added
stringlengths
32
32
created
int64
1,244B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.25
source
stringclasses
1 value
text
stringlengths
324
20.1k
num_lines
int64
16
598
avg_line_length
float64
15.1
58.3
max_line_length
int64
33
179
ast_depth
int64
8
39
length
int64
101
3.8k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.1k
265k
sast_codeql_findings_count
int64
1
45
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
45
rule_ids
listlengths
1
45
confidences
listlengths
1
45
severities
listlengths
1
45
messages
listlengths
1
45
line_starts
listlengths
1
45
line_ends
listlengths
1
45
column_starts
listlengths
1
45
column_ends
listlengths
1
45
2024-11-19T02:30:08.638702+00:00
1,693,057,534,000
157ba488886951ed76b46a4fb431473ceffef4a2
3
{ "blob_id": "157ba488886951ed76b46a4fb431473ceffef4a2", "branch_name": "refs/heads/master", "committer_date": 1693057534000, "content_id": "918657adbdee888bee9386aab50504f4d0e0131c", "detected_licenses": [ "MIT" ], "directory_id": "d977427d0cfec5a68334832c5cd241fbc1f512b5", "extension": "py", "fi...
2.859375
stackv2
"""writer.py: Define class MJScoreWriter. """ from itertools import product #from docutils.writers import UnfilteredWriter from jinja2 import Environment from .languages import get_language from .model import YakuTable from .stat import (create_player_data, evaluate_placing, evalu...
127
30.03
71
17
799
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_f870a655cae951de_ea763cb8", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 104 ]
[ null ]
[ 11 ]
[ 40 ]
2024-11-19T02:30:38.027949+00:00
1,693,584,711,000
f9b8e4521040d09c05b0449827928d6fc99b7c93
3
{ "blob_id": "f9b8e4521040d09c05b0449827928d6fc99b7c93", "branch_name": "refs/heads/master", "committer_date": 1693584711000, "content_id": "863bf6f2ea53d94ee496ded1f7c94caae94bb4c9", "detected_licenses": [ "Apache-2.0" ], "directory_id": "3afe7348e830a0c5139fb7cf393736e18b59ab4a", "extension": "py"...
2.6875
stackv2
# Copyright 2019 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, ...
333
31.71
80
22
2,438
python
[{"finding_id": "codeql_py/tarslip_1d3fea2321a36776_50a76f3f", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially untrusted source](2).\nThis file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially untrusted source](2)." ]
[ 302 ]
[ null ]
[ 7 ]
[ 18 ]
2024-11-19T02:30:39.277637+00:00
1,468,810,516,000
b928778e96678a7e8588af924e1aa936d4519a8c
2
{ "blob_id": "b928778e96678a7e8588af924e1aa936d4519a8c", "branch_name": "refs/heads/master", "committer_date": 1468810516000, "content_id": "71459d6bca261002f23f55eadfcf6c252cc03a9b", "detected_licenses": [ "MIT" ], "directory_id": "c98016f4de5a78ac53a4383ee4ef566ec8d29cb2", "extension": "py", "fi...
2.484375
stackv2
#coding:utf-8 import sys from django.http import HttpResponse from django.core.paginator import Paginator from models import Message,UserMessage import simplejson # Create your views here. def send_msg(request): response = {} info = "" try: if request.method == 'POST': req = request.PO...
106
31.74
92
16
747
python
[{"finding_id": "codeql_py/stack-trace-exposure_a412002232b61ee2_3bc9d4ca", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.\n[S...
2
true
[ "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.\n[Stack trace information](2) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.\n[Stack trace information](2) flo...
[ 31, 106 ]
[ null, null ]
[ 29, 25 ]
[ 33, 29 ]
2024-11-19T02:41:51.632462+00:00
1,506,244,945,000
75d7db0899dd93eee0a44d8f487ed858c8a3cd9a
2
{ "blob_id": "75d7db0899dd93eee0a44d8f487ed858c8a3cd9a", "branch_name": "refs/heads/master", "committer_date": 1506244945000, "content_id": "8ce1ab680ed7bc837c13c3d3cb5d1ab5d4882298", "detected_licenses": [ "MIT" ], "directory_id": "104cac88e86c904f68200684336dbd16e30c3813", "extension": "py", "fi...
2.328125
stackv2
import json from flask import Flask, request, abort, Response, make_response, jsonify, render_template from es_helper import es_search, es_clause_count from datetime import datetime from urllib3.exceptions import ReadTimeoutError from elasticsearch import TransportError from flask_moment import Moment MAX_PAGING_DEPTH...
145
32.03
92
17
1,164
python
[{"finding_id": "codeql_py/flask-debug_8f6b9a61a4eaa31c_f330442f", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
4
true
[ "CWE-215", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/flask-debug", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "HIGH", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 145, 103, 109, 115 ]
[ null, null, null, null ]
[ 5, 26, 26, 26 ]
[ 42, 29, 29, 29 ]
2024-11-19T02:41:52.910043+00:00
1,600,061,209,000
db1d3b04132cd422928b0af4be71ea30518d420d
3
{ "blob_id": "db1d3b04132cd422928b0af4be71ea30518d420d", "branch_name": "refs/heads/master", "committer_date": 1600061209000, "content_id": "1b0a7aff6de7aa8dfe9683b930c51dde2fdc8b1a", "detected_licenses": [ "MIT" ], "directory_id": "f2bb082e3d84558f91e1e7dcc1b85d80686cab52", "extension": "py", "fi...
2.546875
stackv2
""" This script downloads all c3d encodings computed on cineca. """ import paramiko import os import argparse from tqdm import tqdm if __name__ == '__main__': # parse arguments parser = argparse.ArgumentParser() parser.add_argument("--host") parser.add_argument("--user") parser.add_argument("--...
64
30.23
109
17
461
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_98148b0fcfef3946_435f6278", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/paramiko-missing-host-key-validation", "py/paramiko-missing-host-key-validation" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe.", "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 28, 57 ]
[ null, null ]
[ 5, 13 ]
[ 62, 70 ]
2024-11-19T02:42:20.522693+00:00
1,636,666,556,000
da9848d5ff69199a2403e1c859ef5e3ab1f67ada
2
{ "blob_id": "da9848d5ff69199a2403e1c859ef5e3ab1f67ada", "branch_name": "refs/heads/master", "committer_date": 1636666556000, "content_id": "aa8a8da40d3bb49c33548673e678bdff7db191fc", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "ae5150d07b19fc5c6ef2ea1d3f4fcd967ff7174f", "extension": "p...
2.3125
stackv2
#!/usr/bin/python -u import os import sys import json import yaml import pickle import tarfile import argparse from httplib2 import Http from urllib import urlencode URL = '' AUTH = '' VERB = False BATCH = 50 * 1024 def apiPost(fullurl, pdata): if VERB and ('data' in pdata): print "table: %s, version...
158
32.34
163
19
1,319
python
[{"finding_id": "codeql_py/tarslip_72159a4d469b1883_75bf6bc9", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 141 ]
[ null ]
[ 9 ]
[ 12 ]
2024-11-18T19:31:08.737041+00:00
1,599,961,780,000
a0ff6f62454c922fe2d21501a35dbf1f062284d9
2
{ "blob_id": "a0ff6f62454c922fe2d21501a35dbf1f062284d9", "branch_name": "refs/heads/master", "committer_date": 1599961780000, "content_id": "d186196d65950714eaf373050ac582f7386d79d1", "detected_licenses": [ "MIT" ], "directory_id": "0d1a9f1768d6b514e183b2829be2ff6bfe2f440b", "extension": "py", "fi...
2.5
stackv2
import pathlib import pkgutil import typing from contextlib import contextmanager import click from jinja2 import Template from . import formatutils as fmt class Templates: def __init__(self, context: dict): self.context = context @staticmethod def _get(name: str) -> Template: path = st...
92
29.08
76
19
606
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_305a6fda21d4222a_fa0e95a5", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 22 ]
[ null ]
[ 16 ]
[ 49 ]
2024-11-18T19:11:51.944224+00:00
1,453,147,829,000
f18c7aae19a408e38a677e7691222f5932112213
3
{ "blob_id": "f18c7aae19a408e38a677e7691222f5932112213", "branch_name": "refs/heads/master", "committer_date": 1453147855000, "content_id": "f611e5c4a7ff301b6d7958844f2836e283380813", "detected_licenses": [ "MIT" ], "directory_id": "464f619021039030b457f1f9ed706f37c036a0c6", "extension": "py", "fi...
2.828125
stackv2
'''DEPRECATED''' from entities import Team, Player from util.custom_errors import RegistrationError from google.appengine.ext import ndb import re ROLES = set(["sniper", "demo", "medic"]) def register_team(teamname): ''' Store in datastore.''' teamname_p = re.sub(r'[^a-zA-z\s]', '', teamname) team = Te...
78
30.94
78
18
547
python
[{"finding_id": "codeql_py/overly-large-range_eeaa16f51cf2349f_0be1d836", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 14, 24 ]
[ null, null ]
[ 32, 28 ]
[ 35, 31 ]
2024-11-18T19:23:48.325658+00:00
1,693,217,241,000
f04bfdb81a44060d97b9b5cddf5c75b6e1303e83
3
{ "blob_id": "f04bfdb81a44060d97b9b5cddf5c75b6e1303e83", "branch_name": "refs/heads/master", "committer_date": 1693217241000, "content_id": "aec4503fe1619b94729071631a2a826b35887820", "detected_licenses": [ "Apache-2.0" ], "directory_id": "a7c591e5ec540eeefa51517db060449401bf373f", "extension": "py"...
2.546875
stackv2
import os import sys import fnmatch import jinja2 import markdown import importlib import requests import json if (len(sys.argv)!=2): print ('Please provide required arg <file path of realease note md file>') sys.exit() importlib.reload(sys) #sys.setdefaultencoding('utf8') //for pyhton 2.. TEMPLATE = """<div ...
40
28.2
82
13
272
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_3bcbd30d093505b1_05514ade", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 32 ]
[ null ]
[ 15 ]
[ 40 ]
2024-11-18T19:23:48.523557+00:00
1,584,607,225,000
965b3cf75d1f743ff76195c557b12d34b6a17417
2
{ "blob_id": "965b3cf75d1f743ff76195c557b12d34b6a17417", "branch_name": "refs/heads/master", "committer_date": 1584607225000, "content_id": "eb4893eeedf64489d0a659c8f65b016e9a61237e", "detected_licenses": [ "MIT" ], "directory_id": "5ef6ab4c6363681409f0a6173ed8280796a073ef", "extension": "py", "fi...
2.40625
stackv2
from werkzeug.security import check_password_hash from flask_jwt_extended import jwt_required, get_raw_jwt, create_access_token, get_jwt_identity from flask_restplus import Resource, Namespace, fields from flask import request, jsonify from datetime import datetime import re from . import blacklist from application.m...
134
33.72
95
17
1,004
python
[{"finding_id": "codeql_py/polynomial-redos_000f6a938fc66441_3ee40586", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings startin...
1
true
[ "CWE-1333" ]
[ "py/polynomial-redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings starting with '+@0.' and with many repetitions of '.'." ]
[ 19 ]
[ null ]
[ 81 ]
[ 86 ]
2024-11-18T19:23:58.430804+00:00
1,574,616,798,000
05f45f76fa42a5a8d0ac6b3fe11b64122173ffaf
3
{ "blob_id": "05f45f76fa42a5a8d0ac6b3fe11b64122173ffaf", "branch_name": "refs/heads/master", "committer_date": 1574616798000, "content_id": "45b4c83b1b33aff4e2b6a99f0ac559a9e522689e", "detected_licenses": [ "MIT" ], "directory_id": "982b7b9727f2c138f21eb3ee13b49912482180d4", "extension": "py", "fi...
2.671875
stackv2
#!/usr/bin/env python3 """Python multi-threaded webserver.""" import argparse import os import re import socket import sys import threading # ------------------------------------------------------------------------------------------------- # HELPER FUNCTIONS # --------------------------------------------------------...
371
28.82
99
16
2,367
python
[{"finding_id": "codeql_py/redos_55874592afc14ffe_1ba36e80", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'GET ' and containing many repetit...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with 'GET ' and containing many repetitions of 'a'." ]
[ 115 ]
[ null ]
[ 62 ]
[ 64 ]
2024-11-18T18:39:26.270304+00:00
1,483,834,304,000
bc1f98a2ebfc65a6c325b8857cf9b3bfc95c7356
3
{ "blob_id": "bc1f98a2ebfc65a6c325b8857cf9b3bfc95c7356", "branch_name": "refs/heads/master", "committer_date": 1483834304000, "content_id": "57b2c4e05a3eafda9da5ac3b4ec797f6e83ea707", "detected_licenses": [ "Apache-2.0" ], "directory_id": "2447404dca38eea2b073b0e540b2a7b8bd3aeb5d", "extension": "py"...
2.890625
stackv2
"""views.py creates routes and handles all logic based on user input. It uses variables generated by forms.py and models.py and renders them to Jinja2 templates stored in the templates folder. """ from flask import render_template, url_for, request, redirect, flash, abort import utils from nimble import app from fo...
442
38.87
86
21
3,639
python
[{"finding_id": "codeql_py/url-redirection_9cfb7e6050012ee5_889ac67a", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 64 ]
[ null ]
[ 24 ]
[ 68 ]
2024-11-18T18:39:28.675667+00:00
1,634,547,993,000
e1fc957a56ae2be7ea924c5b7b62a42f0e8d4ab6
2
{ "blob_id": "e1fc957a56ae2be7ea924c5b7b62a42f0e8d4ab6", "branch_name": "refs/heads/master", "committer_date": 1634547993000, "content_id": "1647c1d1ea434d2c2b0fb4da5ab65c2ea1d9c74d", "detected_licenses": [ "Apache-2.0" ], "directory_id": "815039439ce27ca788367c7d4e9b3891d4f0975d", "extension": "py"...
