added
stringlengths
32
32
created
int64
1,244B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.25
source
stringclasses
1 value
text
stringlengths
324
20.1k
num_lines
int64
16
598
avg_line_length
float64
15.1
58.3
max_line_length
int64
33
179
ast_depth
int64
8
39
length
int64
101
3.8k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.1k
265k
sast_codeql_findings_count
int64
1
45
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
45
rule_ids
listlengths
1
45
confidences
listlengths
1
45
severities
listlengths
1
45
messages
listlengths
1
45
line_starts
listlengths
1
45
line_ends
listlengths
1
45
column_starts
listlengths
1
45
column_ends
listlengths
1
45
2024-11-19T03:44:27.101216+00:00
1,596,234,293,000
7c7033fd84b5b4bd389784222a90cdb16e57cbf5
3
{ "blob_id": "7c7033fd84b5b4bd389784222a90cdb16e57cbf5", "branch_name": "refs/heads/master", "committer_date": 1596234293000, "content_id": "5d92f1e69210f05e9bc03d6fa7677f1f7563833a", "detected_licenses": [ "MIT" ], "directory_id": "53b2703e78adc3f16f3b20abfc03dc603a329afd", "extension": "py", "fi...
2.953125
stackv2
#!/usr/env/bin/python import sys import socket import paramiko def getStatus(): ip='' port= username='' password='' cmd='ls' ssh=paramiko.SSHClient() ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy()) ssh.connect(ip,port,username,password) stdin,stdout,stderr=ssh.exec_command(...
44
23.36
61
10
262
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_5635b04158570b69_52175b60", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 12 ]
[ null ]
[ 5 ]
[ 62 ]
2024-11-19T02:08:37.974509+00:00
1,573,156,043,000
006211e72517ce9172770e0e6eed59e532b2f4a3
4
{ "blob_id": "006211e72517ce9172770e0e6eed59e532b2f4a3", "branch_name": "refs/heads/master", "committer_date": 1573156043000, "content_id": "fe6a93b88a3d340f7113d39c97b2218f3f8afefe", "detected_licenses": [ "MIT" ], "directory_id": "d8d55793c7b2ab75c9d57147fcfb4610d2e25f67", "extension": "py", "fi...
3.890625
stackv2
#! /usr/bin/python #-*- coding:utf-8 -*- # # Jose Carlos Muñoz Ramirez. # al15211330.AT.ite.DOT.edu.DOT.mx # Libraries. from decimal import * import random import os # Generates pseudo-random numbers using "Multiplicative congruential method". def CardGenerator(seed, a, m): # xn it's a changing value of new seeds t...
137
19.48
88
16
836
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e26e9ac7be668cbc_4dc9ee87", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 106 ]
[ null ]
[ 9 ]
[ 32 ]
2024-11-19T02:58:04.540055+00:00
1,460,934,086,000
9b30c9b085626d1778e3faf186c9c115076dd831
3
{ "blob_id": "9b30c9b085626d1778e3faf186c9c115076dd831", "branch_name": "refs/heads/master", "committer_date": 1460934086000, "content_id": "5e572841a6241cc6dd4563471f2fe2ecaacea21f", "detected_licenses": [ "Apache-2.0" ], "directory_id": "2540eb81f1cd615611e2a5a9d7ba069df822b56a", "extension": "py"...
2.796875
stackv2
""" Copyright 2015 Zalando SE Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distrib...
60
38.05
120
15
498
python
[{"finding_id": "codeql_py/log-injection_d4bb87f83baf5bbc_6f496ea4", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
2
true
[ "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 34, 44 ]
[ null, 46 ]
[ 60, 74 ]
[ 111, 86 ]
2024-11-19T02:58:16.982598+00:00
1,622,265,727,000
0ecf402fb48de5143d08e6af6bf3de958fb7cee4
3
{ "blob_id": "0ecf402fb48de5143d08e6af6bf3de958fb7cee4", "branch_name": "refs/heads/main", "committer_date": 1622265727000, "content_id": "4d2f6f386a30ba62e37959a8e9b95c903ef51dbb", "detected_licenses": [ "MIT" ], "directory_id": "6bf0a8d3f915b21d0afa24f928d1543dc2a7574d", "extension": "py", "file...
3.34375
stackv2
# update the fucntions to count number of number(whole, decimal and fractions) # in article.txt # use regex to match numbers and fractions import re frac_pattern = r'(-?\d+\\tinyfrac{\d+}{\d+}[^A-Za-z]|-?\\frac{\d+}{\d+}[^A-Za-z])' number_pattern = r"([^\na-zA-Z{./\\}]\d+ |\d+\.\d+|\d+[^\n/:\\)-}])" numbers = [] fract...
50
25.42
82
11
348
python
[{"finding_id": "codeql_py/overly-large-range_2bb83fa4b6c15ae7_e297b9f4", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[)*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_`a-z{{|}}\\]...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[)*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_`a-z{{|}}\\]." ]
[ 6 ]
[ null ]
[ 63 ]
[ 66 ]
2024-11-19T03:10:03.570603+00:00
1,591,559,992,000
dc691a52e333f9a4f2257bd8e9c3b26c08781460
3
{ "blob_id": "dc691a52e333f9a4f2257bd8e9c3b26c08781460", "branch_name": "refs/heads/master", "committer_date": 1591559992000, "content_id": "230ca6e0df053c519998819182a9382daaf6298f", "detected_licenses": [ "MIT" ], "directory_id": "9473d3f1c6ad6ab97c63fd28f32ab38a6714fe16", "extension": "py", "fi...
2.625
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- """ Downloads MRI data and mask for CorpusCallosum and prepares it. Data is located in the IntroToDeepLearning repository by Robert Brown https://github.com/robb-brown/IntroToDeepLearning """ import os import glob import urllib.request import nilearn as nilearn import ta...
84
23.69
115
13
616
python
[{"finding_id": "codeql_py/tarslip_ea77268b6ea2230e_748ebb49", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 33 ]
[ null ]
[ null ]
[ 4 ]
2024-11-19T03:10:03.619949+00:00
1,602,580,708,000
cdf4fb722ca59d4434c90fc648a8752c6ede7f65
4
{ "blob_id": "cdf4fb722ca59d4434c90fc648a8752c6ede7f65", "branch_name": "refs/heads/main", "committer_date": 1602580708000, "content_id": "959f836ffab0a7f716abf6a9d0ce25f88fb1799d", "detected_licenses": [ "MIT" ], "directory_id": "3ef7c1abab57d5b92cd39284a30f9468a3e1098a", "extension": "py", "file...
3.5625
stackv2
import random import string user = [] details = [] class Credentials: """ Class that generates new instances of user credentials. """ def __init__ (self, site_name, user_name, password): self.site_name = site_name self.user_name = user_name self.password = password d...
151
27.46
141
20
902
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d47d626c75873993_2ba96624", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 116 ]
[ null ]
[ 53 ]
[ 65 ]
2024-11-19T03:10:28.302241+00:00
1,525,272,384,000
f572b4cbad5aa68016fddd2c1249dbb20c6ffcc6
4
{ "blob_id": "f572b4cbad5aa68016fddd2c1249dbb20c6ffcc6", "branch_name": "refs/heads/master", "committer_date": 1525272384000, "content_id": "fddc56c691ca1fb20ea035bdde4ba560df7773c8", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e6d36d0763b9fc5771de6238db05cc1f080c0ca4", "extension": "py"...
3.53125
stackv2
# gogetit.py # Given a filename that point to a excelfile on disk. Try to get the password for the Excel file. # Use either a wordlist or generate a sequence of letters / numbers from zipfile import ZipFile def scan_zip_passwords(filename='evil.zip', wordlist='dictionary.txt', verbose=False): with ZipFile(filena...
30
28.4
97
19
186
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6d8d86d4814ca444_27b0371f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 15 ]
[ null ]
[ 27 ]
[ 55 ]
2024-11-19T03:10:35.020220+00:00
1,617,821,656,000
499d956e3b130b9d6f15baa451c048f41cd5640c
2
{ "blob_id": "499d956e3b130b9d6f15baa451c048f41cd5640c", "branch_name": "refs/heads/master", "committer_date": 1617821656000, "content_id": "2d3ceaee5f83654ccc8430a901f92abf19b92362", "detected_licenses": [ "MIT" ], "directory_id": "fa42591d173e80eddc78b093a630ebffa58a6574", "extension": "py", "fi...
2.40625
stackv2
import inspect import os from jinja2 import Environment, FileSystemLoader from parse import parse from requests import Session as RequestsSession from webob import Request from whitenoise import WhiteNoise from wsgiadapter import WSGIAdapter as RequestsWSGIAdapter from .middleware import Middleware from .response imp...
115
31.9
84
19
723
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_78cb131666b6ca6e_fc572fd3", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 19 ]
[ 21 ]
[ 30 ]
[ 10 ]
2024-11-19T03:22:33.255536+00:00
1,487,422,114,000
876bfec4023df67d6da0971651e72d1559491c95
3
{ "blob_id": "876bfec4023df67d6da0971651e72d1559491c95", "branch_name": "refs/heads/master", "committer_date": 1487422114000, "content_id": "39a91305a9ebc7132fd667c7380cbd03a74b7cb3", "detected_licenses": [ "MIT" ], "directory_id": "e493939778661ebef10141a6bad1670c86498e29", "extension": "py", "fi...
2.78125
stackv2
import re import os from os.path import join from urlparse import urlparse from pyquery import PyQuery as q import tinycss def ruleset_as_dict(ruleset): out = {} for decl in ruleset.declarations: value = decl.value.as_css() # eg '5px 2px' or 'url(foo.git) no-repeat top right' out[decl.name] = ...
191
30.65
96
17
1,398
python
[{"finding_id": "codeql_py/overly-large-range_459fd7ece75dc984_b504e864", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\w in the same character class.", "remediation": "", "loc...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with \\w in the same character class." ]
[ 70 ]
[ null ]
[ 43 ]
[ 46 ]
2024-11-19T03:22:41.744595+00:00
1,576,950,085,000
98568b1af656177ed084c8689ef36dfb74de3fc1
4
{ "blob_id": "98568b1af656177ed084c8689ef36dfb74de3fc1", "branch_name": "refs/heads/master", "committer_date": 1576950085000, "content_id": "015fe6da84593b1de26843c662bef6176277ecbf", "detected_licenses": [ "MIT" ], "directory_id": "3331fe3bf3e1d8e62dcbb38874bbafd26cc0931b", "extension": "py", "fi...
3.921875
stackv2
''' --- Part Two --- An Elf just remembered one more important detail: the two adjacent matching digits are not part of a larger group of matching digits. Given this additional criterion, but still ignoring the range rule, the following are now true: 112233 meets these criteria because the digits never decrease and a...
70
32.39
133
13
572
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_22d441138d18046c_67c09419", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text." ]
[ 66 ]
[ null ]
[ 11 ]
[ 91 ]
2024-11-19T03:22:46.263943+00:00
1,526,723,543,000
875d4d7aa8b14bc6b107872aab8a47f2f4bf215e
3
{ "blob_id": "875d4d7aa8b14bc6b107872aab8a47f2f4bf215e", "branch_name": "refs/heads/master", "committer_date": 1526723543000, "content_id": "8eee01b6c720b2ec9aec73f7eed9fa0190fb469c", "detected_licenses": [ "MIT" ], "directory_id": "541ec83ef9a5804c9bd83546ad849b54483a8c1b", "extension": "py", "fi...
2.671875
stackv2
from flask import Flask, redirect, url_for, render_template, request, send_from_directory, send_file app = Flask(__name__) app.config['DEBUG'] = True @app.route("/users") def index(): return "Users Content" #@app.route("/users/<string:username>") #exclude forward slashes @app.route("/users/<username>") def show_...
34
24.44
100
10
223
python
[{"finding_id": "codeql_py/reflective-xss_2f6439f924cbaf64_00ecfcdf", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
4
true
[ "CWE-079", "CWE-079", "CWE-079", "CWE-079" ]
[ "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability due to a [user-provided value](2).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scriptin...
[ 14, 18, 27, 31 ]
[ null, null, null, null ]
[ 12, 12, 12, 12 ]
[ 35, 45, 39, 39 ]
2024-11-19T03:23:01.547821+00:00
1,474,472,072,000
cd77b81b9ed1713eb799642fd0edbeacc5159955
3
{ "blob_id": "cd77b81b9ed1713eb799642fd0edbeacc5159955", "branch_name": "refs/heads/master", "committer_date": 1474472072000, "content_id": "28bed17e2a1b5765c9823b3eab183bd3385a3067", "detected_licenses": [ "MIT" ], "directory_id": "44ba172a2f67741c3894ed0be2f4df167c08ff1c", "extension": "py", "fi...
2.65625
stackv2
import datetime import os import random import requests import subprocess import time import traceback import twitter RATE = 60 * 30 FLICKR_API_KEY = None TWITTER_CONSUMER_KEY = None TWITTER_CONSUMER_SECRET = None TWITTER_ACCESS_TOKEN_KEY = None TWITTER_ACCESS_TOKEN_SECRET = None MODE_NAMES = [ 'primitives', ...
133
25.37
73
12
968
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_fa8f4d1964c44bcf_74ae7677", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive data (secret)](2) as clear text." ]
[ 63 ]
[ null ]
[ 18 ]
[ 27 ]
2024-11-19T03:43:58.858655+00:00
1,585,424,906,000
6c7ad3de86c7b2e43d4adef194f637e463c53779
3
{ "blob_id": "6c7ad3de86c7b2e43d4adef194f637e463c53779", "branch_name": "refs/heads/master", "committer_date": 1585424906000, "content_id": "e959a60e377e0f03bea050857530c07b511c506a", "detected_licenses": [ "MIT" ], "directory_id": "d5415355135264f940c9fe48793e604de2f60636", "extension": "py", "fi...
