added
stringlengths
32
32
created
int64
1,244B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.25
source
stringclasses
1 value
text
stringlengths
324
20.1k
num_lines
int64
16
598
avg_line_length
float64
15.1
58.3
max_line_length
int64
33
179
ast_depth
int64
8
39
length
int64
101
3.8k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.1k
265k
sast_codeql_findings_count
int64
1
45
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
45
rule_ids
listlengths
1
45
confidences
listlengths
1
45
severities
listlengths
1
45
messages
listlengths
1
45
line_starts
listlengths
1
45
line_ends
listlengths
1
45
column_starts
listlengths
1
45
column_ends
listlengths
1
45
2024-11-19T02:31:58.295270+00:00
1,596,218,763,000
de336a4637fa87d898092dba46f37328a4fb292b
3
{ "blob_id": "de336a4637fa87d898092dba46f37328a4fb292b", "branch_name": "refs/heads/master", "committer_date": 1596218763000, "content_id": "79c79d9ecd18fddb30821cd93954c5f4d143a240", "detected_licenses": [ "MIT" ], "directory_id": "e615c71dbb301b7928a5aeaa16a2b5f9c4346884", "extension": "py", "fi...
2.8125
stackv2
## The script can be run with Python 3.5 or higher version. ## The script requires 'requests' library to make the API calls. The library can be installed using the command: pip install requests. import sys import argparse import requests import login.login_api as login_api def print_usage(): return ("\nThe comma...
85
37.06
135
15
704
python
[{"finding_id": "codeql_py/request-without-cert-validation_820010161d2c3820_7aa16021", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 55 ]
[ null ]
[ 27 ]
[ 105 ]
2024-11-19T02:32:20.605448+00:00
1,629,851,746,000
096dcf036a168f8fb267e668a580067b953c2690
3
{ "blob_id": "096dcf036a168f8fb267e668a580067b953c2690", "branch_name": "refs/heads/master", "committer_date": 1629851746000, "content_id": "1439124c99648eac36b09894e7291e3ec8953d12", "detected_licenses": [ "Apache-2.0" ], "directory_id": "5e9bba1918ccf56a2d7d49271adb02b2ec19c6f4", "extension": "py"...
3.09375
stackv2
"""Models related to the event schedule section in Tibia.com.""" import re import time import datetime from typing import List, Optional from tibiapy import abc from tibiapy.utils import get_tibia_url, parse_popup, parse_tibiacom_content __all__ = ( 'EventSchedule', 'EventEntry', ) month_year_regex = re.co...
234
34.02
117
22
1,759
python
[{"finding_id": "codeql_py/overly-large-range_13902c27088619be_d414c088", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 17 ]
[ null ]
[ 35 ]
[ 38 ]
2024-11-19T02:32:24.144723+00:00
1,425,129,595,000
178d84f0759dc310ed33cfbbecfb0016f5aba9f3
2
{ "blob_id": "178d84f0759dc310ed33cfbbecfb0016f5aba9f3", "branch_name": "refs/heads/master", "committer_date": 1425129595000, "content_id": "db3995798a791c24eb1dbf7845029a401c53ba92", "detected_licenses": [ "Apache-2.0" ], "directory_id": "0849202e8150e3db4f724475e7e9bbac0fc1f3f9", "extension": "py"...
2.3125
stackv2
#coding:utf-8 import json import hashlib import sqlite3 from datetime import datetime import web from models import User from .base import bad_request session = web.config._session CACHE_USER = {} def sha1(data): return hashlib.sha1(data).hexdigest() class UserHandler: def GET(self): # 获取当前登录的用户...
86
21.48
53
13
412
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_0aaa4901829da222_de54f7cf", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expen...
[ 18 ]
[ null ]
[ 25 ]
[ 29 ]
2024-11-19T02:32:46.907389+00:00
1,688,183,113,000
b562647c337162333efbecbc70a3b23ce93e1457
3
{ "blob_id": "b562647c337162333efbecbc70a3b23ce93e1457", "branch_name": "refs/heads/main", "committer_date": 1688183113000, "content_id": "0e3af714d179777f6869b9b7f76e4a352b6e78d7", "detected_licenses": [ "MIT" ], "directory_id": "0e5a5c6bb6747383bc800faeef07f3b95665a7ea", "extension": "py", "file...
2.90625
stackv2
""" Vworld 데이터 API Python Module """ import requests from ..utils.code import get_vworld_data_api_info_by_dict requests.packages.urllib3.disable_warnings() class VworldData: """Vworld 데이터 API 클래스 Vworld에서 발급받은 API 서비스 인증키를 입력받아 초기화합니다. Parameters ---------- service_key : str Vworld Open...
67
27.66
96
16
450
python
[{"finding_id": "codeql_py/request-without-cert-validation_21618a7be9da95fe_e5cd6451", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 56 ]
[ null ]
[ 23 ]
[ 74 ]
2024-11-19T02:32:52.674302+00:00
1,599,371,369,000
14a2a5939f2ad743f7a9f3c011690afc25956adf
2
{ "blob_id": "14a2a5939f2ad743f7a9f3c011690afc25956adf", "branch_name": "refs/heads/master", "committer_date": 1599371369000, "content_id": "02925f141847f177d65a0d573ded40c30827f155", "detected_licenses": [ "MIT" ], "directory_id": "4b91f359c7f7c619bfd758738b70435a148ffd7d", "extension": "py", "fi...
2.46875
stackv2
from settings import BAIDU import requests from random import randint import hashlib class Baidu: def __init__(self): self.api = 'http://api.fanyi.baidu.com/api/trans/vip/translate' self.appid = BAIDU['appid'] self.appsecret = BAIDU['appsecret'] self.to_langs = { '中文': ...
38
27.61
89
17
292
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_0c7c9da8c3010955_a2b3b689", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 30 ]
[ null ]
[ 20 ]
[ 89 ]
2024-11-19T02:32:55.671205+00:00
1,470,063,915,000
97a03e49f082fa78848866f9be0459ce5e2670cb
2
{ "blob_id": "97a03e49f082fa78848866f9be0459ce5e2670cb", "branch_name": "refs/heads/master", "committer_date": 1470063915000, "content_id": "ddcfc99b917df01e8f7a1b64290fd07f30d5717c", "detected_licenses": [ "Apache-2.0" ], "directory_id": "187774f515dc3def8d2e86fc0fb60ea5dc79bb6c", "extension": "py"...
2.34375
stackv2
import json import requests from time import sleep, time from rancher import exit, util class Stack: rancherApiVersion = '/v1/' request_headers = {'Content-Type': 'application/json', 'Accept': 'application/json'} def __init__(self, configuration): self.config = configuration def get_stack_i...
191
43.33
115
20
1,816
python
[{"finding_id": "codeql_py/request-without-cert-validation_66225ee51c793f8f_dc741707", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
6
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 17, 43, 65, 94, 105, 152 ]
[ 19, 45, 67, 96, 107, 154 ]
[ 20, 20, 20, 20, 20, 20 ]
[ 76, 91, 91, 91, 91, 76 ]
2024-11-19T02:33:01.032507+00:00
1,610,975,226,000
9bb605b52f2aeb4dac66ecd91e8235caafa6e48f
2
{ "blob_id": "9bb605b52f2aeb4dac66ecd91e8235caafa6e48f", "branch_name": "refs/heads/master", "committer_date": 1610975226000, "content_id": "dfbe5f61cb652db4ac3ca1f853715457fc1506ba", "detected_licenses": [ "MIT" ], "directory_id": "49c5f005b1714e2a9c7ab1a87ba66087ddcb0381", "extension": "py", "fi...
2.453125
stackv2
import subprocess import os from io import StringIO import hashlib import pandas as pd from datetime import datetime, timedelta from azure.storage.blob import BlobClient, generate_container_sas, BlobSasPermissions def sha512(text, encoding='utf-8'): """Converts an input string to its sha512 hash """ if n...
191
35.04
129
18
1,593
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_3601af5c840a07e4_9365b417", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally e...
[ 19 ]
[ null ]
[ 27 ]
[ 31 ]
2024-11-19T02:33:12.042344+00:00
1,498,028,673,000
65271b2eee818364fae2a814c42213185d9b9bc7
2
{ "blob_id": "65271b2eee818364fae2a814c42213185d9b9bc7", "branch_name": "refs/heads/master", "committer_date": 1498028673000, "content_id": "80c9bd1c76531f6f3ef6421e24f39b7f3c3c539e", "detected_licenses": [ "Unlicense" ], "directory_id": "f354d9e4d5cde8944375db8422af668cbd61fb17", "extension": "py",...
2.359375
stackv2
#!/usr/bin/python3 from wsgiref.simple_server import make_server from pyramid.config import Configurator from pyramid.view import view_config from pyramid.response import Response from config import * import os @view_config(route_name='sort') def sort_books(request, test_without_try_except = False): if test_witho...
101
34
160
16
808
python
[{"finding_id": "codeql_py/stack-trace-exposure_8efe9fda52819154_9c362a3b", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-079" ]
[ "py/stack-trace-exposure", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 20, 75 ]
[ null, null ]
[ 30, 22 ]
[ 36, 66 ]
2024-11-19T02:43:31.282302+00:00
1,633,628,367,000
35c06f589f6492bb4b266a5ca075d0c047d37645
3
{ "blob_id": "35c06f589f6492bb4b266a5ca075d0c047d37645", "branch_name": "refs/heads/master", "committer_date": 1633628367000, "content_id": "6fc8c60eb779d51c7542e3d3ecddf03f803c1575", "detected_licenses": [ "MIT" ], "directory_id": "bf27149c253827ea87cdcedda0e9c1cf56b9e905", "extension": "py", "fi...
2.78125
stackv2
# write your code here import argparse import sys import socket import itertools import json import os #parser = argparse.ArgumentParser(description="hacking website passwords") #parser.add_argument("addrress") #parser.add_argument("port") #parser.add_argument("password") args = sys.argv ipaddress = args[1] port = ...
70
32.61
79
22
452
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bdebfb3140a3a516_f8bc51a7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 70 ]
[ null ]
[ 7 ]
[ 15 ]
2024-11-19T02:55:12.148535+00:00
1,586,671,621,000
41ecfc7a3a8b5030524ec172d75bacc504679945
3
{ "blob_id": "41ecfc7a3a8b5030524ec172d75bacc504679945", "branch_name": "refs/heads/master", "committer_date": 1586671621000, "content_id": "63efacfacaed97961c380c49deffa93135a135ce", "detected_licenses": [ "Apache-2.0" ], "directory_id": "5773f84f56f01078412f2c2a22a5b5f05cc2b795", "extension": "py"...
2.96875
stackv2
#!/usr/bin/python """A few utilities for working with the cryptography around ephemeral ids. In particular, it can: 1. compute ephemeral ids given an Identity Key, a scaler and a timestamp; 2. compute the identity key from the Curve25519 shared secret and the public keys; 3. compute all the steps needed to registe...
407
30.63
80
18
3,794
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_21a339cb735848b5_4d7cfec7", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 274, 285 ]
[ null, null ]
[ 8, 9 ]
[ 49, 51 ]
2024-11-19T02:55:13.328133+00:00
1,601,405,168,000
3be19fa1a3da8c3c435b2e34cd7f9399ef088cc5
3
{ "blob_id": "3be19fa1a3da8c3c435b2e34cd7f9399ef088cc5", "branch_name": "refs/heads/master", "committer_date": 1601405168000, "content_id": "38efcbeb70f0ee864f425aaf1929758117aaf7cd", "detected_licenses": [ "MIT" ], "directory_id": "e57bc591847c01c78ea39a47db76953a4cc5c3e6", "extension": "py", "fi...
2.8125
stackv2
import numpy as np import torch from torch.distributions import OneHotCategorical from torchvision.transforms import Compose from data import Vocabulary, OneHot, Genders, Races, ToTensor from utils import load_model class Generator: """Base Generator class that can load trained model and require every subclass t...
209
35.95
116
22
1,650
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_abee2e4e654c3882_83e6108a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.\nThis expression logs [sensitive data (priva...
[ 74, 209 ]
[ null, null ]
[ 23, 16 ]
[ 92, 29 ]
2024-11-19T02:55:16.025123+00:00
1,568,455,230,000
67db7a018831042bf9d3c4bcb33d7319ea4fc7f0
2
{ "blob_id": "67db7a018831042bf9d3c4bcb33d7319ea4fc7f0", "branch_name": "refs/heads/master", "committer_date": 1568455230000, "content_id": "1cc6c4e637d09c01db08e440fc73ff3eb4a40ecc", "detected_licenses": [ "MIT" ], "directory_id": "44db47b96054cb4b77e272300a464225c221bd2c", "extension": "py", "fi...
2.46875
stackv2
import re from bot.util.telegram import parser, api from bot import models, db def run(): _listener_content() _listener_news() def _listener_content(): if str(api.CHAT_ID) == str(parser.chat_id()): if parser.forward_from() is not None: _send_message() _add_count_news() ...
59
20.97
93
14
325
python
[{"finding_id": "codeql_py/overly-large-range_daa5d4260190a463_bb7f7b07", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 51 ]
[ null ]
[ 44 ]
[ 47 ]
2024-11-19T02:55:22.847454+00:00
1,555,398,438,000
fb1fbfe4eea8653cb870d5608f2f94b1597cc5dc
3
{ "blob_id": "fb1fbfe4eea8653cb870d5608f2f94b1597cc5dc", "branch_name": "refs/heads/master", "committer_date": 1555398438000, "content_id": "995f6063bb6a0b3b29b3d6741c89fcddb498e0ea", "detected_licenses": [ "MIT" ], "directory_id": "077ce95fe81ec2c49a0be1b2647d9977c9facaf8", "extension": "py", "fi...
