added
stringlengths
32
32
created
int64
1,244B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.25
source
stringclasses
1 value
text
stringlengths
324
20.1k
num_lines
int64
16
598
avg_line_length
float64
15.1
58.3
max_line_length
int64
33
179
ast_depth
int64
8
39
length
int64
101
3.8k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.1k
265k
sast_codeql_findings_count
int64
1
45
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
45
rule_ids
listlengths
1
45
confidences
listlengths
1
45
severities
listlengths
1
45
messages
listlengths
1
45
line_starts
listlengths
1
45
line_ends
listlengths
1
45
column_starts
listlengths
1
45
column_ends
listlengths
1
45
2024-11-18T21:58:58.301537+00:00
1,574,111,911,000
e5163e8727298165a000b4fb5f55344739110a4b
2
{ "blob_id": "e5163e8727298165a000b4fb5f55344739110a4b", "branch_name": "refs/heads/master", "committer_date": 1574111911000, "content_id": "bae7b259aad254b9b6afd3cea14157101688aae2", "detected_licenses": [ "MIT" ], "directory_id": "be4ad108e2cdfbd673d7fd7a1a39c75ad23eabaf", "extension": "py", "fi...
2.34375
stackv2
from flask import Flask, request, jsonify, render_template from flask_cors import CORS from flask_mail import Mail, Message from dotenv import load_dotenv from os import getenv import requests import logging load_dotenv() app = Flask(__name__) CORS(app) app.config['MAIL_PORT'] = 1025 mail = Mail(app) @app.route('/', ...
30
29.13
134
14
221
python
[{"finding_id": "codeql_py/reflective-xss_b4a1af6facec22bf_e500b973", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
2
true
[ "CWE-079", "CWE-918" ]
[ "py/reflective-xss", "py/partial-ssrf" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 22, 18 ]
[ null, null ]
[ 12, 22 ]
[ 22, 135 ]
2024-11-18T21:59:06.666673+00:00
1,380,974,543,000
f90075d2adbf8b175c6015bdbda879ce26644e2e
3
{ "blob_id": "f90075d2adbf8b175c6015bdbda879ce26644e2e", "branch_name": "refs/heads/master", "committer_date": 1380974543000, "content_id": "a6715253fe9da45a5432c40f940d5c54866d1a49", "detected_licenses": [ "Apache-2.0" ], "directory_id": "9675c1c4459ff6b84de25fece1b10e262fc10781", "extension": "py"...
2.625
stackv2
#!/usr/bin/env python # pgsync.py - Dump and restore data from one PostgreSQL database to another. The # log files are generated in /var/log/pgsync directory. Make sure # this directory exists before running the script. import os import sys import stat import logging import datetime import sub...
170
28.9
92
17
1,361
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_270662c3eb7f6308_c548d4a6", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (password)](3) as clear text." ]
[ 82 ]
[ null ]
[ 11 ]
[ 46 ]
2024-11-18T21:59:07.859025+00:00
1,594,799,471,000
762490142f5efa280fe1ef34b9158c8de36121e0
3
{ "blob_id": "762490142f5efa280fe1ef34b9158c8de36121e0", "branch_name": "refs/heads/master", "committer_date": 1594799471000, "content_id": "0c7bcb7bf7c875e25f04db03f361c5fed202f2e4", "detected_licenses": [ "MIT" ], "directory_id": "bbbc685a9e8cba5ee4819c34e5841baa07966bf7", "extension": "py", "fi...
2.6875
stackv2
#!/usr/bin/env python2 # -*- coding: utf-8 -*- import crawler import json import os import sys reload(sys) sys.setdefaultencoding('utf8') class TouTiaoCrawler: toutiao_config = dict() toutiao_crawler = None article_url_list = list() def __init__(self): self.toutiao_crawler = crawler.Crawler...
112
40.63
119
18
953
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_357492706c33d08b_8bb050ff", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [https://www.toutiao.com](1) may be at an arbitrary pos...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "The string [https://www.toutiao.com](1) may be at an arbitrary position in the sanitized URL.", "The string [https://www.toutiao.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 33, 42 ]
[ null, null ]
[ 16, 16 ]
[ 57, 65 ]
2024-11-18T22:24:22.098305+00:00
1,557,979,484,000
3776ab47d19e9a5de744fd9733b8a7655d3b9aee
3
{ "blob_id": "3776ab47d19e9a5de744fd9733b8a7655d3b9aee", "branch_name": "refs/heads/master", "committer_date": 1557979484000, "content_id": "46fade6aceffbb665db07753dbbe1071dec4ccd4", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "d0c581b5d5789e9e30ce4d7785c8a406f2f1d614", "extension": "p...
2.59375
stackv2
"""This REST service allows real-time curation and belief updates for a corpus of INDRA Statements.""" import yaml import pickle import logging import argparse from flask import Flask, request, jsonify, abort, Response # Note: preserve EidosReader install as first one from indra from indra.sources.eidos.reader import E...
349
34.25
79
22
2,706
python
[{"finding_id": "codeql_py/reflective-xss_08d635188da8e282_e79ae6ac", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
3
true
[ "CWE-079", "CWE-079", "CWE-117" ]
[ "py/reflective-xss", "py/reflective-xss", "py/log-injection" ]
[ "HIGH", "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 263, 278, 143 ]
[ null, null, null ]
[ 24, 24, 32 ]
[ 68, 68, 65 ]
2024-11-18T22:24:23.811544+00:00
1,627,206,129,000
5947c052cb1adb3207b6daa8fe3258dbca082e53
3
{ "blob_id": "5947c052cb1adb3207b6daa8fe3258dbca082e53", "branch_name": "refs/heads/main", "committer_date": 1627206129000, "content_id": "5c80c29dc835541f7997b81ac87eaf3ddb6148f5", "detected_licenses": [ "MIT" ], "directory_id": "dd3513c4de74e3ab2e0ddc266d090eb3fb88bfdb", "extension": "py", "file...
3.03125
stackv2
import argparse import sys import requests class WebBruteForce: def __init__(self): self.args = WebBruteForce.parse_args() self.header = {'User-Agent': self.args.agent} @staticmethod def parse_args(): parser = argparse.ArgumentParser(description="Simple python login brute force s...
47
29.66
123
14
337
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_226e7b032be4fd5e_720b200f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 35, 38 ]
[ null, null ]
[ 19, 19 ]
[ 45, 47 ]
2024-11-18T22:24:25.700399+00:00
1,634,373,299,000
a28b50608fc6baed9918279b30f04b84341fbc7e
3
{ "blob_id": "a28b50608fc6baed9918279b30f04b84341fbc7e", "branch_name": "refs/heads/main", "committer_date": 1634373299000, "content_id": "c5951328b5dd1a90f3f4d319d34aa14fd5716295", "detected_licenses": [ "MIT" ], "directory_id": "2657eea254e0f6b1a709638f3eeae377d1fee699", "extension": "py", "file...
2.578125
stackv2
from flask import Flask, render_template, request, redirect, url_for, flash, session from flask_wtf import FlaskForm from wtforms import StringField, PasswordField, BooleanField from wtforms.validators import InputRequired, Email, Length from flask_sqlalchemy import SQLAlchemy from werkzeug.security import generate_pa...
220
35.1
118
17
1,742
python
[{"finding_id": "codeql_py/partial-ssrf_1a36c34c836c609d_c6ee2487", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 69 ]
[ null ]
[ 9 ]
[ 26 ]
2024-11-18T22:36:35.537644+00:00
1,606,644,878,000
5e4ebad51f877a2acb6373a61fd791382bbf1b58
2
{ "blob_id": "5e4ebad51f877a2acb6373a61fd791382bbf1b58", "branch_name": "refs/heads/main", "committer_date": 1606644878000, "content_id": "438aa5da0d0a9459f872ea0a4190f510ca0ce52a", "detected_licenses": [ "MIT" ], "directory_id": "604365ef8a097d86e975cb5478cde485bf94090d", "extension": "py", "file...
2.4375
stackv2
import json import requests from flask import Flask, request from lxml import html app = Flask(__name__) @app.route('/get_cover') def recommendation(): path = request.args.get('url') if not path: response = app.response_class( status=404, ) return response resp = requ...
38
21.11
46
17
207
python
[{"finding_id": "codeql_py/full-ssrf_5e9c4dd93b5e0ba9_3e0ab543", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
1
true
[ "CWE-918" ]
[ "py/full-ssrf" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1)." ]
[ 18 ]
[ null ]
[ 12 ]
[ 30 ]
2024-11-18T22:36:37.838050+00:00
1,606,805,200,000
83ac2a0e7656243dd5a3f8bd1cf89fd06728ca0c
2
{ "blob_id": "83ac2a0e7656243dd5a3f8bd1cf89fd06728ca0c", "branch_name": "refs/heads/main", "committer_date": 1606805200000, "content_id": "f347a5f2f599714686f32dcbbf47ff4322dfcda6", "detected_licenses": [ "Apache-2.0" ], "directory_id": "00385010f4bfef2fcca495e4699ad09d86502cdc", "extension": "py", ...
2.4375
stackv2
from django.http import HttpResponse, JsonResponse from django.shortcuts import render from django.views import View import json from user.models import UserProfile import hashlib import time import jwt from django.conf import settings # error code :10200~10299 # Create your views here. class TokenView(View): def ...
42
32.55
94
15
333
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_e2859876a5e36c24_7c217325", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 26 ]
[ null ]
[ 20 ]
[ 37 ]
2024-11-18T22:36:47.976754+00:00
1,545,841,377,000
2a2568ee3b53e79ca6bb113234c403958a0b071b
3
{ "blob_id": "2a2568ee3b53e79ca6bb113234c403958a0b071b", "branch_name": "refs/heads/master", "committer_date": 1545841377000, "content_id": "2daa7fedc79319dba4758e8ce84b071f07081e9e", "detected_licenses": [ "Unlicense" ], "directory_id": "c4d75dbf784f420bc8961b466207a0b5f699eda1", "extension": "py",...
2.734375
stackv2
from Crypto.Cipher import AES from Crypto.Hash import SHA256 from Crypto.Protocol.KDF import PBKDF2 try: from .Sup import sha000 except: from Sup import sha000 try: from .eff_long import words #from .words6 import words #from .usrsharedictwords6 import words except: from eff_long import words #from words6 impor...
64
27.84
101
16
556
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_49b6d57d0600c93c_81b62f2b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text." ]
[ 59 ]
[ null ]
[ 8 ]
[ 16 ]
2024-11-18T22:36:48.862885+00:00
1,690,553,722,000
a894bbbc5b928b589ba91f61fc202b8f3025ffd2
2
{ "blob_id": "a894bbbc5b928b589ba91f61fc202b8f3025ffd2", "branch_name": "refs/heads/master", "committer_date": 1690553722000, "content_id": "30052909eb2b3d829eb58c562c1a0008e49d14bf", "detected_licenses": [ "MIT" ], "directory_id": "86d1cfa854078e589959e0417356acbe0a1b16f6", "extension": "py", "fi...
2.46875
stackv2
import re from complexism.misc import save_json from .ctbn import BlueprintCTBN from .ctmc import BlueprintCTMC __author__ = 'TimeWz667' __all__ = ['new_dbp', 'read_dbp_json', 'read_dbp_script', 'save_dbp'] def script_to_json(scr): dcs = scr.split('\n') while dcs: dc = dcs[0] pars = re.match...
116
28.47
113
17
1,086
python
[{"finding_id": "codeql_py/redos_fd00cfa5ac29e1b0_eda001de", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'a{{' and containing many repetiti...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with 'a{{' and containing many repetitions of 'a'." ]
[ 35 ]
[ null ]
[ 56 ]
[ 58 ]
2024-11-18T22:36:53.255340+00:00
1,688,183,113,000
c989305d49e90952020bcef9218848b460b9730f
3
{ "blob_id": "c989305d49e90952020bcef9218848b460b9730f", "branch_name": "refs/heads/main", "committer_date": 1688183113000, "content_id": "effd928d8f89ff8304e0053d729f87cc2a90fe20", "detected_licenses": [ "MIT" ], "directory_id": "0e5a5c6bb6747383bc800faeef07f3b95665a7ea", "extension": "py", "file...
2.984375
stackv2
""" 서울 열린데이터 광장 OpenAPI 1. 교통 01.서울시 지하철호선별 역별 승하차 인원 정보 02.서울시 버스노선별 정류장별 승하차 인원 정보 """ import pandas as pd import logging import requests from bs4 import BeautifulSoup class Transportation: """ 서울 열린데이터 광장 교통 관련 정보 조회 클래스 서울 열린데이터 광장에서 발급받은 Service Key를 입력받아 초기화합니다. parameters -------...
158
28.3
179
19
1,260
python
[{"finding_id": "codeql_py/request-without-cert-validation_38a25eb2392f5e97_19de2cab", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 95 ]
[ null ]
[ 26 ]
[ 57 ]
2024-11-18T20:23:16.491635+00:00
1,596,067,769,000
507fd71dda44725a689a06daea7bb4b10f0092ce
3
{ "blob_id": "507fd71dda44725a689a06daea7bb4b10f0092ce", "branch_name": "refs/heads/master", "committer_date": 1596067769000, "content_id": "c4a8625ce26610b29fabbc91175ebc473dfb7830", "detected_licenses": [ "MIT" ], "directory_id": "d386f0e92fae38efc8790782f65542ef44ebcaf4", "extension": "py", "fi...
2.71875
stackv2
# Answer to assignment: I found that both ways had easy parts and difficult parts to understand and # execute. With mongodb I had to convert a query to json and then send it to the server # With postgres I had to iterate over each row. There are trade offs to both. import pymongo import os import json from dotenv ...
