added
stringlengths
32
32
created
int64
1,244B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.25
source
stringclasses
1 value
text
stringlengths
324
20.1k
num_lines
int64
16
598
avg_line_length
float64
15.1
58.3
max_line_length
int64
33
179
ast_depth
int64
8
39
length
int64
101
3.8k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.1k
265k
sast_codeql_findings_count
int64
1
45
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
45
rule_ids
listlengths
1
45
confidences
listlengths
1
45
severities
listlengths
1
45
messages
listlengths
1
45
line_starts
listlengths
1
45
line_ends
listlengths
1
45
column_starts
listlengths
1
45
column_ends
listlengths
1
45
2024-11-19T03:12:26.793803+00:00
1,525,691,909,000
b862c29bd44a6bae61b69c2d98eed4da02187395
3
{ "blob_id": "b862c29bd44a6bae61b69c2d98eed4da02187395", "branch_name": "refs/heads/master", "committer_date": 1525691909000, "content_id": "6491d5f0d20b049462d28160d874776756459c5a", "detected_licenses": [ "MIT" ], "directory_id": "329c00c2699f4fa3459d077c4000eeef41e86f4b", "extension": "py", "fi...
2.5625
stackv2
#!/usr/bin/python # -*- coding: utf-8 -*- import random import string import re import time import requests import proxy # this is a simple example import logging # define the log file, file mode and logging level logging.basicConfig(filename='example.log', filemode="a", level=logging.DEBUG) max_num = 51; url = 'http...
96
27.44
94
12
761
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_3508c7e6acdf78a2_ae45d62c", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'processon.com/signup/verification/'...
2
true
[ "CWE-020", "CWE-312" ]
[ "py/incomplete-hostname-regexp", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'processon.com/signup/verification/', so it might match more hosts than expected.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 71, 48 ]
[ null, null ]
[ 11, 11 ]
[ 60, 65 ]
2024-11-19T03:12:33.697504+00:00
1,403,431,831,000
4154e19cf9d27d534ca8cecb946cbdfb46e16397
2
{ "blob_id": "4154e19cf9d27d534ca8cecb946cbdfb46e16397", "branch_name": "refs/heads/master", "committer_date": 1403431831000, "content_id": "c1e42e97f3cc1eb584a231b860ea89fca11e8204", "detected_licenses": [ "MIT" ], "directory_id": "4e268d4a1810f9ad997f3effff775137328a2210", "extension": "py", "fi...
2.484375
stackv2
# -*- coding: utf-8 -*- """ File handling utils """ import cmd from datetime import datetime import getpass import locale import os import pkg_resources import shlex import shutil import io import sys import time import traceback import urllib import zipfile from concurrent.core.util.texttransforms import _, printerr,...
191
34.52
99
18
1,570
python
[{"finding_id": "codeql_py/overly-permissive-file_ac56edc555327ab9_bc875d23", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in open sets file to world writable.", "remediation": "", "location": {...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in open sets file to world writable." ]
[ 59 ]
[ null ]
[ 36 ]
[ 63 ]
2024-11-19T03:12:42.701577+00:00
1,354,095,425,000
0c2677f9887ac26a46c2493e419b849ba230da67
3
{ "blob_id": "0c2677f9887ac26a46c2493e419b849ba230da67", "branch_name": "refs/heads/master", "committer_date": 1354095425000, "content_id": "707e2cad5c54f99a41f702c70949e3902df58a9f", "detected_licenses": [ "MIT" ], "directory_id": "8144ee25f69e0954039fec5aa9dc7518871d94ed", "extension": "py", "fi...
2.546875
stackv2
import bcrypt from flask import (current_app, escape, flash, redirect, render_template, request, url_for) from flask.ext.login import current_user, logout_user, login_user from pymongo.errors import DuplicateKeyError from location.auth import auth from location.auth.models import User @auth.route('/login', method...
64
39.86
86
19
533
python
[{"finding_id": "codeql_py/url-redirection_94eaf9f5d4928b93_8caa2f46", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 25 ]
[ null ]
[ 33 ]
[ 80 ]
2024-11-19T03:12:52.441288+00:00
1,453,746,650,000
82178566b366f09d9f01f7c5011842f147b8d97a
2
{ "blob_id": "82178566b366f09d9f01f7c5011842f147b8d97a", "branch_name": "refs/heads/master", "committer_date": 1453746650000, "content_id": "fb0ab96e52430e22ef28610f2a2f19f8a346d27c", "detected_licenses": [ "Apache-2.0" ], "directory_id": "cb5ebc38ad32a11cabe045e6f375eae2ebe92106", "extension": "py"...
2.40625
stackv2
#!/usr/bin/env python # # A FusionReactor Nagios check script # # https://github.com/aparnachaudhary/nagios-plugin-jbossas7 is used as a reference for this. # # Main Author # - Christoph Witzany <christoph@web.crofting.com> # Version: 0.1 # Github URL: https://github.com/doublemalt/nagios-plugin-fusionreactor # # ...
343
26.47
143
14
2,382
python
[{"finding_id": "codeql_py/redos_cee0671df70fea73_a21c3716", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '/'.", "remediati...
2
true
[ "CWE-1333", "CWE-327" ]
[ "py/redos", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '/'.", "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password...
[ 272, 168 ]
[ null, null ]
[ 30, 21 ]
[ 32, 41 ]
2024-11-19T03:25:29.932917+00:00
1,630,504,710,000
b98f34d15a0ff8e6436feb60d43da6a9d7f8a2f4
2
{ "blob_id": "b98f34d15a0ff8e6436feb60d43da6a9d7f8a2f4", "branch_name": "refs/heads/master", "committer_date": 1630504710000, "content_id": "b5393a5990d2e915fab2bdcd3a19cf50a1fb8502", "detected_licenses": [ "MIT" ], "directory_id": "e5590ad1cbbb73ead8af88cf33a71c49f964ef8f", "extension": "py", "fi...
2.375
stackv2
import os import zipfile from pathlib import Path import warnings from shutil import rmtree import time import pandas as pd import numpy as np import SimpleITK as sitk from tqdm import tqdm from segmentation_metrics import compute_segmentation_scores from survival_metrics import concordance_index class AIcrowdEvalu...
270
40.63
105
19
2,366
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_eedc289ec398ddba_66983618", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 254, 270 ]
[ null, null ]
[ 15, 15 ]
[ 55, 55 ]
2024-11-19T03:25:40.768292+00:00
1,605,505,275,000
37450c1819731a5b07d8739d590bd06db26bcaa8
3
{ "blob_id": "37450c1819731a5b07d8739d590bd06db26bcaa8", "branch_name": "refs/heads/master", "committer_date": 1605505275000, "content_id": "66981c756464cb87cc06b2bd968d30ec9129f656", "detected_licenses": [ "MIT" ], "directory_id": "f39ba4801aa370007b0b05c08974475472fb1954", "extension": "py", "fi...
3.28125
stackv2
#!/usr/bin/env python3.6 from user import User from credential import Credential import random def create_user(user_name): ''' Function to create a new user ''' new_user = User(user_name) return new_user def create_credential(password): ''' Function to create a new credential ''' ne...
149
23.57
148
19
744
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0a57ab124787c291_43eaa07d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 99, 117, 129 ]
[ null, null, null ]
[ 19, 19, 27 ]
[ 68, 65, 51 ]
2024-11-19T03:35:43.513917+00:00
1,668,662,208,000
bba21e68c30c150256ffb4f9e923efdeb43079ed
3
{ "blob_id": "bba21e68c30c150256ffb4f9e923efdeb43079ed", "branch_name": "refs/heads/master", "committer_date": 1668662208000, "content_id": "706122a090e472ba11b332608aed9173e1fe8568", "detected_licenses": [ "Apache-2.0" ], "directory_id": "228456eccf1eb0bd832cdd8bbc8116cae8432ff6", "extension": "py"...
2.515625
stackv2
from flask import make_response, jsonify, request import socket from random import randint from bson import ObjectId from database import DB import re import boto3 from botocore.exceptions import ClientError import random, string import apis.utils.constants as CONST import logging from datetime import datetime, date, t...
172
28.78
129
16
1,330
python
[{"finding_id": "codeql_py/redos_acab75058536e808_41f0fadb", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'a' and containing many repetition...
2
true
[ "CWE-1333", "CWE-1333" ]
[ "py/redos", "py/redos" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with 'a' and containing many repetitions of 'a'.", "This part of the regular expression may cause exponential backtracking on strings starting with 'a@a' and containing many repetitions of 'a'." ]
[ 119, 119 ]
[ null, null ]
[ 25, 41 ]
[ 28, 44 ]
2024-11-19T03:35:54.169355+00:00
1,461,695,098,000
226627f519832c438036d839edcd81bb24886ac7
3
{ "blob_id": "226627f519832c438036d839edcd81bb24886ac7", "branch_name": "refs/heads/master", "committer_date": 1461695098000, "content_id": "249b37fa7177891b52e5d87b1eb2b6f454721f78", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "b3a090e008f8928ed74b77996c7bf9379f58d083", "extension": "p...
2.875
stackv2
"""Guardian Search web application A small, simple web application which allows a user to search for articles on the Guardian's website (http://www.guardian.co.uk) using simple queries. The aim of this project is primarily to learn about the Guardian's Open Platform Content API (http://www.guardian.co.uk/open-platfor...
134
33.36
79
17
962
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_0757f96c2dcbb917_aa31a7e3", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 24 ]
[ 25 ]
[ 21 ]
[ 63 ]
2024-11-19T01:28:53.585942+00:00
1,621,584,733,000
3576fcf05e7c530b4043cd98345ecac2d26450ec
4
{ "blob_id": "3576fcf05e7c530b4043cd98345ecac2d26450ec", "branch_name": "refs/heads/master", "committer_date": 1621584733000, "content_id": "28e191eb6966e0af898b1429e01b7614a27344a5", "detected_licenses": [ "MIT" ], "directory_id": "f4a554440e3c382375ad8eeabcee6aaadb3113ba", "extension": "py", "fi...
3.59375
stackv2
import hashlib import json import user_login with open('userinfo_files/userinfo.json', 'r') as file: user_info = json.load(file) def check_user(fullname): for key in user_info.keys(): if fullname == key: return True def create_pass(): y_pass = input('''Note that your password must b...
87
28.69
107
16
564
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_9992c4c09a4f95bf_7fb8d468", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e...
[ 46 ]
[ null ]
[ 29 ]
[ 46 ]
2024-11-19T01:29:15.341901+00:00
1,632,078,539,000
41a48ccc73870840c95d2a4b099b381cecd47913
3
{ "blob_id": "41a48ccc73870840c95d2a4b099b381cecd47913", "branch_name": "refs/heads/main", "committer_date": 1632078539000, "content_id": "10724f7791b742389a3e9da9f3d17ff8bb608209", "detected_licenses": [ "Apache-2.0" ], "directory_id": "50969dc5360b0a616d5524e32eab8e560194d2ed", "extension": "py", ...
2.578125
stackv2
import base64 from datetime import datetime import io import json from zipfile import ZipFile import pandas as pd import time import os from dash.dependencies import Input, Output, State from dash.exceptions import PreventUpdate from app import app def parse_google_files(): """ Parse the ZIP file uploaded i...
295
53.77
119
29
3,029
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b9fa0ddb63f9d7e2_add9dccd", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 266 ]
[ null ]
[ 23 ]
[ 35 ]
2024-11-19T01:29:18.694182+00:00
1,592,323,468,000
e907c21a50262a1ef0060e7444e5fb57ef03d209
2
{ "blob_id": "e907c21a50262a1ef0060e7444e5fb57ef03d209", "branch_name": "refs/heads/master", "committer_date": 1592323468000, "content_id": "88c531512611937dd8eb0eb19a8b90a8931090a5", "detected_licenses": [ "Apache-2.0" ], "directory_id": "6d377d36391289374af4127dee2ee9a40e4a3f99", "extension": "py"...
2.328125
stackv2
from django.shortcuts import render,redirect,reverse from django.http import HttpResponse from django.contrib.auth import login,logout,authenticate from django.contrib.auth.decorators import login_required from django.views.decorators.http import require_POST from .forms import LoginForm,RegisterForm from utils import ...
86
32.2
96
18
683
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3495bcb6e21d5b19_f3c1402f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 47, 47 ]
[ null, null ]
[ 15, 34 ]
[ 24, 42 ]
2024-11-19T01:30:06.858785+00:00
1,566,364,083,000
9e6e7a4844cc6a6c70a23c1aec967584ee59f448
2
{ "blob_id": "9e6e7a4844cc6a6c70a23c1aec967584ee59f448", "branch_name": "refs/heads/master", "committer_date": 1566364083000, "content_id": "b3d2217a97739fbfc3b71f6bb88e111f8fffda05", "detected_licenses": [ "MIT" ], "directory_id": "9a2279d073952004e6f607065756fe3a2546b0c7", "extension": "py", "fi...
2.34375
stackv2
"""connectionlist api """ import json import logging.handlers from rest_framework.response import Response from rest_framework.views import APIView, status from webapp.libs.authorization import ValidationUser, ValidateUserRole from webapp.libs.for_embest import ForEmbest from webapp.libs.for_whitewalker import ForWhi...
227
36.26
117
19
1,671
python
[{"finding_id": "codeql_py/log-injection_3b085b50011bae9a_52bb76b6", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
2
true
[ "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 156, 161 ]
[ 157, 162 ]
[ 30, 26 ]
[ 77, 77 ]
2024-11-19T01:30:11.359645+00:00
1,497,993,423,000
7b1fa703843910074a767cbd5c650186b9272b39
2
{ "blob_id": "7b1fa703843910074a767cbd5c650186b9272b39", "branch_name": "refs/heads/master", "committer_date": 1497993423000, "content_id": "f194901bdf377fde6d301bd941765eae77c63266", "detected_licenses": [ "Apache-2.0" ], "directory_id": "7dbf3ca19acce6a2c8992e5dc78bf19ebb158f64", "extension": "py"...
