added
stringlengths
32
32
created
int64
1,244B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.25
source
stringclasses
1 value
text
stringlengths
324
20.1k
num_lines
int64
16
598
avg_line_length
float64
15.1
58.3
max_line_length
int64
33
179
ast_depth
int64
8
39
length
int64
101
3.8k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.1k
265k
sast_codeql_findings_count
int64
1
45
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
45
rule_ids
listlengths
1
45
confidences
listlengths
1
45
severities
listlengths
1
45
messages
listlengths
1
45
line_starts
listlengths
1
45
line_ends
listlengths
1
45
column_starts
listlengths
1
45
column_ends
listlengths
1
45
2024-11-19T01:39:02.066594+00:00
1,634,384,857,000
513a25ef385e2169012595baa1e619ef004b2ec1
3
{ "blob_id": "513a25ef385e2169012595baa1e619ef004b2ec1", "branch_name": "refs/heads/main", "committer_date": 1634384857000, "content_id": "cc1a5fb9e43b00bca8e58fcf78b3e90130c6df20", "detected_licenses": [ "MIT" ], "directory_id": "7271d94ea4688f9de062ad1ff79c5e8905305125", "extension": "py", "file...
2.625
stackv2
import os,sys, random, subprocess from config import ConfigService from encryption import EncryptionService from ingestion import IngestionService from auth import AuthenticationService from persistence import GitPersistenceService from utils import navigate_to_store class TextInterface: def __init__(self): ...
100
30.77
117
22
655
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d76ed9b173aee179_8579d800", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 40 ]
[ null ]
[ 15 ]
[ 23 ]
2024-11-19T01:39:02.394549+00:00
1,551,315,482,000
c573bc577f3b25a2cd9e8776569e115daa998a75
2
{ "blob_id": "c573bc577f3b25a2cd9e8776569e115daa998a75", "branch_name": "refs/heads/master", "committer_date": 1551315482000, "content_id": "44b2a0cfdf3c20e0593c53d7fd3af87cfcf21454", "detected_licenses": [ "Apache-2.0" ], "directory_id": "b05869f5a110cbfd70bc741d502cafa2cdfe6ba7", "extension": "py"...
2.34375
stackv2
# parse input string and create specific records # Copyright 2018 Aloft Time Productions, LLC # Apache License 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt # main functions to parse DL string # import re from datetime import datetime from datetime import date # Discussion: How to parse? Are the fie...
241
33.41
143
13
2,197
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_41112fe12e8de1fe_f18d5d2c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
4
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.\nThis expression logs [sensitive data (priva...
[ 222, 225, 236, 239 ]
[ null, null, null, null ]
[ 23, 32, 23, 32 ]
[ 34, 43, 26, 35 ]
2024-11-19T01:51:55.867987+00:00
1,686,343,535,000
03de94d1699d9c389ae445705cf451c9a376c8c1
3
{ "blob_id": "03de94d1699d9c389ae445705cf451c9a376c8c1", "branch_name": "refs/heads/master", "committer_date": 1686343535000, "content_id": "6a1a8529b48ee2dd3186bee4c7ac52a024cdd64a", "detected_licenses": [ "Apache-2.0" ], "directory_id": "3a682c9375bda0f651cbaebfd3e6e8ffbeb50233", "extension": "py"...
2.8125
stackv2
import flask import uuid blueprint = flask.Blueprint("guid", __name__) @blueprint.route("/guid/mint", methods=["GET"]) def mint_guid(): """ Mint a GUID that is valid for this instance of indexd. The intention of this endpoint is to allow generating valid GUIDs to be indexed WITHOUT actually creating ...
60
26.37
85
14
420
python
[{"finding_id": "codeql_py/reflective-xss_cbabfa89b9c8a3d8_d454425e", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 22 ]
[ null ]
[ 16 ]
[ 60 ]
2024-11-19T01:52:03.516060+00:00
1,537,355,641,000
628f3314a8fd741380db2922d985c40291ab0df5
2
{ "blob_id": "628f3314a8fd741380db2922d985c40291ab0df5", "branch_name": "refs/heads/master", "committer_date": 1537355641000, "content_id": "3fdd846ee962e1aa7b095c80ebbb36a26ad8b236", "detected_licenses": [ "MIT" ], "directory_id": "f21e6144c4076e42916e3c02c3fa18b3fe87cd8d", "extension": "py", "fi...
2.5
stackv2
import hashlib import logging from crypto_exchange.utils.rest.api import APIClient logger = logging.getLogger(__name__) class OKExREST(APIClient): def __init__(self, api_key: str = None, secret_key: str = None, api_version: str = "v1", url: str = "https://www.okex.com/api"): super(OKEx...
22
34.64
110
16
208
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_d316e5024bac6f59_9cb82fd1", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 22 ]
[ null ]
[ 28 ]
[ 47 ]
2024-11-19T02:04:42.100128+00:00
1,522,229,113,000
1fcea123db1fedbe28fd14564ad4bb994f8223c3
3
{ "blob_id": "1fcea123db1fedbe28fd14564ad4bb994f8223c3", "branch_name": "refs/heads/master", "committer_date": 1522229113000, "content_id": "9547fbc8e496e5afbed2be30c55917913bdc5600", "detected_licenses": [ "MIT" ], "directory_id": "a6cb592b15a19694027a72450798decbb2e3fa66", "extension": "py", "fi...
3.28125
stackv2
# -*- coding: utf-8 -*- """ Paper object to store the associated information from a submitted url or an arXiv ID. This module defines the following classes: - `Paper`, schema for the associated information of a paper - `SubmittedPaper`, extends `Paper` to process a submitted url. """ import requests import datetime ...
206
28.33
78
24
1,426
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_12cde065e722dc3d_fc76cdcd", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [arxiv.org](1) may be at an arbitrary position in the s...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "The string [arxiv.org](1) may be at an arbitrary position in the sanitized URL.", "The string [science.sciencemag.org](1) may be at an arbitrary position in the sanitized URL." ]
[ 101, 105 ]
[ null, null ]
[ 29, 12 ]
[ 47, 43 ]
2024-11-19T02:04:47.117817+00:00
1,663,675,429,000
0013bfba047a95f16eb853e2898b8b5de26283ea
2
{ "blob_id": "0013bfba047a95f16eb853e2898b8b5de26283ea", "branch_name": "refs/heads/main", "committer_date": 1664282567000, "content_id": "0acac7fa80470bab74d370a7651ad349ad97deec", "detected_licenses": [], "directory_id": "b84e9370cad9d4c48fb678cbc3ccccad00962a9e", "extension": "py", "filename": "books...
2.484375
stackv2
import os import fnmatch import datetime import collections import json from pathlib import Path import functools from flask import Flask, render_template, url_for, abort, send_from_directory, jsonify from flask_frozen import Freezer from elsa import cli import yaml import markdown import markupsafe app = Flask(__nam...
133
26.7
86
18
873
python
[{"finding_id": "codeql_py/path-injection_c47cf7cb6125af18_550a2280", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 100 ]
[ null ]
[ 8 ]
[ 12 ]
2024-11-19T02:04:53.971113+00:00
1,601,898,618,000
b0741dd6bdc1e1109b9b7df6e554f5b96d81771a
3
{ "blob_id": "b0741dd6bdc1e1109b9b7df6e554f5b96d81771a", "branch_name": "refs/heads/master", "committer_date": 1601898618000, "content_id": "219e2ba8f99f6f4d8e17257302b518f8d39f8e6e", "detected_licenses": [ "MIT" ], "directory_id": "54489f723841157ff6f9d3aa3d9d9590f27d2ed5", "extension": "py", "fi...
2.640625
stackv2
from wordcloud import WordCloud, STOPWORDS from flask import Flask, request from flask_restful import Resource, Api app = Flask(__name__) api = Api(app) class wordCloudservice(Resource): def post(self): ip_json = request.get_json() # get file name and result filename wordFile = ip_json["F...
36
27.31
58
15
222
python
[{"finding_id": "codeql_py/flask-debug_b78a767333704411_650b4de1", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-022" ]
[ "py/flask-debug", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1)." ]
[ 36, 15 ]
[ null, null ]
[ 5, 24 ]
[ 24, 32 ]
2024-11-19T02:04:55.312454+00:00
1,589,849,544,000
23222a75d4a128ca81f05a9da4729b37a10ff26d
3
{ "blob_id": "23222a75d4a128ca81f05a9da4729b37a10ff26d", "branch_name": "refs/heads/master", "committer_date": 1589849544000, "content_id": "c4d47b8e33f239d1d3cd25eef3aa40a03765e19a", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e3422c4dbf02ab6500448854dd46b563d6ac7a0f", "extension": "py"...
2.625
stackv2
from typing import NamedTuple, List, Iterator, Dict, Tuple import tarfile import atexit import os import shutil import tempfile from scispacy.file_cache import cached_path class MedMentionEntity(NamedTuple): start: int end: int mention_text: str mention_type: str umls_id: str class MedMentionEx...
312
32.89
92
17
2,342
python
[{"finding_id": "codeql_py/tarslip_724db6afe889b003_8ee5cc0b", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 167 ]
[ null ]
[ 13 ]
[ 20 ]
2024-11-19T02:28:15.853064+00:00
1,617,655,587,000
b67718f65af9faa7da7f24289230f58d00be6c25
2
{ "blob_id": "b67718f65af9faa7da7f24289230f58d00be6c25", "branch_name": "refs/heads/main", "committer_date": 1617655587000, "content_id": "7206aa2a2e37369641697176b7f50c9c439da73c", "detected_licenses": [ "MIT" ], "directory_id": "b5cca4f03ee8ea511235adfbe3e15e0c9d0cfcf0", "extension": "py", "file...
2.390625
stackv2
import requests, urllib, json from decouple import config def get_roof(latitude, longitude): imagewidth = 400 imageheight = 400 scale = 2 zoom = 20 maps_static_key = "AIzaSyDLgZUkLB8DomzcmN1WceGvVD_qXw7x8XY" url = "https://maps.googleapis.com/maps/api/staticmap?" center = str(latitude) + "...
28
33.61
89
14
233
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bf3694cefde22865_7b00a7d1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 21 ]
[ null ]
[ 11 ]
[ 20 ]
2024-11-19T02:28:16.486390+00:00
1,652,315,436,000
2ca0bb068b97983dff82f4527e0a31a5f7fac4cd
2
{ "blob_id": "2ca0bb068b97983dff82f4527e0a31a5f7fac4cd", "branch_name": "refs/heads/master", "committer_date": 1652315436000, "content_id": "9cb0daa2e1284502b460ce1a1c996657b1311f00", "detected_licenses": [ "MIT" ], "directory_id": "5cf745769b0f891aca2198ace8935dce5221ec48", "extension": "py", "fi...
2.390625
stackv2
#!/usr/bin/env python import os import sys import pathlib def build(source_path, build_path, install_path, targets): print(f"source_path : {source_path}") print(f"build_path : {build_path}") print(f"install_path: {install_path}") print(f"targets : {targets}") version_str = os.path.split(sour...
41
33.34
79
11
341
python
[{"finding_id": "codeql_py/overly-permissive-file_a4644ed9649e7ebc_7029f752", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world writable." ]
[ 32 ]
[ null ]
[ 5 ]
[ 48 ]
2024-11-19T02:28:19.652235+00:00
1,594,456,417,000
dfb83cd9d450e3bd3f7c473c4733a404ede802db
3
{ "blob_id": "dfb83cd9d450e3bd3f7c473c4733a404ede802db", "branch_name": "refs/heads/master", "committer_date": 1594456417000, "content_id": "f880cfbd88d8c9805de59db9d2174e769f259620", "detected_licenses": [ "MIT" ], "directory_id": "4a386d4e12f3b6de52c0b9dacb98c6d63aa73509", "extension": "py", "fi...
3.421875
stackv2
from random import sample from time import sleep islogin = False def code():#驗證碼 str1 = "ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789" code1 = ''.join(sample(str1, 4)) return code1 def registered(): #帳號註冊 register_aacount = input("輸入要註冊的帳號: ") sigh_up_password = input("輸入註冊的密碼: ") repassword = ...
100
23.14
81
17
617
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_71137e97d4b3dc0c_b8588b71", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 30 ]
[ null ]
[ 31 ]
[ 41 ]
2024-11-19T02:28:42.503352+00:00
1,586,730,053,000
5b7db31c14a685f35183160f4ddeccae388f36aa
3
{ "blob_id": "5b7db31c14a685f35183160f4ddeccae388f36aa", "branch_name": "refs/heads/master", "committer_date": 1586730053000, "content_id": "48b6b2d3d27845263b6c5b6e3cea251d4b72e505", "detected_licenses": [ "MIT" ], "directory_id": "fb0f5a0f8f0f269ed07fd95f5d88a91a40782287", "extension": "py", "fi...
2.796875
stackv2
import re from nltk.corpus import stopwords from nltk.tokenize import word_tokenize import string # Happy Emoticons emoticons_happy = set([ ':-)', ':)', ';)', ':o)', ':]', ':3', ':c)', ':>', '=]', '8)', '=)', ':}', ':^)', ':-D', ':D', '8-D', '8D', 'x-D', 'xD', 'X-D', 'XD', '=-D', '=D', '=-3', '=3', ':-))', ":'-)", ":'...
82
36.3
86
11
960
python
[{"finding_id": "codeql_py/overly-large-range_d29784185a84ab9c_829989b2", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "remediatio...
4
true
[ "CWE-020", "CWE-020", "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range ...
[ 22, 22, 22, 22 ]
[ null, null, null, null ]
[ 30, 33, 36, 45 ]
[ 34, 37, 40, 49 ]
2024-11-19T02:28:42.766996+00:00
1,622,584,694,000
8071b4469ac17c45fb9d87e3e69a1f7f8f3bb7df
3
{ "blob_id": "8071b4469ac17c45fb9d87e3e69a1f7f8f3bb7df", "branch_name": "refs/heads/master", "committer_date": 1636182320000, "content_id": "71a7ca44fc7cdb2f24a9d4c521a88b1318629a76", "detected_licenses": [ "MIT" ], "directory_id": "bcc31088ff711da1678d3b390d1644a799a35a92", "extension": "py", "fi...
