added
stringlengths
32
32
created
int64
1,244B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.25
source
stringclasses
1 value
text
stringlengths
324
20.1k
num_lines
int64
16
598
avg_line_length
float64
15.1
58.3
max_line_length
int64
33
179
ast_depth
int64
8
39
length
int64
101
3.8k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.1k
265k
sast_codeql_findings_count
int64
1
45
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
45
rule_ids
listlengths
1
45
confidences
listlengths
1
45
severities
listlengths
1
45
messages
listlengths
1
45
line_starts
listlengths
1
45
line_ends
listlengths
1
45
column_starts
listlengths
1
45
column_ends
listlengths
1
45
2024-11-19T02:07:38.136168+00:00
1,575,584,390,000
6382ee8b5499bca11d3452d15b233c56b8282543
3
{ "blob_id": "6382ee8b5499bca11d3452d15b233c56b8282543", "branch_name": "refs/heads/master", "committer_date": 1575584390000, "content_id": "1372929c260cf1a0f09b6dd2c8de0b16edd19361", "detected_licenses": [ "MIT" ], "directory_id": "3fbad9e3e1256008af05e90bb2a587ca74dced0c", "extension": "py", "fi...
2.71875
stackv2
"""A bunch of api calls functions that we used to talk to MTurk. """ from boto3 import Session from datetime import datetime from jinja2 import Environment from jinja2 import FileSystemLoader import json import os import xml class EasyTurk(object): """Class that contains all the api calls to interface with MTur...
370
36.79
90
18
2,652
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_d24abdc264fbe926_d6fa0273", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 57 ]
[ null ]
[ 16 ]
[ 63 ]
2024-11-19T02:32:44.349943+00:00
1,593,522,068,000
6f08744f8b93cd157f4ea6e6b2fc0b9c58c0ae10
3
{ "blob_id": "6f08744f8b93cd157f4ea6e6b2fc0b9c58c0ae10", "branch_name": "refs/heads/master", "committer_date": 1593522068000, "content_id": "8e2cb0fb8726b6438c0a29483f6345fcbe8b1b2a", "detected_licenses": [ "Apache-2.0" ], "directory_id": "d11e4440b1e3dd659344e78cc2b9839f77bd31a1", "extension": "py"...
2.71875
stackv2
from flask import Flask, jsonify, request app = Flask(__name__) @app.route('/') def hello(): return jsonify(message='Hello from Server') @app.route('/user') def user(): name = request.args.get('name') return '<h1>Hello ' + name + '</h1>' @app.route('/not_found') def no_resource(): return jsonify(...
32
18.66
73
14
165
python
[{"finding_id": "codeql_py/flask-debug_b14189d44569b96f_293b016c", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 32, 14 ]
[ null, null ]
[ 5, 12 ]
[ 35, 41 ]
2024-11-19T02:32:47.252374+00:00
1,572,273,821,000
d11aaeb9d363230e0e09c8329afc7ad7b2235f20
2
{ "blob_id": "d11aaeb9d363230e0e09c8329afc7ad7b2235f20", "branch_name": "refs/heads/master", "committer_date": 1572273821000, "content_id": "b2d19ad13261682d3b30dc5c884caac9bfd4e31a", "detected_licenses": [ "MIT" ], "directory_id": "0f6468e644b9d6b825fc895f2b883b746a1af7d3", "extension": "py", "fi...
2.375
stackv2
import hashlib import requests import logging from requests.auth import HTTPBasicAuth, HTTPDigestAuth #from ddf_manager.ddf_logger import * from .exceptions import NotLoggedIn, MissingVersion, HTTPException, RETSException, MaxrowException from .parsers.get_object import MultipleObjectParser from .parsers.get_object i...
442
39.89
120
22
3,747
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_c29c3ee76d8a020c_3e67e23b", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.", "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (id)](2) is used in a hashing algorithm (MD5) t...
[ 438, 441 ]
[ null, null ]
[ 26, 30 ]
[ 34, 40 ]
2024-11-19T02:32:49.911987+00:00
1,366,531,599,000
dc2cdd3d60bc30b11747470fc97b61e78351e330
2
{ "blob_id": "dc2cdd3d60bc30b11747470fc97b61e78351e330", "branch_name": "refs/heads/master", "committer_date": 1366531599000, "content_id": "abf7ac8f997b2fbd8c237b473046f57d262b561c", "detected_licenses": [ "MIT" ], "directory_id": "6cfdff1798f725f4781eb0c3978f7f38331230cc", "extension": "py", "fi...
2.40625
stackv2
#!/usr/bin/env python """\ Hello Redis Tasks A quick example of how to use Redis as a task queue. """ import logging.config import os from functools import update_wrapper, wraps from redis import Redis, ConnectionError from flask import Flask, render_template, abort, request, session, abort, redirect, url_for, flash, ...
238
29.69
128
16
1,853
python
[{"finding_id": "codeql_py/request-without-cert-validation_7cf7abb1b0896dbe_31d173f2", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
3
true
[ "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 112, 129, 139 ]
[ null, null, null ]
[ 12, 9, 13 ]
[ 73, 55, 59 ]
2024-11-19T02:32:58.109270+00:00
1,693,315,090,000
7a71399b3136204b9fad079d2beee06353bef713
4
{ "blob_id": "7a71399b3136204b9fad079d2beee06353bef713", "branch_name": "refs/heads/master", "committer_date": 1693315090000, "content_id": "4ff90be009c1bb3961f2a11dbe95a70746a47f22", "detected_licenses": [ "MIT" ], "directory_id": "9ed4d46aedd4d4acadb48d610e940594b5b7b3fd", "extension": "py", "fi...
3.71875
stackv2
from __future__ import annotations def find_primitive(n: int) -> int | None: for r in range(1, n): li = [] for x in range(n - 1): val = pow(r, x, n) if val in li: break li.append(val) else: return r return None if __name...
32
27.75
64
14
240
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d7848c0197d7d0ec_12c34b3e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 31, 32 ]
[ null, null ]
[ 52, 52 ]
[ 60, 60 ]
2024-11-19T02:43:30.831962+00:00
1,679,278,623,000
f556cc6e275b0cf1006f00b4dc5e5d700bcb2b23
3
{ "blob_id": "f556cc6e275b0cf1006f00b4dc5e5d700bcb2b23", "branch_name": "refs/heads/master", "committer_date": 1679278623000, "content_id": "7966fa1ca2339b326e3e14711217a2d9e5b3eb5b", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "679b701d8f80807ecd13300d8d5cf17cdb4c2e2a", "extension": "p...
2.515625
stackv2
""" Form fields for composite types Takes inspiration from django.forms.MultiValueField/MultiWidget. """ import copy import logging from django import forms from django.contrib.postgres.utils import prefix_validation_error from django.utils.translation import gettext as _ from . import CompositeType LOGGER = loggi...
208
29.64
88
23
1,294
python
[{"finding_id": "codeql_py/log-injection_2cf802a0a69653bb_868da270", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 97 ]
[ null ]
[ 37 ]
[ 42 ]
2024-11-19T02:54:53.543047+00:00
1,584,501,916,000
5f03cc7486646600557a8cb178e5330eaad31ab5
2
{ "blob_id": "5f03cc7486646600557a8cb178e5330eaad31ab5", "branch_name": "refs/heads/master", "committer_date": 1584501916000, "content_id": "d7ba55745c86aec45873caa183a8a764967d7761", "detected_licenses": [ "Apache-2.0" ], "directory_id": "40ca66a25f5d9278ace89357e98bc44be4190dec", "extension": "py"...
2.46875
stackv2
import logging import os import shutil import cssmin import htmlmin import jinja2 import jsmin def copy_icons(args): logging.info('Copying icons') icons_dir = os.path.join(args.output_dir, 'images', 'icons') os.makedirs(icons_dir) for icon in [ 'github', 'edit', 'external-link...
88
30.08
90
18
569
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_d955a0de9cfb3108_e1a41784", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 28 ]
[ 31 ]
[ 11 ]
[ 6 ]
2024-11-19T02:55:09.902283+00:00
1,603,062,029,000
3da9a16566b8d5b596ed0ffb50572b8d8856642a
3
{ "blob_id": "3da9a16566b8d5b596ed0ffb50572b8d8856642a", "branch_name": "refs/heads/master", "committer_date": 1603062029000, "content_id": "335d37a4fa37769ca2fadba0c01c6a366510c181", "detected_licenses": [ "MIT" ], "directory_id": "fab5d65a6b49a30c8bcdd6c87c3d8532095ec6c3", "extension": "py", "fi...
2.59375
stackv2
from . import auth_blueprint from flask.views import MethodView from flask import make_response, request, jsonify from app.models import User import secrets class RegistrationView(MethodView): """ This class registers a new user""" def post(self): user = User.query.filter_by(account=request.data['...
231
32.99
90
20
1,421
python
[{"finding_id": "codeql_py/stack-trace-exposure_3054d29eb61c9fcb_985ab333", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
4
true
[ "CWE-209", "CWE-209", "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information...
[ 44, 115, 163, 204 ]
[ null, null, null, null ]
[ 46, 42, 42, 42 ]
[ 54, 50, 50, 50 ]
2024-11-19T02:55:53.075841+00:00
1,650,571,729,000
bf08f604cc3968eecafa8dc0e4e017bbaa18f54d
3
{ "blob_id": "bf08f604cc3968eecafa8dc0e4e017bbaa18f54d", "branch_name": "refs/heads/master", "committer_date": 1650571729000, "content_id": "4c4f1c88c2efb15ac7969f7c847a9a3727506bd1", "detected_licenses": [ "MIT" ], "directory_id": "57471e22e4478728bf3d602547f4a52398db3ec4", "extension": "py", "fi...
3.046875
stackv2
from flask import Flask app = Flask(__name__) @app.route('/') def hello(): greet = '<h1>Hello, Gators!</h1>' link = '<p><a href="user/Albert">Click me!</a></p>' return greet + link @app.route('/user/<name>') def user(name): personal = f'<h1>Hello, {name}!</h1>' instruc = '<p>Change the name in the...
17
25.94
95
9
133
python
[{"finding_id": "codeql_py/flask-debug_a72bce26a6034f60_ad7fbf8d", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 17, 14 ]
[ null, null ]
[ 5, 12 ]
[ 24, 30 ]
2024-11-19T03:10:22.435109+00:00
1,622,050,384,000
7af2f4e67f113b4b18bfc7acc797fa1fd65341a2
2
{ "blob_id": "7af2f4e67f113b4b18bfc7acc797fa1fd65341a2", "branch_name": "refs/heads/master", "committer_date": 1622050384000, "content_id": "80ff24b6c13b2f5f9c6c1f4dd5278b16d6de2703", "detected_licenses": [ "Apache-2.0" ], "directory_id": "ec927712164a99136b35e6ac6a88a2e3dd005c45", "extension": "py"...
2.453125
stackv2
import logging, time, json, urllib, socket from datetime import datetime logger = logging.getLogger(__name__) logger.setLevel(logging.DEBUG) class Prey(): terminate = False online = True apikey = None deviceId = None deviceName = None baseURL = 'https://api.preyproject.com/v1' interval = 5 lastLook...
126
29.62
102
21
852
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d54bd40a90b0e1e0_9c5168e9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 121 ]
[ null ]
[ 20 ]
[ 28 ]
2024-11-19T03:10:27.499276+00:00
1,518,972,783,000
1557a06dd05bccb5598a8be00f42b42ebd6f97a6
3
{ "blob_id": "1557a06dd05bccb5598a8be00f42b42ebd6f97a6", "branch_name": "refs/heads/master", "committer_date": 1518972783000, "content_id": "7eb7e592d8d17427d384231f41f6925ac47513e4", "detected_licenses": [ "MIT" ], "directory_id": "0e9c98a6a4ccea5e5c6eb8dbfcacb106637f6414", "extension": "py", "fi...
2.578125
stackv2
import time import os from mediaviewer.log import log from mysite.settings import (API_KEY, OMDBAPI_KEY, IMAGE_PATH, REQUEST_TIMEOUT, ) import requests def getJSONData(url): try: url = url.re...
223
34.42
143
17
2,040
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_d09563234b61a6fb_9b7e73b4", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 110 ]
[ null ]
[ 33 ]
[ 38 ]
2024-11-19T03:10:53.476720+00:00
1,600,983,829,000
b84b68538681c06bc8a416bb82ef99f986e564f5
2
{ "blob_id": "b84b68538681c06bc8a416bb82ef99f986e564f5", "branch_name": "refs/heads/master", "committer_date": 1600983829000, "content_id": "164b32b42ece35ac3b95237f68166aed7ca016e1", "detected_licenses": [ "MIT" ], "directory_id": "38a44085558dc8e7ba1d2a724bc2fc4bca67eecb", "extension": "py", "fi...
2.390625
stackv2
"""Jinja2 environment getters """ from jinja2 import Environment, FileSystemLoader from .filters import gen_id def __make_env(include_paths): env = Environment( loader=FileSystemLoader(include_paths) ) env.filters['genid'] = gen_id return env def get_env(include_paths=None): """Get Jinja...
20
23.05
58
11
115
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_8cf3c7e6d34105c0_bc441046", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 9 ]
[ 11 ]
[ 11 ]
[ 6 ]
2024-11-19T03:10:56.629960+00:00
1,591,471,698,000
5c37db8abe210af8c06c9c769bdd7a1744764ddc
2
{ "blob_id": "5c37db8abe210af8c06c9c769bdd7a1744764ddc", "branch_name": "refs/heads/master", "committer_date": 1591471698000, "content_id": "135e5354b7ee0dc39e428944d843f840fe0602ed", "detected_licenses": [ "MIT", "Apache-2.0" ], "directory_id": "6bbbb8237c93f9b1f302010a65d6ecb6f286f23b", "exten...