2.4375
stackv2
# -*- coding: utf-8 -*- from flask import Flask, request from predict import answer import logging from logging.handlers import RotatingFileHandler import os if not os.path.exists('logs'): os.mkdir('logs') logger = logging.getLogger('app') logger.setLevel(logging.DEBUG) handler = RotatingFileHandler('./logs/' + 'a...
33
25.58
79
10
227
python
[{"finding_id": "codeql_py/log-injection_34da0c5c78ae463a_561d382a", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 27 ]
[ null ]
[ 17 ]
[ 32 ]
2024-11-18T18:39:38.611150+00:00
1,353,069,273,000
688191fb62efa7ceeffc6b7fb5bb38fbd71789d6
3
{ "blob_id": "688191fb62efa7ceeffc6b7fb5bb38fbd71789d6", "branch_name": "refs/heads/master", "committer_date": 1353069273000, "content_id": "3abfec7fbe0984a95c34b52ddab16816cf1dd003", "detected_licenses": [ "MIT" ], "directory_id": "f15511254f0a0ce0be55909a271941d241cd9666", "extension": "py", "fi...
2.734375
stackv2
from collections import namedtuple import datetime import hashlib import random import string from p1tr.plugin import * from p1tr.helpers import * from p1tr.logwrap import * def User(rank, registered_at, authenticated_at, password_hash): """Generates a user data structure.""" return {'rank': rank, 'registered_...
304
40.04
80
17
2,718
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_d88a11524d07041c_28928212", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally e...
[ 22 ]
[ null ]
[ 14 ]
[ 38 ]
2024-11-18T18:39:54.383951+00:00
1,687,418,059,000
772a6d182770fb0dc7297dcecb4e143c7a0c7f51
4
{ "blob_id": "772a6d182770fb0dc7297dcecb4e143c7a0c7f51", "branch_name": "refs/heads/master", "committer_date": 1687418059000, "content_id": "fdb574e819364afd5eb23970521ced7ed2514b2f", "detected_licenses": [ "MIT" ], "directory_id": "d6d0556076692e8581900c928c899242d753d1dc", "extension": "py", "fi...
3.546875
stackv2
import nltk import sklearn from nltk import word_tokenize as wt # --------- optional start ------------ # f = open('NEWS.txt', encoding='utf-8') raw = f.read() # WORD TOKENIZER tokens = wt(raw) # CREATE NLTK TEXT txt = nltk.Text(tokens) # ----------optional end -------------- # # CLASSIFIER from nltk.corpus import...
90
24.18
87
11
551
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_90e913f3a7f70552_53578674", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
4
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 50, 51, 81, 82 ]
[ null, null, null, null ]
[ 7, 7, 7, 7 ]
[ 33, 28, 34, 29 ]
2024-11-18T18:40:04.436775+00:00
1,506,275,355,000
d4ad9ff82cdb7524ce2710eb187a083df2d38f34
3
{ "blob_id": "d4ad9ff82cdb7524ce2710eb187a083df2d38f34", "branch_name": "refs/heads/master", "committer_date": 1506275355000, "content_id": "4f679277085dfefe61de8eef09dd214497cc1e03", "detected_licenses": [ "MIT" ], "directory_id": "3c207d0934b58d901a764e1babf9db20e064c89c", "extension": "py", "fi...
2.828125
stackv2
# -*- coding: utf-8 -*- import os import click from slugify import slugify from jinja2 import Environment from jinja2 import FileSystemLoader from pkg_resources import resource_filename from sqlalchemy import create_engine import logging logger = logging.getLogger('__name__') def to_dict(engine): ''' Conve...
84
25.39
78
17
486
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_aa85c781fb42fdbc_2d53b364", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 62 ]
[ null ]
[ 11 ]
[ 79 ]
2024-11-18T18:40:05.976021+00:00
1,629,062,026,000
cb49b56232b5599f83fd11edee3f486d12f20061
3
{ "blob_id": "cb49b56232b5599f83fd11edee3f486d12f20061", "branch_name": "refs/heads/master", "committer_date": 1629062026000, "content_id": "0041c1988cd3380bd8038c0a8670ea91fa4d6e1f", "detected_licenses": [ "MIT" ], "directory_id": "56018f0c66e44116c96ecdb900e30206a736c866", "extension": "py", "fi...
3.1875
stackv2
import sys import pandas as pd import numpy as np import re import pickle import nltk from nltk.tokenize import word_tokenize, sent_tokenize from nltk.corpus import stopwords from nltk.stem.wordnet import WordNetLemmatizer from sqlalchemy import create_engine from nltk.tokenize import word_tokenize from nltk.stem imp...
158
31.2
110
14
1,174
python
[{"finding_id": "codeql_py/overly-large-range_b455707e9487a60d_c100440e", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 55 ]
[ null ]
[ 48 ]
[ 51 ]
2024-11-18T20:58:17.561373+00:00
1,588,081,448,000
b71c89761e977826a728d1de2b40cd45ca1f3346
2
{ "blob_id": "b71c89761e977826a728d1de2b40cd45ca1f3346", "branch_name": "refs/heads/master", "committer_date": 1588081448000, "content_id": "8ac35e87f9b078f9cf6419b8621061648b5c4b7e", "detected_licenses": [ "MIT" ], "directory_id": "329c9d685a9bf1520a5360e102d88b1698477cb9", "extension": "py", "fi...
2.40625
stackv2
module_array = [ ] from os import system, name try: import re except ImportError: module_array.append("request") pass try: import requests except ImportError: module_array.append("request") pass try: import lxml.etree as ET except ImportError: module_array.append("lxml") pass try: ...
285
28.1
114
17
1,904
python
[{"finding_id": "codeql_py/request-without-cert-validation_07a594769272f672_e687f87c", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
3
true
[ "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 92, 127, 273 ]
[ null, null, null ]
[ 9, 9, 13 ]
[ 55, 57, 76 ]
2024-11-18T20:15:44.554924+00:00
1,555,434,841,000
f1376097321e3ea3f5ac76f359decba7c66237df
2
{ "blob_id": "f1376097321e3ea3f5ac76f359decba7c66237df", "branch_name": "refs/heads/master", "committer_date": 1555434841000, "content_id": "c04f2d2e82d6e40317660126959bd34b607d589b", "detected_licenses": [ "MIT" ], "directory_id": "b0a0ba58d8bd93123dce091150220015a9d35125", "extension": "py", "fi...
2.34375
stackv2
import logging import json from constants import SETTINGS from urllib.parse import urlparse from uuid import uuid4 from tornado import ioloop, gen from tornado.websocket import WebSocketHandler class WSHandler(WebSocketHandler): LOGGER = logging.getLogger(__qualname__) WHITELISTED_DOMAINS = SETTINGS['WHITELI...
58
34.07
90
14
420
python
[{"finding_id": "codeql_py/log-injection_35277a3b82e6e07f_7196ba34", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 33 ]
[ null ]
[ 13 ]
[ 84 ]
2024-11-18T20:15:46.431309+00:00
1,690,910,843,000
fc9900fd6fe2ad62b2fd4f9ae4c3381efa684288
3
{ "blob_id": "fc9900fd6fe2ad62b2fd4f9ae4c3381efa684288", "branch_name": "refs/heads/main", "committer_date": 1690910846000, "content_id": "c25b8b958486f4aa57a6f18a6da0966371b83a27", "detected_licenses": [ "MIT" ], "directory_id": "7fc0d5e751ff4f67eeeea1febc11e4847257f6d7", "extension": "py", "file...
3.03125
stackv2
""" This example creates a new user and prints her API key. It is also used to initialize a Galaxy server in Continuous Integration testing of BioBlend. Usage: python3 create_user_get_api_key.py <Galaxy_URL> <Galaxy_API_key> <new_username> <new_user_email> <new_password> """ import sys import bioblend.galaxy if len...
26
31.85
128
8
236
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3ac1a70ec67fa3c4_c92b25d8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 26 ]
[ null ]
[ 7 ]
[ 18 ]
2024-11-18T20:15:58.437186+00:00
1,489,279,740,000
89dc65a12fa431de8458a47e0df44e2c789c04ce
3
{ "blob_id": "89dc65a12fa431de8458a47e0df44e2c789c04ce", "branch_name": "refs/heads/master", "committer_date": 1489279740000, "content_id": "252d10c1d19c35ac4cc1bc11d25d29a363bd3e22", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "a3fe5fcc3f2ea593e24570669028a1d7a0dcf05b", "extension": "p...
2.796875
stackv2
# Copyright (C) 2016 Benoit Myard <myardbenoit@gmail.com> # Released under the terms of the BSD license. import six from base64 import urlsafe_b64encode from hashlib import md5, pbkdf2_hmac from cryptography.fernet import Fernet, InvalidToken def fernet_encrypt(message, password): if isinstance(password, six.te...
66
24.29
59
11
398
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_f0931657593447c7_62224747", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi...
[ 15, 30 ]
[ null, null ]
[ 20, 20 ]
[ 28, 28 ]
2024-11-18T20:16:01.783296+00:00
1,635,105,954,000
b6d5123d8f8bff08c5031fcaa4ac03be8445a370
2
{ "blob_id": "b6d5123d8f8bff08c5031fcaa4ac03be8445a370", "branch_name": "refs/heads/main", "committer_date": 1635105954000, "content_id": "33fe2a3c88f836f501801fb924f87d39a4c66a81", "detected_licenses": [ "MIT" ], "directory_id": "54ce6741366568437a13e7940a2a7b701b0d16d5", "extension": "py", "file...
2.40625
stackv2
import json from flask import Flask, render_template, redirect, request, flash from flask_bootstrap import Bootstrap from flask_moment import Moment from datetime import datetime import os import logging import requests UPLOAD_FOLDER = './uploaded' OCR_ADDRESS = r'http://ocr:80/process_image/' NER_ADDRESS = r'http:/...
81
31.49
87
14
625
python
[{"finding_id": "codeql_py/flask-debug_be75c07a289729f3_31ba7fee", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
5
true
[ "CWE-215", "CWE-601", "CWE-601", "CWE-022", "CWE-918" ]
[ "py/flask-debug", "py/url-redirection", "py/url-redirection", "py/path-injection", "py/partial-ssrf" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "...
[ 81, 51, 56, 60, 62 ]
[ null, null, null, null, null ]
[ 5, 29, 29, 19, 15 ]
[ 51, 40, 40, 28, 51 ]
2024-11-18T19:38:21.296307+00:00
1,555,894,781,000
74b3266c203580458e38ffd744141243a38d9b90
2
{ "blob_id": "74b3266c203580458e38ffd744141243a38d9b90", "branch_name": "refs/heads/master", "committer_date": 1555894781000, "content_id": "672c712ad626e647d08d67b11c859feb93ca8c4f", "detected_licenses": [ "MIT" ], "directory_id": "f09d1b8caa5d97bdcba22ba48bcf31852f79c960", "extension": "py", "fi...
2.375
stackv2
"""AWS view module.""" import nexmo import json import urllib import logging import validatesns from flask import Blueprint, request, abort from flask import current_app as app from notifyme.responses import success_response, error_response aws_blueprint = Blueprint('aws', __name__) @aws_blueprint.route('/alert', me...
44
27.11
89
17
284
python
[{"finding_id": "codeql_py/full-ssrf_be7939b40c756a39_eed2b346", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
1
true
[ "CWE-918" ]
[ "py/full-ssrf" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1)." ]
[ 36 ]
[ null ]
[ 9 ]
[ 53 ]
2024-11-18T20:10:37.917030+00:00
1,318,036,100,000
ea781b228e09c9e29d16fc9fe27bf42f91ae6ab4
2
{ "blob_id": "ea781b228e09c9e29d16fc9fe27bf42f91ae6ab4", "branch_name": "refs/heads/master", "committer_date": 1318036100000, "content_id": "c7c4c77faf06352325a6a9a3a985770eba3d69fe", "detected_licenses": [ "MIT" ], "directory_id": "f50ec6e53ad20d72d565e6b6fbb8ff1daadb4f69", "extension": "py", "fi...
2.484375
stackv2
import os import glob import re import json import multiprocessing import threading import Queue from BaseHTTPServer import BaseHTTPRequestHandler, HTTPServer import cgi class JSRPC(HTTPServer, threading.Thread): def __init__(self, **kargs): self.include_path = os.path.dirname(os.path.realpath(__file__)) self.j...
197
27.17
74
22
1,470
python
[{"finding_id": "codeql_py/path-injection_3e6143c71ffacbf3_d1ae5364", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2)." ]
[ 67, 114 ]
[ null, null ]
[ 13, 13 ]
[ 61, 22 ]
2024-11-18T20:10:51.240105+00:00
1,683,486,871,000
2bfd2cc315f1562e614a5e5d75d057c2e0c61159
3
{ "blob_id": "2bfd2cc315f1562e614a5e5d75d057c2e0c61159", "branch_name": "refs/heads/master", "committer_date": 1690286346000, "content_id": "af015ca99c7111c02e0fea6f747fcd758840c33c", "detected_licenses": [ "MIT" ], "directory_id": "126884e6916e9d78201527419681c0369bc61e9a", "extension": "py", "fi...
2.59375
stackv2
import string import random import webbrowser import requests import os import dotenv dotenv.load_dotenv() try: API_KEY = os.getenv('API_KEY') random = ''.join(random.choice(string.ascii_uppercase + string.digits) for _ in range(3)) urlData = "https://www.googleapis.com/youtube/v3/search?key={}&maxResults...
