added
stringlengths
32
32
created
int64
1,244B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.25
source
stringclasses
1 value
text
stringlengths
324
20.1k
num_lines
int64
16
598
avg_line_length
float64
15.1
58.3
max_line_length
int64
33
179
ast_depth
int64
8
39
length
int64
101
3.8k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.1k
265k
sast_codeql_findings_count
int64
1
45
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
45
rule_ids
listlengths
1
45
confidences
listlengths
1
45
severities
listlengths
1
45
messages
listlengths
1
45
line_starts
listlengths
1
45
line_ends
listlengths
1
45
column_starts
listlengths
1
45
column_ends
listlengths
1
45
2024-11-19T00:24:54.781440+00:00
1,637,373,938,000
8206ba589decaeee9a9aa412b8a3158beb7ac045
2
{ "blob_id": "8206ba589decaeee9a9aa412b8a3158beb7ac045", "branch_name": "refs/heads/master", "committer_date": 1637373938000, "content_id": "29ff6798590587f2d6bc6f1a3bbc3fdce3cd2506", "detected_licenses": [ "Apache-2.0" ], "directory_id": "6ee06ad2bbc15cc0f829f99198947ffe8cffe395", "extension": "py"...
2.5
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- import requests import requests.packages.urllib3 from .Base import Base class Target(Base): def __init__(self, api_base_url, api_key): super().__init__(api_base_url, api_key) self.logger = self.get_logger def get_all(self): try: ...
75
33.69
136
17
590
python
[{"finding_id": "codeql_py/request-without-cert-validation_1f905aa2db8a763f_46e91729", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
4
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 19, 40, 56, 68 ]
[ null, null, null, null ]
[ 24, 24, 24, 24 ]
[ 95, 97, 107, 100 ]
2024-11-19T00:36:53.171394+00:00
1,543,559,900,000
148faff54c84c9f5f893993feecd928918f53477
4
{ "blob_id": "148faff54c84c9f5f893993feecd928918f53477", "branch_name": "refs/heads/master", "committer_date": 1543559900000, "content_id": "008a4902794aa3c606b6241465dcb7764137f39f", "detected_licenses": [ "MIT" ], "directory_id": "57f3b7c0c4b95d503a960ff1b8368e714f59053f", "extension": "py", "fi...
3.5625
stackv2
import time import random """One implementation of MeisterGeist. Summer 2017 Python class, CRAHS CDC. See https://github.com/cyberdefense-club/cdc2017-summer/blob/master/02-homework.txt""" # define quasi-constants: ALPHA = "ALPHA" BRAVO = "BRAVO" ZULU = "ZULU" SPACE = " " BACKSPACE = "\b" MINDIGITS = 1 MAXDIGITS = 8 ...
202
28.41
82
17
1,575
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5cb6782ac2ee3c91_bbc30d86", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](...
[ 118, 157, 191 ]
[ 119, 158, null ]
[ 23, 11, 11 ]
[ 42, 33, 55 ]
2024-11-19T00:36:58.586197+00:00
1,618,121,071,000
0a47508901c275a67c313f9100806c7457245aad
2
{ "blob_id": "0a47508901c275a67c313f9100806c7457245aad", "branch_name": "refs/heads/main", "committer_date": 1618121071000, "content_id": "e90175c486873649c834b1a9ead085ebd322c5f9", "detected_licenses": [ "Apache-2.0" ], "directory_id": "7ae0ff0f6815961b0ac6506b598d195f04e43eff", "extension": "py", ...
2.5
stackv2
from flask import Flask from flask import json from flask import Response from flask import request from concurrent.futures import ThreadPoolExecutor as Pool from queue import Queue import time import datetime import threading import subprocess import logging import sys import os import configparser import streamlink ...
101
26.39
128
17
614
python
[{"finding_id": "codeql_py/reflective-xss_cad8ca878fc73569_9775698b", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
3
true
[ "CWE-079", "CWE-079", "CWE-079" ]
[ "py/reflective-xss", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 36, 50, 52 ]
[ null, null, null ]
[ 16, 20, 20 ]
[ 37, 44, 44 ]
2024-11-19T00:37:03.483017+00:00
1,557,184,763,000
ea88bbe71a0439d0c23986ea3a2d7f86680a5581
3
{ "blob_id": "ea88bbe71a0439d0c23986ea3a2d7f86680a5581", "branch_name": "refs/heads/master", "committer_date": 1557184763000, "content_id": "0961905a754f09f4843a2d9d0ef6a65dc6516cb3", "detected_licenses": [ "MIT" ], "directory_id": "a53f33bf75d7eebfb2a6a07a31f60309beeb3a22", "extension": "py", "fi...
2.609375
stackv2
from flask import Flask, flash, render_template, request, redirect, url_for, send_from_directory, jsonify from werkzeug.utils import secure_filename import os from skimage import color # change colour of image from scipy.misc import imread, imresize, imsave # For images import numpy as np # martix math import re # ...
137
37.99
137
16
1,220
python
[{"finding_id": "codeql_py/flask-debug_d851c942b81f9e6b_5e5b0166", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-601", "CWE-601" ]
[ "py/flask-debug", "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 136, 53, 59 ]
[ 137, null, null ]
[ 5, 29, 29 ]
[ 24, 40, 40 ]
2024-11-19T00:51:21.933725+00:00
1,557,740,151,000
e9df2830f0b214e80556a466758af079eb186dfa
3
{ "blob_id": "e9df2830f0b214e80556a466758af079eb186dfa", "branch_name": "refs/heads/master", "committer_date": 1557740151000, "content_id": "c77a6fd2f649bf0bf4b6b52f7f64c93c3886f0ad", "detected_licenses": [ "MIT" ], "directory_id": "dd32a9eb411a088f20ab8d06c2654272ccb6e0a1", "extension": "py", "fi...
3.203125
stackv2
#!/usr/bin/python3 #-*-coding:utf8-*- from Crypto.PublicKey import RSA # Şifre çözme import socket # LAN üzerinden iletişim import threading # Aynı anda hem mesaj okuyup hem yazabilmek import os # Ekran temizlemek class Kullanıcı: def __init__(self, isim): #Sabitler self.isim = isim self._PORT = 1423 ...
86
28.73
106
16
782
python
[{"finding_id": "codeql_py/weak-crypto-key_8fb4aa532b6f83ec_760cddb9", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",...
1
true
[ "CWE-326" ]
[ "py/weak-crypto-key" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable." ]
[ 31 ]
[ null ]
[ 19 ]
[ 37 ]
2024-11-19T01:02:22.549818+00:00
1,587,572,192,000
ce0bb91b1cd89ccd6efd3f16fc9dbe96baa9fbcc
4
{ "blob_id": "ce0bb91b1cd89ccd6efd3f16fc9dbe96baa9fbcc", "branch_name": "refs/heads/master", "committer_date": 1587572192000, "content_id": "204cd611e5b0737567c8731d7a3dc350009f63b9", "detected_licenses": [ "MIT" ], "directory_id": "06c434579364651ae876170d5a9f25123533ec2e", "extension": "py", "fi...
4.03125
stackv2
""" bikeshare.py Use Python to explore data related to bike share systems for three major cities in the United States: Chicago, New York City, and Washington. Import the data and compute descriptive statistics. Also write a script to take in raw input for an interactive experience using the terminal to present these...
394
33.52
94
19
3,295
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d5adaf43c18d8ab5_2275e3b6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 295, 296 ]
[ null, null ]
[ 15, 15 ]
[ 67, 67 ]
2024-11-18T23:50:00.148346+00:00
1,489,063,557,000
9906297349e639ed219c017569465e65aa02f549
3
{ "blob_id": "9906297349e639ed219c017569465e65aa02f549", "branch_name": "refs/heads/master", "committer_date": 1489063557000, "content_id": "df3721ab4e0b1f0d190304564bbea7b39e3b24d5", "detected_licenses": [ "Unlicense" ], "directory_id": "c7355f2d2dfd48f23f9c2fab8d40139cdfc17cef", "extension": "py",...
2.609375
stackv2
"""Usage: create-slideshow.py GITHUB_REPO [--title=title] [--output-dir=<path>] [--re-download-images] Create a Reveal.js slide show from the README images of the forks of a repository. For each fork of GITHUB_REPO, if the fork contains a file README.md and that R...
127
29.75
119
17
936
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_4719493df6282e90_ad5c5530", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 119 ]
[ null ]
[ 7 ]
[ 20 ]
2024-11-19T00:13:39.468043+00:00
1,540,038,019,000
bc000aa1b2926abf2ee34945fcb03eab819240d1
3
{ "blob_id": "bc000aa1b2926abf2ee34945fcb03eab819240d1", "branch_name": "refs/heads/master", "committer_date": 1540038019000, "content_id": "c2fac002707bd029d3fb8101203c9f6bb9323c79", "detected_licenses": [ "MIT" ], "directory_id": "55211af19ff2f02e04968c2423acdff73d469dd0", "extension": "py", "fi...
2.90625
stackv2
import json from flask import ( Flask, request, Response, ) from store import ( get_all_products, get_product_by_id, update_product_by_id, delete_product_by_id, create_default_database_table, add_product_by_name_and_price, ) from flask_restplus import Api from flask_restplus impor...
95
25.76
99
16
564
python
[{"finding_id": "codeql_py/stack-trace-exposure_f7082a5619c036e2_41e4b349", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
5
true
[ "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-215" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/flask-debug" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information...
[ 55, 68, 80, 90, 95 ]
[ null, null, null, null, null ]
[ 29, 29, 29, 29, 5 ]
[ 63, 63, 63, 63, 40 ]
2024-11-19T00:13:42.106800+00:00
1,586,737,286,000
61ed7accb966d82b5c09c5b39f28d199f81c3a12
3
{ "blob_id": "61ed7accb966d82b5c09c5b39f28d199f81c3a12", "branch_name": "refs/heads/master", "committer_date": 1586737286000, "content_id": "3474428369b0fb8be675ee0a4780d1c95fbb895c", "detected_licenses": [ "MIT" ], "directory_id": "5d0c54f6067a03a03a7af246c8537e667352b86d", "extension": "py", "fi...
2.640625
stackv2
import re import requests from requests.exceptions import RequestException import os import sys import tarfile import gzip import shutil urls = ['https://ai2-semanticscholar-cord-19.s3-us-west-2.amazonaws.com/2020-04-10/biorxiv_medrxiv.tar.gz', 'https://ai2-semanticscholar-cord-19.s3-us-west-2.amazonaws.com/...
86
31.55
110
18
691
python
[{"finding_id": "codeql_py/tarslip_225e6036d6732b80_bdc14854", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 40 ]
[ null ]
[ 17 ]
[ 35 ]
2024-11-19T01:51:50.999333+00:00
1,592,534,460,000
4cd1b999a8d96774e62e81b78954c467329e8d0f
3
{ "blob_id": "4cd1b999a8d96774e62e81b78954c467329e8d0f", "branch_name": "refs/heads/master", "committer_date": 1592534460000, "content_id": "57f3ddd09c3a6d43d24dba8d3b4a30909cefd8b9", "detected_licenses": [ "MIT" ], "directory_id": "5ea15d871984872110c789867c229339106f5ffc", "extension": "py", "fi...
2.546875
stackv2
# -*- coding:utf-8 -*- import requests, os from configparser import RawConfigParser from base64 import b64encode from traceback import format_exc from json import loads from os.path import exists # 检查“演员头像”文件夹是否就绪 if not exists('演员头像'): print('\n“演员头像”文件夹丢失!请把它放进exe的文件夹中!\n') os.system('pause') # 读取配置文件,这个ini文...
116
34.16
125
15
1,392
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_ce825dd3e2f7e998_a6cf5970", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
5
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.", "This expression stores [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [s...
[ 81, 87, 56, 79, 99 ]
[ null, null, null, null, null ]
[ 25, 21, 15, 30, 26 ]
[ 42, 38, 28, 40, 36 ]
2024-11-18T23:43:36.437029+00:00
1,521,224,756,000
769ec7ff9191d3b71d92bd037c398e390975a5c7
2
{ "blob_id": "769ec7ff9191d3b71d92bd037c398e390975a5c7", "branch_name": "refs/heads/master", "committer_date": 1521224756000, "content_id": "9cde8381af2b5661a8464e06212095039e5585bb", "detected_licenses": [ "MIT" ], "directory_id": "6313bd09fb8d58b8376fcfc27286bc7d9d0ddac5", "extension": "py", "fi...
2.375
stackv2
''' SSH utils ''' import asyncio import io import os import select import socketserver as SocketServer import sys from concurrent.futures import ThreadPoolExecutor import paramiko from . import helpers def connect(hostname, port=22, username=None, password=None, p...
98
36.38
132
14
673
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_e7e84351c3155d8f_af92bd76", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 25 ]
[ null ]
[ 5 ]
[ 65 ]
2024-11-19T00:33:05.148007+00:00
1,610,290,543,000
9b546c1c589765fa6f0c5ef5c410ac53e88db141
3
{ "blob_id": "9b546c1c589765fa6f0c5ef5c410ac53e88db141", "branch_name": "refs/heads/main", "committer_date": 1610290543000, "content_id": "676cfc12b42695a2f54054909f120e91bb90ca62", "detected_licenses": [ "MIT" ], "directory_id": "407b606b6df35b408eb89b3d8f21900d48cd6cea", "extension": "py", "file...
3.390625
stackv2
def validate_password(inp: str): rule, phrase = inp.split(": ") phrase = list(phrase) ids, target = rule.split(" ") id_1, id_2 = ids.split("-") id_1, id_2 = int(id_1), int(id_2) return (phrase[id_1 - 1] == target) != (phrase[id_2 - 1] == target) def count_valid_passwords(s: str) -> int: d ...
