added
stringlengths
32
32
created
int64
1,244B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.25
source
stringclasses
1 value
text
stringlengths
324
20.1k
num_lines
int64
16
598
avg_line_length
float64
15.1
58.3
max_line_length
int64
33
179
ast_depth
int64
8
39
length
int64
101
3.8k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.1k
265k
sast_codeql_findings_count
int64
1
45
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
45
rule_ids
listlengths
1
45
confidences
listlengths
1
45
severities
listlengths
1
45
messages
listlengths
1
45
line_starts
listlengths
1
45
line_ends
listlengths
1
45
column_starts
listlengths
1
45
column_ends
listlengths
1
45
2024-11-18T21:47:38.291315+00:00
1,690,114,324,000
33c9e4bde7dbf7ce0578bedb0f16ecbb5c663a71
2
{ "blob_id": "33c9e4bde7dbf7ce0578bedb0f16ecbb5c663a71", "branch_name": "refs/heads/master", "committer_date": 1690114324000, "content_id": "2573f0d7c5f4ed1b03599401b4e25fcbc9120f13", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "3a3b2b5b410094f4a15cc306f8db7dbf69245a82", "extension": "p...
2.34375
stackv2
"""Generate the main site, other than the theme-specific generated pages.""" import shutil from jinja2 import Template from .constants import BUILD, DESTINATION, TEMPLATES from .themes import get_themes def main(): # Render index.html template = Template(TEMPLATES["index.html"].read_text()) rendered = ...
25
23.84
76
12
145
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_82e8caf97b302ea0_0ecad2da", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 13 ]
[ null ]
[ 16 ]
[ 61 ]
2024-11-18T22:28:48.044628+00:00
1,692,985,815,000
dd23ff94b6e932652af522e16528d5443d4723d5
2
{ "blob_id": "dd23ff94b6e932652af522e16528d5443d4723d5", "branch_name": "refs/heads/master", "committer_date": 1692985815000, "content_id": "4132b12684510a83a8b3321cb8bdaf34ba4ba469", "detected_licenses": [ "MIT" ], "directory_id": "4eec6af52eca33b139f37d38fc909dd976b80be4", "extension": "py", "fi...
2.4375
stackv2
import json import re from datetime import datetime, timedelta from typing import TYPE_CHECKING, Dict, List, Optional, Tuple, Union from github.GitRelease import GitRelease from github.Issue import Issue from github.NamedUser import NamedUser from github.PullRequest import PullRequest from jinja2 import Template from...
201
39.69
87
18
1,840
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_3ae711655c5b9ff5_84f0482b", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 36 ]
[ null ]
[ 26 ]
[ 62 ]
2024-11-18T22:29:03.589318+00:00
1,634,327,392,000
ba2c1430060a110cea4ce59e975f96438e79a65c
3
{ "blob_id": "ba2c1430060a110cea4ce59e975f96438e79a65c", "branch_name": "refs/heads/main", "committer_date": 1634327392000, "content_id": "b75efb9cce7d136f3f90cf825ea7cb55eaa5df43", "detected_licenses": [ "MIT" ], "directory_id": "1d0fb6bd3005fd07546d98fa0c18c35ec0afec62", "extension": "py", "file...
2.796875
stackv2
import os import io from fastapi import APIRouter, Query from starlette.responses import FileResponse from tempfile import TemporaryDirectory import uuid from google.cloud import texttospeech # Instantiates a client client = texttospeech.TextToSpeechClient() # Define Router router = APIRouter() # Routes @router.po...
66
27.35
79
12
440
python
[{"finding_id": "codeql_py/path-injection_0b79cea3c37ff90f_45366d1d", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 66 ]
[ null ]
[ 25 ]
[ 29 ]
2024-11-18T22:29:31.385263+00:00
1,693,008,024,000
6a8bb76b2d3c3d3eda9622e01a20e9031522ca3b
3
{ "blob_id": "6a8bb76b2d3c3d3eda9622e01a20e9031522ca3b", "branch_name": "refs/heads/main", "committer_date": 1693008024000, "content_id": "632451821cd68317df541d0fbb2c8499a34ac64b", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "e249e2f5821116eaa18774b8c36502babbeddc00", "extension": "py"...
2.609375
stackv2
import os, requests from progressbar import progressbar from caltechdata_api import get_metadata, caltechdata_edit def get_datacite_dates(prefix): """Get sumbitted date for DataCite DOIs with specific prefix""" doi_dates = {} doi_urls = {} url = ( "https://api.datacite.org/dois?query=prefix:" ...
46
34.3
85
17
412
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_056dca08abbbfe2b_9abdf89b", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [data.caltech.edu](1) may be at an arbitrary position i...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [data.caltech.edu](1) may be at an arbitrary position in the sanitized URL." ]
[ 35 ]
[ null ]
[ 8 ]
[ 43 ]
2024-11-18T22:41:05.517790+00:00
1,688,050,664,000
7c3f3f4e796c5ad4e01cfc586d433b949afe0a8e
2
{ "blob_id": "7c3f3f4e796c5ad4e01cfc586d433b949afe0a8e", "branch_name": "refs/heads/master", "committer_date": 1688050664000, "content_id": "6480c77599ad19ca6a068fb834b7c2f134867191", "detected_licenses": [ "MIT" ], "directory_id": "7102fe71519a63c00fe2b818f436afed8904efa9", "extension": "py", "fi...
2.4375
stackv2
#!/usr/bin/env python import random import argparse import tempfile import os import tarfile from pathlib import Path import numpy as np import tensorflow as tf from tqdm import tqdm import h5py from hailo_model_zoo.utils import path_resolver, downloader TF_RECORD_TYPE = 'val', 'calib' TF_RECORD_LOC = {'val': 'mod...
148
36.11
119
25
1,232
python
[{"finding_id": "codeql_py/tarslip_800f41c66db14bd4_fd550a01", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 96 ]
[ null ]
[ 21 ]
[ 24 ]
2024-11-18T22:41:13.402324+00:00
1,593,290,089,000
f1a07b1512a40796af08b5805894f703eb62dc99
2
{ "blob_id": "f1a07b1512a40796af08b5805894f703eb62dc99", "branch_name": "refs/heads/master", "committer_date": 1593290089000, "content_id": "a64d25fd50500aa87672c05e8935eb4bad3dcecc", "detected_licenses": [ "Apache-2.0" ], "directory_id": "9dd6886dda3ffa8db14966143e8a5b42b67990d7", "extension": "py"...
2.328125
stackv2
import requests from JavPy.embed.BaseEmbed import BaseEmbed from JavPy.embed.fvs_io import fvs_io import json from JavPy.utils.config import proxy class smartshare_tv(BaseEmbed): @staticmethod def decode(url): video_id = url.split("/v/").pop().split("/")[0] rsp = requests.post( "ht...
30
25.73
74
17
208
python
[{"finding_id": "codeql_py/request-without-cert-validation_3a53f7a713fc34ca_2513c727", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 12 ]
[ 17 ]
[ 15 ]
[ 10 ]
2024-11-18T22:41:14.695454+00:00
1,525,827,221,000
2c1f717e2d2882a541f7af7fdc15856bff73e35e
2
{ "blob_id": "2c1f717e2d2882a541f7af7fdc15856bff73e35e", "branch_name": "refs/heads/master", "committer_date": 1525827221000, "content_id": "0f2f3d44940d4507e9c25cb060d0f44d02b550eb", "detected_licenses": [ "Apache-2.0" ], "directory_id": "34cc4da22aa40ef1aac158cb503d059741509812", "extension": "py"...
2.5
stackv2
""" Fetches and prepares the source code for revisions. """ import errno import logging import os import random import shutil from kazoo.exceptions import NodeExistsError from tornado import gen from tornado.options import options from appscale.common.appscale_utils import get_md5 from appscale.common.appscale_info ...
177
33.5
79
17
1,311
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_8e2bd7c2c7aad38d_8d612079", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (secret)](1) as clear text." ]
[ 177 ]
[ null ]
[ 25 ]
[ 77 ]
2024-11-18T22:54:06.001089+00:00
1,503,996,087,000
49d703a93ca1b489f7784e90d401cd80c01c7577
3
{ "blob_id": "49d703a93ca1b489f7784e90d401cd80c01c7577", "branch_name": "refs/heads/master", "committer_date": 1503996087000, "content_id": "a22c010c433c682e102575d0456ede6d061b3e09", "detected_licenses": [ "Unlicense" ], "directory_id": "a39bddfeea008fa4f469e062ea08c630e95548c7", "extension": "py",...
3.0625
stackv2
#!/usr/bin/env python3 import sys import argparse from getpass import getpass from pathlib import Path from hashlib import sha256 def get_seed(key): return sha256(key.encode('utf-8')).digest() def parse_args(): parser = argparse.ArgumentParser(description='XOR cipher') parser.add_argument('infile', help=...
51
26.43
74
17
338
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_3d728e5bcf16654a_578745fb", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 10 ]
[ null ]
[ 19 ]
[ 38 ]
2024-11-18T22:54:08.864640+00:00
1,583,066,848,000
633dcfaf4760dec9c513f0240e511a3edb12f7cb
3
{ "blob_id": "633dcfaf4760dec9c513f0240e511a3edb12f7cb", "branch_name": "refs/heads/master", "committer_date": 1583066848000, "content_id": "3dc7a0f77f76852935b02639f13154afd3b70105", "detected_licenses": [ "MIT" ], "directory_id": "965e2ac3199deffc3a04cda451681724842ad674", "extension": "py", "fi...
2.796875
stackv2
#pip install lxml #pip install pyOpenSSL import requests import json from bs4 import BeautifulSoup as bs import ssl import time ''' The elsevier search is kind of a tree structure: "keyword --> a list of journals (a journal contain many articles) --> lists of articles ''' journals = [] articles = [] abstracts = {} ...
161
27.27
135
15
1,230
python
[{"finding_id": "codeql_py/request-without-cert-validation_5d5212154fb870b2_a1e5488f", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
3
true
[ "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 28, 44, 67 ]
[ null, null, null ]
[ 12, 12, 12 ]
[ 44, 44, 44 ]
2024-11-18T22:54:32.582659+00:00
1,512,439,428,000
3b7c32a6f859d123a8e1e09106bc5a71617c64b5
3
{ "blob_id": "3b7c32a6f859d123a8e1e09106bc5a71617c64b5", "branch_name": "refs/heads/master", "committer_date": 1512439428000, "content_id": "3eb5c75e887aa8ee84937e884bbb59e9048a2c5f", "detected_licenses": [ "MIT" ], "directory_id": "37170882a5dc31262a6cf418baba71e6f76de12f", "extension": "py", "fi...
2.65625
stackv2
from flask import Flask, render_template, request, flash app = Flask(__name__) app.secret_key = 'this should be a secret key' @app.route('/') def index(): # return HTML # return "<h1>this is the index page!<h1>" return render_template('index.html') @app.route('/songs') def show_all_classes(): classe...
68
25.87
78
12
473
python
[{"finding_id": "codeql_py/reflective-xss_7632c5eb3a893eef_c3c24306", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 55 ]
[ null ]
[ 12 ]
[ 79 ]
2024-11-18T22:54:32.973575+00:00
1,514,428,218,000
1230db29173c4f1476fb5036130d7b07fca8c676
2
{ "blob_id": "1230db29173c4f1476fb5036130d7b07fca8c676", "branch_name": "refs/heads/master", "committer_date": 1514428218000, "content_id": "8bc24e0ba02c261fbafe53a51698ebc5c6fd4116", "detected_licenses": [ "Apache-2.0" ], "directory_id": "25a9f70ac09b84cf368920c9d6802d0965c6340e", "extension": "py"...
2.390625
stackv2
# -*- coding:utf8 -*- import os import re from copy import deepcopy from jinja2 import Template from .snippets_cfg import SNIPPET_CONFIG, CONTAINER_CONFIG __all__ = ["Snippet", "SnippetContainer"] _ROOT_DIR = os.path.abspath(os.path.dirname(__file__)) _TEMPLATE_DIR = os.path.join(_ROOT_DIR, "templates") _SNIPPET_DI...
124
28.58
94
14
873
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_673b53fb6a1dd06d_2147b11d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 49, 85 ]
[ null, null ]
[ 18, 18 ]
[ 37, 37 ]
2024-11-18T20:55:06.418843+00:00
1,602,916,932,000
16769a1032af5cab75f4a4ff4410c32c94001fd7
2
{ "blob_id": "16769a1032af5cab75f4a4ff4410c32c94001fd7", "branch_name": "refs/heads/master", "committer_date": 1602916932000, "content_id": "f364d9eff4e3bc6c21cec6ae30fe66aefeb62af0", "detected_licenses": [ "MIT" ], "directory_id": "05aa0f6cfe34907ff3ccee1d4db3040f5d54c852", "extension": "py", "fi...
2.3125
stackv2
#!/bin/python2 # -*- coding: utf-8 -*- import requests import json import time import calendar import datetime import hashlib import hmac import base64 import collections import socket import ssl import threading import traceback import logging import sys from requests import Request, Session class FalconAuth: def...
317
40.8
169
29
2,706
python
[{"finding_id": "codeql_py/insecure-protocol_0f891638ba553011_832698c0", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/...
1
true
[ "CWE-327" ]
[ "py/insecure-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.create_default_context](1)." ]
[ 180 ]
[ null ]
[ 17 ]
[ 24 ]
2024-11-18T21:07:37.256983+00:00
1,528,881,922,000
f1853293fde2184e7ebd799a5d15f212b05bd61c
3
{ "blob_id": "f1853293fde2184e7ebd799a5d15f212b05bd61c", "branch_name": "refs/heads/master", "committer_date": 1528881922000, "content_id": "5c190687d5bac99d65a16a61882a24febdb02592", "detected_licenses": [ "Apache-2.0" ], "directory_id": "d510c6750eefdd75a6f7d8443347ab144580ba1e", "extension": "py"...