20
31.25
132
15
160
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ac014cc589b6a8e2_a2fc72b2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 20 ]
[ null ]
[ 11 ]
[ 38 ]
2024-11-18T20:11:04.455908+00:00
1,577,158,396,000
3a84bca5471ee3b89f2a401b4846b9321bf95cca
3
{ "blob_id": "3a84bca5471ee3b89f2a401b4846b9321bf95cca", "branch_name": "refs/heads/master", "committer_date": 1577158396000, "content_id": "b4128573022c5cd02a5e9932f9f5b37e68531562", "detected_licenses": [ "MIT" ], "directory_id": "dccb879bb10cc8da4208c3b61d7958778c536af8", "extension": "py", "fi...
3.4375
stackv2
import numpy as np import sys day4_in = np.loadtxt('day4_input.txt', dtype=int, delimiter='-') PART_ONE = False def has_adjacent_digits(password): password = str(password) for i in range(len(str(password))-1): if (password[i] == password[i+1]): if PART_ONE: return True ...
45
27.64
73
12
314
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bf27fc487b71228a_d45b252c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 45 ]
[ null ]
[ 7 ]
[ 44 ]
2024-11-18T20:11:08.229622+00:00
1,428,165,824,000
85ab682b8d65492f5ae5f0e242f14005558c9506
2
{ "blob_id": "85ab682b8d65492f5ae5f0e242f14005558c9506", "branch_name": "refs/heads/master", "committer_date": 1428165824000, "content_id": "a5c0f01ce0e26ee0b3485175d13f2ae4f1940c45", "detected_licenses": [ "MIT" ], "directory_id": "753dd555183067c092ca602a95f8b91039955115", "extension": "py", "fi...
2.34375
stackv2
# -*- coding: utf8 -*- import utils import settings import importlib import tornado.web import json from models import Song class JsonResponse(tornado.web.RequestHandler): """ Request handler where requests and responses speak JSON. From: https://gist.github.com/mminer/5464753 """ def pr...
116
25.97
83
17
627
python
[{"finding_id": "codeql_py/path-injection_a9e438c83dc610a3_61c089a1", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 108 ]
[ null ]
[ 19 ]
[ 28 ]
2024-11-18T20:26:05.278138+00:00
1,397,092,657,000
c521291764a6bd8d1fd3319a295038a49b51dce0
3
{ "blob_id": "c521291764a6bd8d1fd3319a295038a49b51dce0", "branch_name": "refs/heads/master", "committer_date": 1397092657000, "content_id": "661ae2ea0cc0fd0e9ef98aefcb41ae69e131bf2e", "detected_licenses": [ "MIT" ], "directory_id": "bab9840785859769b3895031b6830965b52e97a4", "extension": "py", "fi...
3.109375
stackv2
#!/usr/bin/env python # -*- coding: UTF-8 -*- # # main.py # v1.0.2 # DATABASE = 'sample.db' import sqlite3 import string import random from flask import Flask, render_template, request app = Flask(__name__) class Word(): def __init__(self, text, key=None, node_list=None): self.text = text if not...
166
30.06
79
19
1,137
python
[{"finding_id": "codeql_py/flask-debug_f650d88251cc332d_2341823f", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
5
true
[ "CWE-215", "CWE-089", "CWE-089", "CWE-089", "CWE-089" ]
[ "py/flask-debug", "py/sql-injection", "py/sql-injection", "py/sql-injection", "py/sql-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This SQL query depends on a [user-provided value](1).", "This SQL query depends on a [user-provided value](1).", "This SQL query depends on a [user-provided value](1).", "This SQL query de...
[ 166, 67, 85, 124, 149 ]
[ null, null, null, null, null ]
[ 5, 25, 21, 33, 33 ]
[ 24, 30, 26, 38, 38 ]
2024-11-18T20:26:49.156879+00:00
1,517,455,179,000
3d5c2896d7476afd196cf6ec35cdf06f942946d6
2
{ "blob_id": "3d5c2896d7476afd196cf6ec35cdf06f942946d6", "branch_name": "refs/heads/master", "committer_date": 1517455179000, "content_id": "5f56d55dc23e623bc17da2fff8793b2a141b1820", "detected_licenses": [ "Apache-2.0" ], "directory_id": "888d308bfaf8398fff082f1aaf88fd1395b75531", "extension": "py"...
2.453125
stackv2
# Copyright 2016 Mathew Odden # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing,...
298
27.01
76
16
1,937
python
[{"finding_id": "codeql_py/insecure-protocol_2979ca2b23e5b6a4_4085c214", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/insecure-protocol", "py/insecure-default-protocol" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.create_default_context](1).", "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used."...
[ 109, 115 ]
[ null, 117 ]
[ 27, 27 ]
[ 38, 35 ]
2024-11-18T20:52:10.289451+00:00
1,692,172,347,000
f606d1cfc2b81891f5a005893a0144c42747b867
3
{ "blob_id": "f606d1cfc2b81891f5a005893a0144c42747b867", "branch_name": "refs/heads/master", "committer_date": 1692172347000, "content_id": "ec8307347b4078a54905cfacf5766775163e57aa", "detected_licenses": [ "MIT" ], "directory_id": "34f6ccfad3791c03c6e4c55c56501eb8e5914ec6", "extension": "py", "fi...
2.6875
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- """ Command line script for downloading KM2 and KM10 Digital Elevation Model dataset via NLS ATOM feed. Usage: python nls-dem-downloader.py -h positional arguments: config_json config.json containing API key and predefined tiles for different areas...
203
35.22
124
18
1,688
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_283c167478bad931_2624895c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 50, 54 ]
[ null, null ]
[ 22, 26 ]
[ 76, 94 ]
2024-11-18T20:52:15.583864+00:00
1,507,363,986,000
38bbab6a9bd233b5a0de7e18317725ae7c32f7e9
2
{ "blob_id": "38bbab6a9bd233b5a0de7e18317725ae7c32f7e9", "branch_name": "refs/heads/master", "committer_date": 1507363986000, "content_id": "6331319ffb7301d87ab55f1e6ad6edd0af74c179", "detected_licenses": [ "MIT" ], "directory_id": "e5b1b19e643d8bc371268eef5e9f0012f1376723", "extension": "py", "fi...
2.328125
stackv2
import sys if sys.version_info[0] < 3: import got else: import got3 as got import train_database import database import time from spider import * from bson.objectid import ObjectId def main(): def printTweet(descr, t): print(descr) print("Username: %s" % t.username) print("Retweet...
120
34.27
114
20
1,113
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_151dd216602f8a0d_ae2223ff", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [twitter.com](1) may be at an arbitrary position in the...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [twitter.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 58 ]
[ null ]
[ 12 ]
[ 33 ]
2024-11-18T19:02:45.150112+00:00
1,559,946,406,000
752974eefb5a5f6619c14ce4090c3b1b4c889097
2
{ "blob_id": "752974eefb5a5f6619c14ce4090c3b1b4c889097", "branch_name": "refs/heads/master", "committer_date": 1559946406000, "content_id": "b7305aa4b11b0fb3d57101e54e3edf2bb85ef897", "detected_licenses": [ "Zlib" ], "directory_id": "8dcf04af459193e460131a0df457551e9d7056b5", "extension": "py", "f...
2.4375
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- import os from os.path import exists, isfile, join, dirname, abspath, relpath import re from zipfile import ZipFile from .elements import ElementError, Image from .webtools import * _textmation_dir = abspath(join(dirname(__file__), os.pardir)) _cache_dir = abspath(join(...
112
25.21
130
15
749
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_f07a04db2a8e8d4f_ba281aff", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [fonts.google.com](1) may be at an arbitrary position i...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [fonts.google.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 69 ]
[ null ]
[ 7 ]
[ 32 ]
2024-11-18T19:02:50.198702+00:00
1,631,086,493,000
f2a7c24eb633215561208a049b219822dbac6bdb
2
{ "blob_id": "f2a7c24eb633215561208a049b219822dbac6bdb", "branch_name": "refs/heads/master", "committer_date": 1631086493000, "content_id": "49f158c2980807727c0116f2bdbd66ecee1178dc", "detected_licenses": [ "CC0-1.0" ], "directory_id": "7338dee527cd5ba3e44af6e50a55cdc559243094", "extension": "py", ...
2.34375
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- import logging import os.path import sys import bz2file import re from gensim.corpora import WikiCorpus from xml.etree.cElementTree import iterparse import pysolr from tqdm import tqdm RE_P0 = re.compile('<!--.*?-->', re.DOTALL | re.UNICODE) # comments RE_P1 = re.compil...
217
40.46
124
20
2,340
python
[{"finding_id": "codeql_py/redos_e368a44f13884971_d22a1adf", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '\\n\\[\\[Image|' and containing m...
2
true
[ "CWE-1333", "CWE-1333" ]
[ "py/redos", "py/redos" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '\\n\\[\\[Image|' and containing many repetitions of '|'.", "This part of the regular expression may cause exponential backtracking on strings starting with '\\n\\[\\[File|' and containing many repetitions of '|'." ]
[ 21, 22 ]
[ null, null ]
[ 42, 41 ]
[ 45, 44 ]
2024-11-18T19:14:29.238300+00:00
1,517,314,995,000
b8b7a114489268c7e2388fbd005e01a4c7bcad57
2
{ "blob_id": "b8b7a114489268c7e2388fbd005e01a4c7bcad57", "branch_name": "refs/heads/master", "committer_date": 1517314995000, "content_id": "309f28445878b810c83eb454bff717438b6f34b6", "detected_licenses": [ "Apache-2.0" ], "directory_id": "4fb20e9b94db07659c07a0d712b0842fecd86dcc", "extension": "py"...
2.34375
stackv2
import sublime, sublime_plugin import requests from requests.auth import HTTPBasicAuth import os import base64 import json temp_dir = os.path.abspath(os.path.join(sublime.cache_path(),'Dataiku')) print("DataikuSublimeText -", "Temp directory:", temp_dir) settings = None def plugin_loaded(): global settings s...
228
34.99
173
20
1,900
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9bd9a9ebb2a04b52_8330612c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 143 ]
[ null ]
[ 55 ]
[ 65 ]
2024-11-18T19:14:53.059661+00:00
1,460,552,170,000
3b527e543777563fea9760183eb9aeca585d114e
4
{ "blob_id": "3b527e543777563fea9760183eb9aeca585d114e", "branch_name": "refs/heads/master", "committer_date": 1460552170000, "content_id": "5ed74a9fadbfea83dc58598b9ca58926f1b1bcfa", "detected_licenses": [ "MIT" ], "directory_id": "e2ee3d61126e331f5dc642b2a2344e0cd68d472c", "extension": "py", "fi...
3.53125
stackv2
""" Defines Matrix class for representation of molecular distance matrices. Part of raman package. Copyright Sean McGrath 2015. Issued under the MIT License. """ import re from math import sqrt from .util import is_numeric, flatten class DistanceMatrix: """ Represents a matrix of intermolecular distances t...
205
32.39
87
19
1,479
python
[{"finding_id": "codeql_py/redos_accd028cd9fd3cce_e408dc2e", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '9A9.' and containing many repetit...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '9A9.' and containing many repetitions of '999.'." ]
[ 24 ]
[ null ]
[ 57 ]
[ 60 ]
2024-11-18T19:27:39.425852+00:00
1,588,990,356,000
e760a482ac1a46ca3b6ce037e09a1f9e9fb6d323
3
{ "blob_id": "e760a482ac1a46ca3b6ce037e09a1f9e9fb6d323", "branch_name": "refs/heads/master", "committer_date": 1588990356000, "content_id": "b08d3018cba6c756186e9c909eb3ed7cecad8c67", "detected_licenses": [ "MIT" ], "directory_id": "63e43880bb1c27e819a14801a512ba2ca914397e", "extension": "py", "fi...
2.90625
stackv2
from flask import (Flask, render_template, request) import time import os.path import datetime import json THIS_FILE_PATH = os.path.dirname(os.path.realpath(__file__)) def create_app(): # create and configure the app app = Flask(__name__) # a simple page that says hello # listen for requests on route ...
84
33.76
95
20
679
python
[{"finding_id": "codeql_py/reflective-xss_6139d56a514f44d1_202d21a8", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
2
true
[ "CWE-079", "CWE-022" ]
[ "py/reflective-xss", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 61, 55 ]
[ null, null ]
[ 17, 22 ]
[ 56, 34 ]
2024-11-18T19:27:45.482278+00:00
1,599,844,988,000
6dfd5880e347a65bf46d16b804af77be951c6435
4
{ "blob_id": "6dfd5880e347a65bf46d16b804af77be951c6435", "branch_name": "refs/heads/master", "committer_date": 1599844988000, "content_id": "468e8a41cf7ba6dd62ae36763b576a152d807771", "detected_licenses": [ "Apache-2.0" ], "directory_id": "727717e739d19fb4006a21b5a4b6958057944f3a", "extension": "py"...
3.640625
stackv2
# Collaborators (including web sites where you got help: (enter none if you didn't need help) # none print("Hello welcome to madlibs! You ready?") input() print("Great lets get started!") adjective = input("type an adjective ") nationality = input("type a nationality ") person = input("type a person ") noun = input ("...
26
50.96
124
12
360
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f753ad51ec8b8c55_70b9c373", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 21 ]
[ null ]
[ 7 ]
[ 95 ]
2024-11-18T19:27:49.027348+00:00
1,388,979,058,000
3f42458a8166439b3902c76d3546c591ac14ec8a
3
{ "blob_id": "3f42458a8166439b3902c76d3546c591ac14ec8a", "branch_name": "refs/heads/master", "committer_date": 1388979058000, "content_id": "38973777975d4500ee4b52849bb1ae8aad84efb0", "detected_licenses": [ "MIT" ], "directory_id": "b9b6aedf4756f6c4e68f86a9451a139ddbdbc506", "extension": "py", "fi...