52
29.54
119
9
381
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_485fb787083dc153_765c0e35", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 22 ]
[ null ]
[ 15 ]
[ 29 ]
2024-11-18T20:23:30.293832+00:00
1,505,413,005,000
9c8f75e8ca8150ec15f8bab340c9eea81a68a4f7
3
{ "blob_id": "9c8f75e8ca8150ec15f8bab340c9eea81a68a4f7", "branch_name": "refs/heads/master", "committer_date": 1505413005000, "content_id": "07a8094aae0dd4e5109d7a8784002fc67065e51e", "detected_licenses": [ "MIT" ], "directory_id": "6c1e1d00aa5a99ed9acbf4ab38fc6c87f5998ba4", "extension": "py", "fi...
2.640625
stackv2
# -*- coding: utf-8 -*- try: from . import Offliberate except (SystemError, ValueError): import Offliberate try: from urlparse import urlparse except ImportError: from urllib.parse import urlparse try: from thread import start_new_thread except ImportError: from _thread import start_new_thread import argparse ...
307
30.23
143
24
2,533
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_781ecfedfd42cba5_a569eed4", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [offliberty.com](1) may be at an arbitrary position in ...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [offliberty.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 181 ]
[ null ]
[ 5 ]
[ 28 ]
2024-11-18T20:23:35.010407+00:00
1,546,901,581,000
ab8dac3ee9e226efe2e55c3b568c1b5f3a7776ea
3
{ "blob_id": "ab8dac3ee9e226efe2e55c3b568c1b5f3a7776ea", "branch_name": "refs/heads/master", "committer_date": 1546901581000, "content_id": "2cafbaf43f48c1128aef452f74c1cfa5d0611a1f", "detected_licenses": [ "MIT" ], "directory_id": "ea1190c1658fcbe8ad4855bd457188c159ef8f42", "extension": "py", "fi...
2.890625
stackv2
""" A collection of functions related to Open edX Integration with L&D """ import sys from datetime import datetime, timedelta import json import re import requests import adal # pylint: disable=line-too-long # pylint: disable=W0703 class EdxIntegration(object): """ **Use cases** Get the data from Ope...
351
34.33
158
20
2,708
python
[{"finding_id": "codeql_py/request-without-cert-validation_a07434b75604bfd2_3e1c4c88", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 170 ]
[ null ]
[ 23 ]
[ 90 ]
2024-11-18T20:23:41.133209+00:00
1,558,108,867,000
559e5cddb7252967f6031eae429a9374e1e46a68
2
{ "blob_id": "559e5cddb7252967f6031eae429a9374e1e46a68", "branch_name": "refs/heads/master", "committer_date": 1558108867000, "content_id": "39e3b3d40b11f9cfc971376e710a4a30c0dc86d0", "detected_licenses": [ "MIT" ], "directory_id": "5d5412af91c10ea7089e3cef254b051ad97710fb", "extension": "py", "fi...
2.328125
stackv2
from django.shortcuts import render # Create your views here. from rest_framework.authentication import BasicAuthentication, SessionAuthentication, TokenAuthentication from rest_framework.permissions import IsAuthenticated from rest_framework.response import Response from rest_framework.views import APIView from good...
207
39.57
114
17
1,673
python
[{"finding_id": "codeql_py/stack-trace-exposure_d70aed1766ab9072_8b219fdb", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
4
true
[ "CWE-209", "CWE-209", "CWE-209", "CWE-094" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/code-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "This code execution depe...
[ 78, 102, 148, 49 ]
[ null, null, null, null ]
[ 29, 29, 29, 28 ]
[ 63, 63, 63, 35 ]
2024-11-18T21:22:27.099553+00:00
1,610,649,046,000
b87534775f6e697df78de8390cd72e926ee91162
2
{ "blob_id": "b87534775f6e697df78de8390cd72e926ee91162", "branch_name": "refs/heads/main", "committer_date": 1610649046000, "content_id": "1e9281ee64a45d21c346af2002a469fb4dfa281d", "detected_licenses": [ "MIT" ], "directory_id": "99dec1ef81fdc5e443553e2c10f10c35b048e85b", "extension": "py", "file...
2.3125
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- import os import sys #sys.path.append('/usr/local/lib/python2.7/dist-packages') from bluetooth import * import subprocess import time #sys.path.append('/home/pi/.local/lib/python2.7/site-packages') from wifi import Cell, Scheme import json wpa_supplicant_conf = "/etc/wpa_...
137
25.72
85
15
936
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5a0d199b9e689c67_372aa62f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 57, 98 ]
[ null, null ]
[ 12, 16 ]
[ 41, 67 ]
2024-11-18T21:22:43.906252+00:00
1,551,478,178,000
87fdd44c2e603915eebf5f6360b0a64a3ceab29e
4
{ "blob_id": "87fdd44c2e603915eebf5f6360b0a64a3ceab29e", "branch_name": "refs/heads/master", "committer_date": 1551478178000, "content_id": "37f33daac4ef2f11f95907d58cd6275633fa9740", "detected_licenses": [ "MIT" ], "directory_id": "27e02f3501e2abbc5ff3703987c95cc67e625c96", "extension": "py", "fi...
4.4375
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- """ MATH6005 Lecture 6. Functions Revision. # ============================================================================= # Example: Scope of a variable # A more suitable approach to double the value would be to for a function # to return a value e.g. # ================...
29
32.24
79
10
199
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_252ff244a824a824_b1de95dd", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 22, 25 ]
[ null, null ]
[ 11, 11 ]
[ 76, 75 ]
2024-11-18T21:23:20.500367+00:00
1,609,427,106,000
0c5ca3bdd22aac676ec56892f806df09d6a87738
3
{ "blob_id": "0c5ca3bdd22aac676ec56892f806df09d6a87738", "branch_name": "refs/heads/main", "committer_date": 1609427106000, "content_id": "a009cc47fac141b29ad63cde6e5f5d3c77fea9bd", "detected_licenses": [ "MIT" ], "directory_id": "7e088a09ffd84af4146eea1a14329820e8ddc638", "extension": "py", "file...
2.6875
stackv2
#!/usr/local/bin/python from youtube_api import YouTubeDataAPI import langdetect import sys import re import os if os.getenv('DEBUG', False): DEBUG = True else: DEBUG = False def is_evil(code): yt = YouTubeDataAPI(os.getenv('YOUTUBE_KEY', '123')) response = yt.get_video_metadata(code) title =...
74
25.51
84
20
498
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_b3119967b1f3c5dc_473810d2", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'youtube.com/', so it might match mo...
1
true
[ "CWE-020" ]
[ "py/incomplete-hostname-regexp" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'youtube.com/', so it might match more hosts than expected." ]
[ 45 ]
[ null ]
[ 19 ]
[ 39 ]
2024-11-18T21:51:10.693394+00:00
1,623,153,544,000
2b65c9bd9d17e33b9047488607026d0e8c8a6df5
2
{ "blob_id": "2b65c9bd9d17e33b9047488607026d0e8c8a6df5", "branch_name": "refs/heads/master", "committer_date": 1623153544000, "content_id": "b7bd7f64858d32ad82e60bccad38a092ea8d2a8c", "detected_licenses": [ "MIT" ], "directory_id": "0f986ea71c6b792cceaa964128bb41e4cac1d044", "extension": "py", "fi...
2.328125
stackv2
from flask import Flask, render_template, request, session import sqlite3 import random import urllib app = Flask('app') app.secret_key = '4Q8z\n\xec]/b_5#y2L"F' @app.route('/') def index(): return render_template("index.html", loggedIn=isLoggedIn()) @app.route('/arrivalsDepartures') def arrivalsDepartures(): re...
109
31.1
129
14
853
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_600af47ad3a1ea91_7ea6594b", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
2
true
[ "CWE-312", "CWE-215" ]
[ "py/clear-text-storage-sensitive-data", "py/flask-debug" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger." ]
[ 68, 109 ]
[ null, null ]
[ 23, null ]
[ 27, 47 ]
2024-11-18T21:51:23.988486+00:00
1,602,309,389,000
b8ce4262816441d6aa3a864663a959ba06b8632d
3
{ "blob_id": "b8ce4262816441d6aa3a864663a959ba06b8632d", "branch_name": "refs/heads/main", "committer_date": 1602309389000, "content_id": "8695b73f9cba79e2aa1044a69a3d478398610ba9", "detected_licenses": [ "Apache-2.0" ], "directory_id": "cd846b82f22ccc5d297633ad65cd562201f4dec5", "extension": "py", ...
3.15625
stackv2
#!/usr/bin/python from urllib.request import urlopen from termcolor import colored import hashlib print ("Follow Me On The Github:-- https://github.com/lucifer-008") hash = input("Enter Hash Value: ") Hash = input("Enter Hash Name: ") passlist = str(urlopen('https://raw.githubusercontent.com/danielmiessler/SecList...
92
30.22
177
18
791
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_03c85fb426bec7e1_1cda5448", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse...
8
true
[ "CWE-327", "CWE-327", "CWE-327", "CWE-327", "CWE-327", "CWE-327", "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.", "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally...
[ 29, 36, 43, 50, 57, 64, 73, 80 ]
[ null, null, null, null, null, null, null, null ]
[ 28, 30, 30, 27, 30, 30, 31, 31 ]
[ 52, 54, 54, 51, 54, 54, 55, 55 ]
2024-11-18T21:51:24.695651+00:00
1,616,683,565,000
6197e2a85be5e37c69faebc29466d9358035910f
3
{ "blob_id": "6197e2a85be5e37c69faebc29466d9358035910f", "branch_name": "refs/heads/main", "committer_date": 1616683565000, "content_id": "a729ad6759247393abb4085130b01b49f7753e03", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "0cce0b80b4639a3aebe9491e9c7e6a58746cd78c", "extension": "py"...
3.4375
stackv2
from os import system import time class Node: def __init__(self, value, link=None): self.value = value self.link = link def get_value(self): return self.value def get_link(self): return self.link def set_link(self, new_link): self.link = new_link def ...
236
32.52
122
27
1,340
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_207908015c187b1e_37b945c0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 63 ]
[ null ]
[ 23 ]
[ 82 ]
2024-11-18T21:51:26.809342+00:00
1,626,879,994,000
19fad672b7f6cfebff5403ab58518922bb2aaab1
3
{ "blob_id": "19fad672b7f6cfebff5403ab58518922bb2aaab1", "branch_name": "refs/heads/master", "committer_date": 1626879994000, "content_id": "f0d00eb122d66507c4fd59d8bcef291059713379", "detected_licenses": [ "MIT" ], "directory_id": "6f33b60c79a6b6945b4c72742ac6b2b017456f08", "extension": "py", "fi...
2.75
stackv2
#!/usr/bin/env python import wget import tarfile import os import sys try: import piscola except: pass def download_dustmaps(mapsdir='.'): """ Downloads dust maps of Schlegel, Fikbeiner & Davis (1998). mapsdir : str, default '.' (current directory) or 'sfddata-master' (under piscola directory if pis...
37
26.57
149
14
275
python
[{"finding_id": "codeql_py/tarslip_a74f9a4e5aed337c_d86779ee", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 25 ]
[ null ]
[ 5 ]
[ 8 ]
2024-11-18T21:51:58.502559+00:00
1,689,265,243,000
ce6746fa654b149c9ba8834dc2091f696ae607e5
2
{ "blob_id": "ce6746fa654b149c9ba8834dc2091f696ae607e5", "branch_name": "refs/heads/master", "committer_date": 1689265243000, "content_id": "05443be30b23b55014b5dad3abec8b55d4739e65", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "96255a58eef19fea6380601229538028e283e8d4", "extension": "p...
2.375
stackv2
#!/usr/bin/env python import cgi import re import cgitb import collections cgitb.enable() def header(): header = "Content-Type: text/html;charset=utf-8" header += "\n" header += "\n" header += "<HTML>" header += "<HEAD><TITLE>Port Config Converter</TITLE>" header += "<script src=\"jquery.min.j...
198
32.3
163
23
1,577
python
[{"finding_id": "codeql_py/polynomial-redos_cbaa880da3e61231_98adb6d7", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with ma...
1
true
[ "CWE-1333" ]
[ "py/polynomial-redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with many repetitions of 'a'.\nThis [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with many repetitions of 'a'.\nThis [regular expression](1) that depends on a [user-provided...
[ 178 ]
[ null ]
[ 72 ]
[ 76 ]
2024-11-18T22:02:40.308878+00:00
1,507,669,773,000
d1a1d0da0b4c4b2b15bbacb8c047fbd06ca8d1e7
3
{ "blob_id": "d1a1d0da0b4c4b2b15bbacb8c047fbd06ca8d1e7", "branch_name": "refs/heads/master", "committer_date": 1507669773000, "content_id": "3ba42d4accc62dea18d5244110fa9cf1a04b36ae", "detected_licenses": [ "MIT" ], "directory_id": "e13f1e45dcdd0bc9f76c53d5823ca597ebafb16e", "extension": "py", "fi...
2.65625
stackv2
#!usr/bin/python3 # Modules related comments are only applied in this Script. import requests # Using this module to send request and getting response from local_server. import sys # Using this module for writting formated text on the terminal. from col...
110
45.9
169
19
1,339
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ea54dc2df81f8762_c2b518cb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 82 ]
[ null ]
[ 22 ]
[ 101 ]
2024-11-18T22:16:35.561958+00:00
1,623,000,595,000
8307213de0fd6edd56376663bbb1d0b4b90765f2
3
{ "blob_id": "8307213de0fd6edd56376663bbb1d0b4b90765f2", "branch_name": "refs/heads/main", "committer_date": 1623000790000, "content_id": "f7266dca016862413492651e6ea69b794172bb4d", "detected_licenses": [ "MIT" ], "directory_id": "f34b25deee7860abbcea86e9a051129e6dc3bd83", "extension": "py", "file...