2.796875
stackv2
# -*- coding: utf-8 -*- import datetime from matplotlib.pylab import date2num import matplotlib.pyplot as plt from futuquant import OpenQuoteContext from futuquant import OpenHKTradeContext, OpenUSTradeContext import matplotlib.finance as mpf class MACD(object): """ A simple MACD strategy """ # API pa...
129
37.85
122
19
1,484
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_07536b5c46ef1592_fe5321d7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 56 ]
[ null ]
[ 27 ]
[ 89 ]
2024-11-18T21:07:40.918164+00:00
1,623,954,958,000
a59eba4e957d726b8c1f914189585bacc6a1e470
3
{ "blob_id": "a59eba4e957d726b8c1f914189585bacc6a1e470", "branch_name": "refs/heads/master", "committer_date": 1623954958000, "content_id": "42a08de38693d886bda90f2ed266fdd23b5d1259", "detected_licenses": [ "MIT" ], "directory_id": "d2896b89005dfcbcf679a7488f3d94ffd266d1c7", "extension": "py", "fi...
2.546875
stackv2
import asyncio from jinja2 import Template from starlette.applications import Starlette from starlette.responses import RedirectResponse, HTMLResponse from starlette.requests import Request from starlette.status import (HTTP_201_CREATED, HTTP_303_SEE_OTHER, HTTP_400_BAD_REQUEST) from star...
112
26.26
124
14
666
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_a25cbc7ed2ceddab_f3ba9353", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 68 ]
[ 96 ]
[ 12 ]
[ 5 ]
2024-11-18T21:07:45.311365+00:00
1,537,124,123,000
13074af396f4d958eb122c07b0052122b7aed741
3
{ "blob_id": "13074af396f4d958eb122c07b0052122b7aed741", "branch_name": "refs/heads/master", "committer_date": 1537124123000, "content_id": "4d9b72b8f1354407103c2e4ef38d1f408fcd2613", "detected_licenses": [ "MIT" ], "directory_id": "29b28d10e30a79c91215834ccf681a7874e3ad07", "extension": "py", "fi...
2.734375
stackv2
#!/usr/bin/env python3 import argparse import sys import jinja2 import markdown import re TEMPLATE = """<!DOCTYPE html> <html> <head> <link href="https://azlux.fr/bootstrap-combined.min.css" rel="stylesheet"> <meta http-equiv="cache-control" content="max-age=0" /> <meta http-equiv="cache-control" content...
74
27.57
97
15
549
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_a501d522dfac3d64_8f4e5098", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 67 ]
[ null ]
[ 11 ]
[ 36 ]
2024-11-18T21:33:24.318011+00:00
1,477,241,509,000
29f63c542c4638dbc708e33c3cd2f31c97548e27
2
{ "blob_id": "29f63c542c4638dbc708e33c3cd2f31c97548e27", "branch_name": "refs/heads/master", "committer_date": 1477241509000, "content_id": "9e5cda5c8c283e61f8ca0f0e4cd9d2be508353b4", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "6e8f33f94401a0059eeb63b4dea9044a900d76de", "extension": "p...
2.359375
stackv2
import sys import asyncio from collections import Mapping from pulsar.utils.string import to_bytes from jinja2 import Template STREAM_LIMIT = 2**20 class AgileError(Exception): pass class AgileExit(AgileError): pass class AgileSkip(AgileError): pass class ShellError(AgileError): def __init_...
128
23.71
70
15
737
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_f5a87622ce625c58_ea15e3f9", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 33 ]
[ null ]
[ 16 ]
[ 30 ]
2024-11-18T21:55:53.241493+00:00
1,611,831,863,000
3d4c21ae908990d76cb5f714e5ee203e6762d372
3
{ "blob_id": "3d4c21ae908990d76cb5f714e5ee203e6762d372", "branch_name": "refs/heads/master", "committer_date": 1611831863000, "content_id": "02f4e7f41f8585e8bc37e019435f939a0a1a19c3", "detected_licenses": [ "MIT" ], "directory_id": "60f31a13a7684080c23024de509ed5312575ad57", "extension": "py", "fi...
2.515625
stackv2
import pandas as pd from config import WEBSCRAPE_DATA_PATH, FEATURE_COLUMNS, RAW_DATA_PATH, INGESTED_DATA import os def gameweek_filepaths(players_path): filepaths = [] for root, dirs, files in os.walk(players_path): for filename in files: if filename == "gw.csv": filepaths...
119
46.66
118
23
1,227
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_27c8e11dbd822822_f82a7f35", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 37 ]
[ null ]
[ 11 ]
[ 14 ]
2024-11-18T22:39:32.994515+00:00
1,626,117,656,000
95e0062978256c19be3f57839e4d8bdb6fc4dcad
3
{ "blob_id": "95e0062978256c19be3f57839e4d8bdb6fc4dcad", "branch_name": "refs/heads/main", "committer_date": 1626117656000, "content_id": "0106bd0f40a9ec2dced30654a8b51a80455219fd", "detected_licenses": [ "Apache-2.0" ], "directory_id": "fb8666ba2f687441fb462482ddc2465669ab815f", "extension": "py", ...
2.609375
stackv2
import os import requests from urllib3.exceptions import InsecureRequestWarning requests.packages.urllib3.disable_warnings(category=InsecureRequestWarning) # Constants BASE_URL = "https://netbox.lasthop.io/api/" def main(): token = os.environ["NETBOX_TOKEN"] http_headers = {} http_headers["accept"] ...
45
24.58
87
12
273
python
[{"finding_id": "codeql_py/request-without-cert-validation_bf19052024a355f9_62875a72", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 22 ]
[ null ]
[ 12 ]
[ 88 ]
2024-11-18T22:39:42.430603+00:00
1,692,259,973,000
1f32fba854cd43a7eb819bcc0a96bb6d56b300f0
2
{ "blob_id": "1f32fba854cd43a7eb819bcc0a96bb6d56b300f0", "branch_name": "refs/heads/main", "committer_date": 1692259973000, "content_id": "58010d2c8ee79dc3cc04b64bf39b5ac2b9599020", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "9143962494f56b95589ae8a8d3889bba5a30981d", "extension": "py"...
2.484375
stackv2
"""Definitions of screw axes with methods for scoring against data.""" from __future__ import annotations import logging import math import numpy as np from jinja2 import ChoiceLoader, Environment, PackageLoader from scipy.stats import norm from scitbx.array_family import flex from dials.algorithms.symmetry.absenc...
380
35.01
103
19
3,380
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_5f44040133b15de4_7750a3f6", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 44 ]
[ null ]
[ 15 ]
[ 41 ]
2024-11-18T23:06:13.156502+00:00
1,525,024,436,000
4c23cbde0446033c79cfa61a52bc7c66fbd7d695
2
{ "blob_id": "4c23cbde0446033c79cfa61a52bc7c66fbd7d695", "branch_name": "refs/heads/master", "committer_date": 1525024436000, "content_id": "134a28458da58cfd3a7d9fbc7d21c8337c760263", "detected_licenses": [ "MIT" ], "directory_id": "603ff44ea7d7bdcdffe554050c781e1837b4ca68", "extension": "py", "fi...
2.4375
stackv2
from random import randint, shuffle druzinky = [# 'Muflóny', ] veduci = [ 'Sára', ] def create_password(): big_letter = randint(1,4) digit = randint(1,5) small_letter = 10 - big_letter - digit password_list = [] password = '' for i in range(big_letter): password_list.append(c...
53
28.42
106
13
448
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_1532ed5e9aa44729_9656bddc", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (password)](3) as clear text.\nThis expression stores [sensitive data (password)](4) as clear text.", "This expression stores [sensiti...
[ 39, 47 ]
[ null, null ]
[ 17, 17 ]
[ 105, 104 ]
2024-11-18T23:06:16.623693+00:00
1,574,068,687,000
0d45432ccf82b18769ca9f7a415c1f44cd0a6a20
3
{ "blob_id": "0d45432ccf82b18769ca9f7a415c1f44cd0a6a20", "branch_name": "refs/heads/master", "committer_date": 1574068687000, "content_id": "b613a3556801c42dc2efb59016046228a7f02ece", "detected_licenses": [ "Apache-2.0" ], "directory_id": "33c7e8b0c69338efbb5547f95ecdec81715523e2", "extension": "py"...
2.921875
stackv2
""" OpenID Connect related functionality and helpers. """ import base64 import functools import hashlib import http.server import json import logging import random import string import threading import time import urllib.parse import warnings import webbrowser from collections import namedtuple from queue import Queu...
338
38.93
165
21
2,869
python
[{"finding_id": "codeql_py/log-injection_a5915416dafb8001_207d8e4c", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 39 ]
[ null ]
[ 19 ]
[ 79 ]
2024-11-18T20:56:58.497306+00:00
1,546,896,700,000
48e18fe2609e4468203977f71effa3ae3f4ea2fa
2
{ "blob_id": "48e18fe2609e4468203977f71effa3ae3f4ea2fa", "branch_name": "refs/heads/master", "committer_date": 1546896700000, "content_id": "a54821afcebd37c206d1c4e5c85a488a8bd49521", "detected_licenses": [ "MIT" ], "directory_id": "544dedd74ce6d39f9ce421f16145b32da7968d3a", "extension": "py", "fi...
2.484375
stackv2
import importlib import os import re import sys import tarfile import zipfile import yaml from slugify import slugify from ezored.models.constants import Constants from ezored.models.logger import Logger from ezored.models.util.download_util import DownloadUtil from ezored.models.util.file_util import FileUtil from e...
367
38.65
109
19
2,882
python
[{"finding_id": "codeql_py/tarslip_af385ba48f802aa3_8aeccc0c", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 217 ]
[ null ]
[ 13 ]
[ 19 ]
2024-11-18T22:43:36.541612+00:00
1,686,219,916,000
fdc3627dd3675baaefab9f45b4b90fdbfb87cffa
3
{ "blob_id": "fdc3627dd3675baaefab9f45b4b90fdbfb87cffa", "branch_name": "refs/heads/main", "committer_date": 1686219916000, "content_id": "3a91bafabfc9800c6c7da6f50493fab30f4f1e30", "detected_licenses": [ "MIT" ], "directory_id": "15abe1023912895e9b8c41d77b38f2ce988f309b", "extension": "py", "file...
2.765625
stackv2
# https://exchange-docs.crypto.com/spot/index.html?python#digital-signature import hashlib import hmac def sign_request(req, api_key, secret_key): if req is None or api_key is None or secret_key is None: return None # First ensure the params are alphabetically sorted by key param_string = '' i...
25
37.44
101
15
247
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_cee9c0b4c532ad20_6cbc6578", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 21 ]
[ null ]
[ 13 ]
[ 41 ]
2024-11-18T22:44:11.644742+00:00
1,445,502,508,000
52ecbcd26ceeeaebc96083ea7e1c94c145d12d29
2
{ "blob_id": "52ecbcd26ceeeaebc96083ea7e1c94c145d12d29", "branch_name": "refs/heads/master", "committer_date": 1445502508000, "content_id": "9febde1210ff1912d8058554968a0cde325b30b7", "detected_licenses": [ "MIT" ], "directory_id": "dbd46c6fae3f9f59679d61f5815a25b91af99bc2", "extension": "py", "fi...
2.484375
stackv2
# -*- coding: UTF-8 -*- # !/usr/bin/python """ views.py ~~~~~~~~ auth登录模块视图函数文件 由于桂声是一个面向编辑的后台网站, 所以无需注册接口。账号直接由管理员发放。 """ from flask import render_template from flask import redirect, request, url_for, flash from flask.ext.login import login_user, login_required, logout_user from flask.ext.login i...
59
27.86
69
16
429
python
[{"finding_id": "codeql_py/url-redirection_4b562132364ee1a4_ffbbfa6d", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 32 ]
[ null ]
[ 20 ]
[ 69 ]
2024-11-18T22:44:14.395264+00:00
1,598,850,048,000
0133da49bf9d6c402c34bb0c230073a18e477abf
2
{ "blob_id": "0133da49bf9d6c402c34bb0c230073a18e477abf", "branch_name": "refs/heads/master", "committer_date": 1598850048000, "content_id": "ffc0376d6d06d5d6a89a9979d121075a60087178", "detected_licenses": [ "MIT" ], "directory_id": "c3c34e058a6f9c8d2760299820e07bbf411b7639", "extension": "py", "fi...
2.4375
stackv2
#!/usr/bin/python __author__ = "Bassim Aly" __EMAIL__ = "basim.alyy@gmail.com" import yaml from jinja2 import FileSystemLoader, Environment with open( '/media/bassim/DATA/GoogleDrive/Packt/EnterpriseAutomationProject/Chapter6_Configuration_generator_with_python_and_jinja2/network_dc.yml', 'r') as yaml...
30
38.07
146
12
267
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_ecac4e97acf52c48_b154c903", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 15 ]
[ 18 ]
[ 16 ]
[ 29 ]
2024-11-18T22:29:36.335901+00:00
1,589,384,235,000
066a75848eb15f7bda11efbe5694f261ac06b14f
3
{ "blob_id": "066a75848eb15f7bda11efbe5694f261ac06b14f", "branch_name": "refs/heads/master", "committer_date": 1589384235000, "content_id": "60e02c93acc100b3c081c0c4c7d6471b6f9bf9e8", "detected_licenses": [ "Apache-2.0" ], "directory_id": "2c1ab9ca2be1cbddcd2442b44a99aef1897ca1a3", "extension": "py"...