2.375
stackv2
"""User friend CSRF error page.""" # Standard Library import logging # Pyramid from pyramid.exceptions import BadCSRFToken from pyramid.renderers import render from pyramid.response import Response from pyramid.view import view_config # Websauna from websauna.system.http import Request logger = logging.getLogger(__...
37
29.08
158
10
258
python
[{"finding_id": "codeql_py/log-injection_a637de3f264a724a_383e4599", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
2
true
[ "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 25, 25 ]
[ null, null ]
[ 112, 140 ]
[ 131, 158 ]
2024-11-19T03:22:06.937252+00:00
1,632,898,290,000
291268fc99b156d80fb24ce2a9b67a962ca32097
2
{ "blob_id": "291268fc99b156d80fb24ce2a9b67a962ca32097", "branch_name": "refs/heads/master", "committer_date": 1632898290000, "content_id": "6229240e53b3486dfa2a8ff556fa918cc2e5c0ba", "detected_licenses": [ "MIT" ], "directory_id": "933ffbc470030abc0a443e879dee66ca1305544e", "extension": "py", "fi...
2.3125
stackv2
from traceback import format_exc from django.http import Http404 from django.core.exceptions import PermissionDenied from rest_framework.exceptions import MethodNotAllowed, NotAcceptable from .apis.base import BaseApiExp from rest_framework.response import Response from rest_framework.status import HTTP_500_INTERNAL_SE...
42
35.95
73
13
338
python
[{"finding_id": "codeql_py/stack-trace-exposure_aecd7ce7eadea074_c818300d", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 42 ]
[ null ]
[ 30 ]
[ 34 ]
2024-11-19T03:43:56.015575+00:00
1,549,822,526,000
240ad2109e030121424f5fa9478eabec33624b1f
2
{ "blob_id": "240ad2109e030121424f5fa9478eabec33624b1f", "branch_name": "refs/heads/master", "committer_date": 1549822557000, "content_id": "0ce548b2c08734797a5f11f84e65025bbb0b001c", "detected_licenses": [ "MIT" ], "directory_id": "a801dd999c5b29fa587ec8c20beb914a9e91df6d", "extension": "py", "fi...
2.375
stackv2
from flask import Flask, request, jsonify import configparser import logging import sys import os from deepcubes.embedders import LocalEmbedder logger = logging.getLogger("EmbedderService") logger.setLevel(logging.INFO) # create the logging file handler handler = logging.FileHandler("scripts/logs/embedder_service.lo...
76
29.3
75
17
495
python
[{"finding_id": "codeql_py/log-injection_8c17b5e6e6f56716_46a50783", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
3
true
[ "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 47, 52, 62 ]
[ null, null, null ]
[ 26, 21, 25 ]
[ 75, 62, 61 ]
2024-11-19T03:44:01.822366+00:00
1,685,870,376,000
02f19061d40ce236cc519dbe4f9be131d12bc32c
2
{ "blob_id": "02f19061d40ce236cc519dbe4f9be131d12bc32c", "branch_name": "refs/heads/master", "committer_date": 1685870376000, "content_id": "0ae177b574b626056097c59ad06a328ce109e4d9", "detected_licenses": [ "MIT" ], "directory_id": "873b3289e7e2c5945687454d01214db3290a4240", "extension": "py", "fi...
2.4375
stackv2
import requests from bs4 import BeautifulSoup import sys username = "" # Fill it passwd = "" # Fill it session = requests.Session() url = 'https://atcoder.jp/login' r = session.get(url, verify = False) soup = BeautifulSoup(r.text, features="lxml") _csrf = soup.find("input", attrs={"name": "csrf_token"})["value"] ...
49
20.88
65
11
324
python
[{"finding_id": "codeql_py/request-without-cert-validation_8c8efe58fed7528f_f7b96658", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
4
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 12, 23, 30, 46 ]
[ null, null, null, null ]
[ 5, 5, 5, 5 ]
[ 37, 48, 37, 48 ]
2024-11-19T03:44:12.412359+00:00
1,615,650,148,000
3e4c7a4da638909407b0412c0a1be54108cfdb25
3
{ "blob_id": "3e4c7a4da638909407b0412c0a1be54108cfdb25", "branch_name": "refs/heads/master", "committer_date": 1615650168000, "content_id": "c3c80929027e3f1f899969d905d507a8856479d5", "detected_licenses": [ "Unlicense" ], "directory_id": "e79af1d5d0d7c3140963e5ae1a9725d668b30ef5", "extension": "py",...
3
stackv2
import requests api_url = 'https://srb2circuit.eu/highscores/api/' num_plays = requests.get(api_url + 'num_plays', verify=False).json() maps = requests.get(api_url + 'maps?in_rotation', verify=False).json() maps = sorted(maps, key=lambda map:int(map['votes']), reverse=True) map_dict = {} for i, m in enumerate(maps)...
42
31.38
94
13
406
python
[{"finding_id": "codeql_py/request-without-cert-validation_69945bf46c4f04ab_e9a15059", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 5, 7 ]
[ null, null ]
[ 13, 8 ]
[ 62, 64 ]
2024-11-19T03:44:18.177032+00:00
1,604,921,655,000
fa377dc6f03fc2def398d84a04f2e5f00a8fd193
3
{ "blob_id": "fa377dc6f03fc2def398d84a04f2e5f00a8fd193", "branch_name": "refs/heads/master", "committer_date": 1604921655000, "content_id": "4299b892fd31d79851a477119145679a877f36f3", "detected_licenses": [ "MIT" ], "directory_id": "b4df4985a3937b84ba5da7c6066fcd513fe1d679", "extension": "py", "fi...
3.15625
stackv2
#! /usr/bin/python3 from Crypto.Cipher import AES import base64 # https://www.cryptopals.com/sets/1/challenges/7 # AES in ECB mode # wget https://www.cryptopals.com/static/challenge-data/7.txt --no-check-certificate def main(): obj = AES.new('YELLOW SUBMARINE', AES.MODE_ECB) with open("7.txt") as f: ...
23
20.04
84
14
135
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_6ec0493e9152ccdf_f113abf8", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
1
true
[ "CWE-327" ]
[ "py/weak-cryptographic-algorithm" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 20 ]
[ null ]
[ 17 ]
[ 40 ]
2024-11-19T01:44:08.698496+00:00
1,624,552,129,000
85e92534ec4c3ee10889e92a2ef92fa4eec2de93
4
{ "blob_id": "85e92534ec4c3ee10889e92a2ef92fa4eec2de93", "branch_name": "refs/heads/main", "committer_date": 1624552129000, "content_id": "d8169778767e28a0b35ff13b9a5242f600fc4186", "detected_licenses": [ "Apache-2.0" ], "directory_id": "7f75fb1376e50475357e1bcdf91ae340639de334", "extension": "py", ...
3.921875
stackv2
from datetime import datetime class Employee: company = 'Google' def getSalary(self, signature): print (f'Salary for {self.name} working in {self.company} is {self.salary}\n{signature}' ) @staticmethod def greet(): print ('Good Morning, Sir!') @staticmethod def time(): ...
24
21.38
98
12
138
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_aeefa711cf6ce704_ab46cc44", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 7 ]
[ null ]
[ 16 ]
[ 97 ]
2024-11-19T02:08:19.621610+00:00
1,602,163,362,000
26e94dbe072b86379124c19d5de1c66a3952b404
2
{ "blob_id": "26e94dbe072b86379124c19d5de1c66a3952b404", "branch_name": "refs/heads/master", "committer_date": 1602163362000, "content_id": "2603838d7675a8b0d17522a7322498f35929785f", "detected_licenses": [ "Unlicense" ], "directory_id": "dafb0296082fb91c993dd949704df02c71007f78", "extension": "py",...
2.5
stackv2
from datetime import datetime, timedelta import time as mod_time import json from jinja2 import Environment, PackageLoader import smtplib from email.mime.text import MIMEText import argparse jinja_env = Environment(loader=PackageLoader('price_monitor', 'templates')) def main(args): filename = "data/" + datetime.n...
58
31.45
80
14
439
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_51144e97fbafe070_6e309b2e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 9 ]
[ null ]
[ 13 ]
[ 76 ]
2024-11-19T02:08:39.354569+00:00
1,547,786,130,000
287cccc36417bc7486ea497143387f34f4d7a911
3
{ "blob_id": "287cccc36417bc7486ea497143387f34f4d7a911", "branch_name": "refs/heads/master", "committer_date": 1547786130000, "content_id": "47f3bbf7e464c22023edeffbb3ae542e34a0d54a", "detected_licenses": [ "MIT" ], "directory_id": "66ec7bf5e2b8f3c61ad627e0d3f5586587b46444", "extension": "py", "fi...
2.5625
stackv2
# Team Phil Swift's Amazing Doors # SoftDev pd7 import urllib, json, os, random # Standard Library from flask import Flask, request, render_template, session, redirect, \ flash, url_for # Flask import util.accounts import util.sessions import base64 app = Flask(__name__) app.secret_key = util.accounts.get_s...
152
30.39
119
16
1,029
python
[{"finding_id": "codeql_py/partial-ssrf_d91c863d30351f61_df9aa029", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 45 ]
[ null ]
[ 9 ]
[ 38 ]
2024-11-19T02:21:22.281290+00:00
1,608,324,111,000
b956fa528b0ca72cfcf03b00e1d48d7544c7fbe6
3
{ "blob_id": "b956fa528b0ca72cfcf03b00e1d48d7544c7fbe6", "branch_name": "refs/heads/main", "committer_date": 1608324111000, "content_id": "02a9dc52c1e23dd11cdd8d7fc791469834848652", "detected_licenses": [ "MIT" ], "directory_id": "d42b51e8c38d237ef206628fe8adda03302afef1", "extension": "py", "file...
3.421875
stackv2
import re def part1(lines): nrOfValidPasswords = 0 for line in lines: match = re.match(r"(\d+)-(\d+)\s([a-z]):\s([a-z]+)", line) min_bound = int(match.group(1)) max_bound = int(match.group(2)) character = match.group(3) password = match.group(4) nrOfOccurrences ...
34
31.03
104
15
298
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2256f08573840bd9_081eae18", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 15, 28 ]
[ null, null ]
[ 11, 11 ]
[ 29, 29 ]
2024-11-19T02:21:31.950144+00:00
1,693,452,038,000
70f3b60252a6746c89b1529a69d91dedd4b19069
3
{ "blob_id": "70f3b60252a6746c89b1529a69d91dedd4b19069", "branch_name": "refs/heads/master", "committer_date": 1693452038000, "content_id": "4b15c98012227d09420c6430e5c8357ff2e1790b", "detected_licenses": [ "MIT", "BSD-3-Clause", "Apache-2.0" ], "directory_id": "0760fb4901a75766921a205b55686d6...
2.546875
stackv2
"""Fake multinode docker monitoring script. This script is the "docker compose server" for the fake_multinode provider using Docker compose. It should be started before running `RAY_FAKE_CLUSTER=1 ray up <cluster_config>`. This script reads the volume directory from a supplied fake multinode docker cluster config fil...
243
29.91
88
16
1,696
python
[{"finding_id": "codeql_py/overly-permissive-file_6098862839fe0df6_0257ee29", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world writable." ]
[ 159 ]
[ null ]
[ 5 ]
[ 41 ]
2024-11-19T02:46:45.309873+00:00
1,393,970,451,000
802f4d1da2f28f98c193117470cf8910e26c912f
3
{ "blob_id": "802f4d1da2f28f98c193117470cf8910e26c912f", "branch_name": "refs/heads/master", "committer_date": 1393970451000, "content_id": "3b1630cd81724986a7522f15d6a2bbb8d0fa4412", "detected_licenses": [ "MIT" ], "directory_id": "d3cbd754e0a0df2355b61eeeb9007440e7eb996b", "extension": "py", "fi...
2.90625
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- import os from jinja2 import Environment, FileSystemLoader class SimpleTemplateTofile(object): """ A simple template to file that contains the logic about jinja template rendering. """ loader = FileSystemLoader('./templates') env = Enviro...
35
26.74
93
15
211
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_a0ed201c8a1403c8_72dec813", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 15 ]
[ null ]
[ 11 ]
[ 39 ]
2024-11-19T02:58:15.274238+00:00
1,631,677,077,000
250676bf0777090158fd0c890cd867f6b1c1615f
3
{ "blob_id": "250676bf0777090158fd0c890cd867f6b1c1615f", "branch_name": "refs/heads/master", "committer_date": 1631677685000, "content_id": "45291dcd26e5e13a754988808db672c8c35699d2", "detected_licenses": [ "MIT" ], "directory_id": "c275d06a2b184ae402b0ae7a687b642037b6132b", "extension": "py", "fi...
2.53125
stackv2
import json import logging import os import pathlib from hive.settings import hive_setting from hive.util.common import create_full_path_dir class RcloneTool: @staticmethod def get_config_data(content, did): access_token = content.get('token') refresh_token = content.get('refresh_token') ...
