added
stringlengths
32
32
created
int64
1,236B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.03
source
stringclasses
1 value
text
stringlengths
330
19.3k
num_lines
int64
16
648
avg_line_length
float64
15.5
59.3
max_line_length
int64
37
179
ast_depth
int64
8
38
length
int64
102
3.79k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.11k
276k
sast_codeql_findings_count
int64
1
33
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
33
rule_ids
listlengths
1
33
confidences
listlengths
1
33
severities
listlengths
1
33
messages
listlengths
1
33
line_starts
listlengths
1
33
line_ends
listlengths
1
33
column_starts
listlengths
1
33
column_ends
listlengths
1
33
2024-11-18T22:30:20.181053+00:00
1,693,352,020,000
717d5182de32647219d29dde6cb6f5298b8ac557
4
{ "blob_id": "717d5182de32647219d29dde6cb6f5298b8ac557", "branch_name": "refs/heads/master", "committer_date": 1693352020000, "content_id": "d1576151d755db52665c0c97485c5adad38a00c4", "detected_licenses": [ "MIT" ], "directory_id": "6f90ed39c673c0553b4173ca1c8dd17fa5994ccf", "extension": "py", "fi...
4
stackv2
''' In this mission you need to create a password verification function. The verification conditions are: the length should be bigger than 6; should contain at least one digit, but it cannot consist of just digits; having numbers or containing just numbers does not apply to the password longer than 9; a string should...
81
35.79
101
16
742
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e707f4f5975f1633_5b391921", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 62 ]
[ null ]
[ 7 ]
[ 38 ]
2024-11-18T22:30:23.128199+00:00
1,609,296,703,000
817e1b492e9711d1d4cd65a090f9d5547334c912
3
{ "blob_id": "817e1b492e9711d1d4cd65a090f9d5547334c912", "branch_name": "refs/heads/main", "committer_date": 1609296703000, "content_id": "a8d0470bef144a5fffefa03e938e9d65953c43ac", "detected_licenses": [ "Apache-2.0" ], "directory_id": "1390e4a0c05a73a177748a7087da71078a07f316", "extension": "py", ...
2.515625
stackv2
import paramiko import os import re import sys import msvcrt username = '*****' pw1 = '***************' host_ip_list1 = '192.168.50.130' def run(host_ip, username, password, command): ssh = paramiko.SSHClient() try: ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy()) ssh.connect(host_ip...
73
31.42
95
17
565
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_2da8d63652c36952_a8d6dd29", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 15 ]
[ null ]
[ 9 ]
[ 66 ]
2024-11-18T22:30:23.969409+00:00
1,609,969,169,000
82f3832cca283d78460c719030416c03abe92a6b
3
{ "blob_id": "82f3832cca283d78460c719030416c03abe92a6b", "branch_name": "refs/heads/master", "committer_date": 1610079484000, "content_id": "4e46562221bf363a904484d864ec6604f7ac48ef", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e3eb2f99c5d268d80fdd4fd25f26b52d67e907ae", "extension": "py"...
2.5625
stackv2
""" Handle session info """ import functools import logging import uuid from flask import g, abort, make_response, session, current_app, Blueprint, request from werkzeug.exceptions import BadRequest import redis import psycopg2 import hashlib import os bp = Blueprint('auth', __name__) __password_hash_version = 1 de...
220
32.12
120
19
1,689
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_849c2310c6840780_749d3fcc", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e...
[ 61 ]
[ null ]
[ 19 ]
[ 28 ]
2024-11-18T22:30:25.046139+00:00
1,491,416,123,000
6c582dbde75cf665ee6ebe93d58c666a0839c13a
2
{ "blob_id": "6c582dbde75cf665ee6ebe93d58c666a0839c13a", "branch_name": "refs/heads/master", "committer_date": 1491416123000, "content_id": "2650ea9c0e7a7f3edf466cc3aa220238fe3f423a", "detected_licenses": [ "Apache-2.0" ], "directory_id": "b30a8202a89914a5dc1dc6a9d19564d27df7bd5f", "extension": "py"...
2.46875
stackv2
from werkzeug.exceptions import default_exceptions from werkzeug.exceptions import HTTPException from flask import Flask, request, make_response from flask import abort as flask_abort, _app_ctx_stack import collections DATABASE = { 'ideas': { '0': { 'title': 'amy', 'desc': 'dances...
278
26.46
117
17
1,826
python
[{"finding_id": "codeql_py/flask-debug_494a6b6aac5731e3_4ad15001", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
4
true
[ "CWE-215", "CWE-730", "CWE-079", "CWE-079" ]
[ "py/flask-debug", "py/regex-injection", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This regular expression depends on a [user-provided value](1) and is executed by [re.match](2).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripti...
[ 277, 110, 152, 249 ]
[ null, null, null, null ]
[ 5, 24, 12, 12 ]
[ 40, 45, 36, 36 ]
2024-11-18T22:44:43.796614+00:00
1,535,853,817,000
7cd4063b052cbb526701ff95ccd649297c6aff1c
2
{ "blob_id": "7cd4063b052cbb526701ff95ccd649297c6aff1c", "branch_name": "refs/heads/master", "committer_date": 1535853817000, "content_id": "43a7d134ce266a080999fa4930722b43b665d628", "detected_licenses": [ "MIT" ], "directory_id": "d2c378d953788aca76fd37f45ebfe36661e894a8", "extension": "py", "fi...
2.484375
stackv2
import fileinput import mysql.connector import os import re import tarfile import urllib.request class Whippy: unwanted_characters = re.compile('(\W+)|(_+)') def __init__(self, use_defaults): if use_defaults: self.directory_home = "" self.directory_nginx_available = "" ...
259
34.23
119
17
1,877
python
[{"finding_id": "codeql_py/tarslip_20f0195442b7d4b7_cd41e039", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 109 ]
[ null ]
[ 9 ]
[ 17 ]
2024-11-18T23:37:03.598631+00:00
1,575,120,447,000
d3ab30d3100cabe75a595351a5bff5c8b2575f86
3
{ "blob_id": "d3ab30d3100cabe75a595351a5bff5c8b2575f86", "branch_name": "refs/heads/master", "committer_date": 1575120447000, "content_id": "fca388d8893dfc708cf033d681685a7e37d999d8", "detected_licenses": [ "MIT" ], "directory_id": "5b85541e5f8bee1b07df9d33266b25c4d0c80c23", "extension": "py", "fi...
3.359375
stackv2
### # # Exercise 18.1 - Update the Guess a secret number game # # Now that you've learned how to save an object into a database and read from it, you can update the # "Guess a secret number" game. # # Your user model should have the following fields: # id (integer) # name (string) # email (string) # secret_numb...
121
31.54
100
20
915
python
[{"finding_id": "codeql_py/cookie-injection_5cef6e7ff80b6c80_b92a2838", "tool_name": "codeql", "rule_id": "py/cookie-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cookie is constructed from a [user-supplied input](1).", "remediation": "", "location": {"file_path": "...
2
true
[ "CWE-020", "CWE-215" ]
[ "py/cookie-injection", "py/flask-debug" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cookie is constructed from a [user-supplied input](1).", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger." ]
[ 60, 121 ]
[ null, null ]
[ 34, 5 ]
[ 39, 24 ]
2024-11-18T23:37:05.178195+00:00
1,637,691,276,000
b8a16f5bb51f8ac7c24948af5db9121c1b3c4964
2
{ "blob_id": "b8a16f5bb51f8ac7c24948af5db9121c1b3c4964", "branch_name": "refs/heads/master", "committer_date": 1637691276000, "content_id": "7bbfbf666b3990a79056867a9793517679df68a2", "detected_licenses": [ "MIT" ], "directory_id": "5d9591c19450e0f023a2722a0dde4c52e0dfca68", "extension": "py", "fi...
2.34375
stackv2
import os import getpass import logging import ipaddress import configparser import urllib.request as urllib import spdyn_update.consts as consts from urllib.parse import urlencode logger = logging.getLogger(__name__) ADDRESSES = ['https://api.ipify.org', 'http://checkip4.spdns.de'] class SpDynUpdate(object): ...
128
38.27
153
19
1,127
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_db5427cd5f5a04b2_53ad9728", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 99 ]
[ null ]
[ 26 ]
[ 65 ]
2024-11-18T23:37:11.367702+00:00
1,490,341,743,000
25b5961bd2e64470f2abbb03e2dfd6074add07d4
3
{ "blob_id": "25b5961bd2e64470f2abbb03e2dfd6074add07d4", "branch_name": "refs/heads/master", "committer_date": 1490341743000, "content_id": "40e0878cf41d1e89bdcf6f0733c077d8ff9b0739", "detected_licenses": [ "MIT" ], "directory_id": "7e64d8979f41695b90aed05b04abaaf36dcfc034", "extension": "py", "fi...
2.65625
stackv2
from .structure_generator import StructureGenerator from collections import namedtuple import io import itertools import operator import os import re Variable = namedtuple('Variable', 'name type initializer is_constant') class Function(object): def __init__(self, structure_generator = None, name = '', return_typ...
253
25.89
117
16
1,274
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_23045fc58fe46342_dcb3bf03", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 140 ]
[ null ]
[ 15 ]
[ 43 ]
2024-11-18T23:37:11.415909+00:00
1,449,681,268,000
91d1055dae1ba8b29ece3bb7dd9ee3566ace60bd
2
{ "blob_id": "91d1055dae1ba8b29ece3bb7dd9ee3566ace60bd", "branch_name": "refs/heads/master", "committer_date": 1449681268000, "content_id": "a53c8eabc1a990a99eb2a0b85e3d75e21c91c0d8", "detected_licenses": [ "Apache-2.0" ], "directory_id": "4a4de52f291c7c520afaeaf26e35c4be07d3133c", "extension": "py"...
2.375
stackv2
""" NGINXify """ from flask import Flask, request, jsonify, abort from flask_limiter import Limiter from jinja2 import Environment from jinja2.loaders import FileSystemLoader from werkzeug.contrib.fixers import ProxyFix from subprocess import call from datetime import datetime, timedelta from psutil import cpu_percent,...
130
28.98
74
16
929
python
[{"finding_id": "codeql_py/path-injection_703ce4001e52622b_02ea18e2", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
5
true
[ "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-079" ]
[ "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/jinja2/autoescape-false" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 69, 82, 91, 92, 44 ]
[ null, null, null, null, null ]
[ 23, 19, 23, 19, 7 ]
[ 35, 31, 35, 31, 57 ]
2024-11-18T21:57:27.378336+00:00
1,481,218,147,000
99226dfd3a556a942a77b17d9646b066358bd99c
3
{ "blob_id": "99226dfd3a556a942a77b17d9646b066358bd99c", "branch_name": "refs/heads/master", "committer_date": 1481218147000, "content_id": "513c7a0c569c2832559077df4bc945e745e06106", "detected_licenses": [ "MIT" ], "directory_id": "7ee3d58796a1615f235fed185554b3c1be9bb59d", "extension": "py", "fi...
3.015625
stackv2
#!/usr/bin/python3 import random import sys import json import string PASSWORD_LEN = 10 CHARS = string.ascii_letters + string.digits def main(): random.seed(23456) if len(sys.argv) < 2: print("Usage:\n{} amount_of_teams".format(sys.argv[0])) sys.exit() amount_of_teams = int(sys.argv[1]) ...
40
26.1
81
14
287
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_60869ee9da43f3eb_d75d462e", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.", "This expression stores [sensitive data (password)](1) as clear text." ]
[ 33, 37 ]
[ null, null ]
[ 17, 17 ]
[ 28, 31 ]
2024-11-18T21:57:58.274971+00:00
1,480,003,780,000
aa4207c8f40b790fd052d76ebf3b2a37bf39cef2
3
{ "blob_id": "aa4207c8f40b790fd052d76ebf3b2a37bf39cef2", "branch_name": "refs/heads/master", "committer_date": 1480003780000, "content_id": "44109ff70a1e1abd928cd31fbaf535fb40d83fcd", "detected_licenses": [ "MIT" ], "directory_id": "1149bbebffd4d2ef611ce51a45de53c4563fca10", "extension": "py", "fi...
2.5625
stackv2
from flask import Flask from flask import render_template, request import click import requests import json import redis from ledger import Ledger app = Flask(__name__) @click.command() @click.option('--port', default=8000, help='Listening port.') @click.option('--name', help='Peer name.') @click.option('--peer-ad...
153
22.99
94
14
817
python
[{"finding_id": "codeql_py/stack-trace-exposure_a138014e27e2280f_83c317a8", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 113 ]
[ null ]
[ 16 ]
[ 22 ]
2024-11-18T21:58:04.131733+00:00
1,643,319,457,000
e0f3b4f440773ea84ad0e9e9b9a8e56ee9929510
3
{ "blob_id": "e0f3b4f440773ea84ad0e9e9b9a8e56ee9929510", "branch_name": "refs/heads/master", "committer_date": 1643319457000, "content_id": "35de55863dd23391a7e5d5b97aca842e9d1c8f2b", "detected_licenses": [ "MIT" ], "directory_id": "b3ed4a75d08010308c833fbe8f0aa32ec71991d7", "extension": "py", "fi...
3.46875
stackv2
import math import cmath import datetime from math import sqrt import random from collections import Counter #Dictionaries Challenge 22: Database Admin Program print("Welcome to the Database Admin Program") log_on_information = { 'admin00':'Rafalq25', 'admin2':'Ravix12345', 'admin3':'Polska123', 'adm...
