added
string
created
int64
id
string
int_score
int64
metadata
dict
score
float64
source
string
text
string
num_lines
int64
avg_line_length
float64
max_line_length
int64
ast_depth
int64
length
int64
lang
string
sast_codeql_findings
string
sast_codeql_findings_count
int64
sast_codeql_success
bool
sast_codeql_error
string
cwe_ids
list
rule_ids
list
confidences
list
severities
list
messages
list
line_starts
list
line_ends
list
column_starts
list
column_ends
list
2024-11-18T20:26:56.617264+00:00
1,483,634,444,000
0d9fbc7ad4ccad1128aed87c28d408244e5c7def
2
{ "blob_id": "0d9fbc7ad4ccad1128aed87c28d408244e5c7def", "branch_name": "refs/heads/master", "committer_date": 1483634444000, "content_id": "0e6bb7e73f9e3c578deeb0e910622d133398ce26", "detected_licenses": [ "MIT" ], "directory_id": "584726bafeacc7a48c448e9d40649a8faeeacac6", "extension": "py", "fi...
2.453125
stackv2
import pywikibot import traceback import re from .subject import Subject from ....cache.redis_cache import RedisCache from ....util.translate_util import seealsoer, sortcat, catadder, dater, translator, get_lang from jinja2 import Template from collections import defaultdict, OrderedDict from pywikibot.textlib import...
125
42.58
120
20
1,416
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_85541640adc98699_5795abff", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 25 ]
[ null ]
[ 20 ]
[ 64 ]
2024-11-18T20:52:03.508874+00:00
1,631,095,385,000
c0a376266a6292cd7290b4f6f28daa8f7a2edbac
3
{ "blob_id": "c0a376266a6292cd7290b4f6f28daa8f7a2edbac", "branch_name": "refs/heads/master", "committer_date": 1631095437000, "content_id": "9c6e78e9d0123e390e6d2c2cd4af48c3b90f8eeb", "detected_licenses": [ "MIT" ], "directory_id": "ffa9ca3a9eaeb0abe750ad7a7ace717651474e27", "extension": "py", "fi...
2.75
stackv2
#!/usr/bin/python3 # Scripts for the evaluation of accuracies on MuST-SHE. # If using, please consider citing: # - M. Gaido, B. Savoldi et al., "Breeding Gender-aware Direct Speech Translation Systems", COLING 2020 # Version: 1.0 import argparse import csv def sentence_level_scores(in_f, tsv_f): sentences = [] ...
142
42.99
117
18
1,333
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1e3788a547102329_2db3f6be", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](1) as clear text." ]
[ 116 ]
[ null ]
[ 15 ]
[ 103 ]
2024-11-18T20:52:14.202983+00:00
1,557,626,990,000
60df5c15a6852d59528fdee6a32b843fd2881584
3
{ "blob_id": "60df5c15a6852d59528fdee6a32b843fd2881584", "branch_name": "refs/heads/master", "committer_date": 1557626990000, "content_id": "43617d7b0744bb11a10c1692220434373c9ad5ec", "detected_licenses": [ "MIT" ], "directory_id": "0d4a32392bd5bef3faa621389f6b62cc914fd267", "extension": "py", "fi...
2.5625
stackv2
from flask import Flask, g, render_template, request import sqlite3, json from flask import jsonify import os from functools import wraps DATABASE = "./database.db" # Create app app = Flask(__name__) app.config['DEBUG'] = True app.config['SECRET_KEY'] = 'secret-key' def auth_required(f): @wraps(f) def decorated(*...
100
33.12
157
19
800
python
[{"finding_id": "codeql_py/sql-injection_bb8986e299d12f79_eee8d195", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown...
3
true
[ "CWE-089", "CWE-089", "CWE-089" ]
[ "py/sql-injection", "py/sql-injection", "py/sql-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This SQL query depends on a [user-provided value](1).", "This SQL query depends on a [user-provided value](1).\nThis SQL query depends on a [user-provided value](2).", "This SQL query depends on a [user-provided value](1)." ]
[ 62, 74, 95 ]
[ null, null, null ]
[ 25, 27, 21 ]
[ 157, 143, 81 ]
2024-11-18T20:52:15.583680+00:00
1,588,403,009,000
a21ad5c87393b1a53b7d48835aaf7eb5ac8245db
3
{ "blob_id": "a21ad5c87393b1a53b7d48835aaf7eb5ac8245db", "branch_name": "refs/heads/master", "committer_date": 1588403009000, "content_id": "859ab28f2f2e2354915e3576f4131110720f8763", "detected_licenses": [ "MIT" ], "directory_id": "acef0dabbdc685c0c3119e666e26d438cb30cb8b", "extension": "py", "fi...
3.125
stackv2
# -------------- ##File path for the file file_path #Code starts here def read_file(path): file = open(path,'r') sentence=file.readline() file.close() return sentence sample_message=read_file(file_path) print(sample_message) #Code ends here # -------------- #Code starts here file_path_1 file_pat...
151
17.09
70
12
725
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a65d752b5d8110de_253ba2c4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
5
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive dat...
[ 38, 68, 97, 126, 140 ]
[ null, null, null, null, null ]
[ 7, 7, 7, 7, 7 ]
[ 19, 19, 19, 19, 17 ]
2024-11-18T20:52:20.438510+00:00
1,692,016,061,000
a1642e82e1afe6a6f6eab6434c94b4ebd9ed01f4
2
{ "blob_id": "a1642e82e1afe6a6f6eab6434c94b4ebd9ed01f4", "branch_name": "refs/heads/main", "committer_date": 1692099260000, "content_id": "b2f8f0c87970d0f56a47db7bc5029694afea5482", "detected_licenses": [ "Apache-2.0" ], "directory_id": "32d76924805a35549baee6ef5197c6e4e8be6849", "extension": "py", ...
2.34375
stackv2
"""Package for making catalog of dataservices available in an API.""" import logging import os from typing import Any from aiohttp import hdrs, web from aiohttp_middlewares import cors_middleware, error_middleware from dotenv import load_dotenv import jwt from multidict import MultiDict from .resources.catalogs impor...
89
32.4
90
14
643
python
[{"finding_id": "codeql_py/log-injection_580dea947cc9c1f5_8167642a", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2)...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2)." ]
[ 34 ]
[ null ]
[ 23 ]
[ 67 ]
2024-11-18T20:52:26.400669+00:00
1,606,309,683,000
4539be0834df707f7a80731f49eb0964cc871e78
3
{ "blob_id": "4539be0834df707f7a80731f49eb0964cc871e78", "branch_name": "refs/heads/master", "committer_date": 1606309683000, "content_id": "37dcf065bfba56b5b1569f4559050677a012abf8", "detected_licenses": [ "MIT" ], "directory_id": "6587177426940819637c02bd9817af077bc32b88", "extension": "py", "fi...
3.296875
stackv2
from info import Info from user import User import string import random def created_account(fname,lname,email): new_user = User(fname,lname,email) return new_user def create_credentials(facebookp,emailp,instagrampas,twitterpas,facebookusername,instagramusername,twitusername): new_cred = Info(facebookp,email...
145
28.86
138
19
765
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1e698853c6803a0e_e2956e59", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text." ]
[ 136 ]
[ null ]
[ 19 ]
[ 43 ]
2024-11-18T19:02:38.795096+00:00
1,478,803,748,000
d328658c683e53e5847d53861dde0023d1a527bd
3
{ "blob_id": "d328658c683e53e5847d53861dde0023d1a527bd", "branch_name": "refs/heads/master", "committer_date": 1478803748000, "content_id": "6604d3d9f4f79214fb5d2713fb398bca42e3175c", "detected_licenses": [ "MIT" ], "directory_id": "5684739cad4faea795e5e624e8413a968fc63ec4", "extension": "py", "fi...
2.59375
stackv2
__author__ = 'teemu kanstren' import configparser from file_data import FileData from argparse import ArgumentParser # pip install scp for paramiko import paramiko from scp import SCPClient import os import sys #attribute names for configuration file KEY_DESTINATION_IP="dst_ip" KEY_DESTINATION_PORT="dst_port" KEY_DES...
341
39.66
177
18
3,135
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_6bad9419d110bc4e_9ed85ff3", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 58 ]
[ null ]
[ 5 ]
[ 65 ]
2024-11-18T19:02:47.909377+00:00
1,675,884,890,000
4ce528e0eefe7742dc0a97e85b24a328a4d45789
2
{ "blob_id": "4ce528e0eefe7742dc0a97e85b24a328a4d45789", "branch_name": "refs/heads/master", "committer_date": 1675884890000, "content_id": "6f86689455d3442edc85dcb51d1d5db50f814c73", "detected_licenses": [ "Apache-2.0" ], "directory_id": "30b06187f8c6f30de84b8a93f24bce5562afa947", "extension": "py"...
2.5
stackv2
import requests import json import base64 def anycli(baseurl, cmd, cookie_header): """ Send cli commands supported on ArubaOS switch via REST API. All configuration and execution commands in non-interactive mode are supported. This is not supported for : crypto, copy, process-tracking, recopy, redo, r...
128
35.73
115
14
1,125
python
[{"finding_id": "codeql_py/request-without-cert-validation_317433541b6778e3_bdc560d6", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
3
true
[ "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 27, 84, 100 ]
[ null, 85, null ]
[ 16, 21, 16 ]
[ 91, 45, 74 ]
2024-11-18T19:02:50.643643+00:00
1,563,841,049,000
f8a9f35238a4a3ead5238486593505d5481bded2
4
{ "blob_id": "f8a9f35238a4a3ead5238486593505d5481bded2", "branch_name": "refs/heads/master", "committer_date": 1563841049000, "content_id": "c8ba76318579e2cc7c634056058689d610e8df60", "detected_licenses": [ "MIT" ], "directory_id": "399d513e2be674688b6d007a58ab943db0432837", "extension": "py", "fi...
3.75
stackv2
#Pass-stor: created by Lee Baldwin #import python random module #to generate random string from random import sample #by using a large number of characters #we can create a much harder password strchars = 'abcdefghijklmnopqrstuvwxyz0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ_*+=!@#$%^&' def pwdgen(pwdlen = 8, pwdnums = 1,...
42
23.33
86
13
264
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_d5e18b6ed714eb79_5861a7b4", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 38, 35 ]
[ null, null ]
[ 16, 11 ]
[ 35, 23 ]
2024-11-18T19:02:54.033755+00:00
1,618,866,631,000
019cf553fcf094e84300dd26f86111fce5f4438d
2
{ "blob_id": "019cf553fcf094e84300dd26f86111fce5f4438d", "branch_name": "refs/heads/main", "committer_date": 1618866631000, "content_id": "d972269d20b9a6edb7d978d399147fd50856059d", "detected_licenses": [ "Apache-2.0" ], "directory_id": "2e9a8973728c2b4566596b0d8c78a8c32355e65a", "extension": "py", ...
2.46875
stackv2
"""Resource module for resultat view.""" import logging from aiohttp import web import aiohttp_jinja2 from sprint_webserver.services import InnstillingerService class Innstillinger(web.View): """Class representing the Innstillinger resource.""" async def get(self) -> web.Response: """Get route func...
62
31.87
76
16
426
python
[{"finding_id": "codeql_py/log-injection_ee39aafa06397269_51820541", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 53 ]
[ null ]
[ 23 ]
[ 70 ]
2024-11-18T19:14:26.215154+00:00
1,588,736,697,000
e7aa14dd7a8c89587a1ff3f5d2699ffbc4ba8cb1
4
{ "blob_id": "e7aa14dd7a8c89587a1ff3f5d2699ffbc4ba8cb1", "branch_name": "refs/heads/master", "committer_date": 1588736697000, "content_id": "63e8f491e93e3e980aff3d49d2d5360fc28765b1", "detected_licenses": [ "MIT" ], "directory_id": "f2cf867ff36ddf2f1647d7ca23a8fb0921577c7f", "extension": "py", "fi...
4.3125
stackv2
""" For this problem you will modify a function that creates a password the password needs to include features from the input list that contains information about the person. Passwords need to have 3 random special characters contain jumbled strings from the input include 2-4 numbers be of...
63
34.68
176
13
574
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_05504007113fc6b9_38530ea9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 63 ]
[ null ]
[ 11 ]
[ 36 ]
2024-11-18T19:14:31.931431+00:00
1,634,117,700,000
6246096622900c9e450606deb56a085b2980b3e1
2
{ "blob_id": "6246096622900c9e450606deb56a085b2980b3e1", "branch_name": "refs/heads/main", "committer_date": 1634117700000, "content_id": "ec5388f56b01a76c5e55a8f061ebbe654742fb13", "detected_licenses": [ "MIT" ], "directory_id": "fbc90dcef77b42ba9a8021c471a405d3607be9e0", "extension": "py", "file...
2.484375
stackv2
import re from aiocqhttp.exceptions import Error import ujson import httpx import asyncio from hashlib import md5 from typing import Tuple from loguru import logger from retrying import retry from bs4 import BeautifulSoup from nonebot import MessageSegment import config from src.plugins.pixiv import utils @retry as...
345
32.52
157
33
3,055
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_4adbf0401854074d_327064d1", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'pximg.net/imgaz/upload', so it migh...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/incomplete-hostname-regexp", "py/incomplete-hostname-regexp" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'pximg.net/imgaz/upload', so it might match more hosts than expected.", "This regular expression has an unescaped '.' before 'pximg.net/c/768x1200_80/img-master/img/', so it might match more hosts than expected." ]
[ 92, 232 ]
[ null, null ]
[ 37, 36 ]
[ 80, 106 ]
2024-11-18T19:14:34.922111+00:00
1,609,831,014,000
7475d9d71f52e20ad6a911958d5dfcbd15005b70
2
{ "blob_id": "7475d9d71f52e20ad6a911958d5dfcbd15005b70", "branch_name": "refs/heads/main", "committer_date": 1609831014000, "content_id": "90202642361809add2fdbfa2fd8d0ca034147d23", "detected_licenses": [ "MIT" ], "directory_id": "2a3efc60a28f836a593e83cb9a5312983d6c96c2", "extension": "py", "file...