76
27.92
95
15
464
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_576622bce7ccea49_e3f2b14f", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 69, 68 ]
[ null, null ]
[ 31, 19 ]
[ 36, 24 ]
2024-11-19T03:10:09.101101+00:00
1,586,371,578,000
a9a124f3a43e391f498f8a0f58ac614e9c38a3b0
4
{ "blob_id": "a9a124f3a43e391f498f8a0f58ac614e9c38a3b0", "branch_name": "refs/heads/master", "committer_date": 1586371578000, "content_id": "d469f7f5c17e5e7bf10695bcd5502fda8ac09b62", "detected_licenses": [ "MIT" ], "directory_id": "8b8cda6c585b1c5f1470cc6b12e13c1b7d7a8a2f", "extension": "py", "fi...
3.65625
stackv2
from random import randint import re class Dice(object): def __init__(self, sides=4): self.sides = sides def set_sides(self, sides): if sides is not None and sides > 4: self.sides = sides def roll(self): return randint(1, self.sides) class DiceRoller(object): ...
49
25.51
59
14
318
python
[{"finding_id": "codeql_py/redos_6ce08db873f7cb5c_705cbe44", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '9'.", "remediati...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '9'." ]
[ 27 ]
[ null ]
[ 31 ]
[ 34 ]
2024-11-19T03:10:28.865959+00:00
1,689,912,169,000
19706c6862856e2fe67f902baf89e650576d1265
3
{ "blob_id": "19706c6862856e2fe67f902baf89e650576d1265", "branch_name": "refs/heads/main", "committer_date": 1689912169000, "content_id": "e97f1aa8a99fe7e2b520a26fbe1010c8a8962c1a", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "0ed62eec4eea9931f08f383cf657f3ca1a3ef4f9", "extension": "py"...
2.75
stackv2
#!/usr/bin/python # July-20-2016 # cedarupload.py: Utility to create requests and execute them on CEDAR resources # # - Takes parameters needed for a CEDAR REST API POST request # - Iterates through a directory to post all files to specified host name # - Creates log file log.txt with request status, reason, headers, ...
95
37.91
114
23
863
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_8e2d3052b6803fbb_26f87d78", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 68, 69 ]
[ null, null ]
[ 23, 19 ]
[ 32, 65 ]
2024-11-19T03:22:32.364345+00:00
1,589,989,884,000
98a520c2e67cb640fec1978bea1c4bf62313237b
2
{ "blob_id": "98a520c2e67cb640fec1978bea1c4bf62313237b", "branch_name": "refs/heads/master", "committer_date": 1589989884000, "content_id": "f32ba67d21de36b5778a9e015e876d7531701122", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e1e276e76866c7fc0706b81bb0875c1496e7ce82", "extension": "py"...
2.5
stackv2
import os import numpy as np import pickle import shutil from keras.utils import to_categorical import pandas as pd ### data preparation # extract labels from filename def labels_from_filename(files, label_type): labels = [] for f in files: if label_type == 'point': if f.split('_')[-1].spli...
136
32.9
124
17
1,201
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_582182fbc5905751_dbc79d20", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 116 ]
[ null ]
[ 11 ]
[ 28 ]
2024-11-19T03:22:34.999199+00:00
1,577,696,758,000
bf12fd136c0cf56d539eec33629b891a36e5e065
3
{ "blob_id": "bf12fd136c0cf56d539eec33629b891a36e5e065", "branch_name": "refs/heads/master", "committer_date": 1577696758000, "content_id": "e808663fdca7ed8575776d56e334e178c487fc64", "detected_licenses": [ "MIT" ], "directory_id": "d99615571985c518fe76bf79e9b322390244fd93", "extension": "py", "fi...
3.34375
stackv2
sample_input = [3, 2, 1, 3] def birthdayCakeCandles(ar): "Function to determine the number of candles to be blown." max_height = max(ar) n_of_max_height_candles = 0 for i in ar: if i == max_height: n_of_max_height_candles += 1 else: continue return n_of_max_...
16
22.62
62
10
101
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2030c336fad9c65e_6e1ee216", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 16 ]
[ null ]
[ 7 ]
[ 40 ]
2024-11-19T03:22:36.209616+00:00
1,636,565,450,000
577749063f8c473473461316bd1d9dcb69fe16d3
3
{ "blob_id": "577749063f8c473473461316bd1d9dcb69fe16d3", "branch_name": "refs/heads/main", "committer_date": 1636565450000, "content_id": "ec69c51d994bcefec5dc3d6a0f1998391c1da6c3", "detected_licenses": [ "MIT" ], "directory_id": "727c5d72c074ab8f9d573f65a01e94f110d58c99", "extension": "py", "file...
3.375
stackv2
import numpy as np import matplotlib.pyplot as plt from sklearn import svm import re from nltk import PorterStemmer def plotData(X, y): # PLOTDATA(x,y) plots the data points with + for the positive examples # and o for the negative examples. X is assumed to be a Mx2 matrix. # Note: This was slightly ...
307
30.61
96
16
2,674
python
[{"finding_id": "codeql_py/overly-large-range_e71d10c1bfc79eac_cd1b8518", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[.\\/0-9:\\].", "remediation": "", "location": {"file...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[.\\/0-9:\\]." ]
[ 258 ]
[ null ]
[ 38 ]
[ 41 ]
2024-11-19T03:22:40.040094+00:00
1,477,087,278,000
2aa0746e10c25e2a9ce400e49fbd8c3427c8ae3f
3
{ "blob_id": "2aa0746e10c25e2a9ce400e49fbd8c3427c8ae3f", "branch_name": "refs/heads/master", "committer_date": 1477087278000, "content_id": "900533e781167f8887ba2fd46c6c7c7863be8091", "detected_licenses": [ "MIT" ], "directory_id": "0161fc984cbc1140e8ca2f68ee059445d14bdc55", "extension": "py", "fi...
2.640625
stackv2
import antlr4 import importlib import itertools import json import os import re import subprocess as sp """ Setup some module level information """ config = json.load(open("parser_config")) antlr_jar = '' max_version = '0' for fl in os.listdir('.'): match = re.match('antlr(-)?((\d+\.?)+)?(-\w+)?.jar', fl) if...
98
35.88
93
19
828
python
[{"finding_id": "codeql_py/redos_682f62f3db0753e9_bd770d06", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'antlr' and containing many repeti...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with 'antlr' and containing many repetitions of '9'." ]
[ 18 ]
[ null ]
[ 34 ]
[ 37 ]
2024-11-19T03:22:41.950025+00:00
1,585,764,319,000
2ecb039728b43a4f3fe428ff6531770e0269489d
3
{ "blob_id": "2ecb039728b43a4f3fe428ff6531770e0269489d", "branch_name": "refs/heads/master", "committer_date": 1585764319000, "content_id": "e117f250efd75f13d559ccbe67766b3dbd82883d", "detected_licenses": [ "MIT" ], "directory_id": "9eaa2c64a777bd24a3cccd0230da5f81231ef612", "extension": "py", "fi...
2.53125
stackv2
from flask import Flask,render_template,request,make_response,redirect app = Flask(__name__,template_folder='t',static_url_path='/s',static_folder='s') @app.route('/') def index(): return render_template('01-index.html') @app.route('/request') def request_views(): # 将request中的成员打印在终端上 # print(dir(request)) ...
84
29.13
84
14
694
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9255187a72733ab3_238290de", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
4
true
[ "CWE-312", "CWE-312", "CWE-215", "CWE-022" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/flask-debug", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1)." ...
[ 45, 56, 84, 80 ]
[ null, null, null, null ]
[ 15, 15, 5, 16 ]
[ 56, 84, 24, 29 ]
2024-11-19T01:34:56.806453+00:00
1,609,442,525,000
8625c09b9f475a953fe0b12005c65dc2e6340f19
3
{ "blob_id": "8625c09b9f475a953fe0b12005c65dc2e6340f19", "branch_name": "refs/heads/master", "committer_date": 1609443188000, "content_id": "136985914e80d174aa333e64afdd30498dc526a1", "detected_licenses": [ "MIT" ], "directory_id": "72a36ff85a550582400977bb795e271a9ecf1c59", "extension": "py", "fi...
2.84375
stackv2
# -*- coding: utf-8 -*- """NetworksProject.ipynb Automatically generated by Colaboratory. Original file is located at https://colab.research.google.com/drive/1WxvaO5ytY_APrLsNLAnskPUbY2wteJlM """ # To find similarity between given keywords of a webpage and filter word of our context # Done using pre-trained bert...
112
32.08
146
18
913
python
[{"finding_id": "codeql_py/request-without-cert-validation_bc9cd49fd5e855d9_27b42e62", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 55 ]
[ null ]
[ 9 ]
[ 57 ]
2024-11-19T01:34:59.927910+00:00
1,511,370,748,000
c7c4e2ef6f21f1219d42a3c52716f2e62ca12562
2
{ "blob_id": "c7c4e2ef6f21f1219d42a3c52716f2e62ca12562", "branch_name": "refs/heads/master", "committer_date": 1511370748000, "content_id": "f3745f64f5fb6334cfcfbf64d0c850f485b86ddc", "detected_licenses": [ "Apache-2.0" ], "directory_id": "6a102ca30064ec45c8774e1a36cbb18c77da3808", "extension": "py"...
2.484375
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- import requests import json import pprint class AOS8Auth(): """ This class requests and stores an authentication cookie for AOS8. """ def __init__(self, aosip, username, password): url_login = "https://" + aosip + ":4343/v1/api/login" versi...
36
37.14
99
12
343
python
[{"finding_id": "codeql_py/request-without-cert-validation_df47fc8b1a53b511_90881e61", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 20 ]
[ null ]
[ 24 ]
[ 99 ]
2024-11-19T01:35:02.172958+00:00
1,611,229,977,000
fa755cce3ff9ae16b4cae510f2dceae3f841b0a8
2
{ "blob_id": "fa755cce3ff9ae16b4cae510f2dceae3f841b0a8", "branch_name": "refs/heads/master", "committer_date": 1611229977000, "content_id": "9f35603989947fae23634d63690d7b1c720b7da5", "detected_licenses": [ "MIT" ], "directory_id": "14c0f80aa8c3fdf230878b2385902ad66c59e83f", "extension": "py", "fi...
2.328125
stackv2
from flask import jsonify, request, Blueprint from flask_oauthlib.provider import OAuth2Provider from src.models import RModel from src.models.NCFModel import NCFModel from src.models.NeuMFModel import NeuMFModel from src.restful.oauth2.Oauth2 import require_oauth class RecommendationEndpoint: def __init__(self)...
82
30.93
104
18
596
python
[{"finding_id": "codeql_py/reflective-xss_fb90f83c371d855a_886b551d", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability due to a [user-provided value](2)." ]
[ 50, 59 ]
[ null, null ]
[ 16, 14 ]
[ 55, 105 ]
2024-11-19T01:55:37.243069+00:00
1,587,028,743,000
0c9bd6298974764e88f5aa225f472fdc4a7278a0
3
{ "blob_id": "0c9bd6298974764e88f5aa225f472fdc4a7278a0", "branch_name": "refs/heads/master", "committer_date": 1587028743000, "content_id": "aa9dbb49b73b90a2bd72c418ed66c054cf17c3e3", "detected_licenses": [ "MIT" ], "directory_id": "5776553535644a56147b2d200bfd8cac36f0daee", "extension": "py", "fi...
2.625
stackv2
from abc import ABC, abstractmethod from flask import request import logging import mlog logger = logging.getLogger('endpoint') class Endpoint(ABC): def __init__(self, dbClient, mqClient, logger, env): self.dbClient = dbClient self.mqClient = mqClient self.logger = logger self.env ...
49
32.31
106
13
388
python
[{"finding_id": "codeql_py/log-injection_b11de39bc8d1fc88_2d005f7f", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 41 ]
[ null ]
[ 22 ]
[ 48 ]
2024-11-19T01:55:39.914855+00:00
1,654,066,172,000
cd9f2d0e893e487659f3ae0f253664f2c10df711
2
{ "blob_id": "cd9f2d0e893e487659f3ae0f253664f2c10df711", "branch_name": "refs/heads/master", "committer_date": 1654066172000, "content_id": "619c7a35c077805ac855c805905081a1c8696960", "detected_licenses": [ "MIT" ], "directory_id": "4b8013544bd89210d60a140b82828fabc6399959", "extension": "py", "fi...
2.359375
stackv2
#!/usr/bin/python3 # -*- coding: utf-8 -*- # # The MIT License (MIT) # # Copyright (c) 2015 Tintri, Inc. # # Permission is hereby granted, free of charge, to any person obtaining a copy # of this software and associated documentation files (the "Software"), to deal # in the Software without restriction, including witho...
248
33.45
96
15
1,912
python
[{"finding_id": "codeql_py/request-without-cert-validation_521cf8c8a0801b2a_b8f68352", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
6
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 90, 121, 143, 166, 194, 225 ]
[ null, null, 144, 167, 195, null ]
[ 13, 13, 13, 13, 13, 13 ]
[ 75, 64, 56, 57, 57, 68 ]
2024-11-19T01:55:45.823446+00:00
1,609,946,366,000
b88a6c02bf68600c7dfc92cab1c6daf0c993e71a
3
{ "blob_id": "b88a6c02bf68600c7dfc92cab1c6daf0c993e71a", "branch_name": "refs/heads/master", "committer_date": 1609946366000, "content_id": "3285c77b83fca4cc5508c1296454aae5b3682b72", "detected_licenses": [ "MIT" ], "directory_id": "f70bc8b63f43045110f33717d66309ef8d77a6d9", "extension": "py", "fi...
3.0625
stackv2
from spotdl.search.provider import search_and_get_best_match from spotdl.search.spotifyClient import get_spotify_client from os.path import join from json import dumps as convert_dict_to_json, loads as convert_json_to_dict from typing import List class SongObj(): #! This can be accessed as songObj.searchProvide...