2.59375
stackv2
import time import json import requests import urllib3 from random import randint from bs4 import BeautifulSoup from threading import Thread urllib3.disable_warnings() BASE_URL = "https://jobs.ksl.com/search/posted/last-7-days" HEADERS = { "User-Agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_5) AppleWebKit/...
73
25.38
141
14
509
python
[{"finding_id": "codeql_py/request-without-cert-validation_b92a9a7bc8f32af7_2767bd6b", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 19, 38 ]
[ null, null ]
[ 12, 13 ]
[ 76, 77 ]
2024-11-18T22:16:44.894414+00:00
1,622,142,630,000
e66071662fc60b1a8d720a91d769c29969c14c18
3
{ "blob_id": "e66071662fc60b1a8d720a91d769c29969c14c18", "branch_name": "refs/heads/master", "committer_date": 1622142630000, "content_id": "ad0bf5a40fef6613ec0a6c564dd33a8a3869537f", "detected_licenses": [ "MIT" ], "directory_id": "bdcaeb6da835b8edd86ad269583daf0cc5c5c260", "extension": "py", "fi...
2.90625
stackv2
import os import re from flask import session, redirect, url_for, request, flash import hashlib import model def has_cyrillic(text): return bool(re.search('[а-яА-Я]', text)) def search_bad_symbols_and_username(username): """Поиск зарезервированных слов и запрещенных символов""" search_bad_symbols_resu...
130
39.45
116
28
1,071
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_7d8bfc8b775c2e80_22bbb8c0", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
4
true
[ "CWE-327", "CWE-022", "CWE-022", "CWE-022" ]
[ "py/weak-sensitive-data-hashing", "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provide...
[ 92, 114, 115, 116 ]
[ null, null, null, null ]
[ 45, 42, 42, 42 ]
[ 79, 76, 82, 84 ]
2024-11-18T22:27:54.568593+00:00
1,612,488,239,000
d077fe9ad82606f21442024fa28f29c44518ccb1
3
{ "blob_id": "d077fe9ad82606f21442024fa28f29c44518ccb1", "branch_name": "refs/heads/main", "committer_date": 1612488239000, "content_id": "6eea0863c46dce66a6a74e4f4152f569c69422fd", "detected_licenses": [ "MIT" ], "directory_id": "3af58cbf93ed11bee4be2b933f5ac384fa4be160", "extension": "py", "file...
3.15625
stackv2
"""Utility tools used by revelation""" import os import shutil import tarfile import zipfile from http.client import HTTPMessage from pathlib import Path from typing import Tuple from urllib.request import urlretrieve from . import default_config def make_presentation(presentation_path: Path): """ Make a ne...
96
29.38
78
16
638
python
[{"finding_id": "codeql_py/tarslip_8461873c188118cc_e05a8d8c", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 81 ]
[ null ]
[ 17 ]
[ 22 ]
2024-11-18T22:44:00.198896+00:00
1,476,602,200,000
e1c7f2627819fa524c5bdcad7451fbd093e7c717
2
{ "blob_id": "e1c7f2627819fa524c5bdcad7451fbd093e7c717", "branch_name": "refs/heads/master", "committer_date": 1476602243000, "content_id": "5bdcfb381c7f8e672616cc92971cdef71a3237a1", "detected_licenses": [ "MIT" ], "directory_id": "3a77e1731eacc6748fd9ae4e208be179656fb312", "extension": "py", "fi...
2.375
stackv2
# coding:utf-8 from flask import Flask, url_for from jinja2 import Environment, PackageLoader app = Flask(__name__) env = Environment(loader=PackageLoader('app', 'templates/jinja2')) @app.route('/') def index(): return env.get_template('index.html').render( title='Hello', content='this is my firs...
17
23
66
11
108
python
[{"finding_id": "codeql_py/flask-debug_f9a9419baa212fc6_7b7cc250", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/jinja2/autoescape-false" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 17, 6 ]
[ null, null ]
[ 5, 7 ]
[ 51, 67 ]
2024-11-18T22:44:04.901568+00:00
1,573,756,547,000
0ac2b13a227e16096b8d4a16b0964a14931650dc
3
{ "blob_id": "0ac2b13a227e16096b8d4a16b0964a14931650dc", "branch_name": "refs/heads/master", "committer_date": 1573756547000, "content_id": "ec09278cf6632e500f0e455b660ad490d792d606", "detected_licenses": [ "Apache-2.0" ], "directory_id": "0488c54d5c369dabeab20e9b28537584943c4b3d", "extension": "py"...
2.53125
stackv2
""" Copyright 2019 Vanessa Martina Boehm Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, so...
258
30.21
110
19
2,123
python
[{"finding_id": "codeql_py/tarslip_f9ff486bec872d44_873de592", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 147 ]
[ null ]
[ 13 ]
[ 16 ]
2024-11-18T22:44:06.465680+00:00
1,635,177,683,000
3c0e2aec827cedb2730a79d39326ddcdc8be6eae
2
{ "blob_id": "3c0e2aec827cedb2730a79d39326ddcdc8be6eae", "branch_name": "refs/heads/master", "committer_date": 1635177683000, "content_id": "930021fba8e1e65b4be35ef00a113006e917c8c9", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "1c2bf84fc3ec307296a0c828f46c1b7792de08fd", "extension": "p...
2.40625
stackv2
#!/usr/bin/env python import sys import argparse from Ifc import SchemaParser from jinja2 import Environment, FileSystemLoader, Template, contextfilter from jinja2.runtime import Context from jinja2 import Undefined # parse the commandline arguments ap = argparse.ArgumentParser( ...
92
45.04
168
14
863
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_eb244c3024827626_b2091dcf", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 19 ]
[ 23 ]
[ 7 ]
[ 6 ]
2024-11-18T22:44:14.658507+00:00
1,462,798,849,000
096735ce22de25d688aff55a1ff6408107d7737f
3
{ "blob_id": "096735ce22de25d688aff55a1ff6408107d7737f", "branch_name": "refs/heads/master", "committer_date": 1462798849000, "content_id": "d2abaaea05ee729f4d7c4e759b13d427250048a1", "detected_licenses": [ "MIT" ], "directory_id": "d17e93c3e6037644f8392caf035240eafd465147", "extension": "py", "fi...
2.71875
stackv2
#!/usr/bin/env python from random import randrange import sys credit_card_numbers = { 'visa': [ '4024007132477448', '4539213780183498', '4024007154567043', '4485481702082874', '4556506880751371' ], 'american_express': [ '347515732294946', '3781981137...
44
21.86
71
11
505
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fc8776b9449f3c62_ce05ebe1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 42 ]
[ null ]
[ 22 ]
[ 71 ]
2024-11-18T22:44:42.450809+00:00
1,534,455,089,000
942e5b8ddf560df61d8fc65fbff470c652214ead
3
{ "blob_id": "942e5b8ddf560df61d8fc65fbff470c652214ead", "branch_name": "refs/heads/master", "committer_date": 1534455089000, "content_id": "08d74c4d1296cdda3f6bbd516a6469b0c275b872", "detected_licenses": [ "MIT" ], "directory_id": "ce30494ae099a76727f35906734a4779a68bf8ce", "extension": "py", "fi...
2.75
stackv2
# Instagram-py , Copyright (C) 2017 The Future Shell , DeathSec # filename: logger.py # Colorful print functions for Instagram-py from .colors import Fore , Back , Style , init from .constants import appInfo from datetime import datetime init(autoreset=True) # set to automatically reset colors! def log_result(sessio...
51
34.31
152
24
465
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_649f25702cee555c_1fbcf6bb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 18 ]
[ 19 ]
[ 9 ]
[ 62 ]
2024-11-18T20:36:59.035200+00:00
1,576,618,943,000
72cb14220fd5414137e26e22307b5c7c4f648698
4
{ "blob_id": "72cb14220fd5414137e26e22307b5c7c4f648698", "branch_name": "refs/heads/master", "committer_date": 1576618943000, "content_id": "626c4d644dcee163097205138605ab40642af96c", "detected_licenses": [ "MIT" ], "directory_id": "25c139fa82e424d3dcf3e9a7846b4c02d5c857d6", "extension": "py", "fi...
3.546875
stackv2
""" This module allows to create and populate a database with usernames and passwords. """ import sqlite3 import hashlib import argparse import random conn = None cursor = None def open_and_create(): """ Check the existance of a database of create a new one with a data schema: username, password and s...
94
27.38
87
17
579
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_d2f17117a73db0f0_0faa9f25", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.", "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computational...
[ 56, 74 ]
[ null, null ]
[ 33, 37 ]
[ 55, 59 ]
2024-11-18T21:00:38.311384+00:00
1,626,560,433,000
eebcef4328c07105107329e8dedf2567144f8d3b
3
{ "blob_id": "eebcef4328c07105107329e8dedf2567144f8d3b", "branch_name": "refs/heads/main", "committer_date": 1626560433000, "content_id": "e148ff1cbe9931758cca98a34192d330924e84ba", "detected_licenses": [ "MIT" ], "directory_id": "ff9771e73a03a0bd46535418feebadeeae9d1fd9", "extension": "py", "file...
2.53125
stackv2
from os import environ from cx_Oracle import connect, Error HOST = environ.get('DB_HOST', 'localhost') PORT = environ.get('DB_PORT', '1521') SID = environ.get('DB_SID', 'xe') USER = environ.get('DB_USER', 'system') PASSWORD = environ.get('DB_PASSWORD', 'oracle') SEPARATOR = '----------------------------------------' ...
42
25.69
87
14
288
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_caa4c56223cf7de9_01ed197a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 31 ]
[ null ]
[ 11 ]
[ 34 ]
2024-11-18T21:00:42.389988+00:00
1,692,013,158,000
8ab9ca94875b15927de7f42ea44fd63f86b5de5d
3
{ "blob_id": "8ab9ca94875b15927de7f42ea44fd63f86b5de5d", "branch_name": "refs/heads/master", "committer_date": 1692013158000, "content_id": "033bed7d4a6f1986a3e8c3553d4744abf0bbc9c1", "detected_licenses": [ "Apache-2.0" ], "directory_id": "9ca19852d1245911d7b8b15a0556cd28aaa16094", "extension": "py"...
2.828125
stackv2
import requests import getpass import os import re import datetime import sys from configparser import ConfigParser def getAllDate(eslogin,espasswd,url): urlAllDate = url+"*?v" r = requests.get(urlAllDate, auth=(eslogin,espasswd),verify=False) status_code = r.status_code if status_code == 200: ...
83
25.66
81
16
586
python
[{"finding_id": "codeql_py/request-without-cert-validation_0a0f89c11a6a7bef_07020c4d", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 13, 48 ]
[ null, null ]
[ 9, 13 ]
[ 71, 78 ]
2024-11-18T21:01:22.136287+00:00
1,623,052,659,000
011fe7c32facc132bf09fc93877d3e9a219227db
3
{ "blob_id": "011fe7c32facc132bf09fc93877d3e9a219227db", "branch_name": "refs/heads/master", "committer_date": 1623052659000, "content_id": "ce40edfff0015dd93d60f7ae5c9f5634b03e4eef", "detected_licenses": [ "MIT" ], "directory_id": "985da5163cf8572f353224a48d964594f05d47aa", "extension": "py", "fi...
2.640625
stackv2
#!/usr/bin/env python import argparse import re import subprocess import sys def parse_args(): parser = argparse.ArgumentParser( description="I use this program to generate a bibtex overview for my blog.") parser.add_argument('--input', default="_bibliography.bib") parser.add_argument('--output...
77
31.42
126
14
751
python
[{"finding_id": "codeql_py/overly-large-range_956e31e5d8910fd1_8cbd36d0", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 38 ]
[ null ]
[ 110 ]
[ 113 ]
2024-11-18T21:01:25.860122+00:00
1,622,535,259,000
38c17e4ed27b6f64de671e63f171da032dc1b132
4
{ "blob_id": "38c17e4ed27b6f64de671e63f171da032dc1b132", "branch_name": "refs/heads/main", "committer_date": 1622535259000, "content_id": "5b754b7dc482d64d24dd000a202516a1e1d1fcd6", "detected_licenses": [ "MIT" ], "directory_id": "41e0ccec25f307e316f5a606e510e04e70ccd9bf", "extension": "py", "file...
3.859375
stackv2
import random class Password: """ Генерация пароля :param int lenght: Длина пароля :param bool lower: Наличие нижнего регистра :param bool upper: Наличие верхнего регистра :param bool numbers: Наличие цифр :param bool symbols: Наличие специальных знаков """ def __init__(self, length=8, lower=True, upper=True,...
107
26.99
93
15
893
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_66b5f468f7cc22fa_33e60251", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 49, 37 ]
[ null, null ]
[ 15, 9 ]
[ 28, 22 ]
2024-11-18T21:25:27.949446+00:00
1,458,133,470,000
85878189f792da316a8281c856df5ba29fe613ba
2
{ "blob_id": "85878189f792da316a8281c856df5ba29fe613ba", "branch_name": "refs/heads/master", "committer_date": 1458133470000, "content_id": "a8ca0a4f1ac18cf9ad0bd36810fcc5855a088368", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e29d0a80a67fcfeb831f00ac28d2a66b8d1fcf45", "extension": "py"...
2.5
stackv2
import paramiko import socket import time import logging from paramiko.ssh_exception import SSHException import bastion_ssh.errors LOG = logging.getLogger(__name__) class SSHTransport(object): """ This object wraps a shell in yet another shell. When the shell is switched into "simulate" mode it can just prin...
45
39.36
103
16
324
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_f4f8d407c6bb34a0_9403b6bd", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 20 ]
[ null ]
[ 9 ]
[ 74 ]
2024-11-18T21:25:32.321696+00:00
1,619,824,518,000
f6f7c761e57be67947df2d164fdfbe1b62eb0b54
3
{ "blob_id": "f6f7c761e57be67947df2d164fdfbe1b62eb0b54", "branch_name": "refs/heads/master", "committer_date": 1619824518000, "content_id": "bac7f8d0b5e77f5624971a36811e4227a3d459be", "detected_licenses": [ "BSD-3-Clause", "MIT" ], "directory_id": "babc1c6095e686ba4e6f1ddf4a8fb832b05960aa", "ext...