34
22.82
71
14
253
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b016b3bd2baf0047_6d8712b1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 34 ]
[ null ]
[ 11 ]
[ 16 ]
2024-11-19T00:02:43.965580+00:00
1,612,912,293,000
805599273a8760252b679b592758da29decc8e1d
3
{ "blob_id": "805599273a8760252b679b592758da29decc8e1d", "branch_name": "refs/heads/main", "committer_date": 1612912293000, "content_id": "ca8426c7e07f8b004aa66e1067fa2ffec2a7e592", "detected_licenses": [ "MIT" ], "directory_id": "abfdff1504fb93938555918c82d90af58e136fa5", "extension": "py", "file...
2.59375
stackv2
"""Main module of kytos/pathfinder Kytos Network Application.""" from flask import jsonify, request from kytos.core import KytosNApp, log, rest from kytos.core.helpers import listen_to import traceback # pylint: disable=import-error # from napps.kytos.pathfinder.graph import KytosGraph from graph import KytosGraph # p...
156
32.8
80
19
1,045
python
[{"finding_id": "codeql_py/stack-trace-exposure_f1a246b959b76fc5_08ccc667", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
3
true
[ "CWE-209", "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 110, 135, 137 ]
[ null, null, null ]
[ 28, 28, 28 ]
[ 70, 47, 47 ]
2024-11-19T00:03:07.389731+00:00
1,521,477,289,000
afd114d182e7a774347aa0d2f163af362a3852c6
2
{ "blob_id": "afd114d182e7a774347aa0d2f163af362a3852c6", "branch_name": "refs/heads/master", "committer_date": 1521477289000, "content_id": "94baae048fc2624d5ef4983e50bf3d444827722f", "detected_licenses": [ "MIT" ], "directory_id": "6f5de225152119014001a61c44f590017b26972b", "extension": "py", "fi...
2.4375
stackv2
#!/usr/bin/python3 import sys import os import json import yaml import requests from lxml import html from twilio.rest import Client PAGE_URL = 'http://www.adm.uwaterloo.ca/cgi-bin/cgiwrap/infocour/salook.pl' API_URL = 'https://api.uwaterloo.ca/v2/terms/' API_URL_2 = 'https://api.uwaterloo.ca/v2/courses/' def check...
112
27.28
116
15
818
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0eaea484f1df59d3_d1e65ab9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 23 ]
[ null ]
[ 15 ]
[ 91 ]
2024-11-19T00:15:29.288030+00:00
1,559,058,086,000
dc44eeaaa18a1d9feeeb451373a194ffd6aeeca7
2
{ "blob_id": "dc44eeaaa18a1d9feeeb451373a194ffd6aeeca7", "branch_name": "refs/heads/master", "committer_date": 1559058086000, "content_id": "45e46a7a9ebaa8e37f6bdb7f98b29420c69121e9", "detected_licenses": [ "MIT" ], "directory_id": "22d481ff60d722fb0bbd6b0cb66a8727e48391c1", "extension": "py", "fi...
2.359375
stackv2
# -*- coding:utf-8 -*- from circulation.web import db from circulation.models import Book, Log, Permission from flask import render_template, url_for, flash, redirect, request, abort from flask_login import login_required, current_user from circulation.main.log import log from circulation.main.decorators import permiss...
55
34.11
117
15
458
python
[{"finding_id": "codeql_py/url-redirection_e146dc03a55f20c8_851194ff", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
2
true
[ "CWE-601", "CWE-601" ]
[ "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 22, 42 ]
[ null, null ]
[ 21, 21 ]
[ 88, 87 ]
2024-11-19T00:25:39.383052+00:00
1,622,059,031,000
3bd883f01d7e3041fdc7f935910d894783e6d9cb
3
{ "blob_id": "3bd883f01d7e3041fdc7f935910d894783e6d9cb", "branch_name": "refs/heads/master", "committer_date": 1622059031000, "content_id": "223e525b274340517c4395892ade554d6daafc64", "detected_licenses": [ "MIT", "Apache-2.0" ], "directory_id": "88acf50d83511ae5675122eddd8856ff39e2f717", "exten...
2.546875
stackv2
#!/usr/bin/env python3 # Copyright (c) 2020 SiFive Inc. # SPDX-License-Identifier: Apache-2.0 """Generate OpenOCD configuration files from devicetree source files""" import argparse import sys import jinja2 import pydevicetree TEMPLATES_PATH = "templates" SUPPORTED_BOARDS = ["arty", "vc707", "vcu118", "hifive"] SU...
162
30.79
100
16
1,218
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_f17e7a943e2ba23c_d66c3f89", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 59 ]
[ 62 ]
[ 11 ]
[ 6 ]
2024-11-19T01:02:51.085785+00:00
1,591,172,379,000
ad053e4e907614aed021a31681916a295880bfdb
2
{ "blob_id": "ad053e4e907614aed021a31681916a295880bfdb", "branch_name": "refs/heads/master", "committer_date": 1591172379000, "content_id": "18ad0e7f57e99f96445c9db2adfbc3d76e8749bd", "detected_licenses": [ "MIT" ], "directory_id": "12c77e6ca00317200965eca0014fffe1325b3763", "extension": "py", "fi...
2.390625
stackv2
# coding: utf8 """ This module includes the `Show` class and the main functionalities of `auditorium`. """ import asyncio import base64 import io import json import runpy import warnings import webbrowser from collections import OrderedDict from typing import Union import websockets from fastapi import FastAPI from ...
455
28.51
134
20
2,994
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_38b19d9729be669c_f37f7260", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
3
true
[ "CWE-079", "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 59, 62, 65 ]
[ null, null, null ]
[ 38, 37, 38 ]
[ 57, 56, 57 ]
2024-11-19T00:16:11.803934+00:00
1,558,361,817,000
accd776c68892d13a533186b57f58f69c59d9a6e
3
{ "blob_id": "accd776c68892d13a533186b57f58f69c59d9a6e", "branch_name": "refs/heads/master", "committer_date": 1558361817000, "content_id": "57c530ecaa2b8ed09ecfc0a828524505461587fd", "detected_licenses": [ "MIT" ], "directory_id": "3821caa8e0373acdcfa65c653b05d19af7366d51", "extension": "py", "fi...
3.21875
stackv2
""" Drew Emond -- MIT License Copyright (c) [year] [fullname] Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, mer...
203
42.15
154
20
1,890
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_703ae4852b2078aa_4f240733", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text." ]
[ 53 ]
[ null ]
[ 15 ]
[ 154 ]
2024-11-19T00:16:13.967277+00:00
1,586,203,754,000
250a5d7e4b0431bbcc3fcb8e082156001cbe3e68
3
{ "blob_id": "250a5d7e4b0431bbcc3fcb8e082156001cbe3e68", "branch_name": "refs/heads/master", "committer_date": 1586203754000, "content_id": "d338a5015b86e7c3c1a3055339820a7fb7a35c68", "detected_licenses": [ "Apache-2.0" ], "directory_id": "126ba5108e0b29d04b5adf4cda8e6be63b624a30", "extension": "py"...
2.75
stackv2
import sys, os filename = os.path.join(os.path.dirname(__file__), '..') sys.path.insert(1, filename) from zoomapi import OAuthZoomClient import json from configparser import ConfigParser from pyngrok import ngrok parser = ConfigParser() parser.read("bot.ini") client_id = parser.get("OAuth", "client_id") client_secre...
98
43.27
106
15
1,268
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_74535fae1f769e3d_518f2b86", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text." ]
[ 17 ]
[ null ]
[ 7 ]
[ 73 ]
2024-11-19T00:28:41.775673+00:00
1,544,588,889,000
887e3247207e5a957ab98c25d7e8d64afd66fcbe
2
{ "blob_id": "887e3247207e5a957ab98c25d7e8d64afd66fcbe", "branch_name": "refs/heads/master", "committer_date": 1544588889000, "content_id": "d2b293ebb86c590a975548d8afa2fda4bff43443", "detected_licenses": [ "MIT" ], "directory_id": "d4feadf9eafdf2e42a1fbb212a9247a6cc695ed4", "extension": "py", "fi...
2.3125
stackv2
# -*- coding: utf-8 -*- ''' :maintainer: Chris Reed (chris@dlvr.com) :maturity: new :requires: none :platform: all ''' from __future__ import absolute_import from jinja2 import Environment, FileSystemLoader import yaml import salt import logging import cmd import os LOG = logging.getLogger(__name__) def expand(ranche...
88
36.76
144
14
932
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_8d490e7a8164fa7a_c47728af", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 19 ]
[ null ]
[ 11 ]
[ 101 ]
2024-11-19T00:51:35.683363+00:00
1,539,212,766,000
76ffce64c3fde8e52d4297c84f68cc100a182b2e
3
{ "blob_id": "76ffce64c3fde8e52d4297c84f68cc100a182b2e", "branch_name": "refs/heads/master", "committer_date": 1539212766000, "content_id": "d34b89b8b299b6826a4478b92355b3b1b8b53bb9", "detected_licenses": [ "MIT" ], "directory_id": "50d8d5d28392d5b705eb4cf00fa70118bdca3ed0", "extension": "py", "fi...
2.796875
stackv2
#!/usr/bin/env python import argparse import paramiko import socket DEFAULT_USER = 'admin' DEFAULT_PASSWORD = 'password' DEFAULT_PORT = 22 DEFAULT_TIMEOUT = 30 DEFAULT_COMMANDS = [ 'ping -w 5 -q 127.0.0.1' ] def ssh_client(host, username, password, port, timeout, commands): results = [] client = param...
88
34.08
79
15
691
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_01a0b2c49ba677ba_663661b2", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 21 ]
[ null ]
[ 5 ]
[ 65 ]
2024-11-19T01:30:48.040082+00:00
1,689,933,773,000
276453610d164f55c9c4f11c7c0ca9dfaa3cd391
2
{ "blob_id": "276453610d164f55c9c4f11c7c0ca9dfaa3cd391", "branch_name": "refs/heads/master", "committer_date": 1689933773000, "content_id": "457de878ad1fed7f7e9edf0c09ec058e17e50b57", "detected_licenses": [ "MIT" ], "directory_id": "c30c6906da9900327a3dd68c26df5f1694b86683", "extension": "py", "fi...
2.5
stackv2
import argparse import os import sys import time import sqlite3 from getpass import getpass from requests import RequestException from nautapy.exceptions import NautaException from nautapy.nauta_api import NautaClient, NautaProtocol from nautapy import utils from nautapy.__about__ import __cli__ as prog_name, __versi...
344
31.05
132
24
2,417
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6990ee0bf0fa385a_2aeacc98", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text." ]
[ 228 ]
[ null ]
[ 11 ]
[ 43 ]
2024-11-19T01:30:55.095224+00:00
1,489,679,880,000
ed1d0f5003416dae56fccf14b7c8355d46187784
2
{ "blob_id": "ed1d0f5003416dae56fccf14b7c8355d46187784", "branch_name": "refs/heads/master", "committer_date": 1489679880000, "content_id": "854232cfa1dc0421e98dae59c0726bfe8159cc78", "detected_licenses": [ "MIT" ], "directory_id": "c3634ff4ef74056a7cbc210ceae451b734e9e3b4", "extension": "py", "fi...
2.46875
stackv2
from classes.config.put import Put as ConfigPut import os, stat from functions import Message class Initialize: config = '' db = {} teams = [] services = [] settings = [] def __init__(self, db, type): self.db = db self.config = ConfigPut(type) self.delete_old_data() ...
83
29.72
92
17
543
python
[{"finding_id": "codeql_py/overly-permissive-file_e097981d12a37cc4_6d697534", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world writable." ]
[ 68 ]
[ null ]
[ 9 ]
[ 35 ]
2024-11-19T01:30:55.987263+00:00
1,625,847,662,000
d4617af0e70677120bf9101eebda3b0df6fd45ec
2
{ "blob_id": "d4617af0e70677120bf9101eebda3b0df6fd45ec", "branch_name": "refs/heads/master", "committer_date": 1625847662000, "content_id": "15fa2ea486bf3eb82db1830b0d799553ede86798", "detected_licenses": [ "MIT" ], "directory_id": "ec94406327179a021e0d651a39fab2ed684273db", "extension": "py", "fi...
2.5
stackv2
import subprocess import json import xarray as xr def download_sst(): ''' This is a module for downloading the SST data from the CMEMS Here the address is a cmems data access portal: #https://resources.marine.copernicus.eu/?option=com_csw&task=results You have to register at the CMEMS (link abov...
71
29.56
123
11
740
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a1268fe51eb474b9_e0ea74eb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 59 ]
[ null ]
[ 12 ]
[ 15 ]
2024-11-19T02:00:57.295108+00:00
1,517,436,794,000
1fc66a1b35bd9b54bf2807ab01c9cf403777aa4a
3
{ "blob_id": "1fc66a1b35bd9b54bf2807ab01c9cf403777aa4a", "branch_name": "refs/heads/master", "committer_date": 1517436794000, "content_id": "74dd65fbad7734c07c92694b875dc8cb9b43215d", "detected_licenses": [ "MIT" ], "directory_id": "77ccf3316fda0e521db4773397051d145df3ff61", "extension": "py", "fi...
2.625
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- """ Created on Mon Jul 17 16:17:25 2017 @author: jorgemauricio """ # librerías import matplotlib.pyplot as plt from mpl_toolkits.basemap import Basemap from numpy import meshgrid from scipy.interpolate import griddata as gd import os from netCDF4 import Dataset import nu...
