added
stringlengths
32
32
created
int64
1,236B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.03
source
stringclasses
1 value
text
stringlengths
330
19.3k
num_lines
int64
16
648
avg_line_length
float64
15.5
59.3
max_line_length
int64
37
179
ast_depth
int64
8
38
length
int64
102
3.79k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.11k
276k
sast_codeql_findings_count
int64
1
33
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
33
rule_ids
listlengths
1
33
confidences
listlengths
1
33
severities
listlengths
1
33
messages
listlengths
1
33
line_starts
listlengths
1
33
line_ends
listlengths
1
33
column_starts
listlengths
1
33
column_ends
listlengths
1
33
2024-11-18T21:10:27.759362+00:00
1,461,235,377,000
a8e1fa34515795534bb237b1e769f8b181b69296
3
{ "blob_id": "a8e1fa34515795534bb237b1e769f8b181b69296", "branch_name": "refs/heads/master", "committer_date": 1461235377000, "content_id": "8ae82cea70cab98de623cbe4bf0acc2db8a59fb6", "detected_licenses": [ "Apache-2.0" ], "directory_id": "fe30cf0e8b7b715146f0bae023d58103d586d702", "extension": "py"...
2.59375
stackv2
#!/usr/bin/env python import os import urllib2 import re import math def get_ip(): data = urllib2.urlopen( 'http://ftp.apnic.net/apnic/stats/apnic/delegated-apnic-latest' ).read() cnregex = re.compile(r'^apnic\|cn\|ipv4\|[\d\.]+\|\d+\|\d+\|a\w*$', re.I | re.M) cndata = cnregex.findall(data) ...
63
22.21
95
16
491
python
[{"finding_id": "codeql_py/overly-permissive-file_fd18d99be9736acd_dcc9084e", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
2
true
[ "CWE-732", "CWE-732" ]
[ "py/overly-permissive-file", "py/overly-permissive-file" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable.", "Overly permissive mask in chmod sets file to world readable." ]
[ 51, 52 ]
[ null, null ]
[ 5, 5 ]
[ 38, 40 ]
2024-11-18T19:03:18.619633+00:00
1,547,418,302,000
dd9395d4c9c8405d3dc2042838307773bd47d186
2
{ "blob_id": "dd9395d4c9c8405d3dc2042838307773bd47d186", "branch_name": "refs/heads/master", "committer_date": 1547418302000, "content_id": "6f8fbdc868cbaa8c7fa6742297b02562217eaf1f", "detected_licenses": [ "MIT" ], "directory_id": "a63e151547974b04991682e652718a5dd04fdf12", "extension": "py", "fi...
2.359375
stackv2
import os import json from flask import render_template, jsonify, request from networkx.readwrite import json_graph from Mercator import app, analysis_dir from Mercator.utils import graph @app.route('/show_individual_analysis/<string:md5>', methods=['GET']) def show_individual_analysis(md5): """Display Ego grap...
52
35.81
110
18
464
python
[{"finding_id": "codeql_py/path-injection_f0249d9a39e62edd_41a5351e", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
3
true
[ "CWE-022", "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 29, 31, 48 ]
[ null, null, null ]
[ 23, 19, 19 ]
[ 34, 30, 30 ]
2024-11-18T19:03:21.189892+00:00
1,525,002,476,000
177b0fd6e86159b368e8ea48e082b3014d1eddb2
3
{ "blob_id": "177b0fd6e86159b368e8ea48e082b3014d1eddb2", "branch_name": "refs/heads/master", "committer_date": 1525002476000, "content_id": "f93274af90d8233bf5bd1dc80a3a3fe7ad4bf8e0", "detected_licenses": [ "MIT" ], "directory_id": "01726476850128dff3e52b0d2c3ac2873d2fcd0a", "extension": "py", "fi...
3.078125
stackv2
#! /usr/bin/python """ Assumes a Linux system (Debian, more specifically) Requires Python libraries re, requests, os, and lxml Requires program transmission-cli A simple script that searches Nyaa.se for the newest HorribleSubs torrents. Pick the show you wish to download, then pick the quality, and that torrent wil...
120
32.6
111
17
1,071
python
[{"finding_id": "codeql_py/redos_53b621443501f1a7_3f03cd05", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '\\[horriblesubs\\] ' and containi...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '\\[horriblesubs\\] ' and containing many repetitions of ' '." ]
[ 29 ]
[ null ]
[ 44 ]
[ 46 ]
2024-11-18T19:03:39.565208+00:00
1,577,803,234,000
48f229be41688fc405b24d4c93252518898d9eb3
3
{ "blob_id": "48f229be41688fc405b24d4c93252518898d9eb3", "branch_name": "refs/heads/master", "committer_date": 1577803234000, "content_id": "dbc1e0cfbeb432cf30db51516246494b79be4a21", "detected_licenses": [ "Apache-2.0" ], "directory_id": "05870c108ab7a1934b7588aa9d28fd78c05aa70f", "extension": "py"...
2.734375
stackv2
#!/usr/bin/python import os import hashlib from scp import SCPClient from paramiko import SSHClient from paramiko import SFTPClient from paramiko import AutoAddPolicy def _str(data): try: return str(data.decode('utf-8')) except: return str(data) class LRFSClient(object): def __init__(se...
72
30.36
76
16
565
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_cf4c2e400e0b1173_0a5e909b", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 22 ]
[ null ]
[ 9 ]
[ 62 ]
2024-11-18T19:28:34.545056+00:00
1,629,156,751,000
9e419b835bd57a45ad3921a92dba6c4c473c5ad2
2
{ "blob_id": "9e419b835bd57a45ad3921a92dba6c4c473c5ad2", "branch_name": "refs/heads/main", "committer_date": 1629156751000, "content_id": "8d20dad20d07876a19b72e7fe92a62defee66ebb", "detected_licenses": [ "MIT" ], "directory_id": "2966f20ba49e1b1dafbab09ef1fbfdc1f880b244", "extension": "py", "file...
2.359375
stackv2
import base64 import json from requests import Session apikey = "" url_head = "https://terra--search.datahub.figment.io/apikey/" url_tail = "/transactions_search" url = url_head + apikey + url_tail block_cache = {} headers = {"content-type": "application/json"} oracle_feeder = "terra1zue382qey9l5uhhwcwumjhmsne49a0a...
245
32.24
126
26
2,017
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4fa7f9005fbe0a5c_410b08fc", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 121 ]
[ null ]
[ 19 ]
[ 38 ]
2024-11-18T19:28:50.180491+00:00
1,633,400,300,000
b8851519af5515052af8599d52dbcb30c588b688
3
{ "blob_id": "b8851519af5515052af8599d52dbcb30c588b688", "branch_name": "refs/heads/main", "committer_date": 1633400300000, "content_id": "37ebf2a62833baee6ba6fb36028238a44a2f9bf0", "detected_licenses": [ "MIT" ], "directory_id": "739547a5f1f8f589086990d0dc9e7d696ae564d1", "extension": "py", "file...
2.59375
stackv2
from flask import Flask, request, render_template, redirect, url_for import os app = Flask(__name__) app.config['UPLOAD_FOLDER'] = 'static/portraits/' @app.route('/') def root(): return render_template('index.html') @app.route('/submit', methods=['POST']) def submit(): candidate_no = request.form['candidate...
24
24.79
78
13
141
python
[{"finding_id": "codeql_py/flask-debug_75b99a1027af3fde_75f37561", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-022" ]
[ "py/flask-debug", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1)." ]
[ 24, 21 ]
[ null, null ]
[ null, 20 ]
[ 20, 78 ]
2024-11-18T19:29:02.341470+00:00
1,578,941,746,000
91da6e4099ce853bf489be5e1416334c2c9c23b5
2
{ "blob_id": "91da6e4099ce853bf489be5e1416334c2c9c23b5", "branch_name": "refs/heads/master", "committer_date": 1578941746000, "content_id": "ea9bd6576c9ef37f50f8f6b9dc2529959b20b0e7", "detected_licenses": [ "MIT" ], "directory_id": "c4a3f6eaf5dd8eb70ec31b545487a15c9b091053", "extension": "py", "fi...
2.375
stackv2
#!/usr/bin/python3 GRID = (('', '', 'panama', '', '', '', '', '', '', '', 'bell', '', 'echo'), ('bell', '', '', '', '', '', '', '', '', '', 'hounds', 'crickets', ''), ('grammar', 'surprise', '', '', '', '', '', '', 'hallelujah', '', 'bell', '', 'bell'), ('', '', '', '', '', '', '', '', 'bell', ...
148
27.47
94
16
1,132
python
[{"finding_id": "codeql_py/path-injection_d73ebf62d4aad740_c61f619b", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 110 ]
[ null ]
[ 15 ]
[ 17 ]
2024-11-18T19:39:33.474159+00:00
1,572,360,126,000
21cf6e8d0f400ddc2c90014af76eaca3abb68182
2
{ "blob_id": "21cf6e8d0f400ddc2c90014af76eaca3abb68182", "branch_name": "refs/heads/master", "committer_date": 1572360126000, "content_id": "c5b0f1740ad0fc630261de77fbb7d7852ae41e4e", "detected_licenses": [ "MIT" ], "directory_id": "b1f32c9b68fdc942175d784698edca976747c259", "extension": "py", "fi...
2.4375
stackv2
#!/usr/bin/env python # encoding: utf-8 import os import paramiko from config import config as conn class SysCommandor(): def __init__(self): self.conObj = conn.ConfigInspector() #Create the system connection Object def ConEStablisher(self,sysip=None, syspass=None, sysusername=None): try...
69
38.41
95
16
549
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_a4ac2057164266f1_a04800c9", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 17 ]
[ null ]
[ 13 ]
[ 73 ]
2024-11-18T19:39:37.889779+00:00
1,689,872,064,000
9a1990b2095ff910b468d747d9a926dd4efe65b1
3
{ "blob_id": "9a1990b2095ff910b468d747d9a926dd4efe65b1", "branch_name": "refs/heads/main", "committer_date": 1689872064000, "content_id": "23aa8432623486d2cf8a5b0c52dc0ac6acf0c898", "detected_licenses": [ "Apache-2.0" ], "directory_id": "da2c72776c900705a1408b1baeaf88e6849ef12f", "extension": "py", ...
2.78125
stackv2
import gzip import os import shutil import tarfile import zipfile from pathlib import Path from urllib.parse import urlparse from urllib.request import urlretrieve from zipfile import ZipFile def get_df_count(df, col): if df is None: return None return df.agg({col: "max"}).collect()[0][0] + 1 def do...
83
34.11
114
20
608
python
[{"finding_id": "codeql_py/tarslip_d4d28790e8a8da18_8bc56b73", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
5
true
[ "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022" ]
[ "py/tarslip", "py/tarslip", "py/tarslip", "py/tarslip", "py/tarslip" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1).", "This file extraction depends on a [potentially untrusted source](1).", "This file extraction depends on a [potentially untrusted source](1).", "This file extraction depends on a [potentially untrusted source](1).", "This file extractio...
[ 42, 45, 48, 51, 55 ]
[ null, null, null, null, null ]
[ 21, 21, 21, 21, 25 ]
[ 24, 24, 24, 24, 28 ]
2024-11-18T19:39:52.958728+00:00
1,622,384,730,000
44748b4c2cf192daa72065b7d5bcfe8c67a096b5
3
{ "blob_id": "44748b4c2cf192daa72065b7d5bcfe8c67a096b5", "branch_name": "refs/heads/main", "committer_date": 1622384730000, "content_id": "a370341768529813e678a7e4f7e60fcb1892ba36", "detected_licenses": [ "MIT" ], "directory_id": "1c0a33ead3aec49d7864959f4ffbae6920431928", "extension": "py", "file...
2.75
stackv2
import logging import os import time from typing import NamedTuple, Any, Optional import paramiko import yaml log = logging.getLogger(__name__) CONFIG_FILENAME = 'config.yaml' CONFIG_FILEPATH = os.path.join(os.path.dirname(__file__), CONFIG_FILENAME) class Config(NamedTuple): sas_user: str sas_password: st...
113
32.22
75
14
919
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_07279cf05bb285d7_2b47f77e", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 62 ]
[ null ]
[ 9 ]
[ 75 ]
2024-11-18T20:18:06.173706+00:00
1,621,557,647,000
1bcefa929c7acdd61e06f7a4b368b03e21bb3d5d
2
{ "blob_id": "1bcefa929c7acdd61e06f7a4b368b03e21bb3d5d", "branch_name": "refs/heads/master", "committer_date": 1621557647000, "content_id": "6b9c4f964b1faab0702fbe4bf908b58606409594", "detected_licenses": [ "MIT" ], "directory_id": "b44edc501ccf57e1a2940aec4997a32619281784", "extension": "py", "fi...
2.484375
stackv2
#!/usr/bin/env python """ netapp - Uses the NetApp RestAPI to access NetApp data. Docs: https://library.netapp.com/ecmdocs/ECMLP2856304/html/index.html Examples: https://github.com/NetApp/ontap-rest-python/tree/master/examples/rest_api """ import json import time import logging.config import base64 import requests ...
159
39.01
126
19
1,460
python
[{"finding_id": "codeql_py/request-without-cert-validation_602336975418758a_5abca589", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 80, 97 ]
[ null, null ]
[ 13, 13 ]
[ 92, 86 ]
2024-11-18T20:18:31.572631+00:00
1,487,415,877,000
22e1b30bed894cacf12cd4dd24cc512704c7a870
3
{ "blob_id": "22e1b30bed894cacf12cd4dd24cc512704c7a870", "branch_name": "refs/heads/master", "committer_date": 1487415877000, "content_id": "571eb7e0a6c80ace7fb150fc0b604fc32abf06e2", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "d1993b56122976afc3b2eccfc9b5b76899d793c5", "extension": "p...
