added
stringlengths
32
32
created
int64
1,236B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.03
source
stringclasses
1 value
text
stringlengths
330
19.3k
num_lines
int64
16
648
avg_line_length
float64
15.5
59.3
max_line_length
int64
37
179
ast_depth
int64
8
38
length
int64
102
3.79k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.11k
276k
sast_codeql_findings_count
int64
1
33
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
33
rule_ids
listlengths
1
33
confidences
listlengths
1
33
severities
listlengths
1
33
messages
listlengths
1
33
line_starts
listlengths
1
33
line_ends
listlengths
1
33
column_starts
listlengths
1
33
column_ends
listlengths
1
33
2024-11-18T23:15:48.569984+00:00
1,493,054,247,000
7caef658c1dfb9e7d33e6374d496fdc22b068c25
3
{ "blob_id": "7caef658c1dfb9e7d33e6374d496fdc22b068c25", "branch_name": "refs/heads/master", "committer_date": 1493054247000, "content_id": "633aff194e0c7c7371bb84e68c5c36d326ab053a", "detected_licenses": [ "MIT" ], "directory_id": "9ba396ade063c1d52805e222cec01e208357fb04", "extension": "py", "fi...
2.5625
stackv2
import discord import discord.utils import asyncio import os.path import re import markovify import random import datetime from chatBot.settings import JSONSettings prog_path = os.path.dirname(os.path.abspath(__file__)) default_settings = {"Discord token": "", "Source type (channel or user)": "",...
172
31.16
148
22
1,319
python
[{"finding_id": "codeql_py/overly-large-range_9a531e6464f9994e_fbd432a4", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "remediatio...
7
true
[ "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range ...
[ 35, 35, 35, 35, 35, 35, 36 ]
[ null, null, null, null, null, null, null ]
[ 15, 18, 21, 24, 30, 33, 15 ]
[ 19, 22, 25, 28, 34, 37, 19 ]
2024-11-18T23:15:50.898340+00:00
1,556,089,082,000
b72639ef54edd7cd5bd86093e8a42e807402016b
3
{ "blob_id": "b72639ef54edd7cd5bd86093e8a42e807402016b", "branch_name": "refs/heads/master", "committer_date": 1556089082000, "content_id": "9f1b0bafb8891394393c6f7ab6b30f13aa1e9c81", "detected_licenses": [ "Apache-2.0" ], "directory_id": "7981fa8a679fd3bfe3494273fe61a2abbf31aaad", "extension": "py"...
2.734375
stackv2
# -*- coding: utf-8 -* import os import hashlib import sys import os, sys, time from paramiko import SSHClient, SFTPClient, AutoAddPolicy import pickle class SshServer(object): def __init__(self, ip=None, port=22, user='root', password=None): """ :param ip: 服务器ip地址 :param port: 服务器端口 ssh端口默认22 :...
231
26.02
111
20
2,011
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_39edfbe6cf35c0ad_d222617b", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 46 ]
[ null ]
[ 5 ]
[ 58 ]
2024-11-18T22:30:20.269345+00:00
1,660,119,292,000
f72fafb674ae5a313bc4293f32d00cd46d09f2ac
2
{ "blob_id": "f72fafb674ae5a313bc4293f32d00cd46d09f2ac", "branch_name": "refs/heads/master", "committer_date": 1660119292000, "content_id": "0dfc65f6878045d1126b22a8df04450483cc1913", "detected_licenses": [ "MIT" ], "directory_id": "d25047446b4c66f955d5fab54111ec1fd16dc93c", "extension": "py", "fi...
2.359375
stackv2
#!/usr/bin/python # -*- coding: utf-8 -*- # # TalkTalkTalk # # is an easy-installable small chat room, with chat history. # # author: Joseph Ernest (twitter: @JosephErnest) # url: http://github.com/josephernest/talktalktalk # license: MIT license import sys, json, bleach, time, threading, dumbdbm, random, re i...
177
40.96
177
35
1,654
python
[{"finding_id": "codeql_py/reflective-xss_a5ce6a38463d7443_f6af4fdb", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 153 ]
[ null ]
[ 17 ]
[ 24 ]
2024-11-18T22:30:35.027922+00:00
1,692,841,992,000
748fcb2b0b6d142e8844c73c669706fbbe0f17ef
3
{ "blob_id": "748fcb2b0b6d142e8844c73c669706fbbe0f17ef", "branch_name": "refs/heads/main", "committer_date": 1692841992000, "content_id": "086eb5c16e2f1f4507dfb38391b5c1f295a1a5ca", "detected_licenses": [ "Apache-2.0" ], "directory_id": "352a7d9d534587adc9e1130c71c0b832c020bb10", "extension": "py", ...
2.546875
stackv2
import random import string import json import logging import copy import io from ruamel.yaml import YAML, representer from kubernetes import config as kubeconfig from kubernetes.client.api import core_v1_api from kubernetes.client.rest import ApiException from kubernetes.stream import stream from submitter.abstracts...
314
28.5
79
18
1,986
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_67d72fa66f9eb1bb_6fb91bd5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 89, 100 ]
[ null, null ]
[ 22, 22 ]
[ 76, 77 ]
2024-11-18T22:44:43.444076+00:00
1,467,369,588,000
1c3f895fab26fbab62939b193ec45bfd418320b4
3
{ "blob_id": "1c3f895fab26fbab62939b193ec45bfd418320b4", "branch_name": "refs/heads/master", "committer_date": 1467369588000, "content_id": "cf070cf597017f9376ac52c152d3bfbff857d383", "detected_licenses": [ "MIT" ], "directory_id": "6a9f51df453b3088ab62682c72690c00ecd9b552", "extension": "py", "fi...
2.75
stackv2
''' The following module implements a REST API for resources. This allows us to manipulate our database using simple HTTP requests and without having to go through a form. This may be useful in the future if we are looking to have a mobile app or add an analytics application that is separate from the main site. The ba...
223
26.87
84
15
1,461
python
[{"finding_id": "codeql_py/stack-trace-exposure_3fd0eed22f4b1221_6b9795b2", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
12
true
[ "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure",...
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information...
[ 68, 74, 80, 105, 111, 117, 157, 163, 169, 194, 200, 206 ]
[ null, null, null, null, null, null, null, null, null, null, null, null ]
[ 33, 33, 33, 33, 33, 33, 33, 33, 33, 33, 33, 33 ]
[ 39, 39, 39, 39, 39, 39, 39, 39, 39, 39, 39, 39 ]
2024-11-18T23:36:57.331922+00:00
1,691,855,948,000
8fa464f6d78cf4756ac5b26e5823f5567dd7cde6
3
{ "blob_id": "8fa464f6d78cf4756ac5b26e5823f5567dd7cde6", "branch_name": "refs/heads/main", "committer_date": 1691855948000, "content_id": "51287431b6c90b006e14b098fc6a4044293dd548", "detected_licenses": [ "MIT" ], "directory_id": "416559370cfed287db119360d2747783c6bcc512", "extension": "py", "file...
2.671875
stackv2
import jinja2 import os from posty.util import slugify_posty1 from .base import Renderer class Posty1RedirectRenderer(Renderer): """ Renderer which creates pages to redirect old Posty1 URLs to new Posty2 URLs Old Posty1 post URLs are in the form of: /:year/:month/:old_slug.html Posty2 URLs are ...
37
31.16
79
18
251
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_17f9ec254810b90d_98edc76d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 21 ]
[ null ]
[ 20 ]
[ 63 ]
2024-11-18T23:37:01.852361+00:00
1,521,912,309,000
2cd1c933bffa1c1471cdfe91e66a8d73299e8c64
2
{ "blob_id": "2cd1c933bffa1c1471cdfe91e66a8d73299e8c64", "branch_name": "refs/heads/master", "committer_date": 1521912309000, "content_id": "f08d8f634993abc9be7458bfbfdd45cf735e7cf9", "detected_licenses": [ "MIT" ], "directory_id": "2638d80ca13744caa06f44f6b69d11b41279451b", "extension": "py", "fi...
2.4375
stackv2
#coding = utf-8 import re import json import tweepy from tweepy import OAuthHandler from tweepy import Stream from tweepy.streaming import StreamListener consumer_key = "RNOGX5TiB0Kyto9ggDxcT8Gie" consumer_secret = "Kn7ut4mvlwqPDNXIrl9uQxAblb1115Rg87XZ319UEaaJ09Kf0i" access_token = "3293164734-flLNI737Kx80gPEsJN5DBMX...
54
28.3
148
18
521
python
[{"finding_id": "codeql_py/overly-large-range_0f55e28bc9fcef51_e513957b", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 27 ]
[ null ]
[ 58 ]
[ 61 ]
2024-11-18T23:37:06.101384+00:00
1,553,788,666,000
766664356ebe868216e85995a43ddc26df1c4349
3
{ "blob_id": "766664356ebe868216e85995a43ddc26df1c4349", "branch_name": "refs/heads/master", "committer_date": 1553788666000, "content_id": "29f8ecef97333e2ac510b4652aa320714d462f24", "detected_licenses": [ "MIT" ], "directory_id": "b0d9a6326db00683109c2e0139206ee236b30eab", "extension": "py", "fi...
2.640625
stackv2
#!/usr/bin/env python import argparse, os, logging, json, sys from jinja2 import Template parser = argparse.ArgumentParser() parser.add_argument('-t', '--template', default="-", help='A configuration template') parser.add_argument('-o', '--output', default="-", help='A path to write the rendered configuration to') ...
64
30.69
160
16
480
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_e7ae77aa37fb6321_fda573a9", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 61 ]
[ null ]
[ 16 ]
[ 45 ]
2024-11-18T23:37:10.106319+00:00
1,613,485,448,000
98b60335df9987982b0668293878fe7c1259c02e
2
{ "blob_id": "98b60335df9987982b0668293878fe7c1259c02e", "branch_name": "refs/heads/master", "committer_date": 1613485448000, "content_id": "81c01e3fdc0181b06e6fdc4ed22c834e750c9a0e", "detected_licenses": [ "MIT" ], "directory_id": "441a612051a33b5563c3d644604e597b2e8c5251", "extension": "py", "fi...
2.46875
stackv2
from flask import Blueprint, request, jsonify, redirect, url_for from twitoff.twitter import add_or_update_user, update_all_users, add_users, TWITTER_USERS from twitoff.models import db, User, Tweet user_routes = Blueprint("user_routes", __name__) @user_routes.route('/user', methods=['POST']) def add_user(message=No...
72
34.57
90
18
537
python
[{"finding_id": "codeql_py/stack-trace-exposure_6a536842c7584f03_fdef7d3d", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.\n[S...
2
true
[ "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.\n[Stack trace information](2) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 35, 50 ]
[ null, null ]
[ 20, 20 ]
[ 60, 76 ]
2024-11-18T23:37:10.526117+00:00
1,492,797,560,000
79c8981311861f409d38eeebf0a57924e186c0fa
3
{ "blob_id": "79c8981311861f409d38eeebf0a57924e186c0fa", "branch_name": "refs/heads/master", "committer_date": 1492797560000, "content_id": "12c9c422aa5cdb90132a6662b8b40eeb2fee6574", "detected_licenses": [ "MIT" ], "directory_id": "01de22ca189e8b1014c1fbc806d5469d3f41c1e6", "extension": "py", "fi...
3.15625
stackv2
# Import requests so we can use HTML import requests # Import Time so we can use a delay import time # Import smtplib so we can send emails import smtplib # Import MIMEText, which we will use to create the message from email.mime.text import MIMEText # while this is true (it is true by default), def main(): st...
75
30.21
149
14
545
python
[{"finding_id": "codeql_py/request-without-cert-validation_bb874f93d4704ef7_19c20a8a", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 29 ]
[ null ]
[ 24 ]
[ 72 ]
2024-11-18T21:14:03.819070+00:00
1,540,101,602,000
269c2fefc1e7c5da5fad8fc1c6da24d98c1ff312
3
{ "blob_id": "269c2fefc1e7c5da5fad8fc1c6da24d98c1ff312", "branch_name": "refs/heads/master", "committer_date": 1540101602000, "content_id": "fe25761b98fd49aa71a44c161423e0d61d165790", "detected_licenses": [ "MIT" ], "directory_id": "9a7069a9044b2b26f7f95c4c611b69f3c4d91007", "extension": "py", "fi...
2.75
stackv2
#!/usr/local/bin/python # -*- coding: utf-8 -*- from sklearn import datasets,svm from sklearn import metrics from influxdb import InfluxDBClient from pytz import timezone from datetime import datetime from flask import Flask, jsonify, request import json app = Flask(__name__) @app.route("/", methods=['GET']) def he...
101
22.48
68
13
694
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_33ea7cfbaa7585f7_8481ffdd", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-215" ]
[ "py/clear-text-logging-sensitive-data", "py/flask-debug" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger." ]
[ 89, 34 ]
[ null, null ]
[ 40, 5 ]
[ 48, 51 ]
2024-11-18T21:15:49.019787+00:00
1,625,838,941,000
b7613fb7dc6340cbe3a9c03852a7b859d0cb679e
2
{ "blob_id": "b7613fb7dc6340cbe3a9c03852a7b859d0cb679e", "branch_name": "refs/heads/master", "committer_date": 1625838941000, "content_id": "21cf6abf0691444a659f8f00e463f9e9bcf5d1e9", "detected_licenses": [ "MIT" ], "directory_id": "57b1dbb89c717237ee3d90e32a2c0a3511000016", "extension": "py", "fi...
2.5
stackv2
"""Class for initializing remote virtual machines for agent lifecycle.""" from file_handling import collect_local_dir_names, collect_neuralnets_from_dir from subprocess import Popen, PIPE import os, time, json # Define global variable stricthostkeycheck_flag = "-o StrictHostKeyChecking=no" class RemoteEnvsSetup(obj...
