added
stringlengths
32
32
created
int64
1,244B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.25
source
stringclasses
1 value
text
stringlengths
324
20.1k
num_lines
int64
16
598
avg_line_length
float64
15.1
58.3
max_line_length
int64
33
179
ast_depth
int64
8
39
length
int64
101
3.8k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.1k
265k
sast_codeql_findings_count
int64
1
45
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
45
rule_ids
listlengths
1
45
confidences
listlengths
1
45
severities
listlengths
1
45
messages
listlengths
1
45
line_starts
listlengths
1
45
line_ends
listlengths
1
45
column_starts
listlengths
1
45
column_ends
listlengths
1
45
2024-11-18T22:00:18.024210+00:00
1,676,139,610,000
c255927327f8898eb30e2022736b7dc9fb8fd515
3
{ "blob_id": "c255927327f8898eb30e2022736b7dc9fb8fd515", "branch_name": "refs/heads/master", "committer_date": 1676139610000, "content_id": "9ca63557214c0cfebec42b9e955ce50b7e2a1bad", "detected_licenses": [ "MIT" ], "directory_id": "255e19ddc1bcde0d3d4fe70e01cec9bb724979c9", "extension": "py", "fi...
2.890625
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- """ A simple standalone script to test an Apple Push Notification setup. Uses the feedback packets to provide the best information on how to fix things. Steps to send a push notification: * set up push certificates on your app on the developer portal and regenerate yo...
99
37.13
108
18
877
python
[{"finding_id": "codeql_py/insecure-protocol_859f49390a3eb32f_c7b7e63a", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version SSLv3 specified by [call to ssl.wrap_socket](1).", "remediation": "", "l...
1
true
[ "CWE-327" ]
[ "py/insecure-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Insecure SSL/TLS protocol version SSLv3 specified by [call to ssl.wrap_socket](1)." ]
[ 52 ]
[ null ]
[ 19 ]
[ 107 ]
2024-11-18T22:00:45.564925+00:00
1,510,322,261,000
fdf640f45bd94cc78d19c523770b164948045b68
3
{ "blob_id": "fdf640f45bd94cc78d19c523770b164948045b68", "branch_name": "refs/heads/master", "committer_date": 1510322261000, "content_id": "740a1ac7b6b479b1d6857a77c95261eb17d2eee4", "detected_licenses": [ "BSD-3-Clause", "BSD-2-Clause" ], "directory_id": "5343143a89032e08b47ebf2c36c92b72e5ff1f28...
2.96875
stackv2
""" Provides Sun-related parameters The following code is heavily based on IDL function get_sun.pro which itself is based on algorithms presented in the book Astronomical Formulae for Calculators, by Jean Meeus. Every function returning a quantity is of type astropy.units.Quantity """ from __future__ import absolute_i...
288
34.91
100
14
3,248
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_697337feb828600a_33441f2f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
4
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.\nThis expression logs [sensitive data (private)](4) as clear text.", "This expression logs [sensitive data (priva...
[ 280, 281, 282, 283 ]
[ null, null, null, 284 ]
[ 11, 11, 11, 11 ]
[ 84, 96, 90, 74 ]
2024-11-18T22:00:55.263451+00:00
1,492,018,880,000
3925ffb3c4a8ac31c8c5ce5b43973ebabf62f9a2
3
{ "blob_id": "3925ffb3c4a8ac31c8c5ce5b43973ebabf62f9a2", "branch_name": "refs/heads/master", "committer_date": 1492019307000, "content_id": "0131bacccf6c4df360d631f769f3e8fc84614174", "detected_licenses": [ "MIT" ], "directory_id": "2136e530d0066f737f66d5ac1cfeaf794e44e16f", "extension": "py", "fi...
2.5625
stackv2
import json from os.path import join, dirname, abspath from importlib import import_module from jinja2 import Environment, PackageLoader from scrapy.commands import ScrapyCommand from scrapy.commands.genspider import sanitize_module_name from scrapy.exceptions import UsageError __all__ = ['BrushCommand'] class Brus...
59
36.81
123
17
497
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_3655353144583e39_32fdc9e6", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 36 ]
[ null ]
[ 15 ]
[ 68 ]
2024-11-18T22:01:09.000144+00:00
1,597,217,928,000
b7c14fe5f4f4cc3263cdf828c27d31ad44395d76
2
{ "blob_id": "b7c14fe5f4f4cc3263cdf828c27d31ad44395d76", "branch_name": "refs/heads/master", "committer_date": 1597217928000, "content_id": "470455c8e23d9ddc012d3e4bb648958b019a66e6", "detected_licenses": [ "MIT" ], "directory_id": "188ec0ba6f69ce2d6ff765d217c037d9035fa650", "extension": "py", "fi...
2.375
stackv2
from rest_framework.viewsets import GenericViewSet from rest_framework.decorators import action, api_view from rest_framework.permissions import AllowAny from rest_framework_jwt.settings import api_settings from rest_framework.decorators import permission_classes from django.conf import settings import logging import r...
135
32.52
71
16
993
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_a84997b943d3d30c_b57ee9ff", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n...
2
true
[ "CWE-327", "CWE-022" ]
[ "py/weak-sensitive-data-hashing", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (id)](2) is used in a hashing algorithm (MD5) that is insecure.", "This path depends on a [user-provided value](1)." ]
[ 133, 109 ]
[ null, null ]
[ 27, 19 ]
[ 49, 28 ]
2024-11-18T22:26:08.321736+00:00
1,621,127,573,000
b7ebf279917645463e6cb2b436dd17fc46924490
4
{ "blob_id": "b7ebf279917645463e6cb2b436dd17fc46924490", "branch_name": "refs/heads/main", "committer_date": 1621127573000, "content_id": "079d8a31690072a8b688995a01216004c2cc4b49", "detected_licenses": [ "MIT" ], "directory_id": "5c7f87cc3777db8700a98e5b390b6964f1104504", "extension": "py", "file...
4.09375
stackv2
import random def jogar(): print("*" * 30) print("Bem vindo no jogo da Adivinhação") print("*" * 30) # numeroSecreto = 10 # numeroSecreto = round(random.random() * 100) # rodada = 1 numeroSecreto = random.randrange(1, 101) print(f'Número secreto: {numeroSecreto}') tentativas ...
78
28.21
89
16
654
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5e56e1227c06263e_b6d2c3e0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 14 ]
[ null ]
[ 11 ]
[ 45 ]
2024-11-18T22:26:09.240508+00:00
1,550,659,661,000
5e8c122d273a077de2ddca641bd2dbebf354efcc
2
{ "blob_id": "5e8c122d273a077de2ddca641bd2dbebf354efcc", "branch_name": "refs/heads/master", "committer_date": 1550659661000, "content_id": "4870d4c22cabce46dcd8c07794d121159df6f6a5", "detected_licenses": [ "MIT" ], "directory_id": "a63b417f28f0ce306aa0d4194928906d4ba14aa6", "extension": "py", "fi...
2.453125
stackv2
#!/usr/bin/env python import config import sys import time import select import paramiko import re import requests from influxdb import InfluxDBClient def connect_to_host(host): i = 1 while True: try: ssh = paramiko.SSHClient() ssh.set_missing_host_key_policy(paramiko.AutoAddP...
61
24.54
109
15
373
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_1ce0b71f18a4ccd1_a5b5a67b", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 18 ]
[ null ]
[ 13 ]
[ 70 ]
2024-11-18T20:39:48.393447+00:00
1,605,554,626,000
0dc5f21f8f278672b5eaaca352cf0ab4f6d8708b
3
{ "blob_id": "0dc5f21f8f278672b5eaaca352cf0ab4f6d8708b", "branch_name": "refs/heads/master", "committer_date": 1605554626000, "content_id": "3d97e09e3ecce59e021a78a3d0aa33b8cb849645", "detected_licenses": [ "Apache-2.0" ], "directory_id": "2fd9c8545d3c7a113ad5e5fab1d5a3ce7e593a83", "extension": "py"...
2.78125
stackv2
#! /usr/local/bin/python3 import requests from bs4 import BeautifulSoup import hashlib def generate_sid(key): page = requests.get("http://fritz.box/login_sid.lua") soup = BeautifulSoup(page.text, 'html.parser') challenge_value = soup.find('challenge').text password = challenge_value + '-' + key ...
83
23.77
94
13
492
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_4e8b68bc3c57860b_43e8aebe", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 16 ]
[ null ]
[ 29 ]
[ 56 ]
2024-11-18T20:39:52.854743+00:00
1,612,176,715,000
bb51265da865604124da5338aa0026d94b981551
2
{ "blob_id": "bb51265da865604124da5338aa0026d94b981551", "branch_name": "refs/heads/main", "committer_date": 1612176715000, "content_id": "f87e4c6356f0c7ee2428324f8bf675b8b8c7ae70", "detected_licenses": [ "Apache-2.0" ], "directory_id": "568d7d17d09adeeffe54a1864cd896b13988960c", "extension": "py", ...
2.5
stackv2
from django.http import HttpResponse, JsonResponse from django.shortcuts import render # Create your views here. from django.utils.decorators import method_decorator from django.views import View import json from .models import UserProfile import hashlib import jwt import time from django.conf import settings from too...
186
29.5
66
20
1,577
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_fbe7b37629d186cb_e35ba14e", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 87 ]
[ null ]
[ 20 ]
[ 39 ]
2024-11-18T20:40:02.297216+00:00
1,601,423,530,000
59f35de5f58de7d668d1a23986ad516ab772adf4
2
{ "blob_id": "59f35de5f58de7d668d1a23986ad516ab772adf4", "branch_name": "refs/heads/master", "committer_date": 1601423530000, "content_id": "73a577d008bf0c41c53d98827a70f3084d93f3ca", "detected_licenses": [ "MIT" ], "directory_id": "74cec3aefc021447b79bd681901d085f207b1e13", "extension": "py", "fi...
2.3125
stackv2
# -*- coding: utf-8 -*- """General shortcuts. """ from django.shortcuts import Http404, get_object_or_404 from rest_framework.exceptions import NotFound, APIException def drf_get_object_or_404(klass, *args, **kwargs): """drf_get_object_or_404. """ try: return get_object_or_404(klass, *args, **kwar...
17
31.24
67
18
140
python
[{"finding_id": "codeql_py/stack-trace-exposure_1c5dc6bbfa18057a_06910fec", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 17 ]
[ null ]
[ 35 ]
[ 45 ]
2024-11-18T20:52:18.174597+00:00
1,630,424,893,000
855dcb4029ab53e6a52993ad1f53a45a83ada828
4
{ "blob_id": "855dcb4029ab53e6a52993ad1f53a45a83ada828", "branch_name": "refs/heads/main", "committer_date": 1630424893000, "content_id": "71bebea75f4a703de5687333f7219310e253ad8f", "detected_licenses": [ "MIT" ], "directory_id": "79d776e2e3ff18b5206cf4165418bd76c4a4ed8e", "extension": "py", "file...
4.09375
stackv2
""" This program create a password with random positions until 94 characters """ import random import string print("Welcome") password_lenght = int(input("\nEnter the lenght of password: ")) lower_char = string.ascii_lowercase upper_char = string.ascii_uppercase number_char = string.digits symbol_char = string.punc...
23
20.83
72
10
112
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_cef07485583631f1_842ef2c0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 23 ]
[ null ]
[ 7 ]
[ 37 ]
2024-11-18T21:08:08.039794+00:00
1,641,678,092,000
ec2c3173f1db3da654c74ce0e3c0019fa5dac61d
2
{ "blob_id": "ec2c3173f1db3da654c74ce0e3c0019fa5dac61d", "branch_name": "refs/heads/master", "committer_date": 1641678092000, "content_id": "2943bf64420a5a50c77e538cee741c7649c86254", "detected_licenses": [ "Unlicense" ], "directory_id": "86a213706d55b4f1d390d9b99d59fa78b158a202", "extension": "py",...
2.375
stackv2
from __future__ import print_function from watson_developer_cloud import SpeechToTextV1 from watson_developer_cloud.websocket import RecognizeCallback from watson_developer_cloud import ConversationV1 import os, sys, subprocess, threading, time, json, re, signal, snowboydecoder STTusername = os.environ['WTTSusername'...
114
27.35
142
12
812
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ffb814d853195608_3085923b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 27, 29 ]
[ null, null ]
[ 8, 8 ]
[ 43, 41 ]
2024-11-18T21:08:25.739920+00:00
1,490,999,317,000
677e283b21871ff7dda921373d531420ade9d8df
2
{ "blob_id": "677e283b21871ff7dda921373d531420ade9d8df", "branch_name": "refs/heads/master", "committer_date": 1490999317000, "content_id": "1f90ae33d76579b9089ea5f48e4e0249ccb5243a", "detected_licenses": [ "MIT" ], "directory_id": "9d5d818ced0dc8bf4909d8312f4ab499691fcdd0", "extension": "py", "fi...
2.4375
stackv2
#!/usr/bin/env python3 import argparse import configparser import os import sys import re from jinja2 import Environment, DictLoader from tabulate import tabulate from argparse import RawTextHelpFormatter USERNAME = os.environ.get("SUDO_USER") or os.environ.get("USER") if (not USERNAME): print("Username could not...
330
34.11
80
17
2,636
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_58e4be24e6fc82f3_ff4ac592", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 282 ]
[ null ]
[ 17 ]
[ 65 ]
2024-11-18T21:32:21.365561+00:00
1,581,253,928,000
83fa95854a7cb3d5a2de8d177348441da5dab85d
3
{ "blob_id": "83fa95854a7cb3d5a2de8d177348441da5dab85d", "branch_name": "refs/heads/master", "committer_date": 1581253928000, "content_id": "bdae3fa9db0313d6137e4639814046e66613a1e7", "detected_licenses": [ "MIT" ], "directory_id": "c4c29e0943e727322be4b31f7d51fdaf250e9ac3", "extension": "py", "fi...
