added
stringlengths
32
32
created
int64
1,236B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.03
source
stringclasses
1 value
text
stringlengths
330
19.3k
num_lines
int64
16
648
avg_line_length
float64
15.5
59.3
max_line_length
int64
37
179
ast_depth
int64
8
38
length
int64
102
3.79k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.11k
276k
sast_codeql_findings_count
int64
1
33
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
33
rule_ids
listlengths
1
33
confidences
listlengths
1
33
severities
listlengths
1
33
messages
listlengths
1
33
line_starts
listlengths
1
33
line_ends
listlengths
1
33
column_starts
listlengths
1
33
column_ends
listlengths
1
33
2024-11-19T01:06:17.920265+00:00
1,500,742,139,000
156720165a5352a8d1dcbe888ee4b3af48d74cf3
3
{ "blob_id": "156720165a5352a8d1dcbe888ee4b3af48d74cf3", "branch_name": "refs/heads/master", "committer_date": 1500742139000, "content_id": "302ef2ee7f8089a109df56ac6ffbbac735462749", "detected_licenses": [ "MIT", "Apache-2.0" ], "directory_id": "28deae4b6f2ef4c83116d8a7e08061b2ac47bb71", "exten...
2.96875
stackv2
import sys import csv import urllib2 import requests import re from itertools import izip from lxml import html, etree from bs4 import BeautifulSoup from bs4.element import Comment from datetime import datetime import time class Player: def __init__(self, name, position): self.name = name; self.position = positi...
213
37.07
162
27
2,179
python
[{"finding_id": "codeql_py/bad-tag-filter_ba05d7cc1a2dfd99_20ad1a03", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression only parses --> and not --!> as a HTML comment end tag.", "remediation": "", "location":...
2
true
[ "CWE-116", "CWE-116" ]
[ "py/bad-tag-filter", "py/bad-tag-filter" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This regular expression only parses --> and not --!> as a HTML comment end tag.", "This regular expression only parses --> and not --!> as a HTML comment end tag." ]
[ 75, 149 ]
[ null, null ]
[ 30, 31 ]
[ 46, 47 ]
2024-11-19T01:06:19.072066+00:00
1,595,485,386,000
c3900eeeaa2869e18cf582f043ff58ed71f16301
3
{ "blob_id": "c3900eeeaa2869e18cf582f043ff58ed71f16301", "branch_name": "refs/heads/master", "committer_date": 1595485386000, "content_id": "135dfeb1d03c374c060ee037ca4ce7dddcb6dbb1", "detected_licenses": [ "MIT" ], "directory_id": "c414ce0c93594c2f0c62c4df456a0ee2dd106eed", "extension": "py", "fi...
2.953125
stackv2
import re from tokens import * class Lexer: number_pattern = re.compile(r"^0[xX]([0-9a-fA-F]+(\.)?[0-9a-fA-F]*|\.[0-9a-fA-F]+)([pP][+\-]?[0-9]+)?|" r"^([0-9]+(\.)?[0-9]*|\.[0-9]+)([eE][+\-]?[0-9]+)?") var_pattern = re.compile(r"[_a-zA-z][\w]*") def __init__(self, chunk, c...
161
33.83
114
19
1,367
python
[{"finding_id": "codeql_py/overly-large-range_1fc983f0b1c74f56_193e0d1a", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 9 ]
[ null ]
[ 37 ]
[ 40 ]
2024-11-19T01:17:14.058505+00:00
1,425,344,030,000
e850ef384d73bddbbed3e99d10533fdacff190cc
2
{ "blob_id": "e850ef384d73bddbbed3e99d10533fdacff190cc", "branch_name": "refs/heads/master", "committer_date": 1425344030000, "content_id": "22f0f0391307aa61b9d3f182dcb3b95afcb267eb", "detected_licenses": [ "MIT" ], "directory_id": "7f3123aa95140bb6237d7177e3cf4d3913a98603", "extension": "py", "fi...
2.359375
stackv2
# -*- coding: utf-8 -*- ''' This module supports operations for instructors to manage courses and assignments ''' #import the app and the login manager from app import app, loginManager from flask import g, request, render_template, redirect, url_for, flash, jsonify from flask.ext.login import login_user, logout_use...
238
30.24
112
25
1,791
python
[{"finding_id": "codeql_py/stack-trace-exposure_a33cc918034dc97f_acafcb62", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.\n[S...
4
true
[ "CWE-209", "CWE-209", "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.\n[Stack trace information](2) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1)...
[ 162, 182, 202, 238 ]
[ null, null, null, null ]
[ 24, 26, 26, 26 ]
[ 69, 32, 32, 32 ]
2024-11-19T01:17:15.798009+00:00
1,617,726,321,000
470d735bb0c2a8de5035e7df682a8205c9e677cd
3
{ "blob_id": "470d735bb0c2a8de5035e7df682a8205c9e677cd", "branch_name": "refs/heads/master", "committer_date": 1617726321000, "content_id": "893c234301796fd51b7837a6470b7c606773e727", "detected_licenses": [ "MIT" ], "directory_id": "ab728f672d55a869f02002d5eb9782ce374b5c86", "extension": "py", "fi...
2.765625
stackv2
import requests, json import sys import urllib3 urllib3.disable_warnings() token_url = "https://api.1nce.com/management-api/oauth/token" # client (application) credentials, page number and message as string which should be send client_id = sys.argv[1] client_secret = sys.argv[2] pg_num = sys.argv[3] message_content =...
71
37
112
16
618
python
[{"finding_id": "codeql_py/request-without-cert-validation_1e691c224c87615e_9d99aa34", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 17 ]
[ 18 ]
[ 25 ]
[ 71 ]
2024-11-19T01:15:14.953080+00:00
1,556,003,058,000
02c27199e250714ec5d391f9761e5d595952cb79
3
{ "blob_id": "02c27199e250714ec5d391f9761e5d595952cb79", "branch_name": "refs/heads/master", "committer_date": 1556003058000, "content_id": "8b605393a8fff9fe0d16a567bf0d035711fc4a4d", "detected_licenses": [ "MIT" ], "directory_id": "bff6f78232dbddd0f785bbbb8616b19748c3f55e", "extension": "py", "fi...
2.953125
stackv2
#!/usr/bin/env python3 import bcrypt import fileinput import os from subprocess import call FILE_PATH = os.path.join(os.path.dirname(__file__), 'serverless.yml') def ask_user_for_region(): regions = ["eu-west-1 (Ireland)", "eu-west-2 (London)", "eu-west-3 (Paris)", "eu-central-1 (Frankfurt)", "Quit "] for ...
100
33.08
156
20
956
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_29486f223800e5ae_d62a5ab1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 42, 72, 77 ]
[ 45, null, 97 ]
[ 19, 11, 11 ]
[ 63, 38, 10 ]
2024-11-19T00:43:43.635340+00:00
1,571,328,510,000
555427f69d9059fa038172fbd29953819449feb7
3
{ "blob_id": "555427f69d9059fa038172fbd29953819449feb7", "branch_name": "refs/heads/master", "committer_date": 1571328510000, "content_id": "330f1ee48ef0b0212aaee2b42982fa987021ae2e", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "384e44f0c24d88e02248debed75b897ee9309749", "extension": "p...
2.53125
stackv2
# Copyright Notice: # Copyright 2016-2019 DMTF. All rights reserved. # License: BSD 3-Clause License. For full text see link: https://github.com/DMTF/Redfish-Interface-Emulator/blob/master/LICENSE.md # Thermal API File """ Collection API: (None) Singleton API: GET, PATCH """ import g import sys, traceback import...
129
29.86
130
17
898
python
[{"finding_id": "codeql_py/log-injection_6213851d6d2ca883_5074c637", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
2
true
[ "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 74, 79 ]
[ null, null ]
[ 22, 30 ]
[ 30, 67 ]
2024-11-19T00:43:44.092386+00:00
1,460,934,086,000
dde3581d72f252eb59607e42bcd8c43326901997
2
{ "blob_id": "dde3581d72f252eb59607e42bcd8c43326901997", "branch_name": "refs/heads/master", "committer_date": 1460934086000, "content_id": "e5f50b509038a01d107c1ca100785eb6eb35c55f", "detected_licenses": [ "Apache-2.0" ], "directory_id": "2540eb81f1cd615611e2a5a9d7ba069df822b56a", "extension": "py"...
2.484375
stackv2
import werkzeug.exceptions as exceptions import copy import flask import functools import inspect import logging import six from ..utils import boolean, is_nullable, is_null logger = logging.getLogger(__name__) # https://github.com/swagger-api/swagger-spec/blob/master/versions/2.0.md#data-types TYPE_MAP = {'integer'...
146
38.55
103
21
1,175
python
[{"finding_id": "codeql_py/log-injection_fbae72f5b12a7f88_219b4040", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](1)...
2
true
[ "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-pr...
[ 139, 141 ]
[ null, null ]
[ 90, 86 ]
[ 93, 89 ]
2024-11-19T00:43:46.083260+00:00
1,627,388,436,000
f819f89444e7350a910bd45aa268916c2af00243
3
{ "blob_id": "f819f89444e7350a910bd45aa268916c2af00243", "branch_name": "refs/heads/main", "committer_date": 1627388436000, "content_id": "6cce5c482d3cf7a0ec0c1eb1f46752ac6f1a778e", "detected_licenses": [ "MIT" ], "directory_id": "d61cba88df33eec38a67421f5afa036142e223e7", "extension": "py", "file...
2.9375
stackv2
from selenium import webdriver from selenium.webdriver.common.by import By from selenium.webdriver.support.ui import WebDriverWait from selenium.common.exceptions import TimeoutException from selenium.webdriver.support import expected_conditions as EC from webdriver_manager.chrome import ChromeDriverManager from urllib...
83
30.81
75
18
599
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_328fbebfe9d388bf_fa05958d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
4
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 57, 62, 68, 74 ]
[ 58, 63, null, null ]
[ 19, 19, 19, 15 ]
[ 57, 54, 24, 20 ]
2024-11-19T00:43:59.873224+00:00
1,690,382,364,000
694b1f3a463ee8463898906ac5f2b2ac4f7750e0
2
{ "blob_id": "694b1f3a463ee8463898906ac5f2b2ac4f7750e0", "branch_name": "refs/heads/main", "committer_date": 1690382364000, "content_id": "a26f989fcf3f78576f20360460a980cac5b058ad", "detected_licenses": [ "Apache-2.0" ], "directory_id": "b05641ceeb5fba2bb36fd96a4c881ffef41b6171", "extension": "py", ...
2.375
stackv2
import os import sys import datetime import libhoney from flask import Flask, jsonify, g, request import logging from flask_sqlalchemy import SQLAlchemy app = Flask(__name__) app.logger.addHandler(logging.StreamHandler(sys.stderr)) app.logger.setLevel(logging.DEBUG) db_user = "root" db_pass = "" db_host = os.geten...
186
32.9
109
19
1,360
python
[{"finding_id": "codeql_py/log-injection_03d5ff79a98c8fd9_5b67308b", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 176 ]
[ null ]
[ 30 ]
[ 67 ]
2024-11-19T01:43:37.216803+00:00
1,566,274,409,000
85fd3dad86af5f268f8471a7b07dded3f8cc4edc
3
{ "blob_id": "85fd3dad86af5f268f8471a7b07dded3f8cc4edc", "branch_name": "refs/heads/master", "committer_date": 1566274409000, "content_id": "3cfb0ac291bdb30fb5a2a29b2fd3f2cf78bfa5bb", "detected_licenses": [ "MIT" ], "directory_id": "ee15b3c7f3fbd9c502e93bee987f27d6599cad2d", "extension": "py", "fi...
2.5625
stackv2
import tornado.ioloop import tornado.web import json import base64 from datetime import datetime import argparse MAX_PROCESS=1 class TextHandler(tornado.web.RequestHandler): def post(self, *args, **kwargs): param = self.request.headers['time'] message = self.request.arguments['msg'][0].decode() print("...
59
30.59
104
18
469
python
[{"finding_id": "codeql_py/reflective-xss_54225312a2611118_0da8532c", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 15 ]
[ null ]
[ 23 ]
[ 104 ]
2024-11-19T01:43:47.984312+00:00
1,520,205,950,000
025ae9415db60dde4fc13fc69853f39a95dfd86d
3
{ "blob_id": "025ae9415db60dde4fc13fc69853f39a95dfd86d", "branch_name": "refs/heads/master", "committer_date": 1520205950000, "content_id": "ef0ef8143cef3ad185ad7ce779685117ecf3d37f", "detected_licenses": [ "MIT" ], "directory_id": "8277925fa6a1b2b8b5f13bcd79e46ca5af3f862d", "extension": "py", "fi...
2.515625
stackv2
######################################## ## import packages ######################################## import os, gc import re import csv import codecs import numpy as np import pandas as pd from string import punctuation from collections import defaultdict from nltk.corpus import stopwords from nltk.stem import Snowball...
365
35.46
135
16
3,627
python
[{"finding_id": "codeql_py/overly-large-range_b730cb77495be240_6635823f", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with 0-9 in the same character class, and is equivalent to \\[+...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with 0-9 in the same character class, and is equivalent to \\[+,\\-.\\/0-9:;<=\\]." ]
[ 90 ]
[ null ]
[ 39 ]
[ 42 ]
2024-11-19T01:43:49.216740+00:00
1,635,056,452,000
bdb49aa618aefd370b1ba1b01f75f3638041aab7
4
{ "blob_id": "bdb49aa618aefd370b1ba1b01f75f3638041aab7", "branch_name": "refs/heads/main", "committer_date": 1635056452000, "content_id": "546f3a50c0da88e040ed3cf0fa1cee3cac31b69b", "detected_licenses": [ "MIT" ], "directory_id": "1ee72dcaa45f80066ab16eceb8c06dba013b21f6", "extension": "py", "file...