2.609375
stackv2
""" dockerfile """ import logging from jinja2 import Environment, PackageLoader, StrictUndefined from jinja2.exceptions import UndefinedError from dfgen.file_actions import FileActions class Dockerfile: """ Dockerfile All the dockerfile related functionality for dfgen """ linux_type = 'alpine' ...
168
29.07
115
15
1,090
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_2d31652776317ebb_5f041974", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 151 ]
[ 156 ]
[ 29 ]
[ 10 ]
2024-11-19T02:28:46.463795+00:00
1,597,712,099,000
068ea362bbf9d6765efb97749ab66cd1d94a96cc
2
{ "blob_id": "068ea362bbf9d6765efb97749ab66cd1d94a96cc", "branch_name": "refs/heads/master", "committer_date": 1597712099000, "content_id": "bd0d6971f7f0167d32d676a8ee4dfeaa28419336", "detected_licenses": [ "MIT" ], "directory_id": "3d8d69de5d9cf2db97a2da46b69631b22ba770d8", "extension": "py", "fi...
2.484375
stackv2
import socket import select import time import traceback import colorama from colorama import Fore, Style import threading from threading import Thread import requests # Always initialize colorama colorama.init() ### Utility functions go here :) def parse_tags(tags): tag_dict = {} for tag_pair in tags.split("...
209
33.69
79
22
1,527
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_02da575d9ad4ee37_0661d594", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text." ]
[ 124 ]
[ null ]
[ 19 ]
[ 74 ]
2024-11-19T02:28:48.726635+00:00
1,531,583,215,000
81d93b7b88c4c3e4eb97fa5fdd4c3e0536efa142
3
{ "blob_id": "81d93b7b88c4c3e4eb97fa5fdd4c3e0536efa142", "branch_name": "refs/heads/master", "committer_date": 1531583215000, "content_id": "b3ef293c8ddf89dec389450b82e46df760e38482", "detected_licenses": [ "Apache-2.0" ], "directory_id": "8bca749ad71b484b98ba89ecd0375e4f51aa5702", "extension": "py"...
2.546875
stackv2
import fitbit import datetime import gather_keys_oauth2 as oauth2 import numpy import threading # Generate formula time string. def generate_date(days): return str((datetime.datetime.now() - datetime.timedelta(days=days)).strftime("%Y-%m-%d")) # Get averange rest hear beat rate from fitbit server. def get_avera...
59
33.54
107
17
511
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_22259ddc5ff26c20_24e4894e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 40 ]
[ 41 ]
[ 19 ]
[ 96 ]
2024-11-19T02:28:51.132974+00:00
1,429,457,596,000
d6ed573fe8de4e960d715b4b24511a3f66ed6bfa
3
{ "blob_id": "d6ed573fe8de4e960d715b4b24511a3f66ed6bfa", "branch_name": "refs/heads/master", "committer_date": 1429457596000, "content_id": "416683ea22c5f13a8744eeab5c11fc63966ed45e", "detected_licenses": [ "MIT" ], "directory_id": "6d8f9c847bedc534e0e5d794b613da4a08d0c3c7", "extension": "py", "fi...
2.953125
stackv2
from threading import Thread import time import os import re class RobotFinder(Thread): ROBOT_MAC = 'a0:a8:cd:62:c3:75' IP_NOT_FOUND = '0.0.0.0' SLEEP_TIME_IN_MINS = 5 ip_address = IP_NOT_FOUND def __init__(self, callback): Thread.__init__(self) self.callback = callback se...
47
31.96
80
15
440
python
[{"finding_id": "codeql_py/overly-large-range_edd30cda124bc2dd_af95ca07", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-f\\].", "remediation": "", "lo...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-f\\].", "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-f\\]." ]
[ 36, 36 ]
[ null, null ]
[ 39, 62 ]
[ 42, 65 ]
2024-11-19T02:49:26.486959+00:00
1,584,143,215,000
08a8e14cca7d8c1ce62e6472ed6737be3d9aff2f
2
{ "blob_id": "08a8e14cca7d8c1ce62e6472ed6737be3d9aff2f", "branch_name": "refs/heads/master", "committer_date": 1584143215000, "content_id": "6d6756833368ce896319aac2b91c2c7bc74c88f1", "detected_licenses": [ "MIT" ], "directory_id": "eef680812ad21824137913a99a763ffaefde1b06", "extension": "py", "fi...
2.34375
stackv2
#!/bin/python # -*- coding: utf-8 -*- from flask import Flask, request, jsonify, json import os import time import logging app = Flask(__name__) logging.basicConfig( format='[%(asctime)s] %(message)s', datefmt='%Y-%m-%d %H:%M:%S', level=logging.DEBUG ) # @app.route('/') # def api_index(): # return f...
55
25.84
69
13
394
python
[{"finding_id": "codeql_py/log-injection_aab4dc212bd9889e_e1731802", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 44 ]
[ null ]
[ 28 ]
[ 43 ]
2024-11-19T03:11:31.469961+00:00
1,573,063,157,000
7ec64a8bf4d19c30ea5785df07b84cbfd07123ae
3
{ "blob_id": "7ec64a8bf4d19c30ea5785df07b84cbfd07123ae", "branch_name": "refs/heads/master", "committer_date": 1573063157000, "content_id": "dcddb1073e669cd92300b9e483e2b30e4f035b97", "detected_licenses": [ "MIT" ], "directory_id": "571f91069138d5f07c1865f841dd647b6c3c4aff", "extension": "py", "fi...
2.890625
stackv2
# -*- coding: utf-8 -*- ''' 1. Load chatlog and words for scoring 2. Do preprocessing by reading one line at one time 3. Store the each result of sentences to a dictionary {time - preprocessed words} in a list 4. Review the list that contains a set of dictionary to score them with labeledwords 5. Store the each result...
242
28.01
147
13
1,743
python
[{"finding_id": "codeql_py/overly-large-range_784ca7588b00e543_f4f7bf17", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 41 ]
[ null ]
[ 32 ]
[ 35 ]
2024-11-19T03:11:49.319409+00:00
1,580,847,117,000
fe8fffc0b664e805a3198b93a565e1d7c70a523c
2
{ "blob_id": "fe8fffc0b664e805a3198b93a565e1d7c70a523c", "branch_name": "refs/heads/master", "committer_date": 1580847117000, "content_id": "1017b6d5d179287ae4da64af0a833fb7e115c143", "detected_licenses": [ "MIT" ], "directory_id": "4136195543f18f22a4a3e56d3a813950de1593f4", "extension": "py", "fi...
2.375
stackv2
from django.shortcuts import render import requests import random import datetime import pytz from django.core.mail import send_mail tz = pytz.timezone('America/New_York') emails = ['892714129@qq.com'] content = '' OWM_API_KEY = '508a300e8b1ea7c704b80a574472ae9f' # Your OWM_API_KEY GOOGLE_MAP_KEY = 'Your GOOGLE_MAP_K...
78
45.92
152
20
932
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c42a12ce4c9d7ebc_5ceab4d2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 42 ]
[ null ]
[ 28 ]
[ 35 ]
2024-11-19T03:11:58.402946+00:00
1,656,441,040,000
fab5455acb448ceab242fee776592b15a6bb3636
3
{ "blob_id": "fab5455acb448ceab242fee776592b15a6bb3636", "branch_name": "refs/heads/master", "committer_date": 1656441040000, "content_id": "ac9c0ae379d34c61e2c9d2d019999031f6e48741", "detected_licenses": [ "MIT" ], "directory_id": "0ef6f868c60bf7a54d0a48fbcf5992acc7d47d61", "extension": "py", "fi...
2.734375
stackv2
# ####################################################################### # # Task : RemoteDesktop Interaction # # ####################################################################### """ Creates the autoIT stub code to be passed into the master compile Takes a supplied text file for the Sheepl to type the m...
455
33.95
134
22
3,170
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8cd0262130046e09_e5560893", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 276 ]
[ null ]
[ 19 ]
[ 73 ]
2024-11-19T03:12:13.074995+00:00
1,624,448,088,000
a1d0cf42e3ef4c55647f1294d47eb975a7e3f439
3
{ "blob_id": "a1d0cf42e3ef4c55647f1294d47eb975a7e3f439", "branch_name": "refs/heads/main", "committer_date": 1624448088000, "content_id": "5316032e77ed9c05927abe4f6fe46b6a60183a31", "detected_licenses": [ "MIT" ], "directory_id": "a792b4239f5b06d2c8d181dcd2c5ddbe7cecf60a", "extension": "py", "file...
2.75
stackv2
import sys import re def translate(text, conversion_dict, before=None): """ Translate words from a text using a conversion dictionary Arguments: text: the text to be translated conversion_dict: the conversion dictionary before: a function to transform the input (by default...
171
45.62
149
27
2,117
python
[{"finding_id": "codeql_py/redos_beda218c7de4c05d_084c5c41", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'define i9 @a(i' and containing ma...
4
true
[ "CWE-1333", "CWE-1333", "CWE-1333", "CWE-1333" ]
[ "py/redos", "py/redos", "py/redos", "py/redos" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with 'define i9 @a(i' and containing many repetitions of '90ai'.", "This part of the regular expression may cause exponential backtracking on strings starting with 'define i9 @a(i9' and containing many repetitions of 'ai0'...
[ 50, 50, 46, 46 ]
[ null, null, null, null ]
[ 87, 92, 88, 93 ]
[ 90, 95, 91, 96 ]
2024-11-19T03:12:32.270327+00:00
1,562,735,808,000
f409edb701d1082fcfd72b22133c1b32c78eb999
3
{ "blob_id": "f409edb701d1082fcfd72b22133c1b32c78eb999", "branch_name": "refs/heads/master", "committer_date": 1562735808000, "content_id": "9baba8a522431ae1f2720a0cf6999e35b8c3b668", "detected_licenses": [ "MIT" ], "directory_id": "7a424cbe691d9665409aa975c64531ab0f1cd1bf", "extension": "py", "fi...
2.640625
stackv2
import json from django.http import HttpResponseBadRequest, JsonResponse from django.utils.deprecation import MiddlewareMixin from django.utils.translation import gettext as _ class JSONParsingMiddleware(MiddlewareMixin): ''' 将PUT请求中的数据解析为json,保存到request.PUT中 Django中默认只将GET和POST请求中的数据进行json解析,存放到request...
29
32.97
94
22
196
python
[{"finding_id": "codeql_py/stack-trace-exposure_cac99116a04df8e3_3109d17a", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 21 ]
[ 24 ]
[ 41 ]
[ 22 ]
2024-11-19T03:12:32.783518+00:00
1,407,851,111,000
a1d25d2f26ebf0f37bb30004bbef88ef76e250c4
2
{ "blob_id": "a1d25d2f26ebf0f37bb30004bbef88ef76e250c4", "branch_name": "refs/heads/master", "committer_date": 1407851111000, "content_id": "2ae1be211397fe3e715b5ab66869a3cf91c89429", "detected_licenses": [ "Apache-2.0" ], "directory_id": "4cdb16cef63b205e4c1b41f63b8cd25919cfd748", "extension": "py"...
2.328125
stackv2
#!/usr/bin/env python import argparse from ipaddr import IPv4Address import requests import re from maas_common import get_auth_details, metric, status_err, status_ok from requests import exceptions as exc from lxml import html def check(args): splash_status_code = 0 splash_milliseconds = 0.0 login_statu...
85
30.31
75
13
638
python
[{"finding_id": "codeql_py/request-without-cert-validation_db0b1e39f3576e53_35b2aec5", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 27, 54 ]
[ 29, 57 ]
[ 13, 13 ]
[ 30, 26 ]
2024-11-19T03:12:39.862994+00:00
1,602,774,054,000
4b029a646ea6fbf0acdd487ec7f7314a45c28fa6
2
{ "blob_id": "4b029a646ea6fbf0acdd487ec7f7314a45c28fa6", "branch_name": "refs/heads/master", "committer_date": 1602774054000, "content_id": "bc22dccf7cd53d16a8c73b60f62b35d61e9910d6", "detected_licenses": [ "MIT" ], "directory_id": "ff2b5481cd0eb1024e0abaf02a2e30bdfd0f5422", "extension": "py", "fi...
2.375
stackv2
import json from flask import ( Blueprint, render_template, flash, request, redirect, url_for ) from flask_login import login_required # Plotting import plotly import plotly.graph_objects as go from sqlalchemy import create_engine import pandas as pd from db import db from models import TMCFi...
130
29
92
19
851
python
[{"finding_id": "codeql_py/sql-injection_e0090ba5083e0187_3bb784d0", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown...
1
true
[ "CWE-089" ]
[ "py/sql-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This SQL query depends on a [user-provided value](1)." ]
[ 46 ]
[ null ]
[ 22 ]
[ 62 ]
2024-11-19T03:25:19.977126+00:00
1,674,374,018,000
cd69e022f33d1453ae6e8cd94c0ebbb8815af08a
2
{ "blob_id": "cd69e022f33d1453ae6e8cd94c0ebbb8815af08a", "branch_name": "refs/heads/master", "committer_date": 1674374018000, "content_id": "f45e7c9f67ad9b1de3dc5ee3d1230898d35bafd4", "detected_licenses": [ "MIT" ], "directory_id": "04f75ffb1333f6538c22ecef087978d4520195ce", "extension": "py", "fi...
2.46875
stackv2
import json import jsonpickle from flask import Blueprint, render_template, redirect, url_for, request, flash, Response from flask.json import jsonify from flask_principal import Permission, RoleNeed from werkzeug.security import generate_password_hash, check_password_hash from .models import User, Vote from . import ...