226
30.64
89
14
1,616
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_7ea553ca292686a1_82eb333e", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [open.spotify.com](1) may be at an arbitrary position i...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [open.spotify.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 33 ]
[ null ]
[ 17 ]
[ 49 ]
2024-11-19T02:07:54.072407+00:00
1,622,865,565,000
5f8c2b717d5f46dfddbe3659c57f0096d2d70ec3
2
{ "blob_id": "5f8c2b717d5f46dfddbe3659c57f0096d2d70ec3", "branch_name": "refs/heads/main", "committer_date": 1622865565000, "content_id": "0ec6f97939e4aa316857541382705ba73dc5e0e8", "detected_licenses": [ "MIT" ], "directory_id": "2cf37242babcfaaa6a9448ce3a2cecb33a4779e3", "extension": "py", "file...
2.359375
stackv2
from flask import Flask, render_template, after_this_request, redirect, flash, request from werkzeug.utils import secure_filename from model import * import os import random import re USER_RESULTS_FOLDER = os.path.join("static", "user-results") USER_UPLOADS_FOLDER = "user-files" ALLOWED_EXTENSIONS = ("jpg", "png", "jp...
87
33.23
88
19
644
python
[{"finding_id": "codeql_py/url-redirection_c8b8cb4cb01fb22a_a6f64a2e", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
3
true
[ "CWE-601", "CWE-601", "CWE-601" ]
[ "py/url-redirection", "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 37, 41, 44 ]
[ null, null, null ]
[ 29, 29, 29 ]
[ 40, 40, 40 ]
2024-11-19T02:07:56.143159+00:00
1,693,525,865,000
5576f209788d47fccbe53aac5c74ed7679f8db67
2
{ "blob_id": "5576f209788d47fccbe53aac5c74ed7679f8db67", "branch_name": "refs/heads/master", "committer_date": 1693525911000, "content_id": "fe90f0dd6c4b66b400aa8d2bf319e2d717eace5c", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "0db06afad7ff1378479d3b4c24e9416ce741f008", "extension": "p...
2.484375
stackv2
"""Site theme.""" # Copyright (c) 2012-2023 Wibowo Arindrarto <contact@arindrarto.dev> # SPDX-License-Identifier: BSD-3-Clause import tomlkit from copy import deepcopy from pathlib import Path from functools import cached_property from types import ModuleType from typing import cast, Any, Callable, Literal, Optional, ...
259
29.6
88
18
1,741
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_e17a646dbbf9cc5b_3c75bfb6", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 155 ]
[ 159 ]
[ 15 ]
[ 10 ]
2024-11-19T02:07:57.487285+00:00
1,550,317,989,000
fb38714c465aa2207308e0dc17d1b9641c088120
2
{ "blob_id": "fb38714c465aa2207308e0dc17d1b9641c088120", "branch_name": "refs/heads/master", "committer_date": 1550317989000, "content_id": "efb5d8d95fa411961d0f22f9b67afd670346df9f", "detected_licenses": [ "MIT" ], "directory_id": "7f96fdfd0d691761d142fd00b4cf132960c85723", "extension": "py", "fi...
2.46875
stackv2
from flask import g, Markup from flask import (Blueprint, render_template, make_response, redirect, url_for, abort, request, Response) from tw33t import app from functools import wraps from flask import jsonify from twitter import * import json, requests, datetime, sys, os, uuid, re, time from flask.globals import curr...
65
30.89
106
13
439
python
[{"finding_id": "codeql_py/stack-trace-exposure_3a7901df9c606dd6_10e7ca61", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 40 ]
[ 41 ]
[ 20 ]
[ 33 ]
2024-11-19T02:17:11.460079+00:00
1,440,730,678,000
e8819f635f2fed9965059fda56de73f9164c6eb6
3
{ "blob_id": "e8819f635f2fed9965059fda56de73f9164c6eb6", "branch_name": "refs/heads/master", "committer_date": 1440730678000, "content_id": "85aead4648ecb9bb801789867a4d85f2fcd6774d", "detected_licenses": [ "Apache-2.0" ], "directory_id": "609632165f599a4363923ec04b55de5324215363", "extension": "py"...
2.859375
stackv2
#encoding:utf-8 __authors__ = ['"Liu Fei" <fei.liu@cs2c.com.cn>'] __version__ = "V0.1" ''' # ChangeLog: #--------------------------------------------------------------------------------- # Version Date Desc Author #------------------------------------------------------...
64
39.62
122
18
652
python
[{"finding_id": "codeql_py/request-without-cert-validation_af8bba6a9040ddbc_e7312bb3", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
5
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1) by [this value](2).", "This request may run without certificate validation because [it is disabled](1) by [this value](2).", "This request may run without certificate validation because [it is disabled](1) by [this value](2).", "...
[ 45, 47, 49, 52, 54 ]
[ null, null, null, null, null ]
[ 20, 20, 20, 24, 24 ]
[ 76, 110, 109, 83, 116 ]
2024-11-19T02:17:14.123930+00:00
1,526,144,744,000
da6c36d67f26895fe373b8b32da308c6ad392d4e
4
{ "blob_id": "da6c36d67f26895fe373b8b32da308c6ad392d4e", "branch_name": "refs/heads/master", "committer_date": 1526144744000, "content_id": "fb72135f44657e2bb15ae54e54c456314475fd8c", "detected_licenses": [ "Apache-2.0" ], "directory_id": "cd7f1883360466642d347846a6f264fb98291a0f", "extension": "py"...
3.84375
stackv2
#!/usr/bin/env python3 class SchoolMember: """ Parent class """ def __init__(self, name, age): self.name = name self.age = age class Teacher(SchoolMember): """ Child class with salary """ def __init__(self, *args, **kwargs): if args: salary = args[...
42
21.1
75
13
238
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c730a493c69950bf_19a7af06", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 26 ]
[ null ]
[ 15 ]
[ 75 ]
2024-11-19T02:17:22.479219+00:00
1,510,575,364,000
8e6fa4f410ac70980be54145504bc97d2a203fee
2
{ "blob_id": "8e6fa4f410ac70980be54145504bc97d2a203fee", "branch_name": "refs/heads/master", "committer_date": 1510575364000, "content_id": "d0d8563cb539b8a997083ae29501688bf774cd9d", "detected_licenses": [ "MIT" ], "directory_id": "465ed510632e648c28c2baf8534d88a1e7765e5e", "extension": "py", "fi...
2.3125
stackv2
#!/usr/bin/python # -*- coding: utf-8 -*- import urllib import urllib2 import hashlib import simplejson import sys from market import * sys.path.append('../..') from secret import * class OKCoin(Market): def __init__(self, partner, secret): Market.__init__(self, 'OKCoin') self.api = 'www.okcoin.cn/api/v1/' ...
97
25.76
76
16
718
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_7606df4f7da42038_89ec9dac", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (secret)](2) is used in a hashing algorithm (MD5) that is insecure." ]
[ 71 ]
[ null ]
[ 14 ]
[ 25 ]
2024-11-19T02:17:37.659048+00:00
1,527,732,509,000
5ef424913687f18a5dd018a8fe8a05dd568f29c3
3
{ "blob_id": "5ef424913687f18a5dd018a8fe8a05dd568f29c3", "branch_name": "refs/heads/master", "committer_date": 1527732509000, "content_id": "829e42a5eb6ca9a9979f37764d97ef5db358add9", "detected_licenses": [ "Apache-2.0" ], "directory_id": "29a8218d0653a40aa40d628302056cd4754ed677", "extension": "py"...
2.546875
stackv2
import os #import theano #os.environ["KERAS_BACKEND"] = "theano" import flask from keras import models import tensorflow as tf # initialize our Flask application and the Keras model from safetoswim.core import PhotoProcessor application = flask.Flask(__name__) model = None graph = tf.get_default_graph() ALLOWED_EXTEN...
116
33.67
101
19
870
python
[{"finding_id": "codeql_py/stack-trace-exposure_70eb6cb01cf62e19_2a662200", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-215" ]
[ "py/stack-trace-exposure", "py/flask-debug" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger." ]
[ 93, 115 ]
[ null, null ]
[ 42, 5 ]
[ 101, 59 ]
2024-11-19T02:18:02.431368+00:00
1,549,833,075,000
7fca0dcaacca82b0349e15bda2a65be79cc706bc
2
{ "blob_id": "7fca0dcaacca82b0349e15bda2a65be79cc706bc", "branch_name": "refs/heads/master", "committer_date": 1549833075000, "content_id": "01c43e30e16da02752517981db959fd620cade4c", "detected_licenses": [ "MIT" ], "directory_id": "6abec5acf7e5ed450018a83ecad74126808124cf", "extension": "py", "fi...
2.34375
stackv2
import logging import tornado.ioloop import tornado.web import tornado.websocket from jsonrpc import JSONRPCResponseManager, dispatcher logger = logging.getLogger(__name__) def start(): app = tornado.web.Application([ (r"/", WebSocketHandler), ], debug = True) app.listen(8888) logger.debug('W...
57
25.61
74
16
307
python
[{"finding_id": "codeql_py/log-injection_4034470af347de0d_63bdda0b", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
4
true
[ "CWE-117", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 27, 35, 52, 52 ]
[ null, null, null, null ]
[ 13, 13, 13, 37 ]
[ 35, 35, 35, 44 ]
2024-11-19T02:18:07.805762+00:00
1,585,751,491,000
e2e67e316763ca0e4f514802696741c9941f94ed
3
{ "blob_id": "e2e67e316763ca0e4f514802696741c9941f94ed", "branch_name": "refs/heads/master", "committer_date": 1585751491000, "content_id": "5cb568b727de56ec19191c84c59e64feb58a4084", "detected_licenses": [ "MIT" ], "directory_id": "ede44ac83dc8b626a3e326200793c5ec7850d3cc", "extension": "py", "fi...
2.546875
stackv2
# Inbuild Modules import os import json # Third Party Modules import requests from flask import Flask, render_template, request, jsonify # from decouple import config #<-- not sure what this does yet # Custom Modules from google_books_hf import process_list # Retreive Google API key from environment def create_app...
113
35.96
113
20
863
python
[{"finding_id": "codeql_py/partial-ssrf_d9ceaeab17c3e8e6_ea4c5b92", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
2
true
[ "CWE-918", "CWE-918" ]
[ "py/partial-ssrf", "py/partial-ssrf" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 61, 72 ]
[ 64, 75 ]
[ 28, 28 ]
[ 54, 34 ]
2024-11-19T02:19:03.245077+00:00
1,633,051,263,000
a769cdab32038ea9766ba6d5e5f3c8d4fd7a381b
3
{ "blob_id": "a769cdab32038ea9766ba6d5e5f3c8d4fd7a381b", "branch_name": "refs/heads/main", "committer_date": 1633051263000, "content_id": "54b5a3144dd878c7dc3830c3f6d5ba3628aeada3", "detected_licenses": [ "MIT" ], "directory_id": "8e4b365662e24d6da3dd68b74c645a54aa5b6366", "extension": "py", "file...
2.6875
stackv2
from requests import get from sys import argv from os import system def consulta(placa): req=get('https://apicarros.com/v2/consultas/%s/f63e1e63dd231083d38ce929984aac7d'%placa, verify=False).json() system('cls||clear') msg='|| Consulta de Placa ||\n' for item in req: msg+=str('%s : %s\n'%(item.upper(),req[item])...
24
26.88
109
19
203
python
[{"finding_id": "codeql_py/request-without-cert-validation_95f166b699109ba4_60763d1b", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 6 ]
[ null ]
[ 6 ]
[ 103 ]
2024-11-19T02:30:02.231249+00:00
1,594,955,989,000
da93e4d8c1b27cf4cafb94600a48fba70999f131
2
{ "blob_id": "da93e4d8c1b27cf4cafb94600a48fba70999f131", "branch_name": "refs/heads/master", "committer_date": 1594955989000, "content_id": "bccab4ea6c7f0b1c0b4cb899b24edd1126c0bdda", "detected_licenses": [ "MIT" ], "directory_id": "ae9dfa37ba85d14e34c37bcbdd50dd3a304537ba", "extension": "py", "fi...
2.3125
stackv2
#!/usr/bin/python3 # data.py import os import sqlite3 import hashlib import secrets import youtube_dl from subprocess import Popen, PIPE from config import DB_LOCATION, SHA256_SALT, VIDEOS_LOCATION def authenticate(username, password): conn = sqlite3.connect(DB_LOCATION) cursor = conn.cursor() cursor.exe...
111
29.86
124
16
839
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_1d85457b5863ad60_0bbaaecc", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 20 ]
[ null ]
[ 40 ]
[ 73 ]
2024-11-19T02:30:19.691534+00:00
1,577,632,893,000
a25e78d3a8eb5dc5f3550309d4ed3aeb1bfcbd90
2
{ "blob_id": "a25e78d3a8eb5dc5f3550309d4ed3aeb1bfcbd90", "branch_name": "refs/heads/master", "committer_date": 1577632893000, "content_id": "b9f6a86866e6cad7eb5dd7ea9af877b3975a4c2d", "detected_licenses": [ "MIT" ], "directory_id": "f7abff397a0ec2026a81f8cf3b42cd441ec8c62f", "extension": "py", "fi...
2.375
stackv2
import os from typing import Dict, Optional, List from pathlib import Path import aiodocker from aiodocker.exceptions import DockerError from jinja2 import Template, Environment, FileSystemLoader from .config import Config from .context import create_tar class DockerArtifact: config: Config parameters: dict...
