added
stringlengths
32
32
created
int64
1,236B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.03
source
stringclasses
1 value
text
stringlengths
330
19.3k
num_lines
int64
16
648
avg_line_length
float64
15.5
59.3
max_line_length
int64
37
179
ast_depth
int64
8
38
length
int64
102
3.79k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.11k
276k
sast_codeql_findings_count
int64
1
33
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
33
rule_ids
listlengths
1
33
confidences
listlengths
1
33
severities
listlengths
1
33
messages
listlengths
1
33
line_starts
listlengths
1
33
line_ends
listlengths
1
33
column_starts
listlengths
1
33
column_ends
listlengths
1
33
2024-11-18T21:23:11.984249+00:00
1,624,548,033,000
b1d3f145909bb435a7d11b1a074a3567126410a1
3
{ "blob_id": "b1d3f145909bb435a7d11b1a074a3567126410a1", "branch_name": "refs/heads/master", "committer_date": 1624548033000, "content_id": "812336b01138646beff091248eb331771ef4b898", "detected_licenses": [ "Apache-2.0" ], "directory_id": "7d868cff4d733fd5160d1505febb912b0c559628", "extension": "py"...
3.109375
stackv2
import sys, getopt import os import random keys = dict() KEYS_FILE_NAME = "keys.txt" seed = "1234567890abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ" def load_keys(): """ 加载KEY列表 @return: """ if not os.path.exists(KEYS_FILE_NAME): return False with open(KEYS_FILE_NAME) as f: ...
108
19.17
79
13
615
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_597eed4b521626d4_14c846c8", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive data (secret)](2) as clear text." ]
[ 48 ]
[ null ]
[ 22 ]
[ 26 ]
2024-11-18T21:51:15.651273+00:00
1,610,729,791,000
4711fda446b004b3fccf80a8d562aa8ef34f3078
3
{ "blob_id": "4711fda446b004b3fccf80a8d562aa8ef34f3078", "branch_name": "refs/heads/main", "committer_date": 1610729791000, "content_id": "06ac0788cc6b56593d7a71d6a6b63f267b63b0de", "detected_licenses": [ "MIT" ], "directory_id": "e322e1fa9ad1ebd9bf97b3064c3b3126fddc0cad", "extension": "py", "file...
3.203125
stackv2
#!/usr/bin/env python3 from flask import * import math app = Flask(__name__) @app.route('/') def homepage(): s = 'power x y\nsqrt x' return s, 200 @app.route('/power') def power(): if request.method == 'POST': return 'Not supported', 401 x = request.args.get('x') y = request.args.get('...
45
19.76
54
15
269
python
[{"finding_id": "codeql_py/stack-trace-exposure_d6c33fd81ed251af_ede40727", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
3
true
[ "CWE-209", "CWE-209", "CWE-215" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure", "py/flask-debug" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger." ]
[ 28, 41, 45 ]
[ null, null, null ]
[ 16, 16, 5 ]
[ 46, 45, 24 ]
2024-11-18T21:51:21.588912+00:00
1,626,033,839,000
96e7471697b983f9b1d7f4b533db18e702b51f33
3
{ "blob_id": "96e7471697b983f9b1d7f4b533db18e702b51f33", "branch_name": "refs/heads/main", "committer_date": 1626033839000, "content_id": "92e74334d69e54ab39d502a98e9f25ee7a0111f9", "detected_licenses": [ "MIT" ], "directory_id": "7c8f62edc91547750bc1911b209e28f66383fa96", "extension": "py", "file...
3.078125
stackv2
from flask import Flask, flash, request, render_template, redirect, url_for import pandas as pd import os import json UPLOAD_FOLDER = os.sep + "static" + os.sep # Estamos apuntando a la carpeta static # Flask es una clase app = Flask(__name__) # Para decirle que estamos haciendo un archivo Flask # Aquí __name__ es s...
54
46.19
172
13
647
python
[{"finding_id": "codeql_py/flask-debug_8c386d7621ee94f3_137a14e0", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 50, 39 ]
[ null, 42 ]
[ 5, 16 ]
[ 69, 59 ]
2024-11-18T21:51:34.960123+00:00
1,574,617,900,000
1cebcbc7af64a141ea143e4509b6898792af2ec0
3
{ "blob_id": "1cebcbc7af64a141ea143e4509b6898792af2ec0", "branch_name": "refs/heads/master", "committer_date": 1574617900000, "content_id": "f08aa3f2cf4ac8e79eba0e7e4f66150d605902d3", "detected_licenses": [ "MIT" ], "directory_id": "2ffdb3cad1c58f44f2590c2446a833331c344867", "extension": "py", "fi...
2.640625
stackv2
import game import qrcode import socket import uuid import hashlib import pygame from pygame.locals import * import urllib.request import json import ssl import time import threading WINDOW_WIDTH = 400 WINDOW_HEIGHT = 600 WHITE = (255, 255, 255) BLACK = (0, 0, 0) FONT_SIZE = 30 startGame = game.main clientId = None c...
108
26.73
100
17
748
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_2514e7a312a90006_9909bdcc", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (private)](1) is used in a hashing algorithm (MD5) that is insecu...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (private)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 36 ]
[ null ]
[ 16 ]
[ 38 ]
2024-11-18T21:51:44.924193+00:00
1,633,529,889,000
509cb726cc322a43f05815c353593a800ce2aa22
4
{ "blob_id": "509cb726cc322a43f05815c353593a800ce2aa22", "branch_name": "refs/heads/master", "committer_date": 1633529889000, "content_id": "1eb432485140913b8a2da0103aa71d4c864bbb6c", "detected_licenses": [ "MIT" ], "directory_id": "f8343a8525aae60cc4e470920d6fcad78440b4ee", "extension": "py", "fi...
3.90625
stackv2
import string import random if __name__ == "__main__": Password_Length = int(input("Enter password length")) ''' random.choices(sequence, weights=None, cum_weights=None, k=1) sequence : Required. A sequence like a list, a tuple, a range of numbers etc. weights : Optional. A list were you can w...
22
35.05
116
13
179
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d4ceff32c2245bea_f6a82ea2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 22 ]
[ null ]
[ 11 ]
[ 19 ]
2024-11-18T21:51:59.748806+00:00
1,469,961,307,000
46e281a8b2b27fad15c6fdedd5381fe130523812
3
{ "blob_id": "46e281a8b2b27fad15c6fdedd5381fe130523812", "branch_name": "refs/heads/master", "committer_date": 1469961307000, "content_id": "fc82fac72e9fa9b62b6dfab1e2b803797e4fad84", "detected_licenses": [ "MIT" ], "directory_id": "1f63dcb28ed505552c7cbfa25b031a4502b212aa", "extension": "py", "fi...
2.546875
stackv2
#!/usr/bin/env python # - coding: utf-8 - # Copyright (C) 2014 Toms Bauģis <toms.baugis at gmail.com> import datetime as dt import logging import sqlite3 as sqlite import os from shutil import copy as copyfile class Storage(object): def __init__(self): self._con = None self.db_path = self.__init_...
121
31.71
104
18
855
python
[{"finding_id": "codeql_py/overly-permissive-file_a7c3d0ba1d33f30b_098f26de", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable." ]
[ 48 ]
[ null ]
[ 13 ]
[ 37 ]
2024-11-18T22:02:50.580168+00:00
1,591,796,810,000
81a4c79a600f3d4242d3c86838b716694b1ff828
3
{ "blob_id": "81a4c79a600f3d4242d3c86838b716694b1ff828", "branch_name": "refs/heads/master", "committer_date": 1591796810000, "content_id": "ad1a747a2505b12c94db05df1bdf524d96502c32", "detected_licenses": [ "Apache-2.0" ], "directory_id": "89c878102fa84dfb9d02ed6b7f79199b97035257", "extension": "py"...
2.90625
stackv2
# -*- coding:utf-8 -*- """ author chenrg flask 示例 """ from flask import Flask from flask import request, g, Response, make_response, render_template # 创建一个应用 app = Flask(__name__) # 定义接口路由 @app.route('/') def index(): return '<h1>Hello World!</h1>' # 动态路由 @app.route('/sayhello/<name>', methods=['GET']) def ...
58
19.16
71
12
349
python
[{"finding_id": "codeql_py/flask-debug_a50acd60a43a4465_2462d304", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 58, 25 ]
[ null, null ]
[ 5, 12 ]
[ 24, 38 ]
2024-11-18T22:16:44.175930+00:00
1,632,141,254,000
879e7e0c303ac96b7eadbcdb7546746113eeddef
2
{ "blob_id": "879e7e0c303ac96b7eadbcdb7546746113eeddef", "branch_name": "refs/heads/main", "committer_date": 1632141254000, "content_id": "15e009eab0d9f8ac06584fcdd616175115457c5b", "detected_licenses": [ "Apache-2.0" ], "directory_id": "39fbd5614434f331c9bf03401be7637e7eadafbe", "extension": "py", ...
2.5
stackv2
#!/usr/bin/python3 # Modules' importing import apt import subprocess import mysql.connector import wget import tarfile import shutil import os import yaml import sys #Conf file loading and reading function def read_conf(file): with open(file) as f: return yaml.load(f) # Cache updating function def update(cache)...
169
26.34
108
19
1,108
python
[{"finding_id": "codeql_py/tarslip_7b9c76e9e32edc9e_7dd0d59a", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 91 ]
[ null ]
[ 5 ]
[ 8 ]
2024-11-18T22:27:50.673692+00:00
1,436,076,934,000
bc35598c1345fdd8e4df34fccfbdd36e2d45ab67
3
{ "blob_id": "bc35598c1345fdd8e4df34fccfbdd36e2d45ab67", "branch_name": "refs/heads/master", "committer_date": 1436076954000, "content_id": "2238a5a878e19efef577020c496c20d3a8007fdf", "detected_licenses": [ "MIT" ], "directory_id": "f6faecd12fe267b41a611389ad295af67605b3e6", "extension": "py", "fi...
2.578125
stackv2
import asyncio import logging from stores import network_store, auth_store from network import Network from connection import Connection logger = logging.getLogger('bouncer') class BouncerServerClientProtocol(Connection): def __init__(self, get_network_handle): self.network = None self.username ...
149
36.08
78
18
1,082
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_64fef4a062c9b309_7a81979e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 44 ]
[ null ]
[ 25 ]
[ 38 ]
2024-11-18T22:27:51.446767+00:00
1,692,275,085,000
e9f6adb05b07380f51589db00fd862867e751a7d
3
{ "blob_id": "e9f6adb05b07380f51589db00fd862867e751a7d", "branch_name": "refs/heads/master", "committer_date": 1692275085000, "content_id": "e824f6aa8761d26f47beafda75856fbe40494557", "detected_licenses": [ "MIT" ], "directory_id": "f504253210cec1c4ec6c3ea50a45564db7d6cd7f", "extension": "py", "fi...
2.671875
stackv2
from __future__ import annotations import datetime import itertools import logging import re import typing logger = logging.getLogger(__name__) TIME_REGEX = re.compile( r"((?P<hours>\d+?)h)?((?P<minutes>\d+?)m)?" r"((?P<seconds>\d+?)s)?((?P<milliseconds>\d+?)ms)?" ) CASE_PATTERN = re.compile(r"(?<!^)(?=[A...
284
28.73
89
18
2,183
python
[{"finding_id": "codeql_py/overly-large-range_23d85e9cb8f1538f_6cd1ed54", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 238 ]
[ null ]
[ 47 ]
[ 50 ]
2024-11-18T22:27:52.952190+00:00
1,597,006,371,000
54bc351c3351645e0362f97f4f5c354f2a295eb2
3
{ "blob_id": "54bc351c3351645e0362f97f4f5c354f2a295eb2", "branch_name": "refs/heads/master", "committer_date": 1597006371000, "content_id": "c87563bb1349477c8eb4490d67b418ad314333d6", "detected_licenses": [ "Apache-2.0" ], "directory_id": "c9bc5d6f8dfdca5638cfaafc7cc645920f6ae06e", "extension": "py"...
2.640625
stackv2
import os import firebase as fb from flask import Flask, request, jsonify from flask_cors import CORS from model import Model from data import Data app = Flask(__name__) app.config["DEBUG"] = True CORS(app, resources={r"/*": {"origins": "*"}}) @app.route('/', methods=['GET']) def home(): return """ <!DOC...
106
34.25
100
16
921
python
[{"finding_id": "codeql_py/stack-trace-exposure_bf075502a0b6df18_db0816c9", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 80 ]
[ null ]
[ 24 ]
[ 95 ]
2024-11-18T22:27:55.820721+00:00
1,693,952,634,000
bd2d6becaa3e31d533f5f1da233ac5e785ea20bc
3
{ "blob_id": "bd2d6becaa3e31d533f5f1da233ac5e785ea20bc", "branch_name": "refs/heads/main", "committer_date": 1693952634000, "content_id": "1a299d1da6fcfdff2a038ae6bfc1b91b113ed935", "detected_licenses": [ "MIT" ], "directory_id": "25315b066fd9742d9c8c8be1d0dc70c2dc39a71a", "extension": "py", "file...
2.625
stackv2
import urllib import dateparser import requests from bs4 import BeautifulSoup from .amuselabsdownloader import AmuseLabsDownloader from ..util import XWordDLException class CrosswordClubDownloader(AmuseLabsDownloader): command = 'club' outlet = 'Crossword Club' outlet_prefix = 'Crossword Club' def ...