3.75
stackv2
#!/usr/bin/env python3 # # A random password generator that is customizable in terms of: # - password length # - character sets # import random ALPHA = "abcdefghijklmnopqrstuvwxyz" + "ABCDEFGHIJKLMNOPQRSTUVWXYZ" NUM = "0123456789" SPECIAL = "@#$%&*" class GenPass: """ Generate password based on ...
60
23.97
84
14
345
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a048b224d74f87c3_8b8a65d6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 58 ]
[ null ]
[ 15 ]
[ 43 ]
2024-11-19T01:43:54.869759+00:00
1,608,722,874,000
e44146a9021ef03f94e63fc4c70aa4c687447f69
3
{ "blob_id": "e44146a9021ef03f94e63fc4c70aa4c687447f69", "branch_name": "refs/heads/main", "committer_date": 1608722874000, "content_id": "56c130d2c9b8e91df3d23304f4193004d595428f", "detected_licenses": [ "MIT" ], "directory_id": "99396c7511f6efc2ca168e14ea06aa1264f66416", "extension": "py", "file...
2.609375
stackv2
import irisnative import json import time import os def lambda_handler(event, context): # Retrieve connection information from configuration file connection_detail = get_connection_info("connection.config") ip = connection_detail["ip"] port = int(connection_detail["port"]) namespace = connec...
86
30.08
138
14
620
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_827954b7da14c499_976d9fa3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 29 ]
[ null ]
[ 11 ]
[ 34 ]
2024-11-19T01:44:08.987292+00:00
1,585,061,870,000
45436b433ebce802d2d7b7e0a1944eda513f58ee
3
{ "blob_id": "45436b433ebce802d2d7b7e0a1944eda513f58ee", "branch_name": "refs/heads/master", "committer_date": 1585061870000, "content_id": "a99bac33f7cabcccdf47d3b1edc52a3a2a76d4c6", "detected_licenses": [ "MIT" ], "directory_id": "dbccdd2ba6870a7e362d104c8c0fc13c61b10b71", "extension": "py", "fi...
2.515625
stackv2
#!/usr/bin/env python3 import cgi, cgitb, os import json cgitb.enable() try: form = cgi.FieldStorage() print("Cache-control: private, max-age=0, no-cache") print("Content-type: application/json\r\n\r\n") fileitem = form['filename'] if fileitem.filename: fn = os.path.basename(fileitem....
27
25.41
80
13
181
python
[{"finding_id": "codeql_py/path-injection_5dbfe934de1caeaf_e857cb8a", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 17 ]
[ null ]
[ 14 ]
[ 22 ]
2024-11-19T01:44:10.041853+00:00
1,691,789,519,000
c12416f091361eb884b71ce54f160422dc62da75
3
{ "blob_id": "c12416f091361eb884b71ce54f160422dc62da75", "branch_name": "refs/heads/main", "committer_date": 1691789519000, "content_id": "475af5211ad64f2c48a28a0bd6f8c009b8643838", "detected_licenses": [ "CC0-1.0" ], "directory_id": "f7f3dd55fa7ab6833f3c2d8e457884c127cc203d", "extension": "py", "...
2.546875
stackv2
import logging import re import subprocess import sys from dataclasses import dataclass from pathlib import Path, PurePath from typing import List import click from linkml._version import __version__ re_decl = re.compile(r"^(\S+):$") re_start_yaml = re.compile(r"^```(\w+)$") re_end_yaml = re.compile(r"^```$") re_htm...
222
30.31
98
22
1,527
python
[{"finding_id": "codeql_py/bad-tag-filter_01d8c731451575e6_21c3a4b5", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression does not match comments containing newlines.", "remediation": "", "location": {"file_pat...
1
true
[ "CWE-116" ]
[ "py/bad-tag-filter" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression does not match comments containing newlines." ]
[ 16 ]
[ null ]
[ 32 ]
[ 46 ]
2024-11-19T02:20:03.417532+00:00
1,552,203,519,000
ce6048cea2207c7ba88e36b725041e241ca1f5bd
3
{ "blob_id": "ce6048cea2207c7ba88e36b725041e241ca1f5bd", "branch_name": "refs/heads/master", "committer_date": 1552203519000, "content_id": "4f37487feb931332ea82b787e79cabdf756a7715", "detected_licenses": [ "MIT" ], "directory_id": "8e1756d560054d674c59d4f677a3196c243b0993", "extension": "py", "fi...
2.625
stackv2
from linked_list import LinkedList from queue import Queue import datetime import random import pickle def prRed(skk): print("\033[91m {}\033[00m" .format(skk)) def prGreen(skk): print("\033[92m {}\033[00m" .format(skk)) def prYellow(skk): print("\033[93m {}\033[00m" .format(skk)) def prLightPurple(skk): print("\03...
425
29.5
90
25
3,012
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_2489947eea334d94_19816fd8", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 250 ]
[ null ]
[ 31 ]
[ 53 ]
2024-11-19T02:20:04.693227+00:00
1,542,699,191,000
3573addd31fed954e8f749b8832a31eebdff2e12
3
{ "blob_id": "3573addd31fed954e8f749b8832a31eebdff2e12", "branch_name": "refs/heads/master", "committer_date": 1542699191000, "content_id": "d1d0661113e4423a462ea3ebb8f336e3f590a265", "detected_licenses": [ "MIT" ], "directory_id": "aacbe21e3e9264c9e3d19ba4bbb08e574ac5791d", "extension": "py", "fi...
2.796875
stackv2
import urllib.request,json from .models import Articles,Sources #fetching API key api_key= None #getting the news base url base_url = None def configure_request(app): global api_key,base_url api_key = app.config['NEWS_API_KEY'] base_url = app.config['NEWS_API_SOURCE_URL'] def get_sources(): ...
94
30.69
116
12
612
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_267f6321a191f32d_dda4d94b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 53 ]
[ null ]
[ 11 ]
[ 35 ]
2024-11-19T02:20:07.531924+00:00
1,624,579,221,000
b00b3b83c80fdedaa7fe9f71c73aa72faaf26923
3
{ "blob_id": "b00b3b83c80fdedaa7fe9f71c73aa72faaf26923", "branch_name": "refs/heads/master", "committer_date": 1624579221000, "content_id": "3340ab870d3c2924b4214f3a825376a485004250", "detected_licenses": [ "MIT" ], "directory_id": "92e2e983b6d765750a798d2a4979c75608ba820f", "extension": "py", "fi...
3.109375
stackv2
#!/usr/bin/env python3 # -*- coding: UTF-8 -*- """The common component contains the logger, error logging, and flair sanitizing functions that are used by both routines. There are no functions that connect to Reddit in this component. """ import datetime import logging import re import time from settings import INFO, ...
162
33.61
95
13
1,349
python
[{"finding_id": "codeql_py/overly-large-range_5c142e45350a0583_d82948b7", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "remediatio...
3
true
[ "CWE-020", "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class." ]
[ 120, 120, 120 ]
[ null, null, null ]
[ 12, 15, 18 ]
[ 16, 19, 22 ]
2024-11-19T02:20:07.868106+00:00
1,691,478,382,000
69f39f2750af259aeb56f9978ad737cd87c6d839
3
{ "blob_id": "69f39f2750af259aeb56f9978ad737cd87c6d839", "branch_name": "refs/heads/master", "committer_date": 1691478382000, "content_id": "d69730bd9b2beeb7bf64a2b421de7da4bbf6c51b", "detected_licenses": [ "Apache-2.0" ], "directory_id": "aa1865ff1b47a2ed0f43dc993e7e0916969d3a9e", "extension": "py"...
2.6875
stackv2
""" This examples show how to train a Bi-Encoder for the MS Marco dataset (https://github.com/microsoft/MSMARCO-Passage-Ranking). The queries and passages are passed independently to the transformer network to produce fixed sized embeddings. These embeddings can then be compared using cosine-similarity to find matchin...
242
42.28
177
19
2,449
python
[{"finding_id": "codeql_py/tarslip_7b6916166c5cc84c_e11696d4", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/tarslip", "py/tarslip" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1).", "This file extraction depends on a [potentially untrusted source](1)." ]
[ 98, 118 ]
[ null, null ]
[ 9, 9 ]
[ 12, 12 ]
2024-11-19T00:59:29.855647+00:00
1,618,514,645,000
18c1ca49d00da0c56bd2a68e12f237eb3f204952
2
{ "blob_id": "18c1ca49d00da0c56bd2a68e12f237eb3f204952", "branch_name": "refs/heads/main", "committer_date": 1618514645000, "content_id": "5711dd5530e131df0cae49320d88bdb78f7020ab", "detected_licenses": [ "MIT" ], "directory_id": "7fca03132804100ad46aeb96c3bdb73ea351ae08", "extension": "py", "file...
2.4375
stackv2
import inspect import json import pathlib from fastapi import FastAPI, Request from fastapi.responses import StreamingResponse from .trigger import trigger_run filename = inspect.getframeinfo(inspect.currentframe()).filename BASE_DIR = pathlib.Path(filename).resolve().parent app = FastAPI() @app.get("/") # HTTP GET...
62
30.27
76
12
471
python
[{"finding_id": "codeql_py/path-injection_182def411db356fb_73eb7f0e", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
5
true
[ "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 45, 47, 49, 60, 62 ]
[ null, null, null, null, null ]
[ 5, 12, 23, 12, 35 ]
[ 15, 23, 34, 23, 46 ]
2024-11-19T00:59:31.156103+00:00
1,629,280,618,000
c195b6285ed80d8f5cb1a582d4a2adb143a6392e
3
{ "blob_id": "c195b6285ed80d8f5cb1a582d4a2adb143a6392e", "branch_name": "refs/heads/main", "committer_date": 1629280618000, "content_id": "25d3532ceb470c23e6993831b141e0fd683cde0e", "detected_licenses": [ "MIT" ], "directory_id": "f68c4d396c035deb884917bd87a522174be68c34", "extension": "py", "file...
2.796875
stackv2
import collections import json from jinja2 import Template from typing import Dict, List class LabCollection: def __init__(self, file_name="labs.json", include_status=True): with open(file_name) as f: self.all = json.loads(f.read()) self.include_status = include_status self.cat...
35
32.57
75
17
256
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_96d1a89ae03880d2_adcbae88", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 32 ]
[ null ]
[ 24 ]
[ 42 ]
2024-11-19T00:59:36.526784+00:00
1,635,480,750,000
ee6d19865842bef714dd9435d6c371c4182fa65f
2
{ "blob_id": "ee6d19865842bef714dd9435d6c371c4182fa65f", "branch_name": "refs/heads/master", "committer_date": 1635480750000, "content_id": "c35239e1e3562e1df20ea62d870ed1b524412b47", "detected_licenses": [ "Apache-2.0" ], "directory_id": "0ca52d676ada403de864d52cc7260af6193048f3", "extension": "py"...
2.34375
stackv2
import os from cachetools import cached, LRUCache from logging_helper import setup_logging from ._auth import _get_token from ._cache import get_file_cache from ._compat import urlsplit from ._github import check_repo logger = setup_logging() session = get_file_cache("rtd") TOKEN = os.environ.get("RTD_AUTH_TOKEN")...
186
27.99
128
19
1,276
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_e52b9dfbbddeb7cb_98276c46", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [github.com](1) may be at an arbitrary position in the ...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [github.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 182 ]
[ null ]
[ 28 ]
[ 55 ]
2024-11-19T01:11:38.267907+00:00
1,589,566,024,000
aafd6a4de02c9eeaa8cf2d5590bdf48d9723f288
3
{ "blob_id": "aafd6a4de02c9eeaa8cf2d5590bdf48d9723f288", "branch_name": "refs/heads/master", "committer_date": 1589566024000, "content_id": "2a5aaab6ff843cf165d78b691a35ec4ee4b9dc4f", "detected_licenses": [ "MIT" ], "directory_id": "a8d03be2c746579e698f74efbec1124e72578424", "extension": "py", "fi...
2.6875
stackv2
#mongodb+srv://user123:<password>@cluster0-qas6f.mongodb.net/test?retryWrites=true&w=majority # app/mongo_queries.py import pymongo import os from dotenv import load_dotenv load_dotenv() DB_USER = os.getenv("MONGO_USER", default="OOPS") DB_PASSWORD = os.getenv("MONGO_PASSWORD", default="OOPS") CLUSTER_NAME = os.gete...
198
20.76
118
13
1,514
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6103e85ce6e4738b_4449f0c4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 16 ]
[ null ]
[ 15 ]
[ 29 ]
2024-11-19T01:11:51.879317+00:00
1,490,284,050,000
86fd5583eb8fb4e7363f596b3792341b8ead1fa2
3
{ "blob_id": "86fd5583eb8fb4e7363f596b3792341b8ead1fa2", "branch_name": "refs/heads/master", "committer_date": 1490284050000, "content_id": "02a4ccecdbce594ac43a5fb1c1456988b0719646", "detected_licenses": [ "MIT" ], "directory_id": "6fed17a4613fe0a7779e6bf978bea7831ca0209a", "extension": "py", "fi...
2.71875
stackv2
from bcrypt import hashpw, gensalt from flask import Blueprint, request, render_template, flash, redirect, url_for from pimp_board import User, db from flask_login import login_user, logout_user auth_blueprint = Blueprint('auth_blueprint', __name__, template_folder='templates') @auth_blueprint.route('/register', meth...