2.46875
stackv2
#coding=utf-8 from flask import Flask,request from datetime import datetime import logging from commands.defcmd import * from flask_babel import * import sys sys.path.append('config') from config import * app = Flask(__name__) app.config.from_pyfile('settings.cfg') babel = Babel(app) status_str = "" def error_log(ap...
63
22.32
63
10
407
python
[{"finding_id": "codeql_py/flask-debug_d30f11aa7315149b_12d14ad7", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-079", "CWE-117" ]
[ "py/flask-debug", "py/reflective-xss", "py/log-injection" ]
[ "HIGH", "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 63, 54, 19 ]
[ null, null, null ]
[ 5, 12, 21 ]
[ 51, 18, 48 ]
2024-11-18T19:14:45.331626+00:00
1,616,495,279,000
d73fc9d7ea6d4d97c99bc9d4f17227c237b692f5
3
{ "blob_id": "d73fc9d7ea6d4d97c99bc9d4f17227c237b692f5", "branch_name": "refs/heads/main", "committer_date": 1616495279000, "content_id": "766d4e81e47d098a9bcbd2f244ac54272f9a3172", "detected_licenses": [ "MIT" ], "directory_id": "0804c9f4d46e15a93a4322808b487eb00c28da95", "extension": "py", "file...
2.53125
stackv2
from flask import Flask, render_template, request, make_response app =Flask(__name__) @app.route('/') def index(): return render_template('index.html') @app.route('/setcookie', methods=['POST', 'GET']) def setcookie(): if request.method=='POST': user= request.form['name'] resp = make_response(...
18
29.94
64
14
122
python
[{"finding_id": "codeql_py/insecure-cookie_2468e68c60e9a394_f2559e31", "tool_name": "codeql", "rule_id": "py/insecure-cookie", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Cookie is added to response without the 'secure' flag being set.", "remediation": "", "location": {"file_path"...
3
true
[ "CWE-614", "CWE-020", "CWE-1004" ]
[ "py/insecure-cookie", "py/cookie-injection", "py/client-exposed-cookie" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cookie is added to response without the 'secure' flag being set.", "Cookie is constructed from a [user-supplied input](1).", "Sensitive server cookie is set without HttpOnly flag." ]
[ 13, 13, 13 ]
[ null, null, null ]
[ 9, 35, 9 ]
[ 40, 39, 40 ]
2024-11-18T19:27:37.831344+00:00
1,647,468,409,000
3052f7fd8a818f285b733b6065e77e2c22698c61
3
{ "blob_id": "3052f7fd8a818f285b733b6065e77e2c22698c61", "branch_name": "refs/heads/main", "committer_date": 1647468951000, "content_id": "b841ad558f946b85f167618e2afd272c2d3b4858", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "5cfd0afd93894cb055a34000b1ecea8131102509", "extension": "py"...
2.765625
stackv2
"""Classes that download data from usaspending.gov""" import pathlib import warnings import zipfile import requests from us_hep_funding.constants import ( DOE_CONTRACTS_STR, NSF_GRANTS_STR, RAW_DATA_PATH, USASPENDING_BASEURL, ) class UsaSpendingDataDownloader: """A downloader for getting data f...
55
26.84
79
15
354
python
[{"finding_id": "codeql_py/request-without-cert-validation_6c1c8b819f4b4fe9_451b73ba", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 37 ]
[ null ]
[ 21 ]
[ 74 ]
2024-11-18T19:27:44.323441+00:00
1,548,309,149,000
3d627502f19a29fb5a0f807dee460f3725408b7d
3
{ "blob_id": "3d627502f19a29fb5a0f807dee460f3725408b7d", "branch_name": "refs/heads/master", "committer_date": 1548309149000, "content_id": "5da3d59165a1164a9db2f5690b7e8315a62e9232", "detected_licenses": [ "MIT" ], "directory_id": "843fa640f541c11334ec5dc3082e67ef5269df16", "extension": "py", "fi...
3.28125
stackv2
from flask import Flask,request #create app with Flask app=Flask(__name__) #use python app decorator to create api route # '\api' specifies the end point and methods specify that it will be used for # POST requests @app.route('/api',methods={'POST'}) def say_hello(): #data sent as json so we use get_json to extr...
19
33.37
90
10
168
python
[{"finding_id": "codeql_py/flask-debug_2fdef3d9ffcd928f_88056a35", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 19, 15 ]
[ null, null ]
[ 5, 12 ]
[ 35, 36 ]
2024-11-18T19:27:51.508207+00:00
1,690,649,430,000
c32eba0df9c6f427064ba38a8707ba7443271158
2
{ "blob_id": "c32eba0df9c6f427064ba38a8707ba7443271158", "branch_name": "refs/heads/main", "committer_date": 1690649430000, "content_id": "c00cbfff9aadbc60b89b8faf88c4e8ceef00949d", "detected_licenses": [ "MIT" ], "directory_id": "af2082be2d5cbe39f41b82e84e22bbdf79b49639", "extension": "py", "file...
2.421875
stackv2
# -*- coding: utf-8 -*- """ extension ~~~~ Flask-CORS is a simple extension to Flask allowing you to support cross origin resource sharing (CORS) using a simple decorator. :copyright: (c) 2016 by Cory Dolphin. :license: MIT, see LICENSE for more details. """ import logging from urllib.parse imp...
201
37.97
93
20
1,635
python
[{"finding_id": "codeql_py/log-injection_9cfe19abf0618035_4f5643c7", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 195 ]
[ null ]
[ 23 ]
[ 35 ]
2024-11-18T19:38:22.735555+00:00
1,438,974,824,000
3d76fb906e8b80590afec7a6b2b487069ba9723d
2
{ "blob_id": "3d76fb906e8b80590afec7a6b2b487069ba9723d", "branch_name": "refs/heads/master", "committer_date": 1438974824000, "content_id": "912b260ba153df52ad03773f01d72bc2ce39fd34", "detected_licenses": [ "MIT" ], "directory_id": "458b30867c97c6691174ed5353bba96d4cd3c259", "extension": "py", "fi...
2.390625
stackv2
#!/usr/bin/env python """axis_frame_join Generates an AXI Stream frame join module with a specific number of input ports Usage: axis_frame_join [OPTION]... -?, --help display this help and exit -p, --ports specify number of ports -n, --name specify module name -o, --output specify output file nam...
428
30.42
174
14
3,316
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_5dae9ecf0de11bd5_8748c17f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 73 ]
[ 415 ]
[ 9 ]
[ 5 ]
2024-11-18T19:38:46.991572+00:00
1,466,900,467,000
34f8eedf375c0bc2b4a4db4a2d14a03ed8b658f6
2
{ "blob_id": "34f8eedf375c0bc2b4a4db4a2d14a03ed8b658f6", "branch_name": "refs/heads/master", "committer_date": 1466900467000, "content_id": "b56ca1e30a70fbd757be3ba423e7295c66a29fa9", "detected_licenses": [ "MIT" ], "directory_id": "d20f9d253ee13bf9e6cf87e5eb0f8966e3059a21", "extension": "py", "fi...
2.46875
stackv2
import os from flask import render_template, current_app, request, redirect, url_for, flash, session, send_from_directory from flask_login import login_user from . import home from .forms import LoginForm from app.models.user import User from app import mongo @home.route('/static/favicon.ico') def favicon(): retu...
40
31.82
111
16
280
python
[{"finding_id": "codeql_py/url-redirection_6d9ba0d9cc0ed726_cc61ab9c", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 30 ]
[ null ]
[ 29 ]
[ 84 ]
2024-11-18T20:06:08.969104+00:00
1,608,888,084,000
efe7baf15f614eb8ab5466a5f934ce6836008048
2
{ "blob_id": "efe7baf15f614eb8ab5466a5f934ce6836008048", "branch_name": "refs/heads/main", "committer_date": 1608888084000, "content_id": "0a356d1836b0bf25b32f9510a964957e87dadd8d", "detected_licenses": [ "MIT" ], "directory_id": "5fe857a4c66116269debfd3f7bbc64712fd65efe", "extension": "py", "file...
2.4375
stackv2
#!/usr/bin/python3 # -*- coding: utf-8 -*- # @Time : 2020/11/6 20:24 # @Author : lin # @FileName: collect_paper.py from selenium import webdriver from selenium.webdriver.chrome.options import Options from selenium.webdriver.chrome.service import Service import os,time,requests from lxml import etree def Read_conf...
166
38.66
140
24
1,623
python
[{"finding_id": "codeql_py/request-without-cert-validation_abcc63256be22fa8_6cec1aad", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 132 ]
[ null ]
[ 24 ]
[ 89 ]
2024-11-18T20:06:17.769803+00:00
1,625,817,536,000
3b64434a0126f8d093ac8bc1c869232c9a23f07f
2
{ "blob_id": "3b64434a0126f8d093ac8bc1c869232c9a23f07f", "branch_name": "refs/heads/main", "committer_date": 1625817536000, "content_id": "9c0d40e52724f58531dcb757bb0550d99b0c4dd5", "detected_licenses": [ "MIT" ], "directory_id": "26d6c34df00a229dc85ad7326de6cb5672be7acc", "extension": "py", "file...
2.484375
stackv2
# -------------------------------------------------------------------------------------------- # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the MIT License. See License.txt in the project root for license information. # --------------------------------------------------------------------...
74
28.55
94
13
461
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_ff908b366f7f63cf_2b3fdfe8", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 43 ]
[ null ]
[ 16 ]
[ 49 ]
2024-11-18T20:06:30.536638+00:00
1,573,829,005,000
21f583271bd21590245f3dc0c498028858f88029
3
{ "blob_id": "21f583271bd21590245f3dc0c498028858f88029", "branch_name": "refs/heads/master", "committer_date": 1573829005000, "content_id": "f3791c1237dc54fae2f51ef7cfaa5cb41ec871fc", "detected_licenses": [ "MIT" ], "directory_id": "590f26e35955b1cf0c9bf3e83c4686b12c52367b", "extension": "py", "fi...
2.765625
stackv2
from collections import namedtuple User = namedtuple("User", "name email password role") BROKER = "broker" ADMIN = "admin" admins = [ User("Matías B", "matias@siprop.com", "totally safe password", ADMIN), User("Franco F", "franco@siprop.com", "pass123", ADMIN), ] brokers = [ User("faralla", "admin@f...
44
22.98
74
11
283
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_59390815ef0eac7e_7b6c64ea", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 43, 43 ]
[ null, null ]
[ 11, 26 ]
[ 24, 34 ]
2024-11-18T20:31:14.947309+00:00
1,569,644,119,000
f0fb6776d758f176fc0134397c028a9178f18982
2
{ "blob_id": "f0fb6776d758f176fc0134397c028a9178f18982", "branch_name": "refs/heads/master", "committer_date": 1569644119000, "content_id": "af51d79361f4ee51e56c06a675ef0fc79ec975b9", "detected_licenses": [ "Apache-2.0" ], "directory_id": "bcb214111c6c0a1fcf6aced5010a4712fd2d223f", "extension": "py"...
2.3125
stackv2
import os from sqlalchemy import create_engine from sqlalchemy.orm import scoped_session, sessionmaker from sqlalchemy.ext.declarative import declarative_base from sqlalchemy.exc import OperationalError username = os.getenv('POSTGRES_USERNAME') password = os.getenv('POSTGRES_PASSWORD') database = os.getenv('POSTGRES_D...
38
29.03
77
10
229
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8d3e8c70a9574ff5_aaf85303", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 31 ]
[ null ]
[ 11 ]
[ 55 ]
2024-11-18T20:31:15.547113+00:00
1,584,644,465,000
828931dc3ab7a875880875f2f49c36402ec5250d
3
{ "blob_id": "828931dc3ab7a875880875f2f49c36402ec5250d", "branch_name": "refs/heads/master", "committer_date": 1584644465000, "content_id": "1be7bb91b8a6b8ee3ee1dcae20552576ce1a5ef4", "detected_licenses": [ "MIT" ], "directory_id": "ee2416bb4cdf88f942ee9c4049d0ee944fcf0331", "extension": "py", "fi...
2.703125
stackv2
#!/usr/bin/env python # Copyright 2019 Pascal Audet & Helen Janiszewski # # This file is part of OBStools. # # Permission is hereby granted, free of charge, to any person obtaining a copy # of this software and associated documentation files (the "Software"), to deal # in the Software without restriction, including wi...
263
38.46
82
18
2,213
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_cb54595fa31e73a5_6d4b78a5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 192 ]
[ 193 ]
[ 15 ]
[ 41 ]
2024-11-18T20:31:21.232717+00:00
1,605,548,080,000
d5c86dff386344157ceeb31e34978588bd810477
3
{ "blob_id": "d5c86dff386344157ceeb31e34978588bd810477", "branch_name": "refs/heads/master", "committer_date": 1605548080000, "content_id": "7f5e1084c42ab4041bc178047bf68c59e98dd3df", "detected_licenses": [ "MIT" ], "directory_id": "cbe7302c7e96267318ced4f8938233b063a742b4", "extension": "py", "fi...
2.5625
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- """DAR Server (based on Flask) """ import sys import logging import threading from flask import Flask, request, jsonify import click from core import BASE_DIR, cfg, log, dbg_hand from dar import Dar, TodoState ############# # Flask App # ############# app = Flask(__na...