132
26.43
131
14
1,196
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_b1967f38633a677a_a7be0ed8", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.\nThis expression stores [sensitive data (private)](3) as clear text.\nThis expression stores [sensitive data (private)](4) as clear text." ]
[ 61 ]
[ null ]
[ 17 ]
[ 25 ]
2024-11-19T00:40:17.091317+00:00
1,691,791,264,000
fa8c8dea3e32ca7f2e7c42c5fdfa39b28d70c30b
2
{ "blob_id": "fa8c8dea3e32ca7f2e7c42c5fdfa39b28d70c30b", "branch_name": "refs/heads/master", "committer_date": 1691791264000, "content_id": "ae6f2e8d62320d23f30ffd45e327c51bf6b75a72", "detected_licenses": [ "MIT" ], "directory_id": "108c22e6df535ea75599ff69ad95777de3a85f28", "extension": "py", "fi...
2.46875
stackv2
# -*- coding: utf-8 -*- import hashlib import secrets def rfc2440_hash_password(password, salt=None): # Match tor --hash-password # secret_to_key_rfc2440 EXPBIAS = 6 c = 96 count = (16 + (c & 15)) << ((c >> 4) + EXPBIAS) if salt is None: salt = secrets.token_bytes(8) assert len(...
31
21.77
51
11
211
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_46272c89c2fb0e4a_e2cecd54", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.", "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally e...
[ 25, 28 ]
[ null, null ]
[ 22, 18 ]
[ 31, 35 ]
2024-11-19T00:40:28.395126+00:00
1,456,521,025,000
50afa0b11468d1f13d3951014666be3e8337a09d
3
{ "blob_id": "50afa0b11468d1f13d3951014666be3e8337a09d", "branch_name": "refs/heads/master", "committer_date": 1456521025000, "content_id": "b3020ac7f5cd7e84a9b3286abc56ab7bf7948a4b", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "bf4c6c7984febfe5723145c81661d6a7abda59fe", "extension": "p...
2.671875
stackv2
#!/usr/bin/env python3 from sys import argv import random import string from battle.models import Session, Team from battle.api import Role def random_string(): return ''.join(random.choice(string.ascii_lowercase) for _ in range(6)) def add_team(sess, contest_id, team_name): username = random_string() p...
40
19.48
75
10
197
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ba23a76756af3476_acecc60a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 29 ]
[ null ]
[ 11 ]
[ 36 ]
2024-11-19T01:05:59.330721+00:00
1,599,606,294,000
f3e4ca2125cab8bfdc4c51303d21a88976028a58
3
{ "blob_id": "f3e4ca2125cab8bfdc4c51303d21a88976028a58", "branch_name": "refs/heads/master", "committer_date": 1599606294000, "content_id": "84ca364e7cb2794aefbc21efb083f8d0f915b4de", "detected_licenses": [ "MIT" ], "directory_id": "bc9e3f8604ed42ba274fb57b3546e1363bde882b", "extension": "py", "fi...
2.875
stackv2
import csv import sys import re import string csv_f = csv.reader(sys.stdin) pattern = re.compile("^([0-9.\+\-]+)+$") def print_table(rows, widths, dirs): underline = 1 for row in rows: colsep = "" line = "" for j in range(len(row)): cell = row[j] line = line + colsep line = line + "{0: {dir}{width}}...
62
17.31
51
16
360
python
[{"finding_id": "codeql_py/redos_83ea6ce521c06643_2aa9ca06", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '+'.", "remediati...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '+'." ]
[ 8 ]
[ null ]
[ 25 ]
[ 36 ]
2024-11-19T01:06:09.231949+00:00
1,526,493,862,000
a3838efd7611ef6f37ef6490f0539d9a8edd9d43
3
{ "blob_id": "a3838efd7611ef6f37ef6490f0539d9a8edd9d43", "branch_name": "refs/heads/master", "committer_date": 1526493862000, "content_id": "edb7082c85ca5256005f37c94046d4584bcb414c", "detected_licenses": [ "MIT" ], "directory_id": "5c0bbb143c5bfbfe783ae748bac6d756055dce9c", "extension": "py", "fi...
2.6875
stackv2
import thingspeak import collections import logging, sys import requests import time import json class TSClient: w_api_key = "INSERT_THINGSPEAK_WRITE_API_KEY" r_api_key = "INSERT_THINGSPEAK_READ_API_KEY" channel = 452770 # INSERT YOUR CHANNEL ID HERE def __init__(self, *sens): self.sensors = s...
41
38.22
133
17
385
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c5ad0c1152902db6_43869cd8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 39 ]
[ null ]
[ 23 ]
[ 41 ]
2024-11-19T01:17:12.180353+00:00
1,622,532,025,000
13319df17fd4d24d637b23768f7f8bee05bd5c2f
2
{ "blob_id": "13319df17fd4d24d637b23768f7f8bee05bd5c2f", "branch_name": "refs/heads/master", "committer_date": 1622532025000, "content_id": "177565ba52c76f0fa70d83fe08ec2908aa02af72", "detected_licenses": [ "MIT" ], "directory_id": "5a78b84af173643aba504c03e29d115afe7eab02", "extension": "py", "fi...
2.5
stackv2
# Flask app that handles application logic import base64 import json import re from flask import Flask, jsonify from flask import render_template from flask import request import requests from gui import get_root_path from bs4 import BeautifulSoup app = Flask(__name__, static_folder=get_root_path('static'), templat...
253
29.21
108
21
2,246
python
[{"finding_id": "codeql_py/flask-debug_beab9f597a035120_df28664e", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
4
true
[ "CWE-215", "CWE-918", "CWE-918", "CWE-918" ]
[ "py/flask-debug", "py/full-ssrf", "py/full-ssrf", "py/partial-ssrf" ]
[ "HIGH", "HIGH", "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "The full URL of this request depends on a [user-provided value](1).", "The full URL of this request depends on a [user-provided value](1).", "Part of the URL of this request depends on a [us...
[ 253, 68, 207, 43 ]
[ null, null, null, null ]
[ 5, 9, 9, 14 ]
[ 72, 27, 27, 65 ]
2024-11-19T01:17:17.466575+00:00
1,635,105,954,000
186694caf24d5be139db42a548d92aab5f5da84f
3
{ "blob_id": "186694caf24d5be139db42a548d92aab5f5da84f", "branch_name": "refs/heads/main", "committer_date": 1635105954000, "content_id": "f7f75617f7246e8d3ad11994cbe5145c2cd3ddbb", "detected_licenses": [ "MIT" ], "directory_id": "54ce6741366568437a13e7940a2a7b701b0d16d5", "extension": "py", "file...
2.5625
stackv2
import time import fastapi import uvicorn import logging import os from process_doc import process_image from models.document_model import DocumentModel from pdf2jpg import pdf2jpg from datetime import datetime logs_folder_path = os.path.join(os.getcwd(), 'logs') os.makedirs(logs_folder_path, exist_ok=True) log_path ...
79
26.47
86
15
487
python
[{"finding_id": "codeql_py/path-injection_698cc5d1ef107703_5668a752", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 61 ]
[ null ]
[ 31 ]
[ 39 ]
2024-11-19T01:17:31.256413+00:00
1,508,293,951,000
2a742eb76390e9b04ac4dbb297173641fc227cf2
3
{ "blob_id": "2a742eb76390e9b04ac4dbb297173641fc227cf2", "branch_name": "refs/heads/master", "committer_date": 1508293951000, "content_id": "180de752bfdfeb51ab5510838e16f981d4c9faea", "detected_licenses": [ "MIT" ], "directory_id": "48892a9d8e10521637d303f895216d5da4679daa", "extension": "py", "fi...
2.5625
stackv2
import requests import json import configparser import sqlite3 import time def write_to_config(config_path): with open(config_path, 'w') as configfile: v = int(progress) + counter config.set('users', 'progress', str(v)) config.write(configfile) # Set the file paths config_path = './code/0...
79
23.23
103
13
500
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_901129a9678f9f72_8b0cc034", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 65 ]
[ null ]
[ 16 ]
[ 30 ]
2024-11-19T01:17:41.919910+00:00
1,555,939,711,000
16bc4376a4429489146aad21d4cd04fdd6924297
2
{ "blob_id": "16bc4376a4429489146aad21d4cd04fdd6924297", "branch_name": "refs/heads/master", "committer_date": 1555939711000, "content_id": "f41cb32dfc2b7a082762a4db45e189d8265ca455", "detected_licenses": [ "MIT" ], "directory_id": "d7103533918bb7cf419d13ff0ab9ff72b4ce256c", "extension": "py", "fi...
2.453125
stackv2
import MySQLdb import os import paramiko import socket cnx = MySQLdb.connect(host="localhost", user="root", passwd="raspberry", db="home") cursor = cnx.cursor() query = 'SELECT sensor_ip FROM sensors' cursor.execute(query) r = cursor.fetchall() for sensor_ip in r: host = str(sensor_ip)[2:-3] ssh = paramiko.SSHClie...
29
29.72
83
16
246
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_e99233519e70a2f2_e18e328c", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 14 ]
[ 15 ]
[ 3 ]
[ 30 ]
2024-11-19T01:15:03.313333+00:00
1,413,425,725,000
1b5faf5aa17fe18f9cb340374a91e085ebc574c7
2
{ "blob_id": "1b5faf5aa17fe18f9cb340374a91e085ebc574c7", "branch_name": "refs/heads/master", "committer_date": 1413425725000, "content_id": "799feac60fc522454251326f42ac8eeb45415c45", "detected_licenses": [ "MIT", "Linux-OpenIB" ], "directory_id": "799f68c21328737080197993be8afc1666ef5c52", "ext...
2.328125
stackv2
import logging import json from rest_framework.response import Response from rest_framework import status from cloudengine.classes.manager import ClassesManager from cloudengine.core.cloudapi_view import CloudAPIView from cloudengine.core.utils import paginate from cloudengine.classes.manager import SchemaHandler from...
125
35.34
86
16
875
python
[{"finding_id": "codeql_py/stack-trace-exposure_17067629b6aa8058_b8913124", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 56, 72 ]
[ null, null ]
[ 29, 29 ]
[ 46, 46 ]
2024-11-19T00:43:50.340817+00:00
1,552,522,239,000
8f7debc418193e761a303c8818645a476ceda654
3
{ "blob_id": "8f7debc418193e761a303c8818645a476ceda654", "branch_name": "refs/heads/master", "committer_date": 1552522239000, "content_id": "59eb34b547ad0392f5eee3329ee231da5d40abec", "detected_licenses": [ "MIT" ], "directory_id": "5d3909be0acb528618a5a7b9f50dd91ce4550df0", "extension": "py", "fi...
2.859375
stackv2
import hashlib import time from consts.notification_type import NotificationType from tbans.models.notifications.notification import Notification class VerificationNotification(Notification): """ Verification notification - used for webhooks to ensure the proper people are in control Attributes: url...
53
33.94
96
16
363
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_2cd311bc1e96bc45_3e30a396", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecu...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecure.\n[Sensitive data (secret)](2) is used in a hashing algorithm (SHA1) that is insecure." ]
[ 40 ]
[ null ]
[ 19 ]
[ 30 ]
2024-11-19T00:43:57.821122+00:00
1,692,631,110,000
bbf5730d2e3812c70fec8da506bf2fbc35e88368
3
{ "blob_id": "bbf5730d2e3812c70fec8da506bf2fbc35e88368", "branch_name": "refs/heads/main", "committer_date": 1692631110000, "content_id": "dc88956b74425fece47218388a4f89ed4e5faae2", "detected_licenses": [ "Apache-2.0" ], "directory_id": "84ae9ce61bd47b36af848701ee428c8a199e6364", "extension": "py", ...
2.515625
stackv2
""" install.py: Installs the FPP tool suite based on the version of this installer package. It will use FPP_DOWNLOAD_CACHE environment variable to pull up previously downloaded items for users that wish to install offline. """ import atexit import os import platform import shutil import subprocess import sys import ta...
323
35.23
118
17
2,569
python
[{"finding_id": "codeql_py/tarslip_83979cfd93a6a35e_0061141f", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 246 ]
[ null ]
[ 13 ]
[ 16 ]
2024-11-19T01:32:04.956200+00:00
1,550,751,051,000
f963f7a766914bb6bad6abe76d36b4560a599aa1
3
{ "blob_id": "f963f7a766914bb6bad6abe76d36b4560a599aa1", "branch_name": "refs/heads/master", "committer_date": 1550751051000, "content_id": "23d798e2b917f8bdf1ccc9e4f85167f8e117d7ea", "detected_licenses": [ "MIT" ], "directory_id": "5476a80b8c4a917603d9ab45efe465ae31f1a99b", "extension": "py", "fi...
2.59375
stackv2
#!/usr/bin/python3 import requests from flask import Flask, render_template, request, jsonify, url_for, redirect, json from pymongo import MongoClient app = Flask(__name__) # Official limit - the GitHub Search API provides up to 1,000 results for each search. # https://developer.github.com/v3/search/#about-the-searc...
125
31.81
128
16
1,045
python
[{"finding_id": "codeql_py/stack-trace-exposure_c653ced2de074b3d_91068802", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
4
true
[ "CWE-209", "CWE-209", "CWE-918", "CWE-918" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure", "py/partial-ssrf", "py/partial-ssrf" ]
[ "HIGH", "HIGH", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "Part of the URL of this request depends on a [user-provided value](1).", "Part of the URL of this request depends on a ...