2.5625
stackv2
import json import requests from flask import Flask, Response app = Flask(__name__) mime_type = 'text/plain' @app.route('/') def root_route(): return Response(response='usage : python.semcal.org/<package>[==<version>]', mimetype=mime_type) # todo: should this be <package>[==<version>] or <package>[/<versio...
47
31.57
103
16
360
python
[{"finding_id": "codeql_py/partial-ssrf_9ca720a728e1955a_dfa78b12", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 25 ]
[ null ]
[ 24 ]
[ 41 ]
2024-11-19T02:55:35.641971+00:00
1,552,436,994,000
8ea22312f8378a5bc14ce12a36a8e7fe9e043a1e
3
{ "blob_id": "8ea22312f8378a5bc14ce12a36a8e7fe9e043a1e", "branch_name": "refs/heads/master", "committer_date": 1552436994000, "content_id": "3c6fff9795d298ec9a8d67a1462fcfec1ea914b4", "detected_licenses": [ "Apache-2.0" ], "directory_id": "39763295ac58ac3ee104644b039f5546b64027b4", "extension": "py"...
3.125
stackv2
import sys import urllib2 import hashlib if (len(sys.argv) == 2): password = sys.argv[1] else: print "Usage: python pwned.py <password>" exit(-1) hash = hashlib.sha1() hash.update(password) digest = hash.hexdigest().upper() print digest headers = { 'User-Agent' : 'pwned.py' } apiurl = "https://api.pwne...
35
19.91
65
10
208
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_32ae98863a98d98e_93859872", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 13 ]
[ null ]
[ 13 ]
[ 21 ]
2024-11-19T02:55:37.827700+00:00
1,693,221,508,000
a37124a6b3e3ef78b8aefd82e4bb5e190f9f0770
2
{ "blob_id": "a37124a6b3e3ef78b8aefd82e4bb5e190f9f0770", "branch_name": "refs/heads/main", "committer_date": 1693221508000, "content_id": "2fc9c8a851d00f1ba48c3e530a4264579698a37d", "detected_licenses": [ "Apache-2.0" ], "directory_id": "35b6013c1943f37d1428afd2663c8aba0a02628d", "extension": "py", ...
2.5
stackv2
#!/usr/bin/env python # Copyright 2021 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or ...
41
34.22
82
12
313
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_953000ef5de207c6_9653741f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text." ]
[ 37 ]
[ null ]
[ 11 ]
[ 29 ]
2024-11-19T02:55:39.170779+00:00
1,607,573,628,000
acdae580ffec8dacd3d19dada838f0074146963e
2
{ "blob_id": "acdae580ffec8dacd3d19dada838f0074146963e", "branch_name": "refs/heads/master", "committer_date": 1607573628000, "content_id": "300878da56ebb67caae1a48bd2aaccbb513fd17f", "detected_licenses": [ "MIT" ], "directory_id": "a6ea4012f51ba9f9193334b5574ebe3076fd08a4", "extension": "py", "fi...
2.40625
stackv2
#!/usr/bin/env python # -*- encoding: utf-8 -*- import json import logging import traceback from rest_framework.response import Response from fastrunner import models def get_value(content, keys): if isinstance(content, (str, int)): return content if content == None: return "" if isinsta...
55
27.64
91
18
330
python
[{"finding_id": "codeql_py/stack-trace-exposure_21b7faab96f1d80a_5582f283", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 55 ]
[ null ]
[ 29 ]
[ 50 ]
2024-11-19T02:55:46.472677+00:00
1,428,612,940,000
ce932e6ed2655682429d4a152b957641240337b9
2
{ "blob_id": "ce932e6ed2655682429d4a152b957641240337b9", "branch_name": "refs/heads/master", "committer_date": 1428612940000, "content_id": "d314d774df3a5ae63578e3d48a0f3769905d1a09", "detected_licenses": [ "MIT" ], "directory_id": "7458a23c73ee8ff03fe996bf8d22b44a13142afd", "extension": "py", "fi...
2.5
stackv2
''' Implements handler for /items Imported from handler for /menus/{id} ''' import logging import cherrypy import mysql.connector import sys sys.stdout = sys.stderr # Turn off console output; it will get logged by Apache import os import os.path import json import pprint from jinja2 import Environment, FileSystemLoader...
76
38.55
157
17
734
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_f8fe60592b659a3d_9a288f20", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 13 ]
[ null ]
[ 7 ]
[ 101 ]
2024-11-19T02:55:47.128624+00:00
1,610,308,465,000
dcdc1b07fc36f6db3b0c16610ab422b85f7a30c4
3
{ "blob_id": "dcdc1b07fc36f6db3b0c16610ab422b85f7a30c4", "branch_name": "refs/heads/master", "committer_date": 1610308465000, "content_id": "4740538411342e57ffcdd24e314bc77364befd15", "detected_licenses": [ "MIT" ], "directory_id": "30d9dc8b4885b7bdfd0e6630d32277883cb1fc99", "extension": "py", "fi...
2.65625
stackv2
import os import re import yaml import cerberus import logging from watsor.config.schema import schema _LOGGER = logging.getLogger(__name__) _ENV_pattern = re.compile('.*?\${(\w+)}.*?') SECRETS_YAML = "secrets.yaml" __SECRET_CACHE = {} def _load_yaml(filename: str, loader: yaml.Loader = yaml.SafeLoader): _LOG...
244
31.61
86
19
1,738
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_908a6eed64637169_8400bf20", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 18, 98 ]
[ null, null ]
[ 33, 74 ]
[ 41, 82 ]
2024-11-19T02:55:59.739616+00:00
1,559,154,341,000
29888e81d775d6f80f40c814f7ad303c8ab7c7f4
2
{ "blob_id": "29888e81d775d6f80f40c814f7ad303c8ab7c7f4", "branch_name": "refs/heads/master", "committer_date": 1559154341000, "content_id": "3159ca5a4f160eae7a75313ec3ed0360f193ee0c", "detected_licenses": [ "Unlicense" ], "directory_id": "6f2a6a935501cb2193d62bb77aed01f6e63d8f0c", "extension": "py",...
2.46875
stackv2
#ASSOCIATES PHYSICAL AND L2-OUT DOMAINS TO EPG import requests from jinja2 import Template #use pip install jinja2 if you get a module error import sys import login import getpass import urllib3 urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning) urllib3.disable_warnings(urllib3.exceptions.SNIMissingWar...
121
33.87
106
11
1,052
python
[{"finding_id": "codeql_py/request-without-cert-validation_01e9ca54f51ac1f3_336dbe6a", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
6
true
[ "CWE-295", "CWE-295", "CWE-079", "CWE-079", "CWE-079", "CWE-079" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/jinja2/autoescape-false", "py/jinja2/autoescape-false", "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potential...
[ 57, 84, 39, 53, 66, 80 ]
[ null, null, null, null, null, null ]
[ 19, 19, 14, 14, 14, 14 ]
[ 96, 96, 35, 39, 35, 39 ]
2024-11-19T02:56:04.396775+00:00
1,555,796,870,000
5d7bca842d4eb9bc1da381fd3bd9b2426f06f4a4
3
{ "blob_id": "5d7bca842d4eb9bc1da381fd3bd9b2426f06f4a4", "branch_name": "refs/heads/master", "committer_date": 1555796870000, "content_id": "7beb9661a8208db25108c2576dc64cb0b8295ce6", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e9b363d3192a27c4e81c587f7c9a83da7e894061", "extension": "py"...
2.640625
stackv2
""" All Blueprint routes regarding rendering authentication templates except: /login [POST] --> handeling the login, has nothing todo with rendering a template """ from sqlalchemy.sql import exists from werkzeug.exceptions import BadRequest from flask import Blueprint, request, jsonify, g, redirect, render...
96
29.88
93
17
641
python
[{"finding_id": "codeql_py/url-redirection_da928cac80d7f4bd_270a9f6f", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
2
true
[ "CWE-601", "CWE-601" ]
[ "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 23, 33 ]
[ null, null ]
[ 25, 25 ]
[ 33, 33 ]
2024-11-19T02:56:05.349732+00:00
1,481,563,795,000
9dcaf758b061708c4d1d393562c195a5e2a31556
2
{ "blob_id": "9dcaf758b061708c4d1d393562c195a5e2a31556", "branch_name": "refs/heads/master", "committer_date": 1481563795000, "content_id": "3b15249c3813eec4d999542017f6bf52ff7c18cf", "detected_licenses": [ "MIT" ], "directory_id": "c72edf2594b9391c2c215f4d7dd0eee110e2c157", "extension": "py", "fi...
2.4375
stackv2
#!/usr/bin/env python3 import os, sys, yaml, mistune, importlib, collections, argparse, logging, time, datetime from jinja2 import Environment, FileSystemLoader from stab.watchman import Watchman absjoin = lambda x, y: os.path.abspath(os.path.join(x, y)) class Stab: def __init__(self, ROOT_DIR, force): s...
128
43.18
133
18
1,361
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_fb44dc6d4b4a804a_d03f65ad", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 44 ]
[ null ]
[ 26 ]
[ 63 ]
2024-11-19T03:10:23.357232+00:00
1,603,354,397,000
e5a7529501fb1c721096506cda22e6e592009f62
2
{ "blob_id": "e5a7529501fb1c721096506cda22e6e592009f62", "branch_name": "refs/heads/master", "committer_date": 1603354397000, "content_id": "30c2b77935b1dd9de784885b43f14fff7ffe9d3c", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "a8831959ac9e1c956a65ac613a74f309c253629c", "extension": "p...
2.34375
stackv2
# -*- coding: UTF-8 -*- import sp_utils import copy import ctypes data_folder_path = "constellation_data/" constellation_lla_location = []; # constellation_name = 'StarLink'; constellation_name = 'OneWeb'; # describing the lla location information for a specific satellite class sp_lla_trace: def __init__(self): ...
111
42.65
142
22
1,206
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_5a5a499903efe7f6_ed188cba", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.", "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text." ]
[ 30, 42 ]
[ null, null ]
[ 17, 17 ]
[ 21, 21 ]
2024-11-19T03:22:07.979605+00:00
1,617,189,823,000
4ec93c9f99306dfb31f33894458d73c54b2bdf60
2
{ "blob_id": "4ec93c9f99306dfb31f33894458d73c54b2bdf60", "branch_name": "refs/heads/master", "committer_date": 1617189823000, "content_id": "87cf37159b1e27f9e1ae451d55411671bc226e9c", "detected_licenses": [ "MIT" ], "directory_id": "6f44df5804e3e611706a890b7774db6cdc525fbf", "extension": "py", "fi...
2.375
stackv2
"""Module for handling queries for a valid Sharing/Request API signature.""" import hmac import time import logging import secrets import aiohttp.web from ._convenience import session_check, api_check, get_tempurl_key, sign from .settings import setd LOGGER = logging.getLogger("signature") async def handle_sig...
262
26.56
76
14
1,588
python
[{"finding_id": "codeql_py/log-injection_fd8150b2f8f3672f_989acc7b", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 202 ]
[ null ]
[ 9 ]
[ 23 ]
2024-11-19T03:43:56.384114+00:00
1,568,793,769,000
dd982b5c23a4016ba913cbdfc467eef01f6586e0
3
{ "blob_id": "dd982b5c23a4016ba913cbdfc467eef01f6586e0", "branch_name": "refs/heads/master", "committer_date": 1568793769000, "content_id": "4757173de89fb98dd50b3235c985aa9e8c71b53d", "detected_licenses": [ "Apache-2.0" ], "directory_id": "c0829adfeb87fd28f6b03dd5205db61b1e3eb25e", "extension": "py"...
2.546875
stackv2
# coding=utf-8 from flask import Flask, jsonify from flask import render_template import sqlite3 import cgi import socket DATABASE = 'mini_app.db' PAGE_SIZE = 10 app = Flask(__name__) def escape(html): """ 转义HTML字符 :param html: :return: """ if not html: return "" return cgi.escap...
68
23.66
104
14
447
python
[{"finding_id": "codeql_py/sql-injection_fc645d29e047ac30_01079b6e", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown...
1
true
[ "CWE-089" ]
[ "py/sql-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This SQL query depends on a [user-provided value](1)." ]
[ 40 ]
[ 41 ]
[ 27 ]
[ 37 ]
2024-11-19T02:08:37.312714+00:00
1,620,150,075,000
2cd903dcced5c4682e3b35e80a40489032bb69fe
2
{ "blob_id": "2cd903dcced5c4682e3b35e80a40489032bb69fe", "branch_name": "refs/heads/master", "committer_date": 1620150075000, "content_id": "7fefc388011444b7520969102dda1171cf73e000", "detected_licenses": [ "MIT" ], "directory_id": "8acec7d68f7f7cb1219a5d933d4421e2ba66e9c5", "extension": "py", "fi...
2.421875
stackv2
from flask_login.utils import login_required from . import auth from flask import render_template, url_for, redirect, flash, request from .forms import RegistrationForm, LoginForm from .. import db from ..models import Writer from flask_login import login_user, logout_user from flask_mail import Message from .. import ...
