added stringlengths 32 32 | created int64 1,236B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.03 | source stringclasses 1
value | text stringlengths 330 19.3k | num_lines int64 16 648 | avg_line_length float64 15.5 59.3 | max_line_length int64 37 179 | ast_depth int64 8 38 | length int64 102 3.79k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.11k 276k | sast_codeql_findings_count int64 1 33 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 33 | rule_ids listlengths 1 33 | confidences listlengths 1 33 | severities listlengths 1 33 | messages listlengths 1 33 | line_starts listlengths 1 33 | line_ends listlengths 1 33 | column_starts listlengths 1 33 | column_ends listlengths 1 33 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-19T02:10:48.694613+00:00 | 1,584,642,314,000 | 7ba5090e366fc8f07b9a0f5637f32de28521cbac | 3 | {
"blob_id": "7ba5090e366fc8f07b9a0f5637f32de28521cbac",
"branch_name": "refs/heads/master",
"committer_date": 1584642314000,
"content_id": "9534291d3f8fb57be1335fb0cca2ae5817fec36e",
"detected_licenses": [
"MIT"
],
"directory_id": "1dfa5c3e1da937748c8419066c296526937603bd",
"extension": "py",
"fi... | 2.609375 | stackv2 | import os
import sys
import requests
import shutil
import simplejson as json
import pandas as pd
files = [
{"v1.1-train": "https://raw.githubusercontent.com/rajpurkar/SQuAD-explorer/master/dataset/train-v1.1.json"},
{"v1.1-dev": "https://raw.githubusercontent.com/rajpurkar/SQuAD-explorer/master/dataset... | 188 | 37.31 | 116 | 22 | 1,525 | python | [{"finding_id": "codeql_py/request-without-cert-validation_39f14db8c3c8c704_d539e068", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
62
] | [
63
] | [
21
] | [
63
] | |
2024-11-19T02:45:18.193813+00:00 | 1,647,367,933,000 | 5d96b93bba1395c344d74f86983d41a1685f3ee5 | 3 | {
"blob_id": "5d96b93bba1395c344d74f86983d41a1685f3ee5",
"branch_name": "refs/heads/master",
"committer_date": 1647367933000,
"content_id": "c2a719fdba9fe2cc4323b8c4c51e60625b684750",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "da0ce1ec13cc4154ae4eb204afbf8a81ba600479",
"extension": "py"... | 2.59375 | stackv2 | # coding=utf-8
# Copyright 2019 The Google Research Authors.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicab... | 224 | 33.79 | 80 | 13 | 1,865 | python | [{"finding_id": "codeql_py/overly-large-range_b6100fea9693711b_7c57be65", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo... | 4 | true | [
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].",
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].",
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].",
"Suspicious character range that is equivalent to \\[A-Z\\\\[... | [
26,
26,
27,
27
] | [
null,
null,
null,
null
] | [
52,
65,
40,
51
] | [
55,
68,
43,
54
] | |
2024-11-19T02:45:34.549085+00:00 | 1,615,897,983,000 | 3bf25c794a48ac25b22ed35765d9aa5ff27b43ca | 2 | {
"blob_id": "3bf25c794a48ac25b22ed35765d9aa5ff27b43ca",
"branch_name": "refs/heads/main",
"committer_date": 1615897983000,
"content_id": "2b3eaf7364073d863a8de047c74c428d4a2c9c13",
"detected_licenses": [
"MIT"
],
"directory_id": "879aa7593195bd7e8231fca88ad0d60208c56807",
"extension": "py",
"file... | 2.328125 | stackv2 | import requests
import json
from bs4 import BeautifulSoup
import pymongo
import re
from slimit import ast
from slimit.parser import Parser
from slimit.visitors import nodevisitor
from selenium import webdriver
from selenium.webdriver.support.ui import WebDriverWait
from selenium.webdriver.support import expected_condi... | 78 | 21.56 | 107 | 14 | 441 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_7d9c2c0121137ce1_b5dc452c", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'espn.com/mens-college-basketball/ga... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-hostname-regexp"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'espn.com/mens-college-basketball/game', so it might match more hosts than expected."
] | [
39
] | [
null
] | [
42
] | [
90
] | |
2024-11-19T02:45:43.574192+00:00 | 1,634,114,197,000 | 87e40c16ab3b7c7e1237e967c4ceebe1bd7fc978 | 3 | {
"blob_id": "87e40c16ab3b7c7e1237e967c4ceebe1bd7fc978",
"branch_name": "refs/heads/master",
"committer_date": 1634114197000,
"content_id": "b14150b8b48b1f42caa4f420414f01a8e4a26e27",
"detected_licenses": [
"MIT"
],
"directory_id": "b369554fb670c1cfc838d98f474cea3636e04fca",
"extension": "py",
"fi... | 3.171875 | stackv2 | import pandas as pd
import matplotlib.pyplot as plt
def obesity(excelfile="Obes-phys-acti-diet-eng-2014-tab.xls", nogui = False):
data = pd.ExcelFile(excelfile)
#print(data.sheet_names)
# Read section 7.1 from the Excel file
# Define the columns to be read
columns1 = ['year', 'total', 'males', 'f... | 25 | 23.4 | 80 | 9 | 175 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_60e20409cfd8d672_71e9d2c2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
22
] | [
null
] | [
12
] | [
23
] | |
2024-11-19T02:45:51.526414+00:00 | 1,585,625,997,000 | 65255d3160cd054bc7a4037e9028c974547dc75f | 3 | {
"blob_id": "65255d3160cd054bc7a4037e9028c974547dc75f",
"branch_name": "refs/heads/master",
"committer_date": 1585625997000,
"content_id": "2ede67d9ac3e87896a3748191ab6588677953f7b",
"detected_licenses": [
"MIT"
],
"directory_id": "ee77356856391c24c26400f38f4071b8dd644fba",
"extension": "py",
"fi... | 2.625 | stackv2 | import os
from flask import Flask, request, abort
from linebot import (LineBotApi, WebhookHandler)
from linebot.exceptions import (InvalidSignatureError)
from linebot.models import *
import googlemaps
app = Flask(__name__)
# Channel Access Token
line_bot_api = LineBotApi('Your Token')
# Channel Secret
handler = We... | 124 | 36.53 | 178 | 23 | 1,018 | python | [{"finding_id": "codeql_py/log-injection_006c1ac9511f950e_cd8e3c66", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