2.890625
stackv2
import os from jinja2 import Template import glob import argparse from collections import defaultdict from pathlib import Path def get_args(): parser = argparse.ArgumentParser() parser.add_argument('directory', nargs='*', help='Explicitly list dirs') parser.add_argument('--row', choices=('sort', 'match'), ...
74
31.42
132
21
533
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_711196d8e62c9f08_cfc087ed", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 46 ]
[ 68 ]
[ 16 ]
[ 9 ]
2024-11-18T21:25:35.028376+00:00
1,588,608,081,000
45abc89148eef438748a00564f6c92f266ab915e
3
{ "blob_id": "45abc89148eef438748a00564f6c92f266ab915e", "branch_name": "refs/heads/master", "committer_date": 1588608081000, "content_id": "45a18b1c30b5124242788c97f2712a5804ac9673", "detected_licenses": [ "MIT" ], "directory_id": "709c49d91a3a1bcd1d5c70aecd703d3bf629e83a", "extension": "py", "fi...
2.71875
stackv2
import time import requests import threading from sseclient import SSEClient from hammock import Hammock import traceback requests.packages.urllib3.disable_warnings() """ Inspired heavily from: https://github.com/Alidron/spyrk/blob/master/spyrk/spark_cloud.py -- Thank you for sharing your implementation ...
411
34.11
132
18
3,088
python
[{"finding_id": "codeql_py/request-without-cert-validation_744ef435ee50795e_58b5a45e", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 334 ]
[ null ]
[ 15 ]
[ 91 ]
2024-11-18T21:51:34.244777+00:00
1,505,184,848,000
d57c2dac2224e37cccd08ff05124f353da7e4dab
3
{ "blob_id": "d57c2dac2224e37cccd08ff05124f353da7e4dab", "branch_name": "refs/heads/master", "committer_date": 1505184848000, "content_id": "fcd16217b92f36e24de76f2b4af6b58df0a040a2", "detected_licenses": [ "MIT" ], "directory_id": "184de927609ce08626d417628731b9af23cfda79", "extension": "py", "fi...
3.359375
stackv2
import inspect import os import re # FIXME: remove textwrap dependency and code from scratch import textwrap def remove_indent(text, include_firstline=False): """Removes leading whitespace from the provided text. Removes largest amount of leading whitespaces that is shared amongst all of the selected lines. ...
382
35.93
100
20
3,030
python
[{"finding_id": "codeql_py/redos_a3168f7df482da3f_169b49d5", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '..math::\\n' and containing many ...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '..math::\\n' and containing many repetitions of ' \\n'." ]
[ 179 ]
[ null ]
[ 53 ]
[ 56 ]
2024-11-18T21:51:34.986927+00:00
1,436,861,094,000
46c39151a266022f2550809ffe39dd1c78002960
2
{ "blob_id": "46c39151a266022f2550809ffe39dd1c78002960", "branch_name": "refs/heads/master", "committer_date": 1436861094000, "content_id": "1aef8ab70700d7447eaad17b9be342904ccecb9a", "detected_licenses": [ "MIT" ], "directory_id": "684c0ab1dff3d75cb2994e1adb5e54dbb1af3444", "extension": "py", "fi...
2.328125
stackv2
#!/usr/bin/env python """A simple example of connecting to Earth Engine using App Engine.""" # Works in the local development environment and when deployed. # If successful, shows a single web page with the SRTM DEM # displayed in a Google Map. See accompanying README file for # instructions on how to set up authen...
62
34.81
140
18
597
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_7e1b43fc4c7bc250_6fbf7be2", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 25 ]
[ 26 ]
[ 21 ]
[ 63 ]
2024-11-18T22:00:56.062307+00:00
1,544,634,467,000
bee5621111ade31779f3d4c581ac391eee602a76
3
{ "blob_id": "bee5621111ade31779f3d4c581ac391eee602a76", "branch_name": "refs/heads/master", "committer_date": 1544634467000, "content_id": "4655c17b27c3b973804c67abbfa9b93c712e06ec", "detected_licenses": [ "Apache-2.0" ], "directory_id": "c468915747db034e522e6e542ef9147932b240a1", "extension": "py"...
2.515625
stackv2
from django.views.decorators.csrf import csrf_exempt from django.http import JsonResponse, HttpResponseNotFound, HttpResponseBadRequest, HttpResponse from basicInfo.models import account, attrib, teacher,student import hashlib as hash, json, time, random,re basicUrl="http://127.0.0.1:8000/static/basicInfo/" @csrf_...
256
28.36
115
26
1,647
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7558eea8aa81c833_21be16a6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
4
true
[ "CWE-312", "CWE-312", "CWE-327", "CWE-327" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "[Sensitive data (id)](1) is used in a hashing algorithm (SHA512) that is insecure for id hashing, since it is not a computationally expensive hash function.\n[Sensitive da...
[ 26, 26, 25, 92 ]
[ null, null, null, null ]
[ 19, 27, 54, 54 ]
[ 25, 40, 71, 71 ]
2024-11-18T22:00:56.685077+00:00
1,547,773,580,000
7cc9ee276e95dc653a68f0d0ceca29e580fcdf3b
3
{ "blob_id": "7cc9ee276e95dc653a68f0d0ceca29e580fcdf3b", "branch_name": "refs/heads/master", "committer_date": 1547773580000, "content_id": "f8f0a1ac841dc94920b580516b6759ebbb3e1381", "detected_licenses": [ "Apache-2.0" ], "directory_id": "393701c0a2f9b0b0b3f0f73b9e8dbb5a48652afb", "extension": "py"...
2.546875
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- __author__ = "Rob Knight, Gavin Huttley, and Peter Maxwell" __credits__ = "glenncodes, seals, and newsapi.org" import requests import datetime import time from ftplib import FTP import ctypes counterr = 0 counter = 0 #your api key from newsapi.org apikey = 'APIKEY' ...
183
34.73
143
20
1,629
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_c5698224b5769394_26afaeab", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
10
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging...
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.", "This expression stores [sensitive data (password)](1) as clear text.", "This expression stores [sensitive data (password)](1) as clear text.", "This expression stores [sensitive data (password)](1) as clear text.", "This expression sto...
[ 46, 68, 87, 106, 126, 41, 63, 82, 101, 121 ]
[ null, null, null, null, null, null, null, null, null, null ]
[ 35, 35, 35, 35, 35, 42, 42, 41, 41, 41 ]
[ 39, 39, 39, 39, 39, 52, 52, 51, 51, 51 ]
2024-11-18T22:01:13.023213+00:00
1,552,276,453,000
543d671319811af41229af757ccfa2cd2cf14924
3
{ "blob_id": "543d671319811af41229af757ccfa2cd2cf14924", "branch_name": "refs/heads/master", "committer_date": 1552276453000, "content_id": "4fa35b01e46ba91697f7bb987ec662ba5ca1f7e8", "detected_licenses": [ "MIT" ], "directory_id": "b69e16865f983c7203575ed7ff1c3436cda24cb7", "extension": "py", "fi...
3.171875
stackv2
# -*- coding: utf-8 -*- """ :author: Grey Li (李辉) :url: http://greyli.com :copyright: © 2018 Grey Li :license: MIT, see LICENSE for more details. """ import click from flask import Flask from flask import url_for from flask import redirect # from flask_foo import Foo app001 = Flask(__name__) # the min...
52
21.19
67
11
322
python
[{"finding_id": "codeql_py/reflective-xss_0e21165785168182_d0f0339e", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 42 ]
[ null ]
[ 12 ]
[ 38 ]
2024-11-18T22:15:02.325874+00:00
1,635,027,466,000
14300c57a4340b6b21a6bb7a4a1a0eb81c1c94cc
3
{ "blob_id": "14300c57a4340b6b21a6bb7a4a1a0eb81c1c94cc", "branch_name": "refs/heads/master", "committer_date": 1635027466000, "content_id": "202ab8e91b1a486cc2367f9e5d860cf37ee50d21", "detected_licenses": [ "MIT" ], "directory_id": "c311f95ebc4002a4f9d64edacd36f3152f426120", "extension": "py", "fi...
2.609375
stackv2
import numpy as np import pandas as pd from sklearn import model_selection as ms from sklearn.naive_bayes import GaussianNB as gaussian from sklearn.tree import DecisionTreeClassifier from sklearn.model_selection import GridSearchCV from sklearn.linear_model import Perceptron from sklearn.neural_network import MLPClass...
119
41.61
116
13
1,391
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_457e63d96a4440ea_310bfec0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 23, 28 ]
[ null, null ]
[ 7, 7 ]
[ 10, 9 ]
2024-11-18T22:15:03.109601+00:00
1,649,706,319,000
e4b178bbfb9b90f4ed13180532f0355861633386
3
{ "blob_id": "e4b178bbfb9b90f4ed13180532f0355861633386", "branch_name": "refs/heads/master", "committer_date": 1649706319000, "content_id": "1001851ea6965fca6d10f6ba0a2b959a3d8a89a9", "detected_licenses": [ "MIT" ], "directory_id": "78db5bc74181173f2d00bea409997a64b4682adf", "extension": "py", "fi...
2.515625
stackv2
"""The provided sample code in this repository will reference this file to get the information needed to connect to your lab backend. You provide this info here once and the scripts in this repository will access it as needed by the lab. Copyright (c) 2019 Cisco and/or its affiliates. Permission is hereby granted, fre...
234
34.29
91
21
1,834
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bbdc1c268c6f4821_8df2bb7c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 198 ]
[ null ]
[ 11 ]
[ 30 ]
2024-11-18T22:15:06.438268+00:00
1,633,631,125,000
669a47fbb498302d9954a48c992ac59cf96edfb8
3
{ "blob_id": "669a47fbb498302d9954a48c992ac59cf96edfb8", "branch_name": "refs/heads/main", "committer_date": 1633631125000, "content_id": "bf03a85681be93b3a78da22039cb4e5270f51922", "detected_licenses": [ "MIT" ], "directory_id": "3ff5d3feb9bc983fc8c3b8ed10132054c024f6e2", "extension": "py", "file...
2.859375
stackv2
import tweepy def send_tweet(consumer_key, consumer_secret, key, secret,message): auth = tweepy.OAuthHandler(consumer_key, consumer_secret) auth.set_access_token(key, secret) print("IN SSEND TWEET") print(consumer_secret) print(consumer_key) print(key) print(secret) print(message) ...
18
22.83
67
8
104
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8e6158f063f00d30_8e9d263a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 8, 11 ]
[ null, null ]
[ 11, 11 ]
[ 26, 17 ]
2024-11-18T22:15:09.163273+00:00
1,616,830,651,000
4dd7831bb7abb17d6f2ae8a36b69569ddfdbee1a
3
{ "blob_id": "4dd7831bb7abb17d6f2ae8a36b69569ddfdbee1a", "branch_name": "refs/heads/master", "committer_date": 1616830651000, "content_id": "6836616fe87a7cc9b3bf37cf316d1ff2852bc722", "detected_licenses": [ "MIT" ], "directory_id": "c142b637c7919ee9fd7a0d8fccf702778d46c932", "extension": "py", "fi...
2.96875
stackv2
"""WhatsApp Message Sender API.""" import re from time import sleep # for stopping the program for an interval from traceback import print_exc from typing import List, Generator import validators # for controlling the browser from selenium import webdriver from selenium.common.exceptions import NoSuchElementException...
237
41.74
116
21
2,095
python
[{"finding_id": "codeql_py/overly-large-range_cec11b7215cc994f_accf9162", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 123, 125 ]
[ null, null ]
[ 41, 41 ]
[ 45, 45 ]
2024-11-18T22:26:01.367100+00:00
1,598,004,158,000
bed647ec3ca1499a59b1426335f1a77ac76aed49
2
{ "blob_id": "bed647ec3ca1499a59b1426335f1a77ac76aed49", "branch_name": "refs/heads/master", "committer_date": 1598004158000, "content_id": "a7bc231c52fd728390d698b7769ef267b27ce782", "detected_licenses": [ "Apache-2.0" ], "directory_id": "fc735eff8d464ccdc9e0777612ee82bec11d86d2", "extension": "py"...
2.390625
stackv2
import datetime import os from flask import Flask, request from tasks_access.tasks_access import CloudTasksAccessor app = Flask(__name__) QUEUE_NAME = 'my-appengine-queue' LOCATION = 'us-central1' cloud_tasks_client = None task_count = 0 @app.route('/task_handler', methods=['POST']) def task_handler(): payl...
62
33.61
113
15
492
python
[{"finding_id": "codeql_py/reflective-xss_b796f19fdf0f0258_23896aea", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 23 ]
[ null ]
[ 12 ]
[ 15 ]
2024-11-18T22:26:01.971180+00:00
1,499,431,160,000
2bfa12d19dafd724eb15bdea25cc0e542f0ef868
2
{ "blob_id": "2bfa12d19dafd724eb15bdea25cc0e542f0ef868", "branch_name": "refs/heads/master", "committer_date": 1499431160000, "content_id": "be3ca956a65b0ee4ae1c22e291cd888f11cc6e3b", "detected_licenses": [ "MIT" ], "directory_id": "3c17e189622018329bc0ebd8523eae8db9f3112a", "extension": "py", "fi...
2.328125
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- from ..simpleextractor import SimpleExtractor import re class Iqilu(SimpleExtractor): name = u"齐鲁网 (iqilu)" def __init__(self): SimpleExtractor.__init__(self) self.title_pattern = '<meta name="description" content="(.*?)\"\W' self.url_patt...