53
31.89
127
20
419
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0f37674bdc04df6b_e7ee0a1d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 46 ]
[ null ]
[ 23 ]
[ 84 ]
2024-11-18T21:58:04.367776+00:00
1,607,921,845,000
dffeb5f1d5be63940d3f8be05d21d16875df766e
3
{ "blob_id": "dffeb5f1d5be63940d3f8be05d21d16875df766e", "branch_name": "refs/heads/master", "committer_date": 1607921845000, "content_id": "9e069c5c901bdfc7017820b61ca21813d29da5df", "detected_licenses": [ "MIT" ], "directory_id": "085f286152eb99b6cb7c47754e1d8fea65f3d5e7", "extension": "py", "fi...
2.84375
stackv2
from flask import Flask, redirect, url_for app = Flask(__name__) @app.route("/") def home(): return "<h1>Welcome to my project! Add a /hidden/ to the end of the URL to see another page!<h1>" @app.route("/<name>") def user(name): return f"Hello {name}!" @app.route("/hidden/") def admin(): return redirect...
22
27.45
123
12
176
python
[{"finding_id": "codeql_py/reflective-xss_3b71dbea4e0c7d29_91af01bc", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 11 ]
[ null ]
[ 12 ]
[ 28 ]
2024-11-18T21:58:23.705620+00:00
1,620,081,598,000
419cc6b65dca3da85eae8ca106424c06160785b5
3
{ "blob_id": "419cc6b65dca3da85eae8ca106424c06160785b5", "branch_name": "refs/heads/master", "committer_date": 1620081598000, "content_id": "8f01283e0331c7b5a8a4dfb56abb593d384107a1", "detected_licenses": [ "Apache-2.0" ], "directory_id": "d98c0a32d578593f4320aa75710a09647d1b250f", "extension": "py"...
2.59375
stackv2
import re import pandas as pd # -*- coding: utf-8 -*- # Taken from https://github.com/bfelbo/DeepMoji/blob/master/deepmoji/tokenizer.py """ Splits up a Unicode string into a list of tokens. Recognises: - Abbreviations - URLs - Emails - #hashtags - @mentions - emojis - emoticons (limited support) Multiple consecutive...
201
25.66
103
14
1,769
python
[{"finding_id": "codeql_py/overly-large-range_5ed5d4667529c461_5060d574", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 54 ]
[ null ]
[ 50 ]
[ 53 ]
2024-11-18T21:58:38.762990+00:00
1,552,548,080,000
a09949af064ece510f0d6bebc111cc9d9cfc7134
2
{ "blob_id": "a09949af064ece510f0d6bebc111cc9d9cfc7134", "branch_name": "refs/heads/master", "committer_date": 1552548080000, "content_id": "6f125896da04f39e0b4fe39d378da88296e18bb2", "detected_licenses": [ "Apache-2.0" ], "directory_id": "81060302e96d36262c6f577fe48bf9ad4631b253", "extension": "py"...
2.484375
stackv2
import os, webapp2, jinja2 import urllib from google.appengine.api import users from google.appengine.ext import ndb # templates_folder = current_folder + "\\templates" current_folder = os.path.dirname(__file__) templates_folder = os.path.join(current_folder, "templates") environment = jinja2.Environment(loader = jinj...
286
34.68
107
20
2,180
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_4391f941e5280eea_0d0b316f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 9 ]
[ null ]
[ 15 ]
[ 85 ]
2024-11-18T21:58:40.364582+00:00
1,428,764,901,000
c8ca99ff18f36422d0809d32295a94d10ce71ce1
3
{ "blob_id": "c8ca99ff18f36422d0809d32295a94d10ce71ce1", "branch_name": "refs/heads/master", "committer_date": 1428764901000, "content_id": "be7b5e5f4c3aae3700304e8d09e9431bb9c8302b", "detected_licenses": [ "Apache-2.0" ], "directory_id": "bea3b6b9b79d39fd70d778822f555547b526a8fc", "extension": "py"...
2.640625
stackv2
#!/usr/bin/env python """PyCon JSON to HTML Exporter Usage: ./export.py <group> ./export.py 'day1_group1' ./export.py '__all__' Options: -h --help Show this screen """ from datetime import datetime import urllib import time import json import os from babel import dates from docopt import ...
152
28.97
140
14
1,368
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_cad5913439a3b500_5b2f2b80", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 38 ]
[ null ]
[ 13 ]
[ 69 ]
2024-11-18T23:10:52.228482+00:00
1,603,644,741,000
8d15de77fae9f0d3a517720bb566cb325ff174c5
4
{ "blob_id": "8d15de77fae9f0d3a517720bb566cb325ff174c5", "branch_name": "refs/heads/master", "committer_date": 1603644741000, "content_id": "0d04b6333e4c8d56976580796171c586c64bd1d1", "detected_licenses": [ "MIT" ], "directory_id": "82d972e2c7cf9f1e962a07cde976661b1b7a7f40", "extension": "py", "fi...
3.890625
stackv2
# -------------- #Code starts here #Function to read file def read_file(path): #Opening of the file located in the path in 'read' mode file= open(path, 'r') #Reading of the first line of the file and storing it in a variable sentence=file.readline() #Closing of the file file.close...
218
20.11
73
11
1,161
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_62c82cef01844ec8_6539bd52", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.\nT...
6
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive data (secret)](2) as clear text.\nThis expression stores [sensitive data (secret)](3) as clear text.\nThis expression stores [sensitive data (secret)](4) as clear text.\nThis expression stores [sensitive data (sec...
[ 205, 55, 96, 148, 186, 213 ]
[ null, null, null, null, null, null ]
[ 16, 7, 7, 7, 7, 7 ]
[ 26, 19, 19, 19, 19, 17 ]
2024-11-18T23:10:53.909318+00:00
1,548,608,672,000
749ec002254a8c7aa26cc108a73cfba41afbdf9a
2
{ "blob_id": "749ec002254a8c7aa26cc108a73cfba41afbdf9a", "branch_name": "refs/heads/master", "committer_date": 1548608672000, "content_id": "1de41add06645846c7b60252cf9373012d74fbf4", "detected_licenses": [ "Apache-2.0" ], "directory_id": "c1559ca6b9a49b08c5de4549f8974eb9776dccf5", "extension": "py"...
2.390625
stackv2
from __future__ import unicode_literals, print_function import jinja2 ''' intf_config = """ interface GigabitEthernet0/1 description {{ descript }} no switchport ip address {{ ip_addr }} {{ netmask }} speed auto duplex auto """ ''' with open("template_jinja.j2") as file: # read whatever is in the file defined...
29
21.07
91
9
181
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_73238a4075fd484b_0bc0f439", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 26 ]
[ null ]
[ 12 ]
[ 40 ]
2024-11-18T23:10:58.956655+00:00
1,383,870,311,000
c58eded652205e32e9cc6647b37a3dd123fdc184
3
{ "blob_id": "c58eded652205e32e9cc6647b37a3dd123fdc184", "branch_name": "refs/heads/master", "committer_date": 1383870311000, "content_id": "fbee3507f388c6830a0058e39a13b1f4a435ce59", "detected_licenses": [ "MIT" ], "directory_id": "56f09831300412ec654844a1e2b79530dee04333", "extension": "py", "fi...
2.984375
stackv2
import re import urllib import urllib2 import time def request(tree): url = 'http://www.americanforests.org/bigtrees/bigtrees-search/' user_agent = "Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" values = {'search_val' : tree } headers = { 'User-Agent' : user_agent } data = u...
41
30.46
90
13
356
python
[{"finding_id": "codeql_py/overly-large-range_d1a4646794ab2875_f58514c2", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 18 ]
[ null ]
[ 74 ]
[ 77 ]
2024-11-18T22:36:00.829861+00:00
1,565,693,793,000
106eeeb8bace3395b07df936fb361beca2201177
3
{ "blob_id": "106eeeb8bace3395b07df936fb361beca2201177", "branch_name": "refs/heads/master", "committer_date": 1565693793000, "content_id": "c1c8d2537fe4dd0e812c6a46d4604c99671d9518", "detected_licenses": [ "MIT" ], "directory_id": "dd25f12d1754f7796296845fdbef24f204e572f6", "extension": "py", "fi...
3.03125
stackv2
"""import private key or keystore file as parity account""" import json import os import re import sys import click from eth_account import Account class TrustlinesFiles: def __init__(self, password_file, address_file, keystore_file): self.password_file = password_file self.address_file = addres...
110
30.25
105
19
761
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_8bb575edaec58d3d_0226699b", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (password)](3) as clear text.\nThis expression stores [sensitive data (password)](4) as clear text." ]
[ 29 ]
[ null ]
[ 21 ]
[ 29 ]
2024-11-18T22:49:03.115318+00:00
1,591,171,612,000
98beb2a2f5a09736cedf41935d70f9484fc5bfaa
3
{ "blob_id": "98beb2a2f5a09736cedf41935d70f9484fc5bfaa", "branch_name": "refs/heads/master", "committer_date": 1591171612000, "content_id": "1069eb2f4d02e5a1dcaba9e06d114086d843010f", "detected_licenses": [ "Apache-2.0" ], "directory_id": "4310e12366818af27947b5e2c80cb162da93a4b5", "extension": "py"...
2.65625
stackv2
# Copyright 2015 Open Platform for NFV Project, Inc. and its contributors # This software is distributed under the terms and conditions of the 'Apache-2.0' # license which can be found in the file 'LICENSE' in this package distribution # or at 'http://www.apache.org/licenses/LICENSE-2.0'. import html import re import...
331
35.13
114
26
2,517
python
[{"finding_id": "codeql_py/request-without-cert-validation_2fcc75eb0bd0a037_f337f750", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1) by [this value](2).", "This request may run without certificate validation because [it is disabled](1) by [this value](2)." ]
[ 301, 313 ]
[ null, null ]
[ 19, 15 ]
[ 94, 91 ]
2024-11-18T22:49:04.430745+00:00
1,573,777,769,000
c78e277534f5435daea3682a8aa2d6ab28966a91
3
{ "blob_id": "c78e277534f5435daea3682a8aa2d6ab28966a91", "branch_name": "refs/heads/master", "committer_date": 1573777769000, "content_id": "df297c431fd865b8aa1b28b9c58a929f9c6d7835", "detected_licenses": [ "Unlicense" ], "directory_id": "7104f42032eac4816105aed5eba87d25fd43c79e", "extension": "py",...
2.625
stackv2
#!/usr/bin/env python3 import os import argparse from jinja2 import Environment, FileSystemLoader if __name__ == '__main__': parser = argparse.ArgumentParser() parser.add_argument('input', metavar='FILE', type=str) args = parser.parse_args() env = Environment( loader=FileSystemLoader('.'), ...
22
21.36
58
12
111
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_72bfd607ff2fdf4a_e668ea9e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 12 ]
[ 14 ]
[ 11 ]
[ 6 ]
2024-11-18T22:49:06.751694+00:00
1,607,192,785,000
efa1a01760bf7ec7f312ba0484dd363611a47d7b
3
{ "blob_id": "efa1a01760bf7ec7f312ba0484dd363611a47d7b", "branch_name": "refs/heads/master", "committer_date": 1607192785000, "content_id": "e3a35461ce8de6c9f51e3c865ae794b66f06aafe", "detected_licenses": [ "Apache-2.0" ], "directory_id": "3c6c816056a14979f658cf3f7a3ce885b304ba79", "extension": "py"...
2.6875
stackv2
from __future__ import print_function import numpy as np import os import sys import tarfile import pickle from urllib.request import urlretrieve from sklearn.linear_model import logistic from scipy import ndimage url = 'http://commondatastorage.googleapis.com/books1000/' last_percent_reported = None def download_...
267
31.95
113
18
2,064
python
[{"finding_id": "codeql_py/tarslip_002249d7392b0fd7_cb9f928e", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 55 ]
[ null ]
[ 9 ]
[ 12 ]
2024-11-18T22:49:07.152932+00:00
1,582,669,822,000
2e93fb3ededb798ba81f187bc5bf40e1350847f2
3
{ "blob_id": "2e93fb3ededb798ba81f187bc5bf40e1350847f2", "branch_name": "refs/heads/master", "committer_date": 1582669822000, "content_id": "8dc89ca856499574d6c48dc8aa0bd6e5c482c367", "detected_licenses": [ "Apache-2.0" ], "directory_id": "03be39bffde1c9f3edf55ea8401ae865436f5b6d", "extension": "py"...
2.75
stackv2
# the docs for the format: https://docs.google.com/spreadsheets/d/1LGEnOfUu5PjuE42dMoEhIRve5rv3vNsBtk-8DWozwdg/edit?ts=5e322488#gid=870428257 # https://docs.google.com/spreadsheets/d/1raDs8m-Yd_XOFskueqqcMcMxvR2KVhTJg6ILsQXBhnw/edit#gid=121665415 import codecs from datetime import datetime now = datetime.now() # curre...
172
40.13
179
16
3,060
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_e52a2bc6bbce80a4_b670340a", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.", "This expression stores [sensitive data (private)](1) as clear text.", "This expression stores [sensitive data (private)](1) as clear text." ]
[ 164, 166, 169 ]
[ null, null, null ]
[ 28, 28, 28 ]
[ 41, 41, 41 ]
2024-11-18T22:14:54.560821+00:00
1,598,844,091,000
c6a6c1b12747cfe23694dee4fb18a6534754bf62
3
{ "blob_id": "c6a6c1b12747cfe23694dee4fb18a6534754bf62", "branch_name": "refs/heads/master", "committer_date": 1598844091000, "content_id": "b5a6031335e33d90c468efbab4376a0aec1f1fa1", "detected_licenses": [ "MIT" ], "directory_id": "6222739af0f48139afee1337c089647815cc36e6", "extension": "py", "fi...
2.625
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- # import os # import sys import wmi from hashlib import sha1 def _cpuid(c): # 处理器 for cpu in c.Win32_Processor(): cpuid = cpu.ProcessorId.strip() if cpuid is not None: return cpuid else: return "" def _boardid(c): # 主板 for...
