added
stringlengths
32
32
created
int64
1,244B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.25
source
stringclasses
1 value
text
stringlengths
324
20.1k
num_lines
int64
16
598
avg_line_length
float64
15.1
58.3
max_line_length
int64
33
179
ast_depth
int64
8
39
length
int64
101
3.8k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.1k
265k
sast_codeql_findings_count
int64
1
45
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
45
rule_ids
listlengths
1
45
confidences
listlengths
1
45
severities
listlengths
1
45
messages
listlengths
1
45
line_starts
listlengths
1
45
line_ends
listlengths
1
45
column_starts
listlengths
1
45
column_ends
listlengths
1
45
2024-11-18T19:19:00.488134+00:00
1,496,936,506,000
cfbdd104d1232b51744daf32207d0f6fe0cba362
2
{ "blob_id": "cfbdd104d1232b51744daf32207d0f6fe0cba362", "branch_name": "refs/heads/master", "committer_date": 1496936506000, "content_id": "e66ba97e6aa76dfda4360130b7fff2d8a750acee", "detected_licenses": [ "MIT" ], "directory_id": "4ba7d8ea375e4ce359086c0ed728a01060345efd", "extension": "py", "fi...
2.328125
stackv2
import requests, json, sys from lxml import html import time import datetime from operator import itemgetter date = datetime.date.today().strftime('%m-%d-%Y') if len(sys.argv) > 1: date = sys.argv[1:][0] print date session_requests = requests.session() login_url = "https://live.dentrixascend.com/login/authe...
198
21.95
146
16
1,290
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_7bd02e17b9db8230_1dd5a8fe", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text." ]
[ 157 ]
[ null ]
[ 11 ]
[ 27 ]
2024-11-18T19:19:13.738560+00:00
1,512,920,482,000
ae362b92884980b9b18dad234fcbb4c9b2758737
3
{ "blob_id": "ae362b92884980b9b18dad234fcbb4c9b2758737", "branch_name": "refs/heads/master", "committer_date": 1512920482000, "content_id": "23d4757a1a9885efc75589d80137d0e00592019e", "detected_licenses": [ "Apache-2.0" ], "directory_id": "400d234a475c7e6c61ef87b8cfda2c34cb363ae1", "extension": "py"...
3.0625
stackv2
#!/usr/bin/python """ Two things are wrong with Django's default `SECRET_KEY` system: 1. It is not random but pseudo-random 2. It saves and displays the SECRET_KEY in `settings.py` This snippet 1. uses `SystemRandom()` instead to generate a random key 2. saves a local `secret.txt` The result is a random and safe...
22
22.59
63
11
139
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b50d5c05ff1051d8_589bc0cd", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 22 ]
[ null ]
[ 7 ]
[ 17 ]
2024-11-18T19:19:19.162169+00:00
1,525,310,926,000
6d2f7eaa284e51a490ecb94ebb910b7637eb4e7f
2
{ "blob_id": "6d2f7eaa284e51a490ecb94ebb910b7637eb4e7f", "branch_name": "refs/heads/master", "committer_date": 1525310926000, "content_id": "be35047584df3b78fb415918e997675d804048ed", "detected_licenses": [ "MIT" ], "directory_id": "05eaba543b9c55c93e825851bdee96b0faee0a69", "extension": "py", "fi...
2.34375
stackv2
# coding:utf-8 import cStringIO import httplib import os import pycurl import time from Queue import Queue from optparse import OptionParser from threading import Thread import requests from urllib3 import disable_warnings from module import get_ua httplib.HTTPConnection._http_vsn = 10 httplib.HTTPConnection._http_v...
110
33.83
130
24
978
python
[{"finding_id": "codeql_py/request-without-cert-validation_bb1bf7bc40feee7a_b09d5c17", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 83 ]
[ 84 ]
[ 26 ]
[ 125 ]
2024-11-18T19:29:50.251696+00:00
1,690,664,607,000
5c8ee36332255dae66adb7662d99c59403e6f907
2
{ "blob_id": "5c8ee36332255dae66adb7662d99c59403e6f907", "branch_name": "refs/heads/master", "committer_date": 1690664607000, "content_id": "e34f9a425e435863f547b481c05d17712e6d1f18", "detected_licenses": [ "Apache-2.0" ], "directory_id": "29d9a947fc954e5d182cb2d8292f96c0d27cdde0", "extension": "py"...
2.34375
stackv2
#(C) Copyright Syd Logan 2023 #(C) Copyright Thousand Smiles Foundation 2023 # #Licensed under the Apache License, Version 2.0 (the "License"); #you may not use this file except in compliance with the License. # #You may obtain a copy of the License at #http://www.apache.org/licenses/LICENSE-2.0 # #Unless required by a...
194
33.7
152
19
1,577
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4b026b7ac0ce8078_d3e0effb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 134 ]
[ null ]
[ 27 ]
[ 102 ]
2024-11-18T19:44:16.554277+00:00
1,628,578,251,000
052727530d45beb08a61375ff389f4f016abfec3
2
{ "blob_id": "052727530d45beb08a61375ff389f4f016abfec3", "branch_name": "refs/heads/master", "committer_date": 1628578251000, "content_id": "96160f9492041b393084e230cae6e56385144a14", "detected_licenses": [ "MIT" ], "directory_id": "ab59bf6a28d2fe82c8c9d7442f011e008c7e8cb4", "extension": "py", "fi...
2.390625
stackv2
# -*- coding: utf-8 -*- """ * TencentBlueKing is pleased to support the open source community by making 蓝鲸智云-蓝鲸 PaaS 平台(BlueKing-PaaS) available. * Copyright (C) 2017-2021 THL A29 Limited, a Tencent company. All rights reserved. * Licensed under the MIT License (the "License"); you may not use this file except in co...
54
40.83
118
14
581
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_52add0da92216fa2_d7890e8e", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The cryptographic algorithm TRIPLEDES](1) is broken or weak, and should not be used...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[The cryptographic algorithm TRIPLEDES](1) is broken or weak, and should not be used.", "[The cryptographic algorithm TRIPLEDES](1) is broken or weak, and should not be used." ]
[ 27, 43 ]
[ null, null ]
[ 14, 14 ]
[ 40, 42 ]
2024-11-18T19:44:33.750363+00:00
1,623,626,033,000
76980468f44b6db70b326efcde4cea091de35242
3
{ "blob_id": "76980468f44b6db70b326efcde4cea091de35242", "branch_name": "refs/heads/main", "committer_date": 1623626033000, "content_id": "d6a4b482b443303bf2fd31dc4062cd04e81618b2", "detected_licenses": [ "MIT" ], "directory_id": "ec9a3ca32767d53e688eedb999fd73dbd8ca1576", "extension": "py", "file...
2.546875
stackv2
# this is the "app/robo_advisor.py" file print("-------------------------") print("SELECTED SYMBOL: XYZ") print("-------------------------") print("REQUESTING STOCK MARKET DATA...") print("REQUEST AT: 2018-02-20 02:00pm") print("-------------------------") print("LATEST DAY: 2018-02-20") print("LATEST CLOSE: $100,000....
33
28.33
132
8
281
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_cd768788b43a6c0b_daa9cabe", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 33 ]
[ null ]
[ 7 ]
[ 20 ]
2024-11-18T19:58:02.867790+00:00
1,688,659,531,000
5c46f20b10edf084ffc1d552a8b0ac72768a9563
3
{ "blob_id": "5c46f20b10edf084ffc1d552a8b0ac72768a9563", "branch_name": "refs/heads/master", "committer_date": 1688659531000, "content_id": "fc5ca3a4f2df1ba7a4b8164132308f2c99bc4ad6", "detected_licenses": [ "Apache-2.0" ], "directory_id": "d28c5a2993f5ba6133845ee724c188e0b3c3775a", "extension": "py"...
2.90625
stackv2
import json import csv import pytz import logging import logging.config import datetime from python.common.config import Config logging.config.dictConfig(Config.LOGGING) def load_json_into_dict(file_name) -> dict: with open(file_name, 'r') as f: data = f.read() return json.loads(data) def get_csv_t...
131
27.05
90
16
840
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_51c1c0cb299a3b9e_dc805311", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 128 ]
[ null ]
[ 19 ]
[ 66 ]
2024-11-18T19:58:03.544343+00:00
1,520,655,497,000
0a6f750c47522f89fbf10f082e4c8db1612fff92
3
{ "blob_id": "0a6f750c47522f89fbf10f082e4c8db1612fff92", "branch_name": "refs/heads/master", "committer_date": 1520655497000, "content_id": "a1f15d9dfabb8f8080c1038fd89d3169079e5a15", "detected_licenses": [ "Apache-2.0" ], "directory_id": "f693c8bba68e79ae40521838d278955f2767e7a8", "extension": "py"...
2.546875
stackv2
#!/usr/bin/python import os import sys import random import string import subprocess import datetime from jazz_common import validate_email_id #Global Variables DEV_NULL = open(os.devnull, 'w') def passwd_generator(): """ Random password generator for jazz-ui admin email ID login """ length = 10 ...
138
31.71
130
13
1,079
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_0dd1d9ab6faa620c_3c2f2461", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (secret)](1) as clear text.", "This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive data (secret)](2) as clear text." ]
[ 51, 52 ]
[ null, null ]
[ 14, 14 ]
[ 60, 64 ]
2024-11-18T19:58:04.749828+00:00
1,636,300,792,000
ead1500fb6f0d34895299781644818e8fe36eb39
3
{ "blob_id": "ead1500fb6f0d34895299781644818e8fe36eb39", "branch_name": "refs/heads/main", "committer_date": 1636300792000, "content_id": "ba8599eef8dc1afc5f57d3114fdc5edcc69b56b1", "detected_licenses": [ "MIT" ], "directory_id": "77809b56c447dde9f88fda134fac3c6cdc6f6a2e", "extension": "py", "file...
2.5625
stackv2
# -*- coding:utf-8 -*- import paramiko from paramiko.ssh_exception import SSHException from app.logger import logger from app.config import settings class HostInfo(object): def __init__(self): self.__k = None def connect(self, host, port, username, password): transport = paramiko.Transport((...
74
30
100
14
591
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_30960302cd0e2a1f_88442362", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 31 ]
[ null ]
[ 9 ]
[ 66 ]
2024-11-18T19:58:07.624842+00:00
1,481,934,403,000
c09515b775da55587176c2acb25c5bbb7d0ae201
2
{ "blob_id": "c09515b775da55587176c2acb25c5bbb7d0ae201", "branch_name": "refs/heads/master", "committer_date": 1481934403000, "content_id": "67d9d595c293db036c69a2f2c85fc5afa9ed4726", "detected_licenses": [ "Apache-2.0" ], "directory_id": "d97cc82c1ee383103b82b5888a45f33e1e63ff75", "extension": "py"...
2.34375
stackv2
import time import os import json import requests from traitlets import Int, List, Unicode from tornado import gen from jupyterhub.spawner import Spawner from .QueryUser import query_user from .marathon import Marathon from .GPUResourceAllocator import GPUResourceAllocator class MarathonSpawner(Spawner): resourc...
193
37.18
117
20
1,473
python
[{"finding_id": "codeql_py/request-without-cert-validation_bd73dad564c4f59a_86dbd3ef", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 111 ]
[ null ]
[ 31 ]
[ 71 ]
2024-11-18T19:58:08.577924+00:00
1,468,507,036,000
a195d9cb64da5a116f85d66ae1156d177f595f93
2
{ "blob_id": "a195d9cb64da5a116f85d66ae1156d177f595f93", "branch_name": "refs/heads/master", "committer_date": 1468507036000, "content_id": "28dfd298e58059aa28e804b4047084ab05660544", "detected_licenses": [ "Apache-2.0" ], "directory_id": "fd717fe6ca74f6d77210cdd57a8c365d27c5bfc6", "extension": "py"...
2.359375
stackv2
# =============================================================================== # Copyright 2016 Jake Ross # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses...
207
32.38
89
20
1,349
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_207a541d388f5746_bf8e63d0", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 159 ]
[ null ]
[ 9 ]
[ 66 ]
2024-11-18T19:58:26.053624+00:00
1,597,927,964,000
23d28ab73a79fe41cb083b7971391d082c0fba24
2
{ "blob_id": "23d28ab73a79fe41cb083b7971391d082c0fba24", "branch_name": "refs/heads/master", "committer_date": 1597927964000, "content_id": "d551f1a0c3cf78d2a0a4ea53c02d558e1d5b3c76", "detected_licenses": [ "Apache-2.0" ], "directory_id": "a0bb5f4bb3fdb1adab2492b14a81097cb37e2a42", "extension": "py"...
2.390625
stackv2
import boto3 from botocore.exceptions import ClientError from boto3.dynamodb.conditions import Key import json import os import logging import datetime from dateutil import tz from pprint import pprint from msrestazure.azure_active_directory import ServicePrincipalCredentials from azure.mgmt.compute import ComputeMana...
222
36.09
114
19
1,554
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2951c26b8216f42b_7e55e6b0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 152 ]
[ null ]
[ 26 ]
[ 88 ]
2024-11-18T20:23:09.618698+00:00
1,609,364,175,000
e8cdcfb087017837fda174086e3f650c819ce22f
2
{ "blob_id": "e8cdcfb087017837fda174086e3f650c819ce22f", "branch_name": "refs/heads/master", "committer_date": 1610199016000, "content_id": "ad791183ec839831f2bf98ee00aa203897188c88", "detected_licenses": [ "MIT" ], "directory_id": "5496fc943df90f6a075dd25f04eda94a065ad736", "extension": "py", "fi...