18
25.44
74
10
133
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_ecf24babaf842637_ace0f264", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'iqilu.com/', so it might match more...
1
true
[ "CWE-020" ]
[ "py/incomplete-hostname-regexp" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'iqilu.com/', so it might match more hosts than expected." ]
[ 16 ]
[ null ]
[ 27 ]
[ 49 ]
2024-11-18T22:26:24.409484+00:00
1,610,210,596,000
7b51ad3c562beae10238859fc5bf7b9d5d6f136a
3
{ "blob_id": "7b51ad3c562beae10238859fc5bf7b9d5d6f136a", "branch_name": "refs/heads/main", "committer_date": 1610210596000, "content_id": "e4e0e3bc2fc07e38e2843d388288ba798e124cfb", "detected_licenses": [ "MIT" ], "directory_id": "75fb28b345ee06c201852469d9b02aa3c46d263e", "extension": "py", "file...
2.75
stackv2
from flask import Flask, request, jsonify, render_template import pickle import numpy as np import re from scipy.sparse import hstack import nltk app = Flask(__name__) analyser=open('SentimentAnalyser.pkl','rb') sid=pickle.load(analyser) analyser.close() def remove_htmltags(s): res = re.sub('<.*?>','',s) r...
159
29.5
125
16
1,249
python
[{"finding_id": "codeql_py/flask-debug_2e3a61c699011462_a65d17d6", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-1333" ]
[ "py/flask-debug", "py/polynomial-redos" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings starting with '<' and with many repetitions of '<'." ]
[ 159, 17 ]
[ null, null ]
[ 5, 29 ]
[ 24, 30 ]
2024-11-18T20:39:51.315991+00:00
1,547,191,541,000
0e3abd0140a98561fb20214db8acdd5726fdc1a6
4
{ "blob_id": "0e3abd0140a98561fb20214db8acdd5726fdc1a6", "branch_name": "refs/heads/master", "committer_date": 1547191541000, "content_id": "3ac43b70b173a2e09d14f789900d8fab47e44d7f", "detected_licenses": [ "Apache-2.0" ], "directory_id": "4a1a64880cee58b916225a46ac339b1cf6d39dc5", "extension": "py"...
4
stackv2
# # 类封装版学生管理系统 # # # # n = [{'z':'小明' ,'x':13 ,'c':'男'} , # {'z':'小红' ,'x':12 ,'c':'女'} , # {'z':'老王' ,'x':45 ,'c':'男'}] # print("""1-查询学员姓名 # 2-添加学员姓名 # 3-修改学员姓名 # 4-删除学员姓名 # 0-退出程序""") # # b = int(input('请选择操作:')) # # class S(): # n = [] # def v1(self): # print('编号' ,'\t' ,'\t' ,'姓名' ,'\t' ,...
137
19.97
110
16
939
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fb18931458fbe32d_4e32acdc", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 47 ]
[ null ]
[ 92 ]
[ 110 ]
2024-11-18T20:39:54.076310+00:00
1,591,596,029,000
fdb8f5047abfdd2cb646512bd8157eeaf04b0855
3
{ "blob_id": "fdb8f5047abfdd2cb646512bd8157eeaf04b0855", "branch_name": "refs/heads/master", "committer_date": 1591596029000, "content_id": "87fab26437b7368e3066232055c0030d5b967534", "detected_licenses": [ "Apache-2.0" ], "directory_id": "9d79f590bdf878b70b82168370d6875afe7db7c8", "extension": "py"...
2.703125
stackv2
import hashlib from typing import Tuple import uuid from .auth_provider import User, AuthProvider class AuthService: def __init__(self, auth_provider: AuthProvider) -> None: self.auth_provider = auth_provider self.is_initialised = False async def register(self, email: str, password: str) -> ...
44
35.39
88
17
356
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_c630f9908fb04b01_fe105cb8", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally e...
[ 32, 37 ]
[ null, null ]
[ 42, 44 ]
[ 68, 70 ]
2024-11-18T20:39:59.897997+00:00
1,466,340,930,000
426a8b2e11fb9ee35e564ab603b766ccc73b2272
2
{ "blob_id": "426a8b2e11fb9ee35e564ab603b766ccc73b2272", "branch_name": "refs/heads/master", "committer_date": 1466343186000, "content_id": "b8ed05d566e7b0448653477068a49b5e60a1312a", "detected_licenses": [ "Unlicense" ], "directory_id": "617f317dfe1a160f349670c3244473e81e8cac6d", "extension": "py",...
2.421875
stackv2
import flask import flask_login from flask_skeleton.forms import UserForm from flask_skeleton.models import db, User views = flask.Blueprint( 'views', __name__, template_folder='templates', static_folder='static') @views.route('/login/', methods=['GET', 'POST']) def login(): form = UserForm(flask...
36
29.53
74
18
218
python
[{"finding_id": "codeql_py/url-redirection_8173b100b3a7c78d_8e1269bb", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 25 ]
[ null ]
[ 39 ]
[ 74 ]
2024-11-18T20:40:01.574716+00:00
1,678,784,344,000
5a0461f38bea8bdd6d71fc60c9b94a515a320884
3
{ "blob_id": "5a0461f38bea8bdd6d71fc60c9b94a515a320884", "branch_name": "refs/heads/master", "committer_date": 1678784344000, "content_id": "87b5c8abbb9e7ec0fecccbabf4528669fccab9a9", "detected_licenses": [ "MIT" ], "directory_id": "2f233b31ea7ffefad4b901b561f341fabe3bbb1f", "extension": "py", "fi...
2.53125
stackv2
#!/usr/bin/python3.8 from datetime import datetime import os import sys if len(sys.argv) > 1: day = int(sys.argv[1]) else: day = datetime.now().day print(f"Day {day:02}") with open("template.txt", "rt") as sourcef: template = sourcef.read() template = template.replace("{{day}}", str(day)) fname = f"{d...
24
16.21
48
10
129
python
[{"finding_id": "codeql_py/overly-permissive-file_8ab8c36e1393b236_e0c21fd7", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable." ]
[ 24 ]
[ null ]
[ null ]
[ 23 ]
2024-11-18T20:40:07.571998+00:00
1,693,399,722,000
a48fa1b6e64a1238f063b81b86d7dc7432c0fd40
3
{ "blob_id": "a48fa1b6e64a1238f063b81b86d7dc7432c0fd40", "branch_name": "refs/heads/master", "committer_date": 1693399722000, "content_id": "af4d4a88f028fb5f9e18e4cfdba93a362d6c79fa", "detected_licenses": [ "MIT" ], "directory_id": "9f84d91a8ae3df53b07fe3267992fba00a99ac9e", "extension": "py", "fi...
2.703125
stackv2
import os import os.path as osp from typing import Callable, List, Tuple, Union from uuid import uuid1 import torch from torch_geometric.nn.conv.utils.jit import class_from_module_repr def Sequential( input_args: str, modules: List[Union[Tuple[Callable, str], Callable]], ) -> torch.nn.Module: r"""An ext...
123
36.21
79
16
1,128
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_e683ba0cdaceb100_d822083d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 102 ]
[ null ]
[ 20 ]
[ 38 ]
2024-11-18T20:52:12.999622+00:00
1,619,536,988,000
f78a776b124d9681c053611cfd44b336ea2706d8
3
{ "blob_id": "f78a776b124d9681c053611cfd44b336ea2706d8", "branch_name": "refs/heads/main", "committer_date": 1619536988000, "content_id": "2c6b42ac5b6304739e4973a1df0c8c5d8c2b8dd9", "detected_licenses": [ "MIT" ], "directory_id": "3cc3a94e4819ec66ce91209e226abfd558790e4f", "extension": "py", "file...
2.890625
stackv2
""" Created on 19 Mar 2019 @author: ejimenez-ruiz """ import json import time from urllib import parse, request from entity import KGEntity class Lookup(object): def __init__(self, lookup_url): self.service_url = lookup_url def getJSONRequest(self, params, attempts=3): try: # u...
340
26.49
82
21
2,013
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6d4a6b4d3689abc2_26e1ce33", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 38 ]
[ null ]
[ 19 ]
[ 76 ]
2024-11-18T20:52:20.500003+00:00
1,621,359,801,000
77e1ba1a4f7420698f12533ce06ce6b2e88d0ae8
2
{ "blob_id": "77e1ba1a4f7420698f12533ce06ce6b2e88d0ae8", "branch_name": "refs/heads/master", "committer_date": 1621359801000, "content_id": "5fa70ae29fc4503ae9eec4e07a577337636d4e00", "detected_licenses": [ "MIT" ], "directory_id": "b07d0f7fcf48d9f452cd7a3f60da90bff218c190", "extension": "py", "fi...
2.40625
stackv2
from logging import getLogger from flask import Flask, request, jsonify from ..config import PROJECT_NAME from .parser import parse_request_body from ..predict.main import predict PING_ROUTE = '/ping' PREDICT_ROUTE = '/predict' DEBUG_PORT = 5000 logger = getLogger(__name__) app = Flask(PROJECT_NAME) @app.route(P...
47
22.77
77
15
270
python
[{"finding_id": "codeql_py/stack-trace-exposure_72439e1b7557a288_90b97217", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-215" ]
[ "py/stack-trace-exposure", "py/flask-debug" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger." ]
[ 35, 43 ]
[ null, null ]
[ 24, 5 ]
[ 40, 57 ]
2024-11-18T20:52:25.549340+00:00
1,608,798,459,000
335bc65714e727de19e7eb842e2c111737be86b5
3
{ "blob_id": "335bc65714e727de19e7eb842e2c111737be86b5", "branch_name": "refs/heads/master", "committer_date": 1608798459000, "content_id": "c3dc73a257fda71c3c0e61187d863b7c26d4eba8", "detected_licenses": [ "Apache-2.0" ], "directory_id": "24eceb0f35bf9c9e7d369242816fb168e1006867", "extension": "py"...
2.578125
stackv2
#!/usr/bin/env python import urllib2 import tarfile import os DOWNLOAD_URL = "https://dl.dropboxusercontent.com/s/r23dxeaahpobjuj/ModernMapOccupancyGrid.tgz" LOCALFILENAME = 'ModernMapOccupancyGrid.tgz' def scriptdir(): return os.path.dirname(__file__) or './' def download_untar(data_url, fname, parentdir): ...
32
27.78
95
11
240
python
[{"finding_id": "codeql_py/tarslip_6453496316a4bc72_1108221b", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 25 ]
[ null ]
[ 5 ]
[ 8 ]
2024-11-18T21:08:12.752840+00:00
1,689,093,789,000
3a3b957e816a19f98f1e29b31ce8943fecd9bb73
3
{ "blob_id": "3a3b957e816a19f98f1e29b31ce8943fecd9bb73", "branch_name": "refs/heads/master", "committer_date": 1689093789000, "content_id": "21fce741dde44cb65a23b2629d452c0333e620dc", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "409b066a195db9bb6c65abcfbc1c312b077522b4", "extension": "p...
2.53125
stackv2
# Authors: # Loic Gouarin <loic.gouarin@polytechnique.edu> # Benjamin Graille <benjamin.graille@math.u-psud.fr> # # License: BSD 3 clause """ Symbolic computation of equivalent equations """ # pylint: disable=invalid-name import sympy as sp from ..symbolic import alltogether class EquivalentEquation: de...
348
34.92
115
32
2,713
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_a0a59833339d0dad_6dcc786e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
3
true
[ "CWE-079", "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 201, 212, 227 ]
[ 210, 225, 242 ]
[ 27, 27, 27 ]
[ 10, 10, 10 ]
2024-11-18T21:08:21.509026+00:00
1,621,569,388,000
3d85563003ddee4d2d997bcf8a89ccbabc644828
2
{ "blob_id": "3d85563003ddee4d2d997bcf8a89ccbabc644828", "branch_name": "refs/heads/master", "committer_date": 1621569388000, "content_id": "cd3bf7eaf555b606c5ca5e6a5f9fb70b4b3a568c", "detected_licenses": [ "MIT" ], "directory_id": "bd895a5b0bbabf9ade266b22fad353f6f6d58293", "extension": "py", "fi...
2.390625
stackv2
from typing import Final from google.cloud import secretmanager from dotenv import load_dotenv load_dotenv() SECRET_USER_ID: Final = "user" SECRET_PASSWORD_ID: Final = "password" DECODE_FORMAT: Final = "UTF-8" PROJECT_ID = "devhack-55d18" def get_name(project_id, secret_id, version): return f"projects/{project_...
28
29.79
74
12
207
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2a3857ae5830dfa7_32a1256e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 26, 27, 28 ]
[ null, null, null ]
[ 11, 11, 11 ]
[ 49, 53, 52 ]
2024-11-18T21:08:31.158738+00:00
1,616,208,720,000
d8e9af1e23720c8f4831a4788023847b6fb3eaf9
2
{ "blob_id": "d8e9af1e23720c8f4831a4788023847b6fb3eaf9", "branch_name": "refs/heads/main", "committer_date": 1616208720000, "content_id": "52adb94d08e55783fcb34e421a392c5971335319", "detected_licenses": [ "MIT" ], "directory_id": "964f073fb9a3008e31ab563288dd543aa9bb0d89", "extension": "py", "file...
2.328125
stackv2
import os from flask import Flask, render_template, request, flash, redirect, session, g, abort, jsonify, url_for from flask_admin import Admin from flask_admin.contrib.sqla import ModelView from flask_debugtoolbar import DebugToolbarExtension from sqlalchemy.exc import IntegrityError from forms import UserAddForm,...
528
27.15
103
22
3,119
python
[{"finding_id": "codeql_py/url-redirection_026548874b3de9a3_49440cde", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
6
true
[ "CWE-601", "CWE-601", "CWE-601", "CWE-601", "CWE-601", "CWE-601" ]
[ "py/url-redirection", "py/url-redirection", "py/url-redirection", "py/url-redirection", "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends o...
