added
stringlengths
32
32
created
int64
1,236B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.03
source
stringclasses
1 value
text
stringlengths
330
19.3k
num_lines
int64
16
648
avg_line_length
float64
15.5
59.3
max_line_length
int64
37
179
ast_depth
int64
8
38
length
int64
102
3.79k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.11k
276k
sast_codeql_findings_count
int64
1
33
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
33
rule_ids
listlengths
1
33
confidences
listlengths
1
33
severities
listlengths
1
33
messages
listlengths
1
33
line_starts
listlengths
1
33
line_ends
listlengths
1
33
column_starts
listlengths
1
33
column_ends
listlengths
1
33
2024-11-18T23:06:20.600792+00:00
1,618,021,243,000
31e2df52cebdcd83e686d09961e7dc8bf0a0a6a1
3
{ "blob_id": "31e2df52cebdcd83e686d09961e7dc8bf0a0a6a1", "branch_name": "refs/heads/master", "committer_date": 1618021243000, "content_id": "6d9231ab80d9898850cc9fe8a4557af950125931", "detected_licenses": [ "Apache-2.0" ], "directory_id": "2b69c7bc88235e75fc5a67d41e53f8ecf91390d9", "extension": "py"...
2.578125
stackv2
# Copyright 2021 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # https://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, ...
173
41.31
118
21
1,680
python
[{"finding_id": "codeql_py/request-without-cert-validation_4d2308163dbedace_621cd14c", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 37 ]
[ null ]
[ 16 ]
[ 85 ]
2024-11-18T20:56:57.733053+00:00
1,682,101,480,000
346fcca95a8313f2cfa406a03ac7da4695ae2067
3
{ "blob_id": "346fcca95a8313f2cfa406a03ac7da4695ae2067", "branch_name": "refs/heads/master", "committer_date": 1682101480000, "content_id": "c15760ca0fe4a30fa5221a0e764bbae521a063d3", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "d3996cf8c4e4f739f22175213a50685719287a54", "extension": "p...
2.953125
stackv2
""" ``sklearn_xarray.datasets`` """ import numpy as np import pandas as pd import xarray as xr def load_dummy_dataarray(): """ Load a DataArray for demonstration purposes. """ return xr.DataArray( np.random.random((100, 10)), coords={"sample": range(100), "feature": range(10)}, dims=...
144
25.04
77
17
900
python
[{"finding_id": "codeql_py/tarslip_5649d8e4284d248f_1d571eea", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 121 ]
[ null ]
[ 9 ]
[ 12 ]
2024-11-18T23:10:43.059511+00:00
1,543,904,370,000
4497af4fda72afa8f56c03dc9ba23216dbdd3d99
3
{ "blob_id": "4497af4fda72afa8f56c03dc9ba23216dbdd3d99", "branch_name": "refs/heads/master", "committer_date": 1543904370000, "content_id": "2b7f796a3b6a444304a7b529eccf30816d9f2ad7", "detected_licenses": [ "MIT" ], "directory_id": "d3ea3ca5c4d5b7b5ae5e26948cba7cb29f71b97d", "extension": "py", "fi...
2.65625
stackv2
from flask import render_template, url_for, flash, redirect, request from homepg import app, db, bcrypt from homepg.models import User, Household, Activity from homepg.forms import RegistrationForm, LoginForm, CreateHome from flask_login import login_user, current_user, logout_user, login_required @app.route("/") @app...
116
29.97
103
19
739
python
[{"finding_id": "codeql_py/url-redirection_1d7c11653680500e_4eb0a56f", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 66 ]
[ null ]
[ 29 ]
[ 38 ]
2024-11-18T23:10:47.977726+00:00
1,490,150,532,000
9df3db4fa309d8bb7a3eb1126e262663ea8821f8
3
{ "blob_id": "9df3db4fa309d8bb7a3eb1126e262663ea8821f8", "branch_name": "refs/heads/master", "committer_date": 1490150532000, "content_id": "513eb816f241f3018793c5007d4513f60b8fd809", "detected_licenses": [ "MIT" ], "directory_id": "e6e5e9e10c61db73df93b3269ae869621ca13687", "extension": "py", "fi...
2.578125
stackv2
# -*- coding:utf-8 -*- import collections import hashlib import traceback import requests import logging from random import randint from wxpy import Message logger = logging.getLogger(__name__) class IBot(object): """ * 与 wxpy 深度整合的小i机器人 * 需获取 Key和Secret: http://cloud.xiaoi.com/ """ def __init__(self, app_ke...
97
23.04
88
15
739
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_555af29ca1ff10f4_c74d2178", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecu...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecure." ]
[ 43 ]
[ null ]
[ 23 ]
[ 27 ]
2024-11-18T23:10:50.586652+00:00
1,581,099,363,000
ee854dd33afcf2360e84d30da0ff692406cc75cd
3
{ "blob_id": "ee854dd33afcf2360e84d30da0ff692406cc75cd", "branch_name": "refs/heads/master", "committer_date": 1581099363000, "content_id": "f4c115f3b24841aa9dbb4e26d9b65cedc4f0f966", "detected_licenses": [ "MIT" ], "directory_id": "f87d3c29736cb7249409ad3f6584981a16cf7210", "extension": "py", "fi...
2.828125
stackv2
#!/usr/bin/python3 # -*- coding: utf-8 -*- from web3 import Web3 from sys import exit import os, time, json import getpass, hashlib CPURP = '\033[95m' CGREEN = '\033[92m' CRED = '\033[91m' CEND = '\033[0m' def load_contract(): while True: with open('build/contracts/ChainsawClub.json') as f: co...
112
30.82
82
21
842
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_7b7207d1d106083b_97d323b0", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 57 ]
[ null ]
[ 22 ]
[ 41 ]
2024-11-18T22:29:34.612270+00:00
1,607,325,973,000
3036813ff955c6b0dc55aae86ea6a61c3226929a
2
{ "blob_id": "3036813ff955c6b0dc55aae86ea6a61c3226929a", "branch_name": "refs/heads/master", "committer_date": 1607325973000, "content_id": "e557ca5aefe989071ea17ec08a1ceee21a16a5f6", "detected_licenses": [ "MIT" ], "directory_id": "ab9f57da5bc4fd99bc1c2758f672e8be295731d7", "extension": "py", "fi...
2.421875
stackv2
import hashlib import hmac import json import logging from pprint import pprint import dateparser import requests from flask import Flask, current_app, request from googleapiclient.errors import HttpError from slack.errors import SlackApiError import server.config as config from server.after_this_response import Afte...
138
31.27
87
18
1,011
python
[{"finding_id": "codeql_py/log-injection_e966583bc3ec7655_4ea4489d", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
3
true
[ "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 72, 77, 83 ]
[ null, null, null ]
[ 64, 59, 61 ]
[ 72, 63, 65 ]
2024-11-18T22:29:51.594481+00:00
1,545,404,327,000
f99055b4020da10487481671656792eb1c75b847
3
{ "blob_id": "f99055b4020da10487481671656792eb1c75b847", "branch_name": "refs/heads/master", "committer_date": 1545404327000, "content_id": "5c09227e5e40b8475fff0cf2f450ef12acba99e8", "detected_licenses": [ "MIT" ], "directory_id": "4d20dff6b7c6e21ae08e45a55ff0f1c2553f2ddf", "extension": "py", "fi...
2.96875
stackv2
import requests import string import os import sys import time from base64 import b64decode # setting globals and vars sess = requests.Session() cookies = [] BIN_QUERY = "' or {} {} {};-- " MAX_LENGTH = 100 MAX_CHAR_VALUE = 2 ** 7 - 1 # 7 bit ascii is bae ############################# # USER PARAMS HERE #...
71
23.97
71
15
483
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5dac42b8ad911e56_c3a8360f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 69 ]
[ null ]
[ 11 ]
[ 50 ]
2024-11-18T22:29:57.301776+00:00
1,607,176,192,000
4889db8b27d65eb7a601e152084de19a2e1533de
4
{ "blob_id": "4889db8b27d65eb7a601e152084de19a2e1533de", "branch_name": "refs/heads/main", "committer_date": 1607176192000, "content_id": "e4c608bb005e85ee54bc059e86b3b095e423378c", "detected_licenses": [ "MIT" ], "directory_id": "457ea969b4b5115b2992b8db5578011a720a87a8", "extension": "py", "file...
3.515625
stackv2
# /usr/bin/env python # coding: utf-8 from Crypto.Cipher import AES from constant.constant import Constant class AESCrypto(object): def __init__(self, key, init_vector=None, mode=Constant.MODE_CBC): """ 初始化 :param key: 加密密钥 :param init_vector: 初始化向量 :param mode: AES加密方式,默认为...
97
25.39
86
16
676
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_9ac96566349f9aaa_4bc1a7a6", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode CBC](1) is broken or weak, and should not be used.\n[The block mode ...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[The block mode CBC](1) is broken or weak, and should not be used.\n[The block mode ECB](2) is broken or weak, and should not be used.\n[The block mode CBC](3) is broken or weak, and should not be used.\n[The block mode ECB](4) is broken or weak, and should not be used.", "[The block mode CBC](1) is broken or we...
[ 57, 73 ]
[ null, null ]
[ 16, 40 ]
[ 36, 60 ]
2024-11-18T21:33:36.691517+00:00
1,505,157,373,000
070fc7ec9b4dcef1d708c69e51fe82c68b1a1b8c
3
{ "blob_id": "070fc7ec9b4dcef1d708c69e51fe82c68b1a1b8c", "branch_name": "refs/heads/master", "committer_date": 1505157373000, "content_id": "790a6fced3b1b9469c137f7c3e15dd786ec39a92", "detected_licenses": [ "MIT" ], "directory_id": "8aff61c2c7e77f0f0e0199fcc1a57dccd4f35ab3", "extension": "py", "fi...
2.765625
stackv2
#Written by Shitao Tang # -------------------------------------------------------- import connectDB import time,hashlib,logging def sign_up(username,password): db=connectDB.database.getInstance() if len(username)<=20: return db.create_account(username,hashlib.sha224(password).hexdigest()) else: ...
193
30.15
122
18
2,031
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_cd35691863cc7065_f175dee7", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA224) that is in...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA224) that is insecure for password hashing, since it is not a computationally expensive hash function.", "[Sensitive data (password)](1) is used in a hashing algorithm (SHA224) that is insecure for password hashing, since it is not a computational...
[ 9, 15 ]
[ null, null ]
[ 58, 60 ]
[ 66, 68 ]
2024-11-18T23:15:52.855877+00:00
1,633,512,192,000
d0a757e9382697f658bcfb01cc3775656fe4d4f9
3
{ "blob_id": "d0a757e9382697f658bcfb01cc3775656fe4d4f9", "branch_name": "refs/heads/main", "committer_date": 1633512192000, "content_id": "4449050a187c3148aad269522fc42c4fdffb49b8", "detected_licenses": [ "Apache-2.0" ], "directory_id": "df9c9fc503037361e0321c58006c8071f0ead78f", "extension": "py", ...
2.78125
stackv2
import time import random import shutil import requests import argparse from selenium import webdriver from selenium.webdriver.common.keys import Keys from selenium.webdriver.chrome.options import Options from bs4 import BeautifulSoup as bs def driver(driver_path): options = Options() options.add_argument('-...
95
29.23
146
16
665
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_bf96249eb27c47ae_c33c7474", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [https://i.pinimg.com](1) may be at an arbitrary positi...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [https://i.pinimg.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 34 ]
[ null ]
[ 69 ]
[ 120 ]
2024-11-18T23:15:53.505961+00:00
1,569,589,513,000
f2110ea05b2c1097e8e7c0279543d2bd4a77cd21
2
{ "blob_id": "f2110ea05b2c1097e8e7c0279543d2bd4a77cd21", "branch_name": "refs/heads/master", "committer_date": 1569589513000, "content_id": "b964204a9431f58f580c642c841527cd0dbba11d", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "80721ba8715ffb249746bef405d851cd04df3ea5", "extension": "p...
2.421875
stackv2
#!/usr/bin/env python # Cyborg Web Control import ConfigParser import subprocess import argparse import random import socket import time import pdb import sys import os class VNCRunner: def get_docker_args(self, localport, password, turkerinfo, programname, tasktype): assert programname.find(' ') == -1 ...
116
31.09
145
16
913
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_afc35409e67870d2_e2dc58c9", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (password)](3) as clear text." ]
[ 79 ]
[ null ]
[ 23 ]
[ 36 ]
2024-11-18T22:30:17.613204+00:00
1,464,903,440,000
e87cc45f40cd06d30f57ca7c9558e67de3fa721e
3
{ "blob_id": "e87cc45f40cd06d30f57ca7c9558e67de3fa721e", "branch_name": "refs/heads/master", "committer_date": 1464903440000, "content_id": "5441ee179a8c8835727aef3cd9bdf57105119f0c", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "89881b018b000725a2214822e0b8e01d49bd6998", "extension": "p...
3.046875
stackv2
import csv #---------------------------------------------------------------------- def csv_dict_reader(file_obj): """ Read a CSV file using csv.DictReader """ reader = csv.DictReader(file_obj, delimiter=',') for line in reader: print(line["first_name"]), print(line["last_name"]), ...
18
33.11
71
11
114
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6a119a9702b0af7b_1e6ef7d0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 13 ]
[ null ]
[ 15 ]
[ 31 ]
2024-11-18T22:30:32.766943+00:00
1,609,709,343,000
008b0f7534feebbc060c3a0a283dd849c58ec7c2
2
{ "blob_id": "008b0f7534feebbc060c3a0a283dd849c58ec7c2", "branch_name": "refs/heads/master", "committer_date": 1609709343000, "content_id": "a5522282d2b609530afeafa2023d013cc5495f97", "detected_licenses": [ "MIT" ], "directory_id": "7a17365213dee799a4907d8921aa223ef41b3b6f", "extension": "py", "fi...