2.40625
stackv2
""" :mod:`zsl.application.error_handler` --------------------------------------------------- This module does the error handling. It allows users to register an error handler for a given exception type. It also provides default error handlers. """ from __future__ import absolute_import, division, print_function, unico...
150
31.91
104
17
985
python
[{"finding_id": "codeql_py/log-injection_de647cb2577001c0_3b64bb1a", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 57 ]
[ 58 ]
[ 22 ]
[ 65 ]
2024-11-18T20:23:10.474516+00:00
1,544,651,821,000
b6b41ddbb4bb27ee0d17bacfc59727b67ed13be2
2
{ "blob_id": "b6b41ddbb4bb27ee0d17bacfc59727b67ed13be2", "branch_name": "refs/heads/master", "committer_date": 1544651821000, "content_id": "d41b1f78e9ff6c16377c3d0a1edd0f00004825c2", "detected_licenses": [ "Apache-2.0" ], "directory_id": "ca98a533d53da95249df7aed710a2db9424cdcdc", "extension": "py"...
2.4375
stackv2
import uuid import os import cloudpickle import pickle import base64 import logging import types logger = logging.getLogger() import findspark findspark.init() import pyspark import pyspark.sql.functions from flask import Flask, request, jsonify from flask.logging import default_handler from pyspark_proxy.server.c...
305
24.59
93
20
1,785
python
[{"finding_id": "codeql_py/unsafe-deserialization_e589e097f6849ce2_f5f9a6e2", "tool_name": "codeql", "rule_id": "py/unsafe-deserialization", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Unsafe deserialization depends on a [user-provided value](1).", "remediation": "", "locatio...
12
true
[ "CWE-502", "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-215", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/unsafe-deserialization", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/flask-debug", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Unsafe deserialization depends on a [user-provided value](1).", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location an...
[ 39, 185, 218, 250, 269, 305, 79, 128, 156, 195, 227, 261 ]
[ null, null, null, null, null, null, null, null, null, null, null, null ]
[ 41, 20, 20, 20, 20, 5, 22, 17, 17, 17, 17, 17 ]
[ 76, 77, 84, 76, 62, 55, 53, 20, 20, 20, 20, 20 ]
2024-11-18T20:23:21.254817+00:00
1,623,254,757,000
8ae7ca5fbee6312a0174248c4164cdeef75dd8e7
2
{ "blob_id": "8ae7ca5fbee6312a0174248c4164cdeef75dd8e7", "branch_name": "refs/heads/main", "committer_date": 1623254757000, "content_id": "eaa13fe0098eaa4111d15994c8a84f4f6ffc0b61", "detected_licenses": [ "MIT" ], "directory_id": "bbe2b1394b68ada677d7015fe17cb03dfef6255d", "extension": "py", "file...
2.5
stackv2
# -*- coding: UTF-8 -*- import argparse import datetime import glob import html import json import logging import os import re import sys import tarfile import zipfile from collections import OrderedDict import pandas as pd # Set directory name for script dirname = os.path.dirname(__file__) # Set up argparse ap = a...
116
31.28
107
16
918
python
[{"finding_id": "codeql_py/tarslip_e5feb7beb0e18128_ef688f59", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 44 ]
[ null ]
[ 5 ]
[ 11 ]
2024-11-18T20:23:41.484803+00:00
1,682,092,239,000
405a266b7f5e337a296dc5f6e7a5527873670d06
2
{ "blob_id": "405a266b7f5e337a296dc5f6e7a5527873670d06", "branch_name": "refs/heads/master", "committer_date": 1682092239000, "content_id": "7fc7145bf32a888ab9c4765b26fcedc0350d63f7", "detected_licenses": [ "MIT" ], "directory_id": "6955cf08b26ddce910f4932374d9b5242680009f", "extension": "py", "fi...
2.375
stackv2
from pint import UnitRegistry from jinja2 import Template from wepy.reporter.dashboard import BCDashboardSection # initialize the unit registry units = UnitRegistry() class ReceptorBCDashboardSection(BCDashboardSection): BC_SECTION_TEMPLATE = \ """ Boundary Condition: {{ name }} Total Number of Dynamics seg...
157
22.64
73
13
800
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_ba9491c830f1d3da_064f8e88", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 107, 146 ]
[ null, null ]
[ 26, 26 ]
[ 60, 60 ]
2024-11-18T20:49:15.893788+00:00
1,585,634,174,000
b0df4aa082d7b3834d1862910aa79e4d5b7f622a
3
{ "blob_id": "b0df4aa082d7b3834d1862910aa79e4d5b7f622a", "branch_name": "refs/heads/master", "committer_date": 1585634174000, "content_id": "208e0b3cf63f63d682b1e6b69b301cdc8b861fd2", "detected_licenses": [ "MIT" ], "directory_id": "da421607c1b19ed660fcaee743fdb405aa4f4b7b", "extension": "py", "fi...
2.609375
stackv2
from flask import Blueprint, redirect, render_template, url_for, request, flash from flask_login import login_user, logout_user, current_user, login_required from ...Form import LoginForm, RegisterForm # 导入自定义的登录表单 from ...models import User, Role mod = Blueprint('auth', __name__, url_prefix='/auth') @mod.route('/l...
81
34.37
87
18
699
python
[{"finding_id": "codeql_py/url-redirection_c460c62814fa6b78_4aa59219", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 20 ]
[ null ]
[ 33 ]
[ 43 ]
2024-11-18T20:49:20.182951+00:00
1,593,098,777,000
29d072ff94b46dbe2a86d05f8a056b1e222b7437
3
{ "blob_id": "29d072ff94b46dbe2a86d05f8a056b1e222b7437", "branch_name": "refs/heads/master", "committer_date": 1593098777000, "content_id": "d8636d0d01e75d8385bacaad3a3ec344daaa3ce5", "detected_licenses": [ "Apache-2.0" ], "directory_id": "eade7715e5f1805f461accee8da5e1531ab5c803", "extension": "py"...
2.703125
stackv2
import os from jinja2 import Environment, FileSystemLoader env = Environment(loader=FileSystemLoader(os.path.join(os.path.dirname(__file__), 'templates/flot'))) graphId = 1 class Graph(object): def __init__(self, graphContainer=None, legendPositions=None, labelWidth=80): global graphId graphId ...
89
36.66
150
14
709
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_98f669c409219d68_fc592a5f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 4 ]
[ null ]
[ 7 ]
[ 102 ]
2024-11-18T20:49:29.802830+00:00
1,575,536,195,000
a74e083635a8b24f3c3ac4d6c87b2eed7038b9cc
3
{ "blob_id": "a74e083635a8b24f3c3ac4d6c87b2eed7038b9cc", "branch_name": "refs/heads/master", "committer_date": 1575536195000, "content_id": "8c85db2c35124806eaaacf0addd31915f9c2fc07", "detected_licenses": [ "MIT" ], "directory_id": "801274b01c8ad7665a5d63b4d68cd75fe278eb78", "extension": "py", "fi...
3.203125
stackv2
# frame.py - physical layer # The Ethernet frame is defined by RFC 895, but this code # will follow the norms defined by the class. That norms are: # - Destination MAC Address: 6 bytes # - Sender MAC Address: 6 bytes # - Payload's size : 2 bytes # - Payload : 0-1500 bytes from util import...
90
40.29
82
20
979
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_c4a407a77048f376_9f211c59", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",...
4
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.", "This expression stores [sensitive data (private)](1) as clear text.", "This expression stores [sensitive data (private)](1) as clear text.", "This expression stores [sensitive data (private)](1) as clear text." ]
[ 53, 54, 58, 59 ]
[ null, null, null, null ]
[ 21, 21, 21, 21 ]
[ 44, 44, 37, 37 ]
2024-11-18T20:49:38.800668+00:00
1,486,143,578,000
e72bb6b89e8679eddd55a16e2a82ea28226f394e
3
{ "blob_id": "e72bb6b89e8679eddd55a16e2a82ea28226f394e", "branch_name": "refs/heads/master", "committer_date": 1486143578000, "content_id": "7f6ed8859ddee8eeb20ce6c021d5ce0756a2ff1d", "detected_licenses": [ "MIT" ], "directory_id": "4a56854998b9849406a1a13a6dffb9c151cc1d15", "extension": "py", "fi...
2.71875
stackv2
#!/usr/bin/env python import Tkinter as tk from Crypto.PublicKey import RSA import socket from hashlib import sha1 import RegisterWindow import UserWindowWithTree import Database import User import Utils import Keyring import UserRoom class LoginWindow(tk.Frame): def __init__(self, master=None): self.mas...
142
32.42
108
18
1,054
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_5072304ee5df9b92_5cae19d3", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 61 ]
[ null ]
[ 22 ]
[ 47 ]
2024-11-18T20:49:39.040841+00:00
1,579,187,000,000
bc0704ca75bcaa1b4d50ff2a5a691d2b0ebeecef
3
{ "blob_id": "bc0704ca75bcaa1b4d50ff2a5a691d2b0ebeecef", "branch_name": "refs/heads/master", "committer_date": 1579187000000, "content_id": "573e47dbb43376b7befe307dee57db113f6554c2", "detected_licenses": [ "MIT" ], "directory_id": "3769d4f6f6e41d18a7bdb4c697451836087a7d60", "extension": "py", "fi...
2.671875
stackv2
#This code is written by Priyanshu Dwivedi, Indian Institute of Information Technology, Design and Manufacturing, Jabalpur #Source: https://github.com/coderpd/Ubuntu-Systemwide-Proxy-Setter import sys import re import fileinput import os if os.geteuid() != 0: os.execvp("sudo", ["sudo"] + ["python"] + sys.argv) def ...
237
43.64
156
23
2,763
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_b881d3f7ee93d8bf_c27d9269", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
18
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/clear-text-storage...
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.", "This expression stores [sensitive data (password)](1) as clear text.", "This expression stores [sensitive data (password)](1) as clear text.", "This expression stores [sensitive data (password)](1) as clear text.", "This expression sto...
[ 50, 51, 52, 53, 66, 67, 68, 70, 88, 89, 90, 109, 110, 111, 45, 62, 79, 100 ]
[ null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null ]
[ 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 30, 30, 30, 30 ]
[ 92, 94, 90, 94, 103, 105, 101, 105, 94, 96, 92, 87, 89, 85, 34, 34, 34, 34 ]
2024-11-18T20:49:41.773878+00:00
1,678,868,213,000
4e2bfafabbd313b1e822ab894f8c8a19f0d449f7
2
{ "blob_id": "4e2bfafabbd313b1e822ab894f8c8a19f0d449f7", "branch_name": "refs/heads/master", "committer_date": 1678868213000, "content_id": "f11ad14255804722e51d7d5fbcca1455da526376", "detected_licenses": [ "MIT" ], "directory_id": "9cbda6613c19e65ab30a11a227b7ec2131b5207a", "extension": "py", "fi...
2.3125
stackv2
from pathlib import Path import json import glob import logging as log import gzip import typing from takco import Table class Dataset: tables: typing.Sequence[typing.Dict[str, typing.Any]] = () def params(self, resourcedir: Path = None, datadir: Path = None, **params): params = dict(params) ...
88
35.08
86
23
671
python
[{"finding_id": "codeql_py/tarslip_221e12225c0bfebb_370f8d6b", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 55 ]
[ null ]
[ 25 ]
[ 52 ]
2024-11-18T20:50:30.055708+00:00
1,621,714,210,000
243742bc29038faa05419a812e3ec88a5a95f770
4
{ "blob_id": "243742bc29038faa05419a812e3ec88a5a95f770", "branch_name": "refs/heads/main", "committer_date": 1621714210000, "content_id": "61b347fd43dc6ffad9b98ab8b32a04e095a31422", "detected_licenses": [ "MIT" ], "directory_id": "431f9a03a36162b2e143b56491440d27517af22c", "extension": "py", "file...
3.8125
stackv2
import string lower_case_alphabets = list(string.ascii_lowercase) upper_case_alphabets = list(string.ascii_uppercase) numbers = list(string.digits) punctuation = list(string.punctuation) length = int(input("What is the length of the password you want ? ")) characters_list = lower_case_alphabets + upper_case_alphab...
20
23.15
85
9
105
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1ee30f891ed1ae1f_c8b7b1ff", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 20 ]
[ null ]
[ 7 ]
[ 15 ]
2024-11-18T20:50:36.084905+00:00
1,490,803,687,000
e8421276f6fc0e05879497f06eb845b4ce2acf32
2
{ "blob_id": "e8421276f6fc0e05879497f06eb845b4ce2acf32", "branch_name": "refs/heads/master", "committer_date": 1490803687000, "content_id": "69944333531e24e71828653d609f7e420b90f68d", "detected_licenses": [ "MIT" ], "directory_id": "735f4ca71101e71132b04551c3b6e840bde0db44", "extension": "py", "fi...
2.390625
stackv2
#!/usr/bin/python """ view_rosbag_video.py: version 0.1.0 Note: Part of this code was copied and modified from github.com/comma.ai/research (code: BSD License) Todo: Update steering angle projection. Current version is a hack from comma.ai's version Update enable left, center and right camera selection. Currently al...