168
26.93
80
11
1,417
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_ea30484c0bc4fbbb_f71795ea", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (SHA1) that is insecure.\...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (id)](1) is used in a hashing algorithm (SHA1) that is insecure.\n[Sensitive data (id)](2) is used in a hashing algorithm (SHA1) that is insecure.\n[Sensitive data (id)](3) is used in a hashing algorithm (SHA1) that is insecure.\n[Sensitive data (id)](4) is used in a hashing algorithm (SHA1) that i...
[ 51 ]
[ null ]
[ 15 ]
[ 33 ]
2024-11-18T22:14:57.350519+00:00
1,566,533,881,000
ae4b919893b1373dac8d56312c6e03e3807f0c1e
3
{ "blob_id": "ae4b919893b1373dac8d56312c6e03e3807f0c1e", "branch_name": "refs/heads/master", "committer_date": 1566533881000, "content_id": "5927b72310ed9b948c6654921cf7e673522c4691", "detected_licenses": [ "MIT" ], "directory_id": "f94c7ec6f226272264519127ea9651dc30c38508", "extension": "py", "fi...
2.75
stackv2
import requests import requests_ftp import re import sys import urllib3 urllib3.disable_warnings() # NOTE: urllib warnings are disabled because https certificate validation is disabled. # In general, this is not a secure practice; see more here: https://urllib3.readthedocs.io/en/latest/advanced-usage.html#ssl-warnings...
103
39.36
133
16
1,094
python
[{"finding_id": "codeql_py/request-without-cert-validation_c100f45ba6331d7d_b520c648", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 22 ]
[ null ]
[ 11 ]
[ 108 ]
2024-11-18T22:14:59.753776+00:00
1,437,932,163,000
7ae2e387ea5891161f24f7a9adec9928dc8841c2
3
{ "blob_id": "7ae2e387ea5891161f24f7a9adec9928dc8841c2", "branch_name": "refs/heads/master", "committer_date": 1437932163000, "content_id": "47b9e5a2888d139daf4c07d2192296dab57b8740", "detected_licenses": [ "MIT" ], "directory_id": "190afbd8f751e69f4c97155cddff25b50229b74f", "extension": "py", "fi...
3.1875
stackv2
#!/usr/bin/env python import socket import ssl import datetime import smtplib import argparse import sys import logging # The one external library import certifi def get_connection(address, port): ''' Establishes an SSL connection to the specified address and port ''' # Find out where certifi's root certs ...
129
31.98
114
14
931
python
[{"finding_id": "codeql_py/insecure-default-protocol_61583a6db055348d_1ef2f823", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in...
1
true
[ "CWE-327" ]
[ "py/insecure-default-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used." ]
[ 25 ]
[ 27 ]
[ 16 ]
[ 60 ]
2024-11-18T22:55:24.663931+00:00
1,559,855,168,000
2d239d74165e17d4a65e213188c36679c649a4eb
3
{ "blob_id": "2d239d74165e17d4a65e213188c36679c649a4eb", "branch_name": "refs/heads/master", "committer_date": 1559855168000, "content_id": "07d16211b41d2a9d8ac7fde926e0f70329bdacaf", "detected_licenses": [ "MIT" ], "directory_id": "561c2632a69f13c774918a466fb097ee613d432f", "extension": "py", "fi...
3.25
stackv2
import os import csv from Group import Group from Member import Member from Table import Table from Date import Date def csvParser(filePath): """ filePath is where the file is save, and it must include the name of the file Also, if the file name does not include "Members" or "Fincances", csvParser wil...
130
31.13
83
21
906
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_f91099f24a82100b_3c5c6195", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text." ]
[ 120 ]
[ null ]
[ 23 ]
[ 25 ]
2024-11-18T23:24:03.352188+00:00
1,574,888,635,000
0fd16a8555da1045c3971d9f731b206977bdfa52
2
{ "blob_id": "0fd16a8555da1045c3971d9f731b206977bdfa52", "branch_name": "refs/heads/master", "committer_date": 1574888635000, "content_id": "17ce3208356e2666120a6b7b203f229c837e4ca6", "detected_licenses": [ "MIT" ], "directory_id": "fcbb9da73752589d9ff3b9d9835f84e2a537f9a9", "extension": "py", "fi...
2.421875
stackv2
""" This library contains utilities to use authentication and authorization features of the DCP. """ from typing import List from .dcp_service_account import DCPServiceAccountManager from ..errors import SecurityException security_config_not_set_error = "security configuration not set for {}. Use Config.setup() to s...
59
37.66
119
15
487
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_29a819f064e8961d_9a1ec184", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [iam.gserviceaccount.com](1) may be at an arbitrary pos...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [iam.gserviceaccount.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 37 ]
[ null ]
[ 82 ]
[ 119 ]
2024-11-18T23:32:13.806443+00:00
1,568,670,754,000
aac30affadedd8f239ed5f691a2682b6fa7311d8
2
{ "blob_id": "aac30affadedd8f239ed5f691a2682b6fa7311d8", "branch_name": "refs/heads/master", "committer_date": 1568670754000, "content_id": "4c89c2fa1d0d4bfdfe6b989b41697b8c19f98f0b", "detected_licenses": [ "Apache-2.0" ], "directory_id": "362e8a29e503fa48f34548fa23da7060ab1e961d", "extension": "py"...
2.4375
stackv2
import hashlib import shlex import subprocess import tempfile from lib.constants import PROXYCHAINS from lib.modules.DetectionModule import * class Module(DetectionModule): def __init__(self, name, event_json): super().__init__(name=name, event_json=event_json) def run(self): self.logger.deb...
63
45.03
150
23
580
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_8fafd6e68db3b4cd_857ac966", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [wetransfer.net](1) may be at an arbitrary position in ...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "The string [wetransfer.net](1) may be at an arbitrary position in the sanitized URL.", "The string [wetransfer.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 29, 29 ]
[ null, null ]
[ 20, 52 ]
[ 43, 75 ]
2024-11-18T23:55:42.755116+00:00
1,519,667,481,000
a5d0311734ff6290f47a588ce0caf25984a2bdfa
2
{ "blob_id": "a5d0311734ff6290f47a588ce0caf25984a2bdfa", "branch_name": "refs/heads/master", "committer_date": 1519667481000, "content_id": "6d07cd94b89473a5af0b6b4c5552465ed2d74fcb", "detected_licenses": [ "MIT" ], "directory_id": "a692d07d33bda26ab4f3f2d3b393d068c78eb63d", "extension": "py", "fi...
2.34375
stackv2
from __future__ import unicode_literals import datetime import logging import re import emoji import markdown2 class Message(object): def __init__(self, USER_DATA, CHANNEL_DATA, message): self.__USER_DATA = USER_DATA self.__CHANNEL_DATA = CHANNEL_DATA self._message = message #######...
217
32.75
81
21
1,736
python
[{"finding_id": "codeql_py/overly-large-range_5b096b96ac4687a7_574440d3", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with 0-9 in the same character class, and overlaps with A-Z in ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with 0-9 in the same character class, and overlaps with A-Z in the same character class, and is equivalent to \\[.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 96 ]
[ null ]
[ 48 ]
[ 51 ]
2024-11-18T23:55:48.192155+00:00
1,581,347,173,000
09893761c22b5694cf723f5bf859d85caf7398f8
4
{ "blob_id": "09893761c22b5694cf723f5bf859d85caf7398f8", "branch_name": "refs/heads/master", "committer_date": 1581347173000, "content_id": "1550292d10ade710498d22b52dd18212e9955f7d", "detected_licenses": [ "MIT" ], "directory_id": "fa66a855af11d55a97a12d6f5c284c4bfaea7671", "extension": "py", "fi...
3.578125
stackv2
# Simple command line password manager # can have multiple users passwords, requires user and master key to login # saves the passwords to a encrypted text file import secrets import hashlib import binascii import os import getpass import pickle, json import pyperclip from cryptography.fernet import Fernet def passwor...
144
36.1
129
22
1,135
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_eb464a40621f68de_0e49a1c2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 100, 123 ]
[ null, null ]
[ 57, 51 ]
[ 65, 59 ]
2024-11-18T23:18:23.357072+00:00
1,610,667,673,000
7dba5d42fbe50fd88aee200ed5b5f037e7d183bd
2
{ "blob_id": "7dba5d42fbe50fd88aee200ed5b5f037e7d183bd", "branch_name": "refs/heads/master", "committer_date": 1610667673000, "content_id": "37d03f618ec66e2289d62a44dc88eeafb26f8759", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "d86e14e487cb3c872ef54fcd991818513d5219f2", "extension": "p...
2.453125
stackv2
from __future__ import division from builtins import range from past.utils import old_div import bisect from collections import defaultdict from datetime import timedelta, datetime import dateutil.parser from decimal import Decimal import re import cloudsigma.resource as cr start_time = datetime(2014, 1, 1) end_time ...
110
30.06
79
19
760
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_555470879b721f3b_db982582", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 110 ]
[ null ]
[ 15 ]
[ 45 ]
2024-11-19T00:07:26.251448+00:00
1,577,359,150,000
3222727928ae4ecd5d51cf536368fc826b8ac6e7
3
{ "blob_id": "3222727928ae4ecd5d51cf536368fc826b8ac6e7", "branch_name": "refs/heads/master", "committer_date": 1577359150000, "content_id": "6c9d63958f85ee6757a392cf213b66e0607bd837", "detected_licenses": [ "Apache-2.0" ], "directory_id": "531e7716c126a26dd54e07ce52a973059a44a472", "extension": "py"...
3.015625
stackv2
from day21.script1 import parse, Program, to_codes, to_ascii import re DIRECTIONS = ["north", "east", "south", "west"] DANGEROUS_ITEMS = ["infinite loop", "giant electromagnet", "escape pod", "photons", "molten lava"] def get_combinations_rec(so_far, items, res): if len(items) == 0: res.append(so_far) ...
197
34.23
101
17
1,545
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1e9749a002200832_bf193c1e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 197 ]
[ null ]
[ 11 ]
[ 35 ]
2024-11-19T00:45:03.483978+00:00
1,399,823,488,000
c8fc657c761165565548f28453e1414a418d7a16
2
{ "blob_id": "c8fc657c761165565548f28453e1414a418d7a16", "branch_name": "refs/heads/master", "committer_date": 1399823488000, "content_id": "8fdf7ac622482e85eee99da3ba7ffd8f12964075", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "a4c17715ade823941ef905848b4c509d21ef2a32", "extension": "p...
2.375
stackv2
import json from django.core.serializers.json import DjangoJSONEncoder from django.http import HttpResponse #from django.utils.encoding import force_unicode from django.utils.encoding import force_text from django.utils.functional import Promise from django.utils.translation import ugettext as _ from django.utils.cach...
80
30.75
77
19
491
python
[{"finding_id": "codeql_py/stack-trace-exposure_57a91d34803bdd64_20cfa557", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 37 ]
[ null ]
[ 33 ]
[ 40 ]
2024-11-19T00:45:05.816367+00:00
1,622,808,266,000
cde5f5c5adeb28636b70b29e50e184d947ef8b21
3
{ "blob_id": "cde5f5c5adeb28636b70b29e50e184d947ef8b21", "branch_name": "refs/heads/main", "committer_date": 1622808266000, "content_id": "43587910b211c6bde24fd1f3c245a6ea97343415", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "c36bc912ec289488d6d96bf6447e14ada15363f8", "extension": "py"...
3.125
stackv2
import requests def host_header(host, port): if port == 80: port = 'http://' elif port == 443: port = 'https://' else: print("Couldn't fetch data for the given PORT") return url = port + host headers = {'Host': 'http://evil.com'} response = requests.get(url, he...
19
25
56
11
122
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_008fc3524321d071_366c4faf", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [evil.com](1) may be at an arbitrary position in the sa...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [evil.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 16 ]
[ null ]
[ 8 ]
[ 38 ]
2024-11-19T01:11:39.852482+00:00
1,539,970,125,000
ba7c7bdbe917ce80fc19a8fdee3aa5b9a700eb91
4
{ "blob_id": "ba7c7bdbe917ce80fc19a8fdee3aa5b9a700eb91", "branch_name": "refs/heads/master", "committer_date": 1539970125000, "content_id": "d4d220a70fd3611809f2317b872f06b170dea02f", "detected_licenses": [ "MIT" ], "directory_id": "ffeae925479dfa94d0ec710fcd19061ac3a6e98a", "extension": "py", "fi...
4
stackv2
class Student: def __init__(self,name,school,marks=[]): self.name=name; self.school=school self.marks=marks def average(self): return sum(self.marks)/len(self.marks); @classmethod def friend(cls,origin,friend_name): print ("It Came to Student Class Method") ...
30
31.63
72
11
269
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0df6b6dbc46c5765_9c8e8323", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (priva...
[ 28, 30 ]
[ null, null ]
[ 7, 7 ]
[ 22, 20 ]
2024-11-19T00:44:27.027048+00:00
1,381,987,851,000
932ad9f242394d07484817a1ffc6b8cf19bdc864
2
{ "blob_id": "932ad9f242394d07484817a1ffc6b8cf19bdc864", "branch_name": "refs/heads/master", "committer_date": 1381987851000, "content_id": "ca6dec330b337935804f586f606a21259002f430", "detected_licenses": [ "MIT" ], "directory_id": "f1543edc36cf61725bdec2a14c1ac0ee65c31cc3", "extension": "py", "fi...
2.40625
stackv2
from django.http import HttpResponseRedirect from django.views.generic import FormView, TemplateView from django.views.generic.detail import SingleObjectMixin from django_persistent_todo.forms import AddToDoForm from django_persistent_todo.models import ToDoItem class RedirectMixin(object): def get_success_url(s...
