added
stringlengths
32
32
created
int64
1,236B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.03
source
stringclasses
1 value
text
stringlengths
330
19.3k
num_lines
int64
16
648
avg_line_length
float64
15.5
59.3
max_line_length
int64
37
179
ast_depth
int64
8
38
length
int64
102
3.79k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.11k
276k
sast_codeql_findings_count
int64
1
33
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
33
rule_ids
listlengths
1
33
confidences
listlengths
1
33
severities
listlengths
1
33
messages
listlengths
1
33
line_starts
listlengths
1
33
line_ends
listlengths
1
33
column_starts
listlengths
1
33
column_ends
listlengths
1
33
2024-11-19T01:43:46.564600+00:00
1,624,933,416,000
2640932e4aafefaebe878a737ca2792d7abdc4a2
3
{ "blob_id": "2640932e4aafefaebe878a737ca2792d7abdc4a2", "branch_name": "refs/heads/main", "committer_date": 1624933416000, "content_id": "81c10ce37e521c3634fc6f3767b22a85bf45d9d9", "detected_licenses": [ "MIT" ], "directory_id": "61eb79aad2639da74c07d5fdb7a2569285103d9e", "extension": "py", "file...
2.515625
stackv2
from flask import Flask, Blueprint, render_template app = Flask(__name__) bp = Blueprint('app', __name__) filmes = [ { 'id': 1, 'nome': 'Home Aranha: Longe de casa', 'url': 'https://upload.wikimedia.org/wikipedia/pt/0/04/Spider-man-far-from-home-poster.jpg' }, { 'id': 2, ...
54
27.5
107
9
526
python
[{"finding_id": "codeql_py/flask-debug_78127792cb537a1c_38799646", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 54, 49 ]
[ null, null ]
[ 5, 12 ]
[ 24, 41 ]
2024-11-19T01:44:01.067798+00:00
1,634,246,391,000
2a22e5b2055e8769052019918ac43d8d24f68948
3
{ "blob_id": "2a22e5b2055e8769052019918ac43d8d24f68948", "branch_name": "refs/heads/main", "committer_date": 1634246391000, "content_id": "6a88480d7ec25e4bf21d63ae61610423c2ef34e1", "detected_licenses": [ "MIT" ], "directory_id": "26f3b4ecbe1342de4b48e84bbafebf1b07d72224", "extension": "py", "file...
3.015625
stackv2
# ------------------------------------------------------------------- # CREAR NUESTRA API con Flask # ------------------------------------------------------------------ import traceback from flask import Flask, jsonify, request, render_template # Crear el server Flask app = Flask(__name__) # Crear el modelo que utiliz...
37
32.97
81
17
266
python
[{"finding_id": "codeql_py/stack-trace-exposure_d6c985e8a56cc67b_130124e2", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 32 ]
[ null ]
[ 28 ]
[ 61 ]
2024-11-19T01:44:08.916503+00:00
1,457,351,494,000
15e7b583efa109c573f862cc7093f534eb4f3386
2
{ "blob_id": "15e7b583efa109c573f862cc7093f534eb4f3386", "branch_name": "refs/heads/master", "committer_date": 1457351494000, "content_id": "9a7abec262395b10dd78fa78c622c07f167517d3", "detected_licenses": [ "MIT" ], "directory_id": "bc957e85344c16fd2f33b6c448169c67a1a8a93f", "extension": "py", "fi...
2.40625
stackv2
# -*- coding: UTF-8 -*- from werkzeug.security import check_password_hash from flask.ext.login import current_user from flask import render_template, request, url_for, flash, redirect from flask.ext.login import login_user, login_required, logout_user from ..models import Customer from .forms import LoginForm from . i...
35
34.54
77
16
254
python
[{"finding_id": "codeql_py/url-redirection_82d0ecaa9ae06e22_fa22d6e4", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 25 ]
[ 26 ]
[ 29 ]
[ 45 ]
2024-11-19T02:19:53.861702+00:00
1,598,369,630,000
d53959531d27a7506484e608f01b229e15baf2b4
3
{ "blob_id": "d53959531d27a7506484e608f01b229e15baf2b4", "branch_name": "refs/heads/master", "committer_date": 1598369630000, "content_id": "f500c6806a8b474c55c011688439b369039bfcd8", "detected_licenses": [ "MIT" ], "directory_id": "d2f4c673d6adf16c9f982f68cc21e23b4b453ca9", "extension": "py", "fi...
3.109375
stackv2
# encoding:utf-8 import zipfile import os from threading import Thread import time from itertools import product from pathlib import Path path = r'G:\\video\日本\[多P]某体校运动系美女和两个社会青年野战3P晚上街头露出\某体校运动系美女.zip' my_pass_dict = r'dict\\' def password(x = 6): # iter = ['1234567890abcdefghijklmnopqrstuvwxyz.',] iter = ...
43
27.3
118
15
360
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_acac58b3a06e7181_3e5ffb56", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 29, 33 ]
[ null, null ]
[ 19, 19 ]
[ 62, 62 ]
2024-11-19T02:19:54.856375+00:00
1,470,744,339,000
7442fdb1aff666b03afb8030cc51e23a868e8be1
2
{ "blob_id": "7442fdb1aff666b03afb8030cc51e23a868e8be1", "branch_name": "refs/heads/master", "committer_date": 1470744339000, "content_id": "ef4a4c71e2107ec0430feeb94f24d369c4ba6e02", "detected_licenses": [ "MIT" ], "directory_id": "c6eb460751f59090021f289dda0c80f6bc41d11a", "extension": "py", "fi...
2.453125
stackv2
import requests as r import urllib.parse as purl import json def StartScopusSearch(key,params): ssq = ScopusSearchQuery(key,params) return ssq class ScopusSearchQuery: _defaultParams = {'count':100, 'view':'COMPLETE', 'httpAccept':'application/json'} _baseUr...
96
31.92
94
17
799
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ea37025ef7c6f3b8_7b65a4aa", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 47, 49 ]
[ null, null ]
[ 15, 15 ]
[ 39, 38 ]
2024-11-19T02:19:55.966414+00:00
1,577,765,636,000
49ddaa068309b45c0a7f82907a83b70dee9db644
3
{ "blob_id": "49ddaa068309b45c0a7f82907a83b70dee9db644", "branch_name": "refs/heads/master", "committer_date": 1577765636000, "content_id": "319dfe1f9a6f5c1f27d0fc9c70fa2ddf8d9b1aa3", "detected_licenses": [ "MIT" ], "directory_id": "8f198f895a9bbbc61e5425d31ee02ead13610cd3", "extension": "py", "fi...
2.953125
stackv2
#!/usr/bin/python3 """ User Class from Models Module """ import hashlib import os from models.base_model import BaseModel, Base from sqlalchemy.orm import relationship from sqlalchemy import Column, Integer, String, ForeignKey STORAGE_TYPE = os.environ.get('HBNB_TYPE_STORAGE') class User(BaseModel, Base): """ ...
67
30.01
60
13
440
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_d7f2bb89d82e13e3_e4657831", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 62 ]
[ null ]
[ 23 ]
[ 52 ]
2024-11-19T02:20:06.620079+00:00
1,563,243,049,000
43e2dccabe35905571ca61822de501fd25906b79
4
{ "blob_id": "43e2dccabe35905571ca61822de501fd25906b79", "branch_name": "refs/heads/master", "committer_date": 1563243049000, "content_id": "fd7e36e60ee7282ecdcde0e0870c092dfbd3601c", "detected_licenses": [ "Unlicense" ], "directory_id": "ec3de8dccb601212b754ca2078140c9a4f1535a2", "extension": "py",...
3.59375
stackv2
from sys import argv import string_tools from sanitization import sanitize # takes a secret message and key and returns # vigenere ciphertext # note secret message and key must be a list of numbers # use string tools to convert def encrypt(secret_message, secret_key): cipher_text = [] # encrypting adds the k...
61
31.93
78
15
462
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f4499e6f0435ed29_295a2e22", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
6
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.", "This expression logs [sensitive data (s...
[ 54, 54, 54, 59, 59, 59 ]
[ null, null, null, null, null, null ]
[ 23, 45, 67, 23, 42, 64 ]
[ 37, 55, 78, 34, 52, 78 ]
2024-11-19T00:59:48.497396+00:00
1,604,847,304,000
bf2c8e39de1dbcb74f9dbd795eec56c60813dc30
3
{ "blob_id": "bf2c8e39de1dbcb74f9dbd795eec56c60813dc30", "branch_name": "refs/heads/main", "committer_date": 1604847304000, "content_id": "9781f5efe6a0a54e1e5eddefa44c70bb9bd6c318", "detected_licenses": [ "Apache-2.0" ], "directory_id": "bd664fe124dad44a86dd93846eddbe05bbe6a05b", "extension": "py", ...
2.921875
stackv2
"""Creates class to interact with HomeWizard Energy P1 meter API. API Documentation: https://energy.homewizard.net/en/support/solutions/articles/19000117051-homewizard-p1-meter-local-api-beta- """ import enum import json import logging import requests from . import const _LOGGER = logging.getLogger(__name__) cla...
92
25.17
126
15
527
python
[{"finding_id": "codeql_py/request-without-cert-validation_1bd06488c4ebcda2_794946b3", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 81 ]
[ null ]
[ 24 ]
[ 85 ]
2024-11-19T01:00:01.591029+00:00
1,502,082,315,000
62d31c2a77bbdcbe305f07fcf8a136731e824a20
2
{ "blob_id": "62d31c2a77bbdcbe305f07fcf8a136731e824a20", "branch_name": "refs/heads/master", "committer_date": 1502082315000, "content_id": "9bd838edb5bd44d8104b2e35847eea6636b05361", "detected_licenses": [ "MIT" ], "directory_id": "80b5dc6e4d03068475ec6a265876b5091810187a", "extension": "py", "fi...
2.3125
stackv2
#!/usr/bin/env python try: import argparse, os, re, signal, socket, string, subprocess, sys, time, paramiko from urlparse import urlparse from subprocess import Popen, PIPE, STDOUT except Exception as e: print('\n[!] Import(s) failed! ' + str(e)) class SSHpray(): def __init__(self, args): ...
184
39.59
169
23
1,649
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_0adebe881bcf6821_f686fbf8", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 139 ]
[ null ]
[ 17 ]
[ 74 ]
2024-11-19T01:11:42.492429+00:00
1,623,619,816,000
bea26acaa6fbd74e610095510f0c1da58a7219b6
2
{ "blob_id": "bea26acaa6fbd74e610095510f0c1da58a7219b6", "branch_name": "refs/heads/main", "committer_date": 1623619816000, "content_id": "a548ed8a8969f5f7a2e566b2919ce6664fc200df", "detected_licenses": [ "MIT" ], "directory_id": "45a58742ed35fcd4aeb1acf8f64f233aeccba51c", "extension": "py", "file...
2.46875
stackv2
"""Server program for Tunt.""" from flask import Flask import os import logging import template import mimetypes # All range request imports from datetime import datetime from flask_rangerequest import RangeRequest app = Flask(__name__) server_boot_time = datetime.utcnow() @app.route("/") def render_home_page(): ...
102
24.81
82
14
622
python
[{"finding_id": "codeql_py/path-injection_c477907b3902f70d_b2b93cd5", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
3
true
[ "CWE-022", "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 61, 62, 65 ]
[ null, null, null ]
[ 34, 15, 14 ]
[ 44, 25, 24 ]
2024-11-19T01:22:22.677469+00:00
1,631,256,238,000
1a0c77fa5c580ad3679076ac6a0d36cbf5ff919e
2
{ "blob_id": "1a0c77fa5c580ad3679076ac6a0d36cbf5ff919e", "branch_name": "refs/heads/main", "committer_date": 1631256238000, "content_id": "59e59e4c8701ee9dd9755fa5de1175bc49e302c1", "detected_licenses": [ "MIT" ], "directory_id": "4c4d79235c84c52242f2d8c5171190c6836a43a7", "extension": "py", "file...
2.484375
stackv2
import sys from PyQt5 import QtCore, QtGui, QtWidgets from PyQt5.QtCore import * from PyQt5.QtWidgets import QDial, QDialog, QApplication from PyQt5.QtGui import * from Ui_Dialog_Login import * from Ui_Dialog_Signup import * class Ui_Login(QDialog,Ui_Dialog_Login): def __init__(self): super(Ui_Login,...
51
34.73
88
12
411
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_034ce0befa1c5182_9705b7ca", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 21, 37 ]
[ null, null ]
[ 75, 80 ]
[ 83, 88 ]
2024-11-19T01:33:50.118171+00:00
1,555,220,513,000
81d5fe70d90082ab94786b74a90fc4cf8057e5ce
3
{ "blob_id": "81d5fe70d90082ab94786b74a90fc4cf8057e5ce", "branch_name": "refs/heads/master", "committer_date": 1555220513000, "content_id": "8010af22cc3ee0d75cbe5102631890b38e9d3c45", "detected_licenses": [ "Unlicense" ], "directory_id": "a7e3563eab094b7d0db4f281be0d181a81f4ac1d", "extension": "py",...
2.640625
stackv2
import paramiko import getpass from time import sleep username = raw_input("Enter your username: ") #Remove below sharp sign to hard code your password #password = "YOUR PASSWORD HERE" #use below line to ask for password and echo it to user #password = raw_input("Enter your password: ") #use below line to ask for pass...