2.515625
stackv2
"""To use this script, install the provided requirements.txt file and supply a secrets.py file with the required parameters listed below. JSON records will be written into the specified file and HTML reports will be written into an outputs filter under the provided directory. """ from datetime import datetime, timed...
301
31.33
109
18
2,308
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_b17a8926eaef0fa3_f908201c", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 207 ]
[ null ]
[ 16 ]
[ 34 ]
2024-11-19T03:44:11.626770+00:00
1,601,497,926,000
4dff5a5e0445ee9560036cc0a1dbed7b5d831d00
3
{ "blob_id": "4dff5a5e0445ee9560036cc0a1dbed7b5d831d00", "branch_name": "refs/heads/master", "committer_date": 1601497926000, "content_id": "6bf191844933521032b0746d3f0d085473ed924d", "detected_licenses": [ "MIT" ], "directory_id": "fb6b2fa4a88798563afd25b6cd97019bce2228db", "extension": "py", "fi...
2.515625
stackv2
import http.server import os import urllib.request import contextlib import socket import sys import webbrowser class DualStackServer(http.server.ThreadingHTTPServer): def server_bind(self): # suppress exception when protocol is IPv4 with contextlib.suppress(Exception): self.socket.set...
70
29.46
80
17
490
python
[{"finding_id": "codeql_py/partial-ssrf_0d67ee053916f23a_8b647ebf", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depen...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depends on a [user-provided value](2).\nPart of the URL of this request depends on a [user-provided value](3)." ]
[ 31 ]
[ null ]
[ 23 ]
[ 50 ]
2024-11-19T01:34:58.053422+00:00
1,555,674,627,000
16f07d78048f01ebd4183820be63b65caeb9eee5
3
{ "blob_id": "16f07d78048f01ebd4183820be63b65caeb9eee5", "branch_name": "refs/heads/master", "committer_date": 1555674627000, "content_id": "b9d455e756d7676c992f9a2faca808039cbfcb8e", "detected_licenses": [ "Apache-2.0" ], "directory_id": "c4d573ac2fd26a4fffcdb38c353a8265ebfb080d", "extension": "py"...
2.515625
stackv2
#!/usr/bin/python3 """ Python interface to Apache PDFBox. """ import hashlib import html.parser import os import pathlib import re import shutil import urllib.request import appdirs import pkg_resources import sarge from sarge import run, Capture pdfbox_archive_url = 'https://archive.apache.org/dist/pdfbox/' class...
272
42.28
132
22
2,325
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a96e50d315e5bdd9_0ee427b2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (p...
[ 179, 270 ]
[ null, null ]
[ 15, 15 ]
[ 18, 18 ]
2024-11-19T01:55:41.854148+00:00
1,560,693,382,000
9bdb10c3d2d9c45829f99bcd09f66e675edb0440
2
{ "blob_id": "9bdb10c3d2d9c45829f99bcd09f66e675edb0440", "branch_name": "refs/heads/master", "committer_date": 1560693382000, "content_id": "857943761d50061c99ebfa75c3459971a7ede4db", "detected_licenses": [ "MIT" ], "directory_id": "1346a973aa44fc65086b98358629bfb491d4f71a", "extension": "py", "fi...
2.3125
stackv2
import json import logging logger = logging.getLogger('django') from django import http from django.contrib.auth import login, authenticate, logout from django.db import DatabaseError from django.shortcuts import render, redirect import re # Create your views here. from django.urls import reverse from django.views im...
309
25.9
96
16
2,107
python
[{"finding_id": "codeql_py/url-redirection_1bbaeaffdd37e3e9_58e2e15e", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 176 ]
[ null ]
[ 33 ]
[ 37 ]
2024-11-19T02:08:03.595503+00:00
1,656,826,851,000
cce76ce0610332325ba462ceddc19e946f88c9db
3
{ "blob_id": "cce76ce0610332325ba462ceddc19e946f88c9db", "branch_name": "refs/heads/master", "committer_date": 1656827117000, "content_id": "226f8290984a696a0ba1af23bbb11b4a96b572e1", "detected_licenses": [ "MIT" ], "directory_id": "ab9a0585ebdb37a8dbc3f6d5d5cbdae8db517b17", "extension": "py", "fi...
2.546875
stackv2
#!/usr/bin/python3 import argparse import re import sys debug = False # debug = True endingBlockRegex = re.compile(r"^\s*([\[\]\{\},;]|</|-->|\*/)+\s*") startingBlockRegex = re.compile(r'^\s*(\n|#|/\*|//|/\*|<!--|@|template).*') modifiersRegex = re.compile(r"(public|static|abstract|private|final|const)\s*") continua...
169
32.15
109
22
1,257
python
[{"finding_id": "codeql_py/bad-tag-filter_d8301a3dd6d844d9_6962a12a", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression only parses --> and not --!> as a HTML comment end tag.", "remediation": "", "location":...
1
true
[ "CWE-116" ]
[ "py/bad-tag-filter" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression only parses --> and not --!> as a HTML comment end tag." ]
[ 9 ]
[ null ]
[ 33 ]
[ 66 ]
2024-11-19T02:17:16.876718+00:00
1,447,966,338,000
64a38713acb34868c0c3dddfc1f1f6e93880b5a8
4
{ "blob_id": "64a38713acb34868c0c3dddfc1f1f6e93880b5a8", "branch_name": "refs/heads/master", "committer_date": 1447966338000, "content_id": "ec4b2bd8684a5bf00ff4c0e40d37b75ba7248c74", "detected_licenses": [ "MIT" ], "directory_id": "f7f4f273405d5f7c3dda1a996cf1f7b8b06806b2", "extension": "py", "fi...
3.609375
stackv2
# Fallout password terminal challenge # intro message print(''' Welcome to the Fallout Terminal Management System. Details about the services offered by this Terminal are listed below. Have a nuclear day! Mushroom Corp. Security Systems. ==========================================...
112
33.34
122
17
971
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a2cbd7976253793d_7737957f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.\nThis expression logs [sensitive data (pas...
[ 70, 96 ]
[ null, null ]
[ 15, 15 ]
[ 95, 16 ]
2024-11-19T02:17:26.797135+00:00
1,439,144,945,000
ecf06f4a90829f8e6b5b486c50126922398db717
2
{ "blob_id": "ecf06f4a90829f8e6b5b486c50126922398db717", "branch_name": "refs/heads/master", "committer_date": 1439144945000, "content_id": "31366e3b12b29228b852c42455d8aa477e1f3470", "detected_licenses": [ "MIT" ], "directory_id": "a392e8642663ece07dd818ca3ec3ad7b31583efc", "extension": "py", "fi...
2.484375
stackv2
import requests import Image import StringIO from flask import Flask, jsonify, render_template, request,Blueprint index = Blueprint(__name__, __name__,template_folder='templates',static_folder='static') def getimage(isbn): import requests import Image import StringIO outfile=StringIO.StringIO() x=requests.ge...
25
26.4
95
12
200
python
[{"finding_id": "codeql_py/partial-ssrf_a42771dd5873c23f_3e8bc210", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 12 ]
[ null ]
[ 5 ]
[ 88 ]
2024-11-19T02:18:12.612728+00:00
1,542,152,988,000
97d4c9335ed1c7e35711fd41edb4095b40cc6926
3
{ "blob_id": "97d4c9335ed1c7e35711fd41edb4095b40cc6926", "branch_name": "refs/heads/master", "committer_date": 1542152988000, "content_id": "4c914c128885717809af23815b2240bb13cbcadf", "detected_licenses": [ "MIT" ], "directory_id": "0e3bab212a2e993a0bc8b5182efc6df888cb660b", "extension": "py", "fi...
2.90625
stackv2
'''ssh client use with, or finally close See https://daanlenaerts.com/blog/2016/07/01/python-and-ssh-paramiko-shell/ https://stackoverflow.com/questions/39606573/unable-to-kill-python-script ''' import threading import paramiko class Ssh: '''communicate with miner through ssh''' shell = None client = None ...
85
33.67
106
17
642
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_9cb75ae514f59dc4_9989bfc8", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 23 ]
[ null ]
[ 9 ]
[ 81 ]
2024-11-19T02:18:13.516522+00:00
1,591,940,438,000
42b4c22aa6473c18e0e59421efbf27d957e62683
3
{ "blob_id": "42b4c22aa6473c18e0e59421efbf27d957e62683", "branch_name": "refs/heads/master", "committer_date": 1591940438000, "content_id": "812d6ddfcc2deebbe1da343cca625f7472510340", "detected_licenses": [ "Apache-2.0" ], "directory_id": "28e171e27c3d7cc4ababbb2672c223ce3a9728c0", "extension": "py"...
2.640625
stackv2
# encoding=utf8 # 文件上传,上传文件在同一目录中 import requests files = {"file": open("time.jpg", "rb")} r = requests.post("http://httpbin.org/post", files=files) print(r.text) # cookies import requests r = requests.get("https://www.baidu.com") print(r.cookies) for key,value in r.cookies.items(): print(key + "=" + value) # ...
129
21.09
90
10
914
python
[{"finding_id": "codeql_py/request-without-cert-validation_71ccb80f25b28235_307d80b1", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 52 ]
[ null ]
[ 12 ]
[ 62 ]
2024-11-19T02:18:14.303872+00:00
1,604,595,164,000
fc49b76f46ff586d78e7a150f0af1c8d48ad171a
4
{ "blob_id": "fc49b76f46ff586d78e7a150f0af1c8d48ad171a", "branch_name": "refs/heads/master", "committer_date": 1604595164000, "content_id": "3aa9d1bfb407272cbf145db8ea5e408320367fb2", "detected_licenses": [ "MIT" ], "directory_id": "e32ab58be95da77c4974cfa816496ce4760c7706", "extension": "py", "fi...
3.921875
stackv2
""" Demonstrator appplication for GPS API """ import sys import gps_api # global variables name = "" port = "" GPS = None destination = () def welcome(): """ welcome message and prompt the user to enter the user name and the port name to which the GPS module is attached on the computer """ global...
125
28.74
97
16
813
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7b0670dade6e539d_f21df5f7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 57, 72 ]
[ null, null ]
[ 16, 20 ]
[ 96, 92 ]
2024-11-19T02:29:52.367764+00:00
1,622,855,206,000
e92c51bc5dacf2004922231dcf5192b25bcedb8f
3
{ "blob_id": "e92c51bc5dacf2004922231dcf5192b25bcedb8f", "branch_name": "refs/heads/master", "committer_date": 1622855206000, "content_id": "c7cbb7900ddc3d3075d12e3fedfe222f7cbc5b65", "detected_licenses": [ "MIT" ], "directory_id": "85b6330745d730fb9c80f697ba828111f1dba984", "extension": "py", "fi...
3.15625
stackv2
import sqlite3 import hashing from cryptography.fernet import Fernet import sys class Database: def __init__(self): self.conn = sqlite3.connect('database.db') self.cursor = self.conn.cursor() def createTable(self): try: self.cursor.execute('''CREATE TABLE passwords...
86
32.53
132
15
558
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_cf4e8a6fa36be5f9_d1a184ff", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 79 ]
[ null ]
[ 19 ]
[ 97 ]
2024-11-19T02:29:53.906315+00:00
1,621,982,265,000
129bd078ab64283f43cbbd90ce6f0620355c6ee8
3
{ "blob_id": "129bd078ab64283f43cbbd90ce6f0620355c6ee8", "branch_name": "refs/heads/master", "committer_date": 1621982265000, "content_id": "35fee1ebd10addf2764c7811a972f16b71b444b6", "detected_licenses": [ "MIT" ], "directory_id": "638c7d7c45ba8d5f7f37aa6aec8ca3a5f8e43b92", "extension": "py", "fi...
2.984375
stackv2
import re import requests as requests from bs4 import BeautifulSoup from requests.exceptions import SSLError, ConnectionError class VesselFinderScraper: def get_page(self, url, counter=10, dynamic_verification=True): """ Content retriever :param dynamic_verification: try without SSL verif...
78
34.32
148
19
687
python
[{"finding_id": "codeql_py/request-without-cert-validation_2e2c20e3ba227158_6d095a6c", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1) by [this value](2)." ]
[ 25 ]
[ null ]
[ 28 ]
[ 89 ]
2024-11-19T02:30:09.849498+00:00
1,605,179,077,000
b9d9d9daf0e9741fe6a179c33fe08933b67703a4
3
{ "blob_id": "b9d9d9daf0e9741fe6a179c33fe08933b67703a4", "branch_name": "refs/heads/main", "committer_date": 1605179077000, "content_id": "3cb30c4823dca5d6ab3997c6edc25d76538bfda0", "detected_licenses": [ "MIT" ], "directory_id": "8ee14b8fcbb8468469682fb6a1cbc818b3902c7a", "extension": "py", "file...
3.234375
stackv2
import streamlit as st import requests, io import matplotlib.pyplot as plt from PIL import Image import numpy as np CHOICES = {1: "Upload an image.", 2: "Enter a Image url"} def format_func(option): return CHOICES[option] def file_uploader(): st.markdown("**How do you want to upload the image ?**") ...
