added
stringlengths
32
32
created
int64
1,244B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.25
source
stringclasses
1 value
text
stringlengths
324
20.1k
num_lines
int64
16
598
avg_line_length
float64
15.1
58.3
max_line_length
int64
33
179
ast_depth
int64
8
39
length
int64
101
3.8k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.1k
265k
sast_codeql_findings_count
int64
1
45
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
45
rule_ids
listlengths
1
45
confidences
listlengths
1
45
severities
listlengths
1
45
messages
listlengths
1
45
line_starts
listlengths
1
45
line_ends
listlengths
1
45
column_starts
listlengths
1
45
column_ends
listlengths
1
45
2024-11-18T23:48:05.565077+00:00
1,693,248,254,000
21e4b9d3e3e18e25dcd5897b529ff3c1de209ee5
3
{ "blob_id": "21e4b9d3e3e18e25dcd5897b529ff3c1de209ee5", "branch_name": "refs/heads/master", "committer_date": 1693248254000, "content_id": "697b1e7f598a52389950d5d276757942bbd537c5", "detected_licenses": [ "CC0-1.0" ], "directory_id": "f3771fad41d24b8ec23d3f294f7e9603b1072a19", "extension": "py", ...
2.734375
stackv2
import time import xml.etree.ElementTree as ET import urllib.request import urllib.error import requests from bs4 import BeautifulSoup from config import GOODREADS_PUBLIC_API_KEY, GOOGLE_SEARCH_RAPIDAPI_HOST, GOOGLE_SEARCH_RAPIDAPI_KEY, GOOGLE_BOOK_API_KEY from googlesearch import search def get_details(book_object...
107
35.01
143
20
831
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_94695bbc145b7855_7f2e6f5c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 18 ]
[ null ]
[ 11 ]
[ 14 ]
2024-11-18T23:48:10.498016+00:00
1,626,098,056,000
faaf0a081618cb2a86e260506c17bab82f3853ac
3
{ "blob_id": "faaf0a081618cb2a86e260506c17bab82f3853ac", "branch_name": "refs/heads/main", "committer_date": 1626098056000, "content_id": "b92213c694b27641f401eba020cc2976b704d36c", "detected_licenses": [ "MIT" ], "directory_id": "364359b295af2831c0c80e66adc01b78166a2a1e", "extension": "py", "file...
2.6875
stackv2
from transformers import AutoModelWithLMHead, AutoTokenizer, top_k_top_p_filtering import torch from flask import Flask, request, Response, jsonify from torch.nn import functional as F from queue import Queue, Empty import time import threading # Server & Handling Setting app = Flask(__name__) requests_queue = Queue(...
141
28.99
121
20
966
python
[{"finding_id": "codeql_py/reflective-xss_3b53d1fd199cf03d_7164e516", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability d...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 130 ]
[ null ]
[ 12 ]
[ 25 ]
2024-11-18T23:48:13.040895+00:00
1,608,738,265,000
14b100846a940d03bc9ba8092a27f852e9b4a540
4
{ "blob_id": "14b100846a940d03bc9ba8092a27f852e9b4a540", "branch_name": "refs/heads/master", "committer_date": 1608738265000, "content_id": "75d6b47bf142594ae82e0c5bfbb42ee974359a31", "detected_licenses": [ "MIT" ], "directory_id": "f923ca6d49a7f4a8816e5988879f672b06d06154", "extension": "py", "fi...
4.09375
stackv2
# Python Object Oriented Programming class Employee: def __init__(self, FirstName, LastName, salary): self.FirstName = FirstName self.LastName = LastName self.salary = salary self.email = FirstName + "." + LastName + "@company.com" def FullName(self): return "{} {}".fo...
24
25.25
64
12
150
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ef5cd8ba32b781e3_6bdd2178", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 20 ]
[ null ]
[ 7 ]
[ 35 ]
2024-11-18T23:48:20.633853+00:00
1,655,866,467,000
6a619e52d84144b915531ced4dc4ceb2020e23b5
2
{ "blob_id": "6a619e52d84144b915531ced4dc4ceb2020e23b5", "branch_name": "refs/heads/master", "committer_date": 1655866467000, "content_id": "2df154e97e77446fb37aba8b165a7df3771dbc8e", "detected_licenses": [ "MIT" ], "directory_id": "9047326c551085d9a229e8fa506f111075f3add6", "extension": "py", "fi...
2.484375
stackv2
from flask import Flask, render_template, request, url_for, redirect from flask_uploads import UploadSet, configure_uploads, IMAGES, DATA, ALL from werkzeug import secure_filename import pandas as pd import pygal import io import os app = Flask(__name__) # Configuraรงรตes para o Upload de Arquivos files = UploadSet('...
91
31.31
76
17
755
python
[{"finding_id": "codeql_py/flask-debug_33c31eb750650e2e_6da2b82c", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-601", "CWE-601" ]
[ "py/flask-debug", "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 91, 38, 41 ]
[ null, null, null ]
[ 5, 29, 29 ]
[ 24, 40, 40 ]
2024-11-19T00:44:08.817591+00:00
1,560,247,046,000
5ac17a1f21ec40fdbf31054f8095336357d738de
3
{ "blob_id": "5ac17a1f21ec40fdbf31054f8095336357d738de", "branch_name": "refs/heads/master", "committer_date": 1560247046000, "content_id": "8bdbcf2348d1a9b94712310589e0684cf9ac6502", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "453f0336b46646ba1c5dd01ee8554727bdd2994b", "extension": "p...
3.1875
stackv2
"""Jinja Simple CLI Main Module In this module we find all the functions needed to operate this package. It is important to remark that this package, doesn't improves on jinja's functionality, it just allows you to call for template "filling" using jinja as it's backbone from the command line. """ import argparse i...
91
30
92
16
635
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_cb6f1e7901d71223_7b170818", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 36 ]
[ 40 ]
[ 11 ]
[ 6 ]
2024-11-19T00:44:12.797187+00:00
1,580,258,495,000
733742a679ec1c2a58a44c5e60a17c8f959cccac
3
{ "blob_id": "733742a679ec1c2a58a44c5e60a17c8f959cccac", "branch_name": "refs/heads/master", "committer_date": 1580258495000, "content_id": "d2895517b0fb5221a10977bc619faab197984301", "detected_licenses": [ "MIT" ], "directory_id": "d0e586cb379ea0c070a66d0173b8156037b9a53f", "extension": "py", "fi...
2.765625
stackv2
#!/usr/bin/env python3 from json import loads, dumps from sys import exit, argv import requests if len(argv) < 3: print('Arguments: <rpc_username> <rpc_password> [<rpc_port>]') exit(1) ### START FROM ELECTRUM def bits_to_target(bits): bitsN = (bits >> 24) & 0xff if not (0x03 <= bitsN <= 0x1e): ...
143
30.57
134
15
1,280
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_bfbb6381c6128eac_9b3763f0", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 143 ]
[ null ]
[ 13 ]
[ 64 ]
2024-11-19T00:44:13.160057+00:00
1,624,371,415,000
54faade79fdcca3c4ceccb41f6fca27d95c953b5
3
{ "blob_id": "54faade79fdcca3c4ceccb41f6fca27d95c953b5", "branch_name": "refs/heads/master", "committer_date": 1624371415000, "content_id": "2de7870b8ddd1417f8dfbf9bf54c5ade7e4b74aa", "detected_licenses": [ "MIT" ], "directory_id": "9ddc60141027d5106952c00bb6e0c494c9abac2d", "extension": "py", "fi...
2.609375
stackv2
from app import app from flask import render_template, flash, redirect, url_for, request from flask_login import current_user, login_user, logout_user from app.models.acl import User from app.view_models.acl import LoginForm from werkzeug.urls import url_parse import click import getpass import os @app.route('/login'...
41
38.41
100
15
349
python
[{"finding_id": "codeql_py/url-redirection_44718734c64e842f_dfa7a87f", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
2
true
[ "CWE-601", "CWE-601" ]
[ "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 18, 28 ]
[ null, null ]
[ 25, 25 ]
[ 37, 37 ]
2024-11-19T00:44:19.661583+00:00
1,631,780,342,000
2a7dc1e596b3decd4cf8a0e0367f1aba0ea5c55d
3
{ "blob_id": "2a7dc1e596b3decd4cf8a0e0367f1aba0ea5c55d", "branch_name": "refs/heads/master", "committer_date": 1631780342000, "content_id": "8c452336d223fcdfa60bfbde29cf460344822c12", "detected_licenses": [ "MIT" ], "directory_id": "35f60a0120d262538be00600344b97642e200acb", "extension": "py", "fi...
3.328125
stackv2
from user import User from credentials import Credentials import random import string user_data =None credentials_data = None def signup(user_name, password, email, p_number): user_data = User(user_name, password, email, p_number) return user_data def main(): print("Hello, Welcome to your password locker....
107
29.85
149
21
629
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7a5dbda8058543e9_ea93ca0c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 49 ]
[ null ]
[ 19 ]
[ 118 ]
2024-11-18T23:05:31.823616+00:00
1,595,341,793,000
9d1f24812a3a737dcb2743a6c3dbc2beb8c1f8c7
2
{ "blob_id": "9d1f24812a3a737dcb2743a6c3dbc2beb8c1f8c7", "branch_name": "refs/heads/master", "committer_date": 1595341793000, "content_id": "16cecc24193df859cd034a859e12f55e1c2a486c", "detected_licenses": [ "MIT" ], "directory_id": "54a39539735f1109709d750476d1fdca2818bafa", "extension": "py", "fi...
2.421875
stackv2
from config import DNAC_FQDN, \ DNAC_PORT, \ DNAC_USER, \ DNAC_PASSWORD, \ SCOPE import requests import sys import json from requests.auth import HTTPBasicAuth def get_token(): requests.packages.urllib3.disable_warnings() logi...
115
29.23
101
14
926
python
[{"finding_id": "codeql_py/request-without-cert-validation_d3db07cb098738fa_3388b169", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
3
true
[ "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 14, 31, 88 ]
[ null, null, null ]
[ 14, 20, 20 ]
[ 102, 68, 91 ]
2024-11-18T23:05:46.473545+00:00
1,558,429,347,000
7b060bf8cc3735c3172ea2602ce629e4072e0acc
2
{ "blob_id": "7b060bf8cc3735c3172ea2602ce629e4072e0acc", "branch_name": "refs/heads/master", "committer_date": 1558429347000, "content_id": "ecd37552d9f05b2a8126cefb8c4fd26063c202fe", "detected_licenses": [ "Apache-2.0" ], "directory_id": "0bb54e33bdc14b0656632718f3f06172734d47f2", "extension": "py"...
2.34375
stackv2
# -*- coding: utf-8 -*- """ Created on 2018/5/25 @author: xing yan """ from flask import render_template, redirect, flash, request, url_for from flask_login import login_user, logout_user, login_required, current_user from . import auth from ..models import User from .forms import LoginForm, RegistrationForm, ChangePa...
158
33.42
120
16
1,197
python
[{"finding_id": "codeql_py/url-redirection_97625897097ffe2c_ab5a5374", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 32 ]
[ null ]
[ 29 ]
[ 78 ]
2024-11-19T01:21:44.151653+00:00
1,598,946,658,000
3fba4346d359ae55a73951560ae1a635f472a356
4
{ "blob_id": "3fba4346d359ae55a73951560ae1a635f472a356", "branch_name": "refs/heads/master", "committer_date": 1598946658000, "content_id": "45754cc8939f2ca8f5551df60c1a102df61680b5", "detected_licenses": [ "Apache-2.0" ], "directory_id": "a0b18e6eac4d4cf165ffbd0a4cee188e3c797d25", "extension": "py"...
4.09375
stackv2
iphone_price = 5800 mac_price = 9000 coffee_price = 32 python_price = 80 bicyle_price = 1500 list = [] salary = int(input("Please input your salary:")) print("**********ๆฌข่ฟŽๆฅๅˆฐ่ดญ็‰ฉ่ฝฆ็ณป็ปŸ**********") while True: print("1. iPhone 11 โ€”โ€”โ€”โ€”%dๅ…ƒ" % iphone_price) print("2. Mac book โ€”โ€”โ€”โ€”%d" % mac_price) print("3. cof...
71
27.87
60
15
608
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d3cd41f4ae0a4e18_063dd9cf", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
11
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging...
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.\nThis expression logs [sensitive data (priva...
[ 27, 29, 34, 36, 41, 43, 48, 50, 55, 57, 70 ]
[ null, null, null, null, null, null, null, null, null, null, null ]
[ 19, 19, 19, 19, 19, 19, 19, 19, 19, 19, 7 ]
[ 58, 40, 57, 40, 55, 40, 60, 40, 57, 40, 26 ]
2024-11-19T00:11:35.555655+00:00
1,421,741,263,000
3eab341d696fa92c196a9f1cba9ce47e2ce5bac1
3
{ "blob_id": "3eab341d696fa92c196a9f1cba9ce47e2ce5bac1", "branch_name": "refs/heads/master", "committer_date": 1421741263000, "content_id": "7ab76cf959c76cc8300adfccb7fe25ea795b9a65", "detected_licenses": [ "Apache-2.0" ], "directory_id": "dbd474d80459fdf4063c10ef6fc40a461db703bf", "extension": "py"...
2.625
stackv2
import re def main(): json = [ { "name":"pok", "articles":[] }, { "name":"abila", "articles":[] }, { "name":"gastech", "articles":[] }, { "name":"elodis", "articles":[] }, { "name":"kronos", "articles":[] }, { "name":"tethys", "articles":[] }, { "name":"...
