added
stringlengths
32
32
created
int64
1,236B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.03
source
stringclasses
1 value
text
stringlengths
330
19.3k
num_lines
int64
16
648
avg_line_length
float64
15.5
59.3
max_line_length
int64
37
179
ast_depth
int64
8
38
length
int64
102
3.79k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.11k
276k
sast_codeql_findings_count
int64
1
33
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
33
rule_ids
listlengths
1
33
confidences
listlengths
1
33
severities
listlengths
1
33
messages
listlengths
1
33
line_starts
listlengths
1
33
line_ends
listlengths
1
33
column_starts
listlengths
1
33
column_ends
listlengths
1
33
2024-11-19T02:07:25.563372+00:00
1,630,917,944,000
98d0f99178b2752857897263a71cdcc2a866fbab
3
{ "blob_id": "98d0f99178b2752857897263a71cdcc2a866fbab", "branch_name": "refs/heads/master", "committer_date": 1630917944000, "content_id": "6d125a95ad3dd8a1f2644b27a22216d32faa3aed", "detected_licenses": [ "MIT" ], "directory_id": "de551a7b0a9ba15fbb7741e1eda14337a59e213e", "extension": "py", "fi...
3.484375
stackv2
#!/usr/bin/env python3.8 import random # import string from user import User from credentials import Logins #importing credential class. #create a user account def create_acc(username,password): ''' This function creates a new user account. ''' new_acc = User(username,password) return new_acc ...
151
28.66
139
19
831
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c836ef6d13e6ce59_ed737423", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 75, 127 ]
[ null, null ]
[ 19, 31 ]
[ 74, 63 ]
2024-11-19T02:31:16.212024+00:00
1,632,656,060,000
2b797699abcd03d0a9da8be9ce5d0700f7418a88
2
{ "blob_id": "2b797699abcd03d0a9da8be9ce5d0700f7418a88", "branch_name": "refs/heads/master", "committer_date": 1632656060000, "content_id": "fc02c0f4428e8e60b53dca9c3fe7713431e40ba8", "detected_licenses": [ "MIT" ], "directory_id": "88ec732d185d1323833ba1a5113edde32a86e28f", "extension": "py", "fi...
2.484375
stackv2
import matplotlib.pyplot as plt import pylab from flask import * from config import * latex_runner = Blueprint('latex_runner', __name__) # Using the Blueprint made with a path @latex_runner.route(LATEX_ROUTE, methods=['GET']) def renderTeX(): try: text_input = request.args.get('text') transpar...
54
37.19
114
17
446
python
[{"finding_id": "codeql_py/stack-trace-exposure_afabb6b6d825c937_505a1d58", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
3
true
[ "CWE-209", "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 24, 51, 54 ]
[ null, null, null ]
[ 25, 20, 16 ]
[ 31, 21, 17 ]
2024-11-19T02:31:16.355189+00:00
1,622,756,649,000
e635b30ed927758fa0def3f3ceb3014c3a957961
3
{ "blob_id": "e635b30ed927758fa0def3f3ceb3014c3a957961", "branch_name": "refs/heads/main", "committer_date": 1622756649000, "content_id": "eaa0c601e1b04a32c437801bd859f87f0e0cfa52", "detected_licenses": [ "MIT" ], "directory_id": "a01672a9cec61976ef6084148b3e807e0c0da8ba", "extension": "py", "file...
2.75
stackv2
import requests import json import time token = json.load(open("settings.json", "r"))["TOKEN"] url = 'https://api.telegram.org/bot{}/'.format(token) def get_updates_json(request, update_id=None): params = {'allowed_updates': 'message', 'offset': str(update_id)} if update_id != None: response = reque...
148
28.89
87
18
1,161
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a9a25672410b4d39_a2fd0d84", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 84 ]
[ null ]
[ 11 ]
[ 39 ]
2024-11-19T02:31:23.248688+00:00
1,593,467,822,000
9876b057d3a5843466c9405bc1e7a749004e1adb
3
{ "blob_id": "9876b057d3a5843466c9405bc1e7a749004e1adb", "branch_name": "refs/heads/master", "committer_date": 1593467822000, "content_id": "507135c6bf78260620e5793b9133424e61109e39", "detected_licenses": [ "Apache-2.0" ], "directory_id": "36189d02fb5e5e8f6f0539c5e604935df08521f6", "extension": "py"...
2.609375
stackv2
# Copyright 2020 Martin Olejar # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing...
73
27.27
74
16
521
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_e2d0ef543ba11dd9_92e73164", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 69 ]
[ null ]
[ 19 ]
[ 37 ]
2024-11-19T02:31:46.907466+00:00
1,546,092,068,000
9ba8dce8aa37bd3bf0c6d9790a95b78bd717a815
3
{ "blob_id": "9ba8dce8aa37bd3bf0c6d9790a95b78bd717a815", "branch_name": "refs/heads/master", "committer_date": 1546092068000, "content_id": "85d6e0a8435b326dce5310739248e3175b3c2eb4", "detected_licenses": [ "MIT" ], "directory_id": "00376df2d1e080a2159d217efdcc2a9900ac8ccb", "extension": "py", "fi...
3.1875
stackv2
#!/usr/bin/env python3 import socket import sys import queue import ssl import select """ Module for sending and receiving IRC messages. This module is suited for easy understandable (primitive) understand bots. Currently it implements a single class: IRC WARNING: This module does NOT implement the full IRC specif...
254
22.8
74
19
1,570
python
[{"finding_id": "codeql_py/insecure-default-protocol_a574cfa6e2e2ad14_e0d0208c", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in...
1
true
[ "CWE-327" ]
[ "py/insecure-default-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used." ]
[ 92 ]
[ null ]
[ 12 ]
[ 33 ]
2024-11-19T02:32:07.340950+00:00
1,631,625,061,000
204831ff34efa67f7a2d09b4b65e232672fb133c
2
{ "blob_id": "204831ff34efa67f7a2d09b4b65e232672fb133c", "branch_name": "refs/heads/master", "committer_date": 1631625061000, "content_id": "bb3c2a6597d44a83a9730364bb6a2cdd788bb66e", "detected_licenses": [ "MIT" ], "directory_id": "d5de0a387936d9a08b8fe2c780bc6b29f3707704", "extension": "py", "fi...
2.484375
stackv2
import os import time import uuid from datetime import datetime from glob import glob from flask import Blueprint, jsonify from flask import Response from flask import request from config import config from database import Database from escherconverter import EscherConverter from models import ConvertRequest, OutputF...
298
33.67
103
21
2,406
python
[{"finding_id": "codeql_py/path-injection_45f6f972110153bc_0b2f034a", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2).", "remed...
6
true
[ "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2).", "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2).\nThis pa...
[ 144, 146, 150, 194, 240, 278 ]
[ null, null, null, 195, 241, null ]
[ 23, 17, 17, 23, 28, 21 ]
[ 88, 58, 26, 36, 41, 75 ]
2024-11-19T02:32:21.061059+00:00
1,527,779,333,000
095af637d516db86264b0ba70b3c87f9d194c3f1
3
{ "blob_id": "095af637d516db86264b0ba70b3c87f9d194c3f1", "branch_name": "refs/heads/master", "committer_date": 1527779333000, "content_id": "a35a5cb2e61b265503d9112d65bece429f15da6c", "detected_licenses": [ "MIT" ], "directory_id": "f9e97f9bd4385049f1a1d338cd821d94d195cbe3", "extension": "py", "fi...
2.59375
stackv2
import os import sys import logging import tarfile import shutil import requests import re DATA_DIR = os.path.join(os.path.dirname(os.path.abspath(__file__)), 'data') LOGGER = logging.getLogger(__name__) class Downloader(object): def __init__(self, pkg, url=None, download_dir=DATA_DIR): self._error = None ...
61
35.03
90
21
476
python
[{"finding_id": "codeql_py/tarslip_d3a115c774d7cc86_36cf483f", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 57 ]
[ null ]
[ 33 ]
[ 40 ]
2024-11-19T02:32:40.673440+00:00
1,542,117,842,000
ac3327b3d44f892c6d96b8fe4dd8b2885c13856e
2
{ "blob_id": "ac3327b3d44f892c6d96b8fe4dd8b2885c13856e", "branch_name": "refs/heads/master", "committer_date": 1542117842000, "content_id": "a9a7f5cb445a958cd9b63c60247caacf570947cf", "detected_licenses": [ "MIT" ], "directory_id": "37f48977d361343002e7d1f5d503926183992f6a", "extension": "py", "fi...
2.46875
stackv2
""" Created on 02-10-2011 @author: Kuba Radliński """ import sys import glob from os.path import splitext, split from psg.brainlab.analyze import read_analyze_file from psg.brainlab.signal import read_signal_file from psg.brainlab.utils import make_brainlab_filenames, decode_time def surroud_text(txt, surrounder='"'...
53
54.57
133
18
706
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_00f2df617af9683d_52b09ef1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 41, 41 ]
[ null, null ]
[ 23, 57 ]
[ 55, 80 ]
2024-11-19T02:32:53.967980+00:00
1,601,471,063,000
309834a6ced1d59eee9dd1bcc2d65b1eba779918
3
{ "blob_id": "309834a6ced1d59eee9dd1bcc2d65b1eba779918", "branch_name": "refs/heads/master", "committer_date": 1601471063000, "content_id": "bf9934773c0b50ad509f4b774d388ae2c23bbfb1", "detected_licenses": [ "MIT" ], "directory_id": "4c7aac2ff796cd50ef8b6b37adcc2cc44d31d579", "extension": "py", "fi...
2.625
stackv2
#!/usr/bin/python3 import argparse import requests import hashlib import apikey import re def doitbydomain(connection_details,dominio): ''' function that give you the auth_info passing domain_name ''' xml = ''' <?xml version='1.0' encoding='UTF-8' standalone='no' ?> <!DOCTYPE OPS_envelope SYSTEM 'ops....
115
31.72
136
16
909
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_915277cbcc2b7b2d_fde4830d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
5
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-327", "CWE-327" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive dat...
[ 55, 109, 115, 37, 41 ]
[ null, null, null, null, null ]
[ 15, 39, 27, 20, 20 ]
[ 21, 48, 36, 73, 79 ]
2024-11-19T02:33:12.026942+00:00
1,597,555,641,000
b2b45d684e4833b109e55ef0b93352f4acab7bdd
3
{ "blob_id": "b2b45d684e4833b109e55ef0b93352f4acab7bdd", "branch_name": "refs/heads/master", "committer_date": 1597555641000, "content_id": "01614e787870ce74c76932003bcee96ac4803ebe", "detected_licenses": [ "Apache-2.0" ], "directory_id": "4d0186ea9ab60378d091921df22b54dec446c0b0", "extension": "py"...
2.953125
stackv2
#encoding: utf-8 import pandas as pd import pymongo from pyecharts import options as opts from pyecharts.charts import Geo,Page from pyecharts.globals import ChartType client = pymongo.MongoClient() # 链接pymongo数据库 collection = client['51Job']['Scrapy'] print("数据表名称:",collection.name) data = collection.find() df = pd....
100
28.59
113
19
848
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1167b0e16e2662e5_f8a85b93", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 62 ]
[ null ]
[ 7 ]
[ 22 ]
2024-11-19T02:43:34.845808+00:00
1,545,120,511,000
68f3a2a4266e7cded7001f8dba6c9519f2749397
3
{ "blob_id": "68f3a2a4266e7cded7001f8dba6c9519f2749397", "branch_name": "refs/heads/master", "committer_date": 1545120511000, "content_id": "8f34feca7d097a5de0821bbbb0f479551902bc1a", "detected_licenses": [ "MIT" ], "directory_id": "9289d956330dc45217266f37e1ccee73e2d0ef44", "extension": "py", "fi...
3.4375
stackv2
# solution to Advent of Code 2015, day 4 part one and two # https://adventofcode.com/2015/day/4 # # assumes puzzle input is in a file called input.txt import hashlib def main(): with open('input.txt') as inputfile: secret_key = inputfile.readline().strip() # solve part one (number, md5hash) = min...
31
24.39
68
16
235
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_9daca3f727ee1ae7_16aebbc3", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 24 ]
[ null ]
[ 31 ]
[ 56 ]
2024-11-19T02:43:34.992670+00:00
1,553,530,042,000
37dcc72100e263af00b1686ab6c07b5353c14f70
3
{ "blob_id": "37dcc72100e263af00b1686ab6c07b5353c14f70", "branch_name": "refs/heads/master", "committer_date": 1553530042000, "content_id": "903b9a6d0e4a9254bf6f70bf5f4c3a1b34f6475d", "detected_licenses": [ "MIT" ], "directory_id": "3a54d0bffcc1b0796f6ba863cea3537f60f3ace2", "extension": "py", "fi...
2.640625
stackv2
#!/usr/bin/env python """Copies model output files from ILAMBv1 to ILAMBv2.""" import os import shutil src_dir = '/home/csdms/ILAMB/MODELS/original' dst_dir = '/home/csdms/ilamb/MODELS' for root, dirs, files in os.walk(src_dir): if len(files) == 0: model_name = os.path.basename(root) new_model_...
21
26.71
58
15
160
python
[{"finding_id": "codeql_py/overly-permissive-file_dd3a1605e4118a78_0dae09ef", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable." ]
[ 17 ]
[ null ]
[ 9 ]
[ 38 ]
2024-11-19T02:43:41.588634+00:00
1,633,556,839,000
3bb9b2c28a8a6c93d19806b806e39132bcabdc09
3
{ "blob_id": "3bb9b2c28a8a6c93d19806b806e39132bcabdc09", "branch_name": "refs/heads/master", "committer_date": 1633556839000, "content_id": "61754cdfb75dc8b1783aa3ea32b2e6ecd8cc602d", "detected_licenses": [ "MIT" ], "directory_id": "839a08f946710e2192f91f1e406accdb12822cd6", "extension": "py", "fi...