37
31.16
66
13
253
python
[{"finding_id": "codeql_py/url-redirection_3d720dd3df782436_dc50cc76", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 37 ]
[ null ]
[ 37 ]
[ 59 ]
2024-11-19T00:44:29.858565+00:00
1,495,361,546,000
512108991df79bca3da91cf0dacc012f0be7f364
2
{ "blob_id": "512108991df79bca3da91cf0dacc012f0be7f364", "branch_name": "refs/heads/master", "committer_date": 1495361546000, "content_id": "f5482c6d77d61c3aaadb23b59ee4492c241930d9", "detected_licenses": [ "MIT" ], "directory_id": "cc3a3d0db136e361b5f10bdefd131470d60a7705", "extension": "py", "fi...
2.3125
stackv2
#!/usr/bin/python -p import MySQLdb, base64, json, datetime from bottle import run, post, request, response, get, route KEY = "P3NT4G0N" db = MySQLdb.connect("localhost","root","parrot","parrot" ) cursor = db.cursor() def encode(key, string): encoded_chars = [] for i in xrange(len(string)): key_c = key[i % len(...
132
23.7
76
17
962
python
[{"finding_id": "codeql_py/sql-injection_1c7de1bf06dd62ae_651f5add", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown...
4
true
[ "CWE-089", "CWE-089", "CWE-089", "CWE-089" ]
[ "py/sql-injection", "py/sql-injection", "py/sql-injection", "py/sql-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This SQL query depends on a [user-provided value](1).", "This SQL query depends on a [user-provided value](1).", "This SQL query depends on a [user-provided value](1).", "This SQL query depends on a [user-provided value](1)." ]
[ 49, 90, 93, 112 ]
[ null, null, null, null ]
[ 19, 19, 19, 19 ]
[ 22, 22, 22, 22 ]
2024-11-19T00:44:31.837678+00:00
1,600,202,174,000
8ea94f9a76513f444433e448f92901b75603bc0b
3
{ "blob_id": "8ea94f9a76513f444433e448f92901b75603bc0b", "branch_name": "refs/heads/master", "committer_date": 1600202174000, "content_id": "b0f116de9d876699da83bdb7b31e69e5ed8aa25f", "detected_licenses": [ "Apache-2.0" ], "directory_id": "02fc8eabe1f497947e9a23828fb663109c172197", "extension": "py"...
2.5625
stackv2
#!/usr/bin/env python3 from datetime import datetime import requests import pymongo import sys import threading import queue from bs4 import BeautifulSoup SCAN_INTERVAL = 180 # days mongo_client = pymongo.MongoClient('localhost', 27017) db = mongo_client.domain NUM_THREADS = 2 q = queue.Queue() from stem import S...
119
31.23
128
21
977
python
[{"finding_id": "codeql_py/request-without-cert-validation_c96fbf05f5218cd4_0983f9d6", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 47 ]
[ null ]
[ 9 ]
[ 127 ]
2024-11-19T00:44:31.942285+00:00
1,515,910,182,000
ad87093e8e9ab49ca4ca676cfacc60207403a73b
3
{ "blob_id": "ad87093e8e9ab49ca4ca676cfacc60207403a73b", "branch_name": "refs/heads/master", "committer_date": 1515910182000, "content_id": "db799df665c248210116f23554d7f185c849fdfd", "detected_licenses": [ "MIT" ], "directory_id": "389a4f97e3d20ae9d4ad40fa5ddb354826540421", "extension": "py", "fi...
2.578125
stackv2
#!/usr/bin/env python from flask import Flask, request from flask_cors import CORS from configparser import ConfigParser from controller import Window from threading import Thread import requests import pyautogui import win32gui import win32api import win32con import logging import time import os config = ConfigParse...
145
25.3
93
13
926
python
[{"finding_id": "codeql_py/stack-trace-exposure_ce700a136b2f0f8e_350aaf7c", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 79, 91 ]
[ null, null ]
[ 12, 12 ]
[ 25, 28 ]
2024-11-18T23:05:27.726984+00:00
1,453,577,442,000
214288ee375ba76ae319955ae8dc3686f7820ca7
2
{ "blob_id": "214288ee375ba76ae319955ae8dc3686f7820ca7", "branch_name": "refs/heads/master", "committer_date": 1453577442000, "content_id": "ba73cae787200500f45402d6fd7a53f590e01b9f", "detected_licenses": [ "MIT" ], "directory_id": "207a316dde969bfcdb7d65db346060a2f8db65e5", "extension": "py", "fi...
2.5
stackv2
from apscheduler.scheduler import Scheduler from datetime import datetime, timedelta, date from flask import Flask, g, request import json import time from TwitterAPI import TwitterAPI from twilio.rest import TwilioRestClient secret = open("secret").read().strip() access_secret = open("access_secret").read().strip() tw...
143
30.51
84
14
1,158
python
[{"finding_id": "codeql_py/reflective-xss_c77458fca254c5c9_c49a3c0a", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
4
true
[ "CWE-079", "CWE-079", "CWE-079", "CWE-079" ]
[ "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 127, 130, 136, 139 ]
[ null, null, null, null ]
[ 16, 16, 16, 16 ]
[ 49, 49, 47, 47 ]
2024-11-18T23:05:33.688067+00:00
1,682,161,973,000
3776b27f6dd6044425354d524f0806e03f8751f5
2
{ "blob_id": "3776b27f6dd6044425354d524f0806e03f8751f5", "branch_name": "refs/heads/master", "committer_date": 1682161973000, "content_id": "29af1683a8f8db8d6b82c047be667e8feb707853", "detected_licenses": [ "MIT" ], "directory_id": "84429a65215f58b11649f4d722fce407a9a0f28e", "extension": "py", "fi...
2.40625
stackv2
__author__ = 'raz0r' import re import click import requests from requests.packages.urllib3.exceptions import InsecureRequestWarning requests.packages.urllib3.disable_warnings(InsecureRequestWarning) def run(url): response = requests.get(url + '/non_existing', verify=False) banner = parse_response(response.co...
23
30.04
116
14
159
python
[{"finding_id": "codeql_py/request-without-cert-validation_11c59170cf013689_1e09842b", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 11 ]
[ null ]
[ 16 ]
[ 65 ]
2024-11-18T23:11:07.371720+00:00
1,686,980,980,000
f3cdc7eb53f89f76aa0db148a607c4671c84ab31
3
{ "blob_id": "f3cdc7eb53f89f76aa0db148a607c4671c84ab31", "branch_name": "refs/heads/main", "committer_date": 1686980980000, "content_id": "c4737cc304361fe7fce5e51988dab12fbac99e5a", "detected_licenses": [ "Apache-2.0" ], "directory_id": "4a20b102bf7fedcfb03436c627b77e70650a794d", "extension": "py", ...
3.453125
stackv2
""" Implementation of Shamir's secret sharing scheme, based on https://en.m.wikipedia.org/wiki/Shamir%27s_Secret_Sharing#Python_example. """ from __future__ import division, print_function import random import functools # For this application we want a known prime number as close as possible to # our security level; e...
146
30.55
98
15
1,200
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_21451948eb2516b4_6772a447", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi...
5
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secre...
[ 54, 138, 139, 140, 141 ]
[ null, null, null, null, 142 ]
[ 11, 11, 11, 11, 11 ]
[ 34, 38, 38, 98, 36 ]
2024-11-18T23:11:08.307754+00:00
1,556,260,901,000
47ea4133bd79b562b6b214ea5ec91a42f24e4294
3
{ "blob_id": "47ea4133bd79b562b6b214ea5ec91a42f24e4294", "branch_name": "refs/heads/master", "committer_date": 1556260901000, "content_id": "fafa1379c344420317b08f37db0fd40ce0e4e29f", "detected_licenses": [ "MIT" ], "directory_id": "5eec3e39da814e6979e9e5fc2d663e1e13a8d52b", "extension": "py", "fi...
2.671875
stackv2
from flask_restful import Resource, Api from flask import Flask, request, render_template, jsonify import json, requests APIKEY = 'OTgxMDg5ZDc1M2MyMjhmYjQwNTFlMz' class Weather(Resource): def getWeather(locationID): url = 'https://api.willyweather.com.au/v2/{APIKEY}/locations/{locationID}/weather.json?for...
24
37.25
160
11
235
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_add58744366ba97c_88bed98b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 12, 20 ]
[ null, null ]
[ 15, 15 ]
[ 18, 18 ]
2024-11-19T01:21:44.720035+00:00
1,549,217,934,000
39f968d6031a7d07c22f4beb1fb7761c80e4604e
3
{ "blob_id": "39f968d6031a7d07c22f4beb1fb7761c80e4604e", "branch_name": "refs/heads/master", "committer_date": 1549217934000, "content_id": "80bd901c80d3ece077eaf8d98c2ad72fdfbb3e34", "detected_licenses": [ "MIT" ], "directory_id": "0f07107b016d2aee64788966b9f0d322ac46b998", "extension": "py", "fi...
3.0625
stackv2
"""Manage Moya version comparisons Moya version numbers used in libraries consist of one to three integers separated by dots. If there are less than three components, then they are assumed to be equal to 0. Version numbers may also be appended with a hyphen and string to indicate the pre-release version. For exampl...
345
26.66
171
21
2,383
python
[{"finding_id": "codeql_py/overly-large-range_5271ae15a79556ad_37fd9103", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\d in the same character class.", "remediation": "", "loc...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that overlaps with \\d in the same character class.", "Suspicious character range that overlaps with \\d in the same character class." ]
[ 44, 46 ]
[ null, null ]
[ 48, 60 ]
[ 51, 63 ]
2024-11-19T00:11:38.124930+00:00
1,588,921,237,000
59f345dea61e48d2e1da690c4d6efaddf9cf3c25
3
{ "blob_id": "59f345dea61e48d2e1da690c4d6efaddf9cf3c25", "branch_name": "refs/heads/master", "committer_date": 1588921237000, "content_id": "3de234096186eee51489d1c1e8ecc29a8244743a", "detected_licenses": [ "MIT" ], "directory_id": "55d0e2c5c299573281983eac80b5f28c254e7c21", "extension": "py", "fi...
2.90625
stackv2
import os import shutil from jinja2 import Environment, ChoiceLoader, FileSystemLoader from roman_numerals import convert_to_numeral def relative_to_absolute(base, rel): return os.path.abspath(os.path.join(os.path.dirname(base), rel)) def absolute_directory(filename): return os.path.abspath(os.path.dirname(...
77
25.86
83
19
439
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_456a10975af0273a_84c41c63", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 34 ]
[ 39 ]
[ 11 ]
[ 6 ]
2024-11-19T00:11:40.219068+00:00
1,560,649,541,000
e340f9eb422bdfee7847d5db832011c9bf4ca17f
3
{ "blob_id": "e340f9eb422bdfee7847d5db832011c9bf4ca17f", "branch_name": "refs/heads/master", "committer_date": 1560649541000, "content_id": "220bb7c1f7330ff51a9470048a34eb1212e15281", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "627635361eda4252726f85a792b3437e2772e8da", "extension": "p...
3.015625
stackv2
#coding=utf-8 from django.shortcuts import render from django.views.generic import View from django.http import JsonResponse import json from api.transmitters import Transmitters2D from api.hungarian_algorithm import Hungarian class TransmitterDataWrapper: def __init__(self, request): # type: (Dict) ->...
99
29.91
84
16
661
python
[{"finding_id": "codeql_py/stack-trace-exposure_75eeca0ab7253289_b964eae8", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 76 ]
[ 78 ]
[ 33 ]
[ 14 ]
2024-11-19T00:36:59.319953+00:00
1,507,080,334,000
ff69e28ec1026d8f674e40c20b99767c3280573f
3
{ "blob_id": "ff69e28ec1026d8f674e40c20b99767c3280573f", "branch_name": "refs/heads/master", "committer_date": 1507080334000, "content_id": "4d6a133acbfd5695ade3c82370c986db2606bca9", "detected_licenses": [ "MIT" ], "directory_id": "935d026e12df90de8a6a300a3b2f48552eaffb60", "extension": "py", "fi...
2.8125
stackv2
# -*- coding: utf-8 -*- import logging from flask import request from flask_restful import Resource from werkzeug.exceptions import BadRequest from server import api from server.exceptions import HTTPBadRequest from server.models import Users, Products logger = logging.getLogger(__name__) def _is_valid_user(user_...
375
27.69
90
18
2,060
python
[{"finding_id": "codeql_py/log-injection_fbd5017af51951ba_95282f1b", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
4
true
[ "CWE-117", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 53, 80, 131, 269 ]
[ null, null, null, null ]
[ 26, 26, 26, 30 ]
[ 33, 33, 33, 37 ]
2024-11-19T00:37:01.120903+00:00
1,647,379,388,000
01bc046e1ef35ddbb3ca84504e97b0f76e3fc101
3
{ "blob_id": "01bc046e1ef35ddbb3ca84504e97b0f76e3fc101", "branch_name": "refs/heads/main", "committer_date": 1647379388000, "content_id": "8961ebf8646a4ccc4b3b994e8a3f3bb75a0d707b", "detected_licenses": [ "MIT" ], "directory_id": "617b6944969b5ebad0759a1a10ea184373d7d959", "extension": "py", "file...
2.765625
stackv2
"""Net Functions. The following functions give you access to interact with http services. """ from __future__ import print_function __all__ = [ "getExternalIpAddress", "getHostName", "getIpAddress", "getRemoteServers", "httpClient", "httpDelete", "httpGet", "httpPost", "httpPut", ...
414
35.57
88
11
3,342
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1c12416071cc88f2_88a17c3d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
4
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive dat...