3.25
stackv2
""" users.py - NOTE: this module should not be run as a standalone scripts, excepts for built-in tests. """ # HISTORY #################################################################### # # 1 Dec12 MR Added the implementation of the Password class # 2 Dec14 MR Ported to Py3 (fi...
72
29.78
78
15
501
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2a5ba0e01245b078_d39585a4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 61 ]
[ null ]
[ 11 ]
[ 12 ]
2024-11-18T20:18:46.134756+00:00
1,469,890,689,000
9474f355d12b20542845ffeda51278ba2dd4ccec
3
{ "blob_id": "9474f355d12b20542845ffeda51278ba2dd4ccec", "branch_name": "refs/heads/master", "committer_date": 1469890689000, "content_id": "016d0b22d2aa7bd451e9e98da7d753bbb7338797", "detected_licenses": [ "ISC" ], "directory_id": "df455397a270a6cd5ca4af1f37685182159f5e53", "extension": "py", "fi...
2.59375
stackv2
"""App Entry Point, initializes wsgi app, sets the routes.""" import json import logging import random from gevent import queue, pool from flask import Flask, render_template, request, Response from cosette.thing import Playlist, Artist, Tag, Track log = logging.getLogger(__name__) app = Flask(__name__) app.config['...
113
28.59
81
18
730
python
[{"finding_id": "codeql_py/flask-debug_2739cde4bd86fe7b_7377d2e5", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
5
true
[ "CWE-215", "CWE-117", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/flask-debug", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "HIGH", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry de...
[ 113, 76, 39, 42, 45 ]
[ null, null, null, null, null ]
[ 5, 69, 44, 53, 55 ]
[ 24, 74, 49, 58, 60 ]
2024-11-18T20:18:53.240917+00:00
1,637,434,355,000
d11a9da5fdbdfc9e870ca61b7ca6161984f3622f
3
{ "blob_id": "d11a9da5fdbdfc9e870ca61b7ca6161984f3622f", "branch_name": "refs/heads/main", "committer_date": 1637434355000, "content_id": "86657e595bf8f515e0cda203fb7df9be6f8ee5e2", "detected_licenses": [ "MIT" ], "directory_id": "21e72a42ec5583b915c91c7b5035fc860db107bd", "extension": "py", "file...
2.6875
stackv2
# -*- coding: utf-8 -*- from __future__ import annotations from subprocess import check_output, CalledProcessError from re import findall, search # EDITABLES PROFILES_KEYWORD = "Profile" KEY_CONTENT_KEYWORD = "Key Content" def wifi_passwords( profiles_keyword: str = "Profile", key_content_keyword: st...
49
26.57
74
17
312
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_85627676b91644f4_83da46a3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 49 ]
[ null ]
[ 9 ]
[ 66 ]
2024-11-18T20:29:36.817571+00:00
1,693,495,759,000
813031c752fb8068397497147362689843e761e7
2
{ "blob_id": "813031c752fb8068397497147362689843e761e7", "branch_name": "refs/heads/master", "committer_date": 1693495759000, "content_id": "3cfa6760b3c94a0754801270a7a28e801c1a0d4d", "detected_licenses": [ "Apache-2.0" ], "directory_id": "b095173b2dbc77c8ad61c42403258c76169b7a63", "extension": "py"...
2.359375
stackv2
# Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. # # Licensed under the Apache License, Version 2.0 (the "License"). You # may not use this file except in compliance with the License. A copy of # the License is located at # # http://aws.amazon.com/apache2.0/ # # or in the "license" file accompan...
110
45.32
100
18
1,083
python
[{"finding_id": "codeql_py/tarslip_728d7bffd8c8ca1d_39faa4e3", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 63 ]
[ null ]
[ 13 ]
[ 15 ]
2024-11-18T20:29:45.904303+00:00
1,614,119,134,000
c2fd5702cf9ea2cec19804caa28d3e1f6a79842c
3
{ "blob_id": "c2fd5702cf9ea2cec19804caa28d3e1f6a79842c", "branch_name": "refs/heads/master", "committer_date": 1614119134000, "content_id": "c796632c4b00857069aa0b9b1f9f915890df52a8", "detected_licenses": [ "Apache-2.0" ], "directory_id": "89f44bdf5a79eb02ffd27fc14e80e3a971703672", "extension": "py"...
2.78125
stackv2
# -*- coding: UTF-8 -*- """ This module contains variables that do not change during run time. The idea is to only ever build one source of truth (be it a binary, or package), and execute that same built thing regardless of the run time environment. """ import time from os import environ from urllib.parse import urljoi...
71
36.56
90
15
599
python
[{"finding_id": "codeql_py/request-without-cert-validation_c1192c998818958c_a5271652", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1) by [this value](2)." ]
[ 44 ]
[ null ]
[ 20 ]
[ 84 ]
2024-11-18T20:29:49.843352+00:00
1,538,639,761,000
9a66f3a6c9dec6c858c448d5aecbbc2a5696b704
3
{ "blob_id": "9a66f3a6c9dec6c858c448d5aecbbc2a5696b704", "branch_name": "refs/heads/master", "committer_date": 1538639761000, "content_id": "266725ac0f62c75a8b5c59de1c96faf8a1b2fe2d", "detected_licenses": [ "MIT" ], "directory_id": "69ddb1aeeeb855dff73b4c9135e9d2ac9e3cfbdb", "extension": "py", "fi...
2.921875
stackv2
"""Pull all profile pictures from randomuser.me and save them to images in .ico format. Also make sure copies of all images in icons/ exist in .ico format.""" from io import BytesIO from os import path, listdir from PIL import Image import requests pull_icons = False convert_images = True convert_icons = True num_ico...
46
37.15
158
19
430
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_37e9009219387739_e1568274", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 34 ]
[ null ]
[ 23 ]
[ 27 ]
2024-11-18T20:29:50.245667+00:00
1,587,436,113,000
4a6325299bcd26214d5f0c938e1e276129918b81
3
{ "blob_id": "4a6325299bcd26214d5f0c938e1e276129918b81", "branch_name": "refs/heads/master", "committer_date": 1587436113000, "content_id": "f7bfb29dfa48f8fb5cfbc7028fa5538f90c82ce8", "detected_licenses": [ "Apache-2.0" ], "directory_id": "1c1163cb3ac21ff177bfd92f8b3975adccdad320", "extension": "py"...
2.640625
stackv2
#!/usr/bin/env python3 import requests import string import argparse from multiprocessing import Process, Queue import urllib3 urllib3.disable_warnings() try: import curses except: curses = None def check(pattern, spot, q, url, iterate=False): headers={'content-type': 'application/x-www-form-urlencode...
186
32.97
125
17
1,524
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8b716e54109e44f4_c34857e2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
4
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-295" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/request-without-cert-validation" ]
[ "HIGH", "HIGH", "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive dat...
[ 179, 186, 186, 29 ]
[ null, null, null, null ]
[ 15, 7, 17, 13 ]
[ 47, 15, 25, 107 ]
2024-11-18T20:51:21.622469+00:00
1,545,325,280,000
a2920b7309c94452e31a5adcf73756077ff06a28
2
{ "blob_id": "a2920b7309c94452e31a5adcf73756077ff06a28", "branch_name": "refs/heads/master", "committer_date": 1545325280000, "content_id": "2183524ac1239de1dfa41bcb81fe99caf493b93a", "detected_licenses": [ "MIT" ], "directory_id": "cfca41bbb5b18530ec57d0efe8392e69bd608755", "extension": "py", "fi...
2.46875
stackv2
from flask import render_template, abort, redirect, url_for, request, session, flash, g # from json import JSONDecodeError from .models import db, Company, Portfolio, User # import requests as req from . import app from .forms import CompanySearchForm, CompanyAddForm, PortfolioAddForm import json import requests from s...
146
36.28
96
16
1,127
python
[{"finding_id": "codeql_py/partial-ssrf_6bafbc7d7cde3bdc_cea70672", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 143 ]
[ null ]
[ 11 ]
[ 84 ]
2024-11-18T20:51:45.167978+00:00
1,672,184,505,000
1afbc07c011228b2c27902246a438588434d4d45
2
{ "blob_id": "1afbc07c011228b2c27902246a438588434d4d45", "branch_name": "refs/heads/master", "committer_date": 1672184505000, "content_id": "432b2052521b4a205c7f91c4f16d52ca0ef35511", "detected_licenses": [ "MIT" ], "directory_id": "c667ff125997a0202968d6df79d654d4b7aa3a6c", "extension": "py", "fi...
2.453125
stackv2
# -*- coding:utf-8 -*- """Reader and writer for URDF format :Organization: AIST Requirements ------------ * numpy * lxml xml parser * jinja2 template engine Examples -------- Read URDF model data given the model file >>> import subprocess >>> subprocess.call('rosrun xacro xacro.py `rospack find atlas_description...
369
35.82
134
23
3,171
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_08bc818d5c5cd4b8_ec6490f7", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 270 ]
[ null ]
[ 15 ]
[ 48 ]
2024-11-18T20:51:46.856936+00:00
1,630,954,568,000
7d4fbe3d2826d3caaaf251c29bd09474280fa169
3
{ "blob_id": "7d4fbe3d2826d3caaaf251c29bd09474280fa169", "branch_name": "refs/heads/main", "committer_date": 1630954568000, "content_id": "1047ceab7b671c29373311adb5792f274f688551", "detected_licenses": [ "Apache-2.0" ], "directory_id": "2152f85c6d18f729d471d1d772c321c9671bb5d6", "extension": "py", ...
3
stackv2
import csv import sys import time from os import system, name import requests import colorama import pyfiglet from requests.packages.urllib3.exceptions import InsecureRequestWarning requests.packages.urllib3.disable_warnings(InsecureRequestWarning) from colorama import Fore, Style, Back colorama.init(autoreset=True) ...
95
19.83
84
18
487
python
[{"finding_id": "codeql_py/request-without-cert-validation_2b95d4df2c6c3a15_a9f4bb76", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 50, 65 ]
[ null, null ]
[ 13, 9 ]
[ 48, 44 ]
2024-11-18T19:07:18.710933+00:00
1,538,518,093,000
648c971586db3bf6bb391c25ebfec98386c4b8f3
2
{ "blob_id": "648c971586db3bf6bb391c25ebfec98386c4b8f3", "branch_name": "refs/heads/master", "committer_date": 1538518093000, "content_id": "2b24fb98633fbef8639d89aa1211fbe303dd1333", "detected_licenses": [ "MIT" ], "directory_id": "6532f7a6347c37f11217b8f23ec49afcd303a328", "extension": "py", "fi...
2.484375
stackv2
#!/usr/bin/env python import os import sys import time import json import paramiko import logging logging.basicConfig(level=logging.ERROR) logger = logging.getLogger(__name__) if len(sys.argv) < 2: print("argument: json script file not speicifed") sys.exit(1) localpath = sys.argv[1] username = "crestron" pas...
70
33.36
97
22
502
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_9815499f6a94d2de_bcbaeee7", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 29 ]
[ null ]
[ 5 ]
[ 65 ]
2024-11-18T19:07:19.376420+00:00
1,591,671,993,000
8ffa6add6b48d6d98000ea6437d9590cce4a945d
2
{ "blob_id": "8ffa6add6b48d6d98000ea6437d9590cce4a945d", "branch_name": "refs/heads/master", "committer_date": 1591671993000, "content_id": "2814be0d53653e278667fde7ce685df1d716c442", "detected_licenses": [ "MIT" ], "directory_id": "3c77b25316dd3446a6bc09558c5c15f5e5a38503", "extension": "py", "fi...
2.3125
stackv2
import tornado.ioloop import tornado.web import hashlib import web import requests import time import os import recieve import generateResponseText as grt # ---------------------------------------------------------------- # 基本配置 # ---------------------------------------------------------------- PORT = 8000 APPID = '...
173
34.42
92
21
1,606
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_191783356de37103_701b3f2c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
4
true
[ "CWE-312", "CWE-094", "CWE-079", "CWE-918" ]
[ "py/clear-text-logging-sensitive-data", "py/code-injection", "py/reflective-xss", "py/partial-ssrf" ]
[ "HIGH", "HIGH", "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This code execution depends on a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 82, 59, 107, 58 ]
[ null, null, null, null ]
[ 15, 21, 24, 16 ]
[ 23, 30, 31, 46 ]
2024-11-18T19:07:49.342093+00:00
1,473,966,198,000
95c4457359d17d00b7b4a4c96b0b8c4051c64e8f
3
{ "blob_id": "95c4457359d17d00b7b4a4c96b0b8c4051c64e8f", "branch_name": "refs/heads/master", "committer_date": 1473966198000, "content_id": "9ff2c95fae06ccf07bcefdba140d6604d4e2d5c8", "detected_licenses": [ "MIT" ], "directory_id": "c6d1e0d374314cca89ba45f10773ad8eb61525b1", "extension": "py", "fi...
2.625
stackv2
from .estimate import Estimate from .state import State, evaluate_state import contextlib import datetime import iso8601 import os import os.path as p import pytz import shortuuid import tempfile import yaml def utcnow(): return pytz.UTC.localize(datetime.datetime.utcnow()) @contextlib.contextmanager def cd(ne...
187
29.2
79
16
1,240
python
[{"finding_id": "codeql_py/overly-permissive-file_29846bfa3fe94df4_663bab14", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable." ]
[ 113 ]
[ null ]
[ 13 ]
[ 41 ]
2024-11-18T19:07:55.535948+00:00
1,620,767,719,000
82baa95dbb7327daaf1188bd8f323c716d10c645
3
{ "blob_id": "82baa95dbb7327daaf1188bd8f323c716d10c645", "branch_name": "refs/heads/master", "committer_date": 1620767719000, "content_id": "5feca92d258b5fd511673a1100d8ac99d0152cc4", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "a2742aa0500fe9dd8f5307a5528d7e1d0b078ee0", "extension": "p...