3.15625
stackv2
# import libraries import re import nltk import pandas as pd from nltk.corpus import stopwords from nltk.stem.wordnet import WordNetLemmatizer from nltk.tokenize import word_tokenize from sklearn.base import BaseEstimator, TransformerMixin stop_words = stopwords.words('english') lemmatizer = WordNetLemmatizer() url_r...
121
27.71
93
15
851
python
[{"finding_id": "codeql_py/overly-large-range_764866d6923f7dc0_14da5149", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 13 ]
[ null ]
[ 45 ]
[ 48 ]
2024-11-18T21:32:26.762012+00:00
1,528,145,932,000
881d06ae613c30198250379fa6f565237e53ce4f
2
{ "blob_id": "881d06ae613c30198250379fa6f565237e53ce4f", "branch_name": "refs/heads/master", "committer_date": 1528145932000, "content_id": "0bd9300ba1f36feb973d566e82246977cfc638a7", "detected_licenses": [ "MIT" ], "directory_id": "acabaf7bcc2bf3c42ee7df51391d770a77707ac1", "extension": "py", "fi...
2.3125
stackv2
import os from datetime import datetime, timedelta #Import Flask from flask import Flask, render_template, request, jsonify, json, Response, g from itsdangerous import TimedJSONWebSignatureSerializer as Serializer, BadSignature, SignatureExpired #import stuff for database from flask_sqlalchemy import SQLAlchemy from...
217
32
102
21
1,540
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5b0968f329a1fe7d_2ecb9866", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-215" ]
[ "py/clear-text-logging-sensitive-data", "py/flask-debug" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger." ]
[ 138, 217 ]
[ null, null ]
[ 23, 5 ]
[ 54, 24 ]
2024-11-18T21:49:05.899150+00:00
1,607,091,941,000
08708e4773c01c0f93659d1a69449038ebd69943
4
{ "blob_id": "08708e4773c01c0f93659d1a69449038ebd69943", "branch_name": "refs/heads/main", "committer_date": 1607091941000, "content_id": "0df31d6016d35414ad5807677726bc364fb4c867", "detected_licenses": [ "MIT" ], "directory_id": "4e269268451a9d84d3310dedd1f60d46ed2e3e0c", "extension": "py", "file...
3.59375
stackv2
from hashlib import md5 init = 'ckczppom' def is_pw(key: str, num: int, leading_zeros: int) -> bool: full_key = key + str(num) m = md5(full_key.encode()) target = "0" * leading_zeros return m.hexdigest()[0:leading_zeros] == target def password(init, leading_zeros): key = init for i in range(10...
25
23.04
58
10
196
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4471e4c17c0bb19c_36aa5cd5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 24, 25 ]
[ null, null ]
[ 7, 7 ]
[ 24, 24 ]
2024-11-18T21:49:13.189826+00:00
1,618,391,805,000
b38c0ce40d4231a19f9636329457b2d7aa277c5e
2
{ "blob_id": "b38c0ce40d4231a19f9636329457b2d7aa277c5e", "branch_name": "refs/heads/main", "committer_date": 1618391805000, "content_id": "a91c027cd97a75b8eb0546b0743c458fba3dd77b", "detected_licenses": [ "Apache-2.0" ], "directory_id": "befaebdc6723d12c7b043c8f0d61148f82377507", "extension": "py", ...
2.328125
stackv2
from jinja2 import Template import json try: import importlib.resources as pkg_resources except ImportError: import importlib_resources as pkg_resources def visualize(dicts: dict, out: str): with pkg_resources.path('resources', "viz.j2") as file_: template = Template(file_.read_text()) with ...
35
30.49
110
12
273
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_b7750122bc4e6bc4_19a64160", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 12 ]
[ null ]
[ 20 ]
[ 47 ]
2024-11-18T21:49:22.992655+00:00
1,293,850,972,000
3ec953a9864922d8e6b7da7793530eeaffa7304b
3
{ "blob_id": "3ec953a9864922d8e6b7da7793530eeaffa7304b", "branch_name": "refs/heads/master", "committer_date": 1293850972000, "content_id": "65cdb11e6defaffe803c73b9c8e34afce25eb105", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "3a3f00324fdf2dedede45d072a47f38fdc5a58f3", "extension": "p...
2.5625
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- """ fission.package ~~~~~~~~~~~~~~ Download and expand tar.gz file. :copyright: (c) 2010-2011 Shinya Ohyanagi, All rights reserved. :license: BSD, see LICENSE for more details. """ from paver.easy import task, cmdopts, path, sh from datetime import ...
186
22.66
83
23
1,078
python
[{"finding_id": "codeql_py/tarslip_8dc0c2bb1b6b65b3_2b2e4d1d", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 85 ]
[ null ]
[ 5 ]
[ 12 ]
2024-11-18T22:26:06.723118+00:00
1,550,641,127,000
901c7531ff149c5ffa4506e72f606061ae70a031
2
{ "blob_id": "901c7531ff149c5ffa4506e72f606061ae70a031", "branch_name": "refs/heads/master", "committer_date": 1550641127000, "content_id": "68a7e1866bd867dc4c60b3443cc3bf8ea230d33d", "detected_licenses": [ "MIT" ], "directory_id": "4dceaa269da9629f9882e78e6a0cef449ea38499", "extension": "py", "fi...
2.40625
stackv2
import hashlib import logging import time import requests logger = logging.getLogger(__name__) API_BASE_URL = 'https://smartapi.vesync.com' API_RATE_LIMIT = 30 API_TIMEOUT = 5 DEV15ASTATUS = '/15a/v1/device/devicestatus' DEV15ADETAILS = '/15a/v1/device/devicedetail' DEVICEAPI = '/platform/v1/app/devices' class VeS...
415
33.58
117
23
2,935
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_e3c044a942641e2a_afdb8cc8", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 232 ]
[ null ]
[ 69 ]
[ 98 ]
2024-11-18T20:31:38.755490+00:00
1,646,620,091,000
a5d2bf8a922dcc3452089c2715a0c66e6769db23
3
{ "blob_id": "a5d2bf8a922dcc3452089c2715a0c66e6769db23", "branch_name": "refs/heads/master", "committer_date": 1646620091000, "content_id": "4237e2b01187b6d7bba57b041c6c4e865859d0fe", "detected_licenses": [ "MIT" ], "directory_id": "ef49c247360cefd3efd43cc0293b367004e2383c", "extension": "py", "fi...
2.578125
stackv2
#!/usr/bin/python3 # -*-: coding: utf-8 -*- """ :author: albert :date: 02/28/2019 :desc: http请求工具类 """ import logging import requests from config import GLOBAL_PROXY class Request: def __init__(self, url, params=None, proxy=False, **kwargs): self.proxy = proxy self.url = url self.params =...
39
22.26
92
13
239
python
[{"finding_id": "codeql_py/request-without-cert-validation_552f52ffb67262d9_ac2f3a55", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 24 ]
[ null ]
[ 16 ]
[ 93 ]
2024-11-18T20:31:39.896898+00:00
1,506,194,945,000
15a4307c82327027718321df88d10e10069583f6
2
{ "blob_id": "15a4307c82327027718321df88d10e10069583f6", "branch_name": "refs/heads/master", "committer_date": 1506194945000, "content_id": "c714dc2d4d0ff76afb5c0cf30cb7b27efee4a5d2", "detected_licenses": [ "MIT" ], "directory_id": "be6d8c95dd40fd4944986359b44bb9276ff5e578", "extension": "py", "fi...
2.375
stackv2
import os import cv2 import numpy import requests from flask import Flask from flask import render_template from flask import request import config app = Flask(__name__, template_folder='templates', static_folder='static') rep = config.get_rep0st() if config.IS_PRODUCTION: rep.get_index() @app.route("/", meth...
98
23.95
112
19
549
python
[{"finding_id": "codeql_py/full-ssrf_fc91293d6b257a1d_3ac84352", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
2
true
[ "CWE-918", "CWE-918" ]
[ "py/full-ssrf", "py/full-ssrf" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1).", "The full URL of this request depends on a [user-provided value](1)." ]
[ 62, 69 ]
[ null, null ]
[ 9, 12 ]
[ 26, 29 ]
2024-11-18T20:31:40.017803+00:00
1,542,970,766,000
f061f8a27df5e5615abd16cbddc0c480ac0b96c1
3
{ "blob_id": "f061f8a27df5e5615abd16cbddc0c480ac0b96c1", "branch_name": "refs/heads/master", "committer_date": 1542970766000, "content_id": "d3a87dc5b6326b084153d8965bf9e2aebc7a1134", "detected_licenses": [ "MIT" ], "directory_id": "9641ff7f636f902d56289e7c2822d009254669ec", "extension": "py", "fi...
2.640625
stackv2
#!/usr/bin/python3 from flask import Flask, request, redirect, render_template, jsonify from telegram import Telegram import os,json,datetime,subprocess,time app = Flask(__name__) download_path = "{}/Downloads/".format(os.getcwd()) def append_to_downloads(data): # append the argument to Downloads/downloads.json ...
72
35.57
116
18
657
python
[{"finding_id": "codeql_py/command-line-injection_82fe270c80450e79_2a1a56aa", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {...
2
true
[ "CWE-078", "CWE-022" ]
[ "py/command-line-injection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This command line depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 37, 36 ]
[ null, null ]
[ 19, 18 ]
[ 85, 47 ]
2024-11-18T20:31:41.105249+00:00
1,559,313,807,000
a80aa0f01eae81106cb68c2435e16deb38dd10f4
2
{ "blob_id": "a80aa0f01eae81106cb68c2435e16deb38dd10f4", "branch_name": "refs/heads/master", "committer_date": 1559313807000, "content_id": "52d4c91f27a3e31c03075e23967fbdb6ae50bcc5", "detected_licenses": [ "MIT" ], "directory_id": "a9a0a22482c1c1734ebb232cfa99496e92e55790", "extension": "py", "fi...
2.421875
stackv2
import yaml import sys import os import pathlib import zipfile import shutil import tarfile import errno # Read YAML file def main(argv): command_name = 'mkisofs' target_directory = 'target' if sys.version_info[0] != 3 or sys.version_info[1] < 6: print("This script requires Python version 3.6+") ...
194
32.94
76
22
1,430
python
[{"finding_id": "codeql_py/tarslip_5e594c0a5a6123a0_c45aaa00", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 174 ]
[ null ]
[ 9 ]
[ 12 ]
2024-11-18T20:53:39.110505+00:00
1,620,457,810,000
157880aaacd6e831180b933179de72f5b581c311
2
{ "blob_id": "157880aaacd6e831180b933179de72f5b581c311", "branch_name": "refs/heads/master", "committer_date": 1620457810000, "content_id": "b4261a85b033b200c1184ddc6452da2a006167c2", "detected_licenses": [ "MIT" ], "directory_id": "8a1deb6fa8d615d6ce58d0b082286bf3638e454a", "extension": "py", "fi...
2.46875
stackv2
# coding: utf-8 from base64 import b64decode import binascii import codecs from io import BytesIO import struct import re from Crypto.Cipher import AES, PKCS1_OAEP from Crypto.Util import number from Crypto.PublicKey import RSA from .account import Account from .chunk import Chunk # Secure note types that contain a...
284
28.99
111
15
2,249
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_d6f2be3396a4b9de_14619b82", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode CBC](1) is broken or weak, and should not be used.\n[The block mode ...
1
true
[ "CWE-327" ]
[ "py/weak-cryptographic-algorithm" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[The block mode CBC](1) is broken or weak, and should not be used.\n[The block mode ECB](2) is broken or weak, and should not be used.\n[The block mode CBC](3) is broken or weak, and should not be used.\n[The block mode ECB](4) is broken or weak, and should not be used." ]
[ 281 ]
[ null ]
[ 9 ]
[ 26 ]
2024-11-18T20:53:39.158332+00:00
1,560,771,099,000
3482b81e810bdea38add33a1bb493da426b192a3
4
{ "blob_id": "3482b81e810bdea38add33a1bb493da426b192a3", "branch_name": "refs/heads/master", "committer_date": 1560771099000, "content_id": "36bfcbdd982ae332b0d42c1f40aa51192dc4fd20", "detected_licenses": [ "MIT" ], "directory_id": "0fac5c9888fd8efc01b06357a5c069cd65750c7f", "extension": "py", "fi...
4.125
stackv2
''' 2.0新增功能:循环的终止 break 3.0新增功能:保存密码及强度到文件中:mode r ,w ,r+(读写),a(在末尾添加附加内容,不会覆盖掉之前w写入的内容) 4.0新增功能:读取文件中的密码:read():返回整个内容的字符串。readline()返回文件中下一行内容的字符串。readlines()返回每段以\n结尾的字符串的整个文件list。 文件可进行 for line in f: 5.0新增功能:定义一个password工具class:把面向过程中的变量抽成一个class的属性来处理,然后把相关包含的变量的方法,抽成class的def 6.0新增功能:定义一个文件...
113
21.59
98
13
764
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_8b8134d61388584f_4a6feb2b", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 70 ]
[ null ]
[ 17 ]
[ 21 ]
2024-11-18T21:47:34.454003+00:00
1,648,228,172,000
8b6dda78b7dd38c1c85d594a9071807014ef4e3a
3
{ "blob_id": "8b6dda78b7dd38c1c85d594a9071807014ef4e3a", "branch_name": "refs/heads/master", "committer_date": 1648228172000, "content_id": "ba147df79f640bf71787cba821fa8ad57b243231", "detected_licenses": [ "MIT" ], "directory_id": "e3cdc4e999e4d6d039be09f7836ccbcc6372b517", "extension": "py", "fi...