113
16.73
144
28
722
python
[{"finding_id": "codeql_py/overly-large-range_322421c13aff2423_d6998131", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[+,\\-.\\/0-9:;<=>?@\\].", "remediation": "", "locati...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[+,\\-.\\/0-9:;<=>?@\\]." ]
[ 82 ]
[ null ]
[ 36 ]
[ 39 ]
2024-11-19T00:11:37.357112+00:00
1,558,011,392,000
a7fe66d4a35e522d576195838a7360a1e068cb66
2
{ "blob_id": "a7fe66d4a35e522d576195838a7360a1e068cb66", "branch_name": "refs/heads/master", "committer_date": 1558011392000, "content_id": "31359ef0571da0fede363dbb8aa229922e4d75b8", "detected_licenses": [ "Apache-2.0" ], "directory_id": "c97d7c9a20fc8bfd5c7183ab748b197409e9453f", "extension": "py"...
2.375
stackv2
# -*- coding:utf-8 -*- from splinter.driver.webdriver.chrome import Options, Chrome from splinter.browser import Browser from contextlib import closing import requests, json, time, re, os, sys, time from bs4 import BeautifulSoup class DouYin(object): def __init__(self, width = 500, height = 300): """ ๆŠ–้ŸณApp่ง†้ข‘ไธ‹่ฝฝ ...
160
30.81
112
23
1,596
python
[{"finding_id": "codeql_py/request-without-cert-validation_1d27ad63d64da919_9075697d", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
4
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 45, 53, 76, 99 ]
[ null, null, null, null ]
[ 10, 9, 9, 16 ]
[ 56, 53, 54, 68 ]
2024-11-19T00:12:32.760850+00:00
1,601,081,178,000
42bf6738eaf2f8270112e2191d636f0abbc11272
2
{ "blob_id": "42bf6738eaf2f8270112e2191d636f0abbc11272", "branch_name": "refs/heads/master", "committer_date": 1601081178000, "content_id": "358090dfcd5ac896e3ebc0d70ccb23573f76d6fb", "detected_licenses": [ "MIT" ], "directory_id": "778b940ea8e3a4c1b0519422f4a20e364f44e29d", "extension": "py", "fi...
2.34375
stackv2
๏ปฟfrom flask import Flask, render_template, request, redirect, url_for, flash, jsonify from werkzeug.utils import secure_filename from engine import parseJMX from engine import validateJMX, createJSON from engine import cleanup import json import os UPLOAD_FOLDER='uploads' ALLOWED_EXTENSIONS = {'jmx'} app = Flask(__n...
62
27.29
93
19
395
python
[{"finding_id": "codeql_py/flask-debug_a9a7435a118dc733_d14f41b1", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-601", "CWE-022" ]
[ "py/flask-debug", "py/url-redirection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Untrusted URL redirection depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 62, 47, 41 ]
[ null, null, null ]
[ 5, 33, 27 ]
[ 24, 44, 83 ]
2024-11-19T00:51:25.631352+00:00
1,629,951,468,000
b33f0bdc75356c22722612a778dfec55af28c292
3
{ "blob_id": "b33f0bdc75356c22722612a778dfec55af28c292", "branch_name": "refs/heads/master", "committer_date": 1629951468000, "content_id": "a5a21ab689811f6d17240f9f52909675dc3d6941", "detected_licenses": [ "MIT" ], "directory_id": "efa7489ff9da2f345ccf3ed79ca44059d9c68438", "extension": "py", "fi...
2.5625
stackv2
# -*- coding: utf-8 -*- """ ------------------------------------------------- File Name๏ผš _validators Description : ๅฎšไน‰proxy้ชŒ่ฏๆ–นๆณ• Author : JHao date๏ผš 2021/5/25 ------------------------------------------------- Change Activity: 2021/5/25: -----------------------------...
86
27.51
108
13
633
python
[{"finding_id": "codeql_py/request-without-cert-validation_44fe312f12bf97f3_173adb89", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 77 ]
[ null ]
[ 13 ]
[ 107 ]
2024-11-19T01:02:23.344448+00:00
1,451,299,462,000
693463e6f5ea7766654a5c1cfc310e9e2867a685
3
{ "blob_id": "693463e6f5ea7766654a5c1cfc310e9e2867a685", "branch_name": "refs/heads/master", "committer_date": 1451299462000, "content_id": "fa7648ead55f44f4ae39d1dc40dbf8f8861b6856", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "47474705d06f060218b3ab35e4a0ac4240920798", "extension": "p...
2.671875
stackv2
# -*- coding: utf-8 -*- from __future__ import absolute_import import errno import os import json import re from jinja2 import Environment, DictLoader from behave.reporter.base import Reporter from behave.reporter.livingdoc_templates import * def slugify_string(string_to_slug): char_to_remove = '-&()~`!@ยฃ$%^&*()...
377
38.88
102
20
2,939
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_3589b519d0801d0b_1f54f27c", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 243 ]
[ null ]
[ 20 ]
[ 33 ]
2024-11-18T23:48:38.966715+00:00
1,540,581,241,000
bde563212aa546ea65025bd12d18939fa852a195
2
{ "blob_id": "bde563212aa546ea65025bd12d18939fa852a195", "branch_name": "refs/heads/master", "committer_date": 1540581241000, "content_id": "8ecf37473f15aea2b62ba0a21f933ad15f70f911", "detected_licenses": [ "MIT" ], "directory_id": "5fc8b307836b4f1ddeddf2cf6244d1f659b3c51e", "extension": "py", "fi...
2.40625
stackv2
from flask import Flask, render_template import broadlink import binascii import pprint from time import sleep from commands import commands from scenes import scenes device = broadlink.discover(timeout=5)[0] device.auth() devtype = device.get_type() devnet = device.host[0] devmac = binascii.hexlify(device.mac).decod...
80
28.7
88
19
604
python
[{"finding_id": "codeql_py/reflective-xss_1addc2e996a159ea_78bd674f", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
6
true
[ "CWE-079", "CWE-079", "CWE-079", "CWE-079", "CWE-079", "CWE-079" ]
[ "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability due to a [user-provided value](2).", "Cross-site scriptin...
[ 45, 47, 58, 60, 78, 80 ]
[ null, null, null, null, null, null ]
[ 16, 16, 16, 16, 16, 16 ]
[ 44, 81, 58, 81, 55, 81 ]
2024-11-19T01:52:01.014692+00:00
1,531,853,567,000
b102d49077e99b6551b70652e4b1d6da521b92c4
3
{ "blob_id": "b102d49077e99b6551b70652e4b1d6da521b92c4", "branch_name": "refs/heads/master", "committer_date": 1531853567000, "content_id": "4ee44deb55dba88f6d819112dead5dc1c3e6c6cb", "detected_licenses": [ "MIT" ], "directory_id": "74611b98cfec37792fe8c0d988a617dad6479c0d", "extension": "py", "fi...
2.796875
stackv2
#!/usr/bin/env python import argparse import json import os import re import networkx from jinja2 import Environment, FileSystemLoader SCRIPT_DIR = os.path.dirname(os.path.abspath(__file__)) class JsonSchema2Popo: """Converts a JSON Schema to a Plain Old Python Object class""" CLASS_TEMPLATE_FNAME = '_cla...
187
35.56
114
26
1,566
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_0f336fb060819250_b19c5239", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 30 ]
[ null ]
[ 22 ]
[ 99 ]
2024-11-19T00:17:33.666985+00:00
1,596,652,366,000
db74d4b3953c85ded6074157b26563583dab4a1e
3
{ "blob_id": "db74d4b3953c85ded6074157b26563583dab4a1e", "branch_name": "refs/heads/master", "committer_date": 1596652366000, "content_id": "8e4806625f8d1ba609a5c57368768fbc5b45936a", "detected_licenses": [ "MIT" ], "directory_id": "ffacfb2645ce1ba62b07814afb4bdd8194f0baed", "extension": "py", "fi...
2.875
stackv2
#!/usr/bin/env python3 ################################### # Sample Custom Action: Upload Frame.io video to Youtube ################################### from fastapi import FastAPI, APIRouter, HTTPException from fastapi.responses import JSONResponse from fastapi.testclient import TestClient from typing import Dict im...
136
31.17
115
19
943
python
[{"finding_id": "codeql_py/partial-ssrf_605a7169f77cd3fd_047beac3", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 36 ]
[ null ]
[ 9 ]
[ 60 ]
2024-11-19T00:32:58.521259+00:00
1,624,681,828,000
0627f649ae8b081e65f5338a22659db7745fa7f5
3
{ "blob_id": "0627f649ae8b081e65f5338a22659db7745fa7f5", "branch_name": "refs/heads/main", "committer_date": 1624681828000, "content_id": "a5108667fec2d3958fed1ee91625af8be74916e7", "detected_licenses": [ "MIT" ], "directory_id": "3dae5007510ef1d1bf005655a039fe38a5311e49", "extension": "py", "file...
2.890625
stackv2
#!/usr/bin/python3 import requests, urllib.parse, urllib.error, base64, json, re import picamera import os import sys from gpiozero import Button, LED from time import sleep from subprocess import check_call import time # camera button setup (it's the BCM number, not pin number) camera_start_button = Button(27) # b...
96
32.49
104
15
803
python
[{"finding_id": "codeql_py/overly-large-range_3bc48e0bc710253c_bdb5eb25", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 70 ]
[ null ]
[ 27 ]
[ 30 ]
2024-11-19T00:33:02.536735+00:00
1,567,000,208,000
0bee9e12e610ce7bf89c4720c9d154a8dd17ab4f
2
{ "blob_id": "0bee9e12e610ce7bf89c4720c9d154a8dd17ab4f", "branch_name": "refs/heads/master", "committer_date": 1567000208000, "content_id": "e726f32d4ca576585a552a71151a3744f8ae19ff", "detected_licenses": [ "MIT" ], "directory_id": "97f68c7e547d36c70fd5492d0a999a9dea1a6792", "extension": "py", "fi...
2.359375
stackv2
# -*- coding:utf-8 -*- import json import bs4 from six.moves.urllib_request import urlopen from flask import Blueprint from flask_login import login_user, logout_user from flask import current_app, session, request, url_for, redirect from .cas_urls import create_cas_login_url from .cas_urls import create_cas_logout...
164
34.43
86
17
1,240
python
[{"finding_id": "codeql_py/url-redirection_b0aeb74822e31fa5_4408f432", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 68 ]
[ null ]
[ 21 ]
[ 33 ]
2024-11-19T01:18:05.480439+00:00
1,652,714,594,000
57d064b7af640d693233b156f90d5b3815e8ecf3
2
{ "blob_id": "57d064b7af640d693233b156f90d5b3815e8ecf3", "branch_name": "refs/heads/master", "committer_date": 1652714594000, "content_id": "018f663e707c55ff6322a1176b2aca92e5266a81", "detected_licenses": [ "MIT" ], "directory_id": "e1cd3482db05af69c8aceaa2fec0bde6e043e5cf", "extension": "py", "fi...
2.453125
stackv2
# -*- coding: utf-8 -*- # Created by restran on 2018/6/5 from __future__ import unicode_literals, absolute_import import logging import time from ..encoding import force_text try: import paramiko except ImportError: raise Exception('paramiko is not installed') logger = logging.getLogger(__name__) class SSH...
270
30.14
92
19
1,904
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_12c3fd9b75873f60_9a2a2761", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 41 ]
[ null ]
[ 9 ]
[ 79 ]
2024-11-19T00:15:30.109196+00:00
1,693,137,958,000
b30476c42b9f7842b710fe80f79fb28dbe1e6b3f
3
{ "blob_id": "b30476c42b9f7842b710fe80f79fb28dbe1e6b3f", "branch_name": "refs/heads/master", "committer_date": 1693137958000, "content_id": "6484d331d31824f5aef6ed2b2cc1fd7ed5aa8cbc", "detected_licenses": [ "MIT" ], "directory_id": "74c46c184d957a3b6e8bdbed0d8b4ff64b13ca7a", "extension": "py", "fi...
2.890625
stackv2
# -*- encoding: utf-8 -*- import re try: from urllib.parse import unquote except ImportError: from urllib.parse import unquote # helper def get_value(template, param): if template.has(param, ignore_empty=True): return str(template.get(param).value).strip() ############## # Edit logic # #########...
167
31.96
179
18
1,303
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_43af5fdca025ea70_892d718a", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [babel.hathitrust.org](1) may be at an arbitrary positi...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [babel.hathitrust.org](1) may be at an arbitrary position in the sanitized URL." ]
[ 79 ]
[ null ]
[ 12 ]
[ 41 ]
2024-11-19T00:15:32.062712+00:00
1,592,056,702,000
9df888c5689239faf6d716ffc50d09ab81b7b929
3
{ "blob_id": "9df888c5689239faf6d716ffc50d09ab81b7b929", "branch_name": "refs/heads/master", "committer_date": 1592056702000, "content_id": "526250e3fc44abb69685d0889057b5db451e74fa", "detected_licenses": [ "MIT" ], "directory_id": "a9f55e02f0b7d996ac1819f2217c66b4a46bb56c", "extension": "py", "fi...
2.53125
stackv2
import os import tarfile from pandas import read_csv from six.moves import urllib HOUSING_ROOT = "https://raw.githubusercontent.com/ageron/handson-ml/master/" HOUSING_PATH = "datasets/housing" HOUSING_URL = HOUSING_ROOT + HOUSING_PATH + "/housing.tgz" def fetch_housing_data(housing_url=HOUSING_URL, housing_path=HOUS...
24
32.38
76
9
213
python
[{"finding_id": "codeql_py/tarslip_182618ed35b414d0_0ea3edc9", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 18 ]
[ null ]
[ 5 ]
[ 16 ]
2024-11-19T01:02:40.133003+00:00
1,524,214,112,000
99ed4b5141e5d05413a4e66a0d4282342d5d0909
2
{ "blob_id": "99ed4b5141e5d05413a4e66a0d4282342d5d0909", "branch_name": "refs/heads/master", "committer_date": 1524214112000, "content_id": "51bf8bc24a0ed819cae151e3738b87b43fded898", "detected_licenses": [ "Apache-2.0" ], "directory_id": "93f2d07878a6d81ab16ebdaedfc9889c1cb1de07", "extension": "py"...