2.578125
stackv2
from app import app, db, lm from flask import render_template, flash, redirect, session, url_for, request, g from flask import jsonify from flask.ext.login import login_user, logout_user, current_user, login_required from models import User, ROLE_USER, ROLE_GUEST, Ingredient, Recipe, RI_Link from forms import Registrat...
189
38.52
84
18
1,552
python
[{"finding_id": "codeql_py/url-redirection_330c475b5f2536f2_9905099c", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 40 ]
[ null ]
[ 33 ]
[ 77 ]
2024-11-18T19:38:30.747966+00:00
1,612,302,409,000
5580d874a26b2315752eeb397e2958b1de20e10d
3
{ "blob_id": "5580d874a26b2315752eeb397e2958b1de20e10d", "branch_name": "refs/heads/main", "committer_date": 1612302409000, "content_id": "c4a52dcd1ed5fdeaa9cca9d2d7d229b8e9ae8abc", "detected_licenses": [ "MIT" ], "directory_id": "f4a5a69658566374bc456513d0efbd54df11099f", "extension": "py", "file...
2.625
stackv2
import requests import json import datetime # Suppress HTTPS warnings from urllib3.exceptions import InsecureRequestWarning requests.packages.urllib3.disable_warnings(category=InsecureRequestWarning) # the main function def restconf_config(username, password): # Print a stream of bytes as pretty JSON def prin...
47
36.98
102
13
426
python
[{"finding_id": "codeql_py/request-without-cert-validation_001be9063981b7ba_14f1763b", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 21 ]
[ null ]
[ 16 ]
[ 103 ]
2024-11-18T19:38:35.921793+00:00
1,499,482,455,000
a7c3bba38fa6919d73bb228c135d2c4785c01d96
3
{ "blob_id": "a7c3bba38fa6919d73bb228c135d2c4785c01d96", "branch_name": "refs/heads/master", "committer_date": 1499482455000, "content_id": "3e73a31a9daf1d3d78b75924390f2936f6f6cc5b", "detected_licenses": [ "MIT" ], "directory_id": "6cdd631bcd4bc448de09d47fe422a5a19c6e7613", "extension": "py", "fi...
3.125
stackv2
#!/usr/bin/env python """ Very simple HTTP server in python. Usage:: ./dummy-web-server.py [<port>] Send a GET request:: curl http://localhost Send a HEAD request:: curl -I http://localhost Send a POST request:: curl -d "foo=bar&bin=baz" http://localhost """ from BaseHTTPServer import BaseHTTPRequestHan...
60
31.13
70
17
495
python
[{"finding_id": "codeql_py/polynomial-redos_bf49cccaf1792cf1_949112b8", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings startin...
2
true
[ "CWE-1333", "CWE-022" ]
[ "py/polynomial-redos", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings starting with 'program=\\[{{' and with many repetitions of 'program=\\[{{'.", "This path depends on a [user-provided value](1)." ]
[ 49, 54 ]
[ null, null ]
[ 40, 27 ]
[ 49, 35 ]
2024-11-18T19:38:48.513669+00:00
1,621,352,491,000
002a7beff10e0f43a172e83e3a1ad30773d8828f
3
{ "blob_id": "002a7beff10e0f43a172e83e3a1ad30773d8828f", "branch_name": "refs/heads/main", "committer_date": 1621352491000, "content_id": "26a719e7c6a5c2cfd9fde74ab79f7cb392c28ffd", "detected_licenses": [ "MIT" ], "directory_id": "56ba14e240574dd123cad8e831273db5b7bcbc6b", "extension": "py", "file...
2.703125
stackv2
import psycopg2 import os from psycopg2.extensions import ISOLATION_LEVEL_AUTOCOMMIT from sqlalchemy import Column, Integer, String, ForeignKey from sqlalchemy import create_engine from sqlalchemy.orm import sessionmaker, relationship from sqlalchemy.ext.declarative import declarative_base password = os.environ.get('...
69
27.04
88
11
397
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e837bd2eb2842015_700b7765", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 11 ]
[ null ]
[ 7 ]
[ 15 ]
2024-11-18T19:38:50.989619+00:00
1,584,228,929,000
b56d16fb9e432ba495edbdcd59664f7a71a01da9
2
{ "blob_id": "b56d16fb9e432ba495edbdcd59664f7a71a01da9", "branch_name": "refs/heads/master", "committer_date": 1584228929000, "content_id": "d68034854a5f666a3393b3759b671d10cf2c8b5d", "detected_licenses": [ "MIT" ], "directory_id": "ddc65218806461184d5c990567bc9a80feef220e", "extension": "py", "fi...
2.484375
stackv2
from os import environ import logging from flask import Flask, jsonify, request from flask_cors import CORS from daos import dog_dao from services import dog_service app = Flask(__name__) CORS(app) log = logging.getLogger() log.setLevel(logging.INFO) @app.route('/') def hello_world(): dogs = dog_dao.hello_wor...
62
25.1
100
13
388
python
[{"finding_id": "codeql_py/log-injection_0c07919d2df81fda_c351d310", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
2
true
[ "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 35, 48 ]
[ null, null ]
[ 18, 18 ]
[ 59, 59 ]
2024-11-18T19:38:51.806706+00:00
1,438,128,176,000
117fb68ad58b9715b373ff4e157a173bd1c99b6d
3
{ "blob_id": "117fb68ad58b9715b373ff4e157a173bd1c99b6d", "branch_name": "refs/heads/master", "committer_date": 1438128176000, "content_id": "f5f66168774f2ddcfdc600414a13e21d0b9bbb5b", "detected_licenses": [ "MIT" ], "directory_id": "f1f6a7434a150e6d5f9a68cb378d1cbb9af9331e", "extension": "py", "fi...
2.84375
stackv2
import requests import json from requests.auth import HTTPDigestAuth class SwitchVox: user = "" password = "" server = "" headers = {'Content-Type': 'application/json', 'Accept': 'text/plain'} def __init__(self, user, password, server): self.user = user self.password = password ...
61
34.48
81
14
400
python
[{"finding_id": "codeql_py/request-without-cert-validation_eab05ecae5084a51_9d0ff464", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 35, 55 ]
[ 39, 59 ]
[ 13, 13 ]
[ 40, 40 ]
2024-11-18T20:06:11.622543+00:00
1,411,253,222,000
8e120e9f74177ae96e919afa730870e76aa27ae7
2
{ "blob_id": "8e120e9f74177ae96e919afa730870e76aa27ae7", "branch_name": "refs/heads/master", "committer_date": 1411253222000, "content_id": "fa108177855a04ac98e4d6a83a5c9952d5f31eb0", "detected_licenses": [ "MIT" ], "directory_id": "fb8e88056dfd8da3b7cabac691c8ffb9e81e1efa", "extension": "py", "fi...
2.4375
stackv2
from flask import render_template, url_for, redirect, g, request, flash, jsonify from flask.ext.login import login_user, logout_user, current_user, login_required from hackathon_project import app, db, lm from forms import LoginForm, SignupForm from models import User import os #################Message Handling Functi...
107
27.76
81
17
703
python
[{"finding_id": "codeql_py/url-redirection_f303fe38fa46a303_27036560", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
2
true
[ "CWE-601", "CWE-022" ]
[ "py/url-redirection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 66, 40 ]
[ null, null ]
[ 20, 13 ]
[ 62, 46 ]
2024-11-18T20:06:26.955703+00:00
1,676,139,610,000
37b6c14d81fdbd225d5d9a6c5e85d7b80daab89a
3
{ "blob_id": "37b6c14d81fdbd225d5d9a6c5e85d7b80daab89a", "branch_name": "refs/heads/master", "committer_date": 1676139610000, "content_id": "ea2dbdada0cb1c2fe9d3bb98402830be0b7d8c60", "detected_licenses": [ "MIT" ], "directory_id": "255e19ddc1bcde0d3d4fe70e01cec9bb724979c9", "extension": "py", "fi...
2.9375
stackv2
#!/usr/bin/env python """ Usage: check_ssl_certificate.py -H <host> -p <port> [-m <method>] [-c <days>] [-w <days>] -h show the help -H <HOST> host/ip to check -p <port> port number -m <method> (SSLv2|SSLv3|SSLv23|TLSv1) defaults to SSLv23 -c <days> day threshold for critical ...
157
24.06
97
13
1,114
python
[{"finding_id": "codeql_py/insecure-protocol_c40de84de8805184_2c20839c", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version SSLv3 specified by [call to SSL.Context](1).", "remediation": "", "locat...
4
true
[ "CWE-327", "CWE-327", "CWE-327", "CWE-327" ]
[ "py/insecure-protocol", "py/insecure-protocol", "py/insecure-protocol", "py/insecure-protocol" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Insecure SSL/TLS protocol version SSLv3 specified by [call to SSL.Context](1).", "Insecure SSL/TLS protocol version SSLv2 specified by [call to SSL.Context](1).", "Insecure SSL/TLS protocol version TLSv1 specified by [call to SSL.Context](1).", "Insecure SSL/TLS protocol version SSLv3 allowed by [call to SSL...
[ 89, 91, 95, 98 ]
[ null, null, null, null ]
[ 11, 11, 11, 25 ]
[ 40, 40, 40, 28 ]
2024-11-18T20:18:17.782672+00:00
1,515,000,775,000
8e331cafc15c9e7bf6220dc40fdc3ef0677a33f1
2
{ "blob_id": "8e331cafc15c9e7bf6220dc40fdc3ef0677a33f1", "branch_name": "refs/heads/master", "committer_date": 1515000775000, "content_id": "c9f2999831430a5c08f768dce8f5fd6b66d67b44", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e09a470f727476040523cb65de2d628719a8facc", "extension": "py"...
2.453125
stackv2
"""A simple counter with App Engine pull queue.""" import logging import os import time import jinja2 import webapp2 from google.appengine.api import taskqueue from google.appengine.ext import ndb from google.appengine.runtime import apiproxy_errors JINJA_ENV = jinja2.Environment( loader=jinja2.FileSystemLoade...
69
28.16
73
18
419
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_f92ade6e9721b6a6_079182b4", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 15 ]
[ 16 ]
[ 13 ]
[ 63 ]
2024-11-18T20:18:18.337703+00:00
1,605,746,625,000
e7a70d8a30b8bddf42e3fc233c52e4e6808fb65f
4
{ "blob_id": "e7a70d8a30b8bddf42e3fc233c52e4e6808fb65f", "branch_name": "refs/heads/master", "committer_date": 1605746625000, "content_id": "944add48e6f48921f8e14dcacefb28decf11d463", "detected_licenses": [ "Apache-2.0" ], "directory_id": "cf17d6dc11a5eb90240033e1aff6212f67bfc596", "extension": "py"...
4.09375
stackv2
option = input("(C)reate: or (L)ogin: ") if option.upper() == "C": email = input("Email: ") print(f"This is your email, {email}") print("Email verified") username = input("Username: ") if (len(username)) < 5: print("The username must be at least 5 characters long, try again later.") else...
26
38.58
82
12
250
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5d9b3e68eeb1c20d_99fedbca", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 15 ]
[ null ]
[ 15 ]
[ 51 ]
2024-11-18T20:31:10.193475+00:00
1,537,909,114,000
828dba30c9310f2c4b8b68c960a8dadf9bc1af56
3
{ "blob_id": "828dba30c9310f2c4b8b68c960a8dadf9bc1af56", "branch_name": "refs/heads/master", "committer_date": 1537909114000, "content_id": "e215d8f6ac7ac38cc088dd3e278c5cc27ed432fe", "detected_licenses": [ "MIT" ], "directory_id": "2965aa6e917489bf4e005102861590a7a4de0273", "extension": "py", "fi...
2.953125
stackv2
def five_digits(number): num_str = "00000" + str(number) return num_str[-5:] path1 = "/Volumes/ChenLab3TB1/colorferet/dvd1/data/ground_truths/name_value" path2 = "/Volumes/ChenLab3TB1/colorferet/dvd2/data/ground_truths/name_value" allfile = open("/Volumes/ChenLab3TB1/colorferet/myinfo/masterfile.txt", "w") ma...
42
29.74
78
18
378
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_6b4fbb004f009119_1a78a8e1", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text." ]
[ 26 ]
[ null ]
[ 23 ]
[ 78 ]
2024-11-18T20:31:10.440437+00:00
1,626,342,689,000
f45b842db52a7cb63fe62f0db3f798fe68b38c1f
3
{ "blob_id": "f45b842db52a7cb63fe62f0db3f798fe68b38c1f", "branch_name": "refs/heads/main", "committer_date": 1626342689000, "content_id": "edef4cd6dbe611914c03124e599383e859d3ff13", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "8c1b494108ded137ced9edc19d1e10ed280bab21", "extension": "py"...
2.765625
stackv2
# Author: Wenfan Zhou, Bohua Zhan """API for program verification.""" import json from flask import request from flask.json import jsonify from logic import basic from imperative import parser2 from imperative import imp # for the imp methods from syntax import printer from prover import z3wrapper from app.app impo...
86
28.42
83
17
625
python
[{"finding_id": "codeql_py/path-injection_51d2c494965bc698_ff268107", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
3
true
[ "CWE-022", "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 32, 76, 83 ]
[ null, null, null ]
[ 15, 15, 15 ]
[ 19, 19, 19 ]
2024-11-18T20:31:20.465173+00:00
1,570,048,814,000
ac9a8d179050b57d1d9edff07a20869d518b9102
3
{ "blob_id": "ac9a8d179050b57d1d9edff07a20869d518b9102", "branch_name": "refs/heads/master", "committer_date": 1570048814000, "content_id": "dea8b8ee23d662ebe0a94a686bce1afc686159ce", "detected_licenses": [ "MIT" ], "directory_id": "90c64b683342c2dbcd0b185fd0d099d5ad976605", "extension": "py", "fi...
