added
stringlengths
32
32
created
int64
1,244B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.25
source
stringclasses
1 value
text
stringlengths
324
20.1k
num_lines
int64
16
598
avg_line_length
float64
15.1
58.3
max_line_length
int64
33
179
ast_depth
int64
8
39
length
int64
101
3.8k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.1k
265k
sast_codeql_findings_count
int64
1
45
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
45
rule_ids
listlengths
1
45
confidences
listlengths
1
45
severities
listlengths
1
45
messages
listlengths
1
45
line_starts
listlengths
1
45
line_ends
listlengths
1
45
column_starts
listlengths
1
45
column_ends
listlengths
1
45
2024-11-18T21:47:38.963266+00:00
1,619,648,587,000
7ea239b0acac858da834ae9bf934947669e26e09
3
{ "blob_id": "7ea239b0acac858da834ae9bf934947669e26e09", "branch_name": "refs/heads/main", "committer_date": 1619648763000, "content_id": "7f621f719abbc9727c7f7ca5f009bc33f1a32480", "detected_licenses": [ "MIT" ], "directory_id": "129783d5c860eaea03c581d52f5efd41be0d8f59", "extension": "py", "file...
2.71875
stackv2
"""Processo information contained into the JSON survey result.""" # pylint: disable=C0103 import json csv_stories = "story;engagement;coherence;rating;read_again\n" csv_units = "unit,valence,arousal\n" csv_demo = "gender,age\n" with open('results/survey/results.json', 'r', encoding='utf8') as f: results = json.lo...
43
29.81
76
15
341
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_76a93e4ce269e945_55ed29cc", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text." ]
[ 43 ]
[ null ]
[ 13 ]
[ 21 ]
2024-11-18T22:29:01.603288+00:00
1,624,595,423,000
d78a54685e6c302cfee0fe36ddca53972482d384
3
{ "blob_id": "d78a54685e6c302cfee0fe36ddca53972482d384", "branch_name": "refs/heads/main", "committer_date": 1624595423000, "content_id": "5ee79666a0bce071fb7f482521c15bf79301f8b2", "detected_licenses": [ "CC0-1.0" ], "directory_id": "c2318eb56ada865a459c4def64b75eb441e0cb48", "extension": "py", "...
2.75
stackv2
import argparse import datetime import inspect import logging import sys from collections import defaultdict from pathlib import Path from typing import List, Dict import fnmatch from jinja2 import Environment, FileSystemLoader, Template from phlooph.models import Source, Post from phlooph import config logger = lo...
342
33.18
117
17
2,640
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_f572e385e8d0ed47_0f5cffd1", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 74 ]
[ null ]
[ 19 ]
[ 57 ]
2024-11-18T22:29:35.763546+00:00
1,541,441,143,000
5b34b79c038ab8c4ed1e892fda30fc28c4932d8f
3
{ "blob_id": "5b34b79c038ab8c4ed1e892fda30fc28c4932d8f", "branch_name": "refs/heads/master", "committer_date": 1541441143000, "content_id": "11bf9e2d5eda0a7e52eb73f7a9e51afef79e7d95", "detected_licenses": [ "MIT" ], "directory_id": "a48d507f594f2213f98d90fc0b6024f5f601ff7b", "extension": "py", "fi...
2.65625
stackv2
from django.db import models import datetime import pytz from django.core.exceptions import ObjectDoesNotExist class PasswordResetManager(models.Manager): """ Manager class for Password Reset """ def is_record_expired(self, token): created_date = super().get_queryset().get(token=token).cr...
85
28.14
75
18
484
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ec7c214d9c9f27dd_6096dcf0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 76 ]
[ null ]
[ 20 ]
[ 32 ]
2024-11-18T22:29:38.525592+00:00
1,578,982,899,000
da0bcfc25e64ead7756c478321fe1ef8775e5486
3
{ "blob_id": "da0bcfc25e64ead7756c478321fe1ef8775e5486", "branch_name": "refs/heads/master", "committer_date": 1578982899000, "content_id": "9e908d7bfb67d00fb828824c27f50440d6e228af", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "9084751a90f977fc722f90892e62c6596d0a26c6", "extension": "p...
2.75
stackv2
from abc import ABC, abstractmethod import jinja2 class Template(ABC): @abstractmethod def render(self, session): pass @classmethod def get_template(cls): origin_cls = cls while cls is not Template: if cls.__doc__: return cls.__doc__ el...
40
21.15
69
15
201
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_e4d07eb889584ac2_d00fbdf2", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 36 ]
[ null ]
[ 20 ]
[ 56 ]
2024-11-18T22:41:13.810293+00:00
1,509,802,522,000
7e5c338ddd894db465ab955b1a21c759758148f8
2
{ "blob_id": "7e5c338ddd894db465ab955b1a21c759758148f8", "branch_name": "refs/heads/master", "committer_date": 1509802522000, "content_id": "58ceaafc2d2819124d87eef37b783e73dcf0c336", "detected_licenses": [ "MIT" ], "directory_id": "af94acd04ac9b05bff3cec8c972e38ddeb58bcd7", "extension": "py", "fi...
2.453125
stackv2
# -*- coding: utf-8 -*- import time import xlrd import Register_aidaiwangApp import LogOut_aidiawangApp def start_to_login(filename): print(u'login') driver = Register_aidaiwangApp.driver driver.launch_app() time.sleep(3) try: driver.find_element_by_id('cn.phaidai.loan:id/rb_mine') ...
69
33.17
98
16
575
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ecce819ec68b6945_83b270b6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 56 ]
[ null ]
[ 40 ]
[ 53 ]
2024-11-18T22:41:23.184868+00:00
1,631,459,759,000
26582efa0911e8593813696581b2385d12849835
2
{ "blob_id": "26582efa0911e8593813696581b2385d12849835", "branch_name": "refs/heads/master", "committer_date": 1631459759000, "content_id": "db7f86869c688542ee5aea0211a284cf5b8d03d0", "detected_licenses": [ "MIT" ], "directory_id": "412f1d48b38e85ea443be07a2c7fa168e0c4202b", "extension": "py", "fi...
2.3125
stackv2
"""Sample API Client.""" import logging import asyncio import socket from typing import Any, Coroutine, Optional import aiohttp import async_timeout TIMEOUT = 10 _LOGGER: logging.Logger = logging.getLogger(__package__) HEADERS = { "Content-type": "application/json; charset=UTF-8", } ENTRY_POINT = "https://api4...
115
29.55
91
22
714
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0576ea282ea396eb_94e1fa1b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 100, 106, 111 ]
[ null, null, null ]
[ 17, 17, 17 ]
[ 91, 82, 83 ]
2024-11-18T22:54:12.118633+00:00
1,603,095,059,000
c35f2da77c825154fd02760ffaf321608f52ac92
2
{ "blob_id": "c35f2da77c825154fd02760ffaf321608f52ac92", "branch_name": "refs/heads/master", "committer_date": 1603095059000, "content_id": "c90dd168eb3f3766a74a4eb71ee5576a897f7964", "detected_licenses": [ "Apache-2.0" ], "directory_id": "135f7ff73cd34f8701e42f5136cc3b465f53a1d2", "extension": "py"...
2.3125
stackv2
#!/usr/bin/env python # -*- coding:utf-8 -*- # __author__ = Lyon import jwt import datetime import inspect import itertools import traceback import tornado.web from typing import Any from lib.dt import dt from api.status import Code, Message def before_request(f): """ Add global middleware of before request....
335
34.59
112
18
2,591
python
[{"finding_id": "codeql_py/reflective-xss_4a53296bbb4714c9_b1943563", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 107 ]
[ null ]
[ 27 ]
[ 88 ]
2024-11-18T22:54:14.947172+00:00
1,595,126,478,000
cb1e3013a511d73d35715d989a97b25bc96dae7e
4
{ "blob_id": "cb1e3013a511d73d35715d989a97b25bc96dae7e", "branch_name": "refs/heads/master", "committer_date": 1595126478000, "content_id": "e925e41c53a9fcef89e67de85213b984fb25f84d", "detected_licenses": [ "MIT" ], "directory_id": "c86036712ad07c545768d6ee81c5f339aecf2e35", "extension": "py", "fi...
3.828125
stackv2
import numpy as np import random import string def get_input(): """ Get password settings from user """ # Define password length minimum = int(input('Enter minimum password length: ')) maximum = int(input('Enter maximum password length: ')) assert (maximum >= minimum), 'Maximum must be larger tha...
92
31.12
105
13
707
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_17221b816c516ceb_0ddb1b63", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 92 ]
[ null ]
[ 11 ]
[ 14 ]
2024-11-18T22:54:21.936504+00:00
1,547,280,280,000
36b62d06e54ff701fcb53c23e2af071040fb468c
3
{ "blob_id": "36b62d06e54ff701fcb53c23e2af071040fb468c", "branch_name": "refs/heads/master", "committer_date": 1547280280000, "content_id": "9ad40b5b6463d9e38580439551009c650b666feb", "detected_licenses": [ "MIT" ], "directory_id": "a1ecdea1dd433be50e81d8bbd22d21c85462b370", "extension": "py", "fi...
