added
stringlengths
32
32
created
int64
1,236B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.03
source
stringclasses
1 value
text
stringlengths
330
19.3k
num_lines
int64
16
648
avg_line_length
float64
15.5
59.3
max_line_length
int64
37
179
ast_depth
int64
8
38
length
int64
102
3.79k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.11k
276k
sast_codeql_findings_count
int64
1
33
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
33
rule_ids
listlengths
1
33
confidences
listlengths
1
33
severities
listlengths
1
33
messages
listlengths
1
33
line_starts
listlengths
1
33
line_ends
listlengths
1
33
column_starts
listlengths
1
33
column_ends
listlengths
1
33
2024-11-19T02:10:48.694613+00:00
1,584,642,314,000
7ba5090e366fc8f07b9a0f5637f32de28521cbac
3
{ "blob_id": "7ba5090e366fc8f07b9a0f5637f32de28521cbac", "branch_name": "refs/heads/master", "committer_date": 1584642314000, "content_id": "9534291d3f8fb57be1335fb0cca2ae5817fec36e", "detected_licenses": [ "MIT" ], "directory_id": "1dfa5c3e1da937748c8419066c296526937603bd", "extension": "py", "fi...
2.609375
stackv2
import os import sys import requests import shutil import simplejson as json import pandas as pd files = [ {"v1.1-train": "https://raw.githubusercontent.com/rajpurkar/SQuAD-explorer/master/dataset/train-v1.1.json"}, {"v1.1-dev": "https://raw.githubusercontent.com/rajpurkar/SQuAD-explorer/master/dataset...
188
37.31
116
22
1,525
python
[{"finding_id": "codeql_py/request-without-cert-validation_39f14db8c3c8c704_d539e068", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 62 ]
[ 63 ]
[ 21 ]
[ 63 ]
2024-11-19T02:45:18.193813+00:00
1,647,367,933,000
5d96b93bba1395c344d74f86983d41a1685f3ee5
3
{ "blob_id": "5d96b93bba1395c344d74f86983d41a1685f3ee5", "branch_name": "refs/heads/master", "committer_date": 1647367933000, "content_id": "c2a719fdba9fe2cc4323b8c4c51e60625b684750", "detected_licenses": [ "Apache-2.0" ], "directory_id": "da0ce1ec13cc4154ae4eb204afbf8a81ba600479", "extension": "py"...
2.59375
stackv2
# coding=utf-8 # Copyright 2019 The Google Research Authors. # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicab...
224
33.79
80
13
1,865
python
[{"finding_id": "codeql_py/overly-large-range_b6100fea9693711b_7c57be65", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo...
4
true
[ "CWE-020", "CWE-020", "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "Suspicious character range that is equivalent to \\[A-Z\\\\[...
[ 26, 26, 27, 27 ]
[ null, null, null, null ]
[ 52, 65, 40, 51 ]
[ 55, 68, 43, 54 ]
2024-11-19T02:45:34.549085+00:00
1,615,897,983,000
3bf25c794a48ac25b22ed35765d9aa5ff27b43ca
2
{ "blob_id": "3bf25c794a48ac25b22ed35765d9aa5ff27b43ca", "branch_name": "refs/heads/main", "committer_date": 1615897983000, "content_id": "2b3eaf7364073d863a8de047c74c428d4a2c9c13", "detected_licenses": [ "MIT" ], "directory_id": "879aa7593195bd7e8231fca88ad0d60208c56807", "extension": "py", "file...
2.328125
stackv2
import requests import json from bs4 import BeautifulSoup import pymongo import re from slimit import ast from slimit.parser import Parser from slimit.visitors import nodevisitor from selenium import webdriver from selenium.webdriver.support.ui import WebDriverWait from selenium.webdriver.support import expected_condi...
78
21.56
107
14
441
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_7d9c2c0121137ce1_b5dc452c", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'espn.com/mens-college-basketball/ga...
1
true
[ "CWE-020" ]
[ "py/incomplete-hostname-regexp" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'espn.com/mens-college-basketball/game', so it might match more hosts than expected." ]
[ 39 ]
[ null ]
[ 42 ]
[ 90 ]
2024-11-19T02:45:43.574192+00:00
1,634,114,197,000
87e40c16ab3b7c7e1237e967c4ceebe1bd7fc978
3
{ "blob_id": "87e40c16ab3b7c7e1237e967c4ceebe1bd7fc978", "branch_name": "refs/heads/master", "committer_date": 1634114197000, "content_id": "b14150b8b48b1f42caa4f420414f01a8e4a26e27", "detected_licenses": [ "MIT" ], "directory_id": "b369554fb670c1cfc838d98f474cea3636e04fca", "extension": "py", "fi...
3.171875
stackv2
import pandas as pd import matplotlib.pyplot as plt def obesity(excelfile="Obes-phys-acti-diet-eng-2014-tab.xls", nogui = False): data = pd.ExcelFile(excelfile) #print(data.sheet_names) # Read section 7.1 from the Excel file # Define the columns to be read columns1 = ['year', 'total', 'males', 'f...
25
23.4
80
9
175
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_60e20409cfd8d672_71e9d2c2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 22 ]
[ null ]
[ 12 ]
[ 23 ]
2024-11-19T02:45:51.526414+00:00
1,585,625,997,000
65255d3160cd054bc7a4037e9028c974547dc75f
3
{ "blob_id": "65255d3160cd054bc7a4037e9028c974547dc75f", "branch_name": "refs/heads/master", "committer_date": 1585625997000, "content_id": "2ede67d9ac3e87896a3748191ab6588677953f7b", "detected_licenses": [ "MIT" ], "directory_id": "ee77356856391c24c26400f38f4071b8dd644fba", "extension": "py", "fi...
2.625
stackv2
import os from flask import Flask, request, abort from linebot import (LineBotApi, WebhookHandler) from linebot.exceptions import (InvalidSignatureError) from linebot.models import * import googlemaps app = Flask(__name__) # Channel Access Token line_bot_api = LineBotApi('Your Token') # Channel Secret handler = We...