2.53125
stackv2
""" Copyright 2019 Pacific Gas and Electric Company ALL RIGHTS RESERVED """ import sys import json import requests import threading from time import sleep from datetime import datetime from uuid import uuid4 import urllib3 from conf.ssh import SSH from conf.argumentparser import argparse_get_options from conf.histor...
142
34.51
120
23
1,210
python
[{"finding_id": "codeql_py/request-without-cert-validation_e01a6ee2c9aeadba_eedb6abe", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 64 ]
[ 66 ]
[ 11 ]
[ 70 ]
2024-11-18T19:07:55.734077+00:00
1,498,281,413,000
6cf92fbbded7cff60f0bc5ceca4cfbaf6a5a78f5
3
{ "blob_id": "6cf92fbbded7cff60f0bc5ceca4cfbaf6a5a78f5", "branch_name": "refs/heads/master", "committer_date": 1498281413000, "content_id": "befe3032387fb0f331e887c919111e8613b5abb5", "detected_licenses": [ "MIT" ], "directory_id": "f895cb405a50f17281fd1399c5461a7c2bc887c8", "extension": "py", "fi...
3.171875
stackv2
""" SafeTalk End to end talk encryption, automatically read and clipboard Using pure python rsa module, so the message cannot be too long Author: zjuchenyuan """ import rsa import base64 import pickle import traceback import binascii import threading import os from time import sleep from storage import storage_save, ...
171
25.07
89
15
1,099
python
[{"finding_id": "codeql_py/weak-crypto-key_b2cce4b2ab85d2c3_21bafd87", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",...
1
true
[ "CWE-326" ]
[ "py/weak-crypto-key" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable." ]
[ 42 ]
[ null ]
[ 23 ]
[ 71 ]
2024-11-18T19:18:12.665689+00:00
1,535,677,357,000
cb696345ec94a5b0af500f2d2ab567c9986d9d07
3
{ "blob_id": "cb696345ec94a5b0af500f2d2ab567c9986d9d07", "branch_name": "refs/heads/master", "committer_date": 1535677357000, "content_id": "dd43b27e2806e4ccfb30003853bda8ec05288855", "detected_licenses": [ "Apache-2.0" ], "directory_id": "b6b59aae5ae63416eac5e9615ec20447ce8e0260", "extension": "py"...
3.03125
stackv2
import os import re dirname = os.path.dirname(__file__) def strip_special_chars(string): return re.sub(r"[^A-z^0-9^ ^\-^_^é^ñ]|\\|\^|\]|\[", " ", string) def amalgamate(): files = [] for file in os.listdir(dirname): if file.endswith(".txt"): files.append(os.path.join(dirname, file)) ...
46
23.52
74
15
294
python
[{"finding_id": "codeql_py/overly-large-range_49a574cdefaa6ccf_f3bd1ffb", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 7 ]
[ null ]
[ 23 ]
[ 26 ]
2024-11-18T19:18:19.661217+00:00
1,498,373,756,000
b80e52560e250eebc3f81663e3c83b815864a7d9
3
{ "blob_id": "b80e52560e250eebc3f81663e3c83b815864a7d9", "branch_name": "refs/heads/master", "committer_date": 1498373756000, "content_id": "44fa97421f44d8b340b46babe30f71d093e446d8", "detected_licenses": [ "MIT" ], "directory_id": "80ad608515eef3e15137136d38f1d32b9697e1ff", "extension": "py", "fi...
2.578125
stackv2
#!/usr/bin/python3 # -*- coding: latin-1 -*- import os import sys # import psycopg2 import json from bson import json_util from pymongo import MongoClient from flask import Flask, request, session, g, redirect, url_for, abort, \ render_template, flash def strip_quotes(word): """Strip all quotations marks fro...
137
24.08
99
17
845
python
[{"finding_id": "codeql_py/code-injection_a1704dbfbdb7a8f5_41690a19", "tool_name": "codeql", "rule_id": "py/code-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This code execution depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "...
1
true
[ "CWE-094" ]
[ "py/code-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This code execution depends on a [user-provided value](1)." ]
[ 69 ]
[ null ]
[ 20 ]
[ 36 ]
2024-11-18T19:18:20.245257+00:00
1,646,420,441,000
339059921fea89d6a9177ad7a193506e38f376b7
2
{ "blob_id": "339059921fea89d6a9177ad7a193506e38f376b7", "branch_name": "refs/heads/main", "committer_date": 1646420441000, "content_id": "a559975a2804277ae0612c9519b9450536a79c09", "detected_licenses": [ "MIT" ], "directory_id": "44c648a8248fa81823721d9b9a24852e18ee7996", "extension": "py", "file...
2.484375
stackv2
"""The difference between `dev` and `db` is that `dev` invokes docker. """ from lagoon.config import get_config import pathlib import subprocess import typer import os app = typer.Typer() DB_VERSION = 'postgres:13' @app.command() def backup_restore(fpath: pathlib.Path=typer.Argument(..., exists=True)): """Rest...
156
27.33
88
16
1,098
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d0d463c33213030d_21f1368a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 36 ]
[ null ]
[ 11 ]
[ 17 ]
2024-11-18T19:18:29.138716+00:00
1,566,930,916,000
829c80cb45da9eabaeabc9380877760e832fbdb6
3
{ "blob_id": "829c80cb45da9eabaeabc9380877760e832fbdb6", "branch_name": "refs/heads/master", "committer_date": 1566930916000, "content_id": "b473e9a272584a526ab3bf95fdfa53a8e946e94e", "detected_licenses": [ "MIT" ], "directory_id": "1a3b25a6e430ee68041f315eb10c7402a480b0b4", "extension": "py", "fi...
2.671875
stackv2
""" Caching interface to Kerr QNMs This is a high-level interface to the package. The global cache `qnm.modes_cache` (an instance of :class:`KerrSeqCache`) will return instances of :class:`qnm.spinsequence.KerrSpinSeq` from memory or disk. If a spin sequence is neither in memory nor on disk then it will be computed an...
435
28.9
96
19
3,201
python
[{"finding_id": "codeql_py/tarslip_908b2516a495170e_ee4f4325", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 430 ]
[ null ]
[ 9 ]
[ 12 ]
2024-11-18T19:18:48.794118+00:00
1,649,810,226,000
fa99723055372863faa838c587977fa67c3051e7
3
{ "blob_id": "fa99723055372863faa838c587977fa67c3051e7", "branch_name": "refs/heads/master", "committer_date": 1649811090000, "content_id": "ba74e20a29fb62df4cba125aa9771226259c7e15", "detected_licenses": [ "MIT" ], "directory_id": "41d52285fe21e969bea0b816c9e69eb59368a091", "extension": "py", "fi...
2.578125
stackv2
"""Contains sty file generation code.""" from enum import Enum, auto, unique from time import gmtime, strftime from typing import Any, Dict from jinja2 import Environment, FileSystemLoader, Template MAIN_TEMPLATE = "kappak.sty" OUTPUT_DIRECTORY = "../out/texmf/tex/latex/kappak" TEMPLATE_DIRECTORY = "templates" @un...
105
32.93
75
17
775
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_da773303b5714fbe_95d84dbd", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 90 ]
[ 102 ]
[ 19 ]
[ 6 ]
2024-11-18T19:18:57.381927+00:00
1,447,293,135,000
c222c35e30eb6cff2a73bbf3f041665bd572ee57
3
{ "blob_id": "c222c35e30eb6cff2a73bbf3f041665bd572ee57", "branch_name": "refs/heads/master", "committer_date": 1447293135000, "content_id": "29ba54cdf6548936ee576bfce961fd022eac55c6", "detected_licenses": [ "Apache-2.0" ], "directory_id": "09b9f534be445657c40e2e2285466dbd15436d5b", "extension": "py"...
2.9375
stackv2
#! /bin/env python2.7 import argparse import getpass import hashlib import os import subprocess from itertools import starmap, cycle def encrypt(message, key): # single letter encrpytion. def enc(c, k): return chr((ord(k) + ord(c)) % 256) return "".join(starmap(enc, zip(message, cycle(key)))) def decryp...
82
33.76
90
14
713
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_aa7ca82683d26909_1ba96b64", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
3
true
[ "CWE-312", "CWE-312", "CWE-327" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function."...
[ 58, 60, 30 ]
[ null, null, null ]
[ 18, 11, 27 ]
[ 35, 53, 61 ]
2024-11-18T19:29:48.627424+00:00
1,558,904,702,000
6bf4387a9a9f566fbda5450142f3ce956c66e55b
3
{ "blob_id": "6bf4387a9a9f566fbda5450142f3ce956c66e55b", "branch_name": "refs/heads/master", "committer_date": 1558904702000, "content_id": "1fcf1211735f18ebaae136175759245331553a6d", "detected_licenses": [ "MIT" ], "directory_id": "a066058f4246a55aa219dd0efe46d86961330ff0", "extension": "py", "fi...
2.796875
stackv2
import json import os import requests import pandas as pd from textblob import TextBlob from datetime import date as dt from datetime import timedelta from vaderSentiment.vaderSentiment import SentimentIntensityAnalyzer import statistics class news_data(): def __init__(self, stock_name,from_date=str(dt.today())): ...
119
25.97
91
18
670
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1d67cabd4194a712_af42dcac", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive dat...
[ 32, 33, 34 ]
[ null, null, null ]
[ 19, 19, 19 ]
[ 33, 31, 34 ]
2024-11-18T19:29:53.618366+00:00
1,441,402,373,000
09c97b83f681afeb2cff1ae3059ab734ecc2fd11
2
{ "blob_id": "09c97b83f681afeb2cff1ae3059ab734ecc2fd11", "branch_name": "refs/heads/master", "committer_date": 1441402373000, "content_id": "3a88dbbd1c2a3117499d9077c91247361e1484fc", "detected_licenses": [ "MIT" ], "directory_id": "eb44f4ad176f3cfc17f341d97578d977ff3a276a", "extension": "py", "fi...
2.484375
stackv2
"""Bark Usage: bark new <name> bark make [<settings>] Options: -h --help Show this screen. --version Show version. """ __author__ = 'Casey Weed' __version__ = '1.3.4' from docopt import docopt import json import errno import shutil from hoedown import Markdown, HtmlRenderer, SmartyPants from dateti...
281
30.69
150
18
1,936
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_95531948fe128db4_06451b2a", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 123, 148 ]
[ null, null ]
[ 25, 22 ]
[ 44, 35 ]
2024-11-18T20:23:15.153737+00:00
1,629,685,035,000
562f136d6f7ecd9b8e68ca83da3835d236dd2f0b
2
{ "blob_id": "562f136d6f7ecd9b8e68ca83da3835d236dd2f0b", "branch_name": "refs/heads/master", "committer_date": 1629685035000, "content_id": "8ace412909263bbfa29d0d674a858344e19c45d1", "detected_licenses": [ "MIT" ], "directory_id": "73cda135ead724647b0068a64b0d575ba2d1fa8f", "extension": "py", "fi...
2.3125
stackv2
import jinja2 import json import os import pickle import yaml from collections import defaultdict from jinja2 import Environment from pathlib import Path # Path to read the Bioconda recipes ROOT = "." # Path to write the Bioconda recipes. AROT = "." def fake(foo, **args): pass def parse_bioconda(directory): ...
36
29.67
172
18
269
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_59faaadcb310d2d1_a002c15c", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 24 ]
[ null ]
[ 24 ]
[ 54 ]
2024-11-18T20:23:24.421663+00:00
1,592,757,298,000
db03557dfef23c781b45ecb6ff883418f7b664c9
3
{ "blob_id": "db03557dfef23c781b45ecb6ff883418f7b664c9", "branch_name": "refs/heads/master", "committer_date": 1592757298000, "content_id": "09f97d322f7548f02cc52579b24254787dda4d3e", "detected_licenses": [ "Apache-2.0" ], "directory_id": "be88364bdcb3eb3bcf18bdaa9f8adfdf897f72bb", "extension": "py"...
2.578125
stackv2
import logging import threading import config from dahua import DahuaController, Status class BruteThread(threading.Thread): def __init__(self, brute_queue, screenshot_queue): threading.Thread.__init__(self) self.brute_queue = brute_queue self.screenshot_queue = screenshot_queue ...
53
36.6
106
20
443
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_42231c892efe5354_f4340a2f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive dat...
[ 26, 29, 35 ]
[ null, null, null ]
[ 27, 27, 27 ]
[ 85, 85, 106 ]
2024-11-18T20:23:25.270849+00:00
1,609,267,873,000
3b35894ec9d49ba1524d057142854a0be859bb15
3
{ "blob_id": "3b35894ec9d49ba1524d057142854a0be859bb15", "branch_name": "refs/heads/master", "committer_date": 1609267873000, "content_id": "048836e691d10f21c391bf749fcfacb54e6cb499", "detected_licenses": [ "MIT" ], "directory_id": "d0c00685d91b73273acd8d0eaa1f4190afca2bc2", "extension": "py", "fi...
2.734375
stackv2
#### Convert the (vougen)rsc File to csv #### PEZHMAN SHAFIGH 2019 import os import re import csv import datetime file_in = 'users.rsc' file_ou = 'users.csv' num_lines = sum(1 for line in open(file_in)) with open(file_in) as file_object: string = '' for line in file_object: string += line.rstrip()...