2.5625
stackv2
""" This module contain help routines for the different resources """ import os import subprocess import tempfile from jinja2 import Template import requests from . import celery log_template = Template( "<html>\n" "<body>\n" "<code>\n" "{% for line in lines %}" "{{ line }}<br>\n" "{% endfor ...
55
22.85
73
17
332
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_c65330569ceaa901_7fbcf7c5", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 13 ]
[ 23 ]
[ 16 ]
[ 2 ]
2024-11-18T22:54:28.314391+00:00
1,479,773,565,000
c7e044239e12b3d03524749ce0fb25ee75a62d61
3
{ "blob_id": "c7e044239e12b3d03524749ce0fb25ee75a62d61", "branch_name": "refs/heads/master", "committer_date": 1479773565000, "content_id": "8150c932f7d4b9c8a3f1dbc7868928347277bab0", "detected_licenses": [ "MIT" ], "directory_id": "cdd6c8ec109d23137c8cd2d42395c3bf0646676d", "extension": "py", "fi...
2.703125
stackv2
import re from django.core.validators import RegexValidator, validate_integer from django.utils.deconstruct import deconstructible @deconstructible class TimecodeValidator(RegexValidator): regex = re.compile(r"\d{2}:\d{2}:\d{2}") message = "Invalid timecode. Format: 00:00:00" @deconstructible class IMDBUrl...
31
26.06
93
10
224
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_011cc000e6f274fc_f90c2cdb", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'imdb.com/title/', so it might match...
1
true
[ "CWE-020" ]
[ "py/incomplete-hostname-regexp" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'imdb.com/title/', so it might match more hosts than expected." ]
[ 15 ]
[ null ]
[ 26 ]
[ 54 ]
2024-11-18T22:54:31.530263+00:00
1,604,653,091,000
757bbf391f2ea71fe7b999eb6dacceb6cf5a8c4f
3
{ "blob_id": "757bbf391f2ea71fe7b999eb6dacceb6cf5a8c4f", "branch_name": "refs/heads/master", "committer_date": 1604653091000, "content_id": "f08af8c0d72bff608707ae10c2f886252efec84b", "detected_licenses": [ "MIT" ], "directory_id": "34ba661c593167e2aaa4da6cda5a638524ea8823", "extension": "py", "fi...
2.921875
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- """ Sample script to back up all iRMC settings via iRMC Redfish API in Fujitsu PRIMERGY [Usage] - Show iRMC settings on console $ python backup_irmc_config.py -i 192.168.10.10 -u admin -p admin - Save iRMC settings to a file $ python backup_irmc_config.py -...
84
24.75
100
15
580
python
[{"finding_id": "codeql_py/request-without-cert-validation_564c066f5ee46299_d2ebdafd", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 35 ]
[ 40 ]
[ 16 ]
[ 6 ]
2024-11-18T22:54:31.776424+00:00
1,599,058,859,000
5ae379cfad076157c4be1085848233bc87866b22
3
{ "blob_id": "5ae379cfad076157c4be1085848233bc87866b22", "branch_name": "refs/heads/master", "committer_date": 1599058859000, "content_id": "a3c9d792dc0b3a2f68bf149a0cad1e4d5529322a", "detected_licenses": [ "MIT" ], "directory_id": "7da22c9ab95df4f2ae93c6f30f57158afbd6ef55", "extension": "py", "fi...
2.703125
stackv2
# Copyright 2013-2014 James P Goodwin bkp@jlgoodwin.com """ module to implement shared config functions for the bkp tool """ import os import sys def save_config( bkp_config, config_file, for_restart = False ): """ save the configuration to the file object passed as a parameter """ print("bucket =", bkp_config...
63
50.25
143
17
791
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ac7d703aa0a927ae_da8dc680", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 16 ]
[ null ]
[ 29 ]
[ 55 ]
2024-11-18T20:55:07.292088+00:00
1,681,840,460,000
86230f98338b254abd0b75088192a346d19a3155
4
{ "blob_id": "86230f98338b254abd0b75088192a346d19a3155", "branch_name": "refs/heads/master", "committer_date": 1681840460000, "content_id": "adad1b8c2e68f69a6151c3bedd1f116a5286df9b", "detected_licenses": [ "MIT" ], "directory_id": "b1829737cb9a90c11b9f1af5aec412e2ebf74de8", "extension": "py", "fi...
3.9375
stackv2
class employee: def __init__(self, first, last, salary): self.first = first self.last = last self.email = first + "." + last + "@email.com" self.salary = salary def fullname(self): return '{} {}'.format(self.first, self.last) # for debuging or logging (mostly for ...
39
22.44
84
12
242
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e842b4bd8a1ca175_1700f5fe", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 35, 38 ]
[ null, null ]
[ 7, 7 ]
[ 9, 12 ]
2024-11-18T20:55:09.940658+00:00
1,655,799,592,000
eddf1195f26fb94c73575ae6ae3b99e1b84d795d
2
{ "blob_id": "eddf1195f26fb94c73575ae6ae3b99e1b84d795d", "branch_name": "refs/heads/master", "committer_date": 1655799592000, "content_id": "36e8b0e54fdb28880e72da583c90c67ccfcd78da", "detected_licenses": [ "Apache-2.0" ], "directory_id": "cd274282f9e547e5bb9b6519cf050196f8d51b45", "extension": "py"...
2.390625
stackv2
from flask import Flask, request, Response import cherrypy import json import os import logging import paste.translogger app = Flask(__name__) logger = logging.getLogger("datasink-service") @app.route('/', methods=['GET']) def root(): return Response(status=200, response="I am Groot!") @app.route('/receiver'...
72
29.29
87
14
499
python
[{"finding_id": "codeql_py/path-injection_32d39f9fbd1799f5_cf7db4cb", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
2
true
[ "CWE-022", "CWE-117" ]
[ "py/path-injection", "py/log-injection" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 34, 33 ]
[ null, null ]
[ 19, 21 ]
[ 27, 81 ]
2024-11-18T21:07:41.160889+00:00
1,557,167,669,000
d4d96d0e58d1a1160875959c39f73fa72cc5ea7d
2
{ "blob_id": "d4d96d0e58d1a1160875959c39f73fa72cc5ea7d", "branch_name": "refs/heads/master", "committer_date": 1557167669000, "content_id": "bb56848389d58602e56179496884ebe3f3298c8c", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "303fa0ec9c09811154b311d7ad6d2defcf40d027", "extension": "p...
2.3125
stackv2
import requests import json from flask import request, Response, stream_with_context, current_app as app, jsonify from flask_restplus import Resource, Namespace from flask_jwt_extended import jwt_required, get_jwt_claims api = Namespace('services', description='services') batch_server = 'http://batch:5010/api' datas...
72
31
130
15
496
python
[{"finding_id": "codeql_py/reflective-xss_cb81f96583878b26_49457051", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability d...
2
true
[ "CWE-079", "CWE-918" ]
[ "py/reflective-xss", "py/partial-ssrf" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability due to a [user-provided value](2).\nCross-site scripting vulnerability due to a [user-provided value](3).\nCross-site scripting vulnerability due to a [user-provided value](4).", "Part of the URL of this req...
[ 34, 16 ]
[ null, 23 ]
[ 29, 16 ]
[ 41, 27 ]
2024-11-18T21:07:43.485237+00:00
1,563,364,412,000
11d96e999da2a6bf9c0f6f7994e244a95f111d5b
2
{ "blob_id": "11d96e999da2a6bf9c0f6f7994e244a95f111d5b", "branch_name": "refs/heads/master", "committer_date": 1563364412000, "content_id": "738b2dcf3818b05ce1605b2dcfc81a9898a6005c", "detected_licenses": [ "MIT" ], "directory_id": "be11bd2ebd5cac7c765516c866faf65b82e0086d", "extension": "py", "fi...
2.390625
stackv2
""" application.py - creates a Flask app instance and registers the database object """ from flask import Flask, Blueprint, jsonify, request, current_app, render_template, Response from flask_mail import Mail, Message from flask_cors import CORS from flask_admin import Admin from flask_login import LoginManager, curre...
79
29.9
92
15
544
python
[{"finding_id": "codeql_py/reflective-xss_42ec0cb4e0c16d23_25ca81a8", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
2
true
[ "CWE-079", "CWE-918" ]
[ "py/reflective-xss", "py/partial-ssrf" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 77, 77 ]
[ null, null ]
[ 16, 16 ]
[ 74, 69 ]
2024-11-18T21:33:03.677131+00:00
1,550,867,062,000
77fda715492d6716cc6acd35fcfdeb1b26aadecc
2
{ "blob_id": "77fda715492d6716cc6acd35fcfdeb1b26aadecc", "branch_name": "refs/heads/main", "committer_date": 1550867062000, "content_id": "7ec9635270ccddf5a02880c93479179adfe683f4", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "7f15ff62329262b9de8cb27b31ebf5d8bbed2fd9", "extension": "py"...