327
37.76
101
18
2,764
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_81b640200e1c18a2_39fd777b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 60, 152 ]
[ null, null ]
[ 32, 38 ]
[ 41, 48 ]
2024-11-18T21:57:28.866564+00:00
1,594,272,809,000
b677d518e2e630ef60eb426d6f570cf632412c8b
3
{ "blob_id": "b677d518e2e630ef60eb426d6f570cf632412c8b", "branch_name": "refs/heads/master", "committer_date": 1594272809000, "content_id": "d352447f9e1f040272c5d7bcd024c1b7daa42eb5", "detected_licenses": [ "MIT" ], "directory_id": "3408811873f33e4bfce856f164cdf3180ba83b0c", "extension": "py", "fi...
2.609375
stackv2
# app.py - a minimal flask api using flask_restful from flask import Flask, request, render_template, jsonify from flask_restful import Resource, Api import os import requests application = Flask(__name__) api = Api(application) class HelloWorld(Resource): def get(self): return { "name" :...
74
20.54
62
12
387
python
[{"finding_id": "codeql_py/flask-debug_0d20b000e8ca09a8_67ebc00e", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 74, 27 ]
[ null, null ]
[ 5, 12 ]
[ 48, 24 ]
2024-11-18T21:57:30.273461+00:00
1,686,755,672,000
6ad937268eb4294061d331e022683593fbd2207d
3
{ "blob_id": "6ad937268eb4294061d331e022683593fbd2207d", "branch_name": "refs/heads/master", "committer_date": 1686755672000, "content_id": "3802415fa8797a942f46f290e50cda045089a6bd", "detected_licenses": [ "MIT" ], "directory_id": "6e2fc3d3ab6b1291c088d41e6224b476ca9e6b4a", "extension": "py", "fi...
2.671875
stackv2
''' The process for building the request is as follows: - Combine all params (except sign_type and sign) into a alphabetically sorted list in the form key=value& - Attach your AliPay MD5 secret to the signstring - Calculate the MD5 hash from this combined string - Attach the sign_type and sign parameter with the above ...
61
27.87
105
12
494
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_e6ca21a482a95d75_65157d3b", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.",...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 49 ]
[ null ]
[ 10 ]
[ 39 ]
2024-11-18T21:57:53.169920+00:00
1,542,808,582,000
3290faa1c0bc32f91c9930e9491b323d990d584d
3
{ "blob_id": "3290faa1c0bc32f91c9930e9491b323d990d584d", "branch_name": "refs/heads/master", "committer_date": 1542808582000, "content_id": "cb361b99675f070caeef5c9fea1da040fefb3ab2", "detected_licenses": [ "MIT" ], "directory_id": "5ac60fef12f7501a7045fbefefd0ca0fa7973829", "extension": "py", "fi...
2.53125
stackv2
import os import uuid import json from glob import glob import numpy as np import requests import pandas as pd import tornado.web from tornado import concurrent from tornado import gen from concurrent.futures import ThreadPoolExecutor from app.base_handler import BaseApiHandler from app.settings import MAX_MODEL_THRE...
103
31.38
92
17
712
python
[{"finding_id": "codeql_py/full-ssrf_54b7a81dd3d09177_27b7ae3a", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
1
true
[ "CWE-918" ]
[ "py/full-ssrf" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1)." ]
[ 56 ]
[ null ]
[ 26 ]
[ 49 ]
2024-11-18T21:58:28.524459+00:00
1,532,359,516,000
d0918515948dc900d549fc729240075b4363731c
3
{ "blob_id": "d0918515948dc900d549fc729240075b4363731c", "branch_name": "refs/heads/master", "committer_date": 1532359516000, "content_id": "d108a76584efd02d33cead3f4906e04d3653d0da", "detected_licenses": [ "MIT" ], "directory_id": "9f287bfe376e9416fb5a5be81238da12b041d9df", "extension": "py", "fi...
2.546875
stackv2
import re from collections import namedtuple import numpy from bs4 import BeautifulSoup from sklearn import svm from sklearn.feature_extraction.text import (CountVectorizer, TfidfTransformer, TfidfVectorizer) LabeledVideo = namedtuple('LabeledVideo', ['path', 'label']) DAT...
99
25.63
81
13
637
python
[{"finding_id": "codeql_py/bad-tag-filter_02d854f5c001ddd3_76edfe8d", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression does not match comments containing newlines.", "remediation": "", "location": {"file_pat...
1
true
[ "CWE-116" ]
[ "py/bad-tag-filter" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression does not match comments containing newlines." ]
[ 37 ]
[ null ]
[ 20 ]
[ 29 ]
2024-11-18T21:58:37.924719+00:00
1,503,338,336,000
8b86489991f8b92453531390a4b3a3bd22f19041
3
{ "blob_id": "8b86489991f8b92453531390a4b3a3bd22f19041", "branch_name": "refs/heads/master", "committer_date": 1503338336000, "content_id": "8cf0d4f54fa740370045728f4b30c3258115ed6e", "detected_licenses": [ "MIT" ], "directory_id": "e9a5e773a4305c6363d0127939d5b82338dfee72", "extension": "py", "fi...
2.59375
stackv2
''' @author Gabriel ''' import datetime import serial import time leidoAnterior = "" class xbee: def __init__(self,USB): self.connection=serial.Serial(USB,9600) self.timestamp='' self.challenge='0' self.latitude= 'HDDD.DDDDDD' self.longitude='HDDD.DDDDDD' self.takeoff='0' self.flying='0' self.landin...
70
23.53
137
23
544
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bc4d1985fa22e908_2f1ab67e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 45 ]
[ null ]
[ 9 ]
[ 15 ]
2024-11-18T23:10:50.835792+00:00
1,622,061,069,000
eaa07f8793b4ce7988c043eb1c5a722b6daeafb7
3
{ "blob_id": "eaa07f8793b4ce7988c043eb1c5a722b6daeafb7", "branch_name": "refs/heads/main", "committer_date": 1622061069000, "content_id": "eeefb12b994bcf63ccc6bc46167dd50afdf3e90d", "detected_licenses": [ "MIT" ], "directory_id": "38b17235eae34a13126c7d6597d3aba620c26eff", "extension": "py", "file...
2.796875
stackv2
import subprocess from scapy.all import * import re from enum import Enum import requests import time class ipType(Enum): NONE = 0 IP = 1 CIDR = 2 class lanServer: def __init__(self): self.ip = self.get_local_ip() self.cidr = 24 self.network_addr = ".".join(self.ip.split('.')...
107
30.48
91
18
874
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9739cece49379a30_df54fc1e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 102 ]
[ null ]
[ 19 ]
[ 25 ]
2024-11-18T23:10:52.828646+00:00
1,552,597,759,000
5af028f0b3a1c3249c526aa6971849c20d5e7a18
2
{ "blob_id": "5af028f0b3a1c3249c526aa6971849c20d5e7a18", "branch_name": "refs/heads/master", "committer_date": 1552597759000, "content_id": "4af7bbb7d0507bbeb2d70d472aac4b1f9d28e6ad", "detected_licenses": [ "MIT" ], "directory_id": "724a54f533d9d5af9b76066902f09676306dee28", "extension": "py", "fi...
2.359375
stackv2
url = 'https://files.pythonhosted.org/packages/9d/a4/afaf98be714d3701d47c47b3b6aa3d5e52bf277fe8ceb9a2e3fdb05eaf86/micropython-uasyncio-2.0.tar.gz' proto, _, host, urlpath = url.split('/', 3) try: ai = usocket.getaddrinfo(host, 443, 0, usocket.SOCK_STREAM) except OSError as e: fatal("Unable to resolve %s (no In...
95
26.39
154
13
814
python
[{"finding_id": "codeql_py/insecure-default-protocol_d3e7674b08472508_56b7c710", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/insecure-default-protocol", "py/insecure-default-protocol" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used.", "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used." ]
[ 33, 18 ]
[ null, null ]
[ 13, 6 ]
[ 31, 57 ]
2024-11-18T23:10:55.490412+00:00
1,610,054,421,000
c5e452bc1f61bce15932314648f2daf275eaca76
3
{ "blob_id": "c5e452bc1f61bce15932314648f2daf275eaca76", "branch_name": "refs/heads/master", "committer_date": 1610054421000, "content_id": "020b2eefb4a41266232d65a64a73137dd2ec9fa8", "detected_licenses": [ "MIT" ], "directory_id": "b77b571c0198eaadfc978e348089dda964529bdb", "extension": "py", "fi...
2.625
stackv2
from flask import Flask, request, render_template import sqlite3 import matplotlib, os matplotlib.use('agg') import matplotlib.pyplot as plt import pandas as pd import folium def startup(): try: name = input("Name of the database you will use") check_connection = 'file:{}.db?mode=rw'.format(name) ...
258
34.03
134
21
2,168
python
[{"finding_id": "codeql_py/sql-injection_d171ebcf12915379_ea0b4ddc", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown...
2
true
[ "CWE-089", "CWE-089" ]
[ "py/sql-injection", "py/sql-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This SQL query depends on a [user-provided value](1).", "This SQL query depends on a [user-provided value](1)." ]
[ 69, 164 ]
[ null, null ]
[ 32, 35 ]
[ 34, 48 ]
2024-11-18T23:10:57.141382+00:00
1,623,006,274,000
90da0e993aa49f83e00253d404a6d5d3cce3f7ac
2
{ "blob_id": "90da0e993aa49f83e00253d404a6d5d3cce3f7ac", "branch_name": "refs/heads/main", "committer_date": 1623006274000, "content_id": "dcf8cbfae5fe0d24b6e1ab08eaa2d7ab1352b16d", "detected_licenses": [ "MIT" ], "directory_id": "40aa9e69bb9fe4bc9c68a6ce0329963497cf54f0", "extension": "py", "file...
2.375
stackv2
import os import secrets from PIL import Image from flask import render_template, url_for, flash, redirect, request, abort from flask_login import login_user, current_user, logout_user, login_required from . import app, db, bcrypt from .models import User, Post from .forms import RegistrationForm, LoginForm, AccountUp...
188
42.66
153
16
1,868
python
[{"finding_id": "codeql_py/url-redirection_b71075e93a6a99fe_8cb55577", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 94 ]
[ null ]
[ 33 ]
[ 42 ]
2024-11-18T23:11:01.522000+00:00
1,540,730,913,000
d679a781db13851e0027064b6a340a48e9e6f3d1
2
{ "blob_id": "d679a781db13851e0027064b6a340a48e9e6f3d1", "branch_name": "refs/heads/master", "committer_date": 1540730913000, "content_id": "3a1b728681aa46cc38cd41fea65262693431ae98", "detected_licenses": [ "MIT" ], "directory_id": "8966c316c56586ca589206d83b9d35aec69cc1eb", "extension": "py", "fi...
2.453125
stackv2
from flask import Flask, request, abort import os from linebot import ( LineBotApi, WebhookHandler ) from linebot.exceptions import ( InvalidSignatureError ) from linebot.models import ( MessageEvent, TextMessage, TextSendMessage, ) import json import urllib.request import re app = Flask(__name__) # 環境変...
175
26.87
100
21
1,305
python
[{"finding_id": "codeql_py/log-injection_8124326e9b23129d_fc051c47", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 38 ]
[ null ]
[ 21 ]
[ 44 ]
2024-11-18T22:05:55.032360+00:00
1,608,092,682,000
5fe165f6666c0adaa5037a9e56aab9044d0fdbc0
3
{ "blob_id": "5fe165f6666c0adaa5037a9e56aab9044d0fdbc0", "branch_name": "refs/heads/master", "committer_date": 1608092682000, "content_id": "4afd2bac64b668a5a3226c315d67886be1ab5fc4", "detected_licenses": [ "MIT" ], "directory_id": "b041baf74ad7e684f4da7581f28d8c5702c4bce3", "extension": "py", "fi...
2.890625
stackv2
from datetime import datetime from zoneinfo import ZoneInfo from django.conf import settings from django.contrib.auth import get_user_model from django.contrib.auth.backends import BaseBackend import requests from .models import User def retrieve_user_from_api(username, password): """ The MyVision API uses ...
118
41.25
105
21
1,012
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d471ea8c3703fe4c_914c54a7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 69 ]
[ null ]
[ 28 ]
[ 42 ]
2024-11-18T22:05:55.651343+00:00
1,611,807,379,000
bff0dae7792db3897d9005b1b49aec928541bff9
4
{ "blob_id": "bff0dae7792db3897d9005b1b49aec928541bff9", "branch_name": "refs/heads/main", "committer_date": 1611807379000, "content_id": "72ede1bcf753123febfed4a586017c5514fb8a2c", "detected_licenses": [ "MIT" ], "directory_id": "aed1fdbad787e252c19b6fa1e7328014df02feda", "extension": "py", "file...
4.28125
stackv2
# https://www.globaletraining.com/ # Public & Private Access Modifiers # Public class Employee: # Class Constructor (Method with a special name) def __init__(self, first_name, last_name, base_annual_salary, bonus_percentage): self.first_name = first_name self.last_name = last_name sel...
36
29.81
84
11
277
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_25d19b6142d55196_f679dad6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 30, 32 ]
[ null, null ]
[ 11, 11 ]
[ 72, 73 ]
2024-11-18T22:48:58.644531+00:00
1,524,799,686,000
7e61b0b07534007c9cb4399ac55bc5f2233d7b3b
2
{ "blob_id": "7e61b0b07534007c9cb4399ac55bc5f2233d7b3b", "branch_name": "refs/heads/master", "committer_date": 1524799686000, "content_id": "4d79771974ba1d72729dba79c6a72fb8f1fcfad0", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e5af08144bcf3d07d015e8d41834ea5a281bc594", "extension": "py"...