2.453125
stackv2
# -*- coding: utf-8 -*- """ list_routes.py """ #Built-in/Generic import datetime #Libs from flask import Flask, g, redirect, render_template, request, url_for, session, flash from flask_sqlalchemy import SQLAlchemy from sqlalchemy import ( Table, Column, Integer, String, MetaData, ForeignKey, Boolean ) #Modules...
125
26.56
101
16
834
python
[{"finding_id": "codeql_py/url-redirection_7120f0a92f458983_e26ce41f", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 53 ]
[ null ]
[ 18 ]
[ 34 ]
2024-11-18T23:37:05.909738+00:00
1,446,494,811,000
ebde059b288e761ea7e31bb26768f31b767df753
3
{ "blob_id": "ebde059b288e761ea7e31bb26768f31b767df753", "branch_name": "refs/heads/master", "committer_date": 1446494811000, "content_id": "0864aeedbcb2900b03374aaf3764116d6c75af6c", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "67107ff37bfd4c09077c5781ebf4473c550d62b1", "extension": "p...
2.75
stackv2
#!/usr/local/bin/python ''' Search for and retrieve compromised credentials from ThreatExchange ''' from __future__ import print_function import argparse import json import re import time from urllib import urlencode from urllib2 import urlopen FB_APP_ID = 'Your AppID Here' FB_ACCESS_TOKEN = 'Your AccessToken Here'...
125
25.67
75
16
780
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_45a0281dfb06bcd2_33bbcee3", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 62 ]
[ null ]
[ 22 ]
[ 69 ]
2024-11-18T21:57:34.643578+00:00
1,603,367,072,000
e4fdeb5353249a4a35d52e592bae58f81f5c3112
3
{ "blob_id": "e4fdeb5353249a4a35d52e592bae58f81f5c3112", "branch_name": "refs/heads/master", "committer_date": 1603367072000, "content_id": "07f3c1e388753dbb176711e0e9d87d219e7a62ff", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "d2ac2569926b5030906e5a5506093007f919d966", "extension": "p...
2.734375
stackv2
import pickle import numpy as np import os from utils.features_extraction import mfcc_features MODEL_DIR = 'models/' FEMALE_GMM_MODELFILE = 'females_gmm_model.gmm' MALE_GMM_MODELFILE = 'males_gmm_model.gmm' def identify_gender(female_model, male_model, vector): winner = '' is_female_score = np.arr...
50
23.3
84
11
307
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_74ea2cb1682047e1_4ac0645f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 43 ]
[ null ]
[ 7 ]
[ 13 ]
2024-11-18T21:57:50.610086+00:00
1,507,220,260,000
07b2ed7ef7dcaf6f2295860eca7e56109e01d74b
3
{ "blob_id": "07b2ed7ef7dcaf6f2295860eca7e56109e01d74b", "branch_name": "refs/heads/master", "committer_date": 1507220260000, "content_id": "30f08953d5fadbbb2e03322082d3d9f083aaea16", "detected_licenses": [ "MIT" ], "directory_id": "21f789f364176af1e8fd54c709701cdd6161c452", "extension": "py", "fi...
2.75
stackv2
from .source import Source, PackageInfo import requests from typing import Dict, Set, List import logging from urllib.parse import urlparse from pathlib import PurePosixPath from os.path import splitext class Github(Source): # For a Github object the `name` is owner/repo as a single string # so the URLs below...
70
32.43
69
21
508
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_5a70fecb4179e620_9c855877", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [github.com](1) may be at an arbitrary position in the ...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [github.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 26 ]
[ null ]
[ 20 ]
[ 47 ]
2024-11-18T21:58:12.707544+00:00
1,486,756,388,000
dd0aecd14505450ac2d9885f328b09ba00d3870e
2
{ "blob_id": "dd0aecd14505450ac2d9885f328b09ba00d3870e", "branch_name": "refs/heads/master", "committer_date": 1486756388000, "content_id": "c6cc7f4ea6f47e16ab6f34ffab6ef2c4f2df9404", "detected_licenses": [ "MIT" ], "directory_id": "0a1af18ca7aabc27742f128401bf9058d5a58ab1", "extension": "py", "fi...
2.359375
stackv2
import yaml import os import time from tornado import ioloop, web, httpserver, httpclient import logging from utils import Config config = Config('config.yml') logging.basicConfig( level=10, filename=config.conf['log']['file'], format='%(asctime)s (%(filename)s:%(lineno)s)- %(levelname)s - %(message)s', ...
46
27.54
84
14
313
python
[{"finding_id": "codeql_py/reflective-xss_20169a5ede7cf327_5c7ae0b3", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 29 ]
[ 31 ]
[ 13 ]
[ 44 ]
2024-11-18T21:58:18.923093+00:00
1,563,647,656,000
b66f3ffe69ef5830ba6a27a3b520c247208c9f0f
3
{ "blob_id": "b66f3ffe69ef5830ba6a27a3b520c247208c9f0f", "branch_name": "refs/heads/master", "committer_date": 1563647656000, "content_id": "cf1642c30f37af3005cc987aa0f98891baeb89a6", "detected_licenses": [ "MIT" ], "directory_id": "0ea9270c7dc7697ca9ee88df1f108aca01d0ca07", "extension": "py", "fi...
2.5625
stackv2
"""Custom template support.""" from jinja2 import Template def render_template(content, context): """Render templates in content.""" # Fix None issues if context.last_release_object is not None: prerelease = context.last_release_object.prerelease else: prerelease = False # Rende...
29
29.48
96
13
159
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_c376318f5bd95643_a57df318", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 17 ]
[ null ]
[ 18 ]
[ 35 ]
2024-11-18T21:58:36.023687+00:00
1,480,472,300,000
6b39aedd7f04d0a7ce498ade62f261d79d2e10b9
3
{ "blob_id": "6b39aedd7f04d0a7ce498ade62f261d79d2e10b9", "branch_name": "refs/heads/master", "committer_date": 1480472300000, "content_id": "e37cc76acfc5aeaf8fbd6e31b4733f0625a3e84a", "detected_licenses": [ "Apache-2.0" ], "directory_id": "2d753c9fc9d1d8e455a71edae759adee171f1d56", "extension": "py"...
2.875
stackv2
import datetime import os, pymysql # pip install PyMySql from flask import Flask, request, redirect # o request é para pegarmos os conteúdos passados no post/submit do formulário # redirect -> para redirecionar depois do insert no banco from flask.helpers import url_for # para retornar para outra url a partir do seu ...
64
34.95
100
13
589
python
[{"finding_id": "codeql_py/flask-debug_e502d6eab2c127cb_36d93eb0", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-089" ]
[ "py/flask-debug", "py/sql-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This SQL query depends on a [user-provided value](1)." ]
[ 64, 40 ]
[ null, null ]
[ 5, 32 ]
[ 47, 41 ]
2024-11-18T22:47:25.271636+00:00
1,419,007,202,000
83a70cd930e657d588402ffe7827fccc85335c43
3
{ "blob_id": "83a70cd930e657d588402ffe7827fccc85335c43", "branch_name": "refs/heads/master", "committer_date": 1419007202000, "content_id": "8b7e512a357fab080a08cc9551545430fcf4ccb8", "detected_licenses": [ "MIT" ], "directory_id": "ed3d09867b048a6944bebc52b27f7c031324d655", "extension": "py", "fi...
2.578125
stackv2
import sys, os, re import HTML import tweepy from tweepy import OAuthHandler from optparse import OptionParser from datetime import datetime import codecs import zipfile import urllib2 import collections import shutil import time def setup(): """ Authenticates with Twitter with OAuth credentials and creates an insta...
478
26.45
111
21
3,773
python
[{"finding_id": "codeql_py/overly-large-range_3a202e160a2a7036_6326d99a", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[0-9:;<=>?@A-U\\].", "remediation": "", "location": {...
3
true
[ "CWE-020", "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[0-9:;<=>?@A-U\\].", "Suspicious character range that is equivalent to \\[0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_`a-u\\].", "Suspicious character range that is equivalent to \\[0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_`a-u\\]." ]
[ 401, 404, 404 ]
[ null, null, null ]
[ 38, 34, 47 ]
[ 41, 37, 50 ]
2024-11-18T22:47:26.755441+00:00
1,583,716,336,000
df7a29c035437e7f79d5dee221699eeb47e1f2aa
2
{ "blob_id": "df7a29c035437e7f79d5dee221699eeb47e1f2aa", "branch_name": "refs/heads/master", "committer_date": 1583716336000, "content_id": "f44add7c08ac2a0c86582966a38fc2f35f8972c0", "detected_licenses": [ "MIT" ], "directory_id": "43228f860246ca5af48660d2c4534a774f4c038b", "extension": "py", "fi...
2.40625
stackv2
import csv from http.client import RemoteDisconnected import time import re from bs4 import BeautifulSoup from selenium import webdriver from selenium.webdriver.chrome.options import Options from selenium.webdriver.support.ui import WebDriverWait, Select from selenium.webdriver.support import expected_conditions as EC ...
150
40.87
129
20
1,298
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ed2303e3398aae92_78352105", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 140 ]
[ null ]
[ 23 ]
[ 86 ]
2024-11-18T23:10:59.766768+00:00
1,424,356,998,000
21098d5945a967a5ba915d18a33af1575af4d417
3
{ "blob_id": "21098d5945a967a5ba915d18a33af1575af4d417", "branch_name": "refs/heads/master", "committer_date": 1424356998000, "content_id": "cc8e69d2a1cff3382f98e20de2ac2f03efd57b4c", "detected_licenses": [ "MIT" ], "directory_id": "25c5f1deffd366f25eb8fc063f62cdb2218e8e9e", "extension": "py", "fi...
2.828125
stackv2
import os import requests from geopy.geocoders import Nominatim from flask import Flask, render_template, flash from . import app from .forms import LocationForm app.config.from_object(os.environ['APP_SETTINGS']) WUNDERGROUND_BASE_URL = app.config['WUNDERGROUND_BASE_URL'] WUNDERGROUND_API_KEY = app.config['WUNDERGR...
144
31.85
88
19
1,017
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1b40ac9fcfdaffd6_1b8f229c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 78, 78 ]
[ null, null ]
[ 15, 20 ]
[ 18, 23 ]
2024-11-18T22:35:55.864829+00:00
1,593,711,532,000
5d421e1e597d95b1603c67787bfc48e4c18e6ec2
2
{ "blob_id": "5d421e1e597d95b1603c67787bfc48e4c18e6ec2", "branch_name": "refs/heads/master", "committer_date": 1593711532000, "content_id": "de15fad2b50d651dbdc7699f6f0a0ad0522acb32", "detected_licenses": [ "MIT" ], "directory_id": "542d3f2efb864c80e82bfc11914f12f07bb4caf4", "extension": "py", "fi...
2.34375
stackv2
# -*- coding: utf-8 -*- #!/usr/bin/python """ """ import requests import time from raven import Client client = Client( 'https://aee9ceb609b549fe8a85339e69c74150:8604fd36d8b04fbd9a70a81bdada5cdf@sentry.io/1223891') key = "f02981de7e824038967f4194b7815c8d" def check_api(word): query_string = { 'api-key': key,...
36
23.72
117
13
305
python
[{"finding_id": "codeql_py/request-without-cert-validation_e42256c996704ff6_ccb15ab5", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 20 ]
[ null ]
[ 11 ]
[ 118 ]
2024-11-18T22:36:01.736881+00:00
1,567,959,064,000
e16a18f7f07c70b2ef0ab6deb2a4e7230faa0f5d
3
{ "blob_id": "e16a18f7f07c70b2ef0ab6deb2a4e7230faa0f5d", "branch_name": "refs/heads/master", "committer_date": 1568019469000, "content_id": "9d7d79f84de1b25afca3ed8045e8add7cb6eaa96", "detected_licenses": [ "MIT" ], "directory_id": "a884895151a5b38c38f56542f3f195ce97bc3f2b", "extension": "py", "fi...
2.703125
stackv2
"""Service session object""" import asyncio import json import time from base64 import b64decode, b64encode from typing import TYPE_CHECKING, Optional import aiohttp import requests from Crypto.Random import get_random_bytes #pycryptodome from Crypto.Hash import MD5 from Crypto.Cipher import AES from Crypto.Util.Pad...
169
31.38
104
19
1,236
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_3cf222d86dbbd3aa_e95d59db", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi...
[ 77, 95 ]
[ null, null ]
[ 21, 25 ]
[ 28, 32 ]
2024-11-18T22:48:24.233182+00:00
1,520,396,351,000
34663af13966ebd5e171217f0b300bc59e482b66
3
{ "blob_id": "34663af13966ebd5e171217f0b300bc59e482b66", "branch_name": "refs/heads/master", "committer_date": 1520396351000, "content_id": "55455c1bfef468e6f0564a3134ac2ee49ab67055", "detected_licenses": [ "MIT" ], "directory_id": "30261bcf65b9aeb015edeb5a8ceeedeb0e3493d6", "extension": "py", "fi...
2.765625
stackv2
# -*- coding: utf-8 -*- ''' Copyright(c) 2018, LiuYang All rights reserved. 2018/02/23 ''' import tarfile from six.moves import urllib import sys import numpy as np import pickle import os import cv2 data_dir = 'cifar10_data' full_data_dir = 'cifar10_data/cifar-10-batches-py/data_batch_' vali_dir = 'cifar10_dat...