2.328125
stackv2
#!/usr/bin/env python from __future__ import print_function from future.standard_library import install_aliases install_aliases() from urllib.parse import urlparse, urlencode from urllib.request import urlopen, Request from urllib.error import HTTPError import json import os from flask import Flask from flask impor...
128
28.84
109
19
994
python
[{"finding_id": "codeql_py/partial-ssrf_3685e89516ceaab5_daae4449", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 46 ]
[ null ]
[ 14 ]
[ 30 ]
2024-11-19T01:30:38.520631+00:00
1,617,679,834,000
285c92bebbe178b375b75df2b7e5292117ff1585
2
{ "blob_id": "285c92bebbe178b375b75df2b7e5292117ff1585", "branch_name": "refs/heads/master", "committer_date": 1617679834000, "content_id": "c24a9bb7c19202f2888490da488d0db22dac07df", "detected_licenses": [ "Apache-2.0" ], "directory_id": "fc8f4489a5b579da110847ab6a7aca42fbcc3e0d", "extension": "py"...
2.375
stackv2
from os import path from jinja2 import Environment from jinja2.loaders import FileSystemLoader root_folder_path = path.dirname(path.dirname(__file__)) def generate_sitemap(pages): non_static_urls = [] for url, type in pages: if type is None: continue is_page = type.startswith(...
35
28.03
88
14
225
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_899f92a75b88fc31_b0f8521c", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 30 ]
[ null ]
[ 11 ]
[ 89 ]
2024-11-19T01:55:18.509982+00:00
1,463,117,012,000
2fa11ba01e7ca456ecd4ba9bbe49215255796e15
2
{ "blob_id": "2fa11ba01e7ca456ecd4ba9bbe49215255796e15", "branch_name": "refs/heads/master", "committer_date": 1463117012000, "content_id": "ad450d16878684cbd29874d65b3bb06a3f230c4d", "detected_licenses": [ "MIT" ], "directory_id": "a992cf9c3d52d3e01865918762a29d18719c7a5c", "extension": "py", "fi...
2.375
stackv2
""" flask_interface/app.py Contains the views and url mappings for the web application. """ import json import os from flask import Flask, render_template, redirect, make_response, jsonify, session from flask import request from CardsAgainstGame.GameHandler import Game, SUBMISSION_STATE, JUDGING_STATE from functools i...
308
26.89
134
18
1,894
python
[{"finding_id": "codeql_py/insecure-cookie_8568288584cfccdd_40287b57", "tool_name": "codeql", "rule_id": "py/insecure-cookie", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Cookie is added to response without the 'secure' flag being set.", "remediation": "", "location": {"file_path"...
7
true
[ "CWE-614", "CWE-614", "CWE-614", "CWE-020", "CWE-1004", "CWE-1004", "CWE-1004" ]
[ "py/insecure-cookie", "py/insecure-cookie", "py/insecure-cookie", "py/cookie-injection", "py/client-exposed-cookie", "py/client-exposed-cookie", "py/client-exposed-cookie" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cookie is added to response without the 'secure' flag being set.", "Cookie is added to response without the 'secure' flag being set.", "Cookie is added to response without the 'secure' flag being set.", "Cookie is constructed from a [user-supplied input](1).", "Sensitive server cookie is set without HttpOn...
[ 125, 153, 272, 153, 125, 153, 272 ]
[ null, null, null, null, null, null, null ]
[ 13, 13, 9, 45, 13, 13, 9 ]
[ 59, 71, 48, 53, 59, 71, 48 ]
2024-11-19T01:55:31.954415+00:00
1,615,047,509,000
6b83d3bb3e1661c7a6406736c42b3a749b993b27
2
{ "blob_id": "6b83d3bb3e1661c7a6406736c42b3a749b993b27", "branch_name": "refs/heads/main", "committer_date": 1615047509000, "content_id": "cf0e9fd0d7bca93ada6ace48b81b15338830c2c9", "detected_licenses": [ "Apache-2.0" ], "directory_id": "8554b56092d6d8097c48db74264f402848da753b", "extension": "py", ...
2.40625
stackv2
import requests import json import urllib3 import os import argparse from datetime import datetime urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning) class VRopsClient: headers = {"Accept": "application/json", "Content-Type": "application/json"} url_base = "" token = "" def __init_...
91
38.68
119
19
785
python
[{"finding_id": "codeql_py/request-without-cert-validation_f7a25d6c54d677c2_31c28ad9", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
3
true
[ "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 22, 36, 47 ]
[ 25, 38, 49 ]
[ 22, 22, 16 ]
[ 49, 71, 44 ]
2024-11-19T02:07:23.162672+00:00
1,628,326,795,000
662c07e4cb016eb4eda391e3736848a039f65486
3
{ "blob_id": "662c07e4cb016eb4eda391e3736848a039f65486", "branch_name": "refs/heads/master", "committer_date": 1628326795000, "content_id": "7acd197e1020ed134bc0bfbc96b9c34c3a1c4090", "detected_licenses": [ "MIT" ], "directory_id": "af7cc1544efb268e7f48c8ce4378a817e296550f", "extension": "py", "fi...
3.46875
stackv2
import hashlib ################################################################################ # Class: User # Author: Duc Anh # Last modified: 29 May 2021 ################################################################################ class User: ''' This class is used mainly to create t...
114
29.61
129
14
723
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_4232a1aac7677767_8c804203", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 74 ]
[ null ]
[ 44 ]
[ 61 ]
2024-11-19T02:31:28.885309+00:00
1,515,712,262,000
40875d96f3555e930629d90afce2a91a123a4d52
2
{ "blob_id": "40875d96f3555e930629d90afce2a91a123a4d52", "branch_name": "refs/heads/master", "committer_date": 1515712262000, "content_id": "5d113a5168205563daa91feea735d2e419094d58", "detected_licenses": [ "Apache-2.0" ], "directory_id": "6cf08b4bf8c58acdfdef411915ae355626209c46", "extension": "py"...
2.375
stackv2
import base64 import requests from flask_login import UserMixin from flask_wtf import Form from wtforms import StringField, PasswordField from wtforms.validators import DataRequired from kconfig import settings __author__ = "Manuel Escriche <mev@tid.es>" class User(UserMixin): __data__ = dict() def __init__...
90
29.2
108
13
610
python
[{"finding_id": "codeql_py/request-without-cert-validation_da13c90f0b7c7628_f3dc07a1", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 69 ]
[ null ]
[ 22 ]
[ 83 ]
2024-11-19T02:31:41.611524+00:00
1,378,229,036,000
38b2db2da3dfbfa1a17edc74c908e28a1f6b69c5
3
{ "blob_id": "38b2db2da3dfbfa1a17edc74c908e28a1f6b69c5", "branch_name": "refs/heads/master", "committer_date": 1378229036000, "content_id": "42b89b32c4cd423338d0a864cbb2400b4b7a1ae5", "detected_licenses": [ "MIT" ], "directory_id": "a09ff1936124cb6f5f1cb6ba6ddbb33e242ab839", "extension": "py", "fi...
3.015625
stackv2
#!/usr/bin/python2.7 '''A script for gathering BlueArc NFS shares mounted on servers. It takes one mandatory parameter, the BlueArc site location (either LAXHQ or SEA), and one optional paramater, how many threads to use. Results are returned in txt format. ''' import argparse import MySQLdb import paramiko from Queue...
142
32.49
107
17
1,133
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_dbf8dec0afe5d711_412241e7", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 24 ]
[ null ]
[ 9 ]
[ 71 ]
2024-11-19T02:32:00.152841+00:00
1,582,456,797,000
7233fb82e01072336762d2a76564656e753bea77
3
{ "blob_id": "7233fb82e01072336762d2a76564656e753bea77", "branch_name": "refs/heads/master", "committer_date": 1582456797000, "content_id": "727b234ec1e5ed3649ef0f6e127988557343ae26", "detected_licenses": [ "MIT" ], "directory_id": "3f1a670abd54e0cedad91fcf7ba22041aa1c7fee", "extension": "py", "fi...
2.59375
stackv2
#!./bin/python3 # -*- coding: ascii -*- #import import sys import openpyxl #get_column_letter #column_index_from_string import paramiko import scp import datetime import base64 excelsheetpath = "" excelsheet = None sheets = {} nodeinfo = {} ipinfo = {} def getWorkBookFile(): print("IPCheck started....") print("...
293
30.9
170
22
2,759
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_56980862070e462d_a00bfcea", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 160 ]
[ null ]
[ 2 ]
[ 65 ]
2024-11-19T02:32:09.669218+00:00
1,513,176,118,000
9265c9a5b121642a452fe2a5335c65b1003e77d6
3
{ "blob_id": "9265c9a5b121642a452fe2a5335c65b1003e77d6", "branch_name": "refs/heads/master", "committer_date": 1513176118000, "content_id": "a6a074ab3cf13553283f24c0bcf88f9dbc5cfa0b", "detected_licenses": [ "MIT" ], "directory_id": "7cbb185731e53759b4af0db3f919253baf0b127d", "extension": "py", "fi...
2.6875
stackv2
from multiprocessing.managers import SyncManager import time import inspect import datetime from functools import partial from types import FunctionType import sys import random import string if sys.version_info.major == 3: from queue import Queue as _Queue else: from Queue import Queue as _Queue __all__ = [...
229
36.26
137
19
1,779
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b5d70e4940e87903_ecd67af5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 104 ]
[ null ]
[ 15 ]
[ 137 ]
2024-11-19T02:32:12.493010+00:00
1,383,191,360,000
ece6c8f05fe5e0bcf61b5759a5be2532ed12cb5f
2
{ "blob_id": "ece6c8f05fe5e0bcf61b5759a5be2532ed12cb5f", "branch_name": "refs/heads/master", "committer_date": 1383191360000, "content_id": "77b9465c1209b4496f1c27182a14cf7175520419", "detected_licenses": [ "BSD-3-Clause", "Python-2.0", "BSD-2-Clause", "MIT" ], "directory_id": "989cb3ad6a0...
2.46875
stackv2
import requests from flask import Blueprint, render_template, session, redirect, request from irianas_web.core import require_login, url_server irianas_module = Blueprint('clients', __name__, template_folder='templates') @irianas_module.route('/clients/', methods=['GET']) @require_login def clients(): data = dic...
80
36.16
77
20
622
python
[{"finding_id": "codeql_py/request-without-cert-validation_a9768e0a6063a5f1_f86d3b6a", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
3
true
[ "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 14, 33, 60 ]
[ null, null, 61 ]
[ 13, 17, 21 ]
[ 78, 77, 48 ]
2024-11-19T02:32:20.442082+00:00
1,631,854,394,000
ed80be8ddb522bb6b3ed4cd5f7b9d8536643f887
3
{ "blob_id": "ed80be8ddb522bb6b3ed4cd5f7b9d8536643f887", "branch_name": "refs/heads/master", "committer_date": 1631854394000, "content_id": "1a5be3c7e55762f608f3b442697a32a0add846c1", "detected_licenses": [ "MIT" ], "directory_id": "b2ff37406e50976b8db1c75bde4297f5039f7391", "extension": "py", "fi...
2.640625
stackv2
from flask import Flask, render_template , redirect , request app = Flask(__name__) @app.route('/') def home(): return render_template('index.html') @app.route('/process', methods = ['GET','POST']) def process(): if request.method == "POST": get_name = request.form.get("input_name") return re...
21
24.67
61
12
122
python
[{"finding_id": "codeql_py/flask-debug_6a2527a733fdd387_fb4d23d4", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-601" ]
[ "py/flask-debug", "py/url-redirection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 21, 13 ]
[ null, null ]
[ 5, 25 ]
[ 24, 44 ]
2024-11-19T02:32:48.008121+00:00
1,576,283,391,000
78b039942604cc2806fa1bfffcaeceae7dec6a8a
3
{ "blob_id": "78b039942604cc2806fa1bfffcaeceae7dec6a8a", "branch_name": "refs/heads/master", "committer_date": 1576283391000, "content_id": "e0234f018d7e92122d65a3678974779136bfa70c", "detected_licenses": [ "CC0-1.0" ], "directory_id": "a5b1308385b01178e82fc43954d3bd3e2405fc45", "extension": "py", ...
3.328125
stackv2
import random, pyperclip password = "" symbols = [] nums = [] alphabet = [] for letter in range(97, 123): alphabet.append(chr(letter)) for symbol in range(33, 64): symbols.append(chr(symbol)) for num in range(48, 57): nums.append(chr(num)) for x in range(8): password = password + random.choice(al...
36
17.03
50
9
163
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_be3f9a4903c26d21_7d152a03", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text." ]
[ 28 ]
[ null ]
[ 7 ]
[ 15 ]
2024-11-19T02:33:00.712324+00:00
1,630,638,898,000
9f36f90454a0dd20164d71bb1c0a614a942a79a2
3
{ "blob_id": "9f36f90454a0dd20164d71bb1c0a614a942a79a2", "branch_name": "refs/heads/main", "committer_date": 1630638898000, "content_id": "814e4ee01591c5f0d970f71b26330b588bbe2153", "detected_licenses": [ "MIT" ], "directory_id": "06aa5e824faeccd1dfd78add4e49cdea42a19908", "extension": "py", "file...