2.90625
stackv2
import requests import json import sys import base64 def fetch_oauth_token(**kwargs): """ This method fetches oauth access token by calling /oauth2/token/<app_id> Rest API """ if 'tenant' not in kwargs or \ 'appid' not in kwargs or \ 'scope' not in kwargs or \ ...
52
34.4
85
19
343
python
[{"finding_id": "codeql_py/request-without-cert-validation_82661a4e833e0940_12159037", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 31 ]
[ 34 ]
[ 20 ]
[ 53 ]
2024-11-18T22:29:36.388353+00:00
1,478,009,002,000
2aad6eaf29bd08b380275cee57ac3e1c8fb504aa
2
{ "blob_id": "2aad6eaf29bd08b380275cee57ac3e1c8fb504aa", "branch_name": "refs/heads/master", "committer_date": 1478009002000, "content_id": "749c1ab92fd7c6b725b6956aa214bb485e81715d", "detected_licenses": [ "MIT" ], "directory_id": "6e3d05579687f41ddd47e547a7a78cb6f2d16aec", "extension": "py", "fi...
2.40625
stackv2
# coding=UTF-8 import time from datetime import datetime import requests import time import sys from bs4 import BeautifulSoup requests.packages.urllib3.disable_warnings() Board = '' payload={ 'from':'/bbs/'+ Board +'/index.html', 'yes':'yes' } def getPageNumber(content) : startIndex = content.find('index') ...
76
28.68
82
16
672
python
[{"finding_id": "codeql_py/request-without-cert-validation_4dacc11f61764160_741d2b60", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
4
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 36, 35, 61, 46 ]
[ null, null, null, null ]
[ 8, 8, 9, 9 ]
[ 78, 79, 36, 36 ]
2024-11-18T22:29:37.504780+00:00
1,625,137,108,000
84b1ce717502d5f56c17e659e823f25ca75292ce
2
{ "blob_id": "84b1ce717502d5f56c17e659e823f25ca75292ce", "branch_name": "refs/heads/master", "committer_date": 1625137108000, "content_id": "2f04f6f413528e0d58bf7648b4829468161fe64a", "detected_licenses": [ "MIT" ], "directory_id": "4450824baf47cadb934522e4a1e8d300d04558a9", "extension": "py", "fi...
2.40625
stackv2
import sys import os curPath = os.path.abspath(os.path.dirname(__file__)) rootPath = os.path.split(curPath)[0] sys.path.append(rootPath) from flask import Flask, request, abort from flask_cors import CORS from linebot.exceptions import ( InvalidSignatureError ) from controllers.line_bot_controller import Line...
114
25.22
107
13
675
python
[{"finding_id": "codeql_py/log-injection_921072baf3f55d83_70e156bf", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 69 ]
[ null ]
[ 27 ]
[ 31 ]
2024-11-18T23:15:52.680423+00:00
1,443,518,075,000
acbb754ad30ee7d40d8e3c143cbf39443bb2604d
3
{ "blob_id": "acbb754ad30ee7d40d8e3c143cbf39443bb2604d", "branch_name": "refs/heads/master", "committer_date": 1443518075000, "content_id": "0bb4597193018333c5348ebf4fb4f4c62becbc6b", "detected_licenses": [ "MIT" ], "directory_id": "03f53a603a110699de9dcee96b55275104cebc51", "extension": "py", "fi...
2.65625
stackv2
#!/usr/bin/python __author__ = 'https://github.com/chelnak' import json import requests from helpers import authenticate, checkResponse from prettytable import PrettyTable class ConsumerClient(object): def __init__(self, host, username, password, tenant=None): """ Creates a connection to the vRA...
346
31.41
143
19
2,347
python
[{"finding_id": "codeql_py/request-without-cert-validation_bbf39da5fd936bbf_ead99569", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
10
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation"...
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 58, 87, 116, 139, 173, 234, 263, 290, 318, 338 ]
[ null, null, null, null, null, null, null, null, null, 341 ]
[ 13, 13, 13, 13, 13, 13, 13, 13, 13, 13 ]
[ 65, 65, 65, 65, 65, 65, 65, 65, 65, 40 ]
2024-11-18T22:30:19.907569+00:00
1,586,670,602,000
72ac57ea1751bb2d80a25dca834c20f14db314a3
2
{ "blob_id": "72ac57ea1751bb2d80a25dca834c20f14db314a3", "branch_name": "refs/heads/master", "committer_date": 1586670602000, "content_id": "259b08d31f5592220c55e49b5eaed4f6b98a430d", "detected_licenses": [ "MIT" ], "directory_id": "fe4a18ec560b932a18c4e6226482e1f35eac6e62", "extension": "py", "fi...
2.40625
stackv2
from flask import Flask from flask import render_template from flask import request from flask import redirect from tensorflow import keras from keras.preprocessing import image from werkzeug.utils import secure_filename import os import numpy as np from random import random app = Flask(__name__) UPLOAD_FOLDER = "s...
84
31.42
93
18
572
python
[{"finding_id": "codeql_py/flask-debug_827a03fe9fa3b361_753834eb", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-601", "CWE-601" ]
[ "py/flask-debug", "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 84, 35, 40 ]
[ null, null, null ]
[ 5, 29, 29 ]
[ 24, 40, 40 ]
2024-11-18T22:30:30.300149+00:00
1,663,538,314,000
e210a94fcf01f76c51168ba8740e9f02530290f6
3
{ "blob_id": "e210a94fcf01f76c51168ba8740e9f02530290f6", "branch_name": "refs/heads/master", "committer_date": 1663538314000, "content_id": "2662a7530ceeb417f582c927e18b83ab69648288", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "f411e9a90678c5e93fe0e293f5672be7a35c7291", "extension": "p...
2.53125
stackv2
"""Render items using Jinja2 template engine.""" import pathlib import jinja2 import jsonpointer from .. import source from .._misc import parameters @parameters( jsonschema={ "type": "object", "properties": { "template": {"type": "string"}, "context": {"type": "object"}...
54
31.26
78
20
399
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_a6671e473f2b2800_f97de780", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 33 ]
[ 42 ]
[ 11 ]
[ 6 ]
2024-11-18T23:36:48.091656+00:00
1,517,920,386,000
59d445be63b7347c91eb9815f577b1dfc2377077
3
{ "blob_id": "59d445be63b7347c91eb9815f577b1dfc2377077", "branch_name": "refs/heads/master", "committer_date": 1517920386000, "content_id": "51489d769f7656795306a111d20ae6d78b43afa8", "detected_licenses": [ "MIT" ], "directory_id": "130f1cea85a523b09d4a2eadfea79a2de88219c5", "extension": "py", "fi...
2.765625
stackv2
import os from jinja2 import BaseLoader, Environment from lxml import etree import numpy as np import pandas as pd import requests # Template XML para request ao Webservice do SGS soapenv = 'http://schemas.xmlsoap.org/soap/envelope/' xsd = 'http://www.w3.org/2001/XMLSchema' xsi = 'http://www.w3.org/2001/XMLSchema-ins...
108
36.89
93
18
989
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_d817249c072f83f3_6bd65e84", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 47 ]
[ null ]
[ 20 ]
[ 50 ]
2024-11-18T23:36:59.117572+00:00
1,669,983,054,000
26c454fb75aaffc97bc60136e37c7d637dbb76b6
2
{ "blob_id": "26c454fb75aaffc97bc60136e37c7d637dbb76b6", "branch_name": "refs/heads/master", "committer_date": 1669983054000, "content_id": "ba49241df1fb26329695b8c581ee2a358c99537b", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "56731673c481f872b61f86e9c8c07bb9b0548c94", "extension": "p...
2.5
stackv2
import typing from bottle import Bottle, Request from jinja2 import Template from .base import Apiman as _Apiman class Apiman(_Apiman): """Bottle extension >>> app = Flask(__name__) >>> apiman = Apiman( ... template="./examples/docs/dog_template.yml" ... ) >>> apiman.init_app(app) >...
118
31.86
88
21
830
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_c5baf6a62807e09e_1f4bf71a", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 38, 47 ]
[ null, null ]
[ 28, 26 ]
[ 72, 68 ]
2024-11-18T21:57:26.891204+00:00
1,581,391,624,000
d8e37007ce0a812391b48a0ffa4d6c51afe92244
3
{ "blob_id": "d8e37007ce0a812391b48a0ffa4d6c51afe92244", "branch_name": "refs/heads/master", "committer_date": 1581391624000, "content_id": "335bacd8377ecf0cab53535c610c090a33979ede", "detected_licenses": [ "MIT" ], "directory_id": "cf5170c940e695e4ce7fdfb7c815d08cc751fafa", "extension": "py", "fi...
2.515625
stackv2
import importlib import os import re import types from types import FunctionType from docutils import nodes from docutils.nodes import document from sphinx.application import Sphinx from jinja2 import Template from auto_behave.node import AutoBehave import inspect def process_auto_behave_nodes(app: Sphinx, doc_tre...
136
31.65
112
15
963
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_4329e609acfb728a_8ce9c188", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 21 ]
[ null ]
[ 16 ]
[ 41 ]
2024-11-18T21:57:53.600268+00:00
1,570,981,316,000
f16d81453dad51b27c6439f90ce3aa6f33e801a4
3
{ "blob_id": "f16d81453dad51b27c6439f90ce3aa6f33e801a4", "branch_name": "refs/heads/master", "committer_date": 1570981316000, "content_id": "a800c3993489fab030859fcc54a4ee35c7e2b7b5", "detected_licenses": [ "MIT" ], "directory_id": "b6149b31d8ccd4d1687ea9bd2b291815760dbee3", "extension": "py", "fi...
3.390625
stackv2
#1 -)BIRTHDAY CAKE CANDLES import math import os import random import re import sys def birthdayCakeCandles(ar): # find the max number of array and count how many of it in the array by iterating over list maxi = max(ar) couter = 0 for i in ar: if i == maxi: couter += 1 return...
240
20.18
152
21
1,397
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_8bfc3db735fc591e_97375260", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text." ]
[ 29 ]
[ null ]
[ 16 ]
[ 34 ]
2024-11-18T21:58:03.778537+00:00
1,565,141,187,000
13fdf616cc9dcb1f887e910998e51937f2fdb23e
3
{ "blob_id": "13fdf616cc9dcb1f887e910998e51937f2fdb23e", "branch_name": "refs/heads/master", "committer_date": 1565141187000, "content_id": "03df8bd5ae2289fec5862d59342364688c616c33", "detected_licenses": [ "Apache-2.0" ], "directory_id": "28c4d2a6377f0a5bd5dbb3e4bd3c0b25274e05e2", "extension": "py"...
2.59375
stackv2
import os import subprocess import tempfile import re from flask import Flask, request from google.cloud import storage app = Flask(__name__) def download_blob(gcs_uri, destination_file_name): """Downloads a blob from the bucket.""" bucket_name = os.path.split(gcs_uri.strip())[0].replace("gs://", "") cli...
58
32.67
77
15
462
python
[{"finding_id": "codeql_py/command-line-injection_9896ecb732d8c2b8_1f997612", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {...
3
true
[ "CWE-078", "CWE-215", "CWE-022" ]
[ "py/command-line-injection", "py/flask-debug", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This command line depends on a [user-provided value](1).", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1)." ]
[ 44, 57, 17 ]
[ null, 58, null ]
[ 31, 5, 15 ]
[ 39, 52, 36 ]
2024-11-18T21:58:06.440629+00:00
1,498,043,227,000
e407f38521d96e64052944b7ac9e93c68bcc2bc6
2
{ "blob_id": "e407f38521d96e64052944b7ac9e93c68bcc2bc6", "branch_name": "refs/heads/master", "committer_date": 1498043227000, "content_id": "68a2d44805a6dd312e794f9329668a53e8c607ef", "detected_licenses": [ "MIT" ], "directory_id": "e0bd4928b2c9445da515c747403e3ea3369f8f47", "extension": "py", "fi...
2.390625
stackv2
# -*- coding: utf-8 -*- import logging from tornado.web import RequestHandler from Tools import RedisClient, Configuration logger = logging.getLogger(__name__) (_, try_limit, ban_time) = Configuration.load_security_conf() class BaseHandler(RequestHandler): """Superclass for Handlers which require a connected u...
37
29.68
75
13
230
python
[{"finding_id": "codeql_py/log-injection_2b5784bbefbb8e37_230dd8b2", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 34 ]
[ null ]
[ 43 ]
[ 65 ]
2024-11-18T21:58:17.178814+00:00
1,477,588,847,000
725c4b119ec1415512d592114c420c8fdb4845d8
3
{ "blob_id": "725c4b119ec1415512d592114c420c8fdb4845d8", "branch_name": "refs/heads/master", "committer_date": 1477588847000, "content_id": "ef6a5fdb70394d27d87e0f665519ea32dcf5e2d0", "detected_licenses": [ "MIT" ], "directory_id": "31747052a9faa081e61e52506585ef409dcf3a2c", "extension": "py", "fi...
3.03125
stackv2
#!/usr/bin/python # -*- coding: utf-8 -*- """ Cipher """ __author__ = 'Zagfai' __date__ = '2016-08' import hashlib import M2Crypto.EVP import M2Crypto.Rand ciphers = { 'aes-128-cfb': (16, 16), 'aes-256-cfb': (32, 16), 'camellia-256-cfb': (32, 16), } def random_string(length): return M2Crypto.Rand....
90
23.36
69
14
656
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_f74cf8e5de3c2ffb_4753ebc7", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi...