35
26.94
59
16
303
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_3881631829804fdb_6ab9dd80", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 34 ]
[ null ]
[ 25 ]
[ 35 ]
2024-11-18T20:23:34.425391+00:00
1,639,626,651,000
9df8c19b187d0ca54a6806ed8102c61b28059bed
2
{ "blob_id": "9df8c19b187d0ca54a6806ed8102c61b28059bed", "branch_name": "refs/heads/master", "committer_date": 1639626651000, "content_id": "eee869426a094c36ead4fcc45421945e2f7b7a21", "detected_licenses": [ "MIT" ], "directory_id": "5b92ff560ab2e25f431c65b6add6adb022cb7aa7", "extension": "py", "fi...
2.375
stackv2
#!/usr/bin/env python import json import requests import logging import watchtower import os from admanagerplusclient.connection import Connection logging.basicConfig(level=logging.INFO) logger = logging.getLogger(__name__) env_name = "prod" if "prod" in os.environ.get('SMP_SETUP_DIR') else "dev" logger.addHandler(wa...
100
39.88
138
16
951
python
[{"finding_id": "codeql_py/request-without-cert-validation_d7e90c9b8fe21071_90cbb9d0", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 63, 61 ]
[ null, null ]
[ 17, 17 ]
[ 96, 109 ]
2024-11-18T20:23:41.579706+00:00
1,517,289,115,000
3f95fc6028f33f85b985803deb7a7ef3efe6e31f
2
{ "blob_id": "3f95fc6028f33f85b985803deb7a7ef3efe6e31f", "branch_name": "refs/heads/master", "committer_date": 1517289115000, "content_id": "5a083af9bae7d63a0d9a473ba521361b29fd6ae2", "detected_licenses": [ "Apache-2.0", "MIT", "BSD-2-Clause" ], "directory_id": "f1b759605f5be03b9059f854b6a2bc7...
2.390625
stackv2
from __future__ import print_function import json, re, os, operator, urllib, argparse import praw from praw.exceptions import APIException import prawcore import ImgurBot import VideoBot import bmemcached import SlaveBot import GfycatBot import moviepy.editor as mp class RiskyClickerBot: def __init__(self, herok...
371
34.09
139
21
2,939
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_b8fd69ed950ec2d5_76394610", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [imgur.com/](1) may be at an arbitrary position in the ...
4
true
[ "CWE-020", "CWE-020", "CWE-020", "CWE-1333" ]
[ "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization", "py/overly-large-range", "py/redos" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "The string [imgur.com/](1) may be at an arbitrary position in the sanitized URL.", "The string [gfycat.com/](1) may be at an arbitrary position in the sanitized URL.", "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", "This part of the regular expression...
[ 37, 64, 98, 98 ]
[ null, null, null, null ]
[ 12, 14, 53, 34 ]
[ 40, 43, 56, 101 ]
2024-11-18T20:48:57.922842+00:00
1,619,391,911,000
685b753162526806fb643720ab365603031877a0
2
{ "blob_id": "685b753162526806fb643720ab365603031877a0", "branch_name": "refs/heads/master", "committer_date": 1619391911000, "content_id": "40038e5a8c478e91a7863b4ae568d20ceebfaa63", "detected_licenses": [ "Apache-2.0" ], "directory_id": "bb51d23687a6ff9cc10620455c74055b78a3082b", "extension": "py"...
2.453125
stackv2
import os import sys import tarfile import argparse import pathlib import urllib.request as request from google_drive_downloader import GoogleDriveDownloader as gdd from scipy import io import glob # The URL where the CVPR2016 FLOWERS data can be downloaded. # https://github.com/reedscot/cvpr2016 # http://www.robots.o...
105
40.31
123
17
1,161
python
[{"finding_id": "codeql_py/tarslip_9251bfd516ca02e6_789a4995", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/tarslip", "py/tarslip" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1).", "This file extraction depends on a [potentially untrusted source](1)." ]
[ 59, 71 ]
[ null, null ]
[ 5, 5 ]
[ 49, 40 ]
2024-11-18T20:50:51.603906+00:00
1,487,824,817,000
9851fd65b8ff4d415b6f8431ad90d100256a9f92
2
{ "blob_id": "9851fd65b8ff4d415b6f8431ad90d100256a9f92", "branch_name": "refs/heads/master", "committer_date": 1487824817000, "content_id": "2ec7175f2c406ed09f3ad99a53707ef6c785dcde", "detected_licenses": [ "Apache-2.0" ], "directory_id": "69c0174cbc7acea6f55ef725d1e669e08c977dd6", "extension": "py"...
2.390625
stackv2
# Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under th...
36
35.92
92
13
288
python
[{"finding_id": "codeql_py/request-without-cert-validation_f04b016f92124e77_fcab3c72", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1) by [this value](2)." ]
[ 36 ]
[ null ]
[ 16 ]
[ 65 ]
2024-11-18T20:50:53.432398+00:00
1,597,492,448,000
385ed17f16a9f470c4b4e8e6de8a35428e9d2b7c
3
{ "blob_id": "385ed17f16a9f470c4b4e8e6de8a35428e9d2b7c", "branch_name": "refs/heads/master", "committer_date": 1597492448000, "content_id": "d3b57b607d807b2f8d59b06f11c069f726a3f4ff", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "8bcce040afc41a91056ee44f9853df610c34f7cf", "extension": "p...
2.625
stackv2
import hashlib import string import random def random_string(string_length=20): letters = string.ascii_letters return ''.join(random.choice(letters) for i in range(string_length)) def new_account(redis): redis.incr("uids") uid = redis.get("uids") passwd = random_string() pipe = redis.pipelin...
59
33.8
72
13
624
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_39209f5970e13050_54ccd42a", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 17 ]
[ null ]
[ 14 ]
[ 40 ]
2024-11-18T20:50:54.311782+00:00
1,693,279,486,000
664ce27a2290fca1c5aed6b735f925762db357fe
3
{ "blob_id": "664ce27a2290fca1c5aed6b735f925762db357fe", "branch_name": "refs/heads/main", "committer_date": 1693279486000, "content_id": "4a414fe7adc8346047d9be6bb285b9290318bd8c", "detected_licenses": [ "Apache-2.0" ], "directory_id": "5e6221deeb03b53957c1c24754fd81370587c743", "extension": "py", ...
2.5625
stackv2
""" Helpers for madgraph """ from __future__ import annotations import logging import multiprocessing import re import shutil import sys from pathlib import Path import in_place from jinja2 import StrictUndefined, Template from mapyde.typing import ImmutableConfig logging.basicConfig() log = logging.getLogger() ...
362
36.69
157
23
3,271
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_5452a9090cd55d94_0323157d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 241, 223 ]
[ 243, null ]
[ 9, 9 ]
[ 10, 66 ]
2024-11-18T21:13:47.331614+00:00
1,616,495,279,000
8ad9f198ed72e80206626ab78965b4ad435c214f
3
{ "blob_id": "8ad9f198ed72e80206626ab78965b4ad435c214f", "branch_name": "refs/heads/main", "committer_date": 1616495279000, "content_id": "5dd44f1c120f256b5f85bdf642e4cc0da79e04a5", "detected_licenses": [ "MIT" ], "directory_id": "0804c9f4d46e15a93a4322808b487eb00c28da95", "extension": "py", "file...
3.234375
stackv2
from flask import Flask, request, g app = Flask(__name__) @app.before_first_request def first_request(): print ("This function is run before first request") @app.before_request def each_request(): g.user='guest' print ("This is run before {} visits '{}'".format(g.user, request.path)) @app.after_request d...
24
27.62
96
11
159
python
[{"finding_id": "codeql_py/reflective-xss_882bfc4e8c86e21b_e256326c", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 20 ]
[ null ]
[ 12 ]
[ 72 ]
2024-11-18T21:13:47.385105+00:00
1,686,919,876,000
af02e595124c971a56c1e2cea8003b52fb6672c3
2
{ "blob_id": "af02e595124c971a56c1e2cea8003b52fb6672c3", "branch_name": "refs/heads/master", "committer_date": 1686920835000, "content_id": "7464ba0f4cb84722ee3a4d55b5018fb335e84e04", "detected_licenses": [ "MIT" ], "directory_id": "5a09825ce30b58b75a04f0cfff355207991ffd1e", "extension": "py", "fi...
2.40625
stackv2
#!/usr/bin/env python3 """This module contain a "download-scripts" subcommand for the airgap resource.""" import os from itertools import groupby from os.path import abspath, basename, dirname, join import requests from cbw_api_toolbox.cbw_api import CBWApi SH_EXECUTE_SCRIPT = """#!/bin/bash set -eu readonly DIR=...
134
32.96
88
15
1,033
python
[{"finding_id": "codeql_py/request-without-cert-validation_c1b115856ee928c1_739d1807", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-732" ]
[ "py/request-without-cert-validation", "py/overly-permissive-file" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "Overly permissive mask in chmod sets file to world readable." ]
[ 91, 125 ]
[ null, null ]
[ 18, 9 ]
[ 71, 36 ]
2024-11-18T21:13:47.820655+00:00
1,693,318,965,000
ce493445059f08ab78bd8d7a79b37d65a7f329d1
3
{ "blob_id": "ce493445059f08ab78bd8d7a79b37d65a7f329d1", "branch_name": "refs/heads/master", "committer_date": 1693318965000, "content_id": "10b3d75ad848b88e55ceba1af7ea4071154a5e5a", "detected_licenses": [ "Apache-2.0" ], "directory_id": "29eac50cc208d8aaebde699e8c851ed84b2de591", "extension": "py"...
2.546875
stackv2
""" About the speech_commands corpus This is a set of one-second .wav audio files, each containing a single spoken English word or background noise. These words are from a small set of commands, and are spoken by a variety of different speakers. This data set is designed to help train simple machine learning models. It...
402
36.29
120
19
3,365
python
[{"finding_id": "codeql_py/tarslip_d4963ebba58760e9_fb7148c5", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 88 ]
[ null ]
[ 13 ]
[ 16 ]
2024-11-18T21:13:53.169424+00:00
1,610,140,135,000
72a1ae83543a865886d50f580b2b8f61a50fec11
2
{ "blob_id": "72a1ae83543a865886d50f580b2b8f61a50fec11", "branch_name": "refs/heads/master", "committer_date": 1610140135000, "content_id": "e38696794d1cb5364ec53a5a4a8fc1b1faa4123e", "detected_licenses": [ "Apache-2.0" ], "directory_id": "b19a334e253bbcab8889e502c5fe0c87c4f227c7", "extension": "py"...
2.375
stackv2
'''Arsenal API bulk tags.''' # Copyright 2015 CityGrid Media, LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required ...
120
36.65
113
20
989
python
[{"finding_id": "codeql_py/log-injection_d53e528d15dbabe1_a7200d30", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
3
true
[ "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 104, 112, 119 ]
[ null, 113, null ]
[ 19, 23, 19 ]
[ 53, 71, 82 ]
2024-11-18T21:14:01.066201+00:00
1,318,428,684,000
b04586d4d77553300fac90221dab8e1ef215cbd6
2
{ "blob_id": "b04586d4d77553300fac90221dab8e1ef215cbd6", "branch_name": "refs/heads/master", "committer_date": 1318428684000, "content_id": "677c393e86fb4046d67e91b9a0284d8ac71389b0", "detected_licenses": [ "MIT" ], "directory_id": "6751e291b2305a5f1aa983e8aa3cdf61f916b1e7", "extension": "py", "fi...
2.390625
stackv2
import glob import os from BaseHTTPServer import BaseHTTPRequestHandler, HTTPServer import cgi import threading class JSRPCServer(HTTPServer, threading.Thread): def __init__(self, io, **kargs): self.io = io self.config = {'interface': '', 'port': 8080, 'handler': JSRPCRequestHandler, 'htt...
80
32.83
110
16
586
python
[{"finding_id": "codeql_py/path-injection_48e2c06aabd096cc_43a5961a", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2)." ]
[ 34, 69 ]
[ null, null ]
[ 22, 22 ]
[ 70, 31 ]
2024-11-18T21:14:20.108642+00:00
1,610,287,687,000
34cf0b250d65e18acf7147cf29e0005a797694ea
3
{ "blob_id": "34cf0b250d65e18acf7147cf29e0005a797694ea", "branch_name": "refs/heads/master", "committer_date": 1610287687000, "content_id": "5bf6df012005a829f83e129b4812238e3b4a4435", "detected_licenses": [ "MIT" ], "directory_id": "88baa949f65a25cb12c67c8750145bd0b833406f", "extension": "py", "fi...
2.75
stackv2
import re import json import tarfile from pathlib import Path from PIL import Image from torch.utils.data import Dataset from torchvision.datasets.utils import download_url from horch.datasets.utils import download_google_drive SPLIT_FILES = { "train": { "name": "train.tar", "md5": "5e2cf0c808741e...
126
33.05
95
14
1,084
python
[{"finding_id": "codeql_py/tarslip_62c41a975bdc0459_324793d8", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 124 ]
[ null ]
[ 13 ]
[ 16 ]
2024-11-18T21:14:23.665091+00:00
1,630,974,272,000
4db7e39995a1fe56675d3778b765f3e83b0283ad
2
{ "blob_id": "4db7e39995a1fe56675d3778b765f3e83b0283ad", "branch_name": "refs/heads/main", "committer_date": 1630974272000, "content_id": "9f2964272495866ac0392bea7ad7b0c99b80cd97", "detected_licenses": [ "MIT" ], "directory_id": "ba0dc07e0b5a4b3253c6ac82fb5e8bbd23732994", "extension": "py", "file...
2.34375
stackv2
import teraexport import argparse import sys import os import stat args = sys.argv[1:] parser = argparse.ArgumentParser( prog=u'sc-tera-export', description=u'Mobilize.NET Teradata Code Export Tools' + 'Version ' + teraexport.__version__) parser.add_argument( u'-S', u'--server', ...