201
29.11
104
15
1,410
python
[{"finding_id": "codeql_py/stack-trace-exposure_343441cecba0db55_ff18e79c", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 122, 142 ]
[ null, null ]
[ 16, 16 ]
[ 39, 39 ]
2024-11-18T20:31:27.246963+00:00
1,583,296,855,000
ee694130e1786d597e876658e8cb6f481ec34a9e
2
{ "blob_id": "ee694130e1786d597e876658e8cb6f481ec34a9e", "branch_name": "refs/heads/master", "committer_date": 1583296855000, "content_id": "d460524469912efdede64f2818389693b468ea73", "detected_licenses": [ "Apache-2.0" ], "directory_id": "282808bbabf5c2692e22d85dbaae78bea5f38f4b", "extension": "py"...
2.34375
stackv2
# Copyright Istio Authors # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, soft...
254
31.98
79
20
1,818
python
[{"finding_id": "codeql_py/tarslip_882b08e9f3a9734f_04d65939", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 114 ]
[ null ]
[ 9 ]
[ 12 ]
2024-11-18T20:31:28.155832+00:00
1,634,117,700,000
1bc72a0a1e17e79b92abb898068298c833815e75
2
{ "blob_id": "1bc72a0a1e17e79b92abb898068298c833815e75", "branch_name": "refs/heads/main", "committer_date": 1634117700000, "content_id": "44c3a3954bc1f23a87f81a00cf82195c4255eae9", "detected_licenses": [ "MIT" ], "directory_id": "fbc90dcef77b42ba9a8021c471a405d3607be9e0", "extension": "py", "file...
2.484375
stackv2
import hashlib import random import httpx import asyncio from retrying import retry import config api_id = config.baidu_translate_api_id secret_key = config.baidu_translate_secret_key @retry(stop_max_attempt_number=5) async def baidu_translate(text: str) -> str: """调用百度翻译api进行翻译 Args: text (str): 需...
50
23.98
76
13
341
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_feff8e8d49087159_6a5a4cd8", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (secret)](2) is used in a hashing algorithm (MD5) that is insecure." ]
[ 37 ]
[ null ]
[ 32 ]
[ 45 ]
2024-11-18T20:43:41.525250+00:00
1,383,612,817,000
03d51af3d30193d5a8af95b4164ec97498cf1d5e
3
{ "blob_id": "03d51af3d30193d5a8af95b4164ec97498cf1d5e", "branch_name": "refs/heads/master", "committer_date": 1383612817000, "content_id": "c3d06b436165ad23969ce231388e5c2270708a98", "detected_licenses": [ "MIT" ], "directory_id": "041549b4f6090e16bd215b2b98c11fb52f8385da", "extension": "py", "fi...
2.640625
stackv2
#! /usr/bin/env python """ The terminal just accepts pings from the timer app """ import os import time ## www.pubnub.com - PubNub Real-time push service in the cloud. # coding=utf8 ## PubNub Real-time Push APIs and Notifications Framework ## Copyright (c) 2010 Stephen Blum ## http://www.pubnub.com/ ## --------------...
565
25.83
121
21
3,513
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_385b7ced9df3d760_6f5e03ad", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 102 ]
[ 108 ]
[ 37 ]
[ 15 ]
2024-11-18T20:43:45.828180+00:00
1,487,233,270,000
35e20d1f4d4608d3cb760c67ec9f386c593894f0
4
{ "blob_id": "35e20d1f4d4608d3cb760c67ec9f386c593894f0", "branch_name": "refs/heads/master", "committer_date": 1487233270000, "content_id": "91d54ef516ebdda5858d7ff3f0a592ff3bbc1f01", "detected_licenses": [ "MIT" ], "directory_id": "a4b161f6a2975073709814187ed01b1ddec3bd2a", "extension": "py", "fi...
4.40625
stackv2
def isWord(secretWord, lettersGuessed): ''' secretWord: string, the word the user is guessing lettersGuessed: list, what letters have been guessed so far returns: boolean, True if lettersGuessed[-1] in secretWord; False otherwise ''' if len(lettersGuessed) > 0: x = False fo...
90
33.42
87
19
690
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_048cf19548bf2bbf_13789338", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 85 ]
[ null ]
[ 19 ]
[ 84 ]
2024-11-18T20:43:51.008408+00:00
1,447,188,028,000
5bfd7527c34940dfc4a754c27285b00511b1c1e6
3
{ "blob_id": "5bfd7527c34940dfc4a754c27285b00511b1c1e6", "branch_name": "refs/heads/master", "committer_date": 1447188028000, "content_id": "c447a9065ea55c6a9c42fb848e06dd19c79e34b4", "detected_licenses": [ "MIT" ], "directory_id": "57f5c2885d893beab0e1daeb1b90b29ae0ac1b54", "extension": "py", "fi...
2.65625
stackv2
import os from django.db import models from django.contrib.auth.models import User import uuid import math def make_uuid(): """ Makes a unique integer identifier """ return str(uuid.uuid1().int >> 64) class Locations(models.Model): """ Creates the model of the Location object(s). """ ...
109
31.78
119
17
834
python
[{"finding_id": "codeql_py/path-injection_d25064b027c8e2bd_00d3e22c", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 92, 93 ]
[ null, null ]
[ 27, 23 ]
[ 39, 35 ]
2024-11-18T20:43:57.501899+00:00
1,572,712,668,000
864e3b145e889014c8a026795b58010b20fed07b
2
{ "blob_id": "864e3b145e889014c8a026795b58010b20fed07b", "branch_name": "refs/heads/master", "committer_date": 1572712668000, "content_id": "c108bc80c4b2610f80c549ba0cf31ea5d3c05c27", "detected_licenses": [ "MIT" ], "directory_id": "b133f6fdf3e3e8a3630c4416ba71c4829b523169", "extension": "py", "fi...
2.390625
stackv2
#!/usr/bin/python from flask import Flask, render_template, request, Response from flask_socketio import SocketIO from flask_restful import Resource, Api from urlparse import urlparse import requests requests.packages.urllib3.disable_warnings() app = Flask(__name__) api = Api(app) socketio = SocketIO(app, cors_allo...
70
23.44
89
16
423
python
[{"finding_id": "codeql_py/full-ssrf_b1d51d3926a9f893_e424162f", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
2
true
[ "CWE-918", "CWE-295" ]
[ "py/full-ssrf", "py/request-without-cert-validation" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 46, 46 ]
[ null, null ]
[ 24, 24 ]
[ 90, 90 ]
2024-11-18T20:43:59.773388+00:00
1,627,238,523,000
0a83335c10f0fb8165255ae22b67f5213d680a90
2
{ "blob_id": "0a83335c10f0fb8165255ae22b67f5213d680a90", "branch_name": "refs/heads/main", "committer_date": 1627238523000, "content_id": "096a9bc70a3ebcede3519370a278830e2f914c7f", "detected_licenses": [ "MIT" ], "directory_id": "ce00d0a458996174283445922e4deaa449c08858", "extension": "py", "file...
2.359375
stackv2
import os from logging.config import dictConfig from flask import Flask, request from feistel import Feistel FLAG = os.environ["FLAG"].encode() KEY = bytes.fromhex(os.environ["KEY"]) dictConfig({ 'version': 1, 'formatters': {'default': { 'format': '[%(asctime)s] %(levelname)s in %(module)s: %(messa...
56
27.02
95
14
420
python
[{"finding_id": "codeql_py/log-injection_6ff097633357909a_1132f2bf", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
5
true
[ "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 35, 41, 45, 49, 55 ]
[ null, null, null, null, null ]
[ 26, 26, 26, 21, 21 ]
[ 91, 86, 92, 95, 59 ]
2024-11-18T20:44:07.267362+00:00
1,574,361,476,000
dc8e820c719204ca73b34822362c646c86d035a6
3
{ "blob_id": "dc8e820c719204ca73b34822362c646c86d035a6", "branch_name": "refs/heads/master", "committer_date": 1574361476000, "content_id": "4d07945dc57384f7ad307df295f9c617e1231c28", "detected_licenses": [ "MIT", "Apache-2.0" ], "directory_id": "0e8e04b56fbcde4ed4301c56387164b44c02eca3", "exten...
2.875
stackv2
from flask import Flask, request from cobe.brain import Brain import json import datetime app = Flask(__name__) ''' STANDARD API HOME MESSAGE ''' @app.route('/') def index(): return "Please reference API documentation" ''' PURPOSE: Provide the api for the chatbot METHOD: Using HTTP for the REST API requests OUT...
76
26.79
75
16
507
python
[{"finding_id": "codeql_py/flask-debug_eb46790e6d58c456_e83138d8", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 76, 72 ]
[ null, null ]
[ 5, 16 ]
[ 49, 36 ]
2024-11-18T20:44:18.094432+00:00
1,559,308,338,000
b571e302ad2c7704f06370ce66584a563b33f24b
3
{ "blob_id": "b571e302ad2c7704f06370ce66584a563b33f24b", "branch_name": "refs/heads/master", "committer_date": 1559308338000, "content_id": "0ce2d31aafa7975a7ed2d086e0bef4a70e5a32f9", "detected_licenses": [ "Apache-2.0" ], "directory_id": "66190ffd320eb5d30835bdf0423352e072f8fb65", "extension": "py"...
2.5625
stackv2
import requests from dcosdeploy.auth import get_base_url, get_auth class SecretsAdapter(object): def __init__(self): self.base_url = get_base_url() + "/secrets/v1/" self._cache_secrets_list = None def list_secrets(self): """Retrive a list of secrets names""" if not self._cache...
62
39.19
137
17
530
python
[{"finding_id": "codeql_py/request-without-cert-validation_cd0672feaf610c4d_10a4662c", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
5
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 13, 24, 46, 48, 56 ]
[ null, null, null, null, null ]
[ 24, 20, 24, 24, 20 ]
[ 112, 107, 76, 138, 110 ]
2024-11-18T20:57:31.096111+00:00
1,577,023,156,000
3528e808369c02a50e744d4f2e28634d55b8844d
3
{ "blob_id": "3528e808369c02a50e744d4f2e28634d55b8844d", "branch_name": "refs/heads/master", "committer_date": 1577023156000, "content_id": "9c9a05470e2269f0d25008b056c1ee3213df6a04", "detected_licenses": [ "MIT" ], "directory_id": "890844d4d519f5b4cab71bdd86c04ce808b5ca2e", "extension": "py", "fi...
3.171875
stackv2
from flask import Flask, request, json, jsonify, redirect, url_for, abort from werkzeug.routing import BaseConverter app = Flask(__name__) @app.route('/') def index(): return 'index' """ 转换器: init方法用来重写regex属性,自定义匹配的正则规则 to_python方法用来把url路由中用户输入的/demo3/1,2,3转换为一个列表[1,2,3],方便后台使用 to_...
95
21.44
73
12
790
python
[{"finding_id": "codeql_py/reflective-xss_5957564126556277_aabcca18", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
3
true
[ "CWE-079", "CWE-079", "CWE-079" ]
[ "py/reflective-xss", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 56, 61, 66 ]
[ null, null, null ]
[ 12, 12, 12 ]
[ 32, 32, 33 ]
2024-11-18T20:58:04.545519+00:00
1,631,915,449,000
b9f27a78c7f7544a61b37fc1e62e9bc7953296cc
3
{ "blob_id": "b9f27a78c7f7544a61b37fc1e62e9bc7953296cc", "branch_name": "refs/heads/master", "committer_date": 1631915449000, "content_id": "41a71fa9b037cc50d354f5b5eeb16030e7ce1853", "detected_licenses": [ "MIT" ], "directory_id": "cc8461174a59712685768ee2ea77f0b0e3368386", "extension": "py", "fi...
2.703125
stackv2
from flask import Flask, send_from_directory, request import os app = Flask(__name__) @app.route("/downloads") def baixar_arquivo(): arquivo = request.args.get('arquivo') print(f"Abrindo o arquivo {arquivo}.") try: return send_from_directory('arquivos', arquivo) except FileNotFoundError as x: ...
16
25.69
55
12
113
python
[{"finding_id": "codeql_py/reflective-xss_cafafad3297f3287_9cf9daeb", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 13 ]
[ null ]
[ 16 ]
[ 54 ]
2024-11-18T20:58:15.835345+00:00
1,473,033,750,000
4e23b1e532f0dfd2313444ef66aa15f2baa6d725
3
{ "blob_id": "4e23b1e532f0dfd2313444ef66aa15f2baa6d725", "branch_name": "refs/heads/master", "committer_date": 1473033750000, "content_id": "4a289006fdc2a324287d5a898f8607d94980cc3e", "detected_licenses": [ "MIT" ], "directory_id": "d5b7633eba97497907bf3af78d977fe63571d66f", "extension": "py", "fi...
2.640625
stackv2
#!/usr/bin/env python3 import os import collections import jinja2 as jinja import markdown import markdown.extensions.meta from shutil import copy2 import logger import sswag_config as configs def main(): # make output directory os.makedirs(configs.www_root, exist_ok=True) # generate templates and pag...
178
37.17
118
18
1,508
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_684daab59e720ca1_6ce951b4", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 61 ]
[ null ]
[ 17 ]
[ 80 ]
2024-11-18T20:58:31.545577+00:00
1,565,041,293,000
8edab040e741761538739a168748e5a07a749c79
2
{ "blob_id": "8edab040e741761538739a168748e5a07a749c79", "branch_name": "refs/heads/master", "committer_date": 1565041293000, "content_id": "62e4ba5aafeac3d50a8ea80a5f079883411666f6", "detected_licenses": [ "MIT" ], "directory_id": "581e10caf0549325ca825cb51e0e91fea372b786", "extension": "py", "fi...