139
29.62
97
18
1,092
python
[{"finding_id": "codeql_py/tarslip_ba87999d4f391bfc_eb6f2f66", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 53 ]
[ null ]
[ 9 ]
[ 39 ]
2024-11-18T22:49:13.067160+00:00
1,597,584,899,000
77e371c26f485dccf14e0fa0be944a3b0df99337
2
{ "blob_id": "77e371c26f485dccf14e0fa0be944a3b0df99337", "branch_name": "refs/heads/master", "committer_date": 1597584899000, "content_id": "a9d1091730eac71e3014047af430618b7220646d", "detected_licenses": [ "Apache-2.0" ], "directory_id": "9a653ca161b619f4a2fe345201b5ab591357d84f", "extension": "py"...
2.375
stackv2
import core from core.movieinfo import TheMovieDatabase from core.library import Manage from core import searcher import cherrypy import threading import os import json import logging logging = logging.getLogger(__name__) api_version = 2.4 ''' API All methods output a json object: {'response': true} A 'true' respo...
335
33.77
121
22
2,764
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a128e728b41c3df4_f5b25b02", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 186 ]
[ null ]
[ 29 ]
[ 86 ]
2024-11-18T23:26:00.648978+00:00
1,557,232,025,000
c28187b0b15d381a1296b65feacafde9ff1b0c0d
2
{ "blob_id": "c28187b0b15d381a1296b65feacafde9ff1b0c0d", "branch_name": "refs/heads/master", "committer_date": 1557232041000, "content_id": "8a6cd65e68547c39e34c4761f882120439d631ee", "detected_licenses": [ "MIT" ], "directory_id": "32e42a256e69f462628249339f4f6f0501dd42d8", "extension": "py", "fi...
2.328125
stackv2
import os import json from dotenv import load_dotenv from .aws_signing import AwsSigningV4 from .request_handler import RequestHandler load_dotenv() load_dotenv(os.path.join(os.path.dirname(__name__), "..", ".env")) client_id = os.environ.get("CLIENT_ID") client_secret = os.environ.get("CLIENT_SECRET") api_key = o...
63
27.54
98
12
437
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1942ee25b9e36661_670ae2cb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 50 ]
[ null ]
[ 11 ]
[ 38 ]
2024-11-18T22:27:32.873907+00:00
1,545,303,526,000
72aaaa09e199ded348ba5281ee9c44f1324a0a31
3
{ "blob_id": "72aaaa09e199ded348ba5281ee9c44f1324a0a31", "branch_name": "refs/heads/master", "committer_date": 1545303526000, "content_id": "d35bda7551b30634258299d14b027d8573774745", "detected_licenses": [ "MIT" ], "directory_id": "0b67bcab795878b36596152fe3fc97ba58d15e3f", "extension": "py", "fi...
2.96875
stackv2
from flask import Flask, Response from flask_socketio import SocketIO, send, emit from flask_cors import CORS from components.LCD.I2CLCD1602 import display from components.ultrasonic_ranging import loop_during, get_distance app = Flask(__name__) app.config['SECRET_KEY'] = 'secret!' cors = CORS(app,resources={r"/sock...
72
29.32
136
12
576
python
[{"finding_id": "codeql_py/reflective-xss_125ba263fe3d56bf_0f7bb4c1", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 38 ]
[ null ]
[ 12 ]
[ 19 ]
2024-11-18T22:27:41.483444+00:00
1,625,730,061,000
2812628e686c3ff8ab1ae1f138c4e25d1766476b
2
{ "blob_id": "2812628e686c3ff8ab1ae1f138c4e25d1766476b", "branch_name": "refs/heads/main", "committer_date": 1625730142000, "content_id": "b612945422018cadf4aa6dfb96f232500eb6fca3", "detected_licenses": [ "Apache-2.0" ], "directory_id": "61dfacc97304ea6e95d1d69b14c072c5977899bb", "extension": "py", ...
2.453125
stackv2
# -*- coding: utf-8 -*- # # Copyright (c) 2021, Flybreak # # SPDX-License-Identifier: Apache-2.0 # # Change Logs: # Date Author Notes # 2021-06-06 flybreak the first version # import argparse import os import sys import logging import time import json import requests LOG_LVL = logging.INFO def...
235
36.15
144
17
2,012
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_c27db07a7078bf02_67626ba2", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [https://github.com](1) may be at an arbitrary position...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [https://github.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 25 ]
[ null ]
[ 12 ]
[ 57 ]
2024-11-18T22:27:43.934413+00:00
1,559,897,049,000
0df86980be3e7e6daa9b215d093bfc9b914f1114
2
{ "blob_id": "0df86980be3e7e6daa9b215d093bfc9b914f1114", "branch_name": "refs/heads/master", "committer_date": 1559897049000, "content_id": "0905e39b568781ac26cb71065f944fdb369d1c3e", "detected_licenses": [ "Apache-2.0" ], "directory_id": "862ebd1ef7162606043d2d1af354cbb836311a18", "extension": "py"...
2.359375
stackv2
#!/usr/bin/env python # # Copyright (c) 2018 YADRO # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or ...
175
34.45
84
21
1,332
python
[{"finding_id": "codeql_py/request-without-cert-validation_879387820852e254_c378132a", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 53, 76 ]
[ null, 79 ]
[ 15, 15 ]
[ 50, 46 ]
2024-11-18T22:14:53.061357+00:00
1,385,795,819,000
726b63e2f9cb2734482d41328b9eb1ba63668a8c
3
{ "blob_id": "726b63e2f9cb2734482d41328b9eb1ba63668a8c", "branch_name": "refs/heads/master", "committer_date": 1385795819000, "content_id": "b3029dfa9e46ea8640817cf93d869df6ac2a71ec", "detected_licenses": [ "MIT" ], "directory_id": "019d9148ae97b162d4b4f1f0474de55ee77aaa29", "extension": "py", "fi...
2.921875
stackv2
from ConfigParser import SafeConfigParser from time import sleep import requests CONFIG_FILENAME = 'settings.ini' SECTION_NAME = 'auth' DELAY_SECONDS = 5 class LoginStatus: SUCCESS, LOGGED, WRONGPASS, CONNECTION_ERROR, UNKNOWN = range(5) # enum imitation class Authorizer: def login(self, username, password...
93
34.65
103
17
658
python
[{"finding_id": "codeql_py/request-without-cert-validation_0ed9d415f9c2ed6f_27da174b", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 17 ]
[ 27 ]
[ 17 ]
[ 29 ]
2024-11-18T22:55:28.743813+00:00
1,437,965,279,000
8c8cf5f24ed1db319928859c4ddffc4af8af4ff2
2
{ "blob_id": "8c8cf5f24ed1db319928859c4ddffc4af8af4ff2", "branch_name": "refs/heads/master", "committer_date": 1437965279000, "content_id": "ca6f84b9bfb8d5f3c5bb12b6f5a6e3c85574bef0", "detected_licenses": [ "MIT" ], "directory_id": "f4152991173ced88e536660a71722d31cc74540c", "extension": "py", "fi...
2.40625
stackv2
from django.shortcuts import render, render_to_response, redirect from django.template import RequestContext from django.views.generic import View, ListView, DetailView from main.models import Paste, Op from functions import get_values import datetime import json import re import requests class PasteView(View): ...
106
36.34
78
16
789
python
[{"finding_id": "codeql_py/polynomial-redos_f3f778502972c999_43004f16", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with ma...
2
true
[ "CWE-1333", "CWE-918" ]
[ "py/polynomial-redos", "py/full-ssrf" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with many repetitions of '9'.", "The full URL of this request depends on a [user-provided value](1)." ]
[ 35, 46 ]
[ null, null ]
[ 42, 28 ]
[ 49, 59 ]
2024-11-18T22:55:33.973315+00:00
1,563,112,703,000
f0699e877f8c2c52121411f5793bf3bb36503de9
3
{ "blob_id": "f0699e877f8c2c52121411f5793bf3bb36503de9", "branch_name": "refs/heads/master", "committer_date": 1563112703000, "content_id": "1101f971094758895a4c5300bf91e3bc58e62b93", "detected_licenses": [ "Apache-2.0" ], "directory_id": "53a91db8c501fe3811570848ed932f63ea058b59", "extension": "py"...
2.546875
stackv2
import re import crypto import sys sys.modules['Crypto'] = crypto from base64 import b64decode from base64 import b64encode from Crypto.Cipher import AES import base64 import json import requests import pendulum # Padding for the input string --not # related to encryption itself. BLOCK_SIZE = 16 # Bytes pad = lamb...
197
27.27
89
15
1,413
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_f0ad628dc9d1ee5a_8a6e4bb3", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 39, 46 ]
[ null, null ]
[ 33, 22 ]
[ 52, 41 ]
2024-11-18T22:55:40.557973+00:00
1,570,616,651,000
efabec4fccc118547dad210018e57ede2d9247a0
2
{ "blob_id": "efabec4fccc118547dad210018e57ede2d9247a0", "branch_name": "refs/heads/master", "committer_date": 1570616651000, "content_id": "c03ca85dbe51f8ec2d4955007a87d97a959b8c10", "detected_licenses": [ "Apache-2.0" ], "directory_id": "c0ba94723a2b6cd1cccb10834c5ef8a04c5c3e42", "extension": "py"...
2.375
stackv2
# coding: utf-8 import sys import json import logging import tornado import tornado.web import tornado.ioloop from tornado.httpserver import HTTPServer sys.path.append('/home/gump/Software/pycharm-2018.1.6/projects/bert-for-classificaion/') from sentence_fluency.predictor import predict WEB_PORT = 1368 class Main...
60
24.63
88
17
332
python
[{"finding_id": "codeql_py/stack-trace-exposure_6c6a0a50c5e9cac8_2fe1dbbb", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-117" ]
[ "py/stack-trace-exposure", "py/log-injection" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "This log entry depends on a [user-provided value](1)." ]
[ 41, 27 ]
[ 44, null ]
[ 24, 26 ]
[ 14, 56 ]
2024-11-18T22:56:17.814617+00:00
1,684,821,596,000
a779a8b0413902bfc9576aa39970e896ccc25aa7
3
{ "blob_id": "a779a8b0413902bfc9576aa39970e896ccc25aa7", "branch_name": "refs/heads/master", "committer_date": 1684821596000, "content_id": "3898ca002d106a1462fdc186606af308bc26ce0b", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "f0fc38108790b649b1d2fd5b36099d08011cdcfe", "extension": "p...
3.09375
stackv2
import re from typing import List, Tuple, Dict class Pattern: def __init__(self, format_object: Dict[str, str]) -> None: self._pattern = re.compile(format_object["wallet_regexp"]) self._name = format_object["name"] self._group = format_object["group"] self._symbol = format_object[...
59
27.98
70
12
428
python
[{"finding_id": "codeql_py/redos_024d4e36c182720a_e2ee8469", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '!'.", "remediati...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '!'." ]
[ 54 ]
[ null ]
[ 40 ]
[ 47 ]
2024-11-18T22:56:19.562164+00:00
1,612,294,518,000
bea27cd924b2b67a0de410fa27a357622667b6b5
4
{ "blob_id": "bea27cd924b2b67a0de410fa27a357622667b6b5", "branch_name": "refs/heads/main", "committer_date": 1612294518000, "content_id": "80df5ab1a15da07fd10a465bc57cbe6d514c92b7", "detected_licenses": [ "Unlicense" ], "directory_id": "4c877df2d8feb3b7647f7f83f3f04a36f1e91b1e", "extension": "py", ...
3.671875
stackv2
#! python3 # need these to pass bash and let the program reset before trying again import subprocess import time # initialize some stuff guess = [] guessCharacters = [] totalCharacters = 0 # dictionary of useable characters passwordCharacters = {"numbers": \ (0, 1, 2, 3, 4, 5, 6, 7, 8, 9)...
126
35.48
126
16
1,164
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bd9a8dc0d90de2f2_ba993b16", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 111, 113, 118 ]
[ null, null, null ]
[ 30, 11, 15 ]
[ 39, 56, 112 ]
2024-11-18T22:56:34.910056+00:00
1,545,455,454,000
015f0db6559293b66363cae7c9a547b5d5865140
2
{ "blob_id": "015f0db6559293b66363cae7c9a547b5d5865140", "branch_name": "refs/heads/master", "committer_date": 1545455454000, "content_id": "6c8eb5bdc14cd4112ed4256dc179ab772605a1ce", "detected_licenses": [ "MIT" ], "directory_id": "876561eb2f8946f245332bb6817b56ed789e8d8b", "extension": "py", "fi...
2.328125
stackv2
import os import time import signal import json import requests from web import is_404, is_403, is_complete, is_banned from utils import getIP, getIPWithoutLogin, generate_rnd from config import (headers, time_out, min_crawl_interal, max_crawl_interal, excp_interal, max_retries) TIME_OUT = time_ou...
90
31.21
109
16
704
python
[{"finding_id": "codeql_py/request-without-cert-validation_e95dbf5f4522c75a_2925e7b5", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 39 ]
[ 40 ]
[ 20 ]
[ 110 ]
2024-11-19T00:07:18.498308+00:00
1,621,499,344,000
68fcc51b096ebbbf1dd21355449552497a79de5b
3
{ "blob_id": "68fcc51b096ebbbf1dd21355449552497a79de5b", "branch_name": "refs/heads/master", "committer_date": 1621499344000, "content_id": "17e3f55107f8e815591644c6b7efc9c5e7ab6513", "detected_licenses": [ "MIT" ], "directory_id": "ae72e1c3469c6a372037c25d2f8e40710d12d20b", "extension": "py", "fi...