72
31.75
129
15
552
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_bf58b096a8d429a3_a4da9b3c", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [crosswordclub.com](1) may be at an arbitrary position ...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [crosswordclub.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 23 ]
[ null ]
[ 17 ]
[ 61 ]
2024-11-18T22:43:55.305096+00:00
1,459,794,438,000
bbd884e40b2d5c4587b4a127c5c392038b05e008
3
{ "blob_id": "bbd884e40b2d5c4587b4a127c5c392038b05e008", "branch_name": "refs/heads/master", "committer_date": 1459794438000, "content_id": "20dcfc4c83972034128f174ea41ee7cf87392fdf", "detected_licenses": [ "MIT" ], "directory_id": "9e45b75d611847fb18a34fc9193e9164375cf307", "extension": "py", "fi...
2.8125
stackv2
#BugMartiniAPI #Adam Knuckey October 2015 import urllib,urllib2 import re # Downloads a comic from the given link to a given destination # Destination must be a name ending in .png def download(link,destination): urllib.urlretrieve(link,destination) # Returns a permalink to today's comic def getTodays(): html = ur...
54
34.89
106
17
545
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_9ca5c7e8fb28c950_f668c93f", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'bugmartini.com/comic/', so it might...
1
true
[ "CWE-020" ]
[ "py/incomplete-hostname-regexp" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'bugmartini.com/comic/', so it might match more hosts than expected." ]
[ 29 ]
[ null ]
[ 22 ]
[ 66 ]
2024-11-18T22:44:21.117777+00:00
1,550,153,196,000
6425521c675d62d7e7c85cbd58ee0c94dda787df
3
{ "blob_id": "6425521c675d62d7e7c85cbd58ee0c94dda787df", "branch_name": "refs/heads/master", "committer_date": 1550153196000, "content_id": "f6dfd40ae264c6459588f2c48c360d7fce368286", "detected_licenses": [ "Apache-2.0", "MIT" ], "directory_id": "ede3ecc0f427fb63c3baf66aef86c9566392fafe", "exten...
3.34375
stackv2
import os class LockFile(object): """Provides methods to obtain, check for, and release a file based lock which should be used to handle concurrent access to the same file. As we are a utility class to be derived from, we only use protected methods. Locks will automatically be released on destructio...
72
32.81
133
15
552
python
[{"finding_id": "codeql_py/overly-permissive-file_84273d131d8ef3f1_7949d503", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world writable." ]
[ 67 ]
[ null ]
[ 17 ]
[ 36 ]
2024-11-18T22:44:22.540321+00:00
1,692,832,783,000
2db54c293728d4da063e7312206438631fd22c49
2
{ "blob_id": "2db54c293728d4da063e7312206438631fd22c49", "branch_name": "refs/heads/master", "committer_date": 1692832783000, "content_id": "fc2c4b3c2ea9f1cd2704c816dd07fa1394084fdd", "detected_licenses": [ "MIT" ], "directory_id": "6d2f83e7dade76eeb4f7abdd7286ba7a518a8bbc", "extension": "py", "fi...
2.34375
stackv2
#!/usr/bin/env python import time, requests, json, argparse from raspyrfm import * import sensors from sensors import rawsensor URL = 'https://emoncms.org/input/post.json' APIKEY = '123456789123456789' sensors = [ { "sensorId": '68', #ID of the sensor "minInterval": 30, #if new value received before <minInterva...
93
23.87
102
16
779
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_06887a81ad9a3eb9_4f72ed62", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 83 ]
[ null ]
[ 39 ]
[ 46 ]
2024-11-18T22:44:42.158542+00:00
1,487,000,102,000
844bf812fbfd318beae00abd4ff0b07fa224604b
3
{ "blob_id": "844bf812fbfd318beae00abd4ff0b07fa224604b", "branch_name": "refs/heads/master", "committer_date": 1487000102000, "content_id": "95138c89914017ba3049220226c14fe0ddd3196f", "detected_licenses": [ "Apache-2.0" ], "directory_id": "69f91a91f6be1558cb27fdb557005253841e1115", "extension": "py"...
2.515625
stackv2
############################################################################### ## ## Senze Crypto Library for My Senosr Server/Client v0.01 ## @Copyright 2014 MySensors Research Project ## SCoRe Lab (www.scorelab.org) ## University of Colombo School of Computing ## ## Licensed under the Apache License, Version 2....
268
29.12
101
17
2,077
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_00dad0136bd07386_ad613d17", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 70, 78 ]
[ null, null ]
[ 26, 31 ]
[ 45, 50 ]
2024-11-18T20:24:20.218399+00:00
1,612,180,128,000
bcfd6ff3ae16c0891aaba90122ec8f0317ca3853
3
{ "blob_id": "bcfd6ff3ae16c0891aaba90122ec8f0317ca3853", "branch_name": "refs/heads/main", "committer_date": 1612180128000, "content_id": "70e85a279c9bdf83df4484bb01ebf17c560d771d", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "f994a45b0eae03c2b877dbbbef11dbfd20db7875", "extension": "py"...
3.0625
stackv2
#!/usr/bin/python3 import json, requests, datetime try: from configparser import ConfigParser except ImportError: from ConfigParser import ConfigParser class giantbomb_cli: def __init__(self): #initialises the cli class self.headers = {'User-Agent': 'giantbomb-test-cli 0.1', 'From': 'joe.po...
112
37.21
131
22
959
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8476c258d131e076_0982d23f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
4
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive dat...
[ 84, 86, 87, 89 ]
[ null, null, null, null ]
[ 27, 31, 27, 31 ]
[ 53, 64, 69, 69 ]
2024-11-18T20:59:40.216185+00:00
1,635,716,147,000
04d83e0ae5bfbe5a23b219423f658c4855b9d404
4
{ "blob_id": "04d83e0ae5bfbe5a23b219423f658c4855b9d404", "branch_name": "refs/heads/main", "committer_date": 1635716147000, "content_id": "1413db28ae73c6f411057e41f100000fb5a655b9", "detected_licenses": [ "MIT" ], "directory_id": "3431eeb9b601c672dad490ed7fd8e322bd4202e1", "extension": "py", "file...
4.09375
stackv2
import re #A FUNÇÃO "SEARCH" SÓ BUSCA A PRIMEIRA OPÇÃO DA FRASE #Usando Character Classes names = ["Douglas", "douglas", "souglas", "Souglas", "Touglas", "touglas", "@ouglas"] for name in names: result = re.search(r"[DdSsTt@]ouglas", name) #Buscando o nome Douglas, podendo ele começar com as letras dentro das chav...
43
50.14
172
9
696
python
[{"finding_id": "codeql_py/overly-large-range_05007052c80705dd_419df894", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 23, 26 ]
[ null, null ]
[ 26, 27 ]
[ 29, 30 ]
2024-11-18T20:59:41.895273+00:00
1,630,245,819,000
673554aabf6b4fb7291117e0101abf2f11265d97
3
{ "blob_id": "673554aabf6b4fb7291117e0101abf2f11265d97", "branch_name": "refs/heads/main", "committer_date": 1630245819000, "content_id": "d96fb7ffa6deeb8d64f8ffb91512dce9928939d2", "detected_licenses": [ "MIT" ], "directory_id": "849da0ba1ebec858269c5f86df069d85ac8757e3", "extension": "py", "file...
2.96875
stackv2
import logging from typing import Dict, Tuple, Union from flask import Blueprint, request from flask_restful import Api, Resource from marshmallow import Schema, fields from .geo_functions import default_geocoder, is_inside_mkad, get_distance from .exceptions import GeocoderError logging.basicConfig(level=logging.INF...
72
33.15
79
18
520
python
[{"finding_id": "codeql_py/log-injection_74e9d9f44341ad83_627c215d", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
2
true
[ "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 61, 65 ]
[ null, null ]
[ 30, 30 ]
[ 65, 77 ]
2024-11-18T21:00:04.978956+00:00
1,501,628,243,000
cb93126a43ba5bcf534bff431d2bb84d91f88a0f
2
{ "blob_id": "cb93126a43ba5bcf534bff431d2bb84d91f88a0f", "branch_name": "refs/heads/master", "committer_date": 1501628243000, "content_id": "5eb0f74d9ea724a5aef643dd54a53d1dd60a04b1", "detected_licenses": [ "MIT" ], "directory_id": "b4e7576d908fb08d8863a53eed5ab6d1ca2d1307", "extension": "py", "fi...
2.484375
stackv2
import os import re import sys import time import shutil import subprocess import datetime import yaml import getpass # Import gslab_scons modules import _exception_classes from size_warning import issue_size_warnings def scons_debrief(target, env): '''Execute functions after SCons has built all targets''' # L...
323
32.32
121
21
2,437
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_0a826dc807bbc4f1_d80220e8", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](1) as clear text." ]
[ 297 ]
[ null ]
[ 21 ]
[ 44 ]
2024-11-18T21:00:33.792077+00:00
1,536,000,924,000
ba151cdc82782d312933440ea123ca87acb92098
3
{ "blob_id": "ba151cdc82782d312933440ea123ca87acb92098", "branch_name": "refs/heads/master", "committer_date": 1536000924000, "content_id": "7728affc446017b4e60f4673080a507a14adba71", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "41e97dc8d5e2380ecb3346af55a5bf41ed7846f0", "extension": "p...
2.96875
stackv2
from uuid import uuid4 from hashlib import md5 def generate_salt(): """ Generates a random string to use for password generation """ return uuid4().hex[:8].upper() def generate_password_from_salt(salt, password): string = salt + password + "KEY123" return md5(string.encode('utf-8')).hexdigest() def e...
17
29.59
68
13
116
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_7fb9646b45fb4bd8_907b00b9", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 10 ]
[ null ]
[ 16 ]
[ 38 ]
2024-11-18T21:00:58.354718+00:00
1,451,584,769,000
9755d4d27026ef5f1b679027289523818d64c119
3
{ "blob_id": "9755d4d27026ef5f1b679027289523818d64c119", "branch_name": "refs/heads/master", "committer_date": 1451584769000, "content_id": "0f407716c8abd997627b4c09f6622c7f93caa49b", "detected_licenses": [ "MIT" ], "directory_id": "bbf3de51020d82105594e79f37e44db18e3103ee", "extension": "py", "fi...
3.0625
stackv2
import flask from flask import Module, make_response from urlparse import urlparse from jpegtran import JPEGImage import os import requests cache = Module(__name__, name="cache") """Currently works for jpg image only, client request can provide args in url, ex: http://test-cache.com/cache?url='image url'&width='int'&h...
71
30.46
78
17
532
python
[{"finding_id": "codeql_py/full-ssrf_3c7b44109e86a395_6e437d20", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).\nThe full URL of this request depends on a [user-...
2
true
[ "CWE-918", "CWE-918" ]
[ "py/full-ssrf", "py/full-ssrf" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1).\nThe full URL of this request depends on a [user-provided value](2).", "The full URL of this request depends on a [user-provided value](1)." ]
[ 55, 56 ]
[ null, null ]
[ 12, 15 ]
[ 29, 54 ]
2024-11-18T21:01:17.597821+00:00
1,691,561,787,000
d10faefb8897448c1f363aefeece3318c28a3a09
2
{ "blob_id": "d10faefb8897448c1f363aefeece3318c28a3a09", "branch_name": "refs/heads/main", "committer_date": 1691561787000, "content_id": "0c01a009b1b8b39743278701e103b468a1285b15", "detected_licenses": [ "MIT" ], "directory_id": "268e6241202090b397979d3d7a7cf86f0e44057c", "extension": "py", "file...
2.4375
stackv2
import asyncio import hashlib import secrets from functools import lru_cache from time import time from typing import Optional import bcrypt from fastapi import Request from pydantic import SecretBytes from . import glove from .exceptions import HttpTooManyRequests, UnexpectedResponse, manual_response_error from .uti...
96
37.27
112
17
828
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_04966f3c33093139_039bf9b5", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecu...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecure." ]
[ 43 ]
[ null ]
[ 28 ]
[ 49 ]
2024-11-18T21:01:22.342476+00:00
1,398,260,718,000
1b69d0552aa1258638992def34ff5e245b5ef62c
4
{ "blob_id": "1b69d0552aa1258638992def34ff5e245b5ef62c", "branch_name": "refs/heads/master", "committer_date": 1398260718000, "content_id": "c51d46bb2133f8f50d0f10432ebd465f30b9df0e", "detected_licenses": [ "MIT" ], "directory_id": "074ef082e4970101f8faf46164af8b839dbc519b", "extension": "py", "fi...
3.5
stackv2
#!/usr/bin/env python3 # Combine the data in "genotypes.txt", "markers.txt" and "families.txt" # and convert them into a CRI-MAP .gen file # # This is a python version of the perl script discussed in my "Intro to perl" # at http://www.biostat.wisc.edu/~kbroman/perlintro/index.html#ex2 # # This is the python 3 version; ...
105
30.97
99
18
910
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a37c921767002336_a98c8b33", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 85 ]
[ null ]
[ 15 ]
[ 78 ]
2024-11-18T21:37:56.340078+00:00
1,587,208,859,000
66c41a99a274d6be25a9cccdfa63cc010f0fd5b5
3
{ "blob_id": "66c41a99a274d6be25a9cccdfa63cc010f0fd5b5", "branch_name": "refs/heads/master", "committer_date": 1587208859000, "content_id": "bd67a2a9dea4cd5c76974008ff7799deebf51b67", "detected_licenses": [ "MIT" ], "directory_id": "ac7c2582157edd02d6660972a175afa6bd231c1f", "extension": "py", "fi...
2.703125
stackv2
import argparse import os from sys import platform from selenium.common.exceptions import NoSuchElementException, ElementClickInterceptedException from selenium import webdriver import time import json from JobParser import settings def parsing(): parser = argparse.ArgumentParser() parser.add_argument("-v"...
