added
stringlengths
32
32
created
int64
1,244B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.25
source
stringclasses
1 value
text
stringlengths
324
20.1k
num_lines
int64
16
598
avg_line_length
float64
15.1
58.3
max_line_length
int64
33
179
ast_depth
int64
8
39
length
int64
101
3.8k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.1k
265k
sast_codeql_findings_count
int64
1
45
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
45
rule_ids
listlengths
1
45
confidences
listlengths
1
45
severities
listlengths
1
45
messages
listlengths
1
45
line_starts
listlengths
1
45
line_ends
listlengths
1
45
column_starts
listlengths
1
45
column_ends
listlengths
1
45
2024-11-18T21:51:40.430215+00:00
1,620,250,571,000
1c74c30f492c4c938a550bdf67f670f281a191c4
2
{ "blob_id": "1c74c30f492c4c938a550bdf67f670f281a191c4", "branch_name": "refs/heads/master", "committer_date": 1620250571000, "content_id": "ad5902fa6bd0208d1dc21a06f9560fad535499a0", "detected_licenses": [ "MIT" ], "directory_id": "22c328557c6c86a88d7b1e1154fc84ddb6384ddf", "extension": "py", "fi...
2.34375
stackv2
# Importing Flask and dependencies from flask import Blueprint, jsonify, request, make_response from flask_restx import Resource, abort from app.api import api import os # Import model and db from app import db from app.api.developer.model import Developer, DeveloperSchema, DeveloperRestSchema, DeveloperReturnSchema ...
95
27.93
120
17
687
python
[{"finding_id": "codeql_py/code-injection_0e897aad27a650f1_ac7ec8b5", "tool_name": "codeql", "rule_id": "py/code-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This code execution depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "...
1
true
[ "CWE-094" ]
[ "py/code-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This code execution depends on a [user-provided value](1)." ]
[ 49 ]
[ null ]
[ 9 ]
[ 20 ]
2024-11-18T21:51:56.062582+00:00
1,491,548,103,000
0ddeb4f9d30496111272e3c1ec60f73a01e80266
3
{ "blob_id": "0ddeb4f9d30496111272e3c1ec60f73a01e80266", "branch_name": "refs/heads/master", "committer_date": 1491548103000, "content_id": "0e32b9f20d4301e023daad4ddbb2809b1f9b8930", "detected_licenses": [ "Apache-2.0" ], "directory_id": "b9251fc0c66d62482f04d4e9d90cdba67cabd1f8", "extension": "py"...
2.8125
stackv2
# coding: utf8 """ 工具集 """ import json import pycurl from StringIO import StringIO from prettytable import PrettyTable def get_html(url, user_agent, refer_url): """ curl html :param url: :param user_agent: :param refer_url: :return: """ curl = pycurl.Curl() curl.setopt(pycurl.US...
84
19.04
53
13
441
python
[{"finding_id": "codeql_py/request-without-cert-validation_f8a641aed9d501c3_2704817c", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1) by [this value](2)." ]
[ 27 ]
[ null ]
[ 5 ]
[ 42 ]
2024-11-18T21:51:59.258518+00:00
1,656,074,572,000
18ec26ac01f72e017fb6c58c19fe70bac9e255c0
3
{ "blob_id": "18ec26ac01f72e017fb6c58c19fe70bac9e255c0", "branch_name": "refs/heads/master", "committer_date": 1656074572000, "content_id": "5394556c3f440f43bccb43072c84e2a573cf3e82", "detected_licenses": [ "MIT" ], "directory_id": "6737ba9fb2bdb1c278d6c5d316c4b1ef244fc0db", "extension": "py", "fi...
2.640625
stackv2
#/usr/bin/env python # -*- coding: utf-8 -*- import rsa import sys import base64 # 打印 python 版本 与 windows 系统编码 print("---- 1 ----") print(sys.version) print(sys.getdefaultencoding()) print(sys.getfilesystemencoding()) # 先生成一对密钥,然后保存.pem格式文件,当然也可以直接使用 print("---- 2 ----") (pubkey, privkey) = rsa.newkeys(1024) pub = pu...
91
23.71
69
11
732
python
[{"finding_id": "codeql_py/weak-crypto-key_5793926f60cc7e53_020b7160", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",...
1
true
[ "CWE-326" ]
[ "py/weak-crypto-key" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable." ]
[ 15 ]
[ null ]
[ 21 ]
[ 38 ]
2024-11-18T21:52:07.736723+00:00
1,429,238,814,000
35dee58e8234c1255b9b6ce812a25fbd75b955d6
2
{ "blob_id": "35dee58e8234c1255b9b6ce812a25fbd75b955d6", "branch_name": "refs/heads/master", "committer_date": 1429238814000, "content_id": "c9bf34723fd07d2dfa381ae03b48463857c75c63", "detected_licenses": [ "MIT" ], "directory_id": "4b0cc83d0d7f3c48e2acafc046432a6778c42f35", "extension": "py", "fi...
2.5
stackv2
# -*- coding: utf-8 -*- import jinja2 import markdown2 import os import shutil import subprocess import yaml import json def render_site_ouput(source_dir, output_base, templates_dir, site_data): for root, dirs, files in os.walk(source_dir): for f in files: folder_id = root[len(source_dir):] ...
189
37.58
79
17
1,700
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_1a6ef62b4984acca_f94d7d28", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
3
true
[ "CWE-079", "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 80, 98, 112 ]
[ null, null, null ]
[ 21, 21, 17 ]
[ 60, 60, 53 ]
2024-11-18T22:27:41.043535+00:00
1,631,899,880,000
fdae0965820214f5b2eba2e476a6779545a7a53e
2
{ "blob_id": "fdae0965820214f5b2eba2e476a6779545a7a53e", "branch_name": "refs/heads/master", "committer_date": 1631899880000, "content_id": "33345426b074c46575c056a5dc575ea6ea94e15b", "detected_licenses": [ "MIT" ], "directory_id": "ca0897decab13aa13da09155e119b806864a8fe7", "extension": "py", "fi...
2.5
stackv2
import json import os import time import uuid from operator import and_ import requests from flask import Flask, render_template, abort from flask_basicauth import BasicAuth from flask_cors import CORS from flask_migrate import Migrate from flask_sqlalchemy import SQLAlchemy from sqlalchemy import desc, asc from sqlal...
336
33.99
160
17
2,792
python
[{"finding_id": "codeql_py/reflective-xss_54a57ff54cf1e568_e803f845", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability due to a [user-provided value](2)." ]
[ 172, 202 ]
[ null, null ]
[ 12, 12 ]
[ 16, 16 ]
2024-11-18T22:27:41.403506+00:00
1,673,386,071,000
8dfd7057df47bd94107586d41db9af7b042b3cde
2
{ "blob_id": "8dfd7057df47bd94107586d41db9af7b042b3cde", "branch_name": "refs/heads/main", "committer_date": 1673386071000, "content_id": "c0b181c374a680f21a39136dd7be1297035f05d4", "detected_licenses": [ "MIT" ], "directory_id": "fd4b3a767ea86a3c6b8ff63857009e2f0cddc5de", "extension": "py", "file...
2.328125
stackv2
""" Reolink Camera subscription """ from datetime import datetime, timedelta import base64 import hashlib import logging import re import uuid import aiohttp import asyncio from . import templates TERMINATION_TIME = 15 DEFAULT_TIMEOUT = 30 _LOGGER = logging.getLogger(__name__) class Manager: """Initialize the ...
238
33.68
134
19
1,718
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_ffbd3a1654dd8ee3_7a1cb838", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 68 ]
[ null ]
[ 21 ]
[ 87 ]
2024-11-18T22:43:56.145676+00:00
1,419,464,600,000
2c3853e56bbe25abb83137e201d413320182665e
3
{ "blob_id": "2c3853e56bbe25abb83137e201d413320182665e", "branch_name": "refs/heads/master", "committer_date": 1419464600000, "content_id": "6924ce0a2cb14565eadf3995375fd7f0e8dffd1f", "detected_licenses": [ "MIT" ], "directory_id": "dd08eab78ff8e3da508e199b27d4bca4dcf82ecf", "extension": "py", "fi...
2.59375
stackv2
#! /usr/bin/python # -*- coding: utf-8 -*- import os import argparse from copy import deepcopy import bibtexparser from bibtexparser.bparser import BibTexParser from jinja2 import Environment, FileSystemLoader from auxfun import * PATH = os.getcwdu() # Create command line arguments parser parser = argparse.Argumen...
111
33.6
93
17
824
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_311f4ab3815bb29c_40527cc2", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 74, 100 ]
[ null, null ]
[ 14, 21 ]
[ 62, 89 ]
2024-11-18T22:44:44.962805+00:00
1,574,366,579,000
6470fd5a58df41a5053800054b2ff37ce5e6e788
4
{ "blob_id": "6470fd5a58df41a5053800054b2ff37ce5e6e788", "branch_name": "refs/heads/master", "committer_date": 1574366579000, "content_id": "ac036b60c937f2ef3cba5654e237259670581a94", "detected_licenses": [ "Apache-2.0" ], "directory_id": "ba8b7f6bcffeaed6807ff254699e8ae7013f0c56", "extension": "py"...
3.640625
stackv2
def play_game(): from IPython.display import clear_output clear_output() day_list = ['первое', 'второе', 'третье', 'четвёртое', 'пятое', 'шестое', 'седьмое', 'восьмое', 'девятое', 'десятое', 'одиннадцатое', 'двенадцатое', 'тринадцатое', 'четырнадцатое', 'пятна...
40
52.52
171
21
844
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f5bf0233705b6b05_7907b9dd", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 32 ]
[ null ]
[ 23 ]
[ 142 ]
2024-11-18T22:44:52.435445+00:00
1,648,531,533,000
b73674be647eb8e1b0874e895cb1d48a0adba8c3
2
{ "blob_id": "b73674be647eb8e1b0874e895cb1d48a0adba8c3", "branch_name": "refs/heads/master", "committer_date": 1648531533000, "content_id": "19bd65132a70702583b4f9d48ab1f27dc5c54362", "detected_licenses": [ "MIT" ], "directory_id": "8ac6ad77f3939ebf364dc369e905971a705d9b0c", "extension": "py", "fi...
2.328125
stackv2
""" Script goal, Build evaluation maps of GEE data """ #============================================================================== __title__ = "data fetcher" __author__ = "Arden Burrell" __version__ = "v1.0(11.09.2019)" __email__ = "arden.burrell@gmail.com" #====================================================...
393
28.43
150
19
3,375
python
[{"finding_id": "codeql_py/tarslip_d71e47586336dee3_c2c6628d", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/tarslip", "py/tarslip" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1).", "This file extraction depends on a [potentially untrusted source](1)." ]
[ 347, 356 ]
[ null, null ]
[ 4, 3 ]
[ 6, 5 ]
2024-11-18T21:00:01.838861+00:00
1,470,931,079,000
32f473fd111ad5534c1297b4d64bab2bd079c00e
3
{ "blob_id": "32f473fd111ad5534c1297b4d64bab2bd079c00e", "branch_name": "refs/heads/master", "committer_date": 1470931079000, "content_id": "6aaefdd7698cb6da708fec9568fd7af2f43eea08", "detected_licenses": [ "MIT" ], "directory_id": "87496867d96cd4f830d3f3ec3213b71403ab3e48", "extension": "py", "fi...
2.75
stackv2
# coding=utf-8 # habraproxy.py — это простейший http-прокси-сервер, запускаемый локально (порт на ваше # усмотрение), который показывает содержимое страниц Хабра. С одним исключением: после # каждого слова из шести букв должен стоять значок «™». Примерно так: # # http://habrahabr.ru/company/yandex/blog/258673/ # ...
137
34.21
114
16
1,236
python
[{"finding_id": "codeql_py/partial-ssrf_e823b8a4cfad3a33_b9a53db7", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depen...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depends on a [user-provided value](2)." ]
[ 49 ]
[ null ]
[ 31 ]
[ 71 ]
2024-11-18T21:00:02.861871+00:00
1,596,189,140,000
162fc19fefef77e5fda6bc55e7618418b16735a8
3
{ "blob_id": "162fc19fefef77e5fda6bc55e7618418b16735a8", "branch_name": "refs/heads/master", "committer_date": 1596189140000, "content_id": "e74148b2c1d5b8fddbbad645f9cf141a756d461c", "detected_licenses": [ "MIT" ], "directory_id": "6ca9a7ed179ed96857c86dd91d5f81ad07be4690", "extension": "py", "fi...
2.546875
stackv2
import hashlib import string import requests import re import time import os # 按base64规则解码 def decode_b64str(base64_str): base64_charset = string.ascii_uppercase + string.ascii_lowercase + string.digits + '+/' # 对每一个base64字符取下标索引,并转换为6为二进制字符串 base64_bytes = ['{:0>6}'.format(str(bin(base64_charset.index(s...
160
23.62
111
17
1,296
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_0c17a4f4fa547081_d0dc34cf", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi...
[ 40 ]
[ null ]
[ 24 ]
[ 46 ]
2024-11-18T21:00:05.820810+00:00
1,588,661,101,000
82b0a44371bcb13b13666c7cd6bd07852821971f
2
{ "blob_id": "82b0a44371bcb13b13666c7cd6bd07852821971f", "branch_name": "refs/heads/master", "committer_date": 1588661101000, "content_id": "f251331b8b5d5a4efd4b1c22d4ed63ad9ff48bce", "detected_licenses": [ "MIT" ], "directory_id": "d30280099e212d1dc640743ffc5dd9f9c8144f28", "extension": "py", "fi...