[ 157, 207, 266, 407 ]
[ null, null, null, null ]
[ 9, 9, 9, 9 ]
[ 17, 17, 17, 17 ]
2024-11-19T00:51:22.269848+00:00
1,539,207,444,000
617f18186e2d7f652dc8abd01ba3f7075c6b10e1
3
{ "blob_id": "617f18186e2d7f652dc8abd01ba3f7075c6b10e1", "branch_name": "refs/heads/master", "committer_date": 1539207444000, "content_id": "cd82e0db5bd4912ab33b9898a44c723dc56bcdd0", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "ec5180742c04dc7c49f275ba5780d0088cb3efc1", "extension": "p...
2.625
stackv2
#!/usr/bin/env python ''' A log aggregator, parser and forwarder''' import os import sys import asyncore import socket import logging import json from time import sleep from flask import Flask from Queue import Queue from threading import Thread from numbers import Number from collections import Set, Mapping, deque im...
256
28.93
101
17
1,794
python
[{"finding_id": "codeql_py/stack-trace-exposure_5d8e18623710f213_da2a84f8", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-327" ]
[ "py/stack-trace-exposure", "py/insecure-default-protocol" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used." ]
[ 230, 164 ]
[ null, null ]
[ 16, 16 ]
[ 79, 46 ]
2024-11-19T00:51:23.131292+00:00
1,621,278,759,000
652ab8601a27449103fcdea84f30c79bb000be73
3
{ "blob_id": "652ab8601a27449103fcdea84f30c79bb000be73", "branch_name": "refs/heads/main", "committer_date": 1621278759000, "content_id": "e0c575b57eb24efea80cde49f55ade2e5e00ca7f", "detected_licenses": [ "MIT" ], "directory_id": "5a44940f9d022f0121ef6b13fac3e0ac48cf6b1d", "extension": "py", "file...
2.546875
stackv2
import pathlib import re from cronc.libs.task import Task, TCollection class CrontabIO: __ENCODING: str = 'utf-8' def __init__(self, crontab_file: pathlib.Path) -> None: self.__crontab_file: pathlib.Path = crontab_file def read_params(self) -> str: params: str = '' content: str =...
55
33.78
78
20
473
python
[{"finding_id": "codeql_py/overly-large-range_b789cbfe9eec2f00_13a855fc", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", "remediation": "", ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 16 ]
[ null ]
[ 51 ]
[ 54 ]
2024-11-19T00:51:25.139359+00:00
1,439,805,631,000
fe5896bc79ddd8c510bc7f76b6f80fff441ea421
2
{ "blob_id": "fe5896bc79ddd8c510bc7f76b6f80fff441ea421", "branch_name": "refs/heads/master", "committer_date": 1439805631000, "content_id": "9d2a825ab01237c3731637e878c15e07301c02ed", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "c20842c2f19bb904f1eba7a2ce8a33c72eae8f6c", "extension": "p...
2.5
stackv2
#!/usr/bin/python # -*- coding: utf-8 -*- import socket import select import time import sys buffer_size = 4096 delay = 0.0001 class Forward: """连接需要转发的服务器地址 返回连接后的socket对象 """ def __init__(self): self.forward = socket.socket(socket.AF_INET, socket.SOCK_STREAM) def start(self, host,...
134
29.94
88
16
1,028
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_fbcaa048e90cd2ed_12f63feb", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [twsapp.com](1) may be at an arbitrary position in the ...
2
true
[ "CWE-020", "CWE-200" ]
[ "py/incomplete-url-substring-sanitization", "py/bind-socket-all-network-interfaces" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "The string [twsapp.com](1) may be at an arbitrary position in the sanitized URL.", "'' binds a socket to all interfaces." ]
[ 25, 46 ]
[ null, null ]
[ 16, 9 ]
[ 36, 51 ]
2024-11-19T01:02:11.509422+00:00
1,629,361,109,000
bd9dea15e816ce6af26eaba75f432a2989901d60
2
{ "blob_id": "bd9dea15e816ce6af26eaba75f432a2989901d60", "branch_name": "refs/heads/master", "committer_date": 1629364015000, "content_id": "8a45d336c7c550c277da1c21a160dbaffc1a943c", "detected_licenses": [ "MIT" ], "directory_id": "7718cea6708eb7acfa37565362a8b03ade932fee", "extension": "py", "fi...
2.34375
stackv2
import json import re from base64 import b64decode from Crypto.Cipher import AES from Crypto.Cipher import PKCS1_v1_5 from Crypto.PublicKey import RSA from api.core.anime import * def rsa_decrypt(encrypted_text: str, private_key: str) -> bytes: """使用 RSA 解密, 模式 RSA/ECB/PKCS1Padding""" key = b64decode(privat...
146
41.03
86
16
2,494
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_d6fcc1a07c044b75_8157c1ba", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [quan.qq.com](1) may be at an arbitrary position in the...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [quan.qq.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 143 ]
[ null ]
[ 12 ]
[ 37 ]
2024-11-18T23:48:44.524734+00:00
1,458,642,940,000
ab5f6c680e0818de36d5dc94ec1977c8b1b12b0a
3
{ "blob_id": "ab5f6c680e0818de36d5dc94ec1977c8b1b12b0a", "branch_name": "refs/heads/master", "committer_date": 1458642940000, "content_id": "93944bc222ca0d255df8da60be980493f258298c", "detected_licenses": [ "MIT" ], "directory_id": "0d6b39606b448fca36d919e92e722f8e08e7225f", "extension": "py", "fi...
2.578125
stackv2
# -*- coding: UTF-8 -*- import sys import time import hashlib import urllib import urllib2 import argparse def get(url, **kwargs): if kwargs: data = urllib.urlencode(kwargs) request = urllib2.Request(url, data) else: request = urllib2.Request(url) request.add_header('User-Agent', ...
118
27.3
94
15
878
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_3ecf4fd798b3f91d_169f1a1d", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 103 ]
[ null ]
[ 36 ]
[ 58 ]
2024-11-18T23:50:00.035436+00:00
1,553,943,463,000
126fb45f596e85f9ab2c8a6526a3dbc744451faa
2
{ "blob_id": "126fb45f596e85f9ab2c8a6526a3dbc744451faa", "branch_name": "refs/heads/master", "committer_date": 1553943463000, "content_id": "10b757997cea36d3bdbd230f9628b48d7875c28e", "detected_licenses": [ "MIT" ], "directory_id": "651e7a5bbb392db33083b15d0967a9dbeca36b3b", "extension": "py", "fi...
2.359375
stackv2
from os import listdir from os.path import isfile, join import os from jinja2 import Template, FileSystemLoader, Environment import yaml recipes_folder="./recipes" out_dir="out" if not os.path.exists(out_dir): os.makedirs(out_dir) env = Environment(loader=FileSystemLoader('templates')) template = env.get_templat...
35
27.09
102
12
249
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_03ce6575e8e7e599_83798b01", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 13 ]
[ null ]
[ 7 ]
[ 56 ]
2024-11-19T01:51:52.588658+00:00
1,607,673,291,000
232ec1aa1530bf32fafc5865ba9e9f5049371196
4
{ "blob_id": "232ec1aa1530bf32fafc5865ba9e9f5049371196", "branch_name": "refs/heads/main", "committer_date": 1607673291000, "content_id": "d483d3b6b026757b077c917c066fee2d503f2f4a", "detected_licenses": [ "MIT" ], "directory_id": "85fec238f380e5c3205724af65473c2f5238b521", "extension": "py", "file...
3.5625
stackv2
def index_password_checker(line): min_max, char, password = line.split(' ') first_index, second_index = [int(i)-1 for i in min_max.split('-')] char = char.replace(':', '') char_count = password.count(char) # bitwise exclusive or if (password[first_index] == char) ^ (password[second_index] == c...
19
33.16
93
12
157
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2dc92244e4cdb3eb_5773a3d8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 19 ]
[ null ]
[ 11 ]
[ 93 ]
2024-11-19T01:52:01.121224+00:00
1,607,613,445,000
5a7cd694c648124abc700d63ebb948a48ba5b7f3
3
{ "blob_id": "5a7cd694c648124abc700d63ebb948a48ba5b7f3", "branch_name": "refs/heads/master", "committer_date": 1607613445000, "content_id": "142b08fc4a7446b4295cff20393343cbdb096873", "detected_licenses": [ "Apache-2.0" ], "directory_id": "c934f728ee4ef42eaa276ae30769ad9e7c51c285", "extension": "py"...
3.0625
stackv2
"""Manage file transfer to HPCOM7 devices. """ from scp import SCPClient from lxml import etree from pyhpecw7.utils.xml.lib import * from pyhpecw7.features.errors import FileTransferUnsupportedProtocol, FileTransferError, FileHashMismatchError import paramiko import hashlib import os class FileUpload(object): """...
236
32.21
130
21
1,660
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_7542a18a61fb0b46_083d15cf", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 196 ]
[ null ]
[ 9 ]
[ 66 ]
2024-11-19T01:52:01.469834+00:00
1,628,842,788,000
51b3696aa9d23908774571e2392ef1ae8f9ef6c7
3
{ "blob_id": "51b3696aa9d23908774571e2392ef1ae8f9ef6c7", "branch_name": "refs/heads/main", "committer_date": 1628842788000, "content_id": "e4687dabd1a418d787081516a3a9fa5e2a0f604a", "detected_licenses": [ "MIT" ], "directory_id": "a1bb4670af2b7893e50beb9e386724f4bbb85199", "extension": "py", "file...
3.0625
stackv2
from app.test.userCredentialsTest import isCredentialsNotBlank credentialsTest = isCredentialsNotBlank #manage user credentials def readUserCrenditialFile(): ''' this function have a functionality to read userCredential.txt file ''' file = open("userCredentials.txt", "r") print("\tUser Name\tAccount...
61
30.57
89
18
420
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_e43b98cf3a8b8d1a_21e4223f", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.", "This expression stores [sensitive data (password)](1) as clear text." ]
[ 26, 51 ]
[ null, null ]
[ 16, 16 ]
[ 54, 42 ]
2024-11-19T01:52:01.527990+00:00
1,586,447,871,000
d1e2f92d9617d39e88cd7d7274a830f4c458eddb
2
{ "blob_id": "d1e2f92d9617d39e88cd7d7274a830f4c458eddb", "branch_name": "refs/heads/master", "committer_date": 1586447871000, "content_id": "d71f894483418fd8541b418a2d59b63250c56a7a", "detected_licenses": [ "MIT" ], "directory_id": "f69e3be9ddb8dc736bcf3cd31d4c72c0eca620aa", "extension": "py", "fi...
2.359375
stackv2
import time import logging from flask import Blueprint, request, url_for from flask_api import status from ..models import Room, Color from . import _exceptions as exceptions from ._utils import get_content blueprint = Blueprint('api_rooms', __name__, url_prefix="/api/rooms") log = logging.getLogger(__name__) @b...
153
24.32
79
15
902
python
[{"finding_id": "codeql_py/log-injection_65c2268ca5dd48ba_1b9d93fd", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
2
true
[ "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 106, 147 ]
[ null, null ]
[ 44, 34 ]
[ 48, 38 ]
2024-11-19T01:52:13.942981+00:00
1,618,493,158,000
3f24755f273e54731b5f4bd45f334611f36f1415
3
{ "blob_id": "3f24755f273e54731b5f4bd45f334611f36f1415", "branch_name": "refs/heads/master", "committer_date": 1618493158000, "content_id": "67b5a29a89805c6e4c78e15ede289303cc4525f4", "detected_licenses": [ "MIT" ], "directory_id": "e156c86203b9c7fa2378bf9ecc58051109de8249", "extension": "py", "fi...
2.546875
stackv2
import os, glob import argparse import json import requests from requests import auth def create_parser(): parser = argparse.ArgumentParser(description='Add dashboards to Grafana') parser.add_argument('--login', type=str, required=True) parser.add_argument('--password', type=str, required=True) parser...
35
31.57
93
16
259
python
[{"finding_id": "codeql_py/request-without-cert-validation_3896a3c597bf848d_37e1d2ff", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 27 ]
[ 30 ]
[ 20 ]
[ 14 ]
2024-11-19T01:40:02.218659+00:00
1,513,709,550,000
2e2df3c4b4582bf680b6e561a246d690e84a9291
4
{ "blob_id": "2e2df3c4b4582bf680b6e561a246d690e84a9291", "branch_name": "refs/heads/master", "committer_date": 1513709550000, "content_id": "7e0cf4fd8d6d7a6d965d5a34bbb3bd8d69404dbf", "detected_licenses": [ "MIT" ], "directory_id": "8eb8c42f5e82ffed9f47258d55e1d03e4fcd46b7", "extension": "py", "fi...
4.34375
stackv2
# Hangman Game # ------------ import string import sys import random WORDLIST_FILENAME = "words.txt" def load_words(): """ Returns a list of valid words. Words are strings of lowercase letters. Depending on the size of the word list, this function may take a while to finish. """ #print("Loading word list fro...
142
28.75
90
15
1,109
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6308820fd3221dcd_6b7b0687", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text.\nThis expression logs [sensitive data (secret)](4) as clear text.", "This expression logs [sensitive data (secret)](...
[ 120, 122, 125 ]
[ null, null, null ]
[ 9, 10, 10 ]
[ 55, 62, 64 ]
2024-11-18T23:43:31.344231+00:00
1,399,824,304,000
a9285e62ade344261d0cbc9d842ac4bedf93acd6
3
{ "blob_id": "a9285e62ade344261d0cbc9d842ac4bedf93acd6", "branch_name": "refs/heads/master", "committer_date": 1399824304000, "content_id": "ff2e79ca47f3973f2eae66c0649a59645d798d64", "detected_licenses": [ "MIT" ], "directory_id": "ba0652c18184cdfc9deb153a4ac8d36750bbcd9c", "extension": "py", "fi...
2.84375
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- ''' Created on 16 mai 2013 @author: Aristote ''' import webapp2 from google.appengine.ext import ndb import datetime import timezone import re from conf import UL_DEPARTEMENT def html5_datetime_parser(unedate): """ Cette fonction est une fonction qui transfo...