108
30.5
122
14
865
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_b09f4d4e6858ec21_7dfd165b", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 85 ]
[ null ]
[ 20 ]
[ 28 ]
2024-11-18T21:14:33.797985+00:00
1,433,573,861,000
afc4a940454e6464dfbd5a2ecca552caba6ae7af
2
{ "blob_id": "afc4a940454e6464dfbd5a2ecca552caba6ae7af", "branch_name": "refs/heads/master", "committer_date": 1433573861000, "content_id": "6420848d271644124e812d2fa86b0679c2881bcd", "detected_licenses": [ "MIT" ], "directory_id": "cc29cfeebcd0d804daed465c111fe6589cc27f53", "extension": "py", "fi...
2.5
stackv2
#!/usr/bin/env python2.7 import logging, sys, traceback import telstrasmsapi from urlparse import parse_qsl logger = logging.getLogger('telstra-sms') try: import config except ImportError: raise RuntimeError("no config") class BadRequest(Exception): pass def send_sms_message(params, environ): try...
96
27.4
78
14
663
python
[{"finding_id": "codeql_py/stack-trace-exposure_db87dcbc819b6789_f566d2fe", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 63 ]
[ null ]
[ 16 ]
[ 26 ]
2024-11-18T21:14:43.023735+00:00
1,693,452,038,000
4d1851a05a33ae6087fa736f65ed586c5b25b294
3
{ "blob_id": "4d1851a05a33ae6087fa736f65ed586c5b25b294", "branch_name": "refs/heads/master", "committer_date": 1693452038000, "content_id": "bd23858e95f11918cee3d21e84e430df522e56f8", "detected_licenses": [ "MIT", "BSD-3-Clause", "Apache-2.0" ], "directory_id": "0760fb4901a75766921a205b55686d6...
2.625
stackv2
# flake8: noqa # fmt: off from typing import List # __textbot_setup_start__ import asyncio import logging from queue import Empty from fastapi import FastAPI from starlette.responses import StreamingResponse from transformers import AutoModelForCausalLM, AutoTokenizer, TextIteratorStreamer from ray import serve lo...
348
27.97
88
21
2,226
python
[{"finding_id": "codeql_py/log-injection_1f678efae5410c4e_00c82071", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
3
true
[ "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 40, 134, 280 ]
[ null, null, null ]
[ 21, 29, 21 ]
[ 46, 54, 46 ]
2024-11-18T20:10:33.906651+00:00
1,589,785,322,000
dcdb7dc98a25dd440068de85c6f3b9864a647a6e
3
{ "blob_id": "dcdb7dc98a25dd440068de85c6f3b9864a647a6e", "branch_name": "refs/heads/master", "committer_date": 1589785322000, "content_id": "93764067a975111980739a5a6b68f5765cb9e947", "detected_licenses": [ "MIT" ], "directory_id": "b3b0aaf5372df26d2386dab3313ed06c58fe6bad", "extension": "py", "fi...
2.578125
stackv2
from lib.icrypto import ICrypto from lib.exceptions import ImageAuthoringError from lib.util import read_file_in_chunks, get_stack import logging import os import json import time import datetime import zipfile from shutil import rmtree from lib.image_verification_error import ImageVerificationError log = logging.ge...
323
39.07
131
26
2,801
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_31ff01abad6c9137_0e6cb1bd", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text." ]
[ 115 ]
[ null ]
[ 19 ]
[ 57 ]
2024-11-18T20:10:52.482877+00:00
1,618,756,997,000
207130a39d69dc0a07d79468bdd002436225a47e
3
{ "blob_id": "207130a39d69dc0a07d79468bdd002436225a47e", "branch_name": "refs/heads/main", "committer_date": 1618756997000, "content_id": "888f1a0c9dc6c555ce0fce3828b8bd711f2d11b3", "detected_licenses": [ "MIT" ], "directory_id": "0a7ebf1ccc4f0f7d373c28802af567dab8ef06e2", "extension": "py", "file...
2.90625
stackv2
from bs4 import BeautifulSoup import requests from urllib.parse import urljoin from flask import Flask from flask import render_template from flask import request baseUrl="http://keeranrichardson.com/" class WebPage: def __init__(self, url): self.url = url def findLinks(self): self.statusCod...
147
24.51
105
15
850
python
[{"finding_id": "codeql_py/full-ssrf_616c80cbf5aa617e_8fe63c10", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
2
true
[ "CWE-918", "CWE-918" ]
[ "py/full-ssrf", "py/full-ssrf" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1).", "The full URL of this request depends on a [user-provided value](1)." ]
[ 21, 54 ]
[ null, null ]
[ 21, 33 ]
[ 43, 56 ]
2024-11-18T20:48:23.088032+00:00
1,693,494,236,000
cfba223c33fc38a441c3b519dc36df3a805b9b11
2
{ "blob_id": "cfba223c33fc38a441c3b519dc36df3a805b9b11", "branch_name": "refs/heads/master", "committer_date": 1693494236000, "content_id": "6e732b44baff69335c6dc982d20c2e5e5fbfeb3a", "detected_licenses": [ "MIT" ], "directory_id": "96a34a048c783a75736bf0ec775df22142f9ee53", "extension": "py", "fi...
2.3125
stackv2
""" Defines **async** handlers for socket.io server SEE https://pypi.python.org/pypi/python-socketio SEE http://python-socketio.readthedocs.io/en/latest/ """ import logging from typing import Any from aiohttp import web from models_library.users import UserID from servicelib.aiohttp.observer import emit from...
195
33.48
93
17
1,443
python
[{"finding_id": "codeql_py/log-injection_1788759af8e44160_051dabb1", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 52 ]
[ null ]
[ 58 ]
[ 81 ]
2024-11-18T20:48:28.611198+00:00
1,381,451,865,000
ac30fe9f14a138d08272d3f55f34ba3b5f1cc789
2
{ "blob_id": "ac30fe9f14a138d08272d3f55f34ba3b5f1cc789", "branch_name": "refs/heads/master", "committer_date": 1381451865000, "content_id": "3ac4b65599af80352787ed2472f6680472d3d4db", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "0ab9ccab9673a87716f34ae992f5450c771d9ac6", "extension": "p...
2.4375
stackv2
import bcrypt import sqlite3 import peewee as pw from WCSUGaming import app, g from contextlib import closing from datetime import datetime def init_db(): User.create_table() Page.create_table() Post.create_table() P_Session.create_table() admin = User.create( name='admin', password...
373
30.47
128
19
2,558
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7249d8b12e5f891e_9a6642b3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 45 ]
[ null ]
[ 29 ]
[ 42 ]
2024-11-18T20:48:29.629108+00:00
1,597,713,759,000
365bfe903dad9b673dbb5dd0f994a1e092d34e99
2
{ "blob_id": "365bfe903dad9b673dbb5dd0f994a1e092d34e99", "branch_name": "refs/heads/master", "committer_date": 1597713759000, "content_id": "c79f1cf8551a2c35b58bfd665d654b6d4afbf9fa", "detected_licenses": [ "MIT" ], "directory_id": "51e498cb84ead6f220d860a44c88f193136a0321", "extension": "py", "fi...
2.3125
stackv2
# -*- coding: utf-8 -*- """MySQL prerequisite.""" import logging import os from spet.lib.utilities import download from spet.lib.utilities import execute from spet.lib.utilities import extract from spet.lib.utilities import prettify class MySQL: """MySQL prerequisite. Args: mysql_ver (str): Version...
114
29.62
79
14
757
python
[{"finding_id": "codeql_py/overly-permissive-file_053753a60b9178b8_76897910", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to group readable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to group readable." ]
[ 103 ]
[ null ]
[ 9 ]
[ 35 ]
2024-11-18T20:48:31.252863+00:00
1,618,749,402,000
abc1fef0fbf061f6871b68ba9e927ad98ef96f9f
3
{ "blob_id": "abc1fef0fbf061f6871b68ba9e927ad98ef96f9f", "branch_name": "refs/heads/master", "committer_date": 1618749402000, "content_id": "13c37e2d0773ee15c98674da33385e92fabdc4ce", "detected_licenses": [ "Apache-2.0" ], "directory_id": "2a718238004855786b86143acb429ec0af8cd3df", "extension": "py"...
2.984375
stackv2
#!/home/bemootzer/anaconda3/envs/bahnfail/bin/python """Module handles connections to MySQL databases""" import mysql.connector from mysql.connector import MySQLConnection, Error import datetime class DatabaseWrapper(): """ Handles everything related to the database. """ class Timer(): """Measures ...
94
29.14
94
17
545
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_eec555c773c8bb1b_9b02bb25", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 32 ]
[ 36 ]
[ 19 ]
[ 41 ]
2024-11-18T21:11:29.425766+00:00
1,582,399,903,000
1a6e861297c67780ef73f3a6f5663624b2b4f2c8
2
{ "blob_id": "1a6e861297c67780ef73f3a6f5663624b2b4f2c8", "branch_name": "refs/heads/master", "committer_date": 1582399903000, "content_id": "7176b5db7a4cdbe61e2ea0439869c2c65e5599e1", "detected_licenses": [ "MIT" ], "directory_id": "c173687c8760f22bab0da249cbc1de7870313f98", "extension": "py", "fi...
2.34375
stackv2
import os import shutil import glob import pylidc as pl from pylidc import utils as plutils import matplotlib.pyplot as plt import numpy as np from numpy import savez_compressed from unet3d.utils import dicom_util from unet3d.utils import utils import skimage import scipy from multiprocessing import Pool from skimage.s...
367
37.9
139
18
3,629
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_941f11e0f64361ba_c6bf15da", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
10
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging...
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (priva...
[ 271, 212, 208, 189, 260, 195, 215, 177, 249, 186 ]
[ null, null, null, null, null, null, null, null, null, null ]
[ 44, 32, 30, 50, 51, 48, 42, 31, 43, 70 ]
[ 54, 42, 40, 60, 61, 58, 52, 41, 53, 80 ]
2024-11-18T21:11:31.825618+00:00
1,690,244,544,000
642a9f5fdf863a365643bd548e359c7de2f18419
3
{ "blob_id": "642a9f5fdf863a365643bd548e359c7de2f18419", "branch_name": "refs/heads/master", "committer_date": 1690244544000, "content_id": "aad9d27b7b88a1231cbd8261b4dbb01aef18bd15", "detected_licenses": [ "MIT" ], "directory_id": "9249947c07f8addf64dd3d2a2f9f37d379f83921", "extension": "py", "fi...
2.703125
stackv2
#!/usr/bin/env python import time from hashlib import md5 from gluon.dal import DAL def motp_auth(db=DAL('sqlite://storage.sqlite'), time_offset=60): """ motp allows you to login with a one time password(OTP) generated on a motp client, motp clients are available for practically all platfo...
111
40.37
119
19
1,038
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_a2d29e47a0165efd_d4543054", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (secret)](2) is used in a hashing algorithm (MD5) that is insecure." ]
[ 87 ]
[ null ]
[ 24 ]
[ 31 ]
2024-11-18T21:11:39.019007+00:00
1,633,964,634,000
fdd87eb1c420e528dacbee81139d392dba368936
3
{ "blob_id": "fdd87eb1c420e528dacbee81139d392dba368936", "branch_name": "refs/heads/main", "committer_date": 1633964634000, "content_id": "2f6fc574055e457e654c5ed1942e7930f2fb4ea8", "detected_licenses": [ "MIT" ], "directory_id": "8c57118c62ff00755a6f4d2e578e584d65504228", "extension": "py", "file...
2.703125
stackv2
"""Handles everything related to the Chrome and Selenium drivers""" import os import sys import tempfile import zipfile from io import BytesIO from pathlib import Path from typing import Optional import pefile # type: ignore import requests from loguru import logger __author__ = "Brian Seel" __copyright__ = "Brian S...
97
35.06
108
16
845
python
[{"finding_id": "codeql_py/overly-permissive-file_7f9d7888082f5a37_eef8e504", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable." ]
[ 95 ]
[ null ]
[ 13 ]
[ 35 ]
2024-11-18T21:26:02.159201+00:00
1,463,428,018,000
6b902219709619f8f1759da4138da5193e1add9e
3
{ "blob_id": "6b902219709619f8f1759da4138da5193e1add9e", "branch_name": "refs/heads/master", "committer_date": 1463428018000, "content_id": "8218a2606276e5cc3d6e21762ab486c20b3ccfaa", "detected_licenses": [ "Unlicense" ], "directory_id": "3b84c5c611c4d05684f27a6d6ea5f078c239cea8", "extension": "py",...
2.515625
stackv2
# coding: utf-8 # In[63]: import jinja2 import argparse import csv import os # In[65]: parser = argparse.ArgumentParser(description="Fill template with CSV data.") parser.add_argument('--template', '-t', help="template file to use", required=True) parser.add_argument('--output-dir', '-o', help="where to store fil...
55
29.02
109
20
360
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_9f2dc9934f2d65d0_5898ad9f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 34 ]
[ 45 ]
[ 7 ]
[ 20 ]
2024-11-18T21:26:07.945157+00:00
1,458,689,318,000
06c30541dd39c2ef0eb9a4e6638873e96e4adbe5
2
{ "blob_id": "06c30541dd39c2ef0eb9a4e6638873e96e4adbe5", "branch_name": "refs/heads/master", "committer_date": 1458689318000, "content_id": "6833bab70a1d41c7338b192d0134ab87aeb963f5", "detected_licenses": [ "Apache-2.0" ], "directory_id": "62a499631282495f3182511c3cf917f9485bde56", "extension": "py"...