2.71875
stackv2
import argparse import datetime import sys import time import settings from output import Output from tweepy import OAuthHandler from tweepy import Stream from tweepy.streaming import StreamListener from unidecode import unidecode class MyStreamListener(StreamListener): def on_status(self, status): try: ...
136
38.09
104
17
1,143
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_949c11be4f7431cb_68132ae1", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (secret)](1) as clear text.", "This expression stores [sensitive data (secret)](1) as clear text." ]
[ 71, 73 ]
[ null, null ]
[ 13, 13 ]
[ 70, 67 ]
2024-11-18T20:31:28.013721+00:00
1,520,383,862,000
6438ff0e26bb22f0b9ecdd866defb7409afb16bb
2
{ "blob_id": "6438ff0e26bb22f0b9ecdd866defb7409afb16bb", "branch_name": "refs/heads/master", "committer_date": 1520383862000, "content_id": "b98e239f5315bc4b758e9d0c055ad8635b373a9f", "detected_licenses": [ "Apache-2.0" ], "directory_id": "ed19d54707ef48fc81c4bfd8e4bd782baeee680d", "extension": "py"...
2.375
stackv2
#!/usr/bin/env python # this script does the following: # 1. Read in a configuration file. # 2. Create a kickstart file based on a template # 3. Create an image from that kickstart file to be used to boot a UCS. from socket import inet_aton, error as Serror from jinja2 import Environment, FileSystemLoader from sub...
119
34.11
89
16
1,180
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_389d418f9aa3e25c_b34c1e93", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 50 ]
[ 51 ]
[ 14 ]
[ 39 ]
2024-11-18T20:31:28.905948+00:00
1,584,647,280,000
9172d6f1ef171c58a5457032fe048f1ccf0e169b
3
{ "blob_id": "9172d6f1ef171c58a5457032fe048f1ccf0e169b", "branch_name": "refs/heads/master", "committer_date": 1584647280000, "content_id": "0623150a0c6992801333bf1567a00a1f3ad506c2", "detected_licenses": [ "Apache-2.0" ], "directory_id": "bbeb2702f3abbe3d90215d351f8aa54ab39a9e8f", "extension": "py"...
2.6875
stackv2
# Copyright Year(s) program was created VMware, Inc. # SPDX-License-Identifier: Apache-2.0 from flask import Flask, request import cp from constants import DEBUG, SUCCESS import json import logging app = Flask(__name__) SUCCESS = "100" @app.route("/api/v1/load/<id>") def get_load(id): """ Get current load ...
73
28.6
109
15
541
python
[{"finding_id": "codeql_py/reflective-xss_ab3f6b93dd8c9461_79481fcd", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
5
true
[ "CWE-079", "CWE-079", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/reflective-xss", "py/reflective-xss", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "HIGH", "HIGH", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided valu...
[ 51, 68, 27, 53, 70 ]
[ null, null, null, null, null ]
[ 16, 16, 23, 23, 23 ]
[ 48, 44, 76, 77, 80 ]
2024-11-18T20:31:30.769966+00:00
1,634,725,322,000
ac47b7a61deae6d5c1cee36d2cfc2b72328557bc
2
{ "blob_id": "ac47b7a61deae6d5c1cee36d2cfc2b72328557bc", "branch_name": "refs/heads/master", "committer_date": 1634725322000, "content_id": "acaf056429fff4f9979200cdaa92404885c30447", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "8be5929368bd987caf744c92f234884bf49d3d42", "extension": "p...
2.375
stackv2
# ---------------------------------------------------------------------- # Transmute # ---------------------------------------------------------------------- # Copyright (C) 2007-2020 The NOC Project # See LICENSE for details # ---------------------------------------------------------------------- # Typing from typing...
90
27.83
72
15
581
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_03906fc995abdd5d_ec318c2b", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 65 ]
[ null ]
[ 35 ]
[ 68 ]
2024-11-18T20:31:32.307065+00:00
1,574,245,176,000
177d5ad10ef91e2399a57a23b5af4df6afba88c8
3
{ "blob_id": "177d5ad10ef91e2399a57a23b5af4df6afba88c8", "branch_name": "refs/heads/master", "committer_date": 1574245176000, "content_id": "092253485ef6cbcdb11246ceb74e440bf6285018", "detected_licenses": [ "MIT" ], "directory_id": "041301ee20e4a8fdd1a1201efe251ee4ba5e849a", "extension": "py", "fi...
2.59375
stackv2
import datetime from jinja2 import Environment, FileSystemLoader # TODO: support the following structure if seen better # def print_to_template(outputFile, inputFile): def print_to_template_simple(outputFile, presenter): """ simplest template example, an extandable function for starting new languages """ file_loa...
44
26.18
77
12
276
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_3343c471cde6027c_07b178a3", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 12, 29 ]
[ null, 33 ]
[ 8, 8 ]
[ 39, 20 ]
2024-11-18T20:43:23.315891+00:00
1,532,372,639,000
a571ecedf070ca21a9ab5930316689c187128f99
2
{ "blob_id": "a571ecedf070ca21a9ab5930316689c187128f99", "branch_name": "refs/heads/master", "committer_date": 1532372639000, "content_id": "fb2c268c809ef3f1a10f37a831684543083e1695", "detected_licenses": [ "MIT" ], "directory_id": "16fa1058a256d76709745d2ba5671a267b1198b3", "extension": "py", "fi...
2.4375
stackv2
#/usr/bin/env python #coding=utf8 import http.client import hashlib from hashlib import md5 import urllib.request, urllib.parse, urllib.error import random import json import string #parameters appid = '20151113000005349' secretKey = 'osubCEzlGjzvw8qdQc41' q = 'Hello World!' fromLang = 'en' toLang = 'zh' salt = rando...
42
25.95
143
17
332
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_ef2d9bb8c405d86d_48b27263", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 21 ]
[ null ]
[ 11 ]
[ 15 ]
2024-11-18T20:43:33.128021+00:00
1,502,807,628,000
a65236705b2093b209f270197331d9906f047406
3
{ "blob_id": "a65236705b2093b209f270197331d9906f047406", "branch_name": "refs/heads/master", "committer_date": 1502807628000, "content_id": "76f96ded028d3f9eed4e1978530c5b51cc4d6f64", "detected_licenses": [ "Apache-2.0" ], "directory_id": "4bcc306e51b17e8e7c96afa2f0aaac73c23e1031", "extension": "py"...
2.515625
stackv2
#!/usr/bin/env python """ This is a simple queue system take shell script as an input and execute them as a queue. Requirements: 1. Shell script as an input and execute with proper environmental variables. 2. Take ntasks parameter and launch concurrent jobs. 3. Assigns job ID when a job is submitted and report job st...
249
32.87
122
21
1,829
python
[{"finding_id": "codeql_py/reflective-xss_d8df693bd5fe28bb_1f48672e", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
2
true
[ "CWE-079", "CWE-117" ]
[ "py/reflective-xss", "py/log-injection" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 94, 72 ]
[ null, null ]
[ 20, 21 ]
[ 28, 54 ]
2024-11-18T20:44:17.821306+00:00
1,490,116,937,000
f21a7881765dc724d61ce77f22c30caa150de39a
2
{ "blob_id": "f21a7881765dc724d61ce77f22c30caa150de39a", "branch_name": "refs/heads/master", "committer_date": 1490116937000, "content_id": "4e9a2884bd6d58cedb9cfa90af1817ea0ed62135", "detected_licenses": [ "Apache-2.0" ], "directory_id": "7f38760d6505fd23d76c559700a625a4dab67034", "extension": "py"...
2.34375
stackv2
# ---------------------------------------------------------------------------- # Copyright 2016 Nervana Systems Inc. # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.o...
124
41.2
97
20
1,280
python
[{"finding_id": "codeql_py/tarslip_55940d4011a07238_f5052f60", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 58 ]
[ null ]
[ 17 ]
[ 18 ]
2024-11-18T20:57:30.411554+00:00
1,518,074,522,000
7f7cd78a9b522cba5c0ca9d2285ce58cf9d9dd42
4
{ "blob_id": "7f7cd78a9b522cba5c0ca9d2285ce58cf9d9dd42", "branch_name": "refs/heads/master", "committer_date": 1518074522000, "content_id": "f07eeb92869b8b5f5ea52d0416e924b659787e58", "detected_licenses": [ "MIT" ], "directory_id": "3e718c195cad61e91e8c831037b24a4dea829bd4", "extension": "py", "fi...
3.890625
stackv2
#!/usr/bin/env python # coding: utf-8 #copyRight by heibanke from __future__ import print_function from __future__ import unicode_literals from builtins import input import random # 1. 随机产生要猜的数字 # Your code1 secret = random.randint(1, 100) guess = 0 print("你好, 你很幸运, 我是一个路过的神仙, 我有一个秘密!") print("我的秘密是一个从1到99的数字, 我只会给你...
34
22.76
58
12
330
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3a5044750f52ae64_33d1b1e4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 29 ]
[ null ]
[ 47 ]
[ 58 ]
2024-11-18T20:57:52.932563+00:00
1,574,784,093,000
f689dbcc7b929971749f96cfdce24c584b35fce2
2
{ "blob_id": "f689dbcc7b929971749f96cfdce24c584b35fce2", "branch_name": "refs/heads/master", "committer_date": 1574784093000, "content_id": "e96e5a6a6a606ec609e09f013a2432f4d80f14ef", "detected_licenses": [ "Apache-2.0" ], "directory_id": "c43bbb2f9b7181e362f04ab099c14913236b6d78", "extension": "py"...
2.4375
stackv2
from flask import Blueprint, request, url_for, render_template, redirect, flash from flask_login import current_user, login_user, login_required, logout_user from src.models import * from src import db event_blueprint = Blueprint('event', __name__, template_folder='../../templates/event') @event_blueprint.route('/c...
142
42.39
140
20
1,295
python
[{"finding_id": "codeql_py/url-redirection_6341c5112c8bc340_b657d44b", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 109 ]
[ null ]
[ 25 ]
[ 31 ]
2024-11-18T20:57:57.818044+00:00
1,549,997,308,000
81c70db1c49354edc962ee00f3b566d402c4f1b5
3
{ "blob_id": "81c70db1c49354edc962ee00f3b566d402c4f1b5", "branch_name": "refs/heads/master", "committer_date": 1549997308000, "content_id": "a14b8f9a2e9a95f2a5b2c18fa19166e417659d75", "detected_licenses": [ "Apache-2.0" ], "directory_id": "faded8adf39fc28cf484972fea4689de3ceea6dd", "extension": "py"...
2.796875
stackv2
#!/usr/bin/env python3 from datetime import datetime from datetime import datetime, timedelta from json import loads from os import environ from requests import get, post from sys import argv from time import sleep desired_metrics = [ "temperature", "apparentTemperature", "precipProbability", "precipI...
100
31.27
104
15
778
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9462945bb2f98453_6e4dd5ab", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 95 ]
[ null ]
[ 11 ]
[ 18 ]
2024-11-18T20:58:06.098594+00:00
1,690,525,334,000
fce9cc91e06baef908b9cef84a0c8772ae6af7e6
2
{ "blob_id": "fce9cc91e06baef908b9cef84a0c8772ae6af7e6", "branch_name": "refs/heads/master", "committer_date": 1690525334000, "content_id": "6c4a2443d079d9c6c834f6f0697a0b3723edd1c7", "detected_licenses": [ "Apache-2.0" ], "directory_id": "f8a7e3862ef2b70d5ce26c45796787991677b678", "extension": "py"...
2.375
stackv2
import urllib.request import urllib.error import hmac import datetime import uuid import base64 import hashlib import ssl import json import logging logging.basicConfig( filename='log_vessel_delay.log', level=logging.DEBUG, datefmt='[%Y-%m-%d %H:%M:%S]', format='%(asctime)s %(levelname)s %(filename)s [...
99
31.07
167
20
807
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_d0838b0b68eda53c_a79a4104", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.",...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 30 ]
[ null ]
[ 30 ]
[ 89 ]
2024-11-18T20:58:10.542954+00:00
1,620,788,482,000
d6155fc6e622ae831cc23b2c14c4b2a05e81f812
4
{ "blob_id": "d6155fc6e622ae831cc23b2c14c4b2a05e81f812", "branch_name": "refs/heads/master", "committer_date": 1620788482000, "content_id": "78cb0ac63ef887fda7a047005c1f0ace20449f3b", "detected_licenses": [ "MIT" ], "directory_id": "8d22e1fd064e7f5972c71db82fad657eea5a9333", "extension": "py", "fi...
4.1875
stackv2
""" 【面向对象】 1. 类、对象 2. 对象/类的属性、行为 3. 对象/类的关系:关联、继承、依赖 4. 特征:抽象性、封装性、多态性 """ ''' First I will tell students what is Capsulational Definition of Class. By the way, what is the enum data type will be introduced. * Class code. * Members of Class. * Private members of Class. * Public members of Class. * Construct Method wit...