42
42.05
150
16
375
python
[{"finding_id": "codeql_py/url-redirection_040bb8a5d461346e_86328b81", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 34 ]
[ null ]
[ 29 ]
[ 76 ]
2024-11-19T02:21:23.233677+00:00
1,400,826,297,000
d92955b8f1d67534d1231e1bbc8babd27738b016
3
{ "blob_id": "d92955b8f1d67534d1231e1bbc8babd27738b016", "branch_name": "refs/heads/master", "committer_date": 1400826297000, "content_id": "f197ed20c6084fbe8d3e57a9b29b4bd4a35abbfb", "detected_licenses": [ "MIT" ], "directory_id": "1c9eb7448d899d2d904695cd7412e6702ada2210", "extension": "py", "fi...
2.65625
stackv2
import requests from requests.auth import HTTPBasicAuth class HarvestError(Exception): pass class Harvest(object): def __init__(self, uri, email, password): self.uri = uri self.email = email self.password = password self.headers = { 'Accept': 'application/json', ...
66
34.61
132
21
554
python
[{"finding_id": "codeql_py/request-without-cert-validation_c3c2fad1c6431553_ebb8c180", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
4
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 43, 46, 48, 57 ]
[ null, null, null, null ]
[ 21, 25, 25, 21 ]
[ 133, 129, 56, 124 ]
2024-11-19T03:10:05.294199+00:00
1,635,232,635,000
dedbfe9c73a853c6de2e131542a6d1f7d11bb555
2
{ "blob_id": "dedbfe9c73a853c6de2e131542a6d1f7d11bb555", "branch_name": "refs/heads/master", "committer_date": 1635233771000, "content_id": "90dadc038d43cb19f7507aafb85330f8dbb286a8", "detected_licenses": [ "Apache-2.0" ], "directory_id": "1267a2395f069324733ff13646e8e53a768b04c1", "extension": "py"...
2.328125
stackv2
import requests from flask import Flask, Response, request EXCLUDED_HEADERS = {"content-encoding", "content-length", "transfer-encoding", "connection"} app = Flask(__name__) @app.route("/", defaults={"path": ""}, methods=["GET", "POST", "PUT", "DELETE"]) @app.route("/<path:path>", methods=["GET", "POST", "PUT", "D...
25
32.2
120
15
180
python
[{"finding_id": "codeql_py/full-ssrf_08f5691647475068_9b774e00", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
2
true
[ "CWE-918", "CWE-079" ]
[ "py/full-ssrf", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 13, 22 ]
[ 20, null ]
[ 16, 18 ]
[ 6, 34 ]
2024-11-19T03:10:11.552781+00:00
1,512,397,779,000
2133e7234fdbfe1ba1d7d0fdb32d31f7e2b80d0b
2
{ "blob_id": "2133e7234fdbfe1ba1d7d0fdb32d31f7e2b80d0b", "branch_name": "refs/heads/master", "committer_date": 1512397779000, "content_id": "aca352d8d1bfdcf4c5b0f4ec267b67b2ba8b56c5", "detected_licenses": [ "MIT" ], "directory_id": "5294449c79108fd7ce6d0c970d8d9c28675a09eb", "extension": "py", "fi...
2.421875
stackv2
import telegram from telegram.ext import Updater, MessageHandler, CommandHandler, Filters, BaseFilter import sys from glob import glob import pickle import numpy.random as rn import logging from Crypto.Cipher import AES import base64 """ TODO list: - Do not count other bots when calculating quorum - Store me...
294
30.53
141
18
2,222
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_1556af4c7b412665_b38c356b", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
1
true
[ "CWE-327" ]
[ "py/weak-cryptographic-algorithm" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 253 ]
[ null ]
[ 15 ]
[ 62 ]
2024-11-19T03:10:20.162456+00:00
1,528,899,832,000
15e54604a5bc5617bac3e9816abbec07dfa871a7
3
{ "blob_id": "15e54604a5bc5617bac3e9816abbec07dfa871a7", "branch_name": "refs/heads/master", "committer_date": 1528899832000, "content_id": "f9601b5081c86d813a53690d08cb3008d2ec4534", "detected_licenses": [ "MIT" ], "directory_id": "49f672ad53cbcf85047201a20a5f61b0d9216bcc", "extension": "py", "fi...
2.5625
stackv2
import requests import json import os from flask import Flask, render_template, request # Init Flask app = Flask(__name__) # Helpers def _url(path): return 'https://api.ciscospark.com/v1' + path def _fix_at(at): if 'Bearer' not in at: return 'Bearer ' + at else: return at def get...
116
26.14
82
13
805
python
[{"finding_id": "codeql_py/flask-debug_2a43214a4229948b_ddbf912a", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-918" ]
[ "py/flask-debug", "py/partial-ssrf" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 116, 21 ]
[ null, null ]
[ 5, 12 ]
[ 51, 83 ]
2024-11-19T03:22:33.474593+00:00
1,629,387,081,000
f4e0d02fa0d1a97a2c36cfce99201dd5a7f77c9e
2
{ "blob_id": "f4e0d02fa0d1a97a2c36cfce99201dd5a7f77c9e", "branch_name": "refs/heads/master", "committer_date": 1629387081000, "content_id": "8028cd48ad759c114d0eec695dfe769a8db0bba7", "detected_licenses": [ "Apache-2.0" ], "directory_id": "f1716199259f9a1fc8ee923614ec543ebb3c5409", "extension": "py"...
2.453125
stackv2
from transformers import AutoTokenizer, pipeline from flask import Flask, request, jsonify, render_template from queue import Queue, Empty from threading import Thread import time app = Flask(__name__) print("model loading...") # Model loading tokenizer = AutoTokenizer.from_pretrained("seongju/squadv2-xlm-roberta-b...
111
25.1
91
18
668
python
[{"finding_id": "codeql_py/stack-trace-exposure_620d7d96823876ce_7f4d0afe", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-079" ]
[ "py/stack-trace-exposure", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 67, 89 ]
[ null, null ]
[ 24, 12 ]
[ 36, 25 ]
2024-11-19T03:22:50.377933+00:00
1,551,911,151,000
1bed54eb424103cc838e369982845259f5af429d
2
{ "blob_id": "1bed54eb424103cc838e369982845259f5af429d", "branch_name": "refs/heads/master", "committer_date": 1551911151000, "content_id": "2783191215ffdca5f2813018c229205a46552568", "detected_licenses": [ "MIT" ], "directory_id": "a2f50d0f977f6043cf8ce34efc95815316a6c711", "extension": "py", "fi...
2.5
stackv2
import paramiko from paramiko import AuthenticationException, SSHException, ChannelException from enum import Enum from concurrent.futures import ThreadPoolExecutor from socket import error as SocketError from margaritashotgun.auth import AuthMethods from margaritashotgun.exceptions import * import logging logger = lo...
228
39.12
88
17
1,781
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_8093ea92f1aa157c_33505bb6", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/paramiko-missing-host-key-validation", "py/paramiko-missing-host-key-validation" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe.", "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 32, 53 ]
[ null, null ]
[ 9, 17 ]
[ 71, 89 ]
2024-11-19T03:44:14.108118+00:00
1,692,194,979,000
9daade4a48979e0ce812797adc12a073d1ab257e
2
{ "blob_id": "9daade4a48979e0ce812797adc12a073d1ab257e", "branch_name": "refs/heads/master", "committer_date": 1692194979000, "content_id": "04e3feae09afb3d460f8f3074a8b53ae5faad7c7", "detected_licenses": [ "MIT" ], "directory_id": "26720cf4472a0370881755ef0720893c65977983", "extension": "py", "fi...
2.4375
stackv2
#!/usr/bin/env python3 """InnoGames Monitoring Plugins - HTTPS Domains Check Copyright (c) 2019 InnoGames GmbH """ # Permission is hereby granted, free of charge, to any person obtaining a copy # of this software and associated documentation files (the "Software"), to deal # in the Software without restriction, includ...
186
32.46
79
17
1,392
python
[{"finding_id": "codeql_py/insecure-protocol_db43493e39e646bc_3d75c91b", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol...
1
true
[ "CWE-327" ]
[ "py/insecure-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.SSLContext](1)." ]
[ 113 ]
[ null ]
[ 10 ]
[ 17 ]
2024-11-19T03:44:14.957231+00:00
1,571,612,630,000
98407158290c1cf7fba728271963c74efa9d431f
3
{ "blob_id": "98407158290c1cf7fba728271963c74efa9d431f", "branch_name": "refs/heads/master", "committer_date": 1571612630000, "content_id": "a15f461bdf6af83cc928e09ee6a596f582be85ae", "detected_licenses": [ "MIT" ], "directory_id": "401b79c9b8f16da44352c5509390663ec2239ac5", "extension": "py", "fi...
2.84375
stackv2
# ref: http://ozzmaker.com/using-python-with-a-gps-receiver-on-a-raspberry-pi/ # ref: http://ozzmaker.com/how-to-save-gps-data-to-a-file-using-python/ from gps import * import threading gpsd = None class GpsPoller(threading.Thread): def __init__(self): threading.Thread.__init__(self) global gpsd ...
92
31.9
119
17
891
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_051667b8f4ea58ce_76d1a46e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 86 ]
[ null ]
[ 19 ]
[ 23 ]
2024-11-19T01:34:51.509873+00:00
1,482,494,433,000
4a7d35bd5fc3673c751e05446cc44da5e733f91b
3
{ "blob_id": "4a7d35bd5fc3673c751e05446cc44da5e733f91b", "branch_name": "refs/heads/master", "committer_date": 1482494433000, "content_id": "63155133cc0a2d2166ff0165314a286838f80214", "detected_licenses": [ "MIT" ], "directory_id": "8ef20f842698e009de77269fd6cfe40daa4101d5", "extension": "py", "fi...
2.734375
stackv2
# -*- coding: utf-8 -*- """ Update the secrets in a Wordpress configuration file. MIT License Copyright (c) 2016 Martin Bo Kristensen Grønholdt Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software w...
136
32.46
89
18
1,092
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0ba0009147660c18_807f986d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 106 ]
[ null ]
[ 10 ]
[ 52 ]
2024-11-19T01:34:52.892624+00:00
1,646,407,541,000
b5307fd41d41a776ea79a8e2b282f94c56b7e30a
3
{ "blob_id": "b5307fd41d41a776ea79a8e2b282f94c56b7e30a", "branch_name": "refs/heads/master", "committer_date": 1646407541000, "content_id": "e98cacd94994597adbd88d9312e10c5a069bdfd3", "detected_licenses": [ "MIT" ], "directory_id": "31b2db174900aecc3a71117250aa5f781652bff6", "extension": "py", "fi...
2.984375
stackv2
""" By Hubert Gee Description SSH to a device and enter commands. Supports SFTP to download files also. Usage: sshClient = sshExecCommand.Connect(apiServerIp, username, password) # linux sshClient.transferFile('/mnt/ixload-share/http.rxf', '/home/hgee/http.rxf') stdout,stderr = sshClient.en...
136
34.67
156
20
1,054
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_7af1d51561f7972e_4ef5b122", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 56 ]
[ null ]
[ 13 ]
[ 81 ]
2024-11-19T01:35:08.166702+00:00
1,619,968,750,000
2c42f80a75731b47b6396861fc2ebd3d3c0070e1
3
{ "blob_id": "2c42f80a75731b47b6396861fc2ebd3d3c0070e1", "branch_name": "refs/heads/main", "committer_date": 1619968750000, "content_id": "9facc82540116b9019e0ef9a735ac9670e823ecc", "detected_licenses": [ "MIT" ], "directory_id": "d3aba2f8f1d3248d63857c54282bf7ddce4d8d05", "extension": "py", "file...
2.8125
stackv2
# this is an example # # Dieses Beispiel enthält vorschläge für Formatierung # (und geht über das Niveau des start-projects hinaus). # Dieser Code kann als inspiration dienen um sich den # Aufbau eines Programms in Python vorzustellen. # # Nutzt bitte Methoden und führt dann zum Schluss diese # in dieser if Abfrage au...
415
34.08
92
22
3,107
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_903cfcfa430d7fe2_af0fa851", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 275 ]
[ null ]
[ 15 ]
[ 19 ]
2024-11-19T02:07:50.165521+00:00
1,579,219,365,000
40556ae894c89a88b39a40359f44463f2ec08bcf
3
{ "blob_id": "40556ae894c89a88b39a40359f44463f2ec08bcf", "branch_name": "refs/heads/master", "committer_date": 1579219365000, "content_id": "ee41eb2aa416450544a17be12beb9612eb15f788", "detected_licenses": [ "MIT" ], "directory_id": "be23991846c509b5dda5012e65ec95d3d0a41c73", "extension": "py", "fi...
3
stackv2
from bs4 import BeautifulSoup import requests import re from difflib import SequenceMatcher class Braacket: def __init__(self, league): # https://braacket.com/league/{league} # https://braacket.com/league/{league}/player?rows=200 # ie: 'NCMelee' self.league = league #s...
360
40.06
116
18
3,536
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_532f4525ed9a0ff7_86284570", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [twitter.com](1) may be at an arbitrary position in the...
6
true
[ "CWE-020", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/incomplete-url-substring-sanitization", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "HIGH", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "The string [twitter.com](1) may be at an arbitrary position in the sanitized URL.", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation beca...
[ 111, 29, 68, 121, 167, 281 ]
[ null, 31, 70, 122, 169, null ]
[ 24, 13, 13, 13, 13, 13 ]
[ 53, 60, 69, 74, 58, 48 ]
2024-11-19T02:17:34.836627+00:00
1,619,072,732,000
c4280c8c5985a09b69086fd57452c398d040f42c
2
{ "blob_id": "c4280c8c5985a09b69086fd57452c398d040f42c", "branch_name": "refs/heads/master", "committer_date": 1619072732000, "content_id": "a4e6cba016dd1e2cdd954469d0530a12f290140c", "detected_licenses": [ "MIT" ], "directory_id": "06664d4ae71bc4e9245972544b95d15818774728", "extension": "py", "fi...