2.875
stackv2
import string import wordcloud import nltk nltk.download('stopwords') nltk.download('wordnet') nltk.download('punkt') nltk.download('averaged_perceptron_tagger') import pandas as pd import numpy as np from bs4 import BeautifulSoup import re from nltk.corpus import stopwords from sklearn.model_selection import train_t...
390
34.96
159
17
3,531
python
[{"finding_id": "codeql_py/overly-large-range_556f1285f37ae793_ab687435", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 19 ]
[ null ]
[ 22 ]
[ 25 ]
2024-11-19T02:33:12.407288+00:00
1,500,632,719,000
c7bbd76e80189701e25e0ce528cafc724580cfb7
3
{ "blob_id": "c7bbd76e80189701e25e0ce528cafc724580cfb7", "branch_name": "refs/heads/master", "committer_date": 1500632719000, "content_id": "de659e2516322298fa7842d4a787b1c585bd3c29", "detected_licenses": [ "MIT" ], "directory_id": "37311498a80c6ebffd73ea4f6c262096f39772f2", "extension": "py", "fi...
2.796875
stackv2
# -*- coding: utf-8 -*- import json import os from functools import reduce from config import appid, appsecret import requests def print_btn(btn): result = '' if 'name' in btn: result += btn['name'].encode('utf-8') if 'key' in btn: result += '(' + btn['key'].encode('utf-8') + ')' if 'u...
76
31.79
102
18
618
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3dd4a3fd7448ef42_1c607cdb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
5
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive dat...
[ 28, 33, 47, 55, 71 ]
[ null, null, null, null, null ]
[ 15, 11, 19, 15, 19 ]
[ 22, 18, 31, 51, 56 ]
2024-11-19T02:43:38.881609+00:00
1,625,361,633,000
70950d1ada01c5d3bb3d620100acbfa400a8e660
3
{ "blob_id": "70950d1ada01c5d3bb3d620100acbfa400a8e660", "branch_name": "refs/heads/master", "committer_date": 1625361633000, "content_id": "091d7bf039631d539213c0c841a5dcc0cf6e2075", "detected_licenses": [ "BSD-2-Clause", "BSD-3-Clause" ], "directory_id": "faa84a83a3d347ac8b17cab2fa0599c65652a85d...
2.625
stackv2
import os from uliweb.core.commands import Command from optparse import make_option class MakeKeyCommand(Command): name = 'makekey' help = 'Make secret key to to a file.' option_list = ( make_option('-o', dest="output", help='Output key file name.'), ) def handle(self, options...
82
33.2
138
16
649
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_617d73dee00d9d0f_66e3cd09", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (secret)](1) as clear text." ]
[ 30 ]
[ null ]
[ 17 ]
[ 27 ]
2024-11-19T02:54:49.040707+00:00
1,605,735,520,000
42e83094e933cea6f6ac1abf28955436e9cc1a95
3
{ "blob_id": "42e83094e933cea6f6ac1abf28955436e9cc1a95", "branch_name": "refs/heads/main", "committer_date": 1605735520000, "content_id": "5172ab5d1c319411b479a72236e8440f827271d6", "detected_licenses": [ "MIT" ], "directory_id": "48a03aac74e1417712c09dce8b851ca05915627b", "extension": "py", "file...
3.03125
stackv2
import sys, getopt, hashlib from math import exp, expm1 import random SECRET = "s2rj6235-77d3-3405-3d23-462w34179227" def mykey(key): return hashlib.sha256(key + SECRET).hexdigest() # string to binary def ConvertStringToBinary(s): return ''.join('{:08b}'.format(ord(c)) for c in s) # binary to int def Co...
109
25.4
128
14
900
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_265da9eff9713b90_b156b6f2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 55, 61, 104 ]
[ null, null, null ]
[ 8, 8, 7 ]
[ 51, 36, 29 ]
2024-11-19T02:54:49.097046+00:00
1,572,544,430,000
319494bd45743b9f7bb35f15213ade4275fb97ad
3
{ "blob_id": "319494bd45743b9f7bb35f15213ade4275fb97ad", "branch_name": "refs/heads/master", "committer_date": 1572544430000, "content_id": "fc660ce5af6dab53a6c4159a8087b0f7fe0538fe", "detected_licenses": [ "MIT" ], "directory_id": "0090e851ba8ec7a19e048e0535bc39910bab661e", "extension": "py", "fi...
2.640625
stackv2
# -*- coding: utf-8 -*- from branca.element import CssLink, Figure, JavascriptLink, MacroElement from folium.utilities import parse_options from jinja2 import Template class MeasureControl(MacroElement): """ Add a measurement widget on the map. Parameters ---------- position: str, default 'toprigh...
61
33.3
118
12
471
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_580e57b1c6066916_50bdcfa0", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 25 ]
[ 32 ]
[ 17 ]
[ 13 ]
2024-11-19T02:55:11.015768+00:00
1,560,943,419,000
15ba2d840b28849a758153e88b817f4c3f72fc4c
3
{ "blob_id": "15ba2d840b28849a758153e88b817f4c3f72fc4c", "branch_name": "refs/heads/master", "committer_date": 1560943419000, "content_id": "96201b5bb34fd7b750bbf6af28f4a66240237b8c", "detected_licenses": [ "Apache-2.0" ], "directory_id": "bd73a0f046edac7064e84c802486b11005fb57c4", "extension": "py"...
2.703125
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- # # Copyright (C) 2015-2019 Bitergia # # This program is free software; you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation; either version 3 of the License, or # (at your option) any l...
57
41.72
172
12
623
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ea4fba1aedb26d40_7e3799a6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text." ]
[ 42 ]
[ null ]
[ 11 ]
[ 55 ]
2024-11-19T02:55:13.671771+00:00
1,596,976,671,000
0af53b0f25a0e81d7a2e5046a2ca91afc3b2a805
3
{ "blob_id": "0af53b0f25a0e81d7a2e5046a2ca91afc3b2a805", "branch_name": "refs/heads/master", "committer_date": 1596976671000, "content_id": "df4b12b000bc7e1d4661be378826dde6449a48fd", "detected_licenses": [ "Apache-2.0" ], "directory_id": "6ccaa9eaaea9730a78545876d7d5b37b004a4ca5", "extension": "py"...
2.796875
stackv2
import requests import random import logging import time from datetime import datetime, date, timedelta # from mock_response import response_json # for testing only logging.basicConfig(level=logging.INFO) logger = logging.getLogger('rover-bot') def get_photo(rover, date): api_key = 'DEMO_KEY' # keep this a sec...
101
31.18
102
14
839
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2b368afbb3c4e844_a3f3776f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 18, 75, 90 ]
[ null, null, null ]
[ 17, 21, 14 ]
[ 43, 54, 21 ]
2024-11-19T02:55:13.908028+00:00
1,604,939,944,000
e5fd70439f2570d251cd95ce2dcc67d3d9ff1a52
2
{ "blob_id": "e5fd70439f2570d251cd95ce2dcc67d3d9ff1a52", "branch_name": "refs/heads/main", "committer_date": 1604939944000, "content_id": "bf86be5eb0499164bc503fb6e826b1700a895c2b", "detected_licenses": [ "MIT" ], "directory_id": "063752d83a3a3a582b7ecd7455648fcd4283c854", "extension": "py", "file...
2.421875
stackv2
import json import datetime import time import math from requests_oauthlib import OAuth1Session from pytz import timezone from dateutil import parser import collections as cl json_token = open("config.json", "r", encoding='utf-8') token = json.load(json_token) CK = token["CK"] CS = token["CS"] AT = token["AT"] ATS = ...
134
22.42
88
16
861
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0dad16c1cf79f032_2a180dba", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 71 ]
[ null ]
[ 7 ]
[ 10 ]
2024-11-19T02:55:17.308494+00:00
1,584,033,357,000
0edc6e1c19884c0a8f05bfd90e2e230b935ef354
3
{ "blob_id": "0edc6e1c19884c0a8f05bfd90e2e230b935ef354", "branch_name": "refs/heads/master", "committer_date": 1584033357000, "content_id": "8d6a7e08cb2e41d5d01cc69c7da19ce2d0425ffe", "detected_licenses": [ "MIT" ], "directory_id": "09b733390b1b4ef4dea32a60e76772db93ad627e", "extension": "py", "fi...
2.5625
stackv2
''' 16th april 2018 monday time 3:42am ''' from pathlib import Path from getpass import getpass from cmds.helper import Helper CONFIG_FILE = 'config.txt' HOME = str(Path.home()) DIR_PATH = HOME + "/" + '.local/share/acadbot' FILE_PATH = DIR_PATH + "/" + CONFIG_FILE def cmd_passwd(): file = Path(FILE_PATH) if ...
38
26.18
76
12
250
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_fe9115e713df403f_d3d4bc0a", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 31 ]
[ null ]
[ 27 ]
[ 33 ]
2024-11-19T02:55:36.852542+00:00
1,615,398,281,000
75dd4220d707e5ad6538a7f168d6f999730ec51a
2
{ "blob_id": "75dd4220d707e5ad6538a7f168d6f999730ec51a", "branch_name": "refs/heads/master", "committer_date": 1615398281000, "content_id": "22103bdca8633c600fbbe4697c56e9cba1041715", "detected_licenses": [ "MIT" ], "directory_id": "c7a9ef4807a12c540b93307a207168149ba2d3f9", "extension": "py", "fi...
2.34375
stackv2
# -*- coding: utf-8 -*- import os import shutil import time from flask import render_template, request from app import app, utils @app.route('/test') def home(): """Render test page""" app.logger.debug('Loading test page...') return ''' <html> <head> <title>Test Page - CAVE</title> </hea...
97
28.28
78
15
593
python
[{"finding_id": "codeql_py/path-injection_d192d874f33183a3_12606791", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 71, 72 ]
[ null, 76 ]
[ 21, 21 ]
[ 26, 35 ]
2024-11-19T02:55:43.902885+00:00
1,582,074,402,000
15f49a2319db0d0a21dfd2d03af56e212341bae6
2
{ "blob_id": "15f49a2319db0d0a21dfd2d03af56e212341bae6", "branch_name": "refs/heads/master", "committer_date": 1582074550000, "content_id": "5b636d7acd94228c1eec24ac22eb27f1c6aaee80", "detected_licenses": [ "MIT" ], "directory_id": "0a6ae50779c501c87a4b92e0e8e54c0dcf4d832e", "extension": "py", "fi...
2.390625
stackv2
import json import re import semver from datetime import datetime, timedelta from typing import TYPE_CHECKING, Dict, List, Optional, Tuple, Union from github.GitRelease import GitRelease from github.Issue import Issue from github.NamedUser import NamedUser from github.PullRequest import PullRequest from jinja2 impor...
216
39.79
87
18
2,007
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_726a69a4227e8202_97fc3a52", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 36 ]
[ null ]
[ 26 ]
[ 62 ]
2024-11-19T02:55:50.875967+00:00
1,665,717,399,000
2bc8fbb53eb84296afd64a555918a44236759dd9
3
{ "blob_id": "2bc8fbb53eb84296afd64a555918a44236759dd9", "branch_name": "refs/heads/main", "committer_date": 1665717399000, "content_id": "ba0e89ba8d3705bff29520c9030a989cebddda6d", "detected_licenses": [ "Apache-2.0" ], "directory_id": "d05eb9db3b8c7c0883bd471a6dea49d723616d76", "extension": "py", ...
2.65625
stackv2
#!/usr/bin/env python # Licensed under the Apache License, Version 2.0 (the "License"); you may # not use this file except in compliance with the License. You may obtain # a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software ...
66
38.21
78
20
614
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2a5c39daf9995cb9_897dbb45", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 62 ]
[ null ]
[ 11 ]
[ 19 ]
2024-11-19T02:55:56.791357+00:00
1,541,313,877,000
2a7ff1ea7aef336f3407ba4bd39b8b58fbf0dda0
2
{ "blob_id": "2a7ff1ea7aef336f3407ba4bd39b8b58fbf0dda0", "branch_name": "refs/heads/master", "committer_date": 1541313877000, "content_id": "edac6bde3331e53266ea122769ffd074f6034097", "detected_licenses": [ "MIT" ], "directory_id": "e476267132896ccba3e483890b8316aaaf5e2d58", "extension": "py", "fi...
2.359375
stackv2
# -*- coding: utf-8 -*- import json from flask import Flask, g from cookiepool.config import * from cookiepool.db import * from cookiepool.generator import taobaoCookiesGenerator __all__ = ['app'] app = Flask(__name__) @app.route('/') def index(): return '<h2>Welcome to Cookie Pool System</h2>' def get_conn()...
121
24.66
95
17
807
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6eb60a7f1547250d_1a5924e6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-215" ]
[ "py/clear-text-logging-sensitive-data", "py/flask-debug" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger." ]
[ 52, 121 ]
[ null, null ]
[ 21, 5 ]
[ 29, 42 ]
2024-11-19T02:55:58.580828+00:00
1,526,629,671,000
82fd981f601f453dd83e07158a0bfad4c5a8bcf8
3
{ "blob_id": "82fd981f601f453dd83e07158a0bfad4c5a8bcf8", "branch_name": "refs/heads/master", "committer_date": 1526629671000, "content_id": "9b95a6a2647e666efa8481686ee31ae37939ecda", "detected_licenses": [ "Apache-2.0" ], "directory_id": "64ac514268f093bbc3d034b1868ca2e1277621ff", "extension": "py"...
3.109375
stackv2
import re import sys import os from datetime import datetime import pandas as pd def pairwise(iterable): "s -> (s0, s1), (s2, s3), (s4, s5), ..." a = iter(iterable) return zip(a, a) def convert(list_time): ''' Converts a list of numbers and time symbols into seconds s :param list_time: list o...