2.625
stackv2
from flask import Flask, redirect, request app = Flask(__name__) LOOKUP = { "tutor": "http://pythontutor.com/composingprograms.html", "book": "https://composingprograms.com", "python": "https://code.cs61a.org/python", "scheme": "https://code.cs61a.org/scheme", "sql": "https://code.cs61a.org/sql",...
52
25.6
64
14
368
python
[{"finding_id": "codeql_py/url-redirection_3c8352e6a9cd9c65_1688e531", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).\nUntrusted URL redirection depends on a ...
2
true
[ "CWE-601", "CWE-601" ]
[ "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).\nUntrusted URL redirection depends on a [user-provided value](2).", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 46, 48 ]
[ null, null ]
[ 25, 25 ]
[ 53, 41 ]
2024-11-19T00:07:25.007777+00:00
1,620,504,856,000
fbf5d900fdc9678df76ce27523ab10b31ec96edd
2
{ "blob_id": "fbf5d900fdc9678df76ce27523ab10b31ec96edd", "branch_name": "refs/heads/master", "committer_date": 1620504856000, "content_id": "3c42dd8a81ec11f929296cb850cbb3a05316c06a", "detected_licenses": [ "MIT" ], "directory_id": "8546b944dbf66b1c98219263f424cb1af885967f", "extension": "py", "fi...
2.3125
stackv2
from flask import Flask, Response, redirect, url_for, request, session, abort, jsonify, escape import flask from flask_login import LoginManager, UserMixin, current_user, \ login_required, login_user, logout_user import os from flask_session import Session from flask_socketio import SocketIO, emit, join_ro...
222
29.74
116
18
1,643
python
[{"finding_id": "codeql_py/url-redirection_e2bf08742affed7e_4a337492", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 100 ]
[ null ]
[ 25 ]
[ 49 ]
2024-11-19T00:07:28.698071+00:00
1,594,801,062,000
846b1f7fadcc45f4b2c8251d1ff608fadb5c6cd2
3
{ "blob_id": "846b1f7fadcc45f4b2c8251d1ff608fadb5c6cd2", "branch_name": "refs/heads/master", "committer_date": 1594801062000, "content_id": "ab1d2cff3ff3a2e928cea30ecef80e80e3cf97c2", "detected_licenses": [ "MIT" ], "directory_id": "228da799856a4da26fe3836df6708a351926ad1b", "extension": "py", "fi...
2.625
stackv2
#!/usr/bin/env python # $id$ """ Make gsw_mod_saar_data.f from the current gsw_data_v3_0.nc. This is a developer utility and not a part of the public distribution, but its end-product is. Note that it generates gsw_saar_data.c but will not overwrite it if it exists. General concept: we don't want end-users of this dis...
250
31.55
88
21
2,336
python
[{"finding_id": "codeql_py/overly-permissive-file_35ab05bac8045f81_3afb0ef3", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in open sets file to world readable.", "remediation": "", "location": {...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in open sets file to world readable." ]
[ 188 ]
[ null ]
[ 10 ]
[ 80 ]
2024-11-18T23:28:30.548724+00:00
1,631,836,308,000
9965fa8c07c32e69614ba2c4eef29d42375227f1
3
{ "blob_id": "9965fa8c07c32e69614ba2c4eef29d42375227f1", "branch_name": "refs/heads/main", "committer_date": 1631836308000, "content_id": "dcd2eeeb13520fba2883a8fd1b9cac0dd776bd50", "detected_licenses": [ "MIT" ], "directory_id": "97f8be81a8b8ed13147a1afdeb146f170e27966c", "extension": "py", "file...
3.296875
stackv2
import cmd import glob import random import pickle as p class Proficiency(): NONE = 0 ONCE = 1 TWICE = 2 PROFICIENT = 3 class Card(): proficiency = Proficiency.NONE def __init__(self, english, fr_m, fr_f): self.english = english self.fr_m = fr_m self.fr_f = fr_f ...
281
28.3
86
20
1,952
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_016af07de8dde589_3426faac", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](1) as clear text." ]
[ 33 ]
[ null ]
[ 19 ]
[ 79 ]
2024-11-18T23:39:39.615242+00:00
1,605,705,401,000
ebbabb61a9b4655a9a61cde3f0636bd716626aaa
3
{ "blob_id": "ebbabb61a9b4655a9a61cde3f0636bd716626aaa", "branch_name": "refs/heads/master", "committer_date": 1605705401000, "content_id": "fa02514870bbdcef6e98cdccf82cdca58a133b85", "detected_licenses": [ "MIT" ], "directory_id": "637397bd7d0c0fb6b4f45a1032de79ea2e96dea0", "extension": "py", "fi...
2.765625
stackv2
import datetime import random import hashlib import zhdate from .almanac_text import do, saying, vtb async def get_almanac_for_dd(user_id: int, user_name: str) -> str: # 日期与农历 almanac_geo = datetime.date.today().strftime('%Y年%m月%d日') almanac_luna = zhdate.ZhDate.today().chinese() # 初始化随机种子 random_...
31
34.52
78
11
402
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_7ac9c9e7a1d88a30_65cadac5", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.",...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 15 ]
[ null ]
[ 16 ]
[ 47 ]
2024-11-19T00:05:02.270605+00:00
1,613,337,019,000
08117422a4b6bfd35484c9f5d365cdd2e611ec19
3
{ "blob_id": "08117422a4b6bfd35484c9f5d365cdd2e611ec19", "branch_name": "refs/heads/master", "committer_date": 1613337019000, "content_id": "846b6249ba2ea936a2d5266d594b02fd25ccbaff", "detected_licenses": [ "MIT" ], "directory_id": "fae278fc8c28f7e17004b5216cc21b8b9c7256d6", "extension": "py", "fi...
2.921875
stackv2
import pyttsx3 from threading import Thread from multiprocessing import Queue import time from textwrap import wrap class speaker(): """ The speaker class handles read requests """ queue = Queue() TEXT_LIMIT_SIZE = 5 stopped = False def __init__(self): super().__init__() se...
83
25.52
61
15
481
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3ac929285c6bd7a0_d1a05f78", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 33 ]
[ null ]
[ 19 ]
[ 45 ]
2024-11-18T23:23:30.004409+00:00
1,468,994,327,000
ad2acf938176f5de2b05de5988a0d18d128c86ef
3
{ "blob_id": "ad2acf938176f5de2b05de5988a0d18d128c86ef", "branch_name": "refs/heads/master", "committer_date": 1468994327000, "content_id": "4a17d61d65223659f13f4d3e074dcb5b8f6cbfb5", "detected_licenses": [ "MIT" ], "directory_id": "98731548daa91f8f7c10e0bd41e6f5dc59f8cdf7", "extension": "py", "fi...
2.640625
stackv2
#!/usr/bin/env python import jinja2 import logging import os import webapp2 class MainHandler(webapp2.RequestHandler): def get(self): logging.info("%s.get()" % self.__class__.__name__) template = jinja_environment.get_template('hello.html') self.response.write(template.render()) class Go...
31
24.29
63
12
187
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_d6e7bd748595386e_420be32a", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 25 ]
[ null ]
[ 21 ]
[ 60 ]
2024-11-19T00:44:17.456588+00:00
1,586,158,524,000
9cd99a9d99755012fe4cb7a457e90dfd41988954
3
{ "blob_id": "9cd99a9d99755012fe4cb7a457e90dfd41988954", "branch_name": "refs/heads/master", "committer_date": 1586158524000, "content_id": "f947e4db6f778c62809437f3775f6688a63c7142", "detected_licenses": [ "Apache-2.0" ], "directory_id": "7dd1e3a6bff4ffa321017c2c8d8ac534ee4b9799", "extension": "py"...
2.5625
stackv2
""" @file: tasks @author: linuxzhen520@163.com @date: 2020/03/24 @desc: """ from . import celery import time import random import paramiko @celery.task def celery_task(sth1): print("celery_app.task start") delay_time = random.randint(5, 10) time.sleep(delay_time) print("celery_app.task end") r...
38
22.66
65
12
258
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_1711a1500c9cfdb8_115b114b", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 27 ]
[ null ]
[ 9 ]
[ 66 ]
2024-11-19T00:44:20.357106+00:00
1,608,001,473,000
d29db3894ee315c43a29b079a743a7c7ad00066f
2
{ "blob_id": "d29db3894ee315c43a29b079a743a7c7ad00066f", "branch_name": "refs/heads/master", "committer_date": 1608001473000, "content_id": "f8a8abae8b2e9d504a001a64dd9004d12906942e", "detected_licenses": [ "MIT", "Python-2.0" ], "directory_id": "4a070bd30cebc29fb5a17633d0cc96e27a580fab", "exten...
2.4375
stackv2
#!/usr/bin/python3 # -*- coding: utf-8 -*- """ | @purpose: Automate data importing UTWeb Server. | @date: Created on Sat May 1 15:12:38 2019 | @author: Semeon Risom | @email: semeon.risom@gmail.com | @url: https://semeon.io/d/R33-analysis """ from pdb import set_trace as breakpoint import os, datetime ...
217
38.35
117
20
1,767
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_faf24a1979cddbf4_1cee1847", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 121 ]
[ null ]
[ 9 ]
[ 69 ]
2024-11-18T23:05:20.957927+00:00
1,571,753,752,000
b3c1ff323cac342f1569ff08301931f00098bd18
3
{ "blob_id": "b3c1ff323cac342f1569ff08301931f00098bd18", "branch_name": "refs/heads/master", "committer_date": 1571753752000, "content_id": "8c5b59c7eb917946959ac04920ea7bdbbf7099a8", "detected_licenses": [ "MIT" ], "directory_id": "0d966c8dd7ea5929ef7a5ccc0bf7c4d427d53a93", "extension": "py", "fi...
2.578125
stackv2
import traceback import warnings import paramiko warnings.filterwarnings("ignore") class SshUtil(object): """ - Connect remote by SSH and run specific command. - See also `bage_util.SellUtil` """ def __init__(self, hostname, username=None, password=None, port=22, log=None): self.client ...
61
28.46
102
16
373
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_2a414c94839ca38d_d847af47", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to WarningPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to WarningPolicy may be unsafe." ]
[ 20 ]
[ null ]
[ 13 ]
[ 78 ]
2024-11-18T23:05:32.412397+00:00
1,691,138,554,000
232e171a34b35c0eab49c640d0500a434631685b
3
{ "blob_id": "232e171a34b35c0eab49c640d0500a434631685b", "branch_name": "refs/heads/master", "committer_date": 1691138554000, "content_id": "938f0a14812f86a86c831ab00387c8fe2b5d1df0", "detected_licenses": [ "MIT" ], "directory_id": "e567c779e5c1ec5b601790f35024efc4bff60034", "extension": "py", "fi...
2.59375
stackv2
"""Get gene's info from NCBI entrez API (PubMed). https://www.ncbi.nlm.nih.gov/ Downloads only necessary part of Entrez response, just enough to get all the tags you interested in (parameter fields, values from GeneFields). So we do not wait for full 2Mb entrez response but only for first 5-6Kb. The easiest way to u...
270
37.33
137
18
2,452
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_efd119aad61d6504_385628b0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
9
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-295", "CWE-295" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/request-without-ce...
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive dat...
[ 179, 183, 186, 191, 201, 202, 243, 169, 214 ]
[ null, null, null, null, null, null, null, 173, 219 ]
[ 17, 23, 23, 17, 27, 19, 13, 20, 19 ]
[ 101, 85, 83, 100, 81, 75, 115, 10, 10 ]
2024-11-18T23:05:47.927657+00:00
1,601,592,789,000
66265ce705179f727a1b6cb91acd31b52997b08c
3
{ "blob_id": "66265ce705179f727a1b6cb91acd31b52997b08c", "branch_name": "refs/heads/master", "committer_date": 1601592789000, "content_id": "e58c8af1e332193fec37157ee2d069ebf67e5868", "detected_licenses": [ "MIT" ], "directory_id": "4ebc36035895c6d16727fb08030789c1424e7cd4", "extension": "py", "fi...
3.3125
stackv2
import pymongo import os from dotenv import load_dotenv load_dotenv() DB_USER = os.getenv("MONGO_USER", default="OOPS") DB_PASSWORD = os.getenv("MONGO_PASSWORD", default="OOPS") CLUSTER_NAME = os.getenv("MONGO_CLUSTER_NAME", default="OOPS") connection_uri = f"mongodb+srv://{DB_USER}:{DB_PASSWORD}@{CLUSTER_NAME}.mo...
86
32.17
140
12
734
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9465ecabc5a00473_9ec5f8bd", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 15 ]
[ null ]
[ 15 ]
[ 29 ]
2024-11-18T23:05:48.043141+00:00
1,537,193,696,000
85a04c9ad61bd1e009944659691cadc9a2302b3a
4
{ "blob_id": "85a04c9ad61bd1e009944659691cadc9a2302b3a", "branch_name": "refs/heads/master", "committer_date": 1537193696000, "content_id": "33818eac6f11195799d9dee29264c66afe680b8d", "detected_licenses": [ "MIT" ], "directory_id": "43536edd4f187830297b35178f558e8963021ce3", "extension": "py", "fi...
3.765625
stackv2
from user_accounts import UserAccounts """ This is a class that generates new instances of users. """ class User: def __init__(self, first_name, last_name, email, password, platforms): self.first_name = first_name self.last_name = last_name self.email = email self.password...
92
29.83
144
17
643
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_77c54535c01254e3_b450732e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
4
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (p...