124
29.44
92
19
757
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_5f491d1e2f6c29b4_ea2f1ce0", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
6
true
[ "CWE-079", "CWE-079", "CWE-079", "CWE-079", "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false", "py/jinja2/autoescape-false", "py/jinja2/autoescape-false", "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially...
[ 28, 32, 37, 40, 94, 102 ]
[ null, null, null, null, null, null ]
[ 13, 13, 13, 21, 19, 46 ]
[ 38, 36, 37, 42, 80, 64 ]
2024-11-19T02:30:23.866770+00:00
1,593,966,877,000
6ce5b9ca0fdccb12e539424cd42704a894f52f1d
3
{ "blob_id": "6ce5b9ca0fdccb12e539424cd42704a894f52f1d", "branch_name": "refs/heads/master", "committer_date": 1593966877000, "content_id": "9488ee2026fa42524434bda4567d50c40e8794f3", "detected_licenses": [ "MIT" ], "directory_id": "a71024f0ca1b311a68c286ceb213b8224186c0d9", "extension": "py", "fi...
3.25
stackv2
from bs4 import BeautifulSoup as bs import requests, os class Mangakakalot: def __init__(self, url): self.title='' self.chapter = 0 self.page = 0 self.url = url self.heading() self.download() def heading(self): source = requests.get(self.url).text soup = bs(source, 'lxml') self.title = soup.find(...
117
24.32
94
15
925
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_4f19b8d6cea0c8f6_b8ebd1e2", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [mangakakalot.com](1) may be at an arbitrary position i...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "The string [mangakakalot.com](1) may be at an arbitrary position in the sanitized URL.", "The string [manganelo.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 98, 101 ]
[ null, null ]
[ 4, 6 ]
[ 29, 28 ]
2024-11-19T02:30:27.737710+00:00
1,449,844,753,000
79353a77cb522054ef4268803ab54a385c5f7680
3
{ "blob_id": "79353a77cb522054ef4268803ab54a385c5f7680", "branch_name": "refs/heads/master", "committer_date": 1449844753000, "content_id": "0e3b347cffe11444d64b8cb03e0a7de5be4d0f8e", "detected_licenses": [ "MIT" ], "directory_id": "c07551cd05122cdb8d9f09cff74e3678bc8ee31d", "extension": "py", "fi...
2.59375
stackv2
""" HTTP authentication support for web.py """ import base64 import functools import hashlib import math import os import re import time import web __all__ = ( 'make_hash', 'join_fields', 'parse_fields', 'Auth', 'DigestAuth', 'DUMMY', 'FORWARDED_USER', 'BASIC', 'DIGEST', 'AuthMediator', ) class St...
322
26.63
78
16
1,986
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_30dbb4988829a64d_f407c654", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (id)](2) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (id)](3) is used in a hashing algorithm (MD5) that ...
[ 37 ]
[ null ]
[ 24 ]
[ 46 ]
2024-11-19T02:30:35.404965+00:00
1,689,200,951,000
9d195931a4d11b0418b220c59a1025fe66206a8b
3
{ "blob_id": "9d195931a4d11b0418b220c59a1025fe66206a8b", "branch_name": "refs/heads/main", "committer_date": 1689200951000, "content_id": "5ce5c98d80bfa8a34a93656a969cece5f7279095", "detected_licenses": [ "Apache-2.0" ], "directory_id": "5e24a177efa11fc9f9e77da1413085e4d16a77df", "extension": "py", ...
2.75
stackv2
# # Copyright 2021, by the California Institute of Technology. ALL RIGHTS # RESERVED. United States Government Sponsorship acknowledged. Any commercial # use must be negotiated with the Office of Technology Transfer at the # California Institute of Technology. # """ ============== osti_record.py ============== Co...
130
40.82
114
19
1,184
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_accb865a3d9c71b6_1175e32e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 53, 56 ]
[ null, null ]
[ 28, 29 ]
[ 96, 97 ]
2024-11-19T02:41:42.495799+00:00
1,572,863,429,000
f62e4ed7452822a785a8d244aa24989b6cb1e8f9
3
{ "blob_id": "f62e4ed7452822a785a8d244aa24989b6cb1e8f9", "branch_name": "refs/heads/master", "committer_date": 1572863429000, "content_id": "331f35054bfdbd7735a9005715a49a0223b939aa", "detected_licenses": [ "Apache-2.0" ], "directory_id": "39e0a6cfac6c980b2f8a76871a04e96d1993cce6", "extension": "py"...
2.6875
stackv2
from flask import render_template, url_for, redirect, flash, request from flask_login import current_user, login_user, logout_user, login_required from __init__ import app, bcrypt, db from forms import RegistrationForm, LoginForm, UpdateAccountForm from models import User from utils import save_picture @app.route('/'...
103
35.82
98
16
770
python
[{"finding_id": "codeql_py/url-redirection_3ac76483e4ee259e_f8230cd7", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 59 ]
[ null ]
[ 29 ]
[ 38 ]
2024-11-19T02:41:53.796058+00:00
1,535,383,779,000
80967f08e13137ec5c6a76efc56ef35b2ea8a548
3
{ "blob_id": "80967f08e13137ec5c6a76efc56ef35b2ea8a548", "branch_name": "refs/heads/master", "committer_date": 1535383779000, "content_id": "27e1571b03e6457230679fb22b5a591e26c7312f", "detected_licenses": [ "MIT" ], "directory_id": "bcacb96aecbe300eee79d6d9647122a8bfcd8673", "extension": "py", "fi...
3.390625
stackv2
import pyperclip from user import User from user import Credentials def create_user(username,password): ''' function that creates a new user to the app ''' new_user = User(username,password) return new_user def save_user(user): ''' function to save a user ''' user.save_user() def ...
151
38.49
157
27
1,050
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_54712b27c0c9e001_92f0438c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 76, 129 ]
[ null, null ]
[ 19, 43 ]
[ 71, 157 ]
2024-11-18T18:05:52.504753+00:00
1,498,989,434,000
a456b54761f55969b31d8976eb7f56200a9576f5
3
{ "blob_id": "a456b54761f55969b31d8976eb7f56200a9576f5", "branch_name": "refs/heads/master", "committer_date": 1498989434000, "content_id": "2a003537082f9cf02d5a7b0be1c2b36ef0881240", "detected_licenses": [ "MIT" ], "directory_id": "59ff1c38e7ee0666d32a4dae67d5aeb5ab989e76", "extension": "py", "fi...
3.453125
stackv2
#!/usr/bin/env python3 # coding: utf-8 import twitter twitterSecretsLoc = "twitter.secret" def setup(): print("-----------------") print(" TWITTER SETUP ") print("-----------------\n") print("To connect to Twitter I need some keys. You can get them by creating an app on https://apps.twitter.com.") print("Onc...
92
25.49
114
20
610
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_44c29c321d52236a_6a1beb78", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ...
6
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (secret)](1) as clear text.", "This expression stores [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive...
[ 49, 51, 55, 63, 73, 87 ]
[ null, null, null, null, null, null ]
[ 23, 23, 8, 9, 10, 11 ]
[ 51, 42, 92, 100, 103, 101 ]
2024-11-18T18:05:55.701004+00:00
1,611,872,724,000
e55fa6b8342e263b0d9a782ae3cbd36e5485ff1c
3
{ "blob_id": "e55fa6b8342e263b0d9a782ae3cbd36e5485ff1c", "branch_name": "refs/heads/master", "committer_date": 1611872724000, "content_id": "7ad166e51273e8d81b0320531951f4ead8639e41", "detected_licenses": [ "MIT" ], "directory_id": "6a84fa67fd8f39336b8b98b6dd377eedcc7f6f3e", "extension": "py", "fi...
3.109375
stackv2
from pydriller import RepositoryMining import csv import logging import pandas as pd import matplotlib.pyplot as plt logging.basicConfig(level=logging.INFO) logger = logging.getLogger(__name__) def read_from_github(url, dict): """ url: github link of a repository dict: list commit id, date and message w...
171
35.73
175
16
1,556
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_830dd40beb04beee_62901202", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [https://gitlab.com/](1) may be at an arbitrary positio...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [https://gitlab.com/](1) may be at an arbitrary position in the sanitized URL." ]
[ 126 ]
[ null ]
[ 12 ]
[ 39 ]
2024-11-18T18:05:56.912475+00:00
1,570,025,414,000
7fe641e4cdad79651a7f3c6ee7288d649300a696
2
{ "blob_id": "7fe641e4cdad79651a7f3c6ee7288d649300a696", "branch_name": "refs/heads/master", "committer_date": 1570025414000, "content_id": "fa0a819f13e9e532c958276f3dcd813281248729", "detected_licenses": [ "MIT" ], "directory_id": "df1ed8a730b7be81dc71f1dfd72a1f60e4152102", "extension": "py", "fi...
2.3125
stackv2
from yoti_python_sdk.sandbox.endpoint import SandboxEndpoint from cryptography.fernet import base64 from os.path import expanduser, isfile from past.builtins import basestring import json import requests import yoti_python_sdk from yoti_python_sdk.config import ( X_YOTI_AUTH_KEY, X_YOTI_AUTH_DIGEST, X_YOTI...
182
32.66
94
17
1,330
python
[{"finding_id": "codeql_py/request-without-cert-validation_db3ad9127ace1767_42a6da80", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 81 ]
[ null ]
[ 16 ]
[ 88 ]
2024-11-18T18:05:57.981737+00:00
1,576,195,525,000
ab7e9482626b258fb20fa6c70d0a15d4c02d8a46
2
{ "blob_id": "ab7e9482626b258fb20fa6c70d0a15d4c02d8a46", "branch_name": "refs/heads/master", "committer_date": 1576195525000, "content_id": "19a61d8a5bd3ebc3982d8d9e16e91ad0d3e166f2", "detected_licenses": [ "MIT" ], "directory_id": "eb88c553bae0a7e44384f90a79b56db6f4e3ac33", "extension": "py", "fi...
2.5
stackv2
# Samuel Dunn # CS 320, Fall 2019 import os import cherrypy from jinja2 import Environment, FileSystemLoader try: from ..tutorial.tutorial_factory import TutorialFactory from .tutorial_manager import TutorialManager from ..auth.authenticator import Authenticator except ImportError: from pofis.tutorial...
74
38.34
154
19
620
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_2c5e23ef095f3033_e9a83cd1", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 21 ]
[ null ]
[ 20 ]
[ 70 ]
2024-11-18T18:15:56.090445+00:00
1,616,915,498,000
b6bc109781047cea556774679071c49d8963f667
2
{ "blob_id": "b6bc109781047cea556774679071c49d8963f667", "branch_name": "refs/heads/main", "committer_date": 1616915498000, "content_id": "c26876151d2cd1ffd8d296dcfe1df5e19d61d0da", "detected_licenses": [ "Apache-2.0" ], "directory_id": "ddb36efae1125efc2f51cc3c6347edfaeb5f5292", "extension": "py", ...
2.3125
stackv2
import pandas as pd import config import numpy as np import os import datetime import json import flask import werkzeug from flask import request #from werkzeug.contrib.fixers import ProxyFix app = flask.Flask(__name__) @app.route('/postjson', methods = ['POST']) def postJsonHandler(): content = request.get...
35
22.83
59
12
220
python
[{"finding_id": "codeql_py/flask-debug_b525a0b59cebef21_3f613f0d", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 34, 29 ]
[ null, null ]
[ null, 12 ]
[ 49, 23 ]
2024-11-18T18:16:14.866375+00:00
1,521,609,831,000
f52de3244bdca6b8b7d0ef2b27abcf1ed73b85cf
2
{ "blob_id": "f52de3244bdca6b8b7d0ef2b27abcf1ed73b85cf", "branch_name": "refs/heads/master", "committer_date": 1521609831000, "content_id": "cc91a38489f3159b8ae7e807dd5c01cb77205f2e", "detected_licenses": [ "MIT" ], "directory_id": "e0cb098d0d14f1ededd2224a92bb0554a79cd52c", "extension": "py", "fi...
2.34375
stackv2
from bs4 import BeautifulSoup #as Soup import os ##import soupselect_bs4; soupselect_bs4.monkeypatch() import urllib.request ###soup = BeautifulSoup(urllib.request.urlopen('http://slashdot.org/')) #Soup() ##select(soup, 'div#firehoselist > article > h2.story > span.story-title a') ##soup.findSelect('h2.story span a')...
159
42.08
89
23
1,517
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_cd8f7ef799069607_a7d68678", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 91 ]
[ null ]
[ 23 ]
[ 47 ]
2024-11-18T18:16:14.975326+00:00
1,629,133,973,000
3a2b704367840270f1d138015d734d3f2bcaa218
3
{ "blob_id": "3a2b704367840270f1d138015d734d3f2bcaa218", "branch_name": "refs/heads/main", "committer_date": 1629133973000, "content_id": "052d942f1b788084280d393e0897850e36ccd259", "detected_licenses": [ "Apache-2.0" ], "directory_id": "971d7f21d123e92d93a59fdd7ed216e919c6b599", "extension": "py", ...
2.703125
stackv2
#! /usr/bin/env python import os import sys import requests SLACK_API_TOKEN = os.environ['SLACK_API_TOKEN'] users_list = requests.get('https://slack.com/api/users.list?token=%s' % SLACK_API_TOKEN).json() if users_list['ok'] is not True: print('Slack API call failed') sys.exit(1) for user in users_list['me...