2.546875
stackv2
import requests from configs import default class RestClient(object): _instance = None APP_SCOPES = { "publisher": 'apim:api_view apim:api_create apim:api_publish apim:tier_view apim:tier_manage apim:subscription_view apim:subscription_block apim:subscribe', "store": 'apim:subscribe apim:signu...
59
35.59
164
16
483
python
[{"finding_id": "codeql_py/request-without-cert-validation_f26c0480558e2b52_3ede3c3e", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1) by [this value](2)." ]
[ 31 ]
[ 32 ]
[ 17 ]
[ 64 ]
2024-11-18T21:47:35.373850+00:00
1,604,483,018,000
11246617c174c7d93d6da62766551db1fd1cdf59
3
{ "blob_id": "11246617c174c7d93d6da62766551db1fd1cdf59", "branch_name": "refs/heads/master", "committer_date": 1604483018000, "content_id": "87bc9f99778a8995b37c13bcaa2582912e6331d7", "detected_licenses": [ "MIT" ], "directory_id": "991c3b30ae7310535cf0f91d6cc91fab1125f3e0", "extension": "py", "fi...
3.15625
stackv2
import re import nltk import math import numpy as np from nltk.corpus import cmudict from scipy.interpolate import interp1d from statistics import mean, mode, StatisticsError d = cmudict.dict() extra_abbreviations = ['inc', 'i.e', 'e.g'] sentence_tokenizer = nltk.data.load('tokenizers/punkt/english.pickle') sentence...
380
28.1
107
22
2,879
python
[{"finding_id": "codeql_py/overly-large-range_55d0aab4954c3187_60e6d044", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 136 ]
[ null ]
[ 54 ]
[ 57 ]
2024-11-18T22:28:50.402789+00:00
1,593,403,514,000
6d9f3758fceebffbf89054a0cec2aa9ace0fbeb2
3
{ "blob_id": "6d9f3758fceebffbf89054a0cec2aa9ace0fbeb2", "branch_name": "refs/heads/master", "committer_date": 1593403514000, "content_id": "62b5d72e45b05087dcf5654fa05d529ed53d9e15", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e6efe213644e36723bcdc4c5684144febd0b8c60", "extension": "py"...
2.53125
stackv2
import os import subprocess from flask import Flask, request, make_response print("Started...") app = Flask(__name__) @app.route('/') def func1(): print("Running") return "Hello World" @app.route('/exec', methods=['POST']) def route_exec(): command = request.data.decode('utf-8') try: complete...
28
29.79
149
13
207
python
[{"finding_id": "codeql_py/command-line-injection_6b7b7b762c48f232_6b8dbe55", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {...
2
true
[ "CWE-078", "CWE-215" ]
[ "py/command-line-injection", "py/flask-debug" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This command line depends on a [user-provided value](1).", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger." ]
[ 17, 28 ]
[ null, null ]
[ 43, 5 ]
[ 50, 80 ]
2024-11-18T22:28:52.247012+00:00
1,597,507,184,000
a3ec98a3bea3648db1bf8f775b4e8a5c23aee395
3
{ "blob_id": "a3ec98a3bea3648db1bf8f775b4e8a5c23aee395", "branch_name": "refs/heads/master", "committer_date": 1597507184000, "content_id": "fa7835ec4c14b61b26c1ecdf91c438bd83c7acf3", "detected_licenses": [ "MIT" ], "directory_id": "42ffc94db17b90fee293e8e6b774f3d1b553d845", "extension": "py", "fi...
2.5625
stackv2
from flask import Flask, render_template, url_for, request, redirect from flask_bootstrap import Bootstrap import os import inference app=Flask(__name__) Bootstrap(app) """ Routes """ @app.route('/',methods=['GET','POST']) def index(): if request.method == 'POST': uploaded_file= request.files['file'] ...
29
28.28
69
14
171
python
[{"finding_id": "codeql_py/flask-debug_85017a5f635928e7_ed2c0e92", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-022" ]
[ "py/flask-debug", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1)." ]
[ 29, 18 ]
[ null, null ]
[ 5, 32 ]
[ 24, 42 ]
2024-11-18T22:29:02.043067+00:00
1,576,477,306,000
4eea0e5cdf49fdfd0e397bdaa59d5e642738af07
3
{ "blob_id": "4eea0e5cdf49fdfd0e397bdaa59d5e642738af07", "branch_name": "refs/heads/master", "committer_date": 1576477306000, "content_id": "033c73843a9d47b5928eac97f80c8dee710e4d8b", "detected_licenses": [ "MIT" ], "directory_id": "3a55703604f884b08c06e75de5d0a2d17170ba72", "extension": "py", "fi...
3.21875
stackv2
import pyperclip from user import User from credentials import Credential import string import random def create_user(username,password): ''' Function to create a new user account ''' new_user = User(username,password) return new_user def save_user(user): ''' Function to save new user account ''' user.save_u...
318
25.41
121
30
1,880
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_890d21f3d584e207_3bd62f7e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
7
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensi...
[ 92, 134, 138, 152, 230, 234, 248 ]
[ null, null, null, null, null, null, null ]
[ 10, 19, 19, 18, 19, 19, 18 ]
[ 70, 87, 87, 115, 87, 87, 115 ]
2024-11-18T22:29:22.076990+00:00
1,608,142,050,000
29697fbb1cbfdf3476accee32476a754bfcd1700
3
{ "blob_id": "29697fbb1cbfdf3476accee32476a754bfcd1700", "branch_name": "refs/heads/master", "committer_date": 1608142050000, "content_id": "c2c65b22159361f6884e4134357aeaa63d93a3c9", "detected_licenses": [ "MIT" ], "directory_id": "990d812fe4c29e42e12f5af888f2f556e9994ba2", "extension": "py", "fi...
2.640625
stackv2
import numpy as np import re import string import pandas as pd from gensim.models import Doc2Vec from gensim.models.doc2vec import LabeledSentence from gensim import utils from nltk.corpus import stopwords def textClean(text): text = re.sub(r"[^A-Za-z0-9^,!.\/'+-=]", " ", text) text = text.lower().split() ...
71
30.27
103
16
580
python
[{"finding_id": "codeql_py/overly-large-range_da238ba65a753f5c_7bea3d22", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with 0-9 in the same character class, and is equivalent to \\[+...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with 0-9 in the same character class, and is equivalent to \\[+,\\-.\\/0-9:;<=\\]." ]
[ 12 ]
[ null ]
[ 39 ]
[ 42 ]
2024-11-18T22:29:33.161883+00:00
1,520,192,788,000
0786084bae76f4bc7604af3588add2ed1255fee3
3
{ "blob_id": "0786084bae76f4bc7604af3588add2ed1255fee3", "branch_name": "refs/heads/master", "committer_date": 1520192788000, "content_id": "1467bc5bba417878b18dc2d485c6f6224bb83648", "detected_licenses": [ "MIT" ], "directory_id": "f5b6c97e74939508c11a61216f296e98410d69f0", "extension": "py", "fi...
2.625
stackv2
#!/usr/bin/env python2 # -*- coding: utf-8 -*- """ Created on Mon Feb 19 11:58:11 2018 @author: Vilja Hulden Extract information from the Chronicling America RDF files - each publication title (identified with an "sn" ID) has an associated RDF file that contains various metadata about the title. Among other things, ...
191
36.9
101
16
2,118
python
[{"finding_id": "codeql_py/overly-large-range_a2c7844e3df9d1da_40f8dda9", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/incomplete-hostname-regexp" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "This regular expression has an unescaped '.' before 'geonames.org/', so it might match more hosts than expected." ]
[ 54, 71 ]
[ null, null ]
[ 43, 29 ]
[ 46, 57 ]
2024-11-18T22:29:43.041113+00:00
1,589,569,085,000
bb60bc60c9fb4d2b12eaa69f4553001534e67e5f
3
{ "blob_id": "bb60bc60c9fb4d2b12eaa69f4553001534e67e5f", "branch_name": "refs/heads/master", "committer_date": 1589569085000, "content_id": "a0edac002e877022460f418a1870e0ed55d206ab", "detected_licenses": [ "MIT" ], "directory_id": "d94a8f8e512093a49a8cb0a6c246c2431b94e7ff", "extension": "py", "fi...
2.546875
stackv2
""" Filters down a directory of grb2 files to a specific geometry. FIXME:100 There is a memory leak somewhere in this file. No clue where, but at month-level granularities, you need at least 2GB ram/year-month. """ import os import click import pandas as pd import geopandas as gpd import xarray as xr import tarfile i...
216
29.87
144
18
1,783
python
[{"finding_id": "codeql_py/tarslip_67bcc1ea80310aa0_18d3a22c", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 98 ]
[ null ]
[ 24 ]
[ 31 ]
2024-11-18T22:40:26.171515+00:00
1,504,642,741,000
2e756cc15f61e75af996493ebbd1188fae2f08a7
3
{ "blob_id": "2e756cc15f61e75af996493ebbd1188fae2f08a7", "branch_name": "refs/heads/master", "committer_date": 1504642741000, "content_id": "510aff3ece51e3b9b89c9711807a943dd146c36a", "detected_licenses": [ "Apache-2.0" ], "directory_id": "9f9e162323176f6a220a701ea680ee3f0712b40b", "extension": "py"...
2.96875
stackv2
''' Created on 4 Mar 2017 @author: Robert Putt ''' import logging import argparse import random import bcrypt from openschoolmail.config import DB_URI from openschoolmail.config import SECRET_KEY from openschoolmail.db.models import Staff from openschoolmail.db import get_db_session logging.basicConfig(level=logging...
85
30.25
86
12
556
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_86d5ce7e44f1dc87_79771167", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text." ]
[ 82 ]
[ null ]
[ 18 ]
[ 50 ]
2024-11-18T22:40:27.485514+00:00
1,565,090,854,000
bf0547d82ee80b6319e75ff29ad83d6dfe9c028a
3
{ "blob_id": "bf0547d82ee80b6319e75ff29ad83d6dfe9c028a", "branch_name": "refs/heads/master", "committer_date": 1565090854000, "content_id": "57666d602bbaaaf3ae271b6228c7aa7881e9d36d", "detected_licenses": [ "MIT" ], "directory_id": "15e2c7b30aa72891d6971b911059c3ca62f5a64c", "extension": "py", "fi...
2.625
stackv2
#coding:utf-8 import ftplib import sys,socket def ftpburp(ip,port): with open('ftp\user.txt','r') as user: users = user.readlines() with open('ftp\pass.txt','r') as passs: pwds = passs.readlines() user.close() passs.close() addr = (ip, int(port)) sock_21 = socket.socket(so...
41
24.22
100
18
242
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_289d368f208e05d4_771e34e8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 34 ]
[ null ]
[ 38 ]
[ 100 ]
2024-11-18T22:54:27.221476+00:00
1,680,460,946,000
fd4662fb77c3e1db7b002986bb4621bde8c63f7f
3
{ "blob_id": "fd4662fb77c3e1db7b002986bb4621bde8c63f7f", "branch_name": "refs/heads/main", "committer_date": 1680460946000, "content_id": "1d2262abe79fb442666c9ad36bc3e3f0568ac497", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "168faa31153797d034bc7413dd732bb5830bb5c5", "extension": "py"...
3.0625
stackv2
""" ================== Timeout Middleware ================== Middleware to ensure that request handling does not exceeds X seconds. Usage ===== .. code-block:: python from aiohttp import web from aiohttp_middlewares import ( error_middleware, timeout_middleware, ) # Basic usage ...
144
33.69
79
16
1,065
python
[{"finding_id": "codeql_py/log-injection_50af2328a33a653e_1cc0ca42", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 137 ]
[ null ]
[ 23 ]
[ 71 ]
2024-11-18T22:54:33.769988+00:00
1,599,812,355,000
04ac3fb6b4cf387108789da3c6ed51888f7d5d11
2
{ "blob_id": "04ac3fb6b4cf387108789da3c6ed51888f7d5d11", "branch_name": "refs/heads/master", "committer_date": 1599812355000, "content_id": "227d205f7409749a641fb80c84ae9c60f94ac676", "detected_licenses": [ "Apache-2.0" ], "directory_id": "37df3ce2112fe2961d0683ec1ee8a1c79fd5f182", "extension": "py"...
2.328125
stackv2
#!/usr/bin/env python3 # -*- coding:utf-8 -*- """ @project: k8scontroller-metadata-exporter @component: core @author: vfabi @support: vfabi @initial date: 2020-05-17 18:30:40 @license: this file is subject to the terms and conditions defined in file 'LICENSE', which is part of this sour...
223
36.91
145
18
1,777
python
[{"finding_id": "codeql_py/stack-trace-exposure_357c5d493e8f6781_cfdd66c4", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
3
true
[ "CWE-209", "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 114, 178, 215 ]
[ null, null, null ]
[ 24, 24, 24 ]
[ 32, 32, 32 ]
2024-11-18T20:55:13.453973+00:00
1,543,878,242,000
a230ae970c528aa91965bcebc5c808c118e3019c
2
{ "blob_id": "a230ae970c528aa91965bcebc5c808c118e3019c", "branch_name": "refs/heads/master", "committer_date": 1543878242000, "content_id": "e203ee86e163d74f495f67e78eee876d538e2a45", "detected_licenses": [ "Apache-2.0" ], "directory_id": "5ebdf723e4f26230b6e6ad9307f15a081993194d", "extension": "py"...
2.34375
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- # # Copyright 2011-2016 Lancaster University. # # # This file is part of Yarely. # # Licensed under the Apache License, Version 2.0. # For full licensing information see /LICENSE. # Standard library imports import json import logging import threading from xml.etree imp...