142
35.98
132
23
1,356
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9aedf6bae5a17cf5_8eaf9e04", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 56, 56 ]
[ null, null ]
[ 51, 65 ]
[ 63, 78 ]
2024-11-18T20:50:57.667283+00:00
1,572,708,018,000
2f99668da42327fe607f140b34f8bb1a02e25b2f
3
{ "blob_id": "2f99668da42327fe607f140b34f8bb1a02e25b2f", "branch_name": "refs/heads/master", "committer_date": 1572708018000, "content_id": "cbb7455ae2e7adff10f4ab9ea3bbdf6ed7ce988a", "detected_licenses": [ "MIT" ], "directory_id": "5c0df19de82790354ecbc3c39268b68725dd37f7", "extension": "py", "fi...
2.75
stackv2
from socket import socket, AF_INET, SOCK_STREAM from ssl import SSLContext, PROTOCOL_TLS_SERVER ip = '127.0.0.1' port = 8443 context = SSLContext(PROTOCOL_TLS_SERVER) context.load_cert_chain('cert.pem', 'key.pem') with socket(AF_INET, SOCK_STREAM) as server: server.bind((ip, port)) server.listen(1) with ...
20
28.15
62
11
152
python
[{"finding_id": "codeql_py/insecure-protocol_e114486e4b1bfd3b_eb8c183d", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to SSLContext](1).\nInsecure SSL/TLS protocol ver...
1
true
[ "CWE-327" ]
[ "py/insecure-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Insecure SSL/TLS protocol version TLSv1 allowed by [call to SSLContext](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to SSLContext](1)." ]
[ 13 ]
[ null ]
[ 10 ]
[ 17 ]
2024-11-18T20:51:17.454736+00:00
1,580,884,094,000
7aa38dc204c113cf732b1e77eba9adb8c176db5a
4
{ "blob_id": "7aa38dc204c113cf732b1e77eba9adb8c176db5a", "branch_name": "refs/heads/master", "committer_date": 1580884094000, "content_id": "c4c2e03b3e0d21e33420f8b8f2ef7f83d7f85f47", "detected_licenses": [ "Apache-2.0" ], "directory_id": "9c4c8243f307807d31245f917159282fefe14791", "extension": "py"...
4.125
stackv2
# It is a six-digit number. # The value is within the range given in your puzzle input. # Two adjacent digits are the same (like 22 in 122345). # Going from left to right, the digits never decrease; they only ever increase or stay the same (like 111123 or 135679). # input is 382345-843167. input_from = 382345 input_t...
29
33.34
146
14
367
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_59a4087a0bca9441_ce1034d8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 21, 29 ]
[ null, null ]
[ 7, 7 ]
[ 32, 20 ]
2024-11-18T21:13:52.568626+00:00
1,521,153,467,000
8b9982d414634dd7f9963fe52520722884310dfd
3
{ "blob_id": "8b9982d414634dd7f9963fe52520722884310dfd", "branch_name": "refs/heads/master", "committer_date": 1521153467000, "content_id": "5617ae11f4b437243493cce9f214dfd201fcdbae", "detected_licenses": [ "MIT" ], "directory_id": "f2ba76f0789311ae3efe26184c7bc15ae3b57408", "extension": "py", "fi...
2.625
stackv2
#!/usr/bin/env python # Author: Sami Yessou - samiii@protonmail.com # Telegram Remote-Shell # Control your Linux System remotely via Telegram API # Requirements : apt-get install -y python python-pip && pip install telepot , dig,mtr,nmap,whois ,a Telegram BOT from pprint import pprint import telepot,time,os import co...
192
26.66
114
19
1,293
python
[{"finding_id": "codeql_py/overly-permissive-file_4954bddab35f9cf3_b2d1d82c", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world writable." ]
[ 58 ]
[ null ]
[ 9 ]
[ 36 ]
2024-11-18T21:13:53.309753+00:00
1,587,388,910,000
9e45fcf934ca666e589e07aa7fd50f7f5be7b5e5
3
{ "blob_id": "9e45fcf934ca666e589e07aa7fd50f7f5be7b5e5", "branch_name": "refs/heads/master", "committer_date": 1587388910000, "content_id": "91efefe8c4e16d5bc299c293bdf683ef27941e21", "detected_licenses": [ "MIT" ], "directory_id": "cc3ae37839e17fa3d441725d5c86dc2c5c756a67", "extension": "py", "fi...
3.109375
stackv2
from user import User import string import random import getpass import pyperclip from credentials import Credential def create_credential(account_name,passkey): ''' function to create a new credential ''' new_credential = Credential(account_name,passkey) return new_credential def save_credential(c...
164
32.65
114
26
1,048
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a80ea453162d64e9_3cc87a0b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 117 ]
[ null ]
[ 35 ]
[ 84 ]
2024-11-18T21:14:02.439151+00:00
1,670,311,876,000
fad370ad651becec0b0bc32fff5fa5be59d2e0cf
3
{ "blob_id": "fad370ad651becec0b0bc32fff5fa5be59d2e0cf", "branch_name": "refs/heads/master", "committer_date": 1670311876000, "content_id": "a926dded071177fa356a24a3bfb9db99fb7b3d03", "detected_licenses": [ "MIT" ], "directory_id": "0a6db7d1ad4c1a0b3b41306efa87967c32dc0194", "extension": "py", "fi...
3.046875
stackv2
import hashlib def main(): door = 'ffykfhsq' password = ['', '', '', '', '', '', '', ''] print(password) i = 0 while '' in password: h = hashlib.md5(str.encode(door + str(i))).hexdigest() if h[:5] == '00000': position = int(h[5], 16) if position < 8: ...
20
24.8
62
17
136
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_215b9b239093a3e2_d2064cdc", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 6, 15, 17 ]
[ null, null, null ]
[ 11, 27, 11 ]
[ 19, 35, 19 ]
2024-11-18T21:14:09.253873+00:00
1,599,419,271,000
ec2f2987538e29d2b62be5b2377eca612cfffac7
2
{ "blob_id": "ec2f2987538e29d2b62be5b2377eca612cfffac7", "branch_name": "refs/heads/master", "committer_date": 1599419271000, "content_id": "259467fe9006521cd4212933a210afe8ff52a28f", "detected_licenses": [ "MIT" ], "directory_id": "7677b35355fbb965a8116c6a0f6a67ee98fc3639", "extension": "py", "fi...
2.4375
stackv2
#! python3 """ Perform OAuth authentication - requires user approval. Session tokens are saved for later use (they are valid, until the user revokes access). """ import requests import xmltodict import goodreads_api_client as gr from rauth.service import OAuth1Service, OAuth1Session def read_file(filename): f ...
66
26.45
87
9
405
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_d3660b6e55f1cf93_159ce2b8", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (secret)](1) as clear text." ]
[ 63 ]
[ null ]
[ 9 ]
[ 28 ]
2024-11-18T21:14:31.959641+00:00
1,528,043,362,000
f4b90f50905f8e07d709cf6d68f5d6207c92dd02
3
{ "blob_id": "f4b90f50905f8e07d709cf6d68f5d6207c92dd02", "branch_name": "refs/heads/master", "committer_date": 1528043380000, "content_id": "866f569dda999df9bcd7e9e3d15f068ff2c96d03", "detected_licenses": [ "MIT" ], "directory_id": "f2ebc9b1d73ec3318e84028798a76713d245526d", "extension": "py", "fi...
2.875
stackv2
#!/usr/bin/python3 # coding: utf8 from os import path from main import loadFile, updateFile import re from packages.model.anime import Anime from packages.model.manga import Manga from packages.model.DMBase import SiteType, StatusType from packages.crawler.myselfbbs import MyselfBBSCrawler from packages.crawler.cartoo...
108
27.17
104
17
728
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_75dd79c3a94390af_954199ee", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [myself-bbs.com](1) may be at an arbitrary position in ...
3
true
[ "CWE-020", "CWE-020", "CWE-020" ]
[ "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "The string [myself-bbs.com](1) may be at an arbitrary position in the sanitized URL.", "The string [cartoonmad.com](1) may be at an arbitrary position in the sanitized URL.", "The string [bilibili.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 17, 25, 33 ]
[ null, null, null ]
[ 8, 10, 10 ]
[ 31, 33, 31 ]
2024-11-18T21:14:37.270382+00:00
1,416,853,574,000
8e7bf7a822ca57efaec553c813e80384ccffb46a
2
{ "blob_id": "8e7bf7a822ca57efaec553c813e80384ccffb46a", "branch_name": "refs/heads/master", "committer_date": 1416853574000, "content_id": "d999c4ec06e6f03a616630eb886476a02f548447", "detected_licenses": [ "Apache-2.0" ], "directory_id": "79365e3a4f0dbf41bc68c85937734fd1fe41fc10", "extension": "py"...
2.375
stackv2
import httplib import socket import hashlib import hmac import os import tempfile import multiprocessing import BaseHTTPServer import httplib2 from optparse import OptionParser import logging import urlparse logging.basicConfig() LOG = logging.getLogger() parser = OptionParser() parser.add_option('--instance_dir', d...
101
34.13
127
15
730
python
[{"finding_id": "codeql_py/log-injection_a077c97e0ca86b09_1dce270b", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 35 ]
[ null ]
[ 36 ]
[ 40 ]
2024-11-18T21:14:40.208900+00:00
1,573,404,615,000
ca93f10327f1d5fe69fb0217624f485149214c6c
3
{ "blob_id": "ca93f10327f1d5fe69fb0217624f485149214c6c", "branch_name": "refs/heads/master", "committer_date": 1573404615000, "content_id": "79f60c302a4d39fc5e3003a7ed818707fb5301e0", "detected_licenses": [ "MIT" ], "directory_id": "f95c58386cb2ce45855878756e28e66ea9468a4c", "extension": "py", "fi...
2.90625
stackv2
""" Copyright (c) 2019, Nils P. Müller <shimst3r@gmail.com> All rights reserved. This file is part of dodeka. `factors.py` implements the functionality for generating the twelve-factor app checklist. License: MIT, see https://opensource.org/licenses/MIT """ import os.path from dataclasses import dataclass from typi...
78
29.71
108
15
541
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_8907b6e25de8decc_7279bf9f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 70 ]
[ 73 ]
[ 28 ]
[ 6 ]
2024-11-18T20:48:06.335328+00:00
1,631,350,851,000
248185d800768ed24c38483b6484c08973e5ef31
3
{ "blob_id": "248185d800768ed24c38483b6484c08973e5ef31", "branch_name": "refs/heads/master", "committer_date": 1631350851000, "content_id": "bfbb5f6e28b2cf86d56a8e6f252a3b99fe212e8d", "detected_licenses": [ "MIT" ], "directory_id": "7f71b5f6aa9b0daedd03f20a65e80cfd8c34f4a7", "extension": "py", "fi...
2.671875
stackv2
import os import sys import requests from PyQt5.QtWidgets import QMainWindow from PyQt5.QtWidgets import QApplication from PyQt5.QtCore import QUrl from PyQt5.QtCore import Qt from PyQt5.QtWebEngineWidgets import QWebEngineView, QWebEngineProfile requests.packages.urllib3.disable_warnings() headers = { 'Connection...
133
32.32
136
16
1,192
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_d4b73875a23c60a2_c5230b87", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [www.zhihu.com](1) may be at an arbitrary position in t...
3
true
[ "CWE-020", "CWE-020", "CWE-295" ]
[ "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization", "py/request-without-cert-validation" ]
[ "HIGH", "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "The string [www.zhihu.com](1) may be at an arbitrary position in the sanitized URL.", "The string [zhihu.com](1) may be at an arbitrary position in the sanitized URL.", "This request may run without certificate validation because [it is disabled](1)." ]
[ 75, 75, 96 ]
[ null, null, null ]
[ 12, 50, 9 ]
[ 46, 80, 55 ]
2024-11-18T20:48:12.552258+00:00
1,455,031,788,000
9ad7977faaa1055c649bd25ddb5d7c374192cdd5
2
{ "blob_id": "9ad7977faaa1055c649bd25ddb5d7c374192cdd5", "branch_name": "refs/heads/master", "committer_date": 1455031788000, "content_id": "3ba912363b1288ec118fe1eedaf096e4353417a0", "detected_licenses": [ "MIT" ], "directory_id": "6a001918ac4f3e16a8549d2dbd257bf9341fefcf", "extension": "py", "fi...
2.328125
stackv2
import os from flask import render_template, Blueprint, send_file main = Blueprint('main', __name__, template_folder='templates', static_folder='static/gen', static_url_path='/static') @main.route('/templates/<path:partial>') def render_partial(partial=None): return render_template(partial + '.html') @main.ro...
29
25.9
118
14
177
python
[{"finding_id": "codeql_py/path-injection_a75653718203ac72_72529561", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 20, 21 ]
[ null, null ]
[ 23, 26 ]
[ 75, 78 ]
2024-11-18T20:48:16.415328+00:00
1,584,668,910,000
eeb03ba1a36415686ccbb59a573a0168164d8529
3
{ "blob_id": "eeb03ba1a36415686ccbb59a573a0168164d8529", "branch_name": "refs/heads/master", "committer_date": 1584668910000, "content_id": "c939170e232d9e5212dd1412a02a81f0daa1a35b", "detected_licenses": [ "MIT" ], "directory_id": "09b2ba018c41a32a413517c71491f299b01cc419", "extension": "py", "fi...
2.828125
stackv2
import json import requests from getpass import getpass from logging import getLogger, basicConfig, DEBUG, INFO logger = getLogger(__name__) LOG_FMT = "{asctime} | {levelname:<5s} | {name} | {message}" basicConfig(level=DEBUG, format=LOG_FMT, style="{") # basicConfig(level=INFO, format=LOG_FMT, style="{") # --------...