2.359375
stackv2
#! /usr/bin/env python3.6 """ server.py Stripe Sample. Python 3.6 or newer required. """ import stripe from twilio.rest import Client import json import os from flask import Flask, render_template, jsonify, request, send_from_directory from dotenv import load_dotenv, find_dotenv # Setup Stripe python client library...
193
31.95
119
18
1,314
python
[{"finding_id": "codeql_py/stack-trace-exposure_16fb5e92d613db8a_95910462", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
4
true
[ "CWE-209", "CWE-209", "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information...
[ 84, 110, 156, 174 ]
[ null, null, null, null ]
[ 30, 30, 30, 20 ]
[ 49, 49, 49, 21 ]
2024-11-18T21:00:51.402582+00:00
1,669,749,418,000
05abd8e2807d9fbd325c5c6938417988dde7427f
4
{ "blob_id": "05abd8e2807d9fbd325c5c6938417988dde7427f", "branch_name": "refs/heads/master", "committer_date": 1669749418000, "content_id": "434ad4518fb67ebb79b87c5f0f337e7562d0bea2", "detected_licenses": [], "directory_id": "2296bb6d628d08f59516de14487b8f87fec09bfb", "extension": "py", "filename": "01_...
4.15625
stackv2
# Instructions: # https://docs.google.com/document/d/1Fj1Na3iOYbpw-XejVtvjinl6fensn1gcIrIUsOHAbBc/edit?usp=sharing import random secret_number = random.randint(1, 100) user_guess = None number_of_guesses = 0 def display_secret_number(secret_number): print('-' * 20) print('The secret number is (just for debuggi...
23
43.57
106
9
286
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_58b8ee009e87a84a_a613d887", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text." ]
[ 10 ]
[ null ]
[ 66 ]
[ 79 ]
2024-11-18T21:01:04.285501+00:00
1,689,553,250,000
40640e9808a5439317edac7c1eeaf83d6826fe8a
2
{ "blob_id": "40640e9808a5439317edac7c1eeaf83d6826fe8a", "branch_name": "refs/heads/master", "committer_date": 1689553250000, "content_id": "48c868908c0b6a1776df418139dd12b46fdd63d9", "detected_licenses": [ "Apache-2.0" ], "directory_id": "74dbaccf7da7038876aa3f0c48f7a6b909b9fba6", "extension": "py"...
2.375
stackv2
# -*- coding: utf-8 -*- """ Created on Mar 15, 2012 @author: moloch Copyright 2012 Root the Box Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licen...
377
34.26
88
18
2,854
python
[{"finding_id": "codeql_py/log-injection_30f6be135260bd74_4877c47d", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
5
true
[ "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 96, 100, 121, 196, 215 ]
[ null, null, null, null, null ]
[ 27, 27, 23, 23, 13 ]
[ 88, 77, 81, 81, 79 ]
2024-11-18T21:25:27.737113+00:00
1,475,177,103,000
70dc3e16537028fe34a9c5ee8b0b89b7eb9b609b
4
{ "blob_id": "70dc3e16537028fe34a9c5ee8b0b89b7eb9b609b", "branch_name": "refs/heads/master", "committer_date": 1475177103000, "content_id": "894afe0fe2ab89de80540860ab5ec716080935b8", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "3092e6b025a65a3eff3c81881115d21ea304b3d4", "extension": "p...
3.671875
stackv2
#! /usr/bin/env python3 """ Minceware generates truly random Diceware style passphrases on a computer. Exported functions: get_length_from_entropy -- calculate passphrase length based on entropy and word list length generate_passphrase -- generates passphrase from a given word list For standalone usage and command l...
128
31.37
92
18
880
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5b95615ef700a017_675198aa", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 128 ]
[ null ]
[ 11 ]
[ 49 ]
2024-11-18T22:01:02.859797+00:00
1,554,022,303,000
a77a6ee52af360b1f9d8ed8098b2cbf7ab50fa0b
3
{ "blob_id": "a77a6ee52af360b1f9d8ed8098b2cbf7ab50fa0b", "branch_name": "refs/heads/master", "committer_date": 1554022303000, "content_id": "e0b055acdf85bb2b08ce51cea8f7d6e565da4968", "detected_licenses": [ "MIT" ], "directory_id": "54d552bd969b17f044ab4182cde8e4e5e4ee0796", "extension": "py", "fi...
2.71875
stackv2
#!/usr/bin/python3 # -*- python -*- # -*- coding: UTF-8 -*- # seed_phrase_to_kin_keys # Copyright (C) 2017 chancity # # Permission is hereby granted, free of charge, to any person # obtaining a copy of this software and associated documentation files # (the "Software"), to deal in the Software without restriction, # i...
214
37.41
80
19
1,885
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6c7b5010f70215c8_d98182d2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 120 ]
[ null ]
[ 11 ]
[ 52 ]
2024-11-18T22:01:13.298086+00:00
1,622,717,210,000
dbcc45c6afd2b070244e08b8548b4d479f433db6
3
{ "blob_id": "dbcc45c6afd2b070244e08b8548b4d479f433db6", "branch_name": "refs/heads/main", "committer_date": 1622717210000, "content_id": "47e6bba13d05444956efd89304c7b585954dadb5", "detected_licenses": [ "MIT" ], "directory_id": "38c1a0fb2a6bfc24ad018f3f687e050e95227ad3", "extension": "py", "file...
2.71875
stackv2
from fastapi import APIRouter from fastapi.responses import JSONResponse import requests import json router = APIRouter(prefix="/nasa") @router.get("/planetary-news") # date format: YYYY - MM - DD; api_key can be specified or not (-> then goes with the default one) async def get_planetary_news(date: str, api_key: st...
117
28.68
98
16
766
python
[{"finding_id": "codeql_py/stack-trace-exposure_08c4774d6b50b596_2c310497", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 25 ]
[ null ]
[ 58 ]
[ 66 ]
2024-11-18T22:15:00.566339+00:00
1,582,301,916,000
f707fba49e79e00435ec02cfa7bcf3048071399d
3
{ "blob_id": "f707fba49e79e00435ec02cfa7bcf3048071399d", "branch_name": "refs/heads/master", "committer_date": 1582301916000, "content_id": "11d280391694ddd6c59e748ad95bf0c8fef76508", "detected_licenses": [ "MIT" ], "directory_id": "73845744e1372d187c57c468dba0fed45b7420d4", "extension": "py", "fi...
2.984375
stackv2
""" ComptoxAI graphs. A typical graph workflow looks something like the following: >>> from comptox_ai import Graph >>> G = Graph.from_neo4j(config_file = "./CONFIG.cfg") >>> G.convert_inplace(to='networkx') >>> A = G.get_adjacency() >>> GS = G.convert(to='graphsage') """ import numpy as np import scipy.sparse impor...
371
31.46
117
16
2,637
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_71c72a0f02705c78_4bd36c04", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 236 ]
[ null ]
[ 25 ]
[ 28 ]
2024-11-18T22:15:02.436258+00:00
1,358,291,622,000
41c037a131f0afa29191dac668c206a74841e438
2
{ "blob_id": "41c037a131f0afa29191dac668c206a74841e438", "branch_name": "refs/heads/master", "committer_date": 1358291622000, "content_id": "20d96851103283a3d69c14a4afee1dbf95ca6bb8", "detected_licenses": [ "MIT" ], "directory_id": "e7640af22ff5113e0061765d5d9e6c8c9762e54a", "extension": "py", "fi...
2.3125
stackv2
import os, re from twilio.rest import TwilioRestClient import sendgrid from flask import Flask, request, render_template app = Flask(__name__) # TWILIO_ACCOUNT_SID and TWILIO_AUTH_TOKEN environment variables must be set client = TwilioRestClient() # SENDGRID_USER and SENDGRID_PASS enviornment variables must be set sg...
45
35.36
101
17
382
python
[{"finding_id": "codeql_py/polynomial-redos_fa91fd4f5a4a91d7_a30bb9da", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with ma...
1
true
[ "CWE-1333" ]
[ "py/polynomial-redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with many repetitions of '?'." ]
[ 23 ]
[ null ]
[ 50 ]
[ 72 ]
2024-11-18T22:25:59.505673+00:00
1,548,313,245,000
9479f3c378128943890e650a9f87ba8c0521c1bd
2
{ "blob_id": "9479f3c378128943890e650a9f87ba8c0521c1bd", "branch_name": "refs/heads/master", "committer_date": 1548313245000, "content_id": "f1fc092f778262fd9eb588dc8dbf519c461ebde8", "detected_licenses": [ "Apache-2.0" ], "directory_id": "c4624942c620a7d116dd99024686101c57c0639d", "extension": "py"...
2.5
stackv2
import requests import json def sendSMS(mobile, content): """ :param mobile: :param content: :return: 短信告警 """ headers = {"Content-Type": "application/json"} # url = "http://10.10.70.121:80/api/Message/SendMessageV3" # Help/Api/POST-api-Message-SendMessageV3 # url = "http://10.10.70.1...
29
28.38
105
13
263
python
[{"finding_id": "codeql_py/request-without-cert-validation_fa5cd07010e4d5ad_ea634153", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 21 ]
[ null ]
[ 15 ]
[ 103 ]
2024-11-18T22:26:03.511373+00:00
1,684,792,236,000
c78bd51dcd7027376a450eb18ada955264be6799
3
{ "blob_id": "c78bd51dcd7027376a450eb18ada955264be6799", "branch_name": "refs/heads/master", "committer_date": 1684910798000, "content_id": "b93842b3f77ffe3920f6deadacf4c42c7824b710", "detected_licenses": [ "MIT" ], "directory_id": "6e809100c3772cd490fe5c5d13c9ad0838b3d715", "extension": "py", "fi...
2.6875
stackv2
import requests import requests_cache from datetime import timedelta from rest_framework import status from rest_framework.decorators import api_view from rest_framework.response import Response from api.commonresponses import DOWNSTREAM_ERROR_RESPONSE from api.models import City from api.modules.weather.constants imp...
91
43.35
95
23
787
python
[{"finding_id": "codeql_py/partial-ssrf_c5d02fc0744f3ba1_2586c9cf", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depen...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depends on a [user-provided value](2)." ]
[ 73 ]
[ null ]
[ 24 ]
[ 90 ]
2024-11-18T22:26:17.598625+00:00
1,490,904,838,000
27bcc063842d918cd64de82ab3bbfb0a2034a603
3
{ "blob_id": "27bcc063842d918cd64de82ab3bbfb0a2034a603", "branch_name": "refs/heads/master", "committer_date": 1490904838000, "content_id": "1b1d2af50f210256c26d0aff120e1873a8ded58b", "detected_licenses": [ "MIT" ], "directory_id": "70905cce5f92ff7273ec424d62b338d8f36f3dc0", "extension": "py", "fi...
2.625
stackv2
from Crypto.Cipher import DES from Crypto import Random from base64 import b64encode, b64decode from config import app_config from profiling import profile, Scope # generate new key: # print(b64encode(Random.new().read(DES.block_size)).decode("utf-8")) class Encoder(): @profile(Scope.Core) def __init__(self...
33
29.76
83
15
258
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_5dc923fc87606cbd_a37c1735", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The cryptographic algorithm DES](1) is broken or weak, and should not be used.", "r...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[The cryptographic algorithm DES](1) is broken or weak, and should not be used.", "[The cryptographic algorithm DES](1) is broken or weak, and should not be used." ]
[ 23, 30 ]
[ null, null ]
[ 26, 16 ]
[ 43, 58 ]
2024-11-18T20:39:44.340408+00:00
1,680,032,345,000
c8faef56b3a8eff8fbd06134d23ddc51a83fef25
3
{ "blob_id": "c8faef56b3a8eff8fbd06134d23ddc51a83fef25", "branch_name": "refs/heads/main", "committer_date": 1680033272000, "content_id": "2c736042fe512c5a22f14be75f538ada4fabb70f", "detected_licenses": [ "Apache-2.0" ], "directory_id": "3f5f2bad9f6ab4acd56c4e2929cee1af4a242e57", "extension": "py", ...
2.578125
stackv2
# # Copyright (c) 2022 Dell EMC Corporation # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed...
295
38.36
112
23
2,572
python
[{"finding_id": "codeql_py/request-without-cert-validation_83ccd42ad953bee1_2177840e", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
9
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation"...
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 66, 83, 118, 135, 161, 184, 223, 235, 239 ]
[ 68, null, null, null, 162, 185, null, null, null ]
[ 20, 20, 16, 20, 20, 20, 20, 33, 41 ]
[ 50, 68, 64, 68, 70, 70, 72, 90, 102 ]
2024-11-18T20:39:48.321169+00:00
1,621,507,695,000
0550b942e66c61ae6194d011fd67ca8e844bc6ee
2
{ "blob_id": "0550b942e66c61ae6194d011fd67ca8e844bc6ee", "branch_name": "refs/heads/main", "committer_date": 1621507695000, "content_id": "e64477229ecd3318c9b6007a1535aa17e8628a4c", "detected_licenses": [ "MIT" ], "directory_id": "ee0ded1e4265a3770d524309ff6e1cf1d24a2575", "extension": "py", "file...
2.40625
stackv2
import scrapy from scrapy.spiders import CrawlSpider, Rule from scrapy.linkextractors import LinkExtractor from GitClosedIssuesWebCrawler.items import GitItem import csv import json from collections import defaultdict #################################### #### REMOVE BLANK LINES FROM CSV ### ###########################...