[ 45, 47, 65, 83 ]
[ null, null, null, null ]
[ 15, 13, 17, 17 ]
[ 73, 124, 92, 87 ]
2024-11-18T23:11:01.021051+00:00
1,531,142,386,000
da1043a59e64c88df12611bd44ab05cf20915c3d
3
{ "blob_id": "da1043a59e64c88df12611bd44ab05cf20915c3d", "branch_name": "refs/heads/master", "committer_date": 1531142386000, "content_id": "109c5a2171411777aac90e2b8a690ba46a425eee", "detected_licenses": [ "MIT" ], "directory_id": "8bf8dfbbbe7902c701b0c935c37ff65adf3a424a", "extension": "py", "fi...
2.90625
stackv2
# -*- coding: utf-8 -*- # @Date : 2017/10/24 # @Author : hrwhisper import os from math import pi, cos, sin, atan2, sqrt import gpxpy.geo from parse_data import read_mall_data def get_distance_by_latitude_and_longitude(lat1, lon1, lat2, lon2): return gpxpy.geo.haversine_distance(lat1, lon1, lat2, lon2) de...
66
28.7
104
17
581
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_c82e3e45710f01cd_f3da9cdb", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",...
4
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 62, 61, 61, 61 ]
[ null, null, null, null ]
[ 21, 28, 38, 43 ]
[ 73, 36, 41, 47 ]
2024-11-19T01:21:48.845971+00:00
1,675,810,674,000
40bc0efc0dd4507e43c9b7aef4c2253c96f8d49c
3
{ "blob_id": "40bc0efc0dd4507e43c9b7aef4c2253c96f8d49c", "branch_name": "refs/heads/master", "committer_date": 1675810674000, "content_id": "6b0944fd943f4b3f17a021445eb945e4d463dadc", "detected_licenses": [ "MIT" ], "directory_id": "40642628e19f66ed12eb0cec0837be3efd673348", "extension": "py", "fi...
2.5625
stackv2
#!/usr/bin/env python3 import configparser import praw import json import time print("Reading config") config = configparser.ConfigParser() config.read("config.ini") # someone who knows python please tell me there's a better way to do this subreddit = config["Options"]["subreddit"] interval = int(config["Options"]["...
263
33.59
158
17
2,118
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_e569cb43c548a620_af5ecb6e", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [i.imgur.com](1) may be at an arbitrary position in the...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "The string [i.imgur.com](1) may be at an arbitrary position in the sanitized URL.", "The string [pbs.twimg.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 218, 220 ]
[ null, null ]
[ 8, 8 ]
[ 28, 30 ]
2024-11-19T01:21:49.111850+00:00
1,398,245,114,000
ad0f7e413fa97df03510d940304b9173d7ef06bf
3
{ "blob_id": "ad0f7e413fa97df03510d940304b9173d7ef06bf", "branch_name": "refs/heads/master", "committer_date": 1398245114000, "content_id": "d7cc1287c0af6d209cd9ad015f6d5de10b91ca4c", "detected_licenses": [ "MIT" ], "directory_id": "7bb76a38aa21a95ca35c6eeeebf89270453e6743", "extension": "py", "fi...
2.578125
stackv2
import paramiko class ssh(object): def __init__(self, host, user, pwd, pkey, debug=False): self.user = user self.host = host self.debug = debug self.client = paramiko.SSHClient() self.client.set_missing_host_key_policy(paramiko.AutoAddPolicy()) self.client.c...
44
28.2
89
15
290
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_1ca490a41fb42d66_bc9a8c74", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 10 ]
[ null ]
[ 9 ]
[ 74 ]
2024-11-19T00:11:47.697924+00:00
1,619,117,351,000
8f97fc25a5189d5fd09d19180c085eba924c15a9
4
{ "blob_id": "8f97fc25a5189d5fd09d19180c085eba924c15a9", "branch_name": "refs/heads/main", "committer_date": 1619117351000, "content_id": "7fce96f849aa3164eece22564406eb10fbdb0ea7", "detected_licenses": [ "MIT" ], "directory_id": "a884039e1a8b0ab516b80c2186e0e3bad28d5147", "extension": "py", "file...
3.671875
stackv2
# Program: Exemplos_VideoAula11.py # Author: Ramon R. Valeriano # Description: Exemplos de Video aula, DICIONÁRIO # Developed: 28/04/2020 - 18:17 # Updated: registro = dict() name = str(input("Enter with your name: ")) date_birth = int(input("Enter wiht your year of birth: ")) if date_birth > 0 : work = int(inpu...
29
27.48
58
13
250
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6afa365943f30876_2e1dc9e2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 29 ]
[ null ]
[ 11 ]
[ 23 ]
2024-11-19T00:24:55.015018+00:00
1,636,705,603,000
30044a86396fd49bccdb16f884bd64082044a54c
3
{ "blob_id": "30044a86396fd49bccdb16f884bd64082044a54c", "branch_name": "refs/heads/main", "committer_date": 1636705603000, "content_id": "460a77f1a81833a3c4ed164378fae21b23441ed2", "detected_licenses": [ "MIT" ], "directory_id": "0a0e915f12db251ab2b571799e7f77d634613e7f", "extension": "py", "file...
2.53125
stackv2
### Package Import ### from fastapi import Response, Request from datetime import timedelta ### AppCode Import ### from Server.Schema.UserSchema import UserSchemaDTO, UserRegisterSchemaDTO from Server.Model import UserModel as um def user_login(response:Response, request:Request, user:UserSchemaDTO): try: ...
101
32.45
84
14
614
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_96e87b4b227632c1_8bb09db1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 53 ]
[ null ]
[ 19 ]
[ 27 ]
2024-11-19T00:36:48.919422+00:00
1,585,978,470,000
0b0a99f0dcd032ab0cffc2b1dc37d252ab1919a5
2
{ "blob_id": "0b0a99f0dcd032ab0cffc2b1dc37d252ab1919a5", "branch_name": "refs/heads/master", "committer_date": 1585978470000, "content_id": "7dd8c35827679636921d6bace701f6981a16b0d5", "detected_licenses": [ "Apache-2.0" ], "directory_id": "7b49e7cab5ccf3ecadf4adb8d98477c8316398d2", "extension": "py"...
2.328125
stackv2
from django.shortcuts import render, HttpResponse # Create your views here. # 主页 def index(request): return HttpResponse('这是主页') # 注册 def register(request): return render(request, 'register.html') # 登录 def login(request): print(request.POST) if request.method == 'POST': user = request.POST.g...
22
23.14
72
12
121
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_38ca322cf6e3c522_5abdc9d7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 19 ]
[ null ]
[ 21 ]
[ 24 ]
2024-11-19T00:36:51.891190+00:00
1,520,569,582,000
3e92ab4e060e49d64b7afc05faed14fa42fa7441
3
{ "blob_id": "3e92ab4e060e49d64b7afc05faed14fa42fa7441", "branch_name": "refs/heads/master", "committer_date": 1520569582000, "content_id": "6f20b22a5d91716ec7d9f97f3cef827dd6a745ad", "detected_licenses": [ "MIT" ], "directory_id": "9f37bb2ab0c594cf7badfb175c66b55aa3b7a33f", "extension": "py", "fi...
2.953125
stackv2
from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes from cryptography.hazmat.backends import default_backend BLOCK_SIZE = 16 def encrypt(plaintext, key, mode="ECB", iv=None): cipher = getCipher(key, mode, iv, True) plaintext = addPadding(plaintext) return cipher.encryptor().update...
49
29.37
76
14
378
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_d1440fd146364f12_58988439", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.\n[The block mode ...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.\n[The block mode CBC](2) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used.\n[The block mode CBC](2) is broken or weak, and should not be used." ]
[ 9, 13 ]
[ null, null ]
[ 12, 17 ]
[ 48, 54 ]
2024-11-19T01:02:15.587221+00:00
1,532,292,757,000
2878494bced68a123b48fc7cf750dfd5e2ea775b
3
{ "blob_id": "2878494bced68a123b48fc7cf750dfd5e2ea775b", "branch_name": "refs/heads/master", "committer_date": 1532292757000, "content_id": "78bc500205ca24354a6cefd3392b2477aed4ceb0", "detected_licenses": [ "MIT" ], "directory_id": "4ef398ee3459cb3fe2001cbf8fdfacfc03dd6c60", "extension": "py", "fi...
2.71875
stackv2
import requests with open('access_token', 'r') as f: access_token = f.read().rstrip() with open('secret', 'r') as f: secret = f.read().rstrip() print(access_token, secret) headers = {'Authorization' : 'Bearer %s' % access_token} api_base_url = 'https://www.strava.com/api/v3/' api_activities = api_base_url+...
29
23.28
72
12
183
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d8beb14da3805f61_30577407", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 9 ]
[ null ]
[ 21 ]
[ 27 ]
2024-11-19T01:02:29.428303+00:00
1,464,064,016,000
28e494e4b8b335cd133e9b0871810fa45783225b
3
{ "blob_id": "28e494e4b8b335cd133e9b0871810fa45783225b", "branch_name": "refs/heads/master", "committer_date": 1464064016000, "content_id": "347b824f6febeba8b6094bdd842cfeca51396714", "detected_licenses": [ "Apache-2.0" ], "directory_id": "c0bd7e009e6b4ad6ce221e35ae8fb0adb3523bbc", "extension": "py"...
2.953125
stackv2
"""BuildingDepot helper Provides helper methods to post data to Building Depot via its REST APIs """ import requests import time import json import time import calendar from json_setting import JsonSetting class BuildingDepotHelper: '''Building Depot Helpe Class''' def __init__(self, settingFilePath="./knocki...
115
35.11
86
14
846
python
[{"finding_id": "codeql_py/request-without-cert-validation_50620d65416e659e_defc820f", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 31 ]
[ null ]
[ 18 ]
[ 66 ]
2024-11-18T23:48:39.917111+00:00
1,476,607,362,000
58cfac43b7b13e3ffa5f41f09dd1e4b8ee61be01
3
{ "blob_id": "58cfac43b7b13e3ffa5f41f09dd1e4b8ee61be01", "branch_name": "refs/heads/master", "committer_date": 1476607362000, "content_id": "ab8d801690668fe54dcb52b383fdeaa3d4694d21", "detected_licenses": [ "MIT" ], "directory_id": "e4e3fd38e66869a91153edd9de0c1694ad963edb", "extension": "py", "fi...
2.6875
stackv2
import json import threading import time import logging import socket import ssl from ..exceptions import SocketError class BetfairStream: """Stream holder, socket connects to betfair, pushes any received data to listener """ __host = 'stream-api.betfair.com' __port = 443 __CRLF = '\r\n' ...
153
32.14
103
17
1,072
python
[{"finding_id": "codeql_py/insecure-default-protocol_336b4aad1aba18d6_a5e689ac", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in...
1
true
[ "CWE-327" ]
[ "py/insecure-default-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used." ]
[ 106 ]
[ null ]
[ 13 ]
[ 31 ]
2024-11-18T23:48:42.603280+00:00
1,636,042,919,000
fee5b53f11ab105648c140adebd3835748f80480
3
{ "blob_id": "fee5b53f11ab105648c140adebd3835748f80480", "branch_name": "refs/heads/master", "committer_date": 1636042919000, "content_id": "da17ddb9b5aa9d4ac10545331093e16085395be4", "detected_licenses": [ "MIT" ], "directory_id": "081a998e3e92966007645b74a0ab5754acb6ed9b", "extension": "py", "fi...
2.703125
stackv2
from collections import defaultdict from operator import itemgetter from typing import List from tqdm import tqdm from .language_predictors.util import GENDER def get_src_indices(instance: List[str]) -> List[int]: """ (English) Determine a list of source side indices pertaining to a given instance i...
119
30.61
113
16
884
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_96f197c1b608e9b1_5f80046c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 100 ]
[ null ]
[ 11 ]
[ 17 ]
2024-11-19T01:51:50.123904+00:00
1,609,956,791,000
6e10a7c81db2cdcbc2f1f9ae87ac192ae2edcab7
2
{ "blob_id": "6e10a7c81db2cdcbc2f1f9ae87ac192ae2edcab7", "branch_name": "refs/heads/main", "committer_date": 1609956791000, "content_id": "8f6ad0d9caf1e0547d0837b37b91fcbbed261a79", "detected_licenses": [ "Apache-2.0" ], "directory_id": "7e445080fe2d1e9ec320039054dea2d499f0a42f", "extension": "py", ...
2.484375
stackv2
import os import sqlite3 from pathlib import Path from flask import Flask ROOT_DIR = str(Path(os.path.dirname(__file__)).parent) DATABASE = ROOT_DIR + '/db/database.db' SCHEMA = ROOT_DIR + '/db/schema.sql' app = Flask(__name__) g = {'_database': None} def get_db(): db = getattr(g, '_database', None) if db ...
60
22
81
14
366
python
[{"finding_id": "codeql_py/reflective-xss_2a8128477e70c05d_3bf985b7", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 60 ]
[ null ]
[ 16 ]
[ 82 ]
2024-11-19T01:51:57.633217+00:00
1,411,088,833,000
c2442587343452d1c860398aa047241fba0bc52d
3
{ "blob_id": "c2442587343452d1c860398aa047241fba0bc52d", "branch_name": "refs/heads/master", "committer_date": 1411088833000, "content_id": "4b4fc510396d0c8a53ad4a711a3a0a1b73f010ee", "detected_licenses": [ "MIT" ], "directory_id": "d5488c68f031a8a4cc7fd1bd4fc6e4516c646991", "extension": "py", "fi...
2.796875
stackv2
#!/usr/bin/env python """ Python library to check Euroticket à la card balance and recent history. """ import argparse import collections import http.cookiejar import urllib import ssl from html.parser import HTMLParser from xml.etree import ElementTree Card = collections.namedtuple('Card', ['card_holder_name', 'car...