2.3125
stackv2
# -*- coding: utf-8 -*- """Command line execution listener module of ping-me""" from __future__ import print_function from __future__ import unicode_literals from dateutil import parser import argparse import datetime import getpass import hashlib import os import parsedatetime import sys import time import ping_me.au...
175
38.88
78
34
1,878
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_1912c34652c48b41_a8275f25", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 166 ]
[ 167 ]
[ 32 ]
[ 60 ]
2024-11-19T01:02:45.466571+00:00
1,532,085,303,000
9f787aa1912cd1cb5711af95fc9faa5261254878
3
{ "blob_id": "9f787aa1912cd1cb5711af95fc9faa5261254878", "branch_name": "refs/heads/master", "committer_date": 1532085303000, "content_id": "75ce790149b21925dc52154829e9fab39f037301", "detected_licenses": [ "Apache-2.0" ], "directory_id": "5aed5dd09c7875866a09f0b5dc21a74f013a1239", "extension": "py"...
2.640625
stackv2
#!/usr/bin/python3 # -*-coding:utf-8-*- # ์ž„์‹œ๋กœ ์‚ฌ์šฉ. ์ฝ”๋“œ ์ˆ˜์ • ํ•„์š” import csv import getpass import os import sys from sqlalchemy import create_engine from sqlalchemy.orm import sessionmaker from dictionary.lexicon import Lexicon script_path = os.path.dirname(os.path.realpath(__file__)) sys.path.append(script_path + '/..'...
111
26.4
124
14
716
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_616e4fd310b34c05_996107cc", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 32 ]
[ null ]
[ 15 ]
[ 34 ]
2024-11-19T00:51:35.683503+00:00
1,619,541,529,000
44dbadcb22aedd82348d327faaf6c3ff09fb6a03
2
{ "blob_id": "44dbadcb22aedd82348d327faaf6c3ff09fb6a03", "branch_name": "refs/heads/main", "committer_date": 1619541529000, "content_id": "13d7d240a07c7055bf85286f101ea9dc5f96be22", "detected_licenses": [ "Apache-2.0" ], "directory_id": "a1afa1226bb25476643d3737a10653020890cd9e", "extension": "py", ...
2.359375
stackv2
import json import yaml import pprint import re import os import touch from jinja2 import Template import jinja2 try: from yaml import CLoader as Loader, CDumper as Dumper except ImportError: from yaml import Loader, Dumper # declaring only, not change here DEBUG=None TEMPLATEDIR='templates' def load(filenam...
330
28.56
164
22
2,281
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_cb17056e1211b3fc_74522d10", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 211, 224 ]
[ null, null ]
[ 19, 19 ]
[ 60, 60 ]
2024-11-19T01:30:48.213333+00:00
1,638,458,077,000
2e4b9252e119d79d6c03bf345c273245225c5da2
3
{ "blob_id": "2e4b9252e119d79d6c03bf345c273245225c5da2", "branch_name": "refs/heads/master", "committer_date": 1638458077000, "content_id": "ed47a4fdc6f0cc14cfd96e3d00ef7ab77ff1dee8", "detected_licenses": [ "MIT" ], "directory_id": "b66c4912c8d21a967bf39c3d3720c98e273607da", "extension": "py", "fi...
3.125
stackv2
import itertools import re def add(s): char = s[-1] if char == 'z': char = 'a' s = add(s[:-1]) + char return s char = chr(ord(char) + 1) s = s[:-1] + char return s def threes(s): a, b, c = itertools.tee(s, 3) next(c, None) next(c, None) next(b, None) r...
46
19.2
75
14
314
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8d1a31ad14404b67_b39b00b8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 45 ]
[ null ]
[ 15 ]
[ 21 ]
2024-11-19T01:30:51.482028+00:00
1,615,550,481,000
8ad4211dc7283f8ce5dafcfdf972e94ec373c0ce
2
{ "blob_id": "8ad4211dc7283f8ce5dafcfdf972e94ec373c0ce", "branch_name": "refs/heads/master", "committer_date": 1615550481000, "content_id": "9988cba9d084171f14d84ef811a0d2dcc8fede03", "detected_licenses": [ "MIT" ], "directory_id": "f1289de087d44a7f301845d3aa5bcbd071fff001", "extension": "py", "fi...
2.375
stackv2
# -*- coding: utf-8 -*- from __future__ import absolute_import, print_function from flask import Flask, render_template, request, redirect, url_for, Response from jinja2 import Environment, meta, exceptions from random import choice import inspect from cgi import escape import logging import logging.handlers import js...
341
33.4
127
18
2,556
python
[{"finding_id": "codeql_py/stack-trace-exposure_455fdb7325c21338_3d987aa7", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
7
true
[ "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-074", "CWE-079", "CWE-079" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/template-injection", "py/reflective-xss", "py/jinja2/autoescape-false" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information...
[ 295, 304, 310, 318, 293, 312, 284 ]
[ null, null, null, null, null, null, null ]
[ 16, 24, 24, 16, 45, 20, 18 ]
[ 64, 99, 97, 65, 69, 82, 31 ]
2024-11-19T01:30:55.693400+00:00
1,617,764,297,000
5768f75907d47479e20ad02ed918b98882ad5cbc
3
{ "blob_id": "5768f75907d47479e20ad02ed918b98882ad5cbc", "branch_name": "refs/heads/master", "committer_date": 1617764297000, "content_id": "bc6dd3fa2542c967c0836cc5c8c6c6be7a1a7aaf", "detected_licenses": [ "MIT" ], "directory_id": "e17e0ce66b840f7c91dc6c4e558a132d1df274b2", "extension": "py", "fi...
2.859375
stackv2
#!/usr/bin/env ./venv/bin/python #coding: utf-8 __version__ = '1.0' import requests import re import os from urllib.parse import quote import argparse try: from colorama import init, Fore, Back, Style init() except Exception as e: class Fore(): GREEN = '** ' RESET = ' **' YELLOW = ...
71
34.54
129
17
651
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_1fa22c0863d6416c_9fb71ec8", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
4
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 30, 55, 58, 60 ]
[ null, null, null, null ]
[ 30, 15, 19, 23 ]
[ 37, 63, 62, 32 ]
2024-11-19T00:53:41.011382+00:00
1,620,657,534,000
fd0eb5862c76ea62623642c1d2322958a8bc9f3c
3
{ "blob_id": "fd0eb5862c76ea62623642c1d2322958a8bc9f3c", "branch_name": "refs/heads/master", "committer_date": 1620657534000, "content_id": "451998c224f0e8da94434dfd42d154f71cd1071c", "detected_licenses": [ "MIT" ], "directory_id": "9781189b8384c2f72c55d24ea81158330eb5f62c", "extension": "py", "fi...
2.546875
stackv2
from definitions import * import os import pathlib import sklearn.model_selection import tarfile import torch import torchaudio import urllib.request from get_data.helpers import mkdir_if_not_exists here = pathlib.Path(__file__).resolve().parent def split_data(tensor, stratify): # 0.7/0.15/0.15 train/val/test sp...
159
39.51
123
17
1,518
python
[{"finding_id": "codeql_py/tarslip_4dca7ec5dee25856_39f08e2c", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 59 ]
[ null ]
[ 9 ]
[ 10 ]
2024-11-19T02:00:57.080946+00:00
1,399,218,215,000
ea22f97d5573bb186a75cd1bae24db6ac092f2fb
3
{ "blob_id": "ea22f97d5573bb186a75cd1bae24db6ac092f2fb", "branch_name": "refs/heads/master", "committer_date": 1399218425000, "content_id": "908c30b65cf893e3a5453119773674a96b1dd12d", "detected_licenses": [ "MIT" ], "directory_id": "26903b08fe5380848b80b77749184f4cd3873466", "extension": "py", "fi...
2.59375
stackv2
""" marvin.utils ~~~~~~~~~~~~ A collection of utilities that might be handy in several places in the marvin code. """ from flask import make_response, request from flask.ext.restful import Api from logging import getLogger from werkzeug.exceptions import HTTPException import textwrap import ujson _logg...
103
32.59
109
13
735
python
[{"finding_id": "codeql_py/log-injection_07e3f9225f58a0a3_392cf032", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 85 ]
[ null ]
[ 23 ]
[ 30 ]
2024-11-19T02:00:59.752445+00:00
1,485,433,456,000
fc22349a405f3c39b14b9e495483ef27f0ec145d
3
{ "blob_id": "fc22349a405f3c39b14b9e495483ef27f0ec145d", "branch_name": "refs/heads/master", "committer_date": 1485433456000, "content_id": "d3a9f660dba8f09c2bcdc5dfa9d64f7333e4d57b", "detected_licenses": [ "MIT" ], "directory_id": "00349876ea87737c35a760d9f59055933db3e932", "extension": "py", "fi...
2.796875
stackv2
import argparse import sys import json import pickle import os import time status_colors_hex = { '200': '#6FB665', '204': '#4FA29F', '400': '#D8C726', '404': '#F06A2A', '406': '#78CAEF', '414': '#86F6D2', '500': '#043E8A', '502': '#A81E03', } def fetch_input(stats_file): file_reso...
176
35.59
139
15
1,866
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_64301fe5be10d8e1_4dba2763", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 169 ]
[ null ]
[ 22 ]
[ 65 ]
2024-11-19T00:04:34.222085+00:00
1,488,113,529,000
ba7bd6ace06ce3c876c92b8913352df6e78dce50
2
{ "blob_id": "ba7bd6ace06ce3c876c92b8913352df6e78dce50", "branch_name": "refs/heads/master", "committer_date": 1488113529000, "content_id": "ce1b7f79975f1102ff2e76825442c66962d8965d", "detected_licenses": [ "MIT" ], "directory_id": "9fb7ac807256f4cb6fac8deb28bfeb458844d267", "extension": "py", "fi...
2.484375
stackv2
from utils import get_location_labels, get_location_label locations = get_location_labels() def construct_labeled_user_attributes(): fout = open('./zhihu_user_attributes.data', 'w') for line in open('./user_info.data'): line = line.strip().split('\t') if len(line) < 20: continue ...
25
24.4
86
14
151
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_8e632249e597faf8_ce6b38bb", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text." ]
[ 16 ]
[ null ]
[ 20 ]
[ 86 ]
2024-11-19T00:40:29.802155+00:00
1,618,212,200,000
2d92bdd9790060a9ebc90fec0b2a301875dadd81
4
{ "blob_id": "2d92bdd9790060a9ebc90fec0b2a301875dadd81", "branch_name": "refs/heads/master", "committer_date": 1618212200000, "content_id": "9c78a77380964a53a5df4979f173d1ddcf2f70cd", "detected_licenses": [ "MIT" ], "directory_id": "42f49e52dc19777dc7dee02d71f9630f417c4e9c", "extension": "py", "fi...
3.765625
stackv2
#!/usr/bin/env python3.6 from user import User from credentials import Credentials # Users def create_user(flname,password): ''' Function to create a new user ''' new_user= User(flname,password) return new_user def save_user(user): ''' Function to save user ''' user.save_user() def ...
317
34.46
159
27
1,990
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e863d40b3879f75b_3dd642be", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
4
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 147, 224, 242, 255 ]
[ null, null, null, null ]
[ 27, 39, 39, 35 ]
[ 86, 98, 150, 119 ]
2024-11-19T01:06:12.350327+00:00
1,593,112,939,000
4f4207107d3a11a7a481816d84fe8b77a3489443
3
{ "blob_id": "4f4207107d3a11a7a481816d84fe8b77a3489443", "branch_name": "refs/heads/master", "committer_date": 1593112939000, "content_id": "784f80c523f565e79d0b32c482d4ac3d6001be1b", "detected_licenses": [ "MIT" ], "directory_id": "90cbdc85e657f6f09e5cf664d18069267b3c5e71", "extension": "py", "fi...
2.96875
stackv2
from bs4 import BeautifulSoup import requests import csv import time import os pages = [10, 20, 30, 40, 50] with open('C:/Users/Jenjhayden/Desktop/scrapper_data/python_list.csv', 'a', encoding='utf-8', newline='') as f_output: csv_print = csv.writer(f_output) file_is_empty = os.stat('C:/Users/Jenjhayden/Des...
58
30.02
118
19
396
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_27ea7e180c0c861a_db9c8b20", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 52 ]
[ null ]
[ 30 ]
[ 36 ]
2024-11-19T01:06:18.222602+00:00
1,589,131,935,000
53453943712f9fbc3cf998cb1f64362448dac8b9
3
{ "blob_id": "53453943712f9fbc3cf998cb1f64362448dac8b9", "branch_name": "refs/heads/master", "committer_date": 1589131935000, "content_id": "b5c01e101f1741bbb176574dfec12e5f759ae1f9", "detected_licenses": [ "MIT" ], "directory_id": "88c7ab4d40448c0f2eca1918aab9d61503bc02bf", "extension": "py", "fi...
3.203125
stackv2
# import libraries import nltk import numpy as np import sqlite3 nltk.download(['punkt', 'wordnet']) from nltk.tokenize import word_tokenize, RegexpTokenizer from nltk.stem import WordNetLemmatizer import pandas as pd from sqlalchemy import create_engine import re from sklearn.pipeline import Pipeline from sklearn.ense...
160
28.34
96
15
1,086
python
[{"finding_id": "codeql_py/overly-large-range_6e725b506fdb2545_0d59dd58", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 59 ]
[ null ]
[ 48 ]
[ 51 ]
2024-11-19T01:17:53.904550+00:00
1,602,221,603,000
c2d7eca52eca151274b880fa480697a921503c59
2
{ "blob_id": "c2d7eca52eca151274b880fa480697a921503c59", "branch_name": "refs/heads/master", "committer_date": 1602221603000, "content_id": "e6cbad3df5fe7cac6e18d2668ff8ae13e7512bc1", "detected_licenses": [ "MIT" ], "directory_id": "81407be1385564308db7193634a2bb050b4f822e", "extension": "py", "fi...