124
36.53
178
23
1,018
python
[{"finding_id": "codeql_py/log-injection_006c1ac9511f950e_cd8e3c66", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 25 ]
[ null ]
[ 21 ]
[ 44 ]
2024-11-19T02:57:10.780693+00:00
1,615,222,124,000
1e958781c542d996c3ae3f6929fbff68e2c70085
3
{ "blob_id": "1e958781c542d996c3ae3f6929fbff68e2c70085", "branch_name": "refs/heads/master", "committer_date": 1615222124000, "content_id": "65367c1e14c15e088b8c3cf750788a8fe2dbd34e", "detected_licenses": [ "MIT" ], "directory_id": "f151f353232b3945f1d338479de99fbfbf340f45", "extension": "py", "fi...
2.96875
stackv2
import traceback import requests import json import hashlib import secrets from typing import List class Procd: """Privacy respecting contact discovery""" SHARED_PRIME = 23 SHARED_BASE = 5 # also contains a last date of interaction # [(number1, date1), (number2, date2)] address_book = list()...
148
43.47
96
20
1,366
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b7b852df1d8a993c_4140d590", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
7
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-327", "CWE-327" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (secre...
[ 96, 127, 130, 144, 145, 70, 74 ]
[ null, null, null, null, null, null, null ]
[ 15, 19, 15, 15, 15, 17, 17 ]
[ 44, 52, 60, 30, 28, 40, 44 ]
2024-11-19T02:57:26.117681+00:00
1,587,137,650,000
44d57f868aba6e29f441fad86d79b48afcb12a54
3
{ "blob_id": "44d57f868aba6e29f441fad86d79b48afcb12a54", "branch_name": "refs/heads/master", "committer_date": 1587137650000, "content_id": "22bf09b44a38b69971d9da2e3bfb62f22b23040c", "detected_licenses": [ "Apache-2.0" ], "directory_id": "c081cbd459a873ee129915425e0a72c21b9d90b6", "extension": "py"...
3.1875
stackv2
import re from library import applescript class PyDomElement(object): def __init__(self, parent, as_type, identifier): self.as_type = as_type self.identifier = identifier self.parent = parent self.children = [] def __repr__(self): my_repr = self.as_type + ' ' + self.ide...
109
36.26
140
18
883
python
[{"finding_id": "codeql_py/redos_b1bd294e43fea0d5_10549067", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '! '.", "remediat...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '! '." ]
[ 40 ]
[ null ]
[ 26 ]
[ 31 ]
2024-11-19T03:12:06.811749+00:00
1,582,043,443,000
cdfd511a74bb4c55eac1639639d9d7fe90f2ad4a
3
{ "blob_id": "cdfd511a74bb4c55eac1639639d9d7fe90f2ad4a", "branch_name": "refs/heads/master", "committer_date": 1582043443000, "content_id": "ad6d1ec8a95c8033f22f40445244a9f66cdf73d7", "detected_licenses": [ "MIT" ], "directory_id": "e83a3142a51d5ec187feb4437838e87903514857", "extension": "py", "fi...
2.640625
stackv2
import sys import requests import os import time import datetime # 代理设置 proxies={ 'http':'127.0.0.1:1280', 'https':'127.0.0.1:1280' } # 屏蔽warning信息,因为下面verify=False会报警告信息 requests.packages.urllib3.disable_warnings() def download(url, file_path,headers_dl): start2 = datetime.datetime.now() # 第一次请求是为了得到文件总大小 r1 =...
141
27.01
147
18
1,503
python
[{"finding_id": "codeql_py/request-without-cert-validation_0a5ae43ac6ffaa6a_7203cb8a", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
3
true
[ "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 19, 36, 77 ]
[ null, null, null ]
[ 7, 6, 7 ]
[ 88, 87, 69 ]
2024-11-19T03:12:09.516899+00:00
1,537,909,114,000
d3d69306a16cca610230537d76fb177809750172
3
{ "blob_id": "d3d69306a16cca610230537d76fb177809750172", "branch_name": "refs/heads/master", "committer_date": 1537909114000, "content_id": "dab8ab1a98a17dc4c4de829ac245e76a94d7900e", "detected_licenses": [ "MIT" ], "directory_id": "2965aa6e917489bf4e005102861590a7a4de0273", "extension": "py", "fi...
2.8125
stackv2
with open("lfw-gender.txt") as lfwgender, open("unknown-gender.txt") as unknowngender, open("lfw-gender2.txt", "w") as newfile: nextline = lfwgender.readline() while nextline: firstname, gender = nextline.split() if gender != "?": newfile.write(nextline) else: unl...
24
36.21
127
18
207
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_0b4ebfb0c06fc17d_37104546", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",...
5
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.", "This expression stores [sensitive data (private)](1) as clear text.", "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.", "This expression logs [sensi...
[ 6, 19, 21, 17, 17 ]
[ null, null, null, null, null ]
[ 27, 31, 31, 23, 67 ]
[ 35, 39, 67, 65, 78 ]
2024-11-19T03:12:22.295409+00:00
1,607,614,120,000
803caabc7b7dcaaf56be61794dd7a6180bb7ba96
2
{ "blob_id": "803caabc7b7dcaaf56be61794dd7a6180bb7ba96", "branch_name": "refs/heads/master", "committer_date": 1607614120000, "content_id": "8ac0baddcfde9491186f6ee8c420524b68f3c214", "detected_licenses": [ "MIT" ], "directory_id": "ab045e2598f82ae3d8bcc82bb1dc17a0c884c59e", "extension": "py", "fi...
2.421875
stackv2
import sys if not sys.version_info > (2, 7): print("Python 2 is no more supported") exit(-1) elif not sys.version_info >= (3, 8): print("Requires at least python 3.8 (using dataclasses and walrus operator)") exit(-1) import dataclasses from dataclasses import dataclass from typing import List from dat...
125
35.46
166
20
1,072
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_cf934fadc06e2ed9_cdffa5ac", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 104 ]
[ null ]
[ 17 ]
[ 79 ]
2024-11-19T03:12:24.967323+00:00
1,512,605,069,000
a4414b597adb2525e1fe7cc0bf421ac44960c6ec
2
{ "blob_id": "a4414b597adb2525e1fe7cc0bf421ac44960c6ec", "branch_name": "refs/heads/master", "committer_date": 1512605069000, "content_id": "f903326c9c0f7e71cc467d764da7ae975a6a56ce", "detected_licenses": [ "MIT" ], "directory_id": "b2ca3bc0eaaf3dd430a2f5c118c01632d0a01143", "extension": "py", "fi...