84
36.07
97
9
766
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_dbc06f8c1fad6906_6bcf9229", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 26 ]
[ null ]
[ 5 ]
[ 69 ]
2024-11-19T02:10:44.131433+00:00
1,629,747,878,000
16c7906c07653f8bb9793100315ad0036efa6e45
3
{ "blob_id": "16c7906c07653f8bb9793100315ad0036efa6e45", "branch_name": "refs/heads/main", "committer_date": 1629747878000, "content_id": "ad5179fd84bcc562bcbc25c3656d1ebe203938f1", "detected_licenses": [ "MIT" ], "directory_id": "589b9af0b096d25b987160c347e426597c6c9b27", "extension": "py", "file...
2.78125
stackv2
import requests import os from dotenv import load_dotenv from typing import List, Dict, Any from urllib.parse import urljoin load_dotenv() access_key = os.environ.get("ACCESS_KEY") secret_key = os.environ.get("SECRET_KEY") scan_url = os.environ.get("SCAN_URL", default="https://127.0.0.1:8834/scans") def send(url: s...
53
25.68
93
15
369
python
[{"finding_id": "codeql_py/request-without-cert-validation_57b0ab754ebe8dd2_c511a32c", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1) by [this value](2)." ]
[ 16 ]
[ null ]
[ 16 ]
[ 80 ]
2024-11-19T02:10:44.823079+00:00
1,461,839,437,000
06f21e10b390438697d7a525b2d61ba9033f2227
2
{ "blob_id": "06f21e10b390438697d7a525b2d61ba9033f2227", "branch_name": "refs/heads/master", "committer_date": 1461839437000, "content_id": "bdfec971b1b833b19734ecf5e4b7446aa8c780b1", "detected_licenses": [ "MIT" ], "directory_id": "12d889573dae5e517d92784f67e74d51c55e1a7c", "extension": "py", "fi...
2.421875
stackv2
# -*- coding:utf8 -*- """ Usage: main.py -d <delaytime> -u <url> [-o <save_dir>] [-s] Arguments: delaytime delaytime, eg: 60 save_dir path to save your site, eg: 'tmp' url url, eg: http://m.sohu.com Options: -h --help show this help -d delaytime -o save_dir ...
376
37.55
82
23
3,278
python
[{"finding_id": "codeql_py/request-without-cert-validation_e59d9701c2507c42_26382f9f", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
4
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 111, 169, 207, 251 ]
[ 115, 170, 209, 252 ]
[ 16, 24, 24, 24 ]
[ 41, 73, 63, 75 ]
2024-11-19T02:10:48.882836+00:00
1,671,793,021,000
b5ccd176177016e72f4f3f66e625abf5fa6c1399
2
{ "blob_id": "b5ccd176177016e72f4f3f66e625abf5fa6c1399", "branch_name": "refs/heads/main", "committer_date": 1671793021000, "content_id": "e0592dd0d2687962aba7749f0bdef240b51ede12", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "9aba1b720206a89d5ae965ec592262c5762582e1", "extension": "py"...
2.4375
stackv2
import argparse import json import os import sys import shutil from jupyter_client.kernelspec import KernelSpecManager from tempfile import TemporaryDirectory kernel_json = { "argv": [sys.executable, "-m", "echo_kernel", "-f", "{connection_file}"], "display_name": "Echo", "language": "text", } def insta...
59
32.64
85
16
469
python
[{"finding_id": "codeql_py/overly-permissive-file_26769dbe17595c50_7b0a9cf5", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable." ]
[ 19 ]
[ null ]
[ 9 ]
[ 28 ]
2024-11-19T02:45:18.847253+00:00
1,523,901,429,000
c53ec4729481982593b5d96dc0a45daae71952ad
2
{ "blob_id": "c53ec4729481982593b5d96dc0a45daae71952ad", "branch_name": "refs/heads/master", "committer_date": 1523901429000, "content_id": "90a821eadcd600fc9ceb85786e62d6539b2c7ae3", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "d48b6ffeb1efbad3e766abccde907d97c9348098", "extension": "p...
2.453125
stackv2
#!/usr/bin/python """composes the config from user definitions.""" import argparse import os import users import users.__config__ import importlib import csv # file indicators IND_DELIM = "_" USER_INDICATOR = "user" + IND_DELIM VLAN_INDICATOR = "vlan" + IND_DELIM AUTH_PHASE_ONE = "PEAP" AUTH_PHASE_TWO = "MSCHAPV2" c...
315
29.49
79
17
2,341
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_13d7594fb8a4c4e6_dd84ad2a", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
5
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.", "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.", "This expression stores [sen...
[ 198, 199, 203, 210, 217 ]
[ null, null, null, null, null ]
[ 21, 21, 21, 21, 13 ]
[ 63, 79, 53, 57, 61 ]
2024-11-19T02:45:34.772698+00:00
1,445,244,080,000
6541bd37007652a816cd77acce2a80cbbfc931f9
3
{ "blob_id": "6541bd37007652a816cd77acce2a80cbbfc931f9", "branch_name": "refs/heads/master", "committer_date": 1445244080000, "content_id": "2bc219cb7ee46e73d5f93868ea372ad5f944d209", "detected_licenses": [ "MIT" ], "directory_id": "d07ebe2bbc884a3626084ad95fdc71028d6a3550", "extension": "py", "fi...
2.5625
stackv2
# -*- coding: utf-8 -*- import re import urllib2 import time import json class bookIf: def __init__(self, youth_booklist_url, author_booklist_url): self.youth_booklist_url = youth_booklist_url self.author_booklist_url = author_booklist_url def get_group_booklist(self, group_id): if gr...
140
41.72
161
21
1,238
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_a421a270a55f22ab_a8b5de78", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'douban.com/subject/', so it might m...
1
true
[ "CWE-020" ]
[ "py/incomplete-hostname-regexp" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'douban.com/subject/', so it might match more hosts than expected." ]
[ 122 ]
[ null ]
[ 45 ]
[ 76 ]
2024-11-19T02:57:17.538179+00:00
1,461,384,379,000
9caac4f98f7ad5a63a3495cdacceaa051f9849cf
3
{ "blob_id": "9caac4f98f7ad5a63a3495cdacceaa051f9849cf", "branch_name": "refs/heads/master", "committer_date": 1461384379000, "content_id": "afc79c00b251fa1b3db9880a22cdbe1a8a4de460", "detected_licenses": [ "MIT" ], "directory_id": "8f861fa1cb9decdd9c941304a699fb0eeb0da77b", "extension": "py", "fi...
2.671875
stackv2
import re import os import sys import importlib import os.path import shutil class Exporter(object): data = None def __init__(self, data, target_directory): self.data = data self.target_directory = target_directory def _path_visitor(self, arg, dirname, names): for name in names: ...
79
34.25
121
18
559
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_710aca03f2b6029e_2dccfcf7", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 64, 69 ]
[ null, null ]
[ 28, 24 ]
[ 58, 55 ]
2024-11-19T03:12:08.540137+00:00
1,634,249,866,000
36766edffd0502de83e7fda29e3e1b8fbb529f91
2
{ "blob_id": "36766edffd0502de83e7fda29e3e1b8fbb529f91", "branch_name": "refs/heads/master", "committer_date": 1635270268000, "content_id": "5be0fefa08aa9df742df080ecfe1b5a2be42a4a9", "detected_licenses": [ "Apache-2.0" ], "directory_id": "1c5e29435a6954ccc855f0bc9b3a7f291330282d", "extension": "py"...
2.4375
stackv2
import time import random import logging import paramiko import kraken.kubernetes.client as kubecli import kraken.invoke.command as runcommand node_general = False # Pick a random node with specified label selector def get_node(node_name, label_selector, instance_kill_count): if node_name in kubecli.list_killab...
81
35.56
112
15
690
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_e0b92dcfeb4a05f5_15a2eb0d", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 57 ]
[ null ]
[ 5 ]
[ 62 ]
2024-11-19T03:12:10.023314+00:00
1,621,047,769,000
4ef6965c3492315686f49726a4b6e7d335aae2d9
3
{ "blob_id": "4ef6965c3492315686f49726a4b6e7d335aae2d9", "branch_name": "refs/heads/main", "committer_date": 1621047769000, "content_id": "b6e6fe5c51e84d3a438df1c6b374ee84a31618f6", "detected_licenses": [ "MIT" ], "directory_id": "13b8df116cc8f255907db54cb13e1c721bf1a487", "extension": "py", "file...
3.109375
stackv2
#!/usr/bin/env python3 ## std library imports on top import os ## 3rd party imports below import paramiko ## work assigned to a junior programming asset on our team from jrprogrammer import cmdissue def get_creds(): ip = input("IP: ") user = input("Username: ") #list return [ip, user] return {"ip": ...
64
26.44
124
16
471
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_67ff640b72eb2e9f_509c6833", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 39 ]
[ null ]
[ 3 ]
[ 67 ]
2024-11-19T01:33:39.210335+00:00
1,524,070,863,000
21df106e58196f1d0035a95ba6884fbe81a5a070
2
{ "blob_id": "21df106e58196f1d0035a95ba6884fbe81a5a070", "branch_name": "refs/heads/master", "committer_date": 1524070863000, "content_id": "aae6743107b4fd7e1991218c6cc399367c32c8ab", "detected_licenses": [ "MIT" ], "directory_id": "84fbc1625824ba75a02d1777116fe300456842e5", "extension": "py", "fi...
2.375
stackv2
# MIT License # # Copyright (c) 2017 Apogee Research # # Permission is hereby granted, free of charge, to any person obtaining a copy # of this software and associated documentation files (the "Software"), to deal # in the Software without restriction, including without limitation the rights # to use, copy, modify, mer...
210
32.7
105
16
1,714
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5e7a81cb3b8d70ac_1d70cb86", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text." ]
[ 175, 182 ]
[ null, null ]
[ 43, 53 ]
[ 60, 78 ]
2024-11-19T01:57:19.296446+00:00
1,458,553,443,000
90cf62b4f1d24d8d95b3bd748c87b86aa59d71a0
2
{ "blob_id": "90cf62b4f1d24d8d95b3bd748c87b86aa59d71a0", "branch_name": "refs/heads/master", "committer_date": 1458562992000, "content_id": "b3f4b71a43c18b5486d28972b6bb56f4c41ccd42", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "95c700425464db880229f988c0417bc108b44c01", "extension": "p...
2.484375
stackv2
"""Define tex request class. """ import flasktex.db import os import sys import syslog import tempfile import tarfile import subprocess class TeXRequest(): @staticmethod def daemonize(): """Daemonize with special treatments. Note: Please, manually ensure that database connection is ...
256
31.53
79
17
1,819
python
[{"finding_id": "codeql_py/tarslip_912094cc38ad5521_aa8f0b73", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 189 ]
[ null ]
[ 13 ]
[ 16 ]
2024-11-19T01:57:29.700064+00:00
1,456,775,693,000
9d9dc3cd993bd4edc166661a3f25772d73afe3f5
3
{ "blob_id": "9d9dc3cd993bd4edc166661a3f25772d73afe3f5", "branch_name": "refs/heads/master", "committer_date": 1456775693000, "content_id": "2706b1d83c4a0d17f4484d51c37e03c9bc39b699", "detected_licenses": [ "MIT" ], "directory_id": "31eda0b2eda25b4782f324b5a7ed6cea8b36635b", "extension": "py", "fi...
2.84375
stackv2
""" Basic file transfer server for SmartChain functions. Author: Tim M. (TM2013) Co-Author: Bitkapp (aka alaniz) Organization: Project Radon Date: 2/19/2016 Requirements: HTTP Connection """ import SmartChain_file_transfer_client from BaseHTTPServer import HTTPServer, BaseHTTPRequestHandler import os try: import cP...
88
29.95
82
18
605
python
[{"finding_id": "codeql_py/path-injection_cbb991afdf25c385_19dbc30c", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
3
true
[ "CWE-022", "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 37, 44, 50 ]
[ null, null, null ]
[ 19, 27, 23 ]
[ 48, 56, 52 ]
2024-11-19T02:10:58.235757+00:00
1,557,537,285,000
8039cf7107c3fb1d965bb3dd4c205d553062830e
2
{ "blob_id": "8039cf7107c3fb1d965bb3dd4c205d553062830e", "branch_name": "refs/heads/master", "committer_date": 1557537285000, "content_id": "50017ad81cf74beac5b8cf406c935d65892ec1ea", "detected_licenses": [ "MIT" ], "directory_id": "720be4dd11c98c44bded37f5978f64242efc669b", "extension": "py", "fi...
2.40625
stackv2
from flask import Flask, request import requests import sqlite3 import json DATABASE = './actuator_states.db' app = Flask(__name__) @app.teardown_appcontext def close_connection(exception): db = getattr(Flask, '_database', None) if db is not None: db.close() @app.route('/', methods=['GET']) def hell...
56
29.29
132
22
403
python
[{"finding_id": "codeql_py/sql-injection_f22490490785bcd0_276dce75", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown...
3
true
[ "CWE-089", "CWE-089", "CWE-089" ]
[ "py/sql-injection", "py/sql-injection", "py/sql-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This SQL query depends on a [user-provided value](1).", "This SQL query depends on a [user-provided value](1).", "This SQL query depends on a [user-provided value](1)." ]
[ 42, 48, 51 ]
[ null, null, null ]
[ 25, 29, 29 ]
[ 103, 132, 118 ]
2024-11-19T02:10:58.522782+00:00
1,666,718,158,000
89ded277758c897f18845046ad6f032cbdab626a
2
{ "blob_id": "89ded277758c897f18845046ad6f032cbdab626a", "branch_name": "refs/heads/master", "committer_date": 1666718158000, "content_id": "a044a6ee048fb26da4b209afcb270351074ced15", "detected_licenses": [ "MIT" ], "directory_id": "3e37b07ce6539b0133e021760e6568742f2c59d3", "extension": "py", "fi...