2.390625
stackv2
import aiohttp_jinja2 import jinja2 import secrets import random from aiohttp import web from aiohttp.client import MultiDict from source import fit_model, vectorize, model_predict routes = web.RouteTableDef() PORT = 8080 base_url = f"http://localhost:{PORT}" IMGS, X, Y = 3, 5, 7 THRESH = 0.1 networks = {} @rout...
175
22.64
108
15
1,136
python
[{"finding_id": "codeql_py/url-redirection_0a0d6df9c182a325_afb98aba", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 45 ]
[ null ]
[ 34 ]
[ 108 ]
2024-11-19T02:18:03.310206+00:00
1,678,286,428,000
c5345b0b0def31d2f7b6cc45f98e4848a81b37bd
3
{ "blob_id": "c5345b0b0def31d2f7b6cc45f98e4848a81b37bd", "branch_name": "refs/heads/master", "committer_date": 1678286428000, "content_id": "54e98dc07188a395730e65bd3aabf3fcf3c9b951", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "7a2358ec25d0c0f2ac9c495c95d889022adb2aa1", "extension": "p...
2.75
stackv2
#!/usr/bin/env python ########################################################## # This script retrieves the reference results from # a remote repository which is at # https://simulationresearch.lbl.gov/jmodelica/modelica-ibpsa/Dymola/. # # This script creates a folder called 'Dymola' # in the working directory and wri...
44
36.02
86
15
376
python
[{"finding_id": "codeql_py/overly-large-range_a0ed424d501b3630_fc60a793", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class.", "remediation": "", "loc...
3
true
[ "CWE-020", "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class.", "Suspicious character range that overlaps with A-Z in the same character class.", "Suspicious character range that overlaps with 0-9 in the same character class." ]
[ 29, 29, 29 ]
[ null, null, null ]
[ 35, 38, 41 ]
[ 38, 41, 44 ]
2024-11-19T02:18:15.088517+00:00
1,488,760,291,000
f93d48ceb2ca2b8c1e2f97fd5be9ba5d86c8ff67
4
{ "blob_id": "f93d48ceb2ca2b8c1e2f97fd5be9ba5d86c8ff67", "branch_name": "refs/heads/master", "committer_date": 1488760291000, "content_id": "04ba7ce1a6088995a07e04ad84764c5aaa329eec", "detected_licenses": [ "MIT" ], "directory_id": "7d874847354d8f49cfd49f6c1bdc62e8ad864b99", "extension": "py", "fi...
3.6875
stackv2
""" Exercise 4 """ import hashlib def genpasswd(password): """ Accepts a password and generate new one """ sha1 = hashlib.sha1(password.encode('utf-8')) hashstring = sha1.hexdigest() return hashstring[:6] def findcollision(x0): """ Finds two input passwords which give the same output from genpas...
38
23.24
85
15
275
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b6342326af204d48_235f562c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-327" ]
[ "py/clear-text-logging-sensitive-data", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text.\nThis expression logs [sensitive data (passw...
[ 24, 7 ]
[ null, null ]
[ 19, 25 ]
[ 85, 49 ]
2024-11-19T02:18:16.095828+00:00
1,521,869,104,000
29970279c96cfa794beeea612fa892f2a43a87e3
2
{ "blob_id": "29970279c96cfa794beeea612fa892f2a43a87e3", "branch_name": "refs/heads/master", "committer_date": 1521869104000, "content_id": "882526f622c4e52859a6552c6eb1de9e5322ef34", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "ccefe1573b03ad801b97f648ee4f88cc4383ec7f", "extension": "p...
2.46875
stackv2
from scapy.all import * class signature: def __init__(self, type): if type in ["probe", "assoc"]: self.type = type else: print("wrong data type!") raise ValueError # change member type from list[] to string'' for bitwise comparison later self.pro...
134
37.41
114
23
1,132
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_872e9ed2fb87f524_2e1e515c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text." ]
[ 33 ]
[ null ]
[ 15 ]
[ 47 ]
2024-11-19T02:18:17.877652+00:00
1,624,481,200,000
91ff6b9516d519db68ab97bb8e8caf94082a5be9
2
{ "blob_id": "91ff6b9516d519db68ab97bb8e8caf94082a5be9", "branch_name": "refs/heads/main", "committer_date": 1624481200000, "content_id": "a814e2f2fbab3796bc9ffb9c7874a47679d1d0bc", "detected_licenses": [ "MIT" ], "directory_id": "216912b6d4591c627cf681f86483be2f15aef03d", "extension": "py", "file...
2.4375
stackv2
from typing import Optional from fastapi import FastAPI import requests import json app = FastAPI() @app.get("/") @app.get("/queues/{queue_name}") def read_queue_messages(queue_name: str): url = 'http://13.81.39.210:15672/api/queues/dcs/' + queue_name + '/get' myobj = '{"count":100,"requeue":"true","encodin...
25
28.56
79
14
206
python
[{"finding_id": "codeql_py/partial-ssrf_38329353f11806f0_2d098930", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 16 ]
[ null ]
[ 9 ]
[ 71 ]
2024-11-19T02:29:58.092602+00:00
1,460,397,847,000
fa51c4a75bd36720e82b0e854701261aba1a5896
3
{ "blob_id": "fa51c4a75bd36720e82b0e854701261aba1a5896", "branch_name": "refs/heads/master", "committer_date": 1460397847000, "content_id": "e0acbb29f2195b62410a8581d931306a6ff6397b", "detected_licenses": [ "MIT" ], "directory_id": "b4ae4ded103cc4c496bf4749c5a5fbfb2f1e3a2f", "extension": "py", "fi...
2.671875
stackv2
from flask import Flask, request, make_response import julia_fast from PIL import Image from matplotlib import cm from itertools import product from threading import Thread from uuid import uuid4 import numpy as np import time import io import shelve application = Flask(__name__) store = shelve.open('example.dat') #A...
83
24.27
71
15
604
python
[{"finding_id": "codeql_py/reflective-xss_f0908d6a47a67cfa_a97432c3", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 78 ]
[ null ]
[ 12 ]
[ 16 ]
2024-11-19T02:30:03.804829+00:00
1,569,367,875,000
8b633dc0751f0f3b3d58bf2a4728b59d3b9d6a73
3
{ "blob_id": "8b633dc0751f0f3b3d58bf2a4728b59d3b9d6a73", "branch_name": "refs/heads/master", "committer_date": 1569367875000, "content_id": "26fef67105431aa29509f3c473ffa5fdfa1a358c", "detected_licenses": [ "MIT" ], "directory_id": "77a066a86c8c65b233df5476bac1c16023155c10", "extension": "py", "fi...
3.109375
stackv2
import requests class Employee: min_hourly_wage = 17.91 #LAW weeks_per_year = 52.0 #assume full-time hours_per_week = 40.0 #assume full-time min_superannuation_percent = 9.5 atCompanyDefault="@company.com" min_salary = min_hourly_wage * hours_per_week * weeks_per_year #LAW #assume full-time ...
52
37.02
113
15
491
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6de7d938c8a89abd_84ca2226", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 26 ]
[ null ]
[ 20 ]
[ 81 ]
2024-11-19T02:30:21.187800+00:00
1,619,350,802,000
c6805ba356b673806387cb0eb24bbc942e24f677
3
{ "blob_id": "c6805ba356b673806387cb0eb24bbc942e24f677", "branch_name": "refs/heads/main", "committer_date": 1619350802000, "content_id": "f61f02075500db1f23c733164106f39184d0ad17", "detected_licenses": [ "Apache-2.0" ], "directory_id": "95b0f73d0dac443851359dec350bc22823573ec3", "extension": "py", ...
2.640625
stackv2
# from api import MessageServiceApi from thrift.transport import TSocket from thrift.transport import TTransport from thrift.protocol import TBinaryProtocol from thrift.server import TServer class MessageService(object): def __init__(self): self.name = 'api.MessageService' def startup(self): p...
41
27.66
80
12
295
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9d610c6f5a3b38ef_f6dd7ea5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 30 ]
[ null ]
[ 15 ]
[ 56 ]
2024-11-19T02:30:39.336260+00:00
1,670,690,629,000
223ca0c5d35a0ffc30ea757cedf0e8067ce9c0f9
3
{ "blob_id": "223ca0c5d35a0ffc30ea757cedf0e8067ce9c0f9", "branch_name": "refs/heads/master", "committer_date": 1670690629000, "content_id": "21fbbc24c50c2d4b032efc9bb158027790950d96", "detected_licenses": [ "MIT" ], "directory_id": "e0ca06af60b05d6e8e6d22d1e89696692bdfe807", "extension": "py", "fi...
3.046875
stackv2
#!/usr/local/bin/python3 # -*- coding: utf-8 -*- # DESCRIPTION: Given an excel file and text files passed as arguments to the script, # metadata headers are added to each individual text files # # Mac OS example: # python add_headers.py --directory=Spring\ 2018/normalized/ --master_file=Metadata_Spring_2018_updated...
283
48.12
137
22
3,069
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d988aa21469b7890_a94267bd", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text." ]
[ 235 ]
[ null ]
[ 23 ]
[ 49 ]
2024-11-19T02:30:40.290882+00:00
1,520,601,566,000
2d337b7b4a9372538d0794b472d5d48e5468138a
3
{ "blob_id": "2d337b7b4a9372538d0794b472d5d48e5468138a", "branch_name": "refs/heads/master", "committer_date": 1520601566000, "content_id": "bca8aee2291be2344b3b70df8a57a51a72f61b31", "detected_licenses": [ "MIT" ], "directory_id": "2648b9f8097156ce8c02db4a3c563e9ccd1727e9", "extension": "py", "fi...
2.609375
stackv2
# -*- coding: utf-8 -*- """ Public section """ import os import json from flask import Blueprint, render_template, request, Response import pandas as pd from ..utils import NumpyJsonEncoder, check_config, list_is_true, str_to_list, translate_separator, remove_spaces blueprint = Blueprint('public', __name__, static...
118
40.58
117
19
1,133
python
[{"finding_id": "codeql_py/reflective-xss_6d1a8237bc0c6400_02e17a0b", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
4
true
[ "CWE-079", "CWE-079", "CWE-022", "CWE-022" ]
[ "py/reflective-xss", "py/reflective-xss", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 79, 86, 98, 113 ]
[ 80, 87, null, null ]
[ 16, 12, 23, 19 ]
[ 48, 44, 42, 38 ]
2024-11-19T02:41:39.712681+00:00
1,544,315,709,000
bea20fc8d701c2b91d990bb6203749a2e990819c
2
{ "blob_id": "bea20fc8d701c2b91d990bb6203749a2e990819c", "branch_name": "refs/heads/master", "committer_date": 1544315709000, "content_id": "750f0e118ad45c90af580aae312cba24f988e153", "detected_licenses": [ "MIT" ], "directory_id": "efa579a5b4f4ed9d09bc4db37d388512b4bf0803", "extension": "py", "fi...
2.375
stackv2
# CodeName: rehash.py # Author: Dahir Muhammad Dahir # Date: 14th-May-2018 # About: i will tell u later import os from bs4 import BeautifulSoup as bs import re import argparse import requests import random import sys reload(sys) sys.setdefaultencoding("utf8") headers = {"User-Agent": "Mozilla/5.0 (Windows NT 6.3; Wi...
138
28.88
128
22
1,145
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_9bb2257b7896cf5a_fd930fbe", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.", "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (password)](3) as clear text.\nThis expression stores [sensiti...
[ 85, 90, 131 ]
[ null, null, null ]
[ 16, 12, 11 ]
[ 46, 29, 15 ]
2024-11-18T18:06:00.696718+00:00
1,597,707,080,000
5cd7c509f908eb4c5b71970f3243a33a4c2efdfa
3
{ "blob_id": "5cd7c509f908eb4c5b71970f3243a33a4c2efdfa", "branch_name": "refs/heads/master", "committer_date": 1597707080000, "content_id": "0115d3a8ff85583bc3d82cc36c13e1ee1becd7ef", "detected_licenses": [ "Apache-2.0" ], "directory_id": "be4549717420da7102e0f84ac2743ad1f01f3b4e", "extension": "py"...
2.75
stackv2
from yaml import load, FullLoader from jinja2 import Template from pathlib import Path def load_config(config_path): """Produce a Python object (usually dict-like) from the config file at `config_path` :param config_path: (str) path to config file, can be absolute or relative to working directory :return...
48
30.79
119
13
344
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_348d4ec81a53c76b_b3738602", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 20 ]
[ null ]
[ 20 ]
[ 45 ]
2024-11-18T18:06:04.645571+00:00
1,620,935,549,000
d2d0efaf5f25634f190499d3294e2d6d699cb005
3
{ "blob_id": "d2d0efaf5f25634f190499d3294e2d6d699cb005", "branch_name": "refs/heads/main", "committer_date": 1620935549000, "content_id": "dac347fe19ea9e16f660d53f9c0fb23ccab85853", "detected_licenses": [ "MIT" ], "directory_id": "ba41e9765416a40b8ce533f80b4c593f5b4a256d", "extension": "py", "file...
3.046875
stackv2
import re from controllers import employees_controller # regex for email validation regex = '^(\w|\.|\_|\-)+[@](\w|\_|\-|\.)+[.]\w{2,3}$' # Returns a message "Pass" when field is valid, custom message when invalid def validate_field(id, type, field): if(type == "phone"): print('Checking phone') if(...