2.5
stackv2
import string import requests import re import json import os from PIL import Image req = requests.Session() req.headers.update({ 'User-Agent': 'Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36'}) def save_pic(title, index, content): # ๅญ˜ๅ›พ็‰‡ my_fi...
128
33.22
132
18
1,451
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_3a9bdcf222a1c532_3ebccb1c", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [jz.docin.com](1) may be at an arbitrary position in th...
3
true
[ "CWE-020", "CWE-020", "CWE-020" ]
[ "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "The string [jz.docin.com](1) may be at an arbitrary position in the sanitized URL.", "The string [www.docin.com](1) may be at an arbitrary position in the sanitized URL.", "The string [wenku.baidu.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 120, 120, 122 ]
[ null, null, null ]
[ 4, 34, 6 ]
[ 30, 61, 35 ]
2024-11-19T01:18:10.267483+00:00
1,534,265,886,000
cfbb99855d37108d3dd51f0ad4ef63018b514b8b
3
{ "blob_id": "cfbb99855d37108d3dd51f0ad4ef63018b514b8b", "branch_name": "refs/heads/master", "committer_date": 1534265886000, "content_id": "7e369ad341f18321bc48a23a64c8f12b9d67a4bd", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "68280d4d94486adf6bf8c639f7c8582434bdeadb", "extension": "p...
2.75
stackv2
import networkx as nx import urllib import tarfile import os, sys from timeit import default_timer as timer links = [ ('https://users.dcc.uchile.cl/~jfuentess/datasets/files/g/planar1M.tar.gz', 'planar_embedding1000000.pg'), ('https://users.dcc.uchile.cl/~jfuentess/datasets/files/g/planar5M.tar.gz', 'planar_em...
55
38.13
126
9
582
python
[{"finding_id": "codeql_py/tarslip_5d438ed8e97f3fd8_83639bf3", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 30 ]
[ null ]
[ 5 ]
[ 8 ]
2024-11-19T01:18:10.851267+00:00
1,550,678,537,000
dbcd29d7b9949d228b9f6abdbf34348872677463
2
{ "blob_id": "dbcd29d7b9949d228b9f6abdbf34348872677463", "branch_name": "refs/heads/master", "committer_date": 1550678537000, "content_id": "62b8b53754c085eb5013efff3110e94870d53aaf", "detected_licenses": [ "Apache-2.0" ], "directory_id": "bccbfea7a881798ed7be032f50cad0f12f594e8a", "extension": "py"...
2.34375
stackv2
import os from flask import Flask, flash, render_template, request, redirect, \ url_for, send_from_directory from werkzeug import secure_filename import cloudinary from cloudinary.uploader import upload from cloudinary.utils import cloudinary_url import requests from label import label_leaf ALLOWED_...
90
35.74
79
14
777
python
[{"finding_id": "codeql_py/full-ssrf_fc1a58f01eeead1c_cae8b718", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
4
true
[ "CWE-918", "CWE-601", "CWE-601", "CWE-601" ]
[ "py/full-ssrf", "py/url-redirection", "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 77, 32, 38, 43 ]
[ null, null, null, null ]
[ 17, 29, 29, 29 ]
[ 72, 40, 40, 40 ]
2024-11-19T01:15:15.180309+00:00
1,692,023,739,000
a8df0275f5fddca723f8f37e6e585957143ab5e8
2
{ "blob_id": "a8df0275f5fddca723f8f37e6e585957143ab5e8", "branch_name": "refs/heads/master", "committer_date": 1692023739000, "content_id": "96e233378fb8ec9d53a1b169455b5996e88bf0b3", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "54435a26cb878df64ad29d9718e20733a79b463d", "extension": "p...
2.34375
stackv2
#!/usr/bin/env python3 # ========================================================== # Copyright 2020 519Seven # ========================================================== ''' Designed for cron - scp files to web server ''' # Upload files that match criteria to remote web server # If the file has an extension that falls...
100
37.91
104
18
976
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_6c6bf0f407f627fd_534c4d0f", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 53 ]
[ null ]
[ 5 ]
[ 53 ]
2024-11-19T01:15:24.228735+00:00
1,659,365,313,000
448886f922da2c746e3ac62363852c003d5ffd61
2
{ "blob_id": "448886f922da2c746e3ac62363852c003d5ffd61", "branch_name": "refs/heads/master", "committer_date": 1659365313000, "content_id": "baae8c2502e2b58c28b53d48bca0ae0d4dd1dd20", "detected_licenses": [ "MIT" ], "directory_id": "61673ab9a42f7151de7337608c442fa6247f13bb", "extension": "py", "fi...
2.359375
stackv2
from __future__ import print_function from gnuradio import analog from gnuradio import audio from gnuradio import blocks from gnuradio import eng_notation from gnuradio import gr from gnuradio.eng_option import eng_option from gnuradio.filter import firdes from optparse import OptionParser class TopBlock22(gr.top_blo...
310
28.94
111
12
2,423
python
[{"finding_id": "codeql_py/flask-debug_352e550ba3ffb24a_453cb85f", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
5
true
[ "CWE-215", "CWE-079", "CWE-079", "CWE-079", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a ...
[ 310, 250, 257, 264, 285 ]
[ null, null, null, null, null ]
[ 5, 12, 12, 12, 12 ]
[ 40, 22, 22, 22, 103 ]
2024-11-19T00:43:46.016346+00:00
1,367,165,705,000
5e37a7e98b57ffe84f929529dbb3febce95d4f3b
3
{ "blob_id": "5e37a7e98b57ffe84f929529dbb3febce95d4f3b", "branch_name": "refs/heads/master", "committer_date": 1367165705000, "content_id": "59d4685715d4887003e80af6e842752ff9a140c2", "detected_licenses": [ "MIT" ], "directory_id": "cd91fd16ecd5cb0709e52e48d6bcb339a927e74c", "extension": "py", "fi...
2.6875
stackv2
#!/usr/bin/env python # # server.py # # Original copy from tornado web server (facebook 2009) # # Last updated by Jackie Lee on 08/12/11. # # import logging import tornado.httpserver import tornado.ioloop import tornado.websocket import tornado.options import tornado.web import uuid from tornado.options import def...
120
30.42
139
16
858
python
[{"finding_id": "codeql_py/log-injection_954ebb68ce0066a0_fc98dd23", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 56 ]
[ null ]
[ 40 ]
[ 47 ]
2024-11-19T00:43:49.414324+00:00
1,501,598,635,000
d2776e987141af19674a721731f9d868e6f75d80
3
{ "blob_id": "d2776e987141af19674a721731f9d868e6f75d80", "branch_name": "refs/heads/master", "committer_date": 1501598635000, "content_id": "ad226ebf6accc8aff4bd13fed176278552baf970", "detected_licenses": [ "MIT" ], "directory_id": "a303eaeb9bb5def6625bf203e9e4283ded587433", "extension": "py", "fi...
2.75
stackv2
from __future__ import print_function, division from math import radians, sin import WalabotAPI import paramiko try: input = raw_input except NameError: pass class Walabot: """ Designed to control the Walabot device. """ def __init__(self): """ Set useful arena constants and load the Wala...
187
35.25
79
17
1,695
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_5fcadc9d69147f8f_686c8ed4", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 93 ]
[ null ]
[ 9 ]
[ 71 ]
2024-11-19T00:43:50.454321+00:00
1,557,250,309,000
066080cfea5d9877691c2a236fa2c7703ff5691d
3
{ "blob_id": "066080cfea5d9877691c2a236fa2c7703ff5691d", "branch_name": "refs/heads/master", "committer_date": 1557250309000, "content_id": "89bbc81542526f853c976415f525c8b7b73f6e69", "detected_licenses": [ "MIT" ], "directory_id": "c1dbdf405c3301c4d77068d2b14fb4c962fc1c75", "extension": "py", "fi...
2.765625
stackv2
import socket from tkinter import * ServerIP='127.0.0.1' port = 4500 class FTPClient(): def __init__(self): self.conSoc=socket.socket(socket.AF_INET,socket.SOCK_STREAM) self.loggedIn=False self.open=True self.dataSoc=None self.passiveIP=None self.passivePort=None ...
266
31.02
90
19
2,047
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_90958c7c066bc1d5_c78d6636", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-200" ]
[ "py/clear-text-logging-sensitive-data", "py/bind-socket-all-network-interfaces" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "'' binds a socket to all interfaces." ]
[ 50, 112 ]
[ null, null ]
[ 23, 9 ]
[ 44, 46 ]
2024-11-19T00:43:51.297286+00:00
1,554,907,207,000
650f06c4a2528a4e7f5d2c1c641330400a731234
3
{ "blob_id": "650f06c4a2528a4e7f5d2c1c641330400a731234", "branch_name": "refs/heads/master", "committer_date": 1554907207000, "content_id": "24636fc16735cf115c7b4642d178c201f34efa64", "detected_licenses": [ "MIT" ], "directory_id": "3fe63c5130f838a3138ea586bf6d49039567e839", "extension": "py", "fi...
2.671875
stackv2
import pandas as pd import numpy as np import geojson tec_pandas = pd.read_csv('TEC-raw/AMAP_26_2_2019_0h', sep=';', header=None) tec_pandas = tec_pandas.dropna(axis='columns') tec_pandas_list = np.concatenate(np.array(tec_pandas)) #tec_pandas_list = tec_pandas_list[::-1] latitude = np.arange(-60, 20, 0.5) #latitude ...
53
30.4
99
10
533
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_be69abc743638778_6cdaffd0", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text." ]
[ 26 ]
[ null ]
[ 18 ]
[ 70 ]
2024-11-19T00:43:55.211787+00:00
1,618,571,790,000
e633b3ae4514f9d601b5c3115b8edbde6a4a65fb
2
{ "blob_id": "e633b3ae4514f9d601b5c3115b8edbde6a4a65fb", "branch_name": "refs/heads/master", "committer_date": 1618571868000, "content_id": "2a985b8af3e9a073ecd9354dd8368783b01f8fa0", "detected_licenses": [ "ISC" ], "directory_id": "7f6358aaa6e52a478a7619da326cca1bad2063a4", "extension": "py", "fi...
2.4375
stackv2
from __future__ import generator_stop import logging import os import subprocess # nosec from pathlib import Path from typing import TYPE_CHECKING from ..os import CurrentWorkingDirectory from ..string import surrounding_join if TYPE_CHECKING: from typing import Any, Callable, Dict, Iterable, List, Optional, Tuple...
211
28.88
135
18
1,739
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4fd97a041032a6a9_fef1854f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 130 ]
[ null ]
[ 16 ]
[ 29 ]
2024-11-19T00:43:57.304499+00:00
1,567,950,323,000
5d8dfe6f4f2a65f4caca80c3f678cce3f2619073
2
{ "blob_id": "5d8dfe6f4f2a65f4caca80c3f678cce3f2619073", "branch_name": "refs/heads/master", "committer_date": 1567950323000, "content_id": "4f59ce2f8286c0c0724ab8440a275b752638a1a0", "detected_licenses": [ "Apache-2.0" ], "directory_id": "8c5a9cdf12876084d80d270e87b4f74fc254d196", "extension": "py"...
2.40625
stackv2
from django.contrib.auth.models import User from django.core.paginator import Paginator from django.shortcuts import render, HttpResponse from django.db.models import Q from blog.models.post import Post from django.contrib.auth.decorators import login_required NUM_OF_POSTS = 5 def home(request, username=None): f...
57
33.05
87
16
415
python
[{"finding_id": "codeql_py/stack-trace-exposure_1726c18931bf1435_6e8551db", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 57 ]
[ null ]
[ 33 ]
[ 34 ]
2024-11-19T01:32:15.934772+00:00
1,616,727,265,000
f5c7d54da9fb8cb4f378b6010c80e02fa435b2f4
3
{ "blob_id": "f5c7d54da9fb8cb4f378b6010c80e02fa435b2f4", "branch_name": "refs/heads/main", "committer_date": 1616727265000, "content_id": "48f6929637703a0389de1ea8d8d9cc1003a73884", "detected_licenses": [ "MIT" ], "directory_id": "29ba5034b3e6aeb9f5f928639e004b3196dbf730", "extension": "py", "file...
2.75
stackv2
# developed by mario diaz 01 30 2021 # reinicia la VPN l2tp unifi USG # cuando algun usuario se queda logueado en el sistema # This script restarts the VPN services, # this is very useful when a user is already logged in the vpn, # although itยดs not, showing errors in windows or the OS # this script avoids you to use...
93
30.99
102
12
787
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_2a922253891d0347_050baf70", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 44 ]
[ null ]
[ null ]
[ 58 ]
2024-11-19T01:43:46.173995+00:00
1,595,842,712,000
691ec743eb574d00fd3cf6132e546538e0838d74
4
{ "blob_id": "691ec743eb574d00fd3cf6132e546538e0838d74", "branch_name": "refs/heads/master", "committer_date": 1595842712000, "content_id": "3f57d8484b7076b425dcab5a52d17ce26f6a2ee5", "detected_licenses": [ "MIT" ], "directory_id": "fb3fdd1a07cf2ddf12b9ecdb776e1ae162b3b18b", "extension": "py", "fi...
3.609375
stackv2
#!/usr/bin/env python3.6 from user import User from credential import Card import random import string def create_user(fname, lname, password): ''' Function to create a new user ''' new_user = User(fname, lname, password) return new_user def save_user(user): ''' Function to save user ...
202
23.53
100
19
986
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ef623b259f68350f_577f75f5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (p...