2.453125
stackv2
from cloudant import Cloudant from flask import Flask, render_template, request, jsonify import atexit import cf_deployment_tracker import os import json import ibmiotf.application import pandas as pd import numpy as np from sklearn import svm import time import datetime client=None train_dataframe = pd.read_csv('trai...
123
26.89
155
16
954
python
[{"finding_id": "codeql_py/flask-debug_c471a3f5f6954ce6_6b64fb73", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 123, 110 ]
[ null, null ]
[ 2, 9 ]
[ 48, 18 ]
2024-11-18T22:48:59.075670+00:00
1,558,521,116,000
0477c25462079544459863b1f2164a8432b2d9a4
3
{ "blob_id": "0477c25462079544459863b1f2164a8432b2d9a4", "branch_name": "refs/heads/master", "committer_date": 1558521116000, "content_id": "1113a19e472876f997967740763802e76cde1916", "detected_licenses": [ "MIT" ], "directory_id": "e565dba72af21c596f1405aac4bc132a97a0e562", "extension": "py", "fi...
3.15625
stackv2
import hashlib import random import string def _hash(salt, raw_password): data = "{0}{1}".format(salt, raw_password) return hashlib.sha512(data.encode("UTF-8")).hexdigest() def encrypt_password(plaintext): salt = "".join(random.sample(string.ascii_letters + string.digits, 32)) hashstr = _hash(salt, ...
19
25.53
75
12
128
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_318bab7e8071ae9e_2078d94d", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally e...
[ 8 ]
[ null ]
[ 27 ]
[ 47 ]
2024-11-18T23:25:57.837205+00:00
1,530,038,426,000
bcdb17b82c0edb39255c1de9b6dea7041c3de84f
4
{ "blob_id": "bcdb17b82c0edb39255c1de9b6dea7041c3de84f", "branch_name": "refs/heads/master", "committer_date": 1530038426000, "content_id": "3f7635c7eb77867493457c6dc499a0c1bf63251b", "detected_licenses": [ "MIT" ], "directory_id": "4e2f687b73f8794bd75d75509e63dba1a8079ac2", "extension": "py", "fi...
4.1875
stackv2
print("Let's practice everything.") print('You \'d need to know \'bout escapes with \\ that do:') print('\n new;ines and \t tabs.') poem = """ \t The lovely world with logic so family p;anted cannot discern \n the needs of love nor comprehend passion from intuition and requires an expalanation \n\t\t where there is ...
36
26.14
68
8
267
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_aa99dc2b678e5be9_ed01b8b2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 30, 30, 30 ]
[ null, null, null ]
[ 21, 38, 51 ]
[ 26, 42, 57 ]
2024-11-18T23:26:01.331192+00:00
1,692,791,435,000
34da59d67c71680142e0d4229728116d4abce239
2
{ "blob_id": "34da59d67c71680142e0d4229728116d4abce239", "branch_name": "refs/heads/master", "committer_date": 1692791435000, "content_id": "7c990f4eba753e71848fe6b67fc4fcf46bfa8ead", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "1cd48a9c3e558e05e0ceeb9ab4b689a2d2be5cf8", "extension": "p...
2.390625
stackv2
from datetime import datetime from random import sample from os import path from time import time import os from jinja2 import Template SCRIPT_DIR = path.abspath(path.join(path.dirname(__file__))) def hand...
22
33.55
97
15
160
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_051444a1ed20dbf4_8a0ee473", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 18 ]
[ null ]
[ 16 ]
[ 96 ]
2024-11-18T23:26:05.579216+00:00
1,532,162,870,000
f93a2f0e1d8c616d14570bd04ff579a600af1838
3
{ "blob_id": "f93a2f0e1d8c616d14570bd04ff579a600af1838", "branch_name": "refs/heads/master", "committer_date": 1532162870000, "content_id": "54a110a7add4c5fd4c7a462226dd7556e518f7d4", "detected_licenses": [ "MIT" ], "directory_id": "0a38ee8211153b53c6b67110dd912f694c1c2519", "extension": "py", "fi...
2.625
stackv2
import sys import os import os.path import paramiko import re local_path = '' ssh_path = '' local_file = [] local_folder = [] class ssh: hostname='' port=22 username='' password='' def connect(self): self.ssh = paramiko.SSHClient() self.ssh.set_missing_host_key_policy(paramiko.Aut...
77
26.35
112
13
516
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_c9d9180cc5b2db5a_eef9ddfb", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 20 ]
[ null ]
[ 9 ]
[ 69 ]
2024-11-18T23:26:08.083901+00:00
1,627,009,793,000
16319537426cf4f8ec539692739dfe1914063ff7
2
{ "blob_id": "16319537426cf4f8ec539692739dfe1914063ff7", "branch_name": "refs/heads/main", "committer_date": 1627009793000, "content_id": "acb58b6eeceadcf3aaa35ad22040bb04f95021c9", "detected_licenses": [ "MIT" ], "directory_id": "48a90d421800be13742cec493775e6c0a8c4d131", "extension": "py", "file...
2.390625
stackv2
import os from flask import Flask, flash, request, redirect, url_for from werkzeug.utils import secure_filename from flask import send_from_directory import requests app = Flask(__name__) UPLOAD_FOLDER = os.path.join(app.root_path, 'melody_separator/src/input') DOWNLOAD_FOLDER = os.path.join(app.root_path, 'SPICE') ...
61
31.56
83
16
458
python
[{"finding_id": "codeql_py/flask-debug_a20b17191c089111_fdddd8a8", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-601", "CWE-601" ]
[ "py/flask-debug", "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 61, 30, 36 ]
[ null, null, null ]
[ 5, 29, 29 ]
[ 49, 40, 40 ]
2024-11-18T22:39:21.834863+00:00
1,567,605,827,000
7d80363bd458d63e665ece123675838c7302cdfc
3
{ "blob_id": "7d80363bd458d63e665ece123675838c7302cdfc", "branch_name": "refs/heads/master", "committer_date": 1567605827000, "content_id": "64cc7277655483a663732238f6b93c47e9ddc16a", "detected_licenses": [ "MIT" ], "directory_id": "4b06fd6b46ffc8bdfa476499b96fdefc93053300", "extension": "py", "fi...
2.734375
stackv2
import time import urllib import urllib.request import json class TransitlandRequest(object): """Simple transitland API interface, with rate limits.""" last_request_time = 0.0 # time of last request def __init__(self, host='https://transit.land', apikey=None, ratelimit=8, retrylimit=5): self.host = host ...
70
31.79
90
19
594
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5dbc52c15c97a045_6ce7a650", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 29 ]
[ null ]
[ 11 ]
[ 14 ]
2024-11-18T22:14:47.876441+00:00
1,570,565,161,000
dc3f3aeb140af36971ad6eed7702db748482f36b
2
{ "blob_id": "dc3f3aeb140af36971ad6eed7702db748482f36b", "branch_name": "refs/heads/master", "committer_date": 1570565161000, "content_id": "5ebda871123d2863932dd8d49453e21a52af3f6d", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "8daeab974fd462b6a776f8d8336ec99730bc5ca1", "extension": "p...
2.3125
stackv2
#!/bin/env python # # Python script to generate new DCDE user mapfiles # /etc/globus/globus-acct-map (for globus ssh) # # ldapsearch -LLL -H ldaps://ldap.cilogon.org \ # -D 'uid=readonly_user,ou=system,o=DCDE,o=CO,dc=cilogon,dc=org' -x \ # -w XXXXXXXX \ # -b 'o=DCDE,o=CO,dc=cilogon,dc=org' # import argparse i...
131
27.04
127
17
1,064
python
[{"finding_id": "codeql_py/overly-permissive-file_9c6b108cee898551_9a816d2e", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable." ]
[ 91 ]
[ null ]
[ 3 ]
[ 27 ]
2024-11-18T22:15:00.472406+00:00
1,550,581,160,000
b6a96b78d94dc127a88c1b5643525fbabef6a860
3
{ "blob_id": "b6a96b78d94dc127a88c1b5643525fbabef6a860", "branch_name": "refs/heads/master", "committer_date": 1550581160000, "content_id": "d62756ee8155af743fa6440395c50fd41a2a712f", "detected_licenses": [ "MIT" ], "directory_id": "a0fe87fbc3541205f6587e297b22311f744592eb", "extension": "py", "fi...
2.65625
stackv2
from selenium import webdriver from selenium.webdriver.common.keys import Keys from tts import tts import re def open_firefox(): tts("OK, opening Firefox") webdriver.Firefox() def check_email(): un = "YOUR_USER_NAME" pw = "YOUR_PASSWORD" driver = webdriver.Firefox() driver.get("https://mail.pr...
33
31.39
71
9
245
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_64d2e6d16455a01d_b20518fb", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [Startpage.com](1) may be at an arbitrary position in t...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [Startpage.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 28 ]
[ null ]
[ 12 ]
[ 43 ]
2024-11-18T22:55:27.651487+00:00
1,417,717,687,000
c62be33fd7ecef59f4fc063b0ff7859391a3523f
3
{ "blob_id": "c62be33fd7ecef59f4fc063b0ff7859391a3523f", "branch_name": "refs/heads/master", "committer_date": 1417717687000, "content_id": "6e6c1ebe5cf40150e89a009e718731dfba8ad75e", "detected_licenses": [ "MIT" ], "directory_id": "0912e909b34753d4159c8804c77208ef00b358b0", "extension": "py", "fi...
2.53125
stackv2
#!/usr/bin/env python import os , sys , getopt, subprocess , paramiko , csv #executes a remote process in a node def execute(channel, command): command = 'echo $$; exec ' + command stdin, stdout, stderr = channel.exec_command(command) pid = int(stdout.readline()) return pid, stdin, stdout, stderr def ge...
171
36.15
86
24
1,694
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_884863f6b87b6d81_9f771464", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/paramiko-missing-host-key-validation", "py/paramiko-missing-host-key-validation" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe.", "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 100, 131 ]
[ null, null ]
[ 7, 9 ]
[ 64, 66 ]
2024-11-19T00:34:38.865721+00:00
1,500,230,440,000
a09d4ae03d7f1e6042b785739a202996333c95be
3
{ "blob_id": "a09d4ae03d7f1e6042b785739a202996333c95be", "branch_name": "refs/heads/master", "committer_date": 1500230440000, "content_id": "b7a6b733bcf98e9d9889d93acc0297d91500f692", "detected_licenses": [ "MIT" ], "directory_id": "6424de9456d193939fa68c44655d9e2096f3fd9d", "extension": "py", "fi...
2.859375
stackv2
import os import json import numpy as np import pandas as pd from IPython.display import display, clear_output from scipy.optimize import linprog from bs4 import BeautifulSoup from IPython.display import HTML from fractions import Fraction from urllib.parse import urlparse class Election: """ Random elect...
388
33.1
100
20
3,197
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_8601c347dca4e7a3_2a52395c", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 267 ]
[ 269 ]
[ 15 ]
[ 56 ]
2024-11-19T00:45:01.854365+00:00
1,540,455,105,000
ca9f13c02fd33a6b924d2b652b5752d150c67f76
2
{ "blob_id": "ca9f13c02fd33a6b924d2b652b5752d150c67f76", "branch_name": "refs/heads/master", "committer_date": 1540455105000, "content_id": "0836eb334eb95a45f2cec1d08faa89b5000daced", "detected_licenses": [ "MIT" ], "directory_id": "5d0e83e9e1e1e335e371eef7f3a3105ee250a96e", "extension": "py", "fi...
2.390625
stackv2
# -*- coding: utf-8 -*- import flask_login from flask import request, make_response, render_template, url_for, Blueprint from flask_restful import abort from werkzeug.utils import redirect from robot_ctl.db_util import get_user_session, get_qq_page from robot_ctl.logger import getLogger from robot_ctl.login_manager i...
97
30.71
95
16
744
python
[{"finding_id": "codeql_py/insecure-cookie_ea061c3d093e7057_056f9daa", "tool_name": "codeql", "rule_id": "py/insecure-cookie", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Cookie is added to response without the 'secure' flag being set.", "remediation": "", "location": {"file_path"...
3
true
[ "CWE-614", "CWE-020", "CWE-1004" ]
[ "py/insecure-cookie", "py/cookie-injection", "py/client-exposed-cookie" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cookie is added to response without the 'secure' flag being set.", "Cookie is constructed from a [user-supplied input](1).", "Sensitive server cookie is set without HttpOnly flag." ]
[ 50, 50, 50 ]
[ null, null, null ]
[ 13, 41, 13 ]
[ 50, 49, 50 ]
2024-11-18T23:39:44.456672+00:00
1,458,163,508,000
284473c3b1363596d4cc94aba093196f7111aecf
3
{ "blob_id": "284473c3b1363596d4cc94aba093196f7111aecf", "branch_name": "refs/heads/master", "committer_date": 1458163508000, "content_id": "c67b7ef0740556599aaf7e27760b43d9f626e5d2", "detected_licenses": [ "MIT" ], "directory_id": "7db38f91cd751121e944988a69cba21da9cad428", "extension": "py", "fi...
2.8125
stackv2
from hashlib import sha256 from uuid import uuid4 import sqlite3 import getpass import os import os.path ## # Prints a header for the configuration script def print_header(): print ' == DODSCP CONFIGURATION SCRIPT ==' print ' ' print 'This program will configure DODSCP for your use.' print 'It is...
129
31.11
120
13
996
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_1def38457973fac2_c6ddd875", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 87 ]
[ null ]
[ 21 ]
[ 51 ]
2024-11-18T23:40:01.784414+00:00
1,471,646,347,000
51f8bdb621dea191bfc009e936cf718d474c1350
2
{ "blob_id": "51f8bdb621dea191bfc009e936cf718d474c1350", "branch_name": "refs/heads/master", "committer_date": 1471646347000, "content_id": "61ced50a49c0d75d641be5525a47fa8d074785ab", "detected_licenses": [ "MIT" ], "directory_id": "712277959b65f12b745027214c11fbf431aaa74d", "extension": "py", "fi...