2.40625
stackv2
#! /usr/bin/env python from nda_aws_token_generator import * import getpass web_service_url = 'https://ndar.nih.gov/DataManager/dataManager' #username = raw_input('Enter your NIMH Data Archives username:') #password = getpass.getpass('Enter your NIMH Data Archives password:') username = "FILL_IN_YOUR_NDA_USERNAME" ...
39
28.64
72
11
284
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_14eb07b2636fa40c_d9b83e20", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 16 ]
[ 23 ]
[ 7 ]
[ 26 ]
2024-11-18T21:33:24.639955+00:00
1,571,337,782,000
63d135d27c0d30bf2fed00b1a01d75eca41e914a
4
{ "blob_id": "63d135d27c0d30bf2fed00b1a01d75eca41e914a", "branch_name": "refs/heads/master", "committer_date": 1571337782000, "content_id": "71fa523d40c6e5e959d108433c8ff7dad34c5397", "detected_licenses": [ "Apache-2.0" ], "directory_id": "7fada1dd14df5d4c467a77e88467407a7c507f1d", "extension": "py"...
3.640625
stackv2
#!/usr/bin/env python """ This program generates passwords based on three arguments passed: * seed - which can be any string, eg. website domain * salt - salt, which together with seed provides X and Y position for char matrix * length - which is simply the length of generated password Sample usage: ./password_generat...
62
23.39
69
12
398
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_aad1e02117d9db3d_b825724d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 62 ]
[ null ]
[ 11 ]
[ 29 ]
2024-11-18T21:55:40.156372+00:00
1,536,544,411,000
dad6fe1062560d53f1d462d4bf65246fcde639b7
3
{ "blob_id": "dad6fe1062560d53f1d462d4bf65246fcde639b7", "branch_name": "refs/heads/master", "committer_date": 1536544411000, "content_id": "57f14db525fde851d152671ae25f0a2910731f60", "detected_licenses": [ "MIT" ], "directory_id": "6d3b6f1b1214ab2c111659ce89f8f14765e5f8dc", "extension": "py", "fi...
3.28125
stackv2
# !/usr/bin/python VERSION = 1.3 SECRET_KEY = 'secret' """ Password generator using a concept from this interesting article: http://charlesleifer.com/blog/creating-a-personal-password-manager/ basically the article states that a good way to generate passwords is to use the account type as a salt for a hash and fr...
119
29.61
103
14
796
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_220cae989a1dd822_c8b7ce97", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 89 ]
[ null ]
[ 31 ]
[ 65 ]
2024-11-18T22:39:38.044477+00:00
1,617,374,312,000
6d15a316f7f034a88f25b3caea74cd7c0692b231
3
{ "blob_id": "6d15a316f7f034a88f25b3caea74cd7c0692b231", "branch_name": "refs/heads/master", "committer_date": 1617374312000, "content_id": "c176540496192bd0f59629b414b3ed4847c0a8f8", "detected_licenses": [ "MIT" ], "directory_id": "ae76394077a12fbd715545501e5a21457019fd2b", "extension": "py", "fi...
3.078125
stackv2
# Getting Reddit Client ID and Client Secret import config reddit_credentials = config.reddit_credentials REDDIT_CLIENT = reddit_credentials['client_id'] REDDIT_SECRET = reddit_credentials['client_secret'] REDDIT_USER_PW = reddit_credentials['user_pw'] REDDIT_USER_NAME= reddit_credentials['username'] # Testing if the...
95
35.55
139
14
886
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c8e0929dff0e6fd9_5e55b9c3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 12 ]
[ null ]
[ 7 ]
[ 96 ]
2024-11-18T22:54:56.970058+00:00
1,673,106,838,000
4d2eb3d45d2041fb88dae2e5cdd827ab151650bf
3
{ "blob_id": "4d2eb3d45d2041fb88dae2e5cdd827ab151650bf", "branch_name": "refs/heads/master", "committer_date": 1673106838000, "content_id": "2b98eb915903b71ca11754b8e012599842469408", "detected_licenses": [ "Apache-2.0", "BSD-3-Clause" ], "directory_id": "ee2513aae5bed60e3ede160cb9623c611fe0bc65",...
2.984375
stackv2
# Copyright (C) 2015 Grigorios G. Chrysos # available under the terms of the Apache License, Version 2.0 import os from os import system, listdir, walk from os.path import isdir, isfile, sep, join, getmtime import shutil import errno from glob import glob from subprocess import check_output from pathlib import Path ...
306
38.08
108
19
2,911
python
[{"finding_id": "codeql_py/tarslip_6d41d998551e8bd0_c1b89e6c", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 217 ]
[ null ]
[ 9 ]
[ 18 ]
2024-11-18T20:56:49.827487+00:00
1,518,315,165,000
7a27ead6f2889b3dab80733c8aae2c308bf56022
2
{ "blob_id": "7a27ead6f2889b3dab80733c8aae2c308bf56022", "branch_name": "refs/heads/master", "committer_date": 1518315165000, "content_id": "f916f6a8f67bd1d26554e4450e1a211a66d63cde", "detected_licenses": [ "MIT" ], "directory_id": "4487f5c9b2d8f8fe51fe0ca6b9c32e86b039e194", "extension": "py", "fi...
2.359375
stackv2
#!/usr/bin/env python2.7 import threading, wx, time, urllib2, sys, os, tarfile, shutil, hashlib, importlib os.chdir(os.path.dirname(os.path.realpath(__file__))) class MainFrame(wx.Frame): def __init__(self, parent, ID, title, missing_modules): wx.Frame.__init__(self, parent, ID, title, size=(300,150)) ...
171
31.05
101
18
1,272
python
[{"finding_id": "codeql_py/tarslip_b6d23184d33d7777_4c0e8079", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially untrusted source](1)." ]
[ 67 ]
[ null ]
[ 13 ]
[ 16 ]
2024-11-18T20:56:53.367462+00:00
1,671,582,471,000
81f8f692689416c6de561e5becd89052fa3b1eb9
2
{ "blob_id": "81f8f692689416c6de561e5becd89052fa3b1eb9", "branch_name": "refs/heads/main", "committer_date": 1671582471000, "content_id": "d42ab4e9f4ec7db81c3c869b052cc80837c32421", "detected_licenses": [ "MIT" ], "directory_id": "8ddf316c56ac4d286da71beed5ac5fe69aecc068", "extension": "py", "file...
2.453125
stackv2
import requests from requests.auth import HTTPBasicAuth import json from .directories import Directory from .devices import Device from .exceptions import IMIAuthError, IMIConnectionError import sys requests.packages.urllib3.disable_warnings() class IMI: def __init__( self, server = None, ...
105
42.55
126
15
1,054
python
[{"finding_id": "codeql_py/request-without-cert-validation_c626bed8d0594dd2_b5bfb2cf", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1) by [this value](2)." ]
[ 43 ]
[ null ]
[ 20 ]
[ 116 ]
2024-11-18T20:56:57.155256+00:00
1,675,284,861,000
983dcfa5999ba72a2ebb929412a96851254f722e
3
{ "blob_id": "983dcfa5999ba72a2ebb929412a96851254f722e", "branch_name": "refs/heads/master", "committer_date": 1675284861000, "content_id": "de66a941a971f878c173b9cbb58e2ae480746c41", "detected_licenses": [ "MIT" ], "directory_id": "c6c8dc7224e554fdb3fb0e1b34c69ef09ebc98ab", "extension": "py", "fi...
2.8125
stackv2
# -*- coding: utf-8 -*- """pybooru.moebooru This module contains Moebooru class for access to API calls, authentication, build url and return JSON response. Classes: Moebooru -- Moebooru classs. """ # __furute__ imports from __future__ import absolute_import # External imports import hashlib # Pybooru imports ...
158
37.41
80
19
1,358
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_ad0bddf9860a83ff_106b0865", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 125 ]
[ null ]
[ 21 ]
[ 48 ]
2024-11-18T22:43:34.129845+00:00
1,482,335,571,000
4f6828fe66be53524e3e0a78f02e6896cc5be343
3
{ "blob_id": "4f6828fe66be53524e3e0a78f02e6896cc5be343", "branch_name": "refs/heads/master", "committer_date": 1482335571000, "content_id": "1fc8550b7e9da8fc416eeb57e64940eff95bbc13", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "7a8039246c08b546408d2b9ec2802fa0543a696b", "extension": "p...
2.625
stackv2
import os import pandas as pd import re import matplotlib.pyplot as plt from CCA import ExpressionCCA class CrossValCCA(object): def __init__(self, raw_data_path, uv_dir, input_filepath, path_to_R_script='../../code/sparse_CCA.R', ): self.raw_data_path =...