[ 90, 103 ]
[ null, null ]
[ 23, 19 ]
[ 31, 68 ]
2024-11-19T01:44:04.071893+00:00
1,612,804,537,000
860e1002e69956522375b4e742ac4e550bb67eb0
3
{ "blob_id": "860e1002e69956522375b4e742ac4e550bb67eb0", "branch_name": "refs/heads/main", "committer_date": 1612804537000, "content_id": "6f3a4360d3270a9e98bc9987d911da5bbe95f4d0", "detected_licenses": [ "MIT" ], "directory_id": "81a75b46018362636e4c4824077159b0acc04147", "extension": "py", "file...
2.53125
stackv2
# This Python file uses the following encoding: utf-8 from flask import Flask from flask import request, jsonify, redirect,make_response import logging import sqlite3 import json from flask_cors import CORS, cross_origin app = Flask(__name__) CORS(app) app.config['CORS_HEADERS'] = 'Content-Type' logging.basicConfig...
239
26.74
179
13
1,574
python
[{"finding_id": "codeql_py/log-injection_f80303174ad350ac_4d5188d3", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
8
true
[ "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depen...
[ 22, 27, 152, 157, 174, 191, 207, 224 ]
[ null, null, null, null, null, null, null, null ]
[ 18, 18, 18, 18, 18, 18, 18, 18 ]
[ 25, 24, 25, 24, 25, 25, 25, 25 ]
2024-11-19T01:44:04.239520+00:00
1,412,355,221,000
6b4c450904bc17e9009739705a61b67eb2695d57
3
{ "blob_id": "6b4c450904bc17e9009739705a61b67eb2695d57", "branch_name": "refs/heads/master", "committer_date": 1412355221000, "content_id": "9f04f3528a4add265c901da57344c3c009d1b94f", "detected_licenses": [ "MIT" ], "directory_id": "650d6c3614977c9b4c5408c352c6ad201459d58e", "extension": "py", "fi...
2.640625
stackv2
# coding: utf-8 # date: 2014-09-28 from jinja2 import Template import time import sys reload(sys) sys.setdefaultencoding('utf-8') class Feed(): def __init__(self, template='templates/simplerss.xml'): self.template = template builddate = time.strftime(u"%a, %d %b %Y %H:%M:%S +0000", time.gmtime()...
54
22.59
80
15
325
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_24a900cb7082a5e2_8ae52208", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 37 ]
[ null ]
[ 20 ]
[ 61 ]
2024-11-19T01:44:04.417613+00:00
1,618,866,631,000
d8a137b20ceba88954857de53b9277d8538298ad
2
{ "blob_id": "d8a137b20ceba88954857de53b9277d8538298ad", "branch_name": "refs/heads/main", "committer_date": 1618866631000, "content_id": "b07886261165d02de679ed5962d30e13102f0077", "detected_licenses": [ "Apache-2.0" ], "directory_id": "2e9a8973728c2b4566596b0d8c78a8c32355e65a", "extension": "py", ...
2.484375
stackv2
"""Resource module for foto view.""" import logging from aiohttp import web import aiohttp_jinja2 from sprint_webserver.services import FotoService, InnstillingerService, KlasserService klubber = [ "Bรฆkkelaget", "Heming", "Kjelsรฅs", "Koll", "Lillomarka", "Lyn", "Njรฅrd", "Rustad", ...
87
28.82
87
17
639
python
[{"finding_id": "codeql_py/log-injection_5726e37b02891e79_c2222030", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 80 ]
[ null ]
[ 23 ]
[ 70 ]
2024-11-19T02:20:09.131461+00:00
1,488,785,690,000
5fa5bbdd4a25b01dfd122547b7358e26f9034c9a
2
{ "blob_id": "5fa5bbdd4a25b01dfd122547b7358e26f9034c9a", "branch_name": "refs/heads/master", "committer_date": 1488785690000, "content_id": "052a4480ea5d3bcbef65d740b161ef5f51972575", "detected_licenses": [ "MIT" ], "directory_id": "d331d36eb3d87a6dc7180d6c0552c3eb289aa2c4", "extension": "py", "fi...
2.5
stackv2
#!/usr/bin/env python from jinja2 import Environment, PackageLoader, select_autoescape import sys import re def uc(string): s1 = re.sub('(.)([A-Z][a-z]+)', r'\1_\2', string) return re.sub('([a-z0-9])([A-Z])', r'\1_\2', s1).upper() def main() : ''' ''' if len(sys.argv) <2 : print u"no cla...
32
20.59
65
12
198
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_42805797006d8f79_1761a24c", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 23 ]
[ 25 ]
[ 11 ]
[ 6 ]
2024-11-19T00:59:36.416434+00:00
1,686,555,646,000
9e78932d93934ad80a480eddb17ce6f51dea6b1b
3
{ "blob_id": "9e78932d93934ad80a480eddb17ce6f51dea6b1b", "branch_name": "refs/heads/master", "committer_date": 1686555646000, "content_id": "21fd99f3ad4c5844f0683c798aac54faa2b0da4d", "detected_licenses": [ "MIT" ], "directory_id": "4a4cb262cdfa83131a5b8d8992debb45599b027a", "extension": "py", "fi...
3
stackv2
""" This file contains code to (a) Load the pre-trained classifier and associated files. (b) Transform new input data into the correct format for the classifier. (c) Run the classifier on the transformed data and return results. """ import pickle import numpy as np import pandas as pd from s...
271
32.16
106
16
2,254
python
[{"finding_id": "codeql_py/overly-large-range_5b910edd302c13e0_1eb8567e", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 52, 102 ]
[ null, null ]
[ 55, 55 ]
[ 59, 59 ]
2024-11-19T00:59:53.427297+00:00
1,617,474,200,000
f58068525c4426bf57670eaab6afd24af3cb4557
4
{ "blob_id": "f58068525c4426bf57670eaab6afd24af3cb4557", "branch_name": "refs/heads/main", "committer_date": 1617474200000, "content_id": "2909f692411fe9e369f880a9809126951a573c5c", "detected_licenses": [ "Apache-2.0" ], "directory_id": "250d8daacf606e8cdac26ad78fdb08d0dcde3596", "extension": "py", ...
3.515625
stackv2
BIRTH_SEARCH = 1 ADD_BIRTH = 2 BIRTH_CHANGE = 3 DELETE_BIRTH = 4 CLOSE_PROGRAM = 5 def main(): birthdays = {} #ฮฎ birthdays.dict() choise(birthdays) def choise(birthdays): print('ฮฆฮฏฮปฮฟฮน ฮบฮฑฮน ฯ„ฮฑ ฮณฮตฮฝฮญฮธฮปฮนฮฌ ฯ„ฮฟฯ…ฯ‚.') print("----------------------------") print('ฮ”ฯŽฯƒฮต ฮผฮนฮฑ ฮฑฯ€ฯŒ ฯ„ฮนฯ‚ ฯ€ฮฑฯฮฑฮบฮฌฯ„ฯ‰ ฮตฮฝฯ„ฮฟฮปฮญฯ‚:\n1. ฮ‘ฮฝฮฑฮถฮฎ...
83
31.6
108
15
1,324
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_238f7194fbc9b42e_fa913c55", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text." ]
[ 50 ]
[ null ]
[ 11 ]
[ 45 ]
2024-11-19T01:11:42.163830+00:00
1,617,617,444,000
895b0f35e823cdb2ae42da73e97726cf7959f5ed
2
{ "blob_id": "895b0f35e823cdb2ae42da73e97726cf7959f5ed", "branch_name": "refs/heads/master", "committer_date": 1617617444000, "content_id": "2c5fc45d60f48ecd3dafacdb47012498bdb0c37a", "detected_licenses": [ "MIT" ], "directory_id": "c18f90603275452a9c6e453fc157c10f8fce4f53", "extension": "py", "fi...
2.390625
stackv2
""" Copyright (c) 2018 Keitaro AB Use of this source code is governed by an MIT license that can be found in the LICENSE file or at https://opensource.org/licenses/MIT. """ # encoding: utf-8 import os.path import json import totoboto from flask import Flask, request, make_response, render_template from BeautifulSoup ...
73
30.33
79
14
537
python
[{"finding_id": "codeql_py/flask-debug_ac8f8f9770c43654_5e56d752", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
4
true
[ "CWE-215", "CWE-079", "CWE-079", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a ...
[ 72, 33, 42, 49 ]
[ null, null, null, null ]
[ 5, 26, 30, 23 ]
[ 24, 33, 54, 30 ]
2024-11-19T01:11:43.561683+00:00
1,622,120,154,000
f515d9c87bd52d7d0df1b2a1bfafe142832f9aa3
2
{ "blob_id": "f515d9c87bd52d7d0df1b2a1bfafe142832f9aa3", "branch_name": "refs/heads/master", "committer_date": 1622120154000, "content_id": "c1c9d92b7bbad0feaa2f636725fdfa40ce842579", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "bfbb91e889fc9ef27cd0d39f234a5d3991c7cef7", "extension": "p...
2.421875
stackv2
import datetime import json import os import sys import time from datetime import datetime from selenium.common.exceptions import TimeoutException from selenium.webdriver.common.action_chains import ActionChains from selenium.webdriver.common.by import By from selenium.webdriver.common.keys import Keys from selenium.w...
183
36.08
120
22
1,440
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_139045f33b506356_21d75d04", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 121 ]
[ null ]
[ 23 ]
[ 36 ]
2024-11-19T01:11:44.575081+00:00
1,581,240,833,000
4ed0f58074c3aa62282d3286f55d1b140569b3b8
3
{ "blob_id": "4ed0f58074c3aa62282d3286f55d1b140569b3b8", "branch_name": "refs/heads/master", "committer_date": 1581240842000, "content_id": "f99c9fff653295187c413732465fff248620cbd7", "detected_licenses": [ "MIT" ], "directory_id": "ade3709a01b3c8ba80cdad5de1c13908d5572973", "extension": "py", "fi...
2.65625
stackv2
from flask import Flask, request from flask_cors import CORS from backend.services.database_service import DatabaseService from backend.services.news_website_service import NewsWebsiteService from backend.services.gaming_website_service import GamingWebsiteService APP = Flask(__name__) CORSAPP = CORS(APP) DATABASE_SE...
66
31
93
10
446
python
[{"finding_id": "codeql_py/reflective-xss_4cfb62237d12af8d_89ae5e29", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 42, 64 ]
[ 44, 66 ]
[ 12, 12 ]
[ 6, 6 ]
2024-11-19T01:11:50.263873+00:00
1,670,765,805,000
ca4ff2329a1795f491bd456ae6a134fef2dda05c
2
{ "blob_id": "ca4ff2329a1795f491bd456ae6a134fef2dda05c", "branch_name": "refs/heads/main", "committer_date": 1670765805000, "content_id": "05ddd6d7ea27bda3c7ff655cd87bd06ec6694bcd", "detected_licenses": [ "MIT" ], "directory_id": "e47cc3beaf6f8112ab23144712dcbf7b0540d17e", "extension": "py", "file...
2.453125
stackv2
"""Python client library for the Genius Hub API.""" import logging from hashlib import sha256 import aiohttp from .const import DEFAULT_TIMEOUT_V1, DEFAULT_TIMEOUT_V3 _LOGGER = logging.getLogger(__name__) class GeniusService: """Handle all communication to the Genius Hub.""" def __init__(self, hub_id, us...
74
33.47
88
17
551
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_519bd63753c83577_70f941e7", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e...
[ 22 ]
[ null ]
[ 24 ]
[ 61 ]
2024-11-19T01:11:57.862789+00:00
1,606,837,250,000
9ee2bb10391742451372c8ca9c2110a283d3c11e
2
{ "blob_id": "9ee2bb10391742451372c8ca9c2110a283d3c11e", "branch_name": "refs/heads/master", "committer_date": 1606837250000, "content_id": "dbf1004afba4e0c03aad9c5136df61e3043c7270", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "40fd45b4b468ecc5719d9aee997ab862b726fa69", "extension": "p...
2.3125
stackv2
from jinja2 import Template import random import string import cherrypy from os.path import abspath class Render(object): def getpage(self, path): with open(path) as file: data = file.readlines() page = ''.join(data) return str(page) def setjob(self,jobname,jobtext...
21
23.76
48
13
124
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_5da3724eb697008a_a5f1a93c", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 17 ]
[ null ]
[ 14 ]
[ 33 ]
2024-11-19T01:33:43.864519+00:00
1,372,866,416,000
a581d7a91c220c8afd56a56c0a3836e7704d1318
3
{ "blob_id": "a581d7a91c220c8afd56a56c0a3836e7704d1318", "branch_name": "refs/heads/master", "committer_date": 1372866416000, "content_id": "1a53feccf83600a07ed475ab74be78a46636512a", "detected_licenses": [ "MIT" ], "directory_id": "06c3da4a6f06aea894b2a55bf5192cd0b2ddbcad", "extension": "py", "fi...
2.609375
stackv2
#!/usr/bin/python import commands import subprocess import urllib import tarfile import time import os import hashlib import shutil def check_requirements(): ipset_status = commands.getstatusoutput("hash ipset") iptables_status = commands.getstatusoutput("hash iptables") if ipset_status[0] != 0 or iptables_statu...
73
32.12
137
13
667
python
[{"finding_id": "codeql_py/tarslip_9e776ba6ac92a2e4_49db573f", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 35 ]
[ null ]
[ 3 ]
[ 6 ]
2024-11-19T01:56:51.205018+00:00
1,483,174,918,000
4eb65a1b994460852e7072898740b288ff8c8f2d
3
{ "blob_id": "4eb65a1b994460852e7072898740b288ff8c8f2d", "branch_name": "refs/heads/master", "committer_date": 1483174918000, "content_id": "526d6a8886346ab9b4111d8cf37b93bc72d77a1e", "detected_licenses": [ "MIT" ], "directory_id": "0dade8f085589476a557779632262b0e98bae202", "extension": "py", "fi...