195
38.86
114
21
1,786
python
[{"finding_id": "codeql_py/insecure-protocol_5bae3b5d184516d1_74532ec1", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version SSLv3 specified by [call to ssl.SSLContext](1).", "remediation": "", "lo...
1
true
[ "CWE-327" ]
[ "py/insecure-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Insecure SSL/TLS protocol version SSLv3 specified by [call to ssl.SSLContext](1)." ]
[ 47 ]
[ null ]
[ 61 ]
[ 95 ]
2024-11-19T01:40:02.877263+00:00
1,526,869,969,000
b2d88ff0262359ad22178759dae63c714f22ee2c
3
{ "blob_id": "b2d88ff0262359ad22178759dae63c714f22ee2c", "branch_name": "refs/heads/master", "committer_date": 1526869969000, "content_id": "08eb943ec44394e2f59b820c9b1d98fbc3b6b9aa", "detected_licenses": [ "MIT" ], "directory_id": "095400c80c8751bfca43d5aa39d2af444997b17e", "extension": "py", "fi...
2.609375
stackv2
import jinja2, os, json print "\n\n!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!" print " >>Warning YOU ARE ABOUT TO DELETE DEVICES FROM CISCO PRIME << " print "!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!\n" print "\n*******************...
35
31.03
89
9
241
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_4721b1394f7ab553_1f3921c6", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 23 ]
[ null ]
[ 8 ]
[ 79 ]
2024-11-18T23:43:32.095999+00:00
1,641,888,508,000
345c7fdae6bf24471b2e006a7278a28df017ea2d
2
{ "blob_id": "345c7fdae6bf24471b2e006a7278a28df017ea2d", "branch_name": "refs/heads/master", "committer_date": 1641888508000, "content_id": "ae5d7a4b21c2679342edd3314f302eb390a61d19", "detected_licenses": [ "MIT" ], "directory_id": "b6e5193bccb412c6670b69dd1263c8164f92e3cb", "extension": "py", "fi...
2.390625
stackv2
from json import JSONEncoder from flask import Flask, jsonify, request, send_from_directory from flask_talisman import Talisman from midi_process import process_midi DEFAULT_SONG = process_midi("sample-midi/happy-birthday-simplified.mid") class ObjectJSONEncoder(JSONEncoder): def default(self, o): try: ...
50
22.48
72
14
269
python
[{"finding_id": "codeql_py/stack-trace-exposure_f27f41f4302305db_f437e842", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 45 ]
[ null ]
[ 41 ]
[ 50 ]
2024-11-19T00:33:05.865842+00:00
1,497,604,846,000
a278d4ce5d7d1f3502400a01acbb5c4d589384f4
3
{ "blob_id": "a278d4ce5d7d1f3502400a01acbb5c4d589384f4", "branch_name": "refs/heads/master", "committer_date": 1497604846000, "content_id": "b75fa9d3fb5e0a83e8f3ff635aea95ec465b0d82", "detected_licenses": [ "MIT" ], "directory_id": "28be2173e5590cc5b03119e9b83c57980e6a7e8a", "extension": "py", "fi...
2.90625
stackv2
import phonenumbers import re def _required(func): def decorator(*args, **kwargs): required = kwargs.get('required', False) if 'required' in kwargs: del kwargs['required'] def required_validator(data): if required and data is None: return 'Field is re...
118
26.83
122
14
809
python
[{"finding_id": "codeql_py/redos_ae9cbe0d656bc3b7_85319820", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '\"' and containing many repetitio...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '\"' and containing many repetitions of '\\\\013'." ]
[ 53 ]
[ null ]
[ 18 ]
[ 93 ]
2024-11-19T01:17:58.240211+00:00
1,498,395,064,000
42c8d3d839f40a9a3be86de39a910714f8c17d68
2
{ "blob_id": "42c8d3d839f40a9a3be86de39a910714f8c17d68", "branch_name": "refs/heads/master", "committer_date": 1498395064000, "content_id": "542ede515389ffa93c220064d8f040fe399b9e7c", "detected_licenses": [ "MIT" ], "directory_id": "2e0ffeea2451c3295823c464ef823eb0659a5359", "extension": "py", "fi...
2.453125
stackv2
import OpenSSL from OpenSSL import crypto, SSL from OpenSSL.crypto import Error from OpenSSL.crypto import FILETYPE_PEM from OpenSSL.crypto import dump_certificate from OpenSSL.crypto import dump_privatekey from OpenSSL.crypto import load_certificate from OpenSSL.crypto import load_privatekey import re from os.path im...
117
37.03
128
17
975
python
[{"finding_id": "codeql_py/insecure-protocol_04a65b84db52cad9_cc4018fe", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 specified by [call to OpenSSL.SSL.Context](1).", "remediation": ""...
1
true
[ "CWE-327" ]
[ "py/insecure-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Insecure SSL/TLS protocol version TLSv1 specified by [call to OpenSSL.SSL.Context](1)." ]
[ 107 ]
[ null ]
[ 19 ]
[ 64 ]
2024-11-19T00:15:29.365219+00:00
1,527,503,128,000
622b5af9f65dfdebc84b38c8efb4f5b4021a7d92
3
{ "blob_id": "622b5af9f65dfdebc84b38c8efb4f5b4021a7d92", "branch_name": "refs/heads/master", "committer_date": 1527503128000, "content_id": "e627310c7c77dcc537a1b7334861527af38d53cc", "detected_licenses": [ "MIT" ], "directory_id": "53360fe03154d821fe05cff682b7e5f3ccffdf2c", "extension": "py", "fi...
2.90625
stackv2
# -*- coding: utf-8 -*- ___author___ = "Morando Nicolò" ___version___ = "0.1.2" import cherrypy import os from jinja2 import Environment, FileSystemLoader import random import string ''' declaration of the field of use, of the python code (cherry) ''' enviroment = Environment(loader = FileSystemLoader('html')) ''...
60
22.63
98
15
346
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_fafe4862c2e90d87_5ac5585a", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 16 ]
[ null ]
[ 14 ]
[ 60 ]
2024-11-19T00:16:06.159837+00:00
1,532,971,162,000
6f4779387f32c0cc26642982faa8fec9dd8b045c
3
{ "blob_id": "6f4779387f32c0cc26642982faa8fec9dd8b045c", "branch_name": "refs/heads/master", "committer_date": 1532971162000, "content_id": "344a2998e5ba05411e1d37f8260a847f7953f0ff", "detected_licenses": [ "MIT" ], "directory_id": "111cdba24c3f2bffa6202dc040395144c8cf8ee6", "extension": "py", "fi...
2.734375
stackv2
import os import base64 from Crypto.Cipher import AES chave = "0123456789ABCDEF" aes = AES.new(chave, AES.MODE_ECB) pastaUsuario =os.getcwd()+"/exercicio" for root, dirs, arquivos in os.walk(pastaUsuario): for nome in arquivos: arq=(os.path.join(root, nome)) arq_entrada = open(arq, "r"...
30
25.87
77
19
238
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_2e0f7f770f859ae5_ac132773", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 20, 22 ]
[ null, null ]
[ 42, 38 ]
[ 66, 77 ]
2024-11-19T00:16:09.914521+00:00
1,569,658,648,000
9e19fe7d3344b159cf6872ef45b57c4e9e9e67cb
4
{ "blob_id": "9e19fe7d3344b159cf6872ef45b57c4e9e9e67cb", "branch_name": "refs/heads/master", "committer_date": 1569658648000, "content_id": "be589e7faf27ac5afa08e75f1cafddd286111f4f", "detected_licenses": [ "MIT" ], "directory_id": "2cb19ab173cc50bebf4cbf815731447f52bb553b", "extension": "py", "fi...
3.625
stackv2
import sqlite3 northwind_conn = sqlite3.connect('northwind_small.sqlite3') northwind_cursor1 = northwind_conn.cursor() most_expensive_query = ( 'SELECT ProductName FROM ' + '(SELECT * FROM Product ' + 'Order by UnitPrice DESC LIMIT 10);' ) most...
112
33.39
87
13
826
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ac099d6bf85f1d5b_5857ac38", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 82 ]
[ 83 ]
[ 11 ]
[ 70 ]
2024-11-19T00:28:38.930471+00:00
1,586,696,969,000
f9e0f7a54bcedbed853a0adb8cac3f6fbb16b19e
2
{ "blob_id": "f9e0f7a54bcedbed853a0adb8cac3f6fbb16b19e", "branch_name": "refs/heads/master", "committer_date": 1586696969000, "content_id": "140d311b4fc0f000bccbc3258c7f578583dde090", "detected_licenses": [ "Apache-2.0" ], "directory_id": "8cced97a617f980cca7b5e1342ac15e2ffbf8d33", "extension": "py"...
2.328125
stackv2
from ..CommonInterface import CommonInterfaceNslcm from .helpers import Helpers import json import requests import tarfile class Nslcm(CommonInterfaceNslcm): """ Lifecycle Management interface """ def __init__(self, host, port=9999): self._host = host self._port = port self._bas...
395
37.65
110
14
3,443
python
[{"finding_id": "codeql_py/request-without-cert-validation_31c6b52abfd0c1a9_09cdd1d0", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
8
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation"...
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 49, 95, 131, 198, 231, 267, 308, 329 ]
[ null, 96, 132, null, null, null, null, null ]
[ 17, 17, 17, 17, 17, 17, 17, 17 ]
[ 97, 49, 49, 86, 97, 87, 97, 97 ]
2024-11-19T00:28:46.736894+00:00
1,684,352,409,000
64f4347df9b9bb0b0604e7630438385017e04789
3
{ "blob_id": "64f4347df9b9bb0b0604e7630438385017e04789", "branch_name": "refs/heads/master", "committer_date": 1684352409000, "content_id": "5bbfbe74e52f6701324bb84377695ea7b6bcb9c4", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "ac5c804478b28611208a862fbe64de54562d820a", "extension": "p...
2.90625
stackv2
"""Useful decorators. """ import os import json import uuid import logging import datetime import time import threading from contextlib import ContextDecorator import wrapt from flask import request, g def _start_watch(name, w_type, args, kwargs, show_args=False): """Helper function to start watching command ...
263
32.25
77
18
2,023
python
[{"finding_id": "codeql_py/log-injection_795ee0945199487b_6375f105", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 173 ]
[ null ]
[ 59 ]
[ 62 ]
2024-11-19T00:50:16.755139+00:00
1,409,201,183,000
7752eda75134169b324e6db408f06f1f46931472
2
{ "blob_id": "7752eda75134169b324e6db408f06f1f46931472", "branch_name": "refs/heads/master", "committer_date": 1409201183000, "content_id": "557691ce652211a65b95bd2dcc85350258ac0d96", "detected_licenses": [ "Unlicense" ], "directory_id": "0acb3504e00132ff702c27f31288e24b3bdb6156", "extension": "py",...
2.46875
stackv2
#!/usr/bin/env python3 from bs4 import BeautifulSoup from datetime import datetime from os import path, sep import sys from glob import glob import re import collections from decimal import * from jinja2 import Environment, PackageLoader # REPORTS_DIR = 'C:\\NullpoMino\\report' # windows example REPORTS_DIR = '/home...
116
38.28
77
27
1,157
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_9988aff90ed31f4a_40f6e5a5", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 110 ]
[ null ]
[ 7 ]
[ 47 ]
2024-11-19T00:51:23.495463+00:00
1,331,611,355,000
92cb026403bc888244f8823643dc6221219cf997
3
{ "blob_id": "92cb026403bc888244f8823643dc6221219cf997", "branch_name": "refs/heads/master", "committer_date": 1331611355000, "content_id": "4769fe2b2ff5697edac867610350404b8e93b4ae", "detected_licenses": [ "MIT" ], "directory_id": "cb202849ab49e23e1eda422875e9d984bdaa0121", "extension": "py", "fi...
2.65625
stackv2
import os import random import re import shutil import sys apps = ['app1', 'app2', 'app3'] def copy_template(name): """ Copies the project_template directory structure. """ destination = '/Users/jonathan/projects/' # destination = '/Users/nickficano/Desktop/temp/' top_dir = os.path.join(dest...
66
29.89
126
17
482
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_615492fd1974aeb8_0d37792e", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (secret)](1) as clear text." ]
[ 35 ]
[ null ]
[ 26 ]
[ 126 ]
2024-11-19T01:30:50.939689+00:00
1,545,692,248,000
096383f187fbf0cb2d0ca9afb40c59e25b3a9135
3
{ "blob_id": "096383f187fbf0cb2d0ca9afb40c59e25b3a9135", "branch_name": "refs/heads/master", "committer_date": 1545692248000, "content_id": "1660f48dd2ad7ec0eed3a766cbbc2d7e44daa27d", "detected_licenses": [ "MIT" ], "directory_id": "0e35bbd48b3f3bd3f77a6b1c97222558cc4fa900", "extension": "py", "fi...
2.640625
stackv2
#!/usr/bin/env python3 ############################################################################### # Module Imports ############################################################################### import base64 import jinja2 import os.path import pathlib import random as rand import shutil import subprocess import...
140
29.56
79
13
958
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_b974f053430737d7_6c6d6712", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 70 ]
[ null ]
[ 7 ]
[ 67 ]
2024-11-19T01:30:52.329035+00:00
1,516,570,891,000
23ea155e4235a688d2d61ec8ff98c2279685a03c
3
{ "blob_id": "23ea155e4235a688d2d61ec8ff98c2279685a03c", "branch_name": "refs/heads/master", "committer_date": 1516570891000, "content_id": "9244e8f8577db96b71dc24f9d06bd1f3a29a79a4", "detected_licenses": [ "MIT" ], "directory_id": "abdb29dc22a4a714e48c8d1366e95448ce65c674", "extension": "py", "fi...