[ 36 ]
[ null ]
[ 20 ]
[ 24 ]
2024-11-18T21:58:21.516580+00:00
1,645,573,682,000
2323738506f0651a61d18651cac6b5d8756e60fc
3
{ "blob_id": "2323738506f0651a61d18651cac6b5d8756e60fc", "branch_name": "refs/heads/master", "committer_date": 1645573682000, "content_id": "69d1b7a09020f94cada68900618b3a8a1cba1676", "detected_licenses": [ "MIT" ], "directory_id": "d6ae08228f1b36bd0fc9d169120d080444563e21", "extension": "py", "fi...
2.609375
stackv2
import mysql.connector from flask import Flask, jsonify, abort, request, redirect, url_for from mysql.connector import Error GET = "GET" POST = "POST" LOCALHOST = "0.0.0.0" app = Flask(__name__) app.config.from_object('config') def sql_query(query): try: connection = mysql.connector.connect( ...
82
28.37
133
16
571
python
[{"finding_id": "codeql_py/flask-debug_c4b1ca2f5aeb43ad_08d2174b", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-089" ]
[ "py/flask-debug", "py/sql-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This SQL query depends on a [user-provided value](1)." ]
[ 82, 24 ]
[ null, null ]
[ 5, 28 ]
[ 65, 33 ]
2024-11-18T21:58:35.504872+00:00
1,591,557,524,000
8f3fd97eb403c5ceffb9130a2a9417d562a60fa9
3
{ "blob_id": "8f3fd97eb403c5ceffb9130a2a9417d562a60fa9", "branch_name": "refs/heads/master", "committer_date": 1591557524000, "content_id": "e98c5f8ebe33385858e793e93cfb65e25ce9c91f", "detected_licenses": [ "MIT" ], "directory_id": "a8e30c94e1207220e6ae943e1d90ffa2bf9ce004", "extension": "py", "fi...
3.171875
stackv2
# Script to check subdomain of the websites using Certificate transperancy logs # 100daysCodingChallenge # Level: Easy import requests import sys args_length = len(sys.argv) - 1 if args_length < 1: print("Enter the domain name for search") sys.exit(1) def get_subdomains(url): """ Takes a URL and ...
57
23.98
104
15
330
python
[{"finding_id": "codeql_py/request-without-cert-validation_2b26c6c1ddcafcbc_c29e98ac", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 34 ]
[ null ]
[ 16 ]
[ 47 ]
2024-11-18T23:10:59.727042+00:00
1,621,843,309,000
c799da0489be0d5029bc2b86d853467bb894edd9
3
{ "blob_id": "c799da0489be0d5029bc2b86d853467bb894edd9", "branch_name": "refs/heads/main", "committer_date": 1621922858000, "content_id": "df0d9da4dc8257973d0a12702146b6ccbb0a128e", "detected_licenses": [ "BSD-3-Clause", "MIT" ], "directory_id": "3a6a211ea0d32405497fbd6486c490bb147e25f9", "exten...
2.78125
stackv2
# (c) 2005 Ian Bicking and contributors; written for Paste (http://pythonpaste.org) # Licensed under the MIT license: http://www.opensource.org/licenses/mit-license.php import cgi import six import re from six.moves import html_entities from six.moves.urllib.parse import quote, unquote __all__ = ['html_quote', 'html...
85
25.11
84
17
599
python
[{"finding_id": "codeql_py/overly-large-range_8b3a93d2c3d28364_14028ab4", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[\\u000e\\u000f\\u0010\\u0011\\u0012\\u0013\\u0014\\u...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[\\u000e\\u000f\\u0010\\u0011\\u0012\\u0013\\u0014\\u0015\\...." ]
[ 68 ]
[ null ]
[ 36 ]
[ 39 ]
2024-11-18T22:05:52.974032+00:00
1,604,653,091,000
1955226eb2d73529a46601da42037750ccbeb699
3
{ "blob_id": "1955226eb2d73529a46601da42037750ccbeb699", "branch_name": "refs/heads/master", "committer_date": 1604653091000, "content_id": "b8574bbbf9448f585c0fbc42d67d7034f85251c7", "detected_licenses": [ "MIT" ], "directory_id": "34ba661c593167e2aaa4da6cda5a638524ea8823", "extension": "py", "fi...
2.8125
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- """ Sample script to reboot iRMC via iRMC Redfish API in Fujitsu PRIMERGY """ import sys import argparse import requests import json import urllib3 urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning) __author__ = "Masahiro Murayama" __version__ = "0.0...
58
22.12
77
15
356
python
[{"finding_id": "codeql_py/request-without-cert-validation_b06ea55b05e541bc_dbfe6a5d", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 24 ]
[ null ]
[ 16 ]
[ 71 ]
2024-11-18T22:35:56.006415+00:00
1,690,503,684,000
6ebdbbe6845dbb048dd282d4b5dd4aad54c05868
2
{ "blob_id": "6ebdbbe6845dbb048dd282d4b5dd4aad54c05868", "branch_name": "refs/heads/master", "committer_date": 1690562178000, "content_id": "31717bccda8f939ae79b19e42004a8d75d89e184", "detected_licenses": [ "Apache-2.0" ], "directory_id": "5a1693639a49f08bbf389b1612bedb694c8c4e61", "extension": "py"...
2.359375
stackv2
#!/usr/bin/python3 # # Copyright (c) 2020-2023 Wind River Systems, Inc. # # SPDX-License-Identifier: Apache-2.0 # from argparse import ArgumentParser import getpass import mechanize import re import six import ssl import sys import urllib def main(): parser = ArgumentParser(description="OIDC authentication") ...
194
30.18
79
16
1,367
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_439f0f399d8b1345_8924a202", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 63 ]
[ null ]
[ 15 ]
[ 38 ]
2024-11-18T22:36:01.587001+00:00
1,608,239,720,000
c69ca50f0c5d96f4760d71bc9d478fa886af1063
3
{ "blob_id": "c69ca50f0c5d96f4760d71bc9d478fa886af1063", "branch_name": "refs/heads/main", "committer_date": 1608239720000, "content_id": "2560c9bc1b92b4ef3e80e471a34a319984d19422", "detected_licenses": [ "MIT" ], "directory_id": "9d1d9b4d410e9b7ddf4585dbcf02e84069a4913b", "extension": "py", "file...
2.5625
stackv2
import os import re from datetime import date, datetime import requests from django.conf import settings from django.contrib import messages from django.shortcuts import redirect, render from django.views import View from django.views.generic import ListView from .models import Show class ShowManager(): ...
176
33.64
131
19
1,270
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_98c0150d14c72b68_d0b1d192", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text." ]
[ 99 ]
[ null ]
[ 29 ]
[ 45 ]
2024-11-18T22:36:03.015494+00:00
1,413,795,734,000
e72d1b9f985b7e42fd18065f67ec71b03cb4186c
3
{ "blob_id": "e72d1b9f985b7e42fd18065f67ec71b03cb4186c", "branch_name": "refs/heads/master", "committer_date": 1413795734000, "content_id": "b3fea2a857047d1f8e6a2c41dc18d3ca2670df0c", "detected_licenses": [ "Apache-2.0" ], "directory_id": "dd7a284935058a66ed28c521ba7742b04be9c31e", "extension": "py"...
2.578125
stackv2
#coding=utf-8 import paramiko,datetime,thread from xml.etree.ElementTree import ElementTree class RestServer(): def __init__(self,lab_vm_path,host_authentication_path): self.__lock = thread.allocate_lock() self.__max_iter=100 self.created_time = datetime.datetime.now() ...
188
39.32
118
20
1,654
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_4588b283f29c13a6_afa6dad7", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 49 ]
[ null ]
[ 13 ]
[ 73 ]
2024-11-18T22:48:19.998326+00:00
1,537,139,190,000
f1bae3b1db5caa33c71647e9bfdb96ee49668ee1
3
{ "blob_id": "f1bae3b1db5caa33c71647e9bfdb96ee49668ee1", "branch_name": "refs/heads/master", "committer_date": 1537139190000, "content_id": "6aba2dc0bdca3b0e139c90d90d7cc1bff8a1a751", "detected_licenses": [ "Apache-2.0" ], "directory_id": "d190750d6cb34e9d86ae96724cf4b56a2f57a74a", "extension": "py"...
2.546875
stackv2
from __future__ import absolute_import from __future__ import division from __future__ import print_function import argparse import os import sys from six.moves import urllib if sys.version_info < (3, 0): reload(sys) sys.setdefaultencoding('utf8') def parse_rst(rst_url, tmp_rst_file_path='tmp/rst'): """Parse...
452
32.31
79
22
3,270
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_8147aadf4c711df9_d4a323ee", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 258 ]
[ null ]
[ 15 ]
[ 54 ]
2024-11-18T23:25:53.675107+00:00
1,596,496,357,000
72117b4528d9593fcd7f06cfdc1d8aadf5e0a24c
2
{ "blob_id": "72117b4528d9593fcd7f06cfdc1d8aadf5e0a24c", "branch_name": "refs/heads/master", "committer_date": 1596496357000, "content_id": "f89d4dd49fca93a0adc574ea14c3e9800118709b", "detected_licenses": [ "MIT" ], "directory_id": "cee0b30b1bd3bb834ea35ff6688258f0ba67fd33", "extension": "py", "fi...
2.3125
stackv2
#!usr/bin/env python3.7 import time import os import sys from sys import argv import re import json import multiprocessing import requests from base.Configurations import * from urllib.request import urlopen from subprocess import check_output, CalledProcessError import subprocess import threading from data.index i...
314
33.85
133
21
3,150
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_a071564b0ad07655_5f0cd215", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [.serveo.net](1) may be at an arbitrary position in the...
3
true
[ "CWE-020", "CWE-312", "CWE-312" ]
[ "py/incomplete-url-substring-sanitization", "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "The string [.serveo.net](1) may be at an arbitrary position in the sanitized URL.", "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression log...
[ 215, 288, 289 ]
[ null, null, null ]
[ 12, 23, 11 ]
[ 34, 124, 14 ]
2024-11-18T23:25:58.850741+00:00
1,569,901,609,000
cff762e25051119debe872427bbca3c0da13dc32
3
{ "blob_id": "cff762e25051119debe872427bbca3c0da13dc32", "branch_name": "refs/heads/master", "committer_date": 1569901609000, "content_id": "e76c88818465e451f417198b3ac110cd2188cf9f", "detected_licenses": [ "MIT" ], "directory_id": "9a71988e650cabc657707bb58897e5f7b24053ff", "extension": "py", "fi...
2.65625
stackv2
from datetime import datetime import requests from urllib.error import HTTPError import json import re from dateutil.parser import parse class Scrape: def __init__(self, start_time): self.scrape_start = datetime.now() self.scrape_end = None self.char_count = 0 self.min_ilvl = 0.0 ...
82
33.11
89
19
644
python
[{"finding_id": "codeql_py/overly-large-range_a8eceb9db1a5cda6_784c59ab", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 49 ]
[ null ]
[ 61 ]
[ 64 ]
2024-11-18T23:26:01.063082+00:00
1,451,310,651,000
78adfa77ce5e0cc4ce2b80855ea4c9aec05d7ffc
3
{ "blob_id": "78adfa77ce5e0cc4ce2b80855ea4c9aec05d7ffc", "branch_name": "refs/heads/master", "committer_date": 1451310651000, "content_id": "8b540bcae16b485852c4c1b3356a7c0d8a23714d", "detected_licenses": [ "Apache-2.0" ], "directory_id": "276baddd5665949c334b31f5c4e07356111c90c3", "extension": "py"...
3.375
stackv2
#hash1.py import hashlib md5=hashlib.md5() md5.update('how to use md5 in python hashlib?') print md5.hexdigest() md5=hashlib.md5() md5.update('how to use md5 in') md5.update('python hashlib?') print md5.hexdigest() sha1=hashlib.sha1() sha1.update('how to use sha1 in') sha1.update('python shalib?') print sha1.hexdig...
43
18.53
47
9
329
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_1bbeb5e63bfaf61b_5202acf3", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi...
[ 21 ]
[ null ]
[ 13 ]
[ 21 ]
2024-11-18T23:26:04.814687+00:00
1,632,335,711,000
515766ff4d0d0cb9570784f37b9dc7185c63ee58
3
{ "blob_id": "515766ff4d0d0cb9570784f37b9dc7185c63ee58", "branch_name": "refs/heads/master", "committer_date": 1632335711000, "content_id": "24fa14ff6593823a3ea2c47c50aff8479156bb0d", "detected_licenses": [ "Apache-2.0" ], "directory_id": "745f58a02e94343f67fa5b5af5915aee2b2c9aa7", "extension": "py"...
2.765625
stackv2
import paramiko import logging import os logger = logging.getLogger(__name__) class SSHClient(): def __init__(self, ip_address, ssh_credentials): self.ip_address = ip_address self.ssh_credentials = ssh_credentials self.ssh_client = None if 'key_filename' in self.ssh_credentials ...
104
31.28
86
16
715
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_556087bb7d9a6820_fb6cb8a9", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 33 ]
[ null ]
[ 9 ]
[ 78 ]
2024-11-18T23:26:05.391353+00:00
1,568,828,945,000
19d57236cccc32bac6545b0a812287e30913a3cd
3
{ "blob_id": "19d57236cccc32bac6545b0a812287e30913a3cd", "branch_name": "refs/heads/master", "committer_date": 1568828945000, "content_id": "8bcaedda57bb0aab65cf3531755dc5bee9881840", "detected_licenses": [ "MIT" ], "directory_id": "1795f78569a8dcfa6986168725619d747d88624f", "extension": "py", "fi...