3.125
stackv2
import hashlib def part_one(door_id): print('Starting part one...') password = ['_'] * 8 index = 0 for i in range(len(password)): print(' [%7d] Password so far: %s' % (index, ''.join(password))) h = hashlib.md5((door_id + str(index)).encode('utf-8')).hexdigest() index += 1 ...
43
28.63
79
20
383
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_95552ae5e3fac822_b3906dd9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
4
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 9, 17, 25, 34 ]
[ null, null, null, null ]
[ 15, 11, 15, 11 ]
[ 73, 62, 73, 62 ]
2024-11-19T01:56:51.877108+00:00
1,567,205,743,000
ee0bb246b1ca271cfe4e1ac55627e4feaec795a3
3
{ "blob_id": "ee0bb246b1ca271cfe4e1ac55627e4feaec795a3", "branch_name": "refs/heads/master", "committer_date": 1567205743000, "content_id": "8038fbf535906ed4ed2b44761a318a0cdf8f917a", "detected_licenses": [ "MIT" ], "directory_id": "08da41469587f041cf270d2a6ddf24ebabb07d21", "extension": "py", "fi...
2.59375
stackv2
import os import tarfile from google_drive_downloader import GoogleDriveDownloader as gdd import argparse from capsnets_laseg.io.io import LocalPreprocessingBinarySeg import glob def dload_heart(dset_path = '/content/'): """ Args: dset_path: where you want to save the dataset """ dataset = "Tas...
61
41.2
144
11
617
python
[{"finding_id": "codeql_py/tarslip_324630a2f1a22e01_917c6885", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 33 ]
[ null ]
[ 9 ]
[ 12 ]
2024-11-19T02:10:25.067123+00:00
1,638,449,008,000
2e8c8f0ba38a05d6657fbf329e531b70eb91e48e
3
{ "blob_id": "2e8c8f0ba38a05d6657fbf329e531b70eb91e48e", "branch_name": "refs/heads/master", "committer_date": 1638449008000, "content_id": "7ee9732d416e4d050b59e6e1bc32ad1b8171467a", "detected_licenses": [ "MIT" ], "directory_id": "19d93813cff4c210ceb77128516d4b8bc8c81b76", "extension": "py", "fi...
3.484375
stackv2
def passesRuleCheck(possiblePassword): previousDigit = 0 containsAdjacentDigits = False for digit in str(possiblePassword): if int(digit) < previousDigit: return False if int(digit) == previousDigit: containsAdjacentDigits = True else: previousDigi...
27
33.44
71
15
223
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_33460b527c8a70d3_9e25a3f2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 26, 27 ]
[ null, null ]
[ 7, 7 ]
[ 57, 58 ]
2024-11-19T02:10:29.793880+00:00
1,530,299,179,000
9fbc52fb8e22f971b48b50a9afe04ee69ba676d2
2
{ "blob_id": "9fbc52fb8e22f971b48b50a9afe04ee69ba676d2", "branch_name": "refs/heads/master", "committer_date": 1530299179000, "content_id": "ad888e25c2240e819ff950f4052ca97ddbf861fc", "detected_licenses": [ "MIT" ], "directory_id": "06de8bd5476eeaefefd1f200d5108b8369b684ae", "extension": "py", "fi...
2.484375
stackv2
# -------------------------------------------------------------------------- # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the MIT License. See License.txt in the project root for # license information. # -------------------------------------------------------------------------- # This sc...
94
45.04
132
14
909
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e9bcde009ec8c3c6_cdc2bf7a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 39, 47, 54 ]
[ null, null, null ]
[ 15, 15, 15 ]
[ 83, 74, 86 ]
2024-11-19T02:10:46.642098+00:00
1,600,882,894,000
8124e9224ebde9db7dbf83807282d942e271daad
3
{ "blob_id": "8124e9224ebde9db7dbf83807282d942e271daad", "branch_name": "refs/heads/master", "committer_date": 1600882894000, "content_id": "85dd3eca0f3709f5ac139b8d071f173cf6019d42", "detected_licenses": [ "MIT" ], "directory_id": "f5f0df08146a4f506bc2668ebfbac006e3bc428f", "extension": "py", "fi...
2.703125
stackv2
import base64 import os from cryptography.hazmat.backends import default_backend from cryptography.hazmat.primitives.kdf.pbkdf2 import PBKDF2HMAC from cryptography.hazmat.primitives import hashes from cryptography.fernet import Fernet class Crypto: def __init__(self, password): self.encoding = 'utf-8' ...
47
33.04
105
15
391
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_e3ac56680e772ae1_d54168d3", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 31 ]
[ null ]
[ 23 ]
[ 53 ]
2024-11-19T02:45:32.405767+00:00
1,607,117,496,000
1a6296d9c36c243b5225d53fc7199c2e2d46c3f3
3
{ "blob_id": "1a6296d9c36c243b5225d53fc7199c2e2d46c3f3", "branch_name": "refs/heads/master", "committer_date": 1607117496000, "content_id": "f06eb296a4c325fea56f11b9d948e9db4f8fa63c", "detected_licenses": [ "MIT" ], "directory_id": "b6a348fea3b2b6f9d67abae6b8d6c2605241e55c", "extension": "py", "fi...
2.515625
stackv2
from dataclasses import dataclass, field from pathlib import Path from typing import Any, Dict, List, Optional, Tuple import csv import json import re import jinja2 import mtsg HEADER_DELIMITER = "|" MAX_SIGNATURE_NAME_COMPONENTS = 2 SIGNATURE_NAME_DELIMITER = "-" SIGNATURE_NAME_PREFIX = "SBS" @dataclass class Di...
172
24.89
88
15
951
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_dbfc3672423f8886_ba6d60ac", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 168 ]
[ null ]
[ 11 ]
[ 79 ]
2024-11-19T02:45:41.809665+00:00
1,489,611,534,000
2e0e417d25ebf6b7cf29b2fe612a36957dfedf47
3
{ "blob_id": "2e0e417d25ebf6b7cf29b2fe612a36957dfedf47", "branch_name": "refs/heads/master", "committer_date": 1489611534000, "content_id": "a47cd04fd5f9a943849cba7131a5826586210ccd", "detected_licenses": [ "MIT" ], "directory_id": "6104910d435e86cebfa8a118da556b8998822a61", "extension": "py", "fi...
3.4375
stackv2
import datetime import os import time from collections import OrderedDict from models import * def help_text(): """Application documentation""" clear_screen() print("*"*10) print("A GUIDE TO USING THE APP.\n" "To add a new task enter n\n" "To view previous tasks type v\n" "To search for previously s...
424
23.94
85
18
2,808
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_92a4a019b3a6ae02_f18ca1ae", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 352 ]
[ 355 ]
[ 10 ]
[ 21 ]
2024-11-19T02:45:42.310900+00:00
1,524,666,321,000
20fa130079ae571f2fee4ec32d3fb643122f02de
2
{ "blob_id": "20fa130079ae571f2fee4ec32d3fb643122f02de", "branch_name": "refs/heads/master", "committer_date": 1524666321000, "content_id": "7e151e14d05784f196b466b968d137cbde165bb2", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "072ea14f5bec3ff864c6707cddadfff78d4d4ab9", "extension": "p...
2.5
stackv2
#!/usr/bin/env python3 # Roam - Copyright 2018 David J. C. Beach; see LICENSE in project root import sys import json from io import BytesIO import numpy as np import pandas import matplotlib.pyplot as plt import bottle from munch import Munch import mapalgo as MAP class AppState(object): def __init__(self, ...
306
23.76
111
19
2,012
python
[{"finding_id": "codeql_py/reflective-xss_db264b89bca90594_576a76aa", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 212, 236 ]
[ null, null ]
[ 12, 12 ]
[ 81, 27 ]
2024-11-19T02:57:18.005106+00:00
1,489,709,483,000
4d8381dece388fef90c1aba031ebac30ea3d30b0
3
{ "blob_id": "4d8381dece388fef90c1aba031ebac30ea3d30b0", "branch_name": "refs/heads/master", "committer_date": 1489709483000, "content_id": "f47c8d6ba558165a60a824a9d8625cf631359e9c", "detected_licenses": [ "MIT" ], "directory_id": "27d4ed0bdeafc48cf4aaa6c40e32663736a015bd", "extension": "py", "fi...
2.796875
stackv2
print(" [Search.py] Loading necessary modules...", end="") import discord from discord.ext import commands from random import choice import json import aiohttp import time import modules.utils as utils def time_since(ref): return int(1000*(time.time() - ref)) def tag(start): return f"[Search.py - {time_since(sta...
97
42.67
170
21
950
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9f540396369a75f1_949224a9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 64 ]
[ null ]
[ 58 ]
[ 110 ]
2024-11-19T03:12:07.070544+00:00
1,625,060,774,000
6aff77bcef32ed1843469a0f4e914922b5b891cc
3
{ "blob_id": "6aff77bcef32ed1843469a0f4e914922b5b891cc", "branch_name": "refs/heads/master", "committer_date": 1625060774000, "content_id": "1925688339622b3a9eea941e6c9804943d206d1f", "detected_licenses": [ "MIT" ], "directory_id": "8c15002e963f97af553337354f75584eaa583ba9", "extension": "py", "fi...
2.578125
stackv2
import requests as r import time import re TOKEN = 'asdfasdfasdfasfd' def post(url, body={}, reconnect_attempts=100, token=TOKEN): """sync fetcher for arcgis services""" body.update({ "f": "json", "token": token }) while reconnect_attempts: try: response = r.post(u...
72
31.56
98
17
529
python
[{"finding_id": "codeql_py/request-without-cert-validation_d785424284a01f37_7b694ae8", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 16 ]
[ null ]
[ 24 ]
[ 60 ]
2024-11-19T03:12:08.445582+00:00
1,619,762,487,000
0c6e907754fcbfcc1b643b624a9fae91a38bf664
2
{ "blob_id": "0c6e907754fcbfcc1b643b624a9fae91a38bf664", "branch_name": "refs/heads/master", "committer_date": 1619762487000, "content_id": "bd6b1fc18446b8039ba871ddac82c5c4ccfae118", "detected_licenses": [ "MIT" ], "directory_id": "4eaa0a86ab8dcd96584afa5d37f36824e4212f5d", "extension": "py", "fi...
2.453125
stackv2
from flask import render_template, flash, redirect, request, url_for, jsonify from app import app, db, mail from app.forms import LoginForm, SignUpForm from flask_login import current_user, login_user, logout_user, login_required from app.models import User, Recipe, Ingredient, CRUD from werkzeug.urls import url_parse ...
256
39.74
108
19
2,151
python
[{"finding_id": "codeql_py/url-redirection_2edb8d1ae84bda9a_0f9b3621", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 89 ]
[ null ]
[ 25 ]
[ 34 ]
2024-11-19T03:12:14.210176+00:00
1,516,995,749,000
a07e6b2aea229333b5b624f57892bdfafe0b2ed1
2
{ "blob_id": "a07e6b2aea229333b5b624f57892bdfafe0b2ed1", "branch_name": "refs/heads/master", "committer_date": 1516995749000, "content_id": "728fa5cb06c2b5a7f54735bf1e51050b9cbdb548", "detected_licenses": [ "MIT" ], "directory_id": "6ced5b363e2b2aabd931f525b5945fe78fd658e1", "extension": "py", "fi...
2.40625
stackv2
import os import sys from django.utils.crypto import get_random_string def main(): args = sys.argv[1:] if not args: return if args.pop() == 'generate_secret_key': chars = 'abcdefghijklmnopqrstuvwxyz0123456789!@#$%^&*(-_=+)' secret_key = get_random_string(100, chars) with ...
20
24.3
92
15
138
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_d4a4a8dfe11725da_c4f8c1af", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (secret)](1) as clear text." ]
[ 16 ]
[ null ]
[ 31 ]
[ 65 ]
2024-11-19T03:12:22.001883+00:00
1,689,955,572,000
826e3edf54ef1ef65a55ff3ed96ade084000db92
2
{ "blob_id": "826e3edf54ef1ef65a55ff3ed96ade084000db92", "branch_name": "refs/heads/master", "committer_date": 1689970493000, "content_id": "5c3cd9c7336f5ae3afe0068b3b1f35cf73697473", "detected_licenses": [ "Apache-2.0" ], "directory_id": "97c7bd93242671f8ad215253460a147209935abe", "extension": "py"...
2.46875
stackv2
""" This file contains classes and functionto interact with qcow images servers """ import copy import logging import os import paramiko from common import PromotionError, get_release_map class QcowConnectionClient(object): """ Proxy class for client connection """ _log = logging.getLogger("promoter...
284
38.9
80
19
2,210
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_3d177551e51ec0b6_49a9dcd4", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 28 ]
[ null ]
[ 13 ]
[ 73 ]
2024-11-19T01:33:42.675094+00:00
1,592,404,309,000
1405b3db081b35447bcf22743575cae8d538a2c4
4
{ "blob_id": "1405b3db081b35447bcf22743575cae8d538a2c4", "branch_name": "refs/heads/master", "committer_date": 1592404309000, "content_id": "dbd204d2f31087832e43c64a93e800d242ce907f", "detected_licenses": [ "Apache-2.0" ], "directory_id": "d033b2f8386bad50da633774308c07f3df3789aa", "extension": "py"...