[ 58, 26, 82, 83 ]
[ null, null, null, null ]
[ 23, 19, 21, 22 ]
[ 44, 40, 73, 85 ]
2024-11-19T01:43:54.827618+00:00
1,489,596,974,000
6d005fb2d8bbf003076ce46e045298c11e9652b9
2
{ "blob_id": "6d005fb2d8bbf003076ce46e045298c11e9652b9", "branch_name": "refs/heads/master", "committer_date": 1489596974000, "content_id": "b3fe819c8b726f3c74576db72a48a476785150be", "detected_licenses": [ "MIT" ], "directory_id": "a30872440e9276d41784abb64c9fb64bf73f7b31", "extension": "py", "fi...
2.4375
stackv2
import dateutil.parser import json import logging import os from flask import Flask, request, jsonify from tokens import Token from auth import basic_auth_required app = Flask(__name__) logger = logging.getLogger() logger.setLevel(logging.DEBUG) def get_allowed_actions(user, actions): # determine what actions a...
100
34.3
142
16
826
python
[{"finding_id": "codeql_py/flask-debug_fd95cd4ee2c9d791_1c4970ff", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
6
true
[ "CWE-215", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/flask-debug", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "HIGH", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry de...
[ 98, 17, 24, 56, 77, 88 ]
[ null, null, null, null, null, null ]
[ 9, 19, 19, 19, 23, 22 ]
[ 91, 58, 64, 111, 28, 142 ]
2024-11-19T01:44:00.314961+00:00
1,549,748,277,000
07e35c9b90241987267b8d5ae8bcc1dc4fbcd5c2
3
{ "blob_id": "07e35c9b90241987267b8d5ae8bcc1dc4fbcd5c2", "branch_name": "refs/heads/master", "committer_date": 1549748277000, "content_id": "bbc426db6b0a572fa783323a40410d0fd2ada3c6", "detected_licenses": [ "MIT" ], "directory_id": "7874c34d9bcbdfb9c37e3acebbd849cae3817901", "extension": "py", "fi...
2.65625
stackv2
from dotenv import load_dotenv load_dotenv(verbose=True) import requests as r import re, time, os # defining channels to iterate over channels = ['canary', 'ptb', 'stable'] def fetcher(channel): try: if channel == 'stable': # deferring since stable.discordapp.com does not exist # getting th...
75
35.11
92
16
681
python
[{"finding_id": "codeql_py/overly-large-range_16e4e858f9c65b54_3fb1a173", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 30 ]
[ null ]
[ 30 ]
[ 33 ]
2024-11-19T02:20:03.696048+00:00
1,575,320,207,000
ef2207dd0872792f10f22eaf968e1dafc595bb0f
2
{ "blob_id": "ef2207dd0872792f10f22eaf968e1dafc595bb0f", "branch_name": "refs/heads/master", "committer_date": 1575320207000, "content_id": "98eac8adb34d3a637d24fe7edb6a247a478f1794", "detected_licenses": [ "Apache-2.0" ], "directory_id": "958f1094ff92241a09cb7597f61940d4f0248284", "extension": "py"...
2.359375
stackv2
import logging import paho.mqtt.client as mqtt import time # from utils_intern.messageLogger import MessageLogger logging.basicConfig(format='%(asctime)s %(levelname)s %(name)s: %(message)s', level=logging.DEBUG) logger = logging.getLogger(__file__) class MQTTClient: def __init__(self, host, mqttPort, client_id...
159
37.56
116
22
1,283
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_971c452e5421b08a_58593904", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 27 ]
[ null ]
[ 26 ]
[ 60 ]
2024-11-19T02:20:06.754060+00:00
1,532,207,605,000
ceddfa020e6de1869baa4abf8bcdc9ee774a4ebc
3
{ "blob_id": "ceddfa020e6de1869baa4abf8bcdc9ee774a4ebc", "branch_name": "refs/heads/master", "committer_date": 1532332301000, "content_id": "a0421f03e9059138558421fd5cfd90c191310a9e", "detected_licenses": [ "MIT" ], "directory_id": "cb4fc38a47a673a4338aa8f8f26f875ee2166607", "extension": "py", "fi...
2.796875
stackv2
# This file will authenticate the user upon login. import re import os from flask import request, jsonify, make_response from app.models import Users from flask.views import MethodView import jwt import datetime from app.models import BlacklistToken from classes.auth.auth import token_required from passlib.apps import ...
117
35.73
105
22
880
python
[{"finding_id": "codeql_py/polynomial-redos_fbdfe7ee30c61316_eaa29af3", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with ma...
1
true
[ "CWE-1333" ]
[ "py/polynomial-redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with many repetitions of '+'." ]
[ 57 ]
[ null ]
[ 41 ]
[ 51 ]
2024-11-19T01:11:52.703012+00:00
1,569,626,194,000
763e5a147bea452423262f9c00c788e9edcc0525
2
{ "blob_id": "763e5a147bea452423262f9c00c788e9edcc0525", "branch_name": "refs/heads/master", "committer_date": 1569626194000, "content_id": "41e4b5dea9dc40e04797055bba232641a73cf45b", "detected_licenses": [ "MIT" ], "directory_id": "795989880b067c677572378031ebc2b50b169ae9", "extension": "py", "fi...
2.3125
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- import json import os.path import random import tempfile import time from collections import Counter from glob import glob import dateutil.parser import emoji import exifread import geocoder import instabot import numpy as np import parse import PIL.Image import pycountr...
390
29.75
104
17
3,004
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_bc997f71ab499d2a_4f73805c", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 53 ]
[ null ]
[ 25 ]
[ 40 ]
2024-11-19T01:21:35.845351+00:00
1,542,166,953,000
c6f1c7254e361c079c89bff052b3ee52376ed949
3
{ "blob_id": "c6f1c7254e361c079c89bff052b3ee52376ed949", "branch_name": "refs/heads/master", "committer_date": 1542166953000, "content_id": "55502b2f573bc633ffe0b6480f1b074dd1b19580", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "afd532cc96b7ef51788fa7847afaadae314a725e", "extension": "p...
2.796875
stackv2
import cv2 import numpy as np import sys import os from keras.models import load_model dir = os.path.dirname(__file__) root_dir = os.path.dirname(dir) file_path = [] def get_path(path): if(os.path.exists(path)): pass else: exit ("The data doesn't exist, check your input please.") if(os.p...
80
22.1
71
16
477
python
[{"finding_id": "codeql_py/overly-permissive-file_09b6f362d804bc8b_04906bce", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable." ]
[ 52 ]
[ null ]
[ 5 ]
[ 29 ]
2024-11-19T01:56:45.308459+00:00
1,560,422,142,000
d2eb7636da02f7af379f452ce73fe5710fdc4396
3
{ "blob_id": "d2eb7636da02f7af379f452ce73fe5710fdc4396", "branch_name": "refs/heads/master", "committer_date": 1560422142000, "content_id": "833f5b4d2c9eb33d3775073a4d31805fa52e335a", "detected_licenses": [ "MIT" ], "directory_id": "a06fef890a728c8954833c5f3efd7b430b6f6487", "extension": "py", "fi...
2.734375
stackv2
import sys import Ice import Bank def getFromEnum(currency): if currency == 'PLN': return Bank.Currency.PLN elif currency == 'USD': return Bank.Currency.USD elif currency == 'EURO': return Bank.Currency.EURO else: raise Bank.AccountException('Provide a correct currenc...
94
32.62
117
19
671
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_91a4bd1438342759_33283e7f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 58, 68 ]
[ null, 69 ]
[ 23, 23 ]
[ 68, 112 ]
2024-11-19T01:56:49.223291+00:00
1,559,309,671,000
d85b0201788be768c3b8ea7f2780c64e893038ce
3
{ "blob_id": "d85b0201788be768c3b8ea7f2780c64e893038ce", "branch_name": "refs/heads/master", "committer_date": 1559309671000, "content_id": "c0b7d74d64681f5aa49fc96087335de29c102514", "detected_licenses": [ "MIT" ], "directory_id": "9c2b518b51a12677be82626f690bf748c78e7d01", "extension": "py", "fi...
2.734375
stackv2
#!/usr/bin/python3 ## Required ## pip3 install feedparser ## pip3 install requests import feedparser import requests import json from datetime import datetime, timedelta from time import mktime from requests.auth import HTTPBasicAuth ####################### # Config # ####################### # Debug logg...
91
31.9
117
16
703
python
[{"finding_id": "codeql_py/request-without-cert-validation_5a7915b93c8d8f7b_4262eed1", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 47, 57 ]
[ null, null ]
[ 22, 23 ]
[ 81, 118 ]
2024-11-19T02:10:36.178890+00:00
1,682,161,973,000
3900641318f3c2d7fcb8d292eb330300df8bbe60
3
{ "blob_id": "3900641318f3c2d7fcb8d292eb330300df8bbe60", "branch_name": "refs/heads/master", "committer_date": 1682161973000, "content_id": "b9b80dd6de9d44181829121e9c5eff82449b923d", "detected_licenses": [ "MIT" ], "directory_id": "84429a65215f58b11649f4d722fce407a9a0f28e", "extension": "py", "fi...
2.671875
stackv2
__author__ = 'raz0r' import os import click import string import requests import sys from requests.packages.urllib3.exceptions import InsecureRequestWarning requests.packages.urllib3.disable_warnings(InsecureRequestWarning) def run(url): with open(os.path.dirname(__file__) + '/../data/aem-paths.txt', 'r') as f: ...
35
35.97
91
20
283
python
[{"finding_id": "codeql_py/request-without-cert-validation_bd2915c11ed9a5d0_0dfb8de4", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 19 ]
[ null ]
[ 32 ]
[ 83 ]
2024-11-19T02:45:16.629258+00:00
1,568,056,090,000
e020474aef805100f818af8ced4d3978a9a1755d
2
{ "blob_id": "e020474aef805100f818af8ced4d3978a9a1755d", "branch_name": "refs/heads/master", "committer_date": 1568056090000, "content_id": "fadc76598110d53cb6e39c74c1553236f1abae9a", "detected_licenses": [ "MIT" ], "directory_id": "a15bcd6a4784c506d15fbbc2f97e40001365e62d", "extension": "py", "fi...
2.375
stackv2
import sys from config_handler import ConfigHandler U_CONST = 'CREATE CONSTRAINT ON (n:%s) ASSERT n.%s IS UNIQUE' P_CONST = 'CREATE INDEX ON :%s(point)' I_CONST = 'CREATE INDEX ON :%s(%s)' TOPIC_PREFIX = "neo4j.topic.cypher" SINK_CONFIG = """ { "name": "Neo4jSinkConnector", "config": { "topics": "%s", "con...
159
36.26
99
21
1,476
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_1bc477284f171823_862b8cac", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 112 ]
[ 116 ]
[ 25 ]
[ 10 ]
2024-11-19T02:45:19.788978+00:00
1,692,947,820,000
639e43b20e3f3b9daad6e4d5db232231d0ec6a58
3
{ "blob_id": "639e43b20e3f3b9daad6e4d5db232231d0ec6a58", "branch_name": "refs/heads/master", "committer_date": 1692947820000, "content_id": "087f6d53f056588ce5cbf0b775abcf90408d07d8", "detected_licenses": [ "MIT" ], "directory_id": "bdfae5f79dc6ac9cde19d18c6541d6cb41b46fa0", "extension": "py", "fi...
2.59375
stackv2
#!/bin/python3 """ Renders jinja2 templates in the context of variables loaded from yaml files. It follows these steps: 01. Load variable files <directory>/vars/*.yml 02. Load variable files <directory>/vars/**/*.yml 03. Render templated variable files <directory>/vars/*.yml.j2 04. Render templated variable files <dir...
189
30.29
94
20
1,387
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_7d1320aba4591fb6_d19330cc", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 95 ]
[ 102 ]
[ 9 ]
[ 4 ]
2024-11-19T02:45:22.627738+00:00
1,559,586,868,000
0a43869aaa8a07a22c386d4bea6b6566e909b156
3
{ "blob_id": "0a43869aaa8a07a22c386d4bea6b6566e909b156", "branch_name": "refs/heads/master", "committer_date": 1559586868000, "content_id": "a7ed8b29de81097d0a7fd0ddc98fac8b103b36ee", "detected_licenses": [ "MIT" ], "directory_id": "ec2acdc4f9291fc34aa14b807d7902341b65fcde", "extension": "py", "fi...
2.6875
stackv2
# *************************************************** # * By Group 5 @ HSLU I.BSCI.HS18.IOT * # **************************************************** ######################## # Informations # ######################## # Raspberry Pi: Read BME280 values # Raspberry Pi: Read BME280 values # Raspberr...
231
33.1
178
27
1,972
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_44728f047c9ea34f_b9fc2ab0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 207, 208 ]
[ null, null ]
[ 38, 38 ]
[ 46, 47 ]
2024-11-19T02:45:23.706213+00:00
1,447,891,639,000
8250d5071443af85c4bdf7c776f0fe9b21d50c0d
2
{ "blob_id": "8250d5071443af85c4bdf7c776f0fe9b21d50c0d", "branch_name": "refs/heads/master", "committer_date": 1447891765000, "content_id": "24467e63c6a71d57ae47ea92bdf9a54f5c18d2a5", "detected_licenses": [ "ISC" ], "directory_id": "3fca44728971360e368cb1498c29366bdb234dd3", "extension": "py", "fi...
2.34375
stackv2
import subprocess import shutil import tarfile import pkgutil from pathlib import Path from urllib.request import urlopen PYRUN_VERSION = '2.1.1' PYTHON_FULL_VERSION = '3.4.3' SETUPTOOLS_VERSION = '18.4' PIP_VERSION = '7.1.2' PYRUN_SRC_URL = 'https://downloads.egenix.com/python/egenix-pyrun-{}.tar.gz'.format(PYRUN_VE...