25
] | [
null
] | [
21
] | [
44
] | |
2024-11-19T02:57:10.780693+00:00 | 1,615,222,124,000 | 1e958781c542d996c3ae3f6929fbff68e2c70085 | 3 | {
"blob_id": "1e958781c542d996c3ae3f6929fbff68e2c70085",
"branch_name": "refs/heads/master",
"committer_date": 1615222124000,
"content_id": "65367c1e14c15e088b8c3cf750788a8fe2dbd34e",
"detected_licenses": [
"MIT"
],
"directory_id": "f151f353232b3945f1d338479de99fbfbf340f45",
"extension": "py",
"fi... | 2.96875 | stackv2 | import traceback
import requests
import json
import hashlib
import secrets
from typing import List
class Procd:
"""Privacy respecting contact discovery"""
SHARED_PRIME = 23
SHARED_BASE = 5
# also contains a last date of interaction
# [(number1, date1), (number2, date2)]
address_book = list()... | 148 | 43.47 | 96 | 20 | 1,366 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b7b852df1d8a993c_4140d590", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 7 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-327",
"CWE-327"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (secre... | [
96,
127,
130,
144,
145,
70,
74
] | [
null,
null,
null,
null,
null,
null,
null
] | [
15,
19,
15,
15,
15,
17,
17
] | [
44,
52,
60,
30,
28,
40,
44
] | |
2024-11-19T02:57:26.117681+00:00 | 1,587,137,650,000 | 44d57f868aba6e29f441fad86d79b48afcb12a54 | 3 | {
"blob_id": "44d57f868aba6e29f441fad86d79b48afcb12a54",
"branch_name": "refs/heads/master",
"committer_date": 1587137650000,
"content_id": "22bf09b44a38b69971d9da2e3bfb62f22b23040c",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "c081cbd459a873ee129915425e0a72c21b9d90b6",
"extension": "py"... | 3.1875 | stackv2 | import re
from library import applescript
class PyDomElement(object):
def __init__(self, parent, as_type, identifier):
self.as_type = as_type
self.identifier = identifier
self.parent = parent
self.children = []
def __repr__(self):
my_repr = self.as_type + ' ' + self.ide... | 109 | 36.26 | 140 | 18 | 883 | python | [{"finding_id": "codeql_py/redos_b1bd294e43fea0d5_10549067", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '! '.", "remediat... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '! '."
] | [
40
] | [
null
] | [
26
] | [
31
] | |
2024-11-19T03:12:06.811749+00:00 | 1,582,043,443,000 | cdfd511a74bb4c55eac1639639d9d7fe90f2ad4a | 3 | {
"blob_id": "cdfd511a74bb4c55eac1639639d9d7fe90f2ad4a",
"branch_name": "refs/heads/master",
"committer_date": 1582043443000,
"content_id": "ad6d1ec8a95c8033f22f40445244a9f66cdf73d7",
"detected_licenses": [
"MIT"
],
"directory_id": "e83a3142a51d5ec187feb4437838e87903514857",
"extension": "py",
"fi... | 2.640625 | stackv2 | import sys
import requests
import os
import time
import datetime
# 代理设置
proxies={
'http':'127.0.0.1:1280',
'https':'127.0.0.1:1280'
}
# 屏蔽warning信息,因为下面verify=False会报警告信息
requests.packages.urllib3.disable_warnings()
def download(url, file_path,headers_dl):
start2 = datetime.datetime.now()
# 第一次请求是为了得到文件总大小
r1 =... | 141 | 27.01 | 147 | 18 | 1,503 | python | [{"finding_id": "codeql_py/request-without-cert-validation_0a5ae43ac6ffaa6a_7203cb8a", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 3 | true | [
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
19,
36,
77
] | [
null,
null,
null
] | [
7,
6,
7
] | [
88,
87,
69
] | |
2024-11-19T03:12:09.516899+00:00 | 1,537,909,114,000 | d3d69306a16cca610230537d76fb177809750172 | 3 | {
"blob_id": "d3d69306a16cca610230537d76fb177809750172",
"branch_name": "refs/heads/master",
"committer_date": 1537909114000,
"content_id": "dab8ab1a98a17dc4c4de829ac245e76a94d7900e",
"detected_licenses": [
"MIT"
],
"directory_id": "2965aa6e917489bf4e005102861590a7a4de0273",
"extension": "py",
"fi... | 2.8125 | stackv2 | with open("lfw-gender.txt") as lfwgender, open("unknown-gender.txt") as unknowngender, open("lfw-gender2.txt", "w") as newfile:
nextline = lfwgender.readline()
while nextline:
firstname, gender = nextline.split()
if gender != "?":
newfile.write(nextline)
else:
unl... | 24 | 36.21 | 127 | 18 | 207 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_0b4ebfb0c06fc17d_37104546", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",... | 5 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.",
"This expression stores [sensitive data (private)](1) as clear text.",
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.",
"This expression logs [sensi... | [
6,
19,
21,
17,
17
] | [
null,
null,
null,
null,
null
] | [
27,
31,
31,
23,
67
] | [
35,
39,
67,
65,
78
] | |
2024-11-19T03:12:22.295409+00:00 | 1,607,614,120,000 | 803caabc7b7dcaaf56be61794dd7a6180bb7ba96 | 2 | {
"blob_id": "803caabc7b7dcaaf56be61794dd7a6180bb7ba96",
"branch_name": "refs/heads/master",
"committer_date": 1607614120000,
"content_id": "8ac0baddcfde9491186f6ee8c420524b68f3c214",
"detected_licenses": [
"MIT"
],
"directory_id": "ab045e2598f82ae3d8bcc82bb1dc17a0c884c59e",
"extension": "py",
"fi... | 2.421875 | stackv2 | import sys
if not sys.version_info > (2, 7):
print("Python 2 is no more supported")
exit(-1)
elif not sys.version_info >= (3, 8):
print("Requires at least python 3.8 (using dataclasses and walrus operator)")
exit(-1)
import dataclasses
from dataclasses import dataclass
from typing import List
from dat... | 125 | 35.46 | 166 | 20 | 1,072 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_cf934fadc06e2ed9_cdffa5ac", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
104
] | [
null
] | [
17
] | [
79
] | |
2024-11-19T03:12:24.967323+00:00 | 1,512,605,069,000 | a4414b597adb2525e1fe7cc0bf421ac44960c6ec | 2 | {
"blob_id": "a4414b597adb2525e1fe7cc0bf421ac44960c6ec",
"branch_name": "refs/heads/master",
"committer_date": 1512605069000,
"content_id": "f903326c9c0f7e71cc467d764da7ae975a6a56ce",
"detected_licenses": [