67
32.13
87
13
482
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_df437362967aca2a_11c19e55", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-295" ]
[ "py/clear-text-logging-sensitive-data", "py/request-without-cert-validation" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This request may run without certificate validation because [it is disabled](1)." ]
[ 40, 41 ]
[ null, null ]
[ 18, 9 ]
[ 49, 85 ]
2024-11-18T20:48:21.149247+00:00
1,576,823,831,000
32fcdf7b47d40cdc13578daa081a01cbb4d87fd7
3
{ "blob_id": "32fcdf7b47d40cdc13578daa081a01cbb4d87fd7", "branch_name": "refs/heads/master", "committer_date": 1576823831000, "content_id": "ae04d8a641fa91dc2a35d25d08ea49551a1b038c", "detected_licenses": [ "MIT" ], "directory_id": "b27a159bad30655693963f7404fe0252ee584af0", "extension": "py", "fi...
2.625
stackv2
from algosdk import kmd from algosdk import algod from algosdk.wallet import Wallet from algosdk import account from algosdk import mnemonic #from algosdk import encoding import json from getpass import getpass #Creating kmd and algod sign(This was taken from python_SDK_Algorand). This will start up things kcl = kmd...
49
45.16
125
10
547
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d13a9cdb2f63968c_c56f1032", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 19 ]
[ null ]
[ 23 ]
[ 34 ]
2024-11-18T20:48:28.216535+00:00
1,580,158,542,000
ce8c39ccbc50a9ec0794bc4b680dbb375718bc26
2
{ "blob_id": "ce8c39ccbc50a9ec0794bc4b680dbb375718bc26", "branch_name": "refs/heads/master", "committer_date": 1580163955000, "content_id": "7d82913ec1a39749542a0bd0c6230f318885da56", "detected_licenses": [ "MIT" ], "directory_id": "9b3892c5373d61b3e0987f71f99a9d59a74577ad", "extension": "py", "fi...
2.46875
stackv2
import threading from io import BytesIO from flask import Flask, send_file, render_template from pyboy import PyBoy, windowevent, window from io import BytesIO from os import environ app = Flask(__name__, template_folder='template') ROM_NAME = 'rom/' + environ['ROM_NAME'] pb = PyBoy(ROM_NAME, window_type=None) pb...
146
18.64
61
13
717
python
[{"finding_id": "codeql_py/reflective-xss_600f2afffdb1318d_1480a20e", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 109 ]
[ null ]
[ 12 ]
[ 31 ]
2024-11-18T20:48:30.291327+00:00
1,678,984,485,000
c686b7a7e94e7c24a2f1861bf778687d9eac3f40
3
{ "blob_id": "c686b7a7e94e7c24a2f1861bf778687d9eac3f40", "branch_name": "refs/heads/master", "committer_date": 1678984485000, "content_id": "c136ca053f8e854c4f59d4be6610d4dd1ef3fb5d", "detected_licenses": [ "CC0-1.0" ], "directory_id": "d3924938210b3006fb919b5d7299e4b288d8bad6", "extension": "py", ...
2.65625
stackv2
#!/usr/bin/env python # Copyright (c) 2012, AverageSecurityGuy # All rights reserved. # # Redistribution and use in source and binary forms, with or without modification, # are permitted provided that the following conditions are met: # # Redistributions of source code must retain the above copyright notice, this # l...
187
35.74
121
15
1,681
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_eeb6928bb6a038d6_0184dd5f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 104 ]
[ null ]
[ 11 ]
[ 33 ]
2024-11-18T21:11:33.372278+00:00
1,610,805,927,000
a2f407215a388a013ecc387fe8adbc769698f9aa
3
{ "blob_id": "a2f407215a388a013ecc387fe8adbc769698f9aa", "branch_name": "refs/heads/master", "committer_date": 1610805927000, "content_id": "6fa3beae345a87b84e0333548ee4f56c9959d175", "detected_licenses": [ "MIT" ], "directory_id": "e078c3f250fb201b50f9cc02f069dab3daa00ad5", "extension": "py", "fi...
2.59375
stackv2
import os import re import requests from github import Github from flask import Flask, request from flask import render_template app = Flask(__name__) def get_gists(username): try: url = "https://api.github.com/users/" + username + "/gists" resp = requests.get(url) gists = resp.json() ...
90
26.56
107
21
557
python
[{"finding_id": "codeql_py/partial-ssrf_5ac9295512d268c6_51f11a99", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 14 ]
[ null ]
[ 16 ]
[ 33 ]
2024-11-18T21:11:40.709929+00:00
1,620,078,569,000
e05955ee1e051a65ae673034d054241737bfbbe4
3
{ "blob_id": "e05955ee1e051a65ae673034d054241737bfbbe4", "branch_name": "refs/heads/main", "committer_date": 1620078569000, "content_id": "52b2a90b451fa0a86b968233648914532c36917f", "detected_licenses": [ "Apache-2.0" ], "directory_id": "c17955e3512c94d82cdab469406b72a4c1079a82", "extension": "py", ...
2.828125
stackv2
import datetime import json import requests from flask import render_template, redirect, request from app import app # The node with which our application interacts, there can be multiple # such nodes as well. CONNECTED_NODE_ADDRESS = "http://127.0.0.1:8000" posts = [] def fetch_posts(): """ Function to f...
230
27.98
82
14
1,465
python
[{"finding_id": "codeql_py/partial-ssrf_6f44db9d6bc6fe77_e5b0458f", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 43 ]
[ null ]
[ 16 ]
[ 47 ]
2024-11-18T21:11:43.522722+00:00
1,540,877,381,000
783a1e797570b7cc6c8ddf02b5e7ad7dcebb68f4
3
{ "blob_id": "783a1e797570b7cc6c8ddf02b5e7ad7dcebb68f4", "branch_name": "refs/heads/master", "committer_date": 1540877381000, "content_id": "e537992245700d59d65c6627bac3f8256ac0b7eb", "detected_licenses": [ "Apache-2.0" ], "directory_id": "4c263f856547632a6b73d8279aaea72ce1bcee23", "extension": "py"...
3.265625
stackv2
import operative import sketch from random_word import RandomWords print('H A N G M A N') difficulty = 'X' while difficulty not in 'EMH': print('Select difficulty: E - Easy, M - Medium, H - Hard') difficulty = input()[0].upper() max_length = operative.set_max_length(difficulty) missed_letters = '' correct...
74
28.62
81
22
462
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6d512db88e02c685_c632ab71", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](...
[ 44, 52 ]
[ null, 57 ]
[ 19, 19 ]
[ 81, 38 ]
2024-11-18T21:25:50.609260+00:00
1,485,638,453,000
3044819efacd5d18d1e9f770f29c10921179310f
3
{ "blob_id": "3044819efacd5d18d1e9f770f29c10921179310f", "branch_name": "refs/heads/master", "committer_date": 1485638453000, "content_id": "8d20b0e2c9f4ea02d4544b6523066abda359934c", "detected_licenses": [ "MIT" ], "directory_id": "3b026a4f19165b3f2167fe23e4955a5a843ea8a4", "extension": "py", "fi...
2.796875
stackv2
import argparse import requests import json import sqlite3 as sql import re import datetime as dt import pandas as pd from progress.bar import Bar api_key = open('api_key.txt', 'r').read().strip() url = 'http://api.sportsdatabase.com/nba/query.json?sdql=' def season_team_game_stats(select, season=2014): """ ...
118
34.72
117
16
1,098
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_eb5925efdd221128_d04ef992", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 36 ]
[ null ]
[ 17 ]
[ 52 ]
2024-11-18T21:26:07.970386+00:00
1,554,199,523,000
f27727860893f883859b9aa717ebb41543fbd67f
3
{ "blob_id": "f27727860893f883859b9aa717ebb41543fbd67f", "branch_name": "refs/heads/master", "committer_date": 1554199523000, "content_id": "e2da280bac46f63d272c1d706bc977712fd687e9", "detected_licenses": [ "MIT" ], "directory_id": "0f77d6a78d51f1dafef7c01b54a4be14b3a0bc72", "extension": "py", "fi...
2.75
stackv2
#------------------------------------------------------------------------------- # Name: pyWOL # Purpose: wake up system by sending a magic packet # # Author: hansel@163.com # # Created: 22/03/2019 # Copyright: (c) Hansel 2019 # Licence: MIT license #-------------------------------------------...
94
31.86
134
13
823
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_82cc20791ca36046_9df1dfbe", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-200" ]
[ "py/clear-text-logging-sensitive-data", "py/bind-socket-all-network-interfaces" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "'' binds a socket to all interfaces." ]
[ 82, 52 ]
[ 83, null ]
[ 19, 9 ]
[ 50, 24 ]
2024-11-18T21:26:15.466226+00:00
1,669,497,096,000
db8983c2a0b2b7e252d74da4b390546bee5048c2
2
{ "blob_id": "db8983c2a0b2b7e252d74da4b390546bee5048c2", "branch_name": "refs/heads/master", "committer_date": 1669497096000, "content_id": "53b7e16117e23ce6060378146eaef866607c525d", "detected_licenses": [ "MIT" ], "directory_id": "eb012a857ae020004e9d14608ba96ce713985551", "extension": "py", "fi...
2.34375
stackv2
from __future__ import annotations import jinja2 import shutil from pathlib import Path from importlib.resources import read_text from typing import TYPE_CHECKING if TYPE_CHECKING: from ..theme import Theme class BackupFileExists(Exception): pass class Template: """ Base class for representing t...
120
26.38
94
16
658
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_883e383a991053db_a2147372", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 29 ]
[ null ]
[ 25 ]
[ 55 ]
2024-11-18T21:26:16.432702+00:00
1,608,674,315,000
4b63919948cf2c0dc138a657ff1149996be6d46c
3
{ "blob_id": "4b63919948cf2c0dc138a657ff1149996be6d46c", "branch_name": "refs/heads/main", "committer_date": 1608674315000, "content_id": "4985987fcc8862bec45aa863850537c5a342aac6", "detected_licenses": [ "Apache-2.0" ], "directory_id": "77e228845c627e35ebec5b72ff6a0b0c61434d6e", "extension": "py", ...
2.578125
stackv2
#!/usr/bin/env python # # Copyright 2020 Eric Gustafson # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # https://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable l...
136
30.29
97
15
989
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c3f6c697c764c1b5_7f928695", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 74 ]
[ null ]
[ 19 ]
[ 87 ]
2024-11-18T21:51:44.902914+00:00
1,618,326,524,000
9051c6c5bafe7f5be2bd2dc94b8316fac5d31a65
3
{ "blob_id": "9051c6c5bafe7f5be2bd2dc94b8316fac5d31a65", "branch_name": "refs/heads/main", "committer_date": 1618326524000, "content_id": "99c37fc1fb7087493881e3c88c4772337843ba90", "detected_licenses": [ "MIT" ], "directory_id": "9fb3e00796514a5c8cc27e1679cd2e7af60c7076", "extension": "py", "file...
2.59375
stackv2
import os import sys import random import shutil from commands.config import main as config from commands.mysql_config import main as mysql_config from commands.security import main as security def main(): if len(sys.argv) == 1: os.system('cls') if os.path.isdir('./env'): try: ...
76
28.14
129
16
488
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_22c3f72ea474050c_15233a76", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive data (secret)](2) as clear text." ]
[ 54 ]
[ null ]
[ 17 ]
[ 23 ]
2024-11-18T21:51:48.678822+00:00
1,531,321,809,000
ac2661ee082bc2dbdf85d829506ab00f1273adc0
4
{ "blob_id": "ac2661ee082bc2dbdf85d829506ab00f1273adc0", "branch_name": "refs/heads/master", "committer_date": 1531321809000, "content_id": "f9d8a32cd73a702a096dfa2d64a7c382c185ceee", "detected_licenses": [ "MIT" ], "directory_id": "c849dd77d0872961080165de75c48db8db823660", "extension": "py", "fi...
3.65625
stackv2
class Filer: @staticmethod def writeItemsToFile(items, filename): with open(filename, 'w') as f: for line in items: f.write(str(line) + "\n") @staticmethod def readItemsFromFileToList(filename): with open(filename) as f: lst = f.readlines() ...
26
31.54
97
17
185
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_f5dbeb5a2cce7f46_edc0425c", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 20 ]
[ null ]
[ 21 ]
[ 29 ]
2024-11-18T21:52:20.446625+00:00
1,421,816,504,000
4976fc46d742cff092df0847080d7a65d65cb55f
3
{ "blob_id": "4976fc46d742cff092df0847080d7a65d65cb55f", "branch_name": "refs/heads/master", "committer_date": 1421816504000, "content_id": "67caa3c7326db5fc89b94faacd21be06546990a8", "detected_licenses": [ "MIT" ], "directory_id": "b35817848bcfb5fabf1c89e2a90b91e867aa0cad", "extension": "py", "fi...
2.625
stackv2
from werkzeug.utils import find_modules, import_string from flask import Blueprint from os import path import hashlib def hash_password(password, secret): m = hashlib.sha1() m.update(password) return m.hexdigest() def register_all_blueprints(app, blueprint_module): if blueprint_module: for na...
23
30.17
90
15
138
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_140da4f5b10bdd57_1c7daf14", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 9 ]
[ null ]
[ 14 ]
[ 22 ]
2024-11-18T21:52:21.434874+00:00
1,692,844,508,000
4cd91424b4a99daba5c95874fb3e7d61d5ec8278
3
{ "blob_id": "4cd91424b4a99daba5c95874fb3e7d61d5ec8278", "branch_name": "refs/heads/master", "committer_date": 1692844508000, "content_id": "2574b6b08f000cce53b2d697d0e7b2f07e59699e", "detected_licenses": [ "Apache-2.0" ], "directory_id": "034def375a59ec0fbe539cc33476f2b38d5cdaa0", "extension": "py"...