2.421875
stackv2
# -*- coding: utf-8 -*- from os import path, environ from flask import Flask, jsonify, abort, render_template, request, redirect from flask import url_for, flash import yaml import json from glob import glob import itertools import urbanairship as ua import redis import datetime import time import uuid import sys from ...
275
25.79
78
17
1,724
python
[{"finding_id": "codeql_py/flask-debug_5ec4890bb024e1f4_91462573", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-022", "CWE-022" ]
[ "py/flask-debug", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 275, 210, 219 ]
[ null, null, null ]
[ 5, 26, 26 ]
[ 24, 27, 27 ]
2024-11-19T01:11:27.718313+00:00
1,598,535,210,000
edc11f883ac033edacbe25ccf2d2b254bdd58bbe
3
{ "blob_id": "edc11f883ac033edacbe25ccf2d2b254bdd58bbe", "branch_name": "refs/heads/master", "committer_date": 1598535210000, "content_id": "98c17cebb44245b1da0caedbd6d573d562612b9b", "detected_licenses": [ "MIT" ], "directory_id": "d70dbd11e73cb4425630c4d1ad1a0e4c2ebd705e", "extension": "py", "fi...
3.21875
stackv2
""" Common helper functions """ import logging import functools from jinja2 import Template import json logger = logging.getLogger('main.helpers') def dot_to_json(a): output = {} for key, value in a.items(): path = key.split('.') if path[0] == 'json': path = path[1:] targe...
82
24.34
86
17
465
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_52aac0e507e85fcf_d213b4c8", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 34 ]
[ null ]
[ 9 ]
[ 27 ]
2024-11-19T01:11:30.817557+00:00
1,600,882,894,000
edb4bd3907379b77e64fbf458fdff6f122d89e1f
3
{ "blob_id": "edb4bd3907379b77e64fbf458fdff6f122d89e1f", "branch_name": "refs/heads/master", "committer_date": 1600882894000, "content_id": "b704ff75e3ad689e46edd7a4559e718b30c1d180", "detected_licenses": [ "MIT" ], "directory_id": "f5f0df08146a4f506bc2668ebfbac006e3bc428f", "extension": "py", "fi...
3.140625
stackv2
from models import ManagerModel from encryption import Crypto class ManagerService: def __init__(self, password): self.crypto = Crypto(password) self.model = ManagerModel() def add(self): App = self.crypto.EncryptString(input("App/Webpage name: ")) Username = self.crypto.En...
87
32.9
125
19
606
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f50b902c524ca6fd_d20a95ed", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 74 ]
[ null ]
[ 19 ]
[ 103 ]
2024-11-19T01:11:33.085997+00:00
1,583,134,181,000
f829714210432ed2ab4e0e6980b407339578e556
2
{ "blob_id": "f829714210432ed2ab4e0e6980b407339578e556", "branch_name": "refs/heads/master", "committer_date": 1583134181000, "content_id": "861ac663d595b2a85bef46c3aa083e84ceda9bba", "detected_licenses": [ "MIT" ], "directory_id": "f2c52ff65bbd835acd8289c5d71b4ecb56463504", "extension": "py", "fi...
2.5
stackv2
from flask import render_template, request, redirect, flash, url_for from app.auth.forms import LoginForm from flask_login import current_user, login_user, logout_user from app.models import User from werkzeug.urls import url_parse from app.auth import bp @bp.route('/') @bp.route('/login',methods=['GET','POST']) de...
48
31.65
73
16
330
python
[{"finding_id": "codeql_py/url-redirection_45af9117d57a007b_0fd77f09", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 39 ]
[ null ]
[ 25 ]
[ 34 ]
2024-11-19T01:11:37.142631+00:00
1,555,944,739,000
584f8a9a611ce5fe6433a1271b69439d86211b9a
2
{ "blob_id": "584f8a9a611ce5fe6433a1271b69439d86211b9a", "branch_name": "refs/heads/master", "committer_date": 1555944739000, "content_id": "45f3f51122d94b1d3bbe76ac60ea486e65d27bee", "detected_licenses": [ "Apache-2.0" ], "directory_id": "bba0c52a24495fd612d9365de20e0ccb6185c161", "extension": "py"...
2.328125
stackv2
#coding: utf8 import hashlib from rust.core import business from rust.core.exceptions import BusinessError from rust.resources.business.user.encode_service import EncodeService from rust.resources.business.user.user_repository import UserRepository from rust.utils.jwt_service import JWTService from rust.resources.db...
38
28.39
71
14
260
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_bac7e926264f9061_bffe6ff2", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expen...
[ 24 ]
[ null ]
[ 23 ]
[ 42 ]
2024-11-18T23:48:14.690224+00:00
1,647,787,659,000
12fd58f365c6179240fd2396e0792f8ec0a22d48
3
{ "blob_id": "12fd58f365c6179240fd2396e0792f8ec0a22d48", "branch_name": "refs/heads/master", "committer_date": 1647787659000, "content_id": "c930c1d31559eac1e3c1e2cfc5533d7df0b77b46", "detected_licenses": [ "Apache-2.0" ], "directory_id": "3da3704c5e87255697f75a5ec38effd2e8480ce6", "extension": "py"...
3.0625
stackv2
# Environment Preparation ============================================================= ''' After install Anaconda pip install jupyter # Check environments conda env list # Creating a environment for web crawling conda create --name crawler python=3 # Activate environment conda activate crawler # Installing required pa...
187
30.85
106
13
1,636
python
[{"finding_id": "codeql_py/request-without-cert-validation_300faa1fc89d245e_336484f5", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
4
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 48, 57, 101, 107 ]
[ null, null, null, null ]
[ 5, 5, 5, 5 ]
[ 87, 88, 86, 102 ]
2024-11-18T23:48:20.426203+00:00
1,443,337,931,000
cb5e87cc4a611ab45103d8255298ee93804627be
2
{ "blob_id": "cb5e87cc4a611ab45103d8255298ee93804627be", "branch_name": "refs/heads/master", "committer_date": 1443337931000, "content_id": "aed5ec14c92a1d40607665b78acf2d549839b0b2", "detected_licenses": [ "MIT" ], "directory_id": "2c7fc19093601619a52bace4f35b981b8586bc20", "extension": "py", "fi...
2.375
stackv2
import re import zlib import gzip import struct import socket from datetime import datetime, timedelta import requests from ybk.log import quote_log as log from ybk.models import Quote, Collection from ybk.settings import SITES, get_conf session = requests.Session() session.headers = { 'User-Agent': 'Mozilla/5.0...
253
34.72
81
23
2,326
python
[{"finding_id": "codeql_py/request-without-cert-validation_64e8497baccd3e06_a1caf0bb", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 68 ]
[ 69 ]
[ 17 ]
[ 55 ]
2024-11-18T23:48:21.971164+00:00
1,607,801,627,000
7a37683bc1fd7de9a0156892de5905ddd9e66dd0
3
{ "blob_id": "7a37683bc1fd7de9a0156892de5905ddd9e66dd0", "branch_name": "refs/heads/master", "committer_date": 1607801627000, "content_id": "5450b9c686609dfb6177464e0e3346c57a021dcb", "detected_licenses": [ "MIT" ], "directory_id": "d87a7d2234a376dc3f234c3d8298ed0f9055dbb9", "extension": "py", "fi...
2.5625
stackv2
from dbArtistsBase import dbArtistsBase from dbBase import dbBase from artistMB import artistMB from discogsUtils import musicbrainzUtils import urllib from urllib.parse import quote from webUtils import getHTML from fsUtils import isFile, setFile from multiArtist import multiartist from ioUtils import getFile from tim...
177
37.86
118
21
1,392
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_d505cec1ac97f142_642a5973", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.",...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 90 ]
[ null ]
[ 26 ]
[ 45 ]
2024-11-18T23:23:31.287780+00:00
1,663,770,033,000
dda795265b958c14817748c7aa905aa59d7bffc9
2
{ "blob_id": "dda795265b958c14817748c7aa905aa59d7bffc9", "branch_name": "refs/heads/master", "committer_date": 1663770033000, "content_id": "0bdcaf24710f5c5bcee88075a1c7af21f71261e5", "detected_licenses": [ "MIT" ], "directory_id": "70bc025dea64f085ff830e29d453121a68bf410c", "extension": "py", "fi...
2.34375
stackv2
#!/usr/bin/env python import logging logging.basicConfig(level=logging.INFO) import flickrapi from flask import Flask, render_template, redirect, url_for, request, session app = Flask(__name__) api_key = u'ecd01ab8f00faf13e1f8801586e126fd' api_secret = u'2ee3f558fd79f292' @app.route("/") def index(): return r...
62
28.45
80
13
454
python
[{"finding_id": "codeql_py/reflective-xss_989dfebab82d0660_27690cca", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 56 ]
[ null ]
[ 12 ]
[ 39 ]
2024-11-18T23:23:31.688583+00:00
1,497,536,316,000
706c6eb30dc7f674ea52b170f13d4ef42e3f11fc
3
{ "blob_id": "706c6eb30dc7f674ea52b170f13d4ef42e3f11fc", "branch_name": "refs/heads/master", "committer_date": 1497536316000, "content_id": "befcd67768beb0220be743288e6ab8d72063b752", "detected_licenses": [ "Apache-2.0" ], "directory_id": "46ec3c28890f9dbd6516d5f71d94705943a6c418", "extension": "py"...
2.703125
stackv2
import asyncio import ssl import warnings from pypeman import endpoints, channels, nodes, message import aiohttp from aiohttp import web class HTTPEndpoint(endpoints.BaseEndpoint): """ Endpoint to receive HTTP connection from outside. """ def __init__(self, adress='127.0.0.1', port='8080', loop=None...
146
35.79
169
17
1,168
python
[{"finding_id": "codeql_py/stack-trace-exposure_20ad836d866b412f_76ca44fb", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 76 ]
[ null ]
[ 38 ]
[ 60 ]
2024-11-19T00:44:13.785987+00:00
1,389,170,186,000
aaeb0fe4fc16b6513eba917873e1d4e24b2906bc
3
{ "blob_id": "aaeb0fe4fc16b6513eba917873e1d4e24b2906bc", "branch_name": "refs/heads/master", "committer_date": 1389170186000, "content_id": "54c5b232923d568581d39ea0c6444712c5197d66", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "c4f3f6b335501bf82a548cdf1e14ea234fe0c913", "extension": "p...
2.953125
stackv2
#-*- coding: utf-8 -*- # # This file belongs to Gyrid Server. # # Copyright (C) 2012 Roel Huybrechts # All rights reserved. """ Module that provides a few simple tests and conversions. Can for instance be used to validate configuration file values. All tests take at least the value to validate as an argument. When t...
80
25.85
120
10
641
python
[{"finding_id": "codeql_py/redos_62d6674c8a624997_2f54f71d", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '\"' and containing many repetitio...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '\"' and containing many repetitions of '\\\\013'." ]
[ 73 ]
[ null ]
[ 14 ]
[ 89 ]
2024-11-19T00:44:16.133805+00:00
1,512,327,801,000
0edef055c353b2276adb6facf70b32afdc203a71
3
{ "blob_id": "0edef055c353b2276adb6facf70b32afdc203a71", "branch_name": "refs/heads/master", "committer_date": 1512327801000, "content_id": "67d11d099bbbbf84419dd5cf45d566da2d23f9f2", "detected_licenses": [ "Apache-2.0" ], "directory_id": "363bfead6b995bdc7242654e5002b9de3ce2810c", "extension": "py"...
2.609375
stackv2
from cloudant import Cloudant from flask import Flask, render_template, request, jsonify import atexit import cf_deployment_tracker import os import json # Emit Bluemix deployment event cf_deployment_tracker.track() app = Flask(__name__) db_name = 'mydb' client = None db = None if 'VCAP_SERVICES' in os.environ: ...
133
32.44
135
17
1,519
python
[{"finding_id": "codeql_py/flask-debug_93e695c54c1cb06b_cae65c6a", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 133, 77 ]
[ null, null ]
[ 5, 16 ]
[ 51, 60 ]
2024-11-19T00:44:31.682027+00:00
1,593,064,691,000
8c58fb641072cde36fe843559148dd5bf1dea0ce
2
{ "blob_id": "8c58fb641072cde36fe843559148dd5bf1dea0ce", "branch_name": "refs/heads/master", "committer_date": 1593064691000, "content_id": "b28bef001a40b3c01e8f1ee534261b3b419431d2", "detected_licenses": [ "MIT" ], "directory_id": "9d0093d9545df0fc646b11c80007c55d797242ea", "extension": "py", "fi...
2.375
stackv2
import requests from flask import Flask, json,jsonify,render_template from json2table import convert #pull data from api if __name__ == "__main__": url_players = "https://www.balldontlie.io/api/v1/players" r_players = requests.get(url_players) response_data_players = r_players.json() url_teams = "https://www.ba...
105
31.52
106
10
841
python
[{"finding_id": "codeql_py/flask-debug_24a432bcf868202a_960bb932", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-918", "CWE-918" ]
[ "py/flask-debug", "py/partial-ssrf", "py/partial-ssrf" ]
[ "HIGH", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Part of the URL of this request depends on a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 105, 49, 77 ]
[ null, null, null ]
[ 2, 14, 12 ]
[ 23, 56, 55 ]
2024-11-18T23:05:25.870685+00:00
1,612,626,156,000
394f5ff27a8a40e6ab945070e2a0db5d91629ffa
3
{ "blob_id": "394f5ff27a8a40e6ab945070e2a0db5d91629ffa", "branch_name": "refs/heads/master", "committer_date": 1612626156000, "content_id": "1b3fc65069f6d4e1be9b4b6e13d55d01629f13be", "detected_licenses": [ "MIT" ], "directory_id": "4f674ae175b633fc5b1c5614344fe1ab114c1752", "extension": "py", "fi...