2.390625
stackv2
import DBAPI, uuid, hashlib, csv, os, zipfile from flask import Flask, request, render_template, jsonify, send_from_directory, send_file conn = DBAPI.sqlite3.connect("myDB.db") app = Flask(__name__) currentUser = '' app.config['UPLOAD_FOLDER'] = os.path.join(app.root_path) @app.route('/') def main(): return ren...
149
26.22
134
22
994
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_7828aaba51c1baee_3528ef72", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
6
true
[ "CWE-327", "CWE-327", "CWE-022", "CWE-022", "CWE-022", "CWE-022" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.", "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computational...
[ 40, 107, 24, 101, 104, 122 ]
[ null, null, null, null, null, null ]
[ 35, 50, 36, 12, 15, 12 ]
[ 71, 90, 55, 63, 66, 63 ]
2024-11-19T01:33:39.387724+00:00
1,347,627,675,000
41427a46f4b54b93693443bd46538db21ad4337c
2
{ "blob_id": "41427a46f4b54b93693443bd46538db21ad4337c", "branch_name": "refs/heads/master", "committer_date": 1347627675000, "content_id": "1cd06fbc83614e01684b067409c0ab9244af58e4", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "1abf985d2784efce3196976fc1b13ab91d6a2a9e", "extension": "p...
2.359375
stackv2
from os.path import basename from os import chmod from SCons.Builder import Builder def generateShellScript(filename, class_name, jars, env): f=open(filename, 'w') f.write("#!/bin/bash\n") classpath = "-cp " + ("%s:"*len(jars))[:-1] % tuple([str(jar) for jar in jars]) java_command = "java -Djava.net.pr...
31
35.42
99
18
313
python
[{"finding_id": "codeql_py/overly-permissive-file_532f45e774042347_534ee1c4", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable." ]
[ 16 ]
[ null ]
[ 5 ]
[ 28 ]
2024-11-19T01:33:42.654611+00:00
1,523,281,339,000
49ef1d1114dbc26c3a5b96007cfcab69c8ede4cb
3
{ "blob_id": "49ef1d1114dbc26c3a5b96007cfcab69c8ede4cb", "branch_name": "refs/heads/master", "committer_date": 1523281339000, "content_id": "2894b815448c27f00a391fe6036142be8830ecb6", "detected_licenses": [ "MIT" ], "directory_id": "2266f6ba81eb0b5ef0b07643c8f403b9ad389ce0", "extension": "py", "fi...
2.765625
stackv2
from flask import Flask, request, make_response from random import randint app = Flask(__name__) @app.route('/') def randomnum(): global number number = randint(0, 10000) return str(number) @app.route('/one/<int:num>') def one(num): global number if num == number: m = '{} was correct!<b...
103
23.18
119
18
740
python
[{"finding_id": "codeql_py/reflective-xss_0dcbb4ac8e04d1aa_000460bd", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
7
true
[ "CWE-079", "CWE-079", "CWE-079", "CWE-079", "CWE-079", "CWE-079", "CWE-079" ]
[ "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scri...
[ 22, 33, 44, 73, 75, 84, 94 ]
[ null, null, null, null, null, null, null ]
[ 12, 12, 12, 16, 16, 12, 26 ]
[ 27, 27, 27, 45, 42, 16, 30 ]
2024-11-19T01:33:46.472148+00:00
1,693,589,752,000
a16b06cf6cbcfe8848743446aaf1679032ba8f7a
2
{ "blob_id": "a16b06cf6cbcfe8848743446aaf1679032ba8f7a", "branch_name": "refs/heads/main", "committer_date": 1693589752000, "content_id": "2a697c1c1f9fecc7a4650ca9040eb134519d592d", "detected_licenses": [ "Apache-2.0" ], "directory_id": "2950d1852a03ab912de2c75c3a15c2276555cb5a", "extension": "py", ...
2.46875
stackv2
# This program is free software; you can redistribute it and/or modify # it under the terms of the (LGPL) GNU Lesser General Public License as # published by the Free Software Foundation; either version 3 of the # License, or (at your option) any later version. # # This program is distributed in the hope that it will ...
212
27.22
90
16
1,472
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_d988c70bed1e7e1f_9cbb7c2a", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (id)](2) is used in a hashing algorithm (MD5) that is insecure." ]
[ 144 ]
[ null ]
[ 22 ]
[ 33 ]
2024-11-19T01:33:52.766402+00:00
1,504,621,464,000
03566b06811f4c0b4c2a1a86cf33b128681a7240
3
{ "blob_id": "03566b06811f4c0b4c2a1a86cf33b128681a7240", "branch_name": "refs/heads/master", "committer_date": 1504621464000, "content_id": "ef46b27f0b62efe08351e0f8d5a4fdc0312212a9", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "91d72d939f3a6a09e01d09f4a813755938dca655", "extension": "p...
2.578125
stackv2
#!/usr/bin/python # -*- encoding: utf-8 -*- """ exif-revgeo ~~~~~~~~~~~ This utility reads the GPS coordinates from your photos, reverse geocode them, and write the result to the appropriate EXIF city/country location tags. :copyright: (c) 2015 by fg1 :license: BSD, see LICENSE for more de...
135
33.69
110
15
1,157
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a32a1946a7eaad59_818b7216", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 86 ]
[ null ]
[ 22 ]
[ 87 ]
2024-11-19T02:10:47.223540+00:00
1,572,592,781,000
89abf580cd63c1cf4e453095ace7e3677bed4500
3
{ "blob_id": "89abf580cd63c1cf4e453095ace7e3677bed4500", "branch_name": "refs/heads/master", "committer_date": 1572592781000, "content_id": "f26afce973a876cf4702b09d19e9ba0de95ee748", "detected_licenses": [ "MIT" ], "directory_id": "0703ac9937f8ac84ab58bbf7d60e309fb21b0689", "extension": "py", "fi...