135
34.52
124
15
1,091
python
[{"finding_id": "codeql_py/overly-large-range_cca19ba791fb5b7f_01acd819", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 63, 63 ]
[ null, null ]
[ 26, 46 ]
[ 29, 49 ]
2024-11-18T23:10:42.641677+00:00
1,510,942,894,000
8f0196f60b25a8574c6ecd703e26de68b94d1759
3
{ "blob_id": "8f0196f60b25a8574c6ecd703e26de68b94d1759", "branch_name": "refs/heads/master", "committer_date": 1510942894000, "content_id": "788e822da19fea958d5064d06fe262303e007bfa", "detected_licenses": [ "MIT" ], "directory_id": "6ad437a72334ace247da599d22a71eca4d3ff020", "extension": "py", "fi...
2.78125
stackv2
from .database import Database, dec_to_float_converter import re def main(): db = Database({'conv': dec_to_float_converter()}) # Populate Array with all mobile values from Phoenix DB result = db.query( "SELECT * FROM dosomething.field_data_field_mobile WHERE field_mobile_value is NOT NULL") ...
59
47.37
150
20
568
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_88db6f2ac05d4057_6ae0b9dc", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (p...
[ 31, 48, 53 ]
[ null, null, null ]
[ 27, 27, 19 ]
[ 39, 39, 70 ]
2024-11-18T23:10:46.843399+00:00
1,676,139,610,000
1f4d4d229f4e80d13d46a5b1fe2244ae43a38fc3
3
{ "blob_id": "1f4d4d229f4e80d13d46a5b1fe2244ae43a38fc3", "branch_name": "refs/heads/master", "committer_date": 1676139610000, "content_id": "8e3ef4af3e0dfdbecf84616e468460faefb6ad1c", "detected_licenses": [ "MIT" ], "directory_id": "255e19ddc1bcde0d3d4fe70e01cec9bb724979c9", "extension": "py", "fi...
2.765625
stackv2
import base64, hashlib from ctypes import CDLL, POINTER, Structure, create_string_buffer, byref from ctypes.util import find_library Security = CDLL(find_library('Security')) # Importing this via C because haven't figured out how to mix in pyObjc version yet c_CoreFoundation = CDLL(find_library('CoreFoundation')) cla...
51
41.31
120
18
538
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_4241d32af872e094_13231cbc", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (certificate)](1) is used in a hashing algorithm (SHA1) that is i...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (certificate)](1) is used in a hashing algorithm (SHA1) that is insecure.\n[Sensitive data (certificate)](2) is used in a hashing algorithm (SHA1) that is insecure." ]
[ 39 ]
[ null ]
[ 25 ]
[ 34 ]
2024-11-18T23:25:01.933028+00:00
1,610,462,324,000
9d8a6abe77405aec7ccc19c2b24000b62c0be5de
2
{ "blob_id": "9d8a6abe77405aec7ccc19c2b24000b62c0be5de", "branch_name": "refs/heads/main", "committer_date": 1610462324000, "content_id": "9c2bf133fa0020fff06362ff2e3c2cc64bc78662", "detected_licenses": [ "MIT" ], "directory_id": "cc915f1af58f78bb7769e99b54605d573a8c5426", "extension": "py", "file...
2.359375
stackv2
import sys from os import walk import imghdr import csv import argparse import logging from sqlalchemy import exc from flask import Flask, redirect, url_for, request from flask import render_template from flask import send_file from flask_sqlalchemy import SQLAlchemy app = Flask(__name__) app.config['SEND_FILE_MAX_A...
132
31.99
166
28
1,176
python
[{"finding_id": "codeql_py/path-injection_3e553e65570625e4_6f8c0b7a", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 103 ]
[ null ]
[ 22 ]
[ 32 ]
2024-11-18T21:33:30.502829+00:00
1,389,728,018,000
2e10bb264c5d2a7a4f0d77c211ac7f9b8331a919
3
{ "blob_id": "2e10bb264c5d2a7a4f0d77c211ac7f9b8331a919", "branch_name": "refs/heads/master", "committer_date": 1389728018000, "content_id": "e8e9b78599113ced9dc09985326b366d741c7264", "detected_licenses": [ "Unlicense" ], "directory_id": "b19d99f082a013b92f131443433e5fe683d7e136", "extension": "py",...
2.6875
stackv2
#!/usr/bin/env python import re import sys from youtube_dl.extractor import YoutubeIE from youtube_dl.utils import ( compat_urllib_request ) class Downloader(object): def __init__(self): self.params = {} def report_warning(self, msg): sys.stderr.write(msg + u'\n') def to_screen(sel...
36
22.81
76
13
216
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_e50f2751f75de11c_356f8782", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'ytimg.com/', so it might match more...
1
true
[ "CWE-020" ]
[ "py/incomplete-hostname-regexp" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'ytimg.com/', so it might match more hosts than expected." ]
[ 32 ]
[ null ]
[ 23 ]
[ 48 ]
2024-11-18T21:33:36.931028+00:00
1,593,918,590,000
2d8ec468f4a13de00ec0b96dd605b0e399539ff2
2
{ "blob_id": "2d8ec468f4a13de00ec0b96dd605b0e399539ff2", "branch_name": "refs/heads/master", "committer_date": 1593918590000, "content_id": "662f63570897543e3ad111215cbcdf0a751e6eb4", "detected_licenses": [ "Apache-2.0" ], "directory_id": "2d08dba1ce740b657b6ecbba57fcbde7d18f0ecb", "extension": "py"...
2.5
stackv2
import gevent from gevent import monkey, pool from lxml import etree monkey.patch_all() import requests from proxy.save_proxy import SaveProxies from tools.logger import Logger logger = Logger(__name__).logger class CheckProxies(object): def __init__(self): self.http_url = 'http://www.net.cn/static/cu...
72
29.4
132
18
569
python
[{"finding_id": "codeql_py/request-without-cert-validation_9f7794fc243f6c8c_affa1223", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 43 ]
[ null ]
[ 19 ]
[ 101 ]
2024-11-18T21:33:42.354024+00:00
1,580,305,807,000
792a6ff972c875dd61df615e86a3c025d8df262d
3
{ "blob_id": "792a6ff972c875dd61df615e86a3c025d8df262d", "branch_name": "refs/heads/master", "committer_date": 1580305807000, "content_id": "d23c2c4c249263537dcdd552d384879aaf3084bf", "detected_licenses": [ "MIT" ], "directory_id": "9c51e396480d8139a2dc25ff338dae0a23100a8a", "extension": "py", "fi...
2.75
stackv2
import requests from bs4 import BeautifulSoup as bs from flask import Flask, request # Starts flask app app = Flask(__name__) def parse(html): '''Parse the html to retrieve ingredients and instructions Arguments: html {String} -- a giant string of the page source Return: results {triplet} -- a tiplet consis...
68
21.85
94
16
384
python
[{"finding_id": "codeql_py/full-ssrf_228773e077da853f_b3e303d7", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
1
true
[ "CWE-918" ]
[ "py/full-ssrf" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1)." ]
[ 48 ]
[ null ]
[ 9 ]
[ 29 ]
2024-11-18T23:15:51.449625+00:00
1,496,913,682,000
d6f4538e6a9489fdb0dc5a5aa0aae127b40aef17
3
{ "blob_id": "d6f4538e6a9489fdb0dc5a5aa0aae127b40aef17", "branch_name": "refs/heads/master", "committer_date": 1496913682000, "content_id": "fa4cf21314080463d0c6aef4e6bdbbd571e1baa1", "detected_licenses": [ "MIT" ], "directory_id": "e2cefc848c417334f7ba12d2a3875dfb55b151be", "extension": "py", "fi...
2.765625
stackv2
import random import string import hashlib import s def make_salt(): return "".join(random.choice(string.letters) for i in range(5)) def hash_pw(user, pw, salt=""): salt = make_salt() if salt == "" else salt h = hashlib.sha256(s.secret + user + pw + salt).hexdigest() return "%s|%s" % (h, salt) def...
33
21.33
67
14
211
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_509faa68ad3eab77_28162873", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 25 ]
[ null ]
[ 21 ]
[ 45 ]
2024-11-18T23:15:54.306540+00:00
1,565,279,621,000
d65209ea3fd2a200bd6ab884ba95ea77c4383a55
2
{ "blob_id": "d65209ea3fd2a200bd6ab884ba95ea77c4383a55", "branch_name": "refs/heads/master", "committer_date": 1565279621000, "content_id": "10eaad9fac91fea63e4ad6fa74c444b63b70674e", "detected_licenses": [ "MIT" ], "directory_id": "ed49aff8d5b2fbda13c36a32100ed2157467b559", "extension": "py", "fi...
2.46875
stackv2
import os import sys import logging import multiprocessing import time from flask import Flask, request, jsonify from flask_cors import CORS import io from io import BytesIO from PIL import Image import cv2 import numpy as np from worker import get_model_api # define the app app = Flask(__name__) CORS(app) # neede...
132
23.57
90
13
809
python
[{"finding_id": "codeql_py/flask-debug_4f4f9bd40b74b11c_0e8a909b", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
4
true
[ "CWE-215", "CWE-022", "CWE-117", "CWE-117" ]
[ "py/flask-debug", "py/path-injection", "py/log-injection", "py/log-injection" ]
[ "HIGH", "HIGH", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-p...