285
40.44
159
20
2,307
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2bf1ef0e1d4fd7bb_9d98e023", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 114 ]
[ null ]
[ 23 ]
[ 68 ]
2024-11-18T22:00:13.764053+00:00
1,666,216,470,000
c5f2f0cc42d055f6b531313dd4f1f07a2c2b0650
2
{ "blob_id": "c5f2f0cc42d055f6b531313dd4f1f07a2c2b0650", "branch_name": "refs/heads/master", "committer_date": 1666216470000, "content_id": "260d73cda9fdf812854a6dd0195618ba92762b82", "detected_licenses": [ "MIT" ], "directory_id": "dad655898e438293fa957847795fc52b3c14cf7e", "extension": "py", "fi...
2.40625
stackv2
# -*- encoding: utf-8 -*- import json import base64 import logging import requests from requests.auth import HTTPBasicAuth from django.conf import settings from django.contrib import messages from pprint import pformat # Load Logging definition, this is defined in settings.py in the LOGGING section logger = logging.ge...
170
46.35
146
19
1,909
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_01105bf353ffc68b_2f4a01e7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 22 ]
[ null ]
[ 21 ]
[ 28 ]
2024-11-18T22:01:02.848522+00:00
1,547,791,914,000
8ff43487fe199b3f0d0074dd4fe5b78049497088
2
{ "blob_id": "8ff43487fe199b3f0d0074dd4fe5b78049497088", "branch_name": "refs/heads/master", "committer_date": 1547791914000, "content_id": "e846d5b4d183fee37c59867dad2e551fd5dda39e", "detected_licenses": [ "Apache-2.0" ], "directory_id": "1f0df9e45c38b56b683e1122c350f98f4d474b71", "extension": "py"...
2.359375
stackv2
# Copyright 2016 IBM Corp. All Rights Reserved. #!/usr/bin/python2.7 """Functions for downloading and extracting pretrained py-faster-rcnn/ssd caffe models and client utils.""" from __future__ import print_function import argparse import tarfile import os from six.moves import urllib from os.path import join # -...
198
29.66
103
14
1,685
python
[{"finding_id": "codeql_py/tarslip_b4dac0718ad65fb3_04796b1a", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 68 ]
[ null ]
[ 9 ]
[ 12 ]
2024-11-18T22:01:07.670722+00:00
1,483,961,984,000
df5096d41e3f5654e107d158a2c3c46a0929c554
3
{ "blob_id": "df5096d41e3f5654e107d158a2c3c46a0929c554", "branch_name": "refs/heads/master", "committer_date": 1483961984000, "content_id": "f73c06f02ad32d864afb9c8a00e1e8ee4355a1b9", "detected_licenses": [ "Apache-2.0" ], "directory_id": "ea279ceea73d0a237419db5ff6f99782fb445493", "extension": "py"...
2.59375
stackv2
import os import datetime import logging import csv import requests from flask import make_response from jinja2 import Environment, FileSystemLoader WORK_DIR = os.path.dirname(__file__) CSV_URL = 'http://0.0.0.0:8089/stats/distribution/csv' STAT_URL = 'http://0.0.0.0:8089/stats/requests' HTML_TEMPLATE = 'report-tem...
108
39.79
114
23
922
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_1ec9073b37f2c1ab_844de694", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 37 ]
[ null ]
[ 18 ]
[ 82 ]
2024-11-18T22:26:18.062500+00:00
1,502,083,969,000
c8ea7771d2a75e639ebac68adee75bdd2c7bcc6e
2
{ "blob_id": "c8ea7771d2a75e639ebac68adee75bdd2c7bcc6e", "branch_name": "refs/heads/master", "committer_date": 1502083969000, "content_id": "d10824d179d369fed830b930610f056451d35c06", "detected_licenses": [ "MIT" ], "directory_id": "8b12e0d17beb720d647a663c3fdbb4dd99c1aa74", "extension": "py", "fi...
2.359375
stackv2
from zoodb import * from debug import * import os import hashlib import random import pbkdf2 import bank_client def newtoken(db, cred): hashinput = "%s%.10f" % (cred.password, random.random()) cred.token = hashlib.md5(hashinput).hexdigest() db.commit() return cred.token def login(username, password): ...
53
24.66
72
11
366
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_829b201921c26661_8538d425", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 11 ]
[ null ]
[ 30 ]
[ 39 ]
2024-11-18T20:39:49.535172+00:00
1,442,252,198,000
708f8540647e4c7ffd827430d7d6ea82acf8a985
3
{ "blob_id": "708f8540647e4c7ffd827430d7d6ea82acf8a985", "branch_name": "refs/heads/master", "committer_date": 1442252198000, "content_id": "7baee74249eb65bde3033715738e79b275a032cc", "detected_licenses": [ "MIT" ], "directory_id": "4f8e526b8df465775ae7e3f41bfe4b88a2ccf08b", "extension": "py", "fi...
2.765625
stackv2
import clss import os def setup_sql(): menu() s = clss.sql() s.meta.create_all(s.eng) def menu(): txt = open('auth_sql', 'w') print print '-----SQL Database setup-----' print print '=Select SQL type=' print ' (1) sqlite' print ' (2) MySQL' print typ = int(raw_input('...
36
22.81
69
14
238
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_50630696969133fc_90f529c7", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 35 ]
[ null ]
[ 19 ]
[ 27 ]
2024-11-18T20:39:51.487790+00:00
1,541,437,173,000
c8ec24fd7e16dad6f431fbbfd2ee6b505e13bab5
2
{ "blob_id": "c8ec24fd7e16dad6f431fbbfd2ee6b505e13bab5", "branch_name": "refs/heads/master", "committer_date": 1541437173000, "content_id": "4b1d9a5493a5b12d053c7c511a376980dd8a8b04", "detected_licenses": [ "MIT" ], "directory_id": "9067453580cf1d65fcb6ce1c88bd47376e2c835e", "extension": "py", "fi...
2.46875
stackv2
import requests import threading import json from time import sleep from sys import exit as sysexit, stderr class Bruter(threading.Thread): # public constants ERR_HOMEPAGE_FETCH_FAILED = 0 ERR_HTTP_CODE_NOT_OK = 1 ERR_TOKEN_NOT_FOUND = 2 ERR_CONNECTION_FAILED = 3 ERR_INVALID_RESPONSE = 4 E...
310
40.03
125
23
2,680
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_1ed60f0d0c9fa851_46636678", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 283, 257 ]
[ null, null ]
[ 56, 23 ]
[ 66, 48 ]
2024-11-18T20:52:19.252378+00:00
1,624,178,480,000
fe0bc8472ed910bd76d3e99cfcf48c90dccd1979
2
{ "blob_id": "fe0bc8472ed910bd76d3e99cfcf48c90dccd1979", "branch_name": "refs/heads/main", "committer_date": 1624178480000, "content_id": "da3f15a7d47e8868dd4c2801c1d010ee953295d9", "detected_licenses": [ "Unlicense" ], "directory_id": "90139e18bbd94d51a156f4d1ea7ccb7eb047a1d6", "extension": "py", ...
2.3125
stackv2
from flask import Flask, render_template,redirect from models import SSRServer, db import datetime import json import logging logging.basicConfig(filename='/dev/stdout', level=logging.INFO, format='[WEB] %(asctime)s %(message)s') db.connect() app = Flask(__name__, static_url_path='/static') @app.template_filter() de...
62
28.55
103
14
399
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_a9a1fcd114b86b0c_d0dfdbcd", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 39 ]
[ 53 ]
[ 13 ]
[ 14 ]
2024-11-18T21:08:10.775973+00:00
1,349,379,120,000
20e9fff6c99655caeb0c844b5b8fd4b8e6e3285a
3
{ "blob_id": "20e9fff6c99655caeb0c844b5b8fd4b8e6e3285a", "branch_name": "refs/heads/master", "committer_date": 1349379120000, "content_id": "460949720b20c4eee74af83c44d7b94ee8c85a26", "detected_licenses": [ "MIT" ], "directory_id": "3ff3c2ea13973b0f4309be716501c2fedc1bb8f3", "extension": "py", "fi...
2.75
stackv2
""" Methods for managing S3 Buckets and making them available as local file systems. """ import os import urllib2 from cm.util import misc from cm.util import paths from cm.util.misc import _if_not_installed from cm.util.decorators import TestFlag import logging log = logging.getLogger('cloudman') class Bucket(objec...
150
39.66
106
20
1,387
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3793915d3b8823d5_3f94764d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 40 ]
[ 41 ]
[ 19 ]
[ 62 ]
2024-11-18T21:08:22.855923+00:00
1,616,859,596,000
bbb3dc9c8dd2553915037eef8216fbaaea344fe8
2
{ "blob_id": "bbb3dc9c8dd2553915037eef8216fbaaea344fe8", "branch_name": "refs/heads/main", "committer_date": 1616859596000, "content_id": "e92f647ccd2c7b6b8f80da9594b0f1fbf80ba512", "detected_licenses": [ "Apache-2.0" ], "directory_id": "f39a955f01099317a73a35a4e7a028e3271923da", "extension": "py", ...
2.40625
stackv2
import os from typing import Union import yaml import json from jinja2 import Template from copy import deepcopy header_msg1 = 'This file was automatically generated by jinjaroot. Do not edit directly. See the .jinjaroot dir.' header_msg2 = 'This file was automatically generated by jinjaroot. Do not edit directly.' d...
133
44.12
146
21
1,450
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_437cfb99a09df277_808eae39", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
4
true
[ "CWE-079", "CWE-079", "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false", "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially...
[ 15, 24, 79, 90 ]
[ null, null, null, null ]
[ 18, 17, 21, 32 ]
[ 33, 68, 72, 73 ]
2024-11-18T21:08:23.713989+00:00
1,609,082,708,000
ef2edfda6af0dad445b96cfb547dd9ed934cc958
3
{ "blob_id": "ef2edfda6af0dad445b96cfb547dd9ed934cc958", "branch_name": "refs/heads/master", "committer_date": 1609083830000, "content_id": "30c96cc5682e7f378a19cfc929ffb0c3cbbc31d7", "detected_licenses": [ "Apache-2.0" ], "directory_id": "2ec94b20d7c748e86e249c2921ad0e113e2fd27e", "extension": "py"...
3.046875
stackv2
# Write individuals by generation to stdout in JSON format. # Typical usage: # python preprocess.py <file.ged> > out.json import dateparser import datetime import json import sys from ged4py.parser import GedcomReader import pandas as pd def individual_to_dict(indi, gen, include_parents=False): p = { "i...
115
30.42
140
18
916
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ecd7ab1734d36f0a_14d1b306", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 115 ]
[ null ]
[ 15 ]
[ 48 ]
2024-11-18T21:08:28.210609+00:00
1,665,410,411,000
95d02ff7f2ef895cd75b41c5fdc569193821991b
3
{ "blob_id": "95d02ff7f2ef895cd75b41c5fdc569193821991b", "branch_name": "refs/heads/master", "committer_date": 1665410411000, "content_id": "98a04c22c95ff3d6aaf08ddf6aea6b903fac3269", "detected_licenses": [ "MIT" ], "directory_id": "c3ce0329a42732eb93a09874dc29227efb24f165", "extension": "py", "fi...
2.609375
stackv2
import os import json import time import logging import pathlib import zipfile import tempfile import subprocess from .util import * logger = logging.getLogger() class NgrokManager(): def __init__(self): self.__ngrok_instalation_path = None self.__ngrok_executable = None self.__ngrok_proc...
202
32.06
114
20
1,381
python
[{"finding_id": "codeql_py/overly-permissive-file_128cb13211761627_348ac6b7", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable." ]
[ 77 ]
[ null ]
[ 17 ]
[ 44 ]
2024-11-18T21:08:30.814969+00:00
1,587,899,999,000
4213c6aee3b0739417c5d85e82ffa776c2c68fda
2
{ "blob_id": "4213c6aee3b0739417c5d85e82ffa776c2c68fda", "branch_name": "refs/heads/master", "committer_date": 1587899999000, "content_id": "b761c18d6b16dd69a95ac4c27a115e783dab734b", "detected_licenses": [ "Apache-2.0" ], "directory_id": "2617b0b2a8d264c15304757911ed758f61eb56d8", "extension": "py"...
2.40625
stackv2
#DOCS FOR THE CODE IN THIS PAGE ARE AT: https://docs.python.org/3/library/http.server.html #import statements if __name__ == "__main__": import MasterControl else: from . import MasterControl from sys import exit as ExitProgram from http.server import * import os from pathlib import Path #Variables httpd...
163
46.08
130
30
1,623
python
[{"finding_id": "codeql_py/path-injection_9d50413f1bbbe6a1_e3606250", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
4
true
[ "CWE-022", "CWE-022", "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 42, 54, 66, 79 ]
[ null, null, null, null ]
[ 45, 37, 37, 27 ]
[ 123, 118, 119, 61 ]
2024-11-18T21:31:29.104876+00:00
1,443,612,667,000
1dc9ad48c9c4669ff4d5fc0f15ee56e8844ea743
3
{ "blob_id": "1dc9ad48c9c4669ff4d5fc0f15ee56e8844ea743", "branch_name": "refs/heads/master", "committer_date": 1443612667000, "content_id": "2b4f654a75c62044cb5c8ab587d3a7f9a56ff436", "detected_licenses": [ "Apache-2.0" ], "directory_id": "4a61ab061ecb88a17e18e0d3fc44552541e21af0", "extension": "py"...
2.640625
stackv2
import tornado.ioloop import tornado.web class IndexHandler(tornado.web.RequestHandler): def get(self): greeting = self.get_argument('greeting', 'Hello') self.write(greeting + ", friendly user!") def write_error(self, status_code, **kwargs): self.write("Gosh darnit, user!You caused a %d error." % status_code) ...