2.515625
stackv2
# Copyright 2023 Canonical Ltd. # Licensed under the Apache V2, see LICENCE file for details. # # Module that parses constraints # # The current version of juju core expects the client to take # constraints given in the form "mem=10G foo=bar" and parse them into # json that looks like {"mem": 10240, "foo": "bar"}. Thi...
168
26.22
156
17
1,299
python
[{"finding_id": "codeql_py/redos_d03210cb843591b4_1ac9b622", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with ',+,<=' and containing many repeti...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with ',+,<=' and containing many repetitions of '::='." ]
[ 148 ]
[ null ]
[ 78 ]
[ 83 ]
2024-11-18T20:31:26.135037+00:00
1,631,988,124,000
743c1e1253b8e6ac4d2aea0061c3be3482b7f3c8
3
{ "blob_id": "743c1e1253b8e6ac4d2aea0061c3be3482b7f3c8", "branch_name": "refs/heads/main", "committer_date": 1631988124000, "content_id": "0c5c78cc208261b123f15d739a9219d16cb1558a", "detected_licenses": [ "Apache-2.0" ], "directory_id": "9f7f7b84eaa762e95ef0c642a5f1b31d85b4de9f", "extension": "py", ...
2.578125
stackv2
#!/usr/bin/env python3 """Generate the dockerfiles from a jinja template.""" from jinja2 import Environment, FileSystemLoader from settings import templates import logging log = logging.getLogger(__name__) def generate(log): """Generate the dockerfiles for this repo.""" file_loader = FileSystemLoader('templa...
50
34.5
76
14
361
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_0c5d5e7d1e0dbea0_1bbd27d6", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 13 ]
[ null ]
[ 11 ]
[ 42 ]
2024-11-18T20:31:26.998502+00:00
1,523,006,705,000
5c5702aae0b3e5c8f28079281e8689aa9f14eaf8
3
{ "blob_id": "5c5702aae0b3e5c8f28079281e8689aa9f14eaf8", "branch_name": "refs/heads/master", "committer_date": 1523006705000, "content_id": "8e8676aca9c6a9d5aac64edda915aa205a92d9ad", "detected_licenses": [ "Unlicense" ], "directory_id": "5f9746cd0f51e9db36200cfdfc30770f34d6801e", "extension": "py",...
2.78125
stackv2
from flask import Flask, request, Response app = Flask('mini-amazon') @app.route('/health', methods=['GET']) def health(): return 'healthy' @app.route('/', methods=['GET']) def index(): return "<h1>Welcome to Mini Amazon</h1>" @app.route('/say-hello/<name>') def say_hello(name): return '<h1>Hello, {0}...
31
21.55
56
9
185
python
[{"finding_id": "codeql_py/flask-debug_9638e34c89a689ce_67ef2bdf", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 31, 17 ]
[ null, null ]
[ 5, 12 ]
[ 51, 47 ]
2024-11-18T20:31:31.685020+00:00
1,612,265,071,000
8937cb23599e7691fbb0292b0cd550d913c21d01
2
{ "blob_id": "8937cb23599e7691fbb0292b0cd550d913c21d01", "branch_name": "refs/heads/master", "committer_date": 1612265071000, "content_id": "e46e716183a7653797ba2571951988d048efc7e3", "detected_licenses": [ "Apache-2.0" ], "directory_id": "ff0ca8bdaca92f6b7e137114abbcbfe2a8e34a05", "extension": "py"...
2.3125
stackv2
# Copyright 2020 IBM Corp. # SPDX-License-Identifier: Apache-2.0 """ The server of the secret-provider app. """ import os import logging import hcl from flask import Flask from flask import Response from flask import request from flask import json import util import argparse import sys app = Flask(__name__) def conf...
145
39.99
153
15
1,346
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c0caf9a6eb44c3f4_8d2c2ccd", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
11
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "HIGH", "HIGH", "HIGH", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided val...
[ 91, 98, 129, 78, 90, 91, 92, 117, 128, 129, 130 ]
[ null, null, null, null, null, null, null, null, null, null, null ]
[ 39, 37, 39, 19, 31, 39, 32, 19, 31, 39, 32 ]
[ 55, 52, 55, 36, 39, 55, 41, 36, 39, 55, 41 ]
2024-11-18T20:31:35.412846+00:00
1,497,918,713,000
b892723f224eccc723e506a044d2cdda28160e0f
3
{ "blob_id": "b892723f224eccc723e506a044d2cdda28160e0f", "branch_name": "refs/heads/master", "committer_date": 1497918713000, "content_id": "301d4b6b24a4ea01c0215ce3636c8d2c3c26bfde", "detected_licenses": [ "MIT" ], "directory_id": "c46b7d428c9380bd56a2a86992e0fc15faf24df2", "extension": "py", "fi...
3.28125
stackv2
#!/usr/bin/env python """ Author: Hank Preston <hank.preston@gmail.com> Date: March 26, 2017 GitHub: http://github.com/hpreston/haciendo_aio Lab: http://github.com/hpreston/haciendo_lab Haciendo is a simple application built as a fun demonstration and lab exercise for application refactoring. The point of the lab is ...
179
30.08
134
14
1,242
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c703624970b48ca4_2487e042", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-215" ]
[ "py/clear-text-logging-sensitive-data", "py/flask-debug" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger." ]
[ 114, 179 ]
[ null, null ]
[ 15, 5 ]
[ 22, 55 ]
2024-11-18T20:59:44.849808+00:00
1,462,799,580,000
2e08d325c9150a445c453f14a0204a9c92dc2611
3
{ "blob_id": "2e08d325c9150a445c453f14a0204a9c92dc2611", "branch_name": "refs/heads/master", "committer_date": 1462799580000, "content_id": "7eccec08df91e21e38311f313c6b3e276f35adf3", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "fa7ce71707bc9984add8d8ce9b453f9f698e9087", "extension": "p...
2.59375
stackv2
from flask import Flask, render_template import json app = Flask(__name__) @app.route('/') def index(): return render_template('index.html') @app.route('/tasks', methods=['GET']) def list_tasks(): tasks = [{'id': 1, 'name': 'Task 1'}, {'id': 2, 'name': 'Task 2'}, {'id': 3, 'name': 'Task 3'}] return jso...
43
20.7
99
11
265
python
[{"finding_id": "codeql_py/reflective-xss_fb4e778f9211ec73_2ddb9e90", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
3
true
[ "CWE-079", "CWE-079", "CWE-079" ]
[ "py/reflective-xss", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 21, 33, 38 ]
[ null, null, null ]
[ 12, 12, 12 ]
[ 28, 28, 39 ]
2024-11-18T21:00:02.142350+00:00
1,603,836,333,000
8d204b86bd3f1aca90b06832385bd497af72e2f9
3
{ "blob_id": "8d204b86bd3f1aca90b06832385bd497af72e2f9", "branch_name": "refs/heads/main", "committer_date": 1603836333000, "content_id": "886d8e6f558cf33e70b35da3ee9d635191534bf4", "detected_licenses": [ "MIT" ], "directory_id": "38562596a441c42d687a4fb9eb0acdb0b0a225d9", "extension": "py", "file...
2.84375
stackv2
import json import plotly import pandas as pd import pickle import re from nltk.stem import WordNetLemmatizer from nltk.tokenize import word_tokenize from flask import Flask from flask import render_template, request, jsonify from plotly.graph_objs import Bar from sqlalchemy import create_engine app = Flask(__name_...
150
25.35
92
16
895
python
[{"finding_id": "codeql_py/overly-large-range_c7f6f1942f7d860e_ea07305a", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
2
true
[ "CWE-020", "CWE-215" ]
[ "py/overly-large-range", "py/flask-debug" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger." ]
[ 18, 146 ]
[ null, null ]
[ 44, 5 ]
[ 47, 35 ]
2024-11-18T21:10:50.382811+00:00
1,482,181,609,000
b2ea3d86e9967372985157572a208cc83434f9c6
3
{ "blob_id": "b2ea3d86e9967372985157572a208cc83434f9c6", "branch_name": "refs/heads/master", "committer_date": 1482181609000, "content_id": "1b3cd7b712080365ceda09cac19da75af0f290d4", "detected_licenses": [ "MIT" ], "directory_id": "cd7235651509ce328f282ec96becd5e472a953f1", "extension": "py", "fi...
2.75
stackv2
from __future__ import print_function import boto3 from botocore.exceptions import ClientError from operator import itemgetter class Survivor: survivors_table = boto3.resource('dynamodb').Table('Survivors') def __init__(self, phone_number=None): # Construct from Dynamo if user exists, set propert...
44
34.59
98
18
313
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bbf07c7fea501325_9cdac12a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 38 ]
[ null ]
[ 15 ]
[ 56 ]
2024-11-18T21:10:52.647633+00:00
1,632,379,341,000
6efbbf9e3bce3adc4fbc16853fb280de816750ad
2
{ "blob_id": "6efbbf9e3bce3adc4fbc16853fb280de816750ad", "branch_name": "refs/heads/main", "committer_date": 1632379341000, "content_id": "785bb84255ccfb2ad5ca4eb0e6b7dbb761e2c3e8", "detected_licenses": [ "MIT" ], "directory_id": "21ad3a9fc248bbab6816dbad3ca17614a5c633ad", "extension": "py", "file...
2.3125
stackv2
from datetime import datetime # import config import json import pymongo import requests import plotly from urllib3.exceptions import ProtocolError import json import matplotlib.pyplot as plt import numpy as np import pandas as pd import string import nltk import re from nltk.corpus import stopwords from nltk.stem...
260
32.9
171
19
2,330
python
[{"finding_id": "codeql_py/command-line-injection_ec5c6bd3c83ffd8f_589f87d8", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {...
2
true
[ "CWE-078", "CWE-215" ]
[ "py/command-line-injection", "py/flask-debug" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This command line depends on a [user-provided value](1).", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger." ]
[ 105, 240 ]
[ 106, null ]
[ 14, 5 ]
[ 53, 44 ]
2024-11-18T21:23:39.379030+00:00
1,619,075,440,000
40cf971f58fec0d8ed1ab806eac02835beb1b90f
3
{ "blob_id": "40cf971f58fec0d8ed1ab806eac02835beb1b90f", "branch_name": "refs/heads/master", "committer_date": 1619075440000, "content_id": "f39e2c8cb41286cb59b9f17a516427997013090a", "detected_licenses": [ "Apache-2.0" ], "directory_id": "1623e8fa7c525d5a3eb924a71824f22acf0235cc", "extension": "py"...
2.765625
stackv2
#!/usr/local/bin/python ################################################### #Inputs: #1) a single seed #2) a uuid #Outputs: #1) url_list.txt - a list of images that are retrieved from Flickr import os, sys, json, flickrapi, codecs #================================================= def callTheApi(api_key, seed, pe...
85
33.94
101
20
792
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_d07a02635088a266_b986472d", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (secret)](1) as clear text." ]
[ 64 ]
[ null ]
[ 12 ]
[ 101 ]
2024-11-18T21:24:01.191214+00:00
1,474,483,766,000
b838ef0d67c0d50401bbc92ec5fb2e3ba9870bea
3
{ "blob_id": "b838ef0d67c0d50401bbc92ec5fb2e3ba9870bea", "branch_name": "refs/heads/master", "committer_date": 1474483766000, "content_id": "9e157c5f6c7fc9b8b9ce7002654deabe79900a2f", "detected_licenses": [ "Apache-2.0" ], "directory_id": "5ccd50ab4b96f736d5e02c2ab4380ca8f47f4b3b", "extension": "py"...
2.578125
stackv2
# # Copyright (c) SAS Institute Inc. # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in w...
135
31.36
76
15
924
python
[{"finding_id": "codeql_py/overly-permissive-file_79984163132678ac_58e00ab6", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable." ]
[ 112 ]
[ null ]
[ 9 ]
[ 36 ]
2024-11-18T21:24:02.900848+00:00
1,599,849,251,000
7e7041cfae30c257bc360564febad15d89ae31ce
3
{ "blob_id": "7e7041cfae30c257bc360564febad15d89ae31ce", "branch_name": "refs/heads/master", "committer_date": 1599849251000, "content_id": "a5eea8425b6e9ea78f82b6b636327e983722971c", "detected_licenses": [ "MIT" ], "directory_id": "b227729a494ae5c2c9bfd6248476999874d66731", "extension": "py", "fi...
2.734375
stackv2
#!/usr/bin/env python import json import logging import os import sys import time import traceback from itertools import cycle import coloredlogs import pandas as pd import populartimes from sqlalchemy import create_engine from sqlalchemy.orm import sessionmaker from config import API_KEY_FILE, DB_DIR, PLACE_ID_FILE...
129
27.83
105
18
807
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f7f9e872d31c50c8_0a136757", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 54 ]
[ null ]
[ 9 ]
[ 83 ]
2024-11-18T21:37:25.505540+00:00
1,594,853,748,000
c63e74a9b5320dedbb651c135e3f112cba4ea801
3
{ "blob_id": "c63e74a9b5320dedbb651c135e3f112cba4ea801", "branch_name": "refs/heads/master", "committer_date": 1594853748000, "content_id": "8e813ee501bde541895851065f5b9373c11ef32a", "detected_licenses": [ "MIT" ], "directory_id": "826aacddc06141dc2c7a65579d32e4cd835ce898", "extension": "py", "fi...