129
28.28
97
14
832
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a28a579db69baa27_ebbb8597", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 23 ]
[ null ]
[ 18 ]
[ 26 ]
2024-11-19T03:25:21.656447+00:00
1,620,548,196,000
bf0fe77bf60d91594d9320f92b88a17c08804c69
3
{ "blob_id": "bf0fe77bf60d91594d9320f92b88a17c08804c69", "branch_name": "refs/heads/main", "committer_date": 1620548196000, "content_id": "46d90e1a4d7efeb0f0141c1e0d6682b4abe653c0", "detected_licenses": [ "Python-2.0", "Apache-2.0" ], "directory_id": "2988edff9658f63b4740dfef7097c2f9a7bb6e6d", "...
2.65625
stackv2
import logging import sys import traceback import openpyxl import requests import geocoding import os LOG_FORMAT = "%(asctime)s %(name)s %(levelname)s %(pathname)s %(message)s " # 配置输出日志格式 DATE_FORMAT = '%Y-%m-%d %H:%M:%S %a ' # 配置输出时间的格式,注意月份和天数不要搞乱了 logging.basicConfig(level=logging.INFO, form...
195
34.54
117
20
1,754
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c7bb5af346bab81b_12cda35d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 94 ]
[ null ]
[ 23 ]
[ 114 ]
2024-11-19T03:25:32.929442+00:00
1,544,242,000,000
fdfe8d6a7e966a6f4ad07d19dd6626c8baeac607
2
{ "blob_id": "fdfe8d6a7e966a6f4ad07d19dd6626c8baeac607", "branch_name": "refs/heads/master", "committer_date": 1544242000000, "content_id": "7fea81bde8f417a80ece94158ae7848637a9f579", "detected_licenses": [ "MIT" ], "directory_id": "662cd8d31909f15daacb366b3674237adf3b8baf", "extension": "py", "fi...
2.484375
stackv2
from flask import render_template, flash, url_for, redirect, request, abort from app import app, db from app.forms.forms import RegisterForm, LoginForm, BusinessesForm, ReviewForm, SearchForm from flask_login import login_user, logout_user, current_user, login_required from app.models.models import User, Businesses, Re...
132
38.56
124
16
1,105
python
[{"finding_id": "codeql_py/url-redirection_1124608a463987b8_e82756ab", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 40 ]
[ null ]
[ 29 ]
[ 38 ]
2024-11-19T03:25:38.417215+00:00
1,629,144,671,000
9e3af27cf5488e32002f2db3825f407806c882d8
4
{ "blob_id": "9e3af27cf5488e32002f2db3825f407806c882d8", "branch_name": "refs/heads/main", "committer_date": 1629144671000, "content_id": "09cac2970baeb02784e55e0c472f316841883a1a", "detected_licenses": [ "MIT" ], "directory_id": "c8c5fccb13174a668f445a603e3b271329e8b7f4", "extension": "py", "file...
3.6875
stackv2
import random from text import ABC, HANGMAN, WORDS def get_random_word() -> str: return random.choice(WORDS) def restart() -> None: global missed_letters, correct_letters, game_is_done, secret_word missed_letters = "" correct_letters = "" game_is_done = False secret_word = get_random_word()...
97
28.21
87
24
609
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2ad3cd3572b4c4a8_ce8bd8f0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 33, 75, 83 ]
[ null, null, 89 ]
[ 15, 23, 21 ]
[ 21, 87, 26 ]
2024-11-19T01:28:45.998431+00:00
1,466,414,681,000
7d2e2a3b9f3536a2cffb153f9b1b9c57cc89a485
3
{ "blob_id": "7d2e2a3b9f3536a2cffb153f9b1b9c57cc89a485", "branch_name": "refs/heads/master", "committer_date": 1466414681000, "content_id": "33d36235f3e2d40dc46ebb6ebf5aca3266a16010", "detected_licenses": [ "Apache-2.0" ], "directory_id": "434d82d02084c9041b0d43366e4ff1c777d7b48d", "extension": "py"...
2.828125
stackv2
''' Miguel Angel Alvarez Cabrerizo (n40lab) - ArtemIT 2016 Description: A script for random password and hashes generation to be used as sudo passwords. Ansible Vault is used to encrypt the files containing sensitive information. Password generator: http://stackoverflow.com/questions/2257441/random-string-generation...
67
25.19
112
12
450
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_07f2ab42ee6a2fc5_946b5a71", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 56 ]
[ null ]
[ 16 ]
[ 59 ]
2024-11-19T01:28:48.581561+00:00
1,689,614,293,000
65ab68d7e9ac16e30fa631adbe6778326f7625be
3
{ "blob_id": "65ab68d7e9ac16e30fa631adbe6778326f7625be", "branch_name": "refs/heads/master", "committer_date": 1689614293000, "content_id": "57915100c45ac527d93f0d22605b4c8546c8828e", "detected_licenses": [ "NIST-Software", "Apache-2.0", "BSD-3-Clause" ], "directory_id": "fceb4b981bc5e63891bf6...
2.5625
stackv2
""" REST Views for Instance object """ from core_main_app.commons import exceptions from django.http import Http404 from rest_framework import status from rest_framework.exceptions import ValidationError from rest_framework.permissions import IsAdminUser from rest_framework.response import Response from rest_framework....
310
27.62
77
15
1,702
python
[{"finding_id": "codeql_py/stack-trace-exposure_dd4e8fa048470521_8960f0ca", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
6
true
[ "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information...
[ 51, 98, 153, 205, 238, 309 ]
[ null, null, null, null, null, null ]
[ 17, 17, 17, 17, 17, 17 ]
[ 24, 24, 24, 24, 24, 24 ]
2024-11-19T01:28:58.580854+00:00
1,622,724,319,000
51b2804a3174c31d4a4283435efc4fdfb3e14c3b
3
{ "blob_id": "51b2804a3174c31d4a4283435efc4fdfb3e14c3b", "branch_name": "refs/heads/main", "committer_date": 1622724319000, "content_id": "1ba3ef4ab8694530c78d5d02c701c13ee8fbd054", "detected_licenses": [ "MIT" ], "directory_id": "4484454bad660c415893b3f15548d5370e36bf21", "extension": "py", "file...
2.828125
stackv2
# Date: 02/23/2019 # Original passgen author: Mohamed # Some changed by: virusaki # Description: A social engineering password generator # This script required python version >= 3.0 import argparse import sys max_count_default = 1000000 max_count_main_default = 1000 class PassGen: def __init__(self, max_count=ma...
236
39.95
133
23
1,874
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_1c2aae96a4bda0cf_c8c92d13", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.\nThis expression stores [sensitive data (password)](3) as clear text." ]
[ 196 ]
[ null ]
[ 25 ]
[ 43 ]
2024-11-19T01:29:29.834386+00:00
1,693,805,612,000
b8b5079b48a029db08d3a9e520e16b3b6e5f03c6
2
{ "blob_id": "b8b5079b48a029db08d3a9e520e16b3b6e5f03c6", "branch_name": "refs/heads/main", "committer_date": 1693805612000, "content_id": "67fe3c772fcf2bf049049b497205affbb2841add", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "3d74f759ee48d383aa82eeff0a55864a93a001ba", "extension": "py"...
2.359375
stackv2
#!/usr/bin/env python3 # Copyright 2013 The Flutter Authors. All rights reserved. # Use of this source code is governed by a BSD-style license that can be # found in the LICENSE file. # The return code of this script will always be 0, even if there is an error, # unless the --fail-loudly flag is passed. import argpar...
168
23.96
81
14
1,105
python
[{"finding_id": "codeql_py/tarslip_73412e2174a646be_3e1d223f", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 118 ]
[ null ]
[ 5 ]
[ 6 ]
2024-11-19T01:54:59.757535+00:00
1,616,620,079,000
fa1f0c185bc5283a3af54b2c41f92b7178c51573
4
{ "blob_id": "fa1f0c185bc5283a3af54b2c41f92b7178c51573", "branch_name": "refs/heads/main", "committer_date": 1616620079000, "content_id": "26dfd0d29fbb7eff22264f1521ee53be78c1c1ae", "detected_licenses": [ "MIT" ], "directory_id": "a4e62b078c8d9816ba216e8a8f3584c6b54ef79b", "extension": "py", "file...
3.734375
stackv2
import pandas as pd import time # Set the precision of our dataframes to one decimal place. pd.set_option('precision', 1) # City names corresponding to files df_dic = {'chicago': 'chicago.csv','washington': 'washington.csv','new york': 'new_york_city.csv'} def mostFrequent(df): """Show the most frequent hour,da...
154
39.86
153
18
1,664
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c43193921ceca839_c2118434", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 76 ]
[ null ]
[ 59 ]
[ 70 ]
2024-11-19T01:55:19.036790+00:00
1,567,808,644,000
db3fcab7b2723430524a629c52e1106ddccb6705
3
{ "blob_id": "db3fcab7b2723430524a629c52e1106ddccb6705", "branch_name": "refs/heads/master", "committer_date": 1567808644000, "content_id": "ead757cdf99da2e93c9ebcf678c9c8e8ca34c121", "detected_licenses": [ "MIT" ], "directory_id": "1724dfee76ad898ecd9d82a2a325f2eece2955bf", "extension": "py", "fi...
2.609375
stackv2
import os import platform import requests import zipfile class WebDriverUpdate: BASE_DIR = "./chromedriver" INSTALLED_RELEASE_FILE = BASE_DIR + "/" + "INSTALLED_RELEASE" LATEST_RELEASE_FILE = BASE_DIR + "/" + "LATEST_RELEASE" WEBDRIVER_BASE_URL = "https://chromedriver.storage.googleapis.com" WEBDR...
96
34.23
102
15
739
python
[{"finding_id": "codeql_py/overly-permissive-file_793705520c9c4efe_5f61c6fc", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable." ]
[ 89 ]
[ null ]
[ 9 ]
[ 52 ]
2024-11-19T02:06:44.896829+00:00
1,595,283,090,000
cae48034b83fd9c25a27cef1d6b89eb552cf310e
3
{ "blob_id": "cae48034b83fd9c25a27cef1d6b89eb552cf310e", "branch_name": "refs/heads/master", "committer_date": 1595283090000, "content_id": "3ec59258a08e03a7d80e52deb19de4f27f09b958", "detected_licenses": [ "MIT" ], "directory_id": "839b8d3b691bc07fdd48d2a569d8b86c3cd8b4d1", "extension": "py", "fi...
2.890625
stackv2
import functools import os import tarfile import tempfile import urllib.request import zipfile from typing import Optional from . import remove_suffix from .log import log from .types import BarFn, PathType __all__ = [ "download", ] def download(url: str, save_dir: Optional[PathType] = None, filename: Optional[...
150
36.44
120
17
1,269
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_6b0a0c715803edb5_1a5387c3", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [drive.google.com](1) may be at an arbitrary position i...
3
true
[ "CWE-020", "CWE-020", "CWE-022" ]
[ "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization", "py/tarslip" ]
[ "HIGH", "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "The string [drive.google.com](1) may be at an arbitrary position in the sanitized URL.", "The string [drive.google.com](1) may be at an arbitrary position in the sanitized URL.", "This file extraction depends on a [potentially untrusted source](1)." ]
[ 52, 69, 77 ]
[ null, null, null ]
[ 12, 12, 21 ]
[ 37, 37, 26 ]
2024-11-19T02:06:46.276146+00:00
1,442,161,998,000
a1bbe543abd1ea27d1e9a81df9b515f04a83e0bf
2
{ "blob_id": "a1bbe543abd1ea27d1e9a81df9b515f04a83e0bf", "branch_name": "refs/heads/master", "committer_date": 1442161998000, "content_id": "dd608d2a1cb8cf2a78988d6a632bdcdd86d57427", "detected_licenses": [ "MIT" ], "directory_id": "e48cfabe91c4522462149e3f6cc54258b9b4464b", "extension": "py", "fi...
2.4375
stackv2
import os import sys import ssl import SocketServer from OpenSSL import crypto, SSL from socket import gethostname from pprint import pprint from time import gmtime, mktime SPLUNK_HOME = os.environ["SPLUNK_HOME"] CERTIFICATE_PATH = os.path.join(SPLUNK_HOME, "etc", "apps", "healthkit", "local", "server.pem") def gene...
126
33.65
100
15
1,069
python
[{"finding_id": "codeql_py/insecure-default-protocol_83d6c92018113538_3492d8e3", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in...
1
true
[ "CWE-327" ]
[ "py/insecure-default-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used." ]
[ 89 ]
[ 91 ]
[ 23 ]
[ 43 ]
2024-11-19T02:06:55.165306+00:00
1,593,010,130,000
ed0da8bb88096bab29a6fbd252165768a7d7c6f7
2
{ "blob_id": "ed0da8bb88096bab29a6fbd252165768a7d7c6f7", "branch_name": "refs/heads/master", "committer_date": 1593010130000, "content_id": "c928aab6031a8ab5acd8d370f62bae3011abb16e", "detected_licenses": [ "MIT" ], "directory_id": "4950881f24f0f4cc06ebf5feb5200497487f06ee", "extension": "py", "fi...
2.375
stackv2
import numpy as np from flask import render_template, request, redirect, url_for, Blueprint import sys import time sys.path.insert(0, '../') from python_backend import specs_jobs, utils_jobs, utils_users sys.path.insert(0, '../../') from gaussian_process import GPPairwise from acquisition_function import DiscreteAcquir...
123
36.68
108
15
1,057
python
[{"finding_id": "codeql_py/url-redirection_fc916662554a6653_9dc79100", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 123 ]
[ null ]
[ 25 ]
[ 63 ]
2024-11-19T02:06:55.781647+00:00
1,607,054,347,000
16af5995a8cf3faea2aa9fedda386ed56dbb61c1
2
{ "blob_id": "16af5995a8cf3faea2aa9fedda386ed56dbb61c1", "branch_name": "refs/heads/master", "committer_date": 1607191650000, "content_id": "867d28a812e26451b4aeeb23947f9cf7a6580e7d", "detected_licenses": [ "MIT" ], "directory_id": "3a9f30eaea4608590060f1f3aca9b34d7d5691b2", "extension": "py", "fi...