2.75
stackv2
""" ZeBet odds scraper """ from collections import defaultdict import datetime import re import urllib import urllib.error import urllib.request from bs4 import BeautifulSoup import sportsbetting as sb from sportsbetting.database_functions import is_player_in_db, add_player_to_db, is_player_added_in_db def parse_ze...
181
44.62
124
23
1,966
python
[{"finding_id": "codeql_py/overly-large-range_d607fcbf51b5fe04_9c61fe68", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo...
4
true
[ "CWE-020", "CWE-020", "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "Suspicious character range that is equivalent to \\[A-Z\\\\[...
[ 107, 107, 107, 107 ]
[ null, null, null, null ]
[ 22, 30, 40, 48 ]
[ 25, 33, 43, 51 ]
2024-11-19T02:55:08.807954+00:00
1,532,352,746,000
f282ea16060f50115e3bc017b32e1b1a501082c4
3
{ "blob_id": "f282ea16060f50115e3bc017b32e1b1a501082c4", "branch_name": "refs/heads/master", "committer_date": 1532352746000, "content_id": "0d78f70fdb6183fcfaf07840606e88540497e4e2", "detected_licenses": [ "MIT" ], "directory_id": "275f3a3dce44f35a5dc1a626e2052c006bdb71bf", "extension": "py", "fi...
3.015625
stackv2
import sys sys.setrecursionlimit(10000) def passwordCracker(passwd, attempt): # Complete this function if attempt == '': return True, [] new_attempt = attempt for p in passwd: if p in new_attempt: p_index = new_attempt.index(p) partition_1 = new_attempt[0:p_...
33
31.18
78
17
250
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7032ca79d7c319d1_4cdd1db1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text.\nThis expression logs [sensitive data (passw...
[ 31 ]
[ null ]
[ 19 ]
[ 40 ]
2024-11-19T02:55:08.965746+00:00
1,475,701,655,000
8a4198915f5dcf2c44b3e2784285d4b6c7531cd0
3
{ "blob_id": "8a4198915f5dcf2c44b3e2784285d4b6c7531cd0", "branch_name": "refs/heads/master", "committer_date": 1475701655000, "content_id": "9765f64f3e007e07bf919f866d9b524d7ba33038", "detected_licenses": [ "MIT" ], "directory_id": "9b3db1ffd660040dd8fd3f8391cacf217c38e23d", "extension": "py", "fi...
2.515625
stackv2
#!/usr/bin/env python import os from jinja2 import Environment, FileSystemLoader # To customise the settings, copy the file "default_settings.py" # and save it as "settings.py". See comments in default_settings.py # for explanations. if os.path.exists("settings.py"): import settings else: import default_set...
36
29.83
67
11
243
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_dfbf627165bc7556_c57a8dd3", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 29 ]
[ null ]
[ 16 ]
[ 65 ]
2024-11-19T02:55:21.489646+00:00
1,676,139,610,000
4cb5cdd843f2919a5863cb79c05bd1f32848866f
3
{ "blob_id": "4cb5cdd843f2919a5863cb79c05bd1f32848866f", "branch_name": "refs/heads/master", "committer_date": 1676139610000, "content_id": "9f9340bccf42bc5969dd7b6a0865336632b08a6b", "detected_licenses": [ "MIT" ], "directory_id": "255e19ddc1bcde0d3d4fe70e01cec9bb724979c9", "extension": "py", "fi...
2.5625
stackv2
#!/bin/python import json, sys, requests, string, random auth_endpoints = { "US": "https://identity.api.rackspacecloud.com/v2.0", "UK": "https://lon.identity.api.rackspacecloud.com/v2.0" } username = "XXXX" apikey = "XXXX" def auth(region, username, password='', apikey=''): headers = { "Content-...
53
27.75
98
16
411
python
[{"finding_id": "codeql_py/request-without-cert-validation_dbbcfd94d02cfcba_d87ecd40", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 30, 43 ]
[ null, null ]
[ 9, 9 ]
[ 67, 57 ]
2024-11-19T02:55:27.817091+00:00
1,523,631,560,000
703183494cd79f1dbb2aed66e3c21d9406e90483
3
{ "blob_id": "703183494cd79f1dbb2aed66e3c21d9406e90483", "branch_name": "refs/heads/master", "committer_date": 1523631560000, "content_id": "6b577baa09d114bed98496ce5f86a91e3ce3b407", "detected_licenses": [ "MIT" ], "directory_id": "0793d27e160ff37d8e4f135ac55694b2b7d0e5b8", "extension": "py", "fi...
3.046875
stackv2
## Import de las librerias necesarias para acceder a la api y funcionalidades import requests from random import randint ## Parámetros para configuración api_key = '394c6244e849b9274ef6325cec54f959' api_base = 'http://food2fork.com/api/' seach_uri = '{}search?key={}&q={}' ## Funciones de ayuda def get_recipe(recipe_...
52
37.58
104
16
488
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_14f22c545c254590_a4ae517e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 45, 46, 49 ]
[ null, null, null ]
[ 19, 19, 23 ]
[ 75, 59, 50 ]
2024-11-19T02:55:38.285676+00:00
1,583,598,088,000
eaded038942382a5f7fda6a7232bd35da1dd8e29
2
{ "blob_id": "eaded038942382a5f7fda6a7232bd35da1dd8e29", "branch_name": "refs/heads/master", "committer_date": 1583598088000, "content_id": "974877f2a814e973b10598b37c332261194793f4", "detected_licenses": [ "Apache-2.0" ], "directory_id": "dc5546eb41d36e10edc3d85319714aa5b3a9a70d", "extension": "py"...
2.328125
stackv2
import json import traceback from aiohttp import web from aiohttp.web_routedef import RouteDef import tibiapy from tibiapy.utils import try_enum routes = web.RouteTableDef() @routes.get('/') async def home(request): content = "<h1>Routes</hº><ul>" for route in routes: # type: RouteDef if route.pat...
156
32.5
103
16
1,182
python
[{"finding_id": "codeql_py/stack-trace-exposure_936e221009de6eef_ee7d87fe", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.\n[S...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.\n[Stack trace information](2) flows to this location and may be exposed to an external user.\n[Stack trace information](3) flows to this location and may be exposed to an external user." ]
[ 119 ]
[ 123 ]
[ 14 ]
[ 27 ]
2024-11-19T02:55:50.457832+00:00
1,511,169,244,000
de661ca8d1f85d3297e2e4873973446fa1953441
2
{ "blob_id": "de661ca8d1f85d3297e2e4873973446fa1953441", "branch_name": "refs/heads/master", "committer_date": 1511169244000, "content_id": "a7ea96f196dec9e66487674f19bd102dee428280", "detected_licenses": [ "MIT" ], "directory_id": "bca37991d10aa042bfd1c21e2f4bb7855761808e", "extension": "py", "fi...
2.375
stackv2
"""Initializes and runs localhost:8051 server for searching materials""" # coding=utf-8 # /cygdrive/c/python27/python.exe __author__ = 'eager55' import os from gevent.pywsgi import WSGIServer from gevent.queue import Queue from flask import Flask, request, Response from cgi import escape from json import dump, dumps...
336
34.02
119
28
2,532
python
[{"finding_id": "codeql_py/path-injection_e9b631a191c3f1f1_d8c2bb72", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 113 ]
[ null ]
[ 15 ]
[ 22 ]
2024-11-19T03:10:33.793114+00:00
1,612,801,535,000
329462819af737fe9c5b6d92818b7a261b3d9b37
3
{ "blob_id": "329462819af737fe9c5b6d92818b7a261b3d9b37", "branch_name": "refs/heads/main", "committer_date": 1612801535000, "content_id": "91026741404ae29d5ad35fdd0aa0cd40297e1f40", "detected_licenses": [ "MIT" ], "directory_id": "65fec42dba512fa3922f092c693caa80d42b5c95", "extension": "py", "file...
2.546875
stackv2
from blogproject import app,db from flask import Flask, render_template, request, redirect, url_for, flash, abort from flask_login import login_user, login_required, logout_user from blogproject.models import User, Blogpost from blogproject.forms import LoginForm, RegistrationForm from datetime import datetime @app.ro...
93
27.3
111
16
556
python
[{"finding_id": "codeql_py/url-redirection_a863903ffb37bdc9_c868b0b1", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 41 ]
[ null ]
[ 29 ]
[ 33 ]
2024-11-19T03:10:36.459906+00:00
1,516,238,430,000
241826ef555d719fbcfa58b32bfe624bdd283940
3
{ "blob_id": "241826ef555d719fbcfa58b32bfe624bdd283940", "branch_name": "refs/heads/master", "committer_date": 1516238430000, "content_id": "3b495f401470232075d4ef8a42e79e4ce0b6ee07", "detected_licenses": [ "MIT" ], "directory_id": "fd4d788d9976471e61ac12e9d7518cc901f0c6c0", "extension": "py", "fi...
2.578125
stackv2
from functools import wraps import os from flask import Flask from flask import request import jwt SERVICE_ID = 'calc' ISSUER = 'issuer' app = Flask(SERVICE_ID) app.debug = True KEY = None def get_key_file(): global KEY if KEY is None: with open(os.getenv('KEY', '/key.pub'), 'rb') as f: ...
96
22.39
70
15
569
python
[{"finding_id": "codeql_py/log-injection_4ace8e9bbc638a9f_d6289ebf", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
5
true
[ "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 77, 77, 90, 91, 91 ]
[ null, null, null, null, null ]
[ 60, 66, 21, 54, 60 ]
[ 64, 70, 33, 58, 64 ]
2024-11-19T03:22:06.702823+00:00
1,674,135,460,000
0853c856ffe522431bff9e9817643da1379a8e71
3
{ "blob_id": "0853c856ffe522431bff9e9817643da1379a8e71", "branch_name": "refs/heads/master", "committer_date": 1674135460000, "content_id": "4ecf1070dabeb5c710cb67759ad6d6cc10a720f0", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "704bff0cb5c5c500dda60b3ebe2882f455f710ae", "extension": "p...
2.671875
stackv2
# Author: Harold Clark # Copyright Harold Clark 2019 # import sys import os import psycopg2 import hashlib class database(object): """database class object for a postgres database""" def __init__(self, user='postgres', host='127.0.0.1', port='5432', database='...
121
36.01
80
15
773
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_0a171c18be6aafed_af81168c", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi...
[ 102, 108 ]
[ null, null ]
[ 32, 39 ]
[ 46, 53 ]
2024-11-19T03:22:12.674196+00:00
1,502,042,434,000
770767226d197fec02c4f4700a32fa44bd013457
3
{ "blob_id": "770767226d197fec02c4f4700a32fa44bd013457", "branch_name": "refs/heads/master", "committer_date": 1502042434000, "content_id": "efd9d12d8d384a7021cb7d2a2aa3b3aee0ed5e94", "detected_licenses": [ "MIT" ], "directory_id": "864f0a886235f0f56765ded16506821fc5e0ecf3", "extension": "py", "fi...
2.65625
stackv2
import os from flask import Flask, request, redirect, url_for from werkzeug.utils import secure_filename import requests # AI Imports from keras.preprocessing import image from tqdm import tqdm from keras.models import load_model import numpy as np # Loading Tensors def path_to_tensor(img_path): img = image.load...
83
28.18
104
16
580
python
[{"finding_id": "codeql_py/partial-ssrf_9a17c52699932ace_18470b1f", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 81 ]
[ null ]
[ 14 ]
[ 105 ]
2024-11-19T03:22:19.211593+00:00
1,591,840,943,000
f73d08c117f1f27f4edacf556b3ba0b19414ee19
3
{ "blob_id": "f73d08c117f1f27f4edacf556b3ba0b19414ee19", "branch_name": "refs/heads/master", "committer_date": 1591840943000, "content_id": "2f3e544d1ab35b2b446bacad74f5e3870f730bdf", "detected_licenses": [ "MIT-0" ], "directory_id": "2a4a08a1770b157753bd0a1fb7ca90969d5710aa", "extension": "py", "...
2.578125
stackv2
# Copyright 2020 Amazon.com, Inc. or its affiliates. All Rights Reserved. # SPDX-License-Identifier: MIT-0 import os import sys import json from jinja2 import Template Lambda_dict = {} Environment = "" def read_sm_def ( sm_def_file: str ) -> dict: """ Reads state machine definition from a file and return...
167
31.93
103
24
1,009
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_dbbe035a5cfccb54_5c689648", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 51 ]
[ null ]
[ 10 ]
[ 35 ]
2024-11-19T03:44:02.603401+00:00
1,649,080,391,000
a1981a1a4d5d3166f61cbb9aa698d249405a5d95
3
{ "blob_id": "a1981a1a4d5d3166f61cbb9aa698d249405a5d95", "branch_name": "refs/heads/master", "committer_date": 1649080391000, "content_id": "0aed9b5880150ca049c2ead023dfdaf89c114c52", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "71200fe39fe9415c8498b1e99b05fb704c78c5af", "extension": "p...
2.765625
stackv2
# -*- coding: utf-8 -*- # Originally written by Kevin Breen (@KevTheHermit): # https://github.com/kevthehermit/RATDecoders/blob/master/ClientMesh.py # Standard Imports Go Here from base64 import b64decode from zipfile import ZipFile from io import StringIO from Crypto.Cipher import AES, DES3 # Helper Functions Go He...