47
38.32
93
13
386
python
[{"finding_id": "codeql_py/url-redirection_4055682aee71dc14_82048c49", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 41 ]
[ null ]
[ 21 ]
[ 65 ]
2024-11-19T01:11:53.499372+00:00
1,530,952,053,000
2146772c95e498db13d4ee0fda2ad4922919d6c8
2
{ "blob_id": "2146772c95e498db13d4ee0fda2ad4922919d6c8", "branch_name": "refs/heads/master", "committer_date": 1530952053000, "content_id": "d26ae2c09902a5a8513634a3cb409b9d5338eb23", "detected_licenses": [ "MIT" ], "directory_id": "e770cf3ce12527d24b851a4f77c922cd83a9497a", "extension": "py", "fi...
2.40625
stackv2
import logging import json import random from string import Template import typing from urllib.parse import urlencode from urllib.request import urlopen from crunchy_api.types import Field, ObjectType, MediaType, SortMode __version__ = "0.3.0" """ Api documentation https://github.com/CloudMax94/crunchyroll-api/wiki/...
201
29.17
98
16
1,422
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5c967ff869625564_c90a76d4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 28 ]
[ null ]
[ 53 ]
[ 57 ]
2024-11-19T01:11:54.054104+00:00
1,513,548,304,000
393b7bd0e029e7d7461c41c5563df1ca24f65601
2
{ "blob_id": "393b7bd0e029e7d7461c41c5563df1ca24f65601", "branch_name": "refs/heads/master", "committer_date": 1513548304000, "content_id": "df9b7d8c59b7fc9e5a9a6f631c2946afcf1f972a", "detected_licenses": [ "MIT" ], "directory_id": "f7d15c5ce61b05a74d625dd28f1f481c34b5777f", "extension": "py", "fi...
2.390625
stackv2
#!/usr/bin/env python # coding: utf-8 """MIT License Copyright (c) 2017 Curtis La Graff Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the right...
165
26.35
98
14
1,015
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_59376d774058e4bb_34310ce5", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 75, 89 ]
[ null, null ]
[ 11, 11 ]
[ 36, 36 ]
2024-11-19T01:11:56.582411+00:00
1,494,164,622,000
b342c7959d20a49cecd7e6baf19f90016e1b1cf9
3
{ "blob_id": "b342c7959d20a49cecd7e6baf19f90016e1b1cf9", "branch_name": "refs/heads/master", "committer_date": 1494164622000, "content_id": "884ca2ef4bf426804b2738ab00d3404bca0d0655", "detected_licenses": [ "Apache-2.0" ], "directory_id": "1355e7d7592381bdd6133a6d733736b1fe605766", "extension": "py"...
3.125
stackv2
# 查票类,目的是将查到的票输出到文件,让用户选票 import json import re import requests from requests.packages.urllib3.exceptions import InsecureRequestWarning # 忽略 Warning 用 requests.packages.urllib3.disable_warnings(InsecureRequestWarning) # 忽略 Warning 用 class Crawl: def __init__(self, departure_date, from_station_chs, to_station_...
88
38.67
120
20
1,123
python
[{"finding_id": "codeql_py/request-without-cert-validation_17d670b6e49deb32_b481f782", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 72 ]
[ null ]
[ 16 ]
[ 47 ]
2024-11-19T01:21:38.704148+00:00
1,524,709,553,000
65fef561293e1a8caa4f49a1f043d323ca67dc02
3
{ "blob_id": "65fef561293e1a8caa4f49a1f043d323ca67dc02", "branch_name": "refs/heads/master", "committer_date": 1524709553000, "content_id": "5778121126535b22e91089ab931cc7d51c89e213", "detected_licenses": [ "MIT" ], "directory_id": "221a773d42862d4ec42f859d8daa02784bda4091", "extension": "py", "fi...
2.75
stackv2
# -*- coding:utf-8 -*- import urllib.request import re import os from urllib.error import HTTPError from time import * # 图片保存根目录 pics_path = r'./pics' # 输入id文件 id_file = r'./ids.txt' # 日志文件 logger = r'./piclog.txt' log = open(logger, 'w') # ------------定义3个函数,用来创建每个girl的目录、保存图片、写入文本描述及对话---------------- def mkdir_f...
159
28.75
104
15
1,363
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_8fee67ee51974271_06b5e37a", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'pximg.net/img-master/img', so it mi...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/incomplete-hostname-regexp", "py/incomplete-hostname-regexp" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'pximg.net/img-master/img', so it might match more hosts than expected.", "This regular expression has an unescaped '.' before 'pximg.net/c/600x600/img-master/img', so it might match more hosts than expected." ]
[ 110, 118 ]
[ null, null ]
[ 32, 36 ]
[ 73, 98 ]
2024-11-19T01:22:20.282293+00:00
1,476,855,805,000
4e415fe5fd9f1cbc7ffd44302d7901d583e98731
4
{ "blob_id": "4e415fe5fd9f1cbc7ffd44302d7901d583e98731", "branch_name": "refs/heads/master", "committer_date": 1476855805000, "content_id": "85525df83c7d11eb94cc4a8d6236abc6c2d30be6", "detected_licenses": [ "MIT" ], "directory_id": "5364107c216d6d87a3fd8296d7a5bfb6ae16d11c", "extension": "py", "fi...
3.84375
stackv2
# Pratice 27. Validating inputs # Output: # Enter the first name: J # Enter the last name: # Enter the ZIP code : ABCDE # Enter an employee ID : A12-1234 # "J" is not a valid first name. It is too short. # The last name must be filled in. # The ZIP code must be numeric. # A12-1234 is not a valid ID. # ...
101
31.16
89
12
866
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_55b31a4364ecc0ce_83c6a17d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.\nThis expression logs [sensitive data (private)](4) as clear text." ]
[ 101 ]
[ null ]
[ 12 ]
[ 21 ]
2024-11-19T01:56:40.560559+00:00
1,691,063,377,000
ab9e01474181f2d8283416510475edaaaa6f8e28
3
{ "blob_id": "ab9e01474181f2d8283416510475edaaaa6f8e28", "branch_name": "refs/heads/main", "committer_date": 1691063377000, "content_id": "25aad3973627a74ad48c5a38f94962aa1e7eefcb", "detected_licenses": [ "Apache-2.0" ], "directory_id": "8b12d44618a870d0b4d11719928035f52930093f", "extension": "py", ...
2.8125
stackv2
"""Most of this code is from torchvision. I will remove all this once verbosity is reduced. More info: https://github.com/pytorch/vision/issues/2830 """ import gzip import hashlib import os import tarfile import urllib import zipfile from typing import Optional from torch.hub import tqdm from .typing import TypePath...
172
27.88
81
18
1,182
python
[{"finding_id": "codeql_py/tarslip_16e7a5a51f316312_0216a556", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
3
true
[ "CWE-022", "CWE-022", "CWE-022" ]
[ "py/tarslip", "py/tarslip", "py/tarslip" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1).", "This file extraction depends on a [potentially untrusted source](1).", "This file extraction depends on a [potentially untrusted source](1)." ]
[ 100, 103, 106 ]
[ null, null, null ]
[ 13, 13, 13 ]
[ 16, 16, 16 ]
2024-11-19T01:56:45.506200+00:00
1,311,268,681,000
3ab2b58822a8d235225556caa899bb1db114328e
3
{ "blob_id": "3ab2b58822a8d235225556caa899bb1db114328e", "branch_name": "refs/heads/master", "committer_date": 1311268681000, "content_id": "fd06393cd1e477d57ae41ef080736b3863bde1d9", "detected_licenses": [ "MIT" ], "directory_id": "a9bd142fed942f0de9073f38e2a72395b69d3ef8", "extension": "py", "fi...
2.625
stackv2
# -*- coding: utf-8 -*- u""" Envelope contact form. """ import logging from smtplib import SMTPException from django import forms from django.conf import settings from django.core import mail from django.template.loader import render_to_string from django.utils.translation import ugettext_lazy as _ logger = loggin...
153
32.72
90
15
1,033
python
[{"finding_id": "codeql_py/log-injection_a51118e4f07ef21f_ab8d20ec", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
2
true
[ "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 57, 146 ]
[ 58, 147 ]
[ 25, 25 ]
[ 51, 51 ]
2024-11-19T02:10:46.297265+00:00
1,625,765,000,000
1d912a8b4139b5c9250a2eefc0ac173882ed91c9
3
{ "blob_id": "1d912a8b4139b5c9250a2eefc0ac173882ed91c9", "branch_name": "refs/heads/main", "committer_date": 1625765000000, "content_id": "ab8b920e7ec5abdfe1d13b158b3e5143ec0596ec", "detected_licenses": [ "MIT" ], "directory_id": "779d9244b1280175794a1b3484f7e2c39ecb6922", "extension": "py", "file...
2.796875
stackv2
## This is to help with importing the API only when needed import sys import json from variables import weatherInfo from IPAddress import getMyIPv4Address, getMyIPv6Address #sys.path.append("API/") def readData(filename): f = open(filename, "rb") fin = f.readline() lines = f.readlines() for line in lin...
393
31.66
127
17
2,932
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_49aa2559f136d0bc_65cb493b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 382 ]
[ null ]
[ 11 ]
[ 86 ]
2024-11-19T02:45:21.432362+00:00
1,596,030,399,000
91c99b3920376933832a9616fa8663639da99a04
3
{ "blob_id": "91c99b3920376933832a9616fa8663639da99a04", "branch_name": "refs/heads/master", "committer_date": 1596030399000, "content_id": "14d240e4db4bdd998ab47c229d5fbcd7bd62420e", "detected_licenses": [ "Apache-2.0" ], "directory_id": "8999b1ef8c7a115e2f4de24b7271ce055d89acc4", "extension": "py"...
2.609375
stackv2
from __future__ import print_function __author__ = 'cpaulson' import pyKriging from pyKriging.krige import kriging from pyKriging.samplingplan import samplingplan import numpy as np from random import random from random import seed seed(1) import math # The Kriging model starts by defining a sampling plan, we use an op...
152
23.22
94
17
1,189
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ef40381071c6dd24_f90730a4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 64 ]
[ null ]
[ 17 ]
[ 23 ]
2024-11-19T02:45:45.321232+00:00
1,508,358,032,000
19ef6d3c310a26957747c1c1a4a569570b99f3f8
2
{ "blob_id": "19ef6d3c310a26957747c1c1a4a569570b99f3f8", "branch_name": "refs/heads/master", "committer_date": 1508358032000, "content_id": "04ccdf80e91f14a91f112d36e2c76d09b3015342", "detected_licenses": [ "Apache-2.0" ], "directory_id": "f826e41bb05b461c052aadf2e5783ebb35a59f29", "extension": "py"...
2.40625
stackv2
''' Kurgan AI Web Application Security Analyzer. http://www.kurgan.com.br/ Author: Glaudson Ocampos - <glaudson@vortexai.com.br> Created in May, 11th 2016. ''' import requests import config import sys import warnings import validators sys.path.append('../') class Target(object): host = None method = '' ...
108
23.21
88
15
619
python
[{"finding_id": "codeql_py/request-without-cert-validation_81d3d711509b27ea_8c70bab2", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
4
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 86, 88, 94, 96 ]
[ null, null, null, null ]
[ 17, 17, 17, 17 ]
[ 70, 71, 83, 84 ]
2024-11-19T01:57:31.208430+00:00
1,560,870,299,000
68f61dfc62f2ad6863370c3cbe7790df78a63064
2
{ "blob_id": "68f61dfc62f2ad6863370c3cbe7790df78a63064", "branch_name": "refs/heads/master", "committer_date": 1560870299000, "content_id": "a02f65ec2d617ac2e949309c6bfaa48ccec325aa", "detected_licenses": [ "MIT" ], "directory_id": "f683461f9be9ab6dbf5fbef5c8b97fd27e4e1eb3", "extension": "py", "fi...
2.40625
stackv2
import paramiko import os import sys import subprocess import string hostname = sys.argv[1] def findtunnel(val): country = val[:2] city = val[2:4] appl_type = val[4:7] code = val[7:10] values = (country, city, appl_type, code) return values def start_socks(val): system = findtunnel(val)...
58
31.86
148
14
518
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_0c5857c76238c563_61bde951", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 37 ]
[ null ]
[ 9 ]
[ 74 ]
2024-11-19T02:10:54.835093+00:00
1,544,079,507,000
9594d7d7de0526f3ad7934abf215a59b95604d50
4
{ "blob_id": "9594d7d7de0526f3ad7934abf215a59b95604d50", "branch_name": "refs/heads/master", "committer_date": 1544079507000, "content_id": "13bd1d3079eedc4393b318bb23fead484708df5e", "detected_licenses": [ "Apache-2.0" ], "directory_id": "79acf393ddb336752b1112649ff09fac026a8ab7", "extension": "py"...
3.5625
stackv2
# -*- coding:utf-8 -*- __author__ = 'flybrower' classmates = ['Michael', 'Bob', 'Tracy'] print(classmates) print('len(classmates)=', len(classmates)) def print_scores(**kw): print('-------------score------------') print('------------------------------') for name,score in kw.items(): print('%10s %d...
31
23.06
49
11
223
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_339a44312d06c43f_345b3539", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 24 ]
[ null ]
[ 11 ]
[ 32 ]
2024-11-19T02:10:55.059443+00:00
1,604,570,610,000
4d389e474d4a667aca7b750e3099d61c3c64abd4
3
{ "blob_id": "4d389e474d4a667aca7b750e3099d61c3c64abd4", "branch_name": "refs/heads/main", "committer_date": 1604570610000, "content_id": "dddbf2b50f95a48714b2a4fc6feada95be96371e", "detected_licenses": [ "MIT" ], "directory_id": "e0581dd9b228169e5c927a8a349e58a34e228368", "extension": "py", "file...
2.71875
stackv2
from flask import Flask, render_template, redirect, request app = Flask(__name__) distance = 0.1 @app.route("/") def home(): global distance return render_template('test8/page.html', distance=distance) @app.route("/setdistance", methods=["POST"]) def setdistance(): global distance distance = fl...