119
38.65
119
14
1,206
python
[{"finding_id": "codeql_py/tarslip_d21185957a74b9e4_185e0036", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 35 ]
[ null ]
[ 13 ]
[ 16 ]
2024-11-19T02:45:30.244070+00:00
1,469,306,063,000
61c85c64f0a2cf1e1301a4a3ddeb133b5a89d4b4
3
{ "blob_id": "61c85c64f0a2cf1e1301a4a3ddeb133b5a89d4b4", "branch_name": "refs/heads/master", "committer_date": 1469306281000, "content_id": "15e4eef724961e48a765f396cdc2b31c30a1af02", "detected_licenses": [ "MIT" ], "directory_id": "1a569d92b084d15eefe458a98232b648576594da", "extension": "py", "fi...
2.859375
stackv2
""" This code downloads and executes the autospotting golang binary, but only if it is missing from the current directory, in case of a new deployment or if Lambda moved our code to a new instance. """ import json import os.path import sys from urlparse import urljoin from urllib2 import URLError, urlopen from subpro...
92
26.92
98
14
563
python
[{"finding_id": "codeql_py/overly-permissive-file_e7666847ec6eced3_2bdc7aab", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable." ]
[ 88 ]
[ null ]
[ 5 ]
[ 32 ]
2024-11-19T02:45:57.941356+00:00
1,597,752,750,000
322cba2406cdfea9d1570fae7ace4d0a4fecba2e
2
{ "blob_id": "322cba2406cdfea9d1570fae7ace4d0a4fecba2e", "branch_name": "refs/heads/master", "committer_date": 1597752750000, "content_id": "23a957341fa7907702cb0fbeb4b949f450889756", "detected_licenses": [ "MIT" ], "directory_id": "e4178881478cf71c7023a1361d3d4945a3a64053", "extension": "py", "fi...
2.390625
stackv2
from os import path import re from pathlib import Path from jinja2 import Environment, FileSystemLoader env = Environment(loader=FileSystemLoader(Path(Path(__file__).parent, '..', '..', 'templates').resolve())) def generate(data, parser, output_path): rule_set = get_tagged_rule_ids(data['profiles']) if isinstance...
92
47.16
136
23
1,189
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_d9a52996d3a55c5d_56bd5ca2", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 6 ]
[ null ]
[ 7 ]
[ 107 ]
2024-11-19T02:45:58.051001+00:00
1,596,719,811,000
22aa243884ba39d1ac72ec3981d52bd7491d0355
2
{ "blob_id": "22aa243884ba39d1ac72ec3981d52bd7491d0355", "branch_name": "refs/heads/master", "committer_date": 1596719811000, "content_id": "83751b2eae1bcbf7e16b9102259808ad09e31813", "detected_licenses": [ "Apache-2.0" ], "directory_id": "4671c4195048cce3cd82c6159fdcbb53beae5daf", "extension": "py"...
2.484375
stackv2
# Copyright 2020 Juneau # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, softw...
148
31.56
97
17
995
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a64f30b0b192f651_4a7f88d5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 54 ]
[ null ]
[ 22 ]
[ 65 ]
2024-11-19T02:57:22.810055+00:00
1,632,232,044,000
85b0dfe2634bc016a2daafa0f9c42efd47a9d27d
2
{ "blob_id": "85b0dfe2634bc016a2daafa0f9c42efd47a9d27d", "branch_name": "refs/heads/main", "committer_date": 1632232044000, "content_id": "ca8f40bd997ac85c95124474b9afdf924deb13ad", "detected_licenses": [ "MIT" ], "directory_id": "745ed9601103263df5360423d43c5cb1e0824e7d", "extension": "py", "file...
2.46875
stackv2
from werkzeug.exceptions import RequestURITooLarge from server import find_all_products_data, find_product_data from db_manager import save_to_db from flask import Flask, url_for, request, redirect, render_template import os from talk import add_comment_to_db, get_all_posts app = Flask(__name__) key = os.environ.get('...
69
27.33
115
14
447
python
[{"finding_id": "codeql_py/flask-debug_82d8bc77e0222494_fe17c532", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-601" ]
[ "py/flask-debug", "py/url-redirection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 69, 41 ]
[ null, null ]
[ 5, 29 ]
[ 24, 49 ]
2024-11-19T03:12:06.886382+00:00
1,621,221,083,000
89b418d7eddde2a7d161b19c6adbdfa116d32335
3
{ "blob_id": "89b418d7eddde2a7d161b19c6adbdfa116d32335", "branch_name": "refs/heads/main", "committer_date": 1621221083000, "content_id": "84693e627f491e2a5d6b7dd9e1ba3921483bb81f", "detected_licenses": [ "MIT" ], "directory_id": "42bec32547d1c0f4f4ed9efee05e47ac428912f9", "extension": "py", "file...
3.109375
stackv2
# este es un avance import hashlib # primera password es: 0173490 # segunda password es: Grulla222 dbu =["Secretario1","Secretario2"] dbp =["97c4fd3c0aada3c1c4ed77854ea0dfa7b9b71ef54bd5cab2d620aab19abce1ea", "db65fb13b0f2ecafcdb3f02f18c698f440b8373502c641b32f45d9b72c2c5fc5"] # pedimos usuario y contraseña usuario = i...
28
26.5
141
11
280
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_1adad2a59a220d8e_75e586ae", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA3256) that is i...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA3256) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 13 ]
[ null ]
[ 28 ]
[ 45 ]
2024-11-19T03:12:07.130655+00:00
1,618,760,524,000
8f04eec01afdc942197383a2a0f1518cfd7afa75
3
{ "blob_id": "8f04eec01afdc942197383a2a0f1518cfd7afa75", "branch_name": "refs/heads/main", "committer_date": 1618760524000, "content_id": "2d93d0dc4a88e89d400b3e2f58317410ffa56c20", "detected_licenses": [ "MIT" ], "directory_id": "ab80a1a58369de39278535dc15bfd78ec3efbb3e", "extension": "py", "file...
2.6875
stackv2
# -*- coding: utf-8 -*- def get_path_list(): """ 優先順位 1. 環境変数 $ASCE_DATA/templates/ $ASCE_DATA/parameters/ 2. カレントワーキングディレクトリ ./data/templates/ ./data/parameters/ 3. ユーザホームディレクトリ ~/.asce/templates/ ~/.asce/parameters/ 4. システムデフォルト /etc/asce/templates/ /etc/as...
86
20.21
76
15
481
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_bd5d5bff1b5af048_5fccb209", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 63 ]
[ 65 ]
[ 11 ]
[ 6 ]
2024-11-19T03:12:11.257718+00:00
1,608,917,813,000
5d2b90574c653db7a1c17769aa0740cfff6c9e61
3
{ "blob_id": "5d2b90574c653db7a1c17769aa0740cfff6c9e61", "branch_name": "refs/heads/main", "committer_date": 1608917813000, "content_id": "dbd8cbd9bb0a4cf9b2426d4a26301ebf9499e15b", "detected_licenses": [ "Apache-2.0" ], "directory_id": "6e5b9ab68a4d1b95f63e119cfa1f2cdee16dcb3c", "extension": "py", ...
3.1875
stackv2
DOOR_KEY = 9093927 CARD_KEY = 11001876 def establish_secret_key(door_key: int, card_key: int) -> int: exponent = 0 value = 1 while value != card_key: exponent += 1 value = 7 * value % 20201227 return pow(door_key, exponent, 20201227) if __name__ == "__main__": print(establish_se...
16
20.88
62
10
128
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_574f2bf514868fdc_74b129a9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 16 ]
[ null ]
[ 11 ]
[ 51 ]
2024-11-19T03:12:16.462168+00:00
1,592,084,682,000
1320d74917b9158e687c91bea3adf6cd6282b69e
3
{ "blob_id": "1320d74917b9158e687c91bea3adf6cd6282b69e", "branch_name": "refs/heads/master", "committer_date": 1592084682000, "content_id": "c7f06aa0d19cb68d55bdcebc76cb281a16805be8", "detected_licenses": [ "MIT" ], "directory_id": "024e45ab9a17d0178183dc87f4c3669d4ea7e857", "extension": "py", "fi...
3.359375
stackv2
#! python #This is my first repository to practice using github import sys if len(sys.argv) == 0: print("Enter the password next to the file name.") else: password = "".join(sys.argv[1:]) print(password) tests_failed = {} symbols = "!@#$%^&*~><?|.,'\"" for i in symbols: if i in password...
42
28.48
70
15
294
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_49e1ef48aa3760c6_782d5cb0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 9 ]
[ null ]
[ 11 ]
[ 19 ]
2024-11-19T01:33:39.403914+00:00
1,619,639,769,000
c1adcd98af1924e4b690f9fd0cd8431cdb6408f4
3
{ "blob_id": "c1adcd98af1924e4b690f9fd0cd8431cdb6408f4", "branch_name": "refs/heads/main", "committer_date": 1619639769000, "content_id": "72cd7f0ee3d158d401360c9b39c1411c6054df76", "detected_licenses": [ "MIT" ], "directory_id": "a3e1249729edf825d00be50c87d141d325fe3d47", "extension": "py", "file...
2.890625
stackv2
from pprint import pprint from googleapiclient.discovery import build import sys from query_expansion import query_expansion NUM_Q = 10 API_KEY = sys.argv[1] SEARCH_ENGINE = sys.argv[2] QUERY = sys.argv[4] PRECISION = sys.argv[3] #lists and variables to calcualte precision and pass for query expansion relevant_indices...
101
31.48
110
15
889
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6edb19e91470ede4_ddfe7b8c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 21 ]
[ null ]
[ 24 ]
[ 31 ]
2024-11-19T01:33:39.490942+00:00
1,516,465,677,000
1f0a0d420943f7e573b0cf46bab35eca83d9b0c1
3
{ "blob_id": "1f0a0d420943f7e573b0cf46bab35eca83d9b0c1", "branch_name": "refs/heads/master", "committer_date": 1516465677000, "content_id": "be3280bc295ddbfdaa200628fd24330de86e1461", "detected_licenses": [ "MIT" ], "directory_id": "cbc43ca2a174be90570092e1f862ad4294e516fb", "extension": "py", "fi...
2.59375
stackv2
# -*- coding: utf-8 -*- import os import click import logging import urllib.request import sys import tarfile from dotenv import find_dotenv, load_dotenv # https://stackoverflow.com/questions/13881092/download-progressbar-for-python-3 def reporthook(blocknum, blocksize, totalsize): readsofar = blocknum * blocksiz...
59
31.61
80
14
518
python
[{"finding_id": "codeql_py/tarslip_3685e2c4b67bf238_552a8c92", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 42 ]
[ null ]
[ 5 ]
[ 8 ]
2024-11-19T01:33:44.338742+00:00
1,494,945,257,000
186739811b4b15df4165abc0dc860a871c1d9827
3
{ "blob_id": "186739811b4b15df4165abc0dc860a871c1d9827", "branch_name": "refs/heads/master", "committer_date": 1494945257000, "content_id": "d14867ff469ee7054bd708dc840f1b702ebcdf74", "detected_licenses": [ "MIT" ], "directory_id": "2171e1669df02fdd303b3249da36d3f448b0f677", "extension": "py", "fi...
2.53125
stackv2
from flask import Flask, request from flask_sqlalchemy import SQLAlchemy from keras.models import load_model from keras.preprocessing import sequence from database import db from models import Name import json import numpy as np import re import string import yaml config = yaml.load(open('config.yaml')) app = Flask(_...
72
27.51
101
20
500
python
[{"finding_id": "codeql_py/flask-debug_158d44a2dfdf9b2b_215d1d33", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 72, 35 ]
[ null, null ]
[ 5, 20 ]
[ 39, 26 ]
2024-11-19T01:33:55.202897+00:00
1,631,188,780,000
2624ec9bb0d3f5ae263b456647faf53ff584bda8
2
{ "blob_id": "2624ec9bb0d3f5ae263b456647faf53ff584bda8", "branch_name": "refs/heads/master", "committer_date": 1631188780000, "content_id": "c6fbf33cb9390d6696246a49416ca8cafc446e46", "detected_licenses": [ "Apache-2.0", "MIT" ], "directory_id": "4422ee79b1bbf1cda7f2b993136cf9a52e7e71d7", "exten...
2.375
stackv2
import numpy as np np.random.seed(0) import torch torch.manual_seed(0) import torch.nn as nn import time import pandas as pd import argparse import torch import json import torch.optim as optim from torch.optim.lr_scheduler import StepLR from early_stopping import EarlyStopping from losses import DiceCrossEntropyLoss, ...
123
34.69
98
14
1,101
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_204e90dd1d7f6d5a_aa984a1d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 77 ]
[ null ]
[ 11 ]
[ 53 ]
2024-11-19T01:57:20.376208+00:00
1,601,120,533,000
a681efbae5ea6912d3c7d16f665877fe6dd90764
3
{ "blob_id": "a681efbae5ea6912d3c7d16f665877fe6dd90764", "branch_name": "refs/heads/master", "committer_date": 1601120533000, "content_id": "db42ee49dd8377176a9708a4ae6c91d52bcbdf7f", "detected_licenses": [ "MIT" ], "directory_id": "05d460acd3e15c42c4b1ddd2eead83dc48f5312f", "extension": "py", "fi...
2.953125
stackv2
from robobrowser import RoboBrowser import re,time website = input('[>]Input the URL of the login page or webpage:') #Another user-agent of you choice can be specified user_agent = 'Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.36' simple_slqi = ["1 'or' 1'='1",'1 "...