2.75
stackv2
import logging from getpass import getpass from configparser import ConfigParser, NoOptionError from simple_encrypt import test_encrypt, test_decrypt import ccxt log = logging.getLogger(__name__) logging.basicConfig( level=logging.INFO, format='%(asctime)s %(levelname)s %(message)s' ) # only accept API keys ...
119
29.11
102
14
821
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b497f0093ad6f220_8e8a7e3f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text." ]
[ 39, 62 ]
[ null, 63 ]
[ 18, 18 ]
[ 79, 68 ]
2024-11-19T02:10:55.717472+00:00
1,534,766,194,000
65da51589dfe6baef201b0c1931fe79389a47df4
4
{ "blob_id": "65da51589dfe6baef201b0c1931fe79389a47df4", "branch_name": "refs/heads/master", "committer_date": 1534766194000, "content_id": "a3d3f273c36c3d6b5f5268315182c80fcc7d97d8", "detected_licenses": [ "MIT" ], "directory_id": "d3d5b933fe0672ba141b3cfde0ad942438b38304", "extension": "py", "fi...
3.859375
stackv2
lectures = int(input()) budget = float(input()) jelev = 0 royal = 0 roli = 0 trofon = 0 sino = 0 others= 0 for i in range(lectures+1): name = input().capitalize() if name == 'Jelev': jelev += 1 elif name == 'Royal': royal += 1 elif name == 'Roli': roli += 1 elif name == 'T...
40
24
55
10
335
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4c7a6079740cd726_48c43732", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
6
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive...
[ 34, 35, 36, 37, 38, 39 ]
[ null, null, null, null, null, null ]
[ 7, 7, 7, 7, 7, 7 ]
[ 53, 53, 51, 55, 51, 55 ]
2024-11-19T02:11:21.778685+00:00
1,495,953,004,000
0d6bdf14b0e4dd8e78a5d2bb15c087ec4e32ba79
2
{ "blob_id": "0d6bdf14b0e4dd8e78a5d2bb15c087ec4e32ba79", "branch_name": "refs/heads/master", "committer_date": 1495953004000, "content_id": "e23c7f13037af715aaa07bcb62a1c20283b89ba7", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "b532ad4272e1eca84fa10c311251cbbcbf65bb4f", "extension": "p...
2.390625
stackv2
import psycopg2 from connection import connection from stub import send_err import sys, getopt def main(argv): host = '' password = '' port= '' f = open('conf.ini', 'w') f.write('[postgresql]' + '\n'+'user=postgres'+ '\n'+'database=postgres'+'\n') try: opts, args = getopt.getopt(argv,"hs:p:l:",...
100
30.46
80
15
690
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_c5408ef9761b770f_e8a77036", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text." ]
[ 27 ]
[ null ]
[ 12 ]
[ 71 ]
2024-11-19T02:11:27.690787+00:00
1,617,987,995,000
d81489dcc4253c5028f46b349280929085e63d59
4
{ "blob_id": "d81489dcc4253c5028f46b349280929085e63d59", "branch_name": "refs/heads/main", "committer_date": 1617987995000, "content_id": "c763921b557227354ae292e2fed31a77350bd831", "detected_licenses": [ "Apache-2.0" ], "directory_id": "49f31317285779f488396a1af8171c5775e0e7bb", "extension": "py", ...
3.6875
stackv2
class Student: def __init__(self,name,course,sex): self.name = name self.course = course self.sex = sex s = Student("Mohit","Mtech","Male") print("Student Detail:") print("NAME:",s.name) print("COURSE",s.course) print("SEX",s.sex) #deleting sex del s.sex print("Student Detail:") print("NA...
18
20.06
39
9
110
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_877074f230918dc2_85d8723c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 11 ]
[ null ]
[ 13 ]
[ 18 ]
2024-11-19T02:32:58.355554+00:00
1,488,872,335,000
42cb9ada8a232b98c9e31c1c97fb7fdb8060d960
2
{ "blob_id": "42cb9ada8a232b98c9e31c1c97fb7fdb8060d960", "branch_name": "refs/heads/master", "committer_date": 1488872335000, "content_id": "4bfdf3872dd722d01a8ea2c4d13d4f159b5ffb00", "detected_licenses": [ "MIT" ], "directory_id": "06282ae2a96cac120f574593aaae13ae3a9774c7", "extension": "py", "fi...
2.375
stackv2
# _*_ coding: utf-8 _*_ from flask import render_template, redirect, flash, url_for, request, session from flask.ext.login import login_user, logout_user, login_required, \ current_user from . import auth from ..main import main from ..models import User from ..email import send_async_email from .. import db fro...
118
29.45
87
16
808
python
[{"finding_id": "codeql_py/url-redirection_17d8e8c3e0a708fe_647a4da1", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 27 ]
[ null ]
[ 29 ]
[ 62 ]
2024-11-19T02:33:04.715769+00:00
1,573,131,930,000
9ccb20815acd7de49e0728bd975322f64a0f8622
3
{ "blob_id": "9ccb20815acd7de49e0728bd975322f64a0f8622", "branch_name": "refs/heads/master", "committer_date": 1573132240000, "content_id": "a8e2c8098f5f647c503fd2105ac0b6dbda1475e3", "detected_licenses": [ "MIT" ], "directory_id": "e8a45016e0799181289db0b5ae0cf3c91eec5c80", "extension": "py", "fi...
2.96875
stackv2
"""Authentication/Login Blueprint.""" from pprint import pprint import flask from flask import Blueprint, flash, render_template, url_for, redirect, request from flask_login import login_required, login_user, logout_user from .forms import LoginForm from .models import LDAPUser auth_handler = Blueprint(name='auth',...
61
31.62
102
16
383
python
[{"finding_id": "codeql_py/url-redirection_6afdded9338fb95d_2a2ff586", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 50 ]
[ null ]
[ 29 ]
[ 65 ]
2024-11-19T02:33:28.781065+00:00
1,620,695,672,000
6f12915160ef23952b2e28a2ebad22f44753303f
4
{ "blob_id": "6f12915160ef23952b2e28a2ebad22f44753303f", "branch_name": "refs/heads/main", "committer_date": 1620695672000, "content_id": "71f03963f2d918df2e3d7f8f857f95ac07bb071b", "detected_licenses": [ "MIT" ], "directory_id": "a1c8cf2a07cb1fa755665ed482d63b88925937a1", "extension": "py", "file...