2.390625
stackv2
#!/usr/bin/python2 import cgi import random import string import cgitb import os import sys import subprocess import draw_galaxy import json from glob import glob GENERATED_DIR = "../generated" LAYOUTS_DIR = "../res/layouts" def spiral_pattern(centre): cur_point = centre directions = [[1, 1], [0, 1], [-1, 0]...
259
33.81
135
17
2,371
python
[{"finding_id": "codeql_py/command-line-injection_89da7afe65ad6c73_6f392f33", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).\nThis command line depends on a [u...
3
true
[ "CWE-078", "CWE-022", "CWE-022" ]
[ "py/command-line-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This command line depends on a [user-provided value](1).\nThis command line depends on a [user-provided value](1).\nThis command line depends on a [user-provided value](1).\nThis command line depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [u...
[ 133, 149, 207 ]
[ null, null, null ]
[ 26, 15, 22 ]
[ 29, 23, 42 ]
2024-11-19T02:06:56.334366+00:00
1,597,826,898,000
9193cd84050288a050294243fc3359a3dbc26cee
2
{ "blob_id": "9193cd84050288a050294243fc3359a3dbc26cee", "branch_name": "refs/heads/master", "committer_date": 1597826898000, "content_id": "4deafd14a4f726bfb6c69008f6a8cfac03089c84", "detected_licenses": [ "MIT" ], "directory_id": "5a47b9d0e684984e8a013bc903590c605dc25cd2", "extension": "py", "fi...
2.34375
stackv2
#!/usr/bin/env python # -*- encoding: utf-8 -*- import requests import json import os import codecs import io class send2phone: def __init__(self, *args, **kwargs): self.barklink = kwargs["barkurl" ] if ("barkurl" in kwargs) else "" self.skey = kwargs["skey" ] if ("skey" in kwargs) els...
60
35.58
91
20
510
python
[{"finding_id": "codeql_py/request-without-cert-validation_13c2ef9539937106_12f6898d", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
3
true
[ "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 28, 39, 57 ]
[ null, null, null ]
[ 23, 23, 23 ]
[ 53, 65, 65 ]
2024-11-19T02:06:58.872210+00:00
1,692,041,896,000
85e4bff1d76aa413b40681fd30a89745c3f43e59
2
{ "blob_id": "85e4bff1d76aa413b40681fd30a89745c3f43e59", "branch_name": "refs/heads/master", "committer_date": 1692041896000, "content_id": "fd91fcc40aab86ac6f10782a4aaeeed1f5d50742", "detected_licenses": [ "Apache-2.0" ], "directory_id": "52bf4ed4c0e6a429fe30ad5a168398939ee4bef4", "extension": "py"...
2.390625
stackv2
#! /usr/bin/python3 import argparse import sys import logging import os import http.client import json import textwrap import secrets import string import subprocess import shlex import random from urllib.parse import urlparse API_HOST = os.environ.get('API_URL').strip('https://').strip('http://') API_BASE_URI = '/ap...
308
34.31
116
16
2,777
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bacac9e164b4cfe9_1ec3e07c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 89, 200, 304 ]
[ null, null, null ]
[ 18, 19, 18 ]
[ 35, 92, 80 ]
2024-11-19T02:07:01.125078+00:00
1,633,908,005,000
097b7c7eeffcb6fb82f18e259f94087cc6ae92ff
3
{ "blob_id": "097b7c7eeffcb6fb82f18e259f94087cc6ae92ff", "branch_name": "refs/heads/main", "committer_date": 1633908005000, "content_id": "c618e0d2e2d54831b35d7d0c4dbc85400e530668", "detected_licenses": [ "MIT" ], "directory_id": "1f4acad2f23795c31720528483449bd85d641343", "extension": "py", "file...
2.859375
stackv2
#!/usr/bin/env python3 """ Module of Users views """ from api.v1.views import app_views from flask import abort, jsonify, request from models.user import User @app_views.route('/users', methods=['GET'], strict_slashes=False) def view_all_users() -> str: """ GET /api/v1/users Return: - list of all User o...
125
27.58
78
15
950
python
[{"finding_id": "codeql_py/stack-trace-exposure_ff997a047e88451d_ecdcb83a", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.\n[S...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.\n[Stack trace information](1) flows to this location and may be exposed to an external user.\n[Stack trace information](1) flows to this location and may be exposed to an external user.\n[Stack trace information](1) flows t...
[ 92 ]
[ null ]
[ 20 ]
[ 40 ]
2024-11-19T02:07:12.037152+00:00
1,417,627,651,000
ef68e27e2ba4635fe8322cde82b9c0d27776be31
2
{ "blob_id": "ef68e27e2ba4635fe8322cde82b9c0d27776be31", "branch_name": "refs/heads/master", "committer_date": 1417627651000, "content_id": "360f8de11a3f0e8a189b8391030e7c6954588449", "detected_licenses": [ "MIT" ], "directory_id": "17045f031a47c44cc5a6ad0c06e58a2c78da9680", "extension": "py", "fi...
2.375
stackv2
import os.path from shutil import copyfile from shutil import copytree from shutil import rmtree try: from jinja2 import Template except: print "Could not import Jinja2, run 'easy_install Jinja2'" exit() output_dir = os.path.join('./', 'chrome_webstore') if os.path.exists(output_dir): print "Removing ...
67
25.18
99
12
420
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_a6e70044486d4bda_0195c6be", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 21 ]
[ null ]
[ 16 ]
[ 50 ]
2024-11-19T02:31:20.488440+00:00
1,624,370,503,000
241f507fb1c8067f1a8d83903115fd2349d86e00
3
{ "blob_id": "241f507fb1c8067f1a8d83903115fd2349d86e00", "branch_name": "refs/heads/main", "committer_date": 1624370503000, "content_id": "19a997962cca5611f759fe763c864cbaf40e6643", "detected_licenses": [ "MIT" ], "directory_id": "9c79bc6d75a2db0affb85df4a17ee0e20aa20527", "extension": "py", "file...
2.53125
stackv2
import requests, os, time, logging, json import pandas as pd import numpy as np import geopandas as gpd from ca_parser import parse_conformiteitsattest from tqdm.contrib.concurrent import process_map # or thread_map from functools import partial from pyproj import Proj, transform from tqdm import tqdm logger = loggin...
179
45.37
170
17
2,257
python
[{"finding_id": "codeql_py/request-without-cert-validation_90d31417d193d4ba_db1c558a", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 21 ]
[ null ]
[ 16 ]
[ 90 ]
2024-11-19T02:31:47.919204+00:00
1,455,413,385,000
e901c4f37f63cfe6bbf5a22da0a38decd2cd55df
3
{ "blob_id": "e901c4f37f63cfe6bbf5a22da0a38decd2cd55df", "branch_name": "refs/heads/master", "committer_date": 1455413385000, "content_id": "8ea64a5bebf7446bb3173019ff37ada9aeb0c13f", "detected_licenses": [ "MIT" ], "directory_id": "6db7a3150cf00b4007d5846d95f3ca55373385e1", "extension": "py", "fi...
2.59375
stackv2
""" Tornado server """ import tornado import logging from tornado.ioloop import IOLoop from tornado.httpserver import HTTPServer from tornado.web import RequestHandler, MissingArgumentError from canonicalurl import get_canonical_url_async class MainHandler(RequestHandler): def initialize(self, whitelist, expandl...
66
29.35
79
17
436
python
[{"finding_id": "codeql_py/stack-trace-exposure_12456f85fb85dbeb_41f6ec81", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 45 ]
[ null ]
[ 24 ]
[ 41 ]
2024-11-19T02:32:06.924953+00:00
1,437,753,520,000
ebd1e0827f89b1855cad9805687e897f0db3abf9
2
{ "blob_id": "ebd1e0827f89b1855cad9805687e897f0db3abf9", "branch_name": "refs/heads/master", "committer_date": 1437753520000, "content_id": "ffe375dc9df3e3776e809e4f8c957e96985674c6", "detected_licenses": [ "Apache-2.0" ], "directory_id": "4a858016fdb8d5226114a04b61285dc5154db963", "extension": "py"...
2.3125
stackv2
""" Copyright 2015 Google Inc. All rights reserved. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in...
180
37.91
106
19
1,553
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_3ca9a80654207c01_71548655", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (id)](2) is used in a hashing algorithm (MD5) that is insecure.", "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (id)](2) is used in a hashing algorithm (MD5) that i...
[ 120, 180 ]
[ null, null ]
[ 28, 28 ]
[ 31, 31 ]
2024-11-19T02:32:10.727446+00:00
1,490,863,602,000
c152def57446140fdd07c7d38bbb527066fb3347
2
{ "blob_id": "c152def57446140fdd07c7d38bbb527066fb3347", "branch_name": "refs/heads/master", "committer_date": 1490863602000, "content_id": "bd325f3c024671639ad3225b0d160a7e8b552916", "detected_licenses": [ "MIT" ], "directory_id": "f4721a9dded44a481d3e60f2e9be101a782d7e00", "extension": "py", "fi...
2.375
stackv2
import sys import ast import pandas as pd from flask import Flask, jsonify, request from flasgger import Swagger from flasgger.utils import swag_from from resources import constants from utils import api_utils SWAGGER_CONFIG = { "headers": [ ], "specs": [ { "version": "0.1", ...
262
41.58
137
16
2,765
python
[{"finding_id": "codeql_py/flask-debug_8d2c27ae43f27acf_0fd30925", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
5
true
[ "CWE-215", "CWE-215", "CWE-079", "CWE-079", "CWE-079" ]
[ "py/flask-debug", "py/flask-debug", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1).", ...
[ 255, 257, 210, 223, 236 ]
[ null, null, null, null, null ]
[ 9, 9, 16, 16, 16 ]
[ 53, 28, 27, 27, 27 ]
2024-11-19T02:32:12.839291+00:00
1,663,088,527,000
49d44cab3dd5473db9f5411d512205cd12504d3b
2
{ "blob_id": "49d44cab3dd5473db9f5411d512205cd12504d3b", "branch_name": "refs/heads/main", "committer_date": 1663088527000, "content_id": "9330fe483ae2763021e255ef7ea9dd32baf4bc8b", "detected_licenses": [ "MIT" ], "directory_id": "0e87d1ca1f969f74ddcfb4906ad971486629472f", "extension": "py", "file...
2.5
stackv2
import re from flask import Flask, render_template, request, jsonify from flask_api import status from flask_cors import CORS from pymongo import MongoClient from werkzeug.security import generate_password_hash, check_password_hash from fill_database import fill_database_products app = Flask(__name__) client = Mongo...
328
31.05
109
15
2,278
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d528ffbea0e60f69_a0114b93", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 295 ]
[ null ]
[ 58 ]
[ 67 ]
2024-11-19T02:32:20.792768+00:00
1,449,131,932,000
229b0fe45a4c428d26996a01345952641e1263bf
3
{ "blob_id": "229b0fe45a4c428d26996a01345952641e1263bf", "branch_name": "refs/heads/master", "committer_date": 1449131932000, "content_id": "836703cbf4e8d0e8864b2a420df329931fae3579", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "71733d416bfc0255828ea9fff0536a65ceffecb0", "extension": "p...
2.53125
stackv2
#!/usr/bin/env python import argparse import ConfigParser import requests from flask import Flask, redirect app = Flask(__name__) parser = argparse.ArgumentParser(description='Flask app that redirects to the most relevant YouTube video based on a given query.') parser.add_argument('--config', default='default.conf',...
27
36.37
144
15
245
python
[{"finding_id": "codeql_py/flask-debug_68a24916640662ae_420bee81", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-601", "CWE-918" ]
[ "py/flask-debug", "py/url-redirection", "py/partial-ssrf" ]
[ "HIGH", "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Untrusted URL redirection depends on a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 26, 19, 17 ]
[ null, null, null ]
[ 5, 19, 14 ]
[ 24, 29, 37 ]
2024-11-19T02:54:53.790310+00:00
1,597,934,732,000
3318aecfa36dfbd26e744b929b1ea0322d467e15
3
{ "blob_id": "3318aecfa36dfbd26e744b929b1ea0322d467e15", "branch_name": "refs/heads/master", "committer_date": 1597934732000, "content_id": "a271d606f9dcbf3f72b849ad9b7c18562ff04b36", "detected_licenses": [ "MIT" ], "directory_id": "6fb297e4f210c34370504940902fbcaa34b530ce", "extension": "py", "fi...
2.59375
stackv2
#!/usr/bin/env python3 from flask import Flask, request import json import requests import telegram import config app = Flask(__name__) bot = telegram.Bot(token=config.TELEGRAM_API_TOKEN) API_HEADERS = { 'Accept': 'application/vnd.github.v3+json' } def send_message(text): print("Send message: " + text.repla...
91
33.41
110
18
726
python
[{"finding_id": "codeql_py/full-ssrf_95b38826e400c02c_b56772bb", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
1
true
[ "CWE-918" ]
[ "py/full-ssrf" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1)." ]
[ 37 ]
[ null ]
[ 16 ]
[ 58 ]
2024-11-19T02:55:03.889691+00:00
1,559,014,956,000
bbaa30a7d07f4c6e9fabdeb36933d5e2c5b07b00
3
{ "blob_id": "bbaa30a7d07f4c6e9fabdeb36933d5e2c5b07b00", "branch_name": "refs/heads/master", "committer_date": 1559014956000, "content_id": "8b5df3257172b35568c3fa814acea5f4a6e24a53", "detected_licenses": [ "MIT", "ICU" ], "directory_id": "e2a0d1fe07d8ee245e5e974b6073cfc0de47ed8b", "extension": ...