187
30.45
93
18
1,521
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_86a4b4c9c6e63164_93648d13", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The cryptographic algorithm DES3](1) is broken or weak, and should not be used.", "...
1
true
[ "CWE-327" ]
[ "py/weak-cryptographic-algorithm" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[The cryptographic algorithm DES3](1) is broken or weak, and should not be used." ]
[ 89 ]
[ null ]
[ 12 ]
[ 32 ]
2024-11-19T03:44:07.162854+00:00
1,432,179,359,000
f7002dd341aa268c1c68cde61223489b3c7202f4
3
{ "blob_id": "f7002dd341aa268c1c68cde61223489b3c7202f4", "branch_name": "refs/heads/master", "committer_date": 1432179359000, "content_id": "f945c12c199db090fe8d08848931a977d6af87d7", "detected_licenses": [ "MIT" ], "directory_id": "c787417c053e2dca65f5e3749eec907c44420f96", "extension": "py", "fi...
2.609375
stackv2
import argparse from functools import reduce import gzip import json import requests import logging from flask import Flask, g, jsonify, request import geoip2.database import geoip2.errors DB_FILE_LOCATION = 'data/GeoLite2-City.mmdb' DB_FILE_URL = 'http://geolite.maxmind.com/download/geoip/database/GeoLite2-City.mmd...
104
33.42
121
18
828
python
[{"finding_id": "codeql_py/log-injection_cf893050c7005484_1c5f63fb", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2)...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2)." ]
[ 78 ]
[ null ]
[ 25 ]
[ 63 ]
2024-11-19T03:44:18.295148+00:00
1,689,158,004,000
e48f6ed86dda7df835ae90e28608d9b3a521957c
3
{ "blob_id": "e48f6ed86dda7df835ae90e28608d9b3a521957c", "branch_name": "refs/heads/master", "committer_date": 1689158004000, "content_id": "06b5df150537a20823a0992ffb0d47d3e6822323", "detected_licenses": [ "MIT" ], "directory_id": "096c2a37900ec0b5237be1af1b784934356c8a5c", "extension": "py", "fi...
2.640625
stackv2
# -*- coding: utf-8 -*- from io import StringIO from pdfminer import pslexer from pdfminer.pdfparser import PDFParser, PDFDocument from pdfminer.pdfinterp import PDFResourceManager, PDFTextExtractionNotAllowed, PDFPageInterpreter from pdfminer.converter import TextConverter from pdfminer.layout import LAParams, LTText...
128
30.81
139
21
1,210
python
[{"finding_id": "codeql_py/request-without-cert-validation_91cb8bb1c1588d28_b47b04de", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 125 ]
[ null ]
[ 16 ]
[ 64 ]
2024-11-19T03:44:24.148930+00:00
1,580,543,562,000
c5469763d26c6dadaad05a27f07ffdc65243f3e8
3
{ "blob_id": "c5469763d26c6dadaad05a27f07ffdc65243f3e8", "branch_name": "refs/heads/master", "committer_date": 1580543562000, "content_id": "1580fe1404253d6533886b28b6083f8b89f35d78", "detected_licenses": [ "MIT" ], "directory_id": "a375229c54ca7ed069d1c1dba2cc10a084cb1439", "extension": "py", "fi...
2.984375
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- # Parsing prices from 15-58m11.ru website and writing them to CSV # Written by Snownoise # Snownoise@gmail.com # 1.0 # 2017-06-25 from bs4 import BeautifulSoup from bs4 import element import requests import csv import re import m11_bot_config def parce_tables(tables)...
92
28.2
97
18
702
python
[{"finding_id": "codeql_py/request-without-cert-validation_0a6460ec2f0a8bb7_76180f5e", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 72 ]
[ null ]
[ 8 ]
[ 65 ]
2024-11-19T03:44:28.164143+00:00
1,690,506,920,000
c542b9fc0d0ba5b4a8a327dcca4e151c5ee1324f
3
{ "blob_id": "c542b9fc0d0ba5b4a8a327dcca4e151c5ee1324f", "branch_name": "refs/heads/main", "committer_date": 1690506920000, "content_id": "c5a6d98fa3f1c6390b5936485d2a0334afdd613e", "detected_licenses": [ "Apache-2.0" ], "directory_id": "8245320cd0ccd28d9e8670a80e848ef4a61c8f69", "extension": "py", ...
2.5625
stackv2
# Copyright 2022 Cerebras Systems. # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in wri...
184
32.59
102
24
1,269
python
[{"finding_id": "codeql_py/tarslip_f46f7c5412e91374_7523b4bb", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 146 ]
[ null ]
[ 21 ]
[ 24 ]
2024-11-19T01:44:05.393313+00:00
1,595,547,766,000
0262605b1d62e126ac68772b78f65c73186b9dd7
2
{ "blob_id": "0262605b1d62e126ac68772b78f65c73186b9dd7", "branch_name": "refs/heads/master", "committer_date": 1595547766000, "content_id": "f24688598e0ae11cf8ee43e6954360fbb3560637", "detected_licenses": [ "Apache-2.0" ], "directory_id": "401464c4eab87b77c04aee2dd9ed43f2a203d5b7", "extension": "py"...
2.453125
stackv2
from cyclone.web import * from hashlib import md5 class DigestAuthMixin(object): def apply_checksum(self, data): return md5(data).hexdigest() def apply_digest(self, secret, data): return self.apply_checksum(secret + ":" + data) def A1(self, algorithm, auth_pass): """ If '...
157
40.13
178
20
1,309
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_75134bd68be34d15_2d232e36", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (id)](2) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (password)](3) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensiv...
[ 6 ]
[ null ]
[ 20 ]
[ 24 ]
2024-11-19T01:44:10.658961+00:00
1,599,053,689,000
8cd96bbfb0a344ae8c4beb187aa585c487a5c63b
3
{ "blob_id": "8cd96bbfb0a344ae8c4beb187aa585c487a5c63b", "branch_name": "refs/heads/master", "committer_date": 1599053689000, "content_id": "46629b63857537deedc85ec4a11cd8284816e2a0", "detected_licenses": [ "Apache-2.0" ], "directory_id": "5fe72bb13baf3649058ebe11aa86ad4fc56c69ed", "extension": "py"...
2.546875
stackv2
import os import sys import io import tarfile import urllib.request ARCHIVE_URL = 'http://d.pr/f/YqS5+' def main(): print('Downloading ensurepip module archive...') response = urllib.request.urlopen(ARCHIVE_URL) data = response.read() tar_f = tarfile.open(fileobj=io.BytesIO(data)) package_root ...
32
20.22
70
12
165
python
[{"finding_id": "codeql_py/tarslip_248ede39cba58403_040fa564", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 23 ]
[ null ]
[ 9 ]
[ 14 ]
2024-11-19T02:21:25.406263+00:00
1,465,534,213,000
c8f903c544259e3356ec70e1b2245e468ef78c02
2
{ "blob_id": "c8f903c544259e3356ec70e1b2245e468ef78c02", "branch_name": "refs/heads/master", "committer_date": 1465534213000, "content_id": "340e6ce3965498643a8786ad218ea3ae6093e1be", "detected_licenses": [ "MIT" ], "directory_id": "c145839b030fbd87718b16bf6949b2b5bb160ff1", "extension": "py", "fi...
2.390625
stackv2
import re import sys import time import glob import json import os import socket import ssl import style import fnmatch import traceback from threading import Thread from queue import Queue class DissBot(): config_file = 'config.json' debug = False socket = None connected = False iqueue = Qu...
478
23.65
101
25
2,366
python
[{"finding_id": "codeql_py/insecure-default-protocol_ae2c7001b291f745_d3857988", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in...
1
true
[ "CWE-327" ]
[ "py/insecure-default-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used." ]
[ 181 ]
[ null ]
[ 23 ]
[ 41 ]
2024-11-19T02:21:29.701608+00:00
1,668,691,826,000
ee76ec59d81d8594bb120653ce95a42ff4f98e11
2
{ "blob_id": "ee76ec59d81d8594bb120653ce95a42ff4f98e11", "branch_name": "refs/heads/master", "committer_date": 1668691826000, "content_id": "0a018659ded8ce967fbdb15b023c90903d49eafd", "detected_licenses": [ "MIT", "BSD-3-Clause" ], "directory_id": "04e38597b547424b0d0b0db163372f8a68cc6f92", "ext...
2.46875
stackv2
# -*- coding: utf-8 -*- import requests, json, codecs import logging logger = logging.getLogger('feedler') from .models import Entry from feedler import feedparser API_BASEURL = 'https://cloud.feedly.com/v3/' API_STREAMS = API_BASEURL + 'streams/contents?streamId=' API_TOKENS = API_BASEURL + 'auth/token' def refre...
79
33.65
80
14
589
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4ef974fb4930666c_d139dd6f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 39 ]
[ null ]
[ 22 ]
[ 30 ]
2024-11-19T02:21:32.954855+00:00
1,443,681,158,000
797f3c51be564ff171a3ac712436c0a9b82a2ed9
3
{ "blob_id": "797f3c51be564ff171a3ac712436c0a9b82a2ed9", "branch_name": "refs/heads/master", "committer_date": 1443681158000, "content_id": "133aef9557ab3c4d6c61c7828648e31538fd1512", "detected_licenses": [ "MIT" ], "directory_id": "d977c97b3441a6993d9f5d335ad95b997150180b", "extension": "py", "fi...
3.125
stackv2
class Dog: def name(self): return "Fido" def _tail(self): # Prefixing a method with an underscore implies private scope return "wagging" def __password(self): return 'password' # Genius! def test_attributes_with_double_underscore_prefixes_are_su...
17
28.29
83
9
104
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f72913bbde342353_0bc16c19", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 15 ]
[ null ]
[ 8 ]
[ 24 ]
2024-11-19T02:57:58.813106+00:00
1,620,323,934,000
c9020a5156949836592a9a3c855a720ee75f1f15
3
{ "blob_id": "c9020a5156949836592a9a3c855a720ee75f1f15", "branch_name": "refs/heads/main", "committer_date": 1620323934000, "content_id": "4a3c5ecf8c0776f97c6845e22c2b2f2ffe0fe50e", "detected_licenses": [ "MIT" ], "directory_id": "9480f0b3b0e684081b14679ade371a30751acb4e", "extension": "py", "file...
3.015625
stackv2
import json import requests import telegram_send import datetime import time # Get Data From COWIN Public API def get_data_from_cowin(pincode): url = "https://cdn-api.co-vin.in/api/v2/appointment/sessions/public/calendarByPin?pincode=" + \ str(pincode)+"&date="+datetime.date.today().strftime("%d-%m-%Y") ...
84
34.36
119
16
689
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e3bfbbe965f30ff6_8d4242c1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 57 ]
[ null ]
[ 11 ]
[ 18 ]
2024-11-19T02:58:14.191220+00:00
1,553,498,840,000
32d7a6facb77901110d83faa763d2899ef2f7124
2
{ "blob_id": "32d7a6facb77901110d83faa763d2899ef2f7124", "branch_name": "refs/heads/master", "committer_date": 1553498840000, "content_id": "9b796181676a3933aa568e79ec749b1a8900c02c", "detected_licenses": [ "MIT" ], "directory_id": "c74681dcb6ad58deaefab30a4c6461a710853d34", "extension": "py", "fi...
2.34375
stackv2
#!/usr/bin/python3 """ Tests the view used by dietician looking at a course """ from jinja2 import Environment, FileSystemLoader EDIT_CSS = """\ input.calc { width:130px; visibility:hidden; } button.ifedit { visibility:hidden; } """ input_ = dict( SCRIPT_NAME="...
48
16.9
60
8
230
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_0c2c6fc3c1ec5e32_fdf1048f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 40 ]
[ null ]
[ 7 ]
[ 38 ]
2024-11-19T03:10:03.914135+00:00
1,627,225,268,000
ae0f08dea52cf2c4453843a2c0ebb18691345229
3
{ "blob_id": "ae0f08dea52cf2c4453843a2c0ebb18691345229", "branch_name": "refs/heads/main", "committer_date": 1627225268000, "content_id": "2f48be7dd678c3e12b9a4d5d5f5433e5473a5e80", "detected_licenses": [ "MIT" ], "directory_id": "52679c832c4a0436da11095fcea7b064b557df83", "extension": "py", "file...
2.59375
stackv2
import requests from bs4 import BeautifulSoup import sys import argparse import urllib3 urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning) from timeit import default_timer as timer def getCSRF(url, csrfname, session): html = session.get(url, verify=False).text soup = BeautifulSoup(html, features="lx...
128
38.23
123
21
1,431
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fde63a441fb8e511_fa96e75b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
5
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-295", "CWE-295" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "HIGH", "HIGH", "HIGH", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text.", "This expression logs [sensitive data (p...
[ 45, 63, 68, 10, 27 ]
[ null, null, null, null, null ]
[ 9, 9, 9, 9, 15 ]
[ 43, 34, 52, 39, 74 ]
2024-11-19T03:22:41.984151+00:00
1,481,946,861,000
3d47e3ff5e6985dc79bae06ac4f3c3a8f4dc5169
3
{ "blob_id": "3d47e3ff5e6985dc79bae06ac4f3c3a8f4dc5169", "branch_name": "refs/heads/master", "committer_date": 1481946861000, "content_id": "b3f026488be3c4f9b2484d3a82cf698f1721878e", "detected_licenses": [ "MIT" ], "directory_id": "0701f3722c0b45789286d92f3ea3a0e5d97d7381", "extension": "py", "fi...