75
40.71
115
19
809
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8dc9c016383b1481_5498b897", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 13, 45 ]
[ null, null ]
[ 8, 10 ]
[ 20, 24 ]
2024-11-19T02:11:12.820697+00:00
1,410,399,048,000
c46a708a6ea9ad723d7db78c27df45d87dd87c54
2
{ "blob_id": "c46a708a6ea9ad723d7db78c27df45d87dd87c54", "branch_name": "refs/heads/master", "committer_date": 1410399048000, "content_id": "cc868c3fc53eea3b6b8be63bae21eb5ca35893fe", "detected_licenses": [ "MIT" ], "directory_id": "81a09ab04d2a446ed56ef876438ceb2932d0538e", "extension": "py", "fi...
2.484375
stackv2
#-*- coding: utf-8 -*- from __future__ import unicode_literals from __future__ import print_function import os import sys from jinja2 import Template import json def to_utf8(obj): try: return obj.decode('utf-8') except: return obj.decode('cp949') def build_report(input_file, fixture): wi...
66
26.27
79
15
446
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_e504c39cd8dbd01a_014f6b98", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 23 ]
[ 27 ]
[ 16 ]
[ 6 ]
2024-11-19T02:11:38.369456+00:00
1,625,392,102,000
61e0c6622f092718832ee5b75ba851fd7461b53c
2
{ "blob_id": "61e0c6622f092718832ee5b75ba851fd7461b53c", "branch_name": "refs/heads/master", "committer_date": 1625392102000, "content_id": "3fc2d60ac85b7ce8cf34ff1f3d2d5fbb9a2421b1", "detected_licenses": [ "MIT" ], "directory_id": "0978b2809d2bd84c58e132c055d10de2fd2df469", "extension": "py", "fi...
2.328125
stackv2
from rest_framework.viewsets import ModelViewSet from rest_framework.decorators import action from rest_framework.response import Response from rest_framework import status from django.utils.module_loading import import_string from django.core.exceptions import PermissionDenied class ModelViewsetWithEditSuggestion(Mo...
159
43.77
123
19
1,460
python
[{"finding_id": "codeql_py/stack-trace-exposure_93e1c2c63befc274_ee4207d1", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
5
true
[ "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information...
[ 44, 123, 128, 147, 152 ]
[ 47, 126, 131, 150, 155 ]
[ 46, 46, 46, 46, 46 ]
[ 14, 14, 14, 14, 14 ]
2024-11-19T02:32:59.221018+00:00
1,666,929,698,000
5294322fb6b74e3ae0faf64b11233f7a1b6ad245
2
{ "blob_id": "5294322fb6b74e3ae0faf64b11233f7a1b6ad245", "branch_name": "refs/heads/master", "committer_date": 1666929698000, "content_id": "f6e08399655f589dfb40f36ff959fa19e63379be", "detected_licenses": [ "MIT" ], "directory_id": "bd9a09a3f1a8b2b5166c540ada93cc5b30591605", "extension": "py", "fi...
2.40625
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- ''' name: weblogic XMLdecoder反序列化漏洞(CVE-2017-10271) referer: https://www.anquanke.com/post/id/92003 author: Lucifer description: weblogic /wls-wsat/CoordinatorPortType接口存在命令执行。 ''' import sys import requests class weblogic_xmldecoder_exec_BaseVerify: def __init__(self,...
59
35.27
148
14
568
python
[{"finding_id": "codeql_py/request-without-cert-validation_688cd9bae59b2de8_78e6cdd2", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 49 ]
[ null ]
[ 19 ]
[ 100 ]
2024-11-19T02:46:19.279368+00:00
1,491,184,279,000
3a0fd1de47f49cb9a4cc6ffe6aa4f554914301d9
2
{ "blob_id": "3a0fd1de47f49cb9a4cc6ffe6aa4f554914301d9", "branch_name": "refs/heads/master", "committer_date": 1491184279000, "content_id": "73c0da89e713cea0b3b0ad2f396d076598b437c9", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "d83b1877d3471709f461db25e9e5308fb398fb8b", "extension": "p...
2.359375
stackv2
#!/usr/bin/env python # Teddy Reed <teddy.reed@gmail.com> # Copyright (c) 2016-present # All rights reserved. # # This source code is licensed under the BSD-style license found in the # LICENSE file in the root directory of this source tree. import argparse import jinja2 import os import sys import tempfile fro...
175
32.71
80
17
1,478
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_24dd5b8c5c860ade_523ab359", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 81, 110 ]
[ null, null ]
[ 14, 22 ]
[ 33, 56 ]
2024-11-19T02:59:53.165176+00:00
1,634,204,709,000
4295b479732b2d5004bfa3a139a88113eb1a8b9a
2
{ "blob_id": "4295b479732b2d5004bfa3a139a88113eb1a8b9a", "branch_name": "refs/heads/master", "committer_date": 1634204709000, "content_id": "0cfe1c3f6f94da5ac27055185eb3cc334c0ea009", "detected_licenses": [ "Apache-2.0" ], "directory_id": "517ca489f5829e08e5705fa789e1e233092bc6f7", "extension": "py"...
2.421875
stackv2
import re from abc import ABCMeta, abstractmethod from pesto_orm.core.error import DBError class Dialect(object): __metaclass__ = ABCMeta @abstractmethod def get_db_type(self): raise NotImplementedError @abstractmethod def select(self, columns, table, alias, where): raise NotImp...
158
31.41
136
19
1,215
python
[{"finding_id": "codeql_py/redos_77e596013ba6eed8_338b1be7", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'select count(' and containing man...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with 'select count(' and containing many repetitions of ')count('." ]
[ 54 ]
[ null ]
[ 65 ]
[ 72 ]
2024-11-19T03:24:38.923133+00:00
1,629,605,218,000
1623cd0619bc10039ec564a6abec16996b916c1c
4
{ "blob_id": "1623cd0619bc10039ec564a6abec16996b916c1c", "branch_name": "refs/heads/main", "committer_date": 1629605218000, "content_id": "ea742d34997d8da2b8f368931e86a01a7bdc9ba4", "detected_licenses": [ "MIT" ], "directory_id": "036f5a11b154ac5f2d7fd301fc171b29908cee5b", "extension": "py", "file...
3.5
stackv2
# -*- coding: utf-8 -*- """ Created on Fri Nov 20 10:28:42 2020 @author: pc """ def taxRate(base): if base < 0: tax = 0 elif base <= 1500: tax = base * 0.03 elif base > 1500 and base <= 4500: tax = base * 0.1 - 105 elif base > 4500 and base <= 9000: tax = base * 0.2 - 55...
70
30.57
110
14
754
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0fff0ec519236f4b_eacdfe23", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
4
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (priva...
[ 59, 60, 62, 63 ]
[ null, null, null, null ]
[ 11, 11, 11, 11 ]
[ 47, 54, 54, 73 ]
2024-11-19T03:35:16.703895+00:00
1,563,970,878,000
d4c762afc8ace9c9c247285e084152a6be7e3c81
4
{ "blob_id": "d4c762afc8ace9c9c247285e084152a6be7e3c81", "branch_name": "refs/heads/master", "committer_date": 1563970878000, "content_id": "7bfbb7374c59b580a26d3cad605c3bc9dee5f5ee", "detected_licenses": [ "MIT" ], "directory_id": "c6cbe9d15e9b1e43f7cb7adcf72591533c0fccf4", "extension": "py", "fi...
3.796875
stackv2
# -------------- ##File path for the file file_path #Code starts here def read_file(path): file = open(path,"r") sentence = file.readline() file.close() return sentence sample_message = read_file(file_path) print(sample_message) # -------------- #Code starts here def read_file(file_path_1,file_...
183
19.72
70
12
995
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_d14f8b8f89ba846c_38eb6f48", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.\nT...
6
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive data (secret)](2) as clear text.\nThis expression stores [sensitive data (secret)](3) as clear text.\nThis expression stores [sensitive data (secret)](4) as clear text.\nThis expression stores [sensitive data (sec...
[ 176, 40, 71, 120, 161, 181 ]
[ null, null, null, null, null, null ]
[ 16, 7, 7, 7, 7, 7 ]
[ 26, 19, 19, 19, 19, 17 ]
2024-11-19T03:35:25.772740+00:00
1,692,906,553,000
94bb261fa9f8af6d3f0f6cd0d31439ebce209c70
3
{ "blob_id": "94bb261fa9f8af6d3f0f6cd0d31439ebce209c70", "branch_name": "refs/heads/master", "committer_date": 1692906553000, "content_id": "bc6ac8a63b3a68927fccb9c01b36653461cfb45c", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "bb021c074c95c4fb684cd543b288bc0b976df188", "extension": "p...
2.515625
stackv2
# ----------------------------------------------------------------------------- # Copyright (c) 2012 - 2018, Anaconda, Inc. and Intake contributors # All rights reserved. # # The full license is in the LICENSE file, distributed with this software. # ----------------------------------------------------------------------...
348
31.34
97
17
2,611
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_a678e82e6cb09e31_2b3243d7", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 84, 342 ]
[ null, null ]
[ 17, 11 ]
[ 30, 24 ]
2024-11-19T03:35:28.097592+00:00
1,675,589,721,000
4219da2bdba9e131e66f1ab7a88297f0f7c2c289
3
{ "blob_id": "4219da2bdba9e131e66f1ab7a88297f0f7c2c289", "branch_name": "refs/heads/master", "committer_date": 1675589721000, "content_id": "f66344f748f108580589408e22b87b7e84c43111", "detected_licenses": [ "MIT" ], "directory_id": "f185203cbccdb1f065cde33d1bf3068af974f3a8", "extension": "py", "fi...
2.671875
stackv2
#!/usr/bin/env python2.7 # # PiCam SSTV Transmitterf # # Copyright (C) 2018 Mark Jessop <vk5qi@rfhead.net> # Released under GNU GPL v3 or later # # PiCamera API: https://picamera.readthedocs.io/en/release-1.12/api_camera.html # # This script is hacked together from the WenetPiCam class out of the Wenet proje...
477
36.15
138
21
3,759
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_14bdd409143de487_e908a8a0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 422 ]
[ null ]
[ 15 ]
[ 52 ]
2024-11-19T01:37:33.630269+00:00
1,586,421,157,000
5ae86c566a90f9920e150c3ffd8dcb057146ea21
3
{ "blob_id": "5ae86c566a90f9920e150c3ffd8dcb057146ea21", "branch_name": "refs/heads/master", "committer_date": 1586421157000, "content_id": "e6e7d5c17d65de419e7f0445d978f32307d4bf16", "detected_licenses": [ "MIT" ], "directory_id": "23329178576c7cae0f5c8527905cff5126be13bb", "extension": "py", "fi...
2.5625
stackv2
import paramiko import datetime from PiScanner import PiScanner import nmap class PiControl: def __init__(self): self.now = datetime.datetime.now().strftime("%d/%m/%Y %H:%M:%S") self.ssh = paramiko.SSHClient() self.ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy()) self.std...
87
35.59
95
20
718
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_19ff4bca2659ce46_9846bb6e", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 12 ]
[ null ]
[ 9 ]
[ 71 ]
2024-11-19T01:38:00.753593+00:00
1,608,897,775,000
e855a607840d14706c90fe1f9d99e36a2e25499c
3
{ "blob_id": "e855a607840d14706c90fe1f9d99e36a2e25499c", "branch_name": "refs/heads/master", "committer_date": 1608897775000, "content_id": "df6fb3f4e0dec726073ceaecf5eb7dfc75205641", "detected_licenses": [ "MIT" ], "directory_id": "07e429888e0e564b2d6a8b55180fd117038bc268", "extension": "py", "fi...
3.40625
stackv2
# -------------- #Header files import pandas as pd import numpy as np import matplotlib.pyplot as plt #path of the data file- path data = pd.read_csv(path) data['Gender'].replace('-','Agender',inplace=True) gender_count = data['Gender'].value_counts() print(gender_count) height = [413,157,24] plt.bar(gender_count,hei...
76
21
54
9
461
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a8e06c9d798a1123_7d69d425", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 12 ]
[ null ]
[ 7 ]
[ 19 ]
2024-11-19T01:38:47.334464+00:00
1,523,963,883,000
ec6dad6b27e7c81c6424afae1f9c9a5534854f39
3
{ "blob_id": "ec6dad6b27e7c81c6424afae1f9c9a5534854f39", "branch_name": "refs/heads/master", "committer_date": 1523963883000, "content_id": "87be576d3d056a4803146eea5b68b3b6caebedb9", "detected_licenses": [ "Apache-2.0" ], "directory_id": "3771121eef58d9bc7af7c6efb79c69d7c8d6456d", "extension": "py"...
2.765625
stackv2
try: from StringIO import StringIO except ImportError: from io import BytesIO as StringIO import itertools import os import requests import shutil import tarfile import tempfile import yaml def repo_index(repo_url): """Downloads the Chart's repo index""" index_url = os.path.join(repo_url, 'index.yaml'...
57
31.46
105
18
407
python
[{"finding_id": "codeql_py/tarslip_491948024265d5de_29edd1da", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 42 ]
[ null ]
[ 17 ]
[ 20 ]
2024-11-19T01:52:13.436914+00:00
1,543,284,763,000
185aad8726e66e782dde8ad5424bfecf2874c113
3
{ "blob_id": "185aad8726e66e782dde8ad5424bfecf2874c113", "branch_name": "refs/heads/master", "committer_date": 1543284763000, "content_id": "c3454887579722f02e768e2b3dd38fceb3ae90b8", "detected_licenses": [ "MIT" ], "directory_id": "4e0085c92fe16ff3b7dca50069db43bc4776e352", "extension": "py", "fi...