2.59375
stackv2
import flask from flask import request, jsonify import json import base64 import requests import json import cv2 import os import numpy as np import urllib.request as urllib2 app = flask.Flask(__name__) def download_video(url): file_name = 'trial_video.mp4' rsp = urllib2.urlopen(url) with open(file_name...
98
21.07
81
14
586
python
[{"finding_id": "codeql_py/full-ssrf_3a1301a9b1e93574_dd3d92bb", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
1
true
[ "CWE-918" ]
[ "py/full-ssrf" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1)." ]
[ 17 ]
[ null ]
[ 11 ]
[ 31 ]
2024-11-18T23:05:28.271163+00:00
1,452,452,314,000
f463ad22cf25a82867f9415d1db0d696e3df7d94
2
{ "blob_id": "f463ad22cf25a82867f9415d1db0d696e3df7d94", "branch_name": "refs/heads/master", "committer_date": 1452452314000, "content_id": "eaaba8ebfc3f4dde1b957128a01703452404a01f", "detected_licenses": [ "MIT" ], "directory_id": "b4a9f3f7c1fef09daf8e88a38d0d16c0baa33017", "extension": "py", "fi...
2.328125
stackv2
#!/usr/bin/env python # # Python Version: 2.7 # Boto Version 2.38 # # Enable CloudTrail logging in all AWS regions # # Must be the first line from __future__ import print_function import boto.cloudtrail import boto.sns import sys, getopt def get_regions(): """ Build a region list """ reg_list = [] for reg in...
155
28.94
112
15
1,355
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1040a81e5703a37b_bd916079", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text." ]
[ 116 ]
[ null ]
[ 11 ]
[ 87 ]
2024-11-18T23:05:36.695279+00:00
1,529,659,443,000
b610f9c10ffd199df8fd2fe5ca8a2900c9694312
4
{ "blob_id": "b610f9c10ffd199df8fd2fe5ca8a2900c9694312", "branch_name": "refs/heads/master", "committer_date": 1529659443000, "content_id": "32e582f834285fdd277d18124f4b6c1baa4d6f1b", "detected_licenses": [ "MIT" ], "directory_id": "5e442dd400abaeaeb74a3f58d1002ad60cb909f2", "extension": "py", "fi...
4
stackv2
import re def split_input_string(input_string): """ Split input string into identifiers, symbols and numbers. :param input_string: str, input string representing an assignment statement, like 'A=B+C'. :return: list with each item containing split symbols, identifiers and numbers. All ...
30
32.77
101
15
227
python
[{"finding_id": "codeql_py/overly-large-range_27fbe4b8c7999cc4_59a489f7", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with 0-9 in the same character class, and is equivalent to \\[+...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with 0-9 in the same character class, and is equivalent to \\[+,\\-.\\/0-9:;<=\\]." ]
[ 13 ]
[ null ]
[ 43 ]
[ 46 ]
2024-11-18T23:05:40.963661+00:00
1,629,547,185,000
21763d3e9e754c856cc46fd1ca614623a3f872cb
3
{ "blob_id": "21763d3e9e754c856cc46fd1ca614623a3f872cb", "branch_name": "refs/heads/main", "committer_date": 1629547185000, "content_id": "e129cd1eb80b85d1d3fc86cdaeeff6a9b81c1266", "detected_licenses": [ "MIT" ], "directory_id": "a17be47b4a785f831a4b8b0ee43eacc4515de518", "extension": "py", "file...
3.390625
stackv2
""" Preparing the data for both the stanford parser Java implementations and the Jython implementations. """ import pandas as pd class PrepareStanfordParser: """Useful functions for pipeline to iterate towards the use of the Stanford parser""" def __init__(self): self.genes = self.get_genes() ...
78
29.67
90
15
537
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_c0151d162cb931b5_21727f8d", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.\nThis expression stores [sensitive data (private)](3) as clear text." ]
[ 75 ]
[ null ]
[ 29 ]
[ 44 ]
2024-11-18T23:05:49.836450+00:00
1,515,663,195,000
991e1a216fa9035d6bdc7587ba7233b6d81af03a
3
{ "blob_id": "991e1a216fa9035d6bdc7587ba7233b6d81af03a", "branch_name": "refs/heads/master", "committer_date": 1515663195000, "content_id": "aa0b3c5f7a01e2d58f0aee17288e6fe813c07ac2", "detected_licenses": [ "Apache-2.0" ], "directory_id": "cd4645887981f86afd9d1b0f20fdc25834020239", "extension": "py"...
3.03125
stackv2
import hashlib import os import base64 class PasswordHelper: def get_hash(self, plain): hash = hashlib.sha512() hash.update(('%s%s' % (self.get_salt(), plain)).encode('utf-8')) return hash.hexdigest() def get_salt(self): password_salt = os.urandom(32).hex() return pass...
19
26.84
72
16
135
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_32f72486faed3c00_b85d8436", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 9 ]
[ null ]
[ 21 ]
[ 72 ]
2024-11-18T23:42:49.755577+00:00
1,433,803,405,000
4950dbcab1fb7bd5b60a056c3adceaecc50e55ee
2
{ "blob_id": "4950dbcab1fb7bd5b60a056c3adceaecc50e55ee", "branch_name": "refs/heads/master", "committer_date": 1433803405000, "content_id": "47afeaad1a0258115becaffc1947ec7b271638f4", "detected_licenses": [ "MIT" ], "directory_id": "824c6f07b1ceae9c517e9839a5d77d43f9409d3a", "extension": "py", "fi...
2.453125
stackv2
# -*- coding: utf-8 -*- #------------------------------------------------------------------------------ # Python API kit for the Bits on the Run System API # # Author: Sergey Lashin # Copyright: (c) 2010 - 2011 LongTail Ad Solutions # License: GNU Lesser General Public License, version 3 # http:...
328
34.37
102
26
2,396
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_17571a23ae03df3e_23459272", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecu...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecure." ]
[ 298 ]
[ null ]
[ 38 ]
[ 56 ]
2024-11-19T01:21:50.494988+00:00
1,531,311,928,000
2ad7140b9e55c4be0ec730c1de03a6aaf1fb5782
3
{ "blob_id": "2ad7140b9e55c4be0ec730c1de03a6aaf1fb5782", "branch_name": "refs/heads/master", "committer_date": 1531311928000, "content_id": "a7c3d5e8de4fea842e46ed26bbfc3a59c6d66ae6", "detected_licenses": [ "Unlicense" ], "directory_id": "49369bb12b964c8546cf66528875f2890098a805", "extension": "py",...
2.65625
stackv2
#!/usr/bin/env python3 import re import operator import nltk from nltk.corpus import stopwords import requests from flask import Flask, render_template, request from collections import Counter from bs4 import BeautifulSoup import mysql.connector as mysql from flask import jsonify app = Flask(__name__) @app.route...
60
32.78
114
17
428
python
[{"finding_id": "codeql_py/flask-debug_a6bcfb9597317605_90fa0ef3", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-918", "CWE-089" ]
[ "py/flask-debug", "py/full-ssrf", "py/sql-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "The full URL of this request depends on a [user-provided value](1).", "This SQL query depends on a [user-provided value](1)." ]
[ 60, 23, 50 ]
[ null, null, null ]
[ 5, 17, 32 ]
[ 24, 34, 37 ]
2024-11-19T00:11:34.889381+00:00
1,589,470,065,000
c96e322ed5c03a69a5d37628145d603fa19c819d
3
{ "blob_id": "c96e322ed5c03a69a5d37628145d603fa19c819d", "branch_name": "refs/heads/master", "committer_date": 1589470065000, "content_id": "af011dedbebc566a2b637510b403f52beed54f8c", "detected_licenses": [ "MIT" ], "directory_id": "98b11c21c3b0df7fb9e37f05ff57e6db4a24495e", "extension": "py", "fi...
2.546875
stackv2
import os.path import tarfile from collections import defaultdict from graphdb_builder import mapping as mp, builder_utils import pandas as pd ################### # FooDB # ################### def parser(databases_directory, download=True): relationships = defaultdict(set) directory = os.path.join...
122
33.78
134
20
991
python
[{"finding_id": "codeql_py/tarslip_0f47f2b1e985145f_976133e9", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 32 ]
[ null ]
[ 9 ]
[ 11 ]
2024-11-19T00:11:37.276925+00:00
1,607,264,514,000
23bb646b04c1cfc4a5f9f5918d8257eb844060f9
4
{ "blob_id": "23bb646b04c1cfc4a5f9f5918d8257eb844060f9", "branch_name": "refs/heads/main", "committer_date": 1607264514000, "content_id": "17827c335a101048a888c94411bf75455a5d4ad1", "detected_licenses": [ "MIT" ], "directory_id": "81ec9ad86d16c8d67af3d4a7e28b789ec35d0a23", "extension": "py", "file...
3.96875
stackv2
import re; #amount of valid passwords in database. #Password is valid if number of times the specified letter appears is between the bounds specified. #Format: 'lowerbound-upperbound letter: password' def part1(database): validPasswords=0 for entry in database: (lowerbound,upperbound, (letter,*_), pa...
31
36.77
100
12
281
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bd62902cf72029ec_6bcdc549", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 30, 31 ]
[ null, null ]
[ 30, 30 ]
[ 47, 47 ]
2024-11-19T00:11:39.929753+00:00
1,430,851,063,000
7f7d58f4e0b5754caef08071e9f2d34dc2d1f7f8
3
{ "blob_id": "7f7d58f4e0b5754caef08071e9f2d34dc2d1f7f8", "branch_name": "refs/heads/master", "committer_date": 1430851063000, "content_id": "a06be2339c7840d1ae77a1e46d41ed13cf74e4d2", "detected_licenses": [ "MIT" ], "directory_id": "1eee1c6c45c5cb2596877b5fef07bcd924a0b69f", "extension": "py", "fi...
2.6875
stackv2
__author__ = 'eliashussen' import pandas as p import requests as r from StringIO import StringIO import datetime from bs4 import BeautifulSoup import re from alchemyapi import AlchemyAPI import json import numpy as np from flask import request from os import path import csv from collections import defaultdict def ge...
189
24.73
114
18
1,296
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_d3bf17060d1a54ea_82608c6f", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'yahoo.com', so it might match more ...
1
true
[ "CWE-020" ]
[ "py/incomplete-hostname-regexp" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'yahoo.com', so it might match more hosts than expected." ]
[ 129 ]
[ null ]
[ 31 ]
[ 71 ]
2024-11-19T00:11:44.228129+00:00
1,554,437,875,000
e3a4d7f46963e5c9a48634d638cfd076167d03ed
3
{ "blob_id": "e3a4d7f46963e5c9a48634d638cfd076167d03ed", "branch_name": "refs/heads/master", "committer_date": 1554437875000, "content_id": "9930055511685e091254fff849c6bc1c629da36c", "detected_licenses": [ "MIT" ], "directory_id": "a074f60de4d3334aad671de363a1a95df52a7f42", "extension": "py", "fi...
2.78125
stackv2
#!/usr/bin/env python3 # Downloads universal dependencies datasets # See http://universaldependencies.org for a list of all datasets from tqdm import tqdm import requests import math import tarfile def download_file(url, filename=None): # Streaming, so we can iterate over the response r = requests.get(url,...
53
26.66
117
13
350
python
[{"finding_id": "codeql_py/tarslip_91095797bf0573a8_b09bef88", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 36 ]
[ null ]
[ 5 ]
[ 8 ]
2024-11-19T00:36:48.658913+00:00
1,572,657,159,000
8c824be0cdeb7a3493b84ef437145386185df179
2
{ "blob_id": "8c824be0cdeb7a3493b84ef437145386185df179", "branch_name": "refs/heads/master", "committer_date": 1572657159000, "content_id": "a1198c2bb80ccfc8d501dbe6a4a90b3515bb7e93", "detected_licenses": [ "Apache-2.0" ], "directory_id": "a7c444fc1a6bb58bceecc566a15a308b90ff3b81", "extension": "py"...
2.484375
stackv2
#!/usr/bin/env python """ A simple service Based on version from Michael Hausenblas, http://mhausenblas.info/#i @author: Jayaprakash Subranmanian @since: 2019-10-27 """ import logging import os import platform import distro import random import sys import time import tornado.ioloop import tornado.web from tornado....
171
29.13
119
18
1,154
python
[{"finding_id": "codeql_py/log-injection_82269b4dba1f236d_8ada003d", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
4
true
[ "CWE-117", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 82, 103, 126, 148 ]
[ null, null, null, null ]
[ 26, 97, 95, 94 ]
[ 48, 119, 117, 116 ]
2024-11-19T00:36:56.629933+00:00
1,615,909,340,000
8080b742ca365aebc9c8b3b3bed8541402db9844
3
{ "blob_id": "8080b742ca365aebc9c8b3b3bed8541402db9844", "branch_name": "refs/heads/main", "committer_date": 1615909340000, "content_id": "6543f926de5bf6122b99f5c0d3437f7185c780b3", "detected_licenses": [ "MIT" ], "directory_id": "a91683a535a03a53f90ad37a0b9b99d17453d63c", "extension": "py", "file...
2.8125
stackv2
import json import pickle from flask import Flask, request from utils.input_processor import process_input from database import Database database = Database() classifier = pickle.load(open("model.pkl", "rb")) app = Flask(__name__) @app.route("/predict", methods=["POST"]) def predict() -> str: """Creates route ...