44
30.8
101
16
322
python
[{"finding_id": "codeql_py/full-ssrf_57202cdafded58c2_29b652d9", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
1
true
[ "CWE-918" ]
[ "py/full-ssrf" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1)." ]
[ 38 ]
[ null ]
[ 28 ]
[ 45 ]
2024-11-19T02:30:11.293621+00:00
1,590,095,391,000
5e13db9adec4ff6cb5119f1a40207cbc0f362bb8
2
{ "blob_id": "5e13db9adec4ff6cb5119f1a40207cbc0f362bb8", "branch_name": "refs/heads/master", "committer_date": 1590095391000, "content_id": "43e9e81340cf2fa33732f905a5b275179b1ed378", "detected_licenses": [ "MIT" ], "directory_id": "af5e8c163bd1683fc2a52869feb37a183d885e0e", "extension": "py", "fi...
2.40625
stackv2
from flask import Blueprint, request from vvs.libs import folders_setup, image_capture, image_compare from vvs.libs.storage import GoogleClient import os from datetime import datetime # need to config this BASE_DIR = 'base' DIFFERENCES_DIR = 'differences' TARGETS_DIR = 'targets' DEFAULT_RESOLUTION = (1024, 768) SCR...
215
35.82
98
17
1,563
python
[{"finding_id": "codeql_py/reflective-xss_c30bb37841ecc4e2_665b95c2", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 115, 211 ]
[ null, null ]
[ 16, 16 ]
[ 41, 41 ]
2024-11-19T02:30:18.052727+00:00
1,558,016,124,000
8250d8d04888fca5c1eb523ab5901672fbcd313b
4
{ "blob_id": "8250d8d04888fca5c1eb523ab5901672fbcd313b", "branch_name": "refs/heads/master", "committer_date": 1558016124000, "content_id": "688761aa98c2c05f9c0051faa30e8195a4f407c4", "detected_licenses": [ "MIT" ], "directory_id": "1d7be9d6cf8fbe8b56f384e4d9596e1ada2aab9a", "extension": "py", "fi...
3.546875
stackv2
import json import urllib import urllib2 def read_api_key(key_file_name): """ Reads the API key from a file called key_file_name. Returns either None (no key found), or a string representing the key. Remember: put *.key in your .gitignore file to avoid committing it! """ # See Python Anti-Patte...
85
30.41
109
16
606
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7ac9fb7b9bb1d44e_cdf86bb4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 53 ]
[ null ]
[ 15 ]
[ 25 ]
2024-11-19T02:41:50.416413+00:00
1,540,004,197,000
a91861d4353253d4b9439992a132edf10fbe64af
3
{ "blob_id": "a91861d4353253d4b9439992a132edf10fbe64af", "branch_name": "refs/heads/master", "committer_date": 1540004197000, "content_id": "a67affd5d6c3b9130b36f34371cb347810e0c812", "detected_licenses": [ "MIT" ], "directory_id": "19f0913c565bfc2141fe8b2d46473d1c289da1c0", "extension": "py", "fi...
2.671875
stackv2
#!/usr/local/bin/python # -*- coding: utf-8 -*- from flask import Flask, jsonify, request from influxdb import InfluxDBClient from apscheduler.schedulers.background import BackgroundScheduler from pytz import timezone from datetime import datetime import json import numpy as np from sklearn import datasets,svm from sk...
136
25.96
89
15
1,046
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a637ecaf9c1f17ae_f1ef9b04", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
3
true
[ "CWE-312", "CWE-215", "CWE-079" ]
[ "py/clear-text-logging-sensitive-data", "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 124, 136, 131 ]
[ null, null, null ]
[ 44, 5, 12 ]
[ 52, 51, 21 ]
2024-11-19T02:41:57.000134+00:00
1,693,300,805,000
a385b808cc0562304294aeb51341da15341992cc
3
{ "blob_id": "a385b808cc0562304294aeb51341da15341992cc", "branch_name": "refs/heads/master", "committer_date": 1693300805000, "content_id": "601422ee4766ddfbdefc0870b3e57e57efbd0d48", "detected_licenses": [ "MIT" ], "directory_id": "97884252481ff208519194ecd63dc3a79c250220", "extension": "py", "fi...
3.046875
stackv2
""" TODO: write doc """ __title__ = "FITS utilities" import logging import re from typing import Union, Any, cast, Optional, List, Callable, Dict import numpy as np from astropy.io import fits from numpy.typing import NDArray from pyobs.utils.time import Time log = logging.getLogger(__name__) def fitssec(hdu: Any...
288
27.88
113
20
1,927
python
[{"finding_id": "codeql_py/redos_e3cb2b61394b4ae4_57408ef2", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '{{-|-' and containing many repeti...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '{{-|-' and containing many repetitions of '-'." ]
[ 113 ]
[ null ]
[ 75 ]
[ 84 ]
2024-11-19T02:50:45.816526+00:00
1,500,875,372,000
ec3c5219086bc9934b4624a2d839b9492e85e8c4
4
{ "blob_id": "ec3c5219086bc9934b4624a2d839b9492e85e8c4", "branch_name": "refs/heads/master", "committer_date": 1500875372000, "content_id": "9215d36d88b9933307f50a65b3dc1bcdc51baf60", "detected_licenses": [ "Apache-2.0" ], "directory_id": "913409d550fd5341dc0241c2a46d8965ead69cca", "extension": "py"...
4.375
stackv2
''' Created on 2017. 4. 7. @author: Byoungho Kang ''' def sayHello(name): greeting = "Hello " + name + "." return greeting def noReturn(): print("This function doesn't have return.") def keywordArgs(name, age): print("Hello! I'm", name + ",", age, "years old.") def defaultArgs(name, age, nation...
45
27.2
80
15
359
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4206293ac01af57c_91aea36c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 18 ]
[ null ]
[ 62 ]
[ 73 ]
2024-11-18T18:05:55.779824+00:00
1,584,427,146,000
5c75bea7b7013b47e2f77e92e247f5dd6277c29b
3
{ "blob_id": "5c75bea7b7013b47e2f77e92e247f5dd6277c29b", "branch_name": "refs/heads/master", "committer_date": 1584427146000, "content_id": "76fff056c9623d343dd7ccc86ef917c7a5a85aa2", "detected_licenses": [ "MIT" ], "directory_id": "b16440e1a6ad52d7bb7c88fb2a90df376be63f0b", "extension": "py", "fi...
2.546875
stackv2
""" Preprocess PubMed abstracts or MIMIC-III reports """ import re import pandas as pd import os df = pd.read_csv('../mimic3/NOTEEVENTS.csv') df.CHARTDATE = pd.to_datetime(df.CHARTDATE) df.CHARTTIME = pd.to_datetime(df.CHARTTIME) df.STORETIME = pd.to_datetime(df.STORETIME) df2 = df[df.SUBJECT_ID.notnull()] df2 = df2[...
57
26.12
75
13
445
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f5ded786a107b357_f40c3823", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 41 ]
[ null ]
[ 19 ]
[ 62 ]
2024-11-18T18:05:55.885917+00:00
1,611,272,904,000
f429d0365daaebad625ea1dfae184af730a21371
2
{ "blob_id": "f429d0365daaebad625ea1dfae184af730a21371", "branch_name": "refs/heads/master", "committer_date": 1611272904000, "content_id": "b797a969916e91f98698a456aff32874d683c2b6", "detected_licenses": [ "MIT" ], "directory_id": "f73bf3b6c63327a573dd421c3ed55621409489b6", "extension": "py", "fi...
2.375
stackv2
# Create your tasks here from __future__ import absolute_import, unicode_literals from .models import * from celery import shared_task from celery.task import periodic_task from datetime import datetime, timedelta import requests import re import json #@periodic_task(run_every=(timedelta(seconds=30)), name='hello_wor...
100
33.33
116
17
649
python
[{"finding_id": "codeql_py/request-without-cert-validation_2c3b7d987f247f7d_91c26674", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 54, 62 ]
[ null, null ]
[ 17, 17 ]
[ 76, 88 ]
2024-11-18T18:06:02.852282+00:00
1,515,119,651,000
edadb47d1fe7b48801a19ee61076cf1ba949424e
2
{ "blob_id": "edadb47d1fe7b48801a19ee61076cf1ba949424e", "branch_name": "refs/heads/master", "committer_date": 1515120136000, "content_id": "3bab99574507ff510dd6aa31bfab68a926b0783a", "detected_licenses": [ "MIT" ], "directory_id": "a9c11e10e9388978e3127c52013562c2e6a088a6", "extension": "py", "fi...
2.328125
stackv2
import logging import httplib import requests from werkzeug.exceptions import Unauthorized from flask import request, escape from flask_restful import abort from drift.auth import get_provider_config from base64 import urlsafe_b64encode from drift.core.extensions.schemachecker import check_schema log = logging.getL...
168
29.73
110
15
1,247
python
[{"finding_id": "codeql_py/log-injection_f0022da9c2dfbb9b_28c895c1", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
2
true
[ "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 85, 157 ]
[ null, null ]
[ 78, 81 ]
[ 84, 88 ]
2024-11-18T18:16:04.272968+00:00
1,430,423,954,000
6f4af6760ca24e78dca26ea0ca4888329f72bf99
3
{ "blob_id": "6f4af6760ca24e78dca26ea0ca4888329f72bf99", "branch_name": "refs/heads/master", "committer_date": 1430423954000, "content_id": "c756e803070cb04bcd142909d6c143b8be08399e", "detected_licenses": [ "MIT" ], "directory_id": "39acccb413d099975dc46e724ac3bfa0b6b66bc7", "extension": "py", "fi...
2.734375
stackv2
import os, errno, sqlite3 from uuid import uuid4 from cPickle import dumps, loads from collections import MutableMapping from flask.sessions import SessionInterface, SessionMixin class SqliteSession(MutableMapping, SessionMixin): _create_sql = ( 'CREATE TABLE IF NOT EXISTS session ' '(' ...
140
32.51
65
17
1,047
python
[{"finding_id": "codeql_py/path-injection_b2124486609215e9_4132856c", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 28 ]
[ null ]
[ 31 ]
[ 40 ]
2024-11-18T18:16:10.107591+00:00
1,635,992,483,000
c800d05c646bcd4c1485f14a75d7ac135cd08a22
2
{ "blob_id": "c800d05c646bcd4c1485f14a75d7ac135cd08a22", "branch_name": "refs/heads/main", "committer_date": 1635992483000, "content_id": "1e1fa44f9d038a2b7d8eab97e50f935542ec0c68", "detected_licenses": [ "MIT" ], "directory_id": "19beefabc166ebbd4344078373b4b65a4d337014", "extension": "py", "file...
2.375
stackv2
import json import requests from loguru import logger class CVE_2021_22214(): @logger.catch(level='ERROR') def __init__(self): self.headers = {"Content-Type": "application/json"} self.api = '/api/v4/ci/lint' @logger.catch(level='ERROR') def poc(self, url: str, dnshost: str = ''): ...
29
32.86
111
16
285
python
[{"finding_id": "codeql_py/request-without-cert-validation_72699753934911f6_3e21bdda", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 18 ]
[ null ]
[ 16 ]
[ 112 ]
2024-11-18T19:31:06.919118+00:00
1,555,364,142,000
1334663fb54a53e9d398c2be2ae3f122da02d059
3
{ "blob_id": "1334663fb54a53e9d398c2be2ae3f122da02d059", "branch_name": "refs/heads/master", "committer_date": 1555364142000, "content_id": "154f2959391d1b0841c0149834719ff502a271a9", "detected_licenses": [ "MIT" ], "directory_id": "54d770236feef3df5615f5a9c1679a30056207c6", "extension": "py", "fi...
3.1875
stackv2
#!/usr/bin/env python import numpy as np from datetime import datetime, timedelta from math import sqrt, atan, asin, acos, sin, cos, radians from collections import namedtuple class TideModel(): def __init__(self): self.name = 'Model' self.results = namedtuple("results", ["model_time", "gravity_...
166
47.93
141
19
2,664
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_55e8cc8ae28f6145_6ab6a3e7", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.", "This expression stores [sensitive data (private)](1) as clear text." ]
[ 154, 155 ]
[ null, null ]
[ 17, 17 ]
[ 57, 59 ]
2024-11-18T19:31:08.543216+00:00
1,499,991,443,000
5e9014bd4edcd7a5106ec223d535bd7a357dbffd
3
{ "blob_id": "5e9014bd4edcd7a5106ec223d535bd7a357dbffd", "branch_name": "refs/heads/master", "committer_date": 1499991443000, "content_id": "4adfb953e92aed7567dc30df77766af239a4f24d", "detected_licenses": [ "MIT" ], "directory_id": "31504d163163b26c8583fac9e95f23cb7e8efbcd", "extension": "py", "fi...
3.109375
stackv2
import database_handler import re import getpass import random import string import hashlib import binascii def is_md5(uuid): return re.match(r"^[0-9a-f]{32}$", uuid) is not None def get_admin_credentials(): while True: result = raw_input("Would you like to register a new administrator? [y/n]: ").lo...
71
28.92
120
13
513
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_1e2930d9299d8cf0_8ba3e1e2", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally e...
[ 59 ]
[ null ]
[ 29 ]
[ 44 ]
2024-11-18T19:24:03.626700+00:00
1,607,170,831,000
797d6cc4f8b5eeaf54456c8173f6db4b09507fb3
3
{ "blob_id": "797d6cc4f8b5eeaf54456c8173f6db4b09507fb3", "branch_name": "refs/heads/main", "committer_date": 1607170831000, "content_id": "2f16c5e40e31149cd90634f9bcd1dd00891bad67", "detected_licenses": [ "MIT" ], "directory_id": "06fbda66288ab130f2ef3b899787bb0b89d5b24c", "extension": "py", "file...
3.375
stackv2
import pymysql import openpyxl ''' 엑셀의 데이터가 무조건 A에서 맞닿아 있어야 합니다. ''' def sqlexec(sqlrun, connect, cursor): cursor.execute(sqlrun) result = cursor.fetchall() connect.commit() return result def sqlrunmake(opened_excel, sqlTN, row, column): exceldata = [] for i in range(column): temp = o...