[ 132, 55, 66, 56 ]
[ null, null, null, null ]
[ 5, 15, 26, 22 ]
[ 59, 23, 63, 46 ]
2024-11-18T23:36:59.591980+00:00
1,430,453,001,000
50112d6d638f758ffe6cdc65ee2f0397437ca3d0
3
{ "blob_id": "50112d6d638f758ffe6cdc65ee2f0397437ca3d0", "branch_name": "refs/heads/master", "committer_date": 1430453001000, "content_id": "147c9944d16476cd1a85cda3d88c5f2fec871c8c", "detected_licenses": [ "MIT" ], "directory_id": "5cb934a22e2eea6c723a409198b5607caf895b51", "extension": "py", "fi...
2.6875
stackv2
import os import tornado.ioloop import tornado.web import tornado.autoreload from tornado.options import define, options, parse_command_line from metar.Metar import Metar import requests from aloft import winds_aloft BASE_PATH = os.path.dirname(os.path.realpath(__file__)) BASE_ADDR = 'http://weather.noaa.gov/pub/dat...
76
24.68
81
15
501
python
[{"finding_id": "codeql_py/partial-ssrf_15fa2677771e86a8_4006fe28", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
2
true
[ "CWE-918", "CWE-918" ]
[ "py/partial-ssrf", "py/partial-ssrf" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 20, 22 ]
[ null, null ]
[ 8, 9 ]
[ 60, 67 ]
2024-11-18T21:14:12.672578+00:00
1,654,964,971,000
bd12fb9c5b5f188c8f30047487445aab791c32dc
2
{ "blob_id": "bd12fb9c5b5f188c8f30047487445aab791c32dc", "branch_name": "refs/heads/master", "committer_date": 1654964971000, "content_id": "4a0fa16511aa82eb13fbd6b411c41d22ab986bc1", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "3d673506e870b028bd3d3c977965d262dab823a7", "extension": "p...
2.46875
stackv2
#!/usr/bin/env python3 # -*- coding: UTF-8 -*- import datetime import hashlib import logging import time import json import os from gettext import gettext as _ from social_sqlalchemy.storage import JSONType, SQLAlchemyMixin from sqlalchemy import Boolean, Column, DateTime, ForeignKey, Integer, String from sqlalchemy....
316
29.73
101
19
2,401
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_bc88a67d526a29ff_47dd105d", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.",...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.", "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorith...
[ 144, 149 ]
[ null, null ]
[ 25, 29 ]
[ 42, 57 ]
2024-11-18T21:57:30.288570+00:00
1,684,855,168,000
62f026a32e0a5810c091f5d96999eb4eebd1568c
3
{ "blob_id": "62f026a32e0a5810c091f5d96999eb4eebd1568c", "branch_name": "refs/heads/master", "committer_date": 1684855168000, "content_id": "8966543d57bb111718b12255eabcd235fe6d8388", "detected_licenses": [ "Apache-2.0" ], "directory_id": "9ba8cae790007f12664c6e4432dab007600a7e61", "extension": "py"...
2.6875
stackv2
## Author: John Pierce ## Contributor: Rod Soto from paramiko import SSHClient, AutoAddPolicy, RSAKey import argparse import os parser = argparse.ArgumentParser() parser.add_argument("-f", "--file", help="Text file containing one filename per line.") parser.add_argument("-n", "--name", help="The name of a single fil...
62
33
119
11
508
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_77c312c893966d9c_23eddf86", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 39 ]
[ null ]
[ null ]
[ 49 ]
2024-11-18T21:57:58.314982+00:00
1,659,274,852,000
cfaab04ee1d77e9d90fb86bd807a302c29809a3e
3
{ "blob_id": "cfaab04ee1d77e9d90fb86bd807a302c29809a3e", "branch_name": "refs/heads/master", "committer_date": 1659274852000, "content_id": "9e90671ca2083a7b44930194f535b30334d47b73", "detected_licenses": [ "MIT" ], "directory_id": "e15c230fe218cf0dbf3d93131736e1f2386bff9a", "extension": "py", "fi...
2.578125
stackv2
from .base import Patient import numpy as np from scipy.integrate import ode import pandas as pd from collections import namedtuple import logging import pkg_resources logger = logging.getLogger(__name__) Action = namedtuple("patient_action", ['CHO', 'insulin']) Observation = namedtuple("observation", ['Gsub']) PATI...
316
31.07
92
23
2,964
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9bf0be3a9b12cf8f_4a1cabb2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 199 ]
[ 200 ]
[ 26 ]
[ 35 ]
2024-11-18T21:58:04.128562+00:00
1,565,310,300,000
c4010a495c24ddd18e0767ffd4617997204f5155
3
{ "blob_id": "c4010a495c24ddd18e0767ffd4617997204f5155", "branch_name": "refs/heads/master", "committer_date": 1565310300000, "content_id": "98620f3c74b2ef91ae9b614e9020d7a77aea81eb", "detected_licenses": [ "MIT" ], "directory_id": "fd6fb448af7777b2d54713a24457e6f187aaf09b", "extension": "py", "fi...
3.078125
stackv2
''' Created on Aug 11, 2014 @author: Sai Chaitanya ''' # Run the program by passing an argument <abc.py> arg_url # parse the url and search for a string/url and get the list of urls # append the urls to domain name to get the final result import sys from bs4 import BeautifulSoup import re from urllib2 import urlopen ...
64
58.28
168
20
826
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_0b76f03e6f4b0903_c3ba2e3d", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'stanford.edu/', so it might match m...
1
true
[ "CWE-020" ]
[ "py/incomplete-hostname-regexp" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'stanford.edu/', so it might match more hosts than expected." ]
[ 59 ]
[ null ]
[ 77 ]
[ 104 ]
2024-11-18T21:58:37.062500+00:00
1,481,346,338,000
3b4a18a10464bf003eba2151f103fbd753022fcb
2
{ "blob_id": "3b4a18a10464bf003eba2151f103fbd753022fcb", "branch_name": "refs/heads/master", "committer_date": 1481346338000, "content_id": "9474c83816abe06a3ff7f4c1895688301f400de6", "detected_licenses": [ "MIT" ], "directory_id": "abbf0387c2631171c90fd90a4582ba8de3457864", "extension": "py", "fi...
2.484375
stackv2
#!/usr/bin/env python3 # -*- coding:utf-8 -*- # date: 2016/12/10 from os import mkdir, path, chdir, getcwd from re import search,sub import requests from bs4 import BeautifulSoup domain = 'http://cloud.oracleoaec.com' login_url = "{domain}{uri}".format(domain=domain, uri='/user/login') # 替换账号密码为你自己的 # username = '1...
120
31.94
80
27
974
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_c2601c8151c399b4_dac01bd6", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 97 ]
[ null ]
[ 45 ]
[ 69 ]
2024-11-18T23:10:58.573818+00:00
1,573,411,223,000
4712f13276c3335a1d741070a90e69d08896b823
2
{ "blob_id": "4712f13276c3335a1d741070a90e69d08896b823", "branch_name": "refs/heads/master", "committer_date": 1573411223000, "content_id": "2df522ceb9c3b2c5aea4b93768e9f04389bf20b2", "detected_licenses": [ "MIT" ], "directory_id": "3ebedf6b10e33df77c3390e781bfe326b892e4bb", "extension": "py", "fi...
2.34375
stackv2
"""Main server script for ColorDJ.""" import io import requests from flask import Flask, request from twilio.twiml.messaging_response import MessagingResponse from colortovision import get_image_attributes, get_playlist_ids from playlist import make_playlist app = Flask(__name__) @app.route("/sms", methods=['GET'...
42
26.45
76
13
245
python
[{"finding_id": "codeql_py/flask-debug_ec521d128e530d17_02efa44a", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-918" ]
[ "py/flask-debug", "py/full-ssrf" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "The full URL of this request depends on a [user-provided value](1)." ]
[ 42, 23 ]
[ null, null ]
[ 5, 17 ]
[ 24, 40 ]
2024-11-18T23:11:00.061837+00:00
1,655,761,753,000
469b17d79100a3005ea742e9dfe085050e3d7593
2
{ "blob_id": "469b17d79100a3005ea742e9dfe085050e3d7593", "branch_name": "refs/heads/master", "committer_date": 1655761753000, "content_id": "065721780191682b341fa835958e12bfa68e7d8b", "detected_licenses": [ "MIT" ], "directory_id": "c60b9f10747be3644a46baa6cfc47b3575e773ec", "extension": "py", "fi...
2.375
stackv2
import os import re import numpy as np class AnyWriter: def __init__(self, template_directory='config/anybody_templates/', output_directory='../output/Anybody/'): self._template_directory = template_directory self._output_directory = output_directory self.mapping = { 'Finger1'...