2.75
stackv2
#!/usr/bin/python # coding:utf-8 import os import paramiko import loadConfig class MyParamiko(object): def __init__(self): ''' 封装paramiko的操作服务器类 ''' config = loadConfig.load_json() setting = self.setting = config[config['start']] self.host = setting['host'] ...
206
28.14
78
27
1,390
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_2162a653081b3ac4_68423348", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 74 ]
[ null ]
[ 9 ]
[ 66 ]
2024-11-19T01:52:24.388178+00:00
1,587,136,324,000
54193d73e178acefa3b9d99c7465e5a8008bfbfc
3
{ "blob_id": "54193d73e178acefa3b9d99c7465e5a8008bfbfc", "branch_name": "refs/heads/master", "committer_date": 1587136324000, "content_id": "9271805d0e73732980ae2f64a90fced962b58ae6", "detected_licenses": [ "MIT" ], "directory_id": "8fe513a3eea6c2897fbfe2f4bd6c36bb11cd7587", "extension": "py", "fi...
3.078125
stackv2
# -------------- ##File path for the file file_path #function to read file def read_file(path): file = open(path, 'r') sentence = file.readline() return sentence #calling of function sample_message = read_file(file_path) #Code starts here # -------------- #Code starts here message_1 = read_file(file_p...
107
19.07
70
12
576
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_43153153ce462890_04bf0d67", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive data (secret)](2) as clear text.\nThis expression stores [sensitive data (secret)](3) as clear text.\nThis expression stores [sensitive data (secret)](4) as clear text.\nThis expression stores [sensitive data (sec...
[ 99, 103 ]
[ null, null ]
[ 17, 7 ]
[ 27, 17 ]
2024-11-19T01:52:27.350492+00:00
1,603,723,315,000
1afdad940dedd9f895bdabad25eef8233261f8ea
3
{ "blob_id": "1afdad940dedd9f895bdabad25eef8233261f8ea", "branch_name": "refs/heads/master", "committer_date": 1603723315000, "content_id": "2f70aa76f33126d9e0c8697f2e90053abb0aabaa", "detected_licenses": [ "MIT" ], "directory_id": "a1f8d73ec1642bb345ab088a3a76eba8f9508d18", "extension": "py", "fi...
2.8125
stackv2
from datetime import datetime from tqdm import tqdm import requests import re, sys, time, os #Banner os.system("clear") logo = ''' ____ __ _____ / _/___ _____/ /_____ _/ ___/____ __ _____ _____ / // __ \/ ___/ __/ __ `/\__ \/ __ `/ | / / _ \/ ___/ _/ // / / (__ ) /_/ /_/ /...
187
39.34
129
21
1,802
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_d6ea213caf162f40_57267dcd", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'instagram.com', so it might match m...
14
true
[ "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-1333", "CWE-1333", "CWE-1333", "CWE-1333", "CWE-1333", "CWE-1333", "CWE-1333" ]
[ "py/incomplete-hostname-regexp", "py/incomplete-hostname-regexp", "py/incomplete-hostname-regexp", "py/incomplete-hostname-regexp", "py/incomplete-hostname-regexp", "py/incomplete-hostname-regexp", "py/incomplete-hostname-regexp", "py/redos", "py/redos", "py/redos", "py/redos", "py/redos", "...
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'instagram.com', so it might match more hosts than expected.", "This regular expression has an unescaped '.' before 'instagram.com', so it might match more hosts than expected.", "This regular expression has an unescaped '.' before 'instagram.com', so it migh...
[ 52, 114, 117, 118, 118, 119, 120, 52, 114, 117, 118, 118, 119, 120 ]
[ null, null, null, null, null, null, null, null, null, null, null, null, null, null ]
[ 20, 20, 33, 33, 78, 33, 33, 40, 40, 53, 53, 98, 53, 53 ]
[ 63, 63, 97, 77, 123, 96, 99, 45, 45, 58, 58, 103, 58, 58 ]
2024-11-19T02:04:27.019797+00:00
1,693,486,587,000
4bcda1c12b211b067f774218325d88e1718f3ada
2
{ "blob_id": "4bcda1c12b211b067f774218325d88e1718f3ada", "branch_name": "refs/heads/main", "committer_date": 1693486587000, "content_id": "46ef0810ad437b494b95cf30c0c422e51044d534", "detected_licenses": [ "MIT" ], "directory_id": "5c8c8b33967315e449b730c3f1d0cc4375cd0fe8", "extension": "py", "file...
2.375
stackv2
"""Our default IEM template environ.""" import datetime import json import os from jinja2 import Environment, PackageLoader # Can not support auto_escape at this time as parts of the template are # being provided verbatim. TEMPLATE_ENV = Environment(loader=PackageLoader("pyiem", "templates/iem")) NAVBAR_JSON_FN = "/o...
30
28.2
74
14
209
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_62f7e327260d90bd_47694ad7", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 10 ]
[ null ]
[ 16 ]
[ 75 ]
2024-11-19T02:04:43.721148+00:00
1,589,122,836,000
26bc79c866042690dd9dbb687d20ccdf60a266cc
4
{ "blob_id": "26bc79c866042690dd9dbb687d20ccdf60a266cc", "branch_name": "refs/heads/master", "committer_date": 1589122836000, "content_id": "74e4a07da14ca415889d4321ab8839bb97879360", "detected_licenses": [ "MIT" ], "directory_id": "326409943db38db59f1cae2ac9fd1190f625969d", "extension": "py", "fi...
4.375
stackv2
""" Petit jeu de devinette (version 2) Auteur: Thierry Massart Date : 10 octobre 2018 Petit jeu de devinette d'un nombre entier tiré aléatoirement par le programme dans un intervalle donné Entrée : le nombre proposé par l'utilisateur Résultat : affiche si le nombre proposé est celui tiré aléatoirement """ # importatio...
60
28.53
102
14
493
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b2f3266210239b4f_527a2044", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text." ]
[ 53 ]
[ null ]
[ 42 ]
[ 48 ]
2024-11-19T02:04:45.452348+00:00
1,585,538,045,000
94af4608a6bbbf59a08613a3d92529d5c76baf91
3
{ "blob_id": "94af4608a6bbbf59a08613a3d92529d5c76baf91", "branch_name": "refs/heads/master", "committer_date": 1585538045000, "content_id": "7c6d53fb3beacc4697eceddea19ce3e4bf2de9fb", "detected_licenses": [ "Apache-2.0" ], "directory_id": "2356532cbc830ad22f57ba5387a30e2fbfbb3628", "extension": "py"...
2.734375
stackv2
from flask import Flask from getRedisClient import getRC app = Flask(__name__) # chouJiangEDredis:redis计数器名称 @app.route('/choujiang/<username>') def chouJiang(username): amountL = 400 # 奖金总额度 getrc = getRC.getRedisClient() if getrc.exists("chouJiangEDredis"): pass else: getrc.setnx("ch...
28
30.04
82
15
319
python
[{"finding_id": "codeql_py/reflective-xss_0e14c4ac907814c2_8e20d06d", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 17, 20 ]
[ null, null ]
[ 16, 16 ]
[ 51, 42 ]
2024-11-19T02:04:47.406691+00:00
1,523,706,186,000
bab69cfec94732327ee74cb39f0b38f94b620cca
2
{ "blob_id": "bab69cfec94732327ee74cb39f0b38f94b620cca", "branch_name": "refs/heads/master", "committer_date": 1523706186000, "content_id": "3e251a393d47fff3c7d437f80fd50b9f142f3599", "detected_licenses": [ "Apache-2.0" ], "directory_id": "123b1508c690d7cf7cb78e237ed847ae0f17fb95", "extension": "py"...
2.453125
stackv2
from core.color import blue # Blue for Warnings from core.color import red #Red For Errors from core.color import green #Green for output import requests import re def run(target): try: req = requests.get(target+'/joomla.xml', verify = False) if req.status_code == 404: req = requests.ge...
19
33.68
83
14
147
python
[{"finding_id": "codeql_py/request-without-cert-validation_7c73a18efb480e7d_7ed054a3", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 9, 11 ]
[ null, 12 ]
[ 15, 19 ]
[ 65, 84 ]
2024-11-19T02:04:47.611678+00:00
1,529,369,080,000
e75e263f5879e833df03f6b16f14e24704f655ad
4
{ "blob_id": "e75e263f5879e833df03f6b16f14e24704f655ad", "branch_name": "refs/heads/master", "committer_date": 1529369080000, "content_id": "b1ec7b15ab620b0f7e6ec817900e9782f1697b54", "detected_licenses": [ "MIT" ], "directory_id": "2a5c1fb7d2cce18a68e0e51d3293d4d77c83e730", "extension": "py", "fi...
3.875
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- import random secret = random.randint(1, 99) guess = 0 tries = 0 print(type(secret)) print(type(guess)) print("AHOY! I'm the Dread Pireate Roberts, and I have a secret!") print("It is a number from 1 to 99, I'll give you 6 tries.") while guess != secret and tries < 6: ...
27
26.19
77
11
215
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f5564430ca8cc62f_b6f6d477", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 27 ]
[ null ]
[ 36 ]
[ 42 ]
2024-11-19T02:28:21.645435+00:00
1,657,058,840,000
f6d4631b5f29c121f56a33ce7cfa0975ee4c4e4d
3
{ "blob_id": "f6d4631b5f29c121f56a33ce7cfa0975ee4c4e4d", "branch_name": "refs/heads/master", "committer_date": 1657058840000, "content_id": "d2cbcfa05450a517b21e5509a7349d478885e7c1", "detected_licenses": [ "MIT" ], "directory_id": "eb167912bfc0f07544aaa3fc0466bfc7b53d2760", "extension": "py", "fi...
2.9375
stackv2
# -*- coding: utf-8 -*- """ Created on Sun Jan 21 16:39:28 2018 @author: Tim """ __version__ = '1.21' #python program to run on older PI Canada donor reports prior to October 2021. import re import dateutil.parser as p import pandas as pd ba_len = 8 def get_datestring(donor_line): first_of_month = donor_line....
181
33.52
174
20
1,555
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_ec6d6c41aca07d0d_a80c5163", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text." ]
[ 157 ]
[ null ]
[ 25 ]
[ 31 ]
2024-11-19T02:28:23.823933+00:00
1,599,141,739,000
22afaf04c4fd8bcaa89fb4a64dcab6bbd62c7ef1
3
{ "blob_id": "22afaf04c4fd8bcaa89fb4a64dcab6bbd62c7ef1", "branch_name": "refs/heads/master", "committer_date": 1599141739000, "content_id": "58f8817eeb937fcd2fc4de52f558d4d1dedfeb54", "detected_licenses": [ "MIT" ], "directory_id": "b2c348bbae1aff24532f94b69afad8580d7cf920", "extension": "py", "fi...
3.328125
stackv2
#!/usr/bin/python2 import scrypt import binascii import getpass from hashlib import sha512 def SlowKDF(password, salt, i): digest = password for counter in range(i): print "Iteration %s from %s..." % (counter+1, i) digest = scrypt.hash(digest, salt, N = 1048576, r = 8, p = 1, buflen = 128) ret...
50
26.14
87
11
428
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_e1475419c397ebe9_658b38f2", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally e...
[ 38 ]
[ null ]
[ 22 ]
[ 44 ]
2024-11-19T02:28:26.810638+00:00
1,484,843,806,000
7f01e09d29259269dc98681a331b4be9d814034f
2
{ "blob_id": "7f01e09d29259269dc98681a331b4be9d814034f", "branch_name": "refs/heads/master", "committer_date": 1484843806000, "content_id": "9c42bd6233e324e87868293dcea14f1c78f6ba1c", "detected_licenses": [ "MIT" ], "directory_id": "78ab5021b46ae9920789d3b106f87d4f399036c2", "extension": "py", "fi...
2.421875
stackv2
import configparser import subprocess import re import os from time import sleep import datetime from pysolar.solar import * import requests import json import logging dir_path = os.path.dirname(os.path.realpath(__file__)) config = configparser.ConfigParser() config.read('{}/config/rhythuem.ini'.format(dir_path)) de...
216
29.74
109
15
1,636
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b1c75eb6c0a11b7a_0b4cbbc2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 29, 96, 102 ]
[ null, null, null ]
[ 19, 23, 26 ]
[ 86, 85, 109 ]
2024-11-19T02:28:28.749776+00:00
1,521,889,453,000
2d27f2fe03ac6182f0925b705ef929de120231a5
2
{ "blob_id": "2d27f2fe03ac6182f0925b705ef929de120231a5", "branch_name": "refs/heads/master", "committer_date": 1521889453000, "content_id": "670044945368df785e689cba7d8b2140ce966b52", "detected_licenses": [ "Apache-2.0" ], "directory_id": "4d3f1825f483e6a03c437cdd11142c7bac5f8c27", "extension": "py"...
2.390625
stackv2
from github import Github from argparse import ArgumentParser import jinja2 import base64 import yaml import re import os def normalize(string): lines = string.strip().split('\n') if 'skills' in lines[0]: return '\n'.join([ re.sub('^(#)? ', '\g<1>', line) for line in lines[1:]...