123
26.63
92
18
1,034
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e5bc4753cd4b7131_35d3b02c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 85 ]
[ null ]
[ 15 ]
[ 36 ]
2024-11-18T19:58:23.238781+00:00
1,594,825,602,000
bf3a63b4c64969376b8eb76ce8a95c6f1cd21595
3
{ "blob_id": "bf3a63b4c64969376b8eb76ce8a95c6f1cd21595", "branch_name": "refs/heads/master", "committer_date": 1594825602000, "content_id": "34c4be13e9c749aa00c370c7e38050371375d427", "detected_licenses": [ "MIT" ], "directory_id": "1aacf84f6c8106f04ea03da0a790bce33b22f8b2", "extension": "py", "fi...
2.859375
stackv2
import requests import json from Get_Team import get_team from tools.api_key_webex import key url = "https://webexapis.com/v1/rooms" def get_rooms(): request = requests.session() request.headers = { 'Authorization': f'Bearer {key}', 'Content-Type': 'application/json' } team_id = get_t...
40
20.55
75
13
217
python
[{"finding_id": "codeql_py/request-without-cert-validation_f512e8c057b53542_7679f543", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 21 ]
[ null ]
[ 16 ]
[ 69 ]
2024-11-18T19:58:34.599200+00:00
1,614,364,309,000
3cd21abeb669483f253faae2901d057aece6e99d
3
{ "blob_id": "3cd21abeb669483f253faae2901d057aece6e99d", "branch_name": "refs/heads/master", "committer_date": 1614364309000, "content_id": "9f7fa88a7e02491e97f96a5d711aa26784bdac45", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "8de35ef918f5c41b90c4e1f9627d7d1c84808d7e", "extension": "p...
2.6875
stackv2
#!/usr/bin/env python3 import os import sys buf = '' _next = 0 limit = 0 max_bytes = 1000 eof = '' jobs = [] def getchar(): global eof # Access globals i global buf global _next global limit if _next == limit: # First run, or limit rea...
216
42.13
114
17
1,914
python
[{"finding_id": "codeql_py/overly-permissive-file_cb258dbccdee1feb_dd39a957", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in open sets file to world readable.", "remediation": "", "location": {...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in open sets file to world readable." ]
[ 127 ]
[ null ]
[ 18 ]
[ 68 ]
2024-11-18T18:39:23.677866+00:00
1,693,281,661,000
726e674e6128f31f84502ffe550134ee6b55c988
3
{ "blob_id": "726e674e6128f31f84502ffe550134ee6b55c988", "branch_name": "refs/heads/main", "committer_date": 1693282554000, "content_id": "7a2bc03ecc7da9bedd044dc1227b5bf3ce9a8de5", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "7aa58030cd72c9f9c7906042e6c89693d373f065", "extension": "py"...
2.671875
stackv2
#!/usr/bin/env python # # Copyright 2017 Google Inc. # # Use of this source code is governed by a BSD-style license that can be # found in the LICENSE file. """Delete cached repos on a Swarming bot.""" from __future__ import print_function import errno import os import shutil import subprocess import sys import tim...
114
33.87
140
17
1,038
python
[{"finding_id": "codeql_py/overly-permissive-file_acbfd4af3b30752e_2334c515", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to group writable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to group writable." ]
[ 99 ]
[ null ]
[ 5 ]
[ 26 ]
2024-11-18T18:39:28.321537+00:00
1,615,568,306,000
7ed6ee65ee4b54198729615c2a5fcb18d2f43298
3
{ "blob_id": "7ed6ee65ee4b54198729615c2a5fcb18d2f43298", "branch_name": "refs/heads/master", "committer_date": 1615568306000, "content_id": "8de3a76b1bd830bcf931f9709067ecf01671bb11", "detected_licenses": [ "MIT" ], "directory_id": "130f946bba5e51e73f9fb75518bec8045aa1d289", "extension": "py", "fi...
3.484375
stackv2
#!/usr/bin/env python3.6 import random import string from userData import UserData from credentialsData import CredentialsData def new_users(name_one, name_two, email_address, user_name, pass_word): """ creates new user """ new_user = UserData(name_one, name_two, email_address, user_name, pass_wo...
183
28.99
133
19
1,016
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7fa238b78b95b451_3040684b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text.", "This expression logs [sensitive data (p...
[ 108, 158, 169 ]
[ null, null, null ]
[ 19, 19, 27 ]
[ 66, 60, 133 ]
2024-11-18T18:39:48.812352+00:00
1,571,308,228,000
60ba1a98cdf5f9868e2ac38b5ebe3af2be7e569b
3
{ "blob_id": "60ba1a98cdf5f9868e2ac38b5ebe3af2be7e569b", "branch_name": "refs/heads/master", "committer_date": 1571308228000, "content_id": "0b469b6e2948cdc5fa3d27dc7525c4a01f4053eb", "detected_licenses": [ "Unlicense" ], "directory_id": "14227ede61924e94ba4442c58021ddaa7a9f0e28", "extension": "py",...
2.59375
stackv2
""" Microservice main programm file """ ## # # This file is the microservice itself. # ## # pylint: disable=invalid-name; # In order to avoid false positives with Flask import json from os import environ from datetime import datetime from flask import Flask, jsonify, make_response, url_for, request, logging import set...
153
23.03
87
16
858
python
[{"finding_id": "codeql_py/log-injection_fc8da8af74d76190_3e0bb843", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 133 ]
[ null ]
[ 47 ]
[ 54 ]
2024-11-18T18:40:03.637890+00:00
1,643,244,122,000
75f7663f4b26ccf3acfd545b5383e557e09d0f01
3
{ "blob_id": "75f7663f4b26ccf3acfd545b5383e557e09d0f01", "branch_name": "refs/heads/main", "committer_date": 1643244122000, "content_id": "d9176576d8fa33859d57bf532a01b89ae459819a", "detected_licenses": [ "MIT" ], "directory_id": "5c9dd8aa0bd7a7feec1a3e8800d4c21b05efb90f", "extension": "py", "file...
3.46875
stackv2
"""A command-line tool for generating passwords using the Diceware method. MIT License Copyright (c) 2018 John Eastman Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, includ...
68
42.09
119
14
646
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_db301296ee06e492_86cb6d62", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-327" ]
[ "py/clear-text-logging-sensitive-data", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that i...
[ 68, 63 ]
[ null, null ]
[ 11, 25 ]
[ 26, 42 ]
2024-11-18T20:52:26.832954+00:00
1,600,731,269,000
916721c6912f3796c232a7fa179fe73628e7057d
3
{ "blob_id": "916721c6912f3796c232a7fa179fe73628e7057d", "branch_name": "refs/heads/main", "committer_date": 1600731269000, "content_id": "e2c91d72449fad349a8ca2ab17e151f78840d950", "detected_licenses": [ "Unlicense" ], "directory_id": "a2cffb7a44ef799e7ec1a8d189c6e058e26ae0d3", "extension": "py", ...
2.625
stackv2
""" Generate Validation Certificate bases on Azure IoT Hub Verification Code Based on sample code from the cryptography library docs: https://cryptography.io/en/latest/x509/tutorial/#creating-a-self-signed-certificate """ import datetime from pathlib import Path from cryptography.hazmat.primitives import has...
53
36
99
23
468
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_cb6c0027b183dcb5_40ba0506", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 53 ]
[ null ]
[ 11 ]
[ 65 ]
2024-11-18T20:58:19.485962+00:00
1,634,845,788,000
9f788c1c2f54ee4e94a8edaed600fa9edef48357
3
{ "blob_id": "9f788c1c2f54ee4e94a8edaed600fa9edef48357", "branch_name": "refs/heads/master", "committer_date": 1634845788000, "content_id": "59500f1d5b444da2dca76e3875fe53f91485e479", "detected_licenses": [ "MIT" ], "directory_id": "d9e6dd09e4606b93092eb7175bd5f327fbf3c854", "extension": "py", "fi...
2.84375
stackv2
#!/usr/bin/env python # coding: utf-8 import os import tarfile import glob import pandas as pd import boto3 import json from requests import get, post s3_accessKey = os.getenv("AWS_ACCESS_KEY") s3_secretKey = os.getenv("AWS_SECRET_KEY") bucket_name = "jataware-world-modelers" # Specifics for S3 zipped json file s3_...
81
26.14
78
16
561
python
[{"finding_id": "codeql_py/tarslip_a5b40c8779ef1f89_db803f1f", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 38 ]
[ null ]
[ 5 ]
[ 8 ]
2024-11-18T20:15:50.051947+00:00
1,669,140,932,000
f7ad8263f0e00978a00dde93a8df44b12325788b
3
{ "blob_id": "f7ad8263f0e00978a00dde93a8df44b12325788b", "branch_name": "refs/heads/master", "committer_date": 1669140932000, "content_id": "6ac15f52d38df2ce6d8b18ef1192ff815bc6292c", "detected_licenses": [ "MIT" ], "directory_id": "2d03be96751d29bc8e2686ee3a8bed890261b0fa", "extension": "py", "fi...
2.609375
stackv2
import sys import os import paramiko import time import logging import json import re # create logger and set debugging level logger = logging.getLogger() logger.setLevel(logging.WARNING) #logger.setLevel(logging.DEBUG) # create console handler and set level ch = logging.StreamHandler() # create formatter formatter =...
163
32.31
112
22
1,246
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_8cc7fc5f27cae901_1c5656d5", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 29 ]
[ null ]
[ 9 ]
[ 81 ]
2024-11-18T20:15:53.017996+00:00
1,575,873,993,000
5bd3984966fc0da1fb4cffec10db44113d5b39b1
3
{ "blob_id": "5bd3984966fc0da1fb4cffec10db44113d5b39b1", "branch_name": "refs/heads/master", "committer_date": 1575873993000, "content_id": "4d8ae1edbbe0b0f29458d56894d484cc2f3dc5fb", "detected_licenses": [ "MIT" ], "directory_id": "ccadfe12165fadcbe907f0306020fbde3d6a0f0a", "extension": "py", "fi...
2.640625
stackv2
from pathlib import Path from typing import Optional from jinja2 import Template from logger.my_logger import MyLogger from models.article import Article from tools.base64 import urlsafe_decode from tools.bookmarklet_tools import ( get_raw_encoded_article, get_raw_encoded_message, is_success, ) logger = ...
72
26.86
86
13
431
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_d8f9e4486829d992_ff6e6a30", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 66, 71 ]
[ null, null ]
[ 16, 16 ]
[ 47, 48 ]
2024-11-18T20:15:55.246875+00:00
1,505,091,292,000
eef49328b690471ce45910a889061e0289d729f4
2
{ "blob_id": "eef49328b690471ce45910a889061e0289d729f4", "branch_name": "refs/heads/master", "committer_date": 1505091292000, "content_id": "b9e7768abb1d3ee465fd46c27df976be846bbe02", "detected_licenses": [ "MIT" ], "directory_id": "04dfdd89aba44c44f809054d260d23c6bf7255c6", "extension": "py", "fi...
2.46875
stackv2
import json import threading from django.shortcuts import render from django.http import HttpResponse, HttpResponseRedirect, JsonResponse from django.contrib.auth import login, logout, authenticate from django.contrib.auth.decorators import login_required from django.contrib.auth.models import User from django.views.de...
246
34.38
146
19
1,836
python
[{"finding_id": "codeql_py/stack-trace-exposure_fb44a991bc7bc0b6_1697b036", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 189, 210 ]
[ null, null ]
[ 29, 29 ]
[ 36, 36 ]
2024-11-18T19:38:47.039907+00:00
1,678,294,746,000
a363ddd0805d1714f5bb597f7fae8fdba2843516
4
{ "blob_id": "a363ddd0805d1714f5bb597f7fae8fdba2843516", "branch_name": "refs/heads/master", "committer_date": 1678294746000, "content_id": "a07489f4fab728d6ff4ef8a05cddb05ea224fae3", "detected_licenses": [ "MIT" ], "directory_id": "2eb2b76c5ef03b3323cb37db17134b08f8c6892a", "extension": "py", "fi...
4
stackv2
from __future__ import print_function import numpy as np def readBinary(file_name): """ Read a binary file. """ with open(file_name, 'rb') as fid: # Read the header header_size = int(np.fromfile(fid, dtype=np.uint32, count=1)) station_latitude = np.fromfile(fid, dtype=np.float64, cou...
137
37.37
111
17
1,346
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1fded9b849d08775_9bc18e6c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 29, 30 ]
[ null, null ]
[ 11, 11 ]
[ 27, 28 ]
2024-11-18T20:10:37.638602+00:00
1,571,798,284,000
19a2c73eabfe3913652ef14445c936f206ee389f
2
{ "blob_id": "19a2c73eabfe3913652ef14445c936f206ee389f", "branch_name": "refs/heads/master", "committer_date": 1571798284000, "content_id": "fe4eb2c5a9af9f64a841514fd6b4ab40afa79ccd", "detected_licenses": [ "MIT" ], "directory_id": "e9a973d496074fda29a22af8415e7aa4acfc867b", "extension": "py", "fi...
2.4375
stackv2
from flask import Flask, request, redirect, render_template from http.client import HTTPConnection from pathlib import Path from threading import Thread from tkinter import Toplevel from tkinter.ttk import Frame, Button, Label from werkzeug import secure_filename import logging import netifaces import os.path import sh...
129
34.56
99
21
999
python
[{"finding_id": "codeql_py/url-redirection_05de2537bac14cda_b6ad06aa", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
8
true
[ "CWE-601", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022" ]
[ "py/url-redirection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-...