2.5625
stackv2
import os from mainsite.models import Dashboard, Query, Database from rest_framework.views import APIView from rest_framework.response import Response from rest_framework import status from sqlalchemy import create_engine class RunQueryViewSet(APIView): """ Queries your database """ def post(self, re...
179
41.77
117
18
1,429
python
[{"finding_id": "codeql_py/sql-injection_02081136ef073d23_a418bf98", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown...
1
true
[ "CWE-089" ]
[ "py/sql-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This SQL query depends on a [user-provided value](1)." ]
[ 38 ]
[ null ]
[ 37 ]
[ 66 ]
2024-11-19T03:22:44.511064+00:00
1,479,358,227,000
af63eeeb322869681ad6e92cbb1d240af4339a59
3
{ "blob_id": "af63eeeb322869681ad6e92cbb1d240af4339a59", "branch_name": "refs/heads/master", "committer_date": 1479358227000, "content_id": "0f203e1beed2c203b5a774d3e3f4776bf4b17beb", "detected_licenses": [ "Apache-2.0" ], "directory_id": "6a7a581805a1aa901fd7fb821503652361b088d5", "extension": "py"...
2.53125
stackv2
#!/usr/bin/env python # # Copyright 2009 Facebook # # Licensed under the Apache License, Version 2.0 (the "License"); you may # not use this file except in compliance with the License. You may obtain # a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or a...
61
29.46
81
12
427
python
[{"finding_id": "codeql_py/reflective-xss_a25ddfc9a65e7986_49d50835", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 35 ]
[ null ]
[ 20 ]
[ 43 ]
2024-11-19T03:22:55.771619+00:00
1,572,343,157,000
815623e3b648cafba38cd17dfdf9aeb3b38599c2
3
{ "blob_id": "815623e3b648cafba38cd17dfdf9aeb3b38599c2", "branch_name": "refs/heads/master", "committer_date": 1572343157000, "content_id": "6eb723b5f884f9347638cd565f73b84fd3944c04", "detected_licenses": [ "MIT" ], "directory_id": "64479625ec00febc71746f30ce19c7220a04b00a", "extension": "py", "fi...
2.515625
stackv2
import datetime from .aes256 import aes256 import json def encrypt(): dailyHashes = [ "0LC4K6oXKU", "LoKlo1HcQj", "mgrQdeZA15", "zAy6DYwet7", "8XJ6X2F0R8", "tWieS9EoXL", "kJZ2067Euo" ] weekDay = datetime.datetime.today().weekday() compatibleWeekDay = weekDay + 1 if weekDay == 6: ...
28
19.68
106
14
217
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_817acafe9161b95b_7feeb04a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 22 ]
[ null ]
[ 25 ]
[ 35 ]
2024-11-19T03:22:58.124051+00:00
1,548,911,342,000
beffc43c11871a733f7efa00a6cd242b152fa10f
2
{ "blob_id": "beffc43c11871a733f7efa00a6cd242b152fa10f", "branch_name": "refs/heads/master", "committer_date": 1548911342000, "content_id": "ad14c49a23bbac270e8ab65d400da62272139e1b", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "5316d4882af3822c3474a7d1b1bbef66b71a99b8", "extension": "p...
2.453125
stackv2
from flask import Flask, render_template, request, redirect, url_for, flash from calcount import * from form import * import os from werkzeug.utils import secure_filename app = Flask(__name__) DEBUG = True app.config['SESSION_TYPE'] = 'filesystem' app.secret_key = "secret" UPLOAD_FOLDER = '/static/images/' ALLOWED_EXT...
63
31.73
122
17
465
python
[{"finding_id": "codeql_py/url-redirection_aa3f8252f88a4530_89760851", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
2
true
[ "CWE-601", "CWE-601" ]
[ "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 49, 53 ]
[ null, null ]
[ 29, 29 ]
[ 40, 40 ]
2024-11-19T03:23:00.626415+00:00
1,570,731,765,000
e8f25e2779fa858cc4d2ba7a78b11182fa10d680
2
{ "blob_id": "e8f25e2779fa858cc4d2ba7a78b11182fa10d680", "branch_name": "refs/heads/master", "committer_date": 1570731765000, "content_id": "3032dede09eec9e41549b5bcd996822b4c0b5424", "detected_licenses": [ "Apache-2.0" ], "directory_id": "8b448b3253aebd19cfe9cd73c5c1289b4663d038", "extension": "py"...
2.484375
stackv2
import sys import getopt import os import traceback import apilityio import apilityio.errors def main(argv=None): if argv is None: argv = sys.argv try: try: api_key = None domain = None options, remainder = getopt.getopt( argv[1:], 'h:a:d', ...
84
34.1
86
19
685
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e891d15213c9eb3e_8cf23dfc", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 41 ]
[ null ]
[ 19 ]
[ 48 ]
2024-11-19T03:23:09.896787+00:00
1,626,197,113,000
b58617e0e6c5057a09b5fd8604af6fba4912f819
3
{ "blob_id": "b58617e0e6c5057a09b5fd8604af6fba4912f819", "branch_name": "refs/heads/main", "committer_date": 1626197113000, "content_id": "60ec22e6218db4b3c965d10ba25eec418df6c695", "detected_licenses": [ "Apache-2.0" ], "directory_id": "00073097c89bca2854baf45573be239e2bca0125", "extension": "py", ...
2.890625
stackv2
from bs4 import BeautifulSoup from pathlib import Path import requests def get_imgur_gallery_images(url): response = requests.get(url) soup = BeautifulSoup(response.text, 'lxml') img_ids = [ i['id'] for i in soup.select('.post-image-container') ] return [ f'https://i.imgur....
33
23.85
56
15
207
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_b2b18b3d236945a4_f0f311a6", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [imgur.com](1) may be at an arbitrary position in the s...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [imgur.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 23 ]
[ null ]
[ 10 ]
[ 28 ]
2024-11-19T01:34:49.419152+00:00
1,605,780,906,000
a7497d26357a54d6b016df83b9f100098b846e04
3
{ "blob_id": "a7497d26357a54d6b016df83b9f100098b846e04", "branch_name": "refs/heads/master", "committer_date": 1605780906000, "content_id": "2d4b48720d2f3c6ca34ed05d7dd50e464957df77", "detected_licenses": [ "MIT" ], "directory_id": "1f5bee8fe49bcb9aab6afcaa83c0f2ee9c72b107", "extension": "py", "fi...
3.015625
stackv2
import streamlit as st import nltk #import en_core_web_sm nltk.download('punkt') #NLP import spacy #nlp = spacy.load('en') nlp = spacy.load('en_core_web_sm') from spacy import displacy HTML_WRAPPER = """<div style="overflow-x: auto; border:1px solid #e6e9ef; border-radius: 0.95rem; padding:1 rem">{}</div>""" # Summary...
101
33.88
124
17
863
python
[{"finding_id": "codeql_py/full-ssrf_9ac529fc1fb3984a_4834be8b", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).\nThe full URL of this request depends on a [user-...
1
true
[ "CWE-918" ]
[ "py/full-ssrf" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1).\nThe full URL of this request depends on a [user-provided value](1).\nThe full URL of this request depends on a [user-provided value](1).\nThe full URL of this request depends on a [user-provided value](1)." ]
[ 40 ]
[ null ]
[ 12 ]
[ 28 ]
2024-11-19T01:34:52.771814+00:00
1,580,040,942,000
6161117990a2678efba15ae55c47b202019e50f9
2
{ "blob_id": "6161117990a2678efba15ae55c47b202019e50f9", "branch_name": "refs/heads/master", "committer_date": 1580040942000, "content_id": "31735df7186d0c762d96cd2283fe90e7a2d45753", "detected_licenses": [ "MIT" ], "directory_id": "7711f40d40d72fb97ead5ebd2e59ee2725e98773", "extension": "py", "fi...
2.40625
stackv2
import socket from flask import Flask, request, send_from_directory, redirect, render_template, flash, url_for, jsonify, \ make_response, abort from googletrans import Translator # from .eng_to_kamayo_word_translator_predict import EngToKamayoTranslator # from .kamayo_to_eng_word_translator_predict import KamayoTo...
120
35.74
132
15
1,045
python
[{"finding_id": "codeql_py/url-redirection_fa7194da37521d91_812582ee", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
2
true
[ "CWE-601", "CWE-601" ]
[ "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 45, 48 ]
[ null, null ]
[ 22, 22 ]
[ 33, 33 ]
2024-11-19T01:34:56.553883+00:00
1,568,986,264,000
deee8a6c2ecf2dcb49405c7e8d82252bb1de1c13
3
{ "blob_id": "deee8a6c2ecf2dcb49405c7e8d82252bb1de1c13", "branch_name": "refs/heads/master", "committer_date": 1568986264000, "content_id": "a4229a71aba60e38787a35d8a9ebe1e2bdbca10b", "detected_licenses": [ "MIT" ], "directory_id": "b3c3bddf785298ad8fe74aebe78553ccb686b7a0", "extension": "py", "fi...
2.53125
stackv2
import os from flask import Flask, request, render_template, url_for, redirect app = Flask(__name__) @app.route("/") def fileFrontPage(): return render_template('upload.html') @app.route("/actionUpload", methods=['POST']) def handleFileUpload(): if 'photo' in request.files: photo = request.files['pho...
19
27
68
15
116
python
[{"finding_id": "codeql_py/path-injection_0fac2e5254b6b681_1f7e9974", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 15 ]
[ null ]
[ 24 ]
[ 68 ]
2024-11-19T01:35:03.694195+00:00
1,676,139,610,000
a6714bb11880fca5676a68c8b9e3698cf066d12c
3
{ "blob_id": "a6714bb11880fca5676a68c8b9e3698cf066d12c", "branch_name": "refs/heads/master", "committer_date": 1676139610000, "content_id": "cf7d2f0526dc797ab59e57ebac3f9994818840cb", "detected_licenses": [ "MIT" ], "directory_id": "255e19ddc1bcde0d3d4fe70e01cec9bb724979c9", "extension": "py", "fi...
2.625
stackv2
#!/usr/bin/env python ### # Takes a username from environment variable PAM_USER, a password from STDIN # and tries to verify the shadow's password using LDAP's SSHA algorithm: # # {SSHA}...base64encodedString... # # If used within PAM auth this provides a compatibility layer that allows # to migrate LDAP user into ...
77
37.43
124
19
666
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_5e98f131d8d51b0a_f2c8d5ab", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expen...
[ 43, 44 ]
[ null, null ]
[ 23, 15 ]
[ 31, 19 ]
2024-11-19T01:35:07.111882+00:00
1,469,188,783,000
a08def0151d09a3d0ccef2bbf597569a5f1cc688
3
{ "blob_id": "a08def0151d09a3d0ccef2bbf597569a5f1cc688", "branch_name": "refs/heads/master", "committer_date": 1469188783000, "content_id": "bc80966f3ea191d9e701398f6beec60cbf5312ce", "detected_licenses": [ "AFL-3.0" ], "directory_id": "afd7e97e3e30df7eb7ae34e3accf44e225e7ad67", "extension": "py", ...
2.625
stackv2
#!/usr/bin/python import string, sys import numpy as np import matplotlib.pyplot as plt import pickle import os plt.ioff() frequency=[] spectrumrms=[] spectrummean=[] averagespectrum=[] # If no arguments were given, print a helpful message if len(sys.argv)!=6: print 'Usage: fitband filein start_freq chbw polynomial...
141
26.05
88
15
1,161
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_895be8fead1d1d57_b0478d76", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (secret)](1) as clear text." ]
[ 130 ]
[ null ]
[ 15 ]
[ 42 ]
2024-11-19T01:35:08.260258+00:00
1,580,851,423,000
627b8c3cd2e5b5d044ee740e51ec8e21999d42d3
3
{ "blob_id": "627b8c3cd2e5b5d044ee740e51ec8e21999d42d3", "branch_name": "refs/heads/master", "committer_date": 1580851423000, "content_id": "4ace2024c79a3cd9e7d039b9b52dc846a899c219", "detected_licenses": [ "MIT" ], "directory_id": "601f250e6b76ca366513ff64189778fa7d7bdc69", "extension": "py", "fi...
2.984375
stackv2
""" ESP- Este codigo escanea todas las raspberry conectadas a la red y manda un archivo a cada una de ellas sobre SSH ENG- Scan all IP connected in the local network and detect all the Raspberry Pi in order to create a SSH connection """ import paramiko from scp import SCPClient import os import time import subproces...
45
40.38
134
12
526
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_b6a7262c9ed03c99_7c69d6fd", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 16 ]
[ null ]
[ 5 ]
[ 65 ]
2024-11-19T01:55:44.370876+00:00
1,654,341,263,000
176281625889df19aaa018f89351becc0704bf87
2
{ "blob_id": "176281625889df19aaa018f89351becc0704bf87", "branch_name": "refs/heads/master", "committer_date": 1654341263000, "content_id": "51712827f78fb4561e00da511ac56555a47d32f7", "detected_licenses": [ "MIT" ], "directory_id": "9aac8221051d3f12d6b03a6f10ba77eb24b520d6", "extension": "py", "fi...
2.4375
stackv2
import datetime import time import requests import hashlib from urllib.parse import urlencode from .aes import AESTool BASE_URL = "https://login.dangdang.com" P_PERMANENT_ID = 'permanent_id' P_T = 't' P_CT = 'ct' P_STATUS_CODE = 'statusCode' P_REQUEST_ID = 'requestId' P_RANKEY = 'rankey' P_SIGN = 'sign' UTF8 = 'UTF-8'...