111
44.28
142
15
1,196
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_fa331d7afb31065f_026b4544", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [github.com](1) may be at an arbitrary position in the ...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [github.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 47 ]
[ null ]
[ 46 ]
[ 63 ]
2024-11-18T20:40:08.494414+00:00
1,626,515,579,000
ccecb26f6011dd9bbb1554cf54760766ed05805a
3
{ "blob_id": "ccecb26f6011dd9bbb1554cf54760766ed05805a", "branch_name": "refs/heads/master", "committer_date": 1626515579000, "content_id": "36e850027e522fc22842e385414139cbb992df50", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "6e82f43b9e0c8ca634ebf5c69bfbffdf01951e23", "extension": "p...
2.71875
stackv2
"""Downloads build artifacts via the CircleCI API.""" import argparse import os import json import six import subprocess import sys def query_artifacts(api_token, user, project, branch, filter): """Queries CircleCI for a list of build artifacts. All parameters are strings. The returned value is a JSON object wit...
88
37.81
132
15
737
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a1051b5386230917_5389e1f1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 28 ]
[ null ]
[ 9 ]
[ 23 ]
2024-11-18T20:52:21.742701+00:00
1,532,612,162,000
4b38005e674a72ca06bec7fc0606ba267cddcce8
3
{ "blob_id": "4b38005e674a72ca06bec7fc0606ba267cddcce8", "branch_name": "refs/heads/master", "committer_date": 1532612162000, "content_id": "fe11f66e50648dd89379945db0cb23675b6e1a39", "detected_licenses": [ "MIT" ], "directory_id": "5c603f9b55d30c679ca2dc623953b2e15b3201f7", "extension": "py", "fi...
2.5625
stackv2
from flask import abort, Flask, jsonify, request import os,re,time import pandas as pd import requests from slackclient import SlackClient import summarybot_utils as sbut import summarybot_ref as sref from zappa.async import task app = Flask(__name__) ###################################################################...
143
36.88
109
15
1,163
python
[{"finding_id": "codeql_py/full-ssrf_3f48c394856e5284_092ef077", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
1
true
[ "CWE-918" ]
[ "py/full-ssrf" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1)." ]
[ 129 ]
[ null ]
[ 5 ]
[ 43 ]
2024-11-18T21:08:10.838049+00:00
1,679,473,142,000
7cc7e800035e793c093b3e0a6e0b231d587b0706
2
{ "blob_id": "7cc7e800035e793c093b3e0a6e0b231d587b0706", "branch_name": "refs/heads/master", "committer_date": 1679473142000, "content_id": "e84d8321e429d199dd1b3c6a35ff337c3a7c9e2f", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "d8744b28d1530450cbeeb4c80756bfe41244f859", "extension": "p...
2.34375
stackv2
# -*- coding: utf-8 -*- """ rstblog.programs ~~~~~~~~~~~~~~~~ Builtin build programs. :copyright: (c) 2010 by Armin Ronacher. :license: BSD, see LICENSE for more details. """ import os import shutil import subprocess from datetime import datetime from io import StringIO from typing import Any, Di...
267
30.29
86
20
1,677
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_39815299326cac79_9393b7d7", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 190 ]
[ null ]
[ 20 ]
[ 34 ]
2024-11-18T21:08:19.648595+00:00
1,669,983,054,000
e63df7315732c742c3a8de787db4991f64861fc8
2
{ "blob_id": "e63df7315732c742c3a8de787db4991f64861fc8", "branch_name": "refs/heads/master", "committer_date": 1669983054000, "content_id": "940218b0662b427f5eaedc240cb3f58cd013d78c", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "56731673c481f872b61f86e9c8c07bb9b0548c94", "extension": "p...
2.453125
stackv2
import json import typing from jinja2 import Template from tornado.routing import Rule from tornado.web import Application, RequestHandler from .base import Apiman as _Apiman class Apiman(_Apiman): """Tornado extension >>> apiman = Apiman( ... template="./examples/docs/dog_template.yml" ... ) ...
165
34.43
88
24
1,237
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_cd44aa793cc58b44_aa3182f5", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 43, 52 ]
[ null, null ]
[ 28, 26 ]
[ 72, 68 ]
2024-11-18T21:08:21.883361+00:00
1,529,314,391,000
a646dadea04c176ae9ccbe012635f8561589bdcc
3
{ "blob_id": "a646dadea04c176ae9ccbe012635f8561589bdcc", "branch_name": "refs/heads/master", "committer_date": 1529314391000, "content_id": "1650b63ddede4892977c695f6dba1dd79dd61e3b", "detected_licenses": [ "MIT" ], "directory_id": "4c92dd7bae8e7bb3b0693420bf3098639b207404", "extension": "py", "fi...
2.84375
stackv2
"""Functions for downloading and reading CIFAR10 data.""" from __future__ import absolute_import from __future__ import division from __future__ import print_function import os import urllib import numpy as np import tarfile import pickle from tensorflow.python.platform import gfile import tensorflow as tf from tenso...
209
28.86
92
15
1,429
python
[{"finding_id": "codeql_py/tarslip_17596a8251a59821_226fe123", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 92 ]
[ null ]
[ 13 ]
[ 15 ]
2024-11-18T21:08:26.637879+00:00
1,593,097,517,000
1d155cb02a991787f5f6e28d55c2cdaada8f5352
4
{ "blob_id": "1d155cb02a991787f5f6e28d55c2cdaada8f5352", "branch_name": "refs/heads/master", "committer_date": 1593097517000, "content_id": "3aa497f9099342a53f2e1426bf48e7cb3306615e", "detected_licenses": [ "MIT" ], "directory_id": "27b7cbf08c40cedb3ddb3a6a6acb6e10131844e7", "extension": "py", "fi...
3.703125
stackv2
from string import digits, ascii_letters, punctuation from random import choice, shuffle ######################################## #this small program generate a password you can use it to secure your accounts with a strong password!!! # How it works!!!! # simply choose the length of the letters and the numbers and t...
58
31.74
166
11
423
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_4e84f2c8f269d6d6_89f1913c", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 54 ]
[ null ]
[ 13 ]
[ 29 ]
2024-11-18T21:32:18.207786+00:00
1,429,289,811,000
9e65c2443582cb42452c96584a2aaef7f942802c
2
{ "blob_id": "9e65c2443582cb42452c96584a2aaef7f942802c", "branch_name": "refs/heads/master", "committer_date": 1429289811000, "content_id": "fdb7d3c2ca72445e64f80fea413586865a84d7b2", "detected_licenses": [ "MIT" ], "directory_id": "1e61308b1c503507edc6a788031901199f611228", "extension": "py", "fi...
2.46875
stackv2
'''The MIT License (MIT) Copyright (c) 2014 Shuo Li Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, me...
72
33.83
99
14
633
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_aebfc0679ed63326_15bd87b2", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 47 ]
[ null ]
[ 9 ]
[ 50 ]
2024-11-18T21:32:24.699419+00:00
1,510,860,141,000
04805110d099431c63972456f3988efc518a2c9a
3
{ "blob_id": "04805110d099431c63972456f3988efc518a2c9a", "branch_name": "refs/heads/master", "committer_date": 1510860141000, "content_id": "d9f68d06c428343f291cd15729cef06cc93f027c", "detected_licenses": [ "MIT" ], "directory_id": "7451758cf09b18d42e4720fcf946c8e1610ea5e0", "extension": "py", "fi...
2.71875
stackv2
#!/usr/bin/env python3 import sys from http.server import BaseHTTPRequestHandler from http.client import HTTPSConnection import json import socketserver import urllib # curl -X POST -d @push.raw http://localhost:8081/ --header "Content-Type:application/json" class SimpleServer(socketserver.ThreadingMixIn, socketserv...
143
27.92
99
14
919
python
[{"finding_id": "codeql_py/full-ssrf_d7580b1c63b360e0_3091f555", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).\nThe full URL of this request depends on a [user-...
1
true
[ "CWE-918" ]
[ "py/full-ssrf" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1).\nThe full URL of this request depends on a [user-provided value](1).\nThe full URL of this request depends on a [user-provided value](2).\nThe full URL of this request depends on a [user-provided value](2)." ]
[ 84 ]
[ null ]
[ 13 ]
[ 62 ]
2024-11-18T22:26:06.933747+00:00
1,633,536,693,000
acdda3463be4743b25c3da0fca2f5819f93ac035
2
{ "blob_id": "acdda3463be4743b25c3da0fca2f5819f93ac035", "branch_name": "refs/heads/master", "committer_date": 1633536693000, "content_id": "57c6a7767b06fa1e14471ba762d592ed775a49f9", "detected_licenses": [ "ISC" ], "directory_id": "475889e0e76ea2d7570d07f60b5c4723048d232e", "extension": "py", "fi...
2.484375
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- # # Copyright (C) 2021 The SymbiFlow Authors. # # Use of this source code is governed by a ISC-style # license that can be found in the LICENSE file or at # https://opensource.org/licenses/ISC # # SPDX-License-Identifier: ISC """ This script is responsible for generating ...
81
27.47
79
15
518
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_a0cda7e291f7ea9a_b65c1051", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 30 ]
[ null ]
[ 11 ]
[ 69 ]
2024-11-18T22:42:12.077177+00:00
1,604,719,720,000
3353ded4773ef4496bb6af21d191b1f6c1b62ec1
2
{ "blob_id": "3353ded4773ef4496bb6af21d191b1f6c1b62ec1", "branch_name": "refs/heads/master", "committer_date": 1604719720000, "content_id": "90aecabac8f1ed8eb875c4fe00309d66d6a6c7c4", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "cb6482b61e94355b9a86aec3361d00da6986a57e", "extension": "p...
2.3125
stackv2
#!/usr/bin/env python3 import cmd import sqlite3 import sys import os import requests from time import sleep from terminaltables import AsciiTable from cme.msfrpc import Msfrpc, MsfAuthError import configparser from cme.loaders.protocol_loader import protocol_loader from requests import ConnectionError # The following...
296
34.05
123
22
2,210
python
[{"finding_id": "codeql_py/request-without-cert-validation_22dc8c45893eda57_32ad9c5c", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 105, 110 ]
[ null, null ]
[ 21, 25 ]
[ 110, 112 ]
2024-11-18T22:42:13.390664+00:00
1,633,870,292,000
1fb0d3b7b8f178d0642a159b9f1643c7b5ff1997
2
{ "blob_id": "1fb0d3b7b8f178d0642a159b9f1643c7b5ff1997", "branch_name": "refs/heads/main", "committer_date": 1633870292000, "content_id": "c3ba4d137ed931fa4373fd1519774e8a2767cc8d", "detected_licenses": [ "MIT" ], "directory_id": "8a819058f4ffca208f493033c23f2ff0b54f84b8", "extension": "py", "file...
2.375
stackv2
import sys import os from qtpy.QtWidgets import QDialog, QVBoxLayout, QHBoxLayout, QPushButton, QTextEdit, QFileDialog, QRadioButton, QApplication from qtpy.QtGui import QIcon from nodes_package import NodesPackage from .SelectPackages_Dialog import SelectPackages_Dialog def apply_stylesheet(style: str): from...
161
33.66
125
17
1,113
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_8e9b22395a4edbb6_de443884", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 29 ]
[ null ]
[ 22 ]
[ 40 ]
2024-11-18T22:42:13.570629+00:00
1,553,174,689,000
4b47093c942cc38c2eeaf0dd1008a3480ce47726
2
{ "blob_id": "4b47093c942cc38c2eeaf0dd1008a3480ce47726", "branch_name": "refs/heads/master", "committer_date": 1553174689000, "content_id": "b64036a343ffe8c1e4ef440a2cf3434983a31f4b", "detected_licenses": [ "MIT" ], "directory_id": "2f185e4f02f5c95371c2fe4322470de805fa1225", "extension": "py", "fi...
2.453125
stackv2
import pexpect from firebase import firebase firebase = firebase.FirebaseApplication('https://fizbee-4c002.firebaseio.com', None) res = open("mac.txt", 'w') child = pexpect.spawn("bluetoothctl") child.send("scan on\n") mac_addrs = [] try: while True: child.expect("Device (([0-9A-Fa-f]{2}:){5}([0-9A-Fa...
22
23.77
84
14
149
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_10e13bb135698c25_b1465f3f", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text." ]
[ 19 ]
[ null ]
[ 23 ]
[ 36 ]
2024-11-18T22:42:15.849343+00:00
1,575,556,022,000
99b8b5a2493421fce579fe701c3f610f247afa4c
3
{ "blob_id": "99b8b5a2493421fce579fe701c3f610f247afa4c", "branch_name": "refs/heads/master", "committer_date": 1575556022000, "content_id": "5eabc9bfc40b15d161fe4651e362ecc8368504c2", "detected_licenses": [ "Apache-2.0" ], "directory_id": "1ffac689f0fedd6de04519bbfd6f577a6996798a", "extension": "py"...
2.578125
stackv2
from tornado.web import RequestHandler import pymysql import os class HelloDBHandler(RequestHandler): def get(self): print("HELLO ALL") host = "" if os.environ["db_host"] is None else str(os.environ["db_host"]) user = "" if os.environ["db_username"] is None else str(os.environ["db_usernam...