47
28.83
76
16
312
python
[{"finding_id": "codeql_py/stack-trace-exposure_c3faefc2118610ae_0e8894a3", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 28, 32 ]
[ null, null ]
[ 16, 16 ]
[ 27, 27 ]
2024-11-19T00:51:21.910627+00:00
1,519,742,156,000
4a3f17569adce04d3f487695e01951a94fa362bf
2
{ "blob_id": "4a3f17569adce04d3f487695e01951a94fa362bf", "branch_name": "refs/heads/master", "committer_date": 1519742156000, "content_id": "3671aa5dfeb49a312fce012b105d33d8e92f4aac", "detected_licenses": [ "Apache-2.0" ], "directory_id": "cfe25397f27a17cc642dd8e1ba78ceb75a1c9a93", "extension": "py"...
2.328125
stackv2
# Influxdb core from influxdb_metrics.utils import query from influxdb.exceptions import InfluxDBClientError # Django core from django.http import HttpResponse from django.template import loader from django.shortcuts import redirect from django.contrib.auth.decorators...
200
36.47
118
19
1,541
python
[{"finding_id": "codeql_py/polynomial-redos_33711755a90848d9_e0d33e8c", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with ma...
1
true
[ "CWE-1333" ]
[ "py/polynomial-redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with many repetitions of '.'." ]
[ 79 ]
[ null ]
[ 49 ]
[ 60 ]
2024-11-19T00:51:23.848737+00:00
1,638,662,775,000
5f98ceec443728963eefa718bf43fb7173624e03
3
{ "blob_id": "5f98ceec443728963eefa718bf43fb7173624e03", "branch_name": "refs/heads/main", "committer_date": 1638662775000, "content_id": "aca30483571722335aa0778af5249904cbe05a4a", "detected_licenses": [ "MIT" ], "directory_id": "23509f4a73e20acb4f370e6c66341aaada8e88fe", "extension": "py", "file...
3.0625
stackv2
from DAO.sql_helper import sql_helper class user_dao: """ Class that contains required functions for user_dao. """ def __init__(self): """ Default constructor for the user_dat class. Initializes self.__db with sql_helper() """ self.__db = sql_helper() def create_u...
149
28.65
98
20
950
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c50ab47afa9efcb0_aa3220e9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 29, 29 ]
[ null, null ]
[ 22, 32 ]
[ 30, 38 ]
2024-11-19T01:02:23.628233+00:00
1,595,007,333,000
7910722ec1ea89a7a3b26f32343ef232d9ca4850
2
{ "blob_id": "7910722ec1ea89a7a3b26f32343ef232d9ca4850", "branch_name": "refs/heads/master", "committer_date": 1595007333000, "content_id": "ee3549eb79346845a8b3827c2395e31cfc6bd487", "detected_licenses": [ "MIT" ], "directory_id": "c3a33db74ef936eae39d5d79e5211e4862d22039", "extension": "py", "fi...
2.4375
stackv2
from typing import Dict, Union from django.contrib.auth import authenticate from django.contrib.auth.models import User from django.contrib.sessions.models import Session from django.core.exceptions import ObjectDoesNotExist from django.db.utils import IntegrityError from django.utils import timezone from rest_framewo...
286
39.62
77
17
2,251
python
[{"finding_id": "codeql_py/insecure-cookie_3738830f45fdc777_757804ed", "tool_name": "codeql", "rule_id": "py/insecure-cookie", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Cookie is added to response without the 'secure' flag being set.", "remediation": "", "location": {"file_path"...
7
true
[ "CWE-614", "CWE-614", "CWE-614", "CWE-020", "CWE-1004", "CWE-1004", "CWE-1004" ]
[ "py/insecure-cookie", "py/insecure-cookie", "py/insecure-cookie", "py/cookie-injection", "py/client-exposed-cookie", "py/client-exposed-cookie", "py/client-exposed-cookie" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cookie is added to response without the 'secure' flag being set.", "Cookie is added to response without the 'secure' flag being set.", "Cookie is added to response without the 'secure' flag being set.", "Cookie is constructed from a [user-supplied input](1).", "Sensitive server cookie is set without HttpOn...
[ 80, 228, 281, 282, 80, 228, 281 ]
[ 83, 231, 284, null, 83, 231, 284 ]
[ 13, 13, 13, 30, 13, 13, 13 ]
[ 14, 14, 14, 47, 14, 14, 14 ]
2024-11-18T23:50:11.012012+00:00
1,409,329,507,000
c8fdaace51c60791fe7d16a1cd19aa9a0fb1c1d8
2
{ "blob_id": "c8fdaace51c60791fe7d16a1cd19aa9a0fb1c1d8", "branch_name": "refs/heads/master", "committer_date": 1409329507000, "content_id": "100424d81b90782dffbbaba80ed79364f65c882d", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "ebcbbe645d70d4f756704d3c5113ba25e8a1814c", "extension": "p...
2.359375
stackv2
from flask import (Blueprint, current_app, redirect, render_template, request, session, url_for) from jinja2.filters import urlize from markdown import markdown from urlparse import urljoin from werkzeug.contrib.atom import AtomFeed from sqlalchemy import desc from standup.apps.status.helpers import...
246
30.12
126
18
1,682
python
[{"finding_id": "codeql_py/url-redirection_ffdefe382619a55f_069bce2c", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 246 ]
[ null ]
[ 21 ]
[ 33 ]
2024-11-19T01:51:51.106201+00:00
1,517,311,061,000
89d4d8daa91af278738a5f2a339a5ee79c8fe480
3
{ "blob_id": "89d4d8daa91af278738a5f2a339a5ee79c8fe480", "branch_name": "refs/heads/master", "committer_date": 1517311061000, "content_id": "a92b9ec6dd9c723db6e6253c481501edebad05d5", "detected_licenses": [ "MIT" ], "directory_id": "c3f317030e35db0effb85327d7b49f12641c4909", "extension": "py", "fi...
2.53125
stackv2
import jinja2 as jga import os import itertools as it class LmpWriter(object): '''Writes the pdb data in a lammps compatible data format. Additional parameters are specified in the config file. ''' def __init__(self, environment): template_path = os.path.dirname(os.path.abspath(__file__))+'/lmp...
181
55.15
136
21
2,466
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_e7260afd0ea04f71_0a481d71", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 11 ]
[ null ]
[ 25 ]
[ 65 ]
2024-11-19T00:55:25.025450+00:00
1,614,778,114,000
7fd77fee6e03f2ccfff48c947b7e2010f2e433c2
3
{ "blob_id": "7fd77fee6e03f2ccfff48c947b7e2010f2e433c2", "branch_name": "refs/heads/master", "committer_date": 1614778114000, "content_id": "b769a73c5de8feb683d9f549ce109cf43ce60aa0", "detected_licenses": [ "MIT" ], "directory_id": "8b982f888c26258e2905c725050fe4fae9a9a72c", "extension": "py", "fi...
3.453125
stackv2
import tkinter as tk class LoginApp(tk.Tk): def __init__(self): super().__init__() self.username = tk.Entry(self) self.password = tk.Entry(self, show="*") self.loginButton = tk.Button(self, text="Log in", command=self.printLogin) self.cle...
28
31.43
60
14
193
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3f64efce5abaa013_55c75c82", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 19 ]
[ null ]
[ 15 ]
[ 57 ]
2024-11-19T00:55:26.177055+00:00
1,626,421,076,000
c316f59a2d4691dfab34640df6666ce6a60575cd
3
{ "blob_id": "c316f59a2d4691dfab34640df6666ce6a60575cd", "branch_name": "refs/heads/master", "committer_date": 1626421076000, "content_id": "bf92bbda03a045553cb9f58adb74f9ee09d368a1", "detected_licenses": [ "Apache-2.0" ], "directory_id": "b5167eae1fa86b3729cc149da81a253b0cf3065b", "extension": "py"...
2.53125
stackv2
# *_* coding:utf-8 *_* # 开发人员:烈焰 # 开发时间:2019/12/13 15:34 # 文件名称:page6 # 开发工具:PyCharm # cookie session from flask import Flask,make_response,request app = Flask(__name__,static_url_path="/static",static_folder="static",template_folder="templates") @app.route("/") def index(): """ 定义视图函数 :return: """ ...
44
21.82
111
10
312
python
[{"finding_id": "codeql_py/reflective-xss_050d322c448947df_c565d063", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 32 ]
[ null ]
[ 12 ]
[ 38 ]
2024-11-19T01:39:55.843806+00:00
1,622,439,865,000
41d0cfdb90ee43f37512ae7f2674002f8f7ee9f4
2
{ "blob_id": "41d0cfdb90ee43f37512ae7f2674002f8f7ee9f4", "branch_name": "refs/heads/main", "committer_date": 1622439865000, "content_id": "cdc68dbf41f9f754ae54192c538bbb90113f1a36", "detected_licenses": [ "Apache-2.0" ], "directory_id": "c0817f089d11be16f8177d21ee83630b81a3f76d", "extension": "py", ...
2.5
stackv2
import requests import json import datetime import uuid from faker import Faker import time import random import os import sys import traceback sys.stdout.flush() file1 = open("output.txt","a") faker = Faker() headers = { 'User-Agent': 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTM...
69
35.58
160
22
598
python
[{"finding_id": "codeql_py/request-without-cert-validation_a794d98aa2755346_08b44572", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 30 ]
[ 33 ]
[ 20 ]
[ 43 ]
2024-11-19T01:18:05.856369+00:00
1,634,657,584,000
71e4049b7086e3c355ed79068875bd346919b773
3
{ "blob_id": "71e4049b7086e3c355ed79068875bd346919b773", "branch_name": "refs/heads/main", "committer_date": 1634657584000, "content_id": "9133a8b5e26a77d33434ed6b5a7eb6cc08097b37", "detected_licenses": [ "MIT" ], "directory_id": "4b2a5d293a55ac11e761ebddff494d23f18ccf2b", "extension": "py", "file...
2.953125
stackv2
from abc import ABC from io import BytesIO import re from typing import Any, Dict, Optional, Tuple, TypeVar from typing import List from PIL import Image, ImageOps, ImageDraw, ImageFont, ImageSequence, ImageEnhance import urllib.request as requests class Env: """ Represents a program environment. """ ...
491
26.6
119
18
3,461
python
[{"finding_id": "codeql_py/overly-large-range_4ceefe5a46b76708_26d6bc85", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 338 ]
[ null ]
[ 45 ]
[ 48 ]
2024-11-19T00:02:45.886029+00:00
1,423,050,287,000
bf3602cda8e5e06456a7d13e0db07ed32417344c
3
{ "blob_id": "bf3602cda8e5e06456a7d13e0db07ed32417344c", "branch_name": "refs/heads/master", "committer_date": 1423050287000, "content_id": "ee2445ba209e1ff9fc02bd7c1a605a588d1c9c65", "detected_licenses": [ "MIT" ], "directory_id": "2749f2ee26c4c04b344465260b99699ee539460a", "extension": "py", "fi...
2.8125
stackv2
"""scp module""" import sys, logging, paramiko from blox.modules.module import module, InvalidInputException, InvalidOutputException from os.path import basename logger = logging.getLogger( 'blox.scp' ) class scp(module): """scp file to destination""" def validateInput(self,input): """Expect string as an input...
37
32.51
98
14
298
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_8dea45e1943b0b94_8a697b48", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 23 ]
[ null ]
[ 5 ]
[ 62 ]
2024-11-19T00:25:26.792031+00:00
1,616,405,575,000
4a7213e6f32197c18d0a7edead0e6905aba6a6b8
2
{ "blob_id": "4a7213e6f32197c18d0a7edead0e6905aba6a6b8", "branch_name": "refs/heads/master", "committer_date": 1616405575000, "content_id": "0bb872ea9ac0d6318ba83fa63fa74018608d4fb4", "detected_licenses": [ "MIT" ], "directory_id": "4f1642e699ead45e3feea20a3b6180ae6754a0ee", "extension": "py", "fi...
2.3125
stackv2
"""Authentication module for the swift-sharing-request.""" # The authentication is done via requests signed with a pre-whitelisted token. # This is done to prevent invalid usage. New tokens can be created either # manually on the platform that's running the software, or by # pre-authenticating via Openstack Keystone. ...
129
28.19
79
21
758
python
[{"finding_id": "codeql_py/log-injection_57bd480828211061_aa1ea943", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
3
true
[ "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](1)." ]
[ 59, 72, 117 ]
[ null, null, null ]
[ 22, 18, 30 ]
[ 63, 76, 73 ]
2024-11-19T01:02:38.017303+00:00
1,586,186,687,000
873fe871e99c9741a808bd45c64e7640f702011c
2
{ "blob_id": "873fe871e99c9741a808bd45c64e7640f702011c", "branch_name": "refs/heads/master", "committer_date": 1586186687000, "content_id": "968537a208b8adfe6623bdb1ed48c49fcdd341f3", "detected_licenses": [ "Apache-2.0" ], "directory_id": "48346f43b87a2e09f30cf0665f6339f7047b7b44", "extension": "py"...
2.40625
stackv2
#!/usr/bin/env python # coding=utf-8 import logging from contextlib import contextmanager import click import psycopg2 from flask import Blueprint, Flask, Response, abort from prometheus_client import CONTENT_TYPE_LATEST, generate_latest from prometheus_client.core import REGISTRY, GaugeMetricFamily import postgraas...
111
27.12
115
16
674
python
[{"finding_id": "codeql_py/stack-trace-exposure_8c7131724dbea7f4_91b5a83e", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 82 ]
[ null ]
[ 24 ]
[ 57 ]
2024-11-19T00:28:41.270948+00:00
1,623,843,086,000
42d9733a896287370d38f29c00ca288c473e3a93
3
{ "blob_id": "42d9733a896287370d38f29c00ca288c473e3a93", "branch_name": "refs/heads/master", "committer_date": 1623843086000, "content_id": "b51766c8ed7c377db58163adedcc20b2019354ba", "detected_licenses": [ "MIT" ], "directory_id": "f3714febb638555a0d9ac26643b8c31aaaed21df", "extension": "py", "fi...