2.40625
stackv2
import json import os from django.contrib.auth.forms import UserCreationForm, PasswordResetForm from django.core.exceptions import ValidationError from django.core.validators import validate_email from rest_framework.views import APIView from rest_framework.response import Response from django.contrib.auth import auth...
178
33.53
118
20
1,176
python
[{"finding_id": "codeql_py/path-injection_4cb4912e8b11e628_158e228b", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 112, 115 ]
[ null, null ]
[ 22, 26 ]
[ 53, 73 ]
2024-11-18T20:58:37.954479+00:00
1,423,547,294,000
ae9a904348cc9cf61b22a5cc5fa52c0dd21052ec
2
{ "blob_id": "ae9a904348cc9cf61b22a5cc5fa52c0dd21052ec", "branch_name": "refs/heads/master", "committer_date": 1423547294000, "content_id": "bd8869f862e7fdfa9d3878175c44744681c1cb64", "detected_licenses": [ "MIT" ], "directory_id": "d03369949462326a5a1e9cf445224309aa17a08d", "extension": "py", "fi...
2.453125
stackv2
# -*- coding: utf-8 -*- from __future__ import absolute_import, unicode_literals import hashlib from wechatpy.utils import to_binary from .base import BaseWeChatAPI class WeChatCustomService(BaseWeChatAPI): def add_account(self, account, nickname, password): """ 添加客服账号 详情请参考 http...
117
27.18
76
13
975
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_4c0afb69cdc7e13c_026644d9", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
3
true
[ "CWE-327", "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.", "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally exp...
[ 23, 45, 67 ]
[ null, null, null ]
[ 32, 32, 32 ]
[ 40, 40, 40 ]
2024-11-18T20:58:41.841191+00:00
1,632,333,685,000
03b8fb241088f01947f400ab6d639f78af9d4c77
2
{ "blob_id": "03b8fb241088f01947f400ab6d639f78af9d4c77", "branch_name": "refs/heads/master", "committer_date": 1632333685000, "content_id": "2005d5211de1b3fcfb71d786dee286f8a34c7c00", "detected_licenses": [ "Apache-2.0" ], "directory_id": "f4980b90cd78e8512649c7a35614e8a8df2b7854", "extension": "py"...
2.484375
stackv2
from typing import Any, Optional, Dict, Callable from nornir.core.task import Result, Task from jinja2 import Environment, FileSystemLoader, StrictUndefined FiltersDict = Optional[Dict[str, Callable[..., str]]] def template_file( task: Task, template: str, path: str, jinja_filters: Optional[Filters...
45
29.09
90
14
312
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_6973e387f8db3a51_7a78c07f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 38 ]
[ 40 ]
[ 15 ]
[ 10 ]
2024-11-18T21:10:10.652525+00:00
1,666,929,698,000
db4b0e1923d335083df2e38df394815db7878503
2
{ "blob_id": "db4b0e1923d335083df2e38df394815db7878503", "branch_name": "refs/heads/master", "committer_date": 1666929698000, "content_id": "9768659ce39aad63ca3d1e20e86905b4aa310fcf", "detected_licenses": [ "MIT" ], "directory_id": "bd9a09a3f1a8b2b5166c540ada93cc5b30591605", "extension": "py", "fi...
2.4375
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- ''' name: dedecms版本探测 referer: unknow author: Lucifer description: 亿邮邮件系统存在弱口令账户信息泄露,导致非法登录 ''' import re import sys import requests class dedecms_version_BaseVerify: def __init__(self, url): self.url = url def check_ver(self, arg): ver_histroy =...
62
31.08
148
17
725
python
[{"finding_id": "codeql_py/request-without-cert-validation_e1501091226d3046_c8b341ca", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 51 ]
[ null ]
[ 19 ]
[ 83 ]
2024-11-18T21:10:22.139521+00:00
1,540,538,927,000
56eb269ac6fc4563de02c736ef5e1bb7750e2af5
3
{ "blob_id": "56eb269ac6fc4563de02c736ef5e1bb7750e2af5", "branch_name": "refs/heads/master", "committer_date": 1540538927000, "content_id": "45c3079fed1d1aa9892247049426125f3b413df2", "detected_licenses": [ "MIT" ], "directory_id": "4e27031f12022ccd55355351debf4c2f76d09c2d", "extension": "py", "fi...
2.53125
stackv2
# 作者: Charles # 公众号: Charles的皮卡丘 # 酷狗音乐: # -http://www.kugou.com/ import re import os import click import urllib import requests from contextlib import closing ''' 输入: -songname: 歌名 -downnum: 歌曲下载数量 -savepath: 歌曲保存路径 -app: Cmd/Demo中使用 返回值: -downednum: 歌曲实际下载数量 ''' class kugou(): def __init__(self): self.head...
107
33.48
148
25
1,100
python
[{"finding_id": "codeql_py/request-without-cert-validation_bb48cd8ab269a2ea_26bd14a0", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 71 ]
[ null ]
[ 18 ]
[ 93 ]
2024-11-18T21:10:29.851083+00:00
1,542,670,614,000
f8b1b5a74874fad47bf41c3d8b9c6fea4e123563
3
{ "blob_id": "f8b1b5a74874fad47bf41c3d8b9c6fea4e123563", "branch_name": "refs/heads/master", "committer_date": 1542670614000, "content_id": "e009927c36f6fe5b730ef6cf2b5ff5a83cd92fd2", "detected_licenses": [ "MIT" ], "directory_id": "fdb486c199378321fc4a81a1e2aa1fb3244ab812", "extension": "py", "fi...
3.484375
stackv2
def part1_valid(pw): words = pw.split() return len(set(words)) == len(words) def part2_valid(pw): words = pw.split() sorted_words = [''.join(sorted(w)) for w in words] return len(set(sorted_words)) == len(words) def count_valid_passwords(lines, validator): return sum(1 for pw in lines if val...
24
23.83
54
11
155
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_46acc4d7d939c610_3a2f6bc5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 19, 22 ]
[ 20, 23 ]
[ 11, 11 ]
[ 51, 51 ]
2024-11-18T21:10:30.889247+00:00
1,633,665,949,000
b84583f9ed94f573664841591c1a32dd100d0738
3
{ "blob_id": "b84583f9ed94f573664841591c1a32dd100d0738", "branch_name": "refs/heads/main", "committer_date": 1633665949000, "content_id": "82306cbdc4bebfd3840ab0f873901614737a4644", "detected_licenses": [ "MIT" ], "directory_id": "0116df7d131878ccc098cc5995ee9ab0445824fb", "extension": "py", "file...
2.859375
stackv2
import socket import argparse import subprocess import ssl class ServerRat: def __init__(self, listen_host, listen_port): self.listen_host = listen_host self.listen_port = int(listen_port) def create_server_socket(self): with socket.socket(socket.AF_INET, socket.SOCK_STREAM) as serve...
86
36.98
113
20
590
python
[{"finding_id": "codeql_py/insecure-protocol_05856cf8250dcc2a_d56e8800", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol...
1
true
[ "CWE-327" ]
[ "py/insecure-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.SSLContext](1)." ]
[ 41 ]
[ null ]
[ 18 ]
[ 25 ]
2024-11-18T21:11:02.222452+00:00
1,584,651,463,000
ac50f97cc3f601744067fd98d67a2905aa66f4ac
2
{ "blob_id": "ac50f97cc3f601744067fd98d67a2905aa66f4ac", "branch_name": "refs/heads/master", "committer_date": 1584651463000, "content_id": "48ce26034ac22eb1a2ef72347618255f7b042d31", "detected_licenses": [ "Apache-2.0" ], "directory_id": "ec70c0d61147640844f5d82925e752cf999bc887", "extension": "py"...
2.3125
stackv2
import os import tempfile import tarfile from contextlib import closing from flask import request, make_response, send_file from data.database import configure from config_app.c_app import app, config_provider from config_app.config_endpoints.api import resource, ApiResource, nickname from config_app.config_util.ta...
69
30.81
98
18
447
python
[{"finding_id": "codeql_py/tarslip_a3296c9afb1a90c1_795619ce", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 60 ]
[ null ]
[ 13 ]
[ 23 ]
2024-11-18T21:11:03.462264+00:00
1,537,380,949,000
f191241b71f8295c127a2fe4bffc3416034bd03e
3
{ "blob_id": "f191241b71f8295c127a2fe4bffc3416034bd03e", "branch_name": "refs/heads/master", "committer_date": 1537380949000, "content_id": "794f81527deaf78650cbef16e6f600fb42c7be49", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e7208f2e6c03c171b18708991b30829095284d1c", "extension": "py"...
2.84375
stackv2
#!/usr/bin/env python """ Alternate solution to the OS Upgrade Example. This was the one I created during my initial planning and experimentation. """ from __future__ import print_function, unicode_literals from getpass import getpass from datetime import datetime import re import sys from netmiko import ConnectHandle...
156
28.18
93
14
1,034
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_71832aecff68da03_2c138eed", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 52, 101 ]
[ null, null ]
[ 11, 11 ]
[ 66, 24 ]
2024-11-18T19:03:27.506358+00:00
1,622,326,434,000
ea85c58618a5d2b2ea610862d5be9cff3336bd67
3
{ "blob_id": "ea85c58618a5d2b2ea610862d5be9cff3336bd67", "branch_name": "refs/heads/main", "committer_date": 1622326434000, "content_id": "daae885dd6dd4ca1844f804de67a75c281b239d1", "detected_licenses": [ "Apache-2.0" ], "directory_id": "8afc1a63aef20b4f38ae700f5832d16bdd443a01", "extension": "py", ...
2.546875
stackv2
#!/usr/bin/env python ############################################################################## # Copyright (c) 2021 Intel Corporation # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at...
129
34.67
137
18
1,131
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9adf81bbcce6c25d_82314c03", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 101, 118 ]
[ null, null ]
[ 23, 27 ]
[ 102, 106 ]
2024-11-18T19:03:28.873840+00:00
1,578,739,034,000
8c6ca85b2af1eb69ca2f37914a56a583ea20953a
2
{ "blob_id": "8c6ca85b2af1eb69ca2f37914a56a583ea20953a", "branch_name": "refs/heads/master", "committer_date": 1578739034000, "content_id": "0b23366ae86df1a6b29e16d40bb9c4b767d88464", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e1517a4f37fe141e1fed134e05954be841a0d3b5", "extension": "py"...
2.421875
stackv2
import paramiko class node_manager: ''' exec command on ssh client @param self @param command - command to execute @return stdout form ssh ''' def exec(self, command): ssh_stdin, ssh_stdout, ssh_stderr = self.ssh.exec_command(command) #wait to complete return ssh_std...
134
23.52
94
14
805
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_8609a13501a04eb8_acdc843c", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 35 ]
[ null ]
[ 9 ]
[ 71 ]
2024-11-18T19:03:40.678761+00:00
1,604,940,240,000
ca995157bd939a13b353756c98ed651986372fee
2
{ "blob_id": "ca995157bd939a13b353756c98ed651986372fee", "branch_name": "refs/heads/master", "committer_date": 1604940240000, "content_id": "7b758ee6ce2e9f9525a9acaccaab2f87247a3add", "detected_licenses": [ "MIT" ], "directory_id": "b5e773f542be774d547232ddb63c699b0bf7eb0a", "extension": "py", "fi...
2.453125
stackv2
import logging from pathlib import Path import mondrian import boto3 import pandas as pd import tempfile from warehouse.components.constants import TRAINING_PERCENTAGE mondrian.setup(excepthook=True) logger = logging.getLogger() class PipelineConfig: """ Configuration settings for the whole pipeline """ ...
216
32.61
88
22
1,455
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_dbb71c727d93734a_f08417bc", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 89, 92 ]
[ null, 94 ]
[ 26, 17 ]
[ 65, 48 ]
2024-11-18T20:18:21.928345+00:00
1,629,579,239,000
d7fd0f2d059942bf5024cd4476b40004ee0ce717
2
{ "blob_id": "d7fd0f2d059942bf5024cd4476b40004ee0ce717", "branch_name": "refs/heads/main", "committer_date": 1629579239000, "content_id": "171c44d9b3f64241a77789d82a7c292088241b5a", "detected_licenses": [ "MIT" ], "directory_id": "ec27b985c55977c51fc7f37f8aa58312033ede3d", "extension": "py", "file...
2.484375
stackv2
#!/usr/bin/env python3 import mysql.connector import os.path from db_tunnel import DatabaseTunnel DB_HOST = "cs.westminstercollege.edu" DB_SSH_PORT = 2322 DB_SSH_USER = "student" DB_PORT = 3306 # Default connection information (can be overridden with command-line arguments) DB_SSH_KEYFILE = "id_rsa.cmpt307" DB_NAME ...
252
35.55
169
18
2,215
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9f481ba0f52dad6a_7856002f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 231 ]
[ null ]
[ 15 ]
[ 152 ]
2024-11-18T19:07:24.313422+00:00
1,544,590,835,000
af97f4b7037540ba22de7037c42b7c7ba76758f7
2
{ "blob_id": "af97f4b7037540ba22de7037c42b7c7ba76758f7", "branch_name": "refs/heads/master", "committer_date": 1544590835000, "content_id": "138df68f640a568640fba6925efba7074f05636d", "detected_licenses": [ "Apache-2.0" ], "directory_id": "85eea88d68939ba6b9ffdebe2c6d81c5dcd059f2", "extension": "py"...