3.234375
stackv2
""" How was working with MongoDB different from working with PostgreSQL? Working with MongoDB was harder because of the diferent syntax than what I'm used to. Moreover, it has more freedom for loading data. Which could be a good thing, but also adds more changes for human error. I'll research different use cases f...
67
29.91
121
10
480
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_59a4910a26d0fc14_48202a93", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 30 ]
[ null ]
[ 15 ]
[ 29 ]
2024-11-18T21:37:41.758003+00:00
1,689,708,333,000
82fa2b2b08f237ca38bd26ddb61e0db8243441dd
2
{ "blob_id": "82fa2b2b08f237ca38bd26ddb61e0db8243441dd", "branch_name": "refs/heads/master", "committer_date": 1689708333000, "content_id": "2065f7330fe046061cc32ecd1d3969dd740c1aa9", "detected_licenses": [ "MIT" ], "directory_id": "57e194db1420fea5675d3e9920cdd5dd7ba326bc", "extension": "py", "fi...
2.328125
stackv2
import sys import uuid import traceback import redis import pymysql from wsgiref.simple_server import make_server from pyramid.config import Configurator from pyramid.response import Response import platformshconfig pshconfig = platformshconfig.Config() def hello_world(request): tests = { "database":...
81
21.72
77
15
420
python
[{"finding_id": "codeql_py/stack-trace-exposure_fda397e26425b2e7_9e83394c", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 24 ]
[ null ]
[ 21 ]
[ 31 ]
2024-11-18T21:37:42.325347+00:00
1,562,372,697,000
c307b2570f1c129f8e66b77cb20879c4bc1a6d71
3
{ "blob_id": "c307b2570f1c129f8e66b77cb20879c4bc1a6d71", "branch_name": "refs/heads/master", "committer_date": 1562372697000, "content_id": "bfd4a79f5765344bd2eac6d349b93fe2040d80f2", "detected_licenses": [ "MIT" ], "directory_id": "cb29e3b6d2ece31c30187d66587eedc455dc81fc", "extension": "py", "fi...
2.703125
stackv2
import os import pandas as pd from sqlalchemy import create_engine, inspect, Table, Column from sys import exit class MysqlClient: def __init__( self, user, password, hostname, ): self.db_url = 'mysql+mysqlconnector://{user}:{password}@{hostname}'.format( u...
47
23.85
83
14
271
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_909b62449094bf4d_b7d7cb92", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 21 ]
[ null ]
[ 15 ]
[ 26 ]
2024-11-18T21:37:52.965886+00:00
1,675,179,010,000
ba913add80507d7b775c17824de510c8c0392782
3
{ "blob_id": "ba913add80507d7b775c17824de510c8c0392782", "branch_name": "refs/heads/master", "committer_date": 1675179010000, "content_id": "b0d72ac81e593bc036f34b191af5caf2f7e04e60", "detected_licenses": [ "Zlib" ], "directory_id": "2bbc4c0f576759b488ee5cc875e517e0702ccc75", "extension": "py", "f...
2.515625
stackv2
#!/usr/bin/python3 import argparse from collections import defaultdict from datetime import datetime import os import parse import re import subprocess import sys import tarfile import time import yaml def error(msg): print(msg) sys.exit(-1) def timestamp(): return '{}'.format(int(time.time())) def _...
261
29.36
153
19
1,931
python
[{"finding_id": "codeql_py/tarslip_739d37e80f53de79_f7bd58cd", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 138 ]
[ null ]
[ 9 ]
[ 10 ]
2024-11-18T21:59:01.506662+00:00
1,587,248,636,000
f4206152aa73e1151f16000d635dbec7891815cd
3
{ "blob_id": "f4206152aa73e1151f16000d635dbec7891815cd", "branch_name": "refs/heads/master", "committer_date": 1587248636000, "content_id": "866fe71e5df2a0341a3273530249145486fd0928", "detected_licenses": [ "MIT" ], "directory_id": "c157983c80227348e78073ced29299fa675282d3", "extension": "py", "fi...
3.125
stackv2
import pandas as pd import numpy as np class DataProcessing: def __init__(self): self.file = pd.read_csv("anime.csv") self.test = pd.read_csv("teste.csv") @staticmethod def amplitute(first, last, sturges_size=5): return (last - first) / sturges_size @staticmethod def max...
171
37.71
120
21
1,705
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_308484f93e7fa00d_b4431f48", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text." ]
[ 164 ]
[ null ]
[ 34 ]
[ 35 ]
2024-11-18T21:59:22.857593+00:00
1,607,697,298,000
a4c6b8287dd0db6c2cdc22d33f5af7de3aac78c3
2
{ "blob_id": "a4c6b8287dd0db6c2cdc22d33f5af7de3aac78c3", "branch_name": "refs/heads/master", "committer_date": 1607697298000, "content_id": "a42db8a445e1f0bc592c92b887ee2ccad431f4a9", "detected_licenses": [ "MIT" ], "directory_id": "75c04b5e59d153f5096adbc91b0cf8fe10c5bd72", "extension": "py", "fi...
2.421875
stackv2
import re import json import logging import requests from requests.adapters import HTTPAdapter from requests.packages.urllib3.util.retry import Retry from salesmanago_python_api.data.auth import SalesManagoAuthData from salesmanago_python_api.data.event import SalesManagoEventData logger = logging.getLogger(__name__)...
209
32.73
160
16
1,459
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b0d0af1913a15fa0_40333e6e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text." ]
[ 40 ]
[ 46 ]
[ 22 ]
[ 11 ]
2024-11-18T21:59:28.552728+00:00
1,437,726,491,000
884066f488e7691d9328f5c5f82275eb65666001
3
{ "blob_id": "884066f488e7691d9328f5c5f82275eb65666001", "branch_name": "refs/heads/master", "committer_date": 1437726491000, "content_id": "f19c0dcb9df5da52fab1424123baab43dcccc5e9", "detected_licenses": [ "MIT" ], "directory_id": "9353be31afcac458035c0208d4ce2c9777c44bc8", "extension": "py", "fi...
2.65625
stackv2
#!/usr/bin/python # # grab an entire folder of nessus scans # in .nessus format and dump them in the directory # # useful for when you had to do fifty scans for some ungodly reason # # note that this only grabs the most recent scan, it doesn't care about scan history # # written by ak of Asterisk Information Security ...
122
38.59
128
20
1,115
python
[{"finding_id": "codeql_py/request-without-cert-validation_2e7030d77d1de2cf_341c205a", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
6
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 91, 95, 99, 104, 106, 118 ]
[ null, null, null, null, null, null ]
[ 9, 9, 13, 21, 23, 9 ]
[ 67, 91, 103, 108, 129, 71 ]
2024-11-18T22:11:29.005803+00:00
1,555,278,251,000
493eb408ade703bd7e0528e7825dbfb263241e3d
2
{ "blob_id": "493eb408ade703bd7e0528e7825dbfb263241e3d", "branch_name": "refs/heads/master", "committer_date": 1555278251000, "content_id": "9181f1442647f2be5404fb8c4efdde2ccad753b5", "detected_licenses": [ "Apache-2.0" ], "directory_id": "b5691a7337eec35a20ac3e72329a23d055aadde9", "extension": "py"...
2.359375
stackv2
# coding: utf-8 """ Utility for livedoor corpus test ``` cd <repository root> python src/ld_fetch_data.py ``` -h option to see detail """ import sys import os import glob import argparse import configparser import subprocess import tarfile import tempfile from urllib.request import urlretrieve import json import ...
352
32.39
125
20
2,652
python
[{"finding_id": "codeql_py/tarslip_377e8b424d0ea723_614fc1a6", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 63 ]
[ null ]
[ 9 ]
[ 12 ]
2024-11-18T22:11:50.624893+00:00
1,430,322,536,000
beaa49e40c4a4b11c6702bb734ec962272a17ca7
2
{ "blob_id": "beaa49e40c4a4b11c6702bb734ec962272a17ca7", "branch_name": "refs/heads/master", "committer_date": 1430322536000, "content_id": "a39e043d5c7f6fdd001e260aa5bf45b5c9dc2ebd", "detected_licenses": [ "MIT" ], "directory_id": "fea93d46675bbf7af108db2e23645fa8861e6321", "extension": "py", "fi...
2.328125
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- from bson.objectid import ObjectId from pymongo import MongoClient from validate_email import validate_email from views.base import base import config import hashlib class login(): @property def db(self): if config.debug == True: client = MongoClient('localhost', ...
100
23.18
102
20
683
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_a80b50c08fd77a97_66b79bdf", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 86 ]
[ null ]
[ 27 ]
[ 43 ]
2024-11-18T22:11:51.526927+00:00
1,657,908,305,000
8f5223b97dc85650cfac2628b9da259206dc0454
3
{ "blob_id": "8f5223b97dc85650cfac2628b9da259206dc0454", "branch_name": "refs/heads/master", "committer_date": 1657908305000, "content_id": "8267f75f037c7c4212a6f03c7dbe0cd05061ddbd", "detected_licenses": [ "MIT" ], "directory_id": "ed81f401dcd2ce0399cec3a99b6e5851e62e74ca", "extension": "py", "fi...
2.53125
stackv2
import os import os.path import sys from .common import * def max_samples_per_repositories(dataset, max_samples): samples_per_repo = {} for path in dataset.data["files"].keys(): if not path.startswith("github.com/"): continue repo = "/".join(path.split("/")[1:3]) samples_p...
89
29.38
87
15
623
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_aca7ee07f4fced80_fa1bc35e", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [github.com/](1) may be at an arbitrary position in the...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [github.com/](1) may be at an arbitrary position in the sanitized URL." ]
[ 11 ]
[ null ]
[ 16 ]
[ 46 ]
2024-11-18T22:11:53.904041+00:00
1,619,453,032,000
8d8a94ef4e721a3f58d8a36cab6de9a82ab1c214
2
{ "blob_id": "8d8a94ef4e721a3f58d8a36cab6de9a82ab1c214", "branch_name": "refs/heads/main", "committer_date": 1619453032000, "content_id": "80b90d09748b9c769f3cfa7393ab9002d3a4957c", "detected_licenses": [ "Apache-2.0" ], "directory_id": "710cbf6248a5d51bdb7e9e947f512f11f3b600af", "extension": "py", ...
2.34375
stackv2
from app.calculator import calc # 获取蓝图 from flask import request,session,render_template,flash,redirect,url_for @calc.route('/calc_info', methods=['GET', 'POST']) # 设置路由 def calc_info(): # 执行的方法 result = None if request.method == 'POST': expression = request.form['expression'] print("resul...
20
25.45
72
14
136
python
[{"finding_id": "codeql_py/code-injection_e349321f44551746_5f5146a4", "tool_name": "codeql", "rule_id": "py/code-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This code execution depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "...
2
true
[ "CWE-094", "CWE-094" ]
[ "py/code-injection", "py/code-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This code execution depends on a [user-provided value](1).", "This code execution depends on a [user-provided value](1)." ]
[ 11, 12 ]
[ null, null ]
[ 39, 23 ]
[ 49, 33 ]
2024-11-18T22:11:56.390831+00:00
1,684,008,120,000
ba78de613e91618be86a29ddb5e5b2669d0f0100
3
{ "blob_id": "ba78de613e91618be86a29ddb5e5b2669d0f0100", "branch_name": "refs/heads/master", "committer_date": 1684008120000, "content_id": "a2c87bb9cec1ead5fca20a191864c8cfa247ce76", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "e5c73897fb5c0f97cd6380645d433f0af374b6b5", "extension": "p...
2.59375
stackv2
"""`backup` management command. Backs up the database and media files. """ import os import shutil import time import tempfile from datetime import datetime from django.core.exceptions import ImproperlyConfigured from django.core.management.base import BaseCommand, CommandError, CommandParser from django.conf import s...
227
37.06
97
15
1,968
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f8a9753315f2cb4c_a126ba0f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 19 ]
[ null ]
[ 15 ]
[ 19 ]
2024-11-18T22:24:11.808092+00:00
1,634,245,009,000
69fdffd6a4a353ef8252bfaf87f13fd4317ff0d0
3
{ "blob_id": "69fdffd6a4a353ef8252bfaf87f13fd4317ff0d0", "branch_name": "refs/heads/master", "committer_date": 1634245009000, "content_id": "2f1b1c3919e4a675705ff86b61ad38b8d79e7005", "detected_licenses": [ "MIT" ], "directory_id": "b1d718f1b364fc256062e6975a831bca56e99473", "extension": "py", "fi...
3.375
stackv2
#!/usr/bin/env python3 from pprint import pprint import contextlib import datetime import pytz import requests import sqlite3 API_KEY = os.environ.get(OPENWEATHERAPI) def main(): weather = api_call() cli_display(weather) timestamp = datetime_helper(weather) create_db() insert_data(weather, time...
120
27.44
87
13
801
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f09b8707dba4d169_d60928b9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
4
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 49, 50, 51, 52 ]
[ null, null, null, null ]
[ 11, 11, 11, 11 ]
[ 58, 67, 67, 51 ]
2024-11-18T22:24:26.015342+00:00
1,646,841,742,000
e1f04e68c6ea62522776226e38ad29236f9a40fa
3
{ "blob_id": "e1f04e68c6ea62522776226e38ad29236f9a40fa", "branch_name": "refs/heads/master", "committer_date": 1646841742000, "content_id": "a2d8d3cf6c903b0da00be6ab6f53bbe61260c9a0", "detected_licenses": [ "MIT" ], "directory_id": "bf8fbff494eaaf8046a41d676d553d4e8144ddeb", "extension": "py", "fi...