115
34.11
96
15
911
python
[{"finding_id": "codeql_py/redos_c8bb3735afa41575_685011aa", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '_'.", "remediati...
2
true
[ "CWE-1333", "CWE-1333" ]
[ "py/redos", "py/redos" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '_'.", "This part of the regular expression may cause exponential backtracking on strings starting with 'a@' and containing many repetitions of '_'." ]
[ 4, 4 ]
[ null, null ]
[ 11, 28 ]
[ 25, 42 ]
2024-11-18T18:15:57.062294+00:00
1,543,443,364,000
0b0362d757825b09948a82ae8ae1b58dd2ffcf53
3
{ "blob_id": "0b0362d757825b09948a82ae8ae1b58dd2ffcf53", "branch_name": "refs/heads/master", "committer_date": 1543443364000, "content_id": "2ecfb693502de9822756be21da58399a6e7f3ea7", "detected_licenses": [ "MIT" ], "directory_id": "3c8273af6151343490a09a414a9b50ac1f714f73", "extension": "py", "fi...
2.609375
stackv2
import hashlib import random import string import uuid from mongoengine import StringField from models.Base import BaseDocument, BaseSchema, BaseFactory __author__ = 'Enis Simsar' # from http://www.pythoncentral.io/hashing-strings-with-python/ def hash_password(password): # uuid is used to generate a random nu...
43
25.98
97
16
277
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_b9ff2e165f58a59c_df17446f", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 17 ]
[ null ]
[ 27 ]
[ 60 ]
2024-11-18T18:16:06.145993+00:00
1,605,684,444,000
6633f50ae35fd886e6551b5ba3fc1c8af6d474ec
2
{ "blob_id": "6633f50ae35fd886e6551b5ba3fc1c8af6d474ec", "branch_name": "refs/heads/master", "committer_date": 1605684444000, "content_id": "8d6a1b02d0258b012ca4531c3c0e7e1434a920f0", "detected_licenses": [ "MIT" ], "directory_id": "ef21ea6ed244666cac5f96e4cfdaa58a7276049f", "extension": "py", "fi...
2.46875
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- ''' Use Ciel to automatically do updates ''' import os import re import sys import logging import argparse import requests import readline import subprocess logging.basicConfig( format='[%(levelname)s] %(message)s', level=logging.INFO) re_variable = re.compile('^\\...
166
31.93
105
16
1,332
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_73954cd64f0cede3_e0d3ea5a", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [https://github.com](1) may be at an arbitrary position...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [https://github.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 87 ]
[ null ]
[ 8 ]
[ 47 ]
2024-11-18T18:59:38.109728+00:00
1,693,345,400,000
0c3dc1e9ce57f55301c7a9e7ba8cfdce9b21ffbc
2
{ "blob_id": "0c3dc1e9ce57f55301c7a9e7ba8cfdce9b21ffbc", "branch_name": "refs/heads/master", "committer_date": 1693345400000, "content_id": "b6a7544aa212528e07c5833fb80a17329496e8e1", "detected_licenses": [ "MIT" ], "directory_id": "8018cbc929b44be4a203dafa661a566151bb801d", "extension": "py", "fi...
2.453125
stackv2
from flask import jsonify, request, make_response from flask_restful import Resource from sqlalchemy import or_, and_ from datetime import datetime import json import os from api.function_library.image_functions import save_image from api.resources.authentication import requires_auth from api.utility.storage import up...
280
28.04
173
18
1,798
python
[{"finding_id": "codeql_py/stack-trace-exposure_2177bfc1427770b8_f54c518d", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 198 ]
[ null ]
[ 61 ]
[ 71 ]
2024-11-18T19:11:48.510841+00:00
1,501,782,942,000
3b8c0592ee3d52d27bb26d1526dec0dfb4c495df
3
{ "blob_id": "3b8c0592ee3d52d27bb26d1526dec0dfb4c495df", "branch_name": "refs/heads/master", "committer_date": 1501782942000, "content_id": "e203e8931bfdecf6dd66a070f9844718edd6c7ca", "detected_licenses": [ "MIT" ], "directory_id": "911d88a5de948fe0860afffaa283af6ca1652a8d", "extension": "py", "fi...
3.125
stackv2
""" Simple Facebook Echo bot: Respond with exactly what it receives Standalone version """ import sys, json, traceback, requests from flask import Flask, request application = Flask(__name__) app = application PAT = 'replace_your_own_PAT_here' VERIFICATION_TOKEN = 'replace_your_own_token' @app.route('/', methods=['G...
128
36.35
120
20
1,013
python
[{"finding_id": "codeql_py/reflective-xss_133bdeaaf0a29352_bfeb5adf", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 19 ]
[ null ]
[ 16 ]
[ 53 ]
2024-11-18T18:39:42.703232+00:00
1,644,127,830,000
3f02bebf2cdc3f86aeb87debe47729999fbb3606
3
{ "blob_id": "3f02bebf2cdc3f86aeb87debe47729999fbb3606", "branch_name": "refs/heads/master", "committer_date": 1644127830000, "content_id": "d378b5ae211be29e69c4d6e197348ba91d76eb2c", "detected_licenses": [ "MIT" ], "directory_id": "5a7cd046d62c7476b874d87dc34e6ef6d5e693b6", "extension": "py", "fi...
2.765625
stackv2
#!/usr/bin/python3 from flask import Flask, request, render_template, url_for import json, os, random from PIL import Image TITLE = "VotePhoMe.johanv.xyz - Vote for a Photo" #site title, used in the title bar and the heading within the page app = Flask(__name__) app.config['MAX_CONTENT_LENGTH'] = 100 * 1024 * 1024 ...
172
33.2
150
16
1,438
python
[{"finding_id": "codeql_py/path-injection_9f093b81ef480ef1_aff1113e", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 122, 152 ]
[ null, null ]
[ 19, 25 ]
[ 41, 36 ]
2024-11-18T18:39:52.801616+00:00
1,578,748,829,000
07f24fcaaccf606e4b868c1f811ba6ada3946bc1
2
{ "blob_id": "07f24fcaaccf606e4b868c1f811ba6ada3946bc1", "branch_name": "refs/heads/master", "committer_date": 1578748829000, "content_id": "6f75734ae3af81f50c5560ec2c1171179709e21f", "detected_licenses": [ "Apache-2.0", "MIT" ], "directory_id": "bb9f44facabecb2cc41728d1ebbf5c59be190962", "exten...
2.484375
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- r''' Copyright 2020, SigDev Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless requ...
424
33.29
78
21
3,764
python
[{"finding_id": "codeql_py/overly-large-range_0dde7f753ab5bdde_a289fc76", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 155, 155 ]
[ null, null ]
[ 31, 43 ]
[ 34, 46 ]
2024-11-18T18:39:54.847192+00:00
1,631,518,429,000
7d634bd05c5dac050f3e1018cc33fe7236067b40
3
{ "blob_id": "7d634bd05c5dac050f3e1018cc33fe7236067b40", "branch_name": "refs/heads/master", "committer_date": 1631518429000, "content_id": "89a7fbe71fe45759013e77def4938bd36c557e60", "detected_licenses": [ "MIT" ], "directory_id": "9afcbcbd35dd5d7ac3f497d825bbad8077396ed5", "extension": "py", "fi...
3
stackv2
import re from aalpy.base import SUL class TomitaSUL(SUL): """ Tomita grammars are often used as a benchmark for automata-related challenges. Simple SUL that implements all 7 Tomita grammars and enables their learning. """ def __init__(self, tomita_level_fun): super().__init__() ...
68
20.74
115
13
484
python
[{"finding_id": "codeql_py/redos_3b7c5a19d9176858_1d479e99", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '0'.", "remediati...
3
true
[ "CWE-1333", "CWE-1333", "CWE-1333" ]
[ "py/redos", "py/redos", "py/redos" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '0'.", "This part of the regular expression may cause exponential backtracking on strings starting with '10' and containing many repetitions of '10'.", "This part of the regular expression may cause...
[ 34, 34, 34 ]
[ null, null, null ]
[ 30, 47, 64 ]
[ 36, 53, 70 ]
2024-11-18T18:39:59.636576+00:00
1,631,294,878,000
3d603246342fbdeda6a9a99b790641ef4c2b8af2
3
{ "blob_id": "3d603246342fbdeda6a9a99b790641ef4c2b8af2", "branch_name": "refs/heads/master", "committer_date": 1631294878000, "content_id": "255af7cb32f719e14cc87f76b7c4924180b70bbe", "detected_licenses": [ "MIT" ], "directory_id": "d28b6574e8c088cdb4670c48a53e0f93272b102c", "extension": "py", "fi...
2.71875
stackv2
import logging from http.server import HTTPServer, BaseHTTPRequestHandler from typing import List, Dict from jsonrpcserver import dispatch, method from .autodocstring import get_docstring_info from .constants import DEFAULT_HOST, DEFAULT_PORT logger = logging.getLogger(__name__) logger.setLevel(logging.INFO) logger....
95
32.58
110
16
716
python
[{"finding_id": "codeql_py/log-injection_b484eb9540db94be_d4b475f1", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 30 ]
[ null ]
[ 21 ]
[ 51 ]
2024-11-18T18:40:00.321453+00:00
1,557,494,207,000
3014161f902845ddcf2b827c17fbf522c9c70b87
3
{ "blob_id": "3014161f902845ddcf2b827c17fbf522c9c70b87", "branch_name": "refs/heads/master", "committer_date": 1557494207000, "content_id": "b74225f051a3f77c3917c4872b08e802941c54ff", "detected_licenses": [ "MIT" ], "directory_id": "1ada703c1dde2fa6a2b7b08ef941f842a67a139b", "extension": "py", "fi...
3.21875
stackv2
import base64 import requests import os import sys import platform def prepareImage(pathToImage): print(pathToImage) with open(pathToImage, 'rb') as imgFile: image = base64.b64encode(imgFile.read()) decodedImage = image.decode("utf-8") return decodedImage def placeGoogleOrder(imageAsStrin...
128
22.16
84
15
692
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_16f4c8c523ff1359_2a6ea464", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (password)](3) as clear text." ]
[ 59 ]
[ null ]
[ 20 ]
[ 47 ]
2024-11-18T18:47:04.486433+00:00
1,495,759,412,000
d6e970b1ac4c915a3dfb6c7fca8e7a9068b93651
3
{ "blob_id": "d6e970b1ac4c915a3dfb6c7fca8e7a9068b93651", "branch_name": "refs/heads/master", "committer_date": 1495759412000, "content_id": "7d8159c5180b3930e1974c6da35d37aa911b9c0b", "detected_licenses": [ "MIT" ], "directory_id": "5e6a2124f2a7c7eaf5e3e08c3663859fd7abce66", "extension": "py", "fi...
2.59375
stackv2
import os import jinja2 from . import Object, unicode, settings, descriptors from .base_gui import BaseGUI from .gui_helper import GUIHelper as Helper class AppGUI(BaseGUI): """ GUI class for creating apps using PyQt5's QtWebkit. The class AppGUI can be used to create standalone applications with HTML ...
230
45.59
79
16
2,219
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_bedd58dea69964f4_b54f2fb6", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 111 ]
[ null ]
[ 41 ]
[ 61 ]
2024-11-18T20:58:17.682850+00:00
1,619,117,351,000
34d03e7a1d635d05fdf1b4308baaf4a9be88baa4
4
{ "blob_id": "34d03e7a1d635d05fdf1b4308baaf4a9be88baa4", "branch_name": "refs/heads/main", "committer_date": 1619117351000, "content_id": "09efbef96ed68085200e637622d0952c458af1ba", "detected_licenses": [ "MIT" ], "directory_id": "a884039e1a8b0ab516b80c2186e0e3bad28d5147", "extension": "py", "file...
3.890625
stackv2
# Program: Exercicio4_4.py # Author: Ramon R. Valeriano # Description: # Developed: 23/03/2020 - 13:02 # Updated: salary = float(input("Enter with the salary: R$ ")) if (salary>0): if salary <= 1250: tax = 15 else: tax = 10 new_salary = salary + ((salary*tax)/100) print("The new salary...
19
20
52
11
142
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_03501e27b35a951b_e112e871", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 15 ]
[ null ]
[ 11 ]
[ 52 ]
2024-11-18T19:49:10.112951+00:00
1,628,881,188,000
ea1b07bf741c11e1d7f459d7ef2adad9252c51e1
3
{ "blob_id": "ea1b07bf741c11e1d7f459d7ef2adad9252c51e1", "branch_name": "refs/heads/master", "committer_date": 1628881188000, "content_id": "d2f8a3ca67700c67bf31cea2a4aed06a2a1c48ec", "detected_licenses": [ "Apache-2.0", "BSD-3-Clause" ], "directory_id": "021b3c9db5265d7ec19df0e6a36fa6aec3b506a3",...
2.734375
stackv2
"""JWT Backend. Navigator Authentication using JSON Web Tokens. """ import jwt from aiohttp import web from .base import BaseAuthBackend from datetime import datetime, timedelta from aiohttp_session import get_session, new_session from navigator.exceptions import NavException, UserDoesntExists, InvalidAuth from naviga...