18
26.11
70
12
131
python
[{"finding_id": "codeql_py/reflective-xss_5cba7d575558d75a_eb07e5f6", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 7 ]
[ null ]
[ 14 ]
[ 43 ]
2024-11-18T21:31:53.721584+00:00
1,684,798,861,000
b1df56d27d1643444576a7674484e4abb0dc8149
2
{ "blob_id": "b1df56d27d1643444576a7674484e4abb0dc8149", "branch_name": "refs/heads/master", "committer_date": 1684798861000, "content_id": "52f0847999690f9fd08af0ff0fcd3b0b8529f8cf", "detected_licenses": [ "MIT" ], "directory_id": "301f192743868f4305cf9ed84bf20db512d07d93", "extension": "py", "fi...
2.484375
stackv2
import json import os import requests import schedule import time API_TOKEN = os.environ['SLACK_API_TOKEN'] START_TIME = '10:00' QUITTING_TIME = '18:00' def set_slack_presence(presence): url = "https://slack.com/api/users.setPresence" url += f"?token={API_TOKEN}" url += f"&presence={presence}" respon...
69
23.29
52
12
417
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_dd731d613095515c_c10b3a9e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 18 ]
[ null ]
[ 15 ]
[ 28 ]
2024-11-18T21:32:12.557817+00:00
1,375,682,880,000
e500d536e1b813efb616c6b178d43dfacc7bc834
2
{ "blob_id": "e500d536e1b813efb616c6b178d43dfacc7bc834", "branch_name": "refs/heads/master", "committer_date": 1375682880000, "content_id": "e2ec69dbb57976088fb822d020f4fd0b589ac8e7", "detected_licenses": [ "MIT" ], "directory_id": "6cf46f85debb1b0505c0edcbc7296f50a44a615d", "extension": "py", "fi...
2.3125
stackv2
from dexy.reporter import Reporter from dexy.doc import Doc from jinja2 import Environment from jinja2 import FileSystemLoader import operator import os import random import shutil def link_to_doc(node): return """&nbsp;<a href="#%s">&darr; doc info</a>""" % node.output_data().websafe_key() def link_to_doc_if_doc...
101
33.41
107
17
830
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_880afd4e09ead3cb_a59b48ba", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 97 ]
[ null ]
[ 15 ]
[ 28 ]
2024-11-18T21:32:20.417417+00:00
1,437,205,483,000
5c83e2c9fb97b4aaf774fa890475268295aeecbc
3
{ "blob_id": "5c83e2c9fb97b4aaf774fa890475268295aeecbc", "branch_name": "refs/heads/master", "committer_date": 1437205483000, "content_id": "0cc6aae1861d417d6dd118294e2c12dc3c511adf", "detected_licenses": [ "Apache-2.0" ], "directory_id": "f721832d053345936d579ec8f2322c6dd229edfa", "extension": "py"...
2.703125
stackv2
#!/usr/bin/env python import os, socket, errno, types, tempfile class NetworkError(IOError): pass class FileError(IOError): pass def updArgs(args, newarg=None): if isinstance(args, IOError): myargs = [] myargs.extend([arg for arg in args]) else: myargs = list(args) if ne...
110
22.16
54
14
699
python
[{"finding_id": "codeql_py/insecure-temporary-file_8f166127a3899142_c5b4db68", "tool_name": "codeql", "rule_id": "py/insecure-temporary-file", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated function tempfile.mktemp may be insecure.", "remediation": "", "location": ...
2
true
[ "CWE-377", "CWE-732" ]
[ "py/insecure-temporary-file", "py/overly-permissive-file" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Call to deprecated function tempfile.mktemp may be insecure.", "Overly permissive mask in chmod sets file to world writable." ]
[ 77, 94 ]
[ null, null ]
[ 15, 5 ]
[ 32, 28 ]
2024-11-18T21:32:59.491454+00:00
1,535,482,472,000
03f7181752df8e0375506cacba5294ac3e6f5204
3
{ "blob_id": "03f7181752df8e0375506cacba5294ac3e6f5204", "branch_name": "refs/heads/master", "committer_date": 1535482472000, "content_id": "36b19904e14c4c3f5d84952a8d27d1c4888d3d77", "detected_licenses": [ "MIT" ], "directory_id": "45cfb1fc234ada435c3768b7a3d316fa5b6ee8aa", "extension": "py", "fi...
2.78125
stackv2
#!/usr/bin/env python3 import sys import praw import time import datetime as dt import numpy as np import matplotlib.pyplot as plt import matplotlib.dates as mdates def main(): print("num args:", len(sys.argv)) if len(sys.argv) < 6: print('Usage: python3 main.py link_id client_id client_secret user_agent output...
111
27.5
95
12
848
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_420d2124b836ce90_b425f141", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 30 ]
[ null ]
[ 26 ]
[ 39 ]
2024-11-18T21:33:10.216596+00:00
1,525,187,874,000
69123ced3b705458d3569255b081f9702c0e7000
3
{ "blob_id": "69123ced3b705458d3569255b081f9702c0e7000", "branch_name": "refs/heads/master", "committer_date": 1525187874000, "content_id": "fb6b3df4be74fc6de44f6c726afb5683ae9021fd", "detected_licenses": [ "Unlicense" ], "directory_id": "3504bb8778a86082f7fb2ebc0ac7eeb92bd0eea2", "extension": "py",...
3.40625
stackv2
# -*- coding: utf-8 -*- """ Package: venn Module: draw This package provides functions for computing all sections of Venn diagrams. Functionality for drawing the diagrams in SVG format is also provided. Input can be sets or lists. The length of the input, i.e., the number of individual sets/lists is arbitrary. Howeve...
94
24.73
80
15
590
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_5f3b41de80e3aa04_b335cad2", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 48 ]
[ null ]
[ 11 ]
[ 67 ]
2024-11-18T21:49:14.834745+00:00
1,604,341,488,000
7ac6667403910f03e282f72f6a2bc8d986c063b5
3
{ "blob_id": "7ac6667403910f03e282f72f6a2bc8d986c063b5", "branch_name": "refs/heads/master", "committer_date": 1604341488000, "content_id": "62142209103f560b4cdea281f330f6a26cf690f0", "detected_licenses": [ "MIT" ], "directory_id": "5bc596211416a5dc4d9c8bf05608c8f554e81f8c", "extension": "py", "fi...
2.96875
stackv2
# coding: utf-8 import re class Tweet_processing: """ A helper class for processing tweets. Input: unprocessed tweets """ emojis = re.compile("[" u"\U0001F600-\U0001F64F" # emoticons u"\U0001F300-\U0001F5FF" # symbols & pictographs u"\U0001F680-\U0001F...
65
33.45
126
14
655
python
[{"finding_id": "codeql_py/overly-large-range_08d9dd93b6ed6a63_a07af237", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "remediatio...
7
true
[ "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range ...
[ 10, 10, 10, 10, 10, 10, 11 ]
[ null, null, null, null, null, null, null ]
[ 19, 22, 25, 28, 34, 37, 26 ]
[ 23, 26, 29, 32, 38, 41, 30 ]
2024-11-18T21:49:17.367251+00:00
1,478,596,304,000
0ccf3a4507680cade1d1419e23a7e95f15712004
3
{ "blob_id": "0ccf3a4507680cade1d1419e23a7e95f15712004", "branch_name": "refs/heads/master", "committer_date": 1478596304000, "content_id": "65641fae032a3636025a54669e9049ff6e95cda4", "detected_licenses": [ "MIT" ], "directory_id": "10fe75ff1cecffd7238afcc230adeb5c317b54ea", "extension": "py", "fi...
3.125
stackv2
# -*- coding: utf-8 -*- """ utils.decompress ~~~~~~~~~~~~~~~~ Implements decompress file :author: Feei <wufeifei#wufeifei.com> :homepage: https://github.com/wufeifei/cobra :license: MIT, see LICENSE for more details. :copyright: Copyright (c) 2016 Feei. All rights reserved """ impor...
148
30.68
118
14
1,061
python
[{"finding_id": "codeql_py/tarslip_a2564e2623af7b8a_5fc59459", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 139 ]
[ null ]
[ 9 ]
[ 17 ]
2024-11-18T22:42:11.326295+00:00
1,545,664,275,000
58bd4fb8dffa8dd96c9e46ddcc98174db5904d01
3
{ "blob_id": "58bd4fb8dffa8dd96c9e46ddcc98174db5904d01", "branch_name": "refs/heads/master", "committer_date": 1545664275000, "content_id": "7adaca232ff4e9ef1b1dc402b59344e7ca084006", "detected_licenses": [ "MIT" ], "directory_id": "332bb3d81bbb1a2dbeee0090fdae7cab8f5007ce", "extension": "py", "fi...
2.65625
stackv2
#!/usr/bin/env python3 import glob import sys import os import argparse import random from jinja2 import Template from weasyprint import HTML, CSS from PIL import Image base_path = os.path.dirname(os.path.realpath(__file__)) def remove_rotated(): rotated = glob.glob("rotated*") for i in rotated: o...
101
24.34
90
16
623
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_1d284026027801c4_9270455c", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 90 ]
[ null ]
[ 20 ]
[ 42 ]
2024-11-18T20:31:40.439162+00:00
1,624,713,499,000
ac8bcaedae351ab66eae16f9dea282256ddc5d63
3
{ "blob_id": "ac8bcaedae351ab66eae16f9dea282256ddc5d63", "branch_name": "refs/heads/master", "committer_date": 1624713854000, "content_id": "514d1229faf20d36636547904680cc3d613f71fb", "detected_licenses": [ "Apache-2.0" ], "directory_id": "89200d6c72acccca45808f53fa9bb5a9bd61359a", "extension": "py"...
2.609375
stackv2
import pathlib from fastapi import APIRouter, HTTPException from fastapi.responses import FileResponse __all__ = ["vue_frontend"] def _return_if_exists(path): if path.exists(): return FileResponse(path) else: raise HTTPException(status_code=404) def vue_frontend(main___file__: str) -> APIR...
31
26.23
96
16
199
python
[{"finding_id": "codeql_py/path-injection_f5736a0c9051e3fb_f257f4cf", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2).", "remed...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2).", "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2)." ]
[ 10, 11 ]
[ null, null ]
[ 8, 29 ]
[ 12, 33 ]
2024-11-18T21:10:49.898578+00:00
1,427,272,189,000
5d4e6c2000c4fbe102048b799a625574f675d707
3
{ "blob_id": "5d4e6c2000c4fbe102048b799a625574f675d707", "branch_name": "refs/heads/master", "committer_date": 1427272189000, "content_id": "e024dde9da5e73632822661c083c31c0bfc5a9bc", "detected_licenses": [ "MIT" ], "directory_id": "048d0318f8b51c855bcbf2f096f6a01755ba6922", "extension": "py", "fi...
2.515625
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- # @Author: omi # @Date: 2014-08-24 21:51:57 # @Last Modified by: omi # @Last Modified time: 2015-01-30 18:02:34 ''' 网易云音乐 Ui ''' import curses from api import NetEase import hashlib class Ui: def __init__(self): self.screen = curses.initscr() # c...
276
43.1
129
32
2,900
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_8078f65dd7cbfa0c_d46e6ba7", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi...
[ 222 ]
[ null ]
[ 38 ]
[ 57 ]
2024-11-18T21:46:32.478505+00:00
1,621,565,270,000
7959f0c0df2917049b4dfa76e3b95ef0ef563332
4
{ "blob_id": "7959f0c0df2917049b4dfa76e3b95ef0ef563332", "branch_name": "refs/heads/master", "committer_date": 1621565270000, "content_id": "ed8440f4a78452d989e7f45d4d8fb4167e653a32", "detected_licenses": [ "MIT" ], "directory_id": "3279560117e971ae59c20925ab1cdab27bd2a688", "extension": "py", "fi...
4.03125
stackv2
print('---------- Creating a Class ----------') class Person: pass print('---------- Creating an Object ----------') p = Person() print(p) print('---------- Class Constructor ----------') class Person: def __init__(self, firstname, lastname, age, country, city): self.firstname = firstname ...
129
24.06
120
12
792
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c50ea4184ae7724d_30b0d5d2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 129 ]
[ null ]
[ 7 ]
[ 23 ]
2024-11-18T21:46:35.059149+00:00
1,558,194,638,000
2b7b84cab5c9f8f14e6ccc90d5fb2e84e974c505
3
{ "blob_id": "2b7b84cab5c9f8f14e6ccc90d5fb2e84e974c505", "branch_name": "refs/heads/master", "committer_date": 1558194638000, "content_id": "fd609cce429091c2b5edd6e35e2cd6f02ab357c7", "detected_licenses": [ "MIT" ], "directory_id": "78082599211c21db9cb0f18a7277c234a5f89a3d", "extension": "py", "fi...
2.8125
stackv2
import hashlib import uuid from qobuz import api, Artist, Album, Track, Playlist class User(object): """Own user to be logged in. Some operations require an authenticated user. Parameters ---------- username: str Username or e-mail of the user password: str Password for the ...
296
26.92
78
16
1,630
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_6e23d2dccbf044e0_5a0d996a", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi...
[ 51 ]
[ null ]
[ 28 ]
[ 45 ]
2024-11-18T21:47:33.827763+00:00
1,690,556,815,000
9269eaac78c34bcdc6bcdf3b434ff766f979d3a4
3
{ "blob_id": "9269eaac78c34bcdc6bcdf3b434ff766f979d3a4", "branch_name": "refs/heads/main", "committer_date": 1690556815000, "content_id": "4286bf451a8327ac6fed539904ff31f6560e3d2b", "detected_licenses": [ "Apache-2.0" ], "directory_id": "833267bf748687c8fb36c7fa5792a6a14a509597", "extension": "py", ...