3.15625
stackv2
""" Given the name of a server, mark (or unmark) it as favourite, store its password. """ # Python 3 import tkinter as tk from tkinter import ttk ############################ # The Editor's public class: ############################ class Editor: def __init__(self, parentFrame, serverName, favourite, password): ...
108
30.65
85
12
845
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a143bc9f5bbb99e5_7061f989", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 73 ]
[ null ]
[ 15 ]
[ 39 ]
2024-11-18T22:36:03.281698+00:00
1,625,632,966,000
77f9d3d6ea97b693696c511e07e548a15705f372
3
{ "blob_id": "77f9d3d6ea97b693696c511e07e548a15705f372", "branch_name": "refs/heads/main", "committer_date": 1625632966000, "content_id": "c1b7335afe6d2b17c5ce1145ad72173066c38b6e", "detected_licenses": [ "MIT" ], "directory_id": "6c166c5abf3b0a6e1b4641289c5b4b725c90c5d4", "extension": "py", "file...
2.859375
stackv2
from secrets import API_KEY, CLIENT_ID, CLIENT_SECRET import pandas as pd import requests url = "https://www.googleapis.com/youtube/v3/search" def call_youtube(): results = [] ragas = list_ragas() for raga in ragas: params = { "part": "snippet", "maxResults": 100, ...
64
24.84
68
15
431
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fdaa62cc35fb4598_12a20b24", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 23 ]
[ null ]
[ 19 ]
[ 27 ]
2024-11-18T22:36:33.329365+00:00
1,626,409,956,000
b5843057bcc4344d4ac5e424f78d0fb6c8de1bc1
3
{ "blob_id": "b5843057bcc4344d4ac5e424f78d0fb6c8de1bc1", "branch_name": "refs/heads/main", "committer_date": 1626409956000, "content_id": "040211c81c426602ef319db92931164841e7d39e", "detected_licenses": [ "MIT" ], "directory_id": "7e7dc2d7293ad07866fef3be3c6a3dd5f9c1a5bc", "extension": "py", "file...
2.8125
stackv2
#This program reads tweets made within a week and scans it to categorize as a positive or negative opinion. #In the cryptocurrency world, the Fear vs Greed index is one way of analysing if an asset will increase or decrease. #This program tries to do that index. from os import truncate from datetime import date, timed...
114
49.11
125
11
1,638
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e0de624508115a53_7d0e462f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 63, 64, 66 ]
[ null, null, null ]
[ 25, 25, 32 ]
[ 32, 35, 50 ]
2024-11-18T20:23:15.013337+00:00
1,653,788,651,000
cb754b8e4f0d8ff9168ad6a49b65fd674b29ff4d
2
{ "blob_id": "cb754b8e4f0d8ff9168ad6a49b65fd674b29ff4d", "branch_name": "refs/heads/master", "committer_date": 1653788651000, "content_id": "9808ecb3de324d60937d73406efda0a5515d14ea", "detected_licenses": [ "Apache-2.0" ], "directory_id": "b1c3cc247eee420bd89a79b57e1d59ac04dcbd47", "extension": "py"...
2.484375
stackv2
import socket import uuid from halocoin.ntwrk.message import Message from halocoin.ntwrk.response import Response MAX_MESSAGE_SIZE = 1024 def receive(sock, **kwargs): """ Receives a socket message one time. This is not a SMP message. :param sock: Socket :param kwargs: :return: """ args ...
121
26.8
98
16
761
python
[{"finding_id": "codeql_py/insecure-default-protocol_1719e533855e79d2_709f6ea7", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in...
1
true
[ "CWE-327" ]
[ "py/insecure-default-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used." ]
[ 86 ]
[ null ]
[ 13 ]
[ 43 ]
2024-11-18T20:23:22.484969+00:00
1,589,574,610,000
77cf4474abf28dbd710078e106c8cebf807e80f3
3
{ "blob_id": "77cf4474abf28dbd710078e106c8cebf807e80f3", "branch_name": "refs/heads/master", "committer_date": 1589574610000, "content_id": "9f5427e6226097648e0a39e4226bc3b7328cebbc", "detected_licenses": [ "MIT" ], "directory_id": "c5c4e4ee5a0733af1550cc0b92fcb43dda73b33a", "extension": "py", "fi...
2.703125
stackv2
import requests import json import ast import joblib from flask import Flask, request, jsonify import traceback import pandas as pd import numpy as np # defining the api-endpoint XGBOOST_API_ENDPOINT = "http://127.0.0.1:12345/xgboost_api" DATABASE_API_ENDPOINT = "http://127.0.0.1:12346/database_api" FEATURE_API_EN...
81
32.48
108
21
692
python
[{"finding_id": "codeql_py/stack-trace-exposure_fbbab6b357530f33_535e859c", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-215" ]
[ "py/stack-trace-exposure", "py/flask-debug" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger." ]
[ 62, 81 ]
[ null, null ]
[ 19, 2 ]
[ 52, 32 ]
2024-11-18T21:22:21.613397+00:00
1,659,864,747,000
84e712706e41d2ab79868c8bbca7131277a37bf3
4
{ "blob_id": "84e712706e41d2ab79868c8bbca7131277a37bf3", "branch_name": "refs/heads/master", "committer_date": 1659864747000, "content_id": "d7966ce6c84da7c98269bf10988150922cb8307b", "detected_licenses": [ "MIT" ], "directory_id": "d1ed14daed2b2ebc0f7f7e5810f0715a57ac30c4", "extension": "py", "fi...
3.828125
stackv2
class Employee: number_of_employees = 0 raise_amount = 1.04 def __init__(self, first, last, pay): ## self is the instance here self.first = first self.last = last self.pay = pay self.email = first + "." + last + "@company.com" Employee.number_of_employees += 1 ...
28
24.71
71
12
190
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fd331896e4084ba7_dc1df445", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 23, 28 ]
[ null, null ]
[ 7, 7 ]
[ 35, 35 ]
2024-11-18T21:22:47.642741+00:00
1,558,784,711,000
1866c8ee95ee25ec8d1156a9dd664678ef6fbd60
2
{ "blob_id": "1866c8ee95ee25ec8d1156a9dd664678ef6fbd60", "branch_name": "refs/heads/master", "committer_date": 1558784711000, "content_id": "b6e1c86e5b76b161595912a88f5dc0c3bc9d2c83", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "d61d05748a59a1a73bbf3c39dd2c1a52d649d6e3", "extension": "p...
2.484375
stackv2
#!/usr/bin/python # Copyright (c) 2012 The Chromium Authors. All rights reserved. # Use of this source code is governed by a BSD-style license that can be # found in the LICENSE file. """Utilities for formatting and writing DEPS files.""" from __future__ import print_function from builtins import str from builtins im...
271
34.41
79
18
2,494
python
[{"finding_id": "codeql_py/overly-permissive-file_1ba673a05f1c6694_6918e956", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to group writable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to group writable." ]
[ 264 ]
[ null ]
[ 5 ]
[ 26 ]
2024-11-18T21:51:29.751526+00:00
1,612,193,208,000
d4a82075303b1f6a7d348b5b85c25b675e87812d
2
{ "blob_id": "d4a82075303b1f6a7d348b5b85c25b675e87812d", "branch_name": "refs/heads/main", "committer_date": 1612193208000, "content_id": "8806f0d1ef2074d60636c10d9cc1eeec96794008", "detected_licenses": [ "Apache-2.0" ], "directory_id": "c3f49d1bd74e84f02659bd72f9361f06605bfd74", "extension": "py", ...
2.5
stackv2
#!/usr/bin/env python3 """Generate the dockerfiles from a jinja template.""" from jinja2 import Environment, FileSystemLoader from settings import templates from settings import images import logging log = logging.getLogger(__name__) def generate(log): """Generate the dockerfiles for this repo.""" file_loade...
49
32.82
71
14
343
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_36eea66d00d22a67_d6a505a6", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 14 ]
[ null ]
[ 11 ]
[ 42 ]
2024-11-18T21:51:37.936267+00:00
1,615,546,359,000
c930d464a022ec92e4e5dfe09f8a1879014045ab
3
{ "blob_id": "c930d464a022ec92e4e5dfe09f8a1879014045ab", "branch_name": "refs/heads/main", "committer_date": 1615546359000, "content_id": "26a24c04bd18cbddb42e8c1c2f4b7e00c4364d54", "detected_licenses": [ "MIT" ], "directory_id": "599cd9067d0c9795a943fec0c75dc0a40c8a5f31", "extension": "py", "file...
2.953125
stackv2
from flask import Flask, request, Response import sudoku import generator app = Flask(__name__) @app.route("/solve", methods=["POST"]) def solve(): payload = request.get_json() if (not payload) or ("board" not in payload): return Response("You must provide sudoku board in request", 400) board_...
55
21.76
72
11
285
python
[{"finding_id": "codeql_py/flask-debug_7fb0f1eace68578e_b3b2b011", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 55, 29 ]
[ null, null ]
[ 5, 12 ]
[ 24, 20 ]
2024-11-18T21:51:46.847102+00:00
1,611,591,215,000
3b7378e177dae2ba60127640ecb5fa8c2219e605
3
{ "blob_id": "3b7378e177dae2ba60127640ecb5fa8c2219e605", "branch_name": "refs/heads/main", "committer_date": 1611591215000, "content_id": "e8aa39feb6fea24e6229c7cafb2a1a03c336e1a1", "detected_licenses": [ "MIT" ], "directory_id": "f1ec7a7987325b58bc419681e5000016d564a681", "extension": "py", "file...
2.546875
stackv2
from rest_framework.views import APIView from rest_framework import status from rest_framework.response import Response from rest_framework.parsers import JSONParser from rest_framework.permissions import AllowAny from django.contrib.auth.models import User # Create your views here. class Register(APIView): permi...
53
27.42
62
16
276
python
[{"finding_id": "codeql_py/stack-trace-exposure_f27291b2488d2d38_572cb266", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 39 ]
[ 42 ]
[ 17 ]
[ 18 ]
2024-11-18T21:51:50.108131+00:00
1,630,213,982,000
0468cd8c267713643a2f15abf5e474efc2baa787
2
{ "blob_id": "0468cd8c267713643a2f15abf5e474efc2baa787", "branch_name": "refs/heads/main", "committer_date": 1630213982000, "content_id": "b56a00703ad68d5a3f4483c85543be175b75a14d", "detected_licenses": [ "MIT" ], "directory_id": "c446f5182efff1a6da580ce781eb36f58884af21", "extension": "py", "file...
2.34375
stackv2
from fastapi import APIRouter import requests from conf.conf import OPENWEATHERMAP_API_KEY, url greeting = APIRouter() wheather = APIRouter() @greeting.get('/greeting') def helloWorld(): return "Hello, World" @wheather.get('/wheather/{city}') def getWheatherCity(city: str): req = url.format(city, OPENWEATH...
18
20.39
50
9
102
python
[{"finding_id": "codeql_py/partial-ssrf_47337d7574517aff_4169959f", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 17 ]
[ null ]
[ 11 ]
[ 28 ]
2024-11-18T22:02:40.143178+00:00
1,547,232,896,000
06a55d595f021e76ca1ed72cf7856a88174035ba
4
{ "blob_id": "06a55d595f021e76ca1ed72cf7856a88174035ba", "branch_name": "refs/heads/master", "committer_date": 1547232896000, "content_id": "e066ee431545dc22d95b7674dcdad5cc7937c584", "detected_licenses": [ "Unlicense" ], "directory_id": "848499c69849968fb1aa7786ac245904a8dff591", "extension": "py",...
3.609375
stackv2
#!/usr/bin/env python3 ''' Vectorize text input data and create vocab file ''' import os import re import numpy as np class TextVec(object): ''' TextVec Class - Builds character map from unique alphabetical and whitespace characters in data - Vectorizes an x and y with shapes determined by s...
67
35.85
95
15
564
python
[{"finding_id": "codeql_py/overly-large-range_70a63fc1597063f0_8043d202", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 39 ]
[ null ]
[ 34 ]
[ 37 ]
2024-11-18T22:02:43.134923+00:00
1,620,960,753,000
4c619b5db9c004d5c214ef5288dd8add07f4ae0b
3
{ "blob_id": "4c619b5db9c004d5c214ef5288dd8add07f4ae0b", "branch_name": "refs/heads/master", "committer_date": 1620960753000, "content_id": "9068a069e5d51fac1864c1ca6b683361b792e7b0", "detected_licenses": [ "MIT" ], "directory_id": "719b5faf078c8262af75ebe3c0ced626649593b0", "extension": "py", "fi...
3.078125
stackv2
import datetime import traceback from example_models import Date, User, Name, Employee if __name__ == '__main__': item = {"year": 1985, "month": 4, "day": 3} date = Date(item) item = datetime.datetime(2017, 7, 20) date = Date(item) data = { 'favorite_color': None, 'favorite_numb...
57
18.86
60
11
329
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7cac60ebbef079e4_c2499f7e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 57 ]
[ null ]
[ 11 ]
[ 19 ]
2024-11-18T22:02:48.733076+00:00
1,600,430,308,000
1175330c1e2547d7ef8cc4aca1eabf551a573624
2
{ "blob_id": "1175330c1e2547d7ef8cc4aca1eabf551a573624", "branch_name": "refs/heads/master", "committer_date": 1600430308000, "content_id": "c3b16bfdb6d1ac9877a3f44d3e3f4bc35c6d130a", "detected_licenses": [ "MIT" ], "directory_id": "46bfdbfb1359057653a9859eeafb20692c1de3c9", "extension": "py", "fi...