4.03125
stackv2
from datetime import date import calendar from datetime import date, datetime, time, timedelta ''' Day 11๏ผšPython ๆ—ถ้—ดๆจกๅ—ไฝฟ็”จ้€ป่พ‘ๅคง็›˜็‚น Python ไธŽๆ—ถ้—ดๅค„็†็›ธๅ…ณๆจกๅ—ๆœ‰๏ผštime ๆจกๅ—ๅ’Œ datetime ๆจกๅ—ใ€‚ time ๆจกๅ—๏ผŒ ๆไพ› 2 ็งๆ—ถ้—ด่กจ่พพๆ–นๅผ๏ผš ๅ‡ๅฎšไธ€ไธช้›ถ็‚นๅŸบๅ‡†๏ผŒๅ็งป้•ฟๅบฆๆข็ฎ—ไธบๆŒ‰็ง’็š„ๆ•ฐๅ€ผๅž‹ ็”ฑ 9 ไธชๆ•ดๆ•ฐ็ป„ๆˆ็š„ๅ…ƒ็ป„ struct_time ่กจ็คบ็š„ๆ—ถ้—ด datetime ๆจกๅ—๏ผŒๅธธ็”จ็ฑปๆœ‰ 4 ไธช๏ผš date๏ผšๆ—ฅๆœŸ็ฑป๏ผŒๅŒ…ๆ‹ฌๅฑžๆ€งๅนดใ€ๆœˆใ€ๆ—ฅๅŠ็›ธๅ…ณๆ–นๆณ• time๏ผšๆ—ถ้—ด็ฑป๏ผŒๅŒ…ๆ‹ฌๅฑžๆ€งๆ—ถใ€ๅˆ†ใ€็ง’็ญ‰ๅŠ็›ธๅ…ณๆ–นๆณ• date...
132
25.08
75
11
1,301
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_83d1ab98c0f4dee5_783be241", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 75, 77 ]
[ null, null ]
[ 11, 11 ]
[ 17, 17 ]
2024-11-19T01:57:25.560738+00:00
1,621,013,252,000
7d0a9267e81a5bf362eac0d59cbbbe2c3be74f33
3
{ "blob_id": "7d0a9267e81a5bf362eac0d59cbbbe2c3be74f33", "branch_name": "refs/heads/main", "committer_date": 1621013252000, "content_id": "286125456c7d024c9d7fee607fe511b5d48bd2ee", "detected_licenses": [ "MIT" ], "directory_id": "67809d0206bd0b3755f5c9ea806ab658869a96f1", "extension": "py", "file...
3.234375
stackv2
""" Email """ import re from dataclasses import dataclass from src.domain.domainmodel.exceptions.invalid_email import InvalidEmail @dataclass class Email: """ This class represents the Email datatype """ value: str """ Email value object """ def __init__(self, value: str): if self._valida...
25
22.24
72
13
142
python
[{"finding_id": "codeql_py/redos_437c8a867b397890_db1c0e2b", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'A' and containing many repetition...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with 'A' and containing many repetitions of '_'." ]
[ 24 ]
[ null ]
[ 30 ]
[ 42 ]
2024-11-19T01:57:31.159605+00:00
1,561,368,966,000
6b70bc31bdfcb1c3d67f650a4e80dfb7bae8796f
2
{ "blob_id": "6b70bc31bdfcb1c3d67f650a4e80dfb7bae8796f", "branch_name": "refs/heads/master", "committer_date": 1561368966000, "content_id": "18a03f557f5cb7539fb94568a0163539fa1a58ac", "detected_licenses": [ "MIT" ], "directory_id": "ec7300118fe167729c28504a1c3a4d66a12a137b", "extension": "py", "fi...
2.40625
stackv2
#!/usr/bin/env python import sys import os from os import environ as env import time import random import datetime import json import importlib import schedule from slackclient import SlackClient from slack_utils import get_user_id, get_channel_id DEFAULT_MENUS = """[ "mop.MOP", "finninn.FinnInn", "brygg...
125
26.12
80
13
912
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_63e25440f60b6648_7f9a04a8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 122 ]
[ null ]
[ 11 ]
[ 55 ]
2024-11-19T01:57:32.009723+00:00
1,619,907,316,000
a3fcaf3a8d2076a9b889af39483c46f48a1fdd39
3
{ "blob_id": "a3fcaf3a8d2076a9b889af39483c46f48a1fdd39", "branch_name": "refs/heads/master", "committer_date": 1619907316000, "content_id": "c2e2996f0bb4fa018735644d075b0bb22d609520", "detected_licenses": [ "MIT" ], "directory_id": "00c0c9b80442af8bb26f0d278b4dc9b628d27eba", "extension": "py", "fi...
3.0625
stackv2
import re import csv import pandas as pd pattern = r"(?P<component>^[\%?\#?\w]+)+\s*(?P<Value>[\d\.]+)+\s*(?P<Minimum>[\d\.]+)+\-(?P<Maximum>[\d\.]+)+\s*(?P<Units>[\w\%\/\^]+)" file=open('blood.txt','r') dta_lines=file.readlines() component_data = [] for line in dta_lines: match=re.match(pattern,line) if matc...
20
28.35
135
11
179
python
[{"finding_id": "codeql_py/redos_c09443fdd5845de3_d188cf84", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '#' and containing many repetition...
3
true
[ "CWE-1333", "CWE-1333", "CWE-1333" ]
[ "py/redos", "py/redos", "py/redos" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '#' and containing many repetitions of '.'.", "This part of the regular expression may cause exponential backtracking on strings starting with '#.' and containing many repetitions of '.'.", "This part of the regular...
[ 5, 5, 5 ]
[ null, null, null ]
[ 54, 78, 101 ]
[ 61, 85, 108 ]
2024-11-19T02:11:16.939244+00:00
1,692,341,537,000
1342a7ec82e89c569d045b8781fa215175c60907
3
{ "blob_id": "1342a7ec82e89c569d045b8781fa215175c60907", "branch_name": "refs/heads/master", "committer_date": 1692341537000, "content_id": "0c2eb3a02e6373a1f8110c2c1e3e2da8a532ba5c", "detected_licenses": [ "MIT" ], "directory_id": "c70dc64f3efbb8e824bac4b5cb29ce7cc95c3a75", "extension": "py", "fi...
2.8125
stackv2
""" Nozomi View Template Module author: hugh@blinkybeach.com """ from nozomi.ancillary.configuration import Configuration from typing import Optional from nozomi.rendering.context import Context try: from jinja2 import Environment, FileSystemLoader except ImportError: Environment = None FileSystemLoader = ...
89
32.74
79
15
629
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_242a1148279fa476_c0520c57", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 53, 64 ]
[ 59, 70 ]
[ 43, 43 ]
[ 14, 14 ]
2024-11-19T02:11:20.330096+00:00
1,535,603,015,000
32bf33d809b19439964f2cda6c2244a74adb8df9
2
{ "blob_id": "32bf33d809b19439964f2cda6c2244a74adb8df9", "branch_name": "refs/heads/master", "committer_date": 1535603015000, "content_id": "ad6aff762fdf9587c92919c92f345f8c80ce46b1", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "4d36cd2fb7c35c2356e05779dc96817405c7aed5", "extension": "p...
2.328125
stackv2
import sys import os import os.path import glob flatName = 'flat' sensorName = 'sensor_list.txt' cmdName = 'commands.txt' indirName = 'inputs' workdirName = 'work' outdirName = 'output' rundirName = 'run' runBase = 'run_%03d.sh' stdoutBase = 'stdout_%s.txt' stderrBase = 'stderr_%s.txt' def setup_visit(phosimdir, thr...
63
28.25
69
12
597
python
[{"finding_id": "codeql_py/overly-permissive-file_d2208766ef0d7759_7c295c06", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable." ]
[ 47 ]
[ null ]
[ 9 ]
[ 31 ]
2024-11-19T02:11:24.969598+00:00
1,574,503,632,000
de557aadcf1c0591be31b40ce073af40ca7a0d81
2
{ "blob_id": "de557aadcf1c0591be31b40ce073af40ca7a0d81", "branch_name": "refs/heads/master", "committer_date": 1574503632000, "content_id": "fdc1dba83c4e436d8f7ea97b42810c8c5494b490", "detected_licenses": [ "MIT" ], "directory_id": "16accf32e4a8597b0d6c48fe9272ae9dfa604d19", "extension": "py", "fi...
2.484375
stackv2
from flask import Flask, send_from_directory, request import sqlite3 import datetime import jinja2 app = Flask(__name__) fDir = '/app/static' db = "/database/database.db" @app.route('/') def index(): print("I should server", flush=True) return send_from_directory(fDir, 'index.html') @app.route('/submit', ...
76
25.08
118
17
555
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_a3b96768070dd4e4_ce01790f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 50 ]
[ 75 ]
[ 16 ]
[ 12 ]
2024-11-19T02:11:41.766028+00:00
1,564,369,918,000
fd42f9b6cfe970c405d8ddf0d8bef8178da92e98
2
{ "blob_id": "fd42f9b6cfe970c405d8ddf0d8bef8178da92e98", "branch_name": "refs/heads/master", "committer_date": 1564370030000, "content_id": "1338cbc3e5c07d47975c4ae16aeffc09b1646fa4", "detected_licenses": [ "MIT" ], "directory_id": "2f4bb1647e689546ba010ac4dbf56ff2092c57a6", "extension": "py", "fi...
2.34375
stackv2
# coding = utf-8 # @time : 2019/6/20 9:06 PM # @author : alchemistlee # @fileName: api_utils.py # @abstract: import json import requests import hashlib import time def logging(fh, content): print(content) content += '\n' fh.write(content) def _encrypt(signStr): hash_algorithm = hashlib.sha256() hash_...
76
19.36
69
12
500
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_6a84e973761c8b29_445168bf", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 21 ]
[ null ]
[ 25 ]
[ 48 ]
2024-11-19T02:32:41.025133+00:00
1,431,204,055,000
9cc6f4b3e2a566e2a856b4f904db805be5312957
3
{ "blob_id": "9cc6f4b3e2a566e2a856b4f904db805be5312957", "branch_name": "refs/heads/master", "committer_date": 1431204055000, "content_id": "b85d0879bc9355b22691adf834f5ef54af37d6e2", "detected_licenses": [ "Apache-2.0" ], "directory_id": "d7081d1b7ac9d10239da95c15ca358eb6bda55f6", "extension": "py"...
2.671875
stackv2
''' Restoring module ''' import logging import os import shutil import getpass import tarfile import leveldb import ntpath import backup from myutils import decrypt_file, path_leaf from ConfigParser import SafeConfigParser from file_processor import FileProcessor def restore(dropbox_path, destiantion, override): '...
82
33.1
79
14
653
python
[{"finding_id": "codeql_py/tarslip_b15bedf5b0d47296_7ab33c94", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 36 ]
[ null ]
[ 5 ]
[ 8 ]
2024-11-19T02:33:05.200541+00:00
1,534,485,507,000
c58ae3f589efc76f05f4f446a70b5b3f1befef05
3
{ "blob_id": "c58ae3f589efc76f05f4f446a70b5b3f1befef05", "branch_name": "refs/heads/master", "committer_date": 1534485507000, "content_id": "d4ad700c921043121daf1983317ff0cd6ddfe6a9", "detected_licenses": [ "Apache-2.0" ], "directory_id": "bfa50d8807b79c0601f1613d607353a991083452", "extension": "py"...
2.546875
stackv2
# -*- coding: UTF-8 -*- import os import stat import json import paramiko from utils.logger.log import log from utils.config.path_tool import path class rshell: def __init__(self, conf): self.config = conf self.logger = log.get_logger(category="rsh") self.ssh = None def connect(self...
118
35.05
155
21
988
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_752800f8e4f79b6f_accb7d79", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 31 ]
[ null ]
[ 9 ]
[ 66 ]
2024-11-19T02:33:28.084287+00:00
1,513,223,041,000
2686f0aecb86c21fa699dfe0fa890390b4511034
3
{ "blob_id": "2686f0aecb86c21fa699dfe0fa890390b4511034", "branch_name": "refs/heads/master", "committer_date": 1513223041000, "content_id": "e5a45bbf81b0ee177be407525a8acacd873fe792", "detected_licenses": [ "MIT" ], "directory_id": "dace28e668417b034d561e9349b32f36b3db3265", "extension": "py", "fi...
2.75
stackv2
import base64 import colorsys import csv import os import numpy as np from scipy.io import loadmat from scipy.io import savemat from hashlib import md5 from io import StringIO from PIL import Image, ImageFont, ImageDraw from flask import send_file ## Size of the dataset DATA_SIZE = 30000 FONT = ImageFont.truetype( ...
193
25.37
104
16
1,464
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_15cea24c42608be7_3dd34041", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (id)](2) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (id)](3) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (id)](4) is used in a hashing algorithm (MD5) that is in...
[ 23 ]
[ null ]
[ 14 ]
[ 36 ]
2024-11-19T02:33:40.939495+00:00
1,614,038,886,000
d5234b2d940add9dc4a28d65c70b3ebae46a9237
3
{ "blob_id": "d5234b2d940add9dc4a28d65c70b3ebae46a9237", "branch_name": "refs/heads/main", "committer_date": 1614038886000, "content_id": "98166dc29270b76c706b0df11c0c857ebba579e7", "detected_licenses": [ "MIT" ], "directory_id": "277e0057a6ce4539408d3e3685030788fe955a9c", "extension": "py", "file...
2.796875
stackv2
from paramiko import SSHClient from paramiko import AutoAddPolicy from scp import SCPClient #Define host's here hosts = ('xx.xx.xx.xx','yy.yy.yy.yy'); ssh = SSHClient(); #Set SSH client ssh.load_system_host_keys(); #Get SSH keys from know_hosts ssh.set_missing_host_key_policy(AutoAddPolicy()); #If host is not recogni...
29
27.83
90
11
207
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_3e8bf028fa27b7ef_3e67ff0d", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 10 ]
[ null ]
[ null ]
[ 49 ]
2024-11-19T02:33:41.635721+00:00
1,285,671,810,000
e59a40058d1a782135461679bda124d9fbf93db0
3
{ "blob_id": "e59a40058d1a782135461679bda124d9fbf93db0", "branch_name": "refs/heads/master", "committer_date": 1285671810000, "content_id": "dd20c467b73a0cd65f3a761c3bf824fb5ac3414d", "detected_licenses": [ "MIT" ], "directory_id": "4c726fd23c5eeb0d3e81798095a99c50060709b6", "extension": "py", "fi...