3.03125
stackv2
import requests class BitBank(object): def __init__(self, api_key): self.api_key = api_key def fetch_pair(self, currency_pair): """ :param currency_pair: str market pair name e.g. "BTC_ETH" :return: latest forecasts/featureset for the given currency_pair """ t...
54
35.15
115
16
406
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_31dd7545892db231_164fdf55", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 18, 33, 49 ]
[ null, null, null ]
[ 23, 23, 23 ]
[ 93, 93, 93 ]
2024-11-19T02:05:00.434522+00:00
1,503,160,870,000
38af7a53835dbb21a49f7b9e7dbb97cd205e2eaa
3
{ "blob_id": "38af7a53835dbb21a49f7b9e7dbb97cd205e2eaa", "branch_name": "refs/heads/master", "committer_date": 1503160870000, "content_id": "49af9d5fa7d3572d92fce072767069630fe42774", "detected_licenses": [ "MIT" ], "directory_id": "fe9c592d524755da6f1a4bf3b691482593432f0c", "extension": "py", "fi...
2.71875
stackv2
# -*- coding: utf-8 -*- from flask import render_template, redirect, request, url_for, flash from flask_login import login_user, logout_user, login_required, current_user from . import auth from .. import db from ..models import User from .forms import LoginForm, RegistrationForm, ChangePasswordForm,\ ChangeEmailFo...
93
30.41
78
16
714
python
[{"finding_id": "codeql_py/url-redirection_654c753d30e63d18_cea91d19", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 21 ]
[ null ]
[ 29 ]
[ 78 ]
2024-11-19T00:53:38.017073+00:00
1,528,116,993,000
07665cead73069ce1de316949d395a2bbf10f7d8
3
{ "blob_id": "07665cead73069ce1de316949d395a2bbf10f7d8", "branch_name": "refs/heads/master", "committer_date": 1528116993000, "content_id": "0e1835ae109714948bd8d0ad6418752936b3b9b4", "detected_licenses": [ "MIT" ], "directory_id": "33ae38625f65b685ea7673d2e8f01e25f308e85d", "extension": "py", "fi...
2.515625
stackv2
import requests import sys import random import base64 white = '\033[97m' green = '\033[92m' red = '\033[91m' yellow = '\033[93m' end = '\033[0m' back = '\033[7;91m' info = '\033[33m[!]\033[0m' que = '\033[34m[?]\033[0m' bad = '\033[31m[-]\033[0m' good = '\033[32m[+]\033[0m' run = '\033[97m[~]\033[0m' if sys.version_...
63
32.79
130
21
799
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_60f0139bbe04c8a8_c31260a4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 55 ]
[ null ]
[ 16 ]
[ 66 ]
2024-11-19T02:00:57.765519+00:00
1,583,209,243,000
00e60c80d7c28bc9b00574038d01138f97a37306
3
{ "blob_id": "00e60c80d7c28bc9b00574038d01138f97a37306", "branch_name": "refs/heads/master", "committer_date": 1583209243000, "content_id": "fbca7d779fe318c16803d31487451d78bf6b1bc9", "detected_licenses": [ "MIT" ], "directory_id": "70ba8427a8ee5e16d7a9f577409965ed75abf167", "extension": "py", "fi...
2.609375
stackv2
import re # number_mapping = {'1': 'one', # '2': 'two', # '3': 'three', # '4' : ['one', 'otw', 'itw'] } # s = "1 testing 2 3" # # print (re.sub(r'\d', s, lambda x: number_mapping[x.group()])) # # print(number_mapping) # for k,v in number_mapping.items(): # i...
69
24.91
122
8
501
python
[{"finding_id": "codeql_py/redos_f2e7bc03dcf65dd4_649c663a", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '/*' and containing many repetitio...
2
true
[ "CWE-1333", "CWE-1333" ]
[ "py/redos", "py/redos" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '/*' and containing many repetitions of '\\n'.", "This part of the regular expression may cause exponential backtracking on strings starting with '/**' and containing many repetitions of '\\n*'." ]
[ 58, 58 ]
[ null, null ]
[ 18, 35 ]
[ 52, 49 ]
2024-11-19T02:01:01.461483+00:00
1,609,788,103,000
659d39378eb469dab2dd82fa08101e74a7668520
2
{ "blob_id": "659d39378eb469dab2dd82fa08101e74a7668520", "branch_name": "refs/heads/master", "committer_date": 1609788103000, "content_id": "176fb73ee756fb060f2490b684c6fde2af00c261", "detected_licenses": [ "MIT" ], "directory_id": "92f0c73936c45d683a2d3b87465840b7b1b9817a", "extension": "py", "fi...
2.453125
stackv2
#!/usr/bin/python -tt # TODO: # - JSON body for GET requests """Client for talking to a RESTful server. Maybe just even a regular web server.""" from collections import namedtuple import Cookie import base64 import dbg import hashlib import os import re import socket import sys import time import urllib import urlp...
409
37.67
163
28
3,382
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0dc3bb266bce8cca_8fbe08cc", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](1) as clear text." ]
[ 286 ]
[ null ]
[ 34 ]
[ 91 ]
2024-11-19T00:40:22.977437+00:00
1,600,393,483,000
716ca406484ae249509504ae24c5a89ad298b442
3
{ "blob_id": "716ca406484ae249509504ae24c5a89ad298b442", "branch_name": "refs/heads/master", "committer_date": 1600393483000, "content_id": "92ac8c0dcc755a65f9369ff91b8417950ab785ea", "detected_licenses": [ "MIT" ], "directory_id": "aee58fd0ef8f44c04e08016c25740edeb884568f", "extension": "py", "fi...
3.25
stackv2
import operator import random # This script assumes that the user has a large window full of YouTube tabs with music, and a large window that has non-music tabs. # The user also opens YouTube tabs in other windows from time to time - music or not music. # The script assumes there's only one large (>30) all-music windo...
165
38.48
131
16
1,489
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_c17f5f1edce799a4_5cfb6d13", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [youtube.com/](1) may be at an arbitrary position in th...
3
true
[ "CWE-020", "CWE-020", "CWE-020" ]
[ "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "The string [youtube.com/](1) may be at an arbitrary position in the sanitized URL.", "The string [youtube.com](1) may be at an arbitrary position in the sanitized URL.", "The string [youtube.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 25, 31, 115 ]
[ null, null, null ]
[ 45, 40, 40 ]
[ 77, 64, 64 ]
2024-11-19T01:06:13.187773+00:00
1,572,507,736,000
ffd2437f23fc4dd18d244c91055945306305b8c6
3
{ "blob_id": "ffd2437f23fc4dd18d244c91055945306305b8c6", "branch_name": "refs/heads/master", "committer_date": 1572507736000, "content_id": "f0cdad6c6152ae4bcb627d6cb4449ea691c2d8d8", "detected_licenses": [ "MIT" ], "directory_id": "d62a8e38a5208ccfc7c902766c7c5f3637f153d7", "extension": "py", "fi...
3.03125
stackv2
from flask import Blueprint, request, jsonify, render_template from file_processing import write_file, read_file, read_lines, rewrite_file lesson_5 = Blueprint('lesson_5', __name__) @lesson_5.route('/post_request', methods = ['POST']) def post_request(): return request.args @lesson_5.route('/write_to_file', method...
80
25.1
75
13
541
python
[{"finding_id": "codeql_py/reflective-xss_3257ab0fb104538f_7e7e5a86", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
3
true
[ "CWE-079", "CWE-079", "CWE-079" ]
[ "py/reflective-xss", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 8, 21, 33 ]
[ null, null, null ]
[ 10, 10, 12 ]
[ 22, 52, 27 ]
2024-11-19T01:17:14.419946+00:00
1,653,618,896,000
ef9807f9eac6dc8fef16d772a673ceeda61103bd
3
{ "blob_id": "ef9807f9eac6dc8fef16d772a673ceeda61103bd", "branch_name": "refs/heads/master", "committer_date": 1653618896000, "content_id": "a6edcf4418a86e77638ca9b5a636692241373534", "detected_licenses": [ "MIT" ], "directory_id": "f1254516c22a10eafff4da137f03730809491bef", "extension": "py", "fi...
2.9375
stackv2
import os import tarfile from six.moves import urllib import pandas as pd import matplotlib.pyplot as plt import numpy as np import hashlib from sklearn.model_selection import train_test_split from sklearn.model_selection import StratifiedShuffleSplit from pandas.plotting import scatter_matrix from sklearn.preprocessin...
151
30.81
89
13
1,235
python
[{"finding_id": "codeql_py/tarslip_c79c573f8cc7ca58_a5c6cf8f", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 32 ]
[ null ]
[ 5 ]
[ 16 ]
2024-11-19T01:17:15.789462+00:00
1,438,932,973,000
d2bc9aa80267621262a82244099ed50c2534bad0
3
{ "blob_id": "d2bc9aa80267621262a82244099ed50c2534bad0", "branch_name": "refs/heads/master", "committer_date": 1438932973000, "content_id": "50d3809cd946d7b7493b448fc6736dd68b5e055a", "detected_licenses": [ "MIT" ], "directory_id": "6476302ad55753f812668d5296c2374b83128973", "extension": "py", "fi...
2.515625
stackv2
#!/usr/bin/env python import os import re import argparse import mimetypes from watchdog.observers import Observer from watchdog.events import FileSystemEventHandler import tornado.ioloop import tornado.web # This JS snippet below is embedded dynamically in every # HTML response sent back from this server. The JS co...
126
26.65
79
13
796
python
[{"finding_id": "codeql_py/path-injection_4b997f91dab0f05d_0767a856", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
3
true
[ "CWE-022", "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 83, 86, 94 ]
[ null, null, null ]
[ 26, 31, 18 ]
[ 30, 35, 22 ]
2024-11-19T01:17:22.771596+00:00
1,495,127,235,000
c03adba3cc9af82af123d233bcfed107fda4ca8c
3
{ "blob_id": "c03adba3cc9af82af123d233bcfed107fda4ca8c", "branch_name": "refs/heads/master", "committer_date": 1495127235000, "content_id": "53f74388f88cd072b30f56895bf2be63e971f2a3", "detected_licenses": [ "MIT" ], "directory_id": "1b6b9d59ba4b526480c03b7655a5a346ea2a6ae8", "extension": "py", "fi...
3.171875
stackv2
#! /usr/bin/env python import multiprocessing as mp import numpy as np import os import shutil import configparser import subprocess import collections """Module that contains functions to help run batches and parameter sweeps """ def _parse_config_fr_to_by(config_string): """Returns the value for the fr, to, a...
461
31.95
81
16
3,387
python
[{"finding_id": "codeql_py/overly-permissive-file_6c68163c6a5077b7_aca7773f", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
3
true
[ "CWE-732", "CWE-732", "CWE-732" ]
[ "py/overly-permissive-file", "py/overly-permissive-file", "py/overly-permissive-file" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable.", "Overly permissive mask in chmod sets file to world readable.", "Overly permissive mask in chmod sets file to world readable." ]
[ 450, 453, 455 ]
[ null, null, null ]
[ 5, 13, 13 ]
[ 35, 61, 63 ]
2024-11-19T01:17:25.073910+00:00
1,603,724,969,000
5b6417983b67af473e299e3e088ade751aaf4c21
3
{ "blob_id": "5b6417983b67af473e299e3e088ade751aaf4c21", "branch_name": "refs/heads/master", "committer_date": 1603724969000, "content_id": "0602c85f798320b5622501cdfe262aa33118cfa1", "detected_licenses": [ "MIT" ], "directory_id": "a37d36bae74dca625d56e85727620944b0ffce24", "extension": "py", "fi...
2.5625
stackv2
from config import * from collections import defaultdict from shapely.geometry import Polygon from shapely.ops import cascaded_union from descartes import PolygonPatch import seaborn as sns import re import theano.tensor as tt import scipy.stats from itertools import product import datetime import pickle as pkl import ...
378
32.85
171
18
3,260
python
[{"finding_id": "codeql_py/overly-permissive-file_ce58bafa2bef3608_8c3214a3", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to group writable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to group writable." ]
[ 258 ]
[ null ]
[ 5 ]
[ 36 ]
2024-11-19T01:15:15.860241+00:00
1,691,078,020,000
78acea8056ada3a6c528e1857ed49c4d61baa449
2
{ "blob_id": "78acea8056ada3a6c528e1857ed49c4d61baa449", "branch_name": "refs/heads/master", "committer_date": 1691078020000, "content_id": "7017e9cf440c174f0de6a86c86e5c3a73015a936", "detected_licenses": [ "MIT" ], "directory_id": "19c8f714f77aba731fbe4569501d63a51946f24e", "extension": "py", "fi...
2.421875
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- import os import sys import json import jinja2 import yaml import server def append_path(filename, file_path): ''' If a filename starts with './' then it is relative to the config.yml path. ''' if filename.startswith('./'): filename = os.path.join(file...
232
32.6
116
17
1,765
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_d59699321ced0135_3518b374", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 108 ]
[ 114 ]
[ 16 ]
[ 6 ]
2024-11-19T00:43:42.421061+00:00
1,540,923,380,000
a36d7824f4213f4841d7d79f06d8cb39f2f83482
3
{ "blob_id": "a36d7824f4213f4841d7d79f06d8cb39f2f83482", "branch_name": "refs/heads/master", "committer_date": 1540923441000, "content_id": "0bb3f7ec22da86658ca4da5bb40dde4622675041", "detected_licenses": [ "MIT" ], "directory_id": "d9295073a51d79d504267622d7876b4abd71393d", "extension": "py", "fi...