[ 249, 257, 267, 275, 407, 425 ]
[ null, null, null, null, null, null ]
[ 25, 21, 25, 21, 25, 25 ]
[ 41, 37, 41, 37, 41, 41 ]
2024-11-18T21:31:25.109615+00:00
1,429,354,017,000
422628835e2b62b6c6698e1ea5ebf14cbe704afd
2
{ "blob_id": "422628835e2b62b6c6698e1ea5ebf14cbe704afd", "branch_name": "refs/heads/master", "committer_date": 1429354017000, "content_id": "d97016ffd2c4141be6bd2c224df1caaf7c1ef85d", "detected_licenses": [ "MIT" ], "directory_id": "469dee03907f000a5d99ca3fca41a312f69ce291", "extension": "py", "fi...
2.40625
stackv2
"""A generic rest serving layer for NDB models.""" import logging import sys from google.appengine.api import namespace_manager from google.appengine.ext import db import flask import flask.views from appengine import user def command(func): """Command decorator - automatically dispatches methods.""" setattr(f...
207
27.86
78
15
1,382
python
[{"finding_id": "codeql_py/log-injection_4f72439d0162e83e_f22d0b14", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
3
true
[ "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 58, 116, 126 ]
[ null, null, null ]
[ 56, 18, 21 ]
[ 60, 22, 30 ]
2024-11-18T21:31:59.089746+00:00
1,564,084,309,000
54b694f7c32e6f8d3451b19d928a92558675037d
2
{ "blob_id": "54b694f7c32e6f8d3451b19d928a92558675037d", "branch_name": "refs/heads/master", "committer_date": 1564084309000, "content_id": "6c410ac0c8b7097a36d9757a8a1c24e65e33e7fe", "detected_licenses": [ "BSD-3-Clause", "BSD-2-Clause" ], "directory_id": "54b06698692a9a3401538f18c2f57523ebcf75ba...
2.390625
stackv2
import os import boto3 import time import json import sys import urllib.parse from datetime import datetime, timedelta from botocore.vendored import requests s3 = boto3.client('s3') sqs = boto3.client('sqs') sqs_queue = sqs.get_queue_url(QueueName='PW3Query-Queue.fifo') S3_BUCKET_PREFIX = "results/" PW3_API_URL = "ht...
123
31.37
104
18
956
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_06b9d9916cd12e90_ba2e609b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 66 ]
[ null ]
[ 56 ]
[ 59 ]
2024-11-18T21:32:23.630612+00:00
1,559,592,084,000
236a6eac505ec16f09032287abaf0602d64a9a00
3
{ "blob_id": "236a6eac505ec16f09032287abaf0602d64a9a00", "branch_name": "refs/heads/master", "committer_date": 1559592084000, "content_id": "0895b96765020b36f794848d4fac38bc3f4d6875", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "5e949c43b6e7c1011e6e2b26229855910f8746fa", "extension": "p...
2.578125
stackv2
#!/usr/bin/env python # encoding: utf-8 """ macosdiff.py This is a Flask app to show you the differences between the files installed by two different versions of the macOS installer. Copyright (C) University of Oxford 2018 Ben Goodstein <ben.goodstein at it.ox.ac.uk> This program is free software: you can redist...
99
31.31
86
19
721
python
[{"finding_id": "codeql_py/regex-injection_b1478f0430e300da_088a2873", "tool_name": "codeql", "rule_id": "py/regex-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This regular expression depends on a [user-provided value](1) and is executed by [re.match](2).", "remedi...
1
true
[ "CWE-730" ]
[ "py/regex-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression depends on a [user-provided value](1) and is executed by [re.match](2)." ]
[ 69 ]
[ null ]
[ 49 ]
[ 56 ]
2024-11-18T21:33:03.186439+00:00
1,532,781,802,000
9acee9eb9b4858029f904edba60977fc5a9c8116
3
{ "blob_id": "9acee9eb9b4858029f904edba60977fc5a9c8116", "branch_name": "refs/heads/master", "committer_date": 1532781802000, "content_id": "5f6fabd3cbc0e682094ac49eb8bc559a19fb9ae2", "detected_licenses": [ "Apache-2.0" ], "directory_id": "3c981d1990c6a8daf0d46ed398d82ff71da43b1f", "extension": "py"...
2.921875
stackv2
#!/usr/bin/env python3 import sys import argparse import re from collections import Counter def check_python_version(v): v = str(v).split('.') try: if not 1 < int(v[0]) <= 3: raise ValueError('Error: You are requiring invalid Python version ' + v[0]) except ValueError as e: pr...
168
33.12
154
20
1,395
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2792624af430ccd6_08c5a22f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 106 ]
[ 107 ]
[ 19 ]
[ 77 ]
2024-11-18T22:42:13.738755+00:00
1,607,045,356,000
8fabf4f45d1ee8dd7dda2aab94ac14d300dcba63
3
{ "blob_id": "8fabf4f45d1ee8dd7dda2aab94ac14d300dcba63", "branch_name": "refs/heads/master", "committer_date": 1607045356000, "content_id": "4f0ed0227af588549bb86fdf12fdca7ce6ddb1d5", "detected_licenses": [ "MIT" ], "directory_id": "32f5b3e8299f01bb421e2e2aa324c3f883af1dcf", "extension": "py", "fi...
2.5625
stackv2
from untwisted.event import ACCEPT, READ, CLOSE, SSL_ACCEPT, WRITE, SSL_ACCEPT_ERR from untwisted.dispatcher import Erase from untwisted.errors import ACCEPT_ERR_CODE from untwisted.client import install_basic_handles from untwisted.network import SuperSocket, SuperSocketSSL import socket import ssl class Server: ...
98
25.73
82
16
600
python
[{"finding_id": "codeql_py/insecure-protocol_a28a22286e87d9ae_c09d8cbf", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol...
1
true
[ "CWE-327" ]
[ "py/insecure-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.SSLContext](1)." ]
[ 90 ]
[ null ]
[ 12 ]
[ 19 ]
2024-11-18T20:31:42.119596+00:00
1,690,821,193,000
4b048d4fb07f8058ed5084504c07959ac724f4f1
3
{ "blob_id": "4b048d4fb07f8058ed5084504c07959ac724f4f1", "branch_name": "refs/heads/master", "committer_date": 1690821193000, "content_id": "32c4141b06309853ef874d0dc2edb4537ba34b0c", "detected_licenses": [ "Apache-2.0" ], "directory_id": "c2536b4baefe44dc645e1df9746cbc6f7a7c833c", "extension": "py"...
3.046875
stackv2
#!/usr/bin/env python3 import subprocess import requests def location() -> (float, float): try: process = subprocess.run( ['CoreLocationCLI', '-once', 'YES', '-format', '%latitude\n%longitude'], stdout=subprocess.PIPE, encoding='utf8', timeout=...
88
27.9
73
13
574
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d451d7dd2a02f8da_33323a32", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.\nThis expression logs [sensitive data (private)](4) as clear text.\nThis expression logs [sensitive data (private)]...
[ 88 ]
[ null ]
[ 11 ]
[ 29 ]
2024-11-18T20:31:56.345404+00:00
1,622,565,275,000
4f8c56cde95d5d5c3a97e81ca9b767dd4d16931a
3
{ "blob_id": "4f8c56cde95d5d5c3a97e81ca9b767dd4d16931a", "branch_name": "refs/heads/main", "committer_date": 1622565275000, "content_id": "6827dddf818fa188f9774c7244dc7a50930a67bb", "detected_licenses": [ "MIT" ], "directory_id": "33c020d5bf496a429a6459a37f7eb374599781f4", "extension": "py", "file...
2.671875
stackv2
import logging import random from flask import Flask, request, render_template, flash from flask_cors import CORS from utils import get_or_create, TMDB_URLS, GAME_NUM_OPTIONS, GAME_NUM_CORRECT_OPTIONS, make_tmdb_request, get_wrong_actors, score_game from models import db, Movie, MoviePerson, TriviaScore logger = loggi...
143
32.5
135
18
1,135
python
[{"finding_id": "codeql_py/flask-debug_86ea360a91586bb0_5f5cc0e2", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-117", "CWE-117" ]
[ "py/flask-debug", "py/log-injection", "py/log-injection" ]
[ "HIGH", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 143, 23, 38 ]
[ null, null, null ]
[ 5, 17, 17 ]
[ 51, 62, 29 ]
2024-11-18T20:53:29.871221+00:00
1,689,613,335,000
45003a62d3a0332ab40ba6f4f3025490cad01afc
2
{ "blob_id": "45003a62d3a0332ab40ba6f4f3025490cad01afc", "branch_name": "refs/heads/master", "committer_date": 1689613335000, "content_id": "bcef99e41d2d9c1aa90488a1247e389b3e6abb5e", "detected_licenses": [ "NIST-Software", "BSD-3-Clause", "MIT" ], "directory_id": "faea090a9a70920c5ccdaea84c38...
2.484375
stackv2
""" REST views for the data API """ from django.urls import reverse from rest_framework import status from rest_framework.decorators import schema from rest_framework.exceptions import ValidationError from rest_framework.permissions import IsAuthenticated from rest_framework.response import Response from rest_framewor...
84
31.83
87
18
512
python
[{"finding_id": "codeql_py/stack-trace-exposure_f0121ff1f7017c78_e9d00495", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 83 ]
[ null ]
[ 17 ]
[ 24 ]
2024-11-18T20:53:36.519717+00:00
1,548,463,873,000
ffa8b3c096312939367957b1097672b0b45a5e5c
3
{ "blob_id": "ffa8b3c096312939367957b1097672b0b45a5e5c", "branch_name": "refs/heads/master", "committer_date": 1548463873000, "content_id": "3676557d5554a53f3b3b1d5d5cc973d90b86083d", "detected_licenses": [ "Apache-2.0", "MIT" ], "directory_id": "791e1ac10d0686e9fbb0b00e1f9c112557cae657", "exten...
2.765625
stackv2
''' Segment - a package of resources =================================== A Segment is a package of related xforms, models, schemas and templates. Segments may be exported to, and imported from (correctly formatted) zipfiles. These segment packages make sharing fashion resources much simpler. Segment directory layout ...
520
35.76
118
22
3,555
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_e1e4c7dc40d05f9b_bbb01708", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 258 ]
[ null ]
[ 11 ]
[ 61 ]
2024-11-18T20:53:39.063978+00:00
1,690,380,256,000
3fe4d712dd6b2ed0e8499f2eb11366b5b541f7a7
3
{ "blob_id": "3fe4d712dd6b2ed0e8499f2eb11366b5b541f7a7", "branch_name": "refs/heads/master", "committer_date": 1690380256000, "content_id": "4774fc84afe4cd2e78b0ddb5a438c1369fd3afb6", "detected_licenses": [ "MIT" ], "directory_id": "480e10ba3c431a52e0bfaa1de81896db80aa8061", "extension": "py", "fi...
2.546875
stackv2
"""Contract Message Provider.""" import os import time import requests from requests.adapters import HTTPAdapter from requests.packages.urllib3 import Retry from multiprocessing import Process from .verifier import Verifier from .http_proxy import run_proxy import logging logging.getLogger("urllib3").setLevel(logging...
157
31.04
103
17
1,063
python
[{"finding_id": "codeql_py/request-without-cert-validation_41526eb027cbce86_08fa4d20", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 61, 78 ]
[ 63, null ]
[ 16, 16 ]
[ 73, 64 ]
2024-11-18T20:53:43.787488+00:00
1,615,989,223,000
6378028490933570f2e171bf64c07a5899be2169
2
{ "blob_id": "6378028490933570f2e171bf64c07a5899be2169", "branch_name": "refs/heads/master", "committer_date": 1615989223000, "content_id": "3063abf5d04ae79ebb9b1f7fcdfe25821852d936", "detected_licenses": [ "MIT" ], "directory_id": "d16ea92cbce673b427da0d87c9017ae1fc50cc06", "extension": "py", "fi...
2.34375
stackv2
from app import app from flask import Flask, flash, request, redirect, abort, jsonify, send_from_directory, render_template, make_response, Response from werkzeug.utils import secure_filename import json import time import os UPLOADS = app.config["UPLOADS"] DOWNLOADS = app.config["DOWNLOADS"] EXTENSION_SOMATIC = app....
175
33.2
128
20
1,320
python
[{"finding_id": "codeql_py/url-redirection_f27335373134e68a_ead61807", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
4
true
[ "CWE-601", "CWE-601", "CWE-601", "CWE-601" ]
[ "py/url-redirection", "py/url-redirection", "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).\nUntrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a ...
[ 60, 54, 110, 160 ]
[ null, null, null, null ]
[ 33, 33, 25, 25 ]
[ 44, 44, 36, 36 ]
2024-11-18T21:10:23.602437+00:00
1,669,071,543,000
d66b8a13c741cd3f87a4ff79d82c863199215f41
3
{ "blob_id": "d66b8a13c741cd3f87a4ff79d82c863199215f41", "branch_name": "refs/heads/master", "committer_date": 1669071543000, "content_id": "50806bde25d23ef352eb2546e2bd52357704864d", "detected_licenses": [ "MIT" ], "directory_id": "000715472f9b1d2a286c3c3a28b93537a0e0ffbe", "extension": "py", "fi...
2.53125
stackv2
import json import os import requests import time from dotenv import load_dotenv load_dotenv() api_key = os.environ.get('API_KEY') puuid = os.environ.get('PUUID') start = 0 count = 100 # why this stupid shit not have all data, ffs match_list_url = 'https://americas.api.riotgames.com/lol/match/v5/matches/by-puuid/{}...
83
20.04
119
12
568
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3279e6b67b041ad8_037f1c0c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
7
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensi...