2.609375
stackv2
# Copyright (c) 2020-2023 Antmicro <www.antmicro.com> # # SPDX-License-Identifier: Apache-2.0 """ Provide resource manager responsible for downloading and caching resources """ import hashlib import os import tarfile from pathlib import Path from shutil import copy, rmtree from tqdm import tqdm from typing import Any,...
633
27.42
79
22
3,715
python
[{"finding_id": "codeql_py/tarslip_ca6a366322ba0543_3b3ecbff", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 37 ]
[ null ]
[ 9 ]
[ 11 ]
2024-11-18T21:47:37.678268+00:00
1,624,388,022,000
6e6143a2f81869f71dd28af2a3ac00a4ed84d9b4
3
{ "blob_id": "6e6143a2f81869f71dd28af2a3ac00a4ed84d9b4", "branch_name": "refs/heads/master", "committer_date": 1624388022000, "content_id": "79310318ecf37fab63086aefd21706a0fc4ff895", "detected_licenses": [ "MIT" ], "directory_id": "a9fb9c6477308d33edb329342cc3d0b8c3e80b95", "extension": "py", "fi...
3.0625
stackv2
#!/usr/bin/python3 # HELP: # usage: createPasswdFile [-h] [--path PATH] # Creates a password file according to Basic WWW-Authenticationi Scheme RFC 7617 # # optional arguments: # -h, --help show this help message and exit # --path PATH, -p PATH specify password file path (default: /home/$USER/.passwd-f...
83
25.13
108
12
534
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_4f3289036905f976_f78937ad", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 79 ]
[ null ]
[ 9 ]
[ 13 ]
2024-11-18T21:47:43.455531+00:00
1,551,245,345,000
f6cd872f2c4308c95bb8fd35be8fa1ef87337deb
2
{ "blob_id": "f6cd872f2c4308c95bb8fd35be8fa1ef87337deb", "branch_name": "refs/heads/master", "committer_date": 1551245345000, "content_id": "f38ad5046a3c71254e9aeb159b97efd9338b7dd0", "detected_licenses": [ "Apache-2.0" ], "directory_id": "693e817268b6c64cdc6675e84c71f66d91756601", "extension": "py"...
2.421875
stackv2
import configparser import requests import json import datetime import random from flask import request, jsonify, url_for, flash, redirect from config import configs from .models import User, UserInfo, God from functools import wraps def get_access_token(): url = 'https://api.weixin.qq.com/cgi-bin/token?grant_typ...
129
29.5
110
16
970
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5e0228024e9314d1_f2a2c144", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 19 ]
[ null ]
[ 11 ]
[ 23 ]
2024-11-18T22:29:31.098045+00:00
1,421,879,062,000
0881b1abf16eaebc4d358481a6b9376667ce9bb9
3
{ "blob_id": "0881b1abf16eaebc4d358481a6b9376667ce9bb9", "branch_name": "refs/heads/master", "committer_date": 1421879062000, "content_id": "6eb8c5c188cbfbe1c9b56b1864cfa7952e37582c", "detected_licenses": [ "MIT" ], "directory_id": "c858c9be806510e3e32099178b7b72e43f2a8f51", "extension": "py", "fi...
2.921875
stackv2
# This file is part of gpgpass. # # simple command line password manager using gnupg # Copyright (c) 2015, Markus Klein # MIT Licensed from gpgpass.password_manager import PasswordManager from getpass import getpass import argparse import pyperclip import sys import os.path def main(): parser = argparse.Argument...
106
40.92
145
21
1,050
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_248cb45c67c1d413_722983d6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 103 ]
[ null ]
[ 23 ]
[ 89 ]
2024-11-18T22:29:38.037858+00:00
1,520,577,401,000
d7a82bef2a3664745ae19006a4fef3f84da6fc23
3
{ "blob_id": "d7a82bef2a3664745ae19006a4fef3f84da6fc23", "branch_name": "refs/heads/master", "committer_date": 1520577401000, "content_id": "57a991962cfaad164402d6f2fa58710e72151359", "detected_licenses": [ "MIT" ], "directory_id": "a0e6b98abc914373efc8a51fc1fcad303d0853e4", "extension": "py", "fi...
2.515625
stackv2
""" Application 控制器 add on 2017-11-14 16:46:35 """ import shutil import os import chardet from flask import jsonify, request from buter import db, ServiceException, getAttachPath from buter.app import services from buter.logger import LOG from buter.util import Result from buter.util.FlaskTool import Q from buter.u...
318
23.75
114
17
2,168
python
[{"finding_id": "codeql_py/path-injection_511f03a4c90d674d_04bd3c49", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 229, 232 ]
[ null, null ]
[ 23, 15 ]
[ 34, 26 ]
2024-11-18T22:54:12.820766+00:00
1,682,540,576,000
cf62aa619892209948341d029441037a3d13fd2a
2
{ "blob_id": "cf62aa619892209948341d029441037a3d13fd2a", "branch_name": "refs/heads/master", "committer_date": 1682540576000, "content_id": "9890b38571a2c5596fc61f9dd97a291a8595c2ff", "detected_licenses": [ "MIT" ], "directory_id": "8fc7d4a8d98e39bf38f2ddd9a42bac34847c4339", "extension": "py", "fi...
2.390625
stackv2
#!/usr/bin/env python # # Copyright (c) 2017 Jason Frazier <jafrazie@cisco.com> # All rights reserved. # # Redistribution and use in source and binary forms, with or without # modification, are permitted provided that the following conditions # are met: # 1. Redistributions of source code must retain the above copyrig...
77
37.52
104
12
651
python
[{"finding_id": "codeql_py/request-without-cert-validation_388b2385858cba1f_8489f1b4", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 71 ]
[ null ]
[ 20 ]
[ 105 ]
2024-11-18T22:54:12.930272+00:00
1,620,702,364,000
30aed5c862353c4e61c24a05ce9cc51b21e6f9d8
4
{ "blob_id": "30aed5c862353c4e61c24a05ce9cc51b21e6f9d8", "branch_name": "refs/heads/master", "committer_date": 1620702364000, "content_id": "38350f69f25fd3f2b4c51348e4fd8135bfa85870", "detected_licenses": [ "Unlicense" ], "directory_id": "6c3bb7feea3b3b029fe65de11954aee778ac3578", "extension": "py",...
4.125
stackv2
""" [M] Given an array of intervals representing 'N' appointments, find out if a person can attend all the appointments. Example 1: Appointments: [[1,4], [2,5], [7,9]] Output: false Explanation: Since [1,4] and [2,5] overlap, a person cannot attend both of these appointments. """ # Time: O(nlogn) Space: O(n)...
39
30.03
102
14
353
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9d7017e8a70b200e_66b97a66", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 34, 35, 36 ]
[ null, null, null ]
[ 9, 9, 9 ]
[ 101, 102, 101 ]
2024-11-18T22:54:19.616513+00:00
1,606,333,029,000
144495dadee734e67b4c6af899bcb2fb3dde33dd
2
{ "blob_id": "144495dadee734e67b4c6af899bcb2fb3dde33dd", "branch_name": "refs/heads/main", "committer_date": 1606333029000, "content_id": "ee0f5819f3b9082aab65bb210878b858b54dee16", "detected_licenses": [ "MIT" ], "directory_id": "2188bd3f758186eebb439a86bf6fcdb5ea2bc863", "extension": "py", "file...
2.5
stackv2
#!/usr/bin/python # -*- coding: utf-8 -*- import os from datetime import datetime from flask import Flask, render_template, jsonify, redirect, url_for, \ request, send_from_directory, send_file from convert import Convert template_dir = os.path.abspath(os.path.join(os.getcwd(), "./templates")) app = Flask(__name_...
54
31.94
147
19
382
python
[{"finding_id": "codeql_py/flask-debug_c02507efc0ff4663_c7a71787", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-022" ]
[ "py/flask-debug", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1)." ]
[ 54, 38 ]
[ null, null ]
[ 5, 23 ]
[ 51, 31 ]
2024-11-18T22:54:20.501556+00:00
1,609,661,301,000
581f62d783fa3791e590651467bceacfb3569196
3
{ "blob_id": "581f62d783fa3791e590651467bceacfb3569196", "branch_name": "refs/heads/master", "committer_date": 1609661301000, "content_id": "299ad46ab910d05a102362c3e3dd31a496fed1e2", "detected_licenses": [ "MIT" ], "directory_id": "f020112d55d2c749234cbaebcd02e317a124ab00", "extension": "py", "fi...
2.640625
stackv2
import requests import json import os import urllib.parse import html.parser import lxml.html import lxml.cssselect import argparse import urllib3 urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning) def read_srt( path ): timestamp = '' subtitle = '' skip_num_line = True subtitles = []...
149
32.32
151
18
1,229
python
[{"finding_id": "codeql_py/request-without-cert-validation_dfbf22436b358a71_06d2a838", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 59 ]
[ null ]
[ 9 ]
[ 80 ]
2024-11-18T20:55:07.534078+00:00
1,621,467,813,000
e37c26fbf8d5398357a31073e62794832c78fe30
3
{ "blob_id": "e37c26fbf8d5398357a31073e62794832c78fe30", "branch_name": "refs/heads/main", "committer_date": 1621467813000, "content_id": "4b7e46576f004beffb61e721c608d4a315500e38", "detected_licenses": [ "Apache-2.0" ], "directory_id": "f39917a4ab1fbf1b69f4f44603ab13b664ea2f80", "extension": "py", ...
3.21875
stackv2
import yaml from jinja2 import Environment, BaseLoader, PackageLoader, select_autoescape env = Environment(loader=BaseLoader) def get_sample_template_data(): data = TemplateCollection() ag_news_template = Template( 'basic', 'Example template.', 'return example["text"] + "\n\nIs this a...
212
31.04
123
17
1,469
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_e5fb4715189446a6_0a86049f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 3 ]
[ null ]
[ 7 ]
[ 37 ]
2024-11-18T20:55:11.723828+00:00
1,613,636,538,000
e74b49f9b0309c25b210639090c337be121f8d43
3
{ "blob_id": "e74b49f9b0309c25b210639090c337be121f8d43", "branch_name": "refs/heads/master", "committer_date": 1613636538000, "content_id": "ea3e087375739be5a47d799ef9780d0a08152133", "detected_licenses": [ "MIT" ], "directory_id": "79d679c18983a67c4e33e16eb7afc3023c22bfb4", "extension": "py", "fi...
3.4375
stackv2
import random from credential import User, Credential # from user import User def create_user(user_name, password): new_user = User(user_name, password) return new_user def save_user(user): User.save_user(user) def verify_user(user_name, password): check_user = Credential.check_user(user_name, passwo...
180
37.22
164
27
1,164
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a064acabda7f5d94_249d082c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (p...
[ 80, 139, 148 ]
[ null, null, null ]
[ 23, 31, 37 ]
[ 32, 130, 149 ]
2024-11-18T20:55:11.772490+00:00
1,540,433,714,000
296b0199899d4b8984556b0b93ab813b70a4e2f7
3
{ "blob_id": "296b0199899d4b8984556b0b93ab813b70a4e2f7", "branch_name": "refs/heads/master", "committer_date": 1540433714000, "content_id": "4bd359d5093ab9bb1614cac91da65e64c045bb87", "detected_licenses": [ "MIT" ], "directory_id": "5a1b076248ae481fde791c635ca631b6449529f8", "extension": "py", "fi...
2.53125
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- from flask import Flask, jsonify, make_response, request, send_from_directory from flaskrun import flaskrun from HTU21D.HTU21D import HTU21D import requests from urllib3.exceptions import MaxRetryError # Mostly dicts of endpoint addresses from config import * app = Flask...
170
39.02
110
22
1,630
python
[{"finding_id": "codeql_py/full-ssrf_9425e7016a890061_2d264366", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
1
true
[ "CWE-918" ]
[ "py/full-ssrf" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1)." ]
[ 42 ]
[ null ]
[ 17 ]
[ 67 ]
2024-11-18T21:07:38.061980+00:00
1,621,541,041,000
6ed8afdde515fab86fcd1447586969eee7ae10ed
2
{ "blob_id": "6ed8afdde515fab86fcd1447586969eee7ae10ed", "branch_name": "refs/heads/main", "committer_date": 1621541061000, "content_id": "ef9e9d1f9e9794c8ce6479f6c661123e1f13b239", "detected_licenses": [ "MIT" ], "directory_id": "ce80d129b70ddd576d0fba01f0066588681410b2", "extension": "py", "file...
2.3125
stackv2
import os import json from flask import Flask, render_template, send_from_directory, \ request, redirect, url_for, make_response app = Flask(__name__) @app.route('/', methods=('GET',)) @app.route('/home', methods=('GET',)) def home(): return render_template('index.html') @app.route('/science', methods=('GE...
54
35.94
118
16
467
python
[{"finding_id": "codeql_py/cookie-injection_c9b0ecd243f58229_2de16f6a", "tool_name": "codeql", "rule_id": "py/cookie-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cookie is constructed from a [user-supplied input](1).", "remediation": "", "location": {"file_path": "...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/cookie-injection", "py/cookie-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cookie is constructed from a [user-supplied input](1).", "Cookie is constructed from a [user-supplied input](1)." ]
[ 36, 40 ]
[ null, null ]
[ 48, 48 ]
[ 58, 58 ]
2024-11-18T21:07:42.204480+00:00
1,517,221,329,000
505ef88e3a304d54da047e9d2f66552e18c2a043
3
{ "blob_id": "505ef88e3a304d54da047e9d2f66552e18c2a043", "branch_name": "refs/heads/master", "committer_date": 1517221329000, "content_id": "9f623aa99f49acdc97503537db173b1094038746", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "f5d5576c58c6039723d8a833ea9659f3deffeb88", "extension": "p...