19
22.84
64
11
102
python
[{"finding_id": "codeql_py/flask-debug_99a434ffc6cca913_8acd59e0", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-601" ]
[ "py/flask-debug", "py/url-redirection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 19, 17 ]
[ null, null ]
[ null, 21 ]
[ 22, 37 ]
2024-11-19T02:10:57.696033+00:00
1,533,343,194,000
89ff2af78b3fa467217570434d644d810c6fbbaa
3
{ "blob_id": "89ff2af78b3fa467217570434d644d810c6fbbaa", "branch_name": "refs/heads/master", "committer_date": 1533343194000, "content_id": "75b5903a30320f6dd91d91959870d63044903378", "detected_licenses": [ "MIT" ], "directory_id": "00d1d8931d39a6c7614d48814d9e42ed148299b4", "extension": "py", "fi...
2.515625
stackv2
#! /usr/bin/env python3 # -*- coding: utf-8 -*- import json import os import sys import time # - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - # # CREDENTIALS # # - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -...
291
31.68
79
22
2,461
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_775f61b1e4d28e6d_e8249726", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 181, 64, 68 ]
[ null, null, null ]
[ 29, 15, 15 ]
[ 37, 28, 21 ]
2024-11-19T02:11:20.500204+00:00
1,365,119,198,000
1251682c8ba6a658d40cf77c92e467d8ffb63b56
2
{ "blob_id": "1251682c8ba6a658d40cf77c92e467d8ffb63b56", "branch_name": "refs/heads/master", "committer_date": 1365119198000, "content_id": "4d780466ea82f31de1db068a212c6850a440a0a2", "detected_licenses": [ "Apache-2.0" ], "directory_id": "87424412559338398bf3cef8976fb447d4e15fe6", "extension": "py"...
2.359375
stackv2
#!/usr/bin/env python -tt import base64 import hashlib import hmac import random import re import time import urllib2 import urlparse import string import OAuthSimpleException class OAuthSimple: _secrets = {} _parameters = {} _default_signature_method = "HMAC-SHA1" _action = "GET" _nonce_charact...
242
35.82
77
22
1,849
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_826bbede8dbb43e9_f28c8c79", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expen...
[ 241 ]
[ null ]
[ 33 ]
[ 41 ]
2024-11-19T02:11:24.652983+00:00
1,672,716,953,000
1845e53db42624d6ebb947c686465563e1d70a47
3
{ "blob_id": "1845e53db42624d6ebb947c686465563e1d70a47", "branch_name": "refs/heads/master", "committer_date": 1672716953000, "content_id": "8f1b8db52bc6255f2fdee25a508f12370a1e5d99", "detected_licenses": [ "MIT" ], "directory_id": "e505c675bdd22acc02e4167ec1b762b36d768a70", "extension": "py", "fi...
2.859375
stackv2
import os from urllib.parse import urlparse, urljoin import requests from flask import request, redirect, url_for from mongoengine import DoesNotExist def redirect_back(default='blog.index', **kwargs): """跳转到请求中指定的地址(或发送请求的页面) 尝试从当前请求的next查询参数以及Referer首部字段中获取要跳转的页面地址, 并对改地址进行安全性校验,next查询参数需要在发送请求时传入。 ...
65
27.74
110
12
634
python
[{"finding_id": "codeql_py/url-redirection_5298339d585e9b10_5b5cde35", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 21 ]
[ null ]
[ 29 ]
[ 35 ]
2024-11-19T02:11:30.283369+00:00
1,658,083,637,000
62d68754093a7cdec50bb1a7e582ea51c749ac06
2
{ "blob_id": "62d68754093a7cdec50bb1a7e582ea51c749ac06", "branch_name": "refs/heads/master", "committer_date": 1658083637000, "content_id": "b0ecafe241f17661d6ef0b8452056d8b39e47a67", "detected_licenses": [ "Apache-2.0" ], "directory_id": "da47b025b9250085d8dad72234732d897cd6500c", "extension": "py"...
2.421875
stackv2
# -*- coding: utf-8 -*- ''' Module to provide access to the power DNS http API :configuration: This module uses the pdnaspi python library parameters as well as configuration settings:: pdns.url: "http://192.168.10.65:8081" pdns.server_id: "localhost" pdns.api_key: "f5d2abcd" This dat...
231
25.41
153
12
1,551
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bc7fee0b798e35d2_562b37a0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 65, 74 ]
[ null, null ]
[ 15, 15 ]
[ 82, 70 ]
2024-11-19T02:11:41.102288+00:00
1,614,449,718,000
93be0c48f14c7af4621d3d457e7e0bb0b71169c3
2
{ "blob_id": "93be0c48f14c7af4621d3d457e7e0bb0b71169c3", "branch_name": "refs/heads/master", "committer_date": 1614449718000, "content_id": "189ac1a56e82775c7e68bb5e5436348a7076ac1c", "detected_licenses": [ "MIT" ], "directory_id": "306061d814148dc4423a669ddd5ed14ecf369d86", "extension": "py", "fi...
2.359375
stackv2
#!/usr/bin/env python3 import sys from pathlib import Path from datetime import date import tempfile import pprint import shutil import click import toolz.curried as _ import larc.common as __ import larc import pyperclip import dateutil.parser import jinja2 from ruamel.yaml.comments import CommentedMap log = larc.lo...
188
24.04
71
19
1,138
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_fc4ac87a191f438e_ff85f5ae", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 57 ]
[ 65 ]
[ 9 ]
[ 10 ]
2024-11-19T02:11:41.454829+00:00
1,632,150,499,000
c90c6ead40b897e92d12452365a6ce7566181818
3
{ "blob_id": "c90c6ead40b897e92d12452365a6ce7566181818", "branch_name": "refs/heads/master", "committer_date": 1632150499000, "content_id": "7b7fac4de9f234be032bc0b1765e5619bcdb438e", "detected_licenses": [ "MIT" ], "directory_id": "714b57307dc9e6b222f8e4716b60e942e1f1be97", "extension": "py", "fi...
2.53125
stackv2
from flask import render_template,redirect,url_for,flash,request from . import auth from ..models import User from .forms import RegistrationForm,LoginForm from .. import db from flask_login import login_user,logout_user,login_required from ..email import mail_message #View functions #Login route @auth.route('/login...
47
35.19
119
16
380
python
[{"finding_id": "codeql_py/url-redirection_18d1f660c67dbd43_c328932f", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 20 ]
[ null ]
[ 23 ]
[ 72 ]
2024-11-19T02:59:25.394027+00:00
1,575,454,367,000
642cc701e1bddbad85c66b33ca39d0039907b841
2
{ "blob_id": "642cc701e1bddbad85c66b33ca39d0039907b841", "branch_name": "refs/heads/master", "committer_date": 1575454367000, "content_id": "b20fa42d4da95488c2ba339a5ea16da9587b1efa", "detected_licenses": [ "MIT" ], "directory_id": "b3a7ef94f7b0d5eb8b7633a758d617147d41cd4d", "extension": "py", "fi...
2.5
stackv2
from flask import Flask, request app = Flask(__name__) def shutdown_server(): func = request.environ.get('werkzeug.server.shutdown') if func is None: raise RuntimeError('Not running with the Werkzeug Server') func() @app.route('/') def authorize(): print(request.args['...
22
22.32
74
10
106
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a497242cfc81d54d_41eb211a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 13 ]
[ null ]
[ 15 ]
[ 45 ]
2024-11-19T02:59:34.093949+00:00
1,582,620,092,000
841e5e73b6cedc0711cd900c5169aad4f9851e73
2
{ "blob_id": "841e5e73b6cedc0711cd900c5169aad4f9851e73", "branch_name": "refs/heads/master", "committer_date": 1582620092000, "content_id": "7a829b281763ed7b53f5e66c2e5385bda576342a", "detected_licenses": [ "MIT" ], "directory_id": "95698d7310c15733d284bdf75de96bffe2a03268", "extension": "py", "fi...
2.359375
stackv2
# -*- coding: utf-8 -*- from flask import Flask, request, Response import requests app = Flask(__name__) BASE_URL = "http://222.221.25.243:6166/" @app.before_request def before_request(): request_url = BASE_URL + request.url.split("/")[3] r = requests.get(request_url) headers = { "Access-Control-A...
19
26.79
73
12
140
python
[{"finding_id": "codeql_py/flask-debug_f71ebb524a788400_d2a2ad29", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-918" ]
[ "py/flask-debug", "py/partial-ssrf" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 19, 11 ]
[ null, null ]
[ 5, 9 ]
[ 35, 34 ]
2024-11-19T02:59:48.032588+00:00
1,518,728,592,000
6480bdfba37da80824031eca0d4d10666427c897
3
{ "blob_id": "6480bdfba37da80824031eca0d4d10666427c897", "branch_name": "refs/heads/master", "committer_date": 1518728592000, "content_id": "b402f06f1652b3c3e4979baf03c6275676778d16", "detected_licenses": [ "MIT" ], "directory_id": "a35b557a9cbbd9e2750c50aef6f992093bdba285", "extension": "py", "fi...
3.25
stackv2
import serial import time from flask import Flask app = Flask(__name__) BAUD_RATE = 9600 PORT = '/dev/ttyACM0' arduino = serial.Serial(PORT, BAUD_RATE) class Arm(): def __init__(self): self.servos = [0,0,0,0] def write(self): angles = self.servos msg ='' for ang...
37
20.54
63
14
229
python
[{"finding_id": "codeql_py/reflective-xss_d001536eb00c5b99_99318e87", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability d...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability due to a [user-provided value](2)." ]
[ 34 ]
[ null ]
[ 12 ]
[ 64 ]
2024-11-19T02:59:57.690773+00:00
1,470,816,164,000
b5f9ce2b66cdd079ec29437f2d40a99d77adf8a7
3
{ "blob_id": "b5f9ce2b66cdd079ec29437f2d40a99d77adf8a7", "branch_name": "refs/heads/master", "committer_date": 1470816164000, "content_id": "63d8fe056ee8ded729a13a95888ba881ce6459b7", "detected_licenses": [ "Apache-2.0" ], "directory_id": "b3f2ee8d6d335ea857702f98efc988e2d7673ef5", "extension": "py"...
2.828125
stackv2
import os import posixpath import urllib try: from cStringIO import StringIO except ImportError: from StringIO import StringIO from jinja2 import Environment, FileSystemLoader import cgi import sys THIS_DIR = os.path.dirname(os.path.abspath(__file__)) class Mixin: def translate_path(self, path): "...
88
32.49
81
17
638
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_7305a60da7a02c6f_4c83f051", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 52 ]
[ null ]
[ 18 ]
[ 82 ]
2024-11-19T03:12:10.367265+00:00
1,610,069,966,000
635895cb73dd8dcd2a36f58b0010bdd3bf8ceb6f
3
{ "blob_id": "635895cb73dd8dcd2a36f58b0010bdd3bf8ceb6f", "branch_name": "refs/heads/master", "committer_date": 1610069966000, "content_id": "0b67b654c9bbfe2d29659d5f297fa0c42ebb21bb", "detected_licenses": [ "MIT" ], "directory_id": "a02aee2ee8e898ae5d0846e4dd560acab8d786b3", "extension": "py", "fi...
2.515625
stackv2
#!/usr/bin/env python from openpyxl import load_workbook from pdb import set_trace as debug import re import os from bs4 import BeautifulSoup as bs4 import sys import logging as log import traceback os.chdir(os.path.dirname(os.path.abspath(sys.argv[0]))) log.basicConfig(filename='mailmerge.log',level=log.INFO) log.inf...
163
31.83
177
15
1,288
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_eb99c82a4ec9caad_09799d6a", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 147 ]
[ null ]
[ 16 ]
[ 38 ]
2024-11-19T03:12:12.263582+00:00
1,544,789,121,000
307bcc9ff4cc2dbf78b6c74bfb5e36a640468614
3
{ "blob_id": "307bcc9ff4cc2dbf78b6c74bfb5e36a640468614", "branch_name": "refs/heads/master", "committer_date": 1544789121000, "content_id": "b6ac16db0438001873c0adffe8df5f96cec72338", "detected_licenses": [ "MIT" ], "directory_id": "c8424bd1bf89fac5a654f78d062635f428fa798a", "extension": "py", "fi...
3.171875
stackv2
#!/usr/bin/env python3 from PIL import Image from Crypto.Cipher import AES from Crypto import Random from argparse import ArgumentParser def encrypt_image(image, key, iv=b''): image_array = bytes(image.tostring()) padding_length = AES.block_size - len(image_array) % AES.block_size image_array += bytes(pad...
42
37.57
170
13
369
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_9246d9e8dfe3f0db_f6449abd", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode CBC](1) is broken or weak, and should not be used.\n[The block mode ...
1
true
[ "CWE-327" ]
[ "py/weak-cryptographic-algorithm" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[The block mode CBC](1) is broken or weak, and should not be used.\n[The block mode ECB](2) is broken or weak, and should not be used." ]
[ 16 ]
[ null ]
[ 23 ]
[ 47 ]
2024-11-19T03:12:13.329755+00:00
1,638,275,154,000
1589caab3ef06681c7e40521c6e42c0db27adc7b
2
{ "blob_id": "1589caab3ef06681c7e40521c6e42c0db27adc7b", "branch_name": "refs/heads/master", "committer_date": 1638275154000, "content_id": "27025e7c4fd41155dc9bb818903bff3436acd5b4", "detected_licenses": [ "MIT" ], "directory_id": "e89bf0ff1f31b72ba7d7f03ca628896bb9a6627d", "extension": "py", "fi...
2.4375
stackv2
#! coding: utf-8 import json from json import JSONDecodeError from django.http import JsonResponse, HttpResponseBadRequest from django.views import View from django.views.decorators.csrf import csrf_exempt from series_tiempo_ar import TimeSeriesDataJson from series_tiempo_ar.validations import get_distribution_errors...