2.625
stackv2
#!/usr/bin/python3 """ Capture Siemens WiMAX device configurations. Used by CA Spectrum NCM. """ import argparse import os import re import sys import time import requests from bs4 import BeautifulSoup def newer(file_path, mtime): try: return os.path.getmtime(file_path) > mtime except FileNotFoundEr...
104
28.9
108
16
774
python
[{"finding_id": "codeql_py/request-without-cert-validation_346ce4ed1a93b930_5a3bab4c", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
5
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 43, 46, 56, 83, 84 ]
[ null, null, null, null, null ]
[ 5, 9, 9, 9, 9 ]
[ 34, 38, 43, 45, 61 ]
2024-11-19T00:43:44.883896+00:00
1,630,002,171,000
153cd580f9635812a7f25ca560c30d282b6d5c0e
2
{ "blob_id": "153cd580f9635812a7f25ca560c30d282b6d5c0e", "branch_name": "refs/heads/main", "committer_date": 1630002171000, "content_id": "5751bc6d2a5ad4ada8fe0ef776d5163a7c11dbb3", "detected_licenses": [ "MIT" ], "directory_id": "c232095652d3317a47b2d8a2fc151282992072d4", "extension": "py", "file...
2.4375
stackv2
import re from flask import Flask, render_template, request from keras.preprocessing.image import load_img from keras.preprocessing.image import img_to_array from keras.applications.vgg16 import preprocess_input from keras.applications.vgg16 import decode_predictions from keras.applications.vgg16 import VGG16 app = Fl...
29
27.55
55
12
185
python
[{"finding_id": "codeql_py/flask-debug_96e803d313de9b33_cd89fe36", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-022" ]
[ "py/flask-debug", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1)." ]
[ 29, 20 ]
[ null, null ]
[ 5, 25 ]
[ 35, 35 ]
2024-11-19T00:43:45.117542+00:00
1,543,811,540,000
256b652e72ce15d463fcb4927dc93c121132a40e
3
{ "blob_id": "256b652e72ce15d463fcb4927dc93c121132a40e", "branch_name": "refs/heads/master", "committer_date": 1543811540000, "content_id": "b78a4b8c77f9ca0dd75a7f9ebb4bbff78891825c", "detected_licenses": [ "Apache-2.0" ], "directory_id": "3c22053270dfd2ae6f9689237554fa889a32e5eb", "extension": "py"...
2.75
stackv2
#!/usr/env/python python3 # -*- coding: utf-8 -*- # @File : unzip_tar.py # @Time : 2018/8/17 9:01 # @Software : PyCharm import tarfile import os from absl import flags, app FLAGS = flags.FLAGS flags.DEFINE_string( "data_dir", "../../data/data_aishell/wav/", "the original tar data dir") flags.DEFINE_...
37
20.89
67
14
237
python
[{"finding_id": "codeql_py/tarslip_eb2850df83908a28_f15be73d", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 24 ]
[ null ]
[ 5 ]
[ 15 ]
2024-11-19T00:43:46.673864+00:00
1,632,996,400,000
29fcfcb9e41579da5a831406324ffb66ef6af9cd
3
{ "blob_id": "29fcfcb9e41579da5a831406324ffb66ef6af9cd", "branch_name": "refs/heads/master", "committer_date": 1632996400000, "content_id": "1a4dca9757b86a132c098bcdce210c8f3c5f7808", "detected_licenses": [ "MIT" ], "directory_id": "97ab50a083a5b183593f41e89853e429bc642190", "extension": "py", "fi...
2.984375
stackv2
from twython import Twython def read_strings_from_file(file_path, how_many): with open(file_path, 'r') as file: data = file.read() return data.split()[:how_many] def read_key_and_secret(file_path): return read_strings_from_file(file_path, 2) def read_token_secret_pin(file_path): return rea...
51
29.92
75
13
365
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_29316957f8f5eed2_7d8fbf78", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (secret)](3) as clear text.\nThis expression stores [sensitive data (password)](4) as clear text." ]
[ 20 ]
[ null ]
[ 20 ]
[ 50 ]
2024-11-19T01:32:05.852650+00:00
1,472,233,938,000
c2ec746203e3c0c78621a3490d55d959ce1d89d6
3
{ "blob_id": "c2ec746203e3c0c78621a3490d55d959ce1d89d6", "branch_name": "refs/heads/master", "committer_date": 1472233938000, "content_id": "d32f982dbe1ae0c0f520957f4b111a489b0f36f2", "detected_licenses": [ "MIT" ], "directory_id": "8d7587f48fb459dffec95b817dd528f55199f75c", "extension": "py", "fi...
3.359375
stackv2
#!/usr/bin/env python3 from random import choice medical = open('medical.txt', 'r').read().splitlines() positive = open('positive.txt', 'r').read().splitlines() trial_name = choice(positive) def select_starts_with(letter, terms): selected = [] for t in terms: if t[0] == letter: selected.ap...
24
28.04
67
13
174
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_43e95acba5991714_776531d9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 20, 22, 24 ]
[ null, null, null ]
[ 15, 15, 15 ]
[ 44, 31, 31 ]
2024-11-19T01:44:00.356045+00:00
1,476,916,026,000
f325b45c3daa81157b7dd6154fac62da4d114296
3
{ "blob_id": "f325b45c3daa81157b7dd6154fac62da4d114296", "branch_name": "refs/heads/master", "committer_date": 1476916026000, "content_id": "4256903bdcf3406edacaedeb09adb1195be5fef5", "detected_licenses": [ "MIT" ], "directory_id": "41d0e821757c2b071ddaca6313014f7848bb21e2", "extension": "py", "fi...
2.53125
stackv2
import ipaddress import logging from core.NeuronModule import NeuronModule, MissingParameterException, InvalidParameterException from wakeonlan import wol logging.basicConfig() logger = logging.getLogger("kalliope") class Wake_on_lan(NeuronModule): def __init__(self, **kwargs): super(Wake_on_lan, self)....
36
37.86
117
12
313
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0f188a46e281b000_84ddd53e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 32 ]
[ 33 ]
[ 22 ]
[ 62 ]
2024-11-19T01:44:09.316503+00:00
1,636,492,826,000
005ebc4edcdd425b6a4c4384e04cb743c051162b
3
{ "blob_id": "005ebc4edcdd425b6a4c4384e04cb743c051162b", "branch_name": "refs/heads/main", "committer_date": 1636492826000, "content_id": "5daf5d61df543929a02300ed729344de3a403a98", "detected_licenses": [ "MIT" ], "directory_id": "950627849ec9c0b8b26790a44ead59fc05d38d27", "extension": "py", "file...
3.078125
stackv2
import pydantic from typing import Optional import pprint import regex as re import pyperclip global char_repl_list char_repl_list = {'l':'1','L':'1', 'i':'1','!':'1','I':'1', 'S' : '$', 's': '$', 'a': '@', 'A' : '@', 'o':'0','O':'0','Q':'0' } global new_list new_list = [] class PassPhraseLengt...
80
35.59
155
19
649
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_415050db5affa20e_a06b253f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 61 ]
[ null ]
[ 15 ]
[ 92 ]
2024-11-19T00:59:32.017930+00:00
1,514,560,488,000
8a08d9977fa4c56cc7779820ad1578480c16554d
2
{ "blob_id": "8a08d9977fa4c56cc7779820ad1578480c16554d", "branch_name": "refs/heads/master", "committer_date": 1514560488000, "content_id": "88180ed09cc09809f46758ed6103f2b082867c45", "detected_licenses": [ "MIT" ], "directory_id": "12bcaa918b3a308595f41521df0c72232c1b538a", "extension": "py", "fi...
2.359375
stackv2
# TODO incomplete: # - guard g:loaded_senter? # - log to python-client's log? # - auto focus browser when using jupyter_nbportal import neovim import json import logging import os import re try: import pika except ImportError: pika = None @neovim.plugin class Senter(): def __init__(self, nvim): s...
341
32.65
81
23
2,560
python
[{"finding_id": "codeql_py/redos_4efe9fa6510da49b_6394a2cb", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '\\n'.", "remedia...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '\\n'." ]
[ 322 ]
[ null ]
[ 25 ]
[ 28 ]
2024-11-19T00:59:49.731674+00:00
1,596,408,184,000
d9db44bf21e28da35104e13a5976c167c566e5e5
4
{ "blob_id": "d9db44bf21e28da35104e13a5976c167c566e5e5", "branch_name": "refs/heads/master", "committer_date": 1596408184000, "content_id": "84c4cd69dcfd43b6ee32fd683ffb187b506a95f3", "detected_licenses": [ "MIT" ], "directory_id": "61f96629c9b2a21c48b0d78479ef12b00e4584b7", "extension": "py", "fi...
3.515625
stackv2
import argparse from random import choice from random import shuffle from typing import List from typing import Optional from typing import Sequence UPPER_LETTERS = (x for x in "ABCDEFGHIJKLMNOPQRSTUVWXYZ") LOWER_LETTERS = (x for x in "abcdefghijklmnopqrstuvwxyz") DIGITS = (x for x in "0123456789") SPECIAL = [x for x...
82
31.29
83
13
587
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_99b4096758e56725_b18a3c04", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (password)](3) as clear text.\nThis expression stores [sensitive data (password)](4) as clear text.\nThis expression stores [sensitive d...
[ 52, 75 ]
[ null, null ]
[ 21, 15 ]
[ 36, 23 ]
2024-11-19T01:00:12.843090+00:00
1,607,152,276,000
39f14ac6e180000961a6a69bc55de7f62422ace5
3
{ "blob_id": "39f14ac6e180000961a6a69bc55de7f62422ace5", "branch_name": "refs/heads/master", "committer_date": 1607152276000, "content_id": "5f83f1e61a4591788d9788f8a7bc5a206c98a5ef", "detected_licenses": [ "Apache-2.0" ], "directory_id": "03b258247dd5c48592881e364f017d5f8b9186f9", "extension": "py"...
2.6875
stackv2
#!/usr/bin/env python3 # encoding: utf-8 ''' Created on 2018 @author: Administrator ''' import logging from flask import request, Blueprint, abort, jsonify from langdetect import detect detect_language_api = Blueprint('detect_language_api', __name__, template_folder='templates') @detect_language_api.route('/langu...
26
23.04
93
12
149
python
[{"finding_id": "codeql_py/log-injection_05366e065e9f69b3_9dfb3fa8", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 24 ]
[ null ]
[ 18 ]
[ 67 ]
2024-11-19T01:11:43.966687+00:00
1,565,219,346,000
df79f34fd674c2fa5dd963bf23fdfa39c2a58c49
3
{ "blob_id": "df79f34fd674c2fa5dd963bf23fdfa39c2a58c49", "branch_name": "refs/heads/master", "committer_date": 1565219346000, "content_id": "33878264af728cd13592ee1295a2eaf906ceb9de", "detected_licenses": [ "MIT" ], "directory_id": "bdfe4253bde7d5997bb14decef425268e1c9fc33", "extension": "py", "fi...
2.859375
stackv2
""" Usage: python appleapp.py """ from flask import Flask, request, json from flask import request # App config. DEBUG = True app = Flask(__name__) app.config.from_object(__name__) app.config['SECRET_KEY'] = 'thisisareallygoodsecretmkay???' @app.route("/", methods=['GET', 'POST']) @app.route("/<username>", methods=...
61
30.07
92
15
376
python
[{"finding_id": "codeql_py/reflective-xss_8aaf0e6db162c7cd_736ff540", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 30 ]
[ null ]
[ 48 ]
[ 59 ]
2024-11-19T01:21:34.639075+00:00
1,499,099,757,000
fc8c64eee321637ff65acb9b31bb6d866cb167a6
3
{ "blob_id": "fc8c64eee321637ff65acb9b31bb6d866cb167a6", "branch_name": "refs/heads/master", "committer_date": 1499099757000, "content_id": "bf9bfa6d0bdb4237c2fe223b4cb48734f2c2a043", "detected_licenses": [ "MIT" ], "directory_id": "16b81ed8a643d515a92cbc64618d50cf74953e1a", "extension": "py", "fi...
2.671875
stackv2
#!/usr/bin/env python3.6 """ ReportGeneratorMain.py -- The main logical component of the Appfigures/Zendesk report generation script Copyright (C) 2017 Brandon Hurley This software may be modified and distributed under the terms of the MIT license. See the LICENSE file for details. """ import datetime import o...
342
50.84
152
23
3,095
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4458b05889650327_53ee6ed0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 70 ]
[ 71 ]
[ 11 ]
[ 64 ]
2024-11-19T02:10:35.231265+00:00
1,480,988,980,000
c1ba933740124ed89db1bc24973534f5a1020cb5
2
{ "blob_id": "c1ba933740124ed89db1bc24973534f5a1020cb5", "branch_name": "refs/heads/master", "committer_date": 1480988980000, "content_id": "f8992cea1c4d7044fda2906f249b4055db4713b7", "detected_licenses": [ "MIT" ], "directory_id": "1169f05483e1accce0f9547559132675f606a5ee", "extension": "py", "fi...
2.328125
stackv2
# -*- coding: utf-8 -*- import logging from flask import render_template, current_app, request, redirect, url_for, \ flash, jsonify, session from flask_login import login_user, logout_user, login_required, current_user from .models import User from . import users_bp from .forms import LoginForm, UserFormAdd, UserFo...
125
30.49
93
16
864
python
[{"finding_id": "codeql_py/url-redirection_9630b201bf8ce08d_0cf164ff", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 30 ]
[ null ]
[ 25 ]
[ 70 ]