200
31.38
79
17
1,348
python
[{"finding_id": "codeql_py/log-injection_48c5248a91e9d1ae_422aae28", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 71 ]
[ null ]
[ 19 ]
[ 57 ]
2024-11-18T21:33:29.719071+00:00
1,596,976,420,000
5c7b210be4385fd6ed9d109a272cddd22ae43352
2
{ "blob_id": "5c7b210be4385fd6ed9d109a272cddd22ae43352", "branch_name": "refs/heads/master", "committer_date": 1596976420000, "content_id": "1b4f7ad6198640e36419ebd54dc4878dba7314fa", "detected_licenses": [ "MIT" ], "directory_id": "0f894f29f1065a42523a5cbfb9c33d01f26d4558", "extension": "py", "fi...
2.40625
stackv2
#!/usr/bin/env python3 import os import re import sys from glob import glob import argparse from pprint import pprint from jinja2 import FileSystemLoader, Environment, TemplateNotFound, FunctionLoader from collections import OrderedDict class HumeRenderer(): def __init__(self,templates_dir=None, transfer_method=N...
230
33
92
17
1,821
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_f7753dd986ad2396_4dce017d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 32, 37 ]
[ 33, 38 ]
[ 23, 31 ]
[ 52, 60 ]
2024-11-18T21:55:47.887177+00:00
1,575,423,938,000
b99b1709316a67834957030cd6c3173e4124bc87
2
{ "blob_id": "b99b1709316a67834957030cd6c3173e4124bc87", "branch_name": "refs/heads/master", "committer_date": 1575423938000, "content_id": "883dd2c049178f4e9e05f39525610a9da5ee0706", "detected_licenses": [ "MIT" ], "directory_id": "dc9e005a228441ff77022bbf898ef00721aaf85d", "extension": "py", "fi...
2.421875
stackv2
import os import sys from flask import Flask import hvac import json app = Flask(__name__) @app.route('/') def hello_world(): port = os.getenv('NOMAD_PORT_http', 8000) arg = None if len(sys.argv) > 1: arg = sys.argv[1] token = os.getenv('VAULT_TOKEN', None) data = {} err = None if t...
29
31.66
118
17
274
python
[{"finding_id": "codeql_py/stack-trace-exposure_e31082eea0e28059_ba1bf5f5", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 25 ]
[ null ]
[ 12 ]
[ 119 ]
2024-11-18T21:55:58.847815+00:00
1,525,805,898,000
23014f4452496cc9d595bded95ba075ddbe1ff0d
3
{ "blob_id": "23014f4452496cc9d595bded95ba075ddbe1ff0d", "branch_name": "refs/heads/master", "committer_date": 1525805898000, "content_id": "48470c4af64da29fcb125b2a688a3c85bb7b1536", "detected_licenses": [ "MIT" ], "directory_id": "6ef615e3a34075c1a440f23f43db7d996d3333ce", "extension": "py", "fi...
2.734375
stackv2
import os import subprocess from flask import Flask, request app = Flask(__name__) @app.route('/', methods=['GET', 'POST']) def hello_world(): jsonData = request.json if jsonData: return "{\"message\": \"Hello\", \"data\": [{\"name\": \""+jsonData['name']+"\", \"source\": \""+jsonData['source']+"\"}]}" else: re...
24
28.88
125
18
183
python
[{"finding_id": "codeql_py/stack-trace-exposure_bd7b8f23eeea34d9_7007b32f", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-079" ]
[ "py/stack-trace-exposure", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 21, 10 ]
[ null, null ]
[ 10, 10 ]
[ 36, 126 ]
2024-11-18T21:55:59.877547+00:00
1,581,194,558,000
b6d8abaf8f0102c89f2f573c894750f2a7571881
3
{ "blob_id": "b6d8abaf8f0102c89f2f573c894750f2a7571881", "branch_name": "refs/heads/master", "committer_date": 1581194558000, "content_id": "b4cdf6b5c4594585c56783c95bb0a200537f9af2", "detected_licenses": [ "MIT" ], "directory_id": "afddedac062ae148fbb950318e79fb260eafe3b5", "extension": "py", "fi...
2.546875
stackv2
import os from jinja2 import Template from IPython.core.display import display, HTML CURRENT_PATH = os.path.abspath(os.path.dirname(__file__)) class RenderEngine: def __init__(self, tmpl_file: str = "templates/jupyter_notebook.html"): tmpl_file = os.path.join(CURRENT_PATH, tmpl_file) self.tmpl_f...
25
25.48
75
13
153
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_15aefa19769ff41d_b6d2daef", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 20 ]
[ null ]
[ 16 ]
[ 35 ]
2024-11-18T22:39:39.603583+00:00
1,688,369,869,000
0bdf0acfbfacb453238290858dd031fe8d77fa78
2
{ "blob_id": "0bdf0acfbfacb453238290858dd031fe8d77fa78", "branch_name": "refs/heads/master", "committer_date": 1688369869000, "content_id": "e08b258d91452c088036e45251b4db9773025262", "detected_licenses": [ "MIT" ], "directory_id": "8f0fee459b33524b854be475a71d6d25786acc91", "extension": "py", "fi...
2.328125
stackv2
# Copyright (c) 2020-2022 CRS4 # # Permission is hereby granted, free of charge, to any person obtaining a copy # of this software and associated documentation files (the "Software"), to deal # in the Software without restriction, including without limitation the rights # to use, copy, modify, merge, publish, distribut...
118
31.35
80
12
937
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1da7a650c5a1b1c6_c2399f35", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
4
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 57, 78, 88, 95 ]
[ null, null, null, null ]
[ 11, 15, 45, 11 ]
[ 25, 18, 52, 44 ]
2024-11-18T22:54:58.085547+00:00
1,622,790,219,000
e8d272ba6d116d4c027d71b64a4c9352652b53ee
3
{ "blob_id": "e8d272ba6d116d4c027d71b64a4c9352652b53ee", "branch_name": "refs/heads/master", "committer_date": 1622790219000, "content_id": "a293cf4cd28b28e53d176320c67d1237667a8d15", "detected_licenses": [ "MIT" ], "directory_id": "fea9afe647ffa42961639d5460c9dd50f040713c", "extension": "py", "fi...
2.546875
stackv2
import flask import logging from flask import jsonify, request, Response import io from .GCLocationList import FindLocation, FindLocations,GetLocationsForCountry from .GCCountry import GetCountries from .GCGregorianDate import GCGregorianDate,Today from .TCalendar import TCalendar app = flask.Flask(__name__) @app....
163
31.25
152
16
1,358
python
[{"finding_id": "codeql_py/reflective-xss_b04e92105140c8ca_7ba4eec1", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 88 ]
[ null ]
[ 40 ]
[ 147 ]
2024-11-18T23:06:18.647844+00:00
1,361,979,697,000
cf204398281ee0039e5d89bb21f4dc3a996d9470
3
{ "blob_id": "cf204398281ee0039e5d89bb21f4dc3a996d9470", "branch_name": "refs/heads/master", "committer_date": 1361979961000, "content_id": "828e64a679439690231e03b0bccf97d8a90fe8c7", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "f02d58e1906f72ce06cf5b00deed1bd190d580e6", "extension": "p...
2.515625
stackv2
from urlparse import urlparse, urljoin from flask import request, redirect from flask.ext.wtf import Form from flask.ext.wtf import HiddenField, BooleanField, TextField, PasswordField from flask.ext.wtf import Required, Length, EqualTo, Email, URL def is_safe_url(target): ref_url = urlparse(request.host_url) ...
56
31.5
85
13
390
python
[{"finding_id": "codeql_py/url-redirection_a07e17f48c35a29c_e8d0c1c7", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 34 ]
[ null ]
[ 25 ]
[ 62 ]
2024-11-18T23:25:08.789106+00:00
1,614,876,824,000
965ca005ec7741b9a396e17a3b53c14371a9199d
2
{ "blob_id": "965ca005ec7741b9a396e17a3b53c14371a9199d", "branch_name": "refs/heads/master", "committer_date": 1614876824000, "content_id": "113603cc71db6ea8a45cf84546cf94caa128bf63", "detected_licenses": [ "Apache-2.0" ], "directory_id": "d5146db0a3b144a16a4c3c83d87baa000d7510d1", "extension": "py"...
2.328125
stackv2
__author__ = "Manuel Escriche <mev@tid.es>" import base64, certifi, requests from kernel.Settings import settings class ConnectionToJIRA(Exception): pass class Connector: url_api = { 'session': '/rest/auth/1/session', 'project': '/rest/api/latest/project', 'component': '/rest/api/l...
216
34.25
108
17
1,612
python
[{"finding_id": "codeql_py/request-without-cert-validation_20d306515a37f54a_0283494c", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1) by [this value](2).", "This request may run without certificate validation because [it is disabled](1) by [this value](2)." ]
[ 46, 158 ]
[ null, null ]
[ 18, 18 ]
[ 91, 86 ]
2024-11-18T22:29:34.526532+00:00
1,604,381,269,000
d371cb308003a8487f1a15354e54719fc4bb900c
2
{ "blob_id": "d371cb308003a8487f1a15354e54719fc4bb900c", "branch_name": "refs/heads/master", "committer_date": 1604381269000, "content_id": "aac0513efce92ac35c0eb32804c35148ac0b567a", "detected_licenses": [ "Apache-2.0" ], "directory_id": "03c8064409efe7fba0d0d49db58e4c8b6130376c", "extension": "py"...
2.359375
stackv2
from threading import Thread import time import requests from io import BytesIO import http.cookiejar as cookielib from PIL import Image from base64 import b64decode import os requests.packages.urllib3.disable_warnings() class show_code(Thread): def __init__(self,data): Thread.__init__(self) self....
74
32.42
145
15
626
python
[{"finding_id": "codeql_py/request-without-cert-validation_87bc60b3b0d14a29_2d36848e", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 28 ]
[ null ]
[ 17 ]
[ 62 ]
2024-11-18T22:29:49.652843+00:00
1,482,255,958,000
ab7b9a1d34195123487cfdeda386d46e87cb7ea7
3
{ "blob_id": "ab7b9a1d34195123487cfdeda386d46e87cb7ea7", "branch_name": "refs/heads/master", "committer_date": 1482255958000, "content_id": "3460a2b2e7abcbfd081f9cd36b35bcbbaa9d698a", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "2a56d481855e3621f2c7ffce455bb76f79e6cbea", "extension": "p...
3.0625
stackv2
#!/usr/bin/env python # Build information __author__ = 'Kevin Wurster' __version__ = '0.1' __copyright__ = 'Copyright SkyTruth 2014' __license__ = 'New BSD (See LICENSE.txt)' import os import sys import json from os.path import isfile def print_usage(): print("") print("Usage: task.json task_run.json outf...
216
32.92
120
17
1,703
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_c0355e3716306370_e3ee6526", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.\nThis expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.\nThis expression stores [sensitive data ...
[ 189, 186 ]
[ null, null ]
[ 26, 23 ]
[ 30, 49 ]
2024-11-18T22:29:52.292324+00:00
1,586,436,800,000
d2985dde60c6d84c925180adb2e1f0738e20ba10
3
{ "blob_id": "d2985dde60c6d84c925180adb2e1f0738e20ba10", "branch_name": "refs/heads/master", "committer_date": 1586436800000, "content_id": "75643333ce9e7169ac4b985b101f463df0a88ed4", "detected_licenses": [ "Apache-2.0" ], "directory_id": "a7cd317e03f91431d72f6067c5734c7366addc44", "extension": "py"...
2.609375
stackv2
#!/usr/bin/env python3 from flask import Flask from flask import request from util import startTunnel, stopTunnel, addressesForInterface from argparse import ArgumentParser import logging app = Flask(__name__) settings = {} @app.route("/connect") def connect(): address = request.remote_addr logging.info("Con...
42
24.29
80
12
244
python
[{"finding_id": "codeql_py/log-injection_2799fcfd1136b4e4_8b0e93ff", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 15 ]
[ null ]
[ 18 ]
[ 59 ]
2024-11-18T22:29:56.306406+00:00
1,551,347,594,000
4897d971856b16e6eabd3fc5a885b7f2ad26928b
3
{ "blob_id": "4897d971856b16e6eabd3fc5a885b7f2ad26928b", "branch_name": "refs/heads/master", "committer_date": 1551347594000, "content_id": "8f7671bea0176eec48b6fda9fba0051d6770365c", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e44b25477c08ad1a8696d6310c167a896f7e56ef", "extension": "py"...
2.53125
stackv2
import json import time import gensim import numpy as np from flask import Flask, request from gensim.models import KeyedVectors # json encoder class MyEncoder(json.JSONEncoder): def default(self, obj): if isinstance(obj, np.integer): return int(obj) elif isinstance(obj, np.floating): ...
200
35.46
143
20
1,751
python
[{"finding_id": "codeql_py/stack-trace-exposure_1f720ca02d42fda3_204cccde", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
9
true
[ "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-215", "CWE-079", "CWE-079", "CWE-079", "CWE-079" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/flask-debug", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information...
[ 125, 143, 170, 196, 200, 123, 141, 168, 194 ]
[ null, null, null, null, null, null, null, null, null ]
[ 20, 20, 20, 20, 5, 20, 20, 20, 20 ]
[ 62, 62, 62, 62, 72, 96, 114, 140, 130 ]
2024-11-18T23:21:50.345902+00:00
1,446,234,741,000
808c5091fd53ff12f947c55b58d90edb0e10cbec
3
{ "blob_id": "808c5091fd53ff12f947c55b58d90edb0e10cbec", "branch_name": "refs/heads/master", "committer_date": 1446234741000, "content_id": "6f00a09ba5f13cf25a77f03879fddc96f0f584dc", "detected_licenses": [ "MIT" ], "directory_id": "9055e0d2c32f342eccdd10213bfcd5a72880604b", "extension": "py", "fi...