2.390625
stackv2
import os import datetime import random import jinja2 from wtforms import Form, RadioField, validators import base from organization import Organization from question_db import MultipleChoiceQuestion import page_db jinja_environment = jinja2.Environment( loader=jinja2.FileSystemLoader( os.path.join( ...
122
27.93
89
14
717
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_66083bbe72186531_bbf474af", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 16 ]
[ 23 ]
[ 21 ]
[ 2 ]
2024-11-18T21:26:10.985655+00:00
1,681,669,999,000
5e3b525d8c1b771c064e775a09aa341e4bff2e32
3
{ "blob_id": "5e3b525d8c1b771c064e775a09aa341e4bff2e32", "branch_name": "refs/heads/master", "committer_date": 1681669999000, "content_id": "cbf2959728d8676bdf49bb6467c0b4de7d457c94", "detected_licenses": [ "MIT" ], "directory_id": "9f5065cd1b8e6269097f9a203a0796197387001a", "extension": "py", "fi...
2.546875
stackv2
from flask import render_template, request, flash, redirect import werkzeug import statbotics_api import traceback import scouting.Page import scouting.Element ELEMENT_TYPES = { "number": scouting.Element.ElementNumber, "radio": scouting.Element.ElementSelect, "checkbox": scouting.Element.ElementCheckbox,...
119
35.92
133
18
873
python
[{"finding_id": "codeql_py/url-redirection_ae259e0728b7798e_dff51d06", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
3
true
[ "CWE-601", "CWE-601", "CWE-601" ]
[ "py/url-redirection", "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 67, 98, 109 ]
[ null, null, null ]
[ 25, 29, 25 ]
[ 37, 41, 37 ]
2024-11-18T21:52:17.064363+00:00
1,636,011,621,000
1417a10ab413545ef8d4972b7648ac7b4607a55c
2
{ "blob_id": "1417a10ab413545ef8d4972b7648ac7b4607a55c", "branch_name": "refs/heads/main", "committer_date": 1636011621000, "content_id": "a4e9ca65bfcbcc28de8e1546c16646f3078ff0ec", "detected_licenses": [ "MIT" ], "directory_id": "25d1b14d1239277a4ac7db06998ac7a78a0b7579", "extension": "py", "file...
2.484375
stackv2
# -*- coding: UTF-8 -*- from flask import Flask, jsonify, redirect, make_response import requests import json from bs4 import BeautifulSoup import re app = Flask(__name__) # author: https://github.com/Zfour def github_json(owner, repo, branch): source_url = 'https://raw.githubusercontent.com/' + owner + '/' + rep...
38
32.82
124
13
317
python
[{"finding_id": "codeql_py/partial-ssrf_331e44fdd60a489b_0db11523", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depen...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depends on a [user-provided value](2).\nPart of the URL of this request depends on a [user-provided value](3).\nPart of the URL of this request depends on a [user-provided value](4).\nPart of the URL of this req...
[ 13 ]
[ null ]
[ 11 ]
[ 35 ]
2024-11-18T21:52:26.009596+00:00
1,628,940,141,000
07a06fd722b7c5ff221957261a9bf2a4b48e803a
3
{ "blob_id": "07a06fd722b7c5ff221957261a9bf2a4b48e803a", "branch_name": "refs/heads/main", "committer_date": 1628940141000, "content_id": "0dd3bf160072d94891f9fb16f6ec22cf5f7e0751", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "4a84b29149592e804e7e003193fd464614370795", "extension": "py"...
2.640625
stackv2
#! /usr/local/Python_envs/Python3/bin/python3 import paramiko import time from getpass import getpass import re version_pattern = re.compile(r'Cisco .+ Software, Version (\S+)') model_pattern = re.compile(r'cisco (\S+).+bytes of memory\.') serial_no_pattern = re.compile(r'Processor board ID (\S+)') uptime_pattern = re...
62
30.06
70
14
548
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_4283541fe8f72d28_1c158890", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 27 ]
[ null ]
[ 3 ]
[ 64 ]
2024-11-18T20:31:24.984595+00:00
1,546,496,614,000
2c96890b1d3dc1a1c5f8e7ed788daa43b21c4e68
2
{ "blob_id": "2c96890b1d3dc1a1c5f8e7ed788daa43b21c4e68", "branch_name": "refs/heads/master", "committer_date": 1546496614000, "content_id": "9cf2d314469a052a8b3a13f742bbd6528087e11c", "detected_licenses": [ "MIT" ], "directory_id": "a303929774cc1fd9ddf726ff340d298896de599b", "extension": "py", "fi...
2.453125
stackv2
#!/usr/bin/env python2 # -*- coding: utf-8 -*- """A simple bot script. This sample script leverages web.py (see http://webpy.org/). By default the web server will be reachable at port 8080 - append a different port when launching the script if desired. ngrok can be used to tunnel traffic back to your server if you ...
138
35.54
78
17
1,160
python
[{"finding_id": "codeql_py/request-without-cert-validation_341bf68b833b64ab_209569ca", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 90 ]
[ null ]
[ 16 ]
[ 57 ]
2024-11-18T20:31:35.809618+00:00
1,329,922,120,000
cc83a065e3d434fbce9ced90a3f4fe84f9aef818
3
{ "blob_id": "cc83a065e3d434fbce9ced90a3f4fe84f9aef818", "branch_name": "refs/heads/master", "committer_date": 1329922120000, "content_id": "ef73d48d25a41dd3925ef9abef5b14493a253634", "detected_licenses": [ "Apache-2.0" ], "directory_id": "bcfac4119be873f6f9e72125b04cb1080debb2e9", "extension": "py"...
2.578125
stackv2
# -*- coding: utf-8 -*- import re import operator from urlparse import urlparse, urljoin from goose.utils import FileHelper from goose.parsers import Parser from goose.images.Image import Image from goose.images.ImageUtils import ImageUtils KNOWN_IMG_DOM_NAMES = [ "yn-story-related-media", "cnn_strylccimg300cn...
418
34.55
91
24
3,022
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_cb2cc5ae078ffe96_9233fb23", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'atdmt.com', so it might match more ...
1
true
[ "CWE-020" ]
[ "py/incomplete-hostname-regexp" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'atdmt.com', so it might match more hosts than expected." ]
[ 57 ]
[ null ]
[ 60 ]
[ 73 ]
2024-11-18T21:00:02.573038+00:00
1,435,600,157,000
83ee87559ba4af63159e5230dc0a04ac4dcde076
2
{ "blob_id": "83ee87559ba4af63159e5230dc0a04ac4dcde076", "branch_name": "refs/heads/master", "committer_date": 1435600157000, "content_id": "63b32aa38e8abd27aaa6e1181e460584dff8dc28", "detected_licenses": [ "MIT" ], "directory_id": "87b18d817634c518818609ecd9c6ae334bc868a0", "extension": "py", "fi...
2.375
stackv2
from google.appengine.ext import ndb import hashlib #we need this to safely store passwords import logging class Employee(ndb.Model): workerID = ndb.StringProperty() firstName = ndb.StringProperty() lastName = ndb.StringProperty() userName = ndb.StringProperty() password = ndb.StringProperty() percentJob =...
59
19.76
64
15
276
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_b31561ff73c16ae7_2832f87e", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
3
true
[ "CWE-327", "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.", "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally exp...
[ 17, 21, 47 ]
[ null, null, null ]
[ 31, 31, 35 ]
[ 39, 39, 43 ]
2024-11-18T21:10:23.809845+00:00
1,683,751,539,000
d035dba030f1cd92dac62ab9243cd10c525cf737
2
{ "blob_id": "d035dba030f1cd92dac62ab9243cd10c525cf737", "branch_name": "refs/heads/master", "committer_date": 1683751539000, "content_id": "fb5a5a0922ddeaf968ae3998a242df895ea518ab", "detected_licenses": [ "MIT" ], "directory_id": "c0361bfbc44c64cb5c607d1745322136deed8fd8", "extension": "py", "fi...
2.40625
stackv2
#!/usr/bin/env python import sys from flask import Flask, request, render_template from werkzeug.exceptions import InternalServerError, BadRequest from chandelier import Chandelier, BROADCAST import function as src import generator as g import filter as f import random as r import common from time import sleep, time f...
227
20.79
74
19
1,193
python
[{"finding_id": "codeql_py/stack-trace-exposure_5e3b54856167d3a7_969f9079", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-094" ]
[ "py/stack-trace-exposure", "py/code-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "This code execution depends on a [user-provided value](1)." ]
[ 187, 184 ]
[ null, null ]
[ 16, 21 ]
[ 17, 25 ]
2024-11-18T21:10:29.249801+00:00
1,613,580,292,000
45a1cf2ebbc7521db17869413f49635067d554a9
3
{ "blob_id": "45a1cf2ebbc7521db17869413f49635067d554a9", "branch_name": "refs/heads/main", "committer_date": 1613580292000, "content_id": "ed1e2f07cca65e31d35917f56328d48217ecb880", "detected_licenses": [ "MIT" ], "directory_id": "bc62a94c7a606cbc12271026bddbf771d4af6588", "extension": "py", "file...
2.609375
stackv2
from flask import Flask, request, abort from linebot import ( LineBotApi, WebhookHandler ) from linebot.exceptions import ( InvalidSignatureError ) from linebot.models import ( MessageEvent, TextMessage, TextSendMessage, ) import os # 正規表現 import re # しりとり用 from functions.judge import iskatahira, judger #...
102
24.72
86
19
730
python
[{"finding_id": "codeql_py/log-injection_65d68e14bab040df_8ed51fb5", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 44 ]
[ null ]
[ 21 ]
[ 44 ]
2024-11-18T21:10:38.914736+00:00
1,603,927,368,000
86a3dae282ddeb22d6ef33d40ae701696981ae21
3
{ "blob_id": "86a3dae282ddeb22d6ef33d40ae701696981ae21", "branch_name": "refs/heads/master", "committer_date": 1603927368000, "content_id": "f5b7759c6ab51cb16c85b186ca2328d834398963", "detected_licenses": [ "MIT" ], "directory_id": "db18ec5b15bfb0e043148460256458c4d8dc7be9", "extension": "py", "fi...
3.25
stackv2
from VirtualCopernicusNG import TkCircuit # initialize the circuit inside the configuration = { "name": "CopernicusNG Weather Forecast", "sheet": "sheet_forecast.png", "width": 400, "height": 267, "servos": [ {"x": 170, "y": 150, "length": 90, "name": "Servo 1", "pin": 17} ], "but...
105
24.04
117
13
884
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_43c6b892f4cfd8fe_df64d12d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 54 ]
[ null ]
[ 20 ]
[ 26 ]
2024-11-18T21:10:53.175868+00:00
1,585,891,667,000
92beab7e3911857378498ae9f3807e63303065bc
3
{ "blob_id": "92beab7e3911857378498ae9f3807e63303065bc", "branch_name": "refs/heads/master", "committer_date": 1585891667000, "content_id": "3e9fa865811246f92916c8569f0b7d433e979f93", "detected_licenses": [ "Apache-2.0" ], "directory_id": "5901515deb3d26b6f95a378c467a879b9a480ef2", "extension": "py"...
3
stackv2
# # Generates a twitter_configuration.ini file with Twitter Developers API Keys from pathlib import Path def get_mysql_configuration(): mysql_conf_dict = {} mysql_conf_dict['HOST'] = input( "Hostname (i.e. localhost): ") mysql_conf_dict['USERNAME'] = input( "MySQL Username: ") mysql_c...
78
30.26
81
13
585
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_a47e2222d24d7bb7_ef55273b", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.", "This expression stores [sensitive data (secret)](1) as clear text.", "This expression stores [sensitive data (secret)](1) as clear text." ]
[ 47, 57, 61 ]
[ null, null, null ]
[ 20, 13, 13 ]
[ 64, 73, 81 ]
2024-11-18T21:10:54.889985+00:00
1,568,157,380,000
22bdc7ea1bfd88d52fe7c2edcbf9abcc30c273b5
3
{ "blob_id": "22bdc7ea1bfd88d52fe7c2edcbf9abcc30c273b5", "branch_name": "refs/heads/master", "committer_date": 1568157380000, "content_id": "a8f06665c67e860adc35d58ac1c8440a01a56dde", "detected_licenses": [ "MIT" ], "directory_id": "6d6e68d76f1e03667aba5eea942e5d29d3c84347", "extension": "py", "fi...
2.640625
stackv2
#! /usr/bin/python from nibbler import * import argparse import os import sys import json PATH = os.path.abspath(os.path.dirname(__file__)) def submit_button(): username = n.views['username'].stringValue() password = n.views['password'].stringValue() credentials = { 'username': username, 'password': password...
60
26.17
75
12
392
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_63566cdaea88fb60_7300cbbd", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 18 ]
[ null ]
[ 19 ]
[ 42 ]
2024-11-18T21:23:38.137058+00:00
1,630,378,287,000
ae6c135db34cea91152ef0b67cb2a7c128ad7beb
3
{ "blob_id": "ae6c135db34cea91152ef0b67cb2a7c128ad7beb", "branch_name": "refs/heads/main", "committer_date": 1630378287000, "content_id": "b1081dfd7f588dd69ecad9d8f800e0ae7766af28", "detected_licenses": [ "MIT" ], "directory_id": "102c45acfd82161ca3115ecacfd79e5d9f3f0245", "extension": "py", "file...
3.28125
stackv2
from io import TextIOWrapper import random passwords_file = open('password_generator_file.txt', 'a') lowercase = [] for x in range(97, 123): lowercase.append(chr(x)) uppercase = [] for x in range(65, 91): uppercase.append(chr(x)) numbers = [] for x in range(48, 58): numbers.append(chr(x)) special = [] for x ...
45
20.73
57
9
283
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_8dc0974b19cb7f34_baaeb9e5", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (password)](3) as clear text.\nThis expression stores [sensitive data (password)](4) as clear text.\nThis expression stores [sensitive d...