20
21.7
95
11
125
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_28a5d9b9c9d82b78_c9630899", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 20 ]
[ null ]
[ 11 ]
[ 53 ]
2024-11-18T19:31:11.352690+00:00
1,505,465,056,000
671b3a9bf9da96b46f0a8d4db2322a0a33e315f5
3
{ "blob_id": "671b3a9bf9da96b46f0a8d4db2322a0a33e315f5", "branch_name": "refs/heads/master", "committer_date": 1505465056000, "content_id": "d7f25c5cace2f8519c9c52eace7918d42b6f93b1", "detected_licenses": [ "ISC" ], "directory_id": "f9d8bceaf47504fb6d15d789b0f40fc4cb7e776f", "extension": "py", "fi...
2.5625
stackv2
# coding: utf-8 """Crypto related utilities.""" from __future__ import unicode_literals import base64 import random import string from django.utils.encoding import force_bytes, force_text from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes from cryptography.hazmat.backends import default_ba...
58
28.88
76
14
422
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_1ec6d5c05cea39a4_a8751898", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 42, 53 ]
[ null, null ]
[ 10, 13 ]
[ 33, 33 ]
2024-11-18T18:59:39.238597+00:00
1,579,729,616,000
42559f54816c813d0c94e68406147a8cc4a58ffb
3
{ "blob_id": "42559f54816c813d0c94e68406147a8cc4a58ffb", "branch_name": "refs/heads/master", "committer_date": 1579729616000, "content_id": "0f39c05ce7c52ed7b8a5d52141bb30cbecbf73df", "detected_licenses": [ "MIT" ], "directory_id": "268bb3ebccb9bba43c7878c701bc5398f8dd781f", "extension": "py", "fi...
2.65625
stackv2
from jinja2 import Environment, FileSystemLoader, select_autoescape from jinja2 import Template import report_generator.view.templates as templates #env = Environment( # loader = PackageLoader('report_generator','view/templates'), # autoescape=select_autoescape(['html','xml']) #) """ template = Template(filen...
62
27.5
100
13
360
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_722d21f56d0ae808_9900c98e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 19 ]
[ null ]
[ 7 ]
[ 38 ]
2024-11-18T19:23:57.319916+00:00
1,690,505,680,000
7c256a7b691f9ad7c4f72d29df0601e1f325a78b
3
{ "blob_id": "7c256a7b691f9ad7c4f72d29df0601e1f325a78b", "branch_name": "refs/heads/master", "committer_date": 1690505680000, "content_id": "b5f64b194228ddad9236520b7c3ca04a803ef4fc", "detected_licenses": [ "MIT" ], "directory_id": "45b852a00cb59718b263b823e0f954e9c21e838c", "extension": "py", "fi...
2.734375
stackv2
from astral import AstralError from cachetools import cached from cachetools import TTLCache from json.decoder import JSONDecodeError from logging import info from requests import get from requests import RequestException from firestore import DataError from firestore import Firestore # The endpoint of the OpenWeathe...
92
31.59
77
16
730
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c0012b3eff0d583d_1c10e3f2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text." ]
[ 61 ]
[ null ]
[ 14 ]
[ 34 ]
2024-11-18T18:39:33.359137+00:00
1,604,722,518,000
27e1e1faed78cf74bdaaf10779d29bd4d26bb3b6
2
{ "blob_id": "27e1e1faed78cf74bdaaf10779d29bd4d26bb3b6", "branch_name": "refs/heads/master", "committer_date": 1604722518000, "content_id": "bc56b3e74521d697e1c12e6a21962a08d6680372", "detected_licenses": [ "MIT" ], "directory_id": "297846b2213e3653b26c31cc396cea71c9172191", "extension": "py", "fi...
2.359375
stackv2
''' Function: 小米商城模拟登录 Author: Charles 微信公众号: Charles的皮卡丘 更新日期: 2020-10-29 ''' import re import time import json import hashlib import warnings import requests warnings.filterwarnings('ignore') '''PC端登录小米商城''' class mieshopPC(): is_callable = True def __init__(self, **kwargs): for key,...
132
35.58
164
20
1,214
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_8a762b4bedf9445f_70708a37", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 46 ]
[ null ]
[ 41 ]
[ 74 ]
2024-11-18T18:39:40.866223+00:00
1,647,361,550,000
c1799340d6001841ba5a6195e25ed297101229de
3
{ "blob_id": "c1799340d6001841ba5a6195e25ed297101229de", "branch_name": "refs/heads/master", "committer_date": 1647361550000, "content_id": "722cb849d67a21876d8988845f0ef35bd92bbeea", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "dfbdfab87f412f52bbd4b274e4ea5bbb61dd2f14", "extension": "p...
2.921875
stackv2
#!/usr/bin/env python # landScraper.py -v 1.7 # currently designed for python 3.10.2 # Author- David Sullivan # # Credit to Michael Shilov from scraping.pro/simple-email-crawler-python for the base for this code # # As a reminder, web scraping for the purpose of SPAM or hacking is illegal. This tool has been provided f...
230
33.39
119
21
1,809
python
[{"finding_id": "codeql_py/request-without-cert-validation_bb6846694be66a2c_3928abb5", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 95 ]
[ null ]
[ 28 ]
[ 110 ]
2024-11-18T18:39:56.189424+00:00
1,600,156,337,000
f3871f51c878fba286499c7688659976f2c16901
3
{ "blob_id": "f3871f51c878fba286499c7688659976f2c16901", "branch_name": "refs/heads/main", "committer_date": 1600156337000, "content_id": "61204377acad860cb216648bbf9448dd43d7c3d6", "detected_licenses": [ "MIT" ], "directory_id": "6779059f7c273fd554cbc8dc99bfad06c2cb2a9d", "extension": "py", "file...
2.640625
stackv2
import datetime import urllib.parse import pytz import requests from flask import Blueprint, jsonify, request from ew_common.input_validation import extract_postal_code mod = Blueprint("mobilize_america", __name__) EVENTS_URL_BASE = "https://events.mobilizeamerica.io/api/v1/organizations/3510/events?per_page=3&excl...
106
34.36
115
14
899
python
[{"finding_id": "codeql_py/partial-ssrf_97cfba4491adde68_882402ea", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 67 ]
[ null ]
[ 14 ]
[ 31 ]
2024-11-18T19:10:00.898766+00:00
1,578,952,555,000
cfb7ad6602387aebf6f4c944299ce032445bac6a
3
{ "blob_id": "cfb7ad6602387aebf6f4c944299ce032445bac6a", "branch_name": "refs/heads/master", "committer_date": 1578952555000, "content_id": "e128bb1b2d3d24d497ca67edccdb55e7576baf6b", "detected_licenses": [ "MIT" ], "directory_id": "d0253288a55c9ab71f69e61f166a1e717ddbf923", "extension": "py", "fi...
2.9375
stackv2
# Forked from https://github.com/TelloSDK/Multi-Tello-Formation # This fork hosted at https://github.com/scubyd/Multi-Tello-Formation to support Python 3 # Updated and tested with Python 3.7 import socket def set_ap(ssid, password): """ A Function to set tello in AP mode :param ssid: the ssid of the netw...
36
37.86
112
9
415
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_02efd1f5fd7232e6_e63d4b4c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-200" ]
[ "py/clear-text-logging-sensitive-data", "py/bind-socket-all-network-interfaces" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "'' binds a socket to all interfaces." ]
[ 25, 17 ]
[ null, null ]
[ 11, 5 ]
[ 41, 31 ]
2024-11-18T19:49:09.455976+00:00
1,613,990,125,000
f787ecc8e1c449708ce1bda61ca3211d05304ba4
3
{ "blob_id": "f787ecc8e1c449708ce1bda61ca3211d05304ba4", "branch_name": "refs/heads/master", "committer_date": 1613990125000, "content_id": "52c7eddae88a2cb8f670afc914d8e7fb39d27e07", "detected_licenses": [ "CC0-1.0" ], "directory_id": "5577735428df8e493c59160debcde81e256266ee", "extension": "py", ...
3.171875
stackv2
from datetime import datetime, timedelta import hashlib class Cache: def __init__(self, key_expiration_in_seconds): self.expirationInSeconds = key_expiration_in_seconds self.cache = {} @staticmethod def __key(username, ldap_config_key): return username + '#' + ldap_config_key ...
38
30.37
87
18
254
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_af4f9b33677fb51f_0d0a543a", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e...
[ 16 ]
[ null ]
[ 31 ]
[ 48 ]
2024-11-18T20:15:56.239690+00:00
1,650,918,693,000
5a3607123df8b93ad6dd2cdc1cde8e88622a2b98
4
{ "blob_id": "5a3607123df8b93ad6dd2cdc1cde8e88622a2b98", "branch_name": "refs/heads/main", "committer_date": 1650918693000, "content_id": "7afbe374a4df88c277c1536c0549a7466e7cd7fd", "detected_licenses": [ "MIT" ], "directory_id": "5f65e12a62b59aea9263f35240c960b7e6009aa5", "extension": "py", "file...
3.859375
stackv2
#!/usr/bin/python """Get the numbers for the superbowl box pools.""" from random import shuffle if __name__ == "__main__": team1 = input("Who is the home team? ") team2 = input("Who is the away team? ") teams = {'home': team1, 'away': team2} away = range(0, 10) home = range(0, 10) shuff...
26
21.65
78
12
180
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_09f00ed6260fe44e_98ef6c46", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 25 ]
[ null ]
[ 11 ]
[ 78 ]
2024-11-18T20:15:57.815698+00:00
1,613,664,564,000
ea038483d9cb79b5c01f975a3428e5af1602c558
2
{ "blob_id": "ea038483d9cb79b5c01f975a3428e5af1602c558", "branch_name": "refs/heads/master", "committer_date": 1613664564000, "content_id": "f9259f301ed82179530bfe77880ffbe1174af509", "detected_licenses": [ "Apache-2.0" ], "directory_id": "9360d6354d91bff42f5949cf737512d72b4e1fb3", "extension": "py"...
2.46875
stackv2
from flask import Flask, request import os import datetime from pymongo import MongoClient from flask_httpauth import HTTPTokenAuth app = Flask(__name__) auth = HTTPTokenAuth(scheme='Bearer') db = None secret = None @auth.verify_token def verify_token(token): if token == secret: print("authenicated") ...
63
27.49
106
12
435
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7677304babfcd56f_db6a97e2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 47 ]
[ null ]
[ 11 ]
[ 14 ]
2024-11-18T20:16:02.144390+00:00
1,611,309,661,000
ee259ed0030448d8260adf5fa8ebeb3445de3996
3
{ "blob_id": "ee259ed0030448d8260adf5fa8ebeb3445de3996", "branch_name": "refs/heads/master", "committer_date": 1611309661000, "content_id": "8ef0c28927da1e610e5f61b9e3eb1a3dbaacc171", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "cb17ecde1952866bd485ff4f0a2cba48ee9935e0", "extension": "p...
2.96875
stackv2
import hashlib import json import os from os import path class Cache: def __init__(self, config): self.name = config["name"] self.path = config["path"] self.ext = config["ext"] def _load_cache(self): if self.get_cache_dir() is not None and path.exists(self.get_cache_dir()): ...
61
30.69
95
18
433
python
[{"finding_id": "codeql_py/overly-permissive-file_dfaf1b88b2a29526_c7369cac", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world writable." ]
[ 32 ]
[ null ]
[ 13 ]
[ 39 ]
2024-11-18T19:38:26.002167+00:00
1,554,236,684,000
8f8e3e74e5208a2db9c77679665ce8b69786164c
3
{ "blob_id": "8f8e3e74e5208a2db9c77679665ce8b69786164c", "branch_name": "refs/heads/master", "committer_date": 1554236684000, "content_id": "1c4630086ef30c6136a9edabe95d3911ecb465d4", "detected_licenses": [ "MIT" ], "directory_id": "281aeb647332c4be456ab437fc1fa4f678886d2a", "extension": "py", "fi...
2.625
stackv2
#!/usr/local/bin/python3 import boto3 import logging import os import ast import json import rubrik_cdm from copy import deepcopy import urllib3 urllib3.disable_warnings() logger = logging.getLogger() logger.setLevel(logging.INFO) def lambda_handler(event, context): """Secrets Manager Rotation Template This...
247
52.42
167
17
2,897
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_63afaf5a36a619e2_43b6cf83", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
12
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging...
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive dat...
[ 41, 45, 48, 51, 114, 119, 133, 162, 178, 236, 243, 247 ]
[ null, null, null, null, null, null, null, null, null, null, null, null ]
[ 22, 22, 21, 22, 21, 26, 25, 21, 22, 29, 17, 17 ]
[ 67, 96, 96, 105, 80, 116, 106, 155, 159, 108, 112, 87 ]
2024-11-18T19:38:26.374133+00:00
1,579,393,214,000
d0a5018d26d5ecb852d8ee00acf6ab9a4de606e8
3
{ "blob_id": "d0a5018d26d5ecb852d8ee00acf6ab9a4de606e8", "branch_name": "refs/heads/master", "committer_date": 1579393214000, "content_id": "06d8e08c63e2ec4e1144ecf9ddcfbf20592a26d4", "detected_licenses": [ "MIT" ], "directory_id": "3999908022d4c56494150facf127021ac8a155a2", "extension": "py", "fi...
2.53125
stackv2
from flask import Blueprint, request, jsonify from app.models.interval_model import Interval from app.models.video_model import Video from app.utils.update import average_interval_update interval_api = Blueprint("interval_api", __name__) @interval_api.route("/api/interval", methods=["POST"]) def create_interval(): ...