170
34.96
155
14
1,511
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_953c48328bf95d35_e82070d4", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This string, which is used as a regular expression [here](1), has an unescaped '.' befor...
1
true
[ "CWE-020" ]
[ "py/incomplete-hostname-regexp" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This string, which is used as a regular expression [here](1), has an unescaped '.' before 'eventbuck.com', so it might match more hosts than expected." ]
[ 166 ]
[ null ]
[ 38 ]
[ 62 ]
2024-11-19T01:18:10.806572+00:00
1,588,702,800,000
2c2b78d3788be8ed1ff68ca0dae1c4839b489fee
3
{ "blob_id": "2c2b78d3788be8ed1ff68ca0dae1c4839b489fee", "branch_name": "refs/heads/master", "committer_date": 1588702800000, "content_id": "1ae01493b4387d98f683a46d9064909af88d95ef", "detected_licenses": [ "MIT" ], "directory_id": "a9eb1dd8f643b9f85c040330af8b0e19e3e6b9a1", "extension": "py", "fi...
2.53125
stackv2
#!/usr/bin/env python3.8 import subprocess import platform import os ssids = [] passwords = [] credentials = [] osName = platform.system() result = None if osName == 'Linux': if os.geteuid() != 0: exit('This script needs root privilages, please re-execute as root.') result = subprocess.run( ...
53
32.49
147
18
500
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_542a46a41dc36e68_9775458c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 53 ]
[ null ]
[ 11 ]
[ 14 ]
2024-11-19T00:15:56.321966+00:00
1,578,399,651,000
fda4538e10d9cf0cdec7fca044f713e2f2e83e1c
2
{ "blob_id": "fda4538e10d9cf0cdec7fca044f713e2f2e83e1c", "branch_name": "refs/heads/master", "committer_date": 1578399651000, "content_id": "41834119d2e2f8234d01c1d5531f0c8fd3984e39", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "45333ef93e17f3e647729c387f6c40dba714f651", "extension": "p...
2.328125
stackv2
# -*- coding: utf-8 -*- from django.db import models from django.utils.encoding import python_2_unicode_compatible from django.utils.translation import ugettext_lazy as _ import logging from jinja2 import Environment from permabots.models.base import PermabotsModel from permabots import validators logger = logging.get...
48
48.54
138
14
433
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_535edfdf3bf2a46b_a1d66b36", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 38 ]
[ null ]
[ 15 ]
[ 68 ]
2024-11-19T00:16:03.269703+00:00
1,556,322,162,000
ee04b7f1f61b01da587cb2ced9d5ffde78cdf4c1
3
{ "blob_id": "ee04b7f1f61b01da587cb2ced9d5ffde78cdf4c1", "branch_name": "refs/heads/master", "committer_date": 1556322162000, "content_id": "3af31c893651ef80b61c192bea532de31445e0f6", "detected_licenses": [ "MIT" ], "directory_id": "1d58cbc572ef201e912921bdd4f7fcd6d27ff263", "extension": "py", "fi...
3.265625
stackv2
# imports from pymongo import MongoClient import hashlib import uuid import re # connecto to mongodb client = MongoClient("mongodb+srv://root:root@cluster0-xyrvy.mongodb.net/test?retryWrites=true") # tell which database you would like to use db = client.User # name of the collection collection = db.passwords # hash ...
141
31.76
98
17
1,032
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_4733bbdbd3bdbf32_0e316552", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e...
[ 18, 23 ]
[ null, null ]
[ 27, 39 ]
[ 60, 77 ]
2024-11-19T00:16:13.661261+00:00
1,576,521,979,000
c95b5dab42ae2dd97291d48f6daca5e8bf9f4d78
3
{ "blob_id": "c95b5dab42ae2dd97291d48f6daca5e8bf9f4d78", "branch_name": "refs/heads/master", "committer_date": 1576521979000, "content_id": "707199f5100a2139f6fba82b5524f1edcf051ede", "detected_licenses": [ "MIT" ], "directory_id": "9faf3dbb02ab71d6865aca86b9647c84729147e7", "extension": "py", "fi...
2.796875
stackv2
import os import logging from flask import Flask, render_template, request, session, \ make_response, jsonify, redirect from flask_socketio import SocketIO, emit app = Flask(__name__) app.config["SECRET_KEY"] = os.getenv("SECRET_KEY") socketio = SocketIO(app) # This is the structure that will hold all the chann...
75
30.51
93
16
525
python
[{"finding_id": "codeql_py/log-injection_3be26f7e42428a9a_6aa9175c", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 64 ]
[ null ]
[ 21 ]
[ 48 ]
2024-11-19T00:28:37.625372+00:00
1,585,483,019,000
8a31a79d776e74ba0d94b5ad8c7f62896d6650f1
4
{ "blob_id": "8a31a79d776e74ba0d94b5ad8c7f62896d6650f1", "branch_name": "refs/heads/master", "committer_date": 1585483019000, "content_id": "f14c8c9e8b596fafc55118db56de5c862775f372", "detected_licenses": [ "MIT" ], "directory_id": "4ae93a9d624c3bf2cbca1d4c50f0eb8c4bf0b901", "extension": "py", "fi...
3.5
stackv2
import random info = {} s = "abcdefghijklnmnopqrstuvwxyz0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ!@#$%^&*()?" len_password = int(input("Enter number of letters in password: ")) password ="".join(random.sample(s,len_password)) print(password) answer = input("Do you wnat to keep this password: ") if("yes" in answer): a...
19
21.63
80
9
111
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0e6d73e08da6e7c6_172a955c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 11 ]
[ null ]
[ 7 ]
[ 15 ]
2024-11-19T00:50:19.197712+00:00
1,478,300,401,000
eaf7519df2fd7b9410f31e1b09e7fba2e1cf5ff7
3
{ "blob_id": "eaf7519df2fd7b9410f31e1b09e7fba2e1cf5ff7", "branch_name": "refs/heads/master", "committer_date": 1478300401000, "content_id": "50c66d228dc8734c9dd7c401ef631d9eeb8b7b88", "detected_licenses": [ "MIT" ], "directory_id": "6221bd5acd6ada51669baae059bd71c609f3d077", "extension": "py", "fi...
2.875
stackv2
# Copyright (c) 2016 Arista Networks, Inc. All rights reserved. # Arista Networks, Inc. Confidential and Proprietary. """This is a sample EapiClient library. The goal here is to demonstrate several different approaches to solving the same problem. I hope that by doing this the reader will better understand the under...
376
30.12
81
14
2,759
python
[{"finding_id": "codeql_py/request-without-cert-validation_7870c4b51ab78de3_496e30d5", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 277 ]
[ 280 ]
[ 20 ]
[ 47 ]
2024-11-19T01:54:57.101707+00:00
1,611,149,832,000
459cf474bbe69f4dfcb15a3a28b23e050619e997
3
{ "blob_id": "459cf474bbe69f4dfcb15a3a28b23e050619e997", "branch_name": "refs/heads/master", "committer_date": 1611149832000, "content_id": "a3b0dd454860c9490ff1d8959a6f44f6287fd625", "detected_licenses": [ "MIT" ], "directory_id": "a77f00189c729e99247b67c83eba29b432b16b1f", "extension": "py", "fi...
3.34375
stackv2
from Employee import Employee def main(): humans = [Employee("Raiden", "Kusumo", 5000000), Employee("Norman", "Kamaru", 10000000)] for human in humans: print("Gajimu perbulang sekarang adalah", human.monthly_salary) for human in humans: human.monthly_salary += human.monthly_salary * 10 / 100 print() for h...
19
22.11
89
11
139
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4f229d59b88732fd_0faa07c5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 7, 15 ]
[ null, null ]
[ 45, 45 ]
[ 65, 65 ]
2024-11-19T01:55:01.200400+00:00
1,531,478,260,000
483bd684a525f6397fb65a123a751c3971ed811a
2
{ "blob_id": "483bd684a525f6397fb65a123a751c3971ed811a", "branch_name": "refs/heads/master", "committer_date": 1531478260000, "content_id": "0e0837e8222932d2857af1f9d750aef317b7218a", "detected_licenses": [ "MIT" ], "directory_id": "0a9d7d7844d0a87303bef52703794a0af2b44fcc", "extension": "py", "fi...
2.40625
stackv2
#! /usr/bin/env python # -*- coding: utf-8 -*- """ @version: 1.0 @ __author__: kute @ __file__: sftp_downloader.py @ __mtime__: 2016/10/19 17:12 ssh 公私钥密码认证,sftp下载 http://blog.csdn.net/kutejava/article/details/52880573 """ import sys import socket import traceback import paramiko from paramiko import SSHException,...
192
36.33
126
20
1,568
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_2f3b357afeebb0c4_a64010a4", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 60 ]
[ null ]
[ 13 ]
[ 73 ]
2024-11-19T00:53:46.604808+00:00
1,508,162,677,000
6ee608d2d0c61117038013d59a24beefd89932be
2
{ "blob_id": "6ee608d2d0c61117038013d59a24beefd89932be", "branch_name": "refs/heads/master", "committer_date": 1508162677000, "content_id": "4abb51116fe34c518b2c500cf3fab2b3e5c68e50", "detected_licenses": [ "MIT" ], "directory_id": "34ce5b142d87efe6b6e8fe183d8136f04c594b14", "extension": "py", "fi...
2.421875
stackv2
''' WeSee Server ''' import os import sqlite3 import ConfigParser from flask import Flask, request, session, g, redirect, url_for, \ abort, render_template, flash, jsonify, send_from_directory DEBUG = True HOST = '0.0.0.0' PORT = 51008 SECRET_KEY = 'wesee in hhdt dep dev key' app = Flask(__name__) app.config.from...
102
22.79
67
13
655
python
[{"finding_id": "codeql_py/path-injection_3c38bb9eb8ad0bfb_2f93f81f", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 97 ]
[ null ]
[ 32 ]
[ 66 ]
2024-11-19T02:00:48.831217+00:00
1,601,318,166,000
8de7a42a39de2ea3ecda09dd17e01eeb144817c7
3
{ "blob_id": "8de7a42a39de2ea3ecda09dd17e01eeb144817c7", "branch_name": "refs/heads/master", "committer_date": 1601318166000, "content_id": "427acaea02594d749e71551c9fc3b39238c6b02a", "detected_licenses": [ "MIT" ], "directory_id": "460fe15ffffdc0f9824a69bda931c23542d8bdc2", "extension": "py", "fi...
2.734375
stackv2
from tkinter import * import os from PIL import ImageTk, Image import pickle def deleteMAIN (): screen.destroy() def delete1(): screen1.destroy() def DeleteScreen2(): screen2.destroy() def delete2(): screen3.destroy() def delete3(): screen4.destroy() def delete4(): screen5.destroy() def Addpass(): fil...
231
27.91
146
15
1,870
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_36d373bdf80ded51_7e135d59", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text." ]
[ 114 ]
[ null ]
[ 14 ]
[ 32 ]
2024-11-19T02:01:05.662266+00:00
1,555,918,630,000
1ea12b2f696da3cde2469079e686fdbb13788191
2
{ "blob_id": "1ea12b2f696da3cde2469079e686fdbb13788191", "branch_name": "refs/heads/master", "committer_date": 1555918630000, "content_id": "19172d158fed6e26146ffa1b9d6719479f70d825", "detected_licenses": [ "Apache-2.0" ], "directory_id": "7395f9aface26190507f0f224be2b91bd9e30440", "extension": "py"...
2.359375
stackv2
#!/usr/bin/env python # *_* coding: UTF-8 *_* """ @author: Siffre@三弗 @contact: Siffre@aliyun.com @version: 1.0 @license: Apache Licence @file: alisms.py @time: 2018/12/15 11:34 AM         ┏┓  ┏┓+ +        ┏┛┻━━━┛┻┓ + +        ┃      ┃          ┃   ━   ┃ ++ + + +        ████━████ ┃+        ┃       ┃ +      ...
137
28.88
87
15
1,206
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_7fcd00f9d5be9127_933d145f", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (SHA1) that is insecure."...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (id)](1) is used in a hashing algorithm (SHA1) that is insecure." ]
[ 122 ]
[ null ]
[ 32 ]
[ 36 ]
2024-11-19T00:04:31.503372+00:00
1,585,099,651,000
398a7089081d59f51d3ade4ceb08e347dede26c7
3
{ "blob_id": "398a7089081d59f51d3ade4ceb08e347dede26c7", "branch_name": "refs/heads/master", "committer_date": 1585099651000, "content_id": "8265c9af4f9fe8bec59c294fa25c6fb2956a4e46", "detected_licenses": [ "Apache-2.0" ], "directory_id": "ede32896410ba8f12bb7b516e19490ebbfcf79d1", "extension": "py"...
2.796875
stackv2
# validator for UrlSource from typing import List, Callable, Dict, Union, Tuple from loguru import logger import pandas as pd import re from sources.url_source import UrlSource from shared import udatetime class UrlSourceValidator(): def __init__(self): self._locations = {} self._urls = {} ...
138
34.18
94
18
1,077
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_5462ef44f1a8a285_8853e51a", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [https://google.com](1) may be at an arbitrary position...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "The string [https://google.com](1) may be at an arbitrary position in the sanitized URL.", "The string [https://www.google.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 43, 43 ]
[ null, null ]
[ 12, 53 ]
[ 49, 94 ]
2024-11-19T00:04:32.565743+00:00
1,474,462,547,000
4f8e7bf716fa5ee3199e6dd201d2a6577341e964
3
{ "blob_id": "4f8e7bf716fa5ee3199e6dd201d2a6577341e964", "branch_name": "refs/heads/master", "committer_date": 1474462547000, "content_id": "65a6cca76735f19fe594ea81b3fbeb8f4b108e71", "detected_licenses": [ "Apache-2.0" ], "directory_id": "9d388f338ccb52a818c345a6ccdc87775eb38c52", "extension": "py"...