2.734375
stackv2
# -*- coding:utf-8 -*- import httplib from src.Client.Conf.config import * # import httplib import http.client import hashlib import urllib import random import re appid = 'your appId' # 你的appid secretKey = 'your Key' # 你的密钥 class Translate(): """ 负责长文本的翻译,默认中译英或者英译中,输入其他语言也可以。实际操作类。 """ def tran...
79
29.13
110
21
616
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_28e4bfd77abdcf45_e03feb60", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 35 ]
[ null ]
[ 19 ]
[ 23 ]
2024-11-19T02:55:09.099136+00:00
1,568,951,576,000
efe9aaa0a14653aa4396b31b929bcf71af061335
4
{ "blob_id": "efe9aaa0a14653aa4396b31b929bcf71af061335", "branch_name": "refs/heads/master", "committer_date": 1568951576000, "content_id": "bdf05fed555bd0e5ef3382c8cb17f69b01643adf", "detected_licenses": [ "MIT" ], "directory_id": "b194dee6adead31ee502d27dc800a0a141e315e5", "extension": "py", "fi...
3.65625
stackv2
# Function returns the name of site; Used to know which HTML tags to use for text extraction def getSite(page_url): if 'www.cnn.com' in page_url: return 'cnn' elif 'www.foxnews.com' in page_url: return 'fox' elif 'www.washingtonpost.com' in page_url: return 'WaPo' elif 'www.nbcne...
60
29.93
103
14
448
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_ccc270fd305b68c7_bebe8e40", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [www.cnn.com](1) may be at an arbitrary position in the...
4
true
[ "CWE-020", "CWE-020", "CWE-020", "CWE-020" ]
[ "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "The string [www.cnn.com](1) may be at an arbitrary position in the sanitized URL.", "The string [www.foxnews.com](1) may be at an arbitrary position in the sanitized URL.", "The string [www.washingtonpost.com](1) may be at an arbitrary position in the sanitized URL.", "The string [www.nbcnews.com](1) may be ...
[ 3, 5, 7, 9 ]
[ null, null, null, null ]
[ 8, 10, 10, 10 ]
[ 33, 39, 46, 39 ]
2024-11-19T02:55:16.239803+00:00
1,619,819,362,000
141f51d8368203063ce0f3526d6b36c278171ad0
3
{ "blob_id": "141f51d8368203063ce0f3526d6b36c278171ad0", "branch_name": "refs/heads/master", "committer_date": 1619819362000, "content_id": "aafd80158598e3306292e8f38baca6148a9709f4", "detected_licenses": [ "MIT" ], "directory_id": "76c54509b247fcd61d6ff943ecb9226542db1af5", "extension": "py", "fi...
2.875
stackv2
import logging from datetime import datetime from cloudant.client import CouchDB class DeviceManager: def __init__(self, couch_db_client: CouchDB, db_name: str): self.__client = couch_db_client try: self.__db = self.__client[db_name] logging.info(f"Connected to existing db ...
42
35.07
85
18
310
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8e9d8afd40f74db5_7e8e53d1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 24, 33 ]
[ null, null ]
[ 17, 17 ]
[ 86, 86 ]
2024-11-19T02:55:16.703867+00:00
1,572,600,990,000
263122d43240b450e96352f74050c6a4eab3ff72
3
{ "blob_id": "263122d43240b450e96352f74050c6a4eab3ff72", "branch_name": "refs/heads/master", "committer_date": 1572600990000, "content_id": "c3bfcccb99ad29e68feec91554297e2fe17c3880", "detected_licenses": [ "MIT" ], "directory_id": "b097c0436d45ed5698009f72009218acc200ca50", "extension": "py", "fi...
3.203125
stackv2
""" idealreport.create_html module contains functions to convert pandas DataFrame data to HTML """ import os import json import shutil # external libraries import htmltag import jinja2 # a counter used to assign each plot a unique ID NEXT_PLOT_INDEX = 1 def save(html, title, output_file): """ save HTML ou...
335
35.42
156
23
2,959
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_d0be930f26499265_0551d806", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 38 ]
[ null ]
[ 16 ]
[ 50 ]
2024-11-19T02:55:21.037456+00:00
1,661,763,545,000
0dac03c0f4b9f70d4c39bbba5107f7741b7be0b3
2
{ "blob_id": "0dac03c0f4b9f70d4c39bbba5107f7741b7be0b3", "branch_name": "refs/heads/master", "committer_date": 1661763545000, "content_id": "6b44485a243fbff177b9c661b2540e689ab46d42", "detected_licenses": [ "Apache-2.0" ], "directory_id": "6a7005ca7e418a18cbfeec296129873aef6446a4", "extension": "py"...
2.375
stackv2
''' Function: 搜狐模拟登录 Author: Charles 微信公众号: Charles的皮卡丘 更新日期: 2022-03-10 ''' import re import time import execjs import requests from hashlib import md5 '''PC端登录搜狐''' class sohuPC(): is_callable = True def __init__(self, **kwargs): for key, value in kwargs.items(): setattr(self, key, v...
170
36.99
163
18
1,704
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_3c326bbc79cd59f5_41ff2cdd", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.", "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally exp...
[ 44, 94 ]
[ null, null ]
[ 29, 29 ]
[ 62, 62 ]
2024-11-19T02:55:41.662792+00:00
1,691,608,182,000
375b1a54e2c6e0c848131d7876ab9cb1739cb4be
2
{ "blob_id": "375b1a54e2c6e0c848131d7876ab9cb1739cb4be", "branch_name": "refs/heads/main", "committer_date": 1691608182000, "content_id": "6bf15c5449a97f77b1737f60e09e987c9ea712f5", "detected_licenses": [ "ISC" ], "directory_id": "227762382eabdf753466e218c9b0361d3a1c3b41", "extension": "py", "file...
2.390625
stackv2
# # Copyright (C) 2009-2023 Alex Smith # # Permission to use, copy, modify, and/or distribute this software for any # purpose with or without fee is hereby granted, provided that the above # copyright notice and this permission notice appear in all copies. # # THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS A...
353
36.9
128
18
3,212
python
[{"finding_id": "codeql_py/overly-permissive-file_e89a876839e4f56f_5f664800", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable." ]
[ 230 ]
[ null ]
[ 13 ]
[ 37 ]
2024-11-19T02:55:44.340783+00:00
1,510,109,028,000
6d3f1bbd8fa2d1754d19e5ef12f0257965425f16
3
{ "blob_id": "6d3f1bbd8fa2d1754d19e5ef12f0257965425f16", "branch_name": "refs/heads/master", "committer_date": 1510109028000, "content_id": "c93e96daa553defb60831126555e6c6b5feca172", "detected_licenses": [ "Artistic-2.0" ], "directory_id": "4d6540706c6989458658d731d2b1dfc5bf82844a", "extension": "p...
2.828125
stackv2
""" Replacement for RUSA ACP brevet time calculator (see https://rusa.org/octime_acp.html) """ import flask from flask import request import arrow # Replacement for datetime, based on moment.js import acp_times # Brevet time calculations import config import logging ### # Globals ### app = flask.Flask(__name__) CO...
79
27.14
157
18
546
python
[{"finding_id": "codeql_py/log-injection_9fd88cdea73d1e59_3ad21668", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
2
true
[ "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 58, 59 ]
[ null, null ]
[ 22, 22 ]
[ 40, 61 ]
2024-11-19T02:55:52.548102+00:00
1,511,882,816,000
a6e6dd7aa32e4325256dbba3dd554e2d772e3ca2
2
{ "blob_id": "a6e6dd7aa32e4325256dbba3dd554e2d772e3ca2", "branch_name": "refs/heads/master", "committer_date": 1511882816000, "content_id": "7df5afcc170a6243fb7696626a58f5b30b276c60", "detected_licenses": [ "MIT" ], "directory_id": "0487f0778626faecec6c3b0c6f93bf85319a910e", "extension": "py", "fi...
2.375
stackv2
from paramiko import SSHClient,AutoAddPolicy from scp import SCPClient import Pscp.scp_get as sget import Pscp.scp_put as sput class SSh_Connect(): def __init__(self): self.ssh = "" self.scp = "" def get_dir(self,remote_path,local_path): scp_get = sget.Scp_Get(self.ssh,self.scp) ...
43
34.23
107
13
379
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_8256130316fa10cc_5a84760e", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 36 ]
[ null ]
[ 9 ]
[ 62 ]
2024-11-19T02:56:01.084781+00:00
1,467,397,054,000
dcfd7b9520e1b957f76b76869dab3ac657913a42
3
{ "blob_id": "dcfd7b9520e1b957f76b76869dab3ac657913a42", "branch_name": "refs/heads/master", "committer_date": 1467397054000, "content_id": "756b11a3ef092daab1ab879e4ffbd488381b9c99", "detected_licenses": [ "MIT" ], "directory_id": "6afe0336847e43617084f61215f61ea26a83725f", "extension": "py", "fi...
3.09375
stackv2
#!/usr/bin/env python import jinja2 class TemplateManager(): def __init__(self, template_dirs): ''' Init a TemplateManager object Args: - template_dirs (str) - Path to the directory/directories are stored ''' self._template_env = jinja2.Environme...
28
26.57
96
14
156
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_690659b0f39f899e_207f6187", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 16 ]
[ null ]
[ 30 ]
[ 97 ]
2024-11-19T03:10:24.465582+00:00
1,466,466,715,000
241a7e51c94510c99c7898a8e1866162b48ed198
2
{ "blob_id": "241a7e51c94510c99c7898a8e1866162b48ed198", "branch_name": "refs/heads/master", "committer_date": 1466466715000, "content_id": "2c5c804c64c23ca67f05ed3bb4b8618cb0504606", "detected_licenses": [ "MIT" ], "directory_id": "0ea28d2b1b2ac0991ab57232b8f79e11362a0692", "extension": "py", "fi...
2.34375
stackv2
import __future__ from appdirs import AppDirs import os import sys import tinify dirs = AppDirs("tinyPNG_dir", "milliiard.:") def get_config_file(): conf_file = os.path.join(dirs.user_data_dir, 'api-key.conf') return conf_file def test_api_key(api_key): try: tinify.key = api_key tinify.valida...
58
25.36
70
14
358
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_571d787a55cfd32f_fcd29b98", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 43 ]
[ null ]
[ 29 ]
[ 36 ]
2024-11-19T03:21:44.898381+00:00
1,675,070,211,000
bb29e464b77e091a2a196242ae3628dfdd17658e
3
{ "blob_id": "bb29e464b77e091a2a196242ae3628dfdd17658e", "branch_name": "refs/heads/master", "committer_date": 1675070211000, "content_id": "4046e814ce299a0de222cf82263d1327c286d0cc", "detected_licenses": [ "MIT" ], "directory_id": "f7778bf3b8173915c97193f51ff8a1ac2260a68a", "extension": "py", "fi...
2.796875
stackv2
import argparse import netifaces from scapy.all import * import sys import threading quiet = False stop_threads = False def print_message(message: str): """ Print message to STDOUT if the quiet option is set to False (this is the default). :param message: message to print :return: None """ gl...
162
34.29
117
12
1,333
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_cd65ffd5e95d2dee_49d1b36b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 19 ]
[ null ]
[ 15 ]
[ 22 ]
2024-11-19T03:21:52.498908+00:00
1,559,231,018,000
b797a980944e4dcc7c24b27e3144966cc5018204
2
{ "blob_id": "b797a980944e4dcc7c24b27e3144966cc5018204", "branch_name": "refs/heads/master", "committer_date": 1559231018000, "content_id": "8f3b4e2d2086d0608dbaa9e088b4c4f596e82d6c", "detected_licenses": [ "MIT" ], "directory_id": "5143e1b5c2c915317fe803ade33d775d9b744e85", "extension": "py", "fi...
2.34375
stackv2
import json, requests from flask import Flask, request from db import db, User, Stock import users_dao import re from twython import Twython withConsumerKey = #REMOVED API KEY consumerSecret = #REMOVED API KEY #import environment variables from the host OS #from os import environ app = Flask(__name__) db_filename ...
359
30.07
124
17
2,766
python
[{"finding_id": "codeql_py/flask-debug_eda9a33df9cc5a1a_f79ba6cd", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
7
true
[ "CWE-215", "CWE-079", "CWE-079", "CWE-079", "CWE-918", "CWE-918", "CWE-918" ]
[ "py/flask-debug", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/partial-ssrf", "py/partial-ssrf", "py/partial-ssrf" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a ...
[ 359, 122, 142, 320, 33, 277, 314 ]
[ null, null, null, null, null, null, null ]
[ 5, 16, 16, 12, 9, 13, 9 ]
[ 51, 28, 29, 92, 30, 34, 30 ]
2024-11-19T03:22:08.740287+00:00
1,534,823,005,000
b875b4b9b210ca49f47229a9beff97ad2b1649a2
4
{ "blob_id": "b875b4b9b210ca49f47229a9beff97ad2b1649a2", "branch_name": "refs/heads/master", "committer_date": 1534823005000, "content_id": "eb74e084ca1cea5e0e57ed82733e6ddab2afe259", "detected_licenses": [ "MIT" ], "directory_id": "a47ac7c64cb6bb1f181eadff8e4b24735c19080a", "extension": "py", "fi...
4.15625
stackv2
# 面向对象 class Person(object): '人类的基类' empCount = 0 def __init__(self, name, sex): self.name = name self.sex = sex Person.empCount += 1 # 注意: 方法的参数必须以self当第一个参数 # self代表类的实例(某个对象), 谁调用这个方法self就代表谁 def displayCount(self): print("被调用次数: %d" % Person.empCount) ...