2.59375
stackv2
""" The session manages the mechanics of receiving and sending data over the websocket. """ from __future__ import division from __future__ import print_function from __future__ import unicode_literals import logging import math import select import socket import ssl import threading import time from .frame import ...
392
33.43
72
22
2,713
python
[{"finding_id": "codeql_py/insecure-protocol_e1fa60ee96091f10_7658861b", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/insecure-protocol", "py/insecure-default-protocol" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.SSLContext](1).", "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used." ]
[ 139, 146 ]
[ null, null ]
[ 24, 24 ]
[ 35, 45 ]
2024-11-18T21:07:48.539481+00:00
1,587,992,049,000
a3c9344cd620f0f2e488f9f4598b6d6413f086d1
3
{ "blob_id": "a3c9344cd620f0f2e488f9f4598b6d6413f086d1", "branch_name": "refs/heads/master", "committer_date": 1587992049000, "content_id": "30e631d4a4e69b39ba0bb9cd9edf0675995730f7", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "aa3b5ad86b326baa5dcc349a5c857462d8fba0d3", "extension": "p...
2.53125
stackv2
""" Generate static HTML files for eduid-IdP in all supported languages. """ import os import sys import six import pkg_resources from six.moves import configparser from jinja2 import Environment, PackageLoader from babel.support import Translations __version__ = '0.1' __copyright__ = 'SUNET' __organization__ = 'SUN...
167
31.25
98
18
1,165
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_38d1321bca0b0063_078e3e0a", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 150 ]
[ 155 ]
[ 11 ]
[ 24 ]
2024-11-18T21:33:08.116254+00:00
1,508,407,961,000
c66b815cf6a60dd66a5407a695063b0578d92b31
3
{ "blob_id": "c66b815cf6a60dd66a5407a695063b0578d92b31", "branch_name": "refs/heads/master", "committer_date": 1508407961000, "content_id": "2a358ab40897cb9bfd6523d82b8a15ce976865d8", "detected_licenses": [ "MIT" ], "directory_id": "acb457586a9853be26fd709f47c2afd8a7ca1ae4", "extension": "py", "fi...
2.984375
stackv2
# -*- encoding: utf-8 -*- from jinja2 import Environment from jinja2.ext import Extension from jinja2 import nodes class RepeatNTimesExtension(Extension): tags = {"repeat"} def parse(self, parser): lineno = next(parser.stream).lineno index = nodes.Name("_", "store", lineno=lineno) h...
31
31.74
92
13
241
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_37989b7b600c7bc0_b75045a5", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 23 ]
[ null ]
[ 11 ]
[ 58 ]
2024-11-18T21:33:13.989621+00:00
1,600,799,457,000
dde1db1f99c8699055adb9e08e20d3ca713d09b9
2
{ "blob_id": "dde1db1f99c8699055adb9e08e20d3ca713d09b9", "branch_name": "refs/heads/master", "committer_date": 1600799457000, "content_id": "d72aeab55e3aebe8af363225d3126595856c8e62", "detected_licenses": [ "MIT" ], "directory_id": "dadb7de8dc4b43aff916fead4cf36e7b80131b02", "extension": "py", "fi...
2.40625
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- import os import sys root_path = "/".join(os.path.realpath(__file__).split("/")[:-2]) if root_path not in sys.path: sys.path.insert(0, root_path) import json import math import shutil import tarfile import logging import tempfile import random import argparse impo...
147
37.88
130
18
1,143
python
[{"finding_id": "codeql_py/tarslip_6634792f18ecfbd2_232d3a0f", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 99 ]
[ null ]
[ 17 ]
[ 24 ]
2024-11-18T21:33:18.727688+00:00
1,463,990,647,000
e40ab183d95475a1a51f12278704a1fccac80395
3
{ "blob_id": "e40ab183d95475a1a51f12278704a1fccac80395", "branch_name": "refs/heads/master", "committer_date": 1463990647000, "content_id": "06dda8d8457aee1e12396068696e5420fd703154", "detected_licenses": [ "MIT" ], "directory_id": "70a4b0f8b8ed3478a329e82bf8dff08afad9c897", "extension": "py", "fi...
2.71875
stackv2
# -*- coding: utf-8 -*- """ This module shows how to accept BeeCloud webhook push notifications. :created by xuanzhui on 2016/04/22. :copyright (c) 2015 BeeCloud. :license: MIT, see LICENSE for more details. """ # 这边只是演示如何接收beecloud webhook推送,实际项目中请遵循Flask项目规范,不要重复创建Flask app入口 # 接收webhook推送需要确保你的服务端地...
97
19.93
104
17
802
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_cb322db943094c93_26d7091e", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 43 ]
[ null ]
[ 24 ]
[ 92 ]
2024-11-18T21:33:25.168885+00:00
1,689,912,169,000
7a8c2b81d1ce03ce990743f65f032ec71247e34d
3
{ "blob_id": "7a8c2b81d1ce03ce990743f65f032ec71247e34d", "branch_name": "refs/heads/main", "committer_date": 1689912169000, "content_id": "421a117ed0b51425b9aa3bea0e2eb2a892bdcf3f", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "0ed62eec4eea9931f08f383cf657f3ca1a3ef4f9", "extension": "py"...
2.734375
stackv2
# -*- coding: utf-8 -*- """ utils.searcher ~~~~~~~~~~~~~~ This module provides utility functions that are used to search a CEDAR resource (template/element/instance) by specifying the keyword query and some other search parameters (e.g., max_count and limit). If the user doesn't specify the keyword query then the fun...
96
34.9
98
13
795
python
[{"finding_id": "codeql_py/request-without-cert-validation_cdb97c8e7be653d9_148f5ee1", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 94 ]
[ null ]
[ 16 ]
[ 83 ]
2024-11-18T21:55:56.057734+00:00
1,557,854,736,000
e98f41ebea97f1bfdd24cac5ce94b737310faa07
2
{ "blob_id": "e98f41ebea97f1bfdd24cac5ce94b737310faa07", "branch_name": "refs/heads/master", "committer_date": 1557854736000, "content_id": "74a5875746a51136247ddcaf8761d868556b3ccf", "detected_licenses": [ "Unlicense" ], "directory_id": "027293346b06eb8f1aea6824fcd039f413f58cda", "extension": "py",...
2.375
stackv2
#!/usr/bin/env python3 import argparse import collections import datetime import logging import os import plistlib import random import re import subprocess import sys import time from urllib.parse import unquote import psycopg2 DEFAULT_ITUNES_MUSIC_FOLDER = os.path.expanduser('~/Music/iTunes/iTunes Music/') DEFAULT...
260
35.69
115
17
2,099
python
[{"finding_id": "codeql_py/overly-large-range_3020b6a54447a910_177da0fd", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[\\u000e\\u000f\\u0010\\u0011\\u0012\\u0013\\u0014\\u...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[\\u000e\\u000f\\u0010\\u0011\\u0012\\u0013\\u0014\\u0015\\...." ]
[ 251 ]
[ null ]
[ 48 ]
[ 51 ]
2024-11-18T21:56:05.724099+00:00
1,548,291,009,000
12a3dec865ad4132a34cdffe0c0b440954a89c12
2
{ "blob_id": "12a3dec865ad4132a34cdffe0c0b440954a89c12", "branch_name": "refs/heads/master", "committer_date": 1548291009000, "content_id": "39305326a0154831a43d53b583653d0eeb582e42", "detected_licenses": [ "Apache-2.0" ], "directory_id": "7009c9763c93ca5049b8aaac551477d815b628ec", "extension": "py"...
2.484375
stackv2
#!/usr/bin/env python3 import cgi import cgitb import os import json from templates import login_page, secret_page, after_login_incorrect from secret import username, password cgitb.enable() print("Content-Type: text/html") #print() #print("<!doctype html>") #print(login_page()) #printing out username and password #...
72
22.83
68
13
404
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bb39fd96142b8644_12385d76", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 58, 65, 67 ]
[ null, null, null ]
[ 11, 15, 15 ]
[ 46, 60, 46 ]
2024-11-18T22:39:31.307485+00:00
1,656,526,386,000
dbf6bcb7e75a962c49eb48241cc72238e9a454d8
3
{ "blob_id": "dbf6bcb7e75a962c49eb48241cc72238e9a454d8", "branch_name": "refs/heads/master", "committer_date": 1656526386000, "content_id": "f1534bad005b48c099206b7f59b0f45cefdc87e9", "detected_licenses": [ "MIT" ], "directory_id": "c7be50ef7b154f292ad1fd0f04e90b89f558af31", "extension": "py", "fi...
2.578125
stackv2
import warnings warnings.filterwarnings("ignore") import sys sys.path.append("..") from nltk import word_tokenize from nltk.sentiment.vader import SentimentIntensityAnalyzer import pandas as pd import textblob import PretrainedPolitenessModel import re import PPAClient import nltk nltk.download('words') nltk.downl...
118
28.67
104
14
864
python
[{"finding_id": "codeql_py/overly-large-range_58c22b5c013aa76b_77c942b2", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 22 ]
[ null ]
[ 55 ]
[ 58 ]
2024-11-18T22:39:40.181373+00:00
1,637,477,487,000
89e7266b895db450f4ac14d84020cd6f237e7016
2
{ "blob_id": "89e7266b895db450f4ac14d84020cd6f237e7016", "branch_name": "refs/heads/main", "committer_date": 1637477487000, "content_id": "e1b21523d1109585b328d1f572ca5bf50aaba26c", "detected_licenses": [ "MIT" ], "directory_id": "5292b03998384c0d2bb5858058892d7e45c5365b", "extension": "py", "file...
2.5
stackv2
import numpy as np import random from os import urandom from Crypto.Util.number import long_to_bytes, bytes_to_long from Crypto.Cipher import AES from qiskit import ( QuantumCircuit, QuantumRegister, ClassicalRegister, Aer, assemble ) from qiskit.quantum_info.operators import Operator class Ban...
202
35.23
79
21
1,795
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_3da6547b28540ba4_046873c5", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 30, 33 ]
[ null, null ]
[ 16, 16 ]
[ 58, 58 ]
2024-11-18T22:39:40.402528+00:00
1,595,237,647,000
30ee07b92342bd5a8e00ef4448b9049cf84e12f9
2
{ "blob_id": "30ee07b92342bd5a8e00ef4448b9049cf84e12f9", "branch_name": "refs/heads/master", "committer_date": 1595237647000, "content_id": "6d611eaea51848fbfede694fe9daad14df192468", "detected_licenses": [ "MIT" ], "directory_id": "6ceb90b99a45e072425268f964a84b4881ababee", "extension": "py", "fi...
2.3125
stackv2
# service apache2 start # service apache2 stop # http://10.0.2.13/index.html # Targeting a remote computer # iptables -I FORWARD -j NFQUEUE --queue-num 0 # iptables --flush # Testing on the local computer # iptables -I OUTPUT -j NFQUEUE --queue-num 0 # iptables -I INPUT -j NFQUEUE --queue-num 0 # iptables --flush i...
40
27.05
62
14
326
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_488573ca41d08f37_e68d4cea", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [vulnweb.com](1) may be at an arbitrary position in the...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [vulnweb.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 24 ]
[ null ]
[ 12 ]
[ 34 ]
2024-11-18T22:54:56.567485+00:00
1,540,966,306,000
799886fde7091780390e4060a0f468dd5970eb81
3
{ "blob_id": "799886fde7091780390e4060a0f468dd5970eb81", "branch_name": "refs/heads/master", "committer_date": 1540966306000, "content_id": "42e439abca54ad31d720d2930505ffdeca79e97b", "detected_licenses": [ "MIT" ], "directory_id": "17445cb52e37ddd20db8edb98f0bf19af934b53b", "extension": "py", "fi...
2.5625
stackv2
# -*- coding: utf-8 -*- import jinja2 from distutils.dir_util import copy_tree class SiteGenerator(): def __init__(self): self.t_loader = jinja2.FileSystemLoader(searchpath='templates/') self.t_env = jinja2.Environment(loader=self.t_loader) def publish(self, name, content): with open(...
66
27.26
72
14
441
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_bac0c0f6752fb72f_67edc411", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 9 ]
[ null ]
[ 22 ]
[ 62 ]
2024-11-18T23:06:18.201214+00:00
1,467,786,200,000
02759bc19a0de20608923e09f684d33fe1461de2
2
{ "blob_id": "02759bc19a0de20608923e09f684d33fe1461de2", "branch_name": "refs/heads/master", "committer_date": 1467786200000, "content_id": "96e57d2e057a0452b200b0adbc7294029f016630", "detected_licenses": [ "MIT" ], "directory_id": "93a5773f1a6caf5c929435630eef8b770dc0a450", "extension": "py", "fi...
2.3125
stackv2
from flask import render_template, request, jsonify from flask.ext.socketio import SocketIO, emit from sqlalchemy import text from IPy import IP from index import app, db socketio = SocketIO(app) # set postgres like this: export DATABASE_URL='postgresql://pat:[password]@localhost/ip_coordinates' @socketio.on('clien...
54
31.22
122
16
427
python
[{"finding_id": "codeql_py/sql-injection_0a7ca1a4c952f052_efb75a59", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown...