52
28.92
68
13
462
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_5b8e859e2902aa61_6b95be12", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (private)](1) is used in a hashing algorithm (MD5) that is insecu...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (private)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 44 ]
[ null ]
[ 16 ]
[ 34 ]
2024-11-19T02:17:19.055356+00:00
1,530,106,240,000
aa898c5646f039de12214d8cef1cea4753a014dc
2
{ "blob_id": "aa898c5646f039de12214d8cef1cea4753a014dc", "branch_name": "refs/heads/master", "committer_date": 1530106240000, "content_id": "ecfff2ee6e5ce8ade569a9dc934a8dae86f7b55e", "detected_licenses": [ "Apache-2.0" ], "directory_id": "c5fc8f7f33534bd905f99e69632dca43741f59cd", "extension": "py"...
2.453125
stackv2
# # based on https://stackoverflow.com/questions/11262518/how-to-pass-uploaded-image-to-template-html-in-flask # - simple form to upload images # - redirect to uploaded_file to show image # # import os from subprocess import call from flask import Flask, render_template, request, send_from_directory, redirect, url_for...
98
28.61
138
13
715
python
[{"finding_id": "codeql_py/command-line-injection_ea62512a5d2f369b_14378ecf", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {...
4
true
[ "CWE-078", "CWE-078", "CWE-215", "CWE-022" ]
[ "py/command-line-injection", "py/command-line-injection", "py/flask-debug", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This command line depends on a [user-provided value](1).", "This command line depends on a [user-provided value](1).", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1)." ]
[ 74, 80, 98, 60 ]
[ null, null, null, null ]
[ 13, 13, 5, 15 ]
[ 138, 131, 42, 16 ]
2024-11-19T02:17:41.750276+00:00
1,581,048,481,000
ab9bc3fa0e600c8f6bd4424e32365a63f6173510
3
{ "blob_id": "ab9bc3fa0e600c8f6bd4424e32365a63f6173510", "branch_name": "refs/heads/master", "committer_date": 1581048481000, "content_id": "9aac55377bcb75e14c4e01900b4d7c87982686cc", "detected_licenses": [ "MIT" ], "directory_id": "a7a9dcd01329961aa829ec186159ceed0cff6626", "extension": "py", "fi...
2.703125
stackv2
# -*- coding: utf-8 -*- # 모델 구현을 위한 유틸리티 함수들 import tensorflow as tf import numpy as np import scipy.misc as misc import os, sys from six.moves import urllib import tarfile import zipfile import scipy.io # VGGNet 파라미터가 저장된 mat 파일을 다운로드 받고 불러옵니다. def get_model_data(dir_path, model_url): maybe_download_and_extract(di...
109
30.78
107
18
1,060
python
[{"finding_id": "codeql_py/tarslip_1e7a47365c0fd458_1cf3c7f3", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 40 ]
[ null ]
[ 7 ]
[ 37 ]
2024-11-19T02:18:10.563145+00:00
1,563,875,900,000
e80785c080fde513236f44f46ee836c99220be0a
2
{ "blob_id": "e80785c080fde513236f44f46ee836c99220be0a", "branch_name": "refs/heads/master", "committer_date": 1563875900000, "content_id": "3010846a288744a2824a4e74338ca539ef79b204", "detected_licenses": [ "Apache-2.0" ], "directory_id": "2c67282cb792d358d181b25196937daec6c1417c", "extension": "py"...
2.40625
stackv2
#! /usr/bin/env python """ Copyright [1999-2019] EMBL-European Bioinformatics Institute Licensed under the Apache License, Version 2.0 (the "License") you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless requir...
136
30.58
147
16
1,201
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_d70f59825430fc29_98e04686", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 58 ]
[ null ]
[ 6 ]
[ 29 ]
2024-11-19T02:18:30.960787+00:00
1,538,762,814,000
10629f95863ba7636aa3ee163f5aaf4b403755f5
3
{ "blob_id": "10629f95863ba7636aa3ee163f5aaf4b403755f5", "branch_name": "refs/heads/master", "committer_date": 1538762814000, "content_id": "a1b553f345bc1ab15a535cd832c463dcd0bb13c6", "detected_licenses": [ "Apache-2.0" ], "directory_id": "69a873cbbb371978661628e3e8e4f567713bb57a", "extension": "py"...
2.5625
stackv2
from __future__ import print_function import json import os import subprocess import sys from builtins import input from collections import defaultdict from ..plugins.core import initialize from ..plugins.high_entropy_strings import HighEntropyStringsPlugin from .baseline import merge_results from .bidirectional_iter...
346
28.82
89
20
2,231
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ddd2fd2524d71b70_ec9ea823", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 151 ]
[ null ]
[ 15 ]
[ 34 ]
2024-11-19T02:29:52.402650+00:00
1,571,500,973,000
0c90cdc1771c292878c8da08452ac837c9b20b6b
3
{ "blob_id": "0c90cdc1771c292878c8da08452ac837c9b20b6b", "branch_name": "refs/heads/master", "committer_date": 1571500973000, "content_id": "7136e945bd96a0322cf1a93cb1bd3ee146d63b10", "detected_licenses": [ "MIT" ], "directory_id": "629cd73cb20cbf5d34d6743a52d0d19f0fecc778", "extension": "py", "fi...
2.65625
stackv2
# Date: 07/02/2018 # Author: Pure-L0G1C # Description: DBMS import bcrypt import sqlite3 from . import const from time import time from os import urandom from hashlib import sha256 from base64 import b64encode from datetime import datetime class Database(object): def __init__(self): self.db_path = const...
234
33.16
109
16
1,671
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_d5d5b6dc719ccf06_9dca137a", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e...
[ 203 ]
[ null ]
[ 30 ]
[ 48 ]
2024-11-19T02:30:08.812819+00:00
1,658,555,314,000
5727442b2e908ab177296518b7f31a53b513193f
3
{ "blob_id": "5727442b2e908ab177296518b7f31a53b513193f", "branch_name": "refs/heads/master", "committer_date": 1658555314000, "content_id": "701e818ad7846f64fc1acbc0011dc77c69402440", "detected_licenses": [ "CC0-1.0" ], "directory_id": "d9cb81209d452b7c3180cd2e2b3e1b00279b469c", "extension": "py", ...
2.59375
stackv2
#!/usr/bin/env python3 import re import glob # A quick-and-dirty script to check that for each URL, the script name matches # the expected value, and that for each script, the corresponding database_url # and CSV files are used. SCRIPTS = glob.glob("proc_*.py") def squeeze_hyphens(s): return "_".join(filter(...
66
24.65
78
16
429
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_042e4771159a32f6_f012e600", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [www.conference-board.org](1) may be at an arbitrary po...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [www.conference-board.org](1) may be at an arbitrary position in the sanitized URL." ]
[ 40 ]
[ null ]
[ 22 ]
[ 56 ]
2024-11-19T02:30:17.158483+00:00
1,693,557,656,000
29f6e3111f0961411d34e2307a307dc0a63f7083
3
{ "blob_id": "29f6e3111f0961411d34e2307a307dc0a63f7083", "branch_name": "refs/heads/master", "committer_date": 1693557656000, "content_id": "1b362d55efae070f6a38cea4e1e51df07f8f886b", "detected_licenses": [ "MIT" ], "directory_id": "4f63e427654cd2182970ecb0469cfc4a0e0dbb96", "extension": "py", "fi...
2.84375
stackv2
"""Templating abstraction around jinja2 for Planemo.""" try: from jinja2 import Template except ImportError: Template = None # type: ignore NO_JINJA2_MESSAGE = ( "This functionality requires Jinja2 but this library is " "unavailable. Install with `pip install jinja2`." ) def render(template_str: str, **...
18
29.17
111
9
130
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_27688c6772e19d7c_08e61d60", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 16 ]
[ null ]
[ 16 ]
[ 38 ]
2024-11-19T02:30:26.603048+00:00
1,571,437,769,000
77377a7b7a752535cc85132b82db4d14cd569c55
3
{ "blob_id": "77377a7b7a752535cc85132b82db4d14cd569c55", "branch_name": "refs/heads/master", "committer_date": 1571437769000, "content_id": "8d6acd3fde5d05bf17c5a1f79dcb0fdf52934425", "detected_licenses": [ "Apache-2.0" ], "directory_id": "03561ce569a5ede138340bee411e053063c2e3a3", "extension": "py"...
2.609375
stackv2
import io import select from os.path import exists from paramiko import client, RSAKey from paramiko.channel import ChannelFile, ChannelStderrFile, Channel # && -> is a cross-platform solution that will execute the next command, if the previous had no errors. # you may change it... # ; -> in linux will execute regard...
135
37.33
150
20
1,128
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_a089287292d3b5bc_5bfb2817", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 85 ]
[ null ]
[ 9 ]
[ 72 ]
2024-11-19T02:30:37.785390+00:00
1,632,320,498,000
3b05e9bc6b596bc7961cbb86bdcf9842c3f3c6fb
3
{ "blob_id": "3b05e9bc6b596bc7961cbb86bdcf9842c3f3c6fb", "branch_name": "refs/heads/main", "committer_date": 1632320498000, "content_id": "3ba96ed27566c8ca9edf53d7de0bf56c0f17bced", "detected_licenses": [ "Apache-2.0" ], "directory_id": "6bae7ed2b753b91bb87920e336f847ff3f92060f", "extension": "py", ...
3.28125
stackv2
import Views import Controllers import Models class TournamentView: # ====== NEW TOURNAMENT ====== # @classmethod def new_tournament(cls, tournament, step): """ View corresponding to the addition of a new tournament in the database """ print("\nCREATION D'UN NOUVEAU TOURN...
265
31.57
79
16
1,859
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b4f891785149f6c3_a7f001c0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
4
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 137, 138, 160, 161 ]
[ null, null, null, null ]
[ 19, 19, 19, 19 ]
[ 60, 44, 60, 44 ]
2024-11-19T02:41:42.706572+00:00
1,683,296,390,000
b5582bb1f88a8424607146a859704ed9dbf4526f
2
{ "blob_id": "b5582bb1f88a8424607146a859704ed9dbf4526f", "branch_name": "refs/heads/master", "committer_date": 1683296390000, "content_id": "6f4d987b5d63d7450d7fba0e9babb7e014507744", "detected_licenses": [ "Apache-2.0" ], "directory_id": "c635fe2b4ba68ec73ccea3e06ed1a84e25153ae6", "extension": "py"...
2.34375
stackv2
from __future__ import absolute_import import os import bagit import tarfile import hdfs import shutil # import the Celery app context from crawl.celery import app from crawl.celery import cfg # Set up drop/watched folder configuration DLS_DROP=cfg.get('dls','drop_folder') DLS_WATCH=cfg.get('dls','watch_folder') # ...
67
34.3
93
15
626
python
[{"finding_id": "codeql_py/tarslip_b2f5e31c1fb8711c_b02b9eaf", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 50 ]
[ null ]
[ 9 ]
[ 12 ]
2024-11-19T02:42:23.415433+00:00
1,390,353,062,000
8108d0914dda3fab0d0cb371dddf18eef4c7b557
3
{ "blob_id": "8108d0914dda3fab0d0cb371dddf18eef4c7b557", "branch_name": "refs/heads/master", "committer_date": 1390353062000, "content_id": "1148c1f1fd7a4bdcf2a63688636a77775a286d91", "detected_licenses": [ "MIT" ], "directory_id": "c5d838598ee22b8c6125bd46f3f6078f4e28376e", "extension": "py", "fi...
2.6875
stackv2
import time import hashlib def authenticate_parameters(api_key, api_secret, parameters, expire=60): params = {} params.update(parameters) params["expire"] = int(time.time()) + expire params["api_key"] = api_key sig_base_string = "" for k in sorted(params.keys()): sig_base_string += "%s=...
17
28.53
72
11
129
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_de164e67863a6cb5_0119aef7", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 15 ]
[ null ]
[ 16 ]
[ 47 ]
2024-11-19T02:42:28.915383+00:00
1,534,921,701,000
352c667273edd9a1572568af8583fb46fbbaf46a
3
{ "blob_id": "352c667273edd9a1572568af8583fb46fbbaf46a", "branch_name": "refs/heads/master", "committer_date": 1534921701000, "content_id": "3a85787138cc035f49ff98fbfe22ba8b8ef33648", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e042cdc2b30b3539a66aecede8ead2e63539ad2d", "extension": "py"...
3.015625
stackv2
from Crypto.Cipher import AES KEY = b'fdsl;mewrjope456fds4fbvfnjwaugfo' def encrypt(message): message_length = len(message) if message_length % 16 != 0: message += '\0' * (16 - message_length % 16) message = bytes(message, 'ascii') aes = AES.new(KEY, AES.MODE_ECB) ciphertext = aes.encrypt...
19
25.68
56
12
143
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_63aab31fc1e6bb15_aaafeb09", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 12, 18 ]
[ null, null ]
[ 18, 17 ]
[ 38, 37 ]
2024-11-19T02:50:54.410070+00:00
1,582,523,631,000
1b2bc8e9672f1fdc6a4a3ac2396cbb45561ceadc
3
{ "blob_id": "1b2bc8e9672f1fdc6a4a3ac2396cbb45561ceadc", "branch_name": "refs/heads/master", "committer_date": 1582523631000, "content_id": "7f5dd4fd7ac17925b4c0bfdedfc8c8dc2512cee6", "detected_licenses": [ "MIT" ], "directory_id": "24dbdfbb893ffec8bbab5f1f210a8a32c5fa821b", "extension": "py", "fi...