2.46875
stackv2
import hou import glob, os, re from stat import ST_MTIME from datetime import datetime def main(): # Get a filename of the most recent opened file userPrefDir = hou.getenv('HOUDINI_USER_PREF_DIR') historyPath = os.path.join(userPrefDir, 'file.history') destPath = None filename = None if not o...
79
29.18
104
18
634
python
[{"finding_id": "codeql_py/redos_bf7d3fa6029e19cf_f45c6c47", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'HIP\\n{{\\n' and containing many ...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with 'HIP\\n{{\\n' and containing many repetitions of '\\n'." ]
[ 20 ]
[ null ]
[ 50 ]
[ 53 ]
2024-11-18T22:16:43.645588+00:00
1,539,102,958,000
3eea6d9b1bf398fd31e2bd29d60bf52ab124b151
3
{ "blob_id": "3eea6d9b1bf398fd31e2bd29d60bf52ab124b151", "branch_name": "refs/heads/master", "committer_date": 1539102958000, "content_id": "83a7381fefe107949c63c7b789c6e28274820e72", "detected_licenses": [ "MIT" ], "directory_id": "26e1e3392100f6fa9d5d849a6d09867c98708080", "extension": "py", "fi...
2.6875
stackv2
import os import pandas as pd import tarfile import matplotlib.pyplot as plt import hashlib import numpy as np from six.moves import urllib from sklearn.model_selection import StratifiedShuffleSplit from sklearn.preprocessing import Imputer, LabelEncoder, OneHotEncoder, LabelBinarizer, StandardScaler from sklearn.pipe...
204
41.35
114
14
1,937
python
[{"finding_id": "codeql_py/tarslip_bddaccfcd456dac8_08fa55a8", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 46 ]
[ null ]
[ 5 ]
[ 13 ]
2024-11-18T22:16:45.220486+00:00
1,338,055,240,000
7ff9db901cf60eac826631a86a197c3b38bf6691
3
{ "blob_id": "7ff9db901cf60eac826631a86a197c3b38bf6691", "branch_name": "refs/heads/master", "committer_date": 1338055240000, "content_id": "87713cdbc92a180d744f085421ebf5c2ee033f47", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "21dd79918a9872de1ce5cbc0f12d38644f91aec2", "extension": "p...
3.078125
stackv2
# -*- coding: utf-8 -*- """Advanced string formatting for Python >= 2.4. An implementation of the advanced string formatting (PEP 3101). CAUTION: this module is a stripped version, without strict error checking. Author: Florent Xicluna """ import re if hasattr(str, 'partition'): def partition(s, sep): ...
227
31.62
79
17
1,928
python
[{"finding_id": "codeql_py/redos_5e4f0cac75e51279_fa9081bb", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '{{z' and containing many repetiti...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '{{z' and containing many repetitions of 'z'." ]
[ 28 ]
[ null ]
[ 19 ]
[ 26 ]
2024-11-18T22:27:41.283222+00:00
1,587,017,928,000
e71e00d9e6e4413805ecb3150c885f51445cd605
3
{ "blob_id": "e71e00d9e6e4413805ecb3150c885f51445cd605", "branch_name": "refs/heads/master", "committer_date": 1587017928000, "content_id": "5adb683e4d1eb66594d334b3f929753952272afd", "detected_licenses": [ "MIT" ], "directory_id": "7737adea4591e821611105f548d7807a3744cdb7", "extension": "py", "fi...
2.859375
stackv2
from selenium import webdriver import csv import time import configparser driver = webdriver.Chrome() driver.maximize_window() driver.get('https://shub.edu.vn/login') def start(username, password, class_code, test_number): #Enter username input_username = driver.find_element_by_xpath('//*[@id="__next"]/div/di...
110
36.35
140
16
1,022
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_61e5bec93d357ca5_89accb83", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
6
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensi...
[ 100, 101, 102, 103, 104, 105 ]
[ null, null, null, null, null, null ]
[ 7, 7, 7, 7, 7, 7 ]
[ 31, 31, 35, 37, 37, 35 ]
2024-11-18T22:44:11.324702+00:00
1,676,152,352,000
0bc88063241863d7466f52a939ca59b3169308f7
3
{ "blob_id": "0bc88063241863d7466f52a939ca59b3169308f7", "branch_name": "refs/heads/master", "committer_date": 1676152352000, "content_id": "226fd4aaebf036f06cbdea554156448193b55469", "detected_licenses": [ "MIT" ], "directory_id": "2305caeb1fd48344bd81de24ae912cc777147b99", "extension": "py", "fi...
3.15625
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- ''' origin version: https://www.freecodecamp.org/forum/t/make-a-script-read-gps-geolocation/241607 ''' import requests import time # Step 1) Find the public IP of the user. This is easier said that done, look into the library Netifaces if you're # interested in getting...
37
30.62
114
18
337
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_46062eb593cff1e3_0fa30bcd", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text." ]
[ 31 ]
[ null ]
[ 17 ]
[ 23 ]
2024-11-18T20:37:01.730370+00:00
1,601,387,321,000
1d7d37e58c96c39a2e29677271c8a316d78b9c21
3
{ "blob_id": "1d7d37e58c96c39a2e29677271c8a316d78b9c21", "branch_name": "refs/heads/master", "committer_date": 1601387321000, "content_id": "762644fb0b6b9070de322fdac9ac5c8ce25947ac", "detected_licenses": [ "MIT" ], "directory_id": "8d7b18da138d45acb96e02c6e166b5c8524a486a", "extension": "py", "fi...
2.671875
stackv2
# !/usr/bin/env python3 # -*- coding:utf-8 -*- ### # File: e:\code\python\spider\.vscode\music_spider\main.py # Project: e:\code\python\spider\.vscode\music_spider # Created Date: Saturday, September 12th 2020, 10:10:32 pm # Author: rz # ----- # Last Modified: # Modified By: # ----- # Copyright (c) 2020 rz WTI bupt # #...
75
29
152
26
687
python
[{"finding_id": "codeql_py/request-without-cert-validation_ece2445652e2c60f_65e64036", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 37 ]
[ null ]
[ 13 ]
[ 60 ]
2024-11-18T20:59:43.792642+00:00
1,533,584,300,000
dc15e41bbeabf623c709b9ef2dc0b24314842941
2
{ "blob_id": "dc15e41bbeabf623c709b9ef2dc0b24314842941", "branch_name": "refs/heads/master", "committer_date": 1533584300000, "content_id": "e0ccd0ba9b9e6ba6485f2c9ce2e1fb1110f15906", "detected_licenses": [ "MIT" ], "directory_id": "7112bbd7da20b80f5e1273d06fabfb53f403f971", "extension": "py", "fi...
2.359375
stackv2
import tornado.ioloop import tornado.web import argparse import os import sys currentpath = os.path.dirname(os.path.realpath(__file__)) project_basedir = os.path.join(currentpath,'..') sys.path.append(project_basedir) from config import conf datadir = conf.distributed_datadir parser = argparse.ArgumentParser(descrip...
68
33.28
109
15
528
python
[{"finding_id": "codeql_py/path-injection_f71d4a2eb57d428f_e95357e1", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 32, 49 ]
[ null, null ]
[ 19, 19 ]
[ 45, 28 ]
2024-11-18T21:00:41.436748+00:00
1,664,226,877,000
e45c9f007c76c6a598a4caf8a6623d7c0571b06e
2
{ "blob_id": "e45c9f007c76c6a598a4caf8a6623d7c0571b06e", "branch_name": "refs/heads/master", "committer_date": 1664226877000, "content_id": "6c2cd20bdf7e175cbc9b8de5c34cdb7e634b677e", "detected_licenses": [ "Apache-2.0" ], "directory_id": "dd7d80666eb882ed36163ce888e2039ed077358b", "extension": "py"...
2.359375
stackv2
# Copyright 2018 Centrify Corporation # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in ...
121
42.42
114
21
1,054
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fdf29b820e2f6719_9042a2c9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 49 ]
[ 50 ]
[ 19 ]
[ 72 ]
2024-11-18T21:01:00.407158+00:00
1,619,536,686,000
b326dbfc83c59956062561c2ebdc3a2b6d64cae1
3
{ "blob_id": "b326dbfc83c59956062561c2ebdc3a2b6d64cae1", "branch_name": "refs/heads/main", "committer_date": 1619536686000, "content_id": "1830ca815281b7bc0ef894090a629d9fd6f39e1f", "detected_licenses": [ "MIT" ], "directory_id": "68e4d7f470cc922e72cc3c195c62cd34a0e203b3", "extension": "py", "file...
2.71875
stackv2
import requests import jinja2 import json import os URLS = ['armLink', 'documentationLink', 'githubLink'] WORKDIR='widgets/' ''' Writes a .md file to markdown/ ''' def write_widget(file_name, rendered_template): with open(os.path.join(WORKDIR, f'markdown/{file_name}.md'), 'w') as file_object: file_object....
97
32.03
123
22
751
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_4943f03d4cb9561f_026c7b93", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 55 ]
[ null ]
[ 19 ]
[ 52 ]
2024-11-18T21:01:02.224473+00:00
1,580,780,347,000
52c485cd0727f9c573266d24eb7baa74b3a37a2a
2
{ "blob_id": "52c485cd0727f9c573266d24eb7baa74b3a37a2a", "branch_name": "refs/heads/master", "committer_date": 1580780347000, "content_id": "b283ef1503235575897ab972f15f5aaa537815d2", "detected_licenses": [ "MIT" ], "directory_id": "119185ec4ce8d13a48c0f4690a93fcdb7f88b8e7", "extension": "py", "fi...
2.3125
stackv2
from flask import Blueprint, render_template, flash, redirect, \ url_for, request, Response from flask_login import login_required, current_user from .forms import UpdateAccountForm, UnlockCredentialStoreForm, \ EditCredentialsForm, DecryptCredentialStoreForm, EncryptCredentialStoreForm from resticweb import bc...
214
38.8
127
17
1,722
python
[{"finding_id": "codeql_py/reflective-xss_17ffdb0c42dcb83b_7297222b", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 69, 71 ]
[ null, null ]
[ 16, 16 ]
[ 80, 83 ]
2024-11-18T21:01:16.651022+00:00
1,575,657,963,000
66ec2ecd5d6809de570cf071423b57a71a5daff4
3
{ "blob_id": "66ec2ecd5d6809de570cf071423b57a71a5daff4", "branch_name": "refs/heads/master", "committer_date": 1575657963000, "content_id": "63b91975b6b489915dae6163c99d123649074740", "detected_licenses": [ "MIT" ], "directory_id": "49b8dad2cd5ef94e145c263998f731f5857dce39", "extension": "py", "fi...
2.8125
stackv2
import re import os import random import tarfile import urllib from torchtext import data class TarDataset(data.Dataset): """Defines a Dataset loaded from a downloadable tar archive. Attributes: url: URL where the tar archive can be downloaded. filename: Filename of the downloaded tar archive...
129
38.49
99
19
1,185
python
[{"finding_id": "codeql_py/tarslip_b26067580d506d3f_6bee1371", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 29 ]
[ null ]
[ 17 ]
[ 22 ]
2024-11-18T21:01:17.489781+00:00
1,555,093,300,000
25af8ecb4a9e4a6269ad544aff55733e77f9ee03
2
{ "blob_id": "25af8ecb4a9e4a6269ad544aff55733e77f9ee03", "branch_name": "refs/heads/master", "committer_date": 1555093300000, "content_id": "7c0b8fba69704fffec1fde7a342891dc00f638cc", "detected_licenses": [ "MIT" ], "directory_id": "927285a80b2dd0503dca5a27fdbd0988501f3266", "extension": "py", "fi...
2.375
stackv2
#! /usr/bin/env python import argparse import collections import errno import json import logging import os import re import socket import subprocess import sys import BaseHTTPServer import SimpleHTTPServer def parse_arguments(): parser = argparse.ArgumentParser() parser.add_argument( "-p", "--projec...
304
31.47
77
20
2,059
python
[{"finding_id": "codeql_py/log-injection_f79940355995064b_5f94670a", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
2
true
[ "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 130, 141 ]
[ null, null ]
[ 22, 31 ]
[ 61, 74 ]
2024-11-18T21:01:19.742578+00:00
1,564,733,383,000
25d2ffa8788f54f3e059f9524aab4ca69d342fc1
2
{ "blob_id": "25d2ffa8788f54f3e059f9524aab4ca69d342fc1", "branch_name": "refs/heads/master", "committer_date": 1564733383000, "content_id": "94811a5f859c8250c58ae56d58d677c198c84be6", "detected_licenses": [ "Apache-2.0" ], "directory_id": "19ffcf5055833e65c5dc6ff2b1e5cc716e5addc4", "extension": "py"...
2.484375
stackv2
import os import datetime import logging.config import traceback as tb from flask import request, jsonify, make_response import json # it MUST be included after flask! from pythonjsonlogger import jsonlogger from lxml import etree # this must be before logger setup class CustomJsonFormatter(jsonlogger.JsonFormatte...
103
30.89
90
16
758
python
[{"finding_id": "codeql_py/stack-trace-exposure_7158ae0c3c8c0f85_9227e2d4", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 53 ]
[ null ]
[ 34 ]
[ 35 ]