2.59375
stackv2
import argparse import base64 import requests import urllib3 import re import xml.dom.minidom # Disable warnings, as XML Mgmt often has a self-signed certificate urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning) # Global for verbose logging, set via --verbose argument VERBOSE = False def get_user...
104
27.56
132
12
692
python
[{"finding_id": "codeql_py/request-without-cert-validation_3b9e682b392953ee_4a6ef272", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 79 ]
[ null ]
[ 9 ]
[ 74 ]
2024-11-18T22:48:15.996257+00:00
1,545,744,926,000
9f847380453ea35116ac3c0723faca1d37a2c84e
3
{ "blob_id": "9f847380453ea35116ac3c0723faca1d37a2c84e", "branch_name": "refs/heads/master", "committer_date": 1545744926000, "content_id": "532f206d59541268a0fd997a5a4ee57a2892615a", "detected_licenses": [ "MIT" ], "directory_id": "7f7dc46f18fe565cc49ff6c088047850189ea12d", "extension": "py", "fi...
2.578125
stackv2
import asyncio import random import json import re from .responses import send_error base_dir = "/home/ninhdo/discord/" challenges_path = base_dir + "challenges.json" challenge_regex = "[A-z0-9\.\,\' \(\)]+" async def fortnite_random_challenge(channel): with open(challenges_path) as f: challenges = json.load(f) ...
81
33.91
92
17
690
python
[{"finding_id": "codeql_py/overly-large-range_8fb32b3a7fe2bcbf_52898b01", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 10 ]
[ null ]
[ 21 ]
[ 24 ]
2024-11-18T22:27:18.288850+00:00
1,458,976,673,000
dc180e17f286604ed6650c09bf7b3eff1ca98cf5
3
{ "blob_id": "dc180e17f286604ed6650c09bf7b3eff1ca98cf5", "branch_name": "refs/heads/master", "committer_date": 1458976673000, "content_id": "f7108b18f3cafb6b5f9f52bb095ed18dd1b80111", "detected_licenses": [ "MIT" ], "directory_id": "a1216bad0b2d2d1db66d4ccdb45cc4a9938f5e47", "extension": "py", "fi...
2.6875
stackv2
# !/usr/bin/env python # -*- coding:utf-8 -*- from bs4 import BeautifulSoup import urlparse import re class Parser(object): def _pre_test(self, url, soup): bad_links = {} if soup.title == "手机搜狐" and url != 'http://m.sohu.com': bad_links[url] = 404 # todo:坏链处理。。。 ...
48
29.42
80
17
355
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_84779456bf2d7cb7_6e5706cd", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [http://m.sohu.com](1) may be at an arbitrary position ...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [http://m.sohu.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 29 ]
[ null ]
[ 18 ]
[ 59 ]
2024-11-18T22:27:26.283611+00:00
1,490,657,206,000
7815bac0c6e0f5ea38b8cc7929c76b2db86c9d69
2
{ "blob_id": "7815bac0c6e0f5ea38b8cc7929c76b2db86c9d69", "branch_name": "refs/heads/master", "committer_date": 1490657206000, "content_id": "8dddba289ced193969dbe6e7a5ebc8be3a53dd27", "detected_licenses": [ "MIT" ], "directory_id": "504d7684ab92c853433d8a03096e5650aba61632", "extension": "py", "fi...
2.484375
stackv2
# -*- coding: utf-8 -*- """ Defines the Layout class. """ from __future__ import print_function import os from os import path import inspect import shutil import stat from collections import namedtuple, defaultdict from subprocess import Popen from flask import Markup from jinja2 import Environment, FileSystemLoader...
302
30.62
89
18
1,946
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_9c33dcd0f34926f0_c1f78e4c", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 202 ]
[ 206 ]
[ 15 ]
[ 10 ]
2024-11-18T22:27:43.537433+00:00
1,420,652,029,000
9c76461bd413cb8464ef52c55b267020f862e24a
3
{ "blob_id": "9c76461bd413cb8464ef52c55b267020f862e24a", "branch_name": "refs/heads/master", "committer_date": 1420652029000, "content_id": "6e6669b5cf3efa5ccfd22786619fee5e9af52a74", "detected_licenses": [ "MIT" ], "directory_id": "72c65ab014d5589eeb034568f855ac159fc552aa", "extension": "py", "fi...
2.5625
stackv2
__author__ = 'hujin' import json from twisted.internet import reactor from twisted.web.resource import Resource from twisted.web.server import NOT_DONE_YET from twisted.python.failure import Failure """ API GET /services Get a list of services GET /services/:id Get information of a service PUT /services/:id ...
146
24.84
87
16
787
python
[{"finding_id": "codeql_py/reflective-xss_75c5e2a27fa26a63_8da23d26", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 110 ]
[ null ]
[ 20 ]
[ 72 ]
2024-11-18T22:14:49.870859+00:00
1,605,609,755,000
ef5cb771fbfbdf44d3259f6b3c0c1312d3ea1bd1
3
{ "blob_id": "ef5cb771fbfbdf44d3259f6b3c0c1312d3ea1bd1", "branch_name": "refs/heads/master", "committer_date": 1605609755000, "content_id": "3ea0bfb1f4f1e0dd023dcd6181a114d336cf4b6e", "detected_licenses": [ "MIT" ], "directory_id": "ef5839ac714adb96f0234a8680202fcb836d12f2", "extension": "py", "fi...
2.953125
stackv2
#!/usr/bin/env python3 import fuzzy from timeit import default_timer as timer from collections import Counter from reader import load_sanctions from dataobjects import NamePart from dataobjects import NameAlias dmeta = fuzzy.DMetaphone() import normalizer def find_noise_words(id_to_name): """ Finds the mos...
315
45.64
152
18
3,286
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_de48c99a689b1f32_7188975b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 286 ]
[ null ]
[ 15 ]
[ 149 ]
2024-11-18T22:14:57.350771+00:00
1,660,786,164,000
14cc0f7d6c3996de8572d2d1510bb6111aaf8113
3
{ "blob_id": "14cc0f7d6c3996de8572d2d1510bb6111aaf8113", "branch_name": "refs/heads/master", "committer_date": 1660786164000, "content_id": "76e4f7475f53139ee15060984724ca3c2fd5a763", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "6bebc30cedd75e2e417add03e9e759ae39efbee5", "extension": "p...
2.890625
stackv2
import os import sys from functools import wraps def redirect_stdout_stderr(f): '''a decorator to add keyword stdout, stderr to the function args if stdout, stderr is not None, redirect the stdout, stderr to the respective files. ''' @wraps(f) def f_decorated(*args, **kwargs): try: ...
38
31.39
72
17
273
python
[{"finding_id": "codeql_py/overly-permissive-file_17a36ddaada136fa_3c706cab", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in open sets file to world readable.", "remediation": "", "location": {...
2
true
[ "CWE-732", "CWE-732" ]
[ "py/overly-permissive-file", "py/overly-permissive-file" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Overly permissive mask in open sets file to world readable.", "Overly permissive mask in open sets file to world readable." ]
[ 23, 17 ]
[ null, null ]
[ 25, 25 ]
[ 73, 73 ]
2024-11-18T22:14:57.586604+00:00
1,424,118,744,000
0c8faf33c2d10bf5307224c09fd80b8068ed5d95
2
{ "blob_id": "0c8faf33c2d10bf5307224c09fd80b8068ed5d95", "branch_name": "refs/heads/master", "committer_date": 1424118744000, "content_id": "5c014b3fe33616f85a8445fc409e11ce510f82c4", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "4c84fcc98fe5c0c8d2d4fbf6f35697e8bfd95960", "extension": "p...
2.40625
stackv2
import asyncio import logging import simplejson as json import cryptacular.bcrypt from aiorm import orm log = logging.getLogger(__name__) bcrypt = cryptacular.bcrypt.BCRYPTPasswordManager() class ModelError(Exception): """ A base Exception for models validation """ class Table: """ A class that initial...
172
31.53
77
18
1,230
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_322af67bd8ea1dc1_90590bf8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 147, 148 ]
[ null, null ]
[ 18, 18 ]
[ 38, 31 ]
2024-11-18T22:15:05.507919+00:00
1,507,487,094,000
dafa07df584291f3e1b30e672e7357fdea86f344
3
{ "blob_id": "dafa07df584291f3e1b30e672e7357fdea86f344", "branch_name": "refs/heads/master", "committer_date": 1507487094000, "content_id": "30671f562c1df7b4ad600903b48311e213f91828", "detected_licenses": [ "MIT" ], "directory_id": "ea0580739e2bdade7785ae5d955ad541e00dba71", "extension": "py", "fi...
2.53125
stackv2
#!/usr/bin/python # -*- coding: utf-8 -*- import StringIO import base64 from flask import request, redirect, url_for, render_template, Blueprint import json import glob import time from uuid import uuid4 import random from PIL import Image import os app = Blueprint('steganography', __name__, static_folder='static') ...
211
36.21
127
21
2,166
python
[{"finding_id": "codeql_py/path-injection_cb2194f799ac3bf2_267a5670", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 187 ]
[ null ]
[ 26 ]
[ 30 ]
2024-11-18T22:55:40.768642+00:00
1,628,794,924,000
41f87674071b656814b6d11f2fb1b8b806240701
3
{ "blob_id": "41f87674071b656814b6d11f2fb1b8b806240701", "branch_name": "refs/heads/main", "committer_date": 1628794924000, "content_id": "8206a1463a16592c1f035f6f2aa023fccfdb6cc9", "detected_licenses": [ "MIT" ], "directory_id": "66daee58ac4357d63b98c2c8cab52919ff0c2600", "extension": "py", "file...
2.875
stackv2
import tkinter as tk from tkinter import ttk from tkinter import filedialog, messagebox, simpledialog from PIL import Image, ImageTk from ecg import * import matplotlib.image as mpimg from matplotlib.backends.backend_tkagg import FigureCanvasTkAgg import base64 import io import requests from matplotlib import pyplot as...
275
30.09
79
15
2,079
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_73f5858b6a388884_d3730347", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 75 ]
[ null ]
[ 15 ]
[ 24 ]
2024-11-18T23:23:58.965893+00:00
1,691,874,965,000
f95ea6b79df0db572c2a441cba6f9e7310f956a6
2
{ "blob_id": "f95ea6b79df0db572c2a441cba6f9e7310f956a6", "branch_name": "refs/heads/master", "committer_date": 1691874965000, "content_id": "7e34ed6219cf0122867ce8fb5862df05fbdd5893", "detected_licenses": [ "MIT" ], "directory_id": "f5efaf91c0fde47b73fff89f5dd7951975485194", "extension": "py", "fi...
2.421875
stackv2
import datetime from flask import jsonify, request, url_for, make_response, Response from flask.wrappers import Request from json import dumps from schema import SchemaError from typing import Any, Tuple, Union from . import app, log, dataset assert app is not None assert log is not None # # Convenience functions t...
199
27.8
79
18
1,504
python
[{"finding_id": "codeql_py/stack-trace-exposure_ff5f9d91884b43b9_783ba437", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.\n[S...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.\n[Stack trace information](2) flows to this location and may be exposed to an external user." ]
[ 18 ]
[ null ]
[ 47 ]
[ 50 ]
2024-11-18T22:56:19.262847+00:00
1,567,178,168,000
c77c736c81a3dee4b5045b65bea83dbb5e39a449
3
{ "blob_id": "c77c736c81a3dee4b5045b65bea83dbb5e39a449", "branch_name": "refs/heads/master", "committer_date": 1567178760000, "content_id": "8c4dcab60b7738aaaf8a84252b9f5cd4dba2b051", "detected_licenses": [ "Apache-2.0" ], "directory_id": "07d6ee8f22dbe1a60af1584657373e6913afcc13", "extension": "py"...
2.921875
stackv2
#! /usr/bin/env python3 # proxyget.py """ Simple library for retrieving websites and online files through a proxy """ import functools import json import string from getpass import getpass, getuser from pathlib import Path from typing import Any, Dict, Mapping, NamedTuple, Optional, Union from warnings import warn im...
335
30.77
83
18
2,469
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4ca049bde7c487ec_90d2f5b2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text." ]
[ 180 ]
[ null ]
[ 15 ]
[ 37 ]
2024-11-19T00:07:16.524520+00:00
1,632,872,375,000
bc2fe5721571d144b31a621e42126448c8a5733f
2
{ "blob_id": "bc2fe5721571d144b31a621e42126448c8a5733f", "branch_name": "refs/heads/master", "committer_date": 1632872375000, "content_id": "4c21500c6c5ec9e921ec8369e34767551899d5ce", "detected_licenses": [ "MIT" ], "directory_id": "df867bb68495bafd7525132a0f4dd35d926bc517", "extension": "py", "fi...
2.40625
stackv2
import requests from data import ui def consultar(lang): Sair=False while(Sair==False): placa_input = ui.input_dialog() placa_data = requests.get('https://apicarros.com/v1/consulta/{}/json'.format(placa_input), verify = False).json() # JSQ7436 try: if (placa_data['codigoRetor...
36
34.64
131
16
434
python
[{"finding_id": "codeql_py/request-without-cert-validation_02bc0031528a82bb_522d9099", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 7 ]
[ null ]
[ 22 ]
[ 115 ]
2024-11-19T00:07:29.549434+00:00
1,587,408,546,000
ebb80fde6113ff9c09375561d54d8d018e04e3d3
2
{ "blob_id": "ebb80fde6113ff9c09375561d54d8d018e04e3d3", "branch_name": "refs/heads/master", "committer_date": 1587408546000, "content_id": "dc27635388a07356f30be2f238714dbba1ab1cfc", "detected_licenses": [ "Apache-2.0" ], "directory_id": "4968a1d9ec3447034b04da4fc59f9c5ea88c908a", "extension": "py"...