2.703125
stackv2
""" @Author : dilless @Time : 2018/6/25 22:46 @File : paper_download.py """ import os import re from datetime import datetime import MySQLdb from selenium import webdriver from selenium.common.exceptions import NoSuchElementException class MySQLAccess(object): def __init__(self): self.conn = MySQ...
93
34.85
115
21
768
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_bc0d223438449000_cbb361c3", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'cnki.net', so it might match more h...
4
true
[ "CWE-020", "CWE-020", "CWE-020", "CWE-020" ]
[ "py/incomplete-hostname-regexp", "py/incomplete-hostname-regexp", "py/incomplete-hostname-regexp", "py/incomplete-hostname-regexp" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'cnki.net', so it might match more hosts than expected.", "This regular expression has an unescaped '.' before 'cnki.com', so it might match more hosts than expected.", "This regular expression has an unescaped '.' before 'cnki.com', so it might match more ho...
[ 64, 67, 70, 73 ]
[ null, null, null, null ]
[ 29, 29, 29, 29 ]
[ 48, 59, 52, 58 ]
2024-11-18T18:05:48.115739+00:00
1,579,633,178,000
29adbe20a3905ff258a794448bf983d19873f0aa
3
{ "blob_id": "29adbe20a3905ff258a794448bf983d19873f0aa", "branch_name": "refs/heads/master", "committer_date": 1579633178000, "content_id": "f60ea47d53f23c2f9ff0a0b2acce5080366fd573", "detected_licenses": [ "MIT" ], "directory_id": "de7a0a7c866a1841d33b95f28fa09704ffd394b6", "extension": "py", "fi...
2.9375
stackv2
"""Convert a HAR file to a JMeter test plan Parse <filename>.har and write <filename>.jmx """ from argparse import ArgumentParser import xmlformatter from harpy.har import Har from jinja2 import Environment, PackageLoader from urlparse import urlparse env = Environment(loader=PackageLoader('har2jmx', '.')) def ma...
88
26.06
68
11
522
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_40b6504b28873122_84e5fb94", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 13 ]
[ null ]
[ 7 ]
[ 56 ]
2024-11-18T18:05:51.942073+00:00
1,692,054,708,000
1e5b5ed786c23f28d2013447d465357d5cf8389c
3
{ "blob_id": "1e5b5ed786c23f28d2013447d465357d5cf8389c", "branch_name": "refs/heads/main", "committer_date": 1692054708000, "content_id": "8d53fe68d695227d3d46b8b75c652d2e962ea5b6", "detected_licenses": [ "MIT" ], "directory_id": "a3bb0a821c609ffa700e8da4fca3513cad33e670", "extension": "py", "file...
2.53125
stackv2
import asyncio import re from datetime import datetime from time import mktime import aiohttp import mwparserfromhell as mw import pandas as pd from lxml import html from mwclient import Site from requests.exceptions import ConnectionError from .revision import Revision def _get_users(metadata): """ Pull us...
274
25.12
107
18
1,586
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_65878d0f985c8821_cc74a593", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'wikipedia.org', so it might match m...
1
true
[ "CWE-020" ]
[ "py/incomplete-hostname-regexp" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'wikipedia.org', so it might match more hosts than expected." ]
[ 271 ]
[ null ]
[ 24 ]
[ 47 ]
2024-11-18T18:05:52.360518+00:00
1,675,086,392,000
3df9d577f1fa9ecd7c9b218a70e7853d72cd3a2d
2
{ "blob_id": "3df9d577f1fa9ecd7c9b218a70e7853d72cd3a2d", "branch_name": "refs/heads/main", "committer_date": 1675086392000, "content_id": "c89e13e538a8da526d07969e858c1896370c87eb", "detected_licenses": [ "MIT" ], "directory_id": "19cbda3e5703d8fa8c2167002d67af1e5d0e8d09", "extension": "py", "file...
2.4375
stackv2
import pathlib import distutils.dir_util import subprocess import sys import tempfile import jinja2 import markdown import nbconvert import nbformat import proselint from invoke import task import known WEB_ROOT = "cfm" TITLE = "Computing for mathematics" DESCRIPTION = "An undergraduate course introducing programmin...
175
27.85
99
17
1,133
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_9a7fc273479d1eec_0a5fe73a", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 56 ]
[ null ]
[ 20 ]
[ 61 ]
2024-11-18T18:05:54.905818+00:00
1,550,519,837,000
eae9b38d0866f9294ac74101908bf7b4301678a4
2
{ "blob_id": "eae9b38d0866f9294ac74101908bf7b4301678a4", "branch_name": "refs/heads/master", "committer_date": 1550519837000, "content_id": "da8ededae9fe22ccd44563b5b5eacdeac49af96f", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "9c7daf286de5ee4018c067d9fad33e741b2e2d32", "extension": "p...
2.5
stackv2
import os import urllib.request from glob import glob from scipy.io import arff import pandas as pd import tarfile DELGADO_DIR = 'Delgado_data/' DELGADO_DATASET_DOWNLOAD_URL='https://persoal.citius.usc.es/manuel.fernandez.delgado/papers/jmlr/data.tar.gz' class DownloadAndConvertDelgadoDatasets(object): def...
76
40.72
109
19
681
python
[{"finding_id": "codeql_py/tarslip_5a81875cf47b8aca_62d5c9e0", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 29 ]
[ null ]
[ 13 ]
[ 16 ]
2024-11-18T18:06:04.571906+00:00
1,634,784,750,000
c72cd297f9b55837d559b559677e40568f0ee2a6
2
{ "blob_id": "c72cd297f9b55837d559b559677e40568f0ee2a6", "branch_name": "refs/heads/master", "committer_date": 1634784750000, "content_id": "04dc6e77f53c6c143de5660d7f88dd898d57901b", "detected_licenses": [ "MIT" ], "directory_id": "a3843c8015dbb7438af6329f65f4a8ecbf3ac1fb", "extension": "py", "fi...
2.375
stackv2
import json import os import subprocess import urllib.request import urllib.error from queue import Queue from bottle import route, run, Bottle, request, static_file from threading import Thread import mutagen from mutagen.id3 import ID3, APIC from mutagen.easyid3 import EasyID3 import yt_dlp from yt_dlp.postprocessor....
162
28.73
118
21
1,219
python
[{"finding_id": "codeql_py/reflective-xss_7bda9361d79b7d6a_127e1989", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 35 ]
[ null ]
[ 16 ]
[ 49 ]
2024-11-18T18:16:05.296419+00:00
1,634,936,232,000
bc96458075311588326843081e152c926f6f229f
3
{ "blob_id": "bc96458075311588326843081e152c926f6f229f", "branch_name": "refs/heads/main", "committer_date": 1634936232000, "content_id": "806b6a2b44bc0228af08b3c242f6a2836e901b15", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e5b93f5c79be8eafc6740f22380be41ec163f9ac", "extension": "py", ...
3.140625
stackv2
''' The following is a basic twitter scraper code using tweepy. We preprocess the text - 1. Remove Emojis 2. Remove urls from the tweet. We store the output tweets with tweet-id and tweet-text in each line tab seperated. You will need to have an active Twitter account and provide your consumer key, secret and a callba...
95
34.94
134
16
897
python
[{"finding_id": "codeql_py/overly-large-range_46831e645a3bc865_01502c9b", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "remediatio...
3
true
[ "CWE-020", "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class." ]
[ 37, 37, 37 ]
[ null, null, null ]
[ 11, 14, 17 ]
[ 15, 18, 21 ]
2024-11-18T18:16:05.664047+00:00
1,692,870,659,000
d2fc11584b62a7d4e17d8b543377e03051f2764d
2
{ "blob_id": "d2fc11584b62a7d4e17d8b543377e03051f2764d", "branch_name": "refs/heads/master", "committer_date": 1692870659000, "content_id": "fb24a93a9ec03a9738043eddf2a4c67a51ae84a0", "detected_licenses": [ "Apache-2.0" ], "directory_id": "fc5a4e7c181dc4371ee1ac3b5b077901ca91f889", "extension": "py"...
2.4375
stackv2
#!/usr/bin/env python """ _UserFileCache_ API for UserFileCache service """ from builtins import str, bytes import os import json import shutil import hashlib import tarfile import tempfile from Utils.Utilities import encodeUnicodeToBytesConditional from Utils.PythonVersion import PY3 from WMCore.Services.Service ...
160
35.23
113
18
1,285
python
[{"finding_id": "codeql_py/tarslip_6da76af7775d3f8d_48f6f197", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially untrusted source](2)." ]
[ 68 ]
[ null ]
[ 53 ]
[ 64 ]
2024-11-18T19:58:37.213229+00:00
1,619,206,474,000
ffd2d246bc96ac33310bc893083db844d1232305
3
{ "blob_id": "ffd2d246bc96ac33310bc893083db844d1232305", "branch_name": "refs/heads/main", "committer_date": 1619206474000, "content_id": "974e4ba076d79e20038d09c3f23d05c091d0ab26", "detected_licenses": [ "MIT" ], "directory_id": "289c50a05aee0100b56eff4959f0b126b0a71983", "extension": "py", "file...
2.78125
stackv2
#!/usr/local/bin/python3 from flask import Flask, render_template, request import datetime app=Flask(__name__) @app.route('/') def hello_world(): return render_template('home.html', body="Custom body") @app.route("/owner") def Owner(): return "Hello, World from Pragati!" @app.route("/datetime") def DateTim...
35
21.23
59
12
202
python
[{"finding_id": "codeql_py/flask-debug_0237edf092026aec_ef97b024", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 35, 26 ]
[ null, null ]
[ 2, 10 ]
[ 48, 39 ]
2024-11-18T18:39:34.715388+00:00
1,615,096,115,000
ad7e4e788af95a6e2de6b4d6f9659b9d1faae4fc
3
{ "blob_id": "ad7e4e788af95a6e2de6b4d6f9659b9d1faae4fc", "branch_name": "refs/heads/main", "committer_date": 1615096115000, "content_id": "e10df8160fc4779520612a3a16d95e0052766061", "detected_licenses": [ "MIT" ], "directory_id": "8b2ef586433fcb5cedea3491937a806bfe2a224f", "extension": "py", "file...
2.734375
stackv2
import sqlite3 from os import path from database_functions import (add_service, add_user, check_data_from_service, create_database, delete_service, delete_user, get_master_hashed, get_key, get_user_id, get_usernames_list, list_saved_services, ...
263
38.89
127
28
1,787
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7b2157a7a2ed05e6_fdf91c28", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 172 ]
[ null ]
[ 35 ]
[ 106 ]
2024-11-18T18:39:40.040662+00:00
1,618,012,042,000
276e976e791e2a408d9be5861c1fc1578ee1e58f
2
{ "blob_id": "276e976e791e2a408d9be5861c1fc1578ee1e58f", "branch_name": "refs/heads/master", "committer_date": 1618012042000, "content_id": "535f187165cc571354c7c51129dd4b685b24e7d8", "detected_licenses": [ "MIT" ], "directory_id": "f749434cd97dc2fbad060958a0f3919e51b83d11", "extension": "py", "fi...
2.46875
stackv2
import logging import requests import hashlib import os """ Helper functions for communication with the invoice service. """ PAYMENT_ON_ACCOUNT = 'room-bill' logger = logging.getLogger('RingRing') def add_to_invoice(guest_name, service, payment_type=PAYMENT_ON_ACCOUNT, notes=None): session = requests.session(...
93
36.26
149
13
807
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_16a4d6ab2b07fb75_db588011", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.",...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 71 ]
[ null ]
[ 35 ]
[ 61 ]
2024-11-18T18:39:53.296205+00:00
1,588,786,445,000
6212ca72b7734d00ca5ec6a1c94f67becc28ebc6
4
{ "blob_id": "6212ca72b7734d00ca5ec6a1c94f67becc28ebc6", "branch_name": "refs/heads/master", "committer_date": 1588786445000, "content_id": "5738eb11b2d5bd65e30789e4b30194d99cede307", "detected_licenses": [ "MIT" ], "directory_id": "27be8e46cd420250583fe525e4e41497907956ae", "extension": "py", "fi...
3.765625
stackv2
import random def passwordGenerator(personal_list): outputList = [] personal_list = [x for x in personal_list if not isinstance(x, int)] # Removes integers from list listWithNoInts = [] for i in personal_list: if isinstance(i, str): listWithNoInts.append(i) if isinstan...
61
26.41
116
13
448
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1ec7b98e6cf0ad20_3a0a5950", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 61 ]
[ null ]
[ 11 ]
[ 36 ]
2024-11-18T18:40:00.853331+00:00
1,636,117,271,000
a556c591532409e5568bb4a13595589eb3044a2f
3
{ "blob_id": "a556c591532409e5568bb4a13595589eb3044a2f", "branch_name": "refs/heads/main", "committer_date": 1636117271000, "content_id": "bb141a625f1c2bb3d64423407c71251ea63775c2", "detected_licenses": [ "MIT" ], "directory_id": "c2cbd63a3e6c69419ad1941c42dc419edcc5a4f0", "extension": "py", "file...
2.546875
stackv2
import io import json from PIL import Image from flask import Flask, jsonify, request import hashlib import yaml import torch from torchvision import models import torchvision.transforms as transforms from ai.utils.model import CustomModel import os from waitress import serve app = Flask(__name__) @app.route('/'...
100
24.56
76
16
620
python
[{"finding_id": "codeql_py/flask-debug_4feb87a288b3afd0_8b739c6e", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-327" ]
[ "py/flask-debug", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (passwor...