[ 113, 81, 86, 87, 107, 108, 110, 111 ]
[ null, null, null, null, null, null, null, null ]
[ 29, 32, 39, 35, 39, 33, 35, 35 ]
[ 53, 37, 48, 44, 48, 42, 44, 44 ]
2024-11-18T20:11:04.458585+00:00
1,510,168,289,000
e8e4b207f672922748873a4654afd9ea690e1ae7
2
{ "blob_id": "e8e4b207f672922748873a4654afd9ea690e1ae7", "branch_name": "refs/heads/master", "committer_date": 1510168289000, "content_id": "2a84d8968c496541fb8b1b1a965aad2040c45277", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "cf577643747527582ce3e7c619c9687cd7b1d61a", "extension": "p...
2.421875
stackv2
#!/usr/bin/env python # Licensed under a 3-clause BSD style license - see LICENSE.rst """ Transfer stage files from HEAD network to OCC GRETA network via ftp server lucky. """ import re, os, sys import time import optparse import tarfile import shutil from Chandra.Time import DateTime import Ska.ftp import Ska.engar...
142
31.1
96
14
1,114
python
[{"finding_id": "codeql_py/tarslip_50d40350a537e3ba_534e720a", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 115 ]
[ null ]
[ 9 ]
[ 12 ]
2024-11-18T20:26:21.460120+00:00
1,551,721,525,000
495daacee0574d2a76c8b4dda452822b44385fe4
2
{ "blob_id": "495daacee0574d2a76c8b4dda452822b44385fe4", "branch_name": "refs/heads/master", "committer_date": 1551721525000, "content_id": "0551d7a0533f64737fbe0ea8236db30956d4bfac", "detected_licenses": [ "MIT" ], "directory_id": "8cb5512b466cbdbbb80835d00332109d959988e6", "extension": "py", "fi...
2.40625
stackv2
from flask import Flask, request from flask_cors import CORS import requests import json import IPython app = Flask("Backend") CORS(app) api_key = "API KEY NOT SET" with open("api_key", "r") as file: api_key = file.read() subdomain = "gmusmash" root_url = "https://api.challonge.com/v1/" def check_ip(): re...
66
26.32
113
17
469
python
[{"finding_id": "codeql_py/reflective-xss_97d250b83ef75858_f01fbc65", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
2
true
[ "CWE-079", "CWE-918" ]
[ "py/reflective-xss", "py/partial-ssrf" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 46, 45 ]
[ null, null ]
[ 16, 13 ]
[ 34, 114 ]
2024-11-18T20:26:23.902381+00:00
1,589,530,268,000
168393415ad3ac410b69d1aa2e6905d1d120c73f
3
{ "blob_id": "168393415ad3ac410b69d1aa2e6905d1d120c73f", "branch_name": "refs/heads/master", "committer_date": 1589530268000, "content_id": "74e46e1c79ec72635e2bd7f3675d4f5b5f3de376", "detected_licenses": [ "MIT" ], "directory_id": "8cd4ade6139bfd15b0122d34f68b80be5818513b", "extension": "py", "fi...
2.8125
stackv2
from PyQt5.QtWidgets import QApplication, QWidget, QInputDialog, QLineEdit import sql class PasswordCheckDialog(QWidget): """ Take password but input dialog and check it is valid or not """ def __init__(self): super().__init__() self.title = 'Password Check' self.left = 10 s...
48
28
111
13
288
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fc60555b1331a67a_2e3a658e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 35, 41 ]
[ null, null ]
[ 19, 19 ]
[ 32, 32 ]
2024-11-18T20:26:24.891146+00:00
1,692,614,193,000
0b6d649f29fd6e715c2f23b82c0c131d817ae271
3
{ "blob_id": "0b6d649f29fd6e715c2f23b82c0c131d817ae271", "branch_name": "refs/heads/master", "committer_date": 1692614193000, "content_id": "5ed27ebefd2169eeba80ad422b3be17c2d6d417a", "detected_licenses": [ "Apache-2.0" ], "directory_id": "16c78d28ea7c9080cd914ee1e7a8356f8b997810", "extension": "py"...
2.5625
stackv2
import logging import logging.handlers from . import logger_config import threading try: import http.client as httplib except ImportError: import httplib try: from urllib.parse import urlencode except ImportError: from urllib import urlencode import json import time import os # encodings JSON = 'json' ...
351
34.21
124
22
2,794
python
[{"finding_id": "codeql_py/overly-permissive-file_4b636b33924d9401_d4245224", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world writable." ]
[ 237 ]
[ null ]
[ 9 ]
[ 39 ]
2024-11-18T20:26:35.060473+00:00
1,508,987,873,000
95642a071fc444c060a63470bc74824e83ffadd0
3
{ "blob_id": "95642a071fc444c060a63470bc74824e83ffadd0", "branch_name": "refs/heads/master", "committer_date": 1508987873000, "content_id": "78b43546b82c167e8d13faae12a061ae04bd85a8", "detected_licenses": [ "Apache-2.0" ], "directory_id": "ab7dc5bd2c97d7d431658669b8442eb6a31928ef", "extension": "py"...
2.515625
stackv2
""" TODO: Add description of this script TODO: Add license """ from __future__ import print_function, division, unicode_literals import os import pickle from flask import Flask from flask import render_template, url_for app = Flask(__name__) # SETTINGS VALIDATION_METRIC = "valid_acc" TRAIN_METRIC = "train_acc...
125
36.36
103
16
1,065
python
[{"finding_id": "codeql_py/path-injection_b72684153e938dca_ec03be7b", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 57, 72 ]
[ null, null ]
[ 15, 19 ]
[ 19, 73 ]
2024-11-18T20:26:35.450698+00:00
1,443,647,171,000
31b77bc262121a673cd33190386c40e98ad75585
3
{ "blob_id": "31b77bc262121a673cd33190386c40e98ad75585", "branch_name": "refs/heads/master", "committer_date": 1443647171000, "content_id": "a479b3a630447bb2ca491a6aa86a0603b15206e7", "detected_licenses": [ "BSD-3-Clause", "MIT" ], "directory_id": "ad808d158533435e8cd16f308f454311bb68c369", "ext...
2.78125
stackv2
import xml.etree.ElementTree as ET from jinja2 import FileSystemLoader,Environment import argparse, webbrowser, os class Message(): prio = { "error": 1000, "warning": 100 } def __init__(self, type, code, desc, f, line): self.type = type self.code = code self.desc = desc self.fil...
62
32.82
106
13
503
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_02c2e41346984d5d_991e6baa", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 20 ]
[ null ]
[ 11 ]
[ 85 ]
2024-11-18T20:26:36.870762+00:00
1,602,221,603,000
f926563f4b2f2709a6f8ffdbdc13b3c0944ca5f7
3
{ "blob_id": "f926563f4b2f2709a6f8ffdbdc13b3c0944ca5f7", "branch_name": "refs/heads/master", "committer_date": 1602221603000, "content_id": "db3047d0abda2ea129958b25cba46ac99fcd0e2f", "detected_licenses": [ "MIT" ], "directory_id": "81407be1385564308db7193634a2bb050b4f822e", "extension": "py", "fi...
3.125
stackv2
import configparser # https://docs.python.org/zh-cn/3/library/configparser.html # 配置文件是由小节组成的,每个小节都有一个 [section] 标头,加上多个由特定字符串 (默认为 = 或 : 1) 分隔的键/值条目。 # 默认情况下小节名对大小写敏感而键对大小写不敏感 1。 键和值开头和末尾的空格会被移除。 值可以被省略,在此情况下键/值分隔符也可以被省略。 # 值还可以跨越多行,只要其他行带有比值的第一行更深的缩进。 依据解析器的具体模式,空白行可能被视为多行值的组成部分也可能被忽略。 # 配置文件可以包含注释,要带有指定字符前缀 (默认为 # 和...
90
32.46
115
9
1,078
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3ab201882522a022_583f7ba9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 36, 37 ]
[ null, null ]
[ 7, 7 ]
[ 30, 42 ]
2024-11-18T20:26:52.805428+00:00
1,478,079,938,000
27a2fb5ddce3c70c53fcc7ccd06c5f246cb3ebb6
2
{ "blob_id": "27a2fb5ddce3c70c53fcc7ccd06c5f246cb3ebb6", "branch_name": "refs/heads/master", "committer_date": 1478079938000, "content_id": "a44c7fe5fbc6057032c8c8458108ffb194645734", "detected_licenses": [ "Apache-2.0" ], "directory_id": "187aad32c5ce110d53caa5e7ba5d5872646f064e", "extension": "py"...
2.390625
stackv2
import flask import hashlib import requests import os from datetime import datetime from models.models import db from models.models import User from models.models import Posts from models.models import Connection from decorator import decorator from sqlalchemy.sql import select from sqlalchemy.orm import session ''' I...
95
35.83
135
20
843
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_ce5d5b99bfcd110c_1c81062c", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e...
[ 26 ]
[ null ]
[ 66 ]
[ 83 ]
2024-11-18T20:52:09.186578+00:00
1,591,743,107,000
e5043618254951c8a4cfed855908b2e29402a76f
3
{ "blob_id": "e5043618254951c8a4cfed855908b2e29402a76f", "branch_name": "refs/heads/master", "committer_date": 1591743107000, "content_id": "cc4b3abbc7c1b5ee215246aa5780053b257d72f4", "detected_licenses": [ "MIT" ], "directory_id": "3e64f996dfe9cdc51e76493054602049174b6f4a", "extension": "py", "fi...
2.609375
stackv2
from flask import Flask, request, Response from flask_cors import CORS from threading import Timer from waitress import serve from typing import Union import logging import os import time import traceback import sys import json import requests import random from backendy_stuff.primes import find_next_mersenne_prime fro...
358
30.27
163
17
2,646
python
[{"finding_id": "codeql_py/reflective-xss_8aec723f1f9ae833_779a3433", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability d...
4
true
[ "CWE-079", "CWE-079", "CWE-918", "CWE-918" ]
[ "py/reflective-xss", "py/reflective-xss", "py/partial-ssrf", "py/partial-ssrf" ]
[ "HIGH", "HIGH", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability due to a [user-provided value](2).", "Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability due to a [user-provided value](2).", "Part of the URL of this...
[ 315, 318, 314, 317 ]
[ null, null, null, null ]
[ 29, 29, 17, 17 ]
[ 38, 38, 66, 92 ]
2024-11-18T20:52:25.469537+00:00
1,427,218,357,000
2ff5ae9009d704f6bab8e3ad7291aca07462f220
2
{ "blob_id": "2ff5ae9009d704f6bab8e3ad7291aca07462f220", "branch_name": "refs/heads/master", "committer_date": 1427218357000, "content_id": "9267059a6658718403634cfc18fa7c602f013c69", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "0d0042be17488f4e6beda56e73bfa307681c335c", "extension": "p...
2.375
stackv2
import os import json import urlparse from redis import StrictRedis from markdown2 import markdown import requests import bleach from flask import Flask, render_template, make_response, abort app = Flask(__name__) HEROKU = 'HEROKU' in os.environ if HEROKU: urlparse.uses_netloc.append('redis') redis_url = ur...
96
27.64
87
16
796
python
[{"finding_id": "codeql_py/flask-debug_e93fa7964d170b78_ade189b2", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-918" ]
[ "py/flask-debug", "py/partial-ssrf" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 96, 78 ]
[ null, null ]
[ 9, 9 ]
[ 55, 67 ]
2024-11-18T20:52:41.925168+00:00
1,614,060,280,000
e5c0476674ca992e0e664f99c960e7418e63170e
3
{ "blob_id": "e5c0476674ca992e0e664f99c960e7418e63170e", "branch_name": "refs/heads/main", "committer_date": 1614060280000, "content_id": "a7d550c913b7b526236d5b7a18e8e75e00424a00", "detected_licenses": [ "MIT" ], "directory_id": "70c43015c642db6ca5adf63b537853741b0f92a9", "extension": "py", "file...
2.8125
stackv2
import json import plotly import pandas as pd import re from nltk.stem import WordNetLemmatizer from nltk.tokenize import word_tokenize from nltk.corpus import stopwords from flask import Flask from flask import render_template, request, jsonify from plotly.graph_objs import Bar, Pie import joblib from sqlalchemy impo...
186
25.76
106
18
1,122
python
[{"finding_id": "codeql_py/overly-large-range_d5c2512f1e51d8b4_3aad1f65", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
2
true
[ "CWE-020", "CWE-215" ]
[ "py/overly-large-range", "py/flask-debug" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger." ]
[ 34, 182 ]
[ null, null ]
[ 48, 5 ]
[ 51, 51 ]
2024-11-18T20:52:45.463743+00:00
1,629,659,976,000
6cfc00e34dc7493a23cc8a5a4cd766b5a49f0aa2
2
{ "blob_id": "6cfc00e34dc7493a23cc8a5a4cd766b5a49f0aa2", "branch_name": "refs/heads/master", "committer_date": 1629659976000, "content_id": "aae469ccc16ce035caadfb8360e5667fbd350579", "detected_licenses": [ "MIT" ], "directory_id": "71ae8e73eb8f2ff0564b4e445b069b0727afe2ff", "extension": "py", "fi...
2.328125
stackv2
import os from flask import Flask, render_template, request, redirect from inference import get_prediction from commons import format_class_name, create_predictions_folders from commons import get_model app = Flask(__name__) @app.route('/', methods=['GET', 'POST']) def upload_file(): predicted_files = [] # ch...