141
28.82
95
20
1,200
python
[{"finding_id": "codeql_py/redos_26aa20c44ba4a386_38038b18", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '\\t'.", "remedia...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '\\t'." ]
[ 50 ]
[ null ]
[ 38 ]
[ 54 ]
2024-11-19T02:56:04.848914+00:00
1,525,044,232,000
043942554d5fe3079f0dc424319a1768674a24f8
3
{ "blob_id": "043942554d5fe3079f0dc424319a1768674a24f8", "branch_name": "refs/heads/master", "committer_date": 1525044232000, "content_id": "5a08d7bb79064c8db2c01e80e4abb02b33240f61", "detected_licenses": [ "MIT" ], "directory_id": "b1d0b118be1279f586259d70f1fa8c397d438f54", "extension": "py", "fi...
3.03125
stackv2
#!/usr/bin/env python3 import requests import hashlib import json class hibpEmail(): def __init__(self, email=''): self.found = False self.count = 0 if email: self.email(email) def email(self, email): self.found = False self.count = 0 r = requests...
71
26.77
79
16
430
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_05667307b586ae06_21f01f9e", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expen...
[ 49 ]
[ null ]
[ 32 ]
[ 43 ]
2024-11-19T02:56:09.068144+00:00
1,602,712,022,000
3e34068a056ef0d56b4c268b0b3bfafcd49e41b0
3
{ "blob_id": "3e34068a056ef0d56b4c268b0b3bfafcd49e41b0", "branch_name": "refs/heads/master", "committer_date": 1602712022000, "content_id": "abe58afd35f3c068fbcb1b3bbc10463394a9c430", "detected_licenses": [ "MIT" ], "directory_id": "70b3492d541b35ca61df6617139d7fdf03b33495", "extension": "py", "fi...
2.828125
stackv2
from tensorflow.keras.preprocessing.text import Tokenizer from tensorflow.keras.preprocessing.sequence import pad_sequences import nltk from nltk.stem.snowball import SnowballStemmer import re import string import pandas as pd from nltk.corpus import stopwords import numpy as np import unidecode nltk.download('stopwor...
112
33.06
104
16
1,165
python
[{"finding_id": "codeql_py/overly-large-range_f0f343a7fee03a41_9df07e29", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with 0-9 in the same character class, and is equivalent to \\[+...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with 0-9 in the same character class, and is equivalent to \\[+,\\-.\\/0-9:;<=\\]." ]
[ 25 ]
[ null ]
[ 39 ]
[ 42 ]
2024-11-19T03:10:25.796064+00:00
1,603,199,471,000
b19816a8843bf9e2801517ddc608626a1ad5118b
3
{ "blob_id": "b19816a8843bf9e2801517ddc608626a1ad5118b", "branch_name": "refs/heads/master", "committer_date": 1603199471000, "content_id": "2c2b4f977ee1ddb261d8a6b331333227a47e1482", "detected_licenses": [ "MIT" ], "directory_id": "61ad58a5434415a9ef5c3e429f0314dee0b44d38", "extension": "py", "fi...
3.0625
stackv2
"""Methods to cache remote files.""" import hashlib import logging import os import requests from timer import timed logger = logging.getLogger(__name__) CACHE_DIRECTORY = '/cache/' @timed def cache_file(url, prefix): """Locally cache files fetched from a url.""" cache_filepath = _get_cached_filepath( ...
49
26.47
86
15
297
python
[{"finding_id": "codeql_py/request-without-cert-validation_4dc3dab8c4146123_16de68e4", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 28 ]
[ null ]
[ 13 ]
[ 44 ]
2024-11-19T03:10:38.556894+00:00
1,663,773,454,000
bfd37eed8a0644af4ae74ae6c345cfcd419d38f5
3
{ "blob_id": "bfd37eed8a0644af4ae74ae6c345cfcd419d38f5", "branch_name": "refs/heads/main", "committer_date": 1663773454000, "content_id": "bda1b2c4fc8b38b6d31fc5fff3b891de6411f88c", "detected_licenses": [ "MIT" ], "directory_id": "78e0a1940fa1481636cd9171857d6a5d0825a169", "extension": "py", "file...
2.59375
stackv2
#pylint: disable=too-many-arguments, too-many-locals, invalid-name """ Utility functions to post plot data """ from __future__ import print_function import sys import logging from postprocessing.Configuration import Configuration, CONFIG_FILE import string import requests import urllib3 urllib3.disable_warnings() ...
177
35.62
92
18
1,592
python
[{"finding_id": "codeql_py/request-without-cert-validation_b637373c5047dfc2_9bce4330", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 35 ]
[ 37 ]
[ 15 ]
[ 55 ]
2024-11-19T03:10:52.700997+00:00
1,496,369,499,000
099db780ed7d90f0fea8b4081db8443245ce4726
3
{ "blob_id": "099db780ed7d90f0fea8b4081db8443245ce4726", "branch_name": "refs/heads/master", "committer_date": 1496369499000, "content_id": "7763e07748d34af9f249551fff24ac238efc14f0", "detected_licenses": [ "MIT" ], "directory_id": "1900c27121148be3093e1d7e23dddd9ea04b5e53", "extension": "py", "fi...
2.734375
stackv2
###test version import sqlite3 from flask import Flask, render_template, url_for, request, send_from_directory, session, redirect app = Flask(__name__) app.secret_key = 'lolcatz' app.threaded = True app.config["TEMPLATES_AUTO_RELOAD"] = True ## This is the first page you come to in the program, this displays the home...
136
25.62
156
17
931
python
[{"finding_id": "codeql_py/flask-debug_d5fc4490af130fe6_b0d0268d", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-089" ]
[ "py/flask-debug", "py/sql-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This SQL query depends on a [user-provided value](1)." ]
[ 132, 50 ]
[ null, null ]
[ 2, 13 ]
[ 32, 73 ]
2024-11-19T03:21:44.516188+00:00
1,553,791,929,000
af5f05d789f78d193ce6566c3319f90be9ff71a2
3
{ "blob_id": "af5f05d789f78d193ce6566c3319f90be9ff71a2", "branch_name": "refs/heads/master", "committer_date": 1553791929000, "content_id": "76478ead40c1ca2c7b9d38bfd706c207315c8741", "detected_licenses": [ "MIT" ], "directory_id": "db2e1881d5062abf19e0fcdb572bcb3af7b07576", "extension": "py", "fi...
2.515625
stackv2
import aiohttp import asyncio import base64 import datetime import json # noqa import logging import os import requests def get_config(config_file): """ Get configuration for command :return: """ with open('/jalbot/config/{}'.format(config_file), 'r') as f: config = json.load(f) if 'e...
303
34.01
116
17
2,347
python
[{"finding_id": "codeql_py/request-without-cert-validation_0da7999814d9d59a_f6cbe92f", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 96 ]
[ null ]
[ 19 ]
[ 66 ]
2024-11-19T03:22:14.549002+00:00
1,609,350,867,000
61087c82f4a554a876f385fdfad9427ce6bd07c4
2
{ "blob_id": "61087c82f4a554a876f385fdfad9427ce6bd07c4", "branch_name": "refs/heads/main", "committer_date": 1609350867000, "content_id": "2bb9d36d69ab2a53215fb350551e2412af9ad04d", "detected_licenses": [ "Apache-2.0" ], "directory_id": "76e2900a9dbf18876373618816df1b790fe2670e", "extension": "py", ...
2.390625
stackv2
import cv2 from reciever import SecretCamera from multi_led_reader import MultiLedReader import gbvision as gbv from protocol import raw_to_data, raw_to_bmp import time # ColorThreshold([[176, 255], [198, 255], [155, 255]], 'RGB') # ColorThreshold([[200, 255], [202, 255], [201, 255]], 'RGB') !!!WHITE ON BLACK!!! ERO...
318
29.52
119
17
2,441
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_905c38c779e70d0f_13e4a077", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 260 ]
[ null ]
[ 11 ]
[ 17 ]
2024-11-19T03:22:20.928918+00:00
1,687,636,293,000
809a5d8f8c82e7db612d7687725afbf04f2a463a
3
{ "blob_id": "809a5d8f8c82e7db612d7687725afbf04f2a463a", "branch_name": "refs/heads/master", "committer_date": 1687636293000, "content_id": "bd3cd1cf9714cdef30c102fbf5e5d59afae07ef7", "detected_licenses": [ "MIT" ], "directory_id": "ecb66d151961e27b5e1907268dde4cdf2be5ec45", "extension": "py", "fi...
3.078125
stackv2
#!/usr/bin/python # Import the CGI module import MySQLdb import cgi import cgitb cgitb.enable() # Required header that tells the browser how to render the HTML. def getHeader(): return "Content-Type: text/html\n\n" def getClose(): return "</body>\n</html>\n" # Define function to generate HTML form. def generate...
61
24.95
118
12
433
python
[{"finding_id": "codeql_py/sql-injection_330d8a273f09e537_a62292b8", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown...
1
true
[ "CWE-089" ]
[ "py/sql-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This SQL query depends on a [user-provided value](1)." ]
[ 48 ]
[ null ]
[ 17 ]
[ 20 ]
2024-11-19T03:22:24.783253+00:00
1,525,703,372,000
3979590540046098a6ef6dfca2359159c1d0bebd
2
{ "blob_id": "3979590540046098a6ef6dfca2359159c1d0bebd", "branch_name": "refs/heads/master", "committer_date": 1525703372000, "content_id": "a7ff9701d93293b17f8f276a3420567fe8136373", "detected_licenses": [ "Apache-2.0" ], "directory_id": "2498e45f07e75d88beb5db13b7a734191e463aac", "extension": "py"...
2.453125
stackv2
#!/usr/bin/env python3 import os from jinja2 import FileSystemLoader, Environment from tfgen.client import AWSClient class CodeGenerator(object): def __init__(self): dir_path = os.path.dirname(os.path.realpath(__file__)) loader = FileSystemLoader("{}/templates/".format(dir_path)) self.en...
59
32.75
102
18
424
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_087158494ff6c588_b1ecd473", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 13 ]
[ null ]
[ 28 ]
[ 54 ]
2024-11-19T03:44:01.627065+00:00
1,606,403,504,000
edb31375ec00fdaadf426831d2246e1f9d9d720b
3
{ "blob_id": "edb31375ec00fdaadf426831d2246e1f9d9d720b", "branch_name": "refs/heads/main", "committer_date": 1606403504000, "content_id": "dde74149b855f207e81432a068f19269431cb492", "detected_licenses": [ "MIT" ], "directory_id": "bede9845aa4dbf6f381dcfc006496bfbc0591c7c", "extension": "py", "file...
2.765625
stackv2
from flask import Flask from flask import render_template, url_for import pycountry from bs4 import BeautifulSoup import requests from requests.exceptions import HTTPError app = Flask(__name__) #globals are frowned upon run_info = {'host':None} if run_info['host'] == None: run_info['host'] = '127.0.0.1' @app.rou...
56
35.7
133
21
503
python
[{"finding_id": "codeql_py/stack-trace-exposure_861d2c5b36de4baa_86c847bc", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.\n[S...
4
true
[ "CWE-209", "CWE-215", "CWE-295", "CWE-295" ]
[ "py/stack-trace-exposure", "py/flask-debug", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "HIGH", "HIGH", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.\n[Stack trace information](1) flows to this location and may be exposed to an external user.", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This...
[ 40, 56, 35, 33 ]
[ null, null, null, null ]
[ 16, 5, 20, 20 ]
[ 17, 46, 134, 103 ]
2024-11-19T03:44:15.217269+00:00
1,693,241,515,000
ce50bac42a74c5811811c12aab99ec28417ba92a
2
{ "blob_id": "ce50bac42a74c5811811c12aab99ec28417ba92a", "branch_name": "refs/heads/main", "committer_date": 1693241515000, "content_id": "4413549daa50bd8ac5f9626bad45cdd9a3fde030", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "c168fe819b446640957e5e310ef89fcfe28662b3", "extension": "py"...
2.34375
stackv2
import os import time import argparse import math from numpy import finfo import torch from distributed import DistributedDataParallel from torch.utils.data.distributed import DistributedSampler from torch.nn import DataParallel from torch.utils.data import DataLoader from fp16_optimizer import FP16_Optimizer from m...
291
37.93
84
19
2,376
python
[{"finding_id": "codeql_py/overly-permissive-file_ce184df81ce621cc_0f178c9b", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable." ]
[ 72 ]
[ null ]
[ 13 ]
[ 46 ]
2024-11-19T03:44:20.066683+00:00
1,503,280,715,000
adb1a65daf848cb212e7acd60e862356f0575e20
4
{ "blob_id": "adb1a65daf848cb212e7acd60e862356f0575e20", "branch_name": "refs/heads/master", "committer_date": 1503280715000, "content_id": "7ad97dd6415712e70c581548e2689cd88e9ddcc3", "detected_licenses": [ "MIT" ], "directory_id": "9bc6526c32ffa3d645e24b0fa5dc458d2204f133", "extension": "py", "fi...
3.96875
stackv2
# some time operations. import time; # time method gives the number of ticks since 10:00 am, January 1, 1970. (epoch) print(time.time()); # gives the current time in a time tuple. print(time.localtime()); # asctime will give the time in a readable format, so if we provide the current time in time tuple # to the asc...
36
38.28
105
9
375
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d3709f66fe713725_82421619", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 36 ]
[ null ]
[ 29 ]
[ 41 ]
2024-11-19T03:44:23.452402+00:00
1,692,270,674,000
92c00319060a62925c28f077ec92916affb263eb
2
{ "blob_id": "92c00319060a62925c28f077ec92916affb263eb", "branch_name": "refs/heads/master", "committer_date": 1692270674000, "content_id": "a36c31caf7225aa89c2b247f8f461a180525e5b9", "detected_licenses": [ "MIT" ], "directory_id": "96c3c5d015c5338c4b54c78187be9f75ffb1dd8f", "extension": "py", "fi...