4.03125
stackv2
class Employee: def __init__(self, name, age, salary): self.name = name self.age = age self.salary = salary def work(self): print(f'{self.name} is working ...') class SoftwareEngineer(Employee): def __init__(self, name, age, level, salary): super().__init__(...
35
17.2
75
12
172
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_78660ef9f8a22d2b_551927a3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (priva...
[ 21, 34 ]
[ null, null ]
[ 15, 7 ]
[ 75, 16 ]
2024-11-19T02:33:29.650341+00:00
1,571,589,593,000
38d84cc9fd6860b5ec0e6141eeb50753518b8c53
3
{ "blob_id": "38d84cc9fd6860b5ec0e6141eeb50753518b8c53", "branch_name": "refs/heads/master", "committer_date": 1571589593000, "content_id": "8817a33311d7581ffdbf97eacdec862bdb56ca36", "detected_licenses": [ "MIT" ], "directory_id": "d8517846ad19a4a0d430ce97abfb07ca0f14d231", "extension": "py", "fi...
2.53125
stackv2
# -*- coding: utf-8 -*- from environs import Env import logging import requests import os import smtplib # -------------------------- # Constants # -------------------------- env = Env() env.read_env('../.env') TO = env('TO') FROM = env('FROM') PASSWD = env('PASSWD') NOIP_USER = env('NOIP_USER') NOIP_PASSWD = env(...
86
25.28
141
16
584
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bc2409cfa0fb9c11_b1eb0ad6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 86 ]
[ null ]
[ 22 ]
[ 28 ]
2024-11-19T02:46:21.480272+00:00
1,502,098,745,000
92b2d2d7cec7d9740a7075cc97a4117ed43a1b9d
3
{ "blob_id": "92b2d2d7cec7d9740a7075cc97a4117ed43a1b9d", "branch_name": "refs/heads/master", "committer_date": 1502098745000, "content_id": "9ef73ffd0787e4df9ac63fda5e520da4917e7cd9", "detected_licenses": [ "MIT" ], "directory_id": "025f990682f1a6b8301667fde835f50106ad7677", "extension": "py", "fi...
2.703125
stackv2
import urllib try: import simplejson as json except : import json import requests __all__ = [ 'DFAASApiClient' ] ################################################################################ class HttpException(Exception): def __init__(self, code, reason, error='Unknown Error'): self.c...
243
28.51
119
13
1,603
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8890c095783353b3_748f05b1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (p...
[ 236, 243 ]
[ null, null ]
[ 11, 11 ]
[ 40, 25 ]
2024-11-19T02:59:17.810708+00:00
1,611,005,440,000
876e386e3154d7fb2c16572a1630cd9ed4cb946a
3
{ "blob_id": "876e386e3154d7fb2c16572a1630cd9ed4cb946a", "branch_name": "refs/heads/master", "committer_date": 1611005440000, "content_id": "8bee2d7e3f4f280d26ea6cb0eea5376374c4c258", "detected_licenses": [ "Apache-2.0" ], "directory_id": "0512010ca13342f7cd619003ae36453bc951d427", "extension": "py"...
2.71875
stackv2
import time import fire from libetrv.device import eTRVDevice def time_to_str(datetime): if datetime is not None: return datetime.strftime('%Y-%m-%d %H:%M:%S %Z') return None class CLI: def __init__(self, pin=b'0000', secret=None): self._pin = pin if secret is not None: ...
80
34.31
101
14
668
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_57908af7b71e6bc0_a5231b43", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 48 ]
[ null ]
[ 30 ]
[ 53 ]
2024-11-19T02:59:53.659897+00:00
1,323,362,548,000
977e00dba87fdea1cc33fea255a58833a72bdce1
2
{ "blob_id": "977e00dba87fdea1cc33fea255a58833a72bdce1", "branch_name": "refs/heads/master", "committer_date": 1323362548000, "content_id": "800b169b7debfbc5161770379c9d2178c5cf463b", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "40aeccb61c3b68ad170031808993136061adcba7", "extension": "p...
2.328125
stackv2
import urlparse import base64 import logging from wsgiref.util import is_hop_by_hop from google.appengine.ext import webapp from google.appengine.ext.webapp.util import run_wsgi_app as run from google.appengine.api import urlfetch from cgi import parse_qs,parse_qsl from hashlib import sha1 from hmac import new as hm...
238
34.91
109
16
1,861
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a3b1acb586a1cdc9_b98ea1f3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
3
true
[ "CWE-312", "CWE-312", "CWE-327" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text.\nThis expression logs [sensitive data (passwor...
[ 126, 127, 196 ]
[ null, null, null ]
[ 27, 27, 25 ]
[ 32, 33, 42 ]
2024-11-19T02:59:57.097008+00:00
1,571,393,103,000
66882e897cf7eb4812a7e31c2ab5f2e0e84b9f14
2
{ "blob_id": "66882e897cf7eb4812a7e31c2ab5f2e0e84b9f14", "branch_name": "refs/heads/master", "committer_date": 1571393103000, "content_id": "99da46ce2eca7179576a426b12b08c9c6091640a", "detected_licenses": [ "MIT" ], "directory_id": "bf53931505601b3e11edc80fd436a51f8ecdbbe2", "extension": "py", "fi...
2.484375
stackv2
#!/usr/bin/env python3 import sys import hashlib import random import re import functools import time import json import pathlib import base64 import traceback import socket OK, CORRUPT, MUMBLE, DOWN, CHECKER_ERROR = 101, 102, 103, 104, 110 PORT = 10001 TIMEOUT = 3 SCRIPT_PATH = pathlib.Path(__file__).parent ABC =...