62
34.13
77
14
429
python
[{"finding_id": "codeql_py/stack-trace-exposure_232d77a25e29531a_2d838f1d", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 26 ]
[ null ]
[ 43 ]
[ 49 ]
2024-11-19T03:12:16.134853+00:00
1,451,115,394,000
cda5dc81d1311ff51bcece9fe4744a320c1ecd63
3
{ "blob_id": "cda5dc81d1311ff51bcece9fe4744a320c1ecd63", "branch_name": "refs/heads/master", "committer_date": 1451115394000, "content_id": "b3889c59f05fcdadc11fbd1b60a05124ea1bc2d0", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "7d4559bf78cd1215e16cf9127ae06336a808256d", "extension": "p...
2.546875
stackv2
import json from smartmemorizer.word.models import Word __author__ = 'jackyun' from flask import Blueprint, render_template, session, request from flask_login import login_required from smartmemorizer.extensions import login_manager from smartmemorizer.user.models import User import requests as r from bs4 import Beaut...
91
27.89
106
17
585
python
[{"finding_id": "codeql_py/partial-ssrf_2dedc16bafdafe29_9880e3ba", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 79 ]
[ null ]
[ 27 ]
[ 83 ]
2024-11-19T03:24:44.148457+00:00
1,692,952,916,000
d945d1dc1d8b94d0fbe12718068b0ffa3ea5ae0a
2
{ "blob_id": "d945d1dc1d8b94d0fbe12718068b0ffa3ea5ae0a", "branch_name": "refs/heads/master", "committer_date": 1692952916000, "content_id": "7c222838b1883e74b3650b3c07d7e02e2a842021", "detected_licenses": [ "MIT" ], "directory_id": "9ce891fdd998efea19f79dae4ce971f6e2d74528", "extension": "py", "fi...
2.328125
stackv2
import json from typing import Dict, List from actstream.feeds import ModelJSONActivityFeed from actstream.models import Action from cursor_pagination import CursorPaginator from django.contrib.auth import authenticate, login from django.http import HttpRequest, HttpResponse, HttpResponseForbidden from django.urls imp...
114
34.16
96
16
828
python
[{"finding_id": "codeql_py/stack-trace-exposure_2a6b83a16bcb8460_730d2933", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 107 ]
[ null ]
[ 42 ]
[ 43 ]
2024-11-19T03:24:44.640577+00:00
1,565,330,498,000
2fd87968f093879aafbf5a080166f3ee1ef62f66
3
{ "blob_id": "2fd87968f093879aafbf5a080166f3ee1ef62f66", "branch_name": "refs/heads/master", "committer_date": 1565330498000, "content_id": "daf9931ce21a978f44562bf8eaed2692b7b8fe91", "detected_licenses": [ "Apache-2.0" ], "directory_id": "3c95972abacdb1556a0df80eecebba2694492865", "extension": "py"...
2.546875
stackv2
#!/usr/bin/python # -*- coding: utf-8 -*- # Email: chenwx716@163.com # DateTime: 2016-12-27 23:15:32 __author__ = "chenwx" import paramiko class Myssh(object): """docstring for Myssh 执行一条命令 | 上传和下载文件/目录 """ def __init__( self, ip, user, passwd=None, keys=None,...
75
26.53
87
16
514
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_cafd6ffffc452d55_2102b290", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 29 ]
[ null ]
[ 9 ]
[ 71 ]
2024-11-19T01:26:55.652022+00:00
1,606,683,567,000
82859c69c6ba4379b50724c7bacd18dd7becd1c9
3
{ "blob_id": "82859c69c6ba4379b50724c7bacd18dd7becd1c9", "branch_name": "refs/heads/master", "committer_date": 1606683567000, "content_id": "cd20de4a7fccfa6e423b9ecc07a3550959a850a6", "detected_licenses": [ "MIT" ], "directory_id": "98fa3991640a6bd426ed0b8cd8ee830b26e32930", "extension": "py", "fi...
2.890625
stackv2
from django_date_extensions.fields import ApproximateDate from rest_framework import serializers class ApproximateDateSerializerField(serializers.Field): """ Date objects are serialized to an ApproximateDate object. """ def to_representation(self, value): return str(value) def to_internal...
31
28.55
67
14
212
python
[{"finding_id": "codeql_py/stack-trace-exposure_a45c7b7e36bd29d4_43e70002", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 31 ]
[ null ]
[ 47 ]
[ 50 ]
2024-11-19T01:37:33.738469+00:00
1,610,515,345,000
b56611f2f1b07e18accee31f502c224460440e95
4
{ "blob_id": "b56611f2f1b07e18accee31f502c224460440e95", "branch_name": "refs/heads/main", "committer_date": 1610515345000, "content_id": "2623ea35c2b47cbdcd40d05ab6f743c753107ec8", "detected_licenses": [ "MIT" ], "directory_id": "fc9555f80430b3c1038ff27912ef5f16491738e8", "extension": "py", "file...
4.1875
stackv2
#%% pythin_is_cool = True java_is_cool = False empty_list = [] secret_value = 3.14 print('Python and Java are both cool: {}'.format(pythin_is_cool and java_is_cool)) print('secret value and python is cool: {}'.format(secret_value and pythin_is_cool)) # %% statement = False if statement: print('statement is True')...
43
16.86
84
9
212
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_56b700e9c9f59832_f9a8e86f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 8 ]
[ null ]
[ 7 ]
[ 84 ]
2024-11-19T01:37:33.861801+00:00
1,670,512,794,000
aa0dde2fa582e2417da13299096c801968a6c935
3
{ "blob_id": "aa0dde2fa582e2417da13299096c801968a6c935", "branch_name": "refs/heads/master", "committer_date": 1670512794000, "content_id": "bb62b657bd28a3de08de096ff38585ac3a7c651d", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e5aa5e735d53967862f3cac9ae71640dc85fa498", "extension": "py"...
2.90625
stackv2
def merge(dbag, data): search(dbag, data['mac_address']) # A duplicate ip address wil clobber the old value # This seems desirable .... if "add" in data and data['add'] is False and "ipv4_adress" in data: if data['ipv4_adress'] in dbag: del (dbag[data['ipv4_adress']]) return ...
26
28
72
13
207
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4f9544ff0d7efd0a_e544452c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text." ]
[ 22 ]
[ null ]
[ 15 ]
[ 62 ]
2024-11-19T01:37:38.472559+00:00
1,562,953,121,000
4a9a263e558a3d1b5de363eaa2115aa03ab2e3b9
3
{ "blob_id": "4a9a263e558a3d1b5de363eaa2115aa03ab2e3b9", "branch_name": "refs/heads/master", "committer_date": 1562953121000, "content_id": "7f0aa7a6253f1ac9568e51a266e6f79743960320", "detected_licenses": [ "MIT" ], "directory_id": "893d0839b8558948a3dc7a5353493f783f769964", "extension": "py", "fi...
2.609375
stackv2
from tkinter import * import sqlite3 import hashlib root = Tk() root.title("Login") width = 400 height = 300 screen_width = root.winfo_screenwidth() screen_height = root.winfo_screenheight() x = (screen_width/2) - (width/2) y = (screen_height/2) - (height/2) root.geometry("%dx%d+%d+%d" % (width, height, x, y)) ro...
186
30.55
154
19
1,820
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_448e67a3e15a64fb_0817c972", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
3
true
[ "CWE-327", "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.", "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computational...
[ 52, 127, 170 ]
[ null, null, null ]
[ 23, 25, 27 ]
[ 52, 55, 57 ]
2024-11-19T01:37:56.614644+00:00
1,482,938,747,000
85a2d40f22f560fbf378b02f689afc1e69f647d2
3
{ "blob_id": "85a2d40f22f560fbf378b02f689afc1e69f647d2", "branch_name": "refs/heads/master", "committer_date": 1482938747000, "content_id": "7a9855979886ddfb74d4882de332d5662a8ce070", "detected_licenses": [ "MIT" ], "directory_id": "81dfc5e875ac18e531b0582399901eab4e555cdd", "extension": "py", "fi...
2.546875
stackv2
# coding: utf8 import logging import random import sys from jinja2 import Template from kalliope.core import OrderListener from kalliope.core import OrderAnalyser from kalliope.core.SynapseLauncher import SynapseLauncher from kalliope.core.Utils.Utils import Utils from kalliope.core.ConfigurationManager import Settin...
251
36.7
127
16
2,025
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_06dd3ee5f4134905_c5a9b8f1", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 167, 178 ]
[ null, null ]
[ 13, 13 ]
[ 40, 72 ]
2024-11-19T01:38:05.322711+00:00
1,496,483,916,000
6a13c2eb9e1295a8711c95b453a7a18e7f707c92
3
{ "blob_id": "6a13c2eb9e1295a8711c95b453a7a18e7f707c92", "branch_name": "refs/heads/master", "committer_date": 1496483916000, "content_id": "3dcb1d84cb101cb92d3287654098431c893ea15f", "detected_licenses": [ "MIT" ], "directory_id": "fc0cf151b2f5df4fe522de0c4bc9115d847f3cab", "extension": "py", "fi...
3.171875
stackv2
import base64 import hashlib from Crypto import Random from Crypto.Cipher import AES class AESCipher(object): """ Cryptage AES, Rijndael Peut utiliser n'importe quelle taille de donnees et taille de mot de passe grace au padding On manipule en octet pour garantir l'integrite des donnees Taille(s)...
65
35.18
105
18
670
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_7242c642074e98e2_e53d59b9", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
4
true
[ "CWE-327", "CWE-327", "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 46, 52, 58, 64 ]
[ null, null, null, null ]
[ 38, 28, 38, 28 ]
[ 57, 64, 57, 64 ]
2024-11-19T01:38:11.785707+00:00
1,415,740,638,000
59637d35afd656fbb0e30461e2e300fed2995855
2
{ "blob_id": "59637d35afd656fbb0e30461e2e300fed2995855", "branch_name": "refs/heads/master", "committer_date": 1415740638000, "content_id": "35bb83f1957bcf32e275454c6111b19a75cf5dd2", "detected_licenses": [ "MIT" ], "directory_id": "9858af300456cbd98cf2f3a4bd622f2499deeab6", "extension": "py", "fi...
2.40625
stackv2
#!/usr/bin/python ''' Adapted from simple mjpeg stream server (Igor Maculan - n3wtron@gmail.com) ''' from BaseHTTPServer import BaseHTTPRequestHandler, HTTPServer from lawsoncam import LawsonCamera import keyboard import SocketServer import os import sys import mimetypes sitedir = os.path.dirname(os.path.realpat...
108
27.76
143
17
697
python
[{"finding_id": "codeql_py/http-response-splitting_9db210323c948ef7_ea40381b", "tool_name": "codeql", "rule_id": "py/http-response-splitting", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This HTTP header is constructed from a [user-provided value](1).", "remediation": "", "lo...
2
true
[ "CWE-113", "CWE-022" ]
[ "py/http-response-splitting", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This HTTP header is constructed from a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 24, 86 ]
[ null, null ]
[ 42, 23 ]
[ 53, 42 ]
2024-11-19T01:38:11.827200+00:00
1,580,674,373,000
99f788f1b41c3d28896469288fc591b2f9694f04
4
{ "blob_id": "99f788f1b41c3d28896469288fc591b2f9694f04", "branch_name": "refs/heads/master", "committer_date": 1580674373000, "content_id": "4611bdea4a068cab811abbd598f6bcbb54833161", "detected_licenses": [ "MIT" ], "directory_id": "a0562f9d12f4ff527bb9112f512f1aa8fc45571a", "extension": "py", "fi...
3.5625
stackv2
import string import random def password(userInput): specialCharacter = [random.choice(string.punctuation) for character in range(userInput)] wordLower = [random.choice(string.ascii_lowercase) for lower in range(userInput)] wordUpper = [random.choice(string.ascii_uppercase) for upper in range(userInput)] ...
16
43
95
11
144
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8f2e1b479b67680d_73315060", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text." ]
[ 16 ]
[ null ]
[ 7 ]
[ 13 ]
2024-11-19T01:38:26.901753+00:00
1,676,139,610,000
69a2e540a3c6aa321a01db687a69a48363fda7b3
2
{ "blob_id": "69a2e540a3c6aa321a01db687a69a48363fda7b3", "branch_name": "refs/heads/master", "committer_date": 1676139610000, "content_id": "fd17e21b2673697f3e9d8215fbd85ff73749aa68", "detected_licenses": [ "MIT" ], "directory_id": "255e19ddc1bcde0d3d4fe70e01cec9bb724979c9", "extension": "py", "fi...
2.328125
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- """ Usage: dayone-to-b3.py [options] Options: -p, --path=<path> top directory of your blog. [default: .] """ from bucket3 import b3tools import plistlib import os from docopt import docopt import re import unidecode import shutil def slugify(str): # Credit: http:...
119
24.9
91
15
786
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_08763fdb6f3aae83_7b12accb", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.\nThis expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text." ]
[ 106 ]
[ null ]
[ 21 ]
[ 40 ]
2024-11-19T01:38:46.672337+00:00
1,511,999,316,000
8055fd2a86dfcec2976bd490ab869aa1ddde2ac8
3
{ "blob_id": "8055fd2a86dfcec2976bd490ab869aa1ddde2ac8", "branch_name": "refs/heads/master", "committer_date": 1511999316000, "content_id": "3d77379477ae721ca09f239f7f0257e2ccbd5ee9", "detected_licenses": [ "MIT" ], "directory_id": "235d1ba278f62e73d40eb61d3d7627ce332847b3", "extension": "py", "fi...