2.453125
stackv2
# *********** auth *********** from . import ( app, service_manager, jsonify, request, Response ) # *********** auth *********** # <editor-fold desc="Authentication checking views"> def get_request_auth(request): try: auth_header_value = request.headers.get('Authorization', None) ...
83
34.18
82
15
596
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ba0f07ddfa1a8c44_66a45db2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 51 ]
[ null ]
[ 15 ]
[ 42 ]
2024-11-19T02:11:00.684846+00:00
1,486,945,326,000
b2b151c46731d5f834f01ce47cdf532ae816d9c6
2
{ "blob_id": "b2b151c46731d5f834f01ce47cdf532ae816d9c6", "branch_name": "refs/heads/master", "committer_date": 1486945326000, "content_id": "ae4c4b4a9c89f97ca7b23bbb117d38d06ff65558", "detected_licenses": [ "MIT" ], "directory_id": "9babbf78dee6b37e2e900043cce41ec186af2175", "extension": "py", "fi...
2.390625
stackv2
#!/usr/bin/env python3 import os from collections import OrderedDict from contextlib import contextmanager from flask import Flask, redirect, render_template, request import jinja2 import mistune app = Flask(__name__) markdown = mistune.Markdown(hard_wrap=True) try: ROOT = os.environ['FINIKI_ROOT'] except KeyEr...
112
26.77
151
18
729
python
[{"finding_id": "codeql_py/url-redirection_543873df507b49ce_12cd71b9", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
7
true
[ "CWE-601", "CWE-601", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022" ]
[ "py/url-redirection", "py/url-redirection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).\nUntrusted URL redirection depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).\nThis ...
[ 29, 38, 27, 33, 68, 93, 94 ]
[ null, null, null, null, null, null, null ]
[ 25, 33, 27, 23, 29, 21, 15 ]
[ 35, 37, 36, 32, 38, 47, 24 ]
2024-11-19T02:11:31.049595+00:00
1,633,947,917,000
cd2fb3999b39269fa20a58c42253f052016f0842
3
{ "blob_id": "cd2fb3999b39269fa20a58c42253f052016f0842", "branch_name": "refs/heads/master", "committer_date": 1633947917000, "content_id": "c479ca7d87e977b5edc17dc6dcefd2b369ee94d1", "detected_licenses": [ "MIT" ], "directory_id": "95d34413afdc4f7ddfd7a8edaaeadf6dc47ec7e3", "extension": "py", "fi...
2.59375
stackv2
import re from konlpy.tag import Okt, Komoran, Mecab, Hannanum, Kkma REMOVE_CHARS = re.compile(r"©|'+|(=+.{2,30}=+)|__TOC__|(ファイル:).+|:(en|de|it|fr|es|kr|zh|no|fi):|\n", re.UNICODE) SPACE_CHARS = re.compile(r"(\\s|゙|゚| )+", re.UNICODE) EMAIL_PATTERN = re.compile(r"(^[a-zA-Z0-9_.+-]+@[a-zA-Z0-9-]+\.[a-zA-Z0-9-.]+$)", ...
43
35.26
128
11
488
python
[{"finding_id": "codeql_py/overly-large-range_b168ea8cf1ef06aa_67c0c0cd", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 8 ]
[ null ]
[ 67 ]
[ 70 ]
2024-11-19T02:11:31.920178+00:00
1,634,246,167,000
be975b6ca09f00a87a9e39ca1dfa96bc9c1b9327
2
{ "blob_id": "be975b6ca09f00a87a9e39ca1dfa96bc9c1b9327", "branch_name": "refs/heads/master", "committer_date": 1634246167000, "content_id": "fa7f96a5827bac3c279b265d82333feeaaee30e7", "detected_licenses": [ "Apache-2.0" ], "directory_id": "53cb12a1050181b1e82285cd66be3a2ee73c9ba7", "extension": "py"...
2.328125
stackv2
import json import logging from datetime import datetime import os import importlib from flask import request from flask.ext.restful import Resource from ..stats import get_stats from .. import settings from ..services import host from ..services import query logger = logging.getLogger('resources.api') logging.basic...
210
33.06
97
19
1,482
python
[{"finding_id": "codeql_py/log-injection_ff131fb4e07344c3_c78482c5", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
3
true
[ "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 127, 130, 141 ]
[ 128, 131, null ]
[ 29, 29, 30 ]
[ 57, 57, 93 ]
2024-11-19T02:11:43.880471+00:00
1,590,924,149,000
63660d5aaeeaa988fdcb9c9b59f5da636500b012
3
{ "blob_id": "63660d5aaeeaa988fdcb9c9b59f5da636500b012", "branch_name": "refs/heads/master", "committer_date": 1590924149000, "content_id": "a9472fbddc4ee11e11c203b2066ebf33399894f1", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "e52093052d676a2f239e056d308bd0b69b32d83b", "extension": "p...
2.984375
stackv2
from flask import jsonify def format_data(records): if "Exception" not in records[0]: data = dict() data['columns'] = records.pop(0) data['records'] = records try: json_data = jsonify({ "status": "success", "data": data }) ...
34
20.53
57
17
150
python
[{"finding_id": "codeql_py/stack-trace-exposure_318d8635cd9307fa_cc66beab", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 18 ]
[ 21 ]
[ 33 ]
[ 14 ]
2024-11-19T02:11:48.305897+00:00
1,591,663,470,000
c04efd319df672f32fe154d7bfe3ce1bc5683d33
4
{ "blob_id": "c04efd319df672f32fe154d7bfe3ce1bc5683d33", "branch_name": "refs/heads/master", "committer_date": 1591663470000, "content_id": "820fa2aa4fabb9b7cdf8d5c16e282f438eb0c717", "detected_licenses": [ "MIT" ], "directory_id": "bf55d7ad9b0d3d6c600acefce4fb5c10232c203f", "extension": "py", "fi...
3.515625
stackv2
import re txt = "Hello For other world!" result = re.search(r"f.r", txt, re.IGNORECASE) # Case sensitive print(result) print("Span:", re.search(r"[a-zA-z0-9]unt", "Aunt").span()) result = re.search(r"[^A-Za-z0-9 ]", txt) # wont match any number or alpha neigther a white space print(result) result = re.search(r"f...
80
25.65
99
10
608
python
[{"finding_id": "codeql_py/overly-large-range_e5893855b9f18ff4_cecc44b0", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 9 ]
[ null ]
[ 32 ]
[ 35 ]
2024-11-19T02:11:52.879121+00:00
1,459,622,587,000
78759853affb83979c921af3c2d9db5d30b97729
3
{ "blob_id": "78759853affb83979c921af3c2d9db5d30b97729", "branch_name": "refs/heads/master", "committer_date": 1459622587000, "content_id": "8442bb1bf49459cfaf097ad9e0b73bbbecae1d8a", "detected_licenses": [ "MIT" ], "directory_id": "6ccc1971c7d4d84a7c78eb941a646ae7513e650f", "extension": "py", "fi...
2.515625
stackv2
from django.views.generic import TemplateView from bs4 import BeautifulSoup import requests class Search(TemplateView): """Page to display search for guitar tabs""" template_name = 'main/index.html' def get_context_data(self, **kwargs): context = super().get_context_data(**kwargs) search...
30
34.8
101
15
243
python
[{"finding_id": "codeql_py/partial-ssrf_0880bb31686a7168_90140380", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
2
true
[ "CWE-918", "CWE-918" ]
[ "py/partial-ssrf", "py/partial-ssrf" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 14, 26 ]
[ null, null ]
[ 20, 16 ]
[ 94, 86 ]
2024-11-19T02:32:50.994625+00:00
1,581,387,368,000
4c5c00fb65a9463a6e0afddf38dba601ace2dd04
3
{ "blob_id": "4c5c00fb65a9463a6e0afddf38dba601ace2dd04", "branch_name": "refs/heads/master", "committer_date": 1581387368000, "content_id": "4cbd36cc4e60c4c4cee1580fa77cf0b11b55edad", "detected_licenses": [ "MIT" ], "directory_id": "e24904b6ea66b0725b9122e05a16b696000e039f", "extension": "py", "fi...
2.6875
stackv2
import http.client import hashlib import json import urllib import random import time from tqdm import tqdm import pandas as pd def baidu_translate(content, fromLang='en', toLang='zh'): appid = '' # 需要替换 secretKey = '' # 需要替换 httpClient = None myurl = '/api/trans/vip/translate' q = content #fr...
70
28.59
76
19
586
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_d4e6bfa10514c065_e277633d", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 20 ]
[ null ]
[ 24 ]
[ 37 ]
2024-11-19T02:32:51.113398+00:00
1,482,195,645,000
4f27bcd7373fd24fbd689674c7c0f8a0b3597a4e
2
{ "blob_id": "4f27bcd7373fd24fbd689674c7c0f8a0b3597a4e", "branch_name": "refs/heads/master", "committer_date": 1482195645000, "content_id": "e754c6c11580b3f747b77be7764504a5a351ffeb", "detected_licenses": [ "MIT" ], "directory_id": "15fd913cf6f84205a2233ccea2bc596d8d93f957", "extension": "py", "fi...
2.4375
stackv2
# -*- coding: utf-8 -*- # DISCLAIMER: The regular expressions used here are taken from # https://github.com/gforcada/haproxy_log_analysis from datetime import datetime import re # Example log line, to understand the regex below (truncated to fit into # 80 chars): # # Dec 9 13:01:26 localhost haproxy[28029]: 127.0.0...
149
32.23
76
16
1,531
python
[{"finding_id": "codeql_py/redos_db26d7cf428bc14d_71435e8e", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'a /' and containing many repetiti...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with 'a /' and containing many repetitions of '/'." ]
[ 64 ]
[ null ]
[ 18 ]
[ 66 ]
2024-11-19T02:59:27.180691+00:00
1,632,050,269,000
a313b5da3430d47a21c5a0a189c810ef4d31fb47
3
{ "blob_id": "a313b5da3430d47a21c5a0a189c810ef4d31fb47", "branch_name": "refs/heads/main", "committer_date": 1632050269000, "content_id": "0e9bd5ad0e4cdd8e64cc2580c999070aefbaf0f7", "detected_licenses": [ "MIT" ], "directory_id": "4b807ed174f50be1e7b98f7ac99645ff62874d4f", "extension": "py", "file...
2.578125
stackv2
from flask import render_template, url_for, flash, redirect, request from flaskblog import app, db, bcrypt from flaskblog.forms import RegistrationForm, LoginForm, HashtagtForm from flaskblog.models import User from flask_login import login_user, current_user, logout_user, login_required from flaskblog.sentiment import...
105
38.2
168
17
914
python
[{"finding_id": "codeql_py/url-redirection_79b24d79938326d6_21698dae", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 33 ]
[ null ]
[ 29 ]
[ 38 ]
2024-11-19T02:59:58.208698+00:00
1,627,915,922,000
5f046e2da31993cd523fae11b27b01b5dd2f2518
4
{ "blob_id": "5f046e2da31993cd523fae11b27b01b5dd2f2518", "branch_name": "refs/heads/master", "committer_date": 1627915922000, "content_id": "d82152d289927a473c6b7d11086ff0fcef76cbf9", "detected_licenses": [ "MIT" ], "directory_id": "9bc228372e586a1f90bb0685c43e744be9638ecd", "extension": "py", "fi...
4.40625
stackv2
# 학생 정보 관리 프로그램 # 학생 정보를 담은 Student 클래스 # 단! 무조건 '입력'을 받아서 정보들을 저장할 수 있는 형태 ( + 나중에... 미리 입력된 정보 바탕으로 정보 저장하기 / 값 수정하기) # 생성되는 Student 객체들은 StudentList 에 리스트로 나열하여 저장 # Student 클래스의 필드: name, birth, age, gender, grade # Student 클래스의 메소드: __init__ setInit, getAvg, getName, printStud class Student: # ----- 생성자 --...
76
27.68
96
16
683
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_178d1cf8dd6e98c7_306c9fdb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 48 ]
[ null ]
[ 15 ]
[ 36 ]
2024-11-19T03:24:40.637652+00:00
1,591,961,580,000
d692de36b7f52f865992d75bf0c5b401c9b0e909
4
{ "blob_id": "d692de36b7f52f865992d75bf0c5b401c9b0e909", "branch_name": "refs/heads/master", "committer_date": 1591961580000, "content_id": "427ebafba8271d806ddf8d50411c9548e94c0cf9", "detected_licenses": [ "MIT" ], "directory_id": "a6fb2c28f2f7aa59616050ab557ea5389eb31f19", "extension": "py", "fi...
4.15625
stackv2
""" Реализовать функцию, принимающую несколько параметров, описывающих данные пользователя: имя, фамилия, год рождения, город проживания, email, телефон. Функция должна принимать параметры как именованные аргументы. Реализовать вывод данных о пользователе одной строкой. """ def get_user_data(msg): res = input(f"...
32
31.28
115
10
281
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2dfbba69150276fb_39a795dd", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 15 ]
[ null ]
[ 11 ]
[ 87 ]
2024-11-19T03:24:56.217984+00:00
1,511,397,850,000
e3e07b2ba29cccc8ee1328d8e60ff9ff280ae54f
3
{ "blob_id": "e3e07b2ba29cccc8ee1328d8e60ff9ff280ae54f", "branch_name": "refs/heads/master", "committer_date": 1511397850000, "content_id": "0d381ae35fd12c04ce15db0d49ef5bd00d8afd12", "detected_licenses": [ "MIT" ], "directory_id": "815b191808dffa4869cda6d6a667c923e8fee65c", "extension": "py", "fi...