369
30.88
99
20
3,506
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_019a482d3472308c_9b984dc3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 158 ]
[ null ]
[ 15 ]
[ 21 ]
2024-11-19T03:35:14.182486+00:00
1,543,749,956,000
12df733c1ed87e8407c55d6e9f76e4d8037e4d3c
2
{ "blob_id": "12df733c1ed87e8407c55d6e9f76e4d8037e4d3c", "branch_name": "refs/heads/master", "committer_date": 1543749956000, "content_id": "a1a4de8d4661dbb1072d67fbcabfa59939861b79", "detected_licenses": [ "BSD-2-Clause-Views", "BSD-2-Clause" ], "directory_id": "6cf7192f0da30234fb5ac743bcaba97a12...
2.5
stackv2
import json from flask import Flask, request, redirect import multiprocessing from threading import Timer import twitter from twitter.oauth_dance import parse_oauth_tokens from twitter.oauth import read_token_file, write_token_file # XXX: Go to http://twitter.com/apps/new to create an app and get values # for these ...
107
34.22
125
13
870
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6f57658f672df61b_29fb8020", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 78, 78 ]
[ null, null ]
[ 11, 24 ]
[ 22, 42 ]
2024-11-19T03:35:16.630803+00:00
1,562,700,862,000
db12e707f918c8e3f5edf5580f6884673aa78ec2
2
{ "blob_id": "db12e707f918c8e3f5edf5580f6884673aa78ec2", "branch_name": "refs/heads/master", "committer_date": 1562700862000, "content_id": "b17080220914909e73e2411a7767c4af6f5a6ac4", "detected_licenses": [ "Apache-2.0" ], "directory_id": "1e9fed88ce4a623970f7e53143753a170d4bdcda", "extension": "py"...
2.5
stackv2
#!/bin/env python3 import os import os.path import argparse from jinja2 import Environment, BaseLoader abspath = os.path.abspath join = os.path.join GENERATED_HEADER = '# # # # GENERATED FILE -- DO NOT MODIFY # # # #\n' def main(version, repourl): SCRIPT_DIR = os.path.dirname(__file__) ROOT_DIR = abspath(joi...
59
34.22
130
13
517
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_9f0697d77ff055f2_a17bfbc7", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
3
true
[ "CWE-079", "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 30, 39, 47 ]
[ null, null, null ]
[ 20, 20, 20 ]
[ 50, 50, 50 ]
2024-11-19T03:35:28.259369+00:00
1,693,406,430,000
43331d5d5f0c16563b27bb534bd37140a2d7b7be
2
{ "blob_id": "43331d5d5f0c16563b27bb534bd37140a2d7b7be", "branch_name": "refs/heads/main", "committer_date": 1693406430000, "content_id": "54928eb92bccb02b51b6ca2cb1884c8ade13ee16", "detected_licenses": [ "Apache-2.0" ], "directory_id": "61004e474b7b2ad0071c16766f0f7874f04f9466", "extension": "py", ...
2.40625
stackv2
# Copyright 2022 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # https://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, ...
120
29.65
80
15
865
python
[{"finding_id": "codeql_py/stack-trace-exposure_1406bb0344a85c05_2f90a9a3", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
5
true
[ "CWE-209", "CWE-209", "CWE-209", "CWE-215", "CWE-117" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/flask-debug", "py/log-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "A Flask app appears to b...
[ 108, 112, 116, 120, 102 ]
[ null, null, null, null, null ]
[ 49, 49, 49, 5, 40 ]
[ 56, 62, 56, 64, 45 ]
2024-11-19T01:26:45.041999+00:00
1,549,171,914,000
f1d337134554d98e28da3bdc5b97be5dd1fb29c2
3
{ "blob_id": "f1d337134554d98e28da3bdc5b97be5dd1fb29c2", "branch_name": "refs/heads/master", "committer_date": 1549171914000, "content_id": "9594bb2d42078cc761a2e6e9d5f1e122181b347a", "detected_licenses": [ "MIT" ], "directory_id": "fca43a7649be24ae025a1719f63fb25c816e834c", "extension": "py", "fi...
2.953125
stackv2
#!/usr/bin/python3 import os import os.path from os import listdir from os.path import isfile, join import getpass from Crypto import Random from Crypto.Cipher import AES class Encryptor: def __init__(self, key): self.key = key def pad(self, s): return s + b"\0" * (AES.block_size - len(s) % A...
83
29.59
98
15
655
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_4ee496614822a101_46765090", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text." ]
[ 67 ]
[ null ]
[ 21 ]
[ 29 ]
2024-11-19T01:26:56.982141+00:00
1,683,592,689,000
0254fcf0b93982523cd1c7c5b63098913dd4fcf9
3
{ "blob_id": "0254fcf0b93982523cd1c7c5b63098913dd4fcf9", "branch_name": "refs/heads/master", "committer_date": 1683592689000, "content_id": "e0a2cdf0ebcfe4550f6dc77b99c9289e40d23b8c", "detected_licenses": [ "MIT" ], "directory_id": "430e1fcf16140de1f68d909609df82182a5faf21", "extension": "py", "fi...
2.546875
stackv2
import os import streamlit as st import requests import nltk from langchain.embeddings.openai import OpenAIEmbeddings from langchain.text_splitter import NLTKTextSplitter from langchain.vectorstores import Chroma from langchain.docstore.document import Document from langchain.prompts import PromptTemplate from langcha...
58
34.38
138
19
465
python
[{"finding_id": "codeql_py/full-ssrf_97bf3691d69f3563_1a2895b8", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
1
true
[ "CWE-918" ]
[ "py/full-ssrf" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1)." ]
[ 28 ]
[ null ]
[ 16 ]
[ 33 ]
2024-11-19T01:26:59.101642+00:00
1,554,912,231,000
f68e4f23e27c33b56c9d0ab796f8b0d0bef07070
2
{ "blob_id": "f68e4f23e27c33b56c9d0ab796f8b0d0bef07070", "branch_name": "refs/heads/master", "committer_date": 1554912231000, "content_id": "f29936a51cf9eddb9884b4d56ed11e95bdcdf332", "detected_licenses": [ "MIT" ], "directory_id": "8c8635ec9d41ff0abe7873c14981a80c1805db7d", "extension": "py", "fi...
2.421875
stackv2
import os, sys, shutil from jinja2 import Environment, PackageLoader import csv import operator from boilerplate import get_boilerplate env = Environment(loader=PackageLoader("dbu", "templates")) item_t = env.get_template("item.html") col_t = env.get_template("col.html") base_t = env.get_template("rootpage.html") D...