2.75
stackv2
import paramiko, os, time from paramiko_server import ParamikoServer from process import SingleCPUProcess known_localhosts = ['sacagawea', 'shackleton'] class OSDCProcess(SingleCPUProcess): def __init__(self, pid, logfile): super(OSDCProcess, self).__init__(logfile) self.pid = pid def is_runn...
123
47.26
144
23
1,240
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_57adfe6775ded588_626ad96c", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 70 ]
[ null ]
[ 13 ]
[ 73 ]
2024-11-19T01:39:03.036075+00:00
1,637,350,974,000
56028707a88a8d590a80ef9632af061f7f5ab615
2
{ "blob_id": "56028707a88a8d590a80ef9632af061f7f5ab615", "branch_name": "refs/heads/master", "committer_date": 1637350974000, "content_id": "f775c8066ca8f52d20722541d030deafa4f6ae13", "detected_licenses": [ "MIT" ], "directory_id": "dd7c7ad89512ce333c8abb1140a980ce649966ef", "extension": "py", "fi...
2.453125
stackv2
#!/usr/bin/python3 import subprocess import cgi print("content-type: text/html") print() mydata = cgi.FieldStorage() myx = mydata.getvalue("c") myy = mydata.getvalue("d") if myx == str(1): output = subprocess.getoutput("sudo date") print(output) elif myx == str(2): output = subprocess.getoutput("sudo cal...
46
24.65
68
11
304
python
[{"finding_id": "codeql_py/command-line-injection_6b20b9476985bacc_eac59379", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {...
1
true
[ "CWE-078" ]
[ "py/command-line-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This command line depends on a [user-provided value](1)." ]
[ 45 ]
[ null ]
[ 35 ]
[ 48 ]
2024-11-19T01:52:11.775880+00:00
1,636,420,316,000
5f5d21ff8bafa7e47ebba69ce89dcf81fea400fa
2
{ "blob_id": "5f5d21ff8bafa7e47ebba69ce89dcf81fea400fa", "branch_name": "refs/heads/master", "committer_date": 1636420316000, "content_id": "f65dc650cb5cf27c84c10b0e1f00a86af27845a4", "detected_licenses": [ "MIT" ], "directory_id": "026b5d36a9ea7ce0f75421af5bc840a83022cb54", "extension": "py", "fi...
2.359375
stackv2
"""Log out handler (``/logout``).""" from __future__ import annotations from typing import Optional from fastapi import APIRouter, Depends, status from fastapi.responses import RedirectResponse from gafaelfawr.dependencies.context import RequestContext, context_dependency from gafaelfawr.dependencies.return_url imp...
48
30.71
78
12
325
python
[{"finding_id": "codeql_py/url-redirection_20999139c1b5055c_c6b047df", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 48 ]
[ null ]
[ 29 ]
[ 39 ]
2024-11-19T01:52:15.746904+00:00
1,535,029,765,000
f0a688c71bdc701c9669041ddca18767dc36b028
2
{ "blob_id": "f0a688c71bdc701c9669041ddca18767dc36b028", "branch_name": "refs/heads/master", "committer_date": 1535029765000, "content_id": "9d48c99675a0b0736fa9f35616c5c4e3e87257c0", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "1843fd5ccb4377240e664acd21ba5a9369eca2ab", "extension": "p...
2.328125
stackv2
import re import logging from rest_framework import generics from rest_framework import response from rest_framework import status from bluebottle.payments_logger.models import PaymentLogLevels, PaymentLogEntry logger = logging.getLogger(__name__) # TODO: limit status change notifications to docdata IPs class Generi...
54
41.67
109
17
468
python
[{"finding_id": "codeql_py/log-injection_4ead937853c074d9_03c4f51c", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 30 ]
[ 31 ]
[ 21 ]
[ 34 ]
2024-11-19T02:04:25.416448+00:00
1,571,747,860,000
8b4c149989f520e95a86dad46f2e70e82197509f
3
{ "blob_id": "8b4c149989f520e95a86dad46f2e70e82197509f", "branch_name": "refs/heads/master", "committer_date": 1571747860000, "content_id": "d1c0c2cf5348495c3bdcf64e8f64ab4804514c0b", "detected_licenses": [ "MIT" ], "directory_id": "35b5f9f5f17cb4fae997d83a05d402a4e0ef8efc", "extension": "py", "fi...
2.953125
stackv2
# coding:utf8 # -*- coding: UTF-8 -*- # from Crypto. # # (public_key, private_key) = rsa.newkeys(1024) # print(chr(10)+"公钥:") # print(public_key.save_pkcs1()) # print(chr(10)+"公钥:") # print(public_key.save_pkcs1()) from Crypto.PublicKey import RSA from Crypto import Random from Crypto.Cipher import PKCS1_v1_5 as PKCS...
95
22.57
82
15
676
python
[{"finding_id": "codeql_py/weak-crypto-key_5e098030ad280611_a948e771", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",...
1
true
[ "CWE-326" ]
[ "py/weak-crypto-key" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable." ]
[ 25 ]
[ null ]
[ 11 ]
[ 47 ]
2024-11-19T02:04:30.002257+00:00
1,600,753,561,000
b4bfa826051c9096c111df25eafc7ea9327b449f
2
{ "blob_id": "b4bfa826051c9096c111df25eafc7ea9327b449f", "branch_name": "refs/heads/master", "committer_date": 1600753561000, "content_id": "8235e88e7a6ed3738f1d1bd85971a1b72e0919dd", "detected_licenses": [ "MIT" ], "directory_id": "3224d39151fcea2a70df2ecb7b506545da885db0", "extension": "py", "fi...
2.359375
stackv2
from flask import Flask, request import json import requests from flask_sqlalchemy import SQLAlchemy import os import praw app = Flask(__name__) app.config['SQLALCHEMY_DATABASE_URI'] = os.environ['DATABASE_URL'] db = SQLAlchemy(app) reddit = praw.Reddit(client_id='*******', client_secret='********...
219
35.53
157
23
1,595
python
[{"finding_id": "codeql_py/reflective-xss_1995a3bb88897821_a81d8d54", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 45 ]
[ null ]
[ 16 ]
[ 53 ]
2024-11-19T02:04:54.796522+00:00
1,502,028,161,000
fa45b064f6cf37bf868a13b91ea6254041836dec
3
{ "blob_id": "fa45b064f6cf37bf868a13b91ea6254041836dec", "branch_name": "refs/heads/master", "committer_date": 1502028161000, "content_id": "1173e393d5e26688cf1d522305bd0bd069c0db79", "detected_licenses": [ "MIT" ], "directory_id": "0da9c7045daf3ee6591ca3ac3b8e0c27c7f2c884", "extension": "py", "fi...
2.796875
stackv2
from flask import Flask, url_for, request, render_template app = Flask(__name__) TODOS = { 'todo1': {'task': 'build an API'}, 'todo2': {'task': '?????'}, 'todo3': {'task': 'profit!'}, } @app.route('/') def index(): return 'Index Page' @app.route('/hello') def hello_world(): return 'hello, wor...
51
21.67
75
14
284
python
[{"finding_id": "codeql_py/reflective-xss_939afe6416803f49_31f982ed", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 39, 44 ]
[ null, null ]
[ 12, 12 ]
[ 32, 31 ]
2024-11-19T02:04:55.780995+00:00
1,634,919,988,000
689b0a14f2e56add5b95a4ecc23a21a00020739a
2
{ "blob_id": "689b0a14f2e56add5b95a4ecc23a21a00020739a", "branch_name": "refs/heads/main", "committer_date": 1634919988000, "content_id": "649744ab49b44c1f562d2650c2c8d57fc2e7e58b", "detected_licenses": [ "MIT" ], "directory_id": "c73165911c1e9f62178376ae1e860f42bdaf74f6", "extension": "py", "file...
2.46875
stackv2
# -*- coding:utf-8 -*- from rest_framework import serializers from cmdb.models import Model, Field, Value from cmdb.tools.field import validate_field_value class ValueModelSerializer(serializers.ModelSerializer): """ 模型实例值 Model Serializer """ model = serializers.SlugRelatedField(slug_field='code', q...
57
33.51
105
17
446
python
[{"finding_id": "codeql_py/stack-trace-exposure_5c638cfdc9f1c284_d385bde2", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 29 ]
[ null ]
[ 47 ]
[ 66 ]
2024-11-19T02:28:06.556969+00:00
1,548,858,528,000
2a296839a5538ba27f6b2c4b8c61d9265eac9edb
3
{ "blob_id": "2a296839a5538ba27f6b2c4b8c61d9265eac9edb", "branch_name": "refs/heads/master", "committer_date": 1548858528000, "content_id": "2beb1a3226aaea2f335f070d065054124b98ad02", "detected_licenses": [ "MIT" ], "directory_id": "bb92a6655e286e16ef444275d5c198e61c589796", "extension": "py", "fi...
2.59375
stackv2
from app import db from app.models import User from wtforms.validators import HostnameValidation, ValidationError import re class ExistsInDb(object): def __init__(self, query, message=None): self.message = message self.query = query def __call__(self, form, field): if not field.data: ...
88
29.92
93
19
629
python
[{"finding_id": "codeql_py/redos_9ed35353b63fbb8e_3876b388", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '\"' and containing many repetitio...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '\"' and containing many repetitions of '\\\\013'." ]
[ 61 ]
[ null ]
[ 14 ]
[ 89 ]
2024-11-19T02:28:22.143883+00:00
1,600,962,245,000
80c34f1e39cc6d9fe18d892e3bdf3c908a0a712b
3
{ "blob_id": "80c34f1e39cc6d9fe18d892e3bdf3c908a0a712b", "branch_name": "refs/heads/master", "committer_date": 1600962245000, "content_id": "f5c1be3152b562abfd0d1101a75d5624b3595a4a", "detected_licenses": [ "Apache-2.0" ], "directory_id": "81d86085466a07b214599d682703de27271a0a96", "extension": "py"...
3.0625
stackv2
#!/usr/bin/python import argparse, os #Define list which we'll use to write to file output = [] listgroupmembers = [] listUserDetails = [] try: #Get file to parse from the command line parser = argparse.ArgumentParser() parser.add_argument("--spnfile", help="list of cracked spns to parse") #Add option to be able...
110
31.09
117
25
926
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_988d03bed89fb48a_697220f6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 84 ]
[ null ]
[ 10 ]
[ 12 ]
2024-11-19T02:28:27.184563+00:00
1,555,244,625,000
95e58bd162a6bbe846359e914a3eb7d78dd6a8b5
3
{ "blob_id": "95e58bd162a6bbe846359e914a3eb7d78dd6a8b5", "branch_name": "refs/heads/master", "committer_date": 1555244625000, "content_id": "b54f72a3bf262bbce986bc1a2317d0fee9d638fb", "detected_licenses": [ "MIT" ], "directory_id": "5f4e74dea049171e49c3ea26029db4d9c9d210d3", "extension": "py", "fi...
2.734375
stackv2
#!/usr/bin/env python # encoding=utf8 import requests import time import sys import re import shutil import hashlib import multiprocessing as mp import subprocess as sp def download_ipdb(url, path): response = requests.get(url, verify=False) etag_value = response.headers.get("ETag") current_time = time.s...
105
27.37
117
13
806
python
[{"finding_id": "codeql_py/request-without-cert-validation_27846d1249bcdfcb_50443249", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 15 ]
[ null ]
[ 16 ]
[ 47 ]
2024-11-19T02:28:34.059965+00:00
1,615,294,948,000
d03c8e2ec8b3c6c2c2fffc91da20cb1a46524d09
3
{ "blob_id": "d03c8e2ec8b3c6c2c2fffc91da20cb1a46524d09", "branch_name": "refs/heads/main", "committer_date": 1615294948000, "content_id": "d7d6a8a1fa70c67d2c56354349937c584ce10f88", "detected_licenses": [ "MIT" ], "directory_id": "f19d3d25201321731bbc2c5c8f10e5b11504497d", "extension": "py", "file...
2.703125
stackv2
import pymysql from flask import Flask, g, make_response, jsonify, request, redirect app = Flask(__name__) MYSQL_SETTINGS = { 'host': '81.70.46.54', 'user': 'root', 'password': 'root', 'database': 'flaskDemo', 'charset': 'utf8', 'port': 3306 } @app.before_request def first_request(): # 连...
84
26.95
133
14
660
python
[{"finding_id": "codeql_py/sql-injection_40a236c3612a410d_e83bc66e", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown...
1
true
[ "CWE-089" ]
[ "py/sql-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This SQL query depends on a [user-provided value](1)." ]
[ 73 ]
[ null ]
[ 17 ]
[ 20 ]
2024-11-19T02:28:51.762129+00:00
1,691,917,754,000
e2ef1c75776b9f7834b302970bf7a9a19d4286af
2
{ "blob_id": "e2ef1c75776b9f7834b302970bf7a9a19d4286af", "branch_name": "refs/heads/master", "committer_date": 1691917754000, "content_id": "2cc9f28845843e88370aad12e0d801d001324901", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "430e0675c6c12a45fde01e8ae1d558db62963ff9", "extension": "p...
2.359375
stackv2
import re,sys,os from os import listdir import thread newsUrlRegex='http://timesofindia.indiatimes.com/[^<]*/articleshow/\d+.cms' if len(sys.argv)<2: print 'Please provide toi html files directory' sys.exit(1) mypath=sys.argv[1] print 'Finding news urls...' onlyfiles = [ os.path.join(mypath,f) for f in listdir(myp...
25
27.52
75
16
210
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_754528ee5e0c49d4_14633324", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This string, which is used as a regular expression [here](1), has an unescaped '.' befor...