102
16.31
65
11
688
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9f5efd8c27226767_18fb82eb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 20 ]
[ null ]
[ 53 ]
[ 61 ]
2024-11-19T03:22:15.288261+00:00
1,606,462,835,000
32d4f3f56750069cde4860d171c0c229418ab34f
2
{ "blob_id": "32d4f3f56750069cde4860d171c0c229418ab34f", "branch_name": "refs/heads/main", "committer_date": 1606462835000, "content_id": "8275074906ad6b1d6a5a9e7f9803a7f9bd7598e7", "detected_licenses": [ "MIT" ], "directory_id": "a037238f9af19f653117e5128d25483619494385", "extension": "py", "file...
2.3125
stackv2
from django.http import HttpResponse, JsonResponse from django.shortcuts import get_object_or_404, render from .utils.weather_api import WeatherAPI from .utils.validator import Validator from rest_framework.renderers import JSONRenderer from rest_framework.views import exception_handler from rest_framework import statu...
69
40.01
167
15
589
python
[{"finding_id": "codeql_py/stack-trace-exposure_b3a86056fa522876_5660b226", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 61 ]
[ null ]
[ 29 ]
[ 44 ]
2024-11-19T03:22:24.488552+00:00
1,570,122,801,000
a700799b160cd1f66f29e848378dbd29af7b1a44
3
{ "blob_id": "a700799b160cd1f66f29e848378dbd29af7b1a44", "branch_name": "refs/heads/master", "committer_date": 1570122801000, "content_id": "0a15c525b0c93170c47f2e4b977db133eb0bf2af", "detected_licenses": [ "MIT" ], "directory_id": "937e3138da3a8c6043139213141ce7b9f9caa401", "extension": "py", "fi...
2.59375
stackv2
""" hon_xml ~~~~~ :license: MIT, see LICENSE for more details. """ import hon import json import os import shutil from hon.parsing import MarkdownParser from hon.renderers import Renderer from hon.utils.fileutils import copy_from, filename_matches_pattern from io import StringIO from jinja2 import ( En...
174
33.51
109
21
1,249
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_cc5eafd30bdafb4a_e9ea955e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 147 ]
[ null ]
[ 37 ]
[ 60 ]
2024-11-19T03:43:53.087257+00:00
1,620,412,736,000
5f7d77972d2c53fd58e458cd2ac729e6601a779f
2
{ "blob_id": "5f7d77972d2c53fd58e458cd2ac729e6601a779f", "branch_name": "refs/heads/main", "committer_date": 1620412736000, "content_id": "97e45bf10afad983aec35354c3809101e5283bb3", "detected_licenses": [ "MIT" ], "directory_id": "07212cc7de85fb219db9f3c9ffed44c841ea8d0c", "extension": "py", "file...
2.4375
stackv2
import requests import json import os def get_api_key(): is_production = os.environ.get("IS_PRODUCTION", False) ### TODO: Uncomment when production is enabled on cloverly # return os.getenv("CLOVERY_PUBLIC_KEY") if is_production else os.getenv("CLOVERLY_SANDBOX_KEY") return ( os.environ.get("C...
109
31.32
100
13
1,061
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e36f3bc8254fd093_d4af13d2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 68 ]
[ null ]
[ 15 ]
[ 28 ]
2024-11-19T03:43:54.212225+00:00
1,514,368,650,000
e539ea094fc2802b5980a4ccb587527aee4e0186
2
{ "blob_id": "e539ea094fc2802b5980a4ccb587527aee4e0186", "branch_name": "refs/heads/master", "committer_date": 1514368650000, "content_id": "230bc139c4aabfca74cc02a59ecab3e260ef257b", "detected_licenses": [ "MIT" ], "directory_id": "03154a8a5329e4b6ead02e8166bbe46b0021a23e", "extension": "py", "fi...
2.34375
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- """Easy PS4 Exploit Hosting by Al-Azif Source: https://github.com/Al-Azif/ps4-exploit-host """ from __future__ import print_function import os import SimpleHTTPServer import socket import SocketServer import struct import subprocess import sys SCRIPT_LOC = os.path.rea...
248
28.69
80
20
2,075
python
[{"finding_id": "codeql_py/path-injection_3226fe7ad2c2964e_81e08921", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 63 ]
[ null ]
[ 27 ]
[ 45 ]
2024-11-19T03:44:27.963595+00:00
1,431,474,899,000
edfcd7699d5a70913b94ae4c3059ce5cb6609512
2
{ "blob_id": "edfcd7699d5a70913b94ae4c3059ce5cb6609512", "branch_name": "refs/heads/master", "committer_date": 1431474899000, "content_id": "36efb3bf3fde300862187502147739a62b5ffcfd", "detected_licenses": [ "Apache-2.0" ], "directory_id": "9faa75a49c1a458bd50a6a36b9c5c66e6e4eee83", "extension": "py"...
2.390625
stackv2
# Copyright 2015 Motorola Mobility # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in w...
430
35.67
117
22
3,193
python
[{"finding_id": "codeql_py/tarslip_4670d02fda3565aa_dd939550", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 423 ]
[ null ]
[ 21 ]
[ 24 ]
2024-11-19T02:08:18.994974+00:00
1,607,975,392,000
e6df73794e4ae8c37090e46121cb0ea5837859c9
3
{ "blob_id": "e6df73794e4ae8c37090e46121cb0ea5837859c9", "branch_name": "refs/heads/master", "committer_date": 1607975392000, "content_id": "4028c3b62478b73ef307add96e19703ea08cdb91", "detected_licenses": [ "MIT" ], "directory_id": "11a9b8a030817f3261ee8af627cae3207faf1a17", "extension": "py", "fi...
2.671875
stackv2
import base64 import importlib from flask import Blueprint, render_template, current_app tv_bp = Blueprint('tv', __name__, url_prefix='/tv') @tv_bp.route('/') def tv_index(): return 'this will render the tv control template, where you can power it on/off, change inputs, etc.' @tv_bp.route('/input/<inp>') def t...
64
28.59
105
12
405
python
[{"finding_id": "codeql_py/reflective-xss_6d03ae919376e85a_d7b8f578", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 36 ]
[ null ]
[ 16 ]
[ 52 ]
2024-11-19T02:08:37.435644+00:00
1,680,739,628,000
48e666df8ee3e964c2de7f865f34be5fb9157c83
3
{ "blob_id": "48e666df8ee3e964c2de7f865f34be5fb9157c83", "branch_name": "refs/heads/master", "committer_date": 1680739628000, "content_id": "55950c70b7850f50e26265dc0393083488ff8f82", "detected_licenses": [ "MIT" ], "directory_id": "330c41e75b18f74edc054058a621cbcc65103b56", "extension": "py", "fi...
2.671875
stackv2
import re macro_pattern = '<((?:\\w*\\s*)*)>' macro_regex = re.compile(macro_pattern) def parse_macro(obj): macro = re.findall(macro_regex, obj['id']) if len(macro) > 0: macro = list(map(normalize_id, macro)) obj['macro'] = macro obj['id'] = normalize_id(obj['id']) def normalize_id(...
19
25.58
63
13
134
python
[{"finding_id": "codeql_py/redos_319775d4ee3108fc_176a84f2", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '<' and containing many repetition...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '<' and containing many repetitions of ' '." ]
[ 3 ]
[ null ]
[ 26 ]
[ 29 ]
2024-11-19T02:21:31.898118+00:00
1,594,754,175,000
33136ad350d747192818f19a528e8fbc64bca05e
2
{ "blob_id": "33136ad350d747192818f19a528e8fbc64bca05e", "branch_name": "refs/heads/master", "committer_date": 1594754175000, "content_id": "f3efffc8eca07334c7ba4f48d63311c550202643", "detected_licenses": [ "MIT" ], "directory_id": "186a1dedfd28edb60c3407867d47e17f5a8486f0", "extension": "py", "fi...
2.40625
stackv2
import collections import calendar import datetime import dateutil import simplejson import requests from requests.auth import HTTPBasicAuth from datapackage_pipelines.generators import slugify from datapackage_pipelines.wrapper import ingest, spew from datapackage_pipelines_measure.config import settings import lo...
190
37.24
79
15
1,579
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_caccd754b8322a1a_63fac60d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 31, 38 ]
[ 32, null ]
[ 19, 19 ]
[ 63, 77 ]
2024-11-19T02:21:34.995720+00:00
1,618,525,185,000
1d984ceae812aa673abd77dd7e5305afe38d488a
2
{ "blob_id": "1d984ceae812aa673abd77dd7e5305afe38d488a", "branch_name": "refs/heads/master", "committer_date": 1618525185000, "content_id": "8b2d0d0bd374ddb6d3884af5abcc84796e3a5985", "detected_licenses": [ "MIT" ], "directory_id": "92ab2c1accf80bf00dda4ac43d3a015f0dee5513", "extension": "py", "fi...
2.40625
stackv2
import shutil import subprocess import tarfile from pathlib import Path import numpy as np from observations import maybe_download_and_extract default_max_pixels = 1260 * 840 def image_files_to_array(image_files, max_pixels=default_max_pixels): import cv2 # https://stackoverflow.com/a/15074748/1692437 ...
99
29.52
97
17
796
python
[{"finding_id": "codeql_py/tarslip_e54b0ff0789b652a_d35cc79f", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 32 ]
[ null ]
[ 13 ]
[ 14 ]
2024-11-19T03:10:12.481413+00:00
1,631,073,984,000
ee1a1cc10ea3ff7443ee995195f28775b7cf7ce9
3
{ "blob_id": "ee1a1cc10ea3ff7443ee995195f28775b7cf7ce9", "branch_name": "refs/heads/master", "committer_date": 1631073984000, "content_id": "bbe75ce4891c674447799a0228a4a8dcd2406ba0", "detected_licenses": [ "MIT" ], "directory_id": "b4c48fd9048a04bce0c20b197dab7a6b058a1d9f", "extension": "py", "fi...
3.265625
stackv2
""" Python Utility to class for OpenNotify API to track the International Space Station """ import time import json import argparse import logging import requests logging.basicConfig(format='%(asctime)s - %(message)s', level=logging.INFO) class ISSTracking: """ Python Wrapper Class to interact with OpenNoti...
146
39.47
129
17
1,214
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_517caf9d1c934910_cb395ab5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (priva...
[ 48, 79 ]
[ 50, 82 ]
[ 22, 26 ]
[ 114, 103 ]
2024-11-19T03:22:51.294709+00:00
1,693,419,318,000
63f5ecc2b1ac1eb90b4d8624ef707eb565876b93
3
{ "blob_id": "63f5ecc2b1ac1eb90b4d8624ef707eb565876b93", "branch_name": "refs/heads/master", "committer_date": 1693419318000, "content_id": "b1b576f9ef1fb89b5b9b846bf08e111f3ea6ee48", "detected_licenses": [ "MIT" ], "directory_id": "7c63a96fad4257f4959ffeba0868059fc96566fb", "extension": "py", "fi...
2.5625
stackv2
#!/usr/local/bin/python3 import cgi, shelve, sys, os shelvname = 'class-shelve' fieldnames = ('name', 'age', 'job', 'pay') form = cgi.FieldStorage() print('Content-type: text/html') sys.path.insert(0, os.getcwd()) # main html template replyhtml = """ <html> <head> <meta charset="utf-8"> <title>Peo...
90
26.02
75
16
626
python
[{"finding_id": "codeql_py/code-injection_05f632345e1ec2f7_9199c7e4", "tool_name": "codeql", "rule_id": "py/code-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This code execution depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "...
1
true
[ "CWE-094" ]
[ "py/code-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This code execution depends on a [user-provided value](1)." ]
[ 73 ]
[ null ]
[ 41 ]
[ 58 ]
2024-11-19T03:23:02.098220+00:00
1,416,902,930,000
53e4483b2d1c4218c04b6618488c6ba0dddc1233
2
{ "blob_id": "53e4483b2d1c4218c04b6618488c6ba0dddc1233", "branch_name": "refs/heads/master", "committer_date": 1416902930000, "content_id": "3d05c669377f5b38bfff4376b5c74fd7c183d3b3", "detected_licenses": [ "MIT" ], "directory_id": "c108a9525f5b3bbbaffd7217ed4ff5a114512334", "extension": "py", "fi...
2.390625
stackv2
# all the imports import sqlite3 from flask import Flask from flask import request import database app = Flask(__name__) @app.route('/') def hello_world(): return 'Welcome to the songbook api :) There will be a list of functions on this page later' @app.route('/getSong') def get_song(): songId = request.args.get...
29
17.66
96
10
134
python
[{"finding_id": "codeql_py/reflective-xss_011e178cfaf2deeb_7209e3dc", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 15 ]
[ null ]
[ 9 ]
[ 15 ]
2024-11-19T01:34:53.057406+00:00
1,608,646,852,000
7751f1e3ba7d8cf9ad74fafb4db7d6739512e25c
2
{ "blob_id": "7751f1e3ba7d8cf9ad74fafb4db7d6739512e25c", "branch_name": "refs/heads/main", "committer_date": 1608646852000, "content_id": "78e49d7551008e5fe9aef96845ee4b92b11e4f25", "detected_licenses": [ "MIT" ], "directory_id": "4dbdcaa679eeb389efda7106bfee58bf30ef3c1f", "extension": "py", "file...
2.421875
stackv2
#!/usr/bin/env python3 import os import json import requests from requests.auth import HTTPBasicAuth import argparse import urllib3 urllib3.disable_warnings() # Define the program description desc = 'monitor.py monitors the stdout output from Ansible Tower Jobs.' # Initiate the parser with a description parser = arg...
57
29.26
143
11
443
python
[{"finding_id": "codeql_py/request-without-cert-validation_a05588e4d9e0f373_e10f5615", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 53 ]
[ null ]
[ 5 ]
[ 144 ]
2024-11-19T02:08:00.467302+00:00
1,378,929,631,000
33a76e6cdb1fca427f7c1b3225d0f9fd3a47f035
3
{ "blob_id": "33a76e6cdb1fca427f7c1b3225d0f9fd3a47f035", "branch_name": "refs/heads/master", "committer_date": 1378929631000, "content_id": "61e58786ec728ed6851f4c8444fa8c22b47e4cb3", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "7fa4f568ca4b82fe651be90a62e63e1649061ce3", "extension": "p...