2.59375
stackv2
# # @package ExactAbstract # All non-algorithm related work for ExactAbstract # # The main package for the app from flask import Flask from flask import request from flask import render_template, jsonify, make_response from algorithms.statistical import get_keyword from nltk.tokenize import word_tokenize from nltk.ste...
392
38.3
120
22
3,307
python
[{"finding_id": "codeql_py/flask-debug_9228211900d2c280_b0bd48aa", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-022" ]
[ "py/flask-debug", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1)." ]
[ 392, 143 ]
[ null, null ]
[ 5, 14 ]
[ 24, 47 ]
2024-11-18T23:21:53.190773+00:00
1,570,117,163,000
39b46263c097a01e83b2ce27b62853fde1282b76
2
{ "blob_id": "39b46263c097a01e83b2ce27b62853fde1282b76", "branch_name": "refs/heads/master", "committer_date": 1570120556000, "content_id": "415a53a51ebf51c6d34677c6a602acccecb24ddb", "detected_licenses": [ "MIT" ], "directory_id": "906e157adb45f09b5d035b784cb16d7289a2dbae", "extension": "py", "fi...
2.359375
stackv2
#! /usr/bin/env python import argparse import json import os import re from collections import ChainMap from pathlib import PurePath from jinja2 import Environment, PackageLoader env = Environment(loader=PackageLoader(__name__)) CUSTOM_DOTFILES_DIR = 'custom_dotfiles/' CUSTOM_SETTINGS_DIR = 'custom_settings/' DEFA...
168
32.63
79
19
1,188
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_ac39ccb743d31e0a_e92f8a17", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 13 ]
[ null ]
[ 7 ]
[ 50 ]
2024-11-18T21:33:30.809394+00:00
1,608,024,400,000
4dca853d7f75040526b952f14ff5fc1c345db9ce
3
{ "blob_id": "4dca853d7f75040526b952f14ff5fc1c345db9ce", "branch_name": "refs/heads/master", "committer_date": 1608024400000, "content_id": "d1c8f1a2d1e23f8fba94936422e37af6173e8f04", "detected_licenses": [ "MIT" ], "directory_id": "2c3da6e0bddf55d64d650040bbf286c47b31811a", "extension": "py", "fi...
3
stackv2
from gevent import monkey monkey.patch_all() import gevent import time import pywifi from pywifi import const def test_connect(password_str): wifi = pywifi.PyWiFi() # 开启一个无线对象 interface = wifi.interfaces()[0] # 抓取无线网卡列表第一个无线网卡 # print(wifi.interfaces()) # print(interface.name()) # 取出无限网卡的名字 interface.disco...
59
23.64
63
15
516
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_800bc7da9197c8b8_e5d79e36", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 36, 38 ]
[ null, null ]
[ 9, 9 ]
[ 56, 56 ]
2024-11-18T21:33:36.597085+00:00
1,683,787,480,000
077f7e98d2466473f5eb33043cb636fd1a434d47
3
{ "blob_id": "077f7e98d2466473f5eb33043cb636fd1a434d47", "branch_name": "refs/heads/master", "committer_date": 1683787480000, "content_id": "9e96bc3998b59ab7cc3feb3f1f4160a0d723f40b", "detected_licenses": [ "MIT" ], "directory_id": "35410279821fe2896b3eed264a6cb2f38c1e0dff", "extension": "py", "fi...
2.53125
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- import re import hashlib import json from unicodedata import category from cassandra.cqlengine.models import Model from cassandra.cqlengine.management import sync_table from cassandra.cqlengine import columns, connection, ValidationError import resources.utils.hash_pas...
150
22.63
80
15
1,013
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_fa01ad7d5257ad5e_3d8e2720", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
6
true
[ "CWE-327", "CWE-327", "CWE-327", "CWE-327", "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi...
[ 134, 135, 136, 137, 138, 139 ]
[ null, null, null, null, null, null ]
[ 28, 30, 34, 34, 34, 34 ]
[ 43, 45, 49, 49, 49, 49 ]
2024-11-18T22:30:21.391774+00:00
1,553,692,353,000
04259cc0be42fa5e5efc826792bc8114d5585819
3
{ "blob_id": "04259cc0be42fa5e5efc826792bc8114d5585819", "branch_name": "refs/heads/master", "committer_date": 1553692353000, "content_id": "ab5499e97d346466b1aae6f9561ac4fc5dc4a55c", "detected_licenses": [ "Apache-2.0" ], "directory_id": "17bc72ee1ad409ca65f4c0a07bf7a905faea0cac", "extension": "py"...
3.15625
stackv2
# coding:utf8 ''' 输入一个仓库(文件夹路径): 1. 提取其中的html,js,css文件 2. 提取script标签内容为js文件,提取style标签内容为css文件 3. 变量替换 href,src等引用部分 以及 script片段 (用任意变量名替换) ''' import os import random import re import shutil # 输入仓库路径,返回三个一维list,分别对应此仓库的html,css,js文件 def get_html_css_js_files(repo_path): html_files = [] # html文件路径 css_file...
173
35.72
120
24
1,955
python
[{"finding_id": "codeql_py/bad-tag-filter_b5d096174e44927f_6c57240d", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression does not match upper case <SCRIPT> tags.", "remediation": "", "location": {"file_path": ...
2
true
[ "CWE-116", "CWE-116" ]
[ "py/bad-tag-filter", "py/bad-tag-filter" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This regular expression does not match upper case <SCRIPT> tags.", "This regular expression does not match upper case <SCRIPT> tags." ]
[ 69, 93 ]
[ null, null ]
[ 15, 19 ]
[ 43, 45 ]
2024-11-18T22:30:23.595916+00:00
1,511,218,380,000
72f340951f163acad449bc8e1a6e2e00bcf8910b
3
{ "blob_id": "72f340951f163acad449bc8e1a6e2e00bcf8910b", "branch_name": "refs/heads/master", "committer_date": 1511218380000, "content_id": "a2da485b4185d50d3f28a3dd9af0890756450933", "detected_licenses": [ "MIT" ], "directory_id": "d9e0b7bcc576ac5721140c7018caf75f4369a5c6", "extension": "py", "fi...
2.703125
stackv2
#!/usr/bin/python2.7 from __future__ import print_function import argparse import re import sys import os.path parser = argparse.ArgumentParser() parser.add_argument("input", help="Input PMAnalyzer file") parser.add_argument("plate", help="Plate file name") parser.add_argument("-n", "--nocolumn", action="store_true", ...
64
31.19
72
13
549
python
[{"finding_id": "codeql_py/overly-large-range_f861c31d6253abd2_c11d869d", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 17 ]
[ null ]
[ 23 ]
[ 26 ]
2024-11-18T22:30:33.137601+00:00
1,615,005,687,000
f9efa2343e2a12018c7f91a6c1f492ffb9ebaa30
3
{ "blob_id": "f9efa2343e2a12018c7f91a6c1f492ffb9ebaa30", "branch_name": "refs/heads/master", "committer_date": 1615005687000, "content_id": "473e15f1cf1908a3cb8f88b7016058dd3d3154ae", "detected_licenses": [ "MIT" ], "directory_id": "31ce2a5755c1f1f0569fef61c991259039112c65", "extension": "py", "fi...
2.578125
stackv2
from jinja2 import Template import yaml import sys if len(sys.argv) != 4: sys.exit("Invalid number of arguments.\nUsage: {} template.md profile.yaml output.md".format(sys.argv[0])) template = sys.argv[1] yaml_file = sys.argv[2] output_file = sys.argv[3] #profile with open(yaml_file, "r") as f: profile = yaml...
21
24.81
110
11
147
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_96d52b05f5554ae4_f490d5e8", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 17 ]
[ null ]
[ 27 ]
[ 45 ]
2024-11-18T22:44:49.628960+00:00
1,490,792,459,000
eb7cb2b84aa71c3178faef90eb036242647a06c6
3
{ "blob_id": "eb7cb2b84aa71c3178faef90eb036242647a06c6", "branch_name": "refs/heads/master", "committer_date": 1490792459000, "content_id": "733ab3453c76d0bc7e5a88285690c975b4cec477", "detected_licenses": [ "MIT" ], "directory_id": "66a4f71c99b1444f341bcca8a26bc0cd877553fc", "extension": "py", "fi...
2.609375
stackv2
# -*- coding: utf-8 -*- from django.shortcuts import render from django.http import JsonResponse from . import models import requests import json from . import update_data from rest_framework.views import APIView from rest_framework.response import Response # Create your views here. EARTH_RAD_KM = 6371 GOOGLKEY = "AIz...
127
33.68
120
18
1,008
python
[{"finding_id": "codeql_py/partial-ssrf_10cba819551e5c63_b590c946", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 101 ]
[ null ]
[ 20 ]
[ 72 ]
2024-11-18T23:36:48.094252+00:00
1,619,376,548,000
3147e8829699bd29c4605b709486fd4902a4d57b
3
{ "blob_id": "3147e8829699bd29c4605b709486fd4902a4d57b", "branch_name": "refs/heads/master", "committer_date": 1619376548000, "content_id": "5bf3053088af5e798861a4a5b0c9a40c7343b799", "detected_licenses": [ "MIT" ], "directory_id": "0a66f2fd513b38533b31a0462789c64d5dc7312b", "extension": "py", "fi...
3.171875
stackv2
import numpy as np from numpy.linalg import inv from scipy.stats import binom #a1 = failed #a2 = passed testPassingProbabilities = [0.7, 0.6, 0.8, 0.9] noOfSpecialistsCurrent = [100, 70, 50, 60] wantedSpecialists = 5 wantedWithProbability = 0.9 transitionMatrix = np.zeros((len(testPassingProbabilities) + 2, len(tes...
40
33.6
107
11
421
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_08502a7949c615aa_18f4308c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 39 ]
[ null ]
[ 15 ]
[ 69 ]
2024-11-18T23:36:50.657281+00:00
1,575,601,347,000
79fdd0e018814b5b37fa8839537d961ff0e366cf
3
{ "blob_id": "79fdd0e018814b5b37fa8839537d961ff0e366cf", "branch_name": "refs/heads/master", "committer_date": 1575601347000, "content_id": "6f90a5e73d03714466014d8b6910e59173223950", "detected_licenses": [ "MIT" ], "directory_id": "231f724150a36b21a7767b7636a766e98046f97f", "extension": "py", "fi...
2.8125
stackv2
import requests from bs4 import BeautifulSoup import logging from pprint import pprint import re import dateparser def requests_wraper(url): headers = {'User-Agent':'Mozilla/5.0 (Windows NT 10.0; WOW64; rv:51.0) Gecko/20100101 Firefox/51.0'} for _ in range(200): try: resp = requests.get(url, verify=False...
368
26.01
152
18
2,859
python
[{"finding_id": "codeql_py/request-without-cert-validation_8ee7efd3c6366a21_93854ec2", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 12 ]
[ null ]
[ 14 ]
[ 62 ]
2024-11-18T23:37:11.110922+00:00
1,633,624,855,000
c42d9938ef6e4df6773a1dc52a9c0e11c011d65e
2
{ "blob_id": "c42d9938ef6e4df6773a1dc52a9c0e11c011d65e", "branch_name": "refs/heads/master", "committer_date": 1633624855000, "content_id": "0e2dcd6f0024aff623c685e8be327b9b73e5c8d2", "detected_licenses": [ "MIT" ], "directory_id": "c396faf6d28c3c0067e40418ee78673210875af6", "extension": "py", "fi...
2.328125
stackv2
from __future__ import print_function, division import os import re from sys import stderr from binascii import b2a_hex from .readers import ByteReader from .hexdump import strescape, toout, ashex from .Datamodel import TableDefinition, Record from .Datafile import Datafile import base64 import struct import crodump.ko...
289
33.45
100
23
2,478
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e7de1e95587fef32_26b5c5cb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 162 ]
[ null ]
[ 15 ]
[ 100 ]
2024-11-18T21:15:48.915018+00:00
1,615,486,304,000
12004c1713620c7eccde87038940fdbb94c5c2e6
4
{ "blob_id": "12004c1713620c7eccde87038940fdbb94c5c2e6", "branch_name": "refs/heads/main", "committer_date": 1615486304000, "content_id": "2909fe39bf3518b7af09d4d7f9e0dc6b704bf207", "detected_licenses": [ "MIT" ], "directory_id": "3fc992cb2a68fc6d36a7cfe9806cac8d0bc239af", "extension": "py", "file...
3.5625
stackv2
#!/usr/bin/env python3 """ Simple script to brute force bitcoin wallets with text file filled with passphrases and print any keys with available balance. Program check for both compressed and uncompressed versions of addresses using bit library. Example use: python brutecointxt.py -t passphrases.txt DISCLAIMER: Progr...
80
48.6
153
21
775
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_180a4d1006c66a8c_e472feef", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-327" ]
[ "py/clear-text-logging-sensitive-data", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 64, 53 ]
[ null, null ]
[ 49, 54 ]
[ 55, 76 ]
2024-11-18T21:58:12.925559+00:00
1,591,041,669,000
e9db0d9127c794175f5547a135498b665fd9a608
3
{ "blob_id": "e9db0d9127c794175f5547a135498b665fd9a608", "branch_name": "refs/heads/master", "committer_date": 1591041669000, "content_id": "fe200a96eea6a754d3d0696cf9f33dd7ddec48ed", "detected_licenses": [ "MIT" ], "directory_id": "4e16e6c081ce557657b2b57c4c0996beda05597b", "extension": "py", "fi...
2.53125
stackv2
#!/usr/bin/env python3 # -*- encoding: utf-8 -*- import os import random import time import paramiko from clients.PrototypeClient import PrototypeClient class SSHClient(PrototypeClient.PrototypeClient): def __init__(self, **kwargs): super(SSHClient, self).__init__(**kwargs) self._logger.debug("S...