2.328125
stackv2
import json import requests requests.packages.urllib3.disable_warnings() import logging import os import sys logger = logging.getLogger('avisession') #logger.setLevel(logging.DEBUG) #ch = logging.StreamHandler(sys.stdout) #ch.setLevel(logging.DEBUG) #logger.addHandler(ch) class ObjectNotFound(Exception): pass cl...
321
39.76
102
18
2,890
python
[{"finding_id": "codeql_py/request-without-cert-validation_de1d1c828fe7de12_79c252e2", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 43 ]
[ 44 ]
[ 15 ]
[ 54 ]
2024-11-19T00:45:04.400939+00:00
1,497,868,116,000
bfff4f8191f969ebf26ab0a410365d848e65ab33
2
{ "blob_id": "bfff4f8191f969ebf26ab0a410365d848e65ab33", "branch_name": "refs/heads/master", "committer_date": 1497868116000, "content_id": "7ce3589ed199ff3930c88e51d544fbbec5a535d2", "detected_licenses": [ "MIT" ], "directory_id": "a37cb8941250a2378348b9f2119fb82bac83a903", "extension": "py", "fi...
2.34375
stackv2
__author__ = 'Britefury' import os, tarfile, cPickle import numpy as np from britefury_lasagne import dataset def _download_cifar10(filename='cifar-10-python.tar.gz', source='http://www.cs.toronto.edu/~kriz/'): return dataset.download_data(filename, source + filename) def _convert_batch(b): return b['dat...
64
34.95
120
15
693
python
[{"finding_id": "codeql_py/tarslip_7df21bb400f95fea_1ac92567", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 36 ]
[ null ]
[ 9 ]
[ 45 ]
2024-11-19T00:45:04.560289+00:00
1,623,063,741,000
d1a2bd46ac66d3d6518668cced6cad6435252cea
2
{ "blob_id": "d1a2bd46ac66d3d6518668cced6cad6435252cea", "branch_name": "refs/heads/main", "committer_date": 1623063741000, "content_id": "542e9b55ea4a7c6e6c2727b77ccbbea457a2e0a5", "detected_licenses": [ "MIT" ], "directory_id": "f3159749142a9b143c622780bbb414d08f71fead", "extension": "py", "file...
2.390625
stackv2
import json from rest_framework.views import APIView from rest_framework.response import Response from rest_framework.permissions import IsAuthenticated from django.http import JsonResponse from django.contrib.auth import get_user_model from django.db import IntegrityError from django.contrib.auth import authenticate, ...
295
33.07
98
19
1,991
python
[{"finding_id": "codeql_py/stack-trace-exposure_dce4dcfcda4afa71_07744ef8", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
4
true
[ "CWE-209", "CWE-209", "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information...
[ 144, 219, 282, 295 ]
[ null, null, null, null ]
[ 29, 29, 29, 29 ]
[ 33, 33, 33, 33 ]
2024-11-18T23:39:44.016566+00:00
1,642,621,147,000
7d96721aaa638b477af9ce6ffe43462004589773
3
{ "blob_id": "7d96721aaa638b477af9ce6ffe43462004589773", "branch_name": "refs/heads/master", "committer_date": 1642621147000, "content_id": "00c986cd14706745f5380cfa0a6e25e242b00e5e", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "7de8f47b851bf96c4e7c336deb713c69de91e4e3", "extension": "p...
2.5625
stackv2
""" Simple code for gathering forecasts and adjusting the power factors for multiple DER devices @author: cwhanse, jjohns2 """ import requests from requests.auth import HTTPBasicAuth import json import pandas as pd class CE_API(object): def __init__(self, username=None, password=None): self.proxy = {'...
155
35.28
115
19
1,334
python
[{"finding_id": "codeql_py/request-without-cert-validation_67f09b72a38913fa_e236096e", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
4
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 71, 100, 120, 124 ]
[ 73, 102, 122, 126 ]
[ 24, 16, 24, 24 ]
[ 51, 43, 67, 67 ]
2024-11-18T23:39:45.516932+00:00
1,684,830,686,000
8a31eab9a6bcbba895f5083a7dc861871f12ff48
3
{ "blob_id": "8a31eab9a6bcbba895f5083a7dc861871f12ff48", "branch_name": "refs/heads/master", "committer_date": 1684830686000, "content_id": "7a0c28514ad2cc772e30a7c0d938556851eda070", "detected_licenses": [ "MIT" ], "directory_id": "860ad5b78ca17ef9640549d7114078ea505c2b31", "extension": "py", "fi...
2.859375
stackv2
import re def remove_animation(content): return re.sub(re.compile("<!--.*?-->"), "", str(content.text)) def upto_level(content, level): out = content.text for ss in [ x[0] for x in re.findall( re.compile( "(\s*.*<!--.*?level=(\d+)*.*?-->)" ), # FI...
21
22.1
66
13
125
python
[{"finding_id": "codeql_py/redos_c03486de473878bf_4940bc43", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '<!--level=' and containing many r...
2
true
[ "CWE-1333", "CWE-116" ]
[ "py/redos", "py/bad-tag-filter" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '<!--level=' and containing many repetitions of '9'.", "This regular expression does not match comments containing newlines." ]
[ 14, 5 ]
[ null, null ]
[ 38, 31 ]
[ 41, 41 ]
2024-11-18T23:40:01.415995+00:00
1,573,456,994,000
c3eb7bf28a9121161cab812ac8f088b95210786b
3
{ "blob_id": "c3eb7bf28a9121161cab812ac8f088b95210786b", "branch_name": "refs/heads/master", "committer_date": 1573456994000, "content_id": "5db48a2cc896fe7108ed36c7d155d35a18819388", "detected_licenses": [ "MIT" ], "directory_id": "71f1613bd424d6f46e00156c51dcee0b77e1eb21", "extension": "py", "fi...
3.21875
stackv2
#!/usr/bin/env python3.6 from users import Users from credentials import Credentials import random def create_user(username,firstname,lastname,birthmonth,password): ''' function to create a new account ''' new_users = Users(username,firstname,lastname,birthmonth,password) return new_users def crea...
196
30.28
160
24
1,134
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5de03c277de26979_aadcbfe1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 141, 148, 155 ]
[ null, null, null ]
[ 31, 27, 35 ]
[ 62, 99, 160 ]
2024-11-19T00:19:24.980768+00:00
1,561,408,501,000
7389ca59c6421b2075ed03ea0472b8187afee92f
3
{ "blob_id": "7389ca59c6421b2075ed03ea0472b8187afee92f", "branch_name": "refs/heads/master", "committer_date": 1561408501000, "content_id": "360d79ed46477f76a91f1f7c5a3a4b334b3c0a98", "detected_licenses": [ "MIT" ], "directory_id": "9ccfe921acb5d3940e887f2dae337f5de04ad34d", "extension": "py", "fi...
2.796875
stackv2
# app.py - a minimal flask api using flask_restful from flask import Flask, request from flask_restful import Resource, Api app = Flask(__name__) api = Api(app) class HelloWorld(Resource): def get(self): return {'hello': 'world'} api.add_resource(HelloWorld, '/') @app.route("/reverse") def hello(): ...
24
19.58
52
11
126
python
[{"finding_id": "codeql_py/flask-debug_61012f3d5fbfadc6_d589efa3", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 24, 21 ]
[ null, null ]
[ 5, 12 ]
[ 40, 24 ]
2024-11-19T01:11:35.243751+00:00
1,494,917,096,000
23f94c66ec6e82e62b5cbc81242213ee4919d9ce
3
{ "blob_id": "23f94c66ec6e82e62b5cbc81242213ee4919d9ce", "branch_name": "refs/heads/master", "committer_date": 1494917096000, "content_id": "2071482680a36257cf5b4d4e014bbb4c4b92fb51", "detected_licenses": [ "MIT" ], "directory_id": "a62b97ac693c9614a7926d890bfb199864b5a9c9", "extension": "py", "fi...
2.53125
stackv2
import requests from flask import Flask,render_template,request,redirect,url_for app=Flask(__name__) API_KEY = "XXXXXXXXXXXXX" ENDPOINT = "http://api.giphy.com" @app.route("/",methods = ["GET","POST"]) def home(): if request.method == 'POST': if request.form['submit'] == 'Trending': return tr...
91
29.77
93
15
741
python
[{"finding_id": "codeql_py/flask-debug_4b01a2fc0b1552a0_7e37a5ff", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-918" ]
[ "py/flask-debug", "py/partial-ssrf" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 91, 84 ]
[ null, null ]
[ 2, 9 ]
[ 21, 43 ]
2024-11-19T01:11:41.817814+00:00
1,627,216,375,000
db8b48827dfd439d87ee2198122a43252e25cf38
3
{ "blob_id": "db8b48827dfd439d87ee2198122a43252e25cf38", "branch_name": "refs/heads/master", "committer_date": 1627216375000, "content_id": "f233c5c0eba1ad1f633847b25141f24ff9a829ea", "detected_licenses": [ "Unlicense" ], "directory_id": "ffcdd190fcdf809b1a53368e1835836cb35cea53", "extension": "py",...
2.859375
stackv2
#!/usr/bin/env python3 import json import csv import os.path import requests __author__ = "Alexander Popov" __version__ = "2.1.0" __license__ = "Unlicense" def get_pages(username, api_key, limit=200): """ Getting the number of pages with scrobbling data """ response = requests.get( "https://ws.audi...
138
27.35
83
19
974
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_6c141665ee749ca1_5cacf0d7", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.", "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text." ]
[ 64, 81 ]
[ null, null ]
[ 21, 21 ]
[ 25, 25 ]
2024-11-18T23:48:09.580221+00:00
1,521,909,078,000
2c8fb58012d98d9dabd6f735542bba56834755d2
3
{ "blob_id": "2c8fb58012d98d9dabd6f735542bba56834755d2", "branch_name": "refs/heads/master", "committer_date": 1521909078000, "content_id": "7873f1d69d7656627cc51afb380680a136cf4f58", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "f801c4abf7fabdd9ef6c6f84c52383fd4218725a", "extension": "p...
2.96875
stackv2
# Parsing JSON from web import urllib.request, urllib.parse, urllib.error import ssl import json # key = "" # Google Geocoding JSON interface url google_geocoidng_json = "https://maps.googleapis.com/maps/api/geocode/json?" # dr_chuck_jeojson = "http://py4e-data.dr-chuck.net/geojson?" # Ignore security certificates ct...
74
37.18
97
12
632
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_16db5d22645bbac3_d50ef51b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](1) as clear text." ]
[ 73 ]
[ null ]
[ 26 ]
[ 39 ]
2024-11-19T00:44:24.720158+00:00
1,494,355,716,000
25746364013b0b6d48c9478332fd473c1c6e0d92
3
{ "blob_id": "25746364013b0b6d48c9478332fd473c1c6e0d92", "branch_name": "refs/heads/master", "committer_date": 1494355716000, "content_id": "f723ef9aa14fada584f3eac9662af0e1a0efc756", "detected_licenses": [ "MIT" ], "directory_id": "12716bf2ec47d2c50eb331d164904f05a8e4a736", "extension": "py", "fi...
2.625
stackv2
""" Python program that generates information about a Virtual Machine's vNICs and hard disks """ from __future__ import print_function from pyVim.connect import SmartConnect, Disconnect from pyVmomi import vmodl, vim from datetime import datetime import argparse import atexit import getpass # Alter this to change t...
140
42.09
128
18
1,307
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_87854462c280722f_e6ebcf55", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 90, 94 ]
[ null, null ]
[ 47, 55 ]
[ 62, 64 ]
2024-11-19T00:44:30.793818+00:00
1,457,058,336,000
01355a56e5a620f424ae2ba43a472b8b91003497
2
{ "blob_id": "01355a56e5a620f424ae2ba43a472b8b91003497", "branch_name": "refs/heads/master", "committer_date": 1457058336000, "content_id": "e1f9d3abb7d5c99cc8bf3d509b04b72e13be4754", "detected_licenses": [ "MIT" ], "directory_id": "f78d1e6a8cd1253d9e023bafdbb4d3af1bb14417", "extension": "py", "fi...
2.390625
stackv2
# System import os, sys, socket, json from datetime import datetime # 3rd Party import requests # Local import lib.lib def genconfig(args, config): agent_root_dir = config.get('AGENT_ROOT_DIR') if agent_root_dir is None: agent_root_dir = os.path.dirname(os.path.dirname(__file__)) hostname = conf...
91
32.19
106
17
739
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_9b26268b9a320b37_a8d3c877", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive...
[ 90, 33, 81 ]
[ null, null, null ]
[ 26, 11, 15 ]
[ 30, 43, 19 ]
2024-11-18T23:05:33.931852+00:00
1,424,821,433,000
a0fea8a21ce1b2c7849095e6ec79cdc65b64881e
3
{ "blob_id": "a0fea8a21ce1b2c7849095e6ec79cdc65b64881e", "branch_name": "refs/heads/master", "committer_date": 1424821433000, "content_id": "5e7fea8a6c0bf6622940d4abbfb0174f79e02b1e", "detected_licenses": [ "MIT" ], "directory_id": "4a09febd9782573fb0b8ed92cd01f11a9504cf73", "extension": "py", "fi...
3
stackv2
""" The view module is responsible for the server side view layer of glim framework. """ from glim.core import Facade from glim.response import Response from jinja2 import Environment, PackageLoader class View: """ The view layer base class is responsible for Jinja2 integration, template data binding ...