2.390625
stackv2
import io import logging import os import re import shutil import tarfile import tempfile from typing import List, Optional, Dict from urllib import request as request import numpy as np from ase import Atoms from ase.io.extxyz import read_xyz from tqdm import tqdm import torch from schnetpack.data import * import sc...
262
36.8
110
19
2,309
python
[{"finding_id": "codeql_py/tarslip_8e5110d1797cbd8a_ca1c47b4", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 224 ]
[ null ]
[ 9 ]
[ 12 ]
2024-11-19T02:08:15.888096+00:00
1,623,418,213,000
dafa2bc88a9869eea7c6d99f0fbe2701c377cd53
3
{ "blob_id": "dafa2bc88a9869eea7c6d99f0fbe2701c377cd53", "branch_name": "refs/heads/master", "committer_date": 1623418213000, "content_id": "13b22f6ee9be388122334620880ea9a36f858b20", "detected_licenses": [ "Apache-2.0" ], "directory_id": "dbd3f562768ded628d5d8d7ee3e05a3e88970a8d", "extension": "py"...
2.5625
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -* import configparser import random import requests import time from bs4 import BeautifulSoup from .fastlist import get_article_ids def login(): config = configparser.ConfigParser() config.read("csdn.conf") u = config.get("east", "username") p = config.get...
76
26.99
113
13
630
python
[{"finding_id": "codeql_py/request-without-cert-validation_af333dddf08e160c_ac3a39eb", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 26 ]
[ null ]
[ 9 ]
[ 45 ]
2024-11-19T03:10:02.588016+00:00
1,623,069,389,000
9579f7c63305ba9d89da72b800c41dd32eb1172a
2
{ "blob_id": "9579f7c63305ba9d89da72b800c41dd32eb1172a", "branch_name": "refs/heads/master", "committer_date": 1623069389000, "content_id": "a9e27f7dd9b3f7623a77fe2a0d86ab0d737176e9", "detected_licenses": [ "MIT" ], "directory_id": "d4af15bfec86981d5a8690423c05aa09910967af", "extension": "py", "fi...
2.5
stackv2
import dill import gherkindb import threading import mundisdbobj import mundiscrypto import mundissession import logging from time import sleep, time from xmlrpc.server import SimpleXMLRPCServer import mundisuser __config__ = '/etc/mundis-server/config.db' __schemas__ = '/etc/mundis-server/schemas.db' __userdb__ = '...
247
28.77
104
17
1,519
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3e24037871197822_a6cd6493", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 141, 145 ]
[ null, null ]
[ 28, 29 ]
[ 36, 37 ]
2024-11-19T03:10:13.737104+00:00
1,588,449,685,000
8a55622000c175efcdf4a1f011bd1e0fdd94b601
3
{ "blob_id": "8a55622000c175efcdf4a1f011bd1e0fdd94b601", "branch_name": "refs/heads/master", "committer_date": 1588449685000, "content_id": "a535d3cc55fd278e52358723fcde0af1429771ba", "detected_licenses": [ "MIT" ], "directory_id": "8ba17add5e3a10e577f99d992fe629c2aa92ed0f", "extension": "py", "fi...
3
stackv2
import sys from GenderSwap import InsertGenderLanguage from pathlib import Path rubricData = [] groupInputData = [] def Run(): ReadFiles() CompileComments() # print(rubricData) # print(groupInputData) def ReadFiles(): """get rubric/group file data""" with open(sys.argv[1]) as rubric: #...
84
29.4
97
22
615
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_ff1ab25541088970_abe68b77", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text." ]
[ 56 ]
[ null ]
[ 26 ]
[ 50 ]
2024-11-19T03:22:35.412916+00:00
1,588,259,799,000
1ae3f7884fc60242118c52657762667ffae43d45
3
{ "blob_id": "1ae3f7884fc60242118c52657762667ffae43d45", "branch_name": "refs/heads/master", "committer_date": 1588259799000, "content_id": "6e3d2c3c7ca0f1e33bb2e39000669d7af0bd209b", "detected_licenses": [ "Apache-2.0" ], "directory_id": "59f0aa0a9705ec2af32b864150ffcfd19e6c2af3", "extension": "py"...
2.703125
stackv2
''' Created on 11 Oct 2017 @author: gavin ''' from .basehandler import TcpHandler import socket import ssl import re import logging logger = logging.getLogger(__name__) class forwardsocket(TcpHandler): NAME = "Foward Socket" DESCRIPTION = '''Handles incoming connections and forwards onto a socket of your ch...
114
44.18
154
26
984
python
[{"finding_id": "codeql_py/insecure-protocol_6d9610255ba38b93_8dc29fab", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol...
1
true
[ "CWE-327" ]
[ "py/insecure-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.SSLContext](1)." ]
[ 46 ]
[ null ]
[ 30 ]
[ 37 ]
2024-11-19T03:22:43.416706+00:00
1,533,342,127,000
e1a8c8de3766850555d55e7ef760858423c0ef2c
3
{ "blob_id": "e1a8c8de3766850555d55e7ef760858423c0ef2c", "branch_name": "refs/heads/master", "committer_date": 1533342127000, "content_id": "eb0d9e9bb10e808118e890c20322a2f8e7d238ae", "detected_licenses": [ "MIT" ], "directory_id": "e478e07962d0285e09c7e92db14a51b7604fe39b", "extension": "py", "fi...
2.78125
stackv2
# Based on Python 3.5.2 | Anaconda 4.1.1 # Print software information print('This is SunSpotTracker. (c) Seungwon Park under the terms of the MIT License') print('Source : https://github.com/seungwonpark/SunSpotTracker') from sys import argv script, bool_plot, bool_raw = argv # Input : whether or not to plot(show) th...
137
33.5
161
31
1,316
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_41962097b5407bdd_0a610f8c", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text." ]
[ 110 ]
[ null ]
[ 40 ]
[ 161 ]
2024-11-19T03:22:58.913921+00:00
1,523,599,030,000
a0a23a8d30dfbc08aca7c05dbbd0ec6daf4f3419
3
{ "blob_id": "a0a23a8d30dfbc08aca7c05dbbd0ec6daf4f3419", "branch_name": "refs/heads/master", "committer_date": 1523599030000, "content_id": "42079620a93149b3ced570b62405b54c6245e9f9", "detected_licenses": [ "Apache-2.0" ], "directory_id": "d7814d14456b2146b43a4a4af7851f150f3dc1a0", "extension": "py"...
2.546875
stackv2
# -*- coding: utf-8 -*- """ Created on Tue Mar 27 20:52:14 2018 @author: Prodipta """ import pandas as pd from BaseHTTPServer import HTTPServer, BaseHTTPRequestHandler import json import logging import configparser from order import OrderWriter from checksum import verify_checksum logger = logging.getLogger(__name__)...
87
32.83
90
19
638
python
[{"finding_id": "codeql_py/log-injection_3adad8d20cf3f9eb_a40f5cec", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 41 ]
[ null ]
[ 25 ]
[ 66 ]
2024-11-19T03:23:06.644882+00:00
1,579,767,537,000
95246fc2a4959e45d000cb68c3870083c717188d
3
{ "blob_id": "95246fc2a4959e45d000cb68c3870083c717188d", "branch_name": "refs/heads/master", "committer_date": 1579767537000, "content_id": "d9805a5d0db67aeafc6bb087a8a0aeef7bf5117b", "detected_licenses": [ "MIT" ], "directory_id": "ecb40ef1779d93b0d7cf55f44dd071091bbcc3b8", "extension": "py", "fi...
2.671875
stackv2
import urllib.request import os import csv import cv2 as cv import random from datetime import datetime, timedelta from sklearn.model_selection import train_test_split class Dataset: face_cascade = cv.CascadeClassifier('../data_loader/haarcascade_frontalface_default.xml') def createFolder(self, directory): ...
308
41.59
144
26
2,948
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_423a9d8f0353d113_6cdf713c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
3
true
[ "CWE-312", "CWE-312", "CWE-022" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/tarslip" ]
[ "HIGH", "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This file extraction depends on a [potentially untrusted source](1)." ]
[ 169, 221, 56 ]
[ null, null, null ]
[ 19, 15, 13 ]
[ 28, 26, 16 ]
2024-11-19T03:43:56.554924+00:00
1,594,865,592,000
26cad14b7228e8c9133073e20c940f4e7bc56c2f
2
{ "blob_id": "26cad14b7228e8c9133073e20c940f4e7bc56c2f", "branch_name": "refs/heads/master", "committer_date": 1594865592000, "content_id": "f4180f019372677ad253273a1f5f9806f4ea91d0", "detected_licenses": [ "MIT" ], "directory_id": "03865c4f703e446257804924e931563a210f5ac5", "extension": "py", "fi...
2.4375
stackv2
from flask import Flask, url_for, render_template, flash, redirect from flask_sqlalchemy import SQLAlchemy import os from search import Stalk from models import db from models import Number from forms import DataForm from sqlalchemy import exc app = Flask(__name__) user_data_dict = {} db.init_app(app) app.config["SE...
64
28.23
86
15
423
python
[{"finding_id": "codeql_py/flask-debug_f62139868c28a56e_a70d19ca", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-022" ]
[ "py/flask-debug", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1)." ]
[ 64, 58 ]
[ null, null ]
[ 5, 15 ]
[ 24, 34 ]
2024-11-19T03:44:02.198838+00:00
1,588,639,360,000
cd409d7fb1cc170db84de96e95e2a3630857a276
2
{ "blob_id": "cd409d7fb1cc170db84de96e95e2a3630857a276", "branch_name": "refs/heads/master", "committer_date": 1588639360000, "content_id": "67adb33a98d3e93ca07c3dffcb104fbfc4f7fb32", "detected_licenses": [ "MIT" ], "directory_id": "87f0d06cba88e9b5d7604558a7ede8d647d73af0", "extension": "py", "fi...
2.328125
stackv2
import datetime as dt import json import requests from collections import defaultdict from fastapi import APIRouter, Query, Path from app import const, utils from app.models.response_models import * from app.routers import helpers router = APIRouter() @router.get( "/cumulative/bar-chart-race", summary="Cum...
317
30.69
88
18
2,354
python
[{"finding_id": "codeql_py/partial-ssrf_6007237e8a6d0c87_d4911b58", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depen...
3
true
[ "CWE-918", "CWE-918", "CWE-918" ]
[ "py/partial-ssrf", "py/partial-ssrf", "py/partial-ssrf" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depends on a [user-provided value](2).", "Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depends on a [user-provided value](2).", "Part of the URL of ...
[ 74, 142, 166 ]
[ null, null, null ]
[ 9, 9, 9 ]
[ 86, 86, 78 ]
2024-11-19T01:35:26.464081+00:00
1,618,849,477,000
c7bc8765c6c8ccf9aa2404bd0817ccbefbd7f55d
3
{ "blob_id": "c7bc8765c6c8ccf9aa2404bd0817ccbefbd7f55d", "branch_name": "refs/heads/master", "committer_date": 1618849477000, "content_id": "5fa70195ca9e2ddef14b98532b1ef3cf806b3b94", "detected_licenses": [ "Apache-2.0" ], "directory_id": "f012b65140ce5541406ca43f9122b72bf07fcb6a", "extension": "py"...
2.8125
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- import nrrd import numpy as np import numpngw as pw import progressbar as pb from os.path import basename, isfile from glob import glob progress = pb.ProgressBar(widgets=[pb.Bar('*', '[', ']'), pb.Percentage(), ' ']) class PatientIO(object): ...
160
37.64
93
17
1,352
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_171ab5b4cfc54427_b9451c4a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 55, 109 ]
[ null, null ]
[ 15, 15 ]
[ 56, 71 ]
2024-11-19T01:55:37.412086+00:00
1,692,020,788,000
f43d7229f20f6f7d0b9ccc9e99353d219445ba6e
3
{ "blob_id": "f43d7229f20f6f7d0b9ccc9e99353d219445ba6e", "branch_name": "refs/heads/main", "committer_date": 1692020788000, "content_id": "ae786dfddb872482c1f6865852bbb2675bbea770", "detected_licenses": [ "Apache-2.0" ], "directory_id": "ad39e1324d2f5fc73ae2e06e7a9a7d1048f58dad", "extension": "py", ...
3
stackv2
""" A simple HTTPS server. """ import argparse import ssl from http.server import HTTPServer, SimpleHTTPRequestHandler if __name__ == '__main__': parser = argparse.ArgumentParser() parser.add_argument("listen_port", help="The port this process will listen on.", t...
25
37.2
85
12
188
python
[{"finding_id": "codeql_py/insecure-protocol_5e7ea76c66957b9f_83586c66", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol...
1
true
[ "CWE-327" ]
[ "py/insecure-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.SSLContext](1)." ]
[ 23 ]
[ null ]
[ 10 ]
[ 21 ]
2024-11-19T01:55:52.152574+00:00
1,586,252,711,000
8b0afe64708871293a9130c54833989bd8291e24
2
{ "blob_id": "8b0afe64708871293a9130c54833989bd8291e24", "branch_name": "refs/heads/master", "committer_date": 1586252711000, "content_id": "eb4dbaae5d1bcf2caabfbfba7da0f4131da50476", "detected_licenses": [ "Apache-2.0" ], "directory_id": "073154a50d70fb3d7d482dbee0bde07d28e985a6", "extension": "py"...