159
37.75
157
21
1,252
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_ac0e9873a3148579_d33de441", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to WarningPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to WarningPolicy may be unsafe." ]
[ 132 ]
[ null ]
[ 17 ]
[ 87 ]
2024-11-18T21:58:18.006392+00:00
1,549,884,058,000
291901e97676dfec46633bf8157427f880167f54
3
{ "blob_id": "291901e97676dfec46633bf8157427f880167f54", "branch_name": "refs/heads/master", "committer_date": 1549884058000, "content_id": "76db2ca30039f9758bc722f335da5d05c2a86f8e", "detected_licenses": [ "MIT" ], "directory_id": "91e36564486aaf09640f87c3d654327cfbb79790", "extension": "py", "fi...
2.796875
stackv2
import re import zlib import requests import collections from typing import List from pythonopensubtitles.opensubtitles import OpenSubtitles class OpenSubtitleSession: def __init__(self, username, password): self.username = username self.password = password self._ost = OpenSubtitles() ...
98
28.03
89
16
693
python
[{"finding_id": "codeql_py/bad-tag-filter_b95459f3c505b305_b5d8c263", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression only parses --> and not --!> as a HTML comment end tag.", "remediation": "", "location":...
1
true
[ "CWE-116" ]
[ "py/bad-tag-filter" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression only parses --> and not --!> as a HTML comment end tag." ]
[ 43 ]
[ null ]
[ 27 ]
[ 32 ]
2024-11-18T21:58:19.266865+00:00
1,689,168,397,000
ca8de2c0259530d0d36e63e6a3eb802284b8269e
2
{ "blob_id": "ca8de2c0259530d0d36e63e6a3eb802284b8269e", "branch_name": "refs/heads/main", "committer_date": 1689168397000, "content_id": "11791eabfbc955fd7d47cac12be755d996fe749e", "detected_licenses": [ "Apache-2.0" ], "directory_id": "27dd33362ea9c723db275f2710cb46cdaeb15ed9", "extension": "py", ...
2.421875
stackv2
import sys from getpass import getuser from pathlib import Path import pandas as pd import streamlit as st from duqtools.config import var_lookup from duqtools.ids import ImasHandle, merge_data from duqtools.utils import read_imas_handles_from_file sys.path.insert(0, str(Path(__file__).parent)) from _shared import ...
126
29.18
80
13
851
python
[{"finding_id": "codeql_py/path-injection_744352500d9462a2_851b7b2c", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2).", "remed...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2)." ]
[ 28 ]
[ null ]
[ 8 ]
[ 11 ]
2024-11-18T21:58:30.823602+00:00
1,598,175,851,000
3904a8ffbb161b68a7923f010f2009ef820ac4d8
2
{ "blob_id": "3904a8ffbb161b68a7923f010f2009ef820ac4d8", "branch_name": "refs/heads/master", "committer_date": 1598175851000, "content_id": "43fc6aae2f3c90b24b1c10525a3a927a2914ba84", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "0889262ca12429e9be0241ffe15c47a330c316a6", "extension": "p...
2.46875
stackv2
"""Common generator module.""" import os import datetime import textwrap from configparser import ConfigParser, ParsingError import yaml from jinja2 import Environment, FileSystemLoader from click import prompt, Choice, MissingParameter, BadParameter, Abort from .utils import get_usermail, get_username, parse_list...
246
31.66
87
20
1,754
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_bb9f1a0cbb41e6f3_12208266", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 157 ]
[ 159 ]
[ 11 ]
[ 6 ]
2024-11-18T22:05:52.977898+00:00
1,622,444,931,000
0a1b0a27d071917c6d87ec205d0fa23c2e3c073e
3
{ "blob_id": "0a1b0a27d071917c6d87ec205d0fa23c2e3c073e", "branch_name": "refs/heads/master", "committer_date": 1622444931000, "content_id": "2578e0841d9d5ced39b892a4dde8bd02fe3c5ddf", "detected_licenses": [ "MIT" ], "directory_id": "efe6fe073076a527a4f017de85785f224361cc2b", "extension": "py", "fi...
3.03125
stackv2
""" This script processes the raw Reddit comments for Target group 1(from reddit_data.py) and further creates Counter Target dataset containing target group term replaced with Target group 2 terms. In case of demographic - Gender and Sexual orientation, Reddit comments with only one Target group mention are retained. "...
180
51.84
150
26
2,468
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_cb69c21026dffdbb_1597e358", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 71 ]
[ null ]
[ 19 ]
[ 24 ]
2024-11-18T23:26:06.984721+00:00
1,465,896,677,000
f1ac42d39d086d82b108911fdd0ff1d77b4ca0a2
3
{ "blob_id": "f1ac42d39d086d82b108911fdd0ff1d77b4ca0a2", "branch_name": "refs/heads/master", "committer_date": 1465896677000, "content_id": "0d38e212e1584e5ec82dc62cf3e8657dfaec780c", "detected_licenses": [ "MIT" ], "directory_id": "f92a47c2028fb7c430a937d580f4bbaa9c59a13e", "extension": "py", "fi...
2.53125
stackv2
import jinja2 import json env = jinja2.Environment(loader=jinja2.FileSystemLoader(["."])) template = env.get_template ('list.html') with open ('json.data', 'r') as f: dataset = json.loads (f.readline()) print template.render (title='Alain', dataset=dataset) with open ('json.txt', 'r') as f: dataset = json.l...
17
24.88
63
11
118
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_1d69dbc63ac65f58_0d4c7a8e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 4 ]
[ null ]
[ 7 ]
[ 64 ]
2024-11-18T23:26:11.705721+00:00
1,577,364,934,000
ffe9bb846aec969dd1aec599ddbf69071ec52557
3
{ "blob_id": "ffe9bb846aec969dd1aec599ddbf69071ec52557", "branch_name": "refs/heads/master", "committer_date": 1577364934000, "content_id": "efa99d76ebd2e18fd1729e7620c7e0fc5f88fc4f", "detected_licenses": [ "Apache-2.0" ], "directory_id": "19a4b144e8afa70931d7a6e03bad2acea3d58fec", "extension": "py"...
2.546875
stackv2
# encoding: utf-8 import logging_helper from scp import SCPClient from paramiko import SSHClient, AutoAddPolicy from conversionutil.dx import dx logging = logging_helper.setup_logging() __author__ = u'Oli Davis' __copyright__ = u'Copyright (C) 2016 Oli Davis' class SCP(object): def __init__(self, ...
80
27.64
77
13
452
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_e54a233f6d99f077_41d6d438", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 33 ]
[ null ]
[ 9 ]
[ 62 ]
2024-11-18T23:26:13.707102+00:00
1,563,338,232,000
76b333a245f71f2b331dd93b8abe7e578195131b
3
{ "blob_id": "76b333a245f71f2b331dd93b8abe7e578195131b", "branch_name": "refs/heads/master", "committer_date": 1563338232000, "content_id": "636f2e0b2d74da5a5eb585d54fe1f03960ddac85", "detected_licenses": [ "MIT" ], "directory_id": "a3dc1f341f43f4a5db0d4347ba2528c755505e6e", "extension": "py", "fi...
2.578125
stackv2
#coding = "utf-8" __author :"lokey" import urllib.request import urllib.parse import urllib.error import simplejson import hashlib import itertools import pandas as pd from hashlib import sha1 from datetime import datetime class weather_info(object): def __init__(self,weatherServer_appkey,weatherServer_secret): ...
64
38.33
158
20
640
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9974b050551f8b4d_e87618b8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
2
true
[ "CWE-312", "CWE-327" ]
[ "py/clear-text-logging-sensitive-data", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecure." ]
[ 35, 21 ]
[ null, null ]
[ 15, 29 ]
[ 18, 80 ]
2024-11-18T22:27:25.769744+00:00
1,601,460,310,000
0c1b49210c68e2a9aace9e06327bd2844c3e0d9b
2
{ "blob_id": "0c1b49210c68e2a9aace9e06327bd2844c3e0d9b", "branch_name": "refs/heads/master", "committer_date": 1601460310000, "content_id": "cb34204e21e4d1f872d0fa34de80780ed0fb9e74", "detected_licenses": [ "MIT" ], "directory_id": "a37e29ed8365995cf03efce541f4ffdb1f313fc8", "extension": "py", "fi...
2.4375
stackv2
#!/usr/bin/env python3 import os from flask import Flask, request, jsonify from flask_cors import CORS import requests from datetime import datetime import json import pika import hashlib import hmac import base64 from urllib.parse import urlencode, urlparse # from signature import process_url app = Flask(__name__...
91
37.29
159
13
837
python
[{"finding_id": "codeql_py/flask-debug_5f79be56455897c6_ea164cb4", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
7
true
[ "CWE-215", "CWE-079", "CWE-079", "CWE-327", "CWE-918", "CWE-918", "CWE-918" ]
[ "py/flask-debug", "py/reflective-xss", "py/reflective-xss", "py/weak-sensitive-data-hashing", "py/partial-ssrf", "py/partial-ssrf", "py/partial-ssrf" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "[Sensitive data (password)](1) is used in a ...
[ 91, 52, 77, 84, 33, 42, 58 ]
[ null, null, null, null, null, null, null ]
[ 5, 12, 12, 37, 37, 13, 9 ]
[ 51, 25, 92, 64, 67, 38, 34 ]
2024-11-18T22:14:56.599255+00:00
1,630,239,658,000
319176c26356d4fd8d5c5e2feb6760461a008773
3
{ "blob_id": "319176c26356d4fd8d5c5e2feb6760461a008773", "branch_name": "refs/heads/main", "committer_date": 1630239658000, "content_id": "413bfd8eb0d046f127788c929ecb35616315a232", "detected_licenses": [ "MIT" ], "directory_id": "accc9921ffb9761cd235e40aefdaa577047ec01a", "extension": "py", "file...
2.921875
stackv2
# Import Required modules import os import pickle # Create List details_list=[] l2=[] G = [] #-------------------------------------------------------------------------------------------------------------------------------------------------------------------- def file_save(): # Function to save a file NAME_PRO...
211
42.95
165
14
1,929
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bbf3d27816aeef80_13ec1a73", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text." ]
[ 46 ]
[ null ]
[ 38 ]
[ 52 ]
2024-11-18T22:55:24.834746+00:00
1,590,869,626,000
b25519856f46a50e6b3e705008f8ddc00af91b6e
3
{ "blob_id": "b25519856f46a50e6b3e705008f8ddc00af91b6e", "branch_name": "refs/heads/master", "committer_date": 1590869626000, "content_id": "6c56943e3bfe5aae7a06a9401b45306985c95665", "detected_licenses": [ "Apache-2.0" ], "directory_id": "89da32209f368f97515b2ce151937c8e04bc3c0b", "extension": "py"...
3.28125
stackv2
"""Centralized configuration manager.""" import os import logging import threading import yaml from inotify_simple import INotify, flags class ConfigurationManager: """Configuration manager handles configuration centrally and notify via callbacks of changes """ def __init__(self, work_dir=None): ...
163
28.9
81
18
931
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_891594e09bdc8dec_e005b53b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text." ]
[ 116 ]
[ null ]
[ 46 ]
[ 52 ]
2024-11-18T22:55:39.793831+00:00
1,491,464,925,000
51513677cf438f56550350095909b225e5ef5201
2
{ "blob_id": "51513677cf438f56550350095909b225e5ef5201", "branch_name": "refs/heads/master", "committer_date": 1491464925000, "content_id": "108f1fa79ff5989836e76d6811368e73c5828326", "detected_licenses": [ "MIT" ], "directory_id": "9c5d562132bce2f4642d99bfad26ea37d46c247f", "extension": "py", "fi...
2.359375
stackv2
#!/usr/bin/python """Evil-Ginx Parser""" import os import os.path import argparse import json import ConfigParser import urllib import time import datetime EOL = '\n' TAB = '\t' email_by_ips = {} class log_data: def __init__(self, email, passwd, tokens): self.email = email self.passwd = passwd ...
217
31.17
153
21
1,663
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_d4124b14768159bd_51625e6a", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
5
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (password)](3) as clear text.", "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensiti...
[ 112, 113, 114, 118, 119 ]
[ null, null, null, null, null ]
[ 21, 21, 21, 21, 21 ]
[ 45, 52, 33, 45, 46 ]
2024-11-18T23:32:13.749679+00:00
1,302,953,826,000
eeda930be64501d5da47cd72b1e7df7a9109ba69
3
{ "blob_id": "eeda930be64501d5da47cd72b1e7df7a9109ba69", "branch_name": "refs/heads/master", "committer_date": 1302953826000, "content_id": "22b37eb2f9aa252ab6e87628f4e8527d94d7e426", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "46eb22dbe3514fc586ca57dd5e9a2ef1e486ed7e", "extension": "p...
2.609375
stackv2
from codecs import open from datetime import datetime import imp import logging import ConfigParser from optparse import OptionParser from os import makedirs, getcwd, getlogin from os.path import splitext, join, dirname, split, abspath, getctime,\ basename, exists, relpath, isabs from shutil import ...
331
38.17
98
25
2,657
python
[{"finding_id": "codeql_py/tarslip_06213a252aea6681_a156e156", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 273 ]
[ null ]
[ 5 ]
[ 8 ]
2024-11-18T23:55:45.869013+00:00
1,571,839,760,000
6d2115e20b5281ff195a6bb7e423f21010fb4689
3
{ "blob_id": "6d2115e20b5281ff195a6bb7e423f21010fb4689", "branch_name": "refs/heads/master", "committer_date": 1571839760000, "content_id": "d93c709e387b5f114ee3aa9999074b446889cca0", "detected_licenses": [ "Apache-2.0" ], "directory_id": "6fcc7e53952c7ee05a8cb8e1f60fdfeb11482151", "extension": "py"...