"MIT"
],
"directory_id": "b2ca3bc0eaaf3dd430a2f5c118c01632d0a01143",
"extension": "py",
"fi... | 2.390625 | stackv2 | import DBAPI, uuid, hashlib, csv, os, zipfile
from flask import Flask, request, render_template, jsonify, send_from_directory, send_file
conn = DBAPI.sqlite3.connect("myDB.db")
app = Flask(__name__)
currentUser = ''
app.config['UPLOAD_FOLDER'] = os.path.join(app.root_path)
@app.route('/')
def main():
return ren... | 149 | 26.22 | 134 | 22 | 994 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_7828aaba51c1baee_3528ef72", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 6 | true | [
"CWE-327",
"CWE-327",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computational... | [
40,
107,
24,
101,
104,
122
] | [
null,
null,
null,
null,
null,
null
] | [
35,
50,
36,
12,
15,
12
] | [
71,
90,
55,
63,
66,
63
] | |
2024-11-19T01:33:39.387724+00:00 | 1,347,627,675,000 | 41427a46f4b54b93693443bd46538db21ad4337c | 2 | {
"blob_id": "41427a46f4b54b93693443bd46538db21ad4337c",
"branch_name": "refs/heads/master",
"committer_date": 1347627675000,
"content_id": "1cd06fbc83614e01684b067409c0ab9244af58e4",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "1abf985d2784efce3196976fc1b13ab91d6a2a9e",
"extension": "p... | 2.359375 | stackv2 | from os.path import basename
from os import chmod
from SCons.Builder import Builder
def generateShellScript(filename, class_name, jars, env):
f=open(filename, 'w')
f.write("#!/bin/bash\n")
classpath = "-cp " + ("%s:"*len(jars))[:-1] % tuple([str(jar) for jar in jars])
java_command = "java -Djava.net.pr... | 31 | 35.42 | 99 | 18 | 313 | python | [{"finding_id": "codeql_py/overly-permissive-file_532f45e774042347_534ee1c4", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable."
] | [
16
] | [
null
] | [
5
] | [
28
] | |
2024-11-19T01:33:42.654611+00:00 | 1,523,281,339,000 | 49ef1d1114dbc26c3a5b96007cfcab69c8ede4cb | 3 | {
"blob_id": "49ef1d1114dbc26c3a5b96007cfcab69c8ede4cb",
"branch_name": "refs/heads/master",
"committer_date": 1523281339000,
"content_id": "2894b815448c27f00a391fe6036142be8830ecb6",
"detected_licenses": [
"MIT"
],
"directory_id": "2266f6ba81eb0b5ef0b07643c8f403b9ad389ce0",
"extension": "py",
"fi... | 2.765625 | stackv2 | from flask import Flask, request, make_response
from random import randint
app = Flask(__name__)
@app.route('/')
def randomnum():
global number
number = randint(0, 10000)
return str(number)
@app.route('/one/<int:num>')
def one(num):
global number
if num == number:
m = '{} was correct!<b... | 103 | 23.18 | 119 | 18 | 740 | python | [{"finding_id": "codeql_py/reflective-xss_0dcbb4ac8e04d1aa_000460bd", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 7 | true | [
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scri... | [
22,
33,
44,
73,
75,
84,
94
] | [
null,
null,
null,
null,
null,
null,
null
] | [
12,
12,
12,
16,
16,
12,
26
] | [
27,
27,
27,
45,
42,
16,
30
] | |
2024-11-19T01:33:46.472148+00:00 | 1,693,589,752,000 | a16b06cf6cbcfe8848743446aaf1679032ba8f7a | 2 | {
"blob_id": "a16b06cf6cbcfe8848743446aaf1679032ba8f7a",
"branch_name": "refs/heads/main",
"committer_date": 1693589752000,
"content_id": "2a697c1c1f9fecc7a4650ca9040eb134519d592d",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "2950d1852a03ab912de2c75c3a15c2276555cb5a",
"extension": "py",
... | 2.46875 | stackv2 | # This program is free software; you can redistribute it and/or modify
# it under the terms of the (LGPL) GNU Lesser General Public License as
# published by the Free Software Foundation; either version 3 of the
# License, or (at your option) any later version.
#
# This program is distributed in the hope that it will ... | 212 | 27.22 | 90 | 16 | 1,472 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_d988c70bed1e7e1f_9cbb7c2a", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (id)](2) is used in a hashing algorithm (MD5) that is insecure."
] | [
144
] | [
null
] | [
22
] | [
33
] | |
2024-11-19T01:33:52.766402+00:00 | 1,504,621,464,000 | 03566b06811f4c0b4c2a1a86cf33b128681a7240 | 3 | {
"blob_id": "03566b06811f4c0b4c2a1a86cf33b128681a7240",
"branch_name": "refs/heads/master",
"committer_date": 1504621464000,
"content_id": "ef46b27f0b62efe08351e0f8d5a4fdc0312212a9",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "91d72d939f3a6a09e01d09f4a813755938dca655",
"extension": "p... | 2.578125 | stackv2 | #!/usr/bin/python
# -*- encoding: utf-8 -*-
"""
exif-revgeo
~~~~~~~~~~~
This utility reads the GPS coordinates from your photos, reverse geocode
them, and write the result to the appropriate EXIF city/country location
tags.
:copyright: (c) 2015 by fg1
:license: BSD, see LICENSE for more de... | 135 | 33.69 | 110 | 15 | 1,157 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a32a1946a7eaad59_818b7216", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
86
] | [
null
] | [
22
] | [
87
] | |
2024-11-19T02:10:47.223540+00:00 | 1,572,592,781,000 | 89abf580cd63c1cf4e453095ace7e3677bed4500 | 3 | {
"blob_id": "89abf580cd63c1cf4e453095ace7e3677bed4500",
"branch_name": "refs/heads/master",
"committer_date": 1572592781000,
"content_id": "f26afce973a876cf4702b09d19e9ba0de95ee748",
"detected_licenses": [
"MIT"
],
"directory_id": "0703ac9937f8ac84ab58bbf7d60e309fb21b0689",
"extension": "py",
"fi... | 2.75 | stackv2 | import logging
from getpass import getpass
from configparser import ConfigParser, NoOptionError
from simple_encrypt import test_encrypt, test_decrypt
import ccxt
log = logging.getLogger(__name__)
logging.basicConfig(
level=logging.INFO,
format='%(asctime)s %(levelname)s %(message)s'
)
# only accept API keys ... | 119 | 29.11 | 102 | 14 | 821 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b497f0093ad6f220_8e8a7e3f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text."