1
true
[ "CWE-020" ]
[ "py/incomplete-hostname-regexp" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This string, which is used as a regular expression [here](1), has an unescaped '.' before 'indiatimes.com/', so it might match more hosts than expected." ]
[ 5 ]
[ null ]
[ 15 ]
[ 75 ]
2024-11-19T02:37:03.883560+00:00
1,601,236,072,000
1c95d3bf196a4639d3a8d252c8801a301528046b
4
{ "blob_id": "1c95d3bf196a4639d3a8d252c8801a301528046b", "branch_name": "refs/heads/master", "committer_date": 1601236105000, "content_id": "7c72135f15173d26f8033ebe95aecb10632a000d", "detected_licenses": [ "MIT" ], "directory_id": "56a64c8fbd031b9c45117c5ca3169cff2a9927ca", "extension": "py", "fi...
3.859375
stackv2
class MyList(list): def __getitem__(self, index): if index == 0: raise ValueError("Invalid index") index = index - 1 return list.__getitem__(self, index) def __setitem__(self, index, val): if index == 0: raise ValueError("Invalid index") index = i...
51
26.29
78
12
406
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0a366470fb2c31e2_7205eda1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 44, 48 ]
[ null, null ]
[ 7, 7 ]
[ 12, 12 ]
2024-11-19T02:37:15.774086+00:00
1,566,391,511,000
9814496d6a06e2faf70b237595e9c5486a75b2ad
2
{ "blob_id": "9814496d6a06e2faf70b237595e9c5486a75b2ad", "branch_name": "refs/heads/master", "committer_date": 1566391511000, "content_id": "135150f60b92b35b83a86d6c4ee5bfaa87dc991a", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "e80ebd0a68675236090de4294744594d5591e639", "extension": "p...
2.421875
stackv2
import base64 from Crypto.Cipher import PKCS1_v1_5 from Crypto.PublicKey import RSA import gatlin.config.configLocation as loc PRIVATE_KEY = 0 PUBLIC_KEY = 0 # 废弃,用于生成RSA密钥对 def create_rsa_key(): key = RSA.generate(1024) encrypted_key = key.exportKey(pkcs=8, protection="scryptAndAES128-CBC") # encrypte...
54
26.39
84
13
455
python
[{"finding_id": "codeql_py/weak-crypto-key_8870b3485eefcd73_dcfb39ee", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",...
1
true
[ "CWE-326" ]
[ "py/weak-crypto-key" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable." ]
[ 14 ]
[ null ]
[ 11 ]
[ 29 ]
2024-11-19T02:37:19.178779+00:00
1,476,684,279,000
b3151c8a237141f433bc53599be887f913d5f785
2
{ "blob_id": "b3151c8a237141f433bc53599be887f913d5f785", "branch_name": "refs/heads/master", "committer_date": 1476684279000, "content_id": "30fe0d0811b23fe5d9e27a54b2303d96351b11b9", "detected_licenses": [ "Apache-2.0" ], "directory_id": "a6cd85c3e33f6b19a92cf03f0c198f7bcf0ef7b1", "extension": "py"...
2.421875
stackv2
#!/usr/bin/env python # Name: utils.py # Time:8/19/16 3:38 PM # Author:luo1fly import time, hashlib, json, datetime from hosts import models as hosts_models from django.shortcuts import render, HttpResponse from AntiMagic import settings from django.core.exceptions import ObjectDoesNotExist import redis # import custo...
91
32.32
97
22
699
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_ce4afb739384604d_b88dd46b", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (id)](2) is used in a hashing algorithm (MD5) that is insecure." ]
[ 31 ]
[ null ]
[ 16 ]
[ 43 ]
2024-11-19T02:37:23.816150+00:00
1,566,726,046,000
e830b51b20ad06a167219927543ccba48eac25f2
3
{ "blob_id": "e830b51b20ad06a167219927543ccba48eac25f2", "branch_name": "refs/heads/master", "committer_date": 1566726046000, "content_id": "30a8d339ec3b37c6a193f54f95b1888a50ca6839", "detected_licenses": [ "Apache-2.0" ], "directory_id": "12e4f33887ade554ea7841174b288bec56ff7d59", "extension": "py"...
3.265625
stackv2
# Stdlib imports try: import urlparse except ImportError: import urllib.parse as urlparse def weather_is_twitter_link(link): """ Example: https://twitter.com/bomalkevych/status/1074683558084706305 returns weather link is Twitter link to status :param link: (str) :return: (Boolean) """...
48
20.1
71
13
259
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_7db74166a2c5db35_0fc9df1a", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [twitter.com/](1) may be at an arbitrary position in th...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [twitter.com/](1) may be at an arbitrary position in the sanitized URL." ]
[ 17 ]
[ null ]
[ 12 ]
[ 34 ]
2024-11-19T02:37:43.383172+00:00
1,481,602,084,000
b37dc6d47a41bf339224078b89b4f27845f3c44e
3
{ "blob_id": "b37dc6d47a41bf339224078b89b4f27845f3c44e", "branch_name": "refs/heads/master", "committer_date": 1481602084000, "content_id": "22030e6ae21cdbc2aba6d82e68ef0b43db76398e", "detected_licenses": [ "MIT" ], "directory_id": "d96fcfe30ca6bea2ca950343852369599b2bfa7f", "extension": "py", "fi...
2.765625
stackv2
#!/usr/bin/env python import os import sys import youtube_dl import requests import shutil import urllib import json from bs4 import BeautifulSoup from Tkinter import Tk from tkFileDialog import askopenfilename Tk().withdraw() yt_fmt = u"%(title)s-%(id)s.%(ext)s" def yt_search(query): query = urllib.quote(quer...
173
32.52
158
25
1,169
python
[{"finding_id": "codeql_py/overly-permissive-file_fce22c88a7bd19cc_e0f2b010", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable." ]
[ 152 ]
[ null ]
[ 17 ]
[ 59 ]
2024-11-19T02:49:15.658208+00:00
1,622,189,348,000
033fa36eb36f57a5bdc19f492d6b6e62ce4da0d4
2
{ "blob_id": "033fa36eb36f57a5bdc19f492d6b6e62ce4da0d4", "branch_name": "refs/heads/master", "committer_date": 1622189348000, "content_id": "075b5d53b28240ab4f0dcc3a8ab455d1a99222a1", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "19542506a2bd4594c712064314444e94d1ad48cf", "extension": "p...
2.484375
stackv2
import functools import time import traceback as tb from abc import abstractmethod from fastapi.responses import ORJSONResponse from Utils.Exceptions import DAGAbortException, CustomException class InterfaceResult: def __init__(self, _mock_result): self.interface_result = _mock_result self.start...
84
27.67
73
17
516
python
[{"finding_id": "codeql_py/stack-trace-exposure_b34fd059286bc630_77d7be4a", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 49 ]
[ 54 ]
[ 31 ]
[ 10 ]
2024-11-19T02:49:22.855816+00:00
1,575,900,635,000
e1fa38629cd7031f9ac6c9f3f574b6b86385c35a
3
{ "blob_id": "e1fa38629cd7031f9ac6c9f3f574b6b86385c35a", "branch_name": "refs/heads/master", "committer_date": 1575900635000, "content_id": "a48e5d2c29f073c006e99e4654215ac64fef4901", "detected_licenses": [ "MIT" ], "directory_id": "878279e33352576fa16ae9956b1092ea214c753e", "extension": "py", "fi...
3.1875
stackv2
import pandas as pd import os import re # fonte das funções dms2dd e parse_dms: https://en.proft.me/2015/09/20/converting-latitude-and-longitude-decimal-values-p/ def dms2dd(degrees, minutes, seconds, direction): dd = float(degrees) + float(minutes)/60 + float(seconds)/(60*60); if direction == 'S' or direction...
101
32.77
122
17
1,003
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6fbce38453f9bffa_a3a16dfa", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 81, 81 ]
[ null, null ]
[ 11, 16 ]
[ 14, 19 ]
2024-11-19T03:00:08.666195+00:00
1,537,026,353,000
ed675934c35161fbf08c4b15f661a0f95175e3f6
2
{ "blob_id": "ed675934c35161fbf08c4b15f661a0f95175e3f6", "branch_name": "refs/heads/master", "committer_date": 1537026353000, "content_id": "c3479363b5c8c21f1e5dfe5f4d476e888ca2094e", "detected_licenses": [ "MIT" ], "directory_id": "02c16e1e6c7985779a6cf0726d34584026b8b8d6", "extension": "py", "fi...
2.5
stackv2
# -*- coding: utf-8 -*- """ Module Docstring """ from subprocess import Popen, PIPE import requests import os from datetime import datetime import base64 __author__ = "Sean Douglas" __version__ = "0.1.0" __license__ = "MIT" class EspeakToMe: def __init__(self, espeak_path: str=None, word_gap: int=10, wpm: int=1...
80
38.96
148
17
816
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_4a95aa6737319d70_c6b0b40d", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text." ]
[ 75 ]
[ null ]
[ 21 ]
[ 22 ]
2024-11-19T03:00:29.073922+00:00
1,521,583,841,000
12b6b273b92ac57cd29e2ac5f2d3d9c53dffae28
2
{ "blob_id": "12b6b273b92ac57cd29e2ac5f2d3d9c53dffae28", "branch_name": "refs/heads/master", "committer_date": 1521583841000, "content_id": "575c988d24ea277a48c424ba4bb052c27fd07995", "detected_licenses": [ "MIT" ], "directory_id": "2aeb02fc9ad9cd053e30481027731e76bc015beb", "extension": "py", "fi...
2.40625
stackv2
from io import open import urllib2 from bs4 import BeautifulSoup import re import urlparse import time import numpy as np class Get(object): def __init__(self): self.tag = set() self.links = set() def iniPar(self, url) : # proxies = {'http':'http://10.10.10.10:8765','h...
78
48.42
160
21
943
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_e7289a30ccbb13a5_bd5bcf44", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'douban.com/subject', so it might ma...
1
true
[ "CWE-020" ]
[ "py/incomplete-hostname-regexp" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'douban.com/subject', so it might match more hosts than expected." ]
[ 54 ]
[ null ]
[ 99 ]
[ 138 ]
2024-11-19T03:11:21.123469+00:00
1,601,574,273,000
347135aefffbfb1fb86da204ab618fe48da452c1
3
{ "blob_id": "347135aefffbfb1fb86da204ab618fe48da452c1", "branch_name": "refs/heads/main", "committer_date": 1601574273000, "content_id": "aecb8da6f5c7361ee9d4918a0be6b89d764dd740", "detected_licenses": [ "Apache-2.0" ], "directory_id": "470c67e99ef67b27a653ff6f80b458992a3e2a35", "extension": "py", ...
2.65625
stackv2
#!/usr/bin/env python3 import os, re, pyyoutube, jinja2, urllib.request, requests, json from jinja2 import Template API_KEY = os.environ["API_KEY"] EPISODES_PATH = os.environ["EPISODES_PATH"] IMAGES_REL_PATH = os.environ["IMAGES_REL_PATH"] IMG_PATH_PREFIX = os.environ["IMG_PATH_PREFIX"] PLAYLIST_ID = os.environ["PLAY...
86
35.71
103
20
736
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_decfcd58e703ff51_87265c8f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
3
true
[ "CWE-312", "CWE-312", "CWE-079" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/jinja2/autoescape-false" ]
[ "HIGH", "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 62, 64, 69 ]
[ null, null, null ]
[ 19, 19, 19 ]
[ 63, 83, 60 ]
2024-11-19T03:11:25.902616+00:00
1,557,915,337,000
748257a06d261fe0e13fad4aab649b90c6ce6c1e
4
{ "blob_id": "748257a06d261fe0e13fad4aab649b90c6ce6c1e", "branch_name": "refs/heads/master", "committer_date": 1557915337000, "content_id": "30b9e60149c9b5584d6bed6e04551c63b6d04749", "detected_licenses": [ "Apache-2.0" ], "directory_id": "95ed2db830126aa61d318c036654bb20ac8f49f9", "extension": "py"...
4.125
stackv2
""" Author: shikechen Function: def password class Version: 5.0 Date: 2019/2/7 """ class PasswordTool: def __init__(self, password): self.password = password self.strength_level = 0 def process_password(self): # Rule 1: length >= 8 if len(self.password) >= 8: ...
96
22.47
85
13
509
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_7254d6bca0cab62e_88ad8fe3", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 80 ]
[ null ]
[ 17 ]
[ 85 ]
2024-11-19T03:11:32.502258+00:00
1,576,133,118,000
9c79d4fe6150ee4b4878ff4a472a3a8e89247872
3
{ "blob_id": "9c79d4fe6150ee4b4878ff4a472a3a8e89247872", "branch_name": "refs/heads/master", "committer_date": 1576133118000, "content_id": "ac0fcac11b58667fcb0c58eb74587b1ecb335628", "detected_licenses": [ "MIT" ], "directory_id": "99972ea975b7f0fc4ec08d49b67519fe9424a5cf", "extension": "py", "fi...
2.75
stackv2
from http.server import HTTPServer, BaseHTTPRequestHandler import csv class Serv(BaseHTTPRequestHandler): def do_GET(self): if self.path == '/': self.path = '/index.html' try: file_to_open = open(self.path[1:]).read() self.send_response(200) except: ...
24
26.79
58
16
162
python
[{"finding_id": "codeql_py/path-injection_4bf6583c36cc94cb_444e01a2", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 10 ]
[ null ]
[ 33 ]
[ 46 ]
2024-11-19T03:11:37.337147+00:00
1,684,499,106,000
126aa439e2ab5756cc901c1ccec30d3bb7b3f933
2
{ "blob_id": "126aa439e2ab5756cc901c1ccec30d3bb7b3f933", "branch_name": "refs/heads/master", "committer_date": 1684499106000, "content_id": "dddbc0d853fd5a3ef9a6e261c85dd508c4ac85d7", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "fb11da0311a0c0813904522eb33391b03c1cb1d8", "extension": "p...