2.75
stackv2
from keras.preprocessing.text import Tokenizer from keras.preprocessing.sequence import pad_sequences from keras.utils.np_utils import to_categorical from keras.models import Sequential from keras.layers import Dense, Flatten, LSTM, Conv1D, MaxPooling1D, Dropout, Activation, Bidirectional from keras.layers.embeddings i...
297
30.15
107
14
2,485
python
[{"finding_id": "codeql_py/overly-large-range_53fa1dd512004571_6cb3e754", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with 0-9 in the same character class, and is equivalent to \\[+...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with 0-9 in the same character class, and is equivalent to \\[+,\\-.\\/0-9:;<=\\]." ]
[ 34 ]
[ null ]
[ 36 ]
[ 39 ]
2024-11-18T23:55:48.313038+00:00
1,632,009,836,000
62e80fb5a4a0ff29765469b40ee524c596560a8c
3
{ "blob_id": "62e80fb5a4a0ff29765469b40ee524c596560a8c", "branch_name": "refs/heads/master", "committer_date": 1632009836000, "content_id": "641d8b3be76b4f0cc76d56bb4ff5da16c440cee5", "detected_licenses": [ "Apache-2.0" ], "directory_id": "284b095d58b4ffd913beb911a20894a522d00223", "extension": "py"...
3.453125
stackv2
''' sumber referensi: https://www.petanikode.com/python-file ditulis pada: 14-02-2021 ''' #a = append, dengan append bisa menambahkan data ke dalam file tanpa perlu mengubah isi dari keseluruhan file data_file = open('file.txt', 'a') #membuat input user data_id = input('masukkan id >>> ') data_user = input('masukkan ...
18
33.22
122
9
178
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_ca6d228e242de542_0b3ac95a", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 18 ]
[ null ]
[ 17 ]
[ 21 ]
2024-11-18T22:43:34.389284+00:00
1,418,272,646,000
5d9ad219bb76de6b24a384d232f887c086e1377e
2
{ "blob_id": "5d9ad219bb76de6b24a384d232f887c086e1377e", "branch_name": "refs/heads/master", "committer_date": 1418272646000, "content_id": "7e3f5944c8825825a2110a780d3565653a2ef40a", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "0489b12736da0baedddbb42e7d58ab630d73db3e", "extension": "p...
2.390625
stackv2
# Copyright 2014 Dietrich Epp. # This file is part of SGLib. SGLib is licensed under the terms of the # 2-clause BSD license. For more information, see LICENSE.txt. import os import io NOTICE = 'This file automatically generated by the build system' class GeneratedSource(object): __slots__ = [] @property ...
92
25.35
71
19
510
python
[{"finding_id": "codeql_py/overly-permissive-file_f59ca935ce3ed86d_6ddcf849", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in open sets file to world writable.", "remediation": "", "location": {...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in open sets file to world writable." ]
[ 77 ]
[ 80 ]
[ 24 ]
[ 27 ]
2024-11-18T22:43:38.195454+00:00
1,565,514,402,000
c8a71c9898a8a5e8cad2facdcf1234c5f856326a
2
{ "blob_id": "c8a71c9898a8a5e8cad2facdcf1234c5f856326a", "branch_name": "refs/heads/master", "committer_date": 1565514402000, "content_id": "8130b15d334b024c8d1d379a90200c36ecf3d421", "detected_licenses": [ "Apache-2.0" ], "directory_id": "a4fd055338b55890241b6b8282b2ea4fa408c9c5", "extension": "py"...
2.34375
stackv2
# Import from third-party from flask import Flask, render_template, json, request, jsonify, session def create_report(): ids = [] # print(request.form) for form in request.form: if 'form-name-' in form: ids.append(int(form[len('form-name-'):])) ids = sorted(ids) print ids st...
71
39.87
116
23
615
python
[{"finding_id": "codeql_py/path-injection_d56b39ad5c15313e_83ae017e", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 69 ]
[ null ]
[ 15 ]
[ 19 ]
2024-11-18T23:18:13.454112+00:00
1,582,022,670,000
59dbc5895c5a4c8db1b00ab223d540ace9ed9e12
2
{ "blob_id": "59dbc5895c5a4c8db1b00ab223d540ace9ed9e12", "branch_name": "refs/heads/master", "committer_date": 1582022670000, "content_id": "f05fa9e77df99e783e6c478a11bc9782e6a2be36", "detected_licenses": [ "MIT" ], "directory_id": "b2d63e3bb4ee9730e3979e782866f4c7a05f252b", "extension": "py", "fi...
2.484375
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -* import requests from bs4 import BeautifulSoup import re import os import jieba import numpy as np import matplotlib.pyplot as plt from wordcloud import WordCloud from PIL import Image s = requests.Session() headers = { 'user-agent': 'Mozilla/5.0 (Windows NT 6.1; Win64...
161
31.07
135
22
1,336
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_3560c4c912fb6df7_818bed5e", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'chinaetfs.net/', so it might match ...
3
true
[ "CWE-020", "CWE-020", "CWE-020" ]
[ "py/incomplete-hostname-regexp", "py/incomplete-hostname-regexp", "py/incomplete-hostname-regexp" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'chinaetfs.net/', so it might match more hosts than expected.", "This regular expression has an unescaped '.' before 'chinaetfs.net/', so it might match more hosts than expected.", "This regular expression has an unescaped '.' before 'chinaetfs.net/', so it m...
[ 44, 46, 66 ]
[ null, null, null ]
[ 27, 27, 35 ]
[ 60, 64, 68 ]
2024-11-18T23:18:20.403879+00:00
1,426,386,053,000
e9ce04404c67273459d8626692297828c8c3f086
2
{ "blob_id": "e9ce04404c67273459d8626692297828c8c3f086", "branch_name": "refs/heads/master", "committer_date": 1426386053000, "content_id": "5528267686f6894d23346f929bd38cd94d493bb1", "detected_licenses": [ "MIT" ], "directory_id": "170ad622a7de672bdcd1d3860599915bbd6109f0", "extension": "py", "fi...
2.34375
stackv2
""" homeassistant.components.httpinterface ~~~~~~~~~~~~~~~~~~~~~~~~~~~ This module provides an API and a HTTP interface for debug purposes. By default it will run on port 8123. All API calls have to be accompanied by an 'api_password' parameter and will return JSON. If successful calls will return status code 200 or...
379
30.57
79
17
2,654
python
[{"finding_id": "codeql_py/log-injection_d3520f220bff0348_77c0ce22", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2)...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2).\nThis log entry depends on a [user-provided value](3).\nThis log entry depends on a [user-provided value](4).\nThis log entry depends on a [user-provided value](5).\nThis log entry depends on a [user-provid...
[ 223 ]
[ null ]
[ 51 ]
[ 63 ]
2024-11-19T00:07:16.969885+00:00
1,421,872,002,000
08a2bd59fa7d4033261b120aeea46a9a18746bc3
2
{ "blob_id": "08a2bd59fa7d4033261b120aeea46a9a18746bc3", "branch_name": "refs/heads/master", "committer_date": 1421873436000, "content_id": "88bcec51b38061509bb992cb819d994d71f72873", "detected_licenses": [ "Apache-2.0" ], "directory_id": "cf1348d04a4d11389b2e7f8c48cd866cf6e2b940", "extension": "py"...
2.5
stackv2
import pathlib import flask app = flask.Flask(__name__) @app.route('/') def index(): return flask.redirect(flask.url_for('dir', path='api')) @app.route('/<path:path>/') def dir(path): file_path = pathlib.Path(app.config['SITE_DIR']) / path / 'index.html' if not file_path.exists(): flask.abor...
23
19.35
74
13
114
python
[{"finding_id": "codeql_py/path-injection_138681817198dc10_d49a3c30", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 18, 21 ]
[ null, null ]
[ 12, 10 ]
[ 21, 19 ]
2024-11-19T00:45:04.610874+00:00
1,564,236,695,000
39ec703262a9d347fcf63636501aa21550f2adeb
2
{ "blob_id": "39ec703262a9d347fcf63636501aa21550f2adeb", "branch_name": "refs/heads/master", "committer_date": 1564236695000, "content_id": "ab5ce37561233cd0d5ffb2ff2935e9b1c0c004b8", "detected_licenses": [ "MIT" ], "directory_id": "0f7c7624666263e84e76508430ea433889ce7e89", "extension": "py", "fi...
2.4375
stackv2
from uuid import uuid4 from flask import Flask, request, make_response, jsonify, session from dotenv import load_dotenv import os import logging import json import collections import requests import os from assets.endpoints import endpoint from assets.Course import Course # Read env variables from .env file dotenv_pa...
479
33.9
141
17
3,757
python
[{"finding_id": "codeql_py/log-injection_3a597ef995d3838d_95f36ef4", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
7
true
[ "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depen...
[ 224, 269, 293, 321, 376, 401, 407 ]
[ null, null, null, null, null, null, null ]
[ 22, 18, 45, 18, 22, 18, 18 ]
[ 62, 82, 50, 76, 84, 72, 46 ]
2024-11-18T23:28:27.797635+00:00
1,579,277,064,000
50fc67a15e28cd2f0cdee0be7623555abf817f76
2
{ "blob_id": "50fc67a15e28cd2f0cdee0be7623555abf817f76", "branch_name": "refs/heads/master", "committer_date": 1579277064000, "content_id": "f62947463ffde27d625f6e48a4800d7f056197ac", "detected_licenses": [ "MIT" ], "directory_id": "ff6f03897958735aea2a81f9f57fa1c7b74b777f", "extension": "py", "fi...
2.4375
stackv2
import email.utils import http.server import os import urllib from collections import abc from http.server import HTTPStatus import sys import logging as lg lg.basicConfig(level=lg.INFO, format='%(levelname)-8s: %(message)s') __version__ = '0.1.0' class Cors_container(abc.Container) : def __init__(self, cors) : ...
132
30.36
84
17
968
python
[{"finding_id": "codeql_py/log-injection_fd9b89833d80901f_41b57f46", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
4
true
[ "CWE-117", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 43, 44, 50, 58 ]
[ null, null, null, null ]
[ 14, 14, 28, 47 ]
[ 26, 39, 34, 58 ]
2024-11-19T00:06:19.003772+00:00
1,627,399,007,000
d4755f50d5b1d4f0b05ba3bf237dd4831921541a
3
{ "blob_id": "d4755f50d5b1d4f0b05ba3bf237dd4831921541a", "branch_name": "refs/heads/master", "committer_date": 1627399007000, "content_id": "48b3a26a71103ccf038fb605e28a999098a38610", "detected_licenses": [ "MIT" ], "directory_id": "b769ddda1e4d4a1a55c65587e28f852b85e9de84", "extension": "py", "fi...
2.53125
stackv2
def setup(): print(10*'=' + ' Notas SIGAA setup ' + 10*'=') username = str(input('SIGAA username: ')) password = str(input('SIGAA password: ')) webdriver_path = str(input('Webdriver path (always use / and, if in the same dir, use ./): ')) csv_output = str(input('CSV output path (always use / and, i...
25
37.08
105
11
248
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_1494986526b2c4b1_cb2377fd", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 14 ]
[ 21 ]
[ 20 ]
[ 4 ]
2024-11-19T00:06:20.153048+00:00
1,460,200,038,000
6f56f3f75afc1b520fb9fda0996391aee9599136
2
{ "blob_id": "6f56f3f75afc1b520fb9fda0996391aee9599136", "branch_name": "refs/heads/master", "committer_date": 1460200284000, "content_id": "fa43a3f0b1124e7dcac8eba6a98b8286035a1344", "detected_licenses": [ "Apache-2.0" ], "directory_id": "3b42b4eaeb77f0cf18e8ef0c369b0c9dca835163", "extension": "py"...
2.34375
stackv2
try: from sshtunnel import SSHTunnelForwarder except ImportError: from sshtunnel.sshtunnel import SSHTunnelForwarder from cm_api.api_client import ApiResource, ApiException from cm_api.endpoints.services import ApiService, ApiServiceSetupInfo import paramiko import json import yaml import requests import subpro...
289
53.32
175
20
3,617
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_7edb3c15bcec91c1_63d77991", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 68 ]
[ null ]
[ 13 ]
[ 86 ]
2024-11-19T01:11:32.639594+00:00
1,636,050,565,000
86322f7ed8fcfc3617ae39f5425a35d75d2b43a0
2
{ "blob_id": "86322f7ed8fcfc3617ae39f5425a35d75d2b43a0", "branch_name": "refs/heads/main", "committer_date": 1636050565000, "content_id": "2df13e8c3dce970b76301ac02de5312c24d34b72", "detected_licenses": [ "MIT" ], "directory_id": "287add3abe5c6cc75dccbccd06e8b2a875e87481", "extension": "py", "file...
2.421875
stackv2
import time from pprint import pprint import socket import re import paramiko from textfsm import clitable import yaml class ConnectSSH: def __init__( self, host, username, password, enable_pass, max_read=60000, read_pause=0.5, fail_on="", t...
159
30.54
88
17
1,113
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_c2c972e52bd6d509_16012d72", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 30 ]
[ null ]
[ 9 ]
[ 69 ]
2024-11-18T23:48:05.907024+00:00
1,452,676,763,000
f1aa7f73118382deabc346bb272382b5724a0e6d
2
{ "blob_id": "f1aa7f73118382deabc346bb272382b5724a0e6d", "branch_name": "refs/heads/master", "committer_date": 1452676763000, "content_id": "ebb273ee6675c41bb3dadae495d3180ed7ebe73d", "detected_licenses": [ "MIT" ], "directory_id": "62c703c9ce78d4928b246c098fe282130fbf6c9d", "extension": "py", "fi...