] | [
39,
62
] | [
null,
63
] | [
18,
18
] | [
79,
68
] | |
2024-11-19T02:10:55.717472+00:00 | 1,534,766,194,000 | 65da51589dfe6baef201b0c1931fe79389a47df4 | 4 | {
"blob_id": "65da51589dfe6baef201b0c1931fe79389a47df4",
"branch_name": "refs/heads/master",
"committer_date": 1534766194000,
"content_id": "a3d3f273c36c3d6b5f5268315182c80fcc7d97d8",
"detected_licenses": [
"MIT"
],
"directory_id": "d3d5b933fe0672ba141b3cfde0ad942438b38304",
"extension": "py",
"fi... | 3.859375 | stackv2 | lectures = int(input())
budget = float(input())
jelev = 0
royal = 0
roli = 0
trofon = 0
sino = 0
others= 0
for i in range(lectures+1):
name = input().capitalize()
if name == 'Jelev':
jelev += 1
elif name == 'Royal':
royal += 1
elif name == 'Roli':
roli += 1
elif name == 'T... | 40 | 24 | 55 | 10 | 335 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4c7a6079740cd726_48c43732", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 6 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive... | [
34,
35,
36,
37,
38,
39
] | [
null,
null,
null,
null,
null,
null
] | [
7,
7,
7,
7,
7,
7
] | [
53,
53,
51,
55,
51,
55
] | |
2024-11-19T02:11:21.778685+00:00 | 1,495,953,004,000 | 0d6bdf14b0e4dd8e78a5d2bb15c087ec4e32ba79 | 2 | {
"blob_id": "0d6bdf14b0e4dd8e78a5d2bb15c087ec4e32ba79",
"branch_name": "refs/heads/master",
"committer_date": 1495953004000,
"content_id": "e23c7f13037af715aaa07bcb62a1c20283b89ba7",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "b532ad4272e1eca84fa10c311251cbbcbf65bb4f",
"extension": "p... | 2.390625 | stackv2 | import psycopg2
from connection import connection
from stub import send_err
import sys, getopt
def main(argv):
host = ''
password = ''
port= ''
f = open('conf.ini', 'w')
f.write('[postgresql]' + '\n'+'user=postgres'+ '\n'+'database=postgres'+'\n')
try:
opts, args = getopt.getopt(argv,"hs:p:l:",... | 100 | 30.46 | 80 | 15 | 690 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_c5408ef9761b770f_e8a77036", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text."
] | [
27
] | [
null
] | [
12
] | [
71
] | |
2024-11-19T02:11:27.690787+00:00 | 1,617,987,995,000 | d81489dcc4253c5028f46b349280929085e63d59 | 4 | {
"blob_id": "d81489dcc4253c5028f46b349280929085e63d59",
"branch_name": "refs/heads/main",
"committer_date": 1617987995000,
"content_id": "c763921b557227354ae292e2fed31a77350bd831",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "49f31317285779f488396a1af8171c5775e0e7bb",
"extension": "py",
... | 3.6875 | stackv2 | class Student:
def __init__(self,name,course,sex):
self.name = name
self.course = course
self.sex = sex
s = Student("Mohit","Mtech","Male")
print("Student Detail:")
print("NAME:",s.name)
print("COURSE",s.course)
print("SEX",s.sex)
#deleting sex
del s.sex
print("Student Detail:")
print("NA... | 18 | 20.06 | 39 | 9 | 110 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_877074f230918dc2_85d8723c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
11
] | [
null
] | [
13
] | [
18
] | |
2024-11-19T02:32:58.355554+00:00 | 1,488,872,335,000 | 42cb9ada8a232b98c9e31c1c97fb7fdb8060d960 | 2 | {
"blob_id": "42cb9ada8a232b98c9e31c1c97fb7fdb8060d960",
"branch_name": "refs/heads/master",
"committer_date": 1488872335000,
"content_id": "4bfdf3872dd722d01a8ea2c4d13d4f159b5ffb00",
"detected_licenses": [
"MIT"
],
"directory_id": "06282ae2a96cac120f574593aaae13ae3a9774c7",
"extension": "py",
"fi... | 2.375 | stackv2 | # _*_ coding: utf-8 _*_
from flask import render_template, redirect, flash, url_for, request, session
from flask.ext.login import login_user, logout_user, login_required, \
current_user
from . import auth
from ..main import main
from ..models import User
from ..email import send_async_email
from .. import db
fro... | 118 | 29.45 | 87 | 16 | 808 | python | [{"finding_id": "codeql_py/url-redirection_17d8e8c3e0a708fe_647a4da1", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
27
] | [
null
] | [
29
] | [
62
] | |
2024-11-19T02:33:04.715769+00:00 | 1,573,131,930,000 | 9ccb20815acd7de49e0728bd975322f64a0f8622 | 3 | {
"blob_id": "9ccb20815acd7de49e0728bd975322f64a0f8622",
"branch_name": "refs/heads/master",
"committer_date": 1573132240000,
"content_id": "a8e2c8098f5f647c503fd2105ac0b6dbda1475e3",
"detected_licenses": [
"MIT"
],
"directory_id": "e8a45016e0799181289db0b5ae0cf3c91eec5c80",
"extension": "py",
"fi... | 2.96875 | stackv2 | """Authentication/Login Blueprint."""
from pprint import pprint
import flask
from flask import Blueprint, flash, render_template, url_for, redirect, request
from flask_login import login_required, login_user, logout_user
from .forms import LoginForm
from .models import LDAPUser
auth_handler = Blueprint(name='auth',... | 61 | 31.62 | 102 | 16 | 383 | python | [{"finding_id": "codeql_py/url-redirection_6afdded9338fb95d_2a2ff586", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
50
] | [
null
] | [
29
] | [
65
] | |
2024-11-19T02:33:28.781065+00:00 | 1,620,695,672,000 | 6f12915160ef23952b2e28a2ebad22f44753303f | 4 | {
"blob_id": "6f12915160ef23952b2e28a2ebad22f44753303f",
"branch_name": "refs/heads/main",
"committer_date": 1620695672000,
"content_id": "71f03963f2d918df2e3d7f8f857f95ac07bb071b",
"detected_licenses": [
"MIT"
],
"directory_id": "a1c8cf2a07cb1fa755665ed482d63b88925937a1",
"extension": "py",
"file... | 4.03125 | stackv2 |
class Employee:
def __init__(self, name, age, salary):
self.name = name
self.age = age
self.salary = salary
def work(self):
print(f'{self.name} is working ...')