2.453125
stackv2
# -*- coding: utf-8 -*- from os.path import join, dirname, abspath from flask import Flask, redirect, render_template, request import json app = Flask( __name__, static_url_path = '/', static_folder = 'public' ) # App configuration current_dir = dirname(abspath(__file__)) config_dir = join(current_dir, ...
64
20.69
59
12
331
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_51c1aa8fdf4beca0_8331672b", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 52 ]
[ 56 ]
[ 17 ]
[ 10 ]
2024-11-19T02:07:49.418903+00:00
1,590,781,667,000
06ca139e44f3c9eee89cebc832f840fa4a09a1b1
3
{ "blob_id": "06ca139e44f3c9eee89cebc832f840fa4a09a1b1", "branch_name": "refs/heads/master", "committer_date": 1590781667000, "content_id": "df9b7a3a44b11a4bcc2cceb05f596ad95573111e", "detected_licenses": [ "MIT" ], "directory_id": "1dc952db582a671e5174119cee237e39797f04f5", "extension": "py", "fi...
2.921875
stackv2
from bottle import get, post, delete, put, run, template, request from datetime import datetime from SchoolTasks.assignment4.Database import Database # change tis accordingly to your file structure db = Database() # initialise database db.database_main() # start the database usr_input = input("is this for testing...
182
41.53
119
21
1,814
python
[{"finding_id": "codeql_py/reflective-xss_b99aac3ee805fa4b_d9f1cff1", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 121, 149 ]
[ null, null ]
[ 16, 24 ]
[ 82, 101 ]
2024-11-19T02:07:51.973098+00:00
1,529,689,954,000
c9b503d12e2fe1a41df8be260f0d41c7a44b963f
2
{ "blob_id": "c9b503d12e2fe1a41df8be260f0d41c7a44b963f", "branch_name": "refs/heads/master", "committer_date": 1529689954000, "content_id": "96bdaed46a37d240a32218fa1de86f5f88668f63", "detected_licenses": [ "MIT" ], "directory_id": "0b70cccb012b2e84c94eaf4cc0e76f83ca99a7eb", "extension": "py", "fi...
2.421875
stackv2
import json import time import requests import urllib.request, urllib.parse, urllib.error from decimal import * import asyncio import websockets import redis #import logging #logger = logging.getLogger('websockets') #logger.setLevel(logging.DEBUG) #logger.addHandler(logging.StreamHandler()) from Exchange import * ...
459
23.44
120
18
3,111
python
[{"finding_id": "codeql_py/request-without-cert-validation_0f6f650f1cacff1e_748eaf7f", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
3
true
[ "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 276, 278, 280 ]
[ null, null, null ]
[ 16, 16, 16 ]
[ 92, 92, 92 ]
2024-11-19T02:17:13.000640+00:00
1,690,211,404,000
888c132a59508c2bf1ecd813f943dd45b3be78d9
3
{ "blob_id": "888c132a59508c2bf1ecd813f943dd45b3be78d9", "branch_name": "refs/heads/main", "committer_date": 1690211404000, "content_id": "23cd3b9910712bc8ee203a4f190bf7a282046228", "detected_licenses": [ "MIT" ], "directory_id": "8355269f3ba649ec4a16a849ba22e022edee44d9", "extension": "py", "file...
3.21875
stackv2
import getpass import hashlib import requests import sys def ask_for_password(): password = getpass.getpass(prompt = "\n\nPorfavor introduce tu contraseña: \n\n", stream = None) if password == "" or password.isspace(): print("Please type a password!") sys.exit(1) password = hashlib.sha1(pa...
32
30.03
100
15
238
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f9ff7834b19454aa_de29c391", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-327" ]
[ "py/clear-text-logging-sensitive-data", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text.", "[Sensitive data (password)](1) is used ...
[ 29, 12 ]
[ null, null ]
[ 15, 29 ]
[ 82, 53 ]
2024-11-19T02:17:25.883478+00:00
1,526,499,575,000
f5b440f93f442d808bc994524bd252611fc855ec
3
{ "blob_id": "f5b440f93f442d808bc994524bd252611fc855ec", "branch_name": "refs/heads/master", "committer_date": 1526499575000, "content_id": "a4327971625935499ceaffe35a089c6654f93b6b", "detected_licenses": [ "Apache-2.0" ], "directory_id": "db961a80a3b943a1f7fd12b0e7688f688b78a5d0", "extension": "py"...
2.9375
stackv2
import requests as req 'essa é a minha chave de acesso à API' api_key = '1525c1ab' def pega_filme_por_id(film_id): url = "http://www.omdbapi.com/?apikey={}&i={}".format(api_key, film_id) retorno = req.get(url).json() print(url) print(retorno) dadosFilme = { 'film_id': film_id, 'nome':r...
29
23.66
73
10
221
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8519c3bdeee9c993_17198642", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 10, 11 ]
[ null, null ]
[ 9, 9 ]
[ 12, 16 ]
2024-11-19T02:17:27.780384+00:00
1,634,518,877,000
93c7f6c7ae102fcdf54b4f1cf697e7c2527726a1
3
{ "blob_id": "93c7f6c7ae102fcdf54b4f1cf697e7c2527726a1", "branch_name": "refs/heads/main", "committer_date": 1634518877000, "content_id": "9f950f0cce7f257bf40d523fa5d811eb73dc12cc", "detected_licenses": [ "MIT" ], "directory_id": "6ed581f6f382ece018e09cd6401b11efd3d5b242", "extension": "py", "file...
3.09375
stackv2
import numpy as np import pandas as pd from sklearn.neighbors import KNeighborsClassifier from sklearn.model_selection import train_test_split from sklearn.preprocessing import StandardScaler import tkinter as tk class Predictor: def has_disease(self, row): self.train(self) return True if self.pr...
137
47.55
161
15
2,166
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bcd4c882cf56d050_51d68675", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 51 ]
[ null ]
[ 11 ]
[ 14 ]
2024-11-19T02:17:29.017222+00:00
1,606,042,843,000
7b20d84a062d1ea4a980692e35f4b6cffec46486
3
{ "blob_id": "7b20d84a062d1ea4a980692e35f4b6cffec46486", "branch_name": "refs/heads/main", "committer_date": 1606042843000, "content_id": "70b6a3b1e6dd040e33dfaf0eb06c44a83fb71c64", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "649e89992dbb48da4faf599db43881552b5c474d", "extension": "py"...
2.578125
stackv2
import requests import os import json import re from urllib3.exceptions import InsecureRequestWarning requests.packages.urllib3.disable_warnings(category=InsecureRequestWarning) TIMEOUT=3 social_list = { 'instagram.com': '', 'github.com': '', 'facebook.com': '', 'vk.com': '', 'twitter.com': '' } ...
77
26.73
90
14
520
python
[{"finding_id": "codeql_py/request-without-cert-validation_ac8e23d70b5555ee_fe372cd2", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 66 ]
[ null ]
[ 28 ]
[ 76 ]
2024-11-19T02:17:31.304943+00:00
1,633,731,099,000
2e299ac6db98288b25dfbc8305295edcd143456d
2
{ "blob_id": "2e299ac6db98288b25dfbc8305295edcd143456d", "branch_name": "refs/heads/master", "committer_date": 1633731099000, "content_id": "02f156c7bc147631044fe58eb2d8a82b195bb9bd", "detected_licenses": [ "Apache-2.0" ], "directory_id": "5c0493ef3ed08009387eda5eda98c35b9b7c8187", "extension": "py"...
2.421875
stackv2
""" .. module: awseipext.aws_lambda.lambda_function :copyright: (c) 2016 by Lyft Inc. :license: Apache, see LICENSE for more details. """ import logging import boto3 import botocore import kmsauth import os from awseipext.config.lambda_config import LambdaConfig, SECTION from awseipext.request.lambda_request i...
240
30.94
78
16
1,554
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_427c52a9f2bf13a6_e5e85aa5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 128 ]
[ 134 ]
[ 13 ]
[ 14 ]
2024-11-19T02:17:36.923673+00:00
1,606,730,283,000
5b3db9ec85e3557d699958fd809d49b7642df539
3
{ "blob_id": "5b3db9ec85e3557d699958fd809d49b7642df539", "branch_name": "refs/heads/master", "committer_date": 1606730283000, "content_id": "9a3b695200b09e1d4b32a953c4d9a700139551db", "detected_licenses": [ "MIT" ], "directory_id": "b1a8c7e2b696fa34bbc58876f38c180783e905d8", "extension": "py", "fi...
2.59375
stackv2
import re import gdown import matplotlib.pyplot as plt import pandas as pd import numpy as np import seaborn as sns import torch import tarfile from keras.preprocessing.sequence import pad_sequences from sklearn import preprocessing from sklearn.metrics import precision_recall_fscore_support from sklearn.model_selecti...
566
27.06
88
19
3,619
python
[{"finding_id": "codeql_py/tarslip_a9a60459804a5652_a7b29478", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 96 ]
[ null ]
[ 9 ]
[ 11 ]
2024-11-19T02:18:15.908214+00:00
1,425,803,040,000
cc91710eb0e7eb5d7603e5b6907d23cb14ceaedc
3
{ "blob_id": "cc91710eb0e7eb5d7603e5b6907d23cb14ceaedc", "branch_name": "refs/heads/master", "committer_date": 1425803040000, "content_id": "fcb1e1756aaa9742d3239db9a1f52072b43fcd7f", "detected_licenses": [ "Apache-2.0" ], "directory_id": "1acef78ac732bfdcac503f633dde1d719111f4cb", "extension": "py"...
2.59375
stackv2
from flask import request, flash, redirect, url_for from flask.ext.login import login_user, logout_user, login_required, current_user from psbackend import app from psbackend import templateutil from psbackend.models.user import * from psbackend.forms.user import RegisterForm, LoginForm @app.route('/user') @login_req...
61
33.28
81
14
437
python
[{"finding_id": "codeql_py/url-redirection_93b7d94185db7faf_36af08a5", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
3
true
[ "CWE-601", "CWE-601", "CWE-601" ]
[ "py/url-redirection", "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 31, 48, 61 ]
[ null, null, null ]
[ 25, 25, 21 ]
[ 69, 69, 65 ]
2024-11-19T02:18:16.635582+00:00
1,391,505,331,000
73cdb730206865c6dcb85945445c9b7a80174053
2
{ "blob_id": "73cdb730206865c6dcb85945445c9b7a80174053", "branch_name": "refs/heads/master", "committer_date": 1391505331000, "content_id": "d7fe11c853bf84c565b70be2d003755c622bd4e0", "detected_licenses": [ "MIT" ], "directory_id": "3d1da76dfc025ea0814d4c5245d1ea636d5bc657", "extension": "py", "fi...
2.421875
stackv2
from BeautifulSoup import BeautifulSoup import urllib2 import re tripler_URL = "http://www.rrr.org.au/" def get_podcasts(): url = "http://rrrfm.libsyn.com/rss/category/Breakfasters" page = urllib2.urlopen(url, "xml") soup = BeautifulSoup(page.read()) #urls = soup.findAll(type="audio/mpeg") urls...
22
25.82
62
14
150
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_22286374697376bd_c2fc02cd", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'libsyn.com', so it might match more...
1
true
[ "CWE-020" ]
[ "py/incomplete-hostname-regexp" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'libsyn.com', so it might match more hosts than expected." ]
[ 14 ]
[ null ]
[ 42 ]
[ 60 ]
2024-11-19T02:18:17.476242+00:00
1,644,888,421,000
b3d78488a43db8f8fc5204e4715b3dc704ef485f
3
{ "blob_id": "b3d78488a43db8f8fc5204e4715b3dc704ef485f", "branch_name": "refs/heads/master", "committer_date": 1644888421000, "content_id": "0d33322a8579bce2a5f375536cdf0b265eab9d59", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "2d2ffb9f13bb1b6ea6d1241a9ae6d0a2976dc057", "extension": "p...
2.625
stackv2
#!/usr/bin/python import paramiko, sys, os, socket import threading import subprocess attacked_addr = sys.argv[1] username = sys.argv[2] number = sys.argv[3] time = sys.argv[4] basevm_type = sys.argv[5] class myThread (threading.Thread): def __init__(self, threadID, name): threading.Thread.__init__(self) ...
93
32.94
148
17
843
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_ddb92ce7fcf44a92_4dea2429", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 40 ]
[ null ]
[ 5 ]
[ 62 ]
2024-11-19T02:18:19.420686+00:00
1,598,246,795,000
6171c32470bf1fd097072b572fe9581eae06962e
3
{ "blob_id": "6171c32470bf1fd097072b572fe9581eae06962e", "branch_name": "refs/heads/master", "committer_date": 1598246795000, "content_id": "7c9e3196212bd5055d9836c1be665ff673d63720", "detected_licenses": [ "MIT" ], "directory_id": "327b8d8a9dab288ddcbadab16d6c07de6b418929", "extension": "py", "fi...
2.6875
stackv2
import wikipediaapi import networkx as nx from flask import Flask, request, jsonify, make_response from flask_cors import CORS from decouple import config import requests G = nx.Graph() wiki = wikipediaapi.Wikipedia('en') def smaller_graph(pages): links = pages.links for title in sorted(links.keys()): ...
156
28.93
123
16
1,099
python
[{"finding_id": "codeql_py/stack-trace-exposure_be4c27e3b76eb367_22c6a42a", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
6
true
[ "CWE-209", "CWE-209", "CWE-312", "CWE-312", "CWE-918", "CWE-918" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/partial-ssrf", "py/partial-ssrf" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) a...