76
34.95
94
19
556
python
[{"finding_id": "codeql_py/stack-trace-exposure_c038abb1775ee75c_7269e948", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
3
true
[ "CWE-209", "CWE-209", "CWE-079" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 36, 72, 69 ]
[ null, null, null ]
[ 24, 24, 24 ]
[ 31, 31, 42 ]
2024-11-18T20:53:36.082679+00:00
1,588,148,221,000
e3d671dd148bf35259661914073b6dcd7b709f9f
3
{ "blob_id": "e3d671dd148bf35259661914073b6dcd7b709f9f", "branch_name": "refs/heads/master", "committer_date": 1588148221000, "content_id": "9a89e619a6120f2ece89b5e4d94f0943e530612f", "detected_licenses": [ "Apache-2.0" ], "directory_id": "f4a578152a5309c56cddc4bb3feea90b05fbaaa7", "extension": "py"...
2.671875
stackv2
from http.server import HTTPServer, BaseHTTPRequestHandler #Main Class class Serv(BaseHTTPRequestHandler): def do_GET(self): if self.path=='/': self.path='/index.html' try: file_to_open = open(self.path[1:]).read() self.send_response(200) except: file_to_open = "<h1>404 error</h1>" self.send_res...
20
22.75
58
16
140
python
[{"finding_id": "codeql_py/path-injection_df7221f4ec726138_06b92ff3", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 10 ]
[ null ]
[ 24 ]
[ 37 ]
2024-11-18T21:10:35.005894+00:00
1,498,751,932,000
15aadb2a804a34bd59ae180235c215a36d877b18
2
{ "blob_id": "15aadb2a804a34bd59ae180235c215a36d877b18", "branch_name": "refs/heads/master", "committer_date": 1498751932000, "content_id": "6a957604cb28e5f15978f7fa8d42906eb84579e1", "detected_licenses": [ "Apache-2.0" ], "directory_id": "2247cc67416681f6ec75d36c272cf823c6a288dd", "extension": "py"...
2.375
stackv2
# ********************************************************************************************************************************* # # Name: api_example_python.py # # Desc: full api example ...
129
45.18
133
12
1,266
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0e5d08c0b0e25d3a_d617a23b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
5
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive dat...
[ 61, 63, 70, 71, 79 ]
[ null, null, null, null, null ]
[ 11, 7, 15, 15, 7 ]
[ 42, 47, 52, 52, 24 ]
2024-11-18T21:11:14.837950+00:00
1,688,668,412,000
848d2405adadf12999030d671d476f4e6cda0211
2
{ "blob_id": "848d2405adadf12999030d671d476f4e6cda0211", "branch_name": "refs/heads/master", "committer_date": 1688668412000, "content_id": "d949b2f5ca27426d4e85d4e0ecde864d9003ce11", "detected_licenses": [ "MIT" ], "directory_id": "090cb88268bf3ca43e8acd1061dbda8e878ba159", "extension": "py", "fi...
2.484375
stackv2
import base64 from datetime import date from os import path from jinja2 import BaseLoader, Environment from app.ds_config import TPL_PATH, IMG_PATH def render_transcript(student_name): """Get base64 transcript Parameters: student_name (str): student full name. Returns: base64 transcript. ...
28
30.57
72
14
216
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_2ff30a0194ecd606_05aef959", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 21 ]
[ null ]
[ 18 ]
[ 48 ]
2024-11-18T21:46:37.662933+00:00
1,478,367,052,000
cf2304c5bdbbd5933998c6a99efb33e71670dc46
3
{ "blob_id": "cf2304c5bdbbd5933998c6a99efb33e71670dc46", "branch_name": "refs/heads/master", "committer_date": 1478367052000, "content_id": "568e5ae8023a58af16bf01536e28763ccac3479f", "detected_licenses": [ "MIT" ], "directory_id": "0aa44daed8a65bb77a74482f81d89cb5f97ac2d1", "extension": "py", "fi...
2.828125
stackv2
""" FlashAssassin debug server ========================== This little Flask app provides a suitable implementation of the FlashAir API. It can be used to debug the FlashAssassin server. A demo picture has been added to DCIM directory already that can be used to test the app. """ import os from datetime import datet...
139
26.14
79
18
819
python
[{"finding_id": "codeql_py/flask-debug_783d2d6882d5ceb3_20a75efa", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
7
true
[ "CWE-215", "CWE-079", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022" ]
[ "py/flask-debug", "py/reflective-xss", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path d...
[ 139, 131, 33, 41, 70, 80, 86 ]
[ null, null, null, null, null, null, null ]
[ null, 35, 27, 22, 31, 29, 32 ]
[ 40, 51, 36, 30, 40, 38, 58 ]
2024-11-18T21:47:30.069609+00:00
1,627,654,284,000
dfeb9184cbf3ec28add8a9880eae781e452b66b4
3
{ "blob_id": "dfeb9184cbf3ec28add8a9880eae781e452b66b4", "branch_name": "refs/heads/master", "committer_date": 1627654284000, "content_id": "c5fddb6722976a40f867e5d105309ffe6895aca3", "detected_licenses": [ "MIT" ], "directory_id": "4da7514c9a84b447a5166d6eb4bf84c41662f056", "extension": "py", "fi...
2.578125
stackv2
"""This file contains the flask server.""" from moviebot.controller.controller_messenger import ControllerMessenger from moviebot.controller.controller_telegram import ControllerTelegram from flask import Flask, request from os import environ import yaml import telegram app = Flask(__name__) controller_messenger = Co...
124
29.9
83
17
836
python
[{"finding_id": "codeql_py/reflective-xss_5fba56462d3a6f15_07eaf322", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 78 ]
[ null ]
[ 16 ]
[ 43 ]
2024-11-18T21:47:35.365673+00:00
1,625,199,286,000
0247abb29b2f466265bf2a96e02cd4680740eee9
3
{ "blob_id": "0247abb29b2f466265bf2a96e02cd4680740eee9", "branch_name": "refs/heads/master", "committer_date": 1625199286000, "content_id": "047dec06a1d4fd624a8e5cb50c4f5914a02d6a8f", "detected_licenses": [ "MIT" ], "directory_id": "6bd1d66cc84bfb88f4a4d854822e946d99144820", "extension": "py", "fi...
2.515625
stackv2
from flask import Flask, render_template, Response, request, redirect, url_for from flask_login import (current_user, LoginManager, login_required, login_user, logout_user, UserMixin) from flask_sqlalchemy import SQLAlchemy from werkzeug.security import check_password_hash, generate_password_ha...
249
31.42
79
25
1,827
python
[{"finding_id": "codeql_py/reflective-xss_2f37881a1c362fd1_fd26e64a", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
3
true
[ "CWE-079", "CWE-079", "CWE-079" ]
[ "py/reflective-xss", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 138, 159, 164 ]
[ null, null, null ]
[ 16, 16, 12 ]
[ 56, 68, 53 ]
2024-11-18T21:47:38.193327+00:00
1,567,044,846,000
fcb4714f6fce779a3532c755d41f6b90f779da1f
2
{ "blob_id": "fcb4714f6fce779a3532c755d41f6b90f779da1f", "branch_name": "refs/heads/master", "committer_date": 1567044846000, "content_id": "3c04638d35877336928228266e58c078b2f8265e", "detected_licenses": [ "MIT" ], "directory_id": "2a7f59d07ec2fe52084a1077dc0e2e70db429aff", "extension": "py", "fi...
2.390625
stackv2
import json from rest_framework import status from rest_framework.authentication import TokenAuthentication from rest_framework.decorators import api_view, permission_classes, authentication_classes from rest_framework.permissions import IsAdminUser from rest_framework.response import Response from .serializers impor...
77
22.73
96
17
447
python
[{"finding_id": "codeql_py/path-injection_797a74267e3d24ef_e693cac9", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 28, 49 ]
[ null, null ]
[ 15, 15 ]
[ 19, 19 ]
2024-11-18T22:28:48.847207+00:00
1,463,658,056,000
0d99d641a6e29da7c201a27ff363f3e4207b4ec8
3
{ "blob_id": "0d99d641a6e29da7c201a27ff363f3e4207b4ec8", "branch_name": "refs/heads/master", "committer_date": 1463658056000, "content_id": "382f8155c31ac341b3342bf73f44f0595227548a", "detected_licenses": [ "MIT" ], "directory_id": "cf6d41046228b810b8b292a6af8424f604c5f052", "extension": "py", "fi...
2.90625
stackv2
#!/usr/bin/env python3 """ A fun little script to create a virtualenv without installing a damn thing. python venvbs.py <arguments to virtualenv> """ import contextlib import glob import io import json import logging import os import os.path import shutil import subprocess import sys import tarfile try: from url...
143
27.68
75
16
987
python
[{"finding_id": "codeql_py/tarslip_10574db7c5732971_bce14570", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 87 ]
[ null ]
[ 13 ]
[ 16 ]
2024-11-18T22:29:34.292410+00:00
1,541,912,924,000
baf6d23334fa1eac8ff142f938aafa6a60219314
3
{ "blob_id": "baf6d23334fa1eac8ff142f938aafa6a60219314", "branch_name": "refs/heads/master", "committer_date": 1541912924000, "content_id": "e5dcd360a83281819ebbd3422bd5fe54b279cd9e", "detected_licenses": [ "MIT" ], "directory_id": "ad006bec108f261c4a8309815a7a2615faff1b0e", "extension": "py", "fi...
3.0625
stackv2
#!/usr/bin/env python import os.path import urllib.parse import configparser import base64 import json import requests import argparse import sys def options(): parser = argparse.ArgumentParser(prog="gitlab-file-downloader.py", add_help=True, ...
113
28.66
79
16
749
python
[{"finding_id": "codeql_py/request-without-cert-validation_ddf2d766b775afad_ce915260", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 83, 99 ]
[ 85, 101 ]
[ 9, 9 ]
[ 35, 35 ]
2024-11-18T22:29:35.921103+00:00
1,581,618,086,000
9b114cbcfadd278519614791feb98f6686b96821
3
{ "blob_id": "9b114cbcfadd278519614791feb98f6686b96821", "branch_name": "refs/heads/master", "committer_date": 1581618086000, "content_id": "4ca3ad9dea2efcef46c0347caf8e4a2931438767", "detected_licenses": [ "Apache-2.0" ], "directory_id": "019cd8e16fd5d90c57c45a3ad445cd530ad104a5", "extension": "py"...
2.65625
stackv2
"""Default RG Gamification backend.""" from abc import ABCMeta, abstractmethod, abstractproperty import json import requests import urlparse from gamma_bridge import settings class BaseStorage(object): """ The base class for work with remote storage. """ __metaclass__ = ABCMeta @abstractmethod ...
105
23.61
79
15
509
python
[{"finding_id": "codeql_py/request-without-cert-validation_059a51f8817b71a4_ae64c755", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 72 ]
[ 77 ]
[ 34 ]
[ 14 ]
2024-11-18T22:41:21.576143+00:00
1,607,736,498,000
25638a0978427002e8ccd81204deb59e6e9e4be2
3
{ "blob_id": "25638a0978427002e8ccd81204deb59e6e9e4be2", "branch_name": "refs/heads/master", "committer_date": 1607736498000, "content_id": "56a3c078fd0429d825851df5c279d9073b9aa809", "detected_licenses": [ "MIT" ], "directory_id": "0b299b456067622bae1e1de72efb8ba797c93a37", "extension": "py", "fi...
2.71875
stackv2
import logging import flask from flask import current_app from flask_socketio import emit, join_room from application import GameManager, GAME_MANAGER_CONFIG_KEY from .. import socketio LOG = logging.getLogger("GameState") @socketio.on("join") def joined_event(message): """ Received when a player joins...
89
26.56
114
14
573
python
[{"finding_id": "codeql_py/log-injection_6c1abbfa2a5f40d4_672f906a", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
4
true
[ "CWE-117", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 27, 31, 42, 81 ]
[ null, null, null, null ]
[ 18, 21, 14, 21 ]
[ 60, 71, 59, 102 ]
2024-11-18T22:54:05.755919+00:00
1,681,840,460,000
82c4d6e76e4175dab99a2feacffbbe5a9be82813
3
{ "blob_id": "82c4d6e76e4175dab99a2feacffbbe5a9be82813", "branch_name": "refs/heads/master", "committer_date": 1681840460000, "content_id": "2541641ecea0ed30ff636a5f0fec67f025bc51f3", "detected_licenses": [ "MIT" ], "directory_id": "b1829737cb9a90c11b9f1af5aec412e2ebf74de8", "extension": "py", "fi...
2.734375
stackv2
from bs4 import BeautifulSoup import requests class requests_template(): def __init__(self): self.base_url = "" self.soup = BeautifulSoup(features="html.parser") def __get_url(self, url): raw_site = requests.get(url, verify=False).text self.soup = BeautifulSoup(raw_sit...
65
31.6
131
13
653
python
[{"finding_id": "codeql_py/request-without-cert-validation_13886285c6d3df6c_8675e4f1", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 11 ]
[ null ]
[ 20 ]
[ 51 ]
2024-11-18T22:54:17.457321+00:00
1,574,413,577,000
dc563cbd5dc56704ef4b196705dc9d58f28a4f08
3
{ "blob_id": "dc563cbd5dc56704ef4b196705dc9d58f28a4f08", "branch_name": "refs/heads/master", "committer_date": 1574413577000, "content_id": "22c3b44508593eab27b8bb61a1adc5a2912f40b8", "detected_licenses": [ "MIT" ], "directory_id": "593b18ae3fd2b8a480a0520fb69a062c01782881", "extension": "py", "fi...
3.109375
stackv2
""" Simple Flask app for easy work with TelePort API """ from flask import Flask from flask import render_template from flask import request import urllib3 import json import datetime import re app = Flask(__name__) API_URL = 'https://api.tport.online/v2/public-stations/' def get_data(): """ Try to receive...