2.484375
stackv2
""" Rackspace Cloud Files """ import logging import requests import hashlib from rcbu.common.command import Command class CloudFiles(Command): """ Primary Cloud Files API Class """ def __init__(self, sslenabled, authenticator): """ Setup the CloudFiles API Class in the same manner as...
132
42.58
138
26
1,276
python
[{"finding_id": "codeql_py/request-without-cert-validation_9279a2647bec3b04_fb3de512", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 95 ]
[ null ]
[ 23 ]
[ 81 ]
2024-11-18T19:07:42.577611+00:00
1,596,959,736,000
acfe6b87e67d44725cf32b033726dfb16d31865d
3
{ "blob_id": "acfe6b87e67d44725cf32b033726dfb16d31865d", "branch_name": "refs/heads/master", "committer_date": 1596959736000, "content_id": "b36320b9a664767f9d9de0600b060b52361ed93a", "detected_licenses": [ "MIT" ], "directory_id": "4a14bc1f48ad153a13f5663ecd9f4da6c9208c45", "extension": "py", "fi...
2.921875
stackv2
import os import tarfile from src.data.helpers import DATA_DIR import pandas as pd def unpack_tar_file(file: str = "cal_housing.tgz"): """ Unpack zipped file into present directory. """ file = os.path.join(DATA_DIR, "raw", file) with tarfile.open(file) as tar: tar.extractall(path="raw") ...
40
24.15
88
11
254
python
[{"finding_id": "codeql_py/tarslip_1023ed5d5d413e8e_d11843b6", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 13 ]
[ null ]
[ 9 ]
[ 12 ]
2024-11-18T19:07:47.553865+00:00
1,616,413,730,000
d63c5acc326e0a0f8c7a8a922f4f5e00ec260ad0
2
{ "blob_id": "d63c5acc326e0a0f8c7a8a922f4f5e00ec260ad0", "branch_name": "refs/heads/master", "committer_date": 1616413730000, "content_id": "f16aeb4d95a01361cb8d8e69c4b0a26dd53a5178", "detected_licenses": [ "MIT" ], "directory_id": "2990c16d3d1fce981f06ab121ba6b6538bc10152", "extension": "py", "fi...
2.359375
stackv2
import subprocess import uuid from flask import Flask, Response, request app = Flask(__name__) @app.route('/', methods=['GET', 'POST']) def home(): voice = request.form.get("voice") message = request.form.get("message") supported_voices = ['anna', 'alan', 'aleksandr', 'anatol', 'azamat', 'elena', 'irin...
36
30.75
97
13
298
python
[{"finding_id": "codeql_py/command-line-injection_a6e833a7c493c163_32a8f18d", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {...
2
true
[ "CWE-078", "CWE-209" ]
[ "py/command-line-injection", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This command line depends on a [user-provided value](1).", "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 25, 32 ]
[ null, null ]
[ 36, 25 ]
[ 49, 32 ]
2024-11-18T19:07:49.531768+00:00
1,579,383,462,000
069dab840d956ee512d5242c901909cc2655ba9e
3
{ "blob_id": "069dab840d956ee512d5242c901909cc2655ba9e", "branch_name": "refs/heads/master", "committer_date": 1579383462000, "content_id": "6bf221001103d1bbe9c794f6f8a37782c5be318c", "detected_licenses": [ "Unlicense" ], "directory_id": "f34e78f489c03c91496d06213e644023b156376a", "extension": "py",...
2.8125
stackv2
#---------------------------------------------------------- import hashlib #--------------------------------#encript password#--------------------------------- #sha1------------------------------------------------------ def encrypt_password_sha1(password): encrypt=hashlib.sha1(password.encode()) return encry...
36
33.08
84
10
208
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_f341a9433b3c7401_d8c72a3f", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse...
6
true
[ "CWE-327", "CWE-327", "CWE-327", "CWE-327", "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.", "[Sensitive data (password)](1) is used in a hashing algorithm (SHA224) that is insecure for password hashing, since it is not a computationally...
[ 9, 14, 19, 24, 29, 34 ]
[ null, null, null, null, null, null ]
[ 26, 28, 28, 28, 28, 25 ]
[ 43, 45, 45, 45, 45, 42 ]
2024-11-18T19:07:54.972930+00:00
1,599,146,539,000
d9211532cf6a050b86bdd0eea98eab77af96ce70
3
{ "blob_id": "d9211532cf6a050b86bdd0eea98eab77af96ce70", "branch_name": "refs/heads/master", "committer_date": 1599146539000, "content_id": "9cf4734fdaa1bc45a76de15c5d6b912ef6402091", "detected_licenses": [ "MIT" ], "directory_id": "bb315a23cb30cb5f2db80b1df6181b8d57f1dcb1", "extension": "py", "fi...
2.9375
stackv2
from flask import Flask, request import pandas as pd import numpy as np import json app = Flask(__name__) columns = ['Age', 'Fare', 'FamilySize', 'IsMother', 'IsMale', 'Deck_A', 'Deck_B', 'Deck_C', 'Deck_D', 'Deck_E', 'Deck_F', 'Deck_G', 'Deck_Z', 'Pclass_1', 'Pclass_2', 'Pclass_3', 'Title_Lady'...
43
27
80
12
364
python
[{"finding_id": "codeql_py/flask-debug_80e648a1de528901_addd4cc2", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-079", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 38, 21, 34 ]
[ null, null, null ]
[ 5, 12, 12 ]
[ 36, 27, 27 ]
2024-11-18T19:07:55.619738+00:00
1,576,571,068,000
40d22852c609e5c7a8530c87086b5da1922f0408
3
{ "blob_id": "40d22852c609e5c7a8530c87086b5da1922f0408", "branch_name": "refs/heads/master", "committer_date": 1576571068000, "content_id": "54fd47e439f554aa22f32d7e9faedcddecb2e624", "detected_licenses": [ "MIT" ], "directory_id": "373d47e348ceb326b43a4871ac2a5ea78833fb92", "extension": "py", "fi...
2.6875
stackv2
try: import os import logging from functools import wraps from flask import Flask, request, abort from waitress import serve from twilio.request_validator import RequestValidator from telegram import ParseMode from telegram.ext import Updater, CommandHandler except ImportError as err: ...
147
34
92
15
1,180
python
[{"finding_id": "codeql_py/log-injection_fd7fc4af966e081d_428bd935", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
5
true
[ "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 91, 100, 109, 123, 132 ]
[ null, null, null, null, null ]
[ 40, 48, 17, 45, 17 ]
[ 59, 67, 33, 64, 33 ]
2024-11-18T19:07:59.918157+00:00
1,594,900,708,000
3c342ac7448b3e04a48518b8bc41e9300c2de088
4
{ "blob_id": "3c342ac7448b3e04a48518b8bc41e9300c2de088", "branch_name": "refs/heads/master", "committer_date": 1594900708000, "content_id": "5a206bb2947d085713431bd681c001c839c7a90b", "detected_licenses": [ "MIT" ], "directory_id": "d335ca3095778973bc47e07632b184409f2009a5", "extension": "py", "fi...
3.984375
stackv2
import random def generatePassword(pwlength): alphabet = "abcdefghijklmnopqrstuvwxyz" passwords = [] for i in pwlength: password = "" for j in range(i): next_letter_index = random.randrange(len(alphabet)) password = password + alphabet[next_letter_index...
61
25.52
95
17
370
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_016d68588763abac_32db30e0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (p...
[ 43, 59 ]
[ null, null ]
[ 11, 16 ]
[ 56, 57 ]
2024-11-18T19:18:41.486119+00:00
1,508,943,623,000
cff18336f931aa382296c7059dcbc268e3856450
3
{ "blob_id": "cff18336f931aa382296c7059dcbc268e3856450", "branch_name": "refs/heads/master", "committer_date": 1508943623000, "content_id": "73730c20873173b0b53cf4d9caf1b0176b53a7e4", "detected_licenses": [ "MIT" ], "directory_id": "265e4551126101d29e3bce79641a4ed720ea5289", "extension": "py", "fi...
2.71875
stackv2
from flask import Flask, render_template, request from flask_sqlalchemy import SQLAlchemy from sqlalchemy.dialects.postgresql import UUID as pgUUID, TEXT import uuid import os import hashlib import base64 app = Flask(__name__) app.debug = True app.config["SQLALCHEMY_DATABASE_URI"] = "postgresql://dbadmin@localhost:543...
153
35.24
117
16
1,170
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_9a36fbd9c30129ef_0b88f31e", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi...
[ 46 ]
[ null ]
[ 21 ]
[ 45 ]
2024-11-18T19:18:44.981933+00:00
1,561,385,893,000
a33706eb41d47cd89aac35c267ad60b11bb5a5fa
4
{ "blob_id": "a33706eb41d47cd89aac35c267ad60b11bb5a5fa", "branch_name": "refs/heads/master", "committer_date": 1561385893000, "content_id": "790c28b55d314170ea807611560eda7af16dbf0b", "detected_licenses": [ "MIT" ], "directory_id": "c7840ff29c6389021d9e1cae23d4ade7c8003f22", "extension": "py", "fi...
3.5625
stackv2
"""A simple CLI app to practice grammatical genders of German nouns.""" import argparse import json import pathlib import pandas as pd class WordList: """Data structure to store a pandas dataframe and some structural details. Args: path (pathlib.Path or None): The path (without suffix) to a wor...
420
31.45
91
17
2,908
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_176e9349ad131f3f_6dc76a5e", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 72, 354 ]
[ null, null ]
[ 21, 19 ]
[ 47, 66 ]
2024-11-18T19:18:53.385969+00:00
1,581,519,785,000
2f4ec1f55546a4f0f2e2177e41d633ab28f5edfe
2
{ "blob_id": "2f4ec1f55546a4f0f2e2177e41d633ab28f5edfe", "branch_name": "refs/heads/master", "committer_date": 1581519785000, "content_id": "760800305040675675bcbd1597705f0befced090", "detected_licenses": [ "MIT" ], "directory_id": "f7e30fb3b0de1e7afbf5a498fadff96ee6834ca1", "extension": "py", "fi...
2.5
stackv2
import sys import re import os from sockpot.server import Server from sockpot.dummy import Dummy, dummy from sockpot.conf.utils import import_by_path def find_calee(*sysargs): args = ' '.join(sysargs) path_matcher = re.compile('--path\s*=\s*([a-zA-z0-9_\-./]+)') posix_path = path_matcher.search(args) ...
63
33.27
107
17
573
python
[{"finding_id": "codeql_py/overly-large-range_365f48f8b424eedb_8c0a451b", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
5
true
[ "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "Suspicious character range that overlaps wi...
[ 12, 17, 40, 45, 50 ]
[ null, null, null, null, null ]
[ 50, 54, 50, 50, 55 ]
[ 53, 57, 53, 53, 58 ]
2024-11-18T19:18:57.471197+00:00
1,635,536,659,000
1edb35fad9c06d16c3237ba5a6b3dd599ed5adbb
3
{ "blob_id": "1edb35fad9c06d16c3237ba5a6b3dd599ed5adbb", "branch_name": "refs/heads/main", "committer_date": 1635536659000, "content_id": "3526560a57b8fbe05f66dfcd989503f0cf001cd1", "detected_licenses": [ "MIT" ], "directory_id": "246096c11c7ac7bd47fdf81f0be5faede3588f40", "extension": "py", "file...
2.984375
stackv2
import pickle import random import re import string from time import time import nltk from nltk import NaiveBayesClassifier, classify from nltk.corpus import stopwords, twitter_samples from nltk.stem.wordnet import WordNetLemmatizer from nltk.tag import pos_tag from nltk.tokenize import word_tokenize # # nltk.downloa...
117
32.88
102
16
907
python
[{"finding_id": "codeql_py/overly-large-range_9db84700781825eb_21554c2a", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 35 ]
[ null ]
[ 59 ]
[ 63 ]
2024-11-18T19:19:00.530283+00:00
1,620,112,302,000
bff5f1a816f120d31d8ff6d267fcbed61ae9c9a3
2
{ "blob_id": "bff5f1a816f120d31d8ff6d267fcbed61ae9c9a3", "branch_name": "refs/heads/main", "committer_date": 1620112302000, "content_id": "4e8ae2888ed4910cada595c444f9327366ef7a10", "detected_licenses": [ "MIT" ], "directory_id": "aeac5b7244679951726389920cd7b300fc8ea271", "extension": "py", "file...
2.484375
stackv2
from flask import Flask, render_template, request, Response from flask_pymongo import PyMongo import json from werkzeug.security import generate_password_hash, check_password_hash #Cifrar y descifrar contraseñas de usuario from bson import json_util from bson.objectid import ObjectId app= Flask(__name__) app.config['...
56
25.52
116
14
348
python
[{"finding_id": "codeql_py/flask-debug_7823abf1d7a2510b_0cde62be", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 56, 28 ]
[ null, null ]
[ 5, 16 ]
[ 24, 24 ]
2024-11-18T19:19:13.689585+00:00
1,399,218,215,000
ac3ee25da414e8a87669df8715cf01aa6d1d84e5
3
{ "blob_id": "ac3ee25da414e8a87669df8715cf01aa6d1d84e5", "branch_name": "refs/heads/master", "committer_date": 1399218425000, "content_id": "ccd8c5fef9e7b0bbb2b89c5f53d4d14053afa3b9", "detected_licenses": [ "MIT" ], "directory_id": "26903b08fe5380848b80b77749184f4cd3873466", "extension": "py", "fi...
2.90625
stackv2
""" marvin.views.movies ~~~~~~~~~~~~~~~~~~~ Endpoints related to movies. """ # pylint: disable=no-self-use from ..models import Movie from flask import request from flask.ext.restful import Resource from logging import getLogger _logger = getLogger('marvin.views.movies') class MovieDetailView(Resourc...