1
true
[ "CWE-089" ]
[ "py/sql-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This SQL query depends on a [user-provided value](1)." ]
[ 25 ]
[ null ]
[ 17 ]
[ 28 ]
2024-11-18T23:06:19.122447+00:00
1,585,634,238,000
0955954e9750fc6cd7eb6c13508a3820d8f35364
3
{ "blob_id": "0955954e9750fc6cd7eb6c13508a3820d8f35364", "branch_name": "refs/heads/master", "committer_date": 1585634238000, "content_id": "bf638c234f46eb2f3bbf3bb7257bb8e6db1827a3", "detected_licenses": [ "Apache-2.0" ], "directory_id": "ef58faf726ab9a4b1d711c8c1d17063d8e3a7b81", "extension": "py"...
2.765625
stackv2
""" Copyright 2018 Banco Bilbao Vizcaya Argentaria, S.A. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed ...
210
38.8
106
20
1,846
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b784a812ab7a0c57_b8688473", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 37 ]
[ null ]
[ 13 ]
[ 106 ]
2024-11-18T23:06:21.390202+00:00
1,549,370,812,000
622a4980478d014cea66734400aeb94f2b65c536
3
{ "blob_id": "622a4980478d014cea66734400aeb94f2b65c536", "branch_name": "refs/heads/master", "committer_date": 1549370812000, "content_id": "b9b41b371f984bff65c5c40ebbc6ec4c479c9e9f", "detected_licenses": [], "directory_id": "41bab1de20a739bd792ce7adb947d1d9f66414e2", "extension": "py", "filename": "twe...
2.546875
stackv2
# -*- coding: utf-8 -*-: import geocoder import csv import calendar import tweepy from google.cloud import storage from tweepy import Stream from tweepy import StreamListener from tweepy import OAuthHandler import json clientSt = storage.Client(project='abgcorp-vicsafe') bucket = clientSt.get_bucket('abgcorp-vicsafe')...
470
34.83
152
23
3,507
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_7c828b83ba3dfc12_e6161c60", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",...
4
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.", "This expression stores [sensitive data (private)](1) as clear text.", "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.\nThis expression stores [sensiti...
[ 140, 142, 164, 116 ]
[ null, null, null, null ]
[ 39, 39, 27, 19 ]
[ 47, 53, 39, 105 ]
2024-11-18T20:56:57.507184+00:00
1,603,745,635,000
74e5477c0f4aec988d3ef6557d2cecd75317fddc
2
{ "blob_id": "74e5477c0f4aec988d3ef6557d2cecd75317fddc", "branch_name": "refs/heads/master", "committer_date": 1603745635000, "content_id": "a196e1447281e7e448f74e740a37372115a2aebe", "detected_licenses": [ "MIT" ], "directory_id": "9533e8aa19107ac534056b19c1e3200224d7cf16", "extension": "py", "fi...
2.4375
stackv2
import logging FORMAT = '%(asctime)-15s %(message)s' logging.basicConfig(level=logging.DEBUG, format=FORMAT) from config.env import DESTINATION_AUTH, DESTINATION_URL import os, base64 from functools import wraps from cleaner import cleaner from flask import Flask, request, jsonify, Response import json, requests from ...
93
31.33
98
16
658
python
[{"finding_id": "codeql_py/stack-trace-exposure_e27d8d1fcd03f030_e32c17d8", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-295" ]
[ "py/stack-trace-exposure", "py/request-without-cert-validation" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "This request may run without certificate validation because [it is disabled](1)." ]
[ 82, 59 ]
[ null, 62 ]
[ 24, 19 ]
[ 55, 46 ]
2024-11-18T22:44:01.910805+00:00
1,492,547,306,000
4bc691ae1024ac6098c863c51df55c3eed0c413e
4
{ "blob_id": "4bc691ae1024ac6098c863c51df55c3eed0c413e", "branch_name": "refs/heads/master", "committer_date": 1492547306000, "content_id": "b1827c18aca9283f8be52ee8901a2e244349e38e", "detected_licenses": [ "MIT" ], "directory_id": "875522d8813632a5ee0c053ce29dcbcff0ec331e", "extension": "py", "fi...
3.578125
stackv2
from Department import Department class Departments: """Contains methods for maintaining a Department Methods: -------- build_departments sell_stock purchase_stock """ def __init__(self, name, supervisor, employee_count=0, stock=None): self.name = name self.supervisor = supervisor s...
102
28.39
98
12
759
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d542ee3440d896e8_61c87a43", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
4
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.\nThis expression logs [sensitive data (private)](4) as clear text.", "This expression logs [sensitive data (priva...
[ 34, 42, 45, 53 ]
[ null, null, null, null ]
[ 11, 28, 7, 7 ]
[ 64, 53, 23, 18 ]
2024-11-18T23:10:40.261628+00:00
1,682,619,413,000
05c9d3ce4907311a6830e678773f773208ef28f2
3
{ "blob_id": "05c9d3ce4907311a6830e678773f773208ef28f2", "branch_name": "refs/heads/master", "committer_date": 1682619413000, "content_id": "46a57e21b2074256467df5f45fa17978cf706bab", "detected_licenses": [ "MIT" ], "directory_id": "9c93ea752f1d1b7275be3fb5f58d30f9ee69a2ab", "extension": "py", "fi...
2.5625
stackv2
import inspect import os import select import string import sys import termios import tty import time from contextlib import contextmanager from getpass import getuser from hashlib import md5 from io import BytesIO, StringIO from pathlib import Path import paramiko import yaml from paramiko.client import SSHClient, Wa...
518
28.7
79
23
3,433
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_74fdafb006692ebd_f693d300", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to WarningPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to WarningPolicy may be unsafe." ]
[ 209 ]
[ null ]
[ 9 ]
[ 66 ]
2024-11-18T23:10:41.158682+00:00
1,693,348,322,000
4eced98afd83e330be5ecdb9fe93082070c2eef6
2
{ "blob_id": "4eced98afd83e330be5ecdb9fe93082070c2eef6", "branch_name": "refs/heads/master", "committer_date": 1693348322000, "content_id": "074f15f732038140073867bb44cdfaac461eecff", "detected_licenses": [ "Apache-2.0" ], "directory_id": "5ef6c8d47864f471e26b9902d61f8c687e941f05", "extension": "py"...
2.390625
stackv2
''' show_config.py IOSXE parsers for the following show command * show configuration lock ''' # Python import re # Metaparser from genie.metaparser import MetaParser from genie.metaparser.util.schemaengine import Schema, \ Optional, \ ...
312
37.23
113
22
2,476
python
[{"finding_id": "codeql_py/redos_ed1348c7b9b3b4d2_a0dec4c1", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'User debug info : ' and containin...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with 'User debug info : ' and containing many repetitions of '0'." ]
[ 86 ]
[ null ]
[ 26 ]
[ 30 ]
2024-11-18T22:29:49.633932+00:00
1,327,074,718,000
ddc2c9343a7575d82b8fa4dfb974aad3a46228ce
2
{ "blob_id": "ddc2c9343a7575d82b8fa4dfb974aad3a46228ce", "branch_name": "refs/heads/master", "committer_date": 1327074718000, "content_id": "b058d4e084600845ca2ad81eca6c69724b4cad22", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "58a3c68a5965a30858c5cdf5a3357741098c18aa", "extension": "p...
2.484375
stackv2
import ssl, socket, urlparse from mimetools import Message from StringIO import StringIO FRAME_START = "\x00" FRAME_END = "\xff" class WebSocketError(Exception): def __init__(self, value): self.value = value def __str__(self): return str(self.value) class WebSocket(object): def __init__( ...
130
30.32
125
21
1,027
python
[{"finding_id": "codeql_py/insecure-default-protocol_476d9cf3c3adb745_24f90524", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in...
1
true
[ "CWE-327" ]
[ "py/insecure-default-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used." ]
[ 34 ]
[ 36 ]
[ 25 ]
[ 14 ]
2024-11-18T22:29:52.600634+00:00
1,519,162,890,000
c48a09d79c46ae4b64586c928a360767512f108b
3
{ "blob_id": "c48a09d79c46ae4b64586c928a360767512f108b", "branch_name": "refs/heads/master", "committer_date": 1519162890000, "content_id": "eb0f15791d208c7e829a25f39acade8a0fe0c835", "detected_licenses": [ "MIT" ], "directory_id": "9a6b4802ef2c7274cf49501ec97e1e240a99e122", "extension": "py", "fi...
2.609375
stackv2
"""Python library to connect deCONZ and Home Assistant to work together.""" import asyncio import logging import aiohttp import async_timeout _LOGGER = logging.getLogger(__name__) @asyncio.coroutine def async_get_api_key(loop, host, port, username=None, password=None, **kwargs): """Get a new API key for devicet...
73
34.89
96
16
628
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_55934d830beedbaf_e3438953", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive dat...
[ 58, 66, 69 ]
[ null, null, null ]
[ 55, 63, 61 ]
[ 58, 66, 64 ]
2024-11-18T22:29:54.368591+00:00
1,459,639,145,000
943cdfd4726e5f051a2636fdc098566fa6f66f8b
2
{ "blob_id": "943cdfd4726e5f051a2636fdc098566fa6f66f8b", "branch_name": "refs/heads/master", "committer_date": 1459639145000, "content_id": "ef29af7835f5d778ce688c52b645b15763cce0e9", "detected_licenses": [ "MIT" ], "directory_id": "5c9c140cf86d059e5fd400d9a23c992ac420b153", "extension": "py", "fi...
2.328125
stackv2
from jinja2 import Template from jinja2 import Environment, PackageLoader from jinja2 import FileSystemLoader from premailer import transform import smtplib from private import username, passw def createhtmlmail(html, text, subject, fromEmail): """Create a mime-message that will render HTML in popular MUAs, te...
101
31.39
83
13
844
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_891d550b4bc536a1_f91904a2", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 79 ]
[ null ]
[ 11 ]
[ 69 ]
2024-11-18T23:21:51.971946+00:00
1,585,862,269,000
4a3a5d1125b697ba351c2089bbd31321e56f3dd6
3
{ "blob_id": "4a3a5d1125b697ba351c2089bbd31321e56f3dd6", "branch_name": "refs/heads/master", "committer_date": 1585941966000, "content_id": "e83bc4ebca73fe95981071f38ff00738950d4c69", "detected_licenses": [ "MIT" ], "directory_id": "d7bae114e50e8ca1bbf739474c7a68e8d7e976dd", "extension": "py", "fi...
3.234375
stackv2
import binascii import hashlib import hmac import os import secrets def check_password(current: str, password: str) -> bool: salt = current[:64] stored_password = current[64:] password_hash = hashlib.pbkdf2_hmac( "sha512", password.encode("utf-8"), salt.encode("ascii"), 100000 ) password_h...
55
34.53
84
14
507
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_c3f60f6f97272d29_8d5fb7b4", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecu...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecure.\n[Sensitive data (secret)](2) is used in a hashing algorithm (SHA1) that is insecure." ]
[ 49 ]
[ null ]
[ 24 ]
[ 41 ]
2024-11-18T21:33:40.184028+00:00
1,549,615,359,000
c27e3fbce12a50f5ff2d103927f277bdd7b3b41b
2
{ "blob_id": "c27e3fbce12a50f5ff2d103927f277bdd7b3b41b", "branch_name": "refs/heads/master", "committer_date": 1549615359000, "content_id": "c02b8a4975c9c6de96774f0d519e78fdb0d2aec8", "detected_licenses": [ "MIT" ], "directory_id": "b7f2478f4c47686043f14eb3196c9b1eff6187f7", "extension": "py", "fi...
2.453125
stackv2
# encoding: utf8 from flask import Flask from flask import json from datetime import datetime import requests from bs4 import BeautifulSoup from parse import * from functools import wraps from flask import request import re app = Flask(__name__) from werkzeug.contrib.cache import SimpleCache cache = SimpleCache() #...
231
28.34
140
16
1,684
python
[{"finding_id": "codeql_py/partial-ssrf_a0fe8bbdf676f699_b5f886ce", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
3
true
[ "CWE-918", "CWE-918", "CWE-918" ]
[ "py/partial-ssrf", "py/partial-ssrf", "py/partial-ssrf" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depends on a [user-provided value](2).", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 84, 112, 149 ]
[ null, null, null ]
[ 9, 9, 9 ]
[ 43, 43, 43 ]
2024-11-18T23:15:49.345380+00:00
1,595,732,374,000
5212bbe649fbe9a6bc7137c0757a61ba239b7324
2
{ "blob_id": "5212bbe649fbe9a6bc7137c0757a61ba239b7324", "branch_name": "refs/heads/master", "committer_date": 1595732374000, "content_id": "2bd6129945821e8e840a2a8c11455ed434fdd159", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "779016d79175352ab10061e461d075d9ccc9e87f", "extension": "p...
2.390625
stackv2
import requests import sys import json import os import time import logging import tabulate import yaml from logging.handlers import TimedRotatingFileHandler requests.packages.urllib3.disable_warnings() from requests.packages.urllib3.exceptions import InsecureRequestWarning def get_logger(logfile, level): ''' ...
277
36.38
119
18
1,804
python
[{"finding_id": "codeql_py/request-without-cert-validation_0ac15727226b0231_3270f254", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
4
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 54, 70, 171, 254 ]
[ null, null, null, null ]
[ 20, 20, 20, 20 ]
[ 70, 72, 99, 99 ]
2024-11-18T23:15:54.661984+00:00
1,607,008,373,000
4163b83c3897748874c5d23d8f7811c9bb48f340
3
{ "blob_id": "4163b83c3897748874c5d23d8f7811c9bb48f340", "branch_name": "refs/heads/master", "committer_date": 1607008373000, "content_id": "9a93810863c3ef26c52b1acf9434850eb71661c3", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "ac61fbdcb8c49a0a0915dca392bdabf2ccaf4191", "extension": "p...