2.546875
stackv2
"""Set the default for the application.""" import pdb from pyramid.view import view_config from learning_journal.data.data_entries import ENTRIES from datetime import datetime from pyramid.httpexceptions import HTTPNotFound, HTTPFound, HTTPBadRequest from learning_journal.models.mymodel import Journal @view_config(ro...
74
30.45
81
14
506
python
[{"finding_id": "codeql_py/reflective-xss_27812896d3004ad0_a9b21403", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 38 ]
[ null ]
[ 12 ]
[ 16 ]
2024-11-19T03:35:18.422963+00:00
1,593,545,582,000
10653ee67ca33f9732003169bc2dac36080275d6
3
{ "blob_id": "10653ee67ca33f9732003169bc2dac36080275d6", "branch_name": "refs/heads/master", "committer_date": 1593545582000, "content_id": "ddf2ab6697183113b483ca491f18827a6e223884", "detected_licenses": [ "BSD-2-Clause-Views" ], "directory_id": "8103ac2a9c17773cdf5394479ed3d64a4bd4bb3f", "extensio...
2.5625
stackv2
import argparse from contextlib import closing import mimetypes import os import shutil try: from http.server import BaseHTTPRequestHandler, HTTPServer except ImportError: # Compatible with python 2.7 from BaseHTTPServer import BaseHTTPRequestHandler, HTTPServer import markdown VERSION = "1.1.0" DEFAULT_...
164
31.31
79
18
1,094
python
[{"finding_id": "codeql_py/path-injection_96cbc54e4d2e6234_f37f0f48", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
4
true
[ "CWE-022", "CWE-022", "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 55, 58, 60, 96 ]
[ null, null, null, null ]
[ 31, 26, 37, 19 ]
[ 40, 35, 46, 23 ]
2024-11-19T01:37:52.061833+00:00
1,564,732,485,000
9a0d5c21676908120c1a39c954c126054e0235b0
2
{ "blob_id": "9a0d5c21676908120c1a39c954c126054e0235b0", "branch_name": "refs/heads/master", "committer_date": 1564732485000, "content_id": "0d3e6a6de7d8d4f5118faeda2168f1012a47a74a", "detected_licenses": [ "MIT" ], "directory_id": "070c68f582cbcdf3de29871bdcb7f49b7f09c068", "extension": "py", "fi...
2.453125
stackv2
""" @file @brief Documentation helper. """ from logging import getLogger from textwrap import indent, dedent from jinja2 import Template from sklearn.linear_model import LinearRegression from pyquickhelper.loghelper import noLOG from mlprodict.onnxrt.validate import enumerate_validated_operator_opsets, sklearn_operator...
102
28.58
92
13
707
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_f236ec04b3a601b1_d88c791d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 24 ]
[ null ]
[ 13 ]
[ 44 ]
2024-11-19T01:38:03.017486+00:00
1,478,541,907,000
b7d35126da55a283d14762fa691b495ec1f0bce6
3
{ "blob_id": "b7d35126da55a283d14762fa691b495ec1f0bce6", "branch_name": "refs/heads/master", "committer_date": 1478541907000, "content_id": "296f25c3d328377384a62cb7c55a5993c575238c", "detected_licenses": [ "MIT" ], "directory_id": "77eb303a337e6bef7ea174ecdc79d722adc3e333", "extension": "py", "fi...
2.859375
stackv2
import pandas as pd import numpy as np from bs4 import BeautifulSoup import requests import re import os from time import sleep artist_dict = {} url = 'http://www.songlyrics.com/bob-dylan-lyrics/' response = requests.get(url) page = response.text page = BeautifulSoup(page, 'lxml') for j in page.find_all(href=re.compi...
34
22.91
88
10
234
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_f260682be10d078c_b663eeda", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'songlyrics.com/bob-dylan/', so it m...
1
true
[ "CWE-020" ]
[ "py/incomplete-hostname-regexp" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'songlyrics.com/bob-dylan/', so it might match more hosts than expected." ]
[ 15 ]
[ null ]
[ 41 ]
[ 85 ]
2024-11-19T01:38:09.921621+00:00
1,693,468,902,000
83f28b841d66e52b0361b5e9cf286affa30d4bea
3
{ "blob_id": "83f28b841d66e52b0361b5e9cf286affa30d4bea", "branch_name": "refs/heads/main", "committer_date": 1693468902000, "content_id": "f8f4393499176ee3c007b037de60459d305da4a1", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e90bf4b372da78ceec15282d060b48d18ba8d4e9", "extension": "py", ...
2.5625
stackv2
"""Manage SSO for Add-ons with Home Assistant user.""" import asyncio import hashlib import logging from .addons.addon import Addon from .const import ATTR_ADDON, ATTR_PASSWORD, ATTR_USERNAME, FILE_HASSIO_AUTH from .coresys import CoreSys, CoreSysAttributes from .exceptions import AuthError, AuthPasswordResetError, Ho...
140
35.56
87
19
1,092
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_53031262ef630447_8ed64d2f", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e...
[ 139 ]
[ null ]
[ 36 ]
[ 67 ]
2024-11-19T01:38:47.185004+00:00
1,628,571,439,000
4486aa8ad379a6228a42f4f4a0961c9fa8e25078
3
{ "blob_id": "4486aa8ad379a6228a42f4f4a0961c9fa8e25078", "branch_name": "refs/heads/master", "committer_date": 1628571439000, "content_id": "fd6f8e77e937a3d6b4f7a937d2b40e9e0d41eb2d", "detected_licenses": [ "MIT" ], "directory_id": "7ae4e17b0b2bf9de2fd742a5e615ea8f94929b7c", "extension": "py", "fi...
2.640625
stackv2
import os import ast import pandas as pd from flask import request,jsonify from anuvaad_auditor.loghandler import log_info, log_exception from anuvaad_auditor.errorhandler import post_error from datetime import datetime from utilities import singularcleanerfn,parallelcleanerfn,number_sequence_corr,spell_corrector from ...
144
33.57
142
24
981
python
[{"finding_id": "codeql_py/path-injection_8581fec5700cda6e_63413822", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 58, 61 ]
[ null, null ]
[ 39, 37 ]
[ 67, 65 ]
2024-11-19T01:51:57.313054+00:00
1,600,184,242,000
1a2520c6469318e0d103a7b729cdd67c8073af70
3
{ "blob_id": "1a2520c6469318e0d103a7b729cdd67c8073af70", "branch_name": "refs/heads/master", "committer_date": 1600184242000, "content_id": "7c4435af9717de6f98db15d4727b953d910776a9", "detected_licenses": [ "MIT" ], "directory_id": "039e819fbe4eb9237a2b605c2ddb62302e0a0fda", "extension": "py", "fi...
2.65625
stackv2
# From: https://www.twilio.com/docs/usage/tutorials/how-to-secure-your-flask-app-by-validating-incoming-twilio-requests import logging from functools import wraps from flask import abort, request from bling.common.request_url import request_url from bling.config import config from twilio.request_validator import Req...
39
32
121
18
286
python
[{"finding_id": "codeql_py/log-injection_31d02752c4c248ec_e0ae0f43", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 35 ]
[ null ]
[ 17 ]
[ 122 ]
2024-11-19T01:51:59.256475+00:00
1,566,994,001,000
e91f2f1dad38e71a998a4c1fe47bcbfadc129d01
3
{ "blob_id": "e91f2f1dad38e71a998a4c1fe47bcbfadc129d01", "branch_name": "refs/heads/master", "committer_date": 1566994001000, "content_id": "109e7dcff63ef48bee7a488b7485249b796a52d2", "detected_licenses": [ "MIT" ], "directory_id": "1ff7a3c01ee3a870529bc228767c0fce7d639ccf", "extension": "py", "fi...
2.984375
stackv2
import socket from threading import Thread, Lock from typing import Callable, List, Any import certifi import ssl class IrcClient(): """ Class for connecting to Twitch's IRC chat server. Uses socket with SSL functionality """ _instance: Any = None def __new__(self): if self._instance == N...
196
32.33
97
18
1,340
python
[{"finding_id": "codeql_py/insecure-default-protocol_3ac11ec50ac9bcb1_30193e2e", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in...
1
true
[ "CWE-327" ]
[ "py/insecure-default-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used." ]
[ 49 ]
[ 51 ]
[ 36 ]
[ 39 ]
2024-11-19T01:52:03.170547+00:00
1,601,599,589,000
50b793eba666e61ca9bc692089b9a389cc3d09d1
3
{ "blob_id": "50b793eba666e61ca9bc692089b9a389cc3d09d1", "branch_name": "refs/heads/master", "committer_date": 1601599589000, "content_id": "d6a7f686003385935efa82426cd7a0db4bbc26f3", "detected_licenses": [ "MIT" ], "directory_id": "5bf40ae34fcdf59073651205d2cbc973ff303d30", "extension": "py", "fi...
2.75
stackv2
#!/bin/env python2.7 import os import sys import requests class Main: def __init__(self,x,y): self.email = x self.url = 'https://m.facebook.com/login' self.ex = open(y, 'r').readlines() def main(self): for line in self.ex: password = line.strip() http = re...
41
40.32
107
18
505
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a9a30782dccb9ff6_6ade1b02", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 16, 19 ]
[ null, null ]
[ 24, 23 ]
[ 73, 72 ]
2024-11-19T01:52:19.281244+00:00
1,553,415,942,000
1862bde1f955cc248aeaf1054586da7e88a62c82
2
{ "blob_id": "1862bde1f955cc248aeaf1054586da7e88a62c82", "branch_name": "refs/heads/master", "committer_date": 1553415942000, "content_id": "015a05ef6167deb2f72180dd0e2ed2bd922a4015", "detected_licenses": [ "BSD-3-Clause", "MIT", "Apache-2.0" ], "directory_id": "0ef48c14cb35abab3676c9e289b0758...
2.375
stackv2
# coding=utf-8 import hashlib from json.decoder import JSONDecodeError import projecta11.db as db from projecta11.config import conf from projecta11.session import Session from tornado.escape import json_decode def parse_json_body(func): def wrapper(self, *args, **kwargs): try: data = json_de...
74
29.18
69
18
510
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_6a7ef7cfd9762e63_54863ce0", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.", "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computational...
[ 71, 73 ]
[ null, null ]
[ 29, 40 ]
[ 46, 55 ]
2024-11-19T01:52:25.143626+00:00
1,635,161,890,000
db29928f404ce2b160dc91cd418258d112c640be
2
{ "blob_id": "db29928f404ce2b160dc91cd418258d112c640be", "branch_name": "refs/heads/master", "committer_date": 1635161890000, "content_id": "ff0d5f5b7516f420ebb9f3e7eb97d191474feccc", "detected_licenses": [ "Apache-2.0" ], "directory_id": "372f1aa2cf1d7091d3c8116dfeb9284d9630cfa0", "extension": "py"...
2.421875
stackv2
from __future__ import print_function import numpy as np import torch import torch.utils.data as data import torchvision import torchvision.transforms as transforms from PIL import Image import os import os.path import tarfile import random import boto3 import time from data_loader.cifar10_dataset import CIFAR10_sub...
107
39.45
149
20
1,099
python
[{"finding_id": "codeql_py/tarslip_5078cb33c287aaff_0fe633af", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 38 ]
[ null ]
[ 5 ]
[ 8 ]
2024-11-19T02:04:47.153177+00:00
1,681,516,418,000
92609065738e7049c18cbdc88bebcbe647f7049b
3
{ "blob_id": "92609065738e7049c18cbdc88bebcbe647f7049b", "branch_name": "refs/heads/master", "committer_date": 1681516418000, "content_id": "1b07642d61aa0dc08344b753ae39342f820bd3ca", "detected_licenses": [ "MIT" ], "directory_id": "20e3461cdf20ced844b6d00177c8de4fcefbe7ab", "extension": "py", "fi...
2.75
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- """Get user oauth credentials. Utility to help with getting the access token for a user """ from __future__ import (division, absolute_import, print_function, unicode_literals) import sys import logging import tweepy from six.moves.configparser i...
52
30.15
75
11
359
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_982d5292dc09d676_d72d3682", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 46 ]
[ null ]
[ 11 ]
[ 69 ]
2024-11-19T02:28:04.757879+00:00
1,624,724,787,000
1d2703d0301539a928942067eedd6f0da7de7c2d
3
{ "blob_id": "1d2703d0301539a928942067eedd6f0da7de7c2d", "branch_name": "refs/heads/master", "committer_date": 1624724787000, "content_id": "4e9ce4c1308a981a0f52a56cae672dcbabffe9d9", "detected_licenses": [ "MIT" ], "directory_id": "5e47479f649adb7eaa7103ab17d98e4dc191a783", "extension": "py", "fi...
2.515625
stackv2
import functools import logging import os import sys from modem_logger import CM500Parser from modem_logger.influx import InfluxClient from apscheduler.schedulers.blocking import BlockingScheduler # Configuration influx_base = os.environ.get('INFLUX_URL', 'http://influxdb:8086') influx_db = os.environ.get('INFLUX_DB...
66
29.92
78
13
457
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3ffbf49b76c175df_81dd73f2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 52 ]
[ 57 ]
[ 17 ]
[ 59 ]
2024-11-19T02:28:51.965270+00:00
1,639,357,443,000
633814128e9ee8d115d33ce31b06404832f1d88f
2
{ "blob_id": "633814128e9ee8d115d33ce31b06404832f1d88f", "branch_name": "refs/heads/master", "committer_date": 1639357443000, "content_id": "71f5e1a7c3aac62bb098a18edc75b88e576b7372", "detected_licenses": [ "MIT" ], "directory_id": "333024f7050c41475fb8f32e472421d89b0cb677", "extension": "py", "fi...