[ 37, 43 ]
[ null, null ]
[ 14, 7 ]
[ 18, 55 ]
2024-11-18T21:23:48.887132+00:00
1,570,223,479,000
11234043b532a806c7081015cd67130367919191
3
{ "blob_id": "11234043b532a806c7081015cd67130367919191", "branch_name": "refs/heads/master", "committer_date": 1570462039000, "content_id": "0a123fa1688eac10d4a06c8779a479237ae423b6", "detected_licenses": [ "MIT" ], "directory_id": "8fa9e8aeb331865ccca8fe09ea2972790d2da705", "extension": "py", "fi...
3.234375
stackv2
"""Configuration settings for PPP package.""" from jinja2 import Environment, PackageLoader import re def question_number(question_num, max_length=4): """Splitting question number. Splitting string first by separator chars, then separating letters from numbers, and then splitting just by length. All ...
67
32.63
79
18
501
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_590a128244797faa_b663b65a", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 63 ]
[ 65 ]
[ 11 ]
[ 42 ]
2024-11-18T21:37:31.890062+00:00
1,632,355,123,000
f7b7d59447ae87b5d23fc287eca3156431ffad10
3
{ "blob_id": "f7b7d59447ae87b5d23fc287eca3156431ffad10", "branch_name": "refs/heads/master", "committer_date": 1632355123000, "content_id": "d10829a20252ed325fc3aad83c58d7e6710e25b9", "detected_licenses": [ "MIT" ], "directory_id": "77dc569cccfab88c362a74923c764b7050f39ed3", "extension": "py", "fi...
2.671875
stackv2
""" Gleam: interactive visualizations in Python """ import os import json import urlparse from collections import namedtuple from flask import Flask, request, send_from_directory from jinja2 import Environment, PackageLoader GLEAM_STATIC_DIR = os.path.join(os.path.split(__file__)[0], "static") class InputData(obj...
62
28.4
69
18
380
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_845456dfaf110d33_b66aaa0f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 26 ]
[ null ]
[ 15 ]
[ 70 ]
2024-11-18T21:37:35.029550+00:00
1,563,595,938,000
2d337f3f1be7ae8d32bcc4f5fc405a573fc2d3a1
3
{ "blob_id": "2d337f3f1be7ae8d32bcc4f5fc405a573fc2d3a1", "branch_name": "refs/heads/master", "committer_date": 1563595938000, "content_id": "9a6b80cec8d2a03934e361389697d8b8681ad77c", "detected_licenses": [ "MIT" ], "directory_id": "34297adea85466988fa0b194e1dcc1c3ba22aa15", "extension": "py", "fi...
2.828125
stackv2
from jinja2 import Environment, FileSystemLoader from os.path import join from src.yaml_util import YamlUtil class SubstitutionException(Exception): pass class TemplateManager: ''' Maintain the template environment and yaml loader Perform substitutions into templates inside the current environment ...
27
30.37
71
15
156
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_738f09c5849001e2_5fddb167", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 15 ]
[ 18 ]
[ 36 ]
[ 40 ]
2024-11-18T21:37:43.998197+00:00
1,572,425,479,000
fcd98a23e27369277f66b7fd1424f8ee22a8957d
3
{ "blob_id": "fcd98a23e27369277f66b7fd1424f8ee22a8957d", "branch_name": "refs/heads/master", "committer_date": 1572425479000, "content_id": "058515d87720acda0d32975ee966e9a320b46696", "detected_licenses": [ "MIT" ], "directory_id": "60ef015e042cf11744bed000909ca26addb150b0", "extension": "py", "fi...
2.6875
stackv2
from __future__ import print_function, absolute_import import os import numpy as np from imdb import Imdb import xml.etree.ElementTree as ET import cv2 class PascalVoc(Imdb): """ Implementation of Imdb for Pascal VOC datasets Parameters: ---------- image_set : str set to be used, can be t...
178
32.11
122
18
1,261
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9d6c3aea753997a7_03bc3a86", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 165 ]
[ null ]
[ 23 ]
[ 29 ]
2024-11-18T21:58:56.642010+00:00
1,669,222,436,000
1fc3315bede8eb08289fe9d8046fc56e4713574b
3
{ "blob_id": "1fc3315bede8eb08289fe9d8046fc56e4713574b", "branch_name": "refs/heads/master", "committer_date": 1669222436000, "content_id": "406ff1478e8b1f4aa34dff9deaad74b2d9f677f1", "detected_licenses": [ "MIT" ], "directory_id": "9863f0cedd0b8e1b196d4b5edc5ae59b296956ba", "extension": "py", "fi...
2.890625
stackv2
"""Prepares MSCOCO-like dataset for the im2txt model""" from datetime import datetime import json import logging from pathlib import Path from random import choices import re import shutil import sys from typing import Iterable, List, Tuple import click from os import path, walk COCO_SPLIT_PROPORTIONS = {'val': 0.3,...
236
27.31
82
16
1,523
python
[{"finding_id": "codeql_py/overly-large-range_4acacea93083b07b_1566a679", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with 0-9 in the same character class, and overlaps with A-Z in ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with 0-9 in the same character class, and overlaps with A-Z in the same character class, and is equivalent to \\[.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 47 ]
[ null ]
[ 33 ]
[ 36 ]
2024-11-18T21:58:56.916959+00:00
1,600,510,514,000
038be5b4e31c030e17575bd071b417fd8235e090
3
{ "blob_id": "038be5b4e31c030e17575bd071b417fd8235e090", "branch_name": "refs/heads/master", "committer_date": 1600510514000, "content_id": "b16ec1a909cfb492a5ebd09432ae8567f24a4d38", "detected_licenses": [ "MIT" ], "directory_id": "ca968a0e135418bb8d70cdb75f4351cc1d8af9e9", "extension": "py", "fi...
2.65625
stackv2
import os import sys import hmac import hashlib import time import datetime import base64 class Totp: def __init__(self, interval, digits, iamuser, path): self.interval = interval self.digits = digits self.iamuser = iamuser self.path = path def get_remaintime(self): ...
76
34.75
113
18
806
python
[{"finding_id": "codeql_py/overly-permissive-file_0e9e08277824fd10_6bb97d24", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable." ]
[ 24 ]
[ null ]
[ 13 ]
[ 37 ]
2024-11-18T21:58:58.421258+00:00
1,400,077,094,000
7fcf78fd9a11202b15104f9b062cb35f45495bde
2
{ "blob_id": "7fcf78fd9a11202b15104f9b062cb35f45495bde", "branch_name": "refs/heads/master", "committer_date": 1400077094000, "content_id": "b956459d59b11278b8443a7b32e3f2789e48f9eb", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "a625f16b81247f92d22463c0ba564b887ec0183a", "extension": "p...
2.40625
stackv2
# This file is part of ZS # Copyright (C) 2013-2014 Nathaniel Smith <njs@pobox.com> # See file LICENSE.txt for license information. import requests import lxml.html import re import sys import multiprocessing import os import os.path import cPickle import time import json OVERVIEW_URL = "http://storage.googleapis.com...
353
34.63
140
18
3,244
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_3849362a9140f939_261db112", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 266 ]
[ null ]
[ 16 ]
[ 43 ]
2024-11-18T21:59:05.270398+00:00
1,570,398,879,000
4ecd1696a7fd4a486b29324207abe763e18513b2
4
{ "blob_id": "4ecd1696a7fd4a486b29324207abe763e18513b2", "branch_name": "refs/heads/master", "committer_date": 1570398879000, "content_id": "15d55eb1b3281c3fe7b6c6237fa067c25091f1d5", "detected_licenses": [ "MIT" ], "directory_id": "d874d544f0380e250a69476ac640efb3d7033046", "extension": "py", "fi...
3.84375
stackv2
import random import string def gen(length: int) -> str: password = "" while len(password) < length: password += random.choice(string.ascii_letters + string.digits + string.punctuation) return password def check_password(password: str) -> bool: nletter = 0 nint = 0 nspecial = 0 i =...
39
21.26
92
13
223
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d3922ec73902744b_fe2e0d45", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text.\nThis expression logs [sensitive data (passw...
[ 36 ]
[ null ]
[ 11 ]
[ 19 ]
2024-11-18T21:59:19.476567+00:00
1,513,780,363,000
b76b5013a13a166531d70f9b0174d85601925295
2
{ "blob_id": "b76b5013a13a166531d70f9b0174d85601925295", "branch_name": "refs/heads/master", "committer_date": 1513780399000, "content_id": "da4693263d4dae0e741ab16b46269889e89fa616", "detected_licenses": [ "MIT" ], "directory_id": "d0a7c82c0f50fa68153b0deff56ed525d4699d32", "extension": "py", "fi...
2.5
stackv2
""" Pluggable development environment. Example to add a thread to this command, somewhere that will be imported at startup (ie. yourproject/models.py if you added yourproject to INSTALLED_APPS):: import os from crudlfap.management.commands.dev import Command, CommandThread Command.threads.append( ...
202
25.82
81
19
1,124
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7f6e04fd10004b27_7ab21a91", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 195 ]
[ 196 ]
[ 32 ]
[ 50 ]
2024-11-18T22:11:31.022941+00:00
1,610,704,011,000
79e8049db73a945b3bceea1aa2252c05e4c2a16c
4
{ "blob_id": "79e8049db73a945b3bceea1aa2252c05e4c2a16c", "branch_name": "refs/heads/main", "committer_date": 1610704011000, "content_id": "bb981e2379b8ea88204b4d038cd04afc0538ec23", "detected_licenses": [ "Apache-2.0" ], "directory_id": "d4e2c1287d1427ae42bece28108dc4abf96c0dab", "extension": "py", ...
3.5625
stackv2
import sys from math import sqrt from datetime import datetime def readfile(): f = open("location.txt", "r", encoding="utf8") lines = f.readlines() return lines def createArray(lines,N): cities = [] nCounter = 0 for line in lines: if nCounter == N: break l = line.sp...
80
25.2
108
20
639
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_229bc3b867530a28_4700e770", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.", "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text." ]
[ 34, 36 ]
[ null, null ]
[ 31, 31 ]
[ 108, 101 ]
2024-11-18T22:11:36.302590+00:00
1,640,938,305,000
e87406b194c2efc7c9c0671b67f276f3348862a1
2
{ "blob_id": "e87406b194c2efc7c9c0671b67f276f3348862a1", "branch_name": "refs/heads/master", "committer_date": 1640938305000, "content_id": "317c2de999f82fc42f69b5a66cf8d538c945bc0a", "detected_licenses": [ "Apache-2.0" ], "directory_id": "1a92815f85e7bd4cd6de59668915787631ad1771", "extension": "py"...
2.4375
stackv2
import requests,shutil,uuid import threading def down_img(): for i in range(100): url = "https://weibo.com/signup/v5/pincode/pincode.php?lang=zh&sinaId=3a7cc9f0714cf8bacea0b44e67b7ea99" resp = requests.get(url, verify=False, stream=True) if resp.status_code == 200: with open("i...
18
31.78
111
19
175
python
[{"finding_id": "codeql_py/request-without-cert-validation_f60da9a060d22b1e_8ebda605", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 8 ]
[ null ]
[ 16 ]
[ 60 ]
2024-11-18T22:24:18.971815+00:00
1,615,545,154,000
a46b8d88c9e4ff172684accc43ccde2d2ac4cf9a
3
{ "blob_id": "a46b8d88c9e4ff172684accc43ccde2d2ac4cf9a", "branch_name": "refs/heads/main", "committer_date": 1615545154000, "content_id": "7e37433e18af25e9ee424101c6de80d9da8b0ab6", "detected_licenses": [ "MIT" ], "directory_id": "ca72ad5a3e2300ec02001bcce61bf96343e04b11", "extension": "py", "file...
2.65625
stackv2
from models.User import User from schemas.UserSchema import users_schema, user_schema from models.Word import Word from schemas.WordSchema import word_schema, words_schema from models.SavedWord import SavedWord from schemas.SavedWordSchema import savedword_schema, savedwords_schema from main import db, bcrypt from date...
132
37.52
178
17
1,156
python
[{"finding_id": "codeql_py/partial-ssrf_2b6bfc4a50a15838_67b72210", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 131 ]
[ null ]
[ 17 ]
[ 141 ]
2024-11-18T22:35:56.584151+00:00
1,589,969,901,000
39bab7d31e918b154ac029b7de876e3ad16fad18
3
{ "blob_id": "39bab7d31e918b154ac029b7de876e3ad16fad18", "branch_name": "refs/heads/master", "committer_date": 1589969901000, "content_id": "e7a1469759d888ebed15605e47df8078a2bd75d6", "detected_licenses": [ "Apache-2.0" ], "directory_id": "7775fb7ba338e8707f559e0372a6d11a78f8c69f", "extension": "py"...
2.8125
stackv2
""" This code is based on the QM9 dataset from the pythorch-geometric package, see: https://pytorch-geometric.readthedocs.io/en/latest/_modules/torch_geometric/datasets/qm9.html#QM9 """ import os from six.moves import urllib import torch from os import makedirs import tarfile import numpy as np import scipy.spatial.di...
116
29.18
111
13
911
python
[{"finding_id": "codeql_py/tarslip_1096f98a0c0799d6_d8646b41", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 29 ]
[ null ]
[ 9 ]
[ 10 ]
2024-11-18T22:36:03.493509+00:00
1,631,152,263,000
67400f6a1949c60ac6b1fec65fed2d35e03e85b4
3
{ "blob_id": "67400f6a1949c60ac6b1fec65fed2d35e03e85b4", "branch_name": "refs/heads/master", "committer_date": 1631152263000, "content_id": "4b59b6319a2bba5147b8a0d204bb8e454f9a5f44", "detected_licenses": [ "MIT" ], "directory_id": "5868f8e7d1d33da896b7dca99ec264cfd1fe8edb", "extension": "py", "fi...