267
43.94
118
22
2,831
python
[{"finding_id": "codeql_py/redos_9a37b4c6e51fbf5a_0e51a055", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '{{9.' and containing many repetit...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '{{9.' and containing many repetitions of '999.'." ]
[ 46 ]
[ null ]
[ 54 ]
[ 57 ]
2024-11-18T22:05:57.668609+00:00
1,419,946,894,000
64294a5c1a62319f089f6808612ab26fd608f960
3
{ "blob_id": "64294a5c1a62319f089f6808612ab26fd608f960", "branch_name": "refs/heads/master", "committer_date": 1419946894000, "content_id": "99927bf53e54a51f51e6681da1e738e142d6b7ae", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "3f36e29b020abb1c9108bdd760c9ae7419927b5d", "extension": "p...
2.921875
stackv2
from django.db import models import hashlib, datetime class Zip(models.Model): filename = models.CharField(max_length=20, primary_key=True) password = models.CharField(max_length=40) date_created = models.DateTimeField(auto_now_add=True) def encrypt(self, text): h = hashlib.sha1() h.u...
21
29.29
64
11
138
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_bb096fde87c7b34f_df7e81b9", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expen...
[ 13 ]
[ null ]
[ 18 ]
[ 22 ]
2024-11-18T22:05:59.600656+00:00
1,406,107,239,000
0acd352db8265fbee6b568ec2552cd14d02160a1
3
{ "blob_id": "0acd352db8265fbee6b568ec2552cd14d02160a1", "branch_name": "refs/heads/master", "committer_date": 1406107239000, "content_id": "d907904c152eeecb3b4f19d9e034489baf2cc952", "detected_licenses": [ "Apache-2.0" ], "directory_id": "5c9134d03d75a93f39f05ca6f281ab5073ff82c7", "extension": "py"...
2.65625
stackv2
''' Applications can request permissions on the following items: Photos/video/docs: permissions for photos/videos/docs posted. Articles: permissions for articles. Contact: permissions on the contacts. Profile: permissions on the user's profile. The requested permission can be: read : grant...
358
33.24
107
18
2,715
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_35e8b9cad26d746c_d36e57a9", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (secret)](2) as clear text." ]
[ 87 ]
[ null ]
[ 18 ]
[ 34 ]
2024-11-18T22:36:01.529998+00:00
1,523,139,046,000
f0d28ccab458b87068c2748f8850c1084ed37f12
3
{ "blob_id": "f0d28ccab458b87068c2748f8850c1084ed37f12", "branch_name": "refs/heads/master", "committer_date": 1523139046000, "content_id": "a631176fdc8bae2f06d18c0670ec13446e73afea", "detected_licenses": [ "MIT" ], "directory_id": "30b90919bf243dae64da31ae4af79065fe3f0cd1", "extension": "py", "fi...
2.5625
stackv2
#!/usr/bin/env python ''' File name: database.py Author: Joke Durnez Date created: 02/08/2018 Date last modified: 02/08/2018 Python Version: 2.7 Description: Functions to deal with DICOMs for psychosis project Project: Psychosis ''' import pandas as pd import numpy as np import argparse im...
192
39.16
112
23
1,877
python
[{"finding_id": "codeql_py/tarslip_261a060201b1b9ef_6de199c5", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 44 ]
[ null ]
[ 9 ]
[ 16 ]
2024-11-18T22:48:22.900441+00:00
1,549,116,045,000
29d7b4df30fbff6e155873a824e65e99cf7489ab
3
{ "blob_id": "29d7b4df30fbff6e155873a824e65e99cf7489ab", "branch_name": "refs/heads/master", "committer_date": 1549116045000, "content_id": "a90e0bba7b73543ed2485c1dd919d0c4e3367190", "detected_licenses": [ "Apache-2.0" ], "directory_id": "72504bf6deaadf09635b6dcff2ed8613ee6e2e2d", "extension": "py"...
3.3125
stackv2
class Student(object): gender = "男" def __init__(self, age, name): self.age = age self.name = name stu = Student(20, "antares") print(stu.name) print(stu.age) print(stu.gender) print(Student.gender) # stu.gender = "女" Student.gender = "女" print(stu.gender) print(Student.gender) print(id(stu),id...
17
20.88
40
9
103
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_cf2058f7772d491f_48708585", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
4
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive dat...
[ 10, 11, 14, 15 ]
[ null, null, null, null ]
[ 7, 7, 7, 7 ]
[ 17, 21, 17, 21 ]
2024-11-18T22:49:08.668150+00:00
1,533,612,652,000
0cbdf366433e262e7fb0bfabab65df3e3e0225b2
3
{ "blob_id": "0cbdf366433e262e7fb0bfabab65df3e3e0225b2", "branch_name": "refs/heads/master", "committer_date": 1533612652000, "content_id": "7dd16988384e3e224a92f7aa3479b04f0a7834ac", "detected_licenses": [ "MIT" ], "directory_id": "48b749c0ddd1d212d99cca760d806f46e7ac4dfa", "extension": "py", "fi...
2.75
stackv2
# 作者: Charles # 公众号: Charles的皮卡丘 # youtube视频下载: # -https://www.youtube.com/ import os import re import click import urllib import requests from contextlib import closing ''' Input: -url: 视频地址 -savepath: 视频下载后保存的路径 -app: 在cmd窗口运行还是在Demo中调用该类 Output: -返回下载响应码 ''' class youtube(): def __init__(self): self.header...
74
28.14
136
24
690
python
[{"finding_id": "codeql_py/request-without-cert-validation_2c37a79486b632ca_89c5d758", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 46, 59 ]
[ null, null ]
[ 17, 16 ]
[ 92, 91 ]
2024-11-18T23:26:04.160741+00:00
1,594,850,037,000
6fba82fb5f8520edad88b82be9bd45d5e0c09d9a
4
{ "blob_id": "6fba82fb5f8520edad88b82be9bd45d5e0c09d9a", "branch_name": "refs/heads/master", "committer_date": 1594850037000, "content_id": "87c880af986f7c56dc79bb52c007de88df6687e0", "detected_licenses": [ "MIT" ], "directory_id": "0e61110cb32e384bcb1919602f198cc719f38d5d", "extension": "py", "fi...
3.53125
stackv2
################################### # Dis Python # # Much Use # # Very Doge # ################################### # By C Shi <icydoge@gmail.com> # ################################### KEYBOARD = [[1, 2, 3], [4, 5, 6], [7, 8, 9]] KEYBOARD2 = [[None, None...
54
30.09
169
15
482
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3107a8c1d4824ced_fb43b834", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 53 ]
[ null ]
[ 11 ]
[ 60 ]
2024-11-18T23:26:07.450882+00:00
1,559,683,846,000
e554ce5d89b05a42bd9be82fc1b1f3f3760e939b
3
{ "blob_id": "e554ce5d89b05a42bd9be82fc1b1f3f3760e939b", "branch_name": "refs/heads/master", "committer_date": 1559683846000, "content_id": "cb8c12b6f39669b6d5d1a576a6f598d29ff87bab", "detected_licenses": [ "MIT" ], "directory_id": "f1e0f8662f92ce38626b912dc6026b45d6dbe50e", "extension": "py", "fi...
2.671875
stackv2
import os import hashlib import binascii import hmac import base64 import sqlite3 from sqlite3 import Error, IntegrityError, OperationalError from manager import db_path from db.injection import escape_sql_injection def valid_login(username, password, saved_hmac): conn = sqlite3.connect(db_path) crsr = con...
126
32.7
118
14
984
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_5a8aa5105f67807b_4d08c6b1", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e...
[ 28 ]
[ null ]
[ 34 ]
[ 49 ]
2024-11-18T23:26:17.485139+00:00
1,581,256,328,000
9aaaeb39859bd03287e1ecfb62a178ededfaf7ae
2
{ "blob_id": "9aaaeb39859bd03287e1ecfb62a178ededfaf7ae", "branch_name": "refs/heads/master", "committer_date": 1581256328000, "content_id": "0849b2cd70452faa3f84834b7be9a05bc2e4bff9", "detected_licenses": [ "Apache-2.0" ], "directory_id": "137ed7a1f413d11fac6e559039267fd0b1bad6b1", "extension": "py"...
2.390625
stackv2
from flask import Flask, jsonify, request from flask_restful import Api, Resource from pymongo import MongoClient import bcrypt import numpy import subprocess import json import requests import pdb app = Flask(__name__) api = Api(app) client = MongoClient('mongodb://localhost:27017') # client = MongoClient('mongodb:/...
142
27.2
101
15
840
python
[{"finding_id": "codeql_py/full-ssrf_c93c6da3d0f7c83c_bdeeb7d1", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
1
true
[ "CWE-918" ]
[ "py/full-ssrf" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1)." ]
[ 82 ]
[ null ]
[ 27 ]
[ 50 ]
2024-11-18T22:27:25.404812+00:00
1,693,205,634,000
0a6f6baeb15bdd97890636ae1c09a4eb44255bc1
2
{ "blob_id": "0a6f6baeb15bdd97890636ae1c09a4eb44255bc1", "branch_name": "refs/heads/main", "committer_date": 1693205634000, "content_id": "e47ae096f2e5557d5ac1e98ab3da6d034edd4dc8", "detected_licenses": [ "MIT" ], "directory_id": "7eb7aa60a927cadf83cef5dee105c5ba6a159f3d", "extension": "py", "file...