51
19.96
69
12
305
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7645ffe024d78a49_a8eeb8e6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 42, 51 ]
[ null, null ]
[ 7, 7 ]
[ 54, 54 ]
2024-11-18T20:58:22.103826+00:00
1,635,242,494,000
84b1fdc72c639366bc45271584b88db16d731e41
3
{ "blob_id": "84b1fdc72c639366bc45271584b88db16d731e41", "branch_name": "refs/heads/main", "committer_date": 1635242494000, "content_id": "d0edd9b5a690d68dbe696091fe3f50f97800b8cf", "detected_licenses": [ "MIT" ], "directory_id": "d7ab4eb58fd7a6aedeef776363d644167a3d61d2", "extension": "py", "file...
3.46875
stackv2
from argparse import ArgumentParser, ArgumentTypeError, Namespace from string import ascii_lowercase, ascii_uppercase from random import choice NAME = "pwgen" VERSION = "1.0.0" LOWER_ALPHA = ascii_lowercase UPPER_ALPHA = ascii_uppercase NUMBERS = "0123456789" SPECIALS = "!@#$%^&*" def init_parser() -> ArgumentPars...
84
25.17
78
11
557
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_30d85ddfd26acfd3_ba092c5e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text." ]
[ 81 ]
[ null ]
[ 8 ]
[ 16 ]
2024-11-18T20:58:38.186691+00:00
1,552,432,870,000
4a47b335cb3a68ccedc5bf6bddb8ba7c28bf6bd0
2
{ "blob_id": "4a47b335cb3a68ccedc5bf6bddb8ba7c28bf6bd0", "branch_name": "refs/heads/master", "committer_date": 1552432870000, "content_id": "f968abc5b0983dbdeaafdde3c9ebd7043649aa89", "detected_licenses": [ "MIT" ], "directory_id": "8a9c99d1ff042087a3198995e6dad91859f06ecb", "extension": "py", "fi...
2.453125
stackv2
from flask import Flask, jsonify, request, make_response, g import sqlite3 from flask_api import status import datetime from http import HTTPStatus from flask_httpauth import HTTPBasicAuth from passlib.hash import sha256_crypt app = Flask(__name__) auth = HTTPBasicAuth() DATABASE = 'blogdatabase.db' def get_db(): ...
217
28.11
151
19
1,339
python
[{"finding_id": "codeql_py/flask-debug_fec27591f1c92db5_29013ce7", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-089" ]
[ "py/flask-debug", "py/sql-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This SQL query depends on a [user-provided value](1)." ]
[ 217, 139 ]
[ null, null ]
[ 5, 27 ]
[ 24, 30 ]
2024-11-18T20:58:39.332004+00:00
1,419,345,220,000
a082c0a5b7658d2dde07fa8db12262d7dd7ea0d6
3
{ "blob_id": "a082c0a5b7658d2dde07fa8db12262d7dd7ea0d6", "branch_name": "refs/heads/master", "committer_date": 1419345220000, "content_id": "ee7114670aefb7ec3747e7cb5721b70503b58708", "detected_licenses": [ "MIT" ], "directory_id": "c230188b2b055eb34e099920768a604642bc11d7", "extension": "py", "fi...
3.359375
stackv2
"""Extracting and changing portions of the current line All functions take cursor offset from the beginning of the line and the line of python code, and return None, or a tuple of the start index, end index, and the word""" import re def current_word(cursor_offset, line): """the object.attribute.attribute just b...
159
38.63
118
14
1,742
python
[{"finding_id": "codeql_py/overly-large-range_db23b64ceedf8a91_fb808d90", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\w in the same character class.", "remediation": "", "loc...
14
true
[ "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/overly-large-ra...
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that overlaps with \\w in the same character class.", "Suspicious character range that overlaps with \\w in the same character class.", "Suspicious character range that overlaps with \\w in the same character class.", "Suspicious character range that overlaps with \\w in the same c...
[ 11, 26, 26, 34, 34, 56, 72, 88, 88, 100, 103, 106, 119, 122 ]
[ null, null, null, null, null, null, null, null, null, null, null, null, null, null ]
[ 42, 44, 57, 45, 59, 43, 43, 43, 70, 38, 30, 44, 30, 44 ]
[ 45, 47, 60, 48, 62, 46, 46, 46, 73, 41, 33, 47, 33, 47 ]
2024-11-18T21:10:11.858711+00:00
1,520,873,793,000
a380fc25c6692157c16b2c05b68d063e2456ebc3
3
{ "blob_id": "a380fc25c6692157c16b2c05b68d063e2456ebc3", "branch_name": "refs/heads/master", "committer_date": 1520873793000, "content_id": "c1065f8d89c1bc9d796b251a47e6c93537ded398", "detected_licenses": [ "MIT" ], "directory_id": "6e87ad7f75a2eb0443824d8ae76de7fc7ad15666", "extension": "py", "fi...
2.875
stackv2
#!/usr/bin/env python2 # -*- coding: utf-8 -*- """ Created on Tue Mar 6 15:41:20 2018 @author: dalonlobo """ from __future__ import absolute_import, print_function, division, unicode_literals import sys import re from n2w import convert def process_line(line): """ Preprocessing of the text data: :1...
62
25.39
85
16
356
python
[{"finding_id": "codeql_py/overly-large-range_9d7d7a2361cdbe1b_64f7d854", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 25 ]
[ null ]
[ 26 ]
[ 29 ]
2024-11-18T21:10:19.071144+00:00
1,624,511,774,000
a53c705fb5fea0c1ca2407ff5f17990ac39eeed2
2
{ "blob_id": "a53c705fb5fea0c1ca2407ff5f17990ac39eeed2", "branch_name": "refs/heads/main", "committer_date": 1624511774000, "content_id": "07057ddf166730e64b703c1ea4fa4c42b5ec303f", "detected_licenses": [ "MIT" ], "directory_id": "a4cd8592aa4ebc6e2fa257843b944d588090aed9", "extension": "py", "file...
2.390625
stackv2
import os import random import re import warnings import numpy as np import skimage import tensorflow as tf from PIL import ImageDraw, ImageFont from keras.backend import clear_session from PIL import Image from flask import Flask, send_file from flask import request, jsonify from flask_cors import CORS, cross_origin ...
144
35.56
110
23
1,245
python
[{"finding_id": "codeql_py/path-injection_a0a1ab88bdf9637f_1a951cd8", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 58, 117 ]
[ null, null ]
[ 23, 34 ]
[ 32, 42 ]
2024-11-18T21:10:20.291476+00:00
1,604,339,954,000
889cd121e09ec23a25b9af939864a96335347089
3
{ "blob_id": "889cd121e09ec23a25b9af939864a96335347089", "branch_name": "refs/heads/master", "committer_date": 1604339954000, "content_id": "93f5271a8122f165f2665360cb027bdb32870405", "detected_licenses": [ "MIT" ], "directory_id": "3f070d4d6985778c60ef951ba3fd0a14a9649c87", "extension": "py", "fi...
2.546875
stackv2
"""This module only contrains the handler class for status requests""" import logging from typing import Mapping from flask import jsonify from flask_jwt_extended import jwt_required from flask_restful import Resource from papi.exceptions import InvalidTaskIdError from papi.db import DB from papi.ssh import Ssh class ...
84
36.31
99
15
651
python
[{"finding_id": "codeql_py/stack-trace-exposure_0c22948d61355727_45e9dcc9", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 82 ]
[ 83 ]
[ 24 ]
[ 51 ]
2024-11-18T21:10:20.786400+00:00
1,434,625,992,000
f93c5d1b36b0ee7fcdf377a8ce62ad1c3a2e4b41
2
{ "blob_id": "f93c5d1b36b0ee7fcdf377a8ce62ad1c3a2e4b41", "branch_name": "refs/heads/master", "committer_date": 1434625992000, "content_id": "d75c2f85201d62a7225b033b23abfb41ab608efe", "detected_licenses": [ "Apache-2.0" ], "directory_id": "33ff244c0a20291719922023d6234bf97f1e78d0", "extension": "py"...
2.484375
stackv2
# Copyright 2015 Cisco Systems, Inc. # # Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with # the License. You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writ...
191
31.18
117
14
1,361
python
[{"finding_id": "codeql_py/request-without-cert-validation_fa867120ddab11f8_16742bbc", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 117 ]
[ 123 ]
[ 20 ]
[ 26 ]
2024-11-18T21:10:25.969197+00:00
1,494,449,071,000
550a1c2ed6f9c25d17316e1db0a11feeb545101a
2
{ "blob_id": "550a1c2ed6f9c25d17316e1db0a11feeb545101a", "branch_name": "refs/heads/master", "committer_date": 1494449071000, "content_id": "15ede47043af9bacc3cde53375eeb8be7a3a0620", "detected_licenses": [ "MIT" ], "directory_id": "c07f5d5d38a2502e1987531c0b3a9258e66ffdd3", "extension": "py", "fi...
2.4375
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- """ Created on Tue May 9 15:35:28 2017 @author: woojay #echo 1 > /sys/class/leds/red_led/brightness """ from forecastiopy import * from datetime import datetime from subprocess import call from time import sleep delaySec = 5 blinkPerMinute = int(60 / (delaySec+1)) chec...
78
35.92
138
21
758
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e7528dfb741447b5_31cef01b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 25 ]
[ null ]
[ 7 ]
[ 69 ]
2024-11-18T21:10:45.013027+00:00
1,613,075,950,000
491487702a42d0dfea262167ed410f24770fbd49
2
{ "blob_id": "491487702a42d0dfea262167ed410f24770fbd49", "branch_name": "refs/heads/master", "committer_date": 1613075950000, "content_id": "ae417c0b1700fdf1c663119e1af22972a7eb361c", "detected_licenses": [ "MIT" ], "directory_id": "2d6b5a6c8f6043551038b9f993433028c7c8c3cb", "extension": "py", "fi...
2.46875
stackv2
import sys from bluepy.btle import UUID, Peripheral, Characteristic, BTLEDisconnectError import logging import json from influxdb import InfluxDBClient import time global connections connections = [] def configure_logger(config): log_formatter = logging.Formatter('%(asctime)s : %(levelname)s : %(message)s') ...
156
38.64
144
22
1,334
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6bad4a70ee05a3e4_55211526", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 79, 95 ]
[ null, null ]
[ 61, 96 ]
[ 77, 112 ]
2024-11-18T21:11:00.932018+00:00
1,587,974,576,000
7d731c8ed92805912447a58252c06125b63b9fa1
3
{ "blob_id": "7d731c8ed92805912447a58252c06125b63b9fa1", "branch_name": "refs/heads/master", "committer_date": 1587974576000, "content_id": "ef6cfee34ec2d870fc14ccd7a6fcde1dbed5e190", "detected_licenses": [ "Apache-2.0" ], "directory_id": "7e4b6e6aa20557091f112673b936a20ed9bce0db", "extension": "py"...
2.640625
stackv2
#!/usr/bin/python3 import paramiko,time,sys # using as ssh client client=paramiko.SSHClient() # auto adjust host key verification with yes or no client.set_missing_host_key_policy(paramiko.AutoAddPolicy()) # time for connecting to remote Cisco IOS addr=input("enter your router IP : ") u='root' p='cisco' ...
25
29.36
81
8
196
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_eef77f3632df43ee_f707fc44", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 8 ]
[ null ]
[ null ]
[ 61 ]
2024-11-18T21:11:15.454707+00:00
1,660,834,681,000
61bb168d0ee749299c7577c183e8a3b131b37d1d
3
{ "blob_id": "61bb168d0ee749299c7577c183e8a3b131b37d1d", "branch_name": "refs/heads/master", "committer_date": 1660834725000, "content_id": "f56483202df617c2609da783b2a0718a105e32cf", "detected_licenses": [ "MIT" ], "directory_id": "683663ff0f6efd733b44609d61d96adf33f88b33", "extension": "py", "fi...
2.796875
stackv2
#!/usr/bin/env python import csv import sys from jinja2 import Environment TABLE_TEMPLATE = ''' <table id="table." class="lighttable"> <caption>構造体 </caption> <thead> <tr><th>オフセット</th><th>桁</th><th>属性</th></tr> </thead> <tbody> {%- for row in records %} <tr><td><literal>{{ row['Offset'] }}</literal><...
30
23.17
135
12
205
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_66e6f2fc198c0bd6_ad5d056a", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 25 ]
[ null ]
[ 11 ]
[ 40 ]
2024-11-18T19:03:21.634176+00:00
1,684,363,415,000
e5d05c72f44f31bf2d1248b1e4199795e3910d6f
2
{ "blob_id": "e5d05c72f44f31bf2d1248b1e4199795e3910d6f", "branch_name": "refs/heads/master", "committer_date": 1684363415000, "content_id": "2608dbc83eea54d86e7b02cabb8954bed1970e12", "detected_licenses": [ "MIT" ], "directory_id": "5cd5fc3c4bd5c0a0614ab9c75e96c7b433351f91", "extension": "py", "fi...
2.40625
stackv2
#!/usr/bin/python import sys import requests import json import urllib3 # there is a way to only disable InsecurePlatformWarning but I can't find it now urllib3.disable_warnings() sw_url = sys.argv[1] services = sys.argv[2:] #print (sw_url) #print (services) for dynsvc in services: swdata= { "id": 47,...
61
25.11
156
19
443
python
[{"finding_id": "codeql_py/request-without-cert-validation_70715f77596ed0d9_95b0df00", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 29, 44 ]
[ null, null ]
[ 11, 17 ]
[ 59, 71 ]
2024-11-18T19:03:34.808042+00:00
1,617,216,366,000
a71ed0e11d6a39f98ed33dcfded32a0f85fc12ca
3
{ "blob_id": "a71ed0e11d6a39f98ed33dcfded32a0f85fc12ca", "branch_name": "refs/heads/master", "committer_date": 1617216366000, "content_id": "a753ca3cebe1a8f841870df0027b5551fbd2de80", "detected_licenses": [ "MIT" ], "directory_id": "4b6c98a5f34c189ca483133b7ca8ad7ab7b4b1f4", "extension": "py", "fi...