2.3125
stackv2
#!/usr/bin/env python from cryptography import x509 from cryptography.hazmat.backends import default_backend from datetime import datetime from pluginbase import PluginBase from . import utils import copy import logging import os import socket import ssl import sys import yaml try: from yaml import CLoader as Lo...
150
29.49
79
17
1,013
python
[{"finding_id": "codeql_py/insecure-protocol_586eccb8a4fd932d_6eee4422", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol...
1
true
[ "CWE-327" ]
[ "py/insecure-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.SSLContext](1)." ]
[ 48 ]
[ null ]
[ 20 ]
[ 36 ]
2024-11-19T02:37:09.104351+00:00
1,590,956,832,000
9ff0f32090b91974ff72366142ef9b835603f66b
2
{ "blob_id": "9ff0f32090b91974ff72366142ef9b835603f66b", "branch_name": "refs/heads/master", "committer_date": 1590956832000, "content_id": "20be3844057d063f1608dbc6a0b0aee6e543bd6e", "detected_licenses": [ "MIT" ], "directory_id": "771da90a55c08739f914213869e0feec3084fae4", "extension": "py", "fi...
2.484375
stackv2
# app/mongo_queries.py import pymongo import os import pandas as pd import json DB_USER = 'joemac' DB_PASSWORD = 'WnpPTBG3lyhJ2bXT' CLUSTER_NAME = 'cluster0-udrnh' connection_uri = f"mongodb+srv://{DB_USER}:{DB_PASSWORD}@{CLUSTER_NAME}.mongodb.net/test?retryWrites=true&w=majority" print("----------------") print("UR...
54
25.65
117
12
372
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c2fbc355d99c9934_d4c13c63", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 14 ]
[ null ]
[ 15 ]
[ 29 ]
2024-11-19T02:37:10.862560+00:00
1,683,150,429,000
bd221848c71564c7d8d88518f702d6868d9b47c9
2
{ "blob_id": "bd221848c71564c7d8d88518f702d6868d9b47c9", "branch_name": "refs/heads/master", "committer_date": 1683150429000, "content_id": "cffe8443f8be40aa12abfe24d0084d52e577f6d5", "detected_licenses": [ "MIT" ], "directory_id": "8df74364e4b88d232ece3f306707df1f88993e72", "extension": "py", "fi...
2.46875
stackv2
from flask import Flask, render_template import config.config import csv_processor import os, sysconfig, logging, time import Report import sys from config import config as global_config import pandas as pd app = Flask(__name__) try: logger = logging.getLogger('Report Generator') logger.setLevel(logging.D...
145
41.42
158
21
1,367
python
[{"finding_id": "codeql_py/reflective-xss_5efaa42b35518e65_6cbce1c7", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
2
true
[ "CWE-079", "CWE-117" ]
[ "py/reflective-xss", "py/log-injection" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 133, 68 ]
[ null, null ]
[ 12, 17 ]
[ 100, 73 ]
2024-11-19T02:37:14.502788+00:00
1,692,976,388,000
ecf71ae8348ab1f5ac00bf1371b1342d350212ed
2
{ "blob_id": "ecf71ae8348ab1f5ac00bf1371b1342d350212ed", "branch_name": "refs/heads/master", "committer_date": 1692976388000, "content_id": "168303fb966b3158978db6330d5d543d7511eefc", "detected_licenses": [ "MIT" ], "directory_id": "7f0acb6ce41afb89ae526d3a699ad9570438215b", "extension": "py", "fi...
2.4375
stackv2
#!/usr/bin/env python3 import urllib3 from xml.dom import minidom import requests import dateutil.parser # configure package (disable warning for self-signed certificate) urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning) # some consts WEBDAV_URL_HOST = 'http://localhost:8080' WEBDAV_URL_PATH = '/re...
52
34.88
100
18
493
python
[{"finding_id": "codeql_py/request-without-cert-validation_4ef36b39d315215c_ce9f3be6", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 28 ]
[ 29 ]
[ 5 ]
[ 75 ]
2024-11-19T02:37:27.486911+00:00
1,552,597,759,000
3edfbe105adf4a8e822cb0296e3146aaf51414a7
3
{ "blob_id": "3edfbe105adf4a8e822cb0296e3146aaf51414a7", "branch_name": "refs/heads/master", "committer_date": 1552597759000, "content_id": "8451e309e14ee5152ae111b18d67055a0b6fdf4d", "detected_licenses": [ "MIT" ], "directory_id": "724a54f533d9d5af9b76066902f09676306dee28", "extension": "py", "fi...
2.5625
stackv2
# The MIT License (MIT) # Copyright (c) 2017 Mike Teachman # https://opensource.org/licenses/MIT # # Publish data to a Thingspeak channel using the MQTT protocol # # Micropython implementation using the ESP8266 platform # Tested using Micropython v1.9.3 (Nov 1, 2017) # # prerequisites: # - Thingspeak account # - Think...
85
28.87
118
12
702
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_221b83286eb20fb3_997cadc7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 70 ]
[ null ]
[ 7 ]
[ 18 ]
2024-11-19T02:37:43.725415+00:00
1,379,719,010,000
99c3030c54c876af043c990de90f7eef6a716f6c
3
{ "blob_id": "99c3030c54c876af043c990de90f7eef6a716f6c", "branch_name": "refs/heads/master", "committer_date": 1379719010000, "content_id": "067ffe46b426116dfce974343ba624c381580516", "detected_licenses": [ "MIT" ], "directory_id": "1b74912c47160e865d9d8f96bdbc10a769505b2e", "extension": "py", "fi...
2.890625
stackv2
import jinja2 import os class Config(dict): """Dictionary like helper class for maintaining test data configurations per environment. :class:`holmium.core.TestCase` and :class:`holmium.core.HolmiumNose` both look for either a config.json or config.py file in the same directory as the test file, and will make a ``...
96
37.45
127
16
810
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_186bf4604926c4ab_ba6c69b2", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 75 ]
[ null ]
[ 28 ]
[ 49 ]
2024-11-19T02:37:44.255490+00:00
1,497,374,122,000
6aca261f6b91ca2ec4657e3f4bfef16658ac7aa4
2
{ "blob_id": "6aca261f6b91ca2ec4657e3f4bfef16658ac7aa4", "branch_name": "refs/heads/master", "committer_date": 1497374122000, "content_id": "145d846ce7966b163e2943d2762b1170010ff941", "detected_licenses": [ "Apache-2.0" ], "directory_id": "a2479dd613543c9201310168e47a73ddb95b9745", "extension": "py"...
2.375
stackv2
#!/usr/bin/python import BaseHTTPServer import urllib import os.path SERVER_FILES = "serverFiles" def parsePath(pathArgs): pathArgs = pathArgs.split("?") path = pathArgs[0][1:].split("/") args = pathArgs[1] if len(pathArgs) > 1 else "" path = [p for p in path if len(p) > 0] nArgs = {} for a in args.split("&...
113
19.29
101
15
646
python
[{"finding_id": "codeql_py/path-injection_16e4a68bb6a6c81d_b1bc0b62", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 40, 45 ]
[ null, null ]
[ 24, 12 ]
[ 32, 20 ]
2024-11-19T02:37:46.423719+00:00
1,541,448,388,000
fac19d0c2265343f31a0f621de0e687de49a9349
3
{ "blob_id": "fac19d0c2265343f31a0f621de0e687de49a9349", "branch_name": "refs/heads/master", "committer_date": 1541448388000, "content_id": "7ac056eb89c2bce69d52efb0415d93fd3fc997a6", "detected_licenses": [ "MIT" ], "directory_id": "484083cb99846d134543b578bc003262925e72d6", "extension": "py", "fi...
3.359375
stackv2
import string import random import argparse def password_generator(size=6, chars=string.ascii_letters + string.digits): return ''.join(random.SystemRandom().choice(chars) for _ in range(size)) if __name__ == "__main__": size = 14 parser = argparse.ArgumentParser() parser.add_a...
20
23.9
76
11
109
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_323757ee0e544b05_37702135", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 20 ]
[ null ]
[ 11 ]
[ 40 ]
2024-11-19T02:37:48.102869+00:00
1,480,247,867,000
a8346e310a4cf1b0d58b3005edc8c3d319a79686
2
{ "blob_id": "a8346e310a4cf1b0d58b3005edc8c3d319a79686", "branch_name": "refs/heads/master", "committer_date": 1480247867000, "content_id": "339d035568be37965593c3355059b33d5f1aa89c", "detected_licenses": [ "Apache-2.0" ], "directory_id": "ca7b514b9946be11edb7a17b4ee5c82db7b2eead", "extension": "py"...
2.359375
stackv2
import os from flask import Flask, redirect, send_file, request, jsonify, abort from models import Patient from database import db from models import DBSession from sqlalchemy.orm.exc import NoResultFound app = Flask(__name__) app.config.from_pyfile('config.py') db.init_app(app) class InvalidUsage(Exception): st...
120
28.73
87
14
826
python
[{"finding_id": "codeql_py/path-injection_567cc5df3d87b4b9_bb31c46c", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 32, 34 ]
[ null, null ]
[ 27, 22 ]
[ 31, 26 ]
2024-11-19T02:37:49.238610+00:00
1,605,214,240,000
02879c710ea530fab45f279c09784b38bb8d7895
3
{ "blob_id": "02879c710ea530fab45f279c09784b38bb8d7895", "branch_name": "refs/heads/main", "committer_date": 1605214240000, "content_id": "d52c438fba544ff501d7bc16f5c3240126cd4983", "detected_licenses": [ "MIT" ], "directory_id": "f6f91e340e5f822429317ea1882022bc56a56347", "extension": "py", "file...
3.1875
stackv2
import secrets import string import random from tkinter import * from tkinter import ttk root = Tk() class Application(): def __init__(self): self.root = root self.labels() self.root.mainloop() def labels(self): self.password_entry = Entry(self.root, width=30) self.pas...
35
31.66
111
18
255
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_eabb542a42dc8c08_854101fc", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 32 ]
[ null ]
[ 15 ]
[ 28 ]
2024-11-19T02:49:15.990575+00:00
1,535,635,933,000
643da73658b7955acc1842fd9fd1556f89f4ac74
3
{ "blob_id": "643da73658b7955acc1842fd9fd1556f89f4ac74", "branch_name": "refs/heads/master", "committer_date": 1535635933000, "content_id": "df5cf85c311bcede6db5f775808fc48a57d2383f", "detected_licenses": [ "MIT" ], "directory_id": "7dd4a626a8382916f94a0718a7ca8043435b3424", "extension": "py", "fi...
2.515625
stackv2
import csv import hunterio_api from urllib.parse import urlparse import os from settings import LIMIT out_path = "emails_searched_by_domain.csv" def inject_contacts(companies, api_key): exists = False if os.path.isfile(out_path): exists = True with open(out_path, 'a+') as f: fieldnames...
124
34.06
151
21
930
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_efe39e4b5e27aa10_21cc069c", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (password)](3) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive d...
[ 120, 112 ]
[ null, null ]
[ 28, 27 ]
[ 151, 53 ]
2024-11-19T02:49:41.403746+00:00
1,585,068,851,000
ecbbfbcaaca5d276d493cb80adf27f53eedb185a
3
{ "blob_id": "ecbbfbcaaca5d276d493cb80adf27f53eedb185a", "branch_name": "refs/heads/master", "committer_date": 1585068851000, "content_id": "073a7fdc448c045c98bd47db5e6f65f3c590d5cb", "detected_licenses": [ "MIT" ], "directory_id": "0f40e70549c19c9255eecb345c8ef9f373961e75", "extension": "py", "fi...
2.828125
stackv2
# import packages import sys import pandas as pd from sqlalchemy import create_engine import numpy as np import re from nltk.tokenize import word_tokenize from nltk.stem import WordNetLemmatizer from nltk.corpus import stopwords from sklearn.pipeline import Pipeline from sklearn.metrics import classification_report fro...
156
36.03
119
18
1,330
python
[{"finding_id": "codeql_py/overly-large-range_404fad5820581654_b394ff60", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 90 ]
[ null ]
[ 48 ]
[ 51 ]
2024-11-19T03:00:15.942309+00:00
1,585,899,244,000
052da5a8e8429c4584fea5544fa0d17f6da13899
3
{ "blob_id": "052da5a8e8429c4584fea5544fa0d17f6da13899", "branch_name": "refs/heads/master", "committer_date": 1585899244000, "content_id": "fc2c6de3294a6ca3d8ef8e87f32ef950753f5884", "detected_licenses": [ "MIT" ], "directory_id": "f748e550cd3b57ca61d19e665e789742a88c7abe", "extension": "py", "fi...
2.515625
stackv2
''' docomo API - Powered by アドバンスト・メディア - Powered by NTTテクノクロス - Powered by goo - Powered by Jetrun ''' import requests import json import datetime try: APIKEY = open('config/docomo-token').read().split('\n') if '' in APIKEY: APIKEY.remove('') except: print('Configuration file does not exist') exi...
84
24.69
88
13
611
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2853c16c91c5a49d_a7e76388", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 84 ]
[ null ]
[ 11 ]
[ 40 ]
2024-11-19T03:11:22.112457+00:00
1,619,907,316,000
301acf37ac47f05a0d06be4e68f3458702655ad2
3
{ "blob_id": "301acf37ac47f05a0d06be4e68f3458702655ad2", "branch_name": "refs/heads/master", "committer_date": 1619907316000, "content_id": "2265aad9b40a4ad6b4500e2576a6b24517b1b92b", "detected_licenses": [ "MIT" ], "directory_id": "00c0c9b80442af8bb26f0d278b4dc9b628d27eba", "extension": "py", "fi...