[ 76, 132, 103, 117, 59, 114 ]
[ null, null, null, null, null, null ]
[ 38, 38, 11, 15, 16, 16 ]
[ 45, 45, 21, 18, 33, 33 ]
2024-11-19T02:29:53.352966+00:00
1,634,714,480,000
0818d10f48626da00b7a82abdf609ea44dacd410
2
{ "blob_id": "0818d10f48626da00b7a82abdf609ea44dacd410", "branch_name": "refs/heads/main", "committer_date": 1634714480000, "content_id": "a88d41170bc51f1e089018ef2f2cd13bc2460bff", "detected_licenses": [ "MIT" ], "directory_id": "0ab23c78a4861ac706a639eb537af8fd56b3aad7", "extension": "py", "file...
2.484375
stackv2
from collections import OrderedDict import json import re import os import glob from typing import TYPE_CHECKING import warnings # References: # https://github.com/jgm/pandoc/blob/master/src/Text/Pandoc/Citeproc/BibTeX.hs # https://github.com/andras-simonyi/citeproc-el/wiki/BibLaTeX-CSL-mapping # https://github.com/br...
249
35.73
123
18
2,066
python
[{"finding_id": "codeql_py/redos_2ce12808af59e9c4_41468d11", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '\\\\DeclareDatamodelEntrytypes{{'...
2
true
[ "CWE-1333", "CWE-1333" ]
[ "py/redos", "py/redos" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '\\\\DeclareDatamodelEntrytypes{{' and containing many repetitions of ' '.", "This part of the regular expression may cause exponential backtracking on strings starting with '\\\\DeclareDatamodelFields{{' and containi...
[ 96, 107 ]
[ null, null ]
[ 59, 57 ]
[ 69, 67 ]
2024-11-19T02:30:09.844891+00:00
1,604,988,019,000
b3a20523edc9011a2952bbbdee7fa3e8faf7a987
4
{ "blob_id": "b3a20523edc9011a2952bbbdee7fa3e8faf7a987", "branch_name": "refs/heads/main", "committer_date": 1604988019000, "content_id": "38e0bee1f91c264ec4ce851d30f8cfbfbf49e6dc", "detected_licenses": [ "MIT" ], "directory_id": "0223a85b6a3fecd453b9bd61368cb51c2978c30f", "extension": "py", "file...
4.03125
stackv2
# Вычисление зар.платы hour_salary = 70 salary = 0 # Начальная зарплата work = int(input("Введите кол-во часов работы: ")) work_day = 8 # Рабочий день if work > 1 and work <= 24: if work > work_day: # Кол-во часов переработки check = work - work_day # Зарплата включающая двойную ставку за ...
20
31.05
69
13
209
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f10ecd8d99a8a6e8_619b4031", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 14, 18 ]
[ null, null ]
[ 15, 15 ]
[ 53, 53 ]
2024-11-19T02:41:43.533356+00:00
1,485,023,246,000
e5c82f173d359a8c1f440d48d983a2773e8e588f
2
{ "blob_id": "e5c82f173d359a8c1f440d48d983a2773e8e588f", "branch_name": "refs/heads/master", "committer_date": 1485023246000, "content_id": "7b40445ee7b615cbfcd3a164cc6a859d91a870f9", "detected_licenses": [ "MIT" ], "directory_id": "b1b915ef4054db81e6f24db14184eb32ba1ce217", "extension": "py", "fi...
2.375
stackv2
from __future__ import print_function import boto3 import base64 import time import paramiko import socket public_ip_address = '35.167.226.22' send_script = False # Connect via ssh print('Connecting via ssh...') ssh = paramiko.SSHClient() ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy()) # keep trying, migh...
47
25.57
83
13
324
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_931805f34832c909_4b5fde69", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 15 ]
[ null ]
[ null ]
[ 58 ]
2024-11-18T18:05:53.952975+00:00
1,569,409,144,000
0eacc1f8532871f12f34a1bac6764b3e0aa49558
3
{ "blob_id": "0eacc1f8532871f12f34a1bac6764b3e0aa49558", "branch_name": "refs/heads/master", "committer_date": 1569409144000, "content_id": "b71214afca96b9dd7c2f90062a9a22fca1b968dd", "detected_licenses": [ "MIT" ], "directory_id": "48fee88f737847de15a4a90be6e261d9576074ad", "extension": "py", "fi...
2.59375
stackv2
#!/usr/bin/env python import eventlet eventlet.monkey_patch() import json import requests from flask import Flask, render_template, session, request, \ copy_current_request_context from flask_socketio import SocketIO, emit, join_room, leave_room, \ close_room, rooms, disconnect # Set this variable to "threadi...
79
30.1
110
14
593
python
[{"finding_id": "codeql_py/reflective-xss_580d40254e16b15f_4bc6d46f", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 32 ]
[ 35 ]
[ 12 ]
[ 6 ]
2024-11-18T18:05:57.584886+00:00
1,565,535,093,000
d8f0222b3e77ed3bd19c2defe0afd14b037a789d
3
{ "blob_id": "d8f0222b3e77ed3bd19c2defe0afd14b037a789d", "branch_name": "refs/heads/master", "committer_date": 1565535093000, "content_id": "4d996be29d9b87a47d2b810f41af452883db738c", "detected_licenses": [ "MIT" ], "directory_id": "e842d039ed84700155764c5abc5ab8c6d991efac", "extension": "py", "fi...
2.71875
stackv2
# -*- coding: utf-8 -*- """ Author: Sparrow Purpose: Crawl the single post of content from Instagram application Created: 2017-08-06 """ import re import urllib.request import os import traceback from urllib.parse import quote from bs4 import BeautifulSoup import sys import ssl import requests Video = 'GraphVid...
318
29.34
174
18
2,385
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_6bcb5a33469b445c_9395ff61", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This string, which is used as a regular expression [here](1), has an unescaped '.' befor...
1
true
[ "CWE-020" ]
[ "py/incomplete-hostname-regexp" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This string, which is used as a regular expression [here](1), has an unescaped '.' before 'instagram.com/p/', so it might match more hosts than expected." ]
[ 305 ]
[ null ]
[ 18 ]
[ 49 ]
2024-11-18T18:15:56.372102+00:00
1,426,775,145,000
ff3a9359cd69886337759deb0f999008697fe2bb
2
{ "blob_id": "ff3a9359cd69886337759deb0f999008697fe2bb", "branch_name": "refs/heads/master", "committer_date": 1426775145000, "content_id": "5fa7dd66e88d1b5aba611a2ef257a751097e5063", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "1854ff0adc08f2ecd9ed6facff88468f2d6bf08d", "extension": "p...
2.4375
stackv2
import cv2 import numpy as np import json import os from flask.ext.cors import CORS, cross_origin from flask import Flask, request app = Flask(__name__) cors = CORS(app) @app.route("/imageSearch",methods=["POST"]) def imageSearch(): filename = request.form.get("filename","") typeof = request.form.get("type","") if ...
175
26.77
119
15
1,434
python
[{"finding_id": "codeql_py/flask-debug_e0ceb6d8d7e5873c_2113032c", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-079", "CWE-022" ]
[ "py/flask-debug", "py/reflective-xss", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 175, 18, 23 ]
[ null, null, null ]
[ 5, 9, 12 ]
[ 44, 15, 20 ]
2024-11-18T18:15:56.428362+00:00
1,489,679,255,000
b2cb9be6d8bb555fde22ae1c814fc5d7cf4cfab7
2
{ "blob_id": "b2cb9be6d8bb555fde22ae1c814fc5d7cf4cfab7", "branch_name": "refs/heads/master", "committer_date": 1489679255000, "content_id": "762e88c7e1be2dad425bf56209b932bfc256d97b", "detected_licenses": [ "MIT" ], "directory_id": "75f7659e23baab403fc00b7ced208653442b94b6", "extension": "py", "fi...
2.328125
stackv2
from flask import Blueprint, render_template, flash, request, redirect, url_for, abort from flask_login import login_user, logout_user, login_required, current_user from datetime import datetime import json from app.forms import LoginForm, RegisterUserForm, EditUserForm, SearchForm from app.models import User, Course...
135
36.66
96
20
1,020
python
[{"finding_id": "codeql_py/url-redirection_9dd3ce8b41154f21_fb1bba4e", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
2
true
[ "CWE-601", "CWE-601" ]
[ "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 97, 117 ]
[ null, null ]
[ 25, 25 ]
[ 69, 69 ]
2024-11-18T18:16:10.535585+00:00
1,649,080,391,000
17056e6234aaaf6d9978bd14ec447ba833980a14
2
{ "blob_id": "17056e6234aaaf6d9978bd14ec447ba833980a14", "branch_name": "refs/heads/master", "committer_date": 1649080391000, "content_id": "317c907a0368bbe7ea7622ebee2c47c26e517baa", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "71200fe39fe9415c8498b1e99b05fb704c78c5af", "extension": "p...
2.5
stackv2
# -*- coding: utf-8 -*- # Originally written by Kevin Breen (@KevTheHermit): # https://github.com/kevthehermit/RATDecoders/blob/master/AdWind.py import string from zipfile import ZipFile from io import BytesIO from Crypto.Cipher import ARC4, DES import xml.etree.ElementTree as ET def sortConfig(old_config): if o...
75
38.09
86
20
708
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_713f7f2a40d42c13_847b1a1d", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.\n[The cryptograph...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.\n[The cryptographic algorithm DES](2) is broken or weak, and should not be used.", "[The cryptographic algorithm ARC4](1) is broken or weak, and should not be used." ]
[ 45, 50 ]
[ null, null ]
[ 12, 12 ]
[ 32, 32 ]
2024-11-18T18:16:13.054233+00:00
1,622,492,335,000
e47ce47a830bb4d2ef4346ec95b57d81b317afc9
3
{ "blob_id": "e47ce47a830bb4d2ef4346ec95b57d81b317afc9", "branch_name": "refs/heads/master", "committer_date": 1622492335000, "content_id": "3db0bec8fbd7e7857d198b5f927ca3f8175615e3", "detected_licenses": [ "MIT" ], "directory_id": "104bfb4cda37167e9ebef6b3d0a498b1176e0042", "extension": "py", "fi...
2.796875
stackv2
"""Deal with OpenAPI v3.""" import json import re from jinja2 import Environment, FileSystemLoader class OpenAPI: # pylint: disable=too-few-public-methods """Create OpenAPI skeleton.""" def __init__(self, napp_path, tpl_path): """Instantiate an OpenAPI object. Args: napp_path (...
167
34.29
78
17
1,312
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_6b3b4d2e5e65c2e7_0b263f24", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 161 ]
[ 163 ]
[ 19 ]
[ 30 ]
2024-11-18T18:59:35.288838+00:00
1,391,155,399,000
9885da54d38f531a8db6a2b212a045de3aee4563
3
{ "blob_id": "9885da54d38f531a8db6a2b212a045de3aee4563", "branch_name": "refs/heads/master", "committer_date": 1391155399000, "content_id": "fcc5e23456c183dc99153e9ee5a0ef775da4e61c", "detected_licenses": [ "MIT" ], "directory_id": "9448edd9a529bf6ec52a8516ecf018dc5f05a2f3", "extension": "py", "fi...
2.515625
stackv2
import argparse import logging from os import path from bs4 import BeautifulSoup from cliff.command import Command from jinja2 import Environment, PackageLoader from .core import Qualtrics def surveyname2tablename(surveyname): return surveyname.replace(' ', '').replace('-', '_') class Document(Command): "...
78
30.19
86
17
497
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_a90373738ad677a6_c642063c", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 29 ]
[ null ]
[ 15 ]
[ 62 ]
2024-11-18T18:59:41.655417+00:00
1,692,750,526,000
56166b60f14a651416321f90977c9e76421d989d
2
{ "blob_id": "56166b60f14a651416321f90977c9e76421d989d", "branch_name": "refs/heads/main", "committer_date": 1692750526000, "content_id": "8e27da0428f275d1c273a8cafd23c1abbac969af", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "488f1cf914d76f75a3e28130780e0de368b34a87", "extension": "py"...
2.359375
stackv2
# coding: utf-8 # Copyright (c) Jan Janssen import getpass import importlib import os import re import pandas from jinja2 import Template from jinja2.exceptions import TemplateSyntaxError from pysqa.utils.execute import execute_command from pysqa.utils.queues import Queues class BasisQueueAdapter(object): """ ...
596
28.89
118
25
3,765
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_79e17fda426187ce_f6189293", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 490 ]
[ null ]
[ 50 ]
[ 68 ]
2024-11-18T19:11:50.796873+00:00
1,576,435,849,000
c19fe990bfe489f5f71206c310ecc6f9b5f617ee
3
{ "blob_id": "c19fe990bfe489f5f71206c310ecc6f9b5f617ee", "branch_name": "refs/heads/master", "committer_date": 1576435849000, "content_id": "7230901abba69c4e1d0238921eb85196e6035551", "detected_licenses": [ "MIT" ], "directory_id": "eb70fbe86d605a15540a1976225f0e98b129b507", "extension": "py", "fi...
2.703125
stackv2
import time from selenium import webdriver import json import requests import shutil import os # configure path of webdriver # ---------------------------------------------------- path = "/home/leoam/Downloads/chromedriver" # ---------------------------------------------------- imagesJson = {} count = 21 pageCount = 0...
126
27.78
123
17
882
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_004a5d2604c7b145_490fcf8e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 54, 92 ]
[ null, null ]
[ 11, 23 ]
[ 36, 26 ]
2024-11-18T19:11:53.896165+00:00
1,417,707,480,000
893696db8676fd0d0b6461c1caa329bfa121446d
3
{ "blob_id": "893696db8676fd0d0b6461c1caa329bfa121446d", "branch_name": "refs/heads/master", "committer_date": 1417707480000, "content_id": "6fc25ad9130c1deffd47bf3a6a405d9e0537b6ca", "detected_licenses": [ "MIT" ], "directory_id": "67495dc3be95127eeda8652c89d8a9e89ed97420", "extension": "py", "fi...