2.8125
stackv2
""" ====================================================== Out-of-core classification of text documents ====================================================== This is an example showing how scikit-learn can be used for classification using an out-of-core approach: learning from data that doesn't fit into main memory. ...
281
32.93
79
16
2,217
python
[{"finding_id": "codeql_py/tarslip_16906e8fe883cc36_66b02a82", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 162 ]
[ null ]
[ 9 ]
[ 43 ]
2024-11-19T02:08:11.917188+00:00
1,489,612,993,000
140fec981591c33b4aed8d0069459e531e573420
3
{ "blob_id": "140fec981591c33b4aed8d0069459e531e573420", "branch_name": "refs/heads/master", "committer_date": 1489612993000, "content_id": "a82e83814a7e95f757721b03512be0f2d9a16fe9", "detected_licenses": [ "MIT" ], "directory_id": "2e66b0308682190865de55b1de10ff666b9af2f1", "extension": "py", "fi...
2.75
stackv2
"""Config file (settings.py) creator. Configuration variable value priorities: 1. Environment variable 2. Pre-existing settings file 3. Default (ENV_VAR_DEFAULTS) Note: To set values to be treated as boolean "false", set them as empty strings. This script must be run (`python populate_settings.py`) in order to cr...
113
29.48
80
14
870
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_938a206cbdc346ae_75a2e318", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 92 ]
[ 94 ]
[ 7 ]
[ 2 ]
2024-11-19T02:17:15.874148+00:00
1,552,809,973,000
8f5c96c05ab310c2d103da4992eebd480d4b49d8
3
{ "blob_id": "8f5c96c05ab310c2d103da4992eebd480d4b49d8", "branch_name": "refs/heads/master", "committer_date": 1552809973000, "content_id": "6c970477719f9a748df677bc182009732572692e", "detected_licenses": [ "MIT" ], "directory_id": "20fe66cb8061871107f54bcd30e598da0808b6cd", "extension": "py", "fi...
3.453125
stackv2
# -------------- #Code starts here message_6 = read_file(file_path_6) print(message_6) def extract_msg(message_f): a_list = message_f.split() even_word = lambda x: len(x)%2==0 b_list = list(filter(even_word, a_list)) final_message = " ".join(b_list) print(final_message) return final_message s...
129
18.65
70
11
656
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_d815fdc63dbb25d6_9cfb0e90", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.\nT...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive data (secret)](2) as clear text.\nThis expression stores [sensitive data (secret)](3) as clear text.\nThis expression stores [sensitive data (secret)](4) as clear text.\nThis expression stores [sensitive data (sec...
[ 81, 85, 125 ]
[ null, null, null ]
[ 21, 7, 7 ]
[ 31, 17, 19 ]
2024-11-19T02:17:23.122912+00:00
1,477,762,664,000
71153c5d1e23ec72a0bb80018fa8a62a9f1cf86f
3
{ "blob_id": "71153c5d1e23ec72a0bb80018fa8a62a9f1cf86f", "branch_name": "refs/heads/master", "committer_date": 1477762664000, "content_id": "d2f2b9b784c2064d88e463b223b7c864bd312c08", "detected_licenses": [ "MIT" ], "directory_id": "b3fbb95ebcfc33fc566138a50258bb6297908096", "extension": "py", "fi...
2.515625
stackv2
# -*- coding: utf-8 -*- DEFAULT_PORT = 5000 ADDITIVE_FOR_UID = 1000 try: from os import getuid except ImportError: def getuid(): return DEFAULT_PORT - ADDITIVE_FOR_UID from time import sleep from celery import Celery from flask import Flask, render_template, request, jsonify from bs4 import Beautif...
146
23.63
81
14
885
python
[{"finding_id": "codeql_py/flask-debug_525805a18d1b0169_bef57023", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-116" ]
[ "py/flask-debug", "py/bad-tag-filter" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This regular expression does not match comments containing newlines." ]
[ 146, 82 ]
[ null, null ]
[ 5, 21 ]
[ 58, 30 ]
2024-11-19T02:17:26.795149+00:00
1,567,978,082,000
30b7a108cda92ba07b5f78668a2a324b7ded07ad
3
{ "blob_id": "30b7a108cda92ba07b5f78668a2a324b7ded07ad", "branch_name": "refs/heads/master", "committer_date": 1567978082000, "content_id": "59d960114d7a7c5920377757d0d94802dabcf0cb", "detected_licenses": [ "MIT" ], "directory_id": "a4eb9d8bf9b04306e661581df25cb0bd891c9012", "extension": "py", "fi...
2.53125
stackv2
import os import sys import pytz from werkzeug.urls import url_parse from sqlalchemy import desc, or_ from app import app, db, images from app.forms import LoginForm, RegisterForm, AddAdForm, SearchForm from app.models import User, Ad, Image from flask import render_template, flash, redirect, url_for, request from fla...
246
40.29
171
23
2,301
python
[{"finding_id": "codeql_py/url-redirection_1c85be5f742a5603_b340bc3e", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 45 ]
[ null ]
[ 25 ]
[ 34 ]
2024-11-19T02:17:30.490881+00:00
1,587,541,493,000
3485701789ff7ae2030e983eeae09ad86b62a9b3
3
{ "blob_id": "3485701789ff7ae2030e983eeae09ad86b62a9b3", "branch_name": "refs/heads/master", "committer_date": 1587541493000, "content_id": "3b81ab069b45182779bd8a3edab07499004084a7", "detected_licenses": [ "MIT" ], "directory_id": "8fb2a75126412e655db6bbd6e9615691ce24da87", "extension": "py", "fi...
3.359375
stackv2
import random import string import pyperclip class userAccounts: ''' Class that stores user accounts and credentials ''' accounts = [] def __init__(self, platform, username, password): ''' this function allows users to store their various account details Args: platform...
60
30.2
116
15
354
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1ca5f325f560b06e_d15d1e02", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 54 ]
[ null ]
[ 19 ]
[ 116 ]
2024-11-19T02:17:31.525606+00:00
1,433,605,322,000
d136dbf17f641e41e996e2567e83f7be10f6f648
3
{ "blob_id": "d136dbf17f641e41e996e2567e83f7be10f6f648", "branch_name": "refs/heads/master", "committer_date": 1433605322000, "content_id": "04007768a1d973528fb5f7bcab5c1a2d8021e6fc", "detected_licenses": [ "Apache-2.0" ], "directory_id": "2603b4efaa7034e7d465b200b19e519d811a618b", "extension": "py"...
2.53125
stackv2
#coding:UTF-8 """ 短网址生成器 @author:yubang 2015-06-06 """ from flask import Blueprint,render_template,make_response,request,abort,redirect from werkzeug.contrib.cache import SimpleCache from models import Session,UrlModel import hashlib,json sApp=Blueprint("shortUrl",__name__) cache=SimpleCache() @sApp.route("/") def...
75
20.57
80
15
425
python
[{"finding_id": "codeql_py/reflective-xss_9ef1af204bde1e13_16ff723e", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 47 ]
[ null ]
[ 30 ]
[ 53 ]
2024-11-19T02:18:12.939290+00:00
1,553,609,036,000
155348df5569c00e95115f7aed36e746d6aa5a5d
2
{ "blob_id": "155348df5569c00e95115f7aed36e746d6aa5a5d", "branch_name": "refs/heads/master", "committer_date": 1553609036000, "content_id": "6abcc1ba71b13208b5cba055ca475ec4114e0795", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "646a5f11c4a5e1385e4e989713bb739a34f08a56", "extension": "p...
2.34375
stackv2
#!/usr/bin/python # Copyright 2018, Sourcepole AG # All rights reserved. # # This source code is licensed under the BSD-style license found in the # LICENSE file in the root directory of this source tree. from flask import Flask, request, jsonify, Response, stream_with_context from flask_cors import CORS import reques...
41
39.02
103
15
381
python
[{"finding_id": "codeql_py/flask-debug_c55fa9611562245d_39b7d7ec", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
5
true
[ "CWE-215", "CWE-918", "CWE-918", "CWE-918", "CWE-918" ]
[ "py/flask-debug", "py/full-ssrf", "py/full-ssrf", "py/full-ssrf", "py/full-ssrf" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "The full URL of this request depends on a [user-provided value](1).", "The full URL of this request depends on a [user-provided value](1).", "The full URL of this request depends on a [user-...
[ 41, 24, 27, 29, 31 ]
[ null, null, null, null, null ]
[ 5, 15, 15, 15, 15 ]
[ 35, 100, 99, 60, 57 ]
2024-11-19T02:18:16.241775+00:00
1,541,179,763,000
3385195ee559e9575b2369851f12b66d180fab12
3
{ "blob_id": "3385195ee559e9575b2369851f12b66d180fab12", "branch_name": "refs/heads/master", "committer_date": 1541179763000, "content_id": "b4abf2a7e79f857d83c5a852ac2173140934ec71", "detected_licenses": [ "Apache-2.0" ], "directory_id": "392338a94e1d65eddda2401d1fa6bfd776bd165d", "extension": "py"...
2.5625
stackv2
from flask import Flask from flask import jsonify,request import pickle import ModelUtils as ut from sklearn.cross_validation import train_test_split algrithm_name = "" trained_model = "" app = Flask(__name__) @app.route("/train",methods=['GET']) def training_step(): ### Training Step global algrithm_name algrith...
51
33.35
104
12
474
python
[{"finding_id": "codeql_py/flask-debug_4d1e8a889fbe419d_e6e36c64", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
6
true
[ "CWE-215", "CWE-079", "CWE-079", "CWE-079", "CWE-022", "CWE-022" ]
[ "py/flask-debug", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a ...
[ 51, 27, 45, 47, 22, 25 ]
[ null, null, null, null, null, null ]
[ 5, 9, 10, 10, 35, 35 ]
[ 39, 87, 105, 104, 48, 48 ]
2024-11-19T02:18:22.290966+00:00
1,544,204,704,000
39eac06f51232a213e071221b7b9d1e76a27c3c5
3
{ "blob_id": "39eac06f51232a213e071221b7b9d1e76a27c3c5", "branch_name": "refs/heads/master", "committer_date": 1544204704000, "content_id": "02446294b31b7de7b5260010fe60b35e28d05574", "detected_licenses": [ "MIT" ], "directory_id": "7d8bbb560965f736fb1f5c64f51f441b8c058b7d", "extension": "py", "fi...
3.140625
stackv2
from flask import Flask, request, jsonify from sklearn.externals import joblib import numpy as np from flask_cors import CORS app = Flask(__name__) CORS(app) clf = joblib.load('./model/logreg.pkl') def getParameters(): age = request.args.get('age') sex = request.args.get('sex') cigsPerDay = request.args....
94
31.71
179
19
748
python
[{"finding_id": "codeql_py/stack-trace-exposure_b18ba0e76bed9918_88c311c2", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 65 ]
[ null ]
[ 28 ]
[ 78 ]
2024-11-19T02:19:03.320320+00:00
1,570,825,142,000
78cf89afd962cd28d94d46de4dffc8aeba6f0f9a
3
{ "blob_id": "78cf89afd962cd28d94d46de4dffc8aeba6f0f9a", "branch_name": "refs/heads/master", "committer_date": 1570825142000, "content_id": "2f006494857ad4baf6f3065b597b4f78c6b0a25b", "detected_licenses": [ "MIT" ], "directory_id": "166ae271ba243de5201497daf5ead08ef53e2118", "extension": "py", "fi...
2.59375
stackv2
''' Backup all overleaf projects locally. Use a git clone to the backup and then loop through pulling. Adapted from https://github.com/tdurieux/overleaf-backup/blob/master/overleaf_backup.py To run this, you need: (1) Change the output script. (2) Save your email and password for overleaf with git-credentials (https...
245
31.76
155
19
1,880
python
[{"finding_id": "codeql_py/request-without-cert-validation_efe474677168034c_55d488b7", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
7
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 74, 83, 90, 142, 152, 175, 200 ]
[ null, null, null, null, null, null, null ]
[ 9, 13, 9, 9, 13, 13, 13 ]
[ 39, 50, 39, 71, 68, 56, 56 ]
2024-11-19T02:29:53.721780+00:00
1,692,606,856,000
2c5abdf24f6f52ec0e89ace2077787cc5dcf735b
3
{ "blob_id": "2c5abdf24f6f52ec0e89ace2077787cc5dcf735b", "branch_name": "refs/heads/main", "committer_date": 1692606856000, "content_id": "30047d562e8820434450c089b798e12f7392bd98", "detected_licenses": [ "Apache-2.0" ], "directory_id": "ddddaa700e4642f46a2c1e1e0271a7c8ea62ba0f", "extension": "py", ...
2.6875
stackv2
""" This file loads the training and validation data for model_def """ import logging import os import shutil import tarfile import numpy as np import torch import wget from torch.utils.data import Dataset class PadSequence: def __call__(self, batch): features = batch[:-1] labels = batch[1:] ...
110
28.81
98
16
855
python
[{"finding_id": "codeql_py/tarslip_a7a20884909bf4ac_a496fd98", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 96 ]
[ null ]
[ 5 ]
[ 7 ]
2024-11-19T02:30:06.491368+00:00
1,532,470,257,000
21d42b2df8e3ec7e566b394239cc46ad2cd29ce5
3
{ "blob_id": "21d42b2df8e3ec7e566b394239cc46ad2cd29ce5", "branch_name": "refs/heads/master", "committer_date": 1532470257000, "content_id": "e11e2a9fdae6906ef4ac9faf06eeeab70c04acd6", "detected_licenses": [ "Unlicense" ], "directory_id": "20bf11c44b00ff220160a62a25b7a624274f6a75", "extension": "py",...