90
24.31
88
16
548
python
[{"finding_id": "codeql_py/regex-injection_72b6eb6a8d52a7e4_87c2cd3f", "tool_name": "codeql", "rule_id": "py/regex-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This regular expression depends on a [user-provided value](1) and is executed by [re.match](2).", "remedi...
1
true
[ "CWE-730" ]
[ "py/regex-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression depends on a [user-provided value](1) and is executed by [re.match](2)." ]
[ 51 ]
[ null ]
[ 21 ]
[ 30 ]
2024-11-18T21:07:33.526053+00:00
1,607,286,367,000
13fffea45877ef588b0c22816006e75e622c825b
2
{ "blob_id": "13fffea45877ef588b0c22816006e75e622c825b", "branch_name": "refs/heads/master", "committer_date": 1607286367000, "content_id": "fb59acfeb7a2d3feec3f8f1c7e9c708667911644", "detected_licenses": [ "MIT" ], "directory_id": "67d704301a2d4368866dfea69ecf28184f61734d", "extension": "py", "fi...
2.359375
stackv2
import logging from rest_framework.exceptions import ValidationError from rest_framework.generics import get_object_or_404 from rest_framework.response import Response from rest_framework.views import APIView logger = logging.getLogger(__name__) """ conceptually very similar to https://www.django-rest-framework.org/...
103
33.78
123
17
699
python
[{"finding_id": "codeql_py/log-injection_46a92fe637127271_37760a50", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 100 ]
[ null ]
[ 21 ]
[ 26 ]
2024-11-18T21:07:38.848349+00:00
1,578,005,415,000
bb834e746307088a52dabcd32db4925861e2884b
3
{ "blob_id": "bb834e746307088a52dabcd32db4925861e2884b", "branch_name": "refs/heads/master", "committer_date": 1578005415000, "content_id": "638ceb9bb466329f4c17463e6a2c7fcd395d2049", "detected_licenses": [ "MIT" ], "directory_id": "fdfc37d52fa30acd81c4acc37a41f98be39be45d", "extension": "py", "fi...
2.90625
stackv2
"""Form API Calls""" import os import datetime import json import pandas as pd import requests class ApiCall: call_skele = { "real_time_stock": "https://api.worldtradingdata.com/api/v1/stock?{options}" # tckr should be something like 'ATVI,SNAP' , "real_time_mf": "https://api.worldtradingdata.com/...
192
33.39
136
16
1,580
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_4790468be37b0044_712aebaf", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 65 ]
[ null ]
[ 25 ]
[ 32 ]
2024-11-18T21:33:29.379943+00:00
1,444,889,119,000
f7f8162becb9ef2c88068bd18bcb7aaf7e30bc9b
2
{ "blob_id": "f7f8162becb9ef2c88068bd18bcb7aaf7e30bc9b", "branch_name": "refs/heads/master", "committer_date": 1444889119000, "content_id": "41aa5bfaf23be25b36a6a390b79190dabe0aa46e", "detected_licenses": [ "MIT" ], "directory_id": "50a235bf7b2232a48fe6b497d8adb3729f8c0c01", "extension": "py", "fi...
2.375
stackv2
# -*- coding: utf-8 -*- import os import sys from ConfigParser import ConfigParser from datetime import datetime import requests import rumps import simplejson NIGHTSCOUT_URL = '/api/v1/entries.json?count=100' UPDATE_FREQUENCY_SECONDS = 20 MAX_SECONDS_TO_SHOW_DELTA = 600 HISTORY_LENGTH = 5 MAX_BAD_REQUEST_ATTEMPTS = ...
175
31.54
115
18
1,433
python
[{"finding_id": "codeql_py/request-without-cert-validation_bbb9aa5a96e3dc19_736736f6", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 83 ]
[ null ]
[ 16 ]
[ 78 ]
2024-11-18T21:55:40.038063+00:00
1,512,018,359,000
f57e2403d95f12dfecb01e4ab9ad7d1dfe32e72e
3
{ "blob_id": "f57e2403d95f12dfecb01e4ab9ad7d1dfe32e72e", "branch_name": "refs/heads/master", "committer_date": 1512018359000, "content_id": "ec58adb16847a069c1c065645f9b085616c50a91", "detected_licenses": [ "MIT" ], "directory_id": "8ad32c20b0b75ba4b6e0040019fd607f63779491", "extension": "py", "fi...
2.78125
stackv2
from __future__ import print_function import hashlib import signal import pickle import sys class hasher(): def __init__(self, doorID): self.doorID = doorID def hash(self, num): m = hashlib.md5() m.update(self.doorID + str(num)) return m.hexdigest() class Spinner(): char...
73
23.18
82
15
476
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1ffb921481d12944_7e560784", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (p...
[ 28, 72 ]
[ null, null ]
[ 11, 8 ]
[ 74, 25 ]
2024-11-18T21:55:57.370715+00:00
1,690,388,978,000
15d4ad5c4c0186b02c57461750ae2b610014457d
2
{ "blob_id": "15d4ad5c4c0186b02c57461750ae2b610014457d", "branch_name": "refs/heads/master", "committer_date": 1690388978000, "content_id": "790b038deca2b72154b1317ed77167b94ea5b07b", "detected_licenses": [ "MIT" ], "directory_id": "92a73eb632541a44c16f47731af44b65e777468e", "extension": "py", "fi...
2.375
stackv2
from flask import render_template,redirect,url_for,request,flash from . import auth from ..models import Group from .forms import RegistrationForm,LoginForm from .. import db from flask_login import login_user,logout_user,login_required @auth.route('/login', methods=["GET", "POST"]) def login(): login_form = Logi...
55
23.96
91
17
289
python
[{"finding_id": "codeql_py/url-redirection_c052772bd71fe931_9be7e096", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 21 ]
[ null ]
[ 29 ]
[ 91 ]
2024-11-18T21:55:58.103062+00:00
1,619,799,663,000
e34ddb42fbac81246fb8cf2eb55157e121e304b8
3
{ "blob_id": "e34ddb42fbac81246fb8cf2eb55157e121e304b8", "branch_name": "refs/heads/master", "committer_date": 1619799663000, "content_id": "dbdea514533c63a1e22579bcc04932bed5bf996e", "detected_licenses": [ "Apache-2.0" ], "directory_id": "6491584bfdca9ae85ac8ad06232c597eb735e2ea", "extension": "py"...
2.625
stackv2
import logging import os import pickle from threading import Thread, Event from typing import List, Dict import GPUtil import pandas as pd import psutil from dataclasses import dataclass, field from dataclasses_json import dataclass_json from flask import Flask METRICS_FOLDER = os.path.abspath(os.path.dirname(__file_...
164
22.9
108
15
982
python
[{"finding_id": "codeql_py/flask-debug_c5a643a289d85c5a_6765766d", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-117" ]
[ "py/flask-debug", "py/log-injection" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This log entry depends on a [user-provided value](1)." ]
[ 164, 128 ]
[ null, null ]
[ 5, 18 ]
[ 24, 52 ]
2024-11-18T21:55:59.814238+00:00
1,572,610,861,000
5e817d4b5151181084d0a89ff6d0e1c839e06b8f
2
{ "blob_id": "5e817d4b5151181084d0a89ff6d0e1c839e06b8f", "branch_name": "refs/heads/master", "committer_date": 1572610861000, "content_id": "2f26eab3cfd0cee5112755c29fb935ea6ef2cb67", "detected_licenses": [ "MIT" ], "directory_id": "0c0c3e2010978978207e092ee116a4060ef86f3e", "extension": "py", "fi...
2.3125
stackv2
from flask import * import pdfsplitter app=Flask(__name__) @app.route("/") def upload(): return render_template("file_upload.html") @app.route("/success",methods=["POST"]) def success(): global st global en global file st=int(request.form['start']) en=int(request.form['end']) f=request.f...
37
19.27
68
12
177
python
[{"finding_id": "codeql_py/flask-debug_8bc4cda390535986_b9eff1c0", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-022", "CWE-022" ]
[ "py/flask-debug", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2).\nThis path depends on a [user-provided value](3).", "This path depends on a [user-provided va...
[ 37, 20, 33 ]
[ null, null, null ]
[ 5, 12, 22 ]
[ 24, 16, 30 ]
2024-11-18T21:56:00.528418+00:00
1,586,964,035,000
b4a0290f75f3ba3bc5fed497cce7d92243e4cd8a
3
{ "blob_id": "b4a0290f75f3ba3bc5fed497cce7d92243e4cd8a", "branch_name": "refs/heads/master", "committer_date": 1586964035000, "content_id": "b5067d21e4755059894f5c577d3942cfc2913dac", "detected_licenses": [ "MIT" ], "directory_id": "14ca7f784492ac76c45892190c00e794aa25cee5", "extension": "py", "fi...
2.765625
stackv2
from requests.utils import requote_uri from base64 import b64decode from hashlib import md5 from Crypto.Cipher import AES class TwistSourceDecryptor: BLOCK_SIZE = 16 SECRET_KEY = b'LXgIVP&PorO68Rq7dTx8N^lP!Fa5sGJ^*XK' def __init__(self, enc_src): self.enc_src = enc_src.encode('utf-8') def __...
55
33.16
122
17
608
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_86c238894f78e06d_d1a51dfe", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure.", "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 25, 28 ]
[ null, null ]
[ 19, 23 ]
[ 23, 33 ]
2024-11-18T21:56:00.633723+00:00
1,390,387,565,000
22fcbd91b524ad8ab853e05899a188532a2790ba
2
{ "blob_id": "22fcbd91b524ad8ab853e05899a188532a2790ba", "branch_name": "refs/heads/master", "committer_date": 1390387565000, "content_id": "63f1f48772cc4c16fb37599b678cb5c2f9e83e67", "detected_licenses": [ "CC0-1.0" ], "directory_id": "98d245a3572a2aa380d4683c65305caffde53906", "extension": "py", ...
2.34375
stackv2
import os import json import jinja2 import logging import subprocess def which(program): for path in os.environ["PATH"].split(os.pathsep): path = path.strip('"') exe = os.path.join(path, program) if os.path.isfile(exe) and os.access(exe, os.X_OK): return exe return None d...
56
23.82
77
11
342
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_f375c70a9cc9d2d2_0b82bc27", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 56 ]
[ null ]
[ 9 ]
[ 78 ]
2024-11-18T21:56:07.463586+00:00
1,609,266,700,000
427af9580f29a02b5fc279330eb7be2ac5aaaa56
2
{ "blob_id": "427af9580f29a02b5fc279330eb7be2ac5aaaa56", "branch_name": "refs/heads/master", "committer_date": 1609266700000, "content_id": "84bad5471dfd67b88cc016a54500d8c021cd0ebd", "detected_licenses": [ "MIT" ], "directory_id": "4c0e8eca699f2c9cf4916f4b85f7069058f8eaa5", "extension": "py", "fi...
2.34375
stackv2
#!/usr/bin/env python ''' Python script to get json data from Hive python get_hive_json.py [-h] username password ''' import requests import json import sys import argparse from pprint import pprint parser = argparse.ArgumentParser(description='Get Hive JSON data.') parser.add_argument('username', help='Hive Username'...
43
39.02
158
10
463
python
[{"finding_id": "codeql_py/request-without-cert-validation_01adb421efead4af_1efe2ec1", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
3
true
[ "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 23, 32, 42 ]
[ null, null, null ]
[ 5, 5, 5 ]
[ 80, 53, 56 ]
2024-11-18T22:39:33.910783+00:00
1,689,758,547,000
0c2b792452ce475e3f4bb6af956c6945a00882f8
3
{ "blob_id": "0c2b792452ce475e3f4bb6af956c6945a00882f8", "branch_name": "refs/heads/master", "committer_date": 1689758547000, "content_id": "82c031e91c2389fd9538c56804186765d77483a4", "detected_licenses": [ "MIT", "0BSD", "Apache-2.0" ], "directory_id": "9558cfd15b5d548cc9a82ca4a046fc90d0d5948...
2.578125
stackv2
from flask import Flask, jsonify, request, make_response #from flask import response # default values of parameters breath_rate = 12 tidal_volume = 500 i_ratio = 1 e_ratio = 2 pause_value = 0 o2_fraction = 21 patient_state = 1 volume = 0.0023 sO2 = 0.95 count = 0 #volume = 2500 #sO2 = 0.95 # default value of some...
132
30.24
138
11
1,078
python
[{"finding_id": "codeql_py/reflective-xss_12e8fc3c399db1df_218c4753", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
3
true
[ "CWE-079", "CWE-079", "CWE-079" ]
[ "py/reflective-xss", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vu...
[ 64, 70, 122 ]
[ null, null, null ]
[ 12, 12, 12 ]
[ 22, 22, 22 ]
2024-11-18T22:54:57.744619+00:00
1,547,540,673,000
b9a2b255f8d2fcd76d445b19adbb8ae2ba6b2fc8
2
{ "blob_id": "b9a2b255f8d2fcd76d445b19adbb8ae2ba6b2fc8", "branch_name": "refs/heads/master", "committer_date": 1547540673000, "content_id": "74fae42fb497cf1db3af3a1f37847a8b31ccba49", "detected_licenses": [ "MIT" ], "directory_id": "41a500e0d1035838e7b6d1f5b1cdaf649b97528e", "extension": "py", "fi...