class SoftwareEngineer(Employee):
def __init__(self, name, age, level, salary):
super().__init__(... | 35 | 17.2 | 75 | 12 | 172 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_78660ef9f8a22d2b_551927a3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (priva... | [
21,
34
] | [
null,
null
] | [
15,
7
] | [
75,
16
] | |
2024-11-19T02:33:29.650341+00:00 | 1,571,589,593,000 | 38d84cc9fd6860b5ec0e6141eeb50753518b8c53 | 3 | {
"blob_id": "38d84cc9fd6860b5ec0e6141eeb50753518b8c53",
"branch_name": "refs/heads/master",
"committer_date": 1571589593000,
"content_id": "8817a33311d7581ffdbf97eacdec862bdb56ca36",
"detected_licenses": [
"MIT"
],
"directory_id": "d8517846ad19a4a0d430ce97abfb07ca0f14d231",
"extension": "py",
"fi... | 2.53125 | stackv2 | # -*- coding: utf-8 -*-
from environs import Env
import logging
import requests
import os
import smtplib
# --------------------------
# Constants
# --------------------------
env = Env()
env.read_env('../.env')
TO = env('TO')
FROM = env('FROM')
PASSWD = env('PASSWD')
NOIP_USER = env('NOIP_USER')
NOIP_PASSWD = env(... | 86 | 25.28 | 141 | 16 | 584 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bc2409cfa0fb9c11_b1eb0ad6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
86
] | [
null
] | [
22
] | [
28
] | |
2024-11-19T02:46:21.480272+00:00 | 1,502,098,745,000 | 92b2d2d7cec7d9740a7075cc97a4117ed43a1b9d | 3 | {
"blob_id": "92b2d2d7cec7d9740a7075cc97a4117ed43a1b9d",
"branch_name": "refs/heads/master",
"committer_date": 1502098745000,
"content_id": "9ef73ffd0787e4df9ac63fda5e520da4917e7cd9",
"detected_licenses": [
"MIT"
],
"directory_id": "025f990682f1a6b8301667fde835f50106ad7677",
"extension": "py",
"fi... | 2.703125 | stackv2 |
import urllib
try:
import simplejson as json
except :
import json
import requests
__all__ = [
'DFAASApiClient'
]
################################################################################
class HttpException(Exception):
def __init__(self, code, reason, error='Unknown Error'):
self.c... | 243 | 28.51 | 119 | 13 | 1,603 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8890c095783353b3_748f05b1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (p... | [
236,
243
] | [
null,
null
] | [
11,
11
] | [
40,
25
] | |
2024-11-19T02:59:17.810708+00:00 | 1,611,005,440,000 | 876e386e3154d7fb2c16572a1630cd9ed4cb946a | 3 | {
"blob_id": "876e386e3154d7fb2c16572a1630cd9ed4cb946a",
"branch_name": "refs/heads/master",
"committer_date": 1611005440000,
"content_id": "8bee2d7e3f4f280d26ea6cb0eea5376374c4c258",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "0512010ca13342f7cd619003ae36453bc951d427",
"extension": "py"... | 2.71875 | stackv2 | import time
import fire
from libetrv.device import eTRVDevice
def time_to_str(datetime):
if datetime is not None:
return datetime.strftime('%Y-%m-%d %H:%M:%S %Z')
return None
class CLI:
def __init__(self, pin=b'0000', secret=None):
self._pin = pin
if secret is not None:
... | 80 | 34.31 | 101 | 14 | 668 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_57908af7b71e6bc0_a5231b43", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
48
] | [
null
] | [
30
] | [
53
] | |
2024-11-19T02:59:53.659897+00:00 | 1,323,362,548,000 | 977e00dba87fdea1cc33fea255a58833a72bdce1 | 2 | {
"blob_id": "977e00dba87fdea1cc33fea255a58833a72bdce1",
"branch_name": "refs/heads/master",
"committer_date": 1323362548000,
"content_id": "800b169b7debfbc5161770379c9d2178c5cf463b",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "40aeccb61c3b68ad170031808993136061adcba7",
"extension": "p... | 2.328125 | stackv2 |
import urlparse
import base64
import logging
from wsgiref.util import is_hop_by_hop
from google.appengine.ext import webapp
from google.appengine.ext.webapp.util import run_wsgi_app as run
from google.appengine.api import urlfetch
from cgi import parse_qs,parse_qsl
from hashlib import sha1
from hmac import new as hm... | 238 | 34.91 | 109 | 16 | 1,861 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a3b1acb586a1cdc9_b98ea1f3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-327"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text.\nThis expression logs [sensitive data (passwor... | [
126,
127,
196
] | [
null,
null,
null
] | [
27,
27,
25
] | [
32,
33,
42
] | |
2024-11-19T02:59:57.097008+00:00 | 1,571,393,103,000 | 66882e897cf7eb4812a7e31c2ab5f2e0e84b9f14 | 2 | {
"blob_id": "66882e897cf7eb4812a7e31c2ab5f2e0e84b9f14",
"branch_name": "refs/heads/master",
"committer_date": 1571393103000,
"content_id": "99da46ce2eca7179576a426b12b08c9c6091640a",
"detected_licenses": [
"MIT"
],
"directory_id": "bf53931505601b3e11edc80fd436a51f8ecdbbe2",
"extension": "py",
"fi... | 2.484375 | stackv2 | #!/usr/bin/env python3
import sys
import hashlib
import random
import re
import functools
import time
import json
import pathlib
import base64
import traceback
import socket
OK, CORRUPT, MUMBLE, DOWN, CHECKER_ERROR = 101, 102, 103, 104, 110
PORT = 10001
TIMEOUT = 3
SCRIPT_PATH = pathlib.Path(__file__).parent
ABC =... | 369 | 30.88 | 99 | 20 | 3,506 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_019a482d3472308c_9b984dc3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