56
29.57
90
17
390
python
[{"finding_id": "codeql_py/stack-trace-exposure_a0a07db4e4603de5_3d379409", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 56 ]
[ null ]
[ 16 ]
[ 22 ]
2024-11-18T20:10:55.205485+00:00
1,609,314,125,000
df950b7b60294932a0692b94bd0b91aeafa90a46
4
{ "blob_id": "df950b7b60294932a0692b94bd0b91aeafa90a46", "branch_name": "refs/heads/master", "committer_date": 1609314125000, "content_id": "100f5a8cbdbbd40eb65c60a1ff4df44c67f3a278", "detected_licenses": [ "MIT" ], "directory_id": "d22b83584ea49d230cb8e2c703689e7ddf05ac12", "extension": "py", "fi...
3.515625
stackv2
# -*- coding: utf-8 -*- #Coded By Ashkan Rafiee https://github.com/AshkanRafiee/SimpleBrute/ import requests def readfile(file): with open(file) as f: content = f.readlines() # remove whitespace characters like `\n` at the end of each line content = [x.strip() for x in content] return content ...
47
33.17
85
19
338
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c9e0b39843f090f0_3c4cb581", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (p...
[ 24, 25, 30 ]
[ null, null, null ]
[ 45, 45, 27 ]
[ 56, 56, 54 ]
2024-11-18T20:26:06.830490+00:00
1,611,041,327,000
c821bb8641d82e2f83c3ba33744baa358ab8cf8e
4
{ "blob_id": "c821bb8641d82e2f83c3ba33744baa358ab8cf8e", "branch_name": "refs/heads/master", "committer_date": 1611041327000, "content_id": "a4db21cc480642ff59ddbf4d0c0c07bc6dc60fcc", "detected_licenses": [ "MIT" ], "directory_id": "9486f57d4c0ffb1ae39d5ad78eae5461f177ff35", "extension": "py", "fi...
4
stackv2
# Create the class class Employee: def __init__(self): None def DetermineWeeklySalary(self, weeklyHours, wage): print("ready to calculate" ) class Permanent(Employee): def __init__(self): Employee.__init__(self) def DetermineWeeklySalary(self, weeklyHours, wage): ...
42
29.81
91
19
324
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e18b610115b4c956_1f2fa64a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 16, 24 ]
[ 18, 26 ]
[ 15, 15 ]
[ 55, 55 ]
2024-11-18T20:26:20.358174+00:00
1,622,618,121,000
e0c004f76a6d48e0c0a2b337dc37f842e56404a1
3
{ "blob_id": "e0c004f76a6d48e0c0a2b337dc37f842e56404a1", "branch_name": "refs/heads/master", "committer_date": 1622618121000, "content_id": "98e9dc6c67840001ba8a1e84b0ed04d304ce656e", "detected_licenses": [ "MIT" ], "directory_id": "0b5058743fe5d7f50bd24020ccab4e14772d6651", "extension": "py", "fi...
2.59375
stackv2
from flask import Flask, render_template, request from datastore.store_loader import load_store as store app = Flask(__name__) bus_data = store() @app.route("/api/bus/<bus_number>", methods = ["GET"]) def get(bus_number): if request.method == "GET": try: bus_info = bus_data[bus_number] ...
40
25.57
94
15
222
python
[{"finding_id": "codeql_py/flask-debug_bf655bf4bb4bcebb_9f1878ec", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 40, 29 ]
[ null, null ]
[ 5, 20 ]
[ 26, 23 ]
2024-11-18T20:26:21.515004+00:00
1,552,071,651,000
c9e6b9b58c84c5dcf0c62bf8bedf940d9c313b03
2
{ "blob_id": "c9e6b9b58c84c5dcf0c62bf8bedf940d9c313b03", "branch_name": "refs/heads/master", "committer_date": 1552071651000, "content_id": "1989754455bb05b5bc7e202ef8a3d8a7c46e292a", "detected_licenses": [ "MIT" ], "directory_id": "71dbb40bf28bddff0b96985fbd71c0837f37a572", "extension": "py", "fi...
2.328125
stackv2
import logging import os from ..common.access_exceptions import AuthenticationException from globus_sdk import ConfidentialAppAuthClient, ClientCredentialsAuthorizer from globus_sdk import TransferClient class GlobusAccessWithConfidentialAuth: def __init__(self): self.log = logging.getLogger(self.__clas...
55
39.33
93
15
442
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b679e4834c49e29e_79b6262b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 28 ]
[ null ]
[ 23 ]
[ 87 ]
2024-11-18T20:26:50.058389+00:00
1,475,567,154,000
7399d6657318faee87eefe58aa06efb5d1025e2f
2
{ "blob_id": "7399d6657318faee87eefe58aa06efb5d1025e2f", "branch_name": "refs/heads/master", "committer_date": 1475567154000, "content_id": "67677c05ce8d617981d5a5ac9a2f06d9a2436491", "detected_licenses": [ "MIT" ], "directory_id": "5a0413bacde1176d58577bdfcc7577465dfde2bf", "extension": "py", "fi...
2.5
stackv2
import os import lexEngine.lexengine as LE import subprocess import random import urllib2 import reddit import twitterDicts import crawler import re import threading import bs4 class client: industry = "" url = "" clientName = "" industryWords = [] domain = "" workingDirectory = "" htmlText = "" pdfsDownloaded ...
191
32.3
140
16
1,673
python
[{"finding_id": "codeql_py/bad-tag-filter_d01c632dc09b93e3_3cae7ddc", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression does not match comments containing newlines.", "remediation": "", "location": {"file_pat...
1
true
[ "CWE-116" ]
[ "py/bad-tag-filter" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression does not match comments containing newlines." ]
[ 39 ]
[ null ]
[ 22 ]
[ 31 ]
2024-11-18T20:26:57.767531+00:00
1,586,516,734,000
4c33a12b45d4e50ce33b5bb3ac8ff5ace77d9345
3
{ "blob_id": "4c33a12b45d4e50ce33b5bb3ac8ff5ace77d9345", "branch_name": "refs/heads/master", "committer_date": 1586516734000, "content_id": "e00d7b7408bf1d5e3fc5f07272bea48d74f73033", "detected_licenses": [ "MIT" ], "directory_id": "a0abf7efea510269409f5d81fd71c576c7a5f99c", "extension": "py", "fi...
2.78125
stackv2
import http.client import hashlib import urllib import random import json from tqdm import tqdm appid = '20200403000411315' # 填写你的appid secretKey = '7HjoylhCni3lBsLmeWIr' # 填写你的密钥 httpClient = None myurl = '/api/trans/vip/translate' def _translate(sent, from_lan, to_lan): salt = random.randint(32768, 65536) ...
48
26.96
105
19
378
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_2d446e68ee1cc3db_428fdc75", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 18 ]
[ null ]
[ 24 ]
[ 37 ]
2024-11-18T20:27:02.465394+00:00
1,623,244,875,000
0499ec3d97f2645065fce66073ca96894c1fce80
3
{ "blob_id": "0499ec3d97f2645065fce66073ca96894c1fce80", "branch_name": "refs/heads/main", "committer_date": 1623244875000, "content_id": "f9786605c9a5a026be752ffd57920577f7f6ec47", "detected_licenses": [ "MIT" ], "directory_id": "12508025d13b51f3180e363982e4f5cdec540eee", "extension": "py", "file...
2.640625
stackv2
# default inputs # uri = https://{vra}/iaas/login # vra-refreshtoken = secret with token value (currently manually refreshed every 90 days) # # dependency # requests # import requests import json def handler(context, inputs): # define headers headers = {"Content-Type": "application/x-www-form-urlencoded"}...
34
27.32
96
13
230
python
[{"finding_id": "codeql_py/request-without-cert-validation_ce07cabd5f34a620_64673c09", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 19 ]
[ null ]
[ 14 ]
[ 93 ]
2024-11-18T20:51:55.753376+00:00
1,455,900,945,000
838d002f26c12c0f8b22fc949e4505cb9fde5977
3
{ "blob_id": "838d002f26c12c0f8b22fc949e4505cb9fde5977", "branch_name": "refs/heads/master", "committer_date": 1455900945000, "content_id": "99c0a84d104d4aba330b0e6baf4b7d742492f0a2", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "df310641409d3af2209c628da2473a597fbaccd1", "extension": "p...
2.515625
stackv2
# Simple lockfile. # Copyright (c) 2015, Andre Lucas # All rights reserved. # # Redistribution and use in source and binary forms, with or without # modification, are permitted provided that the following conditions are met: # * Redistributions of source code must retain the above copyright # notice, this li...
134
35.61
78
15
1,076
python
[{"finding_id": "codeql_py/overly-permissive-file_3b3a31579a4f2e83_5180593a", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in open sets file to world readable.", "remediation": "", "location": {...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in open sets file to world readable." ]
[ 57 ]
[ 58 ]
[ 20 ]
[ 75 ]
2024-11-18T20:52:16.382480+00:00
1,572,154,558,000
ab31737ca45d296c1cf1114ca680188f519522ba
3
{ "blob_id": "ab31737ca45d296c1cf1114ca680188f519522ba", "branch_name": "refs/heads/master", "committer_date": 1572154558000, "content_id": "01a40df2f78a2ea6b5e028d38f3bbdab40e1f9cc", "detected_licenses": [ "Apache-2.0" ], "directory_id": "426f216e3d38d2030d337c8be6463cc4cd7af6c3", "extension": "py"...
2.65625
stackv2
#!/usr/bin/env python # -*- coding:utf-8 -*- #通过堡垒机跳转时间命令传输 import paramiko import os import sys import time blip = "121.42.191.190" #定义的堡垒机信息 bluser = "zhangyage" blpasswd = "MCya9B7ewPoTeNT8" hostname = "116.196.69.47" #定义的业务主机信息 username = "root" password = "Zhangyage" port = 22 passinfo = '\'s password: ' #...
72
24.29
81
12
585
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_f025647db98b759f_7208cf33", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 24 ]
[ null ]
[ null ]
[ 58 ]
2024-11-18T20:52:17.906828+00:00
1,692,088,724,000
0572b9a04580626f942f3034f3352aeb5bb476b3
3
{ "blob_id": "0572b9a04580626f942f3034f3352aeb5bb476b3", "branch_name": "refs/heads/main", "committer_date": 1692088724000, "content_id": "6e85b1b1b0e282ae01b6371f56091d5d4874a667", "detected_licenses": [ "MIT" ], "directory_id": "c80d0926964a49d9b136f4d591cd220c54a5ef6b", "extension": "py", "file...
3.046875
stackv2
from jinja2 import Template from folium.elements import JSCSSMixin from folium.map import Marker from folium.utilities import parse_options from folium.vector_layers import path_options class SemiCircle(JSCSSMixin, Marker): """Add a marker in the shape of a semicircle, similar to the Circle class. Use (dire...
94
30.22
99
15
636
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_984c4dc0921276a5_f8b27111", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 39 ]
[ 52 ]
[ 17 ]
[ 6 ]
2024-11-18T20:52:28.949887+00:00
1,592,022,948,000
492a00655c05804278bb2fbbeefd486ed3e78dae
2
{ "blob_id": "492a00655c05804278bb2fbbeefd486ed3e78dae", "branch_name": "refs/heads/master", "committer_date": 1592022948000, "content_id": "6ae50488232b2745c197d52296db726675ae257c", "detected_licenses": [ "MIT" ], "directory_id": "6cd29e63abf68ce35134a6a2550766fa11317b35", "extension": "py", "fi...
2.453125
stackv2
import hashlib import json from random import randrange from time import time import requests from django.core.cache import cache from common import error from tantan.config import WY_SMS_APPSECRET, WY_SMS_APPKEY from worker import call_by_worker def gen_verify_code(length): '''生成验证码''' min_value=10**(lengt...
71
24.34
74
15
542
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_3316c9448743cffd_58d5617f", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecu...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecure." ]
[ 36 ]
[ null ]
[ 29 ]
[ 45 ]
2024-11-18T20:52:49.998916+00:00
1,608,439,614,000
bbc56bd8d9a492b76b5e16e3c958e8d68449fa89
3
{ "blob_id": "bbc56bd8d9a492b76b5e16e3c958e8d68449fa89", "branch_name": "refs/heads/master", "committer_date": 1608439614000, "content_id": "50bff7f1e6601137f47fd0f4aa507167d9635023", "detected_licenses": [ "Apache-2.0" ], "directory_id": "2b7bc7979926987233f07a29c29269273bd123a8", "extension": "py"...
2.515625
stackv2
from flask import Flask, redirect, url_for, request, jsonify, render_template import os import json import io import glob from PIL import Image from torchvision import models import torchvision.transforms as transforms import string app = Flask(__name__) model = models.densenet121(pretrained=True) model.eval() de...
82
30.35
77
15
538
python
[{"finding_id": "codeql_py/url-redirection_a98fed433c0d440f_1d6cac5f", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
3
true
[ "CWE-601", "CWE-601", "CWE-601" ]
[ "py/url-redirection", "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 54, 59, 76 ]
[ null, null, null ]
[ 29, 29, 25 ]
[ 40, 40, 36 ]
2024-11-18T19:02:31.644464+00:00
1,582,901,153,000
03117ba90c2d4be9e04fa0ae18b2fdac0640ce37
3
{ "blob_id": "03117ba90c2d4be9e04fa0ae18b2fdac0640ce37", "branch_name": "refs/heads/master", "committer_date": 1582923422000, "content_id": "5746bf2ef00855ce98290aa3bc008396f0cf46ac", "detected_licenses": [ "MIT" ], "directory_id": "721a87a5ac341930884c81a7ce5c54402e825a27", "extension": "py", "fi...