2.34375
stackv2
# A Wavenet For Speech Denoising - Dario Rethage - 19.05.2017 # Main.py import sys import logging import optparse import json import os import models import datasets import util import denoise import numpy as np def set_system_settings(): sys.setrecursionlimit(50000) logging.getLogger().setLevel(logging.INFO)...
259
41.63
125
17
2,598
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0aa81df7f3180c10_b4662665", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 167, 170, 178 ]
[ null, null, null ]
[ 23, 23, 11 ]
[ 102, 102, 22 ]
2024-11-18T22:54:58.562491+00:00
1,453,103,076,000
5f1174b1480e0264381183b0c13ccec4b9d7b3ca
2
{ "blob_id": "5f1174b1480e0264381183b0c13ccec4b9d7b3ca", "branch_name": "refs/heads/master", "committer_date": 1453103076000, "content_id": "02370958010a62a1ed655d4ad34337740e416428", "detected_licenses": [ "MIT" ], "directory_id": "0362118bfd8f039dcdcf9171c07d31a4f3fa34d1", "extension": "py", "fi...
2.34375
stackv2
import click import os from jinja2 import Environment, PackageLoader from os import path env = Environment(loader=PackageLoader(__name__, 'templates')) package_root = path.join(path.dirname(__file__), '..', '..', 'src', 'main', 'java', 'com.github.parksungmin.collectionUtils') def render_te...
30
22.4
75
12
154
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_96aba4b9d4cf1fab_bf48f60c", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 7 ]
[ null ]
[ 7 ]
[ 63 ]
2024-11-18T23:06:15.853034+00:00
1,671,574,166,000
b535238c8f8df8e0adac9eacd2488682e960a28b
3
{ "blob_id": "b535238c8f8df8e0adac9eacd2488682e960a28b", "branch_name": "refs/heads/main", "committer_date": 1671574166000, "content_id": "03014262ee6f2ca2dbcb499a580c67aaea0cf09b", "detected_licenses": [ "ISC" ], "directory_id": "7113b9475f09687620afa54b6f8d7a591e6f9765", "extension": "py", "file...
3.390625
stackv2
#!/usr/bin/env python from argparse import ArgumentParser import random import string def get_words(): dictionary_file = "/usr/share/dict/words" words = [] try: with open(dictionary_file) as file: for line in file: words.append(line.rstrip()) except FileNotFoundEr...
77
24.95
79
17
427
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_aba4fefb0a152f15_5e8a54b5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text." ]
[ 67 ]
[ null ]
[ 15 ]
[ 33 ]
2024-11-18T23:06:16.336543+00:00
1,576,402,449,000
757665781aadce37966c4d3d36a9aff77086d7a7
4
{ "blob_id": "757665781aadce37966c4d3d36a9aff77086d7a7", "branch_name": "refs/heads/master", "committer_date": 1576402449000, "content_id": "7a49a553a169734e7b5c10c51b4fc87c46ec0812", "detected_licenses": [ "MIT" ], "directory_id": "e8206dd193b9232e5bd3fda484bb0f1083c76d6b", "extension": "py", "fi...
3.609375
stackv2
# https://adventofcode.com/2019/day/4 puzzle_input = "137683-596253" max_digits = 6 def two_adjacent_are_the_same(previous, current): return previous == current def only_increase_or_stay_the_same(first_digit, digits): previous = first_digit for d in digits: if previous > int(d): retu...
75
25.07
83
16
551
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_07297771c0b0d955_eafc9a49", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 63 ]
[ null ]
[ 19 ]
[ 66 ]
2024-11-18T22:43:25.278427+00:00
1,305,905,967,000
3460a50768c18b10017a4136e8797ca9e83dfa40
2
{ "blob_id": "3460a50768c18b10017a4136e8797ca9e83dfa40", "branch_name": "refs/heads/master", "committer_date": 1305905967000, "content_id": "6247f1f2c67f5c1ce2744d3b9922def4c125e913", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "0f40e3d23dfdc5eaa277c222b0230730a94d1c59", "extension": "p...
2.46875
stackv2
import re import unicodedata from erm.settings import * import datetime import os import sys import time import pickle import stat import md5 import urllib from django.utils.encoding import smart_str, smart_unicode, force_unicode def microtime_slug(time_value=None): if time_value is None: time_val...
211
33.88
122
20
1,842
python
[{"finding_id": "codeql_py/overly-permissive-file_a4ba025436a414c9_ab9ac73b", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
2
true
[ "CWE-732", "CWE-732" ]
[ "py/overly-permissive-file", "py/overly-permissive-file" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable.", "Overly permissive mask in chmod sets file to world readable." ]
[ 99, 107 ]
[ null, null ]
[ 17, 9 ]
[ 41, 39 ]
2024-11-18T22:43:27.817352+00:00
1,556,850,976,000
e1d2e71f794a2668e342881bb77b0fae1fd2ffea
2
{ "blob_id": "e1d2e71f794a2668e342881bb77b0fae1fd2ffea", "branch_name": "refs/heads/master", "committer_date": 1556850976000, "content_id": "e89848f18b9d629226d14fe3bf14d40eacc1e9fd", "detected_licenses": [ "Apache-2.0" ], "directory_id": "4903f7aa3c79417650aeabb3e31067f7952d84fa", "extension": "py"...
2.40625
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- import logging import tornado.web import tornado.websocket from tornado.ioloop import IOLoop, PeriodicCallback import Queue import sys import threading import time import json import argparse #from types import * global args global q q_channels = {} wsMapingChannel = ...
175
28.26
136
19
1,114
python
[{"finding_id": "codeql_py/log-injection_f94716f03512272b_41e969ef", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2)...
3
true
[ "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2).\nThis log entry depends on a [user-provided value](3).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 62, 126, 141 ]
[ null, null, null ]
[ 23, 27, 29 ]
[ 82, 60, 93 ]
2024-11-18T22:43:28.789446+00:00
1,632,670,165,000
6e929067cb7cc68f10cca53bf8112e838579cc42
2
{ "blob_id": "6e929067cb7cc68f10cca53bf8112e838579cc42", "branch_name": "refs/heads/master", "committer_date": 1632670165000, "content_id": "028bef823da429802ffa0c7fea70b7a9b3cfaaba", "detected_licenses": [ "Apache-2.0" ], "directory_id": "bc3ad3504c206f0696536e0180f5a9b41347c015", "extension": "py"...
2.453125
stackv2
import hashlib import os from typing import Any, Dict, List from fastapi import Depends, FastAPI, File, HTTPException, UploadFile, status from fastapi.responses import FileResponse from fastapi.security import HTTPBasic, HTTPBasicCredentials from .controller import Controller, ControllerException MAX_UPLOAD_SIZE = 1...
77
29.75
88
15
527
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_7d794dc05c9abc3d_f4755784", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 22 ]
[ null ]
[ 34 ]
[ 63 ]
2024-11-18T22:43:31.950628+00:00
1,680,724,061,000
998506066ddde9edf3bdfd83a48fd2d186a693d3
2
{ "blob_id": "998506066ddde9edf3bdfd83a48fd2d186a693d3", "branch_name": "refs/heads/master", "committer_date": 1680724061000, "content_id": "b4ca317342e21fc43bb117c4f1e754e86e3059a4", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "11ff96811e520ec92e18f591656c183a715edf25", "extension": "p...
2.375
stackv2
#!/usr/bin/env python import os import argparse import json from pathlib import Path from jinja2 import Template import pyyaks.logger def get_opt(): parser = argparse.ArgumentParser(description='Make aimpoint monitor web page') parser.add_argument("--data-root", default=".", ...
49
25.04
82
12
286
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_15b977f1983e0c5b_4bfa40f9", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 39 ]
[ null ]
[ 16 ]
[ 58 ]
2024-11-18T22:44:13.335968+00:00
1,630,987,573,000
de137df8cff04a35dc62d4646936714edc38a873
3
{ "blob_id": "de137df8cff04a35dc62d4646936714edc38a873", "branch_name": "refs/heads/master", "committer_date": 1630987573000, "content_id": "44e425b0f3adce6f7fc7677365cd82ff5ceb3943", "detected_licenses": [ "MIT" ], "directory_id": "d318e7e804772296a5960d3f3c94f644c5e4a8d8", "extension": "py", "fi...
2.828125
stackv2
import flask, requests # user variables faucetuser = "username" faucetpasswd = "password" claimamount = int(10) enable_faucet = False api_port = 5000 #only a program variable users = [faucetuser] def login(username, password): #gets server ip import requests, socket server = requests.get("https://raw...
180
28.37
133
23
1,307
python
[{"finding_id": "codeql_py/reflective-xss_790b9208016f00f3_f23c2412", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 123 ]
[ null ]
[ 28 ]
[ 36 ]
2024-11-18T23:10:38.389561+00:00
1,367,965,029,000
9d5b211c0babd4323ab8913014151ffc6e3c68c4
3
{ "blob_id": "9d5b211c0babd4323ab8913014151ffc6e3c68c4", "branch_name": "refs/heads/master", "committer_date": 1367965029000, "content_id": "804526795eedb8360dc557190fb95e09d68c7ca4", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "930ac658e8a331fe92f4681914f61de33e3e008f", "extension": "p...
2.921875
stackv2
#!/usr/bin/env python import jinja2 import types import os import csv import StringIO import shutil _ROOT = os.path.abspath(os.path.dirname(__file__)) _TEMPLATE_PATH = os.path.join(_ROOT, 'templates') _template_env = jinja2.Environment( loader=jinja2.FileSystemLoader(_TEMPLATE_PATH)) _DEFAULT_ASSET_DEST_DIR = ...
345
30.93
84
15
2,540
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_b15d85c3606ada73_9bdce39d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 13 ]
[ 14 ]
[ 17 ]
[ 52 ]
2024-11-18T23:25:05.144876+00:00
1,572,455,028,000
b6ae3e4a6c6972e05a842def8e9d594103abd727
3
{ "blob_id": "b6ae3e4a6c6972e05a842def8e9d594103abd727", "branch_name": "refs/heads/master", "committer_date": 1572455028000, "content_id": "d754c7e9ec300fce06a524dec4da968c76e45172", "detected_licenses": [ "MIT" ], "directory_id": "276bafbb2f9de6af3bc7a6486e165221361432b9", "extension": "py", "fi...
2.640625
stackv2
import os import sys import json import statistics from datetime import datetime import logging from flask import Flask, make_response, request from flask_restplus import Resource, Api from flask_weather.helper import google_maps from flask_weather.weather import get_available_weather_services from .exceptions impo...
207
33.98
99
19
1,428
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3f9695c205bb183e_8b7d20ff", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.\nThis expression logs [sensitive data (private)](4) as clear text." ]
[ 197 ]
[ null ]
[ 26 ]
[ 34 ]
2024-11-18T22:29:45.877498+00:00
1,557,603,218,000
0dcb5f67dd52645262ac5f7c850b84fc247a065f
3
{ "blob_id": "0dcb5f67dd52645262ac5f7c850b84fc247a065f", "branch_name": "refs/heads/master", "committer_date": 1557603218000, "content_id": "02e7c0827d665e603b14994d5d154004cbd1bf0f", "detected_licenses": [ "MIT" ], "directory_id": "62d766d65a319179c65ab488ea01b487d8ad566e", "extension": "py", "fi...
2.75
stackv2
__version__ = "0.1.10" import argparse, json, os.path, sys import jinja2, requests def main(): parser = argparse.ArgumentParser() parser.add_argument( "-i", "--input", default="swagger.json", help="path to or URL of the Swagger JSON file (default: swagger.json)", metavar="SW...
92
27.34
79
18
561
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_088a7fd5910fe2c9_a3a90ebd", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 79 ]
[ null ]
[ 11 ]
[ 59 ]
2024-11-18T22:29:55.310907+00:00
1,626,365,841,000
0e18726db91b0e2e5eaeca49c495a260091c7d14
3
{ "blob_id": "0e18726db91b0e2e5eaeca49c495a260091c7d14", "branch_name": "refs/heads/master", "committer_date": 1626365841000, "content_id": "3d031a264101f8510ba544b95d4120e966454196", "detected_licenses": [ "MIT" ], "directory_id": "6ab0d2249bbc4690c16b79f8d1ae38ae36a57611", "extension": "py", "fi...
2.9375
stackv2
import socket import hashlib import base64 from Crypto.Cipher import AES from Crypto import Random # vector is global, we start with None IV = None def generate_vector(): global IV if IV is None: # we save it as bytes IV = Random.new().read(AES.block_size) # initialization vector, we n...
38
19.55
106
13
196
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_30bf693a4e30fd40_ac1c30f9", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e...
[ 26 ]
[ null ]
[ 35 ]
[ 48 ]
2024-11-18T23:10:11.016817+00:00
1,621,599,572,000
7315989ec7608333ab93542138a71094c7541df1
4
{ "blob_id": "7315989ec7608333ab93542138a71094c7541df1", "branch_name": "refs/heads/main", "committer_date": 1621599572000, "content_id": "29c4f580e471985ce7576cc09fc7f5118ab9e5ad", "detected_licenses": [ "MIT" ], "directory_id": "751f92fecd33dd35dcc6640afe5c5d71191a7a1b", "extension": "py", "file...
3.875
stackv2
# Design & develop a web application to maintain records of students. # The single the record shall contain the following information: # | Name | Roll number | Age | Gender | import os from enum import Enum os.system("") class Style: BLACK = '\033[30m' RED = '\033[31m' GREEN = '\033[32m' YELLOW = '\...