163
35.69
85
17
1,203
python
[{"finding_id": "codeql_py/stack-trace-exposure_681f80ed19953894_29254302", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 158 ]
[ null ]
[ 47 ]
[ 70 ]
2024-11-18T19:38:18.675826+00:00
1,542,991,135,000
bd011b88cee656ce8451a1917abec62727e84eb4
3
{ "blob_id": "bd011b88cee656ce8451a1917abec62727e84eb4", "branch_name": "refs/heads/master", "committer_date": 1542991135000, "content_id": "bf6b2ad2e8ea736ad86c2d2e23dc01cb71599b5f", "detected_licenses": [ "MIT" ], "directory_id": "04db672bd13408b4b61bb4960333abd1c1926a32", "extension": "py", "fi...
2.578125
stackv2
#!/bin/python3 from event_queue import EventQueue #import firebase_admin #from firebase_admin import credentials, db import pyrebase """ Notifier Gathers notifications from EventQueue and sends them to PrescriptionManager. """ class Notifier: #_ref = None #_notification_ref= None #_prescription_ref= None...
79
32.37
98
16
621
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_88ae024f7e661f32_00b5550d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 63 ]
[ null ]
[ 39 ]
[ 44 ]
2024-11-18T19:38:41.770550+00:00
1,619,768,552,000
bf9e7ee5bfc37e1c4c4f99b6c4644521c591d52a
3
{ "blob_id": "bf9e7ee5bfc37e1c4c4f99b6c4644521c591d52a", "branch_name": "refs/heads/main", "committer_date": 1619768552000, "content_id": "1bed96ebcb27a75c338a5dde86db70938716508c", "detected_licenses": [ "MIT" ], "directory_id": "4781fc05b27ea6c898716c0f1e39dfb328f97e65", "extension": "py", "file...
3.46875
stackv2
income_tax=0 id = int(input("Enter Employee id: ")) basic_salary = int(input("Enter monthly gross salary: ")) allowance = int(input("Enter allowance: ")) gross_salary = basic_salary+allowance if gross_salary<=5000: income_tax = 0 elif gross_salary<=10000: income_tax = 0.1 * gross_salary elif gross_salary<=20...
20
29.45
168
9
179
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6c76553df5f520cd_9ec72883", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 20 ]
[ null ]
[ 7 ]
[ 168 ]
2024-11-18T20:11:03.942870+00:00
1,529,157,358,000
3db2e4a488ed76007e896ae5fa332065bc68e66c
2
{ "blob_id": "3db2e4a488ed76007e896ae5fa332065bc68e66c", "branch_name": "refs/heads/master", "committer_date": 1529157358000, "content_id": "280b890bb5751f19d36335c42b49c54f1f9f17c7", "detected_licenses": [ "MIT" ], "directory_id": "24d1b8bcd71751e37906685f94900a7725fa8fa5", "extension": "py", "fi...
2.46875
stackv2
#!/usr/bin/env python """ C++ source code generator to create bindings from Neovim API functions using Magnum types Based on the bindings/generate_bindings.py script from https://github.com/equalsraf/neovim-qt. """ import argparse import msgpack import sys, subprocess, os import re import jinja2 import datetime impor...
284
31.63
121
20
2,185
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_7f4625e4dd13947b_74046ffa", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 42 ]
[ null ]
[ 11 ]
[ 79 ]
2024-11-18T20:26:19.771363+00:00
1,475,601,860,000
332103705bbd616b0e4d6818cc4a95fbd6d4c2bf
2
{ "blob_id": "332103705bbd616b0e4d6818cc4a95fbd6d4c2bf", "branch_name": "refs/heads/master", "committer_date": 1475601860000, "content_id": "0b0e905e887bd436b3fb0d30e5b3838e87abdc6e", "detected_licenses": [ "MIT" ], "directory_id": "5a5436aeac22f3a928924063ccc7a87d051d03bb", "extension": "py", "fi...
2.484375
stackv2
#!/usr/bin/python # coding=utf-8 import logging import falcon import smtplib from catcher import config from catcher.models import MySQLModel class Login(object): @staticmethod def send_email(recipient, message): # TODO: nacitat z configu sender = 'noreply.catcher@gmail.com' try: ...
74
25.68
64
15
417
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9e6ff5413c5650e5_296a0149", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 31 ]
[ 32 ]
[ 17 ]
[ 43 ]
2024-11-18T20:26:43.134881+00:00
1,592,118,548,000
b8a73db6e97fac282e9fe918f2b52dd51e7e51c7
3
{ "blob_id": "b8a73db6e97fac282e9fe918f2b52dd51e7e51c7", "branch_name": "refs/heads/master", "committer_date": 1592118548000, "content_id": "858325314e3602d47ad9b4cb8be744f17d788e03", "detected_licenses": [ "MIT" ], "directory_id": "7f5e38237e9832f480940bdbb2c152eda370a748", "extension": "py", "fi...
2.640625
stackv2
# -*- coding: utf-8 -*- import redis import uuid import time import json import numpy as np from PIL import Image import cv2 import sys import os # import self tool sys.path.append(os.path.split(os.path.realpath(__file__))[0]) import helpers import age_gender_service_settings as settings db = redis.StrictRedis(host=...
141
29.25
132
18
1,169
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d45246e56d127044_619fa9d6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 119 ]
[ null ]
[ 11 ]
[ 36 ]
2024-11-18T20:26:44.277953+00:00
1,571,132,936,000
0a5663a31d013a3745ddf1ee6d561aac47515cd0
2
{ "blob_id": "0a5663a31d013a3745ddf1ee6d561aac47515cd0", "branch_name": "refs/heads/master", "committer_date": 1571132936000, "content_id": "54a575eef16423c1b4e1a2c077646e3b042da4f5", "detected_licenses": [ "MIT" ], "directory_id": "c57d4e42db1c772b951ca75b909f0021673c7396", "extension": "py", "fi...
2.46875
stackv2
from flask import Flask, jsonify, request from werkzeug import secure_filename from esHandler import ESHandler import asyncio import os import json ES_PORT = os.environ['ES_PORT'] ES_HOST = os.environ['ES_HOST'] ES_INDEX_NAME = "expenses" SHEET_FORM_DATA_NAME = "file" app = Flask(__name__) es = ESHandler(ES_HOST,ES_P...
63
28.81
100
12
460
python
[{"finding_id": "codeql_py/reflective-xss_92ff2a7fa0fe017b_280a720a", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 49 ]
[ null ]
[ 9 ]
[ 97 ]
2024-11-18T20:26:52.490530+00:00
1,601,398,331,000
3fa470a4cba1e2871e7db9296c55042129b2536e
2
{ "blob_id": "3fa470a4cba1e2871e7db9296c55042129b2536e", "branch_name": "refs/heads/main", "committer_date": 1601398331000, "content_id": "c3dc4a46383c558083505f7474c632ee9333e853", "detected_licenses": [ "MIT" ], "directory_id": "cc129db64fc64d1cb9a99526583771c10e245deb", "extension": "py", "file...
2.484375
stackv2
import re from collections import defaultdict from datetime import datetime from city_scrapers_core.constants import ( ADVISORY_COMMITTEE, BOARD, COMMITTEE, FORUM, NOT_CLASSIFIED, ) from city_scrapers_core.items import Meeting from city_scrapers_core.spiders import CityScrapersSpider from dateutil....
146
36.59
88
19
1,186
python
[{"finding_id": "codeql_py/overly-large-range_63e4da11d117a09d_86fdf7da", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 107 ]
[ null ]
[ 37 ]
[ 40 ]
2024-11-18T20:52:16.508081+00:00
1,438,801,911,000
499ff13155344271b01721bd9a6ce7f4b6f2bc26
2
{ "blob_id": "499ff13155344271b01721bd9a6ce7f4b6f2bc26", "branch_name": "refs/heads/master", "committer_date": 1438801911000, "content_id": "a7078044a735cea25d175bae8690ff55351cb03a", "detected_licenses": [ "MIT" ], "directory_id": "c159364dcc17ee7ca04d1b6380ef09f552b3cb36", "extension": "py", "fi...
2.40625
stackv2
from configparser import ConfigParser from datetime import datetime import logging import requests from yapsy.IPlugin import IPlugin from api.motor import Motor ALARM_ON_ALERT_MESSAGE = "Command Center - Alarm is now on alert! Alert start time: %s" ALARM_ON_ALERT_OFF_MESSAGE = "Command Center - Alarm alert is off. ...
54
42.07
113
18
499
python
[{"finding_id": "codeql_py/request-without-cert-validation_be3872d4abe97bc0_39bc6e8f", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 38 ]
[ null ]
[ 21 ]
[ 77 ]
2024-11-18T20:52:17.251664+00:00
1,628,177,393,000
dfd15de8dff1c24862e5e4109d73b0eeb8fbcfa8
2
{ "blob_id": "dfd15de8dff1c24862e5e4109d73b0eeb8fbcfa8", "branch_name": "refs/heads/master", "committer_date": 1628177393000, "content_id": "5e261ce71689edc2d17bc1ba7fbcb193b80441b2", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "825035ad37f8baf4cfd3057afa93a306523644c5", "extension": "p...
2.421875
stackv2
# -*- coding: utf-8 -*- """ restapp.py :copyright: (c) 2014 by Aravinda VK :license: MIT, see LICENSE for more details. """ import types from flask import Flask, request, jsonify from functools import wraps from glusterfsrest import users from glusterfsrest.config import APP_DEBUG from glusterfsrest.excep...
98
23.07
72
15
550
python
[{"finding_id": "codeql_py/stack-trace-exposure_83a8b802b44e809b_4361867d", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 34 ]
[ null ]
[ 20 ]
[ 27 ]
2024-11-18T20:52:28.616547+00:00
1,566,916,850,000
3a2b93bad38cf67fb882d21c306e799932f63b68
4
{ "blob_id": "3a2b93bad38cf67fb882d21c306e799932f63b68", "branch_name": "refs/heads/master", "committer_date": 1566916850000, "content_id": "30487e7d17b24c8231abdfb8f5a5d081d1ac45d0", "detected_licenses": [ "Apache-2.0" ], "directory_id": "7847fc84698c4e5acaad15c9e5435b78bc3fed9b", "extension": "py"...
4.375
stackv2
def main(): printNumbers() password = input("Enter a password: ") confirm_pass = input("Please confirm your password: ") print(checkPassword(password, confirm_pass)) print(evenOrOdd()) print(prob4_main(greeting_word())) print(quit_func()) number1 = int(input("Enter a number: ")) numb...
61
24.03
78
11
427
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d60c6f4a45900780_05048bb1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 5 ]
[ null ]
[ 11 ]
[ 48 ]
2024-11-18T20:52:28.746275+00:00
1,633,424,613,000
962eae897616677d348bba6c680fdee3e86821b9
3
{ "blob_id": "962eae897616677d348bba6c680fdee3e86821b9", "branch_name": "refs/heads/master", "committer_date": 1633424613000, "content_id": "8358dc2e96e48c37b397c1912526b61b2ea400d3", "detected_licenses": [ "MIT" ], "directory_id": "50b9be56ddad0fab18439b6023a174369c3b8c94", "extension": "py", "fi...
2.8125
stackv2
from flask import Blueprint, jsonify, render_template from requests import get import pandas as pd # Create a blueprint for the REST API rest_bp = Blueprint( 'api', __name__, template_folder="templates", static_folder="static", ) """ API endpoints for world data """ # All available data, for all ...
109
27.89
97
15
760
python
[{"finding_id": "codeql_py/partial-ssrf_7587641afee2a920_6e4af34a", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
2
true
[ "CWE-918", "CWE-918" ]
[ "py/partial-ssrf", "py/partial-ssrf" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 46, 107 ]
[ null, null ]
[ 16, 12 ]
[ 74, 78 ]
2024-11-18T20:52:47.619701+00:00
1,533,625,424,000
92ed058745b133d11d08bdea39019646b3fcb357
3
{ "blob_id": "92ed058745b133d11d08bdea39019646b3fcb357", "branch_name": "refs/heads/master", "committer_date": 1533625424000, "content_id": "bc7d738540f0f441e8dc884ea6abb91e330a9f9e", "detected_licenses": [ "MIT" ], "directory_id": "412e49b698f1a3feed93d55817574e6a2cb45b30", "extension": "py", "fi...
2.625
stackv2
#!/usr/bin/env python3 #encoding: utf-8 import threading import sys from json.decoder import JSONDecodeError from requests import get as request from time import sleep from inspect import currentframe # === Константы === api = "https://api.vk.com/method/" tokenPrefix = "?v=5.67&access_token=%s" setActivity = api + ...
372
25.83
140
22
2,572
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_873a05370761846a_75cf296f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 231, 357 ]
[ null, null ]
[ 16, 24 ]
[ 72, 38 ]
2024-11-18T20:52:56.807506+00:00
1,688,789,443,000
45e2c971e7767479a321782fe009249d5f06e51d
2
{ "blob_id": "45e2c971e7767479a321782fe009249d5f06e51d", "branch_name": "refs/heads/master", "committer_date": 1688789443000, "content_id": "0a3e521343551e3fbda50306ee4004df4a25a64c", "detected_licenses": [ "MIT" ], "directory_id": "982385175300be331c5e9dfa22c22ea7d31afb54", "extension": "py", "fi...
2.375
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- from subprocess import check_output # call command line # from subprocess import Popen, PIPE import os # make directories, change current dir, etc import platform # macOS or windows import shutil # move and delete files/folders from glob impor...
297
29.21
91
17
2,222
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_44154256f227b3f4_e72706c0", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 291 ]
[ null ]
[ 16 ]
[ 56 ]
2024-11-18T19:02:35.247871+00:00
1,532,896,337,000
0463acd47cfe1546a3855a828cc6a8e81200ed3e
3
{ "blob_id": "0463acd47cfe1546a3855a828cc6a8e81200ed3e", "branch_name": "refs/heads/master", "committer_date": 1532896337000, "content_id": "7108af6acd918e364e23d694f14a7ffb44f34569", "detected_licenses": [ "MIT" ], "directory_id": "00e6a9585a54f7b82023be8c8d3c58e651faf472", "extension": "py", "fi...