77
34.88
117
22
565
python
[{"finding_id": "codeql_py/log-injection_ca003fd96479a67d_2bc048db", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
4
true
[ "CWE-117", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 55, 58, 64, 67 ]
[ null, null, null, null ]
[ 55, 68, 105, 87 ]
[ 67, 80, 117, 99 ]
2024-11-18T19:29:38.734434+00:00
1,607,973,911,000
e8a3a4d7ba84a92e6ad4cad9d949e78da1fb6d16
3
{ "blob_id": "e8a3a4d7ba84a92e6ad4cad9d949e78da1fb6d16", "branch_name": "refs/heads/master", "committer_date": 1607973911000, "content_id": "b0312487ba80aa91a297b79fa8f71dc7dc6e6d1e", "detected_licenses": [ "MIT" ], "directory_id": "8991bc83219cab6f99cc3da3c93f25fa9dcdf9f2", "extension": "py", "fi...
3.140625
stackv2
from flask import render_template, request, session, redirect from qa327 import app import qa327.backend as bn import datetime import re """ This file defines the front-end part of the service. It elaborates how the services should handle different http requests from the client (browser) through templating. The html ...
447
32.6
114
15
3,326
python
[{"finding_id": "codeql_py/overly-large-range_c3304b57373b359d_79ca934f", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[\\/0-9\\].", "remediation": "", "location": {"file_p...
6
true
[ "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-1333", "CWE-1333" ]
[ "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/redos", "py/polynomial-redos" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[\\/0-9\\].", "Suspicious character range that is equivalent to \\[\\/0-9\\].", "Suspicious character range that is equivalent to \\[#$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\].", "Suspicious character range that is equivalent to \\[\\/0-9\\].", "This part of t...
[ 82, 82, 83, 84, 82, 85 ]
[ null, null, null, null, null, null ]
[ 36, 61, 29, 38, 53, 21 ]
[ 40, 65, 33, 42, 76, 26 ]
2024-11-18T19:29:48.297565+00:00
1,598,981,849,000
bfe61566f60b919a4c1f6b56d4af04aca646b178
2
{ "blob_id": "bfe61566f60b919a4c1f6b56d4af04aca646b178", "branch_name": "refs/heads/master", "committer_date": 1598981849000, "content_id": "1cd881f9de0a9712cd0134bcbb0c0a721c25ff49", "detected_licenses": [ "MIT" ], "directory_id": "685ad3792a6d256616c66a7194f3769024be1590", "extension": "py", "fi...
2.3125
stackv2
from app import app from flask import render_template, jsonify, request, url_for, redirect, flash from app.forms import loginForm from app.datafile_functions import get_data from flask_login import login_user, logout_user, current_user from app.models import User from werkzeug.urls import url_parse @app.route('/index...
59
30.73
84
16
398
python
[{"finding_id": "codeql_py/url-redirection_bf96d112be9170c0_9f29899f", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 36 ]
[ null ]
[ 25 ]
[ 34 ]
2024-11-18T19:44:29.184831+00:00
1,526,723,543,000
abebc64175f21103e4cd4370fc7d4f2a84b81873
2
{ "blob_id": "abebc64175f21103e4cd4370fc7d4f2a84b81873", "branch_name": "refs/heads/master", "committer_date": 1526723543000, "content_id": "15534d4c5205f3ce542860a62b0885c7fcfd50ee", "detected_licenses": [ "MIT" ], "directory_id": "541ec83ef9a5804c9bd83546ad849b54483a8c1b", "extension": "py", "fi...
2.390625
stackv2
from flask import Flask, render_template, request app = Flask(__name__) @app.route("/") @app.route("/index") @app.route("/home") def index(): return render_template("landing.html") @app.route("/about") def about(): return render_template('about.html') @app.route("/contact") def contact(): return "This i...
32
21.91
105
12
177
python
[{"finding_id": "codeql_py/flask-debug_eed86b5ac40c65f5_6698d0f5", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 32, 28 ]
[ null, null ]
[ 5, 12 ]
[ 24, 106 ]
2024-11-18T19:44:33.696597+00:00
1,634,065,187,000
dcbdf4ce3218c6a3a75af072c9a95e43aa48c702
2
{ "blob_id": "dcbdf4ce3218c6a3a75af072c9a95e43aa48c702", "branch_name": "refs/heads/main", "committer_date": 1634065187000, "content_id": "ec3d99e20116b05e3d08d4662e8896cb7221bbc4", "detected_licenses": [ "BSD-3-Clause", "Apache-2.0", "MIT" ], "directory_id": "ab41863bd85739c6709e41c28df1d0886...
2.5
stackv2
# coding=utf-8 # Copyright 2021 The vMF Embeddings Authors. # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicabl...
89
32.07
86
13
744
python
[{"finding_id": "codeql_py/tarslip_073afe74a2e28863_e11feae0", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 39 ]
[ null ]
[ 5 ]
[ 8 ]
2024-11-18T19:44:40.286429+00:00
1,686,609,299,000
923a7915dd7ec8427d01b9a77fb0bbf3e307571d
3
{ "blob_id": "923a7915dd7ec8427d01b9a77fb0bbf3e307571d", "branch_name": "refs/heads/master", "committer_date": 1686609299000, "content_id": "cb027f8a22f77e3de556cd5d3920d44c2b8efed8", "detected_licenses": [ "MIT" ], "directory_id": "5ddfc1c2ecbf0cb02e2865cea853f66df0aadaba", "extension": "py", "fi...
2.875
stackv2
from os.path import join, dirname, exists from os import makedirs, chmod, listdir, rmdir import shutil from glob import glob # Logging from redata.commons.logger import log_stdout # Read in default configuration settings from ..config import config_default_dict class MoveClass: """ Purpose: Python int...
208
38.92
103
21
1,676
python
[{"finding_id": "codeql_py/overly-permissive-file_5bbe0b2e4c6af82e_1a6ec9f4", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world writable." ]
[ 102 ]
[ null ]
[ 17 ]
[ 40 ]
2024-11-18T19:44:42.742293+00:00
1,611,157,635,000
21f759da8c88a96a4722df1503cccac48607733b
3
{ "blob_id": "21f759da8c88a96a4722df1503cccac48607733b", "branch_name": "refs/heads/main", "committer_date": 1611157635000, "content_id": "66b9a464aee1b908abcbd2220bdba741c9f49748", "detected_licenses": [ "MIT" ], "directory_id": "e0f3eb917171b15612bc36f20d3e696e5d962ccb", "extension": "py", "file...
3.140625
stackv2
from tkinter import * from tkinter import messagebox from random import choice, randint, shuffle import pyperclip # ------------------ CONSTANTS ------------------ # GREEN = "#7CDAB8" RED = "#EE6587" FONT = ("Helvetica", 13, "normal") VALIDATION_FONT = ("Helvetica", 11, "normal") # ------------------ PASSWORD GENERAT...
149
35.56
119
17
1,339
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_6ea18026602b5535_71bae21a", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text." ]
[ 53 ]
[ null ]
[ 28 ]
[ 65 ]
2024-11-18T20:10:19.908378+00:00
1,599,027,999,000
867ea48c299ca6b6ba857a2d64c935e03688defb
3
{ "blob_id": "867ea48c299ca6b6ba857a2d64c935e03688defb", "branch_name": "refs/heads/master", "committer_date": 1599027999000, "content_id": "43c27e53f8550c5399fe505f8fe0a363740d0432", "detected_licenses": [ "Apache-2.0" ], "directory_id": "eda91e45e20469c6c6d230d0dd9370c3e7c5bbe4", "extension": "py"...
2.953125
stackv2
# -*- coding: utf-8 -*- """ Created on Mon Jul 13 13:58:52 2020 @author: ganeshmaruti """ ### SPAM DETECTION PROJECT USING BAG OF WORDS AND TFIFDF ALGORITHMS #importing necessary Libraries import pandas as pd import re import nltk from nltk.corpus import stopwords from nltk.stem import PorterStemmer from nltk.stem ...
92
25.9
121
12
632
python
[{"finding_id": "codeql_py/overly-large-range_08ade44f47a74ee9_5951f303", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 37 ]
[ null ]
[ 26 ]
[ 29 ]
2024-11-18T20:23:16.605165+00:00
1,683,743,253,000
b880fcccce9beee8e4672bcf99b727e01ffd0328
3
{ "blob_id": "b880fcccce9beee8e4672bcf99b727e01ffd0328", "branch_name": "refs/heads/master", "committer_date": 1683743253000, "content_id": "9ec8841338902f798e098538d54bd295ffc1bce7", "detected_licenses": [ "MIT" ], "directory_id": "db5cc66ffe6ce1eb4ddb056f17878ad158463732", "extension": "py", "fi...
2.6875
stackv2
"""Helper program/funtions to find endpoint in an ACI Fabric""" import ipaddress import requests import xml.etree.ElementTree as ET import warnings import json # Ignore HTTP warnings warnings.filterwarnings('ignore', message='Unverified HTTPS request') leafs = [] def get_endpoint_by_mac(endpoint, session, apic) -> ...
242
34.51
136
20
2,190
python
[{"finding_id": "codeql_py/request-without-cert-validation_9983ef3bc511f345_54bd0916", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
5
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 25, 26, 53, 54, 228 ]
[ null, null, null, null, null ]
[ 19, 21, 19, 21, 13 ]
[ 53, 56, 53, 56, 59 ]
2024-11-18T20:23:27.590234+00:00
1,509,995,686,000
48b1668e9f2de835f476ef71a19eedd60bf2d97a
3
{ "blob_id": "48b1668e9f2de835f476ef71a19eedd60bf2d97a", "branch_name": "refs/heads/master", "committer_date": 1509995686000, "content_id": "c3f79955cd99079bdc5f825a7219c960a3ddcffd", "detected_licenses": [ "MIT" ], "directory_id": "12e4e2729b8e0b18f3cccd86ffaff6a1a8d52e4d", "extension": "py", "fi...
2.9375
stackv2
import requests from lxml import html from urllib.parse import unquote from collections import namedtuple, deque class SongSearchService(object): def get_songs(self, search_string, limit=None): raise NotImplementedError LastFMLink = namedtuple('LastFMLink', 'artist song url') class TuneFM(SongSearchSer...
113
35.97
109
19
907
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_dd265ea8ddb52b64_d6c076e0", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [youtube.com](1) may be at an arbitrary position in the...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [youtube.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 41 ]
[ null ]
[ 24 ]
[ 72 ]
2024-11-18T20:23:27.927551+00:00
1,615,321,367,000
15783ffa9784fb54a3a5d1c1d0e8e4ae0474ffc5
2
{ "blob_id": "15783ffa9784fb54a3a5d1c1d0e8e4ae0474ffc5", "branch_name": "refs/heads/master", "committer_date": 1615321367000, "content_id": "c8f0a46ac39566f8b2e627ced1d5578beb30de09", "detected_licenses": [ "MIT" ], "directory_id": "fbd892472a3df8cecd7d5c838b650a965c83f921", "extension": "py", "fi...
2.3125
stackv2
from flask import render_template,request,redirect,url_for,abort,flash from . import auth from flask_login import login_user,logout_user,login_required,current_user from ..models import Post,User from werkzeug.security import generate_password_hash, check_password_hash from .forms import LoginForm,RegistrationForm from...
45
33.51
106
16
330
python
[{"finding_id": "codeql_py/url-redirection_fb6336177ef5d474_65ca723a", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 31 ]
[ null ]
[ 29 ]
[ 78 ]
2024-11-18T20:49:18.211367+00:00
1,612,136,636,000
19b4e6fbb2f387ab056672afc6590938cdc8d5bf
3
{ "blob_id": "19b4e6fbb2f387ab056672afc6590938cdc8d5bf", "branch_name": "refs/heads/main", "committer_date": 1612136636000, "content_id": "2d2e838a625942de99c229dea81180a7a33417af", "detected_licenses": [ "MIT" ], "directory_id": "1c6ea8e8dc156d59f3f2e6b3591dec5d90d28bd9", "extension": "py", "file...
3.4375
stackv2
#==================================================================== # PASSWORD MANAGER # Author: Luca Mastroianni # Description: Password Manager developed for my personal use. # It reads and save data from a JSON dictionary. # # LICENSE: MIT #==================================================================== imp...
72
24.68
79
18
478
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_791baf0ef2971978_cdea5210", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 50 ]
[ null ]
[ 11 ]
[ 42 ]
2024-11-18T20:49:28.936287+00:00
1,599,056,169,000
743b5a3f395d8b75f7496de1e0e95def715fa825
3
{ "blob_id": "743b5a3f395d8b75f7496de1e0e95def715fa825", "branch_name": "refs/heads/master", "committer_date": 1599056169000, "content_id": "7cd73421299c56a48cc2718cd91d197a277faec1", "detected_licenses": [ "MIT" ], "directory_id": "22c468e2226c07b782a4b478abc1d7be09f00e71", "extension": "py", "fi...
2.625
stackv2
# -*- coding: utf-8 -*- # # This file is part of Radicale Server - Calendar Server # Copyright © 2008 Nicolas Kandel # Copyright © 2008 Pascal Halter # Copyright © 2008-2013 Guillaume Ayoub # # This library is free software: you can redistribute it and/or modify # it under the terms of the GNU General Public License as...
171
36.1
80
15
1,571
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_84952ca8d046e153_547187a5", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expen...