2.703125
stackv2
#-*- coding: utf-8 -*- """ Generic utility classes and functions used by flow """ import os import sys import re from jinja2 import Environment, FileSystemLoader import flow def copy_template(source, target, name, context): """ Copies a template file/directory structure to the specified directory. s...
62
40.55
92
15
565
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_c442dcb81b8d10ee_00d5dcfe", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 37 ]
[ null ]
[ 11 ]
[ 61 ]
2024-11-19T02:46:18.370251+00:00
1,543,607,311,000
16583f35bb74acf78187ac24224951fd58777a6e
3
{ "blob_id": "16583f35bb74acf78187ac24224951fd58777a6e", "branch_name": "refs/heads/master", "committer_date": 1543607311000, "content_id": "1fb45e6fe928f2b5815d2cced21b0c45fc2f626c", "detected_licenses": [ "MIT" ], "directory_id": "6d68ebc2a269adb94ac5c08410959f3ba42aec3a", "extension": "py", "fi...
2.53125
stackv2
import os from PyQt5.QtWidgets import (QWidget, QDialog, QDesktopWidget, QLabel, QPushButton, QHBoxLayout, QVBoxLayout) from PyQt5.QtCore import Qt, QPoint from autobot.ui.loginwindow_ui import Ui_LoginForm class LoginWindow(QWidget, Ui_LoginForm): def __init__(self, parent=None): ...
157
29.44
75
15
1,138
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_55d7628568fb8e0b_e50c20b8", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 113 ]
[ 115 ]
[ 25 ]
[ 59 ]
2024-11-19T02:46:24.622489+00:00
1,575,636,578,000
4411a46c67b37ec046bf32c1e0f77b4818919550
3
{ "blob_id": "4411a46c67b37ec046bf32c1e0f77b4818919550", "branch_name": "refs/heads/master", "committer_date": 1575636578000, "content_id": "b44f1b04cc5f9c2875e98e27de083711fc617f79", "detected_licenses": [ "MIT" ], "directory_id": "d56996a13e5ac4836f4410ca8dc87a34c9df4790", "extension": "py", "fi...
3.203125
stackv2
# -------------- ##File path for the file file_path = file_path def read_file(path): file = open(path,"r") sentence = file.read() file.close() return (sentence) sample_message = read_file(file_path) print(sample_message) #Code starts here # -------------- #Code starts here file_path_1 = file_path_1 f...
120
19.81
70
11
677
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_83f12d50e7a1aadd_bad58993", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.\nT...
6
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive data (secret)](2) as clear text.\nThis expression stores [sensitive data (secret)](3) as clear text.\nThis expression stores [sensitive data (secret)](4) as clear text.\nThis expression stores [sensitive data (sec...
[ 111, 27, 51, 74, 96, 116 ]
[ null, null, null, null, null, null ]
[ 13, 7, 7, 7, 7, 7 ]
[ 23, 19, 50, 19, 19, 17 ]
2024-11-19T02:59:06.968985+00:00
1,504,952,671,000
37e5bbd6569904b569e59d7b33fd05ecf70369d4
3
{ "blob_id": "37e5bbd6569904b569e59d7b33fd05ecf70369d4", "branch_name": "refs/heads/master", "committer_date": 1504952671000, "content_id": "d2759ef7c90b8b3f903c3cad2cd6bebfbac782ec", "detected_licenses": [ "Unlicense" ], "directory_id": "e229f9f32fec3d5ff3f671862084bca13e5599bf", "extension": "py",...
3.125
stackv2
# -*- coding: utf-8 -*- import json import sys from urllib import parse, request class dictionary(object): legal_translations = ['en-ru', 'ru-en', 'en-en', 'ru-ru'] # Initialize function, get config from file def __init__(self, api_url, api_key): self.cfg_url = api_url self.cfg_key = api_...
49
28.37
76
18
336
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b7403649c6fed297_c1dae619", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 49 ]
[ null ]
[ 11 ]
[ 13 ]
2024-11-19T02:59:07.200154+00:00
1,569,632,986,000
fffa866661931cdf849ac7b50b39f92ded6cd471
2
{ "blob_id": "fffa866661931cdf849ac7b50b39f92ded6cd471", "branch_name": "refs/heads/master", "committer_date": 1569632986000, "content_id": "ccf70c7ad923853a275768521bebfa856254d6f0", "detected_licenses": [ "MIT" ], "directory_id": "ab4badf3d4bcd28e2f223f5534d0d315c220ac67", "extension": "py", "fi...
2.4375
stackv2
import os import re import signal from contextlib import contextmanager import datetime import boto3 from botocore.exceptions import ClientError, NoCredentialsError, HTTPClientError from botocore.handlers import disable_signing from botocore import UNSIGNED from botocore.client import Config import requests SIZE_CHE...
277
33.29
132
22
2,344
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_ec5bb16ae48fd0e3_7be035b1", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [.amazonaws.com](1) may be at an arbitrary position in ...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [.amazonaws.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 99 ]
[ null ]
[ 8 ]
[ 36 ]
2024-11-19T02:59:14.432776+00:00
1,592,464,632,000
a0a1799d77e2fa2539a2439be2cf4d47cab9762d
2
{ "blob_id": "a0a1799d77e2fa2539a2439be2cf4d47cab9762d", "branch_name": "refs/heads/master", "committer_date": 1592464632000, "content_id": "bdb4bebf239f1121d0301714d7eca51c73a08125", "detected_licenses": [ "MIT" ], "directory_id": "1f510848d1defae8d225f9eea150f41311d16717", "extension": "py", "fi...
2.359375
stackv2
import logging.config import os from flasgger import Swagger from flask import Flask, render_template, request from flask_bootstrap import Bootstrap from .pets import inference TF_SERVER_HOST = os.environ.get('TF_SERVER_HOST', '0.0.0.0') TF_SERVER_PORT = os.environ.get('TF_SERVER_PORT', '8501') TF_MODEL_NAME = os.en...
121
29.93
97
16
813
python
[{"finding_id": "codeql_py/path-injection_edacd628b1081cd6_928e0287", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 80, 105 ]
[ null, null ]
[ 28, 32 ]
[ 38, 42 ]
2024-11-19T02:59:16.219664+00:00
1,586,255,770,000
f3b6da56b743bc6e71beefa25df84dfeadf3caf9
3
{ "blob_id": "f3b6da56b743bc6e71beefa25df84dfeadf3caf9", "branch_name": "refs/heads/master", "committer_date": 1586255770000, "content_id": "17ba6d591e1c2323a817de23896ad59d9bf583da", "detected_licenses": [ "MIT" ], "directory_id": "f21027c9c5c38c712590c5b6369c1d0aee5dfccb", "extension": "py", "fi...
3
stackv2
# Getting Reddit Client ID and Client Secret import os REDDIT_CLIENT = os.environ.get('REDDIT_CLIENT') REDDIT_SECRET = os.environ.get('REDDIT_SECRET') REDDIT_USER_PW = os.environ.get('REDDIT_USER_PW') REDDIT_USER_NAME= os.environ.get('REDDIT_USER_NAME') # Testing if the config exists assert REDDIT_CLIENT != None; asse...
114
34.89
122
14
1,008
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_eb22f200e7000e29_29915182", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 10 ]
[ null ]
[ 7 ]
[ 96 ]
2024-11-19T02:59:26.223020+00:00
1,548,951,873,000
bd8c0baf78c704de3e5ea06eaeed05c1aba13fd5
2
{ "blob_id": "bd8c0baf78c704de3e5ea06eaeed05c1aba13fd5", "branch_name": "refs/heads/master", "committer_date": 1548951877000, "content_id": "21903e5f291e54ce9a79474e3aea67f05df420ac", "detected_licenses": [ "MIT" ], "directory_id": "c0c51d3a35564136fc2be0f4f4e892383ba5da65", "extension": "py", "fi...
2.5
stackv2
#!/usr/bin/env python3 """ Builds snippets from terraform's documentation """ import os import re import json import click import yamldown from yaml.parser import ParserError from yaml.scanner import ScannerError import mistune from jinja2 import Template NAME_REGEX = re.compile(r'`([a-z_]+)`') OPTIONAL_REGEX = re.com...
156
35.6
83
16
1,211
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_8cceeef58ffe80ab_4720bee2", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 153 ]
[ null ]
[ 12 ]
[ 38 ]
2024-11-19T02:59:31.412485+00:00
1,587,974,576,000
234ac03a718aaee945ffe9c6707fc1fb22b7727d
3
{ "blob_id": "234ac03a718aaee945ffe9c6707fc1fb22b7727d", "branch_name": "refs/heads/master", "committer_date": 1587974576000, "content_id": "153a274d43f8add22753c6cd71540da071bbcc7a", "detected_licenses": [ "Apache-2.0" ], "directory_id": "7e4b6e6aa20557091f112673b936a20ed9bce0db", "extension": "py"...
2.625
stackv2
#!/usr/bin/python3 import paramiko,time,sys # using as ssh client client=paramiko.SSHClient() # auto adjust host key verification with yes or no client.set_missing_host_key_policy(paramiko.AutoAddPolicy()) # time for connecting to remote Cisco IOS addr=sys.argv[1] # first argument as IP u=sys.argv[2] ...
35
27.29
81
10
274
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_4c9a6a9f407c5295_c6e0054f", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 8 ]
[ null ]
[ null ]
[ 61 ]
2024-11-19T03:11:57.626904+00:00
1,631,558,348,000
a0ce2d6ab3bd39ae30daf711cfb56045c582a99f
2
{ "blob_id": "a0ce2d6ab3bd39ae30daf711cfb56045c582a99f", "branch_name": "refs/heads/master", "committer_date": 1631558348000, "content_id": "a6d52778c5c771f883441f848e7507de8dbdc109", "detected_licenses": [ "Apache-2.0" ], "directory_id": "c8ca395616178167b8f414fc59ee7b6fb6b2c18a", "extension": "py"...
2.328125
stackv2
"""Define a manager to interact with SmartCocoon""" import asyncio import paho.mqtt.client as mqtt import uuid import traceback from aiohttp import ClientSession, ClientTimeout from aiohttp.client_exceptions import ClientError import async_timeout from datetime import datetime, timedelta import logging from typing i...
145
30.53
109
19
952
python
[{"finding_id": "codeql_py/request-without-cert-validation_40abe98be878b220_1a519225", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 100 ]
[ null ]
[ 34 ]
[ 110 ]
2024-11-19T01:26:55.218992+00:00
1,607,226,303,000
54f2698715f2a2e63daab9c8f24757f4ca4320fc
3
{ "blob_id": "54f2698715f2a2e63daab9c8f24757f4ca4320fc", "branch_name": "refs/heads/main", "committer_date": 1607226303000, "content_id": "1fd381401a3940a4d49cf0ab2670699fda8186a6", "detected_licenses": [ "MIT" ], "directory_id": "504a8c45c99e0a8457b5eb7b592f63335c0204a4", "extension": "py", "file...
3.078125
stackv2
list_of_inputs = open("./input.txt").readlines() cleaned_list = [] for item in list_of_inputs: cleaned_list.append(item.strip()) correct_passwords_count = 0 for item in cleaned_list: chCorrect = 0 pCurrent = item.split(" ") pInfo = pCurrent[0] pTimesMin, pTimesMax = pInfo.split ("-") pLetter ...
34
21.59
61
12
208
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6fabe3b8a158d801_54bde58a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 34 ]
[ null ]
[ 7 ]
[ 30 ]
2024-11-19T01:27:02.434379+00:00
1,596,214,083,000
ae7ddb32fe8bbeeea221ffabd9c2fb9fdb63835f
3
{ "blob_id": "ae7ddb32fe8bbeeea221ffabd9c2fb9fdb63835f", "branch_name": "refs/heads/master", "committer_date": 1596214083000, "content_id": "7a5b193fe10e2d343d7a205391857c916efc428d", "detected_licenses": [ "MIT" ], "directory_id": "c68366fd753ac3d8fe051c0967025e24f3f0b4cc", "extension": "py", "fi...
3.171875
stackv2
# Copyright 2012 Google Inc. All Rights Reserved. # -*- coding: utf-8 -*- # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless require...
134
32.83
80
14
1,078
python
[{"finding_id": "codeql_py/bad-tag-filter_4ba24c7023444798_e7182693", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression does not match upper case <SCRIPT> tags.", "remediation": "", "location": {"file_path": ...
1
true
[ "CWE-116" ]
[ "py/bad-tag-filter" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression does not match upper case <SCRIPT> tags." ]
[ 82 ]
[ null ]
[ 33 ]
[ 70 ]
2024-11-19T01:27:03.250685+00:00
1,609,701,260,000
725353ca468385cbf3acc5506ab215e909047bab
3
{ "blob_id": "725353ca468385cbf3acc5506ab215e909047bab", "branch_name": "refs/heads/main", "committer_date": 1609701260000, "content_id": "f5218eaa95b68454aa10fc1c44cfe5b992fc4ddc", "detected_licenses": [ "MIT" ], "directory_id": "31e02058caaf18935d11f851f242a4d23d22ef5e", "extension": "py", "file...
3.4375
stackv2
password_valids = 0 with open("input.txt", "r") as f: lines = f.readlines() for line in lines: position, word, password = line.split() position1, position2 = position.split("-") position1, position2 = int(position1), int(position2) # convert str to int word = word.replace(":", ...
25
28.24
82
11
180
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e4f3122d6bd9d175_93a993a7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 25 ]
[ null ]
[ 7 ]
[ 44 ]