2.734375
stackv2
from flask import Flask from flask import request import os, sys import boto.sqs import boto.sqs.queue from boto.sqs.message import Message from boto.sqs.connection import SQSConnection from boto.exception import SQSError app = Flask(__name__) app.debug = True #curl examples are shown with te hash comment, above func...
240
28.95
155
15
2,348
python
[{"finding_id": "codeql_py/flask-debug_18531d45303dedfb_3f31070f", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
4
true
[ "CWE-215", "CWE-079", "CWE-079", "CWE-022" ]
[ "py/flask-debug", "py/reflective-xss", "py/reflective-xss", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "This path depends on a [user-provided value]...
[ 240, 36, 44, 54 ]
[ null, null, null, null ]
[ 2, 9, 9, 10 ]
[ 37, 31, 28, 33 ]
2024-11-18T19:23:48.826997+00:00
1,579,403,706,000
1c73ba1906aad1e2e3f7895f58238b93a8441ff3
2
{ "blob_id": "1c73ba1906aad1e2e3f7895f58238b93a8441ff3", "branch_name": "refs/heads/master", "committer_date": 1579403706000, "content_id": "13e130d44892fd66018ec6ff6e165b628b860ed7", "detected_licenses": [ "MIT" ], "directory_id": "c1cb1a52e127b8531bcf6ef029994ae4c6a7d9f6", "extension": "py", "fi...
2.40625
stackv2
import logging import json from requests import request, Session from schluter.thermostat import Thermostat API_BASE_URL = "https://ditra-heat-e-wifi.schluter.com" API_AUTH_URL = API_BASE_URL + "/api/authenticate/user" API_GET_THERMOSTATS_URL = API_BASE_URL + "/api/thermostats" API_SET_TEMPERATURE_URL = API_BASE_URL ...
69
34.52
101
15
558
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_06f2ed51f0f1ac77_325f80fb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 60 ]
[ null ]
[ 58 ]
[ 65 ]
2024-11-18T19:23:54.542735+00:00
1,575,004,054,000
9285c8aa6ffb2fef0d0bd26c995d5b4e72970b56
2
{ "blob_id": "9285c8aa6ffb2fef0d0bd26c995d5b4e72970b56", "branch_name": "refs/heads/master", "committer_date": 1575004054000, "content_id": "86ee76ad8172e4a37011719df78c9ac827b91958", "detected_licenses": [ "MIT" ], "directory_id": "163a92c2156afe7bc1c4011f100f01f470bde739", "extension": "py", "fi...
2.4375
stackv2
import collections import re import requests import base64 from hyper.contrib import HTTP20Adapter from requests_toolbelt import MultipartEncoder class File_download_module(): def __init__(self, busy_username, busy_password, busy_ip='127.0.0.1', busy_port='8080', file_folder='./'): """ :param bu...
198
39.19
118
17
1,953
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_dbf38f88e90ec7db_75a168dd", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 187, 191 ]
[ null, null ]
[ 11, 11 ]
[ 26, 34 ]
2024-11-18T19:23:56.047319+00:00
1,415,345,910,000
6437c5ca7b462cbc45622fd02e6ddef88245ff17
2
{ "blob_id": "6437c5ca7b462cbc45622fd02e6ddef88245ff17", "branch_name": "refs/heads/master", "committer_date": 1415345910000, "content_id": "2c7df728fbdd7c866e0a0983fe5d1d511e30f707", "detected_licenses": [ "MIT" ], "directory_id": "0c149a209ced3b331eb0b0f4fb07cac50f63d139", "extension": "py", "fi...
2.421875
stackv2
# TODO # - write code to perform useful queries with business rules # - wrapper to update the data and report # - cron somewhere def _get_data(c, customer_id, p, password, a, account_id, e, email): import sofine.runner as runner import psycopg2 # sofine pipeline to collect the data data = {} ...
88
32.31
101
16
733
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c3d9a11a8fae37f8_fad9f2b4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 39 ]
[ null ]
[ 15 ]
[ 75 ]
2024-11-18T19:24:03.261143+00:00
1,635,000,840,000
38131e74807a012716500b29704334d21782b395
3
{ "blob_id": "38131e74807a012716500b29704334d21782b395", "branch_name": "refs/heads/main", "committer_date": 1635000840000, "content_id": "699aeded45e7572350632693495b216a24a96dcd", "detected_licenses": [ "MIT" ], "directory_id": "7f46ad4b122959b6961dd5f2a85c6bf2e660c0f3", "extension": "py", "file...
2.65625
stackv2
# Unique UBX sentences import ubx.Sensors from ubx.relposned import nav_relposned from ubx.posllh import nav_posllh from ubx.secuniqid import sec_uniqid # Dictionaries of static data import ubx.ClassID as ubc import ubx.MessageID as ubm # List of sensor serial numbers and allocations from ubx.Sensors import UBLOX c...
86
43.27
132
25
881
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2b6bff0366aaefc3_04d78341", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 64 ]
[ null ]
[ 35 ]
[ 132 ]
2024-11-18T19:58:19.095111+00:00
1,585,775,802,000
aca3032f9efd2210ed90c85aea426bcc6b110f5e
2
{ "blob_id": "aca3032f9efd2210ed90c85aea426bcc6b110f5e", "branch_name": "refs/heads/master", "committer_date": 1585775802000, "content_id": "e78804cf11d9bc9bf8e31803a66a14327b9521d2", "detected_licenses": [ "Apache-2.0" ], "directory_id": "b3690d3948bf5064c0a8cc3f8a97fbf506c40ad6", "extension": "py"...
2.375
stackv2
from __future__ import print_function import urllib import requests PROTOCOL = 'http' SERVER = 'localhost:8000' FINAUTAPI = "{}://{}/finautapi/v1/".format(PROTOCOL, SERVER) CLIENT_ID = 'xsojCstayZtM1VFx2zZd3Nq8JdsNXhP091A2GTKe' CLIENT_SECRET = 'nRo351z8wiTWbDSscXCdfItEBiSEZunkyjQ5Q6AotA5pl2Zqv6ggoQNtIlot9yZItT7gzD2Bx...
136
24.72
146
15
933
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_68fd98ce43316c2e_da7348aa", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 124 ]
[ null ]
[ 11 ]
[ 35 ]
2024-11-18T19:58:23.050582+00:00
1,588,181,147,000
bf100cf4d2c2417a3d1d98667f6b641a829b0ed8
2
{ "blob_id": "bf100cf4d2c2417a3d1d98667f6b641a829b0ed8", "branch_name": "refs/heads/master", "committer_date": 1588181147000, "content_id": "ae245a04b5a4d6f1cfe5c3afe05d633fb54c4f81", "detected_licenses": [ "MIT-0" ], "directory_id": "1217bec1017a0586fce4fcfbc84fccaa1b2c065f", "extension": "py", "...
2.375
stackv2
''' Copyright 2020 Amazon.com, Inc. or its affiliates. All Rights Reserved. SPDX-License-Identifier: MIT-0 Disclaimer: The code here is based off of an unsupported API from Chamberlain and is subject to change without notice. The authors claim no responsibility for damages to yo...
178
42.61
107
16
1,429
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7e1e6f737dc0fb06_f135c679", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 38 ]
[ null ]
[ 19 ]
[ 44 ]
2024-11-18T19:58:40.227050+00:00
1,594,543,965,000
671608c1387239fc178fadb4684ee61efd380485
3
{ "blob_id": "671608c1387239fc178fadb4684ee61efd380485", "branch_name": "refs/heads/master", "committer_date": 1594543965000, "content_id": "00edcb0137fcab9abc8f3e79bb3ddecdefd1ea7e", "detected_licenses": [ "MIT" ], "directory_id": "8f4664838f4b70ea9cd1a783779553ae0fac3c9a", "extension": "py", "fi...
2.515625
stackv2
from flask import Flask, request, jsonify, render_template from flask_cors import CORS import postgresql_api app = Flask(__name__) app.config['JSON_AS_ASCII'] = False CORS(app) @app.route('/') def root(): return "yai_pond GOT7" @app.route('/std_list') def std_list(): student_list = postgresql_api.get_studen...
38
22.76
67
12
237
python
[{"finding_id": "codeql_py/flask-debug_a83234bf497aec96_1df6ef2c", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 38, 23 ]
[ null, null ]
[ 5, 12 ]
[ 53, 30 ]
2024-11-18T18:39:28.493438+00:00
1,416,397,801,000
035bf6b221226e2079aca460c3627b431d24a423
3
{ "blob_id": "035bf6b221226e2079aca460c3627b431d24a423", "branch_name": "refs/heads/master", "committer_date": 1416397801000, "content_id": "0a31489c14e822176737c5cf3211c1c554d8ecbf", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "4407d8b87f6830cd10fee497e5738e5ea39dbfeb", "extension": "p...
2.734375
stackv2
# -*- coding: utf-8 -*- import datetime, time import logging, threading from jinja2 import Template import os class output: def __init__(self, devices, mapping): self.running = True self.log_path = mapping['log_path'] self.f_name = self.generate_filename() self.f = open(self.f_name, 'a+', 1) sel...
56
26.25
83
18
381
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_1891e85dd520cb77_ab73d08c", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 42 ]
[ null ]
[ 13 ]
[ 43 ]
2024-11-18T18:39:38.213519+00:00
1,573,203,419,000
9b4b875d0d2f9c67028a631360188dda238706c7
2
{ "blob_id": "9b4b875d0d2f9c67028a631360188dda238706c7", "branch_name": "refs/heads/master", "committer_date": 1573203419000, "content_id": "32ab508ae5d299691a597e5a74e8d573f2941dc4", "detected_licenses": [ "MIT" ], "directory_id": "db4d1c37d1d4d942d89455e407a57cecb273ef8f", "extension": "py", "fi...
2.375
stackv2
from flask import jsonify, abort from flask_restful import Resource, reqparse import logging from pgapi.systemCommands import * class System(Resource): def get(self, section=None): """Return global system information. Example: GET /system It's possible to specify what specific set...
27
27.89
84
11
156
python
[{"finding_id": "codeql_py/log-injection_e2262bb7bfeb4e2c_87b86424", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 19 ]
[ null ]
[ 76 ]
[ 83 ]
2024-11-18T18:39:38.366787+00:00
1,652,994,812,000
d4af47ab9a706b6c58c0d700b493f1a9caa73939
3
{ "blob_id": "d4af47ab9a706b6c58c0d700b493f1a9caa73939", "branch_name": "refs/heads/master", "committer_date": 1652994849000, "content_id": "fd5118e68b8430eda95cadde2f803ac5868801eb", "detected_licenses": [ "MIT" ], "directory_id": "9180f87a6b8e34f227df70da663b88444b08d16c", "extension": "py", "fi...
2.671875
stackv2
# Copyright 2022 Kaiyu Zheng # # Usage of this file is licensed under the MIT License. # Reproduce the run_*.sh scripts # by reorganizing the commands in existing scripts # into new scripts (with shuffle or not) and the # user can specify how many run_*.sh scripts to produce # and a suffix after "run_". import argpa...
60
38.45
127
17
510
python
[{"finding_id": "codeql_py/overly-permissive-file_d0af6dc508234c54_641a2977", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable." ]
[ 56 ]
[ null ]
[ 9 ]
[ 45 ]
2024-11-18T18:40:06.738095+00:00
1,616,256,192,000
82a5b3268be090c12c5d602284b5cb9eedfea846
3
{ "blob_id": "82a5b3268be090c12c5d602284b5cb9eedfea846", "branch_name": "refs/heads/master", "committer_date": 1616256192000, "content_id": "2c637182684706bc005b3f01dd287f5bac0c78ad", "detected_licenses": [ "MIT" ], "directory_id": "b8fcc414c2a888a15c44b4bc64fca1b61f6e3677", "extension": "py", "fi...
2.5625
stackv2
# Copyright (c) 2013-2016 Molly White # # Permission is hereby granted, free of charge, to any person obtaining a copy of this software # and associated documentation files (the "Software"), to deal in the Software without # restriction, including without limitation the rights to use, copy, modify, merge, publish, # di...
253
43.62
104
23
2,847
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_c6b1a6cecd550793_61c9ca4c", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [youtube.com](1) may be at an arbitrary position in the...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "The string [youtube.com](1) may be at an arbitrary position in the sanitized URL.", "The string [reddit.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 62, 64 ]
[ null, null ]
[ 12, 14 ]
[ 32, 33 ]
2024-11-18T18:47:03.348424+00:00
1,624,808,180,000
491512349a3b574a8210be5370b77b74c9c0f64f
2
{ "blob_id": "491512349a3b574a8210be5370b77b74c9c0f64f", "branch_name": "refs/heads/main", "committer_date": 1624808180000, "content_id": "065c8662fb08b9170a24f4a25a1fdab74a9ccef7", "detected_licenses": [ "MIT" ], "directory_id": "f4e82f24b6a9f2069a859f25bc05eaf82b563e4f", "extension": "py", "file...
2.34375
stackv2
""" Generate PDFs from chordpro files Rename PDF songs for latex imports """ import os import subprocess import shutil import re import logging import jinja2 import io logger = logging.getLogger(__name__) try: import cPickle as pickle #noqa except: import pickle key_info_list = [ # https://www.piano-keyboard-...
220
46.63
144
24
2,162
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_6914f2ea8f629d0b_a242abe7", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 136 ]
[ 138 ]
[ 15 ]
[ 10 ]