201
30.7
105
16
1,525
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d09bf9fdd98bf3a1_b4257c56", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
4
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.", "This expression logs [sensitive data (p...
[ 82, 82, 116, 136 ]
[ null, null, null, null ]
[ 15, 34, 19, 40 ]
[ 32, 47, 69, 54 ]
2024-11-18T23:21:49.338469+00:00
1,388,137,916,000
9841bb5a6e89f54bd43553a9164aa3f650f8bd1b
3
{ "blob_id": "9841bb5a6e89f54bd43553a9164aa3f650f8bd1b", "branch_name": "refs/heads/master", "committer_date": 1388137916000, "content_id": "a46251eb65d2a9c313b9e501af3131b2ae892348", "detected_licenses": [ "MIT" ], "directory_id": "61d911ddcde6aa879cd9a77e7c8b86f3f324e8cc", "extension": "py", "fi...
2.65625
stackv2
import paramiko from common import debug class SshClient: def __init__(self, hostname, username, directory, password=None, sshkey=None): self.hostname = hostname self.username = username self.password = password self.sshkey = sshkey self.directory = directory ...
41
34.73
134
16
327
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_4aac1e678e1f2823_0eed538e", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 22 ]
[ null ]
[ 13 ]
[ 75 ]
2024-11-18T21:33:34.707765+00:00
1,443,808,557,000
9903fd3d6aa6394df970296e716cf4a46453ed78
3
{ "blob_id": "9903fd3d6aa6394df970296e716cf4a46453ed78", "branch_name": "refs/heads/master", "committer_date": 1443808557000, "content_id": "df21f71104fea8a3ad2b81dedcec0b155b564839", "detected_licenses": [ "MIT" ], "directory_id": "9701d6e4cb43c3a07fe0186b6d57b1281d75a926", "extension": "py", "fi...
2.640625
stackv2
import os import smtplib from time import sleep from jinja2 import Environment, PackageLoader from email.mime.multipart import MIMEMultipart from email.mime.text import MIMEText from urllib.parse import urlparse class Mailer(object): def __init__(self, url): scheme, netloc, path, params, query, fragment =...
104
31.33
135
17
707
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_a762e5ad7e08bf82_40fb4eac", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 51 ]
[ null ]
[ 20 ]
[ 85 ]
2024-11-18T22:30:16.750693+00:00
1,374,482,273,000
f1e047089bb8e349acfa59a63ec4be44482fbf29
3
{ "blob_id": "f1e047089bb8e349acfa59a63ec4be44482fbf29", "branch_name": "refs/heads/master", "committer_date": 1374482273000, "content_id": "60c238b1c027be80c58b3d2822e08abb0a090f13", "detected_licenses": [ "MIT" ], "directory_id": "82b34241cd1e2d7c6f9ef7660ed7351f615f8d18", "extension": "py", "fi...
2.515625
stackv2
from multiprocessing import Process from functools import wraps from flask import g, redirect, request from aurora_app.helpers import notify def public(location): """Makes location public""" location.is_public = True return location def must_be_able_to(action): """Checks if user can do action, if ...
42
28.21
78
16
242
python
[{"finding_id": "codeql_py/url-redirection_7e68d4521a3938f9_b5b2a2ce", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 23 ]
[ null ]
[ 33 ]
[ 49 ]
2024-11-18T23:36:49.980862+00:00
1,689,912,169,000
78ab42b8dc9757770b1a2ba9bc7cb24e1c1bfc8b
3
{ "blob_id": "78ab42b8dc9757770b1a2ba9bc7cb24e1c1bfc8b", "branch_name": "refs/heads/main", "committer_date": 1689912169000, "content_id": "f9e0e4f1f53a0a5875c325063e70032ad698d820", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "0ed62eec4eea9931f08f383cf657f3ca1a3ef4f9", "extension": "py"...
2.671875
stackv2
# BioPortal utilities import requests from requests.packages.urllib3.exceptions import InsecureRequestWarning import json import urllib.parse import os from fnmatch import fnmatch requests.packages.urllib3.disable_warnings(InsecureRequestWarning) BIOPORTAL_API_BASE = "https://data.bioontology.org" def annotate(api...
59
25.2
98
13
355
python
[{"finding_id": "codeql_py/request-without-cert-validation_337fcdb0e0b367ba_517031b6", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 46 ]
[ null ]
[ 20 ]
[ 83 ]
2024-11-18T23:36:55.858378+00:00
1,586,696,969,000
1dfe50f8c9ba0f0cb97bfec899145751a0391f99
2
{ "blob_id": "1dfe50f8c9ba0f0cb97bfec899145751a0391f99", "branch_name": "refs/heads/master", "committer_date": 1586696969000, "content_id": "998a226915849b83a3cf4a35a10cdaa8aae42fe6", "detected_licenses": [ "Apache-2.0" ], "directory_id": "8cced97a617f980cca7b5e1342ac15e2ffbf8d33", "extension": "py"...
2.375
stackv2
from ..CommonInterface import CommonInterfaceNsd from .helpers import Helpers import json import requests class Nsd(CommonInterfaceNsd): """ NSD Management Interfaces """ def __init__(self, host, port=9999): self._host = host self._port = port self._base_path = 'https://{0}:{1}...
318
37.26
102
16
2,805
python
[{"finding_id": "codeql_py/request-without-cert-validation_1abc20208b947edc_1a90fdbc", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
6
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 60, 110, 157, 195, 229, 265 ]
[ null, null, null, null, null, 266 ]
[ 17, 17, 17, 17, 17, 17 ]
[ 97, 103, 97, 87, 97, 49 ]
2024-11-18T23:36:57.911847+00:00
1,524,234,607,000
914f83ddfa0697671e41011e372c5ff8c9d428be
3
{ "blob_id": "914f83ddfa0697671e41011e372c5ff8c9d428be", "branch_name": "refs/heads/master", "committer_date": 1524234607000, "content_id": "329a6c4038cb9b5af48d3ecb90a066cf00eb7a08", "detected_licenses": [ "MIT" ], "directory_id": "1c298fab3634b79e294936b478c66fed06f5218e", "extension": "py", "fi...
3.484375
stackv2
import random import os def jogar (): os.system('clear') display_abertura() palavras = abri_arquivo() numero = random.randrange(0,len(palavras)) palavra_secreta = palavras[numero].lower() lista_da_palavra = ["_" for letra in palavra_secreta] tentativas = 7 enforcou = False acer...
172
24.43
63
15
1,122
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_52781b06036b5c84_0a94ac1c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text." ]
[ 128 ]
[ null ]
[ 11 ]
[ 63 ]
2024-11-18T21:14:45.542896+00:00
1,522,118,871,000
81b05c13f2fd05b30d2931e99d5dd50c9c42ec1a
2
{ "blob_id": "81b05c13f2fd05b30d2931e99d5dd50c9c42ec1a", "branch_name": "refs/heads/master", "committer_date": 1522118871000, "content_id": "601f5bc869ee3f93ccf9269c0f546a1aa4f8d49a", "detected_licenses": [ "MIT" ], "directory_id": "60e7738d90ea7151a790a73285382b0c77799262", "extension": "py", "fi...
2.453125
stackv2
import sys, os import subprocess import urllib, optparse from flask import Flask, jsonify, request, abort, make_response #from werkzeug.utils import secure_filename ###GLOBAL VARIABLES############################### app = Flask(__name__) ################################################## @app.route('/', methods=['GET...
87
32.69
167
16
708
python
[{"finding_id": "codeql_py/command-line-injection_9e058ac3d90b2d6f_27545dcb", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {...
1
true
[ "CWE-078" ]
[ "py/command-line-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This command line depends on a [user-provided value](1)." ]
[ 27 ]
[ null ]
[ 19 ]
[ 167 ]
2024-11-18T21:57:26.328333+00:00
1,633,971,801,000
370ca635bac9f5327ba3541c5a580c6a8c84427a
3
{ "blob_id": "370ca635bac9f5327ba3541c5a580c6a8c84427a", "branch_name": "refs/heads/main", "committer_date": 1633971801000, "content_id": "cb63951bffdfab4e1337054e4d38ef31d1a7f0d9", "detected_licenses": [ "MIT" ], "directory_id": "a92f4b5a90e97e0fa3b8bc46dfabbd3cf7e0df68", "extension": "py", "file...
2.796875
stackv2
#!/usr/bin/env python3 import subprocess import logging import time import sys import os logging.basicConfig( level=10, format='%(asctime)s:%(levelname)s:%(lineno)d\t\t%(message)s', handlers=[ logging.FileHandler(f'{"/".join(os.path.realpath(__file__).split("/")[:-1])}/process.log'), log...
151
28.91
126
19
983
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d43e59b17b53530c_e610bb30", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 35, 50 ]
[ null, null ]
[ 22, 26 ]
[ 31, 60 ]
2024-11-18T21:57:49.446296+00:00
1,568,564,112,000
58bc6af260b98c5bd5a701318f586b03157e5af6
2
{ "blob_id": "58bc6af260b98c5bd5a701318f586b03157e5af6", "branch_name": "refs/heads/master", "committer_date": 1568564112000, "content_id": "4b01625a65cbc9d9a73917470fc900327f0949be", "detected_licenses": [ "MIT" ], "directory_id": "2367f3995720dfa54dd9c2a8e285fd47f517825c", "extension": "py", "fi...
2.3125
stackv2
import socket import select import sys import re import Crypto from Crypto.PublicKey import RSA from Crypto import Random import ast server = socket.socket() # IP_address = input("Enter IP address: ") Port = int(input("Enter port number: ")) Mode = int(input("Enter mode: ")) IP_address = "127.0.0.1" server.connect((IP...
119
38.95
113
30
972
python
[{"finding_id": "codeql_py/weak-crypto-key_b112157ba5d5ec7c_eb56032e", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",...
1
true
[ "CWE-326" ]
[ "py/weak-crypto-key" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable." ]
[ 17 ]
[ null ]
[ 7 ]
[ 43 ]
2024-11-18T21:57:58.033615+00:00
1,683,032,857,000
09ba89e38f1f729bb336c9bb1d9f101010f39eb0
3
{ "blob_id": "09ba89e38f1f729bb336c9bb1d9f101010f39eb0", "branch_name": "refs/heads/master", "committer_date": 1683032857000, "content_id": "a7bec3f4fae6c340c35e418408544aaa9bcb11c3", "detected_licenses": [ "MIT" ], "directory_id": "edd98ac69375fbe6acbc4a28e6ec5c61bcdbf249", "extension": "py", "fi...
2.9375
stackv2
# 'os' module to access environment variables import os # 'logging' to log things to the terminal import logging # 'requests_oauthlib's 'OAuth2Session' to handle the OAuth magic from requests_oauthlib import OAuth2Session logging.basicConfig(level=logging.INFO) # Gets the basic connection info from the environment v...
70
36.94
71
9
599
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0fd7c9cf2b5a93b4_d5156a22", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 24, 70 ]
[ null, null ]
[ 14, 7 ]
[ 55, 15 ]
2024-11-18T21:58:08.505217+00:00
1,543,578,373,000
f93ca338a8bf42f659b489d94fef2ac74ff53cda
2
{ "blob_id": "f93ca338a8bf42f659b489d94fef2ac74ff53cda", "branch_name": "refs/heads/master", "committer_date": 1543578373000, "content_id": "39a4c17e2eac8b4d644825c5f6d7cc53a5bcc91a", "detected_licenses": [ "MIT" ], "directory_id": "bd7b602e2d362fc801627543aeec4e6ce917c641", "extension": "py", "fi...
2.40625
stackv2
import logging import boto3 from django.conf import settings from ..exceptions import BackendRequirement from .base import BaseSmsBackend logger = logging.getLogger(__name__) AWS_ACCESS_KEY_ID = getattr(settings, 'AWS_ACCESS_KEY_ID') AWS_SECRET_ACCESS_KEY = getattr(settings, 'AWS_SECRET_ACCESS_KEY') AWS_REGION_NAME...
95
32.72
114
16
735
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b96023cb399e447c_487cb22b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 36 ]
[ null ]
[ 30 ]
[ 57 ]
2024-11-18T21:58:09.370132+00:00
1,449,675,412,000
33ee08d10c009e80e4e628ef7fedf5024cc40a40
3
{ "blob_id": "33ee08d10c009e80e4e628ef7fedf5024cc40a40", "branch_name": "refs/heads/master", "committer_date": 1449675412000, "content_id": "df6d50349f1877522ce6c73d8fe8e7f967f5f1b2", "detected_licenses": [ "Apache-2.0" ], "directory_id": "3639762625ea9481f26e77b7ba68b8ae10fa4a84", "extension": "py"...
2.5625
stackv2
# Copyright (c) 2015 Scality # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, s...
245
28
78
17
1,642
python
[{"finding_id": "codeql_py/overly-permissive-file_27eb080bef7a6839_c4126900", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable." ]
[ 157 ]
[ null ]
[ 9 ]
[ 38 ]
2024-11-18T21:58:33.175074+00:00
1,614,366,147,000
cf3ed158a6c5ec7b0607d01a6eaebce0a0386eb3
4
{ "blob_id": "cf3ed158a6c5ec7b0607d01a6eaebce0a0386eb3", "branch_name": "refs/heads/main", "committer_date": 1614366147000, "content_id": "cfbeed53d4565b025cb0b707ec879517a404df29", "detected_licenses": [ "MIT" ], "directory_id": "e26db03a9825b0b82e3ca62326f4be0d70317ad5", "extension": "py", "file...