111
25.94
77
13
585
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_2e38309610c87abd_01c5123e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 29 ]
[ 31 ]
[ 20 ]
[ 10 ]
2024-11-18T23:05:44.328831+00:00
1,589,044,220,000
5129284a465d7abde6a0565f9a28ca665a609535
3
{ "blob_id": "5129284a465d7abde6a0565f9a28ca665a609535", "branch_name": "refs/heads/master", "committer_date": 1589044220000, "content_id": "9ccf31fa1b72d85daccb3a38ac885647766c3a1e", "detected_licenses": [ "MIT" ], "directory_id": "ec81e91f7eb3314fc3d8d92954e3bbd18a9ca20f", "extension": "py", "fi...
3.21875
stackv2
# -*- coding: utf-8 -*- """Exemplo de CRUD com Python, SQLAlchemy e SQLite3""" from sqlalchemy import Column, Integer, String, create_engine from sqlalchemy.ext.declarative import declarative_base from sqlalchemy.orm import sessionmaker # Para debug utilizar ``echo=True``: # engine = create_engine('sqlite:///db.sqlit...
100
32.08
102
13
902
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fca00bd2fdbf02eb_71662dba", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
5
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive...
[ 63, 69, 75, 83, 89 ]
[ null, null, null, null, null ]
[ 15, 15, 11, 11, 11 ]
[ 94, 96, 102, 102, 102 ]
2024-11-18T23:43:00.248773+00:00
1,279,749,070,000
3eb61e8d81f5248ced1a6bbb65dc52a1fc8ce619
2
{ "blob_id": "3eb61e8d81f5248ced1a6bbb65dc52a1fc8ce619", "branch_name": "refs/heads/master", "committer_date": 1279749070000, "content_id": "4b9d79e7f3abcfa0391c3e91a3f42c8494f8965b", "detected_licenses": [ "MIT" ], "directory_id": "1be62e50309c64d1d92b8ab048ac0077cbd1275a", "extension": "py", "fi...
2.421875
stackv2
#coding: utf-8 import tempfile import logging import os from django import forms from django.db.models import Max from django.forms.models import modelformset_factory from django.utils.translation import ugettext_lazy as _ from django.core.files.uploadedfile import UploadedFile from generic_images.models import Atta...
245
32.26
104
17
1,748
python
[{"finding_id": "codeql_py/path-injection_de7015be466e3396_6bbefdd6", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 168 ]
[ null ]
[ 19 ]
[ 31 ]
2024-11-18T23:10:59.786579+00:00
1,525,020,871,000
3777b4a79567a5cc7169117d61847191e986df70
3
{ "blob_id": "3777b4a79567a5cc7169117d61847191e986df70", "branch_name": "refs/heads/master", "committer_date": 1525020871000, "content_id": "03f4dd6211987e47c21dc7e1bdb16891909a2f04", "detected_licenses": [ "MIT" ], "directory_id": "cd161682bfc2377b0df4f8b6c5f93561349fbe5d", "extension": "py", "fi...
2.765625
stackv2
''' RocketChat Realtime API. ''' import hashlib import json import logging import uuid from abc import ABC, abstractmethod from typing import ( Any, Callable, Dict, Generator, List, Optional, Union, ) from ws4py.client.threadedclient import WebSocketClient from ws4py.messaging import Text...
371
28.47
76
18
2,259
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_4201101f0115c0ab_3693d3b1", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e...
[ 266 ]
[ null ]
[ 38 ]
[ 62 ]
2024-11-19T01:21:36.991257+00:00
1,590,781,234,000
4e97976a2c778f816d9fc8b7ebfa588d1cbec61f
3
{ "blob_id": "4e97976a2c778f816d9fc8b7ebfa588d1cbec61f", "branch_name": "refs/heads/master", "committer_date": 1590781234000, "content_id": "0504ad9058a417bd9d4a29f5fd9e466663a57da3", "detected_licenses": [ "MIT" ], "directory_id": "c45d8aa27d97cd4b95bcdbdbe403919cba0c4e2c", "extension": "py", "fi...
2.578125
stackv2
#!/usr/bin/env python #coding:utf-8 #sudo apt-get install python3-pip #sudo pip3 install psutil import psutil import datetime import time import platform now_time = time.strftime('%Y-%m-%d-%H:%M:%S', time.localtime(time.time())) #User Computer network name string = platform.node() #LOUIS-NB print("Network ...
117
34.16
109
17
1,356
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1bcdab8ab7cb7ea6_bb17f1fc", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 84 ]
[ null ]
[ 19 ]
[ 48 ]
2024-11-19T01:21:50.780129+00:00
1,637,477,487,000
eee4d6c998f4a86d7787e4bb247be0052c72a0f5
3
{ "blob_id": "eee4d6c998f4a86d7787e4bb247be0052c72a0f5", "branch_name": "refs/heads/main", "committer_date": 1637477487000, "content_id": "78da46c1925312d60bc7e1b9195998c3fcabf31c", "detected_licenses": [ "MIT" ], "directory_id": "5292b03998384c0d2bb5858058892d7e45c5365b", "extension": "py", "file...
2.84375
stackv2
import os import random import subprocess import shutil max_depth = int(os.environ["MAX_DEPTH"]) name = lambda i: i % 2 left_index = lambda i: 2 * i + 1 right_index = lambda i: 2 * i + 2 parent = lambda i: (i - 1) // 2 depth = lambda i: (i + 1).bit_length() def build_node(i): d = depth(i) os.chmod(".", 0o55...
54
21.91
71
13
385
python
[{"finding_id": "codeql_py/overly-permissive-file_5f9cfee0f5f43d4f_128b38d5", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to group readable.", "remediation": "", "location": ...
2
true
[ "CWE-732", "CWE-732" ]
[ "py/overly-permissive-file", "py/overly-permissive-file" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to group readable.", "Overly permissive mask in chmod sets file to group readable." ]
[ 17, 24 ]
[ null, null ]
[ 5, 9 ]
[ 25, 34 ]
2024-11-19T00:11:33.812578+00:00
1,600,475,645,000
ed40c57deed0151a4d837519082c4f417ae7527b
2
{ "blob_id": "ed40c57deed0151a4d837519082c4f417ae7527b", "branch_name": "refs/heads/master", "committer_date": 1600475645000, "content_id": "3f0c1bbf3ff252911a81dd4740010f4eb1ea5a41", "detected_licenses": [ "Apache-2.0" ], "directory_id": "1fb4afb8bf86dffe8ff1c2e2b9ed6c3f13c848db", "extension": "py"...
2.375
stackv2
from http.server import BaseHTTPRequestHandler from urllib.parse import parse_qs import os import requests class handler(BaseHTTPRequestHandler): def do_GET(self): self.send_response(200) self.send_header('Content-type', 'text/plain') self.end_headers() print(parse_qs(self.path[2:]...
28
32.71
116
14
207
python
[{"finding_id": "codeql_py/partial-ssrf_687819b2330e050f_8feee0ef", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 25 ]
[ null ]
[ 13 ]
[ 47 ]
2024-11-19T00:11:40.925121+00:00
1,618,993,622,000
bf4f6d66b4afe7a05ef510b57e6bb04e01873362
3
{ "blob_id": "bf4f6d66b4afe7a05ef510b57e6bb04e01873362", "branch_name": "refs/heads/main", "committer_date": 1618993622000, "content_id": "59128411997874474b1c869f92251c7b596d1921", "detected_licenses": [ "MIT" ], "directory_id": "1f2761765c0550afb1631cd983fc2badd5772de7", "extension": "py", "file...
2.5625
stackv2
import urllib.request,json from .models import Sources,Article api_key = None base_url = None search_url = None article_url = None topheadline_url = None everything_url = None def configure_request(app): global api_key,base_url,search_url,topheadline_url,article_url,everything_url api_key = app.config['NEWS_API_...
163
28.29
88
12
1,007
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d31bf941fdc90ef5_1cd25b8a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
5
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive dat...
[ 26, 68, 112, 131, 151 ]
[ null, null, null, null, null ]
[ 9, 9, 9, 9, 9 ]
[ 23, 25, 30, 25, 27 ]
2024-11-19T00:12:32.581595+00:00
1,615,738,941,000
2f425f5c30894061ad2baab23318f49c71e5021d
2
{ "blob_id": "2f425f5c30894061ad2baab23318f49c71e5021d", "branch_name": "refs/heads/main", "committer_date": 1615738941000, "content_id": "dc81eee54e5ff3b98be86d261d6a13adb5ca111b", "detected_licenses": [ "MIT" ], "directory_id": "7b8f5b04f59278e1b88136ecf0f2dc19a6eb243a", "extension": "py", "file...
2.328125
stackv2
import os from flask import Flask, request from git_cli.gkm import GitCLIClient from config import Config from github_api_client.github import GitHubOrgAPIClient app = Flask(__name__) URL_PREFIX = '/api/v1' config = Config clone_path = os.environ.get('CLONE_PATH') def _repo_form_origin(origin: str): return ...
52
30.5
84
14
369
python
[{"finding_id": "codeql_py/path-injection_9f5f922e672732fc_935945bc", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](1).", "remed...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](1)." ]
[ 43 ]
[ null ]
[ 18 ]
[ 51 ]
2024-11-19T01:02:07.689059+00:00
1,574,095,857,000
a62b7dd0c264e93d5e4d51ae5fd03261f94151ec
3
{ "blob_id": "a62b7dd0c264e93d5e4d51ae5fd03261f94151ec", "branch_name": "refs/heads/master", "committer_date": 1574095857000, "content_id": "5e8b1af809507acc5b49cc2e7f1221519296673b", "detected_licenses": [ "Apache-2.0" ], "directory_id": "6244c8a6bae4de756528d8618254fc345df92621", "extension": "py"...
2.546875
stackv2
import numpy as np import gym from gym import spaces import requests import json import time from deep_racer_cam import DeepRacerCam import logging from deep_racer_object_detection import DeepRacerObjectDetection from object_detection.detectionresult import DetectionResult class DeepRacerEnv(gym.Env): START = 'st...
115
37.61
149
15
1,048
python
[{"finding_id": "codeql_py/request-without-cert-validation_0a50ac83f8cf28c0_eb28c265", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 61, 68 ]
[ null, null ]
[ 20, 20 ]
[ 79, 79 ]
2024-11-19T01:02:08.940385+00:00
1,600,703,338,000
a0bc316b3029d7e56d42fe0ee6114f09df58199c
2
{ "blob_id": "a0bc316b3029d7e56d42fe0ee6114f09df58199c", "branch_name": "refs/heads/master", "committer_date": 1600703338000, "content_id": "0b3f7a46e245d83f057eed77e29b27ff5a7c1d1b", "detected_licenses": [ "Apache-2.0" ], "directory_id": "63b45604070bfd6309ac7ca06b828bfbf038a14b", "extension": "py"...
2.328125
stackv2
#!/usr/bin/env python3 # coding: utf-8 ''' Author: Park Lam <lqmonline@gmail.com> Copyright: Copyright 2019, unipark.io ''' import os import re import requests import json import tarfile import gzip from decouple import config from zipfile import ZipFile from io import BytesIO PACKAGE_NAME = 'pygeckodriver' PACKAGE_UR...
135
32.5
85
23
1,090
python
[{"finding_id": "codeql_py/overly-permissive-file_3ac11cca49621d35_cec6712f", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
3
true
[ "CWE-732", "CWE-732", "CWE-732" ]
[ "py/overly-permissive-file", "py/overly-permissive-file", "py/overly-permissive-file" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable.", "Overly permissive mask in chmod sets file to world readable.", "Overly permissive mask in chmod sets file to world readable." ]
[ 95, 100, 108 ]
[ null, null, null ]
[ 29, 21, 29 ]
[ 82, 74, 82 ]
2024-11-19T01:02:22.334161+00:00
1,595,616,357,000
4c40025714ef2e2ec2b1f114d83669ac54b06bf8
4
{ "blob_id": "4c40025714ef2e2ec2b1f114d83669ac54b06bf8", "branch_name": "refs/heads/master", "committer_date": 1595616357000, "content_id": "d610be3fe79467a4f38f1846747d0840ab904e4a", "detected_licenses": [ "MIT" ], "directory_id": "7ad7aca20723e4b89618cb20b86eb66fcbb8fa06", "extension": "py", "fi...
3.96875
stackv2
import time cor_vermelho_terminal = '\033[31m' cor_vermelho_final = '\033[m' acertos = [] def verificacao_inicial(entrada): if entrada in acertos: print(cor_vermelho_terminal, 'Você já digitou essa letra\n', cor_vermelho_final) elif not entrada.isalpha(): print(cor_vermelho_terminal, 'Digite s...
47
27.19
89
15
358
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c581864811ed3c03_11d4006f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 30 ]
[ null ]
[ 19 ]
[ 33 ]
2024-11-19T01:02:24.819846+00:00
1,603,152,212,000
2bd20cc295805151e799b0ec269579c5cb0d678e
3
{ "blob_id": "2bd20cc295805151e799b0ec269579c5cb0d678e", "branch_name": "refs/heads/main", "committer_date": 1603152212000, "content_id": "ffb302d88da3dde94697047ad48bb74105174d86", "detected_licenses": [ "MIT" ], "directory_id": "1b3a8f1294dc49eb8dc2ab4a26fd7b7a1136e651", "extension": "py", "file...
3.046875
stackv2
#!/usr/bin/python3 import argparse import os from random import randint import requests RATE_LIMIT = 5 RATE_LIMIT_ERROR = "Blacklist protection" LOGIN_ERROR = "Incorrect username or password" QUIET_MODE = False class ScriptOptions: """Class that is going to store options through whole proccess. :url: Target...