2.9375
stackv2
import getpass import hashlib from pymongo import MongoClient spider_db = MongoClient().spider admin_present = False for user in spider_db.auth.find(): if user["username"] == "admin": admin_present = True break if not admin_present: password1 = getpass.getpass("Give a password for the admin u...
27
28.44
78
17
179
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_a9e2014fb70f765d_a2a7f4e6", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 19 ]
[ null ]
[ 40 ]
[ 65 ]
2024-11-19T00:04:34.866545+00:00
1,611,940,115,000
595c4fc516f11c14de4156aafc707f7b0b88bd79
3
{ "blob_id": "595c4fc516f11c14de4156aafc707f7b0b88bd79", "branch_name": "refs/heads/main", "committer_date": 1611940115000, "content_id": "4d9472b05a25c943af68a6d28c5c9ed54a893ecd", "detected_licenses": [ "MIT" ], "directory_id": "5379177a869e77f78521997769b944c82d8275f2", "extension": "py", "file...
2.625
stackv2
from jinja2 import Template, Environment, FileSystemLoader from yaml import safe_load from typing import List import os # Some constants ROOT_DIR = os.path.join("..", "..") DOCS_DIR = os.path.join(ROOT_DIR, "docs/") LANG_DIR = os.path.join(ROOT_DIR, "lang/") SPECIFICATION_FILE = os.path.join(ROOT_DIR, "spec.yaml") JI...
212
28.86
108
17
1,505
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_cf0de882805b7b36_2b5d916c", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 12 ]
[ null ]
[ 21 ]
[ 71 ]
2024-11-19T00:04:38.804577+00:00
1,663,956,995,000
3be0109a7c24d1b4061202ed43865f34d4fc3d90
3
{ "blob_id": "3be0109a7c24d1b4061202ed43865f34d4fc3d90", "branch_name": "refs/heads/master", "committer_date": 1663956995000, "content_id": "004725917a4bac05f5894f6c1e60a3650f3ad992", "detected_licenses": [ "MIT" ], "directory_id": "bb0c6df450fd7e444454dde0e815c37b13f6bb0c", "extension": "py", "fi...
2.5625
stackv2
"""Customized attributes """ import re import os import shutil import json from numbers import Number, Integral import numpy as np import datajoint as dj from loris.database.attribute_mixin import Placeholder, ProcessMixin from loris.errors import LorisSerializationError from loris.io import spickledumps, spickleloa...
592
22.76
147
17
3,314
python
[{"finding_id": "codeql_py/redos_256b1b6067a8ea97_d78787c7", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'a' and containing many repetition...
2
true
[ "CWE-1333", "CWE-1333" ]
[ "py/redos", "py/redos" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with 'a' and containing many repetitions of 'a'.", "This part of the regular expression may cause exponential backtracking on strings starting with 'a@a' and containing many repetitions of 'a'." ]
[ 265, 265 ]
[ null, null ]
[ 30, 46 ]
[ 33, 49 ]
2024-11-19T00:27:15.128998+00:00
1,463,063,348,000
45265b24c1f1fc6e96c950bcaf154a9d9fe537d0
2
{ "blob_id": "45265b24c1f1fc6e96c950bcaf154a9d9fe537d0", "branch_name": "refs/heads/master", "committer_date": 1463063348000, "content_id": "a775c94a44bfbba1ee70a6fee8945b3bac8723b4", "detected_licenses": [ "MIT" ], "directory_id": "fc1545bfe6b329dc1ad553de588af132da921596", "extension": "py", "fi...
2.484375
stackv2
#!/usr/bin/python from flask import Flask, request, jsonify import logging from logging.handlers import RotatingFileHandler # create our little application :) app = Flask(__name__) app.debug = True app.config['SECRET_KEY'] = 'F34TF$($e34D'; app.config['SQLALCHEMY_DATABASE_URI'] = 'sqlite:///phonebook_server.db' from...
97
24.1
72
14
553
python
[{"finding_id": "codeql_py/log-injection_e0fc6f5fe9239e91_4f9129e3", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
5
true
[ "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 16, 36, 58, 74, 88 ]
[ null, null, null, null, null ]
[ 18, 18, 18, 18, 18 ]
[ 25, 25, 25, 25, 25 ]
2024-11-19T00:40:23.505913+00:00
1,639,898,793,000
f8161fbb409d41ebb090fc2c30c2a58409337b05
2
{ "blob_id": "f8161fbb409d41ebb090fc2c30c2a58409337b05", "branch_name": "refs/heads/master", "committer_date": 1639898793000, "content_id": "efa66bb83ca475e1f57416a76454ba181736721b", "detected_licenses": [ "Apache-2.0" ], "directory_id": "6c3739d13a12bc0cae927da5fe67ceab969d9e55", "extension": "py"...
2.328125
stackv2
#!/usr/bin/env python # # Description: # # Usage: # # Files generated # actions/*.yaml (one for each operation in etc/algosec_wsdl.xml) # import argparse import datetime import glob import jinja2 import json import os import re import requests from xml.dom import minidom import yaml import zeep from operator import i...
330
40.7
95
18
2,761
python
[{"finding_id": "codeql_py/request-without-cert-validation_b12122838ba49378_8d8ec997", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
3
true
[ "CWE-295", "CWE-079", "CWE-079" ]
[ "py/request-without-cert-validation", "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 109, 150, 155 ]
[ null, 152, null ]
[ 28, 16, 16 ]
[ 64, 10, 36 ]
2024-11-19T00:40:29.506504+00:00
1,619,633,422,000
febe6355d4384b4cfd00af4c697b8410c4303d84
2
{ "blob_id": "febe6355d4384b4cfd00af4c697b8410c4303d84", "branch_name": "refs/heads/master", "committer_date": 1619633422000, "content_id": "c2193bae6522a6d3589f280445cc73eba57cff0f", "detected_licenses": [ "MIT" ], "directory_id": "861ecab6d098a64cfa43c675654fc32e86ed96be", "extension": "py", "fi...
2.4375
stackv2
import numpy as np import torch import torch.nn as nn import torchvision.datasets as dsets import torchvision.transforms as transforms from torch.autograd import Variable from tqdm import tqdm from typing import Optional, Union, Tuple, List, Sequence, Iterable import math from scipy.spatial.distance import euclidean fr...
318
36.58
169
17
2,901
python
[{"finding_id": "codeql_py/overly-permissive-file_4eaf8cc1f71819a8_335a1c6f", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world writable." ]
[ 181 ]
[ null ]
[ 9 ]
[ 35 ]
2024-11-19T01:06:06.071486+00:00
1,618,526,230,000
61898af23afa14818028fb27011c9bc30919ac5f
2
{ "blob_id": "61898af23afa14818028fb27011c9bc30919ac5f", "branch_name": "refs/heads/master", "committer_date": 1618526230000, "content_id": "5e8098b87ccc404739ee8438f1dc4a7c97219884", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "51a6d0e88550863ba74572a8537119d903e78719", "extension": "p...
2.34375
stackv2
import os import io import contextlib import paramiko import jinja2 @contextlib.contextmanager def make_client(host, user, private_key): with paramiko.SSHClient() as client: client.set_missing_host_key_policy(paramiko.AutoAddPolicy()) client.connect(host, username=user, pkey=private_key) ...
148
26.05
74
15
1,025
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_5a8175320afa2b4d_17f666cf", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
2
true
[ "CWE-295", "CWE-079" ]
[ "py/paramiko-missing-host-key-validation", "py/jinja2/autoescape-false" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 12, 39 ]
[ null, null ]
[ 9, 11 ]
[ 69, 44 ]
2024-11-19T01:17:13.071376+00:00
1,500,399,871,000
68bdfee548601d4016792aa412e6a25286a3f5f8
3
{ "blob_id": "68bdfee548601d4016792aa412e6a25286a3f5f8", "branch_name": "refs/heads/master", "committer_date": 1500399871000, "content_id": "976e1b3923935d653c1476e87dd026d40ad1bf53", "detected_licenses": [ "MIT" ], "directory_id": "d3372e4375976f9ac7f80bc511c8dfb2122a0a5b", "extension": "py", "fi...
3.0625
stackv2
"""Script for generating html chart file (./html directory) based on local data files""" import json import fsutil import timeutil import wkhtmltoimage from jinja2 import Environment def get_daily_chart_path(config, time): """Returns full path of chart, by given time """ time_str = timeutil.format_to_date_st...
70
34.79
101
13
526
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_e68526ad617ea489_331ee6bc", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 31 ]
[ 33 ]
[ 22 ]
[ 58 ]
2024-11-19T01:17:29.184822+00:00
1,545,281,307,000
660ec63759bc98ff77f81d08e0d3994fb590fc03
3
{ "blob_id": "660ec63759bc98ff77f81d08e0d3994fb590fc03", "branch_name": "refs/heads/master", "committer_date": 1545281307000, "content_id": "42e38e9cdbedafc073d510514def448f78406c81", "detected_licenses": [ "MIT" ], "directory_id": "6b32cfb89434ed6d6dd6cc0fc28b9597c3242c5e", "extension": "py", "fi...
2.5625
stackv2
from flask import Flask, request import json import subprocess app = Flask(__name__) app.config.from_json("config.json") def get_repo(content): return content["repository"]["name"] def execute_script(repo): try: filename = f"./scripts/{repo}.sh" subprocess.call(filename, shell=True) excep...
34
24.09
57
15
193
python
[{"finding_id": "codeql_py/command-line-injection_2ce77705064af134_d459b2e4", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {...
2
true
[ "CWE-078", "CWE-079" ]
[ "py/command-line-injection", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This command line depends on a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 14, 31 ]
[ null, null ]
[ 25, 16 ]
[ 33, 28 ]
2024-11-19T01:17:42.353261+00:00
1,683,637,775,000
f1bbc1cb33e96a4ce5ce6ebf90ddd2be4ae9fe7b
3
{ "blob_id": "f1bbc1cb33e96a4ce5ce6ebf90ddd2be4ae9fe7b", "branch_name": "refs/heads/main", "committer_date": 1683637775000, "content_id": "1cfcff6787cf2e99bd16b2aec0caca85ff65ba36", "detected_licenses": [ "MIT" ], "directory_id": "55a654177d5faeedfc3716530281ab1817b9d793", "extension": "py", "file...
2.828125
stackv2
# -*- coding: utf-8 -*- # Copyright (C) Cardiff University (2018-2021) # SPDX-License-Identifier: MIT """Utilities for URL handling """ import re from os.path import (basename, splitext) from .utils import segments_overlap # GWOSC filename re URL_REGEX = re.compile( r"\A((.*/)*(?P<obs>[^/]+)-" r"(?P<ifo>[A-...
208
24.17
79
18
1,324
python
[{"finding_id": "codeql_py/redos_0a275011b450ee5b_4f9fd628", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '/'.", "remediati...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '/'." ]
[ 15 ]
[ null ]
[ 11 ]
[ 14 ]
2024-11-19T00:41:03.826441+00:00
1,631,354,420,000
d705afa9a50f21ffb48f2c9329c051b73fe7678f
3
{ "blob_id": "d705afa9a50f21ffb48f2c9329c051b73fe7678f", "branch_name": "refs/heads/master", "committer_date": 1631354420000, "content_id": "7c4c7c59db8ce222b2a850592236ebedda2e19df", "detected_licenses": [ "MIT" ], "directory_id": "8d397c0a15d98d4c8f0872d9c31a6936ffc7e7f5", "extension": "py", "fi...
2.703125
stackv2
import os import secrets import string import sys from django.core.management.base import BaseCommand from conf.settings.base import BASE_DIR # TODO: check choice for debug (True/False) def secret_key(): return "".join( secrets.choice(string.digits + string.ascii_letters + string.punctuation) fo...
107
32.05
81
17
867
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_e5593313541a8797_5330ea44", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (secret)](1) as clear text." ]
[ 60 ]
[ null ]
[ 25 ]
[ 33 ]
2024-11-19T00:43:42.138027+00:00
1,498,224,656,000
4cc64334bb3b4db6418dce1d69d027f84c2a22e1
3
{ "blob_id": "4cc64334bb3b4db6418dce1d69d027f84c2a22e1", "branch_name": "refs/heads/master", "committer_date": 1498224656000, "content_id": "402d21cee1f542a91b2bf6b0b6377eb8133a8b88", "detected_licenses": [ "Apache-2.0" ], "directory_id": "eeb53c9e3cc947ca4e29a6d13856229f5fd04a5e", "extension": "py"...
2.890625
stackv2
# coding=utf-8 import argparse import json import re from urllib import request days = {"0":"星期日", "1":"星期一", "2":"星期二", "3":"星期三", "4":"星期四", "5":"星期五", "6":"星期六"} class Anime(): def __init__(self): self.info = None def fetch_anime(self, url): if not re.match("(https?://)?bangumi.bilibili.com...
186
46.82
169
28
2,009
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_6d662f66b23e6f70_e1fd4f13", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'bilibili.com/anime/', so it might m...
1
true
[ "CWE-020" ]
[ "py/incomplete-hostname-regexp" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'bilibili.com/anime/', so it might match more hosts than expected." ]
[ 13 ]
[ null ]
[ 26 ]
[ 71 ]
2024-11-19T01:32:01.845196+00:00
1,633,272,744,000
945dc5383d0ed66e0e58dd4d5d6f65115338d590
2
{ "blob_id": "945dc5383d0ed66e0e58dd4d5d6f65115338d590", "branch_name": "refs/heads/main", "committer_date": 1633272744000, "content_id": "f6401877a8c62d8b1c52f24603122f652db33502", "detected_licenses": [ "MIT" ], "directory_id": "cb5783f2c483e331e227f36d0c86d6f4621422fa", "extension": "py", "file...