2.40625
stackv2
#create LDIF file from config.ini import configparser import random config = configparser.ConfigParser(strict=False) config.read('config.ini') #read global settings configuration=config['globalsettings'] useRandomOrganizations=configuration['useRandomOrganizationAndUsers'] if useRandomOrganizations == "yes": #g...
236
28.1
112
14
1,684
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6b16ea4d726abf49_f7f3996c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 143, 81, 91 ]
[ null, null, 101 ]
[ 11, 7, 7 ]
[ 15, 20, 4 ]
2024-11-18T22:27:41.553033+00:00
1,523,775,755,000
4f08ed6443cf3c2091e5857aa66c95f1ba1236fa
3
{ "blob_id": "4f08ed6443cf3c2091e5857aa66c95f1ba1236fa", "branch_name": "refs/heads/master", "committer_date": 1523775755000, "content_id": "24c68dcc1858624c6b6be36c61b2a510afbe081b", "detected_licenses": [ "MIT" ], "directory_id": "cfab087990e40fcad225feea8e7b7f49b55fe214", "extension": "py", "fi...
2.609375
stackv2
import sys import paramiko # Define global variables ssh_ip = '192.168.1.115' ssh_user = 'root' ssh_pwd = 'toor' def ssh_command(ip, user, passwd, command): client = paramiko.SSHClient() #client.load_host_keys('...') client.set_missing_host_key_policy(paramiko.AutoAddPolicy) try: client.c...
34
24.06
64
14
216
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_ec2ec3715b695bad_33cbd5d1", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 13 ]
[ null ]
[ 5 ]
[ 63 ]
2024-11-18T22:14:43.393699+00:00
1,572,370,315,000
cbdf8523b0e3b7fc25b4b5f5d055214e60d34e95
3
{ "blob_id": "cbdf8523b0e3b7fc25b4b5f5d055214e60d34e95", "branch_name": "refs/heads/master", "committer_date": 1572370315000, "content_id": "7292938216b10251ce0e8c37ecf8ad13bbf8f53b", "detected_licenses": [ "MIT" ], "directory_id": "9e8259d1cb8f0d8657bdd281d618f13c0c7eb66c", "extension": "py", "fi...
3.046875
stackv2
#!/usr/bin/python3 # Autor : Marc Sànchez Pifarré # Programa de codificació # IN : # - bookName -> Nom de fitxer a codificar # - encodedFile -> Nom de fitxer a on desar el text codificat # - password -> Paraula de pas o clau per a la codificació # OUT : # - A encodedFile hi ha el text de bookName xifrat amb la clau ...
50
22.92
91
10
349
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d5fbc516ae0e9254_97339ea4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 50 ]
[ null ]
[ 7 ]
[ 91 ]
2024-11-18T22:14:50.613138+00:00
1,570,216,986,000
08165bf45e063f5f2b1d3511e95e3e8c492d6bb0
3
{ "blob_id": "08165bf45e063f5f2b1d3511e95e3e8c492d6bb0", "branch_name": "refs/heads/master", "committer_date": 1570216986000, "content_id": "5f8b440b4976be25a6a625d205f210bfe51bec25", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "e5602c50b3331ec517b3d81f8a4de2b1ebd0e1b6", "extension": "p...
2.625
stackv2
""" Starting point for DEM retrieval utilities. """ from sys import stderr from math import floor, log from os import unlink, close, write, chmod, makedirs from os.path import basename, exists, isdir, join from httplib import HTTPConnection, HTTPSConnection from urlparse import urlparse from tempfile import mkstemp fro...
160
26.11
96
14
1,275
python
[{"finding_id": "codeql_py/overly-permissive-file_09ea48a609e60c89_40263e92", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ...
2
true
[ "CWE-732", "CWE-732" ]
[ "py/overly-permissive-file", "py/overly-permissive-file" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world writable.", "Overly permissive mask in chmod sets file to world writable." ]
[ 108, 145 ]
[ null, null ]
[ 9, 9 ]
[ 29, 30 ]
2024-11-18T22:15:00.909234+00:00
1,529,463,535,000
1f7b8a4c81e5f02593a19c396cb072a59ef55615
3
{ "blob_id": "1f7b8a4c81e5f02593a19c396cb072a59ef55615", "branch_name": "refs/heads/master", "committer_date": 1529463535000, "content_id": "d3f31a0d3162e8a323027f5b7aa79f67b04cbf18", "detected_licenses": [ "BSD-3-Clause", "MIT" ], "directory_id": "29ebcdc46570470fcaefab87b274f137b4643e92", "ext...
2.671875
stackv2
import codecs import warnings import string try: maketrans = string.maketrans except AttributeError: # On Python3 we get it from bytes. maketrans = bytes.maketrans import six from ldaptor import md4, config lower = b'abcdefghijklmnopqrstuvwxyz' upper = lower.upper() toupper= maketrans(lower, upper) de...
107
24.37
84
18
732
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_538a3dc8456d1192_59c1eb5e", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.\n[The cryptograph...
1
true
[ "CWE-327" ]
[ "py/weak-cryptographic-algorithm" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.\n[The cryptographic algorithm DES](2) is broken or weak, and should not be used." ]
[ 106 ]
[ null ]
[ 11 ]
[ 35 ]
2024-11-18T22:15:06.221872+00:00
1,592,583,554,000
8f85fd0387a018b06dc5ed1310e53619a162c576
4
{ "blob_id": "8f85fd0387a018b06dc5ed1310e53619a162c576", "branch_name": "refs/heads/master", "committer_date": 1592583554000, "content_id": "5e7a14d73e76207118306531e54eeb91730997a6", "detected_licenses": [ "MIT" ], "directory_id": "3e5438ff2957def8d7f3933e4ca163d1616cdbfc", "extension": "py", "fi...
3.515625
stackv2
from operator import itemgetter def read_profiles(filename): profiles_list = list() profiles_dict = dict() with open(filename,'r') as profiles_file: for profile_line in profiles_file: profile = dict() profile_info = profile_line.strip().split(',') profile['...
72
37.29
125
14
503
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0579013372011c0a_29aaf6d9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 33, 47 ]
[ 34, null ]
[ 15, 42 ]
[ 94, 61 ]
2024-11-18T23:55:40.697939+00:00
1,488,482,296,000
ee52313a2726a343572ce4ee8c9910e22f9f7a1b
3
{ "blob_id": "ee52313a2726a343572ce4ee8c9910e22f9f7a1b", "branch_name": "refs/heads/master", "committer_date": 1488482296000, "content_id": "b5ab6eb0fcafbcf36575dfaa4718317fed049dda", "detected_licenses": [ "MIT" ], "directory_id": "1d757538df8e68cc80572665aac8b1af3c7d972c", "extension": "py", "fi...
2.5625
stackv2
import urllib import json import hashlib import re import ssl sslCtx = ssl.create_default_context() sslCtx.check_hostname = False sslCtx.verify_mode = ssl.CERT_NONE # if urllib fails class NetworkError(Exception): pass # we got redirected to login page class NotLoggedIn(Exception): pass # credentials ...
150
30.03
90
17
1,076
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_f458d802dd7251f3_2b57f8f6", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi...
[ 88 ]
[ null ]
[ 50 ]
[ 68 ]
2024-11-18T23:55:49.347199+00:00
1,467,017,511,000
61761f97ef214ece77bf949e189e1ac617963bbc
2
{ "blob_id": "61761f97ef214ece77bf949e189e1ac617963bbc", "branch_name": "refs/heads/master", "committer_date": 1467017511000, "content_id": "491ec51e17a22e223b3088e320568a2ca4764429", "detected_licenses": [ "MIT" ], "directory_id": "230da7b9a8d9a2bef4159fb954dcbb880472499b", "extension": "py", "fi...
2.453125
stackv2
# coding:utf-8 from __future__ import print_function import boto3 import datetime import json import logging from urllib2 import Request, urlopen, URLError, HTTPError # set your own environment HOOK_URL = 'https://hooks.slack.com/services/xxxxxxxxxxxxxxxx' SLACK_CHANNEL = '#xxxxxxxxxx' logger = logging.getLogger() lo...
64
30.77
118
13
463
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_25d4652407cd69e1_46b1b934", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text." ]
[ 52 ]
[ null ]
[ 45 ]
[ 63 ]
2024-11-19T00:07:04.288603+00:00
1,570,913,371,000
d503611df49a95460bfc6033ede7fd0f17ecc143
3
{ "blob_id": "d503611df49a95460bfc6033ede7fd0f17ecc143", "branch_name": "refs/heads/master", "committer_date": 1570913371000, "content_id": "3f4b9351f71888b8c917e863af86f4325d582e5b", "detected_licenses": [ "MIT" ], "directory_id": "057a607ddb52af665130efa819e9e4c00d57bf75", "extension": "py", "fi...
3.375
stackv2
# A very simple Flask Hello World app for you to get started with... from flask import Flask, request, Response import json from os import path app = Flask(__name__) sorted_data = [] @app.route('/data', methods=["GET","POST","PATCH"]) def hello_world(): try: if request.method == "POST": d...