2.765625
stackv2
import logging import requests from furl import furl log = logging.getLogger(__name__) class IATACodesClient: def __init__(self, api_key): self.__api_key = api_key def get(self, code=None, name=None, country_code=None): f = furl('https://iatacodes.org/api/v6/cities?api_key={api_key}'.format...
60
32.12
104
14
501
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_61656434b94219b0_80dd7ae2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
4
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 42, 48, 49, 55 ]
[ null, null, null, null ]
[ 18, 19, 19, 19 ]
[ 21, 44, 22, 42 ]
2024-11-18T19:03:37.793994+00:00
1,633,612,726,000
a99a640b8b48f1b0c8d93c9abb35885d9b884033
2
{ "blob_id": "a99a640b8b48f1b0c8d93c9abb35885d9b884033", "branch_name": "refs/heads/main", "committer_date": 1633612726000, "content_id": "6ae6f3d7ca97174c9e3fca9e279897d2718d2c01", "detected_licenses": [ "MIT" ], "directory_id": "66025066f697e9708a1038eeb611a20b2685a1d0", "extension": "py", "file...
2.328125
stackv2
from flask import Flask, render_template, request, redirect,url_for import os #custom packages import from data_ingestion.data_import_and_preprocessing import DataImport,Preprocessing from image_api_functions.api_functions import API_Functions app=Flask(__name__) #initializing objects data_import = DataImport() prep...
81
30.3
118
15
574
python
[{"finding_id": "codeql_py/path-injection_4645cf61c4ae20cd_4d5db874", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
4
true
[ "CWE-022", "CWE-022", "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2).\nThis path depends on a [user-provided value](3).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 41, 54, 67, 69 ]
[ null, null, null, null ]
[ 16, 15, 24, 23 ]
[ 20, 19, 28, 27 ]
2024-11-18T19:28:38.325204+00:00
1,570,794,323,000
f659a9867aee711a2372ba7e92643506059e36bc
3
{ "blob_id": "f659a9867aee711a2372ba7e92643506059e36bc", "branch_name": "refs/heads/master", "committer_date": 1570794323000, "content_id": "c46cfcc188a1dfb919a1f17c6ebd6baa83fa902c", "detected_licenses": [ "MIT" ], "directory_id": "b6841cfa4f69161e76b3551b39e117a0a57c1275", "extension": "py", "fi...
2.828125
stackv2
#!/usr/bin/python3 import requests ##customize ZONE_ID= API_KEY= AUTH_EMAIL= DOMAIN_NAME= ## CF_API_URL="https://api.cloudflare.com/client/v4/" AUTH_HEADERS = { 'X-Auth-Email': AUTH_EMAIL, 'X-Auth-Key': API_KEY, 'Content-Type': 'application/json' } def check_http_error_code(resp): if resp.status_code != requests....
65
32.02
133
13
594
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6bd9c298286917e1_2a88d80e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 16, 47 ]
[ null, null ]
[ 15, 11 ]
[ 24, 100 ]
2024-11-18T19:28:54.080758+00:00
1,580,895,963,000
cf2412acc904fdf73d23b378133ae66af1667fb0
2
{ "blob_id": "cf2412acc904fdf73d23b378133ae66af1667fb0", "branch_name": "refs/heads/master", "committer_date": 1580895963000, "content_id": "9d5b05caeb50e91fa860c4b8eb21399faa06b956", "detected_licenses": [ "Apache-2.0" ], "directory_id": "7abc013b680e492bca0c7fba914de726e1181029", "extension": "py"...
2.4375
stackv2
import os import uuid from aiohttp import web from app.utility.base_service import BaseService from app.utility.payload_encoder import xor_file class FileSvc(BaseService): def __init__(self, exfil_dir): self.exfil_dir = exfil_dir self.log = self.add_service('file_svc', self) self.data_s...
145
36.29
117
19
1,132
python
[{"finding_id": "codeql_py/stack-trace-exposure_be7e7176e7e49ac7_7f9a16be", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 35 ]
[ null ]
[ 42 ]
[ 43 ]
2024-11-18T19:39:45.977773+00:00
1,544,025,841,000
ba88d001860d10a1c51743a9e5633e5097de3fc8
3
{ "blob_id": "ba88d001860d10a1c51743a9e5633e5097de3fc8", "branch_name": "refs/heads/master", "committer_date": 1544058577000, "content_id": "461150023566b7135f8cae83eb7e0dfc1301069e", "detected_licenses": [ "MIT" ], "directory_id": "225766f60e4e22544bf67e7cab7c0646dbd51abd", "extension": "py", "fi...
2.875
stackv2
#! /usr/bin/env python3 # coding: utf-8 import os import wget import tarfile from bs4 import BeautifulSoup from definitions import ROOT_DIR, word_tokenize, stopwords, ps class Reuters: def __init__(self, number_of_files=22, docs_per_block=500, remove_stopwords=False, stem=False, case_folding=F...
147
40.06
131
20
1,281
python
[{"finding_id": "codeql_py/tarslip_007c22c9f8757a27_d307b2e7", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 59 ]
[ null ]
[ 13 ]
[ 16 ]
2024-11-18T19:39:50.823410+00:00
1,393,535,785,000
a21a752d595e1d239d36910e55ea3bad44bdec31
2
{ "blob_id": "a21a752d595e1d239d36910e55ea3bad44bdec31", "branch_name": "refs/heads/master", "committer_date": 1393535785000, "content_id": "25c61981c9f39a4249debc246b1fd1b40fce99ee", "detected_licenses": [ "MIT" ], "directory_id": "b9489618b38b7c7d6e30d40a0219c9fa462aaa2c", "extension": "py", "fi...
2.484375
stackv2
import json import urllib from requests_toolbelt import MultipartEncoder import requests from bitcasa.filesystem import BitcasaFile, BitcasaFolder from bitcasa.exception import BitcasaException BASEURL = 'https://developer.api.bitcasa.com/v1/' class BitcasaClient(object): def __init__(self, id, secret, redirect_...
159
39.59
115
15
1,476
python
[{"finding_id": "codeql_py/request-without-cert-validation_ca9db4d4a61a76c3_a0f94ec0", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 94 ]
[ null ]
[ 20 ]
[ 116 ]
2024-11-18T19:40:01.318585+00:00
1,586,103,224,000
d08f88a6c3c9d75686f3c8251a74ed88572a915d
3
{ "blob_id": "d08f88a6c3c9d75686f3c8251a74ed88572a915d", "branch_name": "refs/heads/master", "committer_date": 1586103224000, "content_id": "432d20d855473b601e019b403b5dd4aa760966ed", "detected_licenses": [ "MIT" ], "directory_id": "352d994e052bf670f9b99c5b795c6aab22ad613a", "extension": "py", "fi...
2.875
stackv2
from flask import Flask from flask import request from ShoppingList import * import json app = Flask(__name__) list = ShoppingList() list.addElement("patate", 5) list.addElement("patate", 3) list.addElement("fogli", 18) list.addElement("mela", 5) @app.route('/test') def hello_world(): return {'name': 'gian', 'su...
48
28
69
15
335
python
[{"finding_id": "codeql_py/flask-debug_ab0bea34ee8bbf88_ea6f751b", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 48, 42 ]
[ null, 44 ]
[ null, 16 ]
[ 47, 51 ]
2024-11-18T20:18:05.509719+00:00
1,556,693,296,000
d2a70510f5c591fd2e599eb82c34f7a09e196bc4
3
{ "blob_id": "d2a70510f5c591fd2e599eb82c34f7a09e196bc4", "branch_name": "refs/heads/master", "committer_date": 1556693296000, "content_id": "d654f94fec616223da7e1d598f6953bcf83ece1b", "detected_licenses": [ "MIT", "Apache-2.0" ], "directory_id": "df04c111195126abe84143cceb2f3599b6301106", "exten...
2.671875
stackv2
import re try: from .vulnerabilities import definitions except: from vulnerabilities import definitions import hashlib import requests def is_defined(o): return o is not None def scan(data, extractor, matcher=None, definitions=definitions): matcher = matcher or _simple_match detected = [] f...
180
27.52
88
19
1,206
python
[{"finding_id": "codeql_py/request-without-cert-validation_1a039b5545aaeb91_93098aa3", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 176 ]
[ null ]
[ 19 ]
[ 50 ]
2024-11-18T20:18:50.478414+00:00
1,595,209,600,000
09ba11e0ebe9ed80483729cb1219a0c96a5088f7
3
{ "blob_id": "09ba11e0ebe9ed80483729cb1219a0c96a5088f7", "branch_name": "refs/heads/master", "committer_date": 1595209600000, "content_id": "1f7080baef86739872aa6036430dc7ee17d50753", "detected_licenses": [ "MIT" ], "directory_id": "29f8ba19f3b11451cdd3da35f6611996a1def622", "extension": "py", "fi...
3.125
stackv2
import zipfile import time import threading startTime = time.time() # 判断线程是否需要终止 flag = True def extract(password, file): try: password = str(password) file.extractall(path='.', pwd=password.encode('utf-8')) print("The Passwd is: {}".format(password)) nowTime = time.time() ...
36
20.97
70
14
222
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8dac74499a5c44c6_4d703c43", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 14 ]
[ null ]
[ 15 ]
[ 51 ]
2024-11-18T20:18:50.694241+00:00
1,368,355,644,000
b277caeefb062ef62728c697bebbce088fa51a48
3
{ "blob_id": "b277caeefb062ef62728c697bebbce088fa51a48", "branch_name": "refs/heads/master", "committer_date": 1368355644000, "content_id": "860b974fc7e59700e03b4a262abea4bd7a074188", "detected_licenses": [ "MIT" ], "directory_id": "38216d2f3d51a39e12c79b03506be2f7676628bd", "extension": "py", "fi...
2.59375
stackv2
# This file should go in ~/Library/Application Support/SublimeText2/Packages/User/ # Additionally, lines like this: # { "keys": ["ctrl+alt+a"], "command": "record_audio" }, # { "keys": ["ctrl+alt+l"], "command": "add_vo_line_numbers" } # should be added to the keymap file (accessible from the preferences menu) imp...
119
26.47
84
19
863
python
[{"finding_id": "codeql_py/overly-large-range_8b17fa4b237f7866_0892676f", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[+,\\-.\\/0-9:\\].", "remediation": "", "location": {...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[+,\\-.\\/0-9:\\]." ]
[ 77 ]
[ null ]
[ 25 ]
[ 28 ]
2024-11-18T20:29:31.957025+00:00
1,415,845,130,000
18bc65d6877cd55391d8801839f4bb02addc9ecf
3
{ "blob_id": "18bc65d6877cd55391d8801839f4bb02addc9ecf", "branch_name": "refs/heads/master", "committer_date": 1415845130000, "content_id": "741252e057d2528df827e5866521149e6fabebd0", "detected_licenses": [ "MIT" ], "directory_id": "19869ed70b66a5cead6a58315b85c26368816188", "extension": "py", "fi...
2.78125
stackv2
# mailstat.reporting.base # Code for the creation of Reports # # Author: Benjamin Bengfort <benjamin@bengfort.com> # Created: Sun Dec 29 21:45:46 2013 -0600 # # Copyright (C) 2013 Bengfort.com # For license information, see LICENSE.txt # # ID: base.py [] benjamin@bengfort.com $ """ Code for the creation of Reports ...
84
30.62
75
14
521
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_f158d62d5e6d8cb5_aaf75d38", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 52 ]
[ null ]
[ 33 ]
[ 59 ]
2024-11-18T20:29:58.689075+00:00
1,570,885,633,000
9c7b9de71bd9fe70c318eb7b05dd71488634bfb8
4
{ "blob_id": "9c7b9de71bd9fe70c318eb7b05dd71488634bfb8", "branch_name": "refs/heads/master", "committer_date": 1570885633000, "content_id": "9608ecaa14c49c16f377ddb57f9770bc72de128b", "detected_licenses": [ "MIT" ], "directory_id": "ff955556c7b1bf6ba96c66da218b4c6d20bebe31", "extension": "py", "fi...
3.96875
stackv2
'''Finite State Machine nad Rule''' class Rule: """Rule implementation""" def __init__(self, from_state: int, to_state: int, condition, action): # State in which this rule applies self.from_state = from_state # State to which this rule sends the state machine self.to_state = to...
103
27.03
83
14
636
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8a1e7ca9f7b97d96_27718492", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 102 ]
[ null ]
[ 43 ]
[ 69 ]
2024-11-18T20:30:01.306379+00:00
1,628,346,675,000
58a8b51764cd72ddedfed36e73e623016183cb89
3
{ "blob_id": "58a8b51764cd72ddedfed36e73e623016183cb89", "branch_name": "refs/heads/main", "committer_date": 1628346675000, "content_id": "b77868f0db0ea018618c9c85c01028e5c3f7e955", "detected_licenses": [ "MIT" ], "directory_id": "5c52e64424a57b1ddf8b3d09dc98ada658739e58", "extension": "py", "file...
3.46875
stackv2
#!/usr/bin/env python """ 2a. Using the Python requests library, perform an HTTP GET on the base URL of the NetBox server (https://netbox.lasthop.io/api/). Ensure that you are not verifying the SSL certificate. Print the HTTP status code, the response text, the JSON response, and the HTTP response headers. These it...