3.140625
stackv2
import re import csv pattern = r"(?P<component>^[A-Z-\s]+)+(?P<Value>[0-9.]+)+\s*(?P<StandardRange>[0-9-.\s]+)+(?P<Unit>[A-Z%\/]+)" fields=["Component" ,"Your Value", "Standard Range" ,"Units"] file=open('CBC.txt','r') matchesRow = [] lines=file.readlines() for line in lines: match=re.match(pattern,line) ...
25
22.08
110
11
160
python
[{"finding_id": "codeql_py/redos_6bdd6194e8d78590_d8b5c9c0", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '\\t' and containing many repetiti...
2
true
[ "CWE-1333", "CWE-1333" ]
[ "py/redos", "py/redos" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '\\t' and containing many repetitions of '.'.", "This part of the regular expression may cause exponential backtracking on strings starting with '\\t.' and containing many repetitions of '\\t'." ]
[ 4, 4 ]
[ null, null ]
[ 49, 79 ]
[ 56, 89 ]
2024-11-19T03:12:07.203233+00:00
1,481,030,359,000
a057dc2508d8ddbd00723fe196e176e7d37b06b8
3
{ "blob_id": "a057dc2508d8ddbd00723fe196e176e7d37b06b8", "branch_name": "refs/heads/master", "committer_date": 1481030359000, "content_id": "83f8a7d32637c5fa5e18bece2407fd57bf82bebb", "detected_licenses": [ "Apache-2.0" ], "directory_id": "c3a6e38d2ba4f09985bd938b43e16ac43b400986", "extension": "py"...
2.921875
stackv2
#!/usr/bin/env python #coding:utf-8 """ Author: --<VillanCH> Purpose: check proxy available Created: 2016/10/31 """ import unittest import requests from pprint import pprint from base import PluginBaseClass ######################################################################## class CheckProxyPlugin(Plugi...
206
29.95
143
15
1,347
python
[{"finding_id": "codeql_py/request-without-cert-validation_e8ffcc6e205ff6a9_c4224b1e", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 131 ]
[ 133 ]
[ 25 ]
[ 54 ]
2024-11-19T03:12:30.763036+00:00
1,479,216,186,000
18ecf3b210530c8d1bf8f5d1f35038c3f17c4ae3
3
{ "blob_id": "18ecf3b210530c8d1bf8f5d1f35038c3f17c4ae3", "branch_name": "refs/heads/master", "committer_date": 1479216186000, "content_id": "7a25eac592a8e5dc2105fc1498a14ecfe178293e", "detected_licenses": [ "Apache-2.0" ], "directory_id": "1913284f786f3242b64b624a9e5aa9a00e1061de", "extension": "py"...
2.703125
stackv2
import requests from Parser import Parser from Helpers import eprint import requests from furl import furl import sqlite3 # Should be bound to POFSession class class UserHistory(): def __init__(self, username): self.conn = sqlite3.connect("%s.db" % (username)) if self.conn is not None: ...
337
32.47
135
20
2,440
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_38fe101cd2bf07b3_91e4728d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 205 ]
[ null ]
[ 19 ]
[ 81 ]
2024-11-19T03:12:32.076827+00:00
1,489,120,380,000
dae89fbefa236f687ecad90d753dd2ed7139960a
3
{ "blob_id": "dae89fbefa236f687ecad90d753dd2ed7139960a", "branch_name": "refs/heads/master", "committer_date": 1489120380000, "content_id": "c6353f998b2aee9d4d313956ce3a1acee65c5f07", "detected_licenses": [ "Apache-2.0" ], "directory_id": "331475fe157aa85895ecdfd740e41ffece927e04", "extension": "py"...
2.546875
stackv2
# Ansible module that manages Outlyer plugins via the api try: import requests HAS_REQUESTS = True except ImportError: HAS_REQUESTS = False import json import base64 import hashlib def get_api_url(module, restype): ''' Takes ansible module object, and api resource type (agents, plugins, etc.) returns...
194
27.37
116
17
1,171
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_aba7a84a6ce1bbac_14b6e2b6", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (SHA1) that is insecure."...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (id)](1) is used in a hashing algorithm (SHA1) that is insecure." ]
[ 122 ]
[ null ]
[ 20 ]
[ 42 ]
2024-11-19T03:12:32.714132+00:00
1,466,657,600,000
fbc74a6d275e9b8f14eb7b2b2b6ef1df144dfbe4
3
{ "blob_id": "fbc74a6d275e9b8f14eb7b2b2b6ef1df144dfbe4", "branch_name": "refs/heads/master", "committer_date": 1466657600000, "content_id": "64aca864f1b30979a2fda1b3183e696e11997ee1", "detected_licenses": [ "MIT" ], "directory_id": "c063dfddd87cb750101216fb20d53913c819ea66", "extension": "py", "fi...
2.953125
stackv2
from flask import Flask from flask import abort from flask import redirect app = Flask(__name__) @app.route('/') def index(): return '<h1>Hello World!</h1>' #使用app.route修饰器,把修饰的函数注册为路由 #修饰器可以使用不同的方式修改函数的行为,惯常用法是使用修饰器把函数注册为事件的处理程序 @app.route('/user/<name>') def sayHello(name): if name == 'baidu': return redirect(...
22
20.18
44
11
150
python
[{"finding_id": "codeql_py/flask-debug_4051ddc71034e769_54f25bde", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 22, 19 ]
[ null, null ]
[ 2, 9 ]
[ 21, 33 ]
2024-11-19T03:12:42.634834+00:00
1,428,836,017,000
8bf7bf947c1675f27085c5d51758c1b1bac7d76b
3
{ "blob_id": "8bf7bf947c1675f27085c5d51758c1b1bac7d76b", "branch_name": "refs/heads/master", "committer_date": 1428836017000, "content_id": "6fb5fb2ede23aa52094d07a67a8ba7e5bb1dcd84", "detected_licenses": [ "MIT" ], "directory_id": "6a0e282ade623bae2d793b1a99928356a56e67e4", "extension": "py", "fi...
2.9375
stackv2
import re import hashlib import hmac import random from string import letters # # Cookies hashing # SECRET = 'fart' def make_cookie_hash(val): return '%s|%s' % (val, hmac.new(SECRET, val).hexdigest()) def check_cookie_hash(secure_val): val = secure_val.split('|')[0] if secure_val == make_cookie_hash(...
63
17.17
66
12
304
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_952b00764bfcd436_8d35f84c", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 36 ]
[ null ]
[ 24 ]
[ 40 ]
2024-11-19T03:12:51.756939+00:00
1,595,969,780,000
b3896d3a740c0454d2ded689057fa5d7d4914cea
4
{ "blob_id": "b3896d3a740c0454d2ded689057fa5d7d4914cea", "branch_name": "refs/heads/master", "committer_date": 1595969780000, "content_id": "c7d58c3a526d9b0610f2637ca81ee90b8e38be19", "detected_licenses": [ "MIT" ], "directory_id": "d7bf2d5fe88643b4c30c7e38d8f041b6cbcd00ae", "extension": "py", "fi...
3.53125
stackv2
n = int(input().strip()) phone_book = {} for i in range(n): name = input().strip() phone_number = input().strip() phone_book[name] = phone_number queried_name = input().strip() while queried_name != '': found_phone_number = phone_book.get(queried_name) if found_phone_number is None: print(...
16
26.06
54
13
105
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_901fae685caac7f1_d824e190", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 15 ]
[ null ]
[ 15 ]
[ 54 ]
2024-11-19T03:25:19.791468+00:00
1,446,675,874,000
c8e6bbb3de18fb06e0a8fc682692b85422ea0da2
3
{ "blob_id": "c8e6bbb3de18fb06e0a8fc682692b85422ea0da2", "branch_name": "refs/heads/master", "committer_date": 1446675874000, "content_id": "7b2d83dead9b1351e953ec8e6f2f9352c783fa24", "detected_licenses": [ "MIT" ], "directory_id": "e3c85acda8a143b9194539e754a1f71d4029b135", "extension": "py", "fi...
2.640625
stackv2
#!/usr/bin/env python3 import hashlib import getpass import os import base64 home = os.getenv('HOME') seed_path = home + '/.passthe.py.seed' site = input('Site: ').encode('utf-8') password = getpass.getpass().encode('utf-8') with open(seed_path, 'r') as file: seed = file.read().encode('utf-8') new_password = h...
20
21.8
75
10
146
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_eba61c2630633dcb_f689cad8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 20 ]
[ null ]
[ 7 ]
[ 13 ]
2024-11-19T03:25:24.063858+00:00
1,614,396,966,000
1711895f4a54c4be21627f0c925d99fa78d92f88
3
{ "blob_id": "1711895f4a54c4be21627f0c925d99fa78d92f88", "branch_name": "refs/heads/master", "committer_date": 1614396966000, "content_id": "2410229cc4cc4816398cd7ec84fa077cb3bbec33", "detected_licenses": [ "MIT" ], "directory_id": "22eaeeb39e48a23ddc55af1418c80b47536f2a7b", "extension": "py", "fi...
2.5625
stackv2
import os import requests from dotenv import load_dotenv from urllib.parse import urlencode, quote_plus load_dotenv() username = os.getenv('GOSMS_USER', 'username') password = os.getenv('GOSMS_PASS', 'password') base_url = 'http://gosms.xyz/api/v1/sendSms?' with open('file.txt', mode='r') as file: for line in fi...
33
27.79
61
15
230
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_2f85517c59a2b63f_295b2b1b", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 30, 27, 32 ]
[ null, null, null ]
[ 25, 15, 15 ]
[ 54, 26, 21 ]
2024-11-19T03:35:43.324837+00:00
1,603,984,549,000
c90d44b553fd7c830ea543154fa6f08f742eb557
2
{ "blob_id": "c90d44b553fd7c830ea543154fa6f08f742eb557", "branch_name": "refs/heads/master", "committer_date": 1603984549000, "content_id": "f5d16587a0871b6dd8383ec144c16d690ccbb257", "detected_licenses": [ "MIT" ], "directory_id": "1bdc76b33f2905eb5a4fde5c1db644a8f50a2ea8", "extension": "py", "fi...
2.4375
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- import argparse import importlib_resources as _resources import pangu from jinja2 import FileSystemLoader, Environment def to_html(data, template_filename, fp): # Template with Jinja2 with _resources.path("crawler_book_info", "templates") as _path: templat...
34
29.18
68
11
221
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_5ddd41b63e2d2252_091071df", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 14 ]
[ null ]
[ 15 ]
[ 41 ]
2024-11-19T03:35:54.387026+00:00
1,597,682,743,000
fc184c3f92c71af9dd0a64f272145b934cbbcc5b
3
{ "blob_id": "fc184c3f92c71af9dd0a64f272145b934cbbcc5b", "branch_name": "refs/heads/master", "committer_date": 1597682743000, "content_id": "ff731101d5eef4a5e496df605b1704d00d974fde", "detected_licenses": [ "MIT" ], "directory_id": "e6cb448a520d17a7c4c5a43f5df0885e4c2aae7e", "extension": "py", "fi...
2.734375
stackv2
#!/usr/bin/env python # -*- coding:utf-8 -*- """ @author: muketong @file: __init__.py @time: 2020-08-15 """ import sys import re import gettext import click import logging import prettytable as pt from . import config from .utils import colorize from .source import MangaSource gettext.install("manga-dl", "locale") ...
147
25.22
84
17
1,086
python
[{"finding_id": "codeql_py/redos_d250a81a6a51ec0a_6f7b23c3", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '9-' and containing many repetitio...
3
true
[ "CWE-1333", "CWE-1333", "CWE-1333" ]
[ "py/redos", "py/redos", "py/redos" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '9-' and containing many repetitions of '999-'.", "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '9'.", "This part of the regular expression may cau...
[ 48, 48, 48 ]
[ null, null, null ]
[ 34, 40, 45 ]
[ 37, 43, 48 ]
2024-11-19T01:28:50.325198+00:00
1,632,086,099,000
bee82ffa36c2dcb545055e4edf240429f87d11a8
2
{ "blob_id": "bee82ffa36c2dcb545055e4edf240429f87d11a8", "branch_name": "refs/heads/master", "committer_date": 1632086099000, "content_id": "050d04ad2dbdf3f36cfb58e4ac59aeee6e1e6890", "detected_licenses": [ "MIT" ], "directory_id": "b8969a77fee4807e4ae54e5233c25c4dfd43b260", "extension": "py", "fi...
2.390625
stackv2
#!/usr/bin/env python from __future__ import print_function import os import sys import subprocess import argparse from settings import PORT, HOST try: from SocketServer import ThreadingMixIn from BaseHTTPServer import HTTPServer, BaseHTTPRequestHandler except ImportError: from socketserver import Thread...
71
34.68
103
18
509
python
[{"finding_id": "codeql_py/command-line-injection_e92602fd4ef08569_9893e2b5", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {...
2
true
[ "CWE-078", "CWE-022" ]
[ "py/command-line-injection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This command line depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 36, 49 ]
[ null, null ]
[ 21, 26 ]
[ 28, 61 ]
2024-11-19T01:28:53.796053+00:00
1,528,467,142,000
8ff3be0e99c05489491c9026413bb93db5428a09
3
{ "blob_id": "8ff3be0e99c05489491c9026413bb93db5428a09", "branch_name": "refs/heads/master", "committer_date": 1528467142000, "content_id": "13c0bb24aab0dc7cb25f0be41565abc52c44ae37", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "37bdf24b81f11b5e8269bb045f34db9d70f6de21", "extension": "p...