3.28125
stackv2
import os import urllib.request import random URL = 'https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt' FILE_NAME = URL.split('/')[-1] THIS_DIR = os.path.dirname(os.path.realpath(__file__)) WORDLIST = os.path.join(THIS_DIR, FILE_NAME) def download_wordlist(): '''Download the EFF wordlist if not there a...
47
27.66
82
15
340
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2f07e0601e90e158_05e2d1de", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 47 ]
[ null ]
[ 11 ]
[ 21 ]
2024-11-19T02:30:17.241044+00:00
1,681,488,686,000
81c8fc0900fda6742cd29906a87106f25d61f157
3
{ "blob_id": "81c8fc0900fda6742cd29906a87106f25d61f157", "branch_name": "refs/heads/master", "committer_date": 1681488686000, "content_id": "56f462529f84d6eb2f1e3b81d1a3d4acc89ecd3f", "detected_licenses": [ "MIT" ], "directory_id": "5908a3d8bcb5a5efdb4d7880b24125a4603aa676", "extension": "py", "fi...
3.265625
stackv2
""" read from a SQLite database and return data """ from flask import Flask from flask_sqlalchemy import SQLAlchemy # this variable, db, will be used for all SQLAlchemy commands db = SQLAlchemy() # create the app app = Flask(__name__) # change string to the name of your database; add path if necessary db_name = 'sock...
54
29.67
76
17
403
python
[{"finding_id": "codeql_py/stack-trace-exposure_20c0a035bb01b74d_c2460897", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-215" ]
[ "py/stack-trace-exposure", "py/flask-debug" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger." ]
[ 51, 54 ]
[ null, null ]
[ 16, 5 ]
[ 32, 24 ]
2024-11-19T02:30:24.201765+00:00
1,554,478,578,000
1f78dce8219301b7208fa04e0971071ecdf18b4e
3
{ "blob_id": "1f78dce8219301b7208fa04e0971071ecdf18b4e", "branch_name": "refs/heads/master", "committer_date": 1554479493000, "content_id": "cd151f0eb5aa28bbd1257de37b0d91f7932d7e22", "detected_licenses": [ "MIT" ], "directory_id": "78a53d64c6969fc340944c44329bd7916ada4478", "extension": "py", "fi...
2.703125
stackv2
# -*- coding: utf-8 -*- import re from collections import defaultdict from dateutil.parser import parse from city_scrapers.constants import BOARD from city_scrapers.spider import Spider class DetDowntownDevelopmentAuthoritySpider(Spider): name = 'det_downtown_development_authority' agency_name = 'Detroit Do...
137
37.22
95
16
1,181
python
[{"finding_id": "codeql_py/overly-large-range_652f5e158a39ef60_da19b1a1", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 110 ]
[ null ]
[ 37 ]
[ 40 ]
2024-11-19T02:30:30.630237+00:00
1,612,332,983,000
1ab30d36badfbb04080b8c96f90231ecdee96977
2
{ "blob_id": "1ab30d36badfbb04080b8c96f90231ecdee96977", "branch_name": "refs/heads/main", "committer_date": 1612332983000, "content_id": "8411b8a0d27c225b933229274ddf5ae6eee62adc", "detected_licenses": [ "MIT" ], "directory_id": "963fe46a05267f900a88ac04cdbd73256d82a590", "extension": "py", "file...
2.5
stackv2
import config import logging import whois import datetime import OpenSSL import ssl, socket from aiogram import Bot, Dispatcher, executor, types # задаем уровень логов logging.basicConfig(level=logging.INFO) # инициализируем бота bot = Bot(token=config.API_TOKEN) dp = Dispatcher(bot) # Команда активации подпи...
107
25.44
84
15
691
python
[{"finding_id": "codeql_py/insecure-protocol_cdd7a86ed13a9d5c_f350e5be", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/...
1
true
[ "CWE-327" ]
[ "py/insecure-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.create_default_context](1)." ]
[ 87 ]
[ null ]
[ 16 ]
[ 23 ]
2024-11-19T02:30:39.214287+00:00
1,620,404,278,000
b281d60344b57531f93e8b90b3f0bfd3d74a0dd0
3
{ "blob_id": "b281d60344b57531f93e8b90b3f0bfd3d74a0dd0", "branch_name": "refs/heads/main", "committer_date": 1620404278000, "content_id": "a5c6e5f3f6c14bebf6b47b289a2977f1a4a95829", "detected_licenses": [ "MIT" ], "directory_id": "dbc9ab40c50b564ec3caf9b9b6827af2800187f7", "extension": "py", "file...
2.96875
stackv2
import csv import logging import os import re words = [] meanings = {} logger = logging.getLogger(__name__) def list_files(gender): path = f"./extracts/{gender}" source_paths = [f"{path}/{f}" for f in os.listdir(path)] return [ f"{source_path}/{f}" for source_path in source_paths ...
51
28.24
77
19
355
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_93f994c2461745ea_a30b2362", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 35 ]
[ null ]
[ 26 ]
[ 77 ]
2024-11-19T02:30:39.820797+00:00
1,594,854,498,000
3dfb368011aa5a9bb7ba225c1234e2b58e5f4cce
3
{ "blob_id": "3dfb368011aa5a9bb7ba225c1234e2b58e5f4cce", "branch_name": "refs/heads/master", "committer_date": 1594854498000, "content_id": "d6ed6f143b2a28403a234c218b74609ca20daf7a", "detected_licenses": [ "MIT" ], "directory_id": "01572d7200249e3a95fef8638b66a0f71a1c0efa", "extension": "py", "fi...
2.703125
stackv2
# load_ext autoreload # autoreload 2 from openpyxl import load_workbook from collections import namedtuple import jinja2 from os.path import join as pathjoin wb = load_workbook('SYSH_suite.xlsx') print(wb.sheetnames) first_column = 'A' last_column = 'O' first_row = 2 last_row = 26 col_range = f"{first_column}:{las...
78
20.72
76
14
455
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_8c9f8c7a1344f115_fcc114c1", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 39 ]
[ 51 ]
[ 19 ]
[ 2 ]
2024-11-19T02:41:42.953626+00:00
1,620,949,724,000
0b7b2fb3633230b00eebae35c2dfe0a88da61d0a
4
{ "blob_id": "0b7b2fb3633230b00eebae35c2dfe0a88da61d0a", "branch_name": "refs/heads/master", "committer_date": 1620949724000, "content_id": "7c6f66495bf6fad7ba185ce46ef2fe6b1a917f80", "detected_licenses": [ "MIT" ], "directory_id": "431e2cde796554e66190e613baca3e78b8de19f4", "extension": "py", "fi...
3.890625
stackv2
import random print('\nI can assist you in generating a password!') char = 'abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789' number = input('\nInput the number of password you need: ') number = int(number) length = input('Input the length of your proposed password: ') length = int(length) print('\nHe...
18
26.22
71
10
107
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_129a881335278a42_ab86cbe3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 18 ]
[ null ]
[ 11 ]
[ 20 ]
2024-11-19T02:41:53.343545+00:00
1,577,819,157,000
5a4bad0a66a0cb41002e39bbc1b8698280e153e9
3
{ "blob_id": "5a4bad0a66a0cb41002e39bbc1b8698280e153e9", "branch_name": "refs/heads/master", "committer_date": 1577819157000, "content_id": "25906aa398b00988ac205e24ce1ad78259cf44aa", "detected_licenses": [ "MIT" ], "directory_id": "d21dd5a8caff1ef4439aee0ed5946e1d01a81fb8", "extension": "py", "fi...
2.921875
stackv2
from parse_source import parse from random import random from jinja2 import Template import datetime import source import time import gcal URL = 'https://docs.google.com/spreadsheets/d/1J6B-dp2syrz_uQIy0BvyxKas8InCUWXG4Fn9hKeMRZI/edit?usp=sharing' def get_source_data(): _, data = source.convert_to_dict(source.get...
44
31.93
108
14
351
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_7d20f449ea88d866_1de2d8be", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 17 ]
[ null ]
[ 16 ]
[ 109 ]
2024-11-19T02:41:59.096953+00:00
1,393,762,578,000
a85ab817293dbe033bed8214bf7b76ac14b90276
3
{ "blob_id": "a85ab817293dbe033bed8214bf7b76ac14b90276", "branch_name": "refs/heads/master", "committer_date": 1393762578000, "content_id": "5a6bc25869a015b17d512b04b29bbad2459cc133", "detected_licenses": [ "Unlicense" ], "directory_id": "4abd886766eea4d78457cf00dc2a8377d0ea5cee", "extension": "py",...
2.90625
stackv2
import sys comargs = sys.argv inUrl = comargs[1] depth = int(comargs[2]) def getPage(url): import urllib2 res=urllib2.urlopen(url) return res.read() def getNextLink(page, URL): import re #p1 = re.compile('<a.*(\W.)*.*href=', re.IGNORECASE) pat = r"<a\s*href=\s*('(.*?)'|\"(.*?)\")" p1 = re....
126
26.37
62
17
891
python
[{"finding_id": "codeql_py/bad-tag-filter_cce3418d604528e0_36f42485", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression only parses --> and not --!> as a HTML comment end tag.", "remediation": "", "location":...
1
true
[ "CWE-116" ]
[ "py/bad-tag-filter" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression only parses --> and not --!> as a HTML comment end tag." ]
[ 53 ]
[ null ]
[ 23 ]
[ 26 ]
2024-11-19T02:42:23.309244+00:00
1,474,999,294,000
7e15cd169d4f28e5a0a4a814018d13c32a970432
2
{ "blob_id": "7e15cd169d4f28e5a0a4a814018d13c32a970432", "branch_name": "refs/heads/master", "committer_date": 1474999294000, "content_id": "8c83154323c84c5d9a5bb68fefbfb5a868d34789", "detected_licenses": [ "MIT" ], "directory_id": "1503ed2ceede343756079178b3f54935c16467bc", "extension": "py", "fi...
2.453125
stackv2
#!/usr/bin/python DOCUMENTATION = """ --- module: x509_certificate short_description: Create X.509 certificates. requirements: - cryptography (python 2) author: Fabian Peter Hammerle """ from ansible.module_utils.basic import AnsibleModule from cryptography import utils from cryptography import x509 from cryptograph...
148
35.2
111
28
1,164
python
[{"finding_id": "codeql_py/overly-permissive-file_b5546acb990c2b60_cacceb49", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable." ]
[ 49 ]
[ null ]
[ 5 ]
[ 25 ]
2024-11-18T18:05:52.076693+00:00
1,448,350,095,000
23e45dafe4521f680760c37350608270e85bdbe4
3
{ "blob_id": "23e45dafe4521f680760c37350608270e85bdbe4", "branch_name": "refs/heads/master", "committer_date": 1448350095000, "content_id": "b35167428f00869528e078c49609eba8a269cfd5", "detected_licenses": [ "Apache-2.0" ], "directory_id": "20e3319edb79090901dcddb5aac43aa25e596448", "extension": "py"...
2.828125
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- from __future__ import unicode_literals import re from builtins import open import chardet from janome.tokenizer import Tokenizer def read(filepath): ''' マルチバイトを含むテキストファイルを読み込んで文字コードを検出した上でユニコード文字列にして返す ''' with open(filepath, mode='rb') as file_: ...
72
20.88
111
12
461
python
[{"finding_id": "codeql_py/overly-large-range_d9add23657e8a1d6_068984e2", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_`a-z{{|}}~\\u007f\\u008...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_`a-z{{|}}~\\u007f\\u0080\\u0081\\u...." ]
[ 61 ]
[ null ]
[ 47 ]
[ 50 ]
2024-11-18T18:15:59.589135+00:00
1,585,764,319,000
ef32c8596280659ea12650d52eb586d55484a19f
4
{ "blob_id": "ef32c8596280659ea12650d52eb586d55484a19f", "branch_name": "refs/heads/master", "committer_date": 1585764319000, "content_id": "6bcf882018c9300a8b1f4730ccd72e2107a634d8", "detected_licenses": [ "MIT" ], "directory_id": "9eaa2c64a777bd24a3cccd0230da5f81231ef612", "extension": "py", "fi...
4.34375
stackv2
""" 总结不建议的写法 1.在类外添加实例成员 2.通过类访问实例方法(特殊情况除外) 3.通过实例访问类成员 """ class Student: count = 0 def __init__(self,name,sex): self.name = name self.sex = sex def print_self(self): print(self.name,self.sex) s01 = Student("无忌", "男") s02 = Student("学习", "保密") s01.print_...
33
15.48
33
10
204
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_31adee217469aa0f_84dba9e0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 13 ]
[ null ]
[ 25 ]
[ 33 ]
2024-11-18T19:11:48.866232+00:00
1,638,123,111,000
fd75effb68b2c646a78cfdc990a9dca2e36ae1ff
3
{ "blob_id": "fd75effb68b2c646a78cfdc990a9dca2e36ae1ff", "branch_name": "refs/heads/master", "committer_date": 1638123111000, "content_id": "01c1331b3a013a921e9061e3bc664fead78e1f95", "detected_licenses": [ "MIT" ], "directory_id": "415819415c623857752e47047847e3aae9b68a1e", "extension": "py", "fi...
2.78125
stackv2
import urllib import json import webbrowser import oauth2 as oauth class TwitterOauth: REQUEST_TOKEN_URL = "https://api.twitter.com/oauth/request_token" ACCESS_TOKEN_URL = "https://api.twitter.com/oauth/access_token" AUTHENTICATE_URL = "https://api.twitter.com/oauth/authenticate" def __init__(self, ...
59
39.47
83
13
505
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_cc215f96cdfa61ef_84085935", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text.\nThis expression logs [sensitive data (secret)](4) as clear text." ]
[ 59 ]
[ null ]
[ 11 ]
[ 12 ]