2.671875
stackv2
import argparse import requests from flask import Flask, jsonify, request from dokuztas.blockchain import Blockchain, PendingBlock from dokuztas.exceptions import * from dokuztas._internals import _log, MiningThread class NodeComponent(object): def __init__(self, miner=False, cb_notify_nodes=None, difficulty=4):...
324
34.58
144
17
2,735
python
[{"finding_id": "codeql_py/unsafe-deserialization_d3ff60382046c63d_642487d4", "tool_name": "codeql", "rule_id": "py/unsafe-deserialization", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Unsafe deserialization depends on a [user-provided value](1).", "remediation": "", "locatio...
1
true
[ "CWE-502" ]
[ "py/unsafe-deserialization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Unsafe deserialization depends on a [user-provided value](1)." ]
[ 233 ]
[ null ]
[ 32 ]
[ 42 ]
2024-11-19T00:28:43.560055+00:00
1,629,378,150,000
d6a57d958882908d585144bacd63ffa9e2454eb5
3
{ "blob_id": "d6a57d958882908d585144bacd63ffa9e2454eb5", "branch_name": "refs/heads/master", "committer_date": 1629378727000, "content_id": "4d4252e799bcdcfdc4bc351051c2cf3e2d1910c1", "detected_licenses": [ "MIT" ], "directory_id": "5de836cf809ea7088a6c2ae66c4d4c5db2913ca8", "extension": "py", "fi...
2.96875
stackv2
# -*- coding: utf-8 -*- ''' Helper methods used by both pass_checker and pass_checker_async ''' from hashlib import sha1 import passpwnedcheck.constants as constants def get_password_prefix_suffix(password): ''' Calculate prefix and suffix for password. Prefix: the first 5 characters of hashed value i...
42
26.07
88
13
247
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_7f21776ba23a6673_44fad1ac", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 26 ]
[ null ]
[ 17 ]
[ 41 ]
2024-11-19T00:51:41.510250+00:00
1,528,933,235,000
c36752fe305d28ecb07ed253f1836ea4f2685d0a
2
{ "blob_id": "c36752fe305d28ecb07ed253f1836ea4f2685d0a", "branch_name": "refs/heads/master", "committer_date": 1528933235000, "content_id": "a3bf85dfaa8214bc12954396efbf435ad3a4eeef", "detected_licenses": [ "MIT" ], "directory_id": "a6a9d9603719b5e9748a288cebae9ef4fc6bcd4a", "extension": "py", "fi...
2.453125
stackv2
from http.server import BaseHTTPRequestHandler, HTTPServer from http import cookies from socketserver import ThreadingMixIn import dataManagement import time import math dataStor = None _timeP = 0 def start(port, data): global dataStor dataStor = data serverAddress = ('', port) httpd = HTTPServerThrea...
154
30.79
84
18
1,173
python
[{"finding_id": "codeql_py/path-injection_1c449ca6c49c9bfa_ce44a79f", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 140 ]
[ null ]
[ 19 ]
[ 39 ]
2024-11-19T01:54:55.822597+00:00
1,613,884,971,000
951b802b48ee2041cd5a631d457342e345ee4a57
2
{ "blob_id": "951b802b48ee2041cd5a631d457342e345ee4a57", "branch_name": "refs/heads/main", "committer_date": 1613884971000, "content_id": "b8b1c32140df2df9d489b2aba69a98fc387b29d4", "detected_licenses": [ "MIT" ], "directory_id": "b4fbf49978a7678e4835648742ec2dc3a1ca90f5", "extension": "py", "file...
2.5
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- # ======================================================== # import設定 # ======================================================== import requests, time, json, random, string import hmac, hashlib, base64 # ======================================================== # EndPoint ...
155
31.78
120
17
1,439
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b34397a2b81664c6_e7ab3a23", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text." ]
[ 67 ]
[ null ]
[ 9 ]
[ 31 ]
2024-11-19T00:27:24.200809+00:00
1,598,692,576,000
f671fd2a5b11c6a77370573e5145567d7b17437e
3
{ "blob_id": "f671fd2a5b11c6a77370573e5145567d7b17437e", "branch_name": "refs/heads/master", "committer_date": 1598692576000, "content_id": "9f10bdb3dba6e95c7c4ccf66c8dbfc96be54afc0", "detected_licenses": [ "MIT" ], "directory_id": "2a3d4a2dd3101512c9543e5de7c4943048720915", "extension": "py", "fi...
2.65625
stackv2
from src.parser.name_extractor import extract_name_with_rules from src.parser.text_extractor import extract_text_from_document from src.parser.phone_number_extractor import extract_phone_number_with_multiple_expressions from src.parser.email_extractor import extract_email_with_regular_expression_v1 from src.parser.skil...
43
39.44
92
9
356
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2ca868994667c097_56f3ac2a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 35 ]
[ null ]
[ 22 ]
[ 27 ]
2024-11-19T01:06:17.734370+00:00
1,454,435,591,000
444d5e11f9a4eb59c4ef68d921c2d165034bd065
3
{ "blob_id": "444d5e11f9a4eb59c4ef68d921c2d165034bd065", "branch_name": "refs/heads/master", "committer_date": 1454435591000, "content_id": "34ca3ce1c604a7822215b6f4883085fb5f9ca749", "detected_licenses": [ "MIT" ], "directory_id": "d576898e3a41669bd68cade4439ec97a52cc6062", "extension": "py", "fi...
3.0625
stackv2
"""Reddit Saver Usage: saver.py saver.py -u <user> [-p <password>] saver.py -o <output> | [-l <links>] saver.py -h | --help Fetch saved posts links or read them from a file and try to download their content. Arguments: -u --user <user> specify username -p --password <password> specify passwo...
179
30.84
79
19
1,431
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_47891a6185f01c3a_b7bb8fda", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [imgur.com/](1) may be at an arbitrary position in the ...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [imgur.com/](1) may be at an arbitrary position in the sanitized URL." ]
[ 88 ]
[ null ]
[ 16 ]
[ 40 ]
2024-11-19T01:17:11.980605+00:00
1,689,012,531,000
01eebf66b559748a3abfa5b95d909e24ba744ea5
2
{ "blob_id": "01eebf66b559748a3abfa5b95d909e24ba744ea5", "branch_name": "refs/heads/master", "committer_date": 1689012531000, "content_id": "a1f69e71337e59545a2fe5e13318cc99672ca4bf", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "5415ce8edb8696858f5aafb94e686868a00b872b", "extension": "p...
2.4375
stackv2
#!/usr/bin/env python3 ''' * Copyright (C) 2022 Intel Corporation. * * SPDX-License-Identifier: BSD-3-Clause ''' import uuid import socket import os import paho.mqtt.client as mqtt from paho.mqtt import publish class Sidecar: def __init__(self, k8s_namespace, k8s_releasename, mac_address): self.k8s_names...
61
37.23
106
16
576
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_047e24ecc7028c35_cd7afae2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 27 ]
[ null ]
[ 15 ]
[ 97 ]
2024-11-19T01:17:24.955682+00:00
1,429,894,168,000
960c75f518fc1f7d191211b2f31f78b3a1ecf364
3
{ "blob_id": "960c75f518fc1f7d191211b2f31f78b3a1ecf364", "branch_name": "refs/heads/master", "committer_date": 1429894168000, "content_id": "13a081497f4346a4390de8daa0e45c43b1b237ca", "detected_licenses": [ "Apache-2.0" ], "directory_id": "7019a834e9e278ff3eebbfce8c0fe1ae93eaffa0", "extension": "py"...
2.921875
stackv2
import requests import sys import json from alchemyapi import AlchemyAPI alchemyapi = AlchemyAPI() def main(sku, maxReviews): print "Searching Best Buy for product reviews and performing NLP analysis..." pages = (maxReviews/100) + 2 reviews=[] apiKey= open('bestbuy_key.txt', 'r').read().strip() ...
122
33.51
131
18
1,049
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_80ec833d3f159c9c_8d82521f", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
8
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/clear-text-storage...
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.", "This expression stores [sensitive data (password)](1) as clear text.", "This expression stores [sensitive data (password)](1) as clear text.", "This expression stores [sensitive data (password)](1) as clear text.", "This expression sto...
[ 86, 87, 90, 91, 95, 96, 100, 101 ]
[ null, null, null, null, null, null, null, null ]
[ 17, 17, 21, 21, 21, 21, 21, 21 ]
[ 108, 59, 53, 69, 52, 68, 35, 51 ]
2024-11-19T01:17:28.920846+00:00
1,627,362,438,000
1e525db3b444ab1ae82332d684d2189713a28f1d
3
{ "blob_id": "1e525db3b444ab1ae82332d684d2189713a28f1d", "branch_name": "refs/heads/master", "committer_date": 1627362438000, "content_id": "367d0af947644ff05aa3aef3c7ed0cf75ed9f960", "detected_licenses": [ "MIT" ], "directory_id": "6764e2bff984913eaedfde1b811409064852cf10", "extension": "py", "fi...
2.75
stackv2
#!env python3.9 """VEEAM AHV Proxy Dumper This script creates a backup from VEEAM AHV Proxy configuration and save them to local place. In this way way you are able to periodically creates backup of your proxies. Example: ./fetch.py --host myproxy.company.net:8100 --backup-password veeam Authors: Martin Web...
209
30.43
92
14
1,383
python
[{"finding_id": "codeql_py/request-without-cert-validation_52a1729d4cc241d5_abebdb8e", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
4
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 107, 130, 168, 192 ]
[ null, 133, 171, null ]
[ 19, 15, 15, 15 ]
[ 67, 42, 42, 63 ]
2024-11-19T00:43:42.858095+00:00
1,383,284,669,000
6105729c87ba234f1fb9ad5997189279bafaeb19
3
{ "blob_id": "6105729c87ba234f1fb9ad5997189279bafaeb19", "branch_name": "refs/heads/master", "committer_date": 1383284678000, "content_id": "a42fd189dcb7e9726585930d42b98fc864f3ff7f", "detected_licenses": [ "MIT" ], "directory_id": "ff0c7b22e53d1593cda158dc8a87736bc4114709", "extension": "py", "fi...
2.8125
stackv2
import glob import os from post import Post from jinja2 import Template class Webblog(object): def __init__(self, base_path, render_base_path): self.__base_path = base_path self.__render_base_path = render_base_path self.__months = ['January', 'February', 'March', 'April', ...
61
32.89
79
20
456
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_2311347a88eb6767_af39df41", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 26 ]
[ null ]
[ 20 ]
[ 46 ]
2024-11-19T00:43:44.132660+00:00
1,531,194,846,000
df35c42d1e9176b4117f18f9af163a2603c9a3ea
2
{ "blob_id": "df35c42d1e9176b4117f18f9af163a2603c9a3ea", "branch_name": "refs/heads/master", "committer_date": 1531194846000, "content_id": "2e0d06975e1e88b86e4ab33e24c586d6b0d03772", "detected_licenses": [ "Python-2.0" ], "directory_id": "4388363ba45b95910c25bae3d9c02ad78f4a75d6", "extension": "py"...
2.328125
stackv2
# -*- coding: utf-8 -*- # ----------------------------------------------------------------------------- # Copyright 2016 Continuum Analytics, Inc. # # May be copied and distributed freely only as part of an Anaconda or # Miniconda installation. # -------------------------------------------------------------------------...
164
26.84
79
15
1,038
python
[{"finding_id": "codeql_py/overly-permissive-file_2fe75677da9341a2_8d52d8df", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world writable." ]
[ 126 ]
[ null ]
[ 5 ]
[ 27 ]
2024-11-19T00:43:44.656673+00:00
1,578,560,931,000
b4bd137e4b93fdbeb9ab4c4496d19767af08abd0
3
{ "blob_id": "b4bd137e4b93fdbeb9ab4c4496d19767af08abd0", "branch_name": "refs/heads/master", "committer_date": 1578560931000, "content_id": "62f118bd507062d886f16c70ab0c635a445cdd70", "detected_licenses": [ "MIT" ], "directory_id": "398fb61114084d7f51dde61cd706250a9449646a", "extension": "py", "fi...
2.53125
stackv2
import os import urllib.request import urllib.error import json import datetime from weasyprint import HTML from flask import Flask, Response, render_template, abort API_KEY = os.environ.get('API_KEY', 'DEMO_KEY') API_URL = "https://api.nasa.gov/planetary/apod?date={}&api_key=" + API_KEY app = Flask(__name__) def a...
60
24.25
89
15
351
python
[{"finding_id": "codeql_py/flask-debug_e749c3778db0c9df_0204ee88", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-918" ]
[ "py/flask-debug", "py/partial-ssrf" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depends on a [user-provided value](2)." ]
[ 60, 16 ]
[ null, null ]
[ 5, 10 ]
[ 24, 54 ]
2024-11-19T00:43:45.117228+00:00
1,627,280,451,000
828410f320df89e16a0a571699b63f9ddca22c48
3
{ "blob_id": "828410f320df89e16a0a571699b63f9ddca22c48", "branch_name": "refs/heads/main", "committer_date": 1627280451000, "content_id": "778df52cd98d358aeeaa3cd2f864bdb6647f52ff", "detected_licenses": [ "Apache-2.0" ], "directory_id": "cfd1e4d90a2781b815e25ca9eddb645cb856caf5", "extension": "py", ...
2.65625
stackv2
import logging from threading import Timer from tencentcloud.ssm.v20190923 import models, ssm_client from tencentcloud.common.profile import client_profile from tencentcloud.common import credential from tencentcloud.common.exception.tencent_cloud_sdk_exception import TencentCloudSDKException class Error: """自定义错...