184
26.38
80
14
1,155
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e6e2645cffdc1c3e_3cf33b24", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 78, 104 ]
[ null, null ]
[ 15, 19 ]
[ 22, 59 ]
2024-11-19T01:02:25.517226+00:00
1,443,534,474,000
5f05d9d3ec951316cf9f929aa15c8ff17e484721
2
{ "blob_id": "5f05d9d3ec951316cf9f929aa15c8ff17e484721", "branch_name": "refs/heads/master", "committer_date": 1443534474000, "content_id": "60daf149371fc9928c12595ba0540bb9b9d9396f", "detected_licenses": [ "MIT" ], "directory_id": "8c1b5eddc219c181d9bb01dfb017201e4b6935a4", "extension": "py", "fi...
2.375
stackv2
import functools import logging import os import urllib # from google.appengine.api import users # from google.appengine.ext import webapp # from google.appengine.ext.webapp import template # from google.appengine.ext.webapp import util import arrow from flask import Flask from flask import redirect from flask import...
336
29.25
105
17
2,257
python
[{"finding_id": "codeql_py/url-redirection_8d0a0cdd464c3a3c_aaf3f097", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
2
true
[ "CWE-601", "CWE-601" ]
[ "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 190, 207 ]
[ null, null ]
[ 21, 21 ]
[ 33, 33 ]
2024-11-18T23:49:53.261125+00:00
1,629,696,020,000
6178a7aa9c55eae014e137837b59f28f8e9108a8
3
{ "blob_id": "6178a7aa9c55eae014e137837b59f28f8e9108a8", "branch_name": "refs/heads/main", "committer_date": 1629696020000, "content_id": "a6379212f32ac2418e28e5529eb20a119d01c0e7", "detected_licenses": [ "MIT" ], "directory_id": "c48da823e17d9fc726525b7a5254276771229407", "extension": "py", "file...
2.828125
stackv2
import re, io class Earthquake: def __init__(self, year, latitude, longitude, magnitude, depth): self.year = year self.latitude = latitude self.longitude = longitude self.magnitude = magnitude self.depth = depth quakes = [] f = io.open('epicsort.tmp', 'r', encoding='ISO-8859-1') lines = f.readlines() f.cl...
43
25.3
144
17
396
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_a4f3bcbe4d0fe262_e055fdc1", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.\nThis expression stores [sensitive data (private)](3) as clear text.\nThis expression stores [sensitive data (private)](4) as clear text." ]
[ 42 ]
[ null ]
[ 10 ]
[ 144 ]
2024-11-18T23:50:01.051247+00:00
1,608,874,448,000
357dbf1f5920538bcde99ec844dfd3f1feb2a304
3
{ "blob_id": "357dbf1f5920538bcde99ec844dfd3f1feb2a304", "branch_name": "refs/heads/main", "committer_date": 1608874448000, "content_id": "6ada6d72905883c12900d1e4231580766a85f9c4", "detected_licenses": [ "MIT" ], "directory_id": "e55f31c1c49109be69daf1ee4cfe4907e881ddd8", "extension": "py", "file...
3.265625
stackv2
import re matcher = re.compile(fr"(\d+)-(\d+) ([a-z]): ([a-z]+)") with open('input2.txt') as f: passwords = [] line = f.readline() while line != '': result = matcher.match(line) line = f.readline() if result is None or not result.group(0): print(f'wtf,\"{line}\" broke??'...
34
27.79
76
14
305
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_41eac283c850db4e_0b5ea3b8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 33, 34 ]
[ null, null ]
[ 7, 7 ]
[ 34, 34 ]
2024-11-18T23:50:20.275630+00:00
1,538,408,247,000
ed820482cd984c927b2abbbfbabd54b6681cdb9c
3
{ "blob_id": "ed820482cd984c927b2abbbfbabd54b6681cdb9c", "branch_name": "refs/heads/master", "committer_date": 1538408247000, "content_id": "65f254f0f08da7f5acc2a848fcd3abeff630295e", "detected_licenses": [ "Apache-2.0" ], "directory_id": "39666b8110ca59abbf091df14b17f69ea0286fe4", "extension": "py"...
2.640625
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- import argparse import requests import json try: import configparser except ImportError: import ConfigParser as configparser from xdg.BaseDirectory import xdg_config_home import os class BMC: def __init__(self, server, username, password): self.url ...
158
32.18
99
15
1,194
python
[{"finding_id": "codeql_py/request-without-cert-validation_335ccec89b4ecb82_633e19d3", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 24 ]
[ 26 ]
[ 13 ]
[ 44 ]
2024-11-19T00:13:39.823380+00:00
1,430,688,004,000
027fabae9d3102a405bb9ad240565ea89df57bc0
2
{ "blob_id": "027fabae9d3102a405bb9ad240565ea89df57bc0", "branch_name": "refs/heads/master", "committer_date": 1430688004000, "content_id": "cce714b44e35a5151dfd96235d5f410a3b1cf61f", "detected_licenses": [ "MIT" ], "directory_id": "bac207175bd9f19edc02bd0a2429cf3885a56903", "extension": "py", "fi...
2.390625
stackv2
import os import sys import time from flask import Flask, render_template, send_from_directory, request\ , flash, redirect, url_for, make_response, session from werkzeug import secure_filename from flask.ext.bootstrap import Bootstrap from metacleaner import pdfcleaner app = Flask(__name__) bootstrap = Bootstrap...
61
25.13
90
14
361
python
[{"finding_id": "codeql_py/path-injection_e424fdf9d0df3346_91ce6309", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 58 ]
[ null ]
[ 32 ]
[ 75 ]
2024-11-19T01:26:12.915340+00:00
1,532,422,437,000
0c3e4954469aec7f77b5c7d0339875f203feb4fd
3
{ "blob_id": "0c3e4954469aec7f77b5c7d0339875f203feb4fd", "branch_name": "refs/heads/master", "committer_date": 1532422437000, "content_id": "5cc8163397ef6fafbbd91d4cbb258907ec85cbd6", "detected_licenses": [ "MIT" ], "directory_id": "d80ef8c716bcc5ea54e87540dbf0463f15bf44ce", "extension": "py", "fi...
2.71875
stackv2
""" This example shows two ways to redirect flows to other destinations. """ from libmproxy.models import HTTPResponse from netlib.http import Headers def request(context, flow): # pretty_host takes the "Host" header of the request into account, # which is useful in transparent mode where we usually only have ...
22
34.36
75
14
171
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_21764735ffdf1d63_9065d6c3", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [example.com](1) may be at an arbitrary position in the...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "The string [example.com](1) may be at an arbitrary position in the sanitized URL.", "The string [example.org](1) may be at an arbitrary position in the sanitized URL." ]
[ 13, 21 ]
[ null, null ]
[ 8, 8 ]
[ 56, 56 ]
2024-11-19T01:52:00.291222+00:00
1,500,318,631,000
73c4760706e4af18645b8942c0f196d2712511a9
3
{ "blob_id": "73c4760706e4af18645b8942c0f196d2712511a9", "branch_name": "refs/heads/master", "committer_date": 1500318631000, "content_id": "e428826dab85b33fbccca61258860fe14b3bb30b", "detected_licenses": [ "MIT" ], "directory_id": "4790a4517da3aeb7837c2984b5ea73b6d605c570", "extension": "py", "fi...
2.578125
stackv2
import asyncio import argparse import json from pprint import pprint import requests import aiohttp.web def hex_color(r, g, b): r, g, b = int(r), int(g), int(b) v = r * 256**2 + g * 256 + b return hex(v) def map_range(x, x0, x1, y0, y1): i = (x-x0)/(x1-x0) return y0 * (1-i) + y1 * i def color_s...
100
20.3
94
11
620
python
[{"finding_id": "codeql_py/url-redirection_ee326f27060ace80_899dccf3", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
2
true
[ "CWE-601", "CWE-918" ]
[ "py/url-redirection", "py/partial-ssrf" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 53, 34 ]
[ null, null ]
[ 34, 9 ]
[ 37, 26 ]
2024-11-19T00:55:25.451985+00:00
1,673,965,090,000
a382f71a5d4bd788d3201d71d9d1092716043c3f
2
{ "blob_id": "a382f71a5d4bd788d3201d71d9d1092716043c3f", "branch_name": "refs/heads/master", "committer_date": 1673965090000, "content_id": "d20937f526d69fe99a5ee0164f4aae3906d8de6a", "detected_licenses": [ "MIT" ], "directory_id": "342225d4ac58e5414480fd13c20ee5fdfc419f08", "extension": "py", "fi...
2.46875
stackv2
#-*- encoding: utf-8 # Apollo: Centralized WakeOnLAN import os import sqlite3 import re from flask import Flask, request, session, g, redirect, url_for, abort, \ render_template, make_response,flash,jsonify import logging from logging.handlers import RotatingFileHandler import socket app = Flask(__name__)...
221
37.12
172
22
2,046
python
[{"finding_id": "codeql_py/reflective-xss_36f932fc2ddb05a0_52ed1644", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability d...
7
true
[ "CWE-079", "CWE-079", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/reflective-xss", "py/reflective-xss", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "HIGH", "HIGH", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability due to a [user-provided value](2).", "Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability due to a [user-provided value](2).", "This log entry depends ...
[ 113, 125, 134, 137, 147, 150, 160 ]
[ null, null, null, null, null, null, null ]
[ 38, 38, 29, 32, 29, 32, 29 ]
[ 57, 67, 64, 102, 65, 103, 84 ]
2024-11-19T00:55:27.659869+00:00
1,551,136,101,000
95393c08509ace7c3576f87c20617be7438366f4
2
{ "blob_id": "95393c08509ace7c3576f87c20617be7438366f4", "branch_name": "refs/heads/master", "committer_date": 1551136101000, "content_id": "025406551750a16fed8217bf7fa727946a9d311f", "detected_licenses": [ "Apache-2.0" ], "directory_id": "b041836e6071e2bff0589b4ed523f20d6832ad58", "extension": "py"...
2.5
stackv2
"""The main Flask app that serve the different query send by the client""" # !/usr/bin/python3 import datetime import json import logging.handlers from bson import ObjectId from flask import Flask, jsonify, request, send_file from flask_cors import CORS from flask_pymongo import PyMongo DEBUG_APP = True APP = Flask(_...
141
30.89
111
18
1,039
python
[{"finding_id": "codeql_py/stack-trace-exposure_f54a4e8c239f8401_cf189cbd", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-215" ]
[ "py/stack-trace-exposure", "py/flask-debug" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger." ]
[ 137, 141 ]
[ null, null ]
[ 24, 5 ]
[ 37, 58 ]
2024-11-19T00:55:31.098660+00:00
1,597,308,236,000
e2054fe20742dd0e6036d780cace4bcd54f4ef53
5
{ "blob_id": "e2054fe20742dd0e6036d780cace4bcd54f4ef53", "branch_name": "refs/heads/master", "committer_date": 1597308236000, "content_id": "89c2733e06708e221716b8f443f2526493540682", "detected_licenses": [ "MIT" ], "directory_id": "748359048158b44890183e4332837b39b7cc343f", "extension": "py", "fi...
4.5625
stackv2
'''Print the details of a Programmer using SETTER and GETTER''' class Programmer: def setName(self, n): # Setter method, it always takes a parameter which we assign them into object variables self.name = n def getName(self): # Getter method, to access the value of Setter...
31
27.32
127
9
217
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_011cf2ae9965d9ca_eefe4e3e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 30 ]
[ null ]
[ 7 ]
[ 21 ]
2024-11-19T00:33:02.600227+00:00
1,598,776,872,000
9a15a47bea2d62ddab84e88fa5e8cbc5dfb0155f
3
{ "blob_id": "9a15a47bea2d62ddab84e88fa5e8cbc5dfb0155f", "branch_name": "refs/heads/master", "committer_date": 1598776872000, "content_id": "8a45ab84208873d0933a5e7f3fd82424fb7fabca", "detected_licenses": [ "MIT" ], "directory_id": "3fbc60c9ac863a57d89b95667b8f4871b8070a93", "extension": "py", "fi...
2.765625
stackv2
#!/usr/bin/env python3 from airthings import discover_devices if __name__ == "__main__": airthings_devices = discover_devices() print("Found %s Airthings devices:" % len(airthings_devices)) for device in airthings_devices: print("=" * 36) print("\tMAC address:", device.mac_address) ...
17
42.53
68
13
162
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_669a7751fee1cb46_feacbe1d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 9 ]
[ null ]
[ 33 ]
[ 51 ]
2024-11-19T00:33:04.707346+00:00
1,420,154,393,000
c76670970e239f15106cd6eeec799641fa3d6965
3
{ "blob_id": "c76670970e239f15106cd6eeec799641fa3d6965", "branch_name": "refs/heads/master", "committer_date": 1420154393000, "content_id": "3b9ce739f5a0b44b6378fa1160bcbc3a7653ec81", "detected_licenses": [ "MIT" ], "directory_id": "a56e1899962a935fb3d7d52e9f5e9da522bce470", "extension": "py", "fi...
3.046875
stackv2
#!/usr/bin/env python2 from jinja2 import Template from yaml import load import argparse import sys def parse_arguments(): description = 'YAML to TOML converter' parser = argparse.ArgumentParser(description=description) parser.add_argument( '--template', '-t', metavar='FILE', des...
53
23.19
63
11
310
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_c28c82d733c373d1_0160ca1e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 44 ]
[ null ]
[ 9 ]
[ 32 ]