[ 95, 50 ]
[ null, null ]
[ 5, 31 ]
[ 35, 54 ]
2024-11-18T18:46:57.130360+00:00
1,596,502,432,000
045f4784fba1400717c674c27c1d91a9336404da
2
{ "blob_id": "045f4784fba1400717c674c27c1d91a9336404da", "branch_name": "refs/heads/master", "committer_date": 1596502432000, "content_id": "029cf6a7888848d9e6dc54bd5993c2ce7c0d8a2e", "detected_licenses": [ "MIT" ], "directory_id": "c38e220d8a7ad8f7ec2141b3f737894ccef18c49", "extension": "py", "fi...
2.328125
stackv2
import logging import os import json import requests from flask import Flask, jsonify, request, Response from flask_cors import CORS from bson import json_util from services import dbconn from services import cryptool logging.basicConfig(level=logging.DEBUG) logger = logging.getLogger(__name__) app = Flask(__name...
231
32.51
95
14
1,732
python
[{"finding_id": "codeql_py/stack-trace-exposure_905c90e256ce8589_8d4649fe", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
7
true
[ "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-215" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/flask-debug" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information...
[ 40, 62, 121, 183, 196, 223, 231 ]
[ null, null, null, null, null, null, null ]
[ 24, 24, 24, 24, 24, 24, 5 ]
[ 39, 39, 39, 39, 39, 39, 96 ]
2024-11-18T18:47:04.167372+00:00
1,431,654,646,000
4006e1b6fb94fb2bb5f7fbbc6a2826263f7cf950
2
{ "blob_id": "4006e1b6fb94fb2bb5f7fbbc6a2826263f7cf950", "branch_name": "refs/heads/master", "committer_date": 1431654646000, "content_id": "c8d7c882ccb826178a3df5d7971f46488786e419", "detected_licenses": [ "ISC" ], "directory_id": "22af001f4146ef88aaf1b9b023dc37a44f560765", "extension": "py", "fi...
2.453125
stackv2
""" Generic DockCI utils """ import hashlib import hmac import logging import re import socket import struct import subprocess import json import datetime from contextlib import contextmanager from ipaddress import ip_address import docker.errors from flask import flash, request from yaml_model import ValidationErro...
286
26.15
78
18
1,718
python
[{"finding_id": "codeql_py/log-injection_2bf56b231ba41548_1f943c91", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 91 ]
[ null ]
[ 56 ]
[ 65 ]
2024-11-18T18:47:04.398348+00:00
1,504,986,504,000
73b1ff01927ee7d86c4dbd87d9d1d511f009400b
3
{ "blob_id": "73b1ff01927ee7d86c4dbd87d9d1d511f009400b", "branch_name": "refs/heads/master", "committer_date": 1504986504000, "content_id": "d8892c31c782101158688e95a0016a865feed350", "detected_licenses": [ "MIT" ], "directory_id": "6f14ec23c73f145ef6ad792ea44fa9cce6ce01c2", "extension": "py", "fi...
2.625
stackv2
""" Standardized encryption routines. """ import base64 import ctypes import ctypes.wintypes import hashlib import os # For documentation on the cryptography library, or to download it, visit: # https://cryptography.io/en/latest/ # To install with pip: # pip install cryptography import cryptography.fernet from...
316
30.25
100
13
2,326
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_d3275e30f00e2587_93632b34", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e...
[ 211 ]
[ null ]
[ 44 ]
[ 62 ]
2024-11-18T18:47:06.481489+00:00
1,411,295,602,000
c15878a55e48c941e83c02fedd3db845ba4b0403
3
{ "blob_id": "c15878a55e48c941e83c02fedd3db845ba4b0403", "branch_name": "refs/heads/master", "committer_date": 1411295602000, "content_id": "9e82f164fe23e25986b870df40da1aa4483767c9", "detected_licenses": [ "MIT" ], "directory_id": "991d3ffd88ef7fe6c400209162b240ba80060572", "extension": "py", "fi...
2.671875
stackv2
''' bricklink.api ------------- A module providing access to the Bricklink API ''' from .exceptions import * from .methods import * from base64 import b64encode from hashlib import sha1 import hmac import json from random import getrandbits from time import time from urllib import quote, urlencode impor...
129
44.21
143
22
1,332
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_38c151922218f254_4e9ade6d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 37 ]
[ null ]
[ 19 ]
[ 65 ]
2024-11-18T19:09:57.241835+00:00
1,608,631,335,000
1607d864a3b40994215a80bac9f4b8999ffd8069
2
{ "blob_id": "1607d864a3b40994215a80bac9f4b8999ffd8069", "branch_name": "refs/heads/master", "committer_date": 1608631335000, "content_id": "4e3b900f9294af29dffcf54e4192af9ef5455886", "detected_licenses": [ "Apache-2.0" ], "directory_id": "a81f1c4ef4be57f8b5d173e9818dfac3fb59491a", "extension": "py"...
2.46875
stackv2
import os import socket import json import uuid from flask import Flask, request, jsonify app = Flask(__name__) @app.route('/') def hello(): provider = str(os.environ.get('PROVIDER', 'world')) return 'Hello from backend ' + provider + '!' @app.route("/generate") def return_uuid(): uuid_value = str(uuid...
48
25.04
113
12
312
python
[{"finding_id": "codeql_py/reflective-xss_9d60100eadbe7e5d_c302535b", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 38 ]
[ null ]
[ 12 ]
[ 27 ]
2024-11-18T19:49:10.042752+00:00
1,687,336,355,000
689aceb9c06f7f08c5892cc17cf1315f62d6ef98
3
{ "blob_id": "689aceb9c06f7f08c5892cc17cf1315f62d6ef98", "branch_name": "refs/heads/master", "committer_date": 1687336371000, "content_id": "0ca2d513f3813417be72a51bb3175a904d8d764e", "detected_licenses": [ "MIT" ], "directory_id": "748248358ac6523449fc52e8ee488dc6827a55d4", "extension": "py", "fi...
2.6875
stackv2
#!/usr/bin/env python3 import argparse import hashlib import json import socket import time def get_location_request(lon, lat, taxi_id, operator, apikey): """Payload to send to geotaxi to update taxi location.""" payload = { 'timestamp': int(time.time()), 'operator': operator, 'taxi':...
53
32.02
111
13
471
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_4b521127b5a37ac1_479dfbed", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expen...
[ 26 ]
[ null ]
[ 36 ]
[ 53 ]
2024-11-18T20:15:46.168972+00:00
1,583,493,587,000
14ec16e3a81e286cc9daea3499a491701d61ef69
3
{ "blob_id": "14ec16e3a81e286cc9daea3499a491701d61ef69", "branch_name": "refs/heads/master", "committer_date": 1583493587000, "content_id": "e8c22bcd409dfc422f86300a1ab80b1760f256a8", "detected_licenses": [ "MIT" ], "directory_id": "6ced399d63465d63d67bd98493b2e27ea7db88ac", "extension": "py", "fi...
2.53125
stackv2
import torch from transformers import BertTokenizer, BertModel import nltk import numpy as np import pickle import gc import re import pandas as pd import argparse def remove_url(text, replace_token): regex = 'http[s]?://(?:[a-zA-Z]|[0-9]|[$-_@.&+]|[!*\(\),]|(?:%[0-9a-fA-F][0-9a-fA-F]))+' return re.sub(regex...
287
30.83
115
25
2,038
python
[{"finding_id": "codeql_py/overly-large-range_86f62cf6bcf37f2d_859c762b", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 14 ]
[ null ]
[ 44 ]
[ 47 ]
2024-11-18T20:15:47.059371+00:00
1,586,303,350,000
7461d7840c1d8c4ef7fb72fe3c15fcad268079a9
3
{ "blob_id": "7461d7840c1d8c4ef7fb72fe3c15fcad268079a9", "branch_name": "refs/heads/master", "committer_date": 1586303350000, "content_id": "901a275504321fd04c5c58ac6b6e3cd3a95d493a", "detected_licenses": [ "BSD-3-Clause", "MIT" ], "directory_id": "9aaff9df4e431abd4e7403c4ef6dd0095807414a", "ext...
2.8125
stackv2
"""Script to convert pydeck examples into .rst pages with code""" import os import glob import jinja2 from multiprocessing import Pool import subprocess from utils import to_presentation_name, to_snake_case_layer_name DOC_TEMPLATE = jinja2.Template( """ {{ layer_name }} ================================ .. raw...
82
25.59
94
12
560
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_039f34431e5414e8_4790dfda", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 13 ]
[ 36 ]
[ 16 ]
[ 2 ]
2024-11-18T20:16:05.285254+00:00
1,568,520,237,000
09ee164d820a678288c054bc8bbc3bbb43450fc6
3
{ "blob_id": "09ee164d820a678288c054bc8bbc3bbb43450fc6", "branch_name": "refs/heads/master", "committer_date": 1568520237000, "content_id": "a329868ecedcf34b597dfa0114557d409b0793e0", "detected_licenses": [ "MIT" ], "directory_id": "2d2306c20105cc367737758d413a30a22800e306", "extension": "py", "fi...
2.59375
stackv2
import sys import json from jinja2 import Environment, FileSystemLoader def create_out_list(blocks, block): output = block.get('output') if output is None: return () return ((f'{blocks[out_block["block"]]["name"]}@#' f'{out_block["output_number"]}:{out_block["input_number"]}') ...
49
29.14
75
16
294
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_bd6ed2378e632d58_d55ebc14", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 20 ]
[ null ]
[ 17 ]
[ 58 ]
2024-11-18T19:38:01.823452+00:00
1,655,875,208,000
2660ed9ad53c4d891577b6a29835d9fae5c15565
3
{ "blob_id": "2660ed9ad53c4d891577b6a29835d9fae5c15565", "branch_name": "refs/heads/master", "committer_date": 1655875208000, "content_id": "6c5717fe83321b71950c511992b9c529b31bef63", "detected_licenses": [ "MIT" ], "directory_id": "f90716a1b5c5cd0f374056204860d60afc7ad771", "extension": "py", "fi...
2.671875
stackv2
""" Optimize confusion matrix. For more information, see * http://cs.stackexchange.com/q/70627/2914 * http://datascience.stackexchange.com/q/17079/8820 """ # Core Library import json import logging from typing import List, Optional, Tuple # Third party import numpy as np import numpy.typing as npt from jinja2 impor...
369
26.79
88
17
2,627
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_2103ce5f38d16e83_02c9b78d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 307 ]
[ null ]
[ 21 ]
[ 35 ]
2024-11-18T19:38:16.974274+00:00
1,604,223,701,000
ce60a0e497d8b634f1298ff7464b931319e1898d
3
{ "blob_id": "ce60a0e497d8b634f1298ff7464b931319e1898d", "branch_name": "refs/heads/master", "committer_date": 1605451814000, "content_id": "339f48c4533eb5bce2e19946c7d00a7e1dc826b4", "detected_licenses": [ "Apache-2.0" ], "directory_id": "99883e10159dedf4e65e9648e66a65ab68110586", "extension": "py"...
2.5625
stackv2
import tempfile import tarfile import cStringIO import os import random from rackattack.ssh import ftp class DirFTP: def __init__(self, sshClient): self._sshClient = sshClient self._ftp = ftp.FTP(sshClient) def put(self, path, originPath, compressed=True): tarContents = cStringIO.Stri...
41
37.59
102
13
406
python
[{"finding_id": "codeql_py/insecure-temporary-file_c851bbc45cb0bb41_0ac0740a", "tool_name": "codeql", "rule_id": "py/insecure-temporary-file", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated function tempfile.mktemp may be insecure.", "remediation": "", "location": ...
3
true
[ "CWE-377", "CWE-377", "CWE-022" ]
[ "py/insecure-temporary-file", "py/insecure-temporary-file", "py/tarslip" ]
[ "HIGH", "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Call to deprecated function tempfile.mktemp may be insecure.", "Call to deprecated function tempfile.mktemp may be insecure.", "This file extraction depends on a [potentially untrusted source](1)." ]
[ 19, 27, 35 ]
[ null, null, null ]
[ 25, 25, 9 ]
[ 42, 42, 12 ]
2024-11-18T19:38:17.159761+00:00
1,510,477,653,000
9b78adec4c672c6d1e38926b68a4917f66e404a8
3
{ "blob_id": "9b78adec4c672c6d1e38926b68a4917f66e404a8", "branch_name": "refs/heads/master", "committer_date": 1510477653000, "content_id": "29c9d1d0877f5c27889c931cd47dfafb57f788a9", "detected_licenses": [ "MIT" ], "directory_id": "f82237f41747ca501e7681f50ba3382854ce70e6", "extension": "py", "fi...
2.59375
stackv2
import requests import json import base64 import os import glob import concurrent.futures GOOGLE_CLOUD_VISION_API_URL = 'https://vision.googleapis.com/v1/images:annotate?key=' API_KEY = os.environ['GOOGLE'] def goog_cloud_vison(image_content): api_url = GOOGLE_CLOUD_VISION_API_URL + API_KEY req_body = json.du...
47
27.79
100
19
344
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_fb5fe86b7a45565d_40b64613", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 40, 39 ]
[ null, null ]
[ 34, 12 ]
[ 41, 19 ]
2024-11-18T19:38:22.240363+00:00
1,632,245,796,000
b7b67e6aa93ca78249c538a44e9c386d854cd427
2
{ "blob_id": "b7b67e6aa93ca78249c538a44e9c386d854cd427", "branch_name": "refs/heads/main", "committer_date": 1632245796000, "content_id": "edca5bdf85ba22543ac4650ba8a27446120a8f0d", "detected_licenses": [ "Apache-2.0" ], "directory_id": "acb60b0cfad23c8cb1cf558998fc17e961fd3290", "extension": "py", ...