[ 84, 97 ]
[ null, null ]
[ 17, 17 ]
[ 25, 25 ]
2024-11-18T20:49:30.520728+00:00
1,418,334,984,000
77dcceb8272e8badabf9f66747c74177ace5dc78
3
{ "blob_id": "77dcceb8272e8badabf9f66747c74177ace5dc78", "branch_name": "refs/heads/master", "committer_date": 1418334984000, "content_id": "1fe9ac67c1ebafcde4e4aae1af348c1f9e4aa087", "detected_licenses": [ "MIT" ], "directory_id": "9ad374cf943964fcbaf1d627e09ac5b0463b6171", "extension": "py", "fi...
2.90625
stackv2
from flask import Flask from flask import request import os, sys app = Flask(__name__) @app.route("/") def hello(): return "Hello World!" @app.route('/user/<username>') def show_user_profile(username): return 'User %s\n' % username @app.route("/square/<int:number>") def squarenum(number): return numbe...
61
18.57
46
12
362
python
[{"finding_id": "codeql_py/flask-debug_64fc0afcedea7128_9df68459", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
4
true
[ "CWE-215", "CWE-079", "CWE-079", "CWE-022" ]
[ "py/flask-debug", "py/reflective-xss", "py/reflective-xss", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "This path depends on a [user-provided value]...
[ 25, 12, 16, 22 ]
[ null, null, null, null ]
[ 5, 9, 13, 16 ]
[ 40, 31, 26, 39 ]
2024-11-18T20:50:04.904065+00:00
1,602,274,855,000
1a3060833ead94d028b71280400931f8a22a2079
3
{ "blob_id": "1a3060833ead94d028b71280400931f8a22a2079", "branch_name": "refs/heads/main", "committer_date": 1602274855000, "content_id": "6ca4aae7f46cd97c394a1292edb07ecebae42cc6", "detected_licenses": [ "Apache-2.0" ], "directory_id": "35bc39d1dc607a6e53e885dd7729b590517fa3ba", "extension": "py", ...
2.546875
stackv2
import requests import os import logging import traceback from flask import Flask, request app = Flask(__name__) gunicorn_logger = logging.getLogger('gunicorn.error') app.logger.handlers = gunicorn_logger.handlers app.logger.setLevel(gunicorn_logger.level) REQUEST_TIMEOUT = int(os.getenv('REQUEST_TIMEOUT', 5)) METR...
82
32.5
105
18
692
python
[{"finding_id": "codeql_py/full-ssrf_02fb9781b4e261af_1aae2f51", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
5
true
[ "CWE-918", "CWE-079", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/full-ssrf", "py/reflective-xss", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "HIGH", "HIGH", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value]...
[ 55, 82, 58, 65, 66 ]
[ null, null, null, null, null ]
[ 20, 12, 26, 26, 26 ]
[ 92, 30, 48, 48, 35 ]
2024-11-18T20:50:27.062089+00:00
1,625,834,892,000
12cb1f7f3df2d4554b491cbeba54ea59545854f3
3
{ "blob_id": "12cb1f7f3df2d4554b491cbeba54ea59545854f3", "branch_name": "refs/heads/master", "committer_date": 1625834892000, "content_id": "7c094dc9f6789987096d646f2920ee372eb6f1b8", "detected_licenses": [ "MIT" ], "directory_id": "68c013975a380cf0e2b73e1e1703a1e0f0345a59", "extension": "py", "fi...
2.65625
stackv2
from django.db import models from django.contrib.auth.models import User from django.utils import timezone from django.dispatch import receiver import os import shutil class Folder(models.Model): name = models.CharField(max_length=128) parent_folder = models.ForeignKey("self", null=True, blank=True, on_delete...
113
29.17
94
14
743
python
[{"finding_id": "codeql_py/path-injection_fa5a5b903ef9a5c2_47ea2b9e", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 113 ]
[ null ]
[ 36 ]
[ 44 ]
2024-11-18T20:50:31.258833+00:00
1,691,773,834,000
e49b2d5a4aa0f8bda0f8ab8914cf01b5bd636361
3
{ "blob_id": "e49b2d5a4aa0f8bda0f8ab8914cf01b5bd636361", "branch_name": "refs/heads/master", "committer_date": 1691773834000, "content_id": "f82fb4aee251b8f0b428563b71cd9a2f069bbfe1", "detected_licenses": [ "MIT" ], "directory_id": "78c76c48d944362c23b962c788a5d1bf87989320", "extension": "py", "fi...
2.546875
stackv2
import datetime import logging import requests from ambient_api import settings class AmbientWeatherStation: """ This class represents a single weather station. """ api_instance = None mac_address = None last_data = {} info = { 'name': 'Weather Station' } def __init__(se...
185
29.02
120
18
1,206
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_dadff9ccc41f12de_fe2f3e85", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
6
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (p...
[ 123, 125, 119, 115, 117, 121 ]
[ null, null, null, null, null, null ]
[ 34, 23, 33, 31, 30, 31 ]
[ 41, 30, 40, 38, 37, 38 ]
2024-11-18T20:50:41.302093+00:00
1,510,915,108,000
0bba0229ab7cd70e92aeb3e50fb1971ddbc6ea9f
3
{ "blob_id": "0bba0229ab7cd70e92aeb3e50fb1971ddbc6ea9f", "branch_name": "refs/heads/master", "committer_date": 1510915108000, "content_id": "f52077906c02f97a002fb65f7eaf0103cfe58a26", "detected_licenses": [ "MIT" ], "directory_id": "43c4c5b24b696bc7e760c590faf67fbad2fbe417", "extension": "py", "fi...
2.53125
stackv2
# -*- coding: utf-8 -*- import os import click from slugify import slugify from jinja2 import Template from sqlalchemy import create_engine import logging logger = logging.getLogger('__name__') TEMPLATE = """ <!DOCTYPE html> <html> <head> <meta charset="utf-8"> <link rel="stylesheet" type="text/css" href="...
141
29.36
142
17
1,008
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_c83de02ff287fe50_1f2dd12f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 119 ]
[ null ]
[ 16 ]
[ 34 ]
2024-11-18T20:50:54.077972+00:00
1,623,701,328,000
2e1880b2aa70869b63e8f6ac31d4594605b060a3
2
{ "blob_id": "2e1880b2aa70869b63e8f6ac31d4594605b060a3", "branch_name": "refs/heads/master", "committer_date": 1623701328000, "content_id": "f387df021dbcc761e6df96e0c42652a918819ddf", "detected_licenses": [ "MIT" ], "directory_id": "5bb7901231ddd629d8b34f046be374efc944a04d", "extension": "py", "fi...
2.3125
stackv2
from __future__ import absolute_import, unicode_literals from hashlib import sha1 from pyfondy.configuration import __sign_sep__ as sep from pyfondy.exceptions import RequestError from uuid import uuid4 import pyfondy.utils as utils def get_data(data, req_type): """ :param data: data to prepare :param re...
114
27.68
76
18
754
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_e201a7c0e7359808_f5c9867c", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecu...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecure.\n[Sensitive data (secret)](2) is used in a hashing algorithm (SHA1) that is insecure.\n[Sensitive data (secret)](3) is used in a hashing algorithm (SHA1) that is insecure.", "[Sensitive data (secret)](1) is used in a hashing alg...
[ 46, 52 ]
[ null, null ]
[ 26, 21 ]
[ 50, 51 ]
2024-11-18T20:51:14.033530+00:00
1,543,464,067,000
93d17ee9c82a6fc64329974eb27907473fe199c8
3
{ "blob_id": "93d17ee9c82a6fc64329974eb27907473fe199c8", "branch_name": "refs/heads/master", "committer_date": 1543464067000, "content_id": "7fd3dc3e82ba84eab3512610b3800af4d252d0ad", "detected_licenses": [ "MIT" ], "directory_id": "8e0c64052e9733baa88fb3fa1b991e9bf486d35e", "extension": "py", "fi...
2.5625
stackv2
#!/usr/bin/env python3 import os import logging import argparse import configparser from mailboxresource import MailboxClient logging.basicConfig( filename='imapbox.log', format='%(asctime)s - %(levelname)s: %(message)s', datefmt='%Y-%m-%dТ%H:%M:%S%z', level=logging.INFO, ) def load_configuration(ar...
150
25.14
85
14
847
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b5147fad651cce2a_0bfefa04", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
6
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive dat...
[ 126, 127, 128, 129, 142, 143 ]
[ null, null, null, null, null, null ]
[ 13, 13, 13, 13, 13, 13 ]
[ 28, 37, 28, 28, 28, 37 ]
2024-11-18T21:13:47.062651+00:00
1,491,948,835,000
7293243e3ce10ba79b813c4f530d7dbb0436f4a1
2
{ "blob_id": "7293243e3ce10ba79b813c4f530d7dbb0436f4a1", "branch_name": "refs/heads/master", "committer_date": 1491948835000, "content_id": "509287bb0706055fdfad5230f8020246c1f32700", "detected_licenses": [ "Apache-2.0" ], "directory_id": "11034141484c7217823aaa641b7925a6a9d1555b", "extension": "py"...
2.46875
stackv2
import argparse import json import os from jinja2 import Environment, FileSystemLoader parser = argparse.ArgumentParser() parser.add_argument("root_dir") parser.add_argument("--images_dir", default='images') parser.add_argument("--questions_name", default='questions.json') parser.add_argument("--annotations_name", de...
62
40.65
111
14
573
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_9d99a2a0e4b6a151_35c7559e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 23 ]
[ null ]
[ 7 ]
[ 56 ]
2024-11-18T21:13:52.126039+00:00
1,643,564,470,000
4213e0f55de9d8104b54c3ca9badbd7d7cec2997
3
{ "blob_id": "4213e0f55de9d8104b54c3ca9badbd7d7cec2997", "branch_name": "refs/heads/master", "committer_date": 1643564611000, "content_id": "b551a8c8b71a70e480955eab948a6a28f80faa46", "detected_licenses": [ "ISC" ], "directory_id": "0003e7c99347e93eac0bae778041cb1c2241831a", "extension": "py", "fi...
2.625
stackv2
import csv import os import json import pytz import re import sys import urllib.parse from canvasapi import Canvas from invoke import task @task() def roster(c): """show student roster""" course = get_canvas_course() for enrollee in course.get_enrollments(): if enrollee.role == 'StudentEnrollment...
148
28.57
73
19
938
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_c98b451e1db9b931_7bff3f7d", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [github.com](1) may be at an arbitrary position in the ...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [github.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 81 ]
[ null ]
[ 22 ]
[ 52 ]
2024-11-18T21:13:54.027446+00:00
1,566,209,287,000
0207a54b37fbaa1cab03cf20b4246a989cbe1dcc
3
{ "blob_id": "0207a54b37fbaa1cab03cf20b4246a989cbe1dcc", "branch_name": "refs/heads/master", "committer_date": 1566209287000, "content_id": "ae7c2d188413258fe7f1ac875b186e68c93ed335", "detected_licenses": [ "MIT" ], "directory_id": "65bdcfa9b172a297ea2968a432b3fd00d4051622", "extension": "py", "fi...
2.625
stackv2
#! /usr/bin/env python3 import argparse import collections import sys import jinja2 import yaml from .mcu import get_mcu class Pins: _Pin = collections.namedtuple("Pin", ['name', 'port', 'num', 'mode', 'od', 'otype', 'ospeed', ...
184
33.5
103
20
1,426
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_28c5715b6640c10d_382b812d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 178 ]
[ 180 ]
[ 11 ]
[ 49 ]
2024-11-18T21:14:19.758362+00:00
1,604,893,551,000
a96c14c8c9b85a4e9e0d3d6362cf7a7dd0932824
4
{ "blob_id": "a96c14c8c9b85a4e9e0d3d6362cf7a7dd0932824", "branch_name": "refs/heads/main", "committer_date": 1604893551000, "content_id": "af1663e71dd65943e46ed7ea063b9a614b22111c", "detected_licenses": [ "MIT" ], "directory_id": "308e530cec14b8c2f6856fc80b8f9b0d3ece57e9", "extension": "py", "file...
3.890625
stackv2
from random import randint class BankAccount: def __init__(self, full_name): self.full_name = full_name self.account_number = randint(100000000, 999999999) self.routing_number = 98765432 self.balance = float(0) # def deposit(self, amount): # self.balance += float(amount) # return f"Amoun...
70
35.84
163
12
648
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f315cce78a24c1c3_c547f3dd", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 67, 70 ]
[ null, null ]
[ 7, 7 ]
[ 37, 36 ]
2024-11-18T20:10:39.634310+00:00
1,552,207,178,000
4bef0b8f5ff374fa44e6d41d6e96238de635d4a0
2
{ "blob_id": "4bef0b8f5ff374fa44e6d41d6e96238de635d4a0", "branch_name": "refs/heads/master", "committer_date": 1552207178000, "content_id": "b5f250a049f708e4b6224534bd3fb1f292483976", "detected_licenses": [ "MIT" ], "directory_id": "462a3194dad478d6ab5269c16404f5579cc0fe7d", "extension": "py", "fi...
2.484375
stackv2
import http import logging import os import mpld3 from flask import Flask, request, jsonify, send_file from indel_prediction.predictor.predict import plot_predictions as main app = Flask(__name__) model_path = "indel_prediction/predictor/model_output_10000_0.01000000_0.01000000_-0.607_theta.txt_cf0.txt" @app.route...
70
34.81
124
16
611
python
[{"finding_id": "codeql_py/stack-trace-exposure_f4d80db398ca2965_27770fe3", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
3
true
[ "CWE-209", "CWE-022", "CWE-022" ]
[ "py/stack-trace-exposure", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 64, 36, 37 ]
[ null, null, null ]
[ 24, 23, 26 ]
[ 41, 31, 34 ]
2024-11-18T20:48:05.854396+00:00
1,693,346,738,000
f0424d93b05fed6f7d4f6951c14936dd3adee8b2
3
{ "blob_id": "f0424d93b05fed6f7d4f6951c14936dd3adee8b2", "branch_name": "refs/heads/master", "committer_date": 1693346738000, "content_id": "45b088ebf2a06c37c50fa5b15009481ccdd64350", "detected_licenses": [ "MIT" ], "directory_id": "60d6b8501d0be546437b26a6ee1f9fab97ec3897", "extension": "py", "fi...