158
] | [
null
] | [
15
] | [
21
] | |
2024-11-19T03:35:14.182486+00:00 | 1,543,749,956,000 | 12df733c1ed87e8407c55d6e9f76e4d8037e4d3c | 2 | {
"blob_id": "12df733c1ed87e8407c55d6e9f76e4d8037e4d3c",
"branch_name": "refs/heads/master",
"committer_date": 1543749956000,
"content_id": "a1a4de8d4661dbb1072d67fbcabfa59939861b79",
"detected_licenses": [
"BSD-2-Clause-Views",
"BSD-2-Clause"
],
"directory_id": "6cf7192f0da30234fb5ac743bcaba97a12... | 2.5 | stackv2 | import json
from flask import Flask, request, redirect
import multiprocessing
from threading import Timer
import twitter
from twitter.oauth_dance import parse_oauth_tokens
from twitter.oauth import read_token_file, write_token_file
# XXX: Go to http://twitter.com/apps/new to create an app and get values
# for these ... | 107 | 34.22 | 125 | 13 | 870 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6f57658f672df61b_29fb8020", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
78,
78
] | [
null,
null
] | [
11,
24
] | [
22,
42
] | |
2024-11-19T03:35:16.630803+00:00 | 1,562,700,862,000 | db12e707f918c8e3f5edf5580f6884673aa78ec2 | 2 | {
"blob_id": "db12e707f918c8e3f5edf5580f6884673aa78ec2",
"branch_name": "refs/heads/master",
"committer_date": 1562700862000,
"content_id": "b17080220914909e73e2411a7767c4af6f5a6ac4",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "1e9fed88ce4a623970f7e53143753a170d4bdcda",
"extension": "py"... | 2.5 | stackv2 | #!/bin/env python3
import os
import os.path
import argparse
from jinja2 import Environment, BaseLoader
abspath = os.path.abspath
join = os.path.join
GENERATED_HEADER = '# # # # GENERATED FILE -- DO NOT MODIFY # # # #\n'
def main(version, repourl):
SCRIPT_DIR = os.path.dirname(__file__)
ROOT_DIR = abspath(joi... | 59 | 34.22 | 130 | 13 | 517 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_9f0697d77ff055f2_a17bfbc7", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 3 | true | [
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
30,
39,
47
] | [
null,
null,
null
] | [
20,
20,
20
] | [
50,
50,
50
] | |
2024-11-19T03:35:28.259369+00:00 | 1,693,406,430,000 | 43331d5d5f0c16563b27bb534bd37140a2d7b7be | 2 | {
"blob_id": "43331d5d5f0c16563b27bb534bd37140a2d7b7be",
"branch_name": "refs/heads/main",
"committer_date": 1693406430000,
"content_id": "54928eb92bccb02b51b6ca2cb1884c8ade13ee16",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "61004e474b7b2ad0071c16766f0f7874f04f9466",
"extension": "py",
... | 2.40625 | stackv2 | # Copyright 2022 Google LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, ... | 120 | 29.65 | 80 | 15 | 865 | python | [{"finding_id": "codeql_py/stack-trace-exposure_1406bb0344a85c05_2f90a9a3", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 5 | true | [
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-215",
"CWE-117"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/flask-debug",
"py/log-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"A Flask app appears to b... | [
108,
112,
116,
120,
102
] | [
null,
null,
null,
null,
null
] | [
49,
49,
49,
5,
40
] | [
56,
62,
56,
64,
45
] | |
2024-11-19T01:26:45.041999+00:00 | 1,549,171,914,000 | f1d337134554d98e28da3bdc5b97be5dd1fb29c2 | 3 | {
"blob_id": "f1d337134554d98e28da3bdc5b97be5dd1fb29c2",
"branch_name": "refs/heads/master",
"committer_date": 1549171914000,
"content_id": "9594bb2d42078cc761a2e6e9d5f1e122181b347a",
"detected_licenses": [
"MIT"
],
"directory_id": "fca43a7649be24ae025a1719f63fb25c816e834c",
"extension": "py",
"fi... | 2.953125 | stackv2 | #!/usr/bin/python3
import os
import os.path
from os import listdir
from os.path import isfile, join
import getpass
from Crypto import Random
from Crypto.Cipher import AES
class Encryptor:
def __init__(self, key):
self.key = key
def pad(self, s):
return s + b"\0" * (AES.block_size - len(s) % A... | 83 | 29.59 | 98 | 15 | 655 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_4ee496614822a101_46765090", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text."
] | [
67
] | [
null
] | [
21
] | [
29
] | |
2024-11-19T01:26:56.982141+00:00 | 1,683,592,689,000 | 0254fcf0b93982523cd1c7c5b63098913dd4fcf9 | 3 | {
"blob_id": "0254fcf0b93982523cd1c7c5b63098913dd4fcf9",
"branch_name": "refs/heads/master",
"committer_date": 1683592689000,
"content_id": "e0a2cdf0ebcfe4550f6dc77b99c9289e40d23b8c",
"detected_licenses": [
"MIT"
],
"directory_id": "430e1fcf16140de1f68d909609df82182a5faf21",
"extension": "py",
"fi... | 2.546875 | stackv2 | import os
import streamlit as st
import requests
import nltk
from langchain.embeddings.openai import OpenAIEmbeddings
from langchain.text_splitter import NLTKTextSplitter
from langchain.vectorstores import Chroma
from langchain.docstore.document import Document
from langchain.prompts import PromptTemplate
from langcha... | 58 | 34.38 | 138 | 19 | 465 | python | [{"finding_id": "codeql_py/full-ssrf_97bf3691d69f3563_1a2895b8", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 1 | true | [
"CWE-918"
] | [
"py/full-ssrf"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1)."