2.421875
stackv2
# -*- coding: utf-8 -*- # -*- train.py -*- import os import time import faiss import pickle import gensim import string import argparse import unicodedata import numpy as np import pandas as pd import multiprocessing as mp from collections import Counter from tqdm import tqdm from nltk.corpus import stopwords from...
286
43.46
161
25
3,063
python
[{"finding_id": "codeql_py/overly-permissive-file_6e9f0de8efa9499c_9cdf44ef", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world writable." ]
[ 168 ]
[ null ]
[ null ]
[ 42 ]
2024-11-18T19:38:38.308413+00:00
1,479,054,838,000
1a8c09d7cb98a13e0cf093879e8991bc024cbdf7
2
{ "blob_id": "1a8c09d7cb98a13e0cf093879e8991bc024cbdf7", "branch_name": "refs/heads/master", "committer_date": 1479054838000, "content_id": "ff0a129e7635fc62dde169579871af29399d4d1c", "detected_licenses": [ "Apache-2.0" ], "directory_id": "36b408e466970fd36fefd627bd7664bd8f52ea70", "extension": "py"...
2.40625
stackv2
# Copyright 2015 IBM Corp. All Rights Reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # https://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed...
212
27.71
118
14
1,433
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6478372479ceaa04_073f9f86", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 34 ]
[ null ]
[ 31 ]
[ 49 ]
2024-11-18T20:10:35.498083+00:00
1,608,043,448,000
ea39dfbf5f2422803a7a3e9155913a27612b010a
2
{ "blob_id": "ea39dfbf5f2422803a7a3e9155913a27612b010a", "branch_name": "refs/heads/master", "committer_date": 1608043448000, "content_id": "2fc251d8dfe2397b7ea7d382a839869784636b59", "detected_licenses": [ "MIT" ], "directory_id": "4c273e5e598f932558724ca1e1478baf212b625e", "extension": "py", "fi...
2.359375
stackv2
import requests import json from flask import request, Response from tranql.backplane.api.standard_api import StandardAPIResource import logging from tranql.config import config logger = logging.getLogger(__name__) ####################################################### ## # Gamma - publish a graph to Gamma. ## ####...
179
34.31
164
17
1,165
python
[{"finding_id": "codeql_py/request-without-cert-validation_1558c3228acb4d85_b00e894c", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
3
true
[ "CWE-295", "CWE-295", "CWE-117" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This log entry depends on a [user-provided value](1)." ]
[ 53, 121, 120 ]
[ null, null, null ]
[ 20, 20, 22 ]
[ 84, 82, 56 ]
2024-11-18T20:11:08.888807+00:00
1,602,663,864,000
108af515758fcdf1480fdffa7671e21735d9dd5b
2
{ "blob_id": "108af515758fcdf1480fdffa7671e21735d9dd5b", "branch_name": "refs/heads/master", "committer_date": 1602663864000, "content_id": "e0eaead5aec28eb0d24759543ddc772f7a8cbb03", "detected_licenses": [ "MIT" ], "directory_id": "32b9b6149dc0ac750f51ba14a3859eb1364715bf", "extension": "py", "fi...
2.484375
stackv2
""" This script generates demo workspace. """ from dotenv import dotenv_values from http import HTTPStatus import logging import os import requests import subprocess as sp import time logging.basicConfig(level=logging.DEBUG) URI = 'http://0.0.0.0:8089' ENVS = dotenv_values('../../../config/base/.env') GOOGLE_APPLI...
153
30.25
105
15
1,021
python
[{"finding_id": "codeql_py/request-without-cert-validation_2a9a4f60d4afc2ca_610b7dd6", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
6
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 26, 32, 33, 45, 119, 138 ]
[ null, null, null, null, null, null ]
[ 19, 5, 32, 21, 13, 28 ]
[ 90, 71, 106, 61, 85, 76 ]
2024-11-18T20:26:07.305035+00:00
1,455,800,454,000
f32a9661cfc851c91bda849819cd2b54e589ebaf
3
{ "blob_id": "f32a9661cfc851c91bda849819cd2b54e589ebaf", "branch_name": "refs/heads/master", "committer_date": 1455800454000, "content_id": "8236d367019bb26c0aef5b25016b1d1ad4d13aae", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "ff9c7363b72a46adea38cde6798e67c50965c7c5", "extension": "p...
2.578125
stackv2
import os import jinja2 import ruamel.yaml EXPECTED_SECTION_ORDER = ['package', 'source', 'build', 'requirements', 'test', 'app', 'about', 'extra'] class NullUndefined(jinja2.Undefined): def __unicode__(self): return unicode(self._undefined_name) def lintify(meta): lints = [] major_sections ...
56
34
118
15
461
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_be8541d33eb886bd_13c2fd6f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 50 ]
[ null ]
[ 11 ]
[ 54 ]
2024-11-18T20:26:28.071023+00:00
1,506,325,073,000
03b73ea4a3ad9e107177daae80aac45e5cd8ba7e
4
{ "blob_id": "03b73ea4a3ad9e107177daae80aac45e5cd8ba7e", "branch_name": "refs/heads/master", "committer_date": 1506325073000, "content_id": "5287adae99040620feb990657556d1b3dd95a84f", "detected_licenses": [ "MIT" ], "directory_id": "574885005b94491162cbf6832dfd7b9ca681d8e3", "extension": "py", "fi...
3.78125
stackv2
""" CONVENTIONS: - A timesheet object is a Pandas DataFrame object with at least the columns * ``'date'``: date worked was done; datetime object * ``'project'``: project the work is part of * ``'duration'``: time spent on work; hours - A biller is a univariate function that maps duration to cost (in some...
329
31.32
87
23
2,827
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_4c4ff75ee9d9cf30_09ce211d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 326 ]
[ null ]
[ 11 ]
[ 40 ]
2024-11-18T20:26:36.305752+00:00
1,602,566,246,000
b49c3e033e709569b824e64f4196473c9f30fd32
2
{ "blob_id": "b49c3e033e709569b824e64f4196473c9f30fd32", "branch_name": "refs/heads/master", "committer_date": 1602566246000, "content_id": "c726d61987abcc5c92dd13110dafc9d8c815640d", "detected_licenses": [ "MIT" ], "directory_id": "b24a53c5596a3153786ac6804a068e1b539b9c00", "extension": "py", "fi...
2.390625
stackv2
from flask import Flask , render_template, request, flash, url_for, redirect, send_from_directory, jsonify from werkzeug.utils import secure_filename import werkzeug.exceptions import os import subprocess import sys import time import logging import traceback from app import split_pdf logger = logging.getLogger(__n...
164
31.68
107
22
1,186
python
[{"finding_id": "codeql_py/command-line-injection_df7b3f7d60cb0a2c_dc3f7b8d", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).\nThis command line depends on a [u...
4
true
[ "CWE-078", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/command-line-injection", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "HIGH", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This command line depends on a [user-provided value](1).\nThis command line depends on a [user-provided value](2).", "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2).", "This log entry depends on a [user-provided value](1).", "This log entry depends...
[ 59, 58, 79, 110 ]
[ null, null, null, null ]
[ 29, 14, 15, 14 ]
[ 33, 18, 58, 59 ]
2024-11-18T20:26:55.568910+00:00
1,622,001,617,000
3008b3cac57acc4f73e52bb1d42ca1cac7243e27
3
{ "blob_id": "3008b3cac57acc4f73e52bb1d42ca1cac7243e27", "branch_name": "refs/heads/main", "committer_date": 1622001617000, "content_id": "531e59c5593c9336fc7ab0b1719982b0a2acc769", "detected_licenses": [ "MIT" ], "directory_id": "9f04c2977434c5854e889b424e34593fa9f938d1", "extension": "py", "file...
3.140625
stackv2
import requests from bs4 import BeautifulSoup class Zone(object): def __init__(self, data, zoneName): self.data = data self.zoneName = zoneName self.county = None self.town = None def findCounty(self): isCounty = None for zone in self.data: if zone['...
50
29.2
79
16
358
python
[{"finding_id": "codeql_py/request-without-cert-validation_d8dfd73ed1f59d2c_be8abd2b", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 33 ]
[ null ]
[ 15 ]
[ 47 ]
2024-11-18T20:52:02.728724+00:00
1,634,395,480,000
ac8da292701e81bcbd59da134db02730527d406c
3
{ "blob_id": "ac8da292701e81bcbd59da134db02730527d406c", "branch_name": "refs/heads/main", "committer_date": 1634395480000, "content_id": "43750bc99b01f256f094dc53a9f75be40204f92f", "detected_licenses": [ "Apache-2.0" ], "directory_id": "70ddf08a41c915beb735064c6b1081a6d094076c", "extension": "py", ...
2.96875
stackv2
import rsa # 生成密钥 (pubkey, privkey) = rsa.newkeys(1024) # 保存密钥 #with open('public.pem','w+') as f: # f.write(pubkey.save_pkcs1().decode()) #with open('private.pem','w+') as f: # f.write(privkey.save_pkcs1().decode()) # 导入密钥 with open('public.pem','r') as f: pubkey = rsa.PublicKey.load_pkcs1(f.read().encode()) wit...
27
22.7
64
12
210
python
[{"finding_id": "codeql_py/weak-crypto-key_57d516b966606a93_d1ca788d", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",...
1
true
[ "CWE-326" ]
[ "py/weak-crypto-key" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable." ]
[ 3 ]
[ null ]
[ 21 ]
[ 38 ]
2024-11-18T20:52:25.131574+00:00
1,561,127,179,000
24b3b2420ac231cdf0f47a23e0a1ae54a5fb90a8
4
{ "blob_id": "24b3b2420ac231cdf0f47a23e0a1ae54a5fb90a8", "branch_name": "refs/heads/master", "committer_date": 1561127179000, "content_id": "31cd82a61788778eb5fecab7fb3968195fa69494", "detected_licenses": [ "MIT" ], "directory_id": "3a92d6188c26aea7bf1c0e40d65de1951a15c054", "extension": "py", "fi...
3.515625
stackv2
import csv import json import datetime import os from dotenv import load_dotenv import requests load_dotenv() def to_usd(my_price): return "${0:,.2f}".format(my_price) now = datetime.datetime.now() #Information Input api_key = os.environ.get("ALPHA_VANTAGE_API_KEY") while True: symbol = input("Please e...
125
28.96
158
13
901
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b5eda201bc00a28d_422aff7c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 113 ]
[ null ]
[ 7 ]
[ 38 ]
2024-11-18T20:52:36.313218+00:00
1,691,538,221,000
66354e706841a0e5f9f6fd4fab96dbb6d8d559cb
3
{ "blob_id": "66354e706841a0e5f9f6fd4fab96dbb6d8d559cb", "branch_name": "refs/heads/master", "committer_date": 1691538221000, "content_id": "22a8a0ffacb4a56d7a1ea2899acf93a36a2193c5", "detected_licenses": [ "Apache-2.0" ], "directory_id": "f2df19adf2907f8ea23e5d1635e0964d40c4a7a1", "extension": "py"...
2.625
stackv2
"""Module that implements version 1 of an API to access the data held in BMON. Response are in JSON and implement the JSend specification; see: https://labs.omniti.com/labs/jsend . """ import logging from datetime import datetime from collections import Counter import pytz from django.http import JsonResponse from da...
365
36.19
110
18
2,888
python
[{"finding_id": "codeql_py/stack-trace-exposure_fe0b505546fa9605_b714112a", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 325, 365 ]
[ null, null ]
[ 29, 29 ]
[ 35, 35 ]
2024-11-18T20:52:39.734920+00:00
1,568,749,332,000
90a523c9f259e28ea6b457828fcecae4be838025
3
{ "blob_id": "90a523c9f259e28ea6b457828fcecae4be838025", "branch_name": "refs/heads/master", "committer_date": 1568749332000, "content_id": "7e5e03fa0cb62a33cfbfa5f386deccd7e2546c00", "detected_licenses": [ "MIT" ], "directory_id": "a0ead81ca4fa42fbf2460da77db7beef84caf40f", "extension": "py", "fi...
2.546875
stackv2
import os import sys from bokeh.themes import Theme from jinja2 import Environment, FileSystemLoader class VisualHelper: def __init__(self): pass @staticmethod def force_axis_usage(node, axis): all_values = list() lowest = int() highest = int() for value in axis.v...
175
39.18
119
24
1,297
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_78157661e6438152_c51560da", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 168 ]
[ null ]
[ 15 ]
[ 91 ]
2024-11-18T19:02:31.922924+00:00
1,617,527,183,000
841cca67973b8f375b1716e921d13cd8620357a0
3
{ "blob_id": "841cca67973b8f375b1716e921d13cd8620357a0", "branch_name": "refs/heads/main", "committer_date": 1617527183000, "content_id": "04a319a540ef6940ed6cc005880dbfcf8085202a", "detected_licenses": [ "MIT" ], "directory_id": "22389b45317289e52249b875c288ec253057752b", "extension": "py", "file...
2.609375
stackv2
#/usr/bin/env python #coding=utf8 import json import http.client #修改引用的模块 import hashlib #修改引用的模块 from urllib import parse import random # 百度开发者api自己去申请 appid = "" #你的appid secretKey = "" #你的密钥 def bdtrans(word, fromLang, toLang): httpClient = None myurl = "/api/trans/vip/translate" q = word salt = r...
41
27.34
119
19
352
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_26db6f33f9733996_ccdef468", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 21 ]
[ null ]
[ 15 ]
[ 35 ]