41
40.85
114
16
347
python
[{"finding_id": "codeql_py/flask-debug_bfe44c0c5df8818b_7cdcd3af", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-601" ]
[ "py/flask-debug", "py/url-redirection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 41, 19 ]
[ null, null ]
[ 5, 29 ]
[ 64, 40 ]
2024-11-18T20:52:50.171971+00:00
1,369,228,447,000
62a44022e0353f367762eae37007bd5c653e78c0
3
{ "blob_id": "62a44022e0353f367762eae37007bd5c653e78c0", "branch_name": "refs/heads/master", "committer_date": 1369228447000, "content_id": "1ed7dfb26a803b3034f956e814afad39f6e7599e", "detected_licenses": [ "MIT" ], "directory_id": "6b8d1dcf18f688192eebb95e3bd922250b352429", "extension": "py", "fi...
2.5625
stackv2
# # Represents a single EC2 region # # Copyright (c) 2013 by Michael Luckeneder # import boto import sys import time import itertools import boto.ec2 import config import paramiko from abstract_region import AbstractRegion class EC2Region(AbstractRegion): """Represents a single EC2 instance in a region""" d...
123
32.26
113
17
886
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_e16414c63ef9e013_58ad95d6", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 29 ]
[ null ]
[ 9 ]
[ 71 ]
2024-11-18T19:03:02.315730+00:00
1,633,022,001,000
18141e7ad4aec5bd995827fdff46ddc928ae4de0
2
{ "blob_id": "18141e7ad4aec5bd995827fdff46ddc928ae4de0", "branch_name": "refs/heads/main", "committer_date": 1633022001000, "content_id": "e3febb3d54b624ed2c5f9d6fc61170cd89d2eee5", "detected_licenses": [ "MIT" ], "directory_id": "816958975c8ae556735f9e438d61a9cfdff101a2", "extension": "py", "file...
2.4375
stackv2
import json import dash from dash import html from dash import dcc from dash.dependencies import Input, Output, State import dash_auth from pandas.io.json import json_normalize import importlib insta = importlib.import_module("instagram-locations") # read credentials from file with open('config', 'r') as cred: CRE...
124
43.44
129
17
1,142
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_aee1d266fc3735a7_1d351c57", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 73, 73 ]
[ null, null ]
[ 22, 32 ]
[ 30, 41 ]
2024-11-18T19:14:28.664313+00:00
1,616,222,380,000
867a4319795c090bdc71243b675802e811460189
4
{ "blob_id": "867a4319795c090bdc71243b675802e811460189", "branch_name": "refs/heads/master", "committer_date": 1616222380000, "content_id": "c4d54f8a9bc6ef8dfbd4130aa79c69f494791007", "detected_licenses": [ "MIT" ], "directory_id": "e0ab4a91a07c7f0ae2b513563c977e030f6117e3", "extension": "py", "fi...
3.828125
stackv2
import random def generator_password(): upper_list = ['A','B','C','D','E','F','G','H','I','J','k'] lower_list = ['a','b','c','d','e','f','g','h','i','j','K'] symbol_list = ['!','?','$','Ç','¡','&','y','%',':','/','|'] numbers_list = ['1','2','3','4','5','6','7','8','9','10','11'] character_list =...
31
21.87
73
10
203
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8c9fb9ef9488b9c0_6f0c41b1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text." ]
[ 25 ]
[ null ]
[ 11 ]
[ 45 ]
2024-11-18T19:14:34.682928+00:00
1,336,690,961,000
9eee0a8f858e217d1771b4c9d67af1232be371d3
2
{ "blob_id": "9eee0a8f858e217d1771b4c9d67af1232be371d3", "branch_name": "refs/heads/master", "committer_date": 1336690961000, "content_id": "4e3039756fdf84081214e8cc3015010528786827", "detected_licenses": [ "MIT" ], "directory_id": "6458b581fb18da223e7c7cc7156bd66f50b17682", "extension": "py", "fi...
2.46875
stackv2
# -*- coding: utf-8 -*- # vim: tabstop=8 expandtab shiftwidth=4 softtabstop=4 __author__ = "Ole Christian Weidner" __copyright__ = "Copyright 2011, Ole Christian Weidner" __license__ = "MIT" from bliss.interface import FilesystemPluginInterface import os, pwd import time import bliss.saga import logging import...
287
35.5
119
20
2,205
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_8c6f584281888637_8c1aa082", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 74 ]
[ null ]
[ 17 ]
[ 74 ]
2024-11-18T19:14:34.980478+00:00
1,613,069,844,000
1548c422fe5f3040557a8b5625e0b167d10f8066
3
{ "blob_id": "1548c422fe5f3040557a8b5625e0b167d10f8066", "branch_name": "refs/heads/master", "committer_date": 1613069844000, "content_id": "d163712cedf17b838b494f379dd982f567dee880", "detected_licenses": [ "Apache-2.0" ], "directory_id": "b47eaf319ca8a80a29dd5aa54a8454cf56a2014d", "extension": "py"...
2.5625
stackv2
import re from time import sleep from paramiko import SSHClient, AutoAddPolicy class SwitchStack: def __init__(self, name, ip, username, password, port=22): self.name = name self.ip = ip self.username = username self.password = password self.port = port self.swit...
139
36.3
102
25
1,082
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_c21f5e73bd735aa6_d7729ced", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 27 ]
[ null ]
[ 9 ]
[ 67 ]
2024-11-18T19:14:42.296761+00:00
1,626,610,439,000
f1c26c1a3bcd1fcac3ab72c27d2d63e267d495ae
2
{ "blob_id": "f1c26c1a3bcd1fcac3ab72c27d2d63e267d495ae", "branch_name": "refs/heads/main", "committer_date": 1626610439000, "content_id": "ad054cfa732b8f8dfaf6a6e5bd1728e7a4a79534", "detected_licenses": [ "MIT" ], "directory_id": "e5509bb1d049d7da1ebd64a9426e83388733a920", "extension": "py", "file...
2.3125
stackv2
import json, os, copy, logging from pathlib import Path from flask import Flask, request, redirect, render_template, jsonify, url_for from fer.utils import * ROOT = Path(__file__).resolve().parent.parent WEB = ROOT / 'ui' # An instance of Flask class used as WSGI application app = Flask(__name__, template_folder = ...
79
26.09
100
14
545
python
[{"finding_id": "codeql_py/flask-debug_eee83e762902cb86_4cfa479e", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-601" ]
[ "py/flask-debug", "py/url-redirection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 76, 44 ]
[ null, null ]
[ 2, 20 ]
[ 77, 31 ]
2024-11-18T19:27:50.609856+00:00
1,557,529,137,000
3fa722c896f90708aa3824be675db218a3048dad
3
{ "blob_id": "3fa722c896f90708aa3824be675db218a3048dad", "branch_name": "refs/heads/master", "committer_date": 1557529137000, "content_id": "364c3a41242701a61014a2b1edf9d32a2c05c37c", "detected_licenses": [ "MIT" ], "directory_id": "49f2efefa49c68b78e0df56fede5088c205e288c", "extension": "py", "fi...
3.046875
stackv2
import os from typing import Optional from jinja2 import Template import mistune from pygments import highlight from pygments.lexers import get_lexer_by_name from pygments.formatters import html from premailer import transform class HighlightRenderer(mistune.Renderer): """ This highlight renderer improves the...
61
32.77
118
17
474
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_e8662a37d8b4630d_750d381a", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 51, 54 ]
[ null, null ]
[ 20, 9 ]
[ 38, 26 ]
2024-11-18T19:38:27.388647+00:00
1,442,986,938,000
4226b453bd12d8e27ba16dd5a5bebc22947cb3c1
3
{ "blob_id": "4226b453bd12d8e27ba16dd5a5bebc22947cb3c1", "branch_name": "refs/heads/master", "committer_date": 1442986938000, "content_id": "1785b2a9b5f19839a911558cdc7f0a13681b5677", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "d413ac9beb1d9987e17464df2b2aa8d75bd347d5", "extension": "p...
2.90625
stackv2
#!/usr/bin/env python import urllib2 import httplib import ssl import socket import os import re CA_FILE = os.path.join(os.path.dirname(os.path.realpath(__file__)), 'ca.pem') class CertificateError(Exception): pass # The following 2 functions are from Python 3 lib/ssl # To bring SSL hostname matching to Python 2...
135
29.81
88
15
1,151
python
[{"finding_id": "codeql_py/insecure-default-protocol_994c3d639f038867_10c676d5", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in...
1
true
[ "CWE-327" ]
[ "py/insecure-default-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used." ]
[ 125 ]
[ 126 ]
[ 15 ]
[ 50 ]
2024-11-18T19:38:43.139493+00:00
1,449,995,697,000
3ad669cab6e68016bec49f20c383650ee6af43c4
3
{ "blob_id": "3ad669cab6e68016bec49f20c383650ee6af43c4", "branch_name": "refs/heads/master", "committer_date": 1449995697000, "content_id": "f1ba692f6180faa0f2fcf35123272718bf26539a", "detected_licenses": [ "BSD-2-Clause", "MIT" ], "directory_id": "65cd560a1c2f47421e20e389c5f1d1c8f1ee1ba3", "ext...
2.671875
stackv2
import os import os.path import json import io import glob import uuid import re import random import shortuuid import shelve from flask import Flask, abort, redirect, jsonify, render_template, request, make_response, url_for class UrlObject: def to_JSON(self): return json.dumps(self, default=lambda o: o._...
122
32.27
117
16
988
python
[{"finding_id": "codeql_py/code-injection_78eebeb8b31429fc_39c0b6aa", "tool_name": "codeql", "rule_id": "py/code-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This code execution depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "...
1
true
[ "CWE-094" ]
[ "py/code-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This code execution depends on a [user-provided value](1)." ]
[ 114 ]
[ null ]
[ 25 ]
[ 37 ]
2024-11-18T19:38:52.151028+00:00
1,554,997,107,000
28addf2d56ee9e1cbcc35c4105a49ff63bb950ed
3
{ "blob_id": "28addf2d56ee9e1cbcc35c4105a49ff63bb950ed", "branch_name": "refs/heads/master", "committer_date": 1554997107000, "content_id": "9b03a1dc70225b5feac5fe1ab8baf2edce78f12b", "detected_licenses": [ "MIT" ], "directory_id": "3b12173fb2338d51e9cc971ea18d5d561519d648", "extension": "py", "fi...
2.90625
stackv2
#! /usr/bin/python3 import subprocess import fcntl import socket import struct class ChecksumError(Exception): def __init__(self, _type): self.type = _type def __str__(self): return self.type + ' checksum is not match.' class TimeOutError(Exception): def __init__(self): pass ...
87
24.17
91
15
616
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fc19ce3aa4d1dc40_342e8e91", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-200" ]
[ "py/clear-text-logging-sensitive-data", "py/bind-socket-all-network-interfaces" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "'' binds a socket to all interfaces." ]
[ 85, 28 ]
[ null, null ]
[ 11, 5 ]
[ 46, 20 ]
2024-11-18T19:38:55.616521+00:00
1,693,573,922,000
f6f42dc70ade5178ec3f2ee349884c9848b92b5d
3
{ "blob_id": "f6f42dc70ade5178ec3f2ee349884c9848b92b5d", "branch_name": "refs/heads/main", "committer_date": 1693573922000, "content_id": "49486e5e5f3dbd75608bd57a77b45bdd062252df", "detected_licenses": [ "Apache-2.0" ], "directory_id": "9493f8b85660a0965f6e236ab6d9673aa48ff3cb", "extension": "py", ...
2.796875
stackv2
#!/usr/bin/env python # coding=utf-8 import copy import os import json import codecs import requests from jinja2 import Environment, FileSystemLoader CHINESE_WIKI_LANG = "zh" SIMPLIFIED_CHINESE_LANG = "zh-hans" TRADITIONAL_CHINESE_LANG = "zh-hant" # T114042 NORWEGIAN_BOKMAL_WIKI_LANG = "no" NORWEGIAN_BOKMAL_LANG = ...
193
34.4
114
20
1,798
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_925d13c77e6da692_281641fa", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [wikipedia.org](1) may be at an arbitrary position in t...
2
true
[ "CWE-020", "CWE-079" ]
[ "py/incomplete-url-substring-sanitization", "py/jinja2/autoescape-false" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "The string [wikipedia.org](1) may be at an arbitrary position in the sanitized URL.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 81, 41 ]
[ null, 43 ]
[ 16, 29 ]
[ 47, 15 ]
2024-11-18T20:06:25.071840+00:00
1,620,848,868,000
3f2e71aac1f72a4d4730b5b72dd2ff73f4825556
3
{ "blob_id": "3f2e71aac1f72a4d4730b5b72dd2ff73f4825556", "branch_name": "refs/heads/master", "committer_date": 1620848868000, "content_id": "7d62012468385aa5e37c9e56da123db3c693577c", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "a39ad7f40cb8102246b6a56769936281edce1818", "extension": "p...
2.65625
stackv2
""" Transfer Learning (Time Delayed) version of the Convolutional Denoising Autoencoder Contains functions to read in preprocessed data, split according to training parameters, train models, and save model outputs """ import logging from numpy.random import seed seed(1) import tensorflow tensorflow.random.set_seed(2) ...
205
40.61
132
17
2,122
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2942acb7a6ea76bd_cf74612d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
5
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (p...
[ 124, 134, 157, 168, 181 ]
[ null, null, null, null, null ]
[ 19, 15, 19, 15, 44 ]
[ 72, 105, 72, 105, 57 ]
2024-11-18T20:18:19.592741+00:00
1,584,732,930,000
829acdb9a76a13302d9e144133a296e348d35a36
3
{ "blob_id": "829acdb9a76a13302d9e144133a296e348d35a36", "branch_name": "refs/heads/master", "committer_date": 1584732930000, "content_id": "ea2ade73d0015a67fb4d97e1c5aaa4822907cef4", "detected_licenses": [ "MIT" ], "directory_id": "dfa0169fcbf997f7a44e963d78dbdcf9e81039bb", "extension": "py", "fi...