180
28.94
101
15
1,451
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9c64aad4fbeacb85_de604cbb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text." ]
[ 132, 175 ]
[ null, null ]
[ 11, 29 ]
[ 55, 41 ]
2024-11-19T01:32:05.663906+00:00
1,625,714,492,000
cb3108c564eff22a1c47b45e37bb76c82c31933d
3
{ "blob_id": "cb3108c564eff22a1c47b45e37bb76c82c31933d", "branch_name": "refs/heads/master", "committer_date": 1625714492000, "content_id": "e3357a214dda201edf48ce48cc3f370c5aeb3c76", "detected_licenses": [ "MIT" ], "directory_id": "327c6c770ef214717f269f4f55d872b204b86765", "extension": "py", "fi...
3.140625
stackv2
r"""This module implements ISO/IEC 9797-1 MAC algorithms and padding methods used in retail payments. See https://en.wikipedia.org/wiki/ISO/IEC_9797-1 for more information. """ import enum as _enum import typing as _typing from cryptography.hazmat.backends import default_backend as _default_backend from cryptography...
330
25.83
84
12
2,631
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_971e1cf990a5bfe6_cfdf46e6", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The cryptographic algorithm TRIPLEDES](1) is broken or weak, and should not be used...
3
true
[ "CWE-327", "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[The cryptographic algorithm TRIPLEDES](1) is broken or weak, and should not be used.", "[The cryptographic algorithm TRIPLEDES](1) is broken or weak, and should not be used.", "[The cryptographic algorithm TRIPLEDES](1) is broken or weak, and should not be used." ]
[ 196, 203, 203 ]
[ null, null, null ]
[ 12, 30, 12 ]
[ 35, 53, 54 ]
2024-11-19T01:32:19.428483+00:00
1,551,666,052,000
f06f60b46dfc619fb3dfa93470cd6bbca21242d6
5
{ "blob_id": "f06f60b46dfc619fb3dfa93470cd6bbca21242d6", "branch_name": "refs/heads/master", "committer_date": 1551666052000, "content_id": "7bca42ef1d545f802ea0ec6fa5ef44e08073eec4", "detected_licenses": [ "Apache-2.0" ], "directory_id": "be6f7f15cb2441f231456143eb75a7a2c19de03e", "extension": "py"...
4.8125
stackv2
# Lesson 8 Class Inheritance and Polymorphism # Part 1 class Employee: """Employee class""" def __init__(self, name, salary, hire_date): self.name = str(name) self.salary = int(salary) self.hire_date = str(hire_date) def get_name(self): print('Hi! My name is', self.name) ...
34
22.82
63
11
226
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4ad3f5a9c7a49401_feb849f1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 17 ]
[ null ]
[ 25 ]
[ 36 ]
2024-11-19T01:32:25.295561+00:00
1,570,695,761,000
b2a4a36f3e7f8d405700386d4f2db5f983aacb90
2
{ "blob_id": "b2a4a36f3e7f8d405700386d4f2db5f983aacb90", "branch_name": "refs/heads/master", "committer_date": 1570695761000, "content_id": "01ec7a14c31abf0346545a4b1db22ffc82fc8eb4", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "0e9c8fa95822001c25f4bfe96017a7341f736e27", "extension": "p...
2.421875
stackv2
"""OpenAPI core wrappers module""" import re from openapi_core.wrappers.base import BaseOpenAPIRequest, BaseOpenAPIResponse # https://docs.djangoproject.com/en/2.2/topics/http/urls/ # # Currently unsupported are : # - nested arguments, e.g.: ^comments/(?:page-(?P<page_number>\d+)/)?$ # - unnamed regex groups, e.g...
104
26.23
118
13
637
python
[{"finding_id": "codeql_py/redos_2e2416d846230ce1_31c1a74c", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '<' and containing many repetition...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '<' and containing many repetitions of ':'." ]
[ 15 ]
[ null ]
[ 46 ]
[ 49 ]
2024-11-19T01:43:40.766650+00:00
1,541,199,685,000
e706dd2f6d88a76545c3913d0ff60fbcd1ddb480
3
{ "blob_id": "e706dd2f6d88a76545c3913d0ff60fbcd1ddb480", "branch_name": "refs/heads/master", "committer_date": 1541199685000, "content_id": "2bb333b44fbae8222f4cc50b0d5b04d9bea15629", "detected_licenses": [ "MIT" ], "directory_id": "00efb53ba90c5e24b261351138235364acf23ee7", "extension": "py", "fi...
2.640625
stackv2
from http.server import HTTPServer import ssl import sys import types import pyodbc from odbcnotebook import jsonrpc, odbc USAGE = 'odbcnotebook [-p PORT] [-c CONNECTION_STRING] [-s KEY CERT PASSWORD]' def wrap_ssl(runconfig, sock): """ Wraps a socket in an SSL context, if SSL is enabled. """ if run...
103
27.25
101
17
647
python
[{"finding_id": "codeql_py/insecure-protocol_ea4be59ee75186d9_1f415d74", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol...
1
true
[ "CWE-327" ]
[ "py/insecure-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.SSLContext](1)." ]
[ 19 ]
[ null ]
[ 16 ]
[ 23 ]
2024-11-19T01:43:49.932302+00:00
1,619,104,949,000
110dba061cae796b141c3dec2c2ab2d2ea098d4a
3
{ "blob_id": "110dba061cae796b141c3dec2c2ab2d2ea098d4a", "branch_name": "refs/heads/main", "committer_date": 1619104949000, "content_id": "2a07386fb55240e6f28acb80dfae8ace4ea5fb1d", "detected_licenses": [ "MIT" ], "directory_id": "b551dc2483a1be6c9e704c4e9b3ccb1eee4cec20", "extension": "py", "file...
3.015625
stackv2
#! python3 # Author : Petar I # GitHub : https://github.com/Ipetar69 # Year : 2021. # Description : Script that generates random Gmail account. import pyautogui import sys import time import random import string import os # Printing funtion with 3 modes # 1 : Normal message # 2 : Information...
204
25.7
137
17
1,637
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c36fce1ec2f5e5dc_93d68b43", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 24, 26, 28 ]
[ null, null, null ]
[ 15, 15, 15 ]
[ 53, 53, 75 ]
2024-11-19T01:44:09.862639+00:00
1,648,725,382,000
b8f45978be066fdacd9ec31cdf6a01d94b931425
3
{ "blob_id": "b8f45978be066fdacd9ec31cdf6a01d94b931425", "branch_name": "refs/heads/master", "committer_date": 1648725382000, "content_id": "903b053a1a0321081bc6c096ae5c65458c97cf4d", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e459a9608225b81bdb0a5b85cd19b7bd0f6df38e", "extension": "py"...
2.6875
stackv2
#coding=utf-8 import os import re import sys import time from nb_log import LoggerMixin, LoggerLevelSetterMixin import paramiko class ParamikoFolderUploader(LoggerMixin, LoggerLevelSetterMixin): """ paramoki 实现的文件夹上传 """ def __init__(self, host, port, user, password, local_dir: str, remote_dir: str, ...
114
39.31
120
22
1,113
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_e730f6ab96945877_9ae4aa04", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 56 ]
[ null ]
[ 9 ]
[ 66 ]
2024-11-19T02:19:56.423009+00:00
1,569,175,199,000
05e70c51fa5b9af75fd1840785cc1d0ed1c06da1
3
{ "blob_id": "05e70c51fa5b9af75fd1840785cc1d0ed1c06da1", "branch_name": "refs/heads/master", "committer_date": 1569175199000, "content_id": "6747f02492b03e65fa76542c8081fde0509463ce", "detected_licenses": [ "Unlicense" ], "directory_id": "20f0f7ad99206c6d81b353cddfa3ccc699cb4741", "extension": "py",...
2.859375
stackv2
""" Parts of the code, copy modified from: http://www.danmandle.com/blog/getting-gpsd-to-work-with-python/ Written by Dan Mandle http://dan.mandle.me September 2012 License: GPL 2.0 and from: Read Gyro and Accelerometer by Interfacing Raspberry Pi with MPU6050 using Python ...
139
33.45
118
16
1,342
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_90037027930fe3c3_694d5aea", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text." ]
[ 130 ]
[ null ]
[ 32 ]
[ 36 ]
2024-11-19T00:59:31.595995+00:00
1,574,348,932,000
8a31ea7d36bf5f47f91a007da324179651c66107
2
{ "blob_id": "8a31ea7d36bf5f47f91a007da324179651c66107", "branch_name": "refs/heads/master", "committer_date": 1574348932000, "content_id": "ced7b3715ad74377d9cff130a94b559b15b0528b", "detected_licenses": [ "MIT" ], "directory_id": "6e0c7a724ab47c5390ada9108c2b7455105e09e2", "extension": "py", "fi...
2.375
stackv2
import wikipedia,os from flask import Flask from flask import request,jsonify import warnings warnings.filterwarnings("ignore") import sys sys.path.append('/Users/prajwalkirankumar/Documents/WT2/api/Chatbot/') from chatbot import Chat,reflections,multiFunctionCall from flask_sse import sse from apscheduler.scheduler...
214
32.15
138
14
1,787
python
[{"finding_id": "codeql_py/sql-injection_53418477eab7af62_e369cab2", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown...
2
true
[ "CWE-089", "CWE-089" ]
[ "py/sql-injection", "py/sql-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This SQL query depends on a [user-provided value](1).", "This SQL query depends on a [user-provided value](1).\nThis SQL query depends on a [user-provided value](2)." ]
[ 178, 184 ]
[ null, null ]
[ 32, 17 ]
[ 106, 99 ]
2024-11-19T00:59:38.829637+00:00
1,605,253,690,000
cf5e63a7feeb82d68246852d7e4d35e9bd1ba5fa
2
{ "blob_id": "cf5e63a7feeb82d68246852d7e4d35e9bd1ba5fa", "branch_name": "refs/heads/main", "committer_date": 1605253690000, "content_id": "4a32929c87f2107b92e5d18a7fab141c4e0cea5f", "detected_licenses": [ "MIT" ], "directory_id": "747139140194a79f6eefe519e84f4adf544109e9", "extension": "py", "file...
2.3125
stackv2
from time import sleep import paho.mqtt.client as mqtt import urllib.parse def mqtt_publish(mqtt_client, topic, payload): mqtt_client.publish(topic=topic, payload=payload) class AccessControlWorker(object): """Missing associated documentation comment in .proto file.""" def DingDong(self, request): ...
83
29.13
74
15
596
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0f2fd916544cdfde_9da73dba", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 61 ]
[ null ]
[ 15 ]
[ 60 ]
2024-11-19T00:59:55.953711+00:00
1,545,273,010,000
93851622a39c2580bac527842fec44e609183688
2
{ "blob_id": "93851622a39c2580bac527842fec44e609183688", "branch_name": "refs/heads/master", "committer_date": 1545273010000, "content_id": "62083cfcac30c1095516c29ef421b465b1ddf103", "detected_licenses": [ "MIT" ], "directory_id": "cc5fbb0cdce778b4c9b6822e3f9e074c0e3d3af6", "extension": "py", "fi...
2.4375
stackv2
import paramiko import time #new181220 ip_address = "10.0.0.1" username = "sshname" password = "sshpassword" ssh_client = paramiko.SSHClient() ssh_client.set_missing_host_key_policy(paramiko.AutoAddPolicy()) ssh_client.connect(hostname=ip_address,username=username,password=password) print "Successful connection", i...
36
25.25
75
11
277
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_01b227095b1cb418_29987914", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 11 ]
[ null ]
[ null ]
[ 65 ]
2024-11-19T01:00:13.857606+00:00
1,633,926,353,000
82a42fe92cc03c06f1de52e343b5f6ec080642fd
3
{ "blob_id": "82a42fe92cc03c06f1de52e343b5f6ec080642fd", "branch_name": "refs/heads/master", "committer_date": 1633926353000, "content_id": "39c46797f1049a67b23ea28df75231ce2f235460", "detected_licenses": [ "MIT" ], "directory_id": "a687c62f9f66d2ad3a793d6cbf6bc0cd0d00c1fa", "extension": "py", "fi...
2.859375
stackv2
# Credit to: https://github.com/jayjzheng/draftaid-react/blob/5a99a0b9f4cac4e4ccbfb36c86ecee19640969b3/data/fantasyProCsv.py import json import re import requests from bs4 import BeautifulSoup url = "https://www.fantasypros.com/nhl/rankings/overall.php" def get_data(): players = [] r = requests.get(url) ...
48
32.21
124
17
486
python
[{"finding_id": "codeql_py/overly-large-range_7f0efe690bab6b66_3660be1c", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 29 ]
[ null ]
[ 34 ]
[ 37 ]
2024-11-19T01:11:46.360561+00:00
1,542,017,905,000
d9b711290baf7c9d2b3f74e025858766697527ae
3
{ "blob_id": "d9b711290baf7c9d2b3f74e025858766697527ae", "branch_name": "refs/heads/master", "committer_date": 1542017905000, "content_id": "6bdabad406d2fc3a8106af15cc2283ebdc63a4c3", "detected_licenses": [ "Apache-2.0" ], "directory_id": "7e3429024669e6978c170a20e299ee976f8ef04f", "extension": "py"...
3.09375
stackv2
import nltk from nltk import ChartParser import glob import re import json from collections import Counter def load_json(filename): "Utility function to load json files in one line." with open(filename) as f: return json.load(f) GENDERED = set(load_json('./resources/gendered.json')) STOPWORDS = s...
101
29.62
89
16
721
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_e4c60127822ffc06_ea2d3b03", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text." ]
[ 97 ]
[ null ]
[ 18 ]
[ 23 ]