2.40625
stackv2
import os import requests from tqdm import tqdm import tarfile, zipfile from landslide_sentry.cache_manager.file_registry import getResourceRecord, REGISTERED_FILE def loadFromCache(key: str, registry=REGISTERED_FILE): """ Using the key, locate the file from cache folder. If required file does not exit i...
154
31.92
155
17
1,068
python
[{"finding_id": "codeql_py/tarslip_4755b8800aa63462_46616bde", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 143 ]
[ null ]
[ 9 ]
[ 12 ]
2024-11-19T01:32:16.354152+00:00
1,614,262,777,000
ca59ff92cc7b16494c34897991d45fc2a39c7072
3
{ "blob_id": "ca59ff92cc7b16494c34897991d45fc2a39c7072", "branch_name": "refs/heads/main", "committer_date": 1614262777000, "content_id": "5625cc24b3072b03324a31518d9613b09168d47b", "detected_licenses": [ "MIT" ], "directory_id": "cc87b93ae02bb47fb878b8a4899de6a433ae9ccb", "extension": "py", "file...
2.9375
stackv2
import json import os from airflow.utils.decorators import apply_defaults from airflow.models.baseoperator import BaseOperator import requests import logging class FlightApiToJsonOperator(BaseOperator): """ Flight API to S3 Operator """ template_fields = ['folder'] api_url = 'http://api.aviationst...
63
33.51
100
19
472
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f18afea10edfac32_2c099078", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 38 ]
[ null ]
[ 27 ]
[ 94 ]
2024-11-19T01:43:37.132728+00:00
1,609,929,087,000
98f215a1a11d29374d4084ede3e4c24954f92ae6
3
{ "blob_id": "98f215a1a11d29374d4084ede3e4c24954f92ae6", "branch_name": "refs/heads/master", "committer_date": 1609929087000, "content_id": "a2bb0c20b563cb14367f17309b5c88b71af64aaf", "detected_licenses": [ "MIT" ], "directory_id": "f3646538e70fa52e55ebfcb85d9bf5e131cb158d", "extension": "py", "fi...
3.234375
stackv2
import set2_challenge10 as cbc import set2_challenge9 as pkcs7 from Crypto.Cipher import AES import random def oracle(message): prepend = bytes([random.randint(0,255) for i in range(random.randint(5,10))]) append = bytes([random.randint(0,255) for i in range(random.randint(5,10))]) plaintext = prepend + me...
43
39.4
124
15
542
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_77afcc3366437c9e_56799046", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
1
true
[ "CWE-327" ]
[ "py/weak-cryptographic-algorithm" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 15 ]
[ null ]
[ 22 ]
[ 88 ]
2024-11-19T01:43:48.499615+00:00
1,603,730,986,000
80e210a3847a90a0485a07170e67300d9aa7715a
3
{ "blob_id": "80e210a3847a90a0485a07170e67300d9aa7715a", "branch_name": "refs/heads/main", "committer_date": 1603730986000, "content_id": "86db19fef54eeabbe65bbcc1030b0df37d6db8a0", "detected_licenses": [ "MIT" ], "directory_id": "e1176ce665afb32f29296e578b55ce6ff46365fb", "extension": "py", "file...
2.625
stackv2
''' File to convert raw arxiv data stored in azure blob into transformed data that can be uploaded to a graph and other downstream tasks for various learning tasks. This is the main file that will call multiple other functions. arxiv_dl pdf 1991 1992 1993 ... src 1991 ...
260
34.59
150
19
1,969
python
[{"finding_id": "codeql_py/tarslip_34f028679d7505c8_95e5d3da", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 107 ]
[ null ]
[ 13 ]
[ 16 ]
2024-11-19T01:44:00.956288+00:00
1,575,389,673,000
85ec33214f98d8f36cd5bbaf00c8bd56319dfc00
4
{ "blob_id": "85ec33214f98d8f36cd5bbaf00c8bd56319dfc00", "branch_name": "refs/heads/master", "committer_date": 1575389673000, "content_id": "cf95347c2c3a40d527f187734bef176eb2653bf6", "detected_licenses": [ "MIT" ], "directory_id": "5776d9edbb6b8ba4e279512d4c1ced110742f960", "extension": "py", "fi...
4.40625
stackv2
#!/usr/bin/env python # coding: utf-8 # In[ ]: print("""Welcome to the Password Generator App! The password generator is a program that will generate a random password for the user. The user will be allowed to input how many upper case letters, special characters, and numbers/digits, he or she wants in a password....
447
34.18
127
20
3,192
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_38491f254b105e94_6484c9ed", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive dat...
[ 185, 204, 399 ]
[ 186, 205, 400 ]
[ 19, 19, 7 ]
[ 74, 72, 64 ]
2024-11-19T01:44:10.850456+00:00
1,693,051,838,000
f0163e3eac43bb3e9cccb8d3e9b7b24a1ad0d645
2
{ "blob_id": "f0163e3eac43bb3e9cccb8d3e9b7b24a1ad0d645", "branch_name": "refs/heads/master", "committer_date": 1693051838000, "content_id": "2fc96e69de528110674eb22349b66e22b4ad3258", "detected_licenses": [ "MIT" ], "directory_id": "d0c29e025998ea401398889ad26aa4ff15ae5ab7", "extension": "py", "fi...
2.453125
stackv2
""" Manage the wasisdk. """ import sys, os, tarfile, shutil from mod import log, util if sys.version_info[0] >= 3: from urllib.request import urlretrieve else: from urllib import urlretrieve dir_name = 'wasi-sdk-14.0' urls = { 'linux': 'https://github.com/WebAssembly/wasi-sdk/releases/download/wasi-...
64
32.16
112
14
576
python
[{"finding_id": "codeql_py/tarslip_5bdebd1d992c9926_ca650f5f", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 52 ]
[ null ]
[ 9 ]
[ 12 ]
2024-11-19T02:19:53.873614+00:00
1,576,442,933,000
d6f0272ae9536a43ea4239219f5c8dc922fc02ec
3
{ "blob_id": "d6f0272ae9536a43ea4239219f5c8dc922fc02ec", "branch_name": "refs/heads/master", "committer_date": 1576442933000, "content_id": "42bbbc87e6bb5764cd58d4be0ab36dcef40a5f16", "detected_licenses": [ "Apache-2.0" ], "directory_id": "93323c1eaf2a2d6c586c29b45e2c3f5801133a87", "extension": "py"...
3.40625
stackv2
import db def main(): userName = '' password = '' # capture username while userName == '': userName = input('Enter your username:') # capture password while password == '': password = input('Enter your password:') # create a database connection conn = db.create_conne...
22
21.5
64
12
108
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8c55e5048082e125_3925e028", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 18 ]
[ null ]
[ 15 ]
[ 64 ]
2024-11-19T01:11:47.520734+00:00
1,596,419,162,000
783bf0d6d71d9cfe7e790c2baf5b25b37232d41a
2
{ "blob_id": "783bf0d6d71d9cfe7e790c2baf5b25b37232d41a", "branch_name": "refs/heads/master", "committer_date": 1596419162000, "content_id": "cc89c7595d6883e53fff858e56294f3b19e30de0", "detected_licenses": [ "Unlicense" ], "directory_id": "2cd9343bb90d52dc8eabcf3a5e75b35f6857768a", "extension": "py",...
2.375
stackv2
import io import base64 from io import BytesIO from flask import Flask, jsonify, make_response, send_file, request from flask_cors import CORS, cross_origin from grad_cam import grad_cam from tensorflow.keras.models import load_model IMG_SIZE = (299, 299) MODEL_PATH='xception_model_ft.h5' app = Flask(__name__) CORS(ap...
87
32.69
112
13
790
python
[{"finding_id": "codeql_py/path-injection_a3fc51dc1e5aacff_667ca811", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 42 ]
[ null ]
[ 15 ]
[ 28 ]
2024-11-19T01:11:56.022526+00:00
1,474,486,532,000
e622bf002fbdf4a8730ce0dbf8aeac788621e05c
3
{ "blob_id": "e622bf002fbdf4a8730ce0dbf8aeac788621e05c", "branch_name": "refs/heads/master", "committer_date": 1474486532000, "content_id": "9ca15e34a80d279407b103f742cbbffa800419d1", "detected_licenses": [ "MIT" ], "directory_id": "edcd3847115ae76b68195bdda54e04ed06a04318", "extension": "py", "fi...
2.703125
stackv2
import re from bs4 import BeautifulSoup import six def has_attr(attr): """Useful wrapper for filtering w/ BeautifulSoup 'find' methods ex: tag.find('iframe', has_attr('src')) """ def inner_has_attr(tag): return tag and tag.has_attr(attr) return inner_has_attr def prepare_iframe(iframe...
189
31.95
88
21
1,479
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_a36da0391d8b92a7_16bc0a52", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'facebook.com/plugins/', so it might...
3
true
[ "CWE-020", "CWE-020", "CWE-020" ]
[ "py/incomplete-hostname-regexp", "py/incomplete-hostname-regexp", "py/incomplete-hostname-regexp" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'facebook.com/plugins/', so it might match more hosts than expected.", "This regular expression has an unescaped '.' before 'vimeo.com/video/', so it might match more hosts than expected.", "This regular expression has an unescaped '.' before 'soundcloud.com/...
[ 46, 121, 131 ]
[ null, null, null ]
[ 26, 26, 26 ]
[ 60, 58, 59 ]
2024-11-19T01:33:47.330450+00:00
1,532,362,119,000
dd7af2ff579c585bda9099d8373b530be4319f6e
2
{ "blob_id": "dd7af2ff579c585bda9099d8373b530be4319f6e", "branch_name": "refs/heads/master", "committer_date": 1532362119000, "content_id": "50f2cff4c54720f8d305a83ec151cc2473cd0de0", "detected_licenses": [ "Apache-2.0" ], "directory_id": "2b4fcfc3d4e5140af32e351ba10645bd7a6c19bd", "extension": "py"...
2.390625
stackv2
import os from flask import ( Flask, redirect, url_for, render_template, request, session, make_response, jsonify, ) from inception import ( create_graph, download_and_extract, run_inference_on_image, ) from shutil import copyfile from werkzeug.utils import secure_f...
114
23.79
80
16
685
python
[{"finding_id": "codeql_py/flask-debug_aacdb9375700d3ba_df833438", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
4
true
[ "CWE-215", "CWE-022", "CWE-022", "CWE-022" ]
[ "py/flask-debug", "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 114, 79, 84, 89 ]
[ null, null, null, null ]
[ 5, 19, 42, 15 ]
[ 35, 56, 62, 35 ]
2024-11-19T01:56:38.703303+00:00
1,628,172,278,000
d720e7146dbd51ed5bd81965ebed7473e850eabf
2
{ "blob_id": "d720e7146dbd51ed5bd81965ebed7473e850eabf", "branch_name": "refs/heads/master", "committer_date": 1628172278000, "content_id": "4e3d7679394fa883f4e558b118a6cc9e1fc42fb4", "detected_licenses": [ "Apache-2.0" ], "directory_id": "5c5fbc8547bca3ee2cd147186a3a8ce40e75dbc3", "extension": "py"...
2.4375
stackv2
from functools import partial from datetime import datetime import constants from parse_utils import group_data def group_key(row): return row.vehicle_make def filter_key(cutoff_date, gender, row): return row.last_updated >= cutoff_date and row.gender == gender cutoff_date = datetime(2017, 3, 1) for gen...
24
28.21
77
11
143
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_89d8ed18c6c150ec_9f88d58f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 23 ]
[ null ]
[ 11 ]
[ 48 ]
2024-11-19T02:10:25.798946+00:00
1,563,896,037,000
2a03bedc173a6dd225b84624ac1d6138838e6967
3
{ "blob_id": "2a03bedc173a6dd225b84624ac1d6138838e6967", "branch_name": "refs/heads/master", "committer_date": 1563896037000, "content_id": "4d0afdaf9f53394bdc6cd7ddab5ce71fb51bc2ce", "detected_licenses": [ "MIT" ], "directory_id": "9d4b7ef25d980b283a625f18b187823fd31e25f8", "extension": "py", "fi...
3.203125
stackv2
import re import numpy as np import nltk nltk.download("stopwords") from nltk.corpus import stopwords from keras.preprocessing.text import Tokenizer from keras.preprocessing.sequence import pad_sequences class DataPreprocessing: def __init__(self): pass def clean_data(self, dataset): # -...
104
32.1
123
19
748
python
[{"finding_id": "codeql_py/overly-large-range_a4caaa9270824cec_9f23fa33", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 29 ]
[ null ]
[ 75 ]
[ 78 ]
2024-11-19T02:10:27.256497+00:00
1,598,494,162,000
9b75b921921d3f53e7aa37f26f1debbe7c597fcf
3
{ "blob_id": "9b75b921921d3f53e7aa37f26f1debbe7c597fcf", "branch_name": "refs/heads/master", "committer_date": 1598494162000, "content_id": "d2481ae353574991117d9bdecb8f8e2d072b9707", "detected_licenses": [ "MIT" ], "directory_id": "c745a07606ad292f39d011718ae98da27c6f4879", "extension": "py", "fi...
2.859375
stackv2
import requests from unidecode import unidecode import pandas as pd import numpy as np # Carregando dataset arquivo = "santos_rent.csv" santos = pd.read_csv(arquivo) arquivo2 = "santos_local.csv" end = pd.read_csv(arquivo2) santos['endereco'] = santos['endereco'].apply(lambda x: x.replace('Primeiro de Maio','1 de Mai...
68
35.44
136
12
757
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_88ac2ae2b1522d4b_cea74341", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 47 ]
[ null ]
[ 15 ]
[ 26 ]