2.5
stackv2
import os import json from application import whitelist SCANNED_DATA_FILENAME = 'scanned_numbers.txt' SCANNER_ID = '9d3c2169-3be5-4ae6-9be9-2bc2cbd49ccb' def read_list(): if os.path.exists(SCANNED_DATA_FILENAME): with open(SCANNED_DATA_FILENAME, 'rt') as read_handle: read_buffer = read_handle....
79
23.65
120
17
482
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_5d23c474e9d33b66_c725f6ad", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text." ]
[ 32 ]
[ null ]
[ 28 ]
[ 38 ]
2024-11-18T23:48:07.425097+00:00
1,609,410,808,000
3c6789e46d81148efff47b9a407bc38b432ef2e6
3
{ "blob_id": "3c6789e46d81148efff47b9a407bc38b432ef2e6", "branch_name": "refs/heads/master", "committer_date": 1609410808000, "content_id": "26ade937f9db3d49506c14b50a44a7fe2b1bcbcb", "detected_licenses": [ "Apache-2.0" ], "directory_id": "357319d8adf4320246bd3c6c2e45fbb532921f9c", "extension": "py"...
2.640625
stackv2
# -*- coding: utf-8 -*- # Cli.py import re import paramiko import time from scp import SCPClient class SCPCli(object): # class调用方法 def __init__(self, host, port, username, password, timeout = 600): self.host = host self.port = int(port) self.username = username self.password ...
91
23.73
70
13
549
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_e49da72c55ae17f9_05a8a155", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 32 ]
[ null ]
[ 9 ]
[ 71 ]
2024-11-18T23:48:08.522641+00:00
1,651,862,888,000
cc4c3833b15f032725fb639579d273f1f7263e52
2
{ "blob_id": "cc4c3833b15f032725fb639579d273f1f7263e52", "branch_name": "refs/heads/master", "committer_date": 1651862972000, "content_id": "f5fb04a0b5ccd60ad4631899f157f75bdfd81f84", "detected_licenses": [ "MIT" ], "directory_id": "d74eaabe4635ae1b99ba0c0d21b19e8eeade360a", "extension": "py", "fi...
2.359375
stackv2
import re import math import random import string import urllib.request, urllib.error, urllib.parse from datetime import datetime, timedelta import supybot.log as log import supybot.conf as conf import supybot.world as world import supybot.ircutils as ircutils import supybot.registry as registry from . import globals...
269
28.78
117
16
2,163
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_f36ab1aaf4ea6a65_79b1fa41", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'github.com', so it might match more...
1
true
[ "CWE-020" ]
[ "py/incomplete-hostname-regexp" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'github.com', so it might match more hosts than expected." ]
[ 141 ]
[ null ]
[ 34 ]
[ 70 ]
2024-11-18T23:48:09.344208+00:00
1,604,005,824,000
dd8c2e908fedd9e4be4da9f3436beb87ec4c5eec
3
{ "blob_id": "dd8c2e908fedd9e4be4da9f3436beb87ec4c5eec", "branch_name": "refs/heads/master", "committer_date": 1604005824000, "content_id": "a47e995524fd8b8ad328d0a4ea75900cf8ee80da", "detected_licenses": [ "MIT" ], "directory_id": "7804aacdc97e2d89134e9018bf9ed58303a5723f", "extension": "py", "fi...
2.96875
stackv2
from http.server import BaseHTTPRequestHandler, HTTPServer import socket from urllib.parse import urlparse class NumberServer(BaseHTTPRequestHandler): def _set_headers(self): self.send_response(200) self.send_header('Content-type', 'text/plain') self.end_headers() def do_GET(self): ...
61
29.52
91
16
430
python
[{"finding_id": "codeql_py/path-injection_8d1600fe9493b319_23205011", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](1)." ]
[ 25, 39 ]
[ null, null ]
[ 22, 26 ]
[ 27, 31 ]
2024-11-19T00:44:20.831149+00:00
1,639,315,196,000
cc081ec71db390613542e7cf68006a09ac14a7dd
3
{ "blob_id": "cc081ec71db390613542e7cf68006a09ac14a7dd", "branch_name": "refs/heads/master", "committer_date": 1639315196000, "content_id": "849297abf37f9e40831b00a0eb947f192a89b031", "detected_licenses": [ "Unlicense" ], "directory_id": "3beec068158598234412d94ae89c652705cc08b8", "extension": "py",...
3.203125
stackv2
#!/usr/bin/env python3 input = open("day04.txt", "r").read().split("\n")[:-1] valid_passwords = 0 valid_passwords2 = 0 for line in input: words = line.split() if len(set(words)) == len(words): valid_passwords += 1 for line in input: words = ["".join(sorted(w)) for w in line.split()] if len(se...
18
22.5
54
12
122
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_caa24325a1ce8daf_b86e2734", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 17, 18 ]
[ null, null ]
[ 7, 7 ]
[ 22, 23 ]
2024-11-18T23:19:49.746426+00:00
1,603,962,142,000
e3ef16a1b722768c5be6e87ec00518a784dee61a
3
{ "blob_id": "e3ef16a1b722768c5be6e87ec00518a784dee61a", "branch_name": "refs/heads/main", "committer_date": 1603962142000, "content_id": "a2ff4a7fd2026f92f52c9d42774e15f927f4bc12", "detected_licenses": [ "MIT" ], "directory_id": "1c36db390f9d66a0dd93e47a0f417d233229da37", "extension": "py", "file...
3.109375
stackv2
from flask import Flask app = Flask(__name__) # @app.route('/') 使用app.route装饰器注册视图函数 def hello_world(): return '<h1>Hello MMY!</h1>' app.add_url_rule('/', 'hello_world', hello_world) # 使用app.add_url_rule()方法 3个参数:URL、端点名和视图函数 # 动态路由 @app.route('/user/<name>') def user(name): return '<h1>Hello,{}!</h1>'...
22
16.18
93
9
124
python
[{"finding_id": "codeql_py/reflective-xss_08d9969128d0edd1_932d8673", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 17 ]
[ null ]
[ 12 ]
[ 45 ]
2024-11-18T23:11:13.892492+00:00
1,445,413,049,000
89a311c5e5a722a132df8c3f1df21b69542eed5b
3
{ "blob_id": "89a311c5e5a722a132df8c3f1df21b69542eed5b", "branch_name": "refs/heads/master", "committer_date": 1445413049000, "content_id": "ba6d6a33499c1ed5ce89cfddcb0f000f36c6c181", "detected_licenses": [ "MIT" ], "directory_id": "4d1e93a236890614670559d703e6a412341c851f", "extension": "py", "fi...
2.75
stackv2
from . import connection import hashlib, random, string def password_hash(password, salt): return hashlib.sha256((password + salt).encode('utf-8')).hexdigest() def current_user(handler): uid = handler.get_secure_cookie('uid') if uid is None: return None else: return User.from_uid(int(uid.decode())) ...
77
28.52
110
16
532
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_27a5271bb6669726_f9ee8ff1", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e...
[ 6 ]
[ null ]
[ 25 ]
[ 58 ]
2024-11-19T01:21:45.298515+00:00
1,690,556,429,000
d1ffa7fc6de3e3f4b6c7a22177154ea399923b96
3
{ "blob_id": "d1ffa7fc6de3e3f4b6c7a22177154ea399923b96", "branch_name": "refs/heads/master", "committer_date": 1690556429000, "content_id": "c54542bcdc560f1d9cbd47a280827e551d930171", "detected_licenses": [ "MIT" ], "directory_id": "7d9d651cc5ecbd520b73779631a5d7c8eae40aca", "extension": "py", "fi...
2.78125
stackv2
import jinja2 class Saturation(object): def __init__(self, name, input_word_length=22, input_frac_length=10, output_word_length=16): context = {'name': name, 'iw': input_word_length, 'ow': output_wo...
39
36.59
110
16
344
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_9a4ace2ab1ea6a1e_5dafa6de", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 23 ]
[ null ]
[ 15 ]
[ 48 ]
2024-11-19T00:11:35.962906+00:00
1,374,482,273,000
69c3a16d9d81be44b8dc19dfdaa2bf4106dcf54d
2
{ "blob_id": "69c3a16d9d81be44b8dc19dfdaa2bf4106dcf54d", "branch_name": "refs/heads/master", "committer_date": 1374482273000, "content_id": "78a4a6623f2603616a03276541cc712efdbee9a8", "detected_licenses": [ "MIT" ], "directory_id": "82b34241cd1e2d7c6f9ef7660ed7351f615f8d18", "extension": "py", "fi...
2.359375
stackv2
from flask import Blueprint, render_template, redirect, g, url_for, request from flask.ext.login import login_user, logout_user from aurora_app import login_manager from aurora_app.models import User, Deployment from aurora_app.decorators import public from aurora_app.forms import LoginForm mod = Blueprint('main', __...
44
28.75
78
17
281
python
[{"finding_id": "codeql_py/url-redirection_008eb4b36781951f_201a05bb", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 35 ]
[ null ]
[ 30 ]
[ 34 ]
2024-11-19T00:36:48.933889+00:00
1,432,724,567,000
34b57092ab8a5231c4dccd973a73ae583cfab612
2
{ "blob_id": "34b57092ab8a5231c4dccd973a73ae583cfab612", "branch_name": "refs/heads/master", "committer_date": 1432724567000, "content_id": "e5079e4f3b536af49943cdf191d4074a465d4408", "detected_licenses": [ "Apache-2.0" ], "directory_id": "3e73e9d9b22efe3d2e99aea44d1e6fb1c91064c1", "extension": "py"...
2.40625
stackv2
# -*- coding: utf-8 -*- import tornado.httpserver import tornado.ioloop import tornado.options import tornado.web import json from bson import json_util from bson.objectid import ObjectId import pymongo from tornado.options import define, options define('port', default=8000, help='run on the given port', type=int)...
77
25.73
73
16
480
python
[{"finding_id": "codeql_py/reflective-xss_e94bd8c22e2ed13c_7089545a", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 49 ]
[ null ]
[ 20 ]
[ 62 ]
2024-11-19T00:36:50.450384+00:00
1,634,357,771,000
3ba5a71f99870ffec8228cfc040b5864f138564d
3
{ "blob_id": "3ba5a71f99870ffec8228cfc040b5864f138564d", "branch_name": "refs/heads/main", "committer_date": 1634357771000, "content_id": "d7546223a042fa9111a561655ac89db027df7084", "detected_licenses": [ "MIT" ], "directory_id": "43093ea92879ed3d192ee846f9fb5b0ac9b358a7", "extension": "py", "file...
3.203125
stackv2
#!/usr/bin/env python3 ''' Scrapes for phone and emails and places in spreadsheet. Python 3 required ''' import re from urllib.request import urlopen, Request import os from datetime import datetime from openpyxl import Workbook from ...
102
30.91
129
17
846
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_11ac7abd296f3a13_85e4f7bb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 52 ]
[ null ]
[ 19 ]
[ 62 ]
2024-11-19T00:36:54.322289+00:00
1,597,942,083,000
f0e90bbfcf370724760b6957cc11cff5419b2e32
3
{ "blob_id": "f0e90bbfcf370724760b6957cc11cff5419b2e32", "branch_name": "refs/heads/master", "committer_date": 1597942083000, "content_id": "80f50e1a641901c2f073c7f396efbf5411b601b2", "detected_licenses": [ "MIT" ], "directory_id": "9759d275a6087a15aebed8deec52c18cfcde9d93", "extension": "py", "fi...
2.5625
stackv2
from django.shortcuts import render from django.http import HttpResponse,JsonResponse from django.views import View from book.models import BookInfo,PeopleInfo from django.http import HttpResponse from django.shortcuts import redirect # Create your views here. import json def set_cookies(request): response = H...
176
18.02
89
11
848
python
[{"finding_id": "codeql_py/reflective-xss_316f369de37c9a26_46aa2ad0", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 127 ]
[ null ]
[ 29 ]
[ 47 ]
2024-11-19T01:02:11.140966+00:00
1,450,738,667,000
cae70cabd035fc89bc7362b8254ce9944370e674
3
{ "blob_id": "cae70cabd035fc89bc7362b8254ce9944370e674", "branch_name": "refs/heads/master", "committer_date": 1450738667000, "content_id": "4e6e530fc9b8b2f4ac7b8575c3a4508161dcf959", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "97b7669912e19019d5cddec83001af065e9389d4", "extension": "p...
2.90625
stackv2
# -*- coding: utf-8 -*- """Dump a production database backup and current commit to **luna**.""" # python from datetime import datetime # third party import environ import paramiko from scp import SCPClient from time import sleep def backuptoluna(): """ Dump a production database backup and current commit t...
69
31.86
79
12
565
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_be4ce2580d725c6b_54c4a769", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 48 ]
[ null ]
[ 5 ]
[ 62 ]
2024-11-19T00:13:41.525701+00:00
1,599,762,393,000
efbef5424a910fff06c65ab7628484de5b8a049b
3
{ "blob_id": "efbef5424a910fff06c65ab7628484de5b8a049b", "branch_name": "refs/heads/master", "committer_date": 1599762393000, "content_id": "25536eeba737050ed944c38c90412350d2420b6f", "detected_licenses": [ "MIT" ], "directory_id": "ec8be97834198ae6c5cd43863727fba444b59b48", "extension": "py", "fi...
3.234375
stackv2
# -------------- #Header files import pandas as pd import numpy as np import matplotlib.pyplot as plt data=pd.read_csv(path) data['Gender'].replace('-','Agender',inplace=True) print(data['Gender']) #path of the data file- path gender_count=data['Gender'].value_counts() data['Gender'].value_counts().plot(kind="bar") #...
70
19.44
69
9
388
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_daf22020211e4232_81a9afbe", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 9 ]
[ null ]
[ 7 ]
[ 21 ]