3.28125
stackv2
import requests import json import pprint salary_list_from = [] # список с зарплатами от... salary_list_to = [] # список с зарплатами до... for n in range(20): URL = 'https://api.hh.ru/vacancies' params = {'text': 'Python && Москва', 'only_with_salary': True, 'per_page': 100, 'page': n } # {'i...
41
31.83
89
14
383
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_71a7a7d930349326_cbf3e2f1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (p...
[ 29, 30, 38 ]
[ null, null, null ]
[ 7, 7, 7 ]
[ 23, 21, 75 ]
2024-11-18T20:18:25.298161+00:00
1,531,104,128,000
90e2d0e296a314978bca9a791ae75a580fa0fefa
2
{ "blob_id": "90e2d0e296a314978bca9a791ae75a580fa0fefa", "branch_name": "refs/heads/master", "committer_date": 1531104128000, "content_id": "1e41d8a1b59909bd8c6ab6dc23cae7670eff2d83", "detected_licenses": [ "CC0-1.0" ], "directory_id": "15a6d1070f59cf49f4356cf7164c50c69259d4f4", "extension": "py", ...
2.46875
stackv2
import logging import os from flask import Flask, request from core.webhook.message_saver import MessageSaver from common.util.util import log, mark_seen from pprint import pprint app = Flask(__name__) @app.route('/', methods=['GET']) def verify(): # when the endpoint is registered as a webhook, it must echo bac...
79
33.03
109
23
558
python
[{"finding_id": "codeql_py/flask-debug_67fdfc318d39f518_c5510cc7", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 79, 18 ]
[ null, null ]
[ 5, 16 ]
[ 24, 50 ]
2024-11-18T20:31:38.228406+00:00
1,552,991,391,000
52a0fa43c9a63968387ad33e5a8262b30561c6e8
2
{ "blob_id": "52a0fa43c9a63968387ad33e5a8262b30561c6e8", "branch_name": "refs/heads/master", "committer_date": 1552991391000, "content_id": "c24d637522c032788dc002305d5a9404a66ed6cd", "detected_licenses": [ "MIT" ], "directory_id": "7e7f1e157049b8fa983ebbc6e19665c7b9245c2d", "extension": "py", "fi...
2.359375
stackv2
#!/usr/bin/python3 # # Get PLAZA information for Galaxy # # Get all genomes and annotations available in PLAZA data warehouse, formatted to be used by Ephemeris import json import os from jinja2 import Environment import urllib import urllib.request from urllib.error import HTTPError, URLError # Template for anno...
148
40.78
135
22
1,428
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_d34e90437c43be20_3f46160f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 140 ]
[ null ]
[ 13 ]
[ 26 ]
2024-11-18T20:43:21.184622+00:00
1,560,024,501,000
911956415e3034f58cc9455b928c665b62308bb3
2
{ "blob_id": "911956415e3034f58cc9455b928c665b62308bb3", "branch_name": "refs/heads/master", "committer_date": 1560024501000, "content_id": "81ab8e40b9483945a551c3ca766041eef9d7a92a", "detected_licenses": [ "MIT" ], "directory_id": "c05a6e6af9a6386fb36bc99c9ac77ef081dab8e4", "extension": "py", "fi...
2.46875
stackv2
from Co import * from loader import * from Interpreter import * """ Foe every "user" in starting accounts: Change the "user"'s password according to the OS type. """ def changeAllPasswords(stringsList,readCurrentUsersList,readNewPasswordList): accounts = [] for user in readCurrentUsersList: readCurre...
261
28.83
100
18
1,697
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_aad16aba5cacf751_a3ddd5af", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (password)](3) as clear text.\nThis expression stores [sensitive data (password)](4) as clear text.\nThis expression stores [sensitive d...
[ 246, 75, 199 ]
[ null, null, null ]
[ 17, 23, 15 ]
[ 24, 26, 22 ]
2024-11-18T20:43:55.866554+00:00
1,580,943,344,000
62de4e7049f46e903a1529e49b8d29c45ea7fe7e
3
{ "blob_id": "62de4e7049f46e903a1529e49b8d29c45ea7fe7e", "branch_name": "refs/heads/master", "committer_date": 1591886878000, "content_id": "dcd40f3397da0671b197e7b1bcbba405bd975c94", "detected_licenses": [ "MIT" ], "directory_id": "8ccff6fd5fa3da398816b54988db14b6091e04cc", "extension": "py", "fi...
2.671875
stackv2
from __future__ import print_function # usage: # python letters.py input.csv # logs to csv's in the output directory import csv import datetime import os import sys # Load lob-python root directory into the import path so you can use the lob package without having to install it through pip. sys.path.insert(0, os...
161
30.72
126
22
1,066
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5476d7ce030de7ac_ca58c0e6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 88 ]
[ null ]
[ 15 ]
[ 62 ]
2024-11-18T20:44:01.761343+00:00
1,626,836,173,000
bc381a68736ac9104223e66ad08f1e00ae9d7d43
3
{ "blob_id": "bc381a68736ac9104223e66ad08f1e00ae9d7d43", "branch_name": "refs/heads/main", "committer_date": 1626836173000, "content_id": "845821edbf2f2c7c42fa0bd5bad721e00cc968d7", "detected_licenses": [ "BSD-2-Clause-Views" ], "directory_id": "7f8204bb9dc907bcefecfa4b6221a73d638a5995", "extension"...
2.75
stackv2
""" Copyright (c) 2021, Timothy Murphy All rights reserved. This source code is licensed under the BSD-style license found in the LICENSE file in the root directory of this source tree. """ import os from cryptography.fernet import Fernet from loqet.loqet_configs import LOQET_CONFIG_DIR, LOQ_KEY_FILE from loqet.file_...
83
27.36
77
14
599
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_a5a7330db2e92589_c7a082a5", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive data (secret)](2) as clear text.\nThis expression stores [sensitive data (secret)](3) as clear text.", "This expression stores [sensitive data (secret)](1) as clear text." ]
[ 48, 67 ]
[ null, null ]
[ 17, 21 ]
[ 27, 31 ]
2024-11-18T20:44:06.069417+00:00
1,471,285,160,000
c58d7a1a480c48e1392c6dea1d59daf82bca4289
4
{ "blob_id": "c58d7a1a480c48e1392c6dea1d59daf82bca4289", "branch_name": "refs/heads/master", "committer_date": 1471285160000, "content_id": "6de3d27856ab8ad868b663a71d67a7bfee694bf4", "detected_licenses": [ "MIT" ], "directory_id": "2a323a4e16cead0ea470e60774400266b2fb7c87", "extension": "py", "fi...
4.15625
stackv2
# hangman_mit-ocw_musovzky.py # Python version: 3.4.3 # Created by: Musovzky (viviyi4@gmail.com) # Created on: June 27, 2016 # Hangman is a guessing game between you and your computer... # You can choose among 3 difficulty levels: Beginner, Intermediate and Savvy # This is the first project of MIT OpenCourseWare: # A...
170
33.38
93
21
1,218
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4cc377bc3b3ecca8_3803ddfd", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 94, 119, 142 ]
[ null, null, null ]
[ 19, 27, 31 ]
[ 68, 74, 68 ]
2024-11-18T20:44:17.453722+00:00
1,571,975,594,000
36a50c446c58f120105ea2c33e7ec93d05596e64
3
{ "blob_id": "36a50c446c58f120105ea2c33e7ec93d05596e64", "branch_name": "refs/heads/master", "committer_date": 1571975594000, "content_id": "cbbb473909c6751bbce9b519e17ddd6e34715a31", "detected_licenses": [ "Apache-2.0" ], "directory_id": "1d7ae0cd984f1b1cb94d25f21df51d0e2caeb983", "extension": "py"...
2.796875
stackv2
import requests import re import json from contextlib import closing from pyquery import PyQuery as pq from requests import RequestException class bilibili(): def __init__(self): self.getHtmlHeaders={ 'User-Agent': 'Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chro...
75
38.08
139
16
814
python
[{"finding_id": "codeql_py/request-without-cert-validation_5f942cda3ee975ea_e7dd81a5", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 59 ]
[ null ]
[ 21 ]
[ 104 ]
2024-11-18T20:57:29.329479+00:00
1,627,124,773,000
a1b0a6fe480c47b3e2d3fbc7481a6b3caac4dacb
3
{ "blob_id": "a1b0a6fe480c47b3e2d3fbc7481a6b3caac4dacb", "branch_name": "refs/heads/master", "committer_date": 1627124773000, "content_id": "8f27ebefee905981e61ade3f3ac5e1c028a3e117", "detected_licenses": [ "Apache-2.0" ], "directory_id": "c705b2620119df0d60e925e55228bfbb5de3f568", "extension": "py"...
3.140625
stackv2
# -*- coding: UTF-8 -*- __author__ = 'mcxiaoke' import hashlib from base64 import b64encode def make_hash(username, secret, password): """Generate a salt and return a new hash for the password.""" if isinstance(password, unicode): password = password.encode('utf-8') salt = b64encode(username + se...
23
27.74
65
11
156
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_c8b545e84a45ca56_f99b8856", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e...
[ 15 ]
[ null ]
[ 19 ]
[ 27 ]
2024-11-18T20:57:52.503132+00:00
1,682,636,052,000
aa2bf093e25942d689ac6895bca8936d656bfc3c
3
{ "blob_id": "aa2bf093e25942d689ac6895bca8936d656bfc3c", "branch_name": "refs/heads/master", "committer_date": 1682636052000, "content_id": "0cba4556f66bb816297690c1209be9e82794ce98", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "e5ba883c7ae6761e119e245d66b01efc41631d97", "extension": "p...
2.59375
stackv2
## Full writeup on flag 2 found on http://www.ctfhacker.com ## Binary found here: http://csapp.cs.cmu.edu/3e/bomb.tar import angr import claripy import logging from struct import unpack class readline_hook(angr.SimProcedure): def run(self): pass class strtol_hook(angr.SimProcedure): def run(self, str,...
310
31.74
113
19
3,044
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8a0ea8c65b0315c4_84beace6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 277 ]
[ null ]
[ 11 ]
[ 41 ]
2024-11-18T20:58:14.038179+00:00
1,503,645,442,000
673df3963bd0025e825ca9d8959df95c57d7ab05
2
{ "blob_id": "673df3963bd0025e825ca9d8959df95c57d7ab05", "branch_name": "refs/heads/master", "committer_date": 1503645442000, "content_id": "3a1efe47c0ea80b7b16396be4bfcbb4bf0259650", "detected_licenses": [ "Apache-2.0" ], "directory_id": "d26afaf2030bde67f7c159290e796bc8c1dca968", "extension": "py"...
2.390625
stackv2
# -*- coding: utf-8 -*- """ Created on Wed Aug 23 10:54:15 2017 @author: goingcosme20 """ from flask import Flask, request, abort from dbModel import * from datetime import datetime from linebot import ( LineBotApi, WebhookHandler ) from linebot.exceptions import ( InvalidSignatureError ) from linebot.models...
68
23.62
93
19
406
python
[{"finding_id": "codeql_py/log-injection_b00072fbd12a3cb8_53d3767c", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 40 ]
[ null ]
[ 22 ]
[ 45 ]
2024-11-18T20:58:19.103878+00:00
1,583,146,245,000
f259ae396d8dec5414a7dcecfce1963449391d9c
3
{ "blob_id": "f259ae396d8dec5414a7dcecfce1963449391d9c", "branch_name": "refs/heads/master", "committer_date": 1583146245000, "content_id": "0d005e559f04c6f66be6416d170395c16a4e6e62", "detected_licenses": [ "MIT" ], "directory_id": "20782c3dff9c09cc8946c5f17da116953ff74318", "extension": "py", "fi...
2.59375
stackv2
import os from flask import Flask, flash, render_template, redirect, request, url_for, send_file import efficientnetB0_model import tensorflow as tf # from flask_bootstrap import Bootstrap # App config app = Flask(__name__) app.config['SECRET_KEY'] = "supertopsecretprivatekey" app.config['UPLOAD_FOLDER'] = '/tmp/' # B...
85
30.55
86
17
587
python
[{"finding_id": "codeql_py/url-redirection_11bdaa149b3a82c1_0f97c53c", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
5
true
[ "CWE-601", "CWE-601", "CWE-601", "CWE-022", "CWE-022" ]
[ "py/url-redirection", "py/url-redirection", "py/url-redirection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 40, 47, 63, 55, 68 ]
[ null, null, null, null, null ]
[ 29, 29, 33, 33, 22 ]
[ 40, 40, 44, 41, 73 ]
2024-11-18T20:58:32.661003+00:00
1,510,915,213,000
3cbff60aadba5df212f947e63b6bb57d4c5353cb
3
{ "blob_id": "3cbff60aadba5df212f947e63b6bb57d4c5353cb", "branch_name": "refs/heads/master", "committer_date": 1510915213000, "content_id": "2c7bbbd71bb1127820c1d95ab15aa74d42b6e4ad", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "398e76f2b2dc7f06018d0f5126ef0cbbeb1cbfaf", "extension": "p...
2.578125
stackv2
import numpy as np from scipy import misc import os import hashlib import urllib.request DATA_DIR = os.environ.get( 'COPT_DATA_DIR', os.path.join(os.path.expanduser("~"), 'copt_data')) def load_img1(n_rows=20, n_cols=20): """Load sample image""" dir_path = os.path.dirname(os.path.realpath(__file__)) ...