46
25.96
106
9
302
python
[{"finding_id": "codeql_py/request-without-cert-validation_db58d68a19cde147_bb43a01f", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 26 ]
[ null ]
[ 16 ]
[ 47 ]
2024-11-18T20:51:20.071611+00:00
1,690,553,201,000
1fb8dea6c83228fd3b47cc09f755a7f2d6320c11
2
{ "blob_id": "1fb8dea6c83228fd3b47cc09f755a7f2d6320c11", "branch_name": "refs/heads/master", "committer_date": 1690553201000, "content_id": "5a93f0d7f9721c148753b2cb1201ca9933ae2779", "detected_licenses": [ "MIT" ], "directory_id": "c7644a122dfdfd4522aa4e678dbae0a78c3b50ed", "extension": "py", "fi...
2.359375
stackv2
import logging import json from urllib.parse import parse_qs #from urllib3.response import HTTPResponse import os from twilio_app.call import call_handler from twilio_app.sms import message_handler from twilio_app.fax import fax_handler twilio_account_sid = os.environ["AccountSid"] twilio_phone_number = os.environ["Ph...
148
40.29
130
15
1,309
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c8cf5705f680c5b1_86012769", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](1) as clear text." ]
[ 125 ]
[ 128 ]
[ 21 ]
[ 14 ]
2024-11-18T19:07:07.373527+00:00
1,633,276,052,000
8a402f79469f9b66c1784683cdc5b44e10f58fc9
2
{ "blob_id": "8a402f79469f9b66c1784683cdc5b44e10f58fc9", "branch_name": "refs/heads/master", "committer_date": 1633276052000, "content_id": "60c7e4cf6e223f489462f73e1c817dcfe5d0eb27", "detected_licenses": [ "MIT" ], "directory_id": "98cf090b15e8b7100c466d80b0c485d40711a4de", "extension": "py", "fi...
2.390625
stackv2
import boto3 import config import yaml import os import sys import logging import hashlib import json logger = logging.getLogger('certman') def create_aws_client(service): aws_client = boto3.client(service, aws_access_key_id=config.c['aws_access_key'], aws_secret_access_key=config.c['aws_secret_key']) return...
107
42.04
146
19
907
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_d325cb60036880bb_275394bb", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (certificate)](1) is used in a hashing algorithm (MD5) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (certificate)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 31 ]
[ null ]
[ 37 ]
[ 57 ]
2024-11-18T19:07:25.120818+00:00
1,549,034,435,000
ade8b0f369ebe7437041b1c770bb29e34db950b6
3
{ "blob_id": "ade8b0f369ebe7437041b1c770bb29e34db950b6", "branch_name": "refs/heads/master", "committer_date": 1549034435000, "content_id": "dd7ac47a65021d8478bae0c7a3c35bbf29eb58ee", "detected_licenses": [ "MIT" ], "directory_id": "e62e7ba552486e66685b2a84f983eadc7aa0d37c", "extension": "py", "fi...
2.53125
stackv2
from distutils.dir_util import copy_tree from glob import glob from jinja2 import Template import janus import mlflow import os def to_camel(s): return ''.join(x.capitalize() or '_' for x in s.split()) def create_new_experiment(s: str): exps = sorted(glob('../experiments/*')) if len(exps) == 0: ...
37
27.57
106
19
300
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_6d556dad91e59d8f_86e3ec6a", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 25 ]
[ null ]
[ 9 ]
[ 34 ]
2024-11-18T19:07:49.287463+00:00
1,535,115,115,000
9556e3db4513c02b911be7ba1bf20912dc249c13
2
{ "blob_id": "9556e3db4513c02b911be7ba1bf20912dc249c13", "branch_name": "refs/heads/master", "committer_date": 1535115115000, "content_id": "f72aed9d327e72295b43763c2797eac876625233", "detected_licenses": [ "MIT" ], "directory_id": "11d3f0fcf4a968a6b612f2b85d242cbbbabc7e07", "extension": "py", "fi...
2.3125
stackv2
import re import logging from aleph import settings from aleph.analyze.analyzer import EntityAnalyzer from aleph.model import DocumentTag log = logging.getLogger(__name__) class RegexAnalyzer(EntityAnalyzer): def extract_match(self, document, match): return match.group(0) def extract(self, collect...
62
26.71
102
16
519
python
[{"finding_id": "codeql_py/overly-large-range_6aa1cc4b39e709ea_1a2b804e", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-f\\].", "remediation": "", "lo...
4
true
[ "CWE-020", "CWE-020", "CWE-1333", "CWE-1333" ]
[ "py/overly-large-range", "py/overly-large-range", "py/redos", "py/redos" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-f\\].", "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-f\\].", "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '0:'.", "This part of the regu...
[ 46, 46, 46, 46 ]
[ null, null, null, null ]
[ 69, 83, 68, 78 ]
[ 72, 86, 78, 80 ]
2024-11-18T19:08:00.579973+00:00
1,622,819,357,000
7d11b9a2d85b67b047ea7c8109fdee92c27729f6
5
{ "blob_id": "7d11b9a2d85b67b047ea7c8109fdee92c27729f6", "branch_name": "refs/heads/main", "committer_date": 1622819357000, "content_id": "6f4e1812baf65f1c846c7214d9ac8cfe71bfc869", "detected_licenses": [ "MIT" ], "directory_id": "00ccb576a4e631382a2a2d9d308048d52f18b91f", "extension": "py", "file...
5.25
stackv2
#Hundredth Birthday Year: #For this execrcise I had to create a program that asks the user to enter their name and their age. #Print out a message addressed to them that tells them the year that they will turn 100 years old. #I imported date object from the python datetime library. #Used the built-in python method "...
24
55.29
139
9
338
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_eb43e7fa8a2028e5_45534890", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 24 ]
[ null ]
[ 7 ]
[ 102 ]
2024-11-18T19:08:01.284924+00:00
1,612,924,185,000
b8a6963f04361ee311be3ac4ccae313968428947
3
{ "blob_id": "b8a6963f04361ee311be3ac4ccae313968428947", "branch_name": "refs/heads/master", "committer_date": 1612924185000, "content_id": "6e39a61d55c031cbf7d59fe105cf22cd6d6503ae", "detected_licenses": [ "MIT" ], "directory_id": "77f30500024d989db874fbc219af973841b950ae", "extension": "py", "fi...
2.546875
stackv2
#!/usr/bin/env python3 import click import yaml from jinja2 import Environment, FileSystemLoader @click.command() @click.option('-v', '--varsfile', type=click.File('r'), multiple=True, help='vars file path for jinja2') @click.argument('template', type=click.Path(exists=True)) def cmd(template, varsfile...
28
21.07
70
14
144
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_0fd1f9e11b1a1999_64e79308", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 13 ]
[ null ]
[ 11 ]
[ 70 ]
2024-11-18T19:18:34.603193+00:00
1,616,087,824,000
83305249aea81bffb7e52820f573b287e2de4267
3
{ "blob_id": "83305249aea81bffb7e52820f573b287e2de4267", "branch_name": "refs/heads/master", "committer_date": 1616087824000, "content_id": "e0058d76eb0792011778038a14c4a059d682b0d8", "detected_licenses": [ "MIT" ], "directory_id": "722b0d6f4610640062e061e679e01a66ece8e81b", "extension": "py", "fi...
3.234375
stackv2
import requests import json import time class GooglePlaces(object): def __init__(self, apiKey): super(GooglePlaces, self).__init__() self.apiKey = apiKey # Text search URL # url = "https://maps.googleapis.com/maps/api/place/textsearch/json?" # Nearby search URL Example # https://...
109
34.22
131
13
860
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_eede86be30995566_8f90ee04", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 96 ]
[ null ]
[ 31 ]
[ 43 ]
2024-11-18T19:18:45.477652+00:00
1,600,587,360,000
bee40ae18bf023ab041c06505c272c76fa0d7d63
4
{ "blob_id": "bee40ae18bf023ab041c06505c272c76fa0d7d63", "branch_name": "refs/heads/master", "committer_date": 1600587360000, "content_id": "c624ad655d0ad4f6966d2bbedc530a9212c840fb", "detected_licenses": [ "MIT" ], "directory_id": "6175a78a5c4b4320dab30bc5de21dcc8de474756", "extension": "py", "fi...
3.765625
stackv2
def shout(fn): def wrapper(*args, **kwargs): return fn(*args, **kwargs).upper() return wrapper @shout def greet(name): return f"Hi, I'm {name}" @shout def order(name, dish): return f"Hi! I'm {name} and I would like to order {dish}." @shout def user(name, address, phone, gender): return...
24
18.88
62
12
153
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_af71d5aba089f358_670fb1cb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 24 ]
[ null ]
[ 7 ]
[ 49 ]
2024-11-18T19:29:45.813294+00:00
1,553,620,184,000
0894fadd8b951f0c8f8bd8f68ca73b2f991d4d1c
3
{ "blob_id": "0894fadd8b951f0c8f8bd8f68ca73b2f991d4d1c", "branch_name": "refs/heads/master", "committer_date": 1553620184000, "content_id": "494cc47e9e3bba0e16b4b04a71b66c450af1b979", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "f087bf63027a5d760a0eec4c671e7f571e72fbc8", "extension": "p...
2.953125
stackv2
import time import sys from Hasher import md5_hasher, sha_1_hasher, sha_224_hasher, sha_256_hasher, sha_384_hasher, sha_512_hasher from AdditionalComponents import spacereplace from ReportCreate import createcrackingreport def dictionary_attack(hash, dict_location, algorithm, output, start_time): print("\tStartin...
47
33.57
122
15
425
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6f161f4daf2f3aa5_89dae76f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 45 ]
[ null ]
[ 73 ]
[ 81 ]
2024-11-18T19:44:29.474119+00:00
1,479,168,861,000
d08b99bf74d57241f896bbb85f1e4a9cdb7710e0
2
{ "blob_id": "d08b99bf74d57241f896bbb85f1e4a9cdb7710e0", "branch_name": "refs/heads/master", "committer_date": 1479168861000, "content_id": "589843ea2b58ce5179576f770dbd1da373aefd63", "detected_licenses": [ "MIT" ], "directory_id": "8593ffabd126b0d06e9d2dc6094c60fb1fb9bf9b", "extension": "py", "fi...
2.359375
stackv2
#! /usr/bin/env python import boto3 import sys import jinja2 if len(sys.argv) < 4: print "usage: python render-manifest.py stack-id us-west-1 ./file" exit(1) stack_id = sys.argv[1] region = sys.argv[2] file_source = sys.argv[3] client = boto3.client('ec2', region_name=region) reservations = client.describ...
31
23.87
96
13
193
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_989d30dcecc75b17_2c670c64", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 30 ]
[ null ]
[ 11 ]
[ 36 ]
2024-11-18T19:57:58.582642+00:00
1,510,729,801,000
cc224b765a3cb96ff187b206a7fd3523fb6c29bb
3
{ "blob_id": "cc224b765a3cb96ff187b206a7fd3523fb6c29bb", "branch_name": "refs/heads/master", "committer_date": 1510729801000, "content_id": "0fe0c2227a511963f9834697f29662f3abad1162", "detected_licenses": [ "Apache-2.0" ], "directory_id": "58807951d4f5cec144be3c0893b4f73300227996", "extension": "py"...
2.5625
stackv2
""" Libraries for making archives. """ from __future__ import print_function __author__ = 'jlevy' import sys import os import tarfile import tempfile import itertools import logging as log from collections import namedtuple from functools32 import lru_cache # functools32 pip # The subprocess module has known thre...
160
32.19
112
20
1,395
python
[{"finding_id": "codeql_py/insecure-temporary-file_d0abaa9679cdd8aa_54184ea4", "tool_name": "codeql", "rule_id": "py/insecure-temporary-file", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated function tempfile.mktemp may be insecure.", "remediation": "", "location": ...
2
true
[ "CWE-377", "CWE-022" ]
[ "py/insecure-temporary-file", "py/tarslip" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Call to deprecated function tempfile.mktemp may be insecure.", "This file extraction depends on a [potentially untrusted source](1)." ]
[ 132, 91 ]
[ null, null ]
[ 58, 5 ]
[ 75, 7 ]
2024-11-18T19:58:02.912204+00:00
1,609,642,871,000
fbef5e79fa208836275795141db90a63a20577d1
3
{ "blob_id": "fbef5e79fa208836275795141db90a63a20577d1", "branch_name": "refs/heads/main", "committer_date": 1609642871000, "content_id": "b99640751c4e27a2b6e0ed151b7b35a2bf3b8130", "detected_licenses": [ "MIT" ], "directory_id": "d024c97ea155bbe2a4060217f4aa2c6f98fc57ef", "extension": "py", "file...
3.359375
stackv2
# This is a server import blowfish import random import ecdsa class Server(): def __init__(self, ec): """ This function is a constructor that initializes simulated variables username and hashed password. """ self.ec = ec self.simulation_username = "dima" s...
106
35.9
108
13
861
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a0963c5bb14242af_077cef25", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 50 ]
[ null ]
[ 48 ]
[ 56 ]
2024-11-18T19:58:13.090585+00:00
1,555,769,974,000
cd6362c4d6337c067e7d5305752da089226bf636
2
{ "blob_id": "cd6362c4d6337c067e7d5305752da089226bf636", "branch_name": "refs/heads/master", "committer_date": 1555769974000, "content_id": "57a1b64b0a0c5a7c8821351aa97e68a38e44bb7c", "detected_licenses": [ "MIT" ], "directory_id": "dcd4dd4024e7f0c9542a4d7620e83e07dbb9de2b", "extension": "py", "fi...
2.46875
stackv2
""" Generate docs """ from jinja2 import Template import subprocess def generate(host, port, database): # read config template with open("bin/schemaspy-template.properties", "r") as inpfile: template = Template(inpfile.read()) rendered_config = template.render( host=host, port=po...
22
30.68
84
13
159
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_ae93d4a3a9af8257_a7deec4b", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 12 ]
[ null ]
[ 20 ]
[ 44 ]