2.703125
stackv2
from flask import Flask, request from flask_sqlalchemy import SQLAlchemy from raven.contrib.flask import Sentry import os import requests from datetime import datetime from pytz import timezone from urllib import parse db_url = os.environ['DB_URL'] bot_token = os.environ['BOT_TOKEN'] date_key = 'date' meal_key = 'typ...
95
32.03
150
20
791
python
[{"finding_id": "codeql_py/partial-ssrf_e1f63cdb49eea1b7_fad57a11", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 76 ]
[ null ]
[ 5 ]
[ 115 ]
2024-11-19T01:29:03.149188+00:00
1,678,956,400,000
9321fbebf0283f6025867bf30dda7708b9560fa5
2
{ "blob_id": "9321fbebf0283f6025867bf30dda7708b9560fa5", "branch_name": "refs/heads/master", "committer_date": 1678956400000, "content_id": "37934db268bf0333caf748b98aed506404cbc3a9", "detected_licenses": [ "Apache-2.0" ], "directory_id": "9eac9f8e7495d916f7596c4444461521b1a39086", "extension": "py"...
2.453125
stackv2
#!/bin/env/user python import jinja2 import yaml import os, sys def extractFormat(infile): format = str.upper(str.rsplit(os.path.basename(infile),".")[1]) return format def createCSVfile(input_files_list): o = open('csvfile', 'w') o.write('filepath\tformat\n') for f in input_files_list: ...
75
23.88
112
14
465
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_bc8f64a6c7047af5_450ea471", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 56 ]
[ null ]
[ 16 ]
[ 113 ]
2024-11-19T01:29:06.709584+00:00
1,592,154,233,000
14ed0eda1074034e5c57e401501e0e3a06d4cfa3
3
{ "blob_id": "14ed0eda1074034e5c57e401501e0e3a06d4cfa3", "branch_name": "refs/heads/master", "committer_date": 1592154233000, "content_id": "71b5670cf3ced817f935a65b71eec9b05a8a3199", "detected_licenses": [ "MIT" ], "directory_id": "353f30d5043aa4bf6744ab58447192eeaf0af4b0", "extension": "py", "fi...
2.515625
stackv2
import re import numpy as np #import pgnEval import settings import os import sys def output(moveEval, username, fileName, path): # Create arrays and counters names = [] values = [] PGN = [] count = 0 PGNCount = 0 i = 0 dateInsert = 0 dateNumber = 0 evalCount = 0 nameCounter...
163
31.8
125
18
1,394
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_d618e7c2bf9dada2_498eda13", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [https://lichess.org/](1) may be at an arbitrary positi...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [https://lichess.org/](1) may be at an arbitrary position in the sanitized URL." ]
[ 67 ]
[ null ]
[ 12 ]
[ 39 ]
2024-11-19T01:29:07.310716+00:00
1,587,645,358,000
ab9c69353dc72e1d03de8ffa67f874636b7bc77e
3
{ "blob_id": "ab9c69353dc72e1d03de8ffa67f874636b7bc77e", "branch_name": "refs/heads/master", "committer_date": 1587645358000, "content_id": "b612b376c9341dfe18571c00dc3c6db3a9a23773", "detected_licenses": [ "MIT" ], "directory_id": "cb795495d7cb7e053c51236279bdfedf3e4b7a37", "extension": "py", "fi...
3.390625
stackv2
# Importing required Libraries import requests from bs4 import BeautifulSoup import pandas as pd import string # Url of the website base_url = 'https://babynames.extraprepare.com/' for gender in ['boy','girl']: print(f"Scrapping Indian {gender}s Names") for initial in string.ascii_lowercase: # To mak...
47
37.6
99
26
337
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f0188fd96be72bb0_a2c81257", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 11 ]
[ null ]
[ 11 ]
[ 46 ]
2024-11-19T01:29:11.871903+00:00
1,623,888,169,000
d5aa356cdb61e0681cf1b11e72aa516db3bbb519
2
{ "blob_id": "d5aa356cdb61e0681cf1b11e72aa516db3bbb519", "branch_name": "refs/heads/master", "committer_date": 1623888169000, "content_id": "e4a1d65ca8a6778e7c1e51757dbbcde12e38ef10", "detected_licenses": [ "MIT" ], "directory_id": "598cf86dbda2f36e3d5aea9990f0f161b5af7301", "extension": "py", "fi...
2.40625
stackv2
from flask import Flask, jsonify from flask_restful import Api from ast import literal_eval from common_functions import common from modify_db import New_Entry import os app = Flask(__name__) api = Api(app) class DELETE(): # USED TO DELETE PERSONAL TEXT NOTE FOR A USER. @app.route("/note/<UserID>/<topic>", m...
60
41.08
101
19
627
python
[{"finding_id": "codeql_py/flask-debug_b9ea9796a72fe7db_28cde915", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-022", "CWE-022" ]
[ "py/flask-debug", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2).", "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided va...
[ 60, 30, 53 ]
[ null, null, null ]
[ 5, 24, 24 ]
[ 40, 83, 100 ]
2024-11-19T01:29:30.319722+00:00
1,412,614,664,000
2c8c179b247ad18a451c2a0b8edf1ad63f44dee9
2
{ "blob_id": "2c8c179b247ad18a451c2a0b8edf1ad63f44dee9", "branch_name": "refs/heads/master", "committer_date": 1412614664000, "content_id": "8ae20a30ff606ca1f3db263ee58fdce6135c0e8d", "detected_licenses": [ "MIT" ], "directory_id": "f7624618f1aa47735d87bbe4e20bb4c7646060a2", "extension": "py", "fi...
2.453125
stackv2
#!/usr/bin/env python # -*- vim set ft=python # # @author kchr from PIL import Image as pil, ImageOps as pilops import jinja2 import argparse import os import glob import shutil import time import sys parser = argparse.ArgumentParser() parser.add_argument('-f', '--force', action="store_true", ...
184
27.79
79
15
1,353
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_6a02576cdc34b6fe_e3b12c81", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 35 ]
[ null ]
[ 7 ]
[ 72 ]
2024-11-19T01:29:34.671030+00:00
1,498,729,776,000
0af3bd1a83b5f8f1d21356d15841a73d976dbc84
3
{ "blob_id": "0af3bd1a83b5f8f1d21356d15841a73d976dbc84", "branch_name": "refs/heads/master", "committer_date": 1498729776000, "content_id": "de96a225620ea959d77e62362b48df5847282db6", "detected_licenses": [ "MIT" ], "directory_id": "fcde00de3e324925f275eea24248e4e468494454", "extension": "py", "fi...
2.734375
stackv2
""" 스크립트 구동 방법 $ export FLASK_APP=urban_sound_classifier.py $ flask run ... Running on http://127.0.0.1:5000 """ import numpy as np import tensorflow as tf import librosa from flask import Flask, request import os def extract_feature(file_name): X, sample_rate = librosa.load(file_name) stft = np.abs(libr...
88
31.19
102
15
929
python
[{"finding_id": "codeql_py/path-injection_2d0d1b54675f2875_4cb50ff2", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 80 ]
[ null ]
[ 15 ]
[ 25 ]
2024-11-19T01:29:48.563581+00:00
1,557,234,373,000
f2054636c48c082ea2a075ca37fcc65c04e08103
2
{ "blob_id": "f2054636c48c082ea2a075ca37fcc65c04e08103", "branch_name": "refs/heads/master", "committer_date": 1557234373000, "content_id": "be8a81c6f663c790b461c4ee537bd6aae5d44580", "detected_licenses": [ "MIT" ], "directory_id": "262cf46504a60bacbeee23d3e4d433f2984b82d3", "extension": "py", "fi...
2.375
stackv2
import os import sys import uuid from flask import render_template, redirect, url_for, flash, \ request, jsonify, send_from_directory from werkzeug.utils import secure_filename from app import app from app.forms import UploadPhotoForm from app.utils.ocr import extract_text @app.route('/', methods=['GET', 'POST']...
63
27.95
75
18
410
python
[{"finding_id": "codeql_py/path-injection_e905e146652e28b1_52f4cf04", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 38, 39 ]
[ null, null ]
[ 23, 19 ]
[ 31, 27 ]
2024-11-19T01:29:58.184460+00:00
1,570,946,802,000
9e72115b683566c1c4e2cb63c38d84a59bc23d6b
2
{ "blob_id": "9e72115b683566c1c4e2cb63c38d84a59bc23d6b", "branch_name": "refs/heads/master", "committer_date": 1570946802000, "content_id": "0120043339fc529ec7fbd68697437e6064cc51b4", "detected_licenses": [ "MIT" ], "directory_id": "c3fef4cac557d2f0977b4c481b0475036c7a3d09", "extension": "py", "fi...
2.40625
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- """ MIT License Copyright (c) 2017 Maxim Krivich Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation t...
278
30.88
82
24
2,050
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_47895d832c53d5f9_525763a3", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA3256) that is i...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA3256) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 265 ]
[ null ]
[ 22 ]
[ 28 ]
2024-11-19T01:30:07.031801+00:00
1,493,219,542,000
bb3365f5f4977b71f97729a3b31766947a2e250d
2
{ "blob_id": "bb3365f5f4977b71f97729a3b31766947a2e250d", "branch_name": "refs/heads/master", "committer_date": 1493219542000, "content_id": "a87dbb21c9b817b463537ebbcf73cd6eebd6cfb6", "detected_licenses": [ "Apache-2.0" ], "directory_id": "a3c9d55ec9a513352e6b71e01af33305b0e33bc1", "extension": "py"...
2.359375
stackv2
import http.client import json import http.server import socketserver # Copyright [2017] [Jorge Arroyo Blanco] # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/license...
430
22.53
100
16
3,049
python
[{"finding_id": "codeql_py/partial-ssrf_7bcc6e9e406f10c3_65d7e38a", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depen...
3
true
[ "CWE-918", "CWE-918", "CWE-918" ]
[ "py/partial-ssrf", "py/partial-ssrf", "py/partial-ssrf" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depends on a [user-provided value](2).", "Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depends on a [user-provided value](2).", "Part of the URL of ...
[ 30, 39, 48 ]
[ null, null, null ]
[ 3, 3, 3 ]
[ 65, 68, 69 ]
2024-11-19T01:30:28.188099+00:00
1,593,190,089,000
77d065466347718ca83cb05211fde20f59b319dd
3
{ "blob_id": "77d065466347718ca83cb05211fde20f59b319dd", "branch_name": "refs/heads/master", "committer_date": 1593190089000, "content_id": "66bed673804a669e3d3edada0eae3e6b5972ec2f", "detected_licenses": [ "MIT" ], "directory_id": "b33db98ca608a4a72a0ec1f435eb75817c36a204", "extension": "py", "fi...
2.734375
stackv2
# -*- coding: utf-8 -*- """ Created on Fri Jun 26 10:55:19 2020 @author: Soumitra """ from bson import json_util import json import pprint from pymongo import MongoClient #python module MongoDb url = 'mongodb://localhost:27017/' #url for connecting to mongo server client = MongoClient(url) db ...
90
28.41
116
16
687
python
[{"finding_id": "codeql_py/flask-debug_5d67ed501c88aa1e_71122662", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
5
true
[ "CWE-215", "CWE-079", "CWE-079", "CWE-079", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a ...
[ 89, 57, 69, 76, 84 ]
[ null, null, null, null, null ]
[ 5, 16, 11, 16, 16 ]
[ 26, 63, 73, 76, 76 ]
2024-11-19T01:30:38.502554+00:00
1,582,231,414,000
c8cfa2ea223b015227c05ed3285717c02c527acf
2
{ "blob_id": "c8cfa2ea223b015227c05ed3285717c02c527acf", "branch_name": "refs/heads/master", "committer_date": 1582231414000, "content_id": "443c60765cf85c2802cd9e2fd5a85953216df923", "detected_licenses": [ "MIT" ], "directory_id": "0353024b9682164dba10ee49495b6a9a97312555", "extension": "py", "fi...
2.4375
stackv2
import os from jinja2 import Template from session import existRecord, path from db import getUser def checkLogin(u, p): res = getUser(u, p) print (res) return res # def check(rec): # r = rec.split(',') # return (r[0].strip() == u) and (p == r[1].strip()) # res, rec = existRecord(os...
22
30.91
73
12
193
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_14e9198f83fcbb85_1659fb90", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 21 ]
[ null ]
[ 20 ]
[ 34 ]
2024-11-19T01:43:03.152397+00:00
1,604,066,694,000
05baac5e1eb803ee98621e2122f69b009bd431fa
3
{ "blob_id": "05baac5e1eb803ee98621e2122f69b009bd431fa", "branch_name": "refs/heads/main", "committer_date": 1604066694000, "content_id": "1b90caf360416eab53dd7b5a62a9b041e59887c9", "detected_licenses": [ "MIT" ], "directory_id": "a3a0dcc9c9627f37b8dd7219a055a5d8a76b0d83", "extension": "py", "file...
2.625
stackv2
import aiohttp import asyncio import argparse async def get(url): try: async with aiohttp.ClientSession() as session: async with session.get(url=url) as response: resp = await response.read() except Exception as e: raise e async def post(url, user_input): data...
55
36.09
108
16
502
python
[{"finding_id": "codeql_py/request-without-cert-validation_63bacd39287e8c3a_5649810c", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 19 ]
[ null ]
[ 24 ]
[ 67 ]
2024-11-19T01:54:47.221809+00:00
1,470,262,592,000
f9756624e5a9bd3ad547d688a63cadc06efc66c6
2
{ "blob_id": "f9756624e5a9bd3ad547d688a63cadc06efc66c6", "branch_name": "refs/heads/master", "committer_date": 1470262592000, "content_id": "b831ba804110a318102d4c09c05c568c40a4caf8", "detected_licenses": [ "MIT" ], "directory_id": "1f6453533176993eb0061dcc1b35c993dce6c10c", "extension": "py", "fi...