2.515625
stackv2
import pdb import os from tqdm import tqdm from random import randint from randomuser import RandomUser import firebase_admin from firebase_admin import credentials from firebase_admin import firestore # School subjects offered at Gunn I could think of in less than a min SUBJECTS = [ "AP Comp Sci A", "Bio H",...
248
27.29
134
17
1,731
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7198abee1fadd5e7_74b16cd4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 126 ]
[ null ]
[ 15 ]
[ 50 ]
2024-11-18T19:02:47.624207+00:00
1,557,949,982,000
28e6b991d714540eb13a6d7a3da2a93a58cdd1af
3
{ "blob_id": "28e6b991d714540eb13a6d7a3da2a93a58cdd1af", "branch_name": "refs/heads/master", "committer_date": 1557949982000, "content_id": "abf9056fa52dc02913fc9a4bcda40e4f289c5fbf", "detected_licenses": [ "MIT" ], "directory_id": "5102e36063144ae45e1cc5f37676f6c582c97b57", "extension": "py", "fi...
3.390625
stackv2
import time import resource import platform # check if prefix is a valid prefix for phoneNumber def isPrefix(phoneNumber, prefix): if len(prefix) > len(phoneNumber): return False for i in range(len(prefix)): if (phoneNumber[i] != prefix[i]): return False return True #...
91
29.42
88
13
723
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_df762010ca7ac06c_0dd346bc", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text." ]
[ 59 ]
[ null ]
[ 11 ]
[ 88 ]
2024-11-18T19:03:03.853517+00:00
1,594,329,341,000
7261d048c931813ea8ab0ff4cc3b2a573c8bced8
2
{ "blob_id": "7261d048c931813ea8ab0ff4cc3b2a573c8bced8", "branch_name": "refs/heads/master", "committer_date": 1594329341000, "content_id": "3bb403d0c12a46ce81a2d25334cd5b6f7f8f7a0e", "detected_licenses": [ "MIT" ], "directory_id": "4707406e9e031cd0fad0c45fd99d472f47fadf61", "extension": "py", "fi...
2.4375
stackv2
import base64 import hashlib import hmac import json import time import requests #generate keys from https://www.koinde.com/user-account/api-key/ API_KEY = "<YOUR_API_KEY>" API_SECRET = "<YOUR_API_SECRET>==" def authenticate(): private_key = base64.b64decode(API_SECRET) stamp = str(int(time.time())*1000) ...
38
26.32
146
13
323
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_82b2fe1ac41cf7ea_85b438a7", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 17 ]
[ null ]
[ 57 ]
[ 61 ]
2024-11-18T19:14:31.334951+00:00
1,613,673,048,000
eb7a63aa46c66c2ec2c63a6ae252ac4c6366a1d6
3
{ "blob_id": "eb7a63aa46c66c2ec2c63a6ae252ac4c6366a1d6", "branch_name": "refs/heads/master", "committer_date": 1613673048000, "content_id": "d46c1d61312c3fcea5efee7b081097045c29c641", "detected_licenses": [ "MIT" ], "directory_id": "c8e4e5c74a7d48daec0743e45eb5d4e15af53e60", "extension": "py", "fi...
2.65625
stackv2
import os import sys import pathlib import stat from getpass import getpass class Configurer: DEFAULT_REGION = "us-east-1" DEFAULT_CLIENT_ID = "2amp6q8t55a0usvo63cqu5vj11" def __init__(self): self.config = {} def interactive_config(self): config_path = os.path.join(pathlib.Path.home()...
60
31.15
108
16
431
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_37128ad0047dc416_7f0478a8", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 28 ]
[ null ]
[ 35 ]
[ 39 ]
2024-11-18T19:14:39.375321+00:00
1,610,094,463,000
b7d87c287ec013d85374dde3a0a6d365cc6374b8
2
{ "blob_id": "b7d87c287ec013d85374dde3a0a6d365cc6374b8", "branch_name": "refs/heads/master", "committer_date": 1610094463000, "content_id": "5e7b954c74f8f7df321b6462cf3d169692db9795", "detected_licenses": [ "MIT" ], "directory_id": "633ddec16a6e5f3b70ab646dcc48814c56287164", "extension": "py", "fi...
2.3125
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- import jinja2 import ftplib import inspect import logging import datetime import configparser import dataclasses from pathlib import Path from collections import namedtuple from types import SimpleNamespace __author__ = 'Damian Pala' __version__ = '0.1.0' CLOUD_CREDENT...
437
36.75
115
26
3,377
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_9f1c4239146cb8d2_a3c2982a", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 154 ]
[ null ]
[ 21 ]
[ 65 ]
2024-11-18T19:14:45.084474+00:00
1,627,513,186,000
fc837ea618e8014634429ec60e63e1d6e4934930
3
{ "blob_id": "fc837ea618e8014634429ec60e63e1d6e4934930", "branch_name": "refs/heads/main", "committer_date": 1627513186000, "content_id": "dd427b9746487822a70751083b0568a10e39d804", "detected_licenses": [ "MIT" ], "directory_id": "b15bc367149721edc18a55f878a13d3b81af2201", "extension": "py", "file...
2.546875
stackv2
from django.db import models from django.contrib.auth.models import AbstractBaseUser, BaseUserManager, PermissionsMixin from django.core.exceptions import ValidationError # Create your models here. class AccountManager(BaseUserManager): def domain_validation(self, email): if "gmail.com" in email.split('@'...
59
32.03
109
13
411
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_fe34c2119020ca4d_628eb613", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [gmail.com](1) may be at an arbitrary position in the s...
3
true
[ "CWE-020", "CWE-020", "CWE-020" ]
[ "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "The string [gmail.com](1) may be at an arbitrary position in the sanitized URL.", "The string [outlook.com](1) may be at an arbitrary position in the sanitized URL.", "The string [icloud.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 9, 12, 15 ]
[ null, null, null ]
[ 12, 14, 14 ]
[ 43, 47, 46 ]
2024-11-18T19:27:26.460795+00:00
1,516,957,278,000
1edb7cca69ea3108c5f6ccee637a18c98d5b5c10
4
{ "blob_id": "1edb7cca69ea3108c5f6ccee637a18c98d5b5c10", "branch_name": "refs/heads/master", "committer_date": 1516957278000, "content_id": "4c1985a8ec338bc31c9bfea2760d7d0b3955816b", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "4c1b3de0def9ae8275f9dd88c23987c374054f7d", "extension": "p...
4.09375
stackv2
# 이름 짓기 # 파스칼 표기법(클래스) : 첫단어를 대문자로 시작하며 이름을 지음 # Employees, Department # RegisterEmployees, JoinMember # 카멜 표기법 : 첫단어를 소문자로 시작하며 이름을 지음 # registerEmployees, joinMember # 스네이크 표기법(함수, 변수) : 소문자와 _ 기호를 이용해서 이름을 지음 # register_employees, join_member # 헝가리언 표기법 : 자료형을 의...
152
20
68
13
1,286
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1250b412457d5ebc_53b3eedb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 112 ]
[ null ]
[ 12 ]
[ 42 ]
2024-11-18T19:27:43.951253+00:00
1,554,103,379,000
be35371e03fb466758a6db5bc1c1be359ea9f55e
2
{ "blob_id": "be35371e03fb466758a6db5bc1c1be359ea9f55e", "branch_name": "refs/heads/master", "committer_date": 1554103379000, "content_id": "218e22212b1516d1102a9348615d09ccedcaabe6", "detected_licenses": [ "BSD-3-Clause", "Apache-2.0" ], "directory_id": "26f65f41cff242f91c9d26001c06c90cef1e4fd8",...
2.3125
stackv2
import flask import json import argparse import base64 import sqlite3 import sys TEST_DB = 'example_app_test_db.db' TEST_DB_SCHEMA = '''\ create table if not exists events ( _id integer primary key autoincrement, date_created datetime default current_timestamp, token varchar, data blob );''' INSERT_EVENT_QUER...
143
29.13
79
15
1,008
python
[{"finding_id": "codeql_py/sql-injection_d47ef07cbdec1c0d_836a4632", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown...
3
true
[ "CWE-089", "CWE-089", "CWE-089" ]
[ "py/sql-injection", "py/sql-injection", "py/sql-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This SQL query depends on a [user-provided value](1).", "This SQL query depends on a [user-provided value](1).", "This SQL query depends on a [user-provided value](1)." ]
[ 82, 105, 106 ]
[ null, null, null ]
[ 33, 37, 20 ]
[ 38, 48, 32 ]
2024-11-18T19:27:46.686034+00:00
1,631,542,580,000
3e94c71ca484e261ccf3508010ef495892ab35e6
3
{ "blob_id": "3e94c71ca484e261ccf3508010ef495892ab35e6", "branch_name": "refs/heads/main", "committer_date": 1631542580000, "content_id": "4543c8b214c0d8dc361c10847713d7224951efc7", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "12c5d78ee199ffc4a95113752218377ab15561ad", "extension": "py"...
2.671875
stackv2
import json from flask import Blueprint from flask import flash from flask import redirect from flask import render_template from flask import request, jsonify from flask import url_for from werkzeug.utils import secure_filename from datetime import datetime from werkzeug.exceptions import abort from tour.db import g...
71
35.48
142
15
596
python
[{"finding_id": "codeql_py/reflective-xss_495b7875373e07d4_de73fe2d", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 70 ]
[ null ]
[ 16 ]
[ 20 ]
2024-11-18T19:27:50.779422+00:00
1,425,906,026,000
ac1c2bfb1850c7f4e3c6714b5b819d98661a2308
2
{ "blob_id": "ac1c2bfb1850c7f4e3c6714b5b819d98661a2308", "branch_name": "refs/heads/master", "committer_date": 1425906026000, "content_id": "4d168fe5abc3c5c6e723496d8eeadd61a919cce8", "detected_licenses": [ "Apache-2.0" ], "directory_id": "8f37a9d8e40afa22fbfad6228802af0c2791d893", "extension": "py"...
2.34375
stackv2
""" This script contains various views of Atlassian Parse Application views ``````` 1. /create_message 2. /register run the views as http://127.0.0.1:5000/register """ # Import Statements import datetime import json # from numpy import cast import os import sys import messageDecode import ti...
551
31.22
91
21
3,474
python
[{"finding_id": "codeql_py/reflective-xss_d76cc764f02d9b74_bbabdb23", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 90 ]
[ 91 ]
[ 12 ]
[ 76 ]
2024-11-18T19:38:21.837106+00:00
1,522,853,047,000
e757fc98764c3c07e7d26cc2c1bab9737b4a0aec
3
{ "blob_id": "e757fc98764c3c07e7d26cc2c1bab9737b4a0aec", "branch_name": "refs/heads/master", "committer_date": 1522853047000, "content_id": "440faa3a5423dc888308724a0db1da37b0c3315a", "detected_licenses": [ "MIT" ], "directory_id": "00223e04d6e65dfac680ea501b5a2a4bdeefbaac", "extension": "py", "fi...
2.75
stackv2
import re from ssh import SSHSession WWN_REGEX = re.compile('[0-9A-F]{2}:[0-9A-F]{2}:[0-9A-F]{2}:[0-9A-F]{2}:[0-9A-F]{2}:[0-9A-F]{2}:[0-9A-F]{2}:[0-9A-F]{2}' , re.I) class BrocadeSwitch(SSHSession): """ Establish SSH Connection to Brocade FC Switch which can be used to run commands ...
220
29.05
120
20
1,476
python
[{"finding_id": "codeql_py/overly-large-range_50b8f349aee3bf8a_270e5bb9", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 113 ]
[ null ]
[ 36 ]
[ 39 ]
2024-11-18T20:06:16.697205+00:00
1,511,987,035,000
74df9c90f4aed6da31959a2d58785bf4d609a86a
3
{ "blob_id": "74df9c90f4aed6da31959a2d58785bf4d609a86a", "branch_name": "refs/heads/master", "committer_date": 1511987035000, "content_id": "8f23612ffdb663e5ac60db421151a666b110e9d8", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "cd809c5c8daf799cbfb94a902e53d8a9d5b6021f", "extension": "p...
2.5625
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- """ ``gvjinja module`` ~~~~~~~~~~~~~~~~~~ A jinja module to create Graphviz directed graphs as UML diagrams for jinja templates environments. :Copyright: 2017 by Victor Hui. :Licence: BSD, see LICENSE for more details. ``dir`` ------- - `class` :class:`.gvjinja` - `cla...
390
26.72
87
19
2,772
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_6bd00fe3db031d20_7b5358cd", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 317 ]
[ null ]
[ 11 ]
[ 52 ]
2024-11-18T20:18:11.424920+00:00
1,688,618,879,000
32ba28e21cd389e2d646c0b0706a5a40d1e6c671
2
{ "blob_id": "32ba28e21cd389e2d646c0b0706a5a40d1e6c671", "branch_name": "refs/heads/main", "committer_date": 1688618879000, "content_id": "06ea5e6720999f5f00a31156888496b3e1c5cd2f", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "c71b7a8a9dd7bf7c9496b1df2acc1e52a2a913d0", "extension": "py"...
2.3125
stackv2
# coding: utf-8 from django.conf import settings from django.utils.translation import gettext as t from django.http import HttpResponse from django_digest import HttpDigestAuthenticator from rest_framework.authentication import ( BaseAuthentication, BasicAuthentication, get_authorization_header, TokenAu...
115
33.4
86
15
735
python
[{"finding_id": "codeql_py/stack-trace-exposure_37ff2502645bb98b_2ff47327", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 23 ]
[ null ]
[ 13 ]
[ 19 ]