[ 41, 48, 49, 73, 77, 78, 79 ]
[ null, null, null, null, null, null, null ]
[ 9, 9, 9, 9, 9, 9, 9 ]
[ 17, 12, 17, 43, 12, 17, 14 ]
2024-11-18T21:10:30.647607+00:00
1,607,437,498,000
67def59df2bde67d0fe7610685a2e8365ff32ab6
2
{ "blob_id": "67def59df2bde67d0fe7610685a2e8365ff32ab6", "branch_name": "refs/heads/master", "committer_date": 1607437498000, "content_id": "44ff1d5cacec6606aebdca4ffabd7e4b35bcd214", "detected_licenses": [ "MIT" ], "directory_id": "b1523a6a9e665847cc1cbb7f00870265ba985363", "extension": "py", "fi...
2.375
stackv2
import configparser import json import logging import subprocess import sys from dataclasses import dataclass from pprint import pformat from typing import Any, List import bottle logging.basicConfig(stream=sys.stdout, level=logging.INFO, format='%(asctime)-15s %(levelname)s: %(message)s') log = l...
196
27.94
108
19
1,327
python
[{"finding_id": "codeql_py/log-injection_7399438a0e2bcf78_e1f0be74", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2)...
3
true
[ "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2).", "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2).", "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [use...
[ 107, 110, 158 ]
[ null, null, 163 ]
[ 23, 23, 14 ]
[ 77, 75, 37 ]
2024-11-18T21:10:34.209154+00:00
1,628,859,238,000
b8d4398fc087e45a2dc225d216ef24aafda4cbfa
3
{ "blob_id": "b8d4398fc087e45a2dc225d216ef24aafda4cbfa", "branch_name": "refs/heads/main", "committer_date": 1628859238000, "content_id": "8906234f2cbd96d80cbd870ab60971bea518a807", "detected_licenses": [ "MIT" ], "directory_id": "d5c0c7316d7304c496ea120292b045803ee324c5", "extension": "py", "file...
2.75
stackv2
import os import tweepy from huepy import * # refer to this https://github.com/s0md3v/huepy import re import time import pandas as pd from pandas import DataFrame from mtranslate import translate from textblob import TextBlob import nltk from nltk.corpus import stopwords from nltk.tokenize import word_tokenize class...
170
42.12
123
21
1,514
python
[{"finding_id": "codeql_py/overly-large-range_cf13db5dad6f858a_52255379", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with 0-9 in the same character class, and overlaps with A-Z in ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with 0-9 in the same character class, and overlaps with A-Z in the same character class." ]
[ 122 ]
[ null ]
[ 32 ]
[ 35 ]
2024-11-18T21:46:33.435419+00:00
1,511,820,096,000
36b7490b6b8eee332b2aec4534f9ced2851e6eb1
2
{ "blob_id": "36b7490b6b8eee332b2aec4534f9ced2851e6eb1", "branch_name": "refs/heads/master", "committer_date": 1511820096000, "content_id": "8f42e57b46db277baa2e1f05532ef57bc75eaf33", "detected_licenses": [ "MIT" ], "directory_id": "faade30e4ab8e35ff8d6b2483b4a7971d3373ca2", "extension": "py", "fi...
2.4375
stackv2
#!/usr/bin/env python """ ASI Data Timeseries """ import sys import datetime import numpy import matplotlib matplotlib.use('agg') import matplotlib.pyplot as plt import matplotlib.dates as mdates import pytz import cgitb cgitb.enable() from pyiem.network import Table as NetworkTable nt = NetworkTable("ISUASI") # Quer...
106
33.11
85
13
1,083
python
[{"finding_id": "codeql_py/sql-injection_a13fa14e91c2f98f_f1e14549", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown...
1
true
[ "CWE-089" ]
[ "py/sql-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This SQL query depends on a [user-provided value](1)." ]
[ 48 ]
[ null ]
[ 17 ]
[ 20 ]
2024-11-18T21:47:33.713289+00:00
1,537,447,594,000
939dcf818e0df9e726c6e2b8b86b4050b388329c
2
{ "blob_id": "939dcf818e0df9e726c6e2b8b86b4050b388329c", "branch_name": "refs/heads/master", "committer_date": 1537447594000, "content_id": "992755a1f697017573fc331fb6e1e63bdedae81f", "detected_licenses": [ "Apache-2.0" ], "directory_id": "94ea92b00f1c8c14af7064350d619daf65b37f09", "extension": "py"...
2.421875
stackv2
#!/usr/bin/python3 # # Author: B. Herfort, M. Reinmuth, 2017 ############################################ import pyrebase import pymysql # handle mysql import json import sys CONFIG_PATH = './cfg/config.cfg' try: with open(CONFIG_PATH) as f: config_data = f.read() except IOError: print('Unable to lo...
185
29.64
117
13
1,210
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a75c23ada9689745_d50db8f7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 75 ]
[ null ]
[ 11 ]
[ 47 ]
2024-11-18T21:47:34.929259+00:00
1,616,298,141,000
275b37bce0ed51194b670e745244b30e661168d6
2
{ "blob_id": "275b37bce0ed51194b670e745244b30e661168d6", "branch_name": "refs/heads/main", "committer_date": 1616298141000, "content_id": "fb9d64e37476a89feff194132fe33440abb36523", "detected_licenses": [ "MIT" ], "directory_id": "f0169f15e6450b41f2d2c9a955bc806102f6ef66", "extension": "py", "file...
2.46875
stackv2
import requests from bs4 import BeautifulSoup from bs4 import Comment import csv import re import sys import getopt import urllib import pandas as pd from selenium import webdriver from selenium.webdriver.common.keys import Keys from selenium.webdriver.common.action_chains import ActionChains from selenium.webdriver.c...
170
28.36
108
21
1,180
python
[{"finding_id": "codeql_py/bad-tag-filter_fb3cb766471fe717_d79fa995", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression only parses --> and not --!> as a HTML comment end tag.", "remediation": "", "location":...
1
true
[ "CWE-116" ]
[ "py/bad-tag-filter" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression only parses --> and not --!> as a HTML comment end tag." ]
[ 104 ]
[ null ]
[ 31 ]
[ 39 ]
2024-11-18T22:29:03.276333+00:00
1,689,761,405,000
aaabe374412eb4bbb39eab6a4cca960fded5acaf
3
{ "blob_id": "aaabe374412eb4bbb39eab6a4cca960fded5acaf", "branch_name": "refs/heads/master", "committer_date": 1689761405000, "content_id": "bf6de46dc371a7fc8d6eb12fe58288ccf12b6b61", "detected_licenses": [ "MIT" ], "directory_id": "957ae0f325516ce4f8d7940aae628d4ec34ac647", "extension": "py", "fi...
3.203125
stackv2
# -*- coding: utf-8 -*- """Utility functions to download files.""" import os import hashlib import zipfile import tarfile import requests from tqdm.auto import tqdm CHUNKSIZE = 1048576 # 1 MB RETRIES = 3 def download_file(url, out_path, extract_out_path=None, byte_size=None, sha256sum=None, progress=True, callb...
123
37.23
126
17
1,132
python
[{"finding_id": "codeql_py/tarslip_6cd237fa94d40348_351d9d08", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially untrusted source](1)." ]
[ 83 ]
[ null ]
[ 13 ]
[ 23 ]
2024-11-18T22:29:03.695532+00:00
1,625,155,430,000
40775984de5bc83716e74cfdb5c56a78332c628b
3
{ "blob_id": "40775984de5bc83716e74cfdb5c56a78332c628b", "branch_name": "refs/heads/master", "committer_date": 1625155430000, "content_id": "74ac33efd7c21830d8a55194cb5ad11bf7eb818a", "detected_licenses": [ "MIT" ], "directory_id": "ba91a64cc040cec52e8b46d4064a810ec8927e60", "extension": "py", "fi...
2.65625
stackv2
import os import json from flask import Flask, render_template, request, redirect, url_for, flash from werkzeug.utils import secure_filename from read_midi import read_midi from algorithms import siatec, time_warp_invariant app = Flask(__name__) app.config['UPLOAD_FOLDER'] = 'midi_files' app.config['MAX_CONTENT_LENG...
194
24.24
75
17
1,172
python
[{"finding_id": "codeql_py/flask-debug_794df12fa4f6fcb3_41d82409", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-022" ]
[ "py/flask-debug", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1)." ]
[ 194, 156 ]
[ null, null ]
[ 2, 13 ]
[ 22, 21 ]
2024-11-18T22:29:20.188710+00:00
1,531,527,840,000
c43bbc0b8a159060ad356c0a6ed5e61950376a12
3
{ "blob_id": "c43bbc0b8a159060ad356c0a6ed5e61950376a12", "branch_name": "refs/heads/master", "committer_date": 1531527840000, "content_id": "f7db3126a7ca4d2c550c7cad7b4e07e0c5610e87", "detected_licenses": [ "MIT" ], "directory_id": "2e6e1902fb74bb1af4820b85bc46e4feb21d58d0", "extension": "py", "fi...
3.484375
stackv2
import racegen, namegen, statgen, classgen, featgen, skillgen class NPC(): def __init__(self): #Inputs self.inLevel = None self.inRace = None self.inName = None self.inGender = None self.inStats = None self.inClass = None self.inFeats = None self.inSkills = None #Intermediate values self.raceSt...
116
27.18
114
15
908
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2c1d32f630cae3a4_916dcdad", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 99 ]
[ null ]
[ 9 ]
[ 60 ]
2024-11-18T22:29:29.458445+00:00
1,608,527,961,000
8a4a5db7f93ac432dc848302261c721be8001c4a
3
{ "blob_id": "8a4a5db7f93ac432dc848302261c721be8001c4a", "branch_name": "refs/heads/main", "committer_date": 1608527961000, "content_id": "2038c6d07b2476b214e42ce6fbc4ed55fa2e85e8", "detected_licenses": [ "Apache-2.0" ], "directory_id": "a1555437baf215548a7fc718b544264095718488", "extension": "py", ...
3.078125
stackv2
"""Recursive full backup. Usage: remote-to-local-backup bkp SERVER USER REMOTE_DIR LOCAL_DIR remote-to-local-backup (-h | --help) Arguments: SERVER Remote server from which to backup. It is assumed the passwordless authentication using public SSH key has already been set up USER User id to login t...
74
35.22
170
15
658
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_98504922c9a86287_aa8ccf77", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 38 ]
[ null ]
[ 5 ]
[ 60 ]
2024-11-18T22:29:34.597030+00:00
1,603,740,682,000
d98fe06ebe21f5d40394092fc90c84b8ac962b25
4
{ "blob_id": "d98fe06ebe21f5d40394092fc90c84b8ac962b25", "branch_name": "refs/heads/master", "committer_date": 1603740682000, "content_id": "fedcd3d6aca2b13a5d4adbef1f9ad080291d121b", "detected_licenses": [ "MIT" ], "directory_id": "7a20dac7b15879b9453150b1a1026e8760bcd817", "extension": "py", "fi...
3.546875
stackv2
employee_salary = float(input()) readjustment_rate = gain = 0 if 0 <= employee_salary <= 400: readjustment_rate = 15 elif 400 < employee_salary <= 800: readjustment_rate = 12 elif 800 < employee_salary <= 1200: readjustment_rate = 10 elif 1200 < employee_salary <= 2000: readjustment_rate = 7 elif 2000 <...
17
35.65
79
8
210
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_397e9fbdc7abf9a3_ba4945fa", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 15 ]
[ null ]
[ 7 ]
[ 45 ]
2024-11-18T22:40:27.601365+00:00
1,537,385,351,000
127e4a44a2f1c24299915d5b3bf51ddf6c41fb65
3
{ "blob_id": "127e4a44a2f1c24299915d5b3bf51ddf6c41fb65", "branch_name": "refs/heads/master", "committer_date": 1537385351000, "content_id": "5c4821bb82c66fa22cf3a130d9722d69648f54b8", "detected_licenses": [ "MIT" ], "directory_id": "517230c50762a1e3e10810831a2023554d0f99e2", "extension": "py", "fi...
2.796875
stackv2
"""Offer functions for updating the ``Population`` table in the database. This module offer functions to automate the process of updating the ``Population`` table in the database file, ``@/database/database.db``. The module depends on ``database``, ``inputtools`` and ``outputtools`` modules. The module contains the f...
295
32.5
126
16
2,295
python
[{"finding_id": "codeql_py/request-without-cert-validation_b19a80e614c5e33b_8fd10c72", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 76 ]
[ null ]
[ 11 ]
[ 42 ]
2024-11-18T22:41:13.633880+00:00
1,572,614,666,000
2e1d96e95790aa32d784f79e0d836b09dfa9b414
2
{ "blob_id": "2e1d96e95790aa32d784f79e0d836b09dfa9b414", "branch_name": "refs/heads/master", "committer_date": 1572614666000, "content_id": "93a07dc7500b6e036de7644d9cbe6f2d9caca97a", "detected_licenses": [ "MIT" ], "directory_id": "54e9f602de6d5b17e76170e78922f4ef26da99cd", "extension": "py", "fi...
2.46875
stackv2
import time import os import tweepy from selenium import webdriver import sys #Globals: #pagenum, timeline, CONSUMER_TOKEN, CONSUMER_SECRET, config[] def get_api_keys(): file = open(find_path("\env.txt"),"r") api_keys = file.read() file.close() global CONSUMER_TOKEN global CONSUMER_SEC...
227
29.28
117
16
1,657
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_f2c2781337712f89_9b01702f", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive data (secret)](2) as clear text." ]
[ 103 ]
[ null ]
[ 24 ]
[ 44 ]
2024-11-18T22:41:17.713248+00:00
1,377,196,573,000
6bb8a3044b0428f52d5e5b220719134ac07ccb35
2
{ "blob_id": "6bb8a3044b0428f52d5e5b220719134ac07ccb35", "branch_name": "refs/heads/master", "committer_date": 1377196573000, "content_id": "df5dc4e622ac5338936a74f29bc5bb3d37582cc1", "detected_licenses": [ "Apache-2.0" ], "directory_id": "4d7c40c014762d03e27f999cc989906bb24cec2a", "extension": "py"...