3.359375
stackv2
import re import string class Clean: def __init__(self, text): self.text = text def low(self): '''make string lowercase''' return self.text.lower() def caps(self): '''make string uppercase''' return self.text.upper(...
54
24.17
64
13
338
python
[{"finding_id": "codeql_py/overly-large-range_c2caf65b7291b94e_661e0cf8", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "remediatio...
4
true
[ "CWE-020", "CWE-020", "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range ...
[ 47, 47, 47, 47 ]
[ null, null, null, null ]
[ 34, 37, 40, 49 ]
[ 38, 41, 44, 53 ]
2024-11-18T19:02:39.543382+00:00
1,536,892,647,000
32507472067e84a94fccc44eb5f900e19fc9f0cb
2
{ "blob_id": "32507472067e84a94fccc44eb5f900e19fc9f0cb", "branch_name": "refs/heads/master", "committer_date": 1536892647000, "content_id": "b165b98d47e80dd13a5f43c5038b6e789e14e945", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "4e6ca2bf1e8b250bf5457c41cdbf07f7b958ddf3", "extension": "p...
2.328125
stackv2
#!/usr/bin/env python3 from flask import Flask, jsonify, request import threading import time import os from functools import partial from config import config from multiprocessing.dummy import Pool as ThreadPool import requests import os import sys from itertools import product app = Flask(__name__) local_data_stor...
68
30.91
134
19
513
python
[{"finding_id": "codeql_py/partial-ssrf_b0871adbdc759c73_83523638", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depen...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depends on a [user-provided value](2)." ]
[ 60 ]
[ null ]
[ 17 ]
[ 135 ]
2024-11-18T19:02:47.807467+00:00
1,618,849,231,000
d23446f8e75e5425ec6277402f060865381f8d2a
2
{ "blob_id": "d23446f8e75e5425ec6277402f060865381f8d2a", "branch_name": "refs/heads/master", "committer_date": 1618996570000, "content_id": "2fd0909fc4554d12b2ec63537968aff3fabe4936", "detected_licenses": [ "MIT" ], "directory_id": "50810fdbd65afed9a060c9c39cc79ae1c52b86f6", "extension": "py", "fi...
2.359375
stackv2
# Copyright (c) Facebook, Inc. and its affiliates. # # This source code is licensed under the MIT license found in the # LICENSE file in the root directory of this source tree. import subprocess from flask import Flask app = Flask(__name__) @app.route("/rce/<string:payload>") def definite_rce(payload: str) -> Non...
26
22.46
65
10
149
python
[{"finding_id": "codeql_py/command-line-injection_81fbb3009fc3c34d_804fee6f", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {...
2
true
[ "CWE-078", "CWE-078" ]
[ "py/command-line-injection", "py/command-line-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This command line depends on a [user-provided value](1).", "This command line depends on a [user-provided value](1)." ]
[ 16, 26 ]
[ null, null ]
[ 20, 20 ]
[ 27, 37 ]
2024-11-18T19:14:28.520022+00:00
1,671,235,182,000
41d012c570717943b557698551cd2cad4433e735
2
{ "blob_id": "41d012c570717943b557698551cd2cad4433e735", "branch_name": "refs/heads/master", "committer_date": 1671235182000, "content_id": "b84d726536adf4b47379fe75807f6b47121bac66", "detected_licenses": [ "MIT" ], "directory_id": "6f5475a4753cf7839c2196f2f9b398ad8eeb3a95", "extension": "py", "fi...
2.46875
stackv2
import socket import ssl import json import hashlib import time import random RSV1 = 64 RSV2 = 32 RSV3 = 16 OP_CONTINUATION = 0 OP_TEXT = 1 OP_BINARY = 2 OP_CLOSE = 8 OP_PING = 9 OP_PONG = 10 OPCODES = [ OP_CONTINUATION, OP_TEXT, OP_BINARY, OP_CLOSE, OP_P...
371
27.07
82
24
2,744
python
[{"finding_id": "codeql_py/insecure-default-protocol_d5368c176e83a308_9ac5c80f", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in...
1
true
[ "CWE-327" ]
[ "py/insecure-default-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used." ]
[ 198 ]
[ null ]
[ 23 ]
[ 44 ]
2024-11-18T19:14:36.260409+00:00
1,504,705,569,000
780a6180773ad472eb12b90f2c964ffdc3bd65c9
2
{ "blob_id": "780a6180773ad472eb12b90f2c964ffdc3bd65c9", "branch_name": "refs/heads/master", "committer_date": 1504705569000, "content_id": "540462580d0f8cedff3d90d8d5cc88b08892edf6", "detected_licenses": [ "MIT" ], "directory_id": "3eec9638de882a24a854b927f543b029e9ddec9c", "extension": "py", "fi...
2.5
stackv2
import os from itertools import count import requests class HubAPI: def __init__(self, hapikey): self.session = requests.Session() self.hapikey = hapikey def request(self, method, url, params=None, **kwargs): if params is None: params = {} if url.startswith('/'): ...
55
30.27
88
17
383
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_52cd031ebf403adb_8cf50616", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [https://api.hubapi.com](1) may be at an arbitrary posi...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [https://api.hubapi.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 17 ]
[ null ]
[ 12 ]
[ 43 ]
2024-11-18T19:14:42.619870+00:00
1,628,602,606,000
0712d8c695e3fa463546e31479c0ce07fe6597af
3
{ "blob_id": "0712d8c695e3fa463546e31479c0ce07fe6597af", "branch_name": "refs/heads/master", "committer_date": 1628602606000, "content_id": "02f446eb5120cfbc064568ae9847366572123a25", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "76efc9f38dae28d3072c624cda1ac48714633ded", "extension": "p...
2.703125
stackv2
#! /usr/bin/env python3 """ ONTAP REST API Sample Scripts This script was developed by NetApp to help demonstrate NetApp technologies. This script is not officially supported as a standard NetApp product. Purpose: This Module covers system/node/power/off CLI diagnostic mode usage using ONTAP REST API Usage: system_...
102
32.1
97
18
767
python
[{"finding_id": "codeql_py/request-without-cert-validation_3bb3634668fdaeef_b5497622", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 46 ]
[ 50 ]
[ 20 ]
[ 26 ]
2024-11-18T19:14:43.364653+00:00
1,638,551,708,000
3c6efbff4c8a5080d489416ed750430a9e64d62e
2
{ "blob_id": "3c6efbff4c8a5080d489416ed750430a9e64d62e", "branch_name": "refs/heads/master", "committer_date": 1638861686000, "content_id": "2950800f0c45bcccc20bca50edf6335bcf88c533", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "70a1cfaee115bc96012df4ba7411548131b18a6c", "extension": "p...
2.421875
stackv2
# //////////////////////////////////////////////////////////// # # File: remoteshell.py # # //////////////////////////////////////////////////////////// # # Author: Robin Nyman # # Nokia - Confidential # Do not use, distribute, or copy without consent of Nokia. # Copyright (c) 2021 Nokia. All rights reserved. # # /////...
141
33.29
87
18
1,055
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_2aa549696bc23c7b_2944a680", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 74 ]
[ null ]
[ 9 ]
[ 71 ]
2024-11-18T19:27:40.219503+00:00
1,528,992,725,000
73c5300bf757572fd1ef38581d6e2ab45288c13e
2
{ "blob_id": "73c5300bf757572fd1ef38581d6e2ab45288c13e", "branch_name": "refs/heads/master", "committer_date": 1528992725000, "content_id": "5de2d464b994671b9e6a076341774a608752fc55", "detected_licenses": [ "MIT" ], "directory_id": "f7d8cd730978aa6e0d04be7a4157a900b793e9fe", "extension": "py", "fi...
2.40625
stackv2
import os import shutil from scipy.misc import imread, toimage import urllib.request import tarfile bsds_url = 'http://www.eecs.berkeley.edu/Research/Projects/CS/vision/grouping/BSR/BSR_bsds500.tgz' tar_name = bsds_url.split('/')[-1] print('start downloading training data from "{}"'.format(bsds_url)) urllib.request...
58
32.31
98
14
533
python
[{"finding_id": "codeql_py/tarslip_8501b5d748cb11c5_ab0cd79e", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 18 ]
[ null ]
[ 5 ]
[ 13 ]
2024-11-18T19:27:40.278175+00:00
1,480,348,690,000
2100c355e0f0131fd3dd49455fa21bb41d703ccf
2
{ "blob_id": "2100c355e0f0131fd3dd49455fa21bb41d703ccf", "branch_name": "refs/heads/master", "committer_date": 1480348690000, "content_id": "64c0e26bd1e2413ced80866baebc82883086018d", "detected_licenses": [ "MIT" ], "directory_id": "4022fdf491e29722a7684f4f1aba8e4ac3ed5c02", "extension": "py", "fi...
2.453125
stackv2
# -*- coding: utf-8 -*- from datetime import datetime, timedelta from django.conf import settings from pymongo import MongoClient, DESCENDING class Morudall(object): def __init__(self): uri = 'mongodb://%s:%d/' % (settings.MONGO_ADDRESS, settings.MONGO_PORT) mc = MongoClient(uri) self.db...
120
24.57
80
17
771
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6515883fc6954f6e_47449217", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 116, 120 ]
[ null, null ]
[ 11, 11 ]
[ 38, 46 ]
2024-11-18T19:38:51.905338+00:00
1,618,476,875,000
ac65350c07146ed8dca2de8247c7ebbe793621eb
3
{ "blob_id": "ac65350c07146ed8dca2de8247c7ebbe793621eb", "branch_name": "refs/heads/master", "committer_date": 1618476875000, "content_id": "26728db02d9a4e96c0187b22be79e767d54b1f6b", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e7a79508d88c8b77edc4a49b31d802eafc276a6c", "extension": "py"...
3.40625
stackv2
import time if __name__ == '__main__': with open('today.txt', 'wt') as fin: fin.write(time.ctime(time.time())) today_string = '' with open('today.txt', 'rt') as fout: today_string = fout.readline() print(today_string) time_pars = time.strptime(today_string) print(time_pars) ...
19
23.32
54
13
122
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d30db48f81279d18_14e9bb02", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 19 ]
[ null ]
[ 11 ]
[ 54 ]
2024-11-18T20:06:01.376245+00:00
1,465,785,184,000
77ce611409b99da94d1d72e2c9f59a50a1171f9e
3
{ "blob_id": "77ce611409b99da94d1d72e2c9f59a50a1171f9e", "branch_name": "refs/heads/master", "committer_date": 1465785184000, "content_id": "949e097613462d1f932828aab4ad9bc65ef395f9", "detected_licenses": [ "Apache-2.0" ], "directory_id": "43e4ca65303f6c103d03287e125528c484aa4430", "extension": "py"...
2.8125
stackv2
#coding=utf-8 import requests from bs4 import BeautifulSoup import shutil import re import time def get_gif_urls(content): output = [] soup = BeautifulSoup(content) for link in soup.find_all('a'): href = link.get('href') if href != None and 'gif' in href and 'blogspot.com' in href: ...
70
33.46
173
19
670
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_2e5a23235d0670b8_5f7650bb", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [blogspot.com](1) may be at an arbitrary position in th...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [blogspot.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 15 ]
[ null ]
[ 47 ]
[ 69 ]
2024-11-18T20:06:01.689831+00:00
1,598,474,249,000
cd23cf793478c125b54c260aa28e0a75afca10d3
2
{ "blob_id": "cd23cf793478c125b54c260aa28e0a75afca10d3", "branch_name": "refs/heads/master", "committer_date": 1598474249000, "content_id": "6696a323982b7f522c77946f02d4c68d95931790", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e8927da938039e86853955690a120ee8643d8565", "extension": "py"...
2.3125
stackv2
import hashlib from uuid import uuid4 from functools import wraps from django.http import HttpResponse from django.db import IntegrityError, transaction from django.contrib.auth.models import User from django.conf import settings def only_lti(fn): """ Decorator ensures that user comes from LTI session. "...
70
26.23
83
15
425
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_6b0952b9c6806511_ba3a4ecb", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecu...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecure.", "[Sensitive data (id)](1) is used in a hashing algorithm (RIPEMD160) that is insecure." ]
[ 56, 65 ]
[ null, null ]
[ 17, 14 ]
[ 54, 37 ]
2024-11-18T20:06:21.929818+00:00
1,603,572,371,000
3cf9f5367cfc8cd7a2a2eb9b2f43d0eb3013ad5e
2
{ "blob_id": "3cf9f5367cfc8cd7a2a2eb9b2f43d0eb3013ad5e", "branch_name": "refs/heads/main", "committer_date": 1603572371000, "content_id": "457993b8bd5053862ede76967aef767dfbcf6170", "detected_licenses": [ "Apache-2.0" ], "directory_id": "7c10f3b5c39458788bd0b62765ed767c8f0d1f6d", "extension": "py", ...
2.34375
stackv2
from flask import Flask, request, send_file, Response, make_response app = Flask(__name__) app.config['SEND_FILE_MAX_AGE_DEFAULT'] = 0 import database db = database.Database() import analysis import ml predictor = ml.Predictor() import json import os import threading ROOT_DIR = "/tf/HackDuke2019" FRONTEND_DIR = os...