2.703125
stackv2
#File inladen #URl ophalen # Output checken import requests import sys fileName = "./words.txt" login_url = "http://192.168.178.122:88/cgi-bin/CGIProxy.fcgi?cmd=logIn&usrName=wificam&remoteIp=192.168.178.122&groupId=673982479&pwd=^PASS^&usr=wificam&pwd=^PASS^" logout_url = "http://192.168.178.122:88/cgi-bin/CGIProxy....
62
22.45
164
13
480
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ceafe78c51b88d07_1664147e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 45, 55 ]
[ null, null ]
[ 9, 8 ]
[ 15, 16 ]
2024-11-18T22:30:29.493425+00:00
1,606,627,158,000
0fe2b6abe397401750ffb7cd3c6271ea3ebe8a9d
2
{ "blob_id": "0fe2b6abe397401750ffb7cd3c6271ea3ebe8a9d", "branch_name": "refs/heads/main", "committer_date": 1606627158000, "content_id": "f3ea1c08ca786f903a7e9d066ce13f02f37aaaaf", "detected_licenses": [ "Apache-2.0" ], "directory_id": "af55e889b7eddc58f20a0906083f2e76b589c6c7", "extension": "py", ...
2.40625
stackv2
import argparse import csv import jinja2 import sys parser = argparse.ArgumentParser() parser.add_argument('input_file', nargs='?', type=argparse.FileType('r', encoding='utf-8'), default=sys.stdin) parser.add_argument('output_file', nargs='?', type=argparse.FileType('w', encoding='utf-8'), default=sys.stdout) args = p...
61
24.64
112
13
399
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_693071d15ee3b18b_2eeb48b1", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 56 ]
[ null ]
[ 7 ]
[ 84 ]
2024-11-18T22:44:48.006873+00:00
1,606,692,467,000
aef098d5cace735f214cdeed23c2d0eb5e7aae9c
3
{ "blob_id": "aef098d5cace735f214cdeed23c2d0eb5e7aae9c", "branch_name": "refs/heads/master", "committer_date": 1606692467000, "content_id": "f3fa73cbb4bd6394a220dc462b13aaeb617db9d0", "detected_licenses": [ "MIT" ], "directory_id": "8d0951f6ef1918e6c775b1a193f58e69c2b9b64a", "extension": "py", "fi...
2.71875
stackv2
import string import getpass import urllib.request import json import sys import operator import os import re from datetime import datetime, timezone from time import sleep stream = "" accessToken = "" getChat = False getCommentorStats = False getImageLog = False getVideoLog = False #Setup to stage the execution of ...
403
32.67
93
23
3,123
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_4bb730d4b8dbffac_b9d7a85f", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This string, which is used as a regular expression [here](1), has an unescaped '.' befor...
1
true
[ "CWE-020" ]
[ "py/incomplete-hostname-regexp" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This string, which is used as a regular expression [here](1), has an unescaped '.' before 'groupme.com/', so it might match more hosts than expected.\nThis string, which is used as a regular expression [here](2), has an unescaped '.' before 'groupme.com/', so it might match more hosts than expected." ]
[ 328 ]
[ null ]
[ 16 ]
[ 45 ]
2024-11-18T23:37:08.036551+00:00
1,612,099,241,000
750df554f3e1704c1bb842eaf86d4d586d2be9ea
4
{ "blob_id": "750df554f3e1704c1bb842eaf86d4d586d2be9ea", "branch_name": "refs/heads/main", "committer_date": 1612099241000, "content_id": "2db67fdfbd14913a9682a6f3b7f7864f9fecbc12", "detected_licenses": [ "MIT" ], "directory_id": "04d02719ebd8c8866943b0c0e116f904a2f2690d", "extension": "py", "file...
4.34375
stackv2
'''3. Faça um programa que leia e valide as seguintes informações: Nome: maior que 3 caracteres; Idade: entre 0 e 150; Salário: maior que zero; Sexo: 'f' ou 'm'; Estado Civil: 's', 'c', 'v', 'd';''' name = str(input('Name: ')) while len(name) < 3: print('TRY AGAIN!\nName must be longer than 3 cha...
40
29.35
66
15
374
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b14255f07d8b127e_f8fc5068", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 37, 38 ]
[ null, null ]
[ 7, 7 ]
[ 26, 26 ]
2024-11-18T21:57:34.418042+00:00
1,594,807,001,000
e5bb19b2184573bed336edcdffad141d0f4339f2
2
{ "blob_id": "e5bb19b2184573bed336edcdffad141d0f4339f2", "branch_name": "refs/heads/master", "committer_date": 1594807001000, "content_id": "cd3689800bcbcbbd08562f66ef47f659354baf40", "detected_licenses": [ "MIT" ], "directory_id": "d6a2eddca83007209ba6f2eda6c426df7a8b9f1c", "extension": "py", "fi...
2.40625
stackv2
""" Wrapper class for MPTinR. """ import math import re import numpy as np from mptpy.fitting import fitter from . import likelihood as lh from . import optimize as optim FUNCS = {"rmse": optim.optim_rmse, "llik": optim.optim_llik} # def __init__(self, data_path, sep=',', func="rmse", header=None): # super()...
265
24.71
112
15
1,790
python
[{"finding_id": "codeql_py/overly-large-range_f2572eed4f72f448_915ec5e7", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 58 ]
[ null ]
[ 29 ]
[ 32 ]
2024-11-18T21:57:35.919321+00:00
1,436,515,514,000
901b093e46fe58abbee5e4d7fafb2711bbee3930
3
{ "blob_id": "901b093e46fe58abbee5e4d7fafb2711bbee3930", "branch_name": "refs/heads/master", "committer_date": 1436515514000, "content_id": "e136d72e2f154404a544ea05a905cd04892e711a", "detected_licenses": [ "MIT" ], "directory_id": "1d9aef7fc32bfbe3de98781f1001389a6f62a02b", "extension": "py", "fi...
2.6875
stackv2
from dashie_sampler import DashieSampler import random import requests import collections import re import datetime class ConfluenceCutFromDevelopAndRelease(DashieSampler): def __init__(self, *args, **kwargs): DashieSampler.__init__(self, *args, **kwargs) def name(self): return 'conflu...
48
41.1
163
13
484
python
[{"finding_id": "codeql_py/request-without-cert-validation_0f4a24571cde1adc_359a1dd8", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 21 ]
[ null ]
[ 20 ]
[ 164 ]
2024-11-18T21:57:54.524932+00:00
1,482,182,070,000
4bdc3c963da0523a1fdb9c29a643bf10fe66fc3e
3
{ "blob_id": "4bdc3c963da0523a1fdb9c29a643bf10fe66fc3e", "branch_name": "refs/heads/master", "committer_date": 1482182070000, "content_id": "3b42deaa343cb8d689d41149971e2ec82cfa2ca2", "detected_licenses": [ "MIT" ], "directory_id": "fb0d9a62b13dc9cf71ab9edda4821a894039c943", "extension": "py", "fi...
2.828125
stackv2
#!/usr/bin/python from flask import Flask from flask import render_template import json import RPi.GPIO as GPIO from time import sleep from multiprocessing.pool import ThreadPool app = Flask(__name__) activeleds = [12,18,24,25] GPIO.setmode(GPIO.BCM) GPIO.setwarnings(False) def togglepin(pin): if GPIO.input(pin):...
67
22.34
61
13
447
python
[{"finding_id": "codeql_py/flask-debug_901ed43167aad11d_98ee8718", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-079", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 67, 54, 62 ]
[ null, null, null ]
[ 3, 12, 12 ]
[ 45, 62, 60 ]
2024-11-18T21:58:09.020146+00:00
1,563,439,533,000
d75e099366f6f0346574febc727017f82f0c0d0a
3
{ "blob_id": "d75e099366f6f0346574febc727017f82f0c0d0a", "branch_name": "refs/heads/master", "committer_date": 1563439533000, "content_id": "c1e545953aee30970cdb07b0666db22b93ae4e7b", "detected_licenses": [ "Apache-2.0" ], "directory_id": "d1a54642fbef0972acea171d738186bac4c2c05c", "extension": "py"...
2.765625
stackv2
""" Wrapper for pretrained Deepbind """ import os import math import tarfile import tempfile import subprocess import numpy as np from .core import TextModel from subprocess import PIPE from spacy.tokens import Doc from spacy.vocab import Vocab from ..core import Task from spacy.language import Language DEEPBIND_CLAS...
114
30.14
150
20
866
python
[{"finding_id": "codeql_py/tarslip_1fbd30f174120c16_9d7cd89b", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 104 ]
[ null ]
[ 17 ]
[ 26 ]
2024-11-18T21:58:22.189920+00:00
1,692,089,812,000
1a10fb29f3012b653e7c3413947b42fcc9e5e4cb
4
{ "blob_id": "1a10fb29f3012b653e7c3413947b42fcc9e5e4cb", "branch_name": "refs/heads/master", "committer_date": 1692089812000, "content_id": "ef882f4237fec32adaab20e272e9c4ffe241f751", "detected_licenses": [ "Apache-2.0" ], "directory_id": "d30de65ce6c2491bde4d2fa1225415a41305e3a7", "extension": "py"...
4.25
stackv2
""" 面向对象技术简介 类(Class): 用来描述具有相同的属性和方法的对象的集合。它定义了该集合中每个对象所共有的属性和方法。对象是类的实例。 类变量:类变量在整个实例化的对象中是公用的。类变量定义在类中且在函数体之外。类变量通常不作为实例变量使用。 数据成员:类变量或者实例变量, 用于处理类及其实例对象的相关的数据。 方法重写:如果从父类继承的方法不能满足子类的需求,可以对其进行改写,这个过程叫方法的覆盖(override),也称为方法的重写。 局部变量:定义在方法中的变量,只作用于当前实例的类。 实例变量:在类的声明中,属性是用变量来表示的。这种变量就称为实例变量,是在类声明的内部但是在类的其他成员方法之外声明的。 继承...
62
21.73
97
11
605
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b4769274ce03f15f_c710fc06", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 59 ]
[ null ]
[ 7 ]
[ 97 ]
2024-11-18T21:58:27.501452+00:00
1,661,771,678,000
bf914ed3dfd4be01ffe6698cdd3812a279aa20b5
3
{ "blob_id": "bf914ed3dfd4be01ffe6698cdd3812a279aa20b5", "branch_name": "refs/heads/master", "committer_date": 1661771678000, "content_id": "cecd8d09b33aba8b4c0391541c81653f9f21d71d", "detected_licenses": [ "CC0-1.0" ], "directory_id": "1286ed0470bb1448f31a9e4e0410cd73f241b692", "extension": "py", ...
2.890625
stackv2
"""Validators and converters for regolith input.""" import os from getpass import getpass from regolith.tools import string_types def noop(x): """Does nothing, just returns the input.""" return x def is_int(x): """Tests if something is an integer""" return isinstance(x, int) def always_true(x): ...
114
25.07
72
14
751
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_90aec521ae6abfee_dd070ec2", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 97 ]
[ null ]
[ 21 ]
[ 22 ]
2024-11-18T21:58:30.428398+00:00
1,509,606,811,000
9b1a2016a7d9b1da4ae71c3f7bc677207fd6bad8
2
{ "blob_id": "9b1a2016a7d9b1da4ae71c3f7bc677207fd6bad8", "branch_name": "refs/heads/master", "committer_date": 1509606811000, "content_id": "fb8060d2f8f6848eb1c0827ce1fc2466b515ab94", "detected_licenses": [ "Apache-2.0" ], "directory_id": "b15c47a45207e854fb002d69f7e33f8943a5e2b3", "extension": "py"...
2.328125
stackv2
import json from rest_framework.response import Response from rest_framework.views import APIView import coreapi class WorkFlowDataReuse(APIView): coreapi_fields = ( coreapi.Field( name='node_id', required=True, type='string', ), ) def post(self, request...
53
29.96
76
15
343
python
[{"finding_id": "codeql_py/stack-trace-exposure_b66f1a0181128f32_83bb7abe", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 32, 52 ]
[ null, null ]
[ 29, 29 ]
[ 52, 52 ]
2024-11-18T21:58:31.462266+00:00
1,444,847,110,000
1d74063c02f391dab88b31a4114a691506e3ee4c
3
{ "blob_id": "1d74063c02f391dab88b31a4114a691506e3ee4c", "branch_name": "refs/heads/master", "committer_date": 1444847110000, "content_id": "13a9cf09be596245cb03604a84ab48e4c388376a", "detected_licenses": [ "MIT" ], "directory_id": "8bacda6f9c88370546e1fc4c1b4c61b27f4b6c9c", "extension": "py", "fi...
2.8125
stackv2
#!/usr/bin/python """ Simple Python HTTP Server with HTTPS and basic authorization support. See --help for usage guide. Author: Mehran Ahadi Homepage: http://mehran.ahadi.me/ License: MIT Repository: https://github.com/zxcmehran/SecurePyServer Version 1.1 """ import BaseHTTPServer from SimpleHTTPServer import Simpl...
174
30.27
136
17
1,346
python
[{"finding_id": "codeql_py/insecure-protocol_924040f8ebac7991_4652f6b0", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 specified by [call to ssl.wrap_socket](1).", "remediation": "", "l...
1
true
[ "CWE-327" ]
[ "py/insecure-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Insecure SSL/TLS protocol version TLSv1 specified by [call to ssl.wrap_socket](1)." ]
[ 110 ]
[ null ]
[ 21 ]
[ 130 ]