3.375
stackv2
import pickle file_path = "D:\Sindhi Model School (SMS)\HARSH\.PROGRAMS\School\School12\emp.dat" def file_write(emp_no): file_2 = open(file_path, 'ab') n1 = 1 while n1 <= emp_no: name1 = input("enter your name : ") try: salary = int(input("enter your Salary : ")) l...
80
28.36
102
18
587
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4dcd4ba4de6a823c_c3614f30", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 43 ]
[ null ]
[ 51 ]
[ 66 ]
2024-11-18T22:36:19.617143+00:00
1,428,331,743,000
479dfc843033999278fc201c40a881d3ed88d182
3
{ "blob_id": "479dfc843033999278fc201c40a881d3ed88d182", "branch_name": "refs/heads/master", "committer_date": 1428331743000, "content_id": "d5c2c474f095f5ecd1507a27fde8740d1beb4907", "detected_licenses": [ "MIT" ], "directory_id": "c2c5d7247f512d52d3c6fc67ccc6f3763f5d11a6", "extension": "py", "fi...
2.5625
stackv2
import os import sys import time import logging import argparse import threading from flask import Flask, request, abort, jsonify from utils.scripting import server_address, positive_int from utils.strings import slugify import shm from simulators import get_simulator, available_simulators, NoSuchSimulator logging.bas...
307
30.99
79
18
2,185
python
[{"finding_id": "codeql_py/stack-trace-exposure_c8815da9894aefdd_143ac2e4", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 36 ]
[ null ]
[ 24 ]
[ 42 ]
2024-11-18T22:36:22.321136+00:00
1,609,393,173,000
b899a930c67c9698a4c345e450b834086762e912
2
{ "blob_id": "b899a930c67c9698a4c345e450b834086762e912", "branch_name": "refs/heads/master", "committer_date": 1609393173000, "content_id": "d6eb929b74ef5d423ce7962267713e9f407c9ec3", "detected_licenses": [ "MIT" ], "directory_id": "33974de9f5c457a9b9a79343686aa9bffdd170b2", "extension": "py", "fi...
2.359375
stackv2
#!/usr/bin/env python3 import os from dotenv import load_dotenv from sqlalchemy.engine.url import make_url source_dir = os.path.abspath(os.curdir) # 导入环境变量 env_path = os.path.join(source_dir, '.env') if os.path.isfile(env_path): load_dotenv(dotenv_path=env_path, verbose=True) from config import DockerConfig # ...
81
36.89
105
14
747
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_a32a0b8b548350f7_ce80c5a8", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.", "This expression stores [sensitive data (password)](1) as clear text.", "This expression stores [sensitive data (password)](1) as clear text." ]
[ 38, 56, 79 ]
[ null, null, null ]
[ 32, 35, 28 ]
[ 74, 80, 70 ]
2024-11-18T22:36:46.523744+00:00
1,634,583,958,000
86a065149bdd95c8b57a00ce4b291c7d8d431d0f
2
{ "blob_id": "86a065149bdd95c8b57a00ce4b291c7d8d431d0f", "branch_name": "refs/heads/main", "committer_date": 1634583958000, "content_id": "e043d441bdfb9e08962da52fa279efd4b519f71d", "detected_licenses": [ "MIT" ], "directory_id": "4dd82171e3293cdee5d356fc5b0c045cd17ae4f2", "extension": "py", "file...
2.5
stackv2
from parseDOM import parseDOM import spacy import re import nltk from GMFormInput import GMFormInput from bs4 import BeautifulSoup # required for github API usage (install using terminal) #pip install 'git+https://github.com/caiusb/miner-utils' #pip install 'gitpython' #pip install 'pandas' #useful imports (from when...
424
37.79
171
30
3,683
python
[{"finding_id": "codeql_py/overly-large-range_0ea23fd997380f1a_dac2acb4", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 142, 187 ]
[ null, null ]
[ 59, 75 ]
[ 62, 78 ]
2024-11-18T22:36:51.484154+00:00
1,461,821,396,000
fcc623f3377289dc283feab6e97ae151e2f1e347
2
{ "blob_id": "fcc623f3377289dc283feab6e97ae151e2f1e347", "branch_name": "refs/heads/master", "committer_date": 1461821396000, "content_id": "a91648218d7ca7dbaa6cde4e8f5c80555146be2a", "detected_licenses": [ "Apache-2.0" ], "directory_id": "d8422247ecbe450c75df45dcf2c92fb4438b65af", "extension": "py"...
2.328125
stackv2
# --*-- coding:utf-8 --*-- __author__ = 'nolan' import uuid from hashlib import md5 from openstack_dashboard.api.member.member import * import time import hashlib def get_user(user_email): userC = UserCenter() param = {} param["email"]=user_email user = userC.checkUser(param) return user # 数字签...
53
18.47
73
12
288
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_d7c0674ee7b6be53_e0121331", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.",...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 47 ]
[ null ]
[ 15 ]
[ 18 ]
2024-11-18T22:36:52.011572+00:00
1,403,028,765,000
d416d56d22e93260fe6968cfa2df62048fa58680
2
{ "blob_id": "d416d56d22e93260fe6968cfa2df62048fa58680", "branch_name": "refs/heads/master", "committer_date": 1403028765000, "content_id": "c5085b121ab7e6152b692bcd61edf899d1c44431", "detected_licenses": [ "MIT" ], "directory_id": "5cefd3f3847774818e7bab5d517922ee29b77f94", "extension": "py", "fi...
2.484375
stackv2
#!/usr/bin/env python """Scrapes HTML articles from http://www.kcna.co.jp/ for relevant text, outputting as JSON for database import.""" # TODOs: # Multiple rules defined by year, with function to choose the correct rule # Process real data # Confirm you can run just the HTML->JSON function on it's own from cmd ln # ...
295
36.41
146
17
2,590
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4ea924c39003d7a1_746a8b7e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 136, 144 ]
[ null, null ]
[ 24, 22 ]
[ 101, 53 ]
2024-11-18T20:23:20.882503+00:00
1,592,074,431,000
ec632663179ba0a556bd9ff93d9f178e185c699c
4
{ "blob_id": "ec632663179ba0a556bd9ff93d9f178e185c699c", "branch_name": "refs/heads/master", "committer_date": 1592074431000, "content_id": "7557948a34e14bd04ea7b7059f2b91cf20073a29", "detected_licenses": [ "MIT" ], "directory_id": "155e0bf68930488ccd88e6a59f29749b70c981f0", "extension": "py", "fi...
4.25
stackv2
#!/usr/bin/env python3 """A password generator and manager. Title: Password Generator Description: Create a program that allows a user to enter a password name eg: "Facebook Account Password" and length eg: '24'. Your program should then proceed to generate a strong password. This strong password should be generated ...
81
31.75
76
16
536
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_83c5bd38c52ce6dd_0cb1b8c2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 76 ]
[ null ]
[ 19 ]
[ 28 ]
2024-11-18T20:23:39.343152+00:00
1,515,499,120,000
d11c9fac0ee57edab02693f02476593ecbd4ac41
3
{ "blob_id": "d11c9fac0ee57edab02693f02476593ecbd4ac41", "branch_name": "refs/heads/master", "committer_date": 1515499120000, "content_id": "5749fa4866350f873713cd967ab4f8b57e365180", "detected_licenses": [ "MIT" ], "directory_id": "8f26a211acfeb55921fccb0841f4efde10409595", "extension": "py", "fi...
2.8125
stackv2
# -*- coding: utf-8 -*- """ URL Check URL查重处理 @dependencies: 1. mmh 2. bitarray """ import re import math import random import mmh3 from bitarray import bitarray urls = [ 'https://www.zhihu.com/question/26006703', 'https://www.zhihu.com/roundtable/jiqixuexi', 'https://www.zhihu.com/question/6388350...
202
18.59
68
15
1,128
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_9d237468779a0c89_62759d94", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This string, which is used as a regular expression [here](1), has an unescaped '.' befor...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/incomplete-hostname-regexp", "py/incomplete-hostname-regexp" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This string, which is used as a regular expression [here](1), has an unescaped '.' before 'zhihu.com/', so it might match more hosts than expected.", "This string, which is used as a regular expression [here](1), has an unescaped '.' before 'zhihu.com/', so it might match more hosts than expected." ]
[ 82, 123 ]
[ null, null ]
[ 16, 16 ]
[ 48, 48 ]
2024-11-18T20:23:41.593533+00:00
1,632,402,912,000
02cc474dc769920be604be3a0bc65720e3eb1f40
2
{ "blob_id": "02cc474dc769920be604be3a0bc65720e3eb1f40", "branch_name": "refs/heads/master", "committer_date": 1632402912000, "content_id": "9953be3cc2409baab431091ff0b5c93b04cd0add", "detected_licenses": [ "MIT" ], "directory_id": "b3aba03f063816e123b933fa28c60a0be7ee245f", "extension": "py", "fi...
2.484375
stackv2
import requests import pickle import time import node from flask import Blueprint, jsonify, request, render_template from node import Node, MINING_DIFFICULTY from block import Block from transaction import Transaction from transaction_output import TransactionOutput from node import Node ############################...
296
31.89
118
21
1,958
python
[{"finding_id": "codeql_py/unsafe-deserialization_c88700263816f409_84cd1358", "tool_name": "codeql", "rule_id": "py/unsafe-deserialization", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Unsafe deserialization depends on a [user-provided value](1).", "remediation": "", "locatio...
5
true
[ "CWE-502", "CWE-502", "CWE-502", "CWE-502", "CWE-502" ]
[ "py/unsafe-deserialization", "py/unsafe-deserialization", "py/unsafe-deserialization", "py/unsafe-deserialization", "py/unsafe-deserialization" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Unsafe deserialization depends on a [user-provided value](1).", "Unsafe deserialization depends on a [user-provided value](1).", "Unsafe deserialization depends on a [user-provided value](1).", "Unsafe deserialization depends on a [user-provided value](1).", "Unsafe deserialization depends on a [user-provi...
[ 42, 88, 106, 165, 182 ]
[ null, null, null, null, null ]
[ 30, 36, 36, 30, 31 ]
[ 48, 54, 54, 48, 49 ]
2024-11-18T21:22:14.184175+00:00
1,539,809,933,000
091878e5a1c0d86ffd01558e7c974a5503a7a02f
3
{ "blob_id": "091878e5a1c0d86ffd01558e7c974a5503a7a02f", "branch_name": "refs/heads/master", "committer_date": 1539809933000, "content_id": "e81542d897442535495a108fcd8436b2cef235a2", "detected_licenses": [ "Apache-2.0" ], "directory_id": "2c541e4a960ec6abe18ba288b865eacd03efb7f4", "extension": "py"...
2.765625
stackv2
# -*- coding: utf-8 -*- # # Copyright stuff # # License stuff # import json from .infoblox import Infoblox, InfobloxGeneralException, Util # import more stuff class HighLevelInfobloxActions(object): """ Implements the following high level infoblox actions convert_lease_to_fixed_address """ def __i...
162
37.46
88
22
1,304
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1c6259068259aace_331c49c6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](1) as clear text." ]
[ 73, 137 ]
[ null, null ]
[ 15, 15 ]
[ 33, 43 ]
2024-11-18T21:22:14.987387+00:00
1,600,911,985,000
66c0792b133d39a3d46a6e99baf04b1f3c4e0702
3
{ "blob_id": "66c0792b133d39a3d46a6e99baf04b1f3c4e0702", "branch_name": "refs/heads/master", "committer_date": 1600911985000, "content_id": "90d3cfad2964372ef606dd5e28647b1467dd21b0", "detected_licenses": [ "MIT" ], "directory_id": "397c5d934c7908bdd6c61360ef4e62b646544be8", "extension": "py", "fi...
2.6875
stackv2
import requests from secrets import tumblr_api_key type_list = ['text', 'photo', 'quote', 'link', 'answer', 'video', 'audio', 'chat'] posts_dict = {} for type in type_list: posts_dict[f'{type}_posts'] = [] api_key = tumblr_api_key.get_tumblr_api_key() # pull first 20 posts post_url = f'https://api....
35
31
113
16
283
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ac6a84ce1db4ecb4_95452539", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 17, 28 ]
[ null, null ]
[ 11, 15 ]
[ 39, 43 ]
2024-11-18T21:22:30.492836+00:00
1,612,359,493,000
d3cb32f2e103d12e1eee12183f52653fbbc8ea0c
3
{ "blob_id": "d3cb32f2e103d12e1eee12183f52653fbbc8ea0c", "branch_name": "refs/heads/main", "committer_date": 1612359493000, "content_id": "171f8b26a73b4ce14bcbfed5b8fc53d5441a390d", "detected_licenses": [ "MIT" ], "directory_id": "838f84136ad89d1ee710ca37c50049fa7d4d4b7f", "extension": "py", "file...
3.09375
stackv2
#!/usr/bin/python # Jeremy Kosse 10/30/2020 # # # # - Uses the PUT HTTPS method to add/update a configuration # - In this example updating the IP of loopback100 # import requests import json # Welcome print("Welcome to the Netconf_IOS-XE_Put.py Script!") print("*" * 80) # Variable collection host_value = input("Hos...
73
21.64
113
14
457
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d9f2a069150461f4_e8d3ca05", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-295" ]
[ "py/clear-text-logging-sensitive-data", "py/request-without-cert-validation" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This request may run without certificate validation because [it is disabled](1)." ]
[ 72, 59 ]
[ null, 65 ]
[ 9, 12 ]
[ 22, 2 ]