151
27.26
77
16
1,026
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_0c33aeaa99cba73a_ab23369c", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 22 ]
[ 24 ]
[ 12 ]
[ 6 ]
2024-11-19T02:28:45.283102+00:00
1,615,261,839,000
10aa5b2a88f57da70debcff52b5bbe2bfe670d20
3
{ "blob_id": "10aa5b2a88f57da70debcff52b5bbe2bfe670d20", "branch_name": "refs/heads/main", "committer_date": 1615261839000, "content_id": "ad147bf1b327b11bd26e63d2c6133a336772ad87", "detected_licenses": [ "MIT" ], "directory_id": "395bc3078d69e4adebd5b0577d7f36eca1df20e2", "extension": "py", "file...
3.21875
stackv2
# app/robo_advisor.py file import requests import os import datetime import json import csv from pandas import read_csv import seaborn as sns import matplotlib.pyplot as plt import pandas as pd # this function is used to convert from normal number to a currency (as to say) def to_usd(my_price): """ Conv...
183
37.37
152
18
1,682
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e1aa7d4c6fe798b2_3a391c6d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 114, 116, 117 ]
[ null, null, null ]
[ 22, 23, 22 ]
[ 45, 55, 53 ]
2024-11-19T02:36:47.493184+00:00
1,661,276,162,000
e4aa807b1ad45968555563fcb09cddfe052e9210
3
{ "blob_id": "e4aa807b1ad45968555563fcb09cddfe052e9210", "branch_name": "refs/heads/master", "committer_date": 1661276162000, "content_id": "ce1d5b97d282124f83f9c814261602b04ec3742f", "detected_licenses": [ "Apache-2.0" ], "directory_id": "1045cf0f12a8f5059983506ce3d71ad73c02a3fe", "extension": "py"...
2.515625
stackv2
from base_scraper import BaseScraper import requests import Geohash import re IGNORE_DUPE_IDS = { 456, # Hialeah Middle School 442, # Amelia Earhart Elementary } GEOHASH_PRECISION = 7 class IrmaShelters(BaseScraper): filepath = 'irma-shelters.json' url = 'https://irma-api.herokuapp.com/api/v1/shelte...
334
37.64
109
19
2,936
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_e4162f4b86c7a521_9a71debe", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'google.com/maps', so it might match...
1
true
[ "CWE-020" ]
[ "py/incomplete-hostname-regexp" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'google.com/maps', so it might match more hosts than expected." ]
[ 222 ]
[ null ]
[ 7 ]
[ 70 ]
2024-11-19T02:36:50.713873+00:00
1,583,139,863,000
fc6d2140dbd4e3903097cbc164143ee333126876
3
{ "blob_id": "fc6d2140dbd4e3903097cbc164143ee333126876", "branch_name": "refs/heads/master", "committer_date": 1583139863000, "content_id": "03390c145f4509d7b32fed45490ece7dd4345af2", "detected_licenses": [ "MIT" ], "directory_id": "6425ce8ef2386fb2ed974adf8b39b1f428834077", "extension": "py", "fi...
2.921875
stackv2
''' Function: 虾米音乐下载: https://www.xiami.com/ Author: Charles 微信公众号: Charles的皮卡丘 声明: 代码仅供学习交流, 不得用于商业/非法使用. ''' import os import json import click import requests from contextlib import closing try: from urllib.parse import unquote except ImportError: from urllib import unquote ''' Function: 破解虾米URL加密 ''' class...
162
29.86
137
31
1,455
python
[{"finding_id": "codeql_py/request-without-cert-validation_f8cb848c7ef53268_f65fa968", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 116 ]
[ null ]
[ 17 ]
[ 92 ]
2024-11-19T02:37:12.853886+00:00
1,672,334,718,000
129825424fa2b30bc2978e00d9b27a3830a8e6d5
3
{ "blob_id": "129825424fa2b30bc2978e00d9b27a3830a8e6d5", "branch_name": "refs/heads/master", "committer_date": 1672334718000, "content_id": "a777b08ece04644da98e5a2f78d503e4557dcf82", "detected_licenses": [ "Apache-2.0" ], "directory_id": "3086506a2fc668d7a580e4511105f04e8dbfc5d6", "extension": "py"...
3.09375
stackv2
#!/usr/bin/env python # encoding: utf-8 import string import random def get_passwd(): passwd = [] for i in range(4): passwd.append(random.choice(string.lowercase)) passwd.append(random.choice(string.uppercase)) passwd.append(random.choice(string.digits)) passwd.append(random.c...
26
26.5
86
18
169
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_fdef1d763f2ed95d_17828c43", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text." ]
[ 26 ]
[ null ]
[ 42 ]
[ 86 ]
2024-11-19T02:37:16.131792+00:00
1,490,185,135,000
5e7171187db22fb6b1efeecc168939a5690c3131
3
{ "blob_id": "5e7171187db22fb6b1efeecc168939a5690c3131", "branch_name": "refs/heads/master", "committer_date": 1490185135000, "content_id": "e9098f595929e9605239b26a0c4ad6d998da95a7", "detected_licenses": [ "MIT" ], "directory_id": "eda97d9a87a96d989b5eacafe40fe4741a0719f4", "extension": "py", "fi...
2.90625
stackv2
import re import jinja2 import os import shutil def get_template(template_file): """Get a jinja template with latex tags. modified from http://eosrei.net/articles/2015/11/latex-templates-python-and-jinja2-generate-pdfs """ latex_jinja_env = jinja2.Environment( block_start_string = '\BLOCK{', ...
45
36.93
114
15
401
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_f727021393f0de69_73eee7df", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 11 ]
[ 23 ]
[ 23 ]
[ 6 ]
2024-11-19T02:37:17.727222+00:00
1,672,163,493,000
9d58adeac84034bb3a3b499656a3b099d0a273a5
2
{ "blob_id": "9d58adeac84034bb3a3b499656a3b099d0a273a5", "branch_name": "refs/heads/master", "committer_date": 1672163493000, "content_id": "aa28f55370c6c27b6ef846cb22081eefbb715c56", "detected_licenses": [ "Zlib" ], "directory_id": "ced0a5875b6003d2590d1c362e41016b61d8b80c", "extension": "py", "f...
2.328125
stackv2
import sys from random import randint from flamejam import app, db, mail from flamejam.models.user import User from flamejam.utils import hash_password, verify_password from flamejam.forms import ( UserLogin, UserRegistration, ResetPassword, NewPassword, SettingsForm, ContactUserForm, ) from fl...
315
36.99
98
18
2,451
python
[{"finding_id": "codeql_py/url-redirection_69ee3bef3d1646ac_37078271", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 57 ]
[ null ]
[ 29 ]
[ 73 ]
2024-11-19T02:37:39.897296+00:00
1,613,413,180,000
22caffd93a7a3b5b56c1c344237d96cda5df5328
4
{ "blob_id": "22caffd93a7a3b5b56c1c344237d96cda5df5328", "branch_name": "refs/heads/master", "committer_date": 1613413180000, "content_id": "8af26ff21a33b36428121f5fe3880e23106d9500", "detected_licenses": [ "MIT" ], "directory_id": "0bf0d6543b05cb1eb3e650e328ccd9abe541bf22", "extension": "py", "fi...
3.734375
stackv2
#! /usr/bin/en python3.6 from user import User from credentials import Credentials from random import choice def create_account(first_name, last_name, user_name, password): """ Fuction that creates a new user account when a user opts to sign-up """ new_user = User(first_name, last_name, user_name, pas...
176
37.1
168
25
1,180
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d3951ba0b61c52df_65a12425", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.", "This expression logs [sensitive dat...
[ 92, 139, 147 ]
[ null, null, null ]
[ 17, 29, 37 ]
[ 93, 134, 109 ]
2024-11-19T02:37:44.385526+00:00
1,559,740,857,000
01520741539373e95ed0971d0f9e9350c4c9f6b0
3
{ "blob_id": "01520741539373e95ed0971d0f9e9350c4c9f6b0", "branch_name": "refs/heads/master", "committer_date": 1559740857000, "content_id": "52bd17c3fe38d8e4cb06600c42b21865deae7375", "detected_licenses": [ "MIT" ], "directory_id": "9fb4df222a42c1f37553651861807fe2e1822413", "extension": "py", "fi...
2.625
stackv2
import pandas as pd import boto3 from sqlalchemy import create_engine import pytz my_timezone = pytz.timezone('Europe/Dublin') # creeate s3 connection client = boto3.client('s3', 'eu-west-1') # create database connetion POSTGRES_USERNAME = 'sahil' POSTGRES_PASSWORD = 'zxcvbnm1234' POSTGRES_DBNAME = 'data' POSTGRES_H...
49
27.33
118
13
392
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3df82779da2973e0_e628fad9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 18 ]
[ null ]
[ 7 ]
[ 10 ]
2024-11-19T03:00:27.057296+00:00
1,375,682,880,000
ab1ca906a782915b1b884fc30a4fe5b487070e30
2
{ "blob_id": "ab1ca906a782915b1b884fc30a4fe5b487070e30", "branch_name": "refs/heads/master", "committer_date": 1375682880000, "content_id": "e7f50e268468e3aeb6caf0156d25768943d7453c", "detected_licenses": [ "MIT" ], "directory_id": "6cf46f85debb1b0505c0edcbc7296f50a44a615d", "extension": "py", "fi...
2.5
stackv2
from datetime import datetime from dexy.reporters.output import OutputReporter from dexy.utils import dict_from_string from dexy.utils import file_exists from dexy.utils import iter_paths from dexy.utils import reverse_iter_paths from jinja2 import Environment from jinja2 import FileSystemLoader import dexy.exceptions ...
268
34.38
143
21
1,887
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_b01bdbd6a9021502_2dfd8ac8", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 169 ]
[ null ]
[ 15 ]
[ 60 ]
2024-11-19T03:11:26.475640+00:00
1,578,687,668,000
7537a4a17f91fc841955d597c3cf9c69e17b5845
2
{ "blob_id": "7537a4a17f91fc841955d597c3cf9c69e17b5845", "branch_name": "refs/heads/master", "committer_date": 1578687668000, "content_id": "b1fd0190502044ba4e597dcfb393119dd0d469cf", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "2c24efab5a3d2ac311003b6ee37b338c505b8e31", "extension": "p...
2.359375
stackv2
''' This file exposes RESTful HTTP APIS to interact with service manager and task manager. ''' import sys,os from functools import wraps import json import threading import time from datetime import datetime from flask import Blueprint, request, jsonify, abort from .manager import Manager bp = Blueprint('tasks', ...
220
31.57
117
20
1,741
python
[{"finding_id": "codeql_py/reflective-xss_01d4454378cb7347_417b8b5c", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 98 ]
[ null ]
[ 12 ]
[ 55 ]
2024-11-19T03:11:39.696030+00:00
1,570,627,592,000
7b30efc753ad9b35bfc4f4d417faabb986c16a70
2
{ "blob_id": "7b30efc753ad9b35bfc4f4d417faabb986c16a70", "branch_name": "refs/heads/master", "committer_date": 1570627592000, "content_id": "829c175c0b5ae1e6dc98a762cb08d6f7be85d2eb", "detected_licenses": [ "MIT" ], "directory_id": "db7bb2154f041db8b7d26bae56b9432b1650ddab", "extension": "py", "fi...
2.484375
stackv2
"""SODAR Taskflow API for Django apps""" import logging import requests from uuid import UUID from django.conf import settings from django.core.exceptions import ImproperlyConfigured # Projectroles dependency from projectroles.models import SODAR_CONSTANTS logger = logging.getLogger(__name__) # SODAR constants PR...
168
29.58
80
15
1,141
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c05082d76f4da125_c86dd9dd", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 110 ]
[ null ]
[ 22 ]
[ 52 ]
2024-11-19T03:12:11.106639+00:00
1,628,280,543,000
5ae251dda99378b10d219676d614d5b792156b66
2
{ "blob_id": "5ae251dda99378b10d219676d614d5b792156b66", "branch_name": "refs/heads/master", "committer_date": 1628280543000, "content_id": "20350eb9ae70ec64695e93de324c15d4127fed6e", "detected_licenses": [ "MIT" ], "directory_id": "1845f0d71f3ed4063bbb5417ca6ae1555a16dd0a", "extension": "py", "fi...
2.453125
stackv2
#!/usr/bin/env python3 # Extract hash files of package # -*- coding: utf-8 -*- # %%%%%%%%%%% Libraries %%%%%%%%%%%# import re import os import json import gzip import shutil import hashlib import tarfile from auxiliar_functions.globals import tmp # %%%%%%%%%%% Functions %%%%%%%%%%%# def get_hash_pkg(path_pack)...
91
33.12
77
23
701
python
[{"finding_id": "codeql_py/tarslip_6410b864444bbda9_a1c2e27d", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 51 ]
[ null ]
[ 13 ]
[ 17 ]
2024-11-19T03:12:12.443625+00:00
1,419,737,143,000
7eaccb0387ff3c4e08cdb47d5fb494f752b33808
3
{ "blob_id": "7eaccb0387ff3c4e08cdb47d5fb494f752b33808", "branch_name": "refs/heads/master", "committer_date": 1419737143000, "content_id": "55a46be9c2c0b9479db547cff7699793d4b72927", "detected_licenses": [ "MIT" ], "directory_id": "02348531f65e154606f289fe982abe4446379829", "extension": "py", "fi...
2.53125
stackv2
#!/usr/bin/python def main(): print "Digital Ocean API v1" print "You can find these tokens here: https://cloud.digitalocean.com/api_access" print do_v1_client_id = raw_input("Client ID: ") do_v1_api_key = raw_input("API key: ") print print print "Digital Ocean API v2" print "You...
73
19.85
121
11
402
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_4742766b27d21151_e33d61f4", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text." ]
[ 69 ]
[ null ]
[ 32 ]
[ 51 ]