254
32.39
110
17
2,191
python
[{"finding_id": "codeql_py/tarslip_474006080c5035cb_028726e2", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 243 ]
[ null ]
[ 9 ]
[ 12 ]
2024-11-18T21:10:25.255320+00:00
1,604,676,135,000
fe226c58fafc16f8ca036118cf106372292091e3
3
{ "blob_id": "fe226c58fafc16f8ca036118cf106372292091e3", "branch_name": "refs/heads/main", "committer_date": 1604676135000, "content_id": "e38d5713540e5becdfd6c3dd347c4c6bc05d5686", "detected_licenses": [ "MIT" ], "directory_id": "cfe67567f2168e8435c86692141cabbc3591a8ba", "extension": "py", "file...
2.625
stackv2
import argparse import os.path import urllib.request import tarfile import shutil import numpy as np import get_feat as get_feat import get_labels as get_labels import cnn as cnn import conf_matrix as conf_mat if __name__ == '__main__': parser = argparse.ArgumentParser() parser.add_argument("-e", type=int,...
70
28.86
96
13
524
python
[{"finding_id": "codeql_py/tarslip_6ceb392c4a6bb649_6db76435", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 44 ]
[ null ]
[ 9 ]
[ 12 ]
2024-11-18T21:10:48.050166+00:00
1,677,214,094,000
85dcab48da1de886a8db39cb35952214648351e0
2
{ "blob_id": "85dcab48da1de886a8db39cb35952214648351e0", "branch_name": "refs/heads/master", "committer_date": 1677214094000, "content_id": "474d72a22e163e3259dbac3a85f500fd81c1c6af", "detected_licenses": [ "MIT" ], "directory_id": "393e875c9bb455ed0600d2521aa6049d06cb2818", "extension": "py", "fi...
2.3125
stackv2
#!/usr/bin/env python import os import contextlib import logging import shutil import tarfile import urllib.request from argparse import ArgumentParser, RawTextHelpFormatter from datetime import datetime as dt from difflib import ndiff, unified_diff from filecmp import dircmp from logging import basicConfig from pack...
288
31.59
131
17
2,127
python
[{"finding_id": "codeql_py/tarslip_bc37deb0b3a36a03_74941465", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 179 ]
[ null ]
[ 5 ]
[ 12 ]
2024-11-18T21:10:48.313841+00:00
1,690,317,962,000
c3b0a6d7efdbdfb8d3931094143e4e991ff26d5b
2
{ "blob_id": "c3b0a6d7efdbdfb8d3931094143e4e991ff26d5b", "branch_name": "refs/heads/master", "committer_date": 1690317962000, "content_id": "968dd9a3d50096378b37c9c6388af9be5212df72", "detected_licenses": [ "MIT" ], "directory_id": "a07fd8aca2d69ade2e388054dd2c1c9991232185", "extension": "py", "fi...
2.421875
stackv2
import json import logging import os import re import shutil import subprocess from functools import lru_cache from http.server import HTTPServer, SimpleHTTPRequestHandler from importlib import metadata from multiprocessing import Pool from pathlib import Path from typing import Any, Dict, List, Optional, Union import...
307
31.55
105
15
2,399
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_aa8ebaacbdf35098_203024cb", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 164 ]
[ null ]
[ 16 ]
[ 49 ]
2024-11-18T21:10:57.500154+00:00
1,470,508,367,000
0e420d34da8d7f1263330e9bfa0037a350cf1868
3
{ "blob_id": "0e420d34da8d7f1263330e9bfa0037a350cf1868", "branch_name": "refs/heads/master", "committer_date": 1470508367000, "content_id": "49b5d397bbd0ec0abbe53d7092c24f4098de261c", "detected_licenses": [ "MIT", "Apache-2.0" ], "directory_id": "8350c57eac4b708ff9ce6958f345d9471a393588", "exten...
2.59375
stackv2
import urllib.request import bs4 from bs4 import BeautifulSoup import re from News import News import html class NewsContentCrawler: contentPatterns = {'metro': '<div class="body parsys">(.*?|\s)*?<\/div>\s<\/div>', 'chronicle': '<div class="article-related-content-wrapper">.*?<p>(.|\s)*?<\/div><!-- \/.article-...
137
33.96
141
23
1,373
python
[{"finding_id": "codeql_py/redos_97e89727f0b4ded7_c97cd3cc", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '<div class=\"text combinedtext pa...
2
true
[ "CWE-1333", "CWE-1333" ]
[ "py/redos", "py/redos" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '<div class=\"text combinedtext parbase section\">' and containing many repetitions of ' '.", "This part of the regular expression may cause exponential backtracking on strings starting with '<p>' and containing many ...
[ 55, 62 ]
[ null, null ]
[ 79, 42 ]
[ 82, 46 ]
2024-11-18T21:11:08.855341+00:00
1,572,941,287,000
eaf8ac81cb9d594a576be0f6fcdb5b53e41cd510
2
{ "blob_id": "eaf8ac81cb9d594a576be0f6fcdb5b53e41cd510", "branch_name": "refs/heads/master", "committer_date": 1572941287000, "content_id": "92eb981ede240f6f7c0584a94d6d7b0b71af7a7f", "detected_licenses": [ "MIT" ], "directory_id": "b15fea7545e05f2b55a5eb1400c9264f1888f804", "extension": "py", "fi...
2.359375
stackv2
#!/usr/bin/env python import os import pathlib import jinja2 import yaml import tempfile import invoke import click import awss3 as cloudstorage BASE_PATH = pathlib.Path(__file__).absolute().parents[2] def __build(diskimage, release, kernel): print(f'Creating "{diskimage}"..') sources_tmpl = jinja2.Environ...
124
26.16
86
19
854
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_f06ec6f04aeb8039_bb9604db", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 18, 69 ]
[ 20, 71 ]
[ 20, 13 ]
[ 6, 6 ]
2024-11-18T21:11:10.138438+00:00
1,693,456,282,000
863cce0678fabe522c246b293432c9f1e1c661cf
2
{ "blob_id": "863cce0678fabe522c246b293432c9f1e1c661cf", "branch_name": "refs/heads/main", "committer_date": 1693456282000, "content_id": "c63d73bf3db520d7b889037db098ce94f6cb5710", "detected_licenses": [ "MIT" ], "directory_id": "977f7a7386899a5d0152b29b57ec26682b430437", "extension": "py", "file...
2.46875
stackv2
#!/usr/bin/env python # Data manager for reference data for the QIIME Galaxy tools import argparse import ftplib import json import os import tarfile import zipfile import requests protocol = { "unite": "http", "greengenes": "ftp", "silva": "http", "img": "ftp" } baseUrl = { "unite": "http://uni...
390
29.42
105
18
2,717
python
[{"finding_id": "codeql_py/tarslip_e85cb97b58679d03_18d4190a", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 197 ]
[ null ]
[ 17 ]
[ 20 ]
2024-11-18T21:11:16.275747+00:00
1,610,425,898,000
536303c4b9e0d98878e8ad080731cd5440b11989
2
{ "blob_id": "536303c4b9e0d98878e8ad080731cd5440b11989", "branch_name": "refs/heads/master", "committer_date": 1610425898000, "content_id": "829d841b7e57ec4431b3eaae8808bdaf507f342b", "detected_licenses": [ "MIT" ], "directory_id": "4f725e6bd67c9c0782fc30007f714eee81b267a0", "extension": "py", "fi...
2.40625
stackv2
# -*- coding: utf-8 -*- #!/usr/bin/env python import json import requests from urllib3.exceptions import InsecureRequestWarning # Suppress only the single warning from urllib3 needed. requests.packages.urllib3.disable_warnings(category=InsecureRequestWarning) # options: local || remote environment = 'local' # options...
125
34.81
118
20
1,255
python
[{"finding_id": "codeql_py/request-without-cert-validation_ae82f74d265bf038_0c610eef", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 104 ]
[ null ]
[ 20 ]
[ 110 ]
2024-11-18T19:03:19.908287+00:00
1,405,372,266,000
9630bdf9d29995be6b0b26e4f7eb445600cc4516
3
{ "blob_id": "9630bdf9d29995be6b0b26e4f7eb445600cc4516", "branch_name": "refs/heads/master", "committer_date": 1405372266000, "content_id": "a412fda94f85c5f3c15458057a256824792ac391", "detected_licenses": [ "Apache-2.0" ], "directory_id": "4453de00f9dbb5228a7b7aaee90052296f91c83d", "extension": "py"...
2.546875
stackv2
from jinja2 import Environment, FileSystemLoader import json import region ### ### PULL REQUESTS ACCEPTED HERE: ### https://github.com/codingoutloud/azuremap ### ####################################################################### ### UPDATE THE LIST BELOW AS DATA CENTER INFORMATION EVOLVES ### ##...
73
35.04
118
14
617
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_e2efd15b7f46768e_5f8877f5", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 65 ]
[ null ]
[ 7 ]
[ 66 ]
2024-11-18T19:03:20.182425+00:00
1,526,632,925,000
a7095acf5673ab3a99e61484545e956ef40e822f
2
{ "blob_id": "a7095acf5673ab3a99e61484545e956ef40e822f", "branch_name": "refs/heads/master", "committer_date": 1526632925000, "content_id": "abc4ec4da5e43d9a6b1fdb7751a037a367a88cb4", "detected_licenses": [ "ISC" ], "directory_id": "22e04d844059993681bf22f07a3af43c5c54eb70", "extension": "py", "fi...
2.4375
stackv2
"""This module implements an agent for KeePassC Classes: Agent(Client, Daemon) """ import logging import signal import socket import ssl import sys from hashlib import sha256 from os import chdir from os.path import expanduser, realpath, isfile, join from keepassc.conn import * from keepassc.client impor...
218
30.98
78
23
1,454
python
[{"finding_id": "codeql_py/insecure-protocol_fc9261eb238542f7_799a6856", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 specified by [call to ssl.SSLContext](1).", "remediation": "", "lo...
1
true
[ "CWE-327" ]
[ "py/insecure-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Insecure SSL/TLS protocol version TLSv1 specified by [call to ssl.SSLContext](1)." ]
[ 78 ]
[ null ]
[ 28 ]
[ 62 ]
2024-11-18T19:03:30.995169+00:00
1,593,011,356,000
e3c1a572de3c3b3d44bc1ff46c2c219a5d2e6090
4
{ "blob_id": "e3c1a572de3c3b3d44bc1ff46c2c219a5d2e6090", "branch_name": "refs/heads/master", "committer_date": 1593011356000, "content_id": "bdc6022436e52af888851d7a3d117234836fe136", "detected_licenses": [ "CC0-1.0" ], "directory_id": "514c194c4c00900662a8919eff944443cfcfbb19", "extension": "py", ...
3.703125
stackv2
# bibliotheque pour executer des requetes web : import requests import config as conf baseurl="http://api.openweathermap.org/data/2.5/weather?units=metric&appid="+conf.apikey def get_locations(): geocode=[] # geocode = tableau des listes de coord lonlat=open('lonlatonly.txt', 'r') # ouverture du fichier ...
84
34.93
132
11
814
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_aaab11a8887bb641_b686c157", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 51, 53 ]
[ null, null ]
[ 11, 11 ]
[ 14, 18 ]
2024-11-18T19:03:43.133416+00:00
1,621,600,867,000
953017f3e0861a41b0b6c48cfe602cec79db59c2
2
{ "blob_id": "953017f3e0861a41b0b6c48cfe602cec79db59c2", "branch_name": "refs/heads/master", "committer_date": 1621600867000, "content_id": "afb43dfb67983efd6db3fb0c7241703469eb76e9", "detected_licenses": [ "MIT" ], "directory_id": "059a86859bdf336c415f4a840605ba5e257db7db", "extension": "py", "fi...
2.40625
stackv2
import json import logging import os import re import sqlite3 import time from contextlib import closing from io import StringIO from pathlib import Path import pdfminer import pytest import requests as req from dotenv import load_dotenv from pdfminer.high_level import extract_text from pdfminer.high_level import extr...
168
28.3
94
19
1,192
python
[{"finding_id": "codeql_py/redos_1f11caec23f97df4_0af8dbfb", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'Tema' and containing many repetit...
3
true
[ "CWE-1333", "CWE-1333", "CWE-1333" ]
[ "py/redos", "py/redos", "py/redos" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with 'Tema' and containing many repetitions of 'Tema'.", "This part of the regular expression may cause exponential backtracking on strings starting with 'Oblig' and containing many repetitions of 'Oblig'.", "This part o...
[ 69, 69, 69 ]
[ null, null, null ]
[ 32, 40, 48 ]
[ 34, 42, 50 ]
2024-11-18T19:28:46.319190+00:00
1,535,932,966,000
d269dc07a463af32e83e76b9c4c1a794effaf5d4
3
{ "blob_id": "d269dc07a463af32e83e76b9c4c1a794effaf5d4", "branch_name": "refs/heads/master", "committer_date": 1535932966000, "content_id": "5ff15e151317be17f64ce52ee184952441979057", "detected_licenses": [ "MIT" ], "directory_id": "87b947d4cdf0fda9d3d46243380620dfc14e5b59", "extension": "py", "fi...
3.375
stackv2
# -*- coding: utf-8 -*- """ Created on Wed Aug 29 20:18:56 2018 @author: kevin """ import random import csv while True: #Age question, nullifies user input errors try: n = int(input("Please enter age: ")) except ValueError: print("Age does not compute, please enter a integer i > 1") ...
176
30.99
107
25
1,481
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5f9c25c285d0954e_ad91388b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 56 ]
[ null ]
[ 24 ]
[ 34 ]