2.546875
stackv2
import hashlib import requests from enum import Enum from typing import Optional, Union, List from platypush.message.response.pihole import PiholeStatusResponse from platypush.plugins import Plugin, action class PiholeStatus(Enum): ENABLED = 'enabled' DISABLED = 'disabled' class PiholePlugin(Plugin): ...
308
47.06
143
22
3,260
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_bc49cf3a7a8c1922_9f0dd3ed", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e...
[ 42 ]
[ null ]
[ 46 ]
[ 68 ]
2024-11-18T20:48:09.558926+00:00
1,618,236,580,000
3750cc85306c989fbc49f8305f4a5e2e9f8f4bb0
3
{ "blob_id": "3750cc85306c989fbc49f8305f4a5e2e9f8f4bb0", "branch_name": "refs/heads/master", "committer_date": 1618236580000, "content_id": "8b05401cfe7295ae67c94e1c7a8b7966a16d8ee7", "detected_licenses": [ "MIT" ], "directory_id": "398869c79284a4b9b6ec187259ecb70c90f5ed4a", "extension": "py", "fi...
3.25
stackv2
import hashlib import os from cryptography.exceptions import InvalidSignature from cryptography.hazmat.backends import default_backend from cryptography.hazmat.primitives import hashes from cryptography.hazmat.primitives.asymmetric import padding, rsa def get_key_pair(key_size=512): """ Returns (public key, p...
104
28.42
101
16
641
python
[{"finding_id": "codeql_py/weak-crypto-key_19c38b95f19cf048_32721282", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [512](1) bits, which is below 2048 and considered breakable.", "remediation": "", ...
1
true
[ "CWE-326" ]
[ "py/weak-crypto-key" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Creation of an RSA key uses [512](1) bits, which is below 2048 and considered breakable." ]
[ 13 ]
[ 17 ]
[ 19 ]
[ 10 ]
2024-11-18T20:48:22.745454+00:00
1,601,468,554,000
68ccade6ee8bb7bb8b24dad372c06fe7e33f2ef7
2
{ "blob_id": "68ccade6ee8bb7bb8b24dad372c06fe7e33f2ef7", "branch_name": "refs/heads/master", "committer_date": 1601468554000, "content_id": "b356e685d5d0ed1ab48318091f613381c90c4bfe", "detected_licenses": [ "MIT" ], "directory_id": "0ddec47170a8c576521bc8f48f13b2b32653f56e", "extension": "py", "fi...
2.484375
stackv2
import os from json import load from flask import Flask, request, render_template from logging.config import dictConfig # Logging 設定ファイル読み込み with open("logging.json", "r", encoding="utf-8") as f: dictConfig(load(f)) app = Flask(__name__, instance_relative_config=True) # 標準設定ファイル読み込み app.config.from_object("sett...
33
28.36
83
13
245
python
[{"finding_id": "codeql_py/log-injection_067e1fd4cbc93abe_6e97a715", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 31 ]
[ null ]
[ 40 ]
[ 49 ]
2024-11-18T20:48:32.504403+00:00
1,685,631,867,000
d91ebf61f93f642088ef67033319db8787345f99
3
{ "blob_id": "d91ebf61f93f642088ef67033319db8787345f99", "branch_name": "refs/heads/master", "committer_date": 1685631867000, "content_id": "ec57591f39838bc93fa8d967015e407e1bd11ec3", "detected_licenses": [ "MIT" ], "directory_id": "5f1a3d7f36425a52049f3bf14f7a8cee66fb23d5", "extension": "py", "fi...
2.828125
stackv2
"""timeflux.core.manager: manage workers""" import logging import sys import os import time import signal import json import yaml from jinja2 import Template from timeflux.core.validate import validate from timeflux.core.worker import Worker class Manager: """Load configuration and spawn workers.""" def __...
167
29.22
106
16
1,011
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_656a67483506410a_044ccfa2", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 166 ]
[ null ]
[ 20 ]
[ 38 ]
2024-11-18T21:11:41.323308+00:00
1,579,825,623,000
5bcd3758d58119ad2017edaf2e28b6a3448bceb1
4
{ "blob_id": "5bcd3758d58119ad2017edaf2e28b6a3448bceb1", "branch_name": "refs/heads/master", "committer_date": 1579825623000, "content_id": "c6c727da62a7b4ee2fb97ed050c7da2cf08e5862", "detected_licenses": [ "MIT" ], "directory_id": "4ed0ca36dc0f7221c470a4dad9a09fc2251b1661", "extension": "py", "fi...
4.0625
stackv2
# Exercise 34 - Birthday JSON # For JSON # json library # json.dump(json_obj, file) # json.load(file) import json def write_json_birthdays(f_name, birthdays): with open(f_name, 'w') as open_file: json.dump(birthdays, open_file) def read_json_birthdays(f_name): with open(f_name, 'r') as open_file: ...
46
25.54
82
12
354
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c2bcb4aa18fab32d_d1789e28", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 40, 44 ]
[ null, null ]
[ 15, 15 ]
[ 18, 68 ]
2024-11-18T21:25:46.326988+00:00
1,651,749,196,000
82cf4d36b71e2ed94c26c051a265f2a4327e1cbb
2
{ "blob_id": "82cf4d36b71e2ed94c26c051a265f2a4327e1cbb", "branch_name": "refs/heads/master", "committer_date": 1651749196000, "content_id": "21ff53f764ea45b609145713af88826cccd6fa1d", "detected_licenses": [ "Apache-2.0" ], "directory_id": "8a963ab764da000990491bf3ac3fd0600199aea4", "extension": "py"...
2.4375
stackv2
#!/usr/bin/python import sys, os import jinja2 import argparse __author__ ="pkopka" #Script render Geometry macro for Gate simulation #Create Geomerty.mac with <n_strip> strips splited on <n_part> regions. #JPET Geometry: max number strips - 384 Z size strip 500 mm #python splitter.py -c <crystals_number> -o <outpu...
43
34.63
98
16
381
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_7064cc87997d0b32_77cd3558", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 22 ]
[ 24 ]
[ 12 ]
[ 6 ]
2024-11-18T21:25:51.438014+00:00
1,634,872,415,000
193b55d86a98646b5884e9dbfe06d37bdc3c84f9
3
{ "blob_id": "193b55d86a98646b5884e9dbfe06d37bdc3c84f9", "branch_name": "refs/heads/main", "committer_date": 1634872415000, "content_id": "b5af68de260a31987ae049546523121807777bef", "detected_licenses": [ "MIT" ], "directory_id": "98df7291586d5a463c6e88ec8aa2665b153a23f3", "extension": "py", "file...
2.5625
stackv2
import os import requests import json import pandas as pd from flask import Flask, request, Response #constants TOKEN = '2066590284:AAFGaFTcKQilu8FAVV4FIu8aFkD2PgRu3pA' # Info about the boot #https://api.telegram.org/bot2066590284:AAFGaFTcKQilu8FAVV4FIu8aFkD2PgRu3pA/getMe # get updates #https://api.telegram.org/bot...
138
28.5
152
22
1,174
python
[{"finding_id": "codeql_py/partial-ssrf_cb8f6f2404fc23b4_9fddcf5d", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 30 ]
[ null ]
[ 9 ]
[ 51 ]
2024-11-18T21:25:52.945092+00:00
1,618,814,537,000
7296b7f2e58bfcf052e880f4dc884ecba0015bcf
2
{ "blob_id": "7296b7f2e58bfcf052e880f4dc884ecba0015bcf", "branch_name": "refs/heads/main", "committer_date": 1618814537000, "content_id": "2bc7518002e489375d9585797bbbb8bed50aba4a", "detected_licenses": [ "MIT" ], "directory_id": "737039ae745c0cae90b93f3dbe11815549560c60", "extension": "py", "file...
2.390625
stackv2
""" hrit2image """ from glob import glob import numpy as np import pandas as pd import click import matplotlib import matplotlib.pyplot as plt from cartopy.crs import ( PlateCarree, AlbersEqualArea, AzimuthalEquidistant, EquidistantConic, LambertConformal, Mercator, Miller, Mollweide...
392
26.11
127
13
2,920
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b2c64fda3e064f32_132081f2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 238, 239 ]
[ null, null ]
[ 11, 11 ]
[ 69, 67 ]
2024-11-18T21:25:53.659976+00:00
1,572,904,662,000
8d09afe6d5d92203a44e7cb15bd349424e947e80
3
{ "blob_id": "8d09afe6d5d92203a44e7cb15bd349424e947e80", "branch_name": "refs/heads/master", "committer_date": 1572904662000, "content_id": "2345edd78f3349fcb77c3ba16f5597f9010abf67", "detected_licenses": [ "MIT" ], "directory_id": "b695f15adffeac94c19ff62537950542a52f9c55", "extension": "py", "fi...
3.25
stackv2
#!/usr/bin/env/ python # -*- encoding:UTF -*- import numpy as np def reduced_latitude(lat): f = 1/298.257223563 b = np.arctan((1 - f)*np.tan(lat)) return b # Lambert's formula, https://en.wikipedia.org/wiki/Geographical_distance def lambert(c1, c2, unit='m'): if c1[0] == c2[0] and c1[1] == c2[1]: ...
100
24.71
87
16
817
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_025b542b95a9f9a5_c6cfc1f1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (p...
[ 75, 86, 100 ]
[ null, null, null ]
[ 7, 11, 11 ]
[ 15, 81, 84 ]
2024-11-18T21:25:55.706297+00:00
1,604,359,681,000
befbd27b4b85b8c3782297ecb76bb7723ed09de8
2
{ "blob_id": "befbd27b4b85b8c3782297ecb76bb7723ed09de8", "branch_name": "refs/heads/master", "committer_date": 1604359681000, "content_id": "c4e5593eae9dbfc72558c768e8837d6dc9a886b5", "detected_licenses": [ "MIT" ], "directory_id": "b31e75e111f76cb55d839b46677c2bbc5861be7c", "extension": "py", "fi...
2.46875
stackv2
from datetime import timedelta from flask import abort, flash, redirect, render_template, request, url_for from flask_login import LoginManager, login_required, login_user, logout_user from werkzeug.security import check_password_hash from multilens.ext.db.models import User from multilens.ext.site import is_safe_url...
73
28.23
83
18
452
python
[{"finding_id": "codeql_py/url-redirection_ccb88e2b5989bc18_508430ee", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 38 ]
[ null ]
[ 29 ]
[ 62 ]
2024-11-18T21:26:06.473694+00:00
1,676,303,643,000
5a08e6c4435ff72948ff19d0bb0c2032b6162f4d
4
{ "blob_id": "5a08e6c4435ff72948ff19d0bb0c2032b6162f4d", "branch_name": "refs/heads/master", "committer_date": 1676303643000, "content_id": "e75123ce0d25c2fb70c9296bfaff63532bb975c7", "detected_licenses": [ "Apache-2.0" ], "directory_id": "4f7aa44d21ae38093869e79e10f5cdc8842d48b7", "extension": "py"...
3.703125
stackv2
import datetime class Person(object): def __init__(self, ssn, first_name, last_name, address= None, phone=None): self.__ssn = ssn self.__first_name = first_name self.__last_name = last_name self.__address = address self.__phone = phone @property def ssn(self): ...
110
29.04
113
14
980
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a8127822bdca594a_b392be02", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 100, 109 ]
[ null, null ]
[ 11, 11 ]
[ 23, 23 ]
2024-11-18T21:52:24.393525+00:00
1,618,472,644,000
c2c960e58662393a1748e5351668877c7b888257
2
{ "blob_id": "c2c960e58662393a1748e5351668877c7b888257", "branch_name": "refs/heads/master", "committer_date": 1618472644000, "content_id": "8ee02c23866ea85c516b560718e892e26608758c", "detected_licenses": [ "Apache-2.0" ], "directory_id": "7a864f0f8f3c5e2b08d411676440ccb4cbce5336", "extension": "py"...
2.3125
stackv2
import json import logging import os from datetime import datetime import requests from jinja2 import Template, StrictUndefined from jsonschema import validate as json_validate from connaisseur.util import safe_path_func from connaisseur.exceptions import AlertSendingError, ConfigurationError from connaisseur.image i...
194
35.92
104
18
1,390
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_dd7f62720bba250b_aa9e7af2", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 82 ]
[ null ]
[ 24 ]
[ 42 ]
2024-11-18T21:52:29.495685+00:00
1,546,769,282,000
f4c4947e0fad3f991cd0df52a8974f6e335f2831
3
{ "blob_id": "f4c4947e0fad3f991cd0df52a8974f6e335f2831", "branch_name": "refs/heads/master", "committer_date": 1546769282000, "content_id": "4d936948fd09c5ef2fb4a6f4cc72038a0a1b8c22", "detected_licenses": [ "MIT" ], "directory_id": "c3bc667239d25bb75cbaad88a7eb603c85f49fcd", "extension": "py", "fi...
2.59375
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- import requests from lxml import html import urllib3 import unicodecsv as csv import argparse urllib3.disable_warnings() print( ''' ============================================== | | | ...
140
45.87
159
24
1,318
python
[{"finding_id": "codeql_py/request-without-cert-validation_95a4bcbafd77bc02_656d281d", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 45, 78 ]
[ null, null ]
[ 24, 45 ]
[ 72, 103 ]