2.328125
stackv2
""" pgoapi - Pokemon Go API Copyright (c) 2016 tjado <https://github.com/tejado> Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use...
93
33.89
132
15
875
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_903267add84b2af9_3cbb7feb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 64, 64 ]
[ null, null ]
[ 67, 81 ]
[ 79, 94 ]
2024-11-19T01:55:00.695344+00:00
1,675,672,889,000
0e95ce8915124af73f9247af780c2fa386550d83
2
{ "blob_id": "0e95ce8915124af73f9247af780c2fa386550d83", "branch_name": "refs/heads/main", "committer_date": 1675672889000, "content_id": "edc4d5c8506f9f6bd4d676a23beb36f8327bcaba", "detected_licenses": [ "Apache-2.0" ], "directory_id": "7e10785944ddad6aabe6f36a9a72ddfed578542e", "extension": "py", ...
2.375
stackv2
import os import click from bioblend import galaxy from parsec.cli import pass_context from parsec import config from parsec.io import warn, info CONFIG_TEMPLATE = """## Parsec Global Configuration File. # Each stanza should contian a single galaxy server to control. # # You can set the key __default to the name of ...
97
34.7
117
17
794
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_1a8b3cb5ece859cb_eee7eea1", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text." ]
[ 93 ]
[ 96 ]
[ 13 ]
[ 14 ]
2024-11-19T01:55:09.628132+00:00
1,574,185,549,000
02f183642f7f4d43174f3187400b62d3f620ec7a
2
{ "blob_id": "02f183642f7f4d43174f3187400b62d3f620ec7a", "branch_name": "refs/heads/master", "committer_date": 1574185549000, "content_id": "61548d2496a49460fc1f47369b9adc4b9481988d", "detected_licenses": [ "MIT" ], "directory_id": "46edad33f48b5c3fe445e06be298eed098afa0d8", "extension": "py", "fi...
2.484375
stackv2
# -*- coding: utf-8 -*- import os import shutil import re import subprocess import tempfile from git import Repo import requests # disable ssl warnings. BAD PRACTICE. import urllib3 urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning) """Main module.""" def migrate_repo(url, target_base_url, targe...
154
34.83
120
16
1,399
python
[{"finding_id": "codeql_py/request-without-cert-validation_bac7f8c5826e5740_1d73cd6d", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
6
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 75, 91, 98, 108, 142, 149 ]
[ null, null, null, null, null, null ]
[ 16, 22, 12, 16, 12, 12 ]
[ 119, 112, 118, 121, 92, 102 ]
2024-11-19T01:55:10.040503+00:00
1,455,748,221,000
6185f2f52f66ff219b21f110adeab6a0c336d290
3
{ "blob_id": "6185f2f52f66ff219b21f110adeab6a0c336d290", "branch_name": "refs/heads/master", "committer_date": 1455748221000, "content_id": "606d2658788a4daf3cdb56fe48c18042a313ff04", "detected_licenses": [ "MIT" ], "directory_id": "112e9d2fb78af3f84d98e81c1cb17771c8fc0a1c", "extension": "py", "fi...
2.953125
stackv2
"""HTTP Server for rjpres This module builds on SimpleHTTPServer by adding extra functionality to deal with serving files from two directory trees (the user's dir and a static data dir), dynamically providing wrapper pages, and processing Markdown files that perhaps weren't orginally designed for presentation with R...
302
36.92
100
18
2,493
python
[{"finding_id": "codeql_py/http-response-splitting_2f872cc178891712_fcec9fe5", "tool_name": "codeql", "rule_id": "py/http-response-splitting", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This HTTP header is constructed from a [user-provided value](1).\nThis HTTP header is con...
1
true
[ "CWE-113" ]
[ "py/http-response-splitting" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This HTTP header is constructed from a [user-provided value](1).\nThis HTTP header is constructed from a [user-provided value](2).\nThis HTTP header is constructed from a [user-provided value](3)." ]
[ 133 ]
[ null ]
[ 46 ]
[ 61 ]
2024-11-19T01:55:21.672082+00:00
1,596,598,787,000
f3e884fda105407f7fe4713b5f555ecbcfbaeead
4
{ "blob_id": "f3e884fda105407f7fe4713b5f555ecbcfbaeead", "branch_name": "refs/heads/master", "committer_date": 1596598787000, "content_id": "c48e5baf79f9a8d961fb735ebb922146a709f709", "detected_licenses": [ "MIT" ], "directory_id": "c3706bcb3c8392b3cdead2303af9b8c1fb3fb7e5", "extension": "py", "fi...
3.6875
stackv2
import requests, sys, string from string import ascii_lowercase, digits # Pseudo-code: # 1) Loop through the list of ascii_lowercase and digits, # 2) For each character, send a request and get the elapsed time for the response # 3) Take the character that has that highest elapsed time and double check by going through...
140
34.93
117
16
1,184
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_16363e55b38386bc_63d9089d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
4
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (p...
[ 67, 131, 134, 136 ]
[ null, null, null, null ]
[ 19, 37, 37, 30 ]
[ 72, 45, 45, 38 ]
2024-11-19T02:06:55.026881+00:00
1,560,905,968,000
84441ebfc9b18978a7955d86b3691375f2cd1989
2
{ "blob_id": "84441ebfc9b18978a7955d86b3691375f2cd1989", "branch_name": "refs/heads/master", "committer_date": 1560905968000, "content_id": "1899fcef172d0ac7d50a02841205a1ff0c5c618a", "detected_licenses": [ "MIT" ], "directory_id": "1f55e68c97dd69369273ba5117b10bea059cd008", "extension": "py", "fi...
2.453125
stackv2
from flask import Flask,render_template,request import mysql.connector import time import redis import hashlib import pickle import random app = Flask(__name__) config = { 'host':'demoquakes.mysql.database.azure.com', 'user':'quakes@demoquakes', 'password':'Earth_quake', 'database':'equakes' } @app.route(...
127
29.44
140
19
916
python
[{"finding_id": "codeql_py/sql-injection_23759708a50f8e45_4a4edc78", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown...
1
true
[ "CWE-089" ]
[ "py/sql-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This SQL query depends on a [user-provided value](1)." ]
[ 118 ]
[ null ]
[ 24 ]
[ 29 ]
2024-11-19T02:06:59.160534+00:00
1,625,657,027,000
f03458e85f7c0b4ad9105423a606a4e08725995d
3
{ "blob_id": "f03458e85f7c0b4ad9105423a606a4e08725995d", "branch_name": "refs/heads/main", "committer_date": 1625657027000, "content_id": "c3bfedc0479b8a9e0ca97f10a4c7aa545ee83df6", "detected_licenses": [ "MIT" ], "directory_id": "a33b146e03776c041ff89c24e231650fa0a88e52", "extension": "py", "file...
2.71875
stackv2
#!/usr/bin/env python # -*- coding: UTF-8 -*- # File: slack.py """Slack module file.""" import requests from jinja2 import Environment from notifierlib.notifierlib import Channel __author__ = '''Oriol Fabregas <fabregas.oriol@gmail.com>''' __docformat__ = 'plaintext' __date__ = '''20-09-2017''' class Authenticatio...
86
36.52
80
18
650
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_cd70d52d70deae85_b28e8fad", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 64 ]
[ null ]
[ 24 ]
[ 37 ]
2024-11-19T02:07:02.837320+00:00
1,537,977,803,000
1e33a611cfcf048759277f2e3b0b748df9fff143
3
{ "blob_id": "1e33a611cfcf048759277f2e3b0b748df9fff143", "branch_name": "refs/heads/master", "committer_date": 1537977803000, "content_id": "135c8516ddc750dc03060a245c74b508397e42ac", "detected_licenses": [ "MIT" ], "directory_id": "03c54b2554cb76ea63770b3d208c4102b65d02d6", "extension": "py", "fi...
2.59375
stackv2
#!/usr/bin/env python """ US-Analytics RPD Merge Script This script allows merges RPD files automatically. The variables at the top of this script must be updated. The Git repository must include the .gitattributes file with the below body: *.rpd merge=usa-obiee Add the below content to the .gitconfig file (use '...
120
29.44
166
17
954
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_e212d07e4043d3a3_080839be", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text." ]
[ 39 ]
[ null ]
[ 11 ]
[ 19 ]
2024-11-19T02:07:11.893592+00:00
1,598,662,845,000
789cdf3dec54bdfbe64407f608e14b9d4f6e26f7
3
{ "blob_id": "789cdf3dec54bdfbe64407f608e14b9d4f6e26f7", "branch_name": "refs/heads/master", "committer_date": 1598662845000, "content_id": "674f72fef28113139a4263d167965bb500591c5e", "detected_licenses": [ "MIT" ], "directory_id": "6212f46db6202e20fb499e19816d0c9d97ed1383", "extension": "py", "fi...
3.40625
stackv2
import re import pandas as pd def find_url(text): '''Finds URLS embedded in a text and extracts them as a list Parameters ---------- str: text Returns ------- urls: list Returns a list of all URLS embedded in a text ''' urls = [] ...
79
18.51
111
11
373
python
[{"finding_id": "codeql_py/overly-large-range_d37ed01a38f400ee_4e420dc0", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 22 ]
[ null ]
[ 55 ]
[ 58 ]
2024-11-19T02:07:16.575542+00:00
1,678,744,463,000
4e1d0ef28a26b480ac1cbd01379d3825f09c77af
3
{ "blob_id": "4e1d0ef28a26b480ac1cbd01379d3825f09c77af", "branch_name": "refs/heads/master", "committer_date": 1678744463000, "content_id": "52e37dc2b1145cb8599a3b876079a11d50e88b57", "detected_licenses": [ "MIT" ], "directory_id": "7dfc28944db71d80bd04c6597363591aa08c6687", "extension": "py", "fi...
3.21875
stackv2
import os import sys import math import tarfile class DataManager: def __init__(self, dataset_path): self.dataset_path = dataset_path def extract_dataset(self, compressed_dataset_file_name, dataset_directory): try: # extract files to dataset folder tar = tarfile.open(c...
91
36.51
109
16
806
python
[{"finding_id": "codeql_py/tarslip_b917852a9daaded9_4ac68417", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 15 ]
[ null ]
[ 13 ]
[ 16 ]
2024-11-19T02:07:17.450830+00:00
1,562,356,942,000
aafdae7e28b9c45b9698d60c02fd23e7e6305a84
3
{ "blob_id": "aafdae7e28b9c45b9698d60c02fd23e7e6305a84", "branch_name": "refs/heads/master", "committer_date": 1562356942000, "content_id": "c98e1ff44b2cc283828675b4f7496d3f648bc17c", "detected_licenses": [ "MIT" ], "directory_id": "0a9cf96fda202102bc009593d8dd4153e8fb8190", "extension": "py", "fi...
2.65625
stackv2
"""### Creado por William Rodriguez Ingeniero Electronico WISROVI ###""" import os os.system("git clone https://github.com/DTIC2019/HorariosEjecucionNurcallApp") from HorariosEjecucionNurcallApp.HorariosProcesos import * import requests import json import os.path as path import pandas as pd import sched, time im...
384
32.97
143
19
3,548
python
[{"finding_id": "codeql_py/request-without-cert-validation_4e78ba64148dc5fb_860d34d4", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 84, 100 ]
[ 87, 103 ]
[ 15, 15 ]
[ 23, 23 ]
2024-11-19T02:07:20.326176+00:00
1,488,315,450,000
aa0ca6fda85932a28cf3c33d626bc7effcc21f5b
2
{ "blob_id": "aa0ca6fda85932a28cf3c33d626bc7effcc21f5b", "branch_name": "refs/heads/master", "committer_date": 1488358428000, "content_id": "340ba06bba3ed9fd01e6bc71922be12e4a917c44", "detected_licenses": [ "MIT" ], "directory_id": "113cb2b0cc09f88d6397ebb4121cfb2aceb05912", "extension": "py", "fi...
2.4375
stackv2
import json import twitter from django.conf import settings from django.shortcuts import render from django.http import HttpResponse from .models import Tweet from .lib import process_tweet # VIEW: / # Main tweeting app entry point def index(response): """ Simple renders the index.html, we get tweet informat...
90
31.79
80
15
635
python
[{"finding_id": "codeql_py/stack-trace-exposure_847134da97a84753_0b1ba19e", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 88 ]
[ null ]
[ 13 ]
[ 29 ]
2024-11-19T02:07:24.970776+00:00
1,603,796,734,000
eb96907b89ffcc0fceed9e05b041158aed848f28
2
{ "blob_id": "eb96907b89ffcc0fceed9e05b041158aed848f28", "branch_name": "refs/heads/master", "committer_date": 1603796734000, "content_id": "35453712a6d391fe2a66fca189864106ca23d64b", "detected_licenses": [ "MIT" ], "directory_id": "332a0289a572c2d68f145d867a28013f02a0c4e1", "extension": "py", "fi...
2.34375
stackv2
import os from dotenv import load_dotenv from flask import Flask, request import requests import db_aps import fb_cache import fb_templates import moltin_aps app = Flask(__name__) load_dotenv() FACEBOOK_TOKEN = os.environ['PAGE_ACCESS_TOKEN'] DB = db_aps.get_database_connection() @app.route('/', methods=['GET'])...
153
31.61
109
16
1,192
python
[{"finding_id": "codeql_py/reflective-xss_d295e5799b27a371_7e47e43a", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 28 ]
[ null ]
[ 16 ]
[ 50 ]