] | [
28
] | [
null
] | [
16
] | [
33
] | |
2024-11-19T01:26:59.101642+00:00 | 1,554,912,231,000 | f68e4f23e27c33b56c9d0ab796f8b0d0bef07070 | 2 | {
"blob_id": "f68e4f23e27c33b56c9d0ab796f8b0d0bef07070",
"branch_name": "refs/heads/master",
"committer_date": 1554912231000,
"content_id": "f29936a51cf9eddb9884b4d56ed11e95bdcdf332",
"detected_licenses": [
"MIT"
],
"directory_id": "8c8635ec9d41ff0abe7873c14981a80c1805db7d",
"extension": "py",
"fi... | 2.421875 | stackv2 | import os, sys, shutil
from jinja2 import Environment, PackageLoader
import csv
import operator
from boilerplate import get_boilerplate
env = Environment(loader=PackageLoader("dbu", "templates"))
item_t = env.get_template("item.html")
col_t = env.get_template("col.html")
base_t = env.get_template("rootpage.html")
D... | 200 | 38.48 | 156 | 22 | 2,136 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_5e9c4d0429ef46b5_71ff0d1f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
9
] | [
null
] | [
7
] | [
60
] | |
2024-11-19T01:26:59.328010+00:00 | 1,621,516,838,000 | 5dd1770614df0b277c418d471c4eac8b38c9502b | 3 | {
"blob_id": "5dd1770614df0b277c418d471c4eac8b38c9502b",
"branch_name": "refs/heads/master",
"committer_date": 1621516838000,
"content_id": "73321e7ca1fccbfb39ace436601b7dc2187cde7c",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "72c5793a06577d79807f53e96c2d2fc0a04573d0",
"extension": "py"... | 2.71875 | stackv2 | import requests
from requests.packages.urllib3.exceptions import InsecureRequestWarning
# disable any ssl insecure warnings
requests.packages.urllib3.disable_warnings(InsecureRequestWarning)
# Assign requests.Session instance to session variable
session = requests.Session()
# Define URL and PAYLOAD variables
URL = "h... | 52 | 27.98 | 78 | 12 | 373 | python | [{"finding_id": "codeql_py/request-without-cert-validation_e7fd07d83c63174e_3895f7b5", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
21,
48
] | [
null,
null
] | [
null,
15
] | [
44,
67
] | |
2024-11-19T01:37:40.827258+00:00 | 1,551,900,007,000 | cb0879210545cb109f1dd8dfe5bd25e3efe29a3c | 3 | {
"blob_id": "cb0879210545cb109f1dd8dfe5bd25e3efe29a3c",
"branch_name": "refs/heads/master",
"committer_date": 1551900007000,
"content_id": "c2f96e2d10559a9c755f63c4fcf27b09b6ef29f3",
"detected_licenses": [
"MIT"
],
"directory_id": "f11b1fe9cad511e5a76445023134f82ad68c6358",
"extension": "py",
"fi... | 2.71875 | stackv2 | #!/usr/bin/env python2.7
# TODO: Support python2 and python3
import getpass
import jinja2
import orionsdk
import requests
import re
import yaml
# TODO: Refactor into proper module / classes
# TODO: Better organize method ordering
# TODO: Add sample input and output data
# TODO: Add tests
# TODO: PEP8 code formatting... | 401 | 34.2 | 90 | 15 | 3,505 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_3357799e388f2b60_158f4da2", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
44
] | [
null
] | [
7
] | [
81
] | |
2024-11-19T01:37:56.235775+00:00 | 1,667,101,461,000 | 38cc1c5c203bf638e0732d91cb8a7e1a6701d915 | 3 | {
"blob_id": "38cc1c5c203bf638e0732d91cb8a7e1a6701d915",
"branch_name": "refs/heads/master",
"committer_date": 1667101461000,
"content_id": "36f38a0bc6ba0c5cac4223c10e74a96a04f9f01e",
"detected_licenses": [
"MIT"
],
"directory_id": "190c5d74b312e30be44f4717c96147dd9b0e09fb",
"extension": "py",
"fi... | 2.6875 | stackv2 | #!/usr/bin/env python
# -*-coding: utf-8-*-
import subprocess
from dataclasses import dataclass
from hashlib import sha1
from io import DEFAULT_BUFFER_SIZE
from itertools import chain
from os import PathLike
from pathlib import Path
from typing import Callable, Dict, Iterable, List
from urllib.parse import parse_qs, u... | 152 | 35.18 | 113 | 22 | 1,270 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_e4423cf322056072_4a51af79", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [humblebundle.com](1) may be at an arbitrary position i... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [humblebundle.com](1) may be at an arbitrary position in the sanitized URL."
] | [
120
] | [
null
] | [
12
] | [
40
] | |
2024-11-19T01:38:03.017608+00:00 | 1,626,114,783,000 | 90885fbc9489d12c8c9b4bb9a8a89edf3fdbd771 | 2 | {
"blob_id": "90885fbc9489d12c8c9b4bb9a8a89edf3fdbd771",
"branch_name": "refs/heads/master",
"committer_date": 1626114783000,
"content_id": "bb94d2bcd6c49f651d8a84d9c4d5a78871a0b388",
"detected_licenses": [
"MIT"
],
"directory_id": "9f3a2cac34e3ef17614329bfd2b5c8c945fe6003",
"extension": "py",
"fi... | 2.453125 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
import tkinter as tk
from tkinter import ttk
import tkinter.simpledialog
import os
import paramiko
from glob import glob
from configparser import ConfigParser
__author__ = ['Enrico Giampieri', 'Nico Curti']
__email__ = ['enrico.giampieri@unibo.it', 'nico.curti2@unibo.it... | 193 | 30.28 | 116 | 18 | 1,510 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_b6c763f155d865bc_d5f9fbfd", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
130
] | [
null
] | [
7
] | [
64
] | |
2024-11-19T01:38:07.111642+00:00 | 1,508,059,484,000 | 54db615588bf37f9d0ac8c59c1ad9e9d0c576386 | 3 | {
"blob_id": "54db615588bf37f9d0ac8c59c1ad9e9d0c576386",
"branch_name": "refs/heads/master",
"committer_date": 1508059484000,
"content_id": "de01a1173961dafaae12e04452aa4b60f9c997be",
"detected_licenses": [
"MIT"
],
"directory_id": "5da7eb78c7fae517aa297c8492eac0751f580784",
"extension": "py",
"fi... | 2.53125 | stackv2 | import urllib.request
import json
import requests
from pprint import pprint
import time
import pdb
f = open('key.txt')
API_KEY = f.read()
f.close()
def error_code(code):
return (code > 400)
def get_routes(origin_id, destination_id, date_out, date_in):
session_params = {
'cabinclass':"Economy",
... | 84 | 26.26 | 107 | 15 | 536 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_09c6ec6ef38224be_f7eb0aad", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
45
] | [
null
] | [
37
] | [
53
] | |
2024-11-19T01:38:12.311863+00:00 | 1,572,541,825,000 | ad36894611ced84db7c24dd44a2edc85f40150f2 | 3 | {
"blob_id": "ad36894611ced84db7c24dd44a2edc85f40150f2",
"branch_name": "refs/heads/master",
"committer_date": 1572541825000,
"content_id": "9bf2f3ad73a4e882baa32dfb6da96fbda4d74ce4",
"detected_licenses": [
"MIT"
],
"directory_id": "f08fb4a3a3e3e3d15ef0c8e8c8f0c6217106d459",
"extension": "py",
"fi... | 2.703125 | stackv2 | # Copyright (c) 2014--2019 Muhammad Yousefnezhad
#
# Permission is hereby granted, free of charge, to any person obtaining a copy
# of this software and associated documentation files (the "Software"), to deal
# in the Software without restriction, including without limitation the rights
# to use, copy, modify, merge, ... | 91 | 33.66 | 80 | 13 | 682 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9d00cd192a086e69_14da7e2d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
86
] | [
null
] | [
27
] | [
39
] | |
2024-11-19T01:38:15.256206+00:00 | 1,482,394,937,000 | 787c2b7cb8312b1b96b28926f2ae3f1f10737f33 | 2 | {
"blob_id": "787c2b7cb8312b1b96b28926f2ae3f1f10737f33",
"branch_name": "refs/heads/master",
"committer_date": 1482394937000,
"content_id": "bab65f3c594d1b3c4727f47896ab8303c20407a6",
"detected_licenses": [
"MIT"
],
"directory_id": "34da25a905b3eaae6938b51761e6bdc943cb6c19",
"extension": "py",
"fi... | 2.34375 | stackv2 | # coding: utf-8
from leancloud import Object
from leancloud import Query
import urllib,urllib2,time
import re
from bs4 import BeautifulSoup
from header import *
class BookRack(Object):
def networkRequestForData(self,url,data):
index=1
while(True):
if(index==10):
print ... | 206 | 38.39 | 140 | 22 | 1,970 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_30e7d0321fab65bb_3048a887", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [http://m.23wx.com](1) may be at an arbitrary position ... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization",
"py/incomplete-hostname-regexp"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"The string [http://m.23wx.com](1) may be at an arbitrary position in the sanitized URL.",
"This regular expression has an unescaped '.' before '23wx.com/html/', so it might match more hosts than expected."