3.703125
stackv2
import random upperCaseLetters: str = "ABCDEFGHIJKLMNOPQRSTUVWXYZ" lowerCaseLetters: str = upperCaseLetters.lower() digits: str = "0123456789" symbols: str = "!@#$%^&*()_-+={[}]|\\/?.>,<;:" upper: bool = True lower: bool = True nums: bool = True syms: bool = True allLetters: str = "" if upper: allLetters += upp...
31
18.39
57
10
176
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_75f5d84a25b84be8_62c7a136", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 31 ]
[ null ]
[ 11 ]
[ 19 ]
2024-11-18T21:58:33.296734+00:00
1,559,697,696,000
8fafb8fccb57ff0187ab07b5b32511110fe268d9
2
{ "blob_id": "8fafb8fccb57ff0187ab07b5b32511110fe268d9", "branch_name": "refs/heads/master", "committer_date": 1559697696000, "content_id": "b00d0fe2d357010585916b08f7e8793cbf4c335d", "detected_licenses": [ "MIT" ], "directory_id": "99249dad36df26a712ae8d900041d53acf3901ea", "extension": "py", "fi...
2.40625
stackv2
#!/usr/bin/env python """High-magnification, small field of view video camera of the diffractometer, used for aligneing a crystal in the X-ray beam Friedrich Schotte, 19 Feb 2008 - 6 Jul 2017""" __version__ = "1.8.1" # __main__ import logging; from tempfile import gettempdir logfile = gettempdir()+"/MicroscopeCamera.l...
34
34.32
79
10
315
python
[{"finding_id": "codeql_py/overly-permissive-file_8cc893aeb9a47ee7_cb35a658", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world writable." ]
[ 13 ]
[ null ]
[ 6 ]
[ 25 ]
2024-11-18T23:10:56.196729+00:00
1,556,577,091,000
4a78012f53de834848d718c4a0b101d6fd4bf5f5
3
{ "blob_id": "4a78012f53de834848d718c4a0b101d6fd4bf5f5", "branch_name": "refs/heads/master", "committer_date": 1556577091000, "content_id": "601d3713081ce8aac14228323196307d0b13284f", "detected_licenses": [ "MIT" ], "directory_id": "ce86b4d3aa9fefdd412d33cb4e7256d456e160e8", "extension": "py", "fi...
2.75
stackv2
import pathlib import jinja2 from .assetfiles import AssetFiles def setup_parser(parser): parser.add_argument('src', type=str, help='''src root folder. src/articles is markdown folder. src/templates is html template folder. ''') parser.ad...
81
26.2
76
18
463
python
[{"finding_id": "codeql_py/stack-trace-exposure_2093629f00bab67a_94dda121", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
3
true
[ "CWE-209", "CWE-079", "CWE-079" ]
[ "py/stack-trace-exposure", "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "HIGH", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 68, 44, 63 ]
[ null, 45, 64 ]
[ 20, 26, 32 ]
[ 39, 71, 77 ]
2024-11-18T22:48:21.970842+00:00
1,596,429,528,000
706d79e34e1ad5a702890318779cbbf1a0846ac9
3
{ "blob_id": "706d79e34e1ad5a702890318779cbbf1a0846ac9", "branch_name": "refs/heads/master", "committer_date": 1596429528000, "content_id": "5c47d08ad99d5a33e3602bc6200db9c984e64d4c", "detected_licenses": [ "MIT" ], "directory_id": "d25488bede4e1a1316aa1afbd6e446144deb12bb", "extension": "py", "fi...
2.828125
stackv2
from click import echo from jinja2 import Template def merge(template_string: str, values: dict): template = Template(template_string) return template.render(values) def render(template, values, target=None): with open(template, 'r') as template_file: template_string = template_file.read() ...
20
24.4
46
13
107
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_711a854467abcfa6_5002e9ea", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 6 ]
[ null ]
[ 16 ]
[ 41 ]
2024-11-18T22:49:06.943437+00:00
1,357,025,520,000
ee5fa6bd80cbbff94049e91c2f9603e84ddae174
3
{ "blob_id": "ee5fa6bd80cbbff94049e91c2f9603e84ddae174", "branch_name": "refs/heads/master", "committer_date": 1357025520000, "content_id": "6c6812c455765d3d53b124a793b745397866471b", "detected_licenses": [ "MIT" ], "directory_id": "23da0ae6ef9f08738a0c8d50ddb09ede159a62de", "extension": "py", "fi...
2.71875
stackv2
# encoding: utf-8 import pwd import os import pwd import grp def get_uid(username): try: pwd.getpwnam(username)[2] except: return None def drop_privileges(uid_name='nobody', gid_name='nogroup'): if os.getuid() != 0: # We're not root so, like, whatever dude return # Get...
66
27.45
74
13
484
python
[{"finding_id": "codeql_py/overly-permissive-file_3875b3e3097e41ff_a903f6e8", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable." ]
[ 48 ]
[ null ]
[ 13 ]
[ 37 ]
2024-11-18T22:49:10.064948+00:00
1,537,916,713,000
6f7b6512815ccee1bd52232bb7450523a41e7799
2
{ "blob_id": "6f7b6512815ccee1bd52232bb7450523a41e7799", "branch_name": "refs/heads/master", "committer_date": 1537916713000, "content_id": "a6389d29b4d832889706fcae67bd44d42d8daf1e", "detected_licenses": [ "MIT" ], "directory_id": "5d3924fb75b83175f1276696b5843203445f9b6d", "extension": "py", "fi...
2.390625
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- import logging import os import re import requests import simplejson as json import socket import time import tornado.ioloop import tornado.options import tornado.web import tornado.websocket import urllib.request import uuid logging.basicConfig( format='%(asctime)s' ...
207
29.95
78
23
1,307
python
[{"finding_id": "codeql_py/stack-trace-exposure_1a51d095cccdbd75_f8f6a6e7", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
6
true
[ "CWE-209", "CWE-209", "CWE-209", "CWE-079", "CWE-117", "CWE-117" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/reflective-xss", "py/log-injection", "py/log-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "Cross-site scripting vul...
[ 86, 114, 194, 191, 58, 189 ]
[ 89, 117, 197, null, null, null ]
[ 24, 24, 24, 24, 22, 26 ]
[ 15, 15, 15, 49, 51, 66 ]
2024-11-18T23:26:01.010451+00:00
1,571,867,241,000
06be4c8aabf6ae285a2b5d6bacd5985a816f6c31
3
{ "blob_id": "06be4c8aabf6ae285a2b5d6bacd5985a816f6c31", "branch_name": "refs/heads/master", "committer_date": 1571867241000, "content_id": "bbd464ec35c27b667877b303765a608df6171acb", "detected_licenses": [ "MIT" ], "directory_id": "472b0eb035ea11a4978c87d43a4e698aaa0f161c", "extension": "py", "fi...
2.546875
stackv2
import grp import os import pwd import shlex import subprocess from typing import Set, List from helpers.ssh_key_object import SSHKeyObject from helpers.gitlab_operations import GitlabGroupConfig from helpers.config_operations import sanitize_sudoers_line, sanitize_username __all__ = [ "UserOps", "UOProtectedU...
252
33.23
116
20
1,952
python
[{"finding_id": "codeql_py/overly-permissive-file_487d733703b653b4_23889134", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable." ]
[ 141 ]
[ null ]
[ 9 ]
[ 46 ]
2024-11-18T23:26:03.774290+00:00
1,626,522,876,000
b45a00cd924b9946041ac99da80f15ea6458044f
3
{ "blob_id": "b45a00cd924b9946041ac99da80f15ea6458044f", "branch_name": "refs/heads/master", "committer_date": 1626522876000, "content_id": "06918eba1956bf727e2803ac886f1bec5ac8588f", "detected_licenses": [ "MIT" ], "directory_id": "65f73fbe3842767fbc1b28a4edc97232c3e3952e", "extension": "py", "fi...
2.671875
stackv2
import time import uuid import discordsdk as dsdk # we get the application id from a file with open("application_id.txt", "r") as file: application_id = int(file.read()) # debug callback def debug_callback(debug, result, *args): if result == dsdk.Result.ok: print(debug, "success") else: ...
83
25.72
100
13
501
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_648b896a23994142_4ab07024", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 27, 32 ]
[ null, null ]
[ 21, 21 ]
[ 27, 27 ]
2024-11-18T23:26:07.235953+00:00
1,558,883,853,000
2fd8d71b709babeba3deec802f6d1df535639ebc
3
{ "blob_id": "2fd8d71b709babeba3deec802f6d1df535639ebc", "branch_name": "refs/heads/master", "committer_date": 1558883853000, "content_id": "f0980698e186b83aba4f1c4ca9f221b4be314f6b", "detected_licenses": [ "MIT" ], "directory_id": "96262ca5188d996902570e97f3d95baebf6c9c94", "extension": "py", "fi...
2.53125
stackv2
#!/usr/bin/env python # coding: utf-8 # @Author: lapis-hong # @Date : 2019/5/8 """Abstract base class for all search engine extractor descendant classes.""" from __future__ import absolute_import from __future__ import unicode_literals import os import time import random import logging from abc import ABCMeta, abstra...
270
35.6
101
16
2,068
python
[{"finding_id": "codeql_py/request-without-cert-validation_d783abd37fd5dfcb_2a18299d", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 201 ]
[ 207 ]
[ 28 ]
[ 32 ]
2024-11-18T23:26:08.603573+00:00
1,546,549,139,000
a88f0a03f0271658d3298d377eef9c4ecc39b066
3
{ "blob_id": "a88f0a03f0271658d3298d377eef9c4ecc39b066", "branch_name": "refs/heads/master", "committer_date": 1546549139000, "content_id": "ed368db905068ab107f455a6ec5dca026ff77376", "detected_licenses": [ "MIT" ], "directory_id": "3598c02d42963fff2a48b121dbf6c6993611e2b6", "extension": "py", "fi...
3.375
stackv2
import random caracteres = "abcdefghijklmnospqrstuvwxyzABCDEFGHIJKLMNOSPQRSTUVWXYZ1234567890$#@" numero, longitud = input("Número Longitud ").split() numero = int(numero) longitud = int(longitud) arreglo_password = [] for i in range(numero): password = "".join(random.sample(caracteres, longitud)) if passw...
23
22.13
82
10
127
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_5ada00011a39eb02_e3e76982", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 22, 20 ]
[ null, null ]
[ 17, 7 ]
[ 44, 23 ]
2024-11-18T22:27:27.540102+00:00
1,613,665,022,000
2af9815cd896b010f1f8356d9efa819b5236ad47
2
{ "blob_id": "2af9815cd896b010f1f8356d9efa819b5236ad47", "branch_name": "refs/heads/master", "committer_date": 1613665022000, "content_id": "c03d6b95e68730d19fac182baf4d592c11ed7432", "detected_licenses": [ "MIT" ], "directory_id": "ff818f48b52a812256d4bb8718a0b5fefaa33f4c", "extension": "py", "fi...
2.40625
stackv2
import logging import os from flask import Flask from flask import Markup from flask import render_template from flask import request from flask import Response from flask import jsonify from flask_babel import Babel, gettext from google.cloud import datastore from opencensus.ext.azure.log_exporter import AzureLogHand...
211
30.32
146
19
1,446
python
[{"finding_id": "codeql_py/reflective-xss_520333c788f0d8a3_de89c307", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 120 ]
[ null ]
[ 12 ]
[ 51 ]
2024-11-18T22:27:31.559637+00:00
1,542,977,253,000
8d33cbbb833a727dca6d6bf8245233a1b3d3c5d1
3
{ "blob_id": "8d33cbbb833a727dca6d6bf8245233a1b3d3c5d1", "branch_name": "refs/heads/master", "committer_date": 1542977253000, "content_id": "9b3485eaede35baaf9567155d3bb5f93d6de1640", "detected_licenses": [ "MIT" ], "directory_id": "f3b6644916ab2e0dba94b514904f46269454149c", "extension": "py", "fi...
2.65625
stackv2
import json from flask import Flask, render_template from flask_cors import CORS from tfidf import ExtractiveSummarizer_tfidf from balance import balance_equation app = Flask(__name__) CORS(app, resources={r"/*": {"origins": "*"}}) text_summarizer = ExtractiveSummarizer_tfidf(corpus="clean_dataset") with open("eleme...
63
24.48
73
14
365
python
[{"finding_id": "codeql_py/flask-debug_280361410aa169d3_2a6f8dd1", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-079", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 63, 40, 53 ]
[ null, null, null ]
[ 5, 20, 16 ]
[ 24, 48, 44 ]
2024-11-18T22:27:33.619961+00:00
1,626,936,728,000
e3593184a165e68328c4748ff6485f405e957ee1
3
{ "blob_id": "e3593184a165e68328c4748ff6485f405e957ee1", "branch_name": "refs/heads/master", "committer_date": 1626936728000, "content_id": "c35971479e9a2c79290f75f5273eaab268ef9bbc", "detected_licenses": [ "Apache-2.0" ], "directory_id": "b08fa95dc2e838d425a7b4569383b400c73103d1", "extension": "py"...
2.953125
stackv2
#! /usr/bin/env python # -*- coding: utf-8 -*- # File Name: base # Description : # Author : SanYapeng # date: 2019-05-15 # Change Activity: 2019-05-15: import json import re import time import hashlib import os class Message: @staticmethod def welcome(): mes...
252
24.18
92
16
1,619
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_0393556752ce7fe1_f23d2c54", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi...
[ 81 ]
[ null ]
[ 20 ]
[ 44 ]