200
38.48
156
22
2,136
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_5e9c4d0429ef46b5_71ff0d1f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 9 ]
[ null ]
[ 7 ]
[ 60 ]
2024-11-19T01:26:59.328010+00:00
1,621,516,838,000
5dd1770614df0b277c418d471c4eac8b38c9502b
3
{ "blob_id": "5dd1770614df0b277c418d471c4eac8b38c9502b", "branch_name": "refs/heads/master", "committer_date": 1621516838000, "content_id": "73321e7ca1fccbfb39ace436601b7dc2187cde7c", "detected_licenses": [ "Apache-2.0" ], "directory_id": "72c5793a06577d79807f53e96c2d2fc0a04573d0", "extension": "py"...
2.71875
stackv2
import requests from requests.packages.urllib3.exceptions import InsecureRequestWarning # disable any ssl insecure warnings requests.packages.urllib3.disable_warnings(InsecureRequestWarning) # Assign requests.Session instance to session variable session = requests.Session() # Define URL and PAYLOAD variables URL = "h...
52
27.98
78
12
373
python
[{"finding_id": "codeql_py/request-without-cert-validation_e7fd07d83c63174e_3895f7b5", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 21, 48 ]
[ null, null ]
[ null, 15 ]
[ 44, 67 ]
2024-11-19T01:37:40.827258+00:00
1,551,900,007,000
cb0879210545cb109f1dd8dfe5bd25e3efe29a3c
3
{ "blob_id": "cb0879210545cb109f1dd8dfe5bd25e3efe29a3c", "branch_name": "refs/heads/master", "committer_date": 1551900007000, "content_id": "c2f96e2d10559a9c755f63c4fcf27b09b6ef29f3", "detected_licenses": [ "MIT" ], "directory_id": "f11b1fe9cad511e5a76445023134f82ad68c6358", "extension": "py", "fi...
2.71875
stackv2
#!/usr/bin/env python2.7 # TODO: Support python2 and python3 import getpass import jinja2 import orionsdk import requests import re import yaml # TODO: Refactor into proper module / classes # TODO: Better organize method ordering # TODO: Add sample input and output data # TODO: Add tests # TODO: PEP8 code formatting...
401
34.2
90
15
3,505
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_3357799e388f2b60_158f4da2", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 44 ]
[ null ]
[ 7 ]
[ 81 ]
2024-11-19T01:37:56.235775+00:00
1,667,101,461,000
38cc1c5c203bf638e0732d91cb8a7e1a6701d915
3
{ "blob_id": "38cc1c5c203bf638e0732d91cb8a7e1a6701d915", "branch_name": "refs/heads/master", "committer_date": 1667101461000, "content_id": "36f38a0bc6ba0c5cac4223c10e74a96a04f9f01e", "detected_licenses": [ "MIT" ], "directory_id": "190c5d74b312e30be44f4717c96147dd9b0e09fb", "extension": "py", "fi...
2.6875
stackv2
#!/usr/bin/env python # -*-coding: utf-8-*- import subprocess from dataclasses import dataclass from hashlib import sha1 from io import DEFAULT_BUFFER_SIZE from itertools import chain from os import PathLike from pathlib import Path from typing import Callable, Dict, Iterable, List from urllib.parse import parse_qs, u...
152
35.18
113
22
1,270
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_e4423cf322056072_4a51af79", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [humblebundle.com](1) may be at an arbitrary position i...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [humblebundle.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 120 ]
[ null ]
[ 12 ]
[ 40 ]
2024-11-19T01:38:03.017608+00:00
1,626,114,783,000
90885fbc9489d12c8c9b4bb9a8a89edf3fdbd771
2
{ "blob_id": "90885fbc9489d12c8c9b4bb9a8a89edf3fdbd771", "branch_name": "refs/heads/master", "committer_date": 1626114783000, "content_id": "bb94d2bcd6c49f651d8a84d9c4d5a78871a0b388", "detected_licenses": [ "MIT" ], "directory_id": "9f3a2cac34e3ef17614329bfd2b5c8c945fe6003", "extension": "py", "fi...
2.453125
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- import tkinter as tk from tkinter import ttk import tkinter.simpledialog import os import paramiko from glob import glob from configparser import ConfigParser __author__ = ['Enrico Giampieri', 'Nico Curti'] __email__ = ['enrico.giampieri@unibo.it', 'nico.curti2@unibo.it...
193
30.28
116
18
1,510
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_b6c763f155d865bc_d5f9fbfd", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 130 ]
[ null ]
[ 7 ]
[ 64 ]
2024-11-19T01:38:07.111642+00:00
1,508,059,484,000
54db615588bf37f9d0ac8c59c1ad9e9d0c576386
3
{ "blob_id": "54db615588bf37f9d0ac8c59c1ad9e9d0c576386", "branch_name": "refs/heads/master", "committer_date": 1508059484000, "content_id": "de01a1173961dafaae12e04452aa4b60f9c997be", "detected_licenses": [ "MIT" ], "directory_id": "5da7eb78c7fae517aa297c8492eac0751f580784", "extension": "py", "fi...
2.53125
stackv2
import urllib.request import json import requests from pprint import pprint import time import pdb f = open('key.txt') API_KEY = f.read() f.close() def error_code(code): return (code > 400) def get_routes(origin_id, destination_id, date_out, date_in): session_params = { 'cabinclass':"Economy", ...
84
26.26
107
15
536
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_09c6ec6ef38224be_f7eb0aad", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 45 ]
[ null ]
[ 37 ]
[ 53 ]
2024-11-19T01:38:12.311863+00:00
1,572,541,825,000
ad36894611ced84db7c24dd44a2edc85f40150f2
3
{ "blob_id": "ad36894611ced84db7c24dd44a2edc85f40150f2", "branch_name": "refs/heads/master", "committer_date": 1572541825000, "content_id": "9bf2f3ad73a4e882baa32dfb6da96fbda4d74ce4", "detected_licenses": [ "MIT" ], "directory_id": "f08fb4a3a3e3e3d15ef0c8e8c8f0c6217106d459", "extension": "py", "fi...