2.484375
stackv2
import os from typing import Union from jinja2 import Environment, FileSystemLoader from .apptemplate import TemplateFile from .utils import chdir if False: # pragma: nocover from .appmaker import AppMaker class ContextMutator: """Mutator applying additional transformations to template get_context.""" ...
143
27.27
101
18
812
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_199b68aca24156d9_fa675762", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 61 ]
[ 65 ]
[ 20 ]
[ 10 ]
2024-11-19T03:11:39.574298+00:00
1,623,084,971,000
1f01b53a03a473e06ec69adf5839847f10a119db
3
{ "blob_id": "1f01b53a03a473e06ec69adf5839847f10a119db", "branch_name": "refs/heads/main", "committer_date": 1623084971000, "content_id": "41dcae898a85f7b96ddcc8412a785f1bae5d178d", "detected_licenses": [ "Apache-2.0" ], "directory_id": "844c7f8fb8d6bfab912583c71b93695167c59764", "extension": "py", ...
2.9375
stackv2
import datetime import configparser import cx_Oracle import csv config = configparser.ConfigParser() try: print('Lendo arquivo de configuracao...') with open('conf/config.ini') as f: config.read_file(f) user = config['oracle']['user'] passwd = config['oracle']['password'] db = config['o...
79
29.04
104
19
529
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_36b28eb064f78583_bcc539ce", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 21 ]
[ null ]
[ 11 ]
[ 32 ]
2024-11-19T03:11:58.890008+00:00
1,526,672,900,000
a33e3b570bdab0a3d339783152df4f4f6b46fe57
3
{ "blob_id": "a33e3b570bdab0a3d339783152df4f4f6b46fe57", "branch_name": "refs/heads/master", "committer_date": 1526672900000, "content_id": "d6e7ee9746c52b4077d200ce8624fa3c66a47fca", "detected_licenses": [ "MIT" ], "directory_id": "88eb13ed46237fc57ad1cc4d028f5f0cfe417119", "extension": "py", "fi...
2.84375
stackv2
#! /usr/bin/python # -*- coding: utf-8 -*- """ Program <meteobike.py> to read and record GPS data, air temperature and humidity using Adafruit's Ultimate GPS and Pimoroni's DHT22 temperature sensor while riding on a bike. University of Freiburg Environmental Meteology Version 1.1 Written by Heinz Christen Mar 2018 Mod...
197
36.48
125
18
2,169
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_c725364d465ba7be_d5f9269f", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](1) as clear text.", "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](1) as clear text." ]
[ 132, 133 ]
[ null, null ]
[ 15, 15 ]
[ 49, 50 ]
2024-11-19T03:12:06.435409+00:00
1,610,832,336,000
3a77740f1e018dc93da7a56325d909aeceec76ed
2
{ "blob_id": "3a77740f1e018dc93da7a56325d909aeceec76ed", "branch_name": "refs/heads/main", "committer_date": 1610832336000, "content_id": "ab5ecf92861abca32d4f4aaa0917601b8d31ce1a", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "100f86b4a9f9032ceefa4b6b12fbef343b9c491f", "extension": "py"...
2.421875
stackv2
import functools from flask import Blueprint from flask import flash from flask import g from flask import make_response from flask import redirect from flask import render_template from flask import request from flask import session from flask import url_for from werkzeug.exceptions import abort from flaskr import d...
163
28.4
126
19
999
python
[{"finding_id": "codeql_py/cookie-injection_a05498c2aeef6c81_643e32e1", "tool_name": "codeql", "rule_id": "py/cookie-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cookie is constructed from a [user-supplied input](1).", "remediation": "", "location": {"file_path": "...
1
true
[ "CWE-020" ]
[ "py/cookie-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cookie is constructed from a [user-supplied input](1)." ]
[ 160 ]
[ null ]
[ 47 ]
[ 54 ]
2024-11-19T03:12:11.617457+00:00
1,502,576,150,000
fa53802dda30c249db120e21af2bb2c0b68e06c4
3
{ "blob_id": "fa53802dda30c249db120e21af2bb2c0b68e06c4", "branch_name": "refs/heads/master", "committer_date": 1502576150000, "content_id": "617a1eeaf48928b43ed6c4528d25e9ada3a362e3", "detected_licenses": [ "MIT" ], "directory_id": "cb27ec8e7338a09be5c3dd8098d0fb8e4d49faaa", "extension": "py", "fi...
3.046875
stackv2
import coordinates import requests import datetime def get_weather(): #if coordinates.get_coordinates() in coordinates: lat,lng=(coordinates.get_coordinates()) api_key="e0a60102f41a97b05ea6fe58b5b5fbd0" host="https://api.darksky.net/forecast/" url=host+api_key+"/"+str(lat)+","+str(ln...
32
30.25
60
13
240
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_71b50b95e4fb4fec_2b28c06b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 22, 25, 32 ]
[ null, null, null ]
[ 31, 35, 15 ]
[ 46, 47, 52 ]
2024-11-19T03:12:14.995560+00:00
1,692,879,666,000
01c430ef18f23140c7cf2909e0f4eebc7d32f603
2
{ "blob_id": "01c430ef18f23140c7cf2909e0f4eebc7d32f603", "branch_name": "refs/heads/master", "committer_date": 1692879666000, "content_id": "e9b9187d1ff6cd1751be2670385e886693375e2d", "detected_licenses": [ "Apache-2.0" ], "directory_id": "0db2472a86d52fba6a7219490dd171d44f44c197", "extension": "py"...
2.328125
stackv2
# -*- coding: utf-8 -*- from futu.common import bytes_utf8, IS_PY2 from futu.common.utils import * from futu.common.constant import * from futu.common.sys_config import SysConfig from Crypto.Cipher import AES from futu.common.constant import * import struct def add_pkcs7_padding(data): padding_len = 16 - len(dat...
151
30.74
68
18
1,292
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_8a6d93dc7fbd8fe7_76fb1243", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode CBC](1) is broken or weak, and should not be used.\n[The block mode ...
5
true
[ "CWE-327", "CWE-327", "CWE-327", "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[The block mode CBC](1) is broken or weak, and should not be used.\n[The block mode ECB](2) is broken or weak, and should not be used.\n[The block mode CBC](3) is broken or weak, and should not be used.\n[The block mode ECB](4) is broken or weak, and should not be used.", "[The block mode CBC](1) is broken or we...
[ 98, 108, 131, 133, 142 ]
[ null, null, null, null, null ]
[ 20, 32, 27, 27, 23 ]
[ 45, 57, 62, 57, 48 ]
2024-11-19T03:12:17.965251+00:00
1,649,902,751,000
321aebe75a78aeac3338f6e3fa425f92930c1ba2
2
{ "blob_id": "321aebe75a78aeac3338f6e3fa425f92930c1ba2", "branch_name": "refs/heads/master", "committer_date": 1649902751000, "content_id": "6e48ecfacc027fb736285cd0ee57989efd13a638", "detected_licenses": [ "MIT" ], "directory_id": "015a2f09f43fdf5113ab5e493661c636d1c189fa", "extension": "py", "fi...
2.46875
stackv2
# -*- coding: utf-8 -*- # /usr/bin/python import os import requests, json, re import time, datetime from bs4 import BeautifulSoup from apscheduler.schedulers.blocking import BlockingScheduler class DaKa(object): def __init__(self, username, password, sms_number="", sms_api_key=""): self.username = usernam...
196
33.33
151
20
1,711
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bf2c0ac08873efe3_711f7ad4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text.\nThis expression logs [sensitive data (passw...
[ 108, 110, 126 ]
[ null, null, null ]
[ 15, 15, 52 ]
[ 18, 18, 55 ]
2024-11-19T03:12:45.185305+00:00
1,628,982,898,000
77d08b2eed9aec6a6eb2e70a5cb5fdfaba37288c
3
{ "blob_id": "77d08b2eed9aec6a6eb2e70a5cb5fdfaba37288c", "branch_name": "refs/heads/main", "committer_date": 1628982898000, "content_id": "4fff627cd04ed79b009b542e61d479a665c1ac7a", "detected_licenses": [ "BSD-2-Clause", "MIT" ], "directory_id": "11221dedcc5773d5f2e8689e610c0d29287ec224", "exten...
2.546875
stackv2
#!/usr/bin/env python # MiniSplitPi - Mitsubishi Mr Slim HeatPump API # # requires file MiniSplitPi.uuid with a UUID and cert files key.pem and cert.pem, all in /home/pi/MiniSplitPi/ # # submit GET request with parameters: # uuid # action = [ poweroff, poweron, shutdown, reboot, ledon, ledoff, set ] # temp (if...
146
27.96
118
18
1,185
python
[{"finding_id": "codeql_py/insecure-default-protocol_fd8f4d5f921a1d14_3fc082b1", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in...
1
true
[ "CWE-327" ]
[ "py/insecure-default-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used." ]
[ 144 ]
[ null ]
[ 16 ]
[ 119 ]
2024-11-19T03:12:47.290017+00:00
1,549,034,435,000
80de3b3272e793de73567d86901ef380f3c41355
2
{ "blob_id": "80de3b3272e793de73567d86901ef380f3c41355", "branch_name": "refs/heads/master", "committer_date": 1549034435000, "content_id": "9cd0072e84ae696809a700193eb6cdc1459d1f2b", "detected_licenses": [ "MIT" ], "directory_id": "e62e7ba552486e66685b2a84f983eadc7aa0d37c", "extension": "py", "fi...
2.328125
stackv2
from jinja2 import Template from toolz import groupby import glob import janus import os import re def make_doc_index(template_path: str, doc_index_path: str): with open(template_path) as f: template = Template(f.read()) project_name = os.path.dirname( os.path.dirname(os.path....
51
27.9
82
20
405
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_a3fbcb6d7c8113ef_e7cd3e5d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 12 ]
[ null ]
[ 20 ]
[ 38 ]
2024-11-19T03:12:52.563097+00:00
1,474,946,498,000
010a1ff04ee3f5f5f56678084ae0bcf53e0b3e57
3
{ "blob_id": "010a1ff04ee3f5f5f56678084ae0bcf53e0b3e57", "branch_name": "refs/heads/master", "committer_date": 1474946498000, "content_id": "9cc22afd60f87d183ec3060995221cbe8281157a", "detected_licenses": [ "Apache-2.0" ], "directory_id": "96dac91d033048edf94e45c4730906b9249232cf", "extension": "py"...
2.71875
stackv2
# coding=utf-8 """ views module """ from urllib.parse import urlunsplit, urljoin from flask import Blueprint, request, current_app, redirect from .config import NAMESPACE blueprint = Blueprint( # pylint: disable=invalid-name 'redirector', __name__ ) @blueprint.route('/', defaults={'path': ''}) @blueprint.r...
48
28.56
118
12
353
python
[{"finding_id": "codeql_py/url-redirection_b5f059c1f07bfdb2_bdb550e5", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 21 ]
[ null ]
[ 21 ]
[ 33 ]
2024-11-19T03:35:50.192705+00:00
1,573,062,676,000
0b532c0b5dba04e131790656cabfc7060b5c0e72
3
{ "blob_id": "0b532c0b5dba04e131790656cabfc7060b5c0e72", "branch_name": "refs/heads/master", "committer_date": 1573062676000, "content_id": "b83b0b874573872f804621fa6b0f93ea68053636", "detected_licenses": [ "MIT" ], "directory_id": "25567981824beca1431b85423da6f3188e4d2356", "extension": "py", "fi...
2.84375
stackv2
import argparse from io import BytesIO import json import logging import os from urllib.parse import urlparse from jinja2 import Environment, FileSystemLoader from markdown import markdown from PIL import Image import requests from slugify import slugify import xmltodict import yaml log_format = "%(message)s" loggi...
149
32.32
109
15
1,080
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_a047596069648418_61c4cf74", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 33, 34 ]
[ null, null ]
[ 20, 17 ]
[ 69, 74 ]
2024-11-19T01:28:43.956989+00:00
1,611,548,992,000
9f3e98ec4f4c3e011d0cf409356f7612209ae4bf
3
{ "blob_id": "9f3e98ec4f4c3e011d0cf409356f7612209ae4bf", "branch_name": "refs/heads/main", "committer_date": 1611548992000, "content_id": "e86d202a0c30162699fb8ddf49ad499066812baf", "detected_licenses": [ "MIT" ], "directory_id": "59eb161f03f01cecfc9d658b5233bed1906b2d1b", "extension": "py", "file...
3.484375
stackv2
import requests import hashlib import sys def request_api_data(query_char): url = 'https://api.pwnedpasswords.com/range/' + query_char res = requests.get(url) if res.status_code != 200: raise RuntimeError(f'Error fetching: {res.status_code}, check the api and try again') return res def get_p...
45
30.22
93
15
350
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_65f873989f028ad7_4d419bd6", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 28 ]
[ null ]
[ 33 ]
[ 57 ]
2024-11-19T01:28:45.129863+00:00
1,609,415,291,000
1a566d2333f8db03351b5b47b9d555fd8840d42f
3
{ "blob_id": "1a566d2333f8db03351b5b47b9d555fd8840d42f", "branch_name": "refs/heads/master", "committer_date": 1609415291000, "content_id": "86ece520ace17c05d6cd27b496ff94b137bfb8b9", "detected_licenses": [ "Apache-2.0" ], "directory_id": "bd6201cb3b1fc8973dae628998c9cf3b7b97c06b", "extension": "py"...
2.65625
stackv2
#!/usr/bin/env python3 """ exercise 2a for Arista eAPI """ from getpass import getpass import pyeapi from pprint import pprint import yaml arista_file = "arista.yml" with open(arista_file, 'r') as f: arista_dict = yaml.safe_load(f) for name, values in arista_dict.items(): values['password'] = getpass(promp...
34
24.24
73
13
243
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3c69298b50d023b5_4d29f5b5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 32 ]
[ null ]
[ 15 ]
[ 73 ]