2.328125
stackv2
# Copyright 2012 OpenStack Foundation # # Licensed under the Apache License, Version 2.0 (the "License"); you may # not use this file except in compliance with the License. You may obtain # a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable l...
51
34.39
78
13
397
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_2cc59b69501cd7e8_ba542a3f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 17 ]
[ 20 ]
[ 7 ]
[ 4 ]
2024-11-18T22:41:21.169755+00:00
1,458,375,735,000
833438ff1b37e80468f0f762af032484854ba254
2
{ "blob_id": "833438ff1b37e80468f0f762af032484854ba254", "branch_name": "refs/heads/master", "committer_date": 1458375735000, "content_id": "1191c67fa9bfdb8cccaa02434885f06f506a8ecb", "detected_licenses": [ "MIT" ], "directory_id": "0a17076b65f7a8cf44decdc6bd924bc12d6ee4df", "extension": "py", "fi...
2.328125
stackv2
# -*- coding: utf-8 -*- import os import sys import requests import shutil import multiprocessing import time from time import strftime from bs4 import BeautifulSoup from functools import partial requests.packages.urllib3.disable_warnings() rs = requests.session() #移除特殊字元(移除Windows上無法作為資料夾的字元) def remove(value, del...
141
28.61
110
16
1,145
python
[{"finding_id": "codeql_py/request-without-cert-validation_8c7416cfacf40886_2dffbfac", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
3
true
[ "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 71, 85, 95 ]
[ null, null, null ]
[ 14, 11, 14 ]
[ 56, 38, 82 ]
2024-11-18T22:54:22.853364+00:00
1,624,074,467,000
42ff578786a37b04f2c4c2e19bdc9fe1f56aa8d2
2
{ "blob_id": "42ff578786a37b04f2c4c2e19bdc9fe1f56aa8d2", "branch_name": "refs/heads/main", "committer_date": 1624074467000, "content_id": "3d015a9b6da1a85dcd1547d211ecee60a9198b97", "detected_licenses": [ "Unlicense" ], "directory_id": "69f171d355007971c23cdb1ab7fa62c73e3705d0", "extension": "py", ...
2.34375
stackv2
# ver 20210508a import time _ = {'_':time.time()} class main: def __init__(self, dbstr_file=None, debug=False, dbstr='{protocol}://{user}:{password}@{host}:{port}/{db}?charset={charset}', db='', protocol='mysql', user='root',password='', host='127.0.0.1', port=3306, charset='utf8mb4' ...
48
35.88
134
18
470
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7093ed9dfcf50be2_1ea5eab3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 19 ]
[ null ]
[ 23 ]
[ 29 ]
2024-11-18T20:55:06.512597+00:00
1,555,601,556,000
1c5ba0ac6ab24c55ecc12619ffa0d59ab1f9dcfa
2
{ "blob_id": "1c5ba0ac6ab24c55ecc12619ffa0d59ab1f9dcfa", "branch_name": "refs/heads/master", "committer_date": 1555601556000, "content_id": "7b3b7eab9fb4df666d085b0506319e9920d8872f", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e658c33d72c123db65c0343bdf284ed108108d27", "extension": "py"...
2.46875
stackv2
from flask import Flask, request, jsonify import base64 import json import os from predict import predict from crontab import CronTab app = Flask(__name__) if os.path.isdir("data/known/aligned") == False: os.mkdir("data/known/aligned") training_cron = CronTab(user='root') job = training_cron.new(command='python ...
43
28.53
103
17
346
python
[{"finding_id": "codeql_py/path-injection_adb364422d438ec5_34673bf4", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
4
true
[ "CWE-022", "CWE-022", "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 37, 37, 39, 39 ]
[ null, null, null, null ]
[ 14, 42, 14, 53 ]
[ 41, 84, 51, 103 ]
2024-11-18T21:07:42.927382+00:00
1,455,588,497,000
b7472cb20b8cef7035262fcc04a4ef27c130e718
3
{ "blob_id": "b7472cb20b8cef7035262fcc04a4ef27c130e718", "branch_name": "refs/heads/master", "committer_date": 1455588497000, "content_id": "beefe452a7baee907eca3c3c2813218b1046541c", "detected_licenses": [ "MIT" ], "directory_id": "04445b43506e1351a7b78e60d09b2af67db527ed", "extension": "py", "fi...
2.625
stackv2
import requests import json uwApiEndpoint = "https://api.uwaterloo.ca/v2/" apiKey = "YOUR API KEY HERE" reqUrl = uwApiEndpoint + "terms/1161/courses.json?key=" + apiKey r = requests.get(reqUrl) courseListData = r.json() courseDetailsList = [] print "There are " + str(len(courseListData["data"])) + " courses" count ...
27
27.96
125
13
211
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_89e1f3a4e921e6bd_66a71e9e", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 26 ]
[ null ]
[ 16 ]
[ 26 ]
2024-11-18T21:33:01.817387+00:00
1,645,276,200,000
2367e91d6bb2c4ecf55da59b8864961cb050559e
2
{ "blob_id": "2367e91d6bb2c4ecf55da59b8864961cb050559e", "branch_name": "refs/heads/master", "committer_date": 1645276200000, "content_id": "37d121e94ed3dec537c749e16783b5a0117ef462", "detected_licenses": [ "MIT" ], "directory_id": "3ee7a2074e29e070ecc8d84efb7175a44aa1c7dc", "extension": "py", "fi...
2.4375
stackv2
# pylint: disable=too-many-branches import socket import time import random import logging import ssl import datetime import subprocess import threading from . import config from . import parser from . import handler CONNECTION_TIMEOUT = 30 REBOOT_TIMEOUT = 6 class ShutdownException(Exception): pass class Clie...
87
29.24
89
17
468
python
[{"finding_id": "codeql_py/insecure-protocol_3973cd2e15e841d8_0eeaa6f4", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/...
1
true
[ "CWE-327" ]
[ "py/insecure-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.create_default_context](1)." ]
[ 50 ]
[ null ]
[ 26 ]
[ 37 ]
2024-11-18T21:33:13.059491+00:00
1,426,898,201,000
dea8c66fe4e6587d9ce6c0725a30aebfb5c38be8
3
{ "blob_id": "dea8c66fe4e6587d9ce6c0725a30aebfb5c38be8", "branch_name": "refs/heads/master", "committer_date": 1426898201000, "content_id": "55e0930f83b2c5193a9525f7b96ce1aedc27394e", "detected_licenses": [ "MIT" ], "directory_id": "ca6b7a35820a513634c97be6951f6c5c02fa1073", "extension": "py", "fi...
3.375
stackv2
import random content = open("enable1.txt").readlines() length = 4 amount = 5 words = [] realpass = 0 while True: s = input("Difficulty level? (1-5): ") if int(s) >=1 and int(s)<=5: length+=int(s) amount=(2*int(s))+2 break else: print("actual difficulty please") for item in content: if len(item) == length+1...
44
21.34
61
13
290
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_438d8f6456b4c7b4_07d59dae", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 23 ]
[ null ]
[ 8 ]
[ 20 ]
2024-11-18T21:33:18.500658+00:00
1,690,302,849,000
466d6e6f665d1bace119ec2a74485519ab22f5d2
3
{ "blob_id": "466d6e6f665d1bace119ec2a74485519ab22f5d2", "branch_name": "refs/heads/master", "committer_date": 1690302849000, "content_id": "e1f6ac499025b9e8175d647e47a5fbec6bda6bc1", "detected_licenses": [ "MIT" ], "directory_id": "911eb06616fba273482941ff729a55f61fd3404d", "extension": "py", "fi...
3.171875
stackv2
#!/usr/bin/python3 import os import random as rn import time import xml.etree.ElementTree as ET import hashlib from AESCipher import AESCipher from Database import Database # ============ GLOBAL VARS ===================================================== # ============ UTILITIES =======================================...
391
32.07
107
17
2,923
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6b9b9c68190347ad_f9cfd66f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 147, 229 ]
[ null, 231 ]
[ 15, 11 ]
[ 18, 81 ]
2024-11-18T21:33:18.866126+00:00
1,445,125,314,000
c4635d18173f4eee56189082e40d8f87ae4bf2d4
3
{ "blob_id": "c4635d18173f4eee56189082e40d8f87ae4bf2d4", "branch_name": "refs/heads/master", "committer_date": 1445125314000, "content_id": "673fe4b0a91910b9e66c66420c3e51c0e422c3be", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "85578a60df18e3147ec6d47d41f54454dee1343d", "extension": "p...
2.515625
stackv2
""" This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT...
214
26.73
87
18
1,453
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_c60f2a4d7e69f9ed_03913fdb", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [http://news.ycombinator.com](1) may be at an arbitrary...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [http://news.ycombinator.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 157 ]
[ null ]
[ 14 ]
[ 60 ]
2024-11-18T21:33:22.743889+00:00
1,429,267,842,000
ff90aa0fb61ee8cdfdce7c4f9fc924e957eabe5b
3
{ "blob_id": "ff90aa0fb61ee8cdfdce7c4f9fc924e957eabe5b", "branch_name": "refs/heads/master", "committer_date": 1429267842000, "content_id": "101a7d148874f545b161968d0a67f51310cf8392", "detected_licenses": [ "MIT" ], "directory_id": "a4526e490d516e02baf3e2a47dfdd0635e7a03c9", "extension": "py", "fi...
2.625
stackv2
#!/usr/bin/env python # # run.py # # References: # # * Masek J. 2013. Single interval showtwave radiation scheme with # parametrized optical saturation and spectral overlaps. # import sys import os from tempfile import NamedTemporaryFile import subprocess import numpy as np from StringIO import StringIO impo...
223
20.1
71
16
1,532
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_dfb5a556248de0ba_23f9d650", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 93 ]
[ null ]
[ 14 ]
[ 43 ]
2024-11-18T21:33:26.679663+00:00
1,599,270,040,000
f6e58103968da2c46c03db882ca198facf9ba349
3
{ "blob_id": "f6e58103968da2c46c03db882ca198facf9ba349", "branch_name": "refs/heads/master", "committer_date": 1599270040000, "content_id": "bf93fdfd6233dc9f7eff19f2f8af1ce0f6631d8d", "detected_licenses": [ "MIT" ], "directory_id": "156b7c94908339457d938c0330ec1313ec6cc132", "extension": "py", "fi...
2.8125
stackv2
import datetime import itertools import re from urllib.parse import urlparse import arrow import pytz from .constants import LOCALE, Accuracy, Guess, NO_METHOD # inspired by (MIT licensed) https://github.com/codelucas/newspaper _LOCALE = arrow.locales.get_locale(LOCALE) SEPARATOR = r'([\./\-_]{0,1})' YEAR_PATTERN =...
139
30.56
100
16
1,058
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_bff1ae6cf04935f6_c3eb6457", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [wikipedia.org](1) may be at an arbitrary position in t...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "The string [wikipedia.org](1) may be at an arbitrary position in the sanitized URL.", "The string [twitter.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 119, 122 ]
[ null, null ]
[ 10, 10 ]
[ 44, 42 ]
2024-11-18T21:55:55.945435+00:00
1,564,690,515,000
b35fdf5d495bc00f776f0f00d7fdbc78bb6e4fc1
3
{ "blob_id": "b35fdf5d495bc00f776f0f00d7fdbc78bb6e4fc1", "branch_name": "refs/heads/master", "committer_date": 1564690515000, "content_id": "98648affd74e77e13cf3ae32fc7cbfa2a4869f14", "detected_licenses": [ "MIT" ], "directory_id": "22cc26c10943bc25f50f36cb2b36a28948ef885b", "extension": "py", "fi...
2.8125
stackv2
#!/usr/bin/env python3 from flask import Flask from flask import redirect from flask import url_for app = Flask(__name__) @app.route("/admin") def hello_admin(): return "Hello Administrator" @app.route("/guest/<guest>") def hello_guest(guest): return "Hello {}, Guest".format(guest) @app.route("/user/<name>...
24
21.38
59
14
129
python
[{"finding_id": "codeql_py/reflective-xss_974507bf4accf501_aa6259ca", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 14 ]
[ null ]
[ 12 ]
[ 43 ]
2024-11-18T21:56:07.664293+00:00
1,603,728,276,000
397d26c98a0fb6dd6bded84f53d80497810a48e9
3
{ "blob_id": "397d26c98a0fb6dd6bded84f53d80497810a48e9", "branch_name": "refs/heads/main", "committer_date": 1603728276000, "content_id": "d2d79637c891bad8ed69b4d1dc572282f031d2c3", "detected_licenses": [ "MIT" ], "directory_id": "6286bd6ae8085c3f7946011ad8b2faf743577b78", "extension": "py", "file...
2.546875
stackv2
import os from pathlib import Path from flask import Blueprint, flash, request, redirect, render_template, send_from_directory from werkzeug.utils import secure_filename from flaskr.worker import process_file from flaskr.db import get_db from flaskr.conf import ALLOWED_EXTENSIONS, MAX_VIDEO_LENGTH, UPLOAD_FOLDER bp ...
93
32.65
118
16
701
python
[{"finding_id": "codeql_py/url-redirection_4beed19d15d80717_6c75e901", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
5
true
[ "CWE-601", "CWE-601", "CWE-601", "CWE-601", "CWE-601" ]
[ "py/url-redirection", "py/url-redirection", "py/url-redirection", "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends o...
[ 43, 47, 52, 68, 71 ]
[ null, null, null, null, null ]
[ 29, 33, 29, 29, 29 ]
[ 40, 44, 40, 40, 40 ]