138
29.22
98
16
946
python
[{"finding_id": "codeql_py/path-injection_8f089b2138d2f769_ec7d31c8", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 31, 32 ]
[ null, null ]
[ 27, 30 ]
[ 40, 43 ]
2024-11-18T20:18:11.683590+00:00
1,647,367,933,000
c1271fd402026bde765c662bf8166cc40dfa55cc
2
{ "blob_id": "c1271fd402026bde765c662bf8166cc40dfa55cc", "branch_name": "refs/heads/master", "committer_date": 1647367933000, "content_id": "71e36a4e2e3fb2bd46a6fb6ade0731403b9b4d0e", "detected_licenses": [ "Apache-2.0" ], "directory_id": "da0ce1ec13cc4154ae4eb204afbf8a81ba600479", "extension": "py"...
2.484375
stackv2
# coding=utf-8 # Copyright 2020 The Google Research Authors. # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicab...
200
28.32
79
17
1,546
python
[{"finding_id": "codeql_py/overly-large-range_276c864c45bcc021_819cd87a", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo...
6
true
[ "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "Suspicious character range that is equivalent to \\[A-Z\\\\[...
[ 34, 34, 47, 47, 50, 50 ]
[ null, null, null, null, null, null ]
[ 23, 42, 42, 50, 51, 59 ]
[ 27, 46, 46, 54, 55, 63 ]
2024-11-18T20:18:14.377954+00:00
1,583,706,665,000
a19a51f62b90cf20ced2395bfcc181981946db21
2
{ "blob_id": "a19a51f62b90cf20ced2395bfcc181981946db21", "branch_name": "refs/heads/master", "committer_date": 1583706665000, "content_id": "95f5ee2cfb4f5667e7bad4a8346fc236ecc1dace", "detected_licenses": [ "MIT" ], "directory_id": "d211bf8cddcfe3a5e288efee292be0d7eb23209a", "extension": "py", "fi...
2.484375
stackv2
from rest_framework import viewsets, status from rest_framework.authentication import TokenAuthentication from rest_framework.permissions import IsAuthenticated from rest_framework.response import Response from core.models import News, Campaing from newscampaing import serializers class NewsPrivate(viewsets.ModelView...
87
30.98
70
16
515
python
[{"finding_id": "codeql_py/stack-trace-exposure_da8f685bbdf6da85_8e833684", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 64, 85 ]
[ null, null ]
[ 21, 21 ]
[ 40, 40 ]
2024-11-18T20:18:15.988713+00:00
1,629,913,561,000
55f52100233ed13260b806934e1da1e215b0fa8d
2
{ "blob_id": "55f52100233ed13260b806934e1da1e215b0fa8d", "branch_name": "refs/heads/master", "committer_date": 1629913561000, "content_id": "4dea2172263e42a77b85f07d7a92882a7645e0ec", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "f7b4c0234db78b5987e066763890a1a763085cce", "extension": "p...
2.5
stackv2
import environ import json from django.conf import settings import requests class Pessoa(object): def __init__(self, set_id, pes_matricula, pes_nome): self.set_id = set_id self.pes_matricula = pes_matricula self.pes_nome = pes_nome class Setor(object): def __init__(self, set_id, set_nome, set_sigla, set_id_...
76
46.53
132
11
736
python
[{"finding_id": "codeql_py/request-without-cert-validation_94ea01d33729b819_5b7098e0", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
4
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 45, 54, 63, 72 ]
[ null, null, null, null ]
[ 7, 7, 7, 7 ]
[ 45, 45, 45, 45 ]
2024-11-18T20:18:24.204797+00:00
1,620,981,766,000
819c6389c28b3296a142ad9e6116d258b94693c8
2
{ "blob_id": "819c6389c28b3296a142ad9e6116d258b94693c8", "branch_name": "refs/heads/master", "committer_date": 1620981766000, "content_id": "4a06a74bfa1782dd989a3ba4c4bdcaf813c89926", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "1ea80a195958c5faef5090fedc14389dc6932716", "extension": "p...
2.453125
stackv2
import datetime from collections import defaultdict from api.models.couriers import Courier from rest_framework import serializers from rest_framework.exceptions import ValidationError class CourierSerializer(serializers.ModelSerializer): courier_id = serializers.IntegerField() class Meta: fields = ...
101
39.38
78
17
840
python
[{"finding_id": "codeql_py/stack-trace-exposure_c1f6574e17d9e110_5f5648c0", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 62 ]
[ null ]
[ 35 ]
[ 36 ]
2024-11-18T20:18:31.175827+00:00
1,620,788,482,000
887490abbb7f4e2481aa77ab0286b3839a623a09
4
{ "blob_id": "887490abbb7f4e2481aa77ab0286b3839a623a09", "branch_name": "refs/heads/master", "committer_date": 1620788482000, "content_id": "0a48d8cb3f5a69848a94495ded63602740d2b0f9", "detected_licenses": [ "MIT" ], "directory_id": "8d22e1fd064e7f5972c71db82fad657eea5a9333", "extension": "py", "fi...
4.25
stackv2
import math # 编写一个代表圆形的类,其具备: # (1)半径属性 # (2)求面积行为 class Circle: def __init__(self, radius): self.Radius = radius def GetArea(self): return 3.14 * self.Radius * self.Radius c = Circle(3) print("The circle's radius is {0}. It's area is {1:.2f}." .format(c.Radius, c.GetArea())) # 编写一个代表矩形的...
171
27.77
109
19
1,607
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_823c8776f0b3c6b0_9071b875", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
4
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (p...
[ 61, 64, 83, 86 ]
[ 62, 65, 84, 87 ]
[ 15, 15, 15, 15 ]
[ 89, 89, 109, 109 ]
2024-11-18T20:18:31.634176+00:00
1,396,164,245,000
581676971a91b817ca17822e4151543a9a1dcda6
3
{ "blob_id": "581676971a91b817ca17822e4151543a9a1dcda6", "branch_name": "refs/heads/master", "committer_date": 1396164245000, "content_id": "ea5eacbf3a2a7853547bb1e884c3fa75b44815b3", "detected_licenses": [ "Apache-2.0" ], "directory_id": "023e4279f0b54e5bb8beaed36561e20226d81bd4", "extension": "py"...
2.609375
stackv2
import flask import hashlib import base64 import uuid import re import boto boto.s3 from .database import query import logging logger = logging.getLogger(__name__) logger.addHandler(logging.FileHandler(u'auth.log')) class Auth(object): @staticmethod def query(*args, **kwargs): return query(*args, *...
95
28.79
79
16
616
python
[{"finding_id": "codeql_py/polynomial-redos_e970f8ee5e6e316c_f8949a9c", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with ma...
2
true
[ "CWE-1333", "CWE-327" ]
[ "py/polynomial-redos", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with many repetitions of 'a'.\nThis [regular expression](3) that depends on a [user-provided value](2) may run slow on strings starting with 'signature=' and with many repetitions of 'signature=a'.", "[Sensitive data ...
[ 54, 73 ]
[ null, null ]
[ 23, 20 ]
[ 43, 28 ]
2024-11-18T20:18:37.545456+00:00
1,495,370,577,000
85bb27c855ad006665a8cf1b03ee9ad91b95502a
3
{ "blob_id": "85bb27c855ad006665a8cf1b03ee9ad91b95502a", "branch_name": "refs/heads/master", "committer_date": 1495370577000, "content_id": "9b703455337c1001e36e501622c86cdbc9578883", "detected_licenses": [ "MIT" ], "directory_id": "a68230657489a1d9e4c850a394539a992d66e94a", "extension": "py", "fi...
2.75
stackv2
import os import sys import time import logging import tempfile import zipfile import tarfile import requests import subprocess try: import curses assert curses except ImportError: curses = None # Fake unicode literal support: Python 3.2 doesn't have the u'' marker for # literal strings, and alternative ...
170
32.14
75
16
1,295
python
[{"finding_id": "codeql_py/tarslip_cd779261909d92db_678b7ff0", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 94 ]
[ null ]
[ 13 ]
[ 17 ]
2024-11-18T20:31:21.127143+00:00
1,581,353,094,000
5cb1658605e3acb438f6ccb07d8cfb726273570e
3
{ "blob_id": "5cb1658605e3acb438f6ccb07d8cfb726273570e", "branch_name": "refs/heads/master", "committer_date": 1581353094000, "content_id": "0974b93022f0d7de0fec8b4b7bd1e3e54d5a06de", "detected_licenses": [ "MIT" ], "directory_id": "5b09ee3b611a9d6935a3400dd6fe23770a87368a", "extension": "py", "fi...
2.96875
stackv2
import re from pyjo_mdl.exceptions import InstanceValidationError __author__ = 'xelhark' URL_REGEX = re.compile(r'http[s]?://(?:[a-zA-Z]|[0-9]|[$-_@.&+]|[!*\(\),]|(?:%[0-9a-fA-F][0-9a-fA-F]))+') def number_validator(fs, value): if 'max_value' in fs and value > fs['max_value']: raise InstanceValidationEr...
68
35.12
120
15
571
python
[{"finding_id": "codeql_py/overly-large-range_65c0f6acdff71b25_66fc5093", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 6 ]
[ null ]
[ 56 ]
[ 59 ]
2024-11-18T20:31:38.336908+00:00
1,522,980,554,000
51e7035b76d49ddd80de92b7905d4ef43f8a93d4
3
{ "blob_id": "51e7035b76d49ddd80de92b7905d4ef43f8a93d4", "branch_name": "refs/heads/master", "committer_date": 1522980554000, "content_id": "dcd3a664b9c1a2d09a6aa2876f4d3382232557d0", "detected_licenses": [ "MIT" ], "directory_id": "257577c237a46a9147b9086ff3d438e53144cb7f", "extension": "py", "fi...
3.21875
stackv2
""" File: encrypt.py Author: Matt Kearns (mdk2mc) Date: 10/10/2017 """ __author__ = "mdk2mc" import sys from Crypto.PublicKey import RSA from Crypto import Random from Crypto.Cipher import PKCS1_OAEP from Crypto.Cipher import ARC4 from Crypto.Hash import SHA256 def secret_string(message, public_ke...
84
28.4
74
16
672
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_d8f808aa2ce4f991_63d5b795", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The cryptographic algorithm ARC4](1) is broken or weak, and should not be used.", "...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[The cryptographic algorithm ARC4](1) is broken or weak, and should not be used.", "[The cryptographic algorithm ARC4](1) is broken or weak, and should not be used." ]
[ 40, 64 ]
[ null, null ]
[ 26, 17 ]
[ 55, 46 ]
2024-11-18T20:43:20.979463+00:00
1,692,041,996,000
56b464f2be70953113b84165b8d0825b26cc142f
3
{ "blob_id": "56b464f2be70953113b84165b8d0825b26cc142f", "branch_name": "refs/heads/main", "committer_date": 1692041996000, "content_id": "2dea333fd709c9a76884dacf50ef6673b8ac9e75", "detected_licenses": [ "MIT" ], "directory_id": "1dbbb05b30d27c6419b9f34eea3b9a47f92582a0", "extension": "py", "file...
2.84375
stackv2
#!/usr/bin/env python3 # Copyright (c) Facebook, Inc. and its affiliates. # This source code is licensed under the MIT license found in the # LICENSE file in the root directory of this source tree. import os from collections import defaultdict from typing import Dict, List, Tuple import pandas as pd RACES_ETHNICIT...
225
37.46
89
21
2,221
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2da23d1d8813a59d_c2cec75f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.\nThis expression logs [sensitive data (priva...
[ 34, 221 ]
[ null, 222 ]
[ 11, 9 ]
[ 70, 34 ]
2024-11-18T20:43:29.760541+00:00
1,550,058,886,000
a68f24e61aa2a9df42d73995ade25211601700c8
2
{ "blob_id": "a68f24e61aa2a9df42d73995ade25211601700c8", "branch_name": "refs/heads/master", "committer_date": 1550058886000, "content_id": "ad2a35eb9bdfc7d99b89e1c53e46e4e6b049f9f7", "detected_licenses": [ "MIT" ], "directory_id": "2a018ef76779ca26f03a22283c3bfc80039118a8", "extension": "py", "fi...
2.421875
stackv2
import logging import string from xml.sax.saxutils import escape import io from google.cloud import vision from google.cloud.vision import types from PIL import Image import requests import os from jinja2 import Environment, FileSystemLoader NEW_LINE_HYSTERESIS = 4 TEMPLATE_ENVIRONMENT = Environment( autoescape=Fa...
167
33.58
118
21
1,300
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_0bb9f1c568731a69_bdc035d2", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 13 ]
[ 16 ]
[ 24 ]
[ 23 ]
2024-11-18T20:43:38.376500+00:00
1,399,218,215,000
7ef67c549c2e4fc189bcb8cec42f5fde19c6e31a
3
{ "blob_id": "7ef67c549c2e4fc189bcb8cec42f5fde19c6e31a", "branch_name": "refs/heads/master", "committer_date": 1399218425000, "content_id": "667076d0bf3530ccb2eca155772c344f789db828", "detected_licenses": [ "MIT" ], "directory_id": "26903b08fe5380848b80b77749184f4cd3873466", "extension": "py", "fi...
2.640625
stackv2
""" marvin.security ~~~~~~~~~~~~~~~ Security-related utilities and tools. """ from .utils import generic_error_handler from itsdangerous import BadData, constant_time_compare, URLSafeSerializer from flask import abort, current_app, g, request from flask.ext.principal import identity_changed, Identity i...
151
34.78
119
17
1,328
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_71e02fccd23de949_089cb903", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e...
[ 31 ]
[ null ]
[ 27 ]
[ 35 ]