2.703125
stackv2
# Copyright (c) 2014--2019 Muhammad Yousefnezhad # # Permission is hereby granted, free of charge, to any person obtaining a copy # of this software and associated documentation files (the "Software"), to deal # in the Software without restriction, including without limitation the rights # to use, copy, modify, merge, ...
91
33.66
80
13
682
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9d00cd192a086e69_14da7e2d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 86 ]
[ null ]
[ 27 ]
[ 39 ]
2024-11-19T01:38:15.256206+00:00
1,482,394,937,000
787c2b7cb8312b1b96b28926f2ae3f1f10737f33
2
{ "blob_id": "787c2b7cb8312b1b96b28926f2ae3f1f10737f33", "branch_name": "refs/heads/master", "committer_date": 1482394937000, "content_id": "bab65f3c594d1b3c4727f47896ab8303c20407a6", "detected_licenses": [ "MIT" ], "directory_id": "34da25a905b3eaae6938b51761e6bdc943cb6c19", "extension": "py", "fi...
2.34375
stackv2
# coding: utf-8 from leancloud import Object from leancloud import Query import urllib,urllib2,time import re from bs4 import BeautifulSoup from header import * class BookRack(Object): def networkRequestForData(self,url,data): index=1 while(True): if(index==10): print ...
206
38.39
140
22
1,970
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_30e7d0321fab65bb_3048a887", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [http://m.23wx.com](1) may be at an arbitrary position ...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/incomplete-url-substring-sanitization", "py/incomplete-hostname-regexp" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "The string [http://m.23wx.com](1) may be at an arbitrary position in the sanitized URL.", "This regular expression has an unescaped '.' before '23wx.com/html/', so it might match more hosts than expected." ]
[ 93, 121 ]
[ null, null ]
[ 28, 55 ]
[ 54, 78 ]
2024-11-19T01:51:58.939467+00:00
1,513,863,577,000
2263c222849c3ee73e748e91ac39171246edea71
3
{ "blob_id": "2263c222849c3ee73e748e91ac39171246edea71", "branch_name": "refs/heads/master", "committer_date": 1513863577000, "content_id": "c26818dbcdc7dc6445a126e6dc4a3350f269634c", "detected_licenses": [ "MIT" ], "directory_id": "0bf0911bdb62acc117e9902dd3a5bddd2d7228eb", "extension": "py", "fi...
2.578125
stackv2
#! /usr/bin/env python # -*- coding: utf-8 -*- import json import requests PROTOCOL = 'http' # or https RVISION = '127.0.0.1' # ip or hostname USERNAME = 'admin' # any user login PASSWORD = 'admin' requests.packages.urllib3.disable_warnings() s = requests.Session() # Авторизируемся login = s.post( PROTOCOL ...
45
22.18
115
10
312
python
[{"finding_id": "codeql_py/request-without-cert-validation_5b3029a5523be9a8_39969325", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 17, 37 ]
[ 24, 41 ]
[ 9, 10 ]
[ 2, 2 ]
2024-11-19T01:52:14.312760+00:00
1,612,073,411,000
de2f27bf386401cb89605027585c289b9b81040f
3
{ "blob_id": "de2f27bf386401cb89605027585c289b9b81040f", "branch_name": "refs/heads/master", "committer_date": 1612073411000, "content_id": "e5214b673de213d6849926084e5e18eded175368", "detected_licenses": [ "MIT" ], "directory_id": "45c2bb4f1d209e71d41fe1281a5212fa544df609", "extension": "py", "fi...
2.71875
stackv2
import sys import os from urllib.parse import urlparse from urllib.parse import parse_qs from http.server import SimpleHTTPRequestHandler, HTTPServer class Handler(SimpleHTTPRequestHandler): def do_GET(self): res_file = self.get_file(self.path) self.send_response(200) self.send_header('Co...
43
25.84
101
15
268
python
[{"finding_id": "codeql_py/path-injection_3b6a85f53b0dbfbd_9477ceca", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 16, 23 ]
[ null, null ]
[ 19, 71 ]
[ 50, 100 ]
2024-11-19T01:52:22.841437+00:00
1,568,991,429,000
4572e846301129ac5c5f896c83c4e003c9ae82f7
3
{ "blob_id": "4572e846301129ac5c5f896c83c4e003c9ae82f7", "branch_name": "refs/heads/master", "committer_date": 1568991429000, "content_id": "caf4d5530972d9f4461002d3b85a3415684fc216", "detected_licenses": [ "Apache-2.0" ], "directory_id": "2bd75cf8f172c079caf32c19a3469bbf26fbe85b", "extension": "py"...
2.734375
stackv2
import keyring import base64 import os from sys import argv from keyrings.cryptfile.cryptfile import CryptFileKeyring def secure_keyring_access(keyring_name=None): "Encrypted Keyring file access." kr = CryptFileKeyring() kr._unlock() return(kr) def secure_keyring_get(name, kr): "Gets encrypted Key...
48
33.1
125
11
432
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_04a0d36fbf15296b_5162264e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 29 ]
[ null ]
[ 11 ]
[ 17 ]
2024-11-19T01:52:27.163229+00:00
1,514,039,017,000
05d3a8554ffa9dfab5b2e67c150f1831cfa9a217
3
{ "blob_id": "05d3a8554ffa9dfab5b2e67c150f1831cfa9a217", "branch_name": "refs/heads/master", "committer_date": 1514039017000, "content_id": "ca0b7cc89d1951d435c0302a48b12abfdb86f174", "detected_licenses": [ "MIT" ], "directory_id": "9a273d10436f1a39f981e3a4ed993a9e16cc562f", "extension": "py", "fi...
2.8125
stackv2
"""API logic.""" from flask import request, jsonify from app import app @app.route('/cat', methods=['PUT']) def put_test(): """To call this method use the following command on your terminal. curl -H "Content-Type: application/json" -i -X PUT -d '{"name":"don gato","age":"13"}' localhost:80/cat """ try: ...
40
23.12
103
16
262
python
[{"finding_id": "codeql_py/stack-trace-exposure_b38c053730e1d964_b0ff31a3", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 19 ]
[ null ]
[ 24 ]
[ 40 ]