] | [
93,
121
] | [
null,
null
] | [
28,
55
] | [
54,
78
] | |
2024-11-19T01:51:58.939467+00:00 | 1,513,863,577,000 | 2263c222849c3ee73e748e91ac39171246edea71 | 3 | {
"blob_id": "2263c222849c3ee73e748e91ac39171246edea71",
"branch_name": "refs/heads/master",
"committer_date": 1513863577000,
"content_id": "c26818dbcdc7dc6445a126e6dc4a3350f269634c",
"detected_licenses": [
"MIT"
],
"directory_id": "0bf0911bdb62acc117e9902dd3a5bddd2d7228eb",
"extension": "py",
"fi... | 2.578125 | stackv2 | #! /usr/bin/env python
# -*- coding: utf-8 -*-
import json
import requests
PROTOCOL = 'http' # or https
RVISION = '127.0.0.1' # ip or hostname
USERNAME = 'admin' # any user login
PASSWORD = 'admin'
requests.packages.urllib3.disable_warnings()
s = requests.Session()
# Авторизируемся
login = s.post(
PROTOCOL ... | 45 | 22.18 | 115 | 10 | 312 | python | [{"finding_id": "codeql_py/request-without-cert-validation_5b3029a5523be9a8_39969325", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
17,
37
] | [
24,
41
] | [
9,
10
] | [
2,
2
] | |
2024-11-19T01:52:14.312760+00:00 | 1,612,073,411,000 | de2f27bf386401cb89605027585c289b9b81040f | 3 | {
"blob_id": "de2f27bf386401cb89605027585c289b9b81040f",
"branch_name": "refs/heads/master",
"committer_date": 1612073411000,
"content_id": "e5214b673de213d6849926084e5e18eded175368",
"detected_licenses": [
"MIT"
],
"directory_id": "45c2bb4f1d209e71d41fe1281a5212fa544df609",
"extension": "py",
"fi... | 2.71875 | stackv2 | import sys
import os
from urllib.parse import urlparse
from urllib.parse import parse_qs
from http.server import SimpleHTTPRequestHandler, HTTPServer
class Handler(SimpleHTTPRequestHandler):
def do_GET(self):
res_file = self.get_file(self.path)
self.send_response(200)
self.send_header('Co... | 43 | 25.84 | 101 | 15 | 268 | python | [{"finding_id": "codeql_py/path-injection_3b6a85f53b0dbfbd_9477ceca", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
16,
23
] | [
null,
null
] | [
19,
71
] | [
50,
100
] | |
2024-11-19T01:52:22.841437+00:00 | 1,568,991,429,000 | 4572e846301129ac5c5f896c83c4e003c9ae82f7 | 3 | {
"blob_id": "4572e846301129ac5c5f896c83c4e003c9ae82f7",
"branch_name": "refs/heads/master",
"committer_date": 1568991429000,
"content_id": "caf4d5530972d9f4461002d3b85a3415684fc216",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "2bd75cf8f172c079caf32c19a3469bbf26fbe85b",
"extension": "py"... | 2.734375 | stackv2 | import keyring
import base64
import os
from sys import argv
from keyrings.cryptfile.cryptfile import CryptFileKeyring
def secure_keyring_access(keyring_name=None):
"Encrypted Keyring file access."
kr = CryptFileKeyring()
kr._unlock()
return(kr)
def secure_keyring_get(name, kr):
"Gets encrypted Key... | 48 | 33.1 | 125 | 11 | 432 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_04a0d36fbf15296b_5162264e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
29
] | [
null
] | [
11
] | [
17
] | |
2024-11-19T01:52:27.163229+00:00 | 1,514,039,017,000 | 05d3a8554ffa9dfab5b2e67c150f1831cfa9a217 | 3 | {
"blob_id": "05d3a8554ffa9dfab5b2e67c150f1831cfa9a217",
"branch_name": "refs/heads/master",
"committer_date": 1514039017000,
"content_id": "ca0b7cc89d1951d435c0302a48b12abfdb86f174",
"detected_licenses": [
"MIT"
],
"directory_id": "9a273d10436f1a39f981e3a4ed993a9e16cc562f",
"extension": "py",
"fi... | 2.8125 | stackv2 | """API logic."""
from flask import request, jsonify
from app import app
@app.route('/cat', methods=['PUT'])
def put_test():
"""To call this method use the following command on your terminal.
curl -H "Content-Type: application/json" -i -X PUT -d '{"name":"don gato","age":"13"}' localhost:80/cat
"""
try:
... | 40 | 23.12 | 103 | 16 | 262 | python | [{"finding_id": "codeql_py/stack-trace-exposure_b38c053730e1d964_b0ff31a3", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
19
] | [
null
] | [
24
] | [
40
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.