52
33.15
104
19
379
python
[{"finding_id": "codeql_py/stack-trace-exposure_86f8bd8f0c68903a_ff6780bf", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 50 ]
[ null ]
[ 25 ]
[ 31 ]
2024-11-19T00:07:11.602868+00:00
1,636,508,262,000
cab84f05962ef8c1f89bfa762a7f6f68a7819879
3
{ "blob_id": "cab84f05962ef8c1f89bfa762a7f6f68a7819879", "branch_name": "refs/heads/main", "committer_date": 1636508262000, "content_id": "74ff1202fec78e6c67576c55bdc240c0776f5760", "detected_licenses": [ "MIT" ], "directory_id": "d16ef1bb7c237a901601163af939c735349cbc8a", "extension": "py", "file...
3.046875
stackv2
import os from Crypto.Cipher import AES from Crypto.Util.Padding import pad from Crypto.Util.strxor import strxor from secret import flag class AESNOC: def __init__(self, key: bytes, iv: bytes): self.iv = iv self.key = key self.block_size = AES.block_size def encrypt(self, plaintext...
63
23.41
62
15
381
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_eeea901939a80f78_7a4d75f7", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
1
true
[ "CWE-327" ]
[ "py/weak-cryptographic-algorithm" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 27 ]
[ null ]
[ 17 ]
[ 34 ]
2024-11-19T00:45:06.573070+00:00
1,570,708,183,000
0af2a80674619f5e563dd2e1cb581529b996119f
2
{ "blob_id": "0af2a80674619f5e563dd2e1cb581529b996119f", "branch_name": "refs/heads/master", "committer_date": 1570708183000, "content_id": "db9725c667605a3e0e6ce0e7e9e63aaba26a0e66", "detected_licenses": [ "MIT" ], "directory_id": "abe2f2f5a78813b3e98d79c75a9c15888df91243", "extension": "py", "fi...
2.390625
stackv2
"""A module that defines Airflow DAGS for dataset pipelines.""" import json import logging import time from datetime import timedelta from airflow import DAG from airflow.hooks.postgres_hook import PostgresHook from airflow.models import Variable from airflow.operators.python_operator import PythonOperator from jinj...
439
34.01
114
23
3,128
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_3f332c6a255e9ea3_14dc825d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 165, 330 ]
[ null, null ]
[ 37, 28 ]
[ 63, 53 ]
2024-11-18T23:28:31.354338+00:00
1,448,119,639,000
3d89ecac3371eb2ca1ec16108bb142fda3427b76
2
{ "blob_id": "3d89ecac3371eb2ca1ec16108bb142fda3427b76", "branch_name": "refs/heads/master", "committer_date": 1448119639000, "content_id": "1e0da85117a1e6e2d4330f8148cd52bbd0f93f7d", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "59fbda0d069078fc00a7e150cbf10beb28ce1d87", "extension": "p...
2.453125
stackv2
# -*- coding: UTF-8 -*- # # Copyright (c) 2014, Yung-Yu Chen <yyc@solvcon.net> # # All rights reserved. # # Redistribution and use in source and binary forms, with or without # modification, are permitted provided that the following conditions are met: # # - Redistributions of source code must retain the above copyrigh...
379
34.45
80
15
3,360
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_bad429d6050594d8_a24b55e8", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 137 ]
[ null ]
[ 9 ]
[ 73 ]
2024-11-18T23:39:43.782141+00:00
1,589,228,165,000
d2d34975d38c9467769a5532b0827ed465239409
2
{ "blob_id": "d2d34975d38c9467769a5532b0827ed465239409", "branch_name": "refs/heads/master", "committer_date": 1589228165000, "content_id": "4b7db621a708df50157a666caa37e26b46d47bc2", "detected_licenses": [ "MIT" ], "directory_id": "6152f6fd09410f2315e3cf970bf2d71359480521", "extension": "py", "fi...
2.421875
stackv2
import ast import os class ParametersLoader: def __init__(self, config): self.config = config self.general_params = self.return_parameters("general") self.load_save_params = self.return_parameters("load_and_save") self.model_params = self.return_parameters("model") '''add ...
71
43.32
104
15
522
python
[{"finding_id": "codeql_py/overly-permissive-file_e7f3e6e49b84781f_5dbf2453", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world writable." ]
[ 56 ]
[ null ]
[ 21 ]
[ 47 ]
2024-11-19T00:19:23.493820+00:00
1,485,180,890,000
001fda6fb11fb86837ad37d17c6be6d006280e48
2
{ "blob_id": "001fda6fb11fb86837ad37d17c6be6d006280e48", "branch_name": "refs/heads/master", "committer_date": 1485180890000, "content_id": "e89b59f6218d449183199d83482f094f30842f03", "detected_licenses": [ "MIT" ], "directory_id": "2551500c9a520221bd07f32f1c6fbd7001c6182c", "extension": "py", "fi...
2.359375
stackv2
#!/usr/bin/env python3 # coding: utf-8 from bottle import error, route, response, request, run, default_app from enum import Enum from json import dumps import datetime import hashlib import os import subprocess __basedir__ = os.path.abspath(os.path.dirname(__file__)) class Auth(Enum): success = 0 invalid = ...
206
24.28
174
17
1,314
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_76a6ccde62322bb9_4189f48c", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally e...
[ 53 ]
[ null ]
[ 32 ]
[ 53 ]
2024-11-19T01:11:18.417391+00:00
1,653,254,333,000
f49b45fb497a8d46d74a40f3b9dfb4356f4d82f8
2
{ "blob_id": "f49b45fb497a8d46d74a40f3b9dfb4356f4d82f8", "branch_name": "refs/heads/master", "committer_date": 1653254333000, "content_id": "0708f81e59a1cec473a0af4515a519f749069868", "detected_licenses": [ "MIT" ], "directory_id": "86110b35c99bbce34cd50f55a5ca8cf51bc3ccbb", "extension": "py", "fi...
2.328125
stackv2
#!/usr/bin/env python3 import json import os import sys from jinja2 import Environment, FileSystemLoader from weasyprint import HTML dir_path = os.path.dirname(os.path.realpath(__file__)) env = Environment( loader=FileSystemLoader(os.path.abspath(os.path.join(dir_path, os.pardir))) ) with open('cv.json', 'r', ...
34
24.35
79
14
213
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_3651de618d82e444_32ddb6b8", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 11 ]
[ 13 ]
[ 7 ]
[ 2 ]
2024-11-19T01:11:34.034379+00:00
1,629,547,739,000
925da46e4de94fd516f5a41399b81d8b66b57d0f
3
{ "blob_id": "925da46e4de94fd516f5a41399b81d8b66b57d0f", "branch_name": "refs/heads/master", "committer_date": 1629547739000, "content_id": "b87006a59962a1f518044e76d807f2cd97a12e2f", "detected_licenses": [ "MIT" ], "directory_id": "662723f6a5237d8c3b2ee0dfc525f868100932ee", "extension": "py", "fi...
2.703125
stackv2
import requests from flask import render_template, request, abort def index(): return render_template('index.html') def user(): try: username = request.form["username"] if username is None or username == '': return abort(404, '[ERROR] username not find') res = requests.ge...
24
24.83
70
12
131
python
[{"finding_id": "codeql_py/partial-ssrf_29e01f3665d7fce7_4e7b0eb0", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 14 ]
[ null ]
[ 15 ]
[ 71 ]
2024-11-19T01:11:36.805946+00:00
1,586,621,809,000
7a10906753f0c97765f15b1b1d0be5c02ab9094a
3
{ "blob_id": "7a10906753f0c97765f15b1b1d0be5c02ab9094a", "branch_name": "refs/heads/master", "committer_date": 1586621809000, "content_id": "df3e5931cf494ea6fc01ba5131f2461eb4ad6353", "detected_licenses": [ "MIT" ], "directory_id": "d0a47f6ca3643d629fb0233bb4aaa324c9709002", "extension": "py", "fi...
2.640625
stackv2
import pandas as pd import configparser import json import glob import os from loguru import logger from vectorizer import Vectorizer import pickle import urllib import re class DataIO(object): def __init__(self, config_path="config.cfg", autoload=True): self.config_path = config_path self.autoloa...
132
37.03
157
17
1,113
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_b35006581039fdab_caa5eaf8", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'amazonaws.com/', so it might match ...
1
true
[ "CWE-020" ]
[ "py/incomplete-hostname-regexp" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'amazonaws.com/', so it might match more hosts than expected." ]
[ 37 ]
[ null ]
[ 42 ]
[ 110 ]
2024-11-18T23:46:50.057041+00:00
1,418,046,597,000
41eb17025f6faa07503100d84ab042374a6b307f
3
{ "blob_id": "41eb17025f6faa07503100d84ab042374a6b307f", "branch_name": "refs/heads/master", "committer_date": 1418046597000, "content_id": "c13251caf0ff9887ff5fcefd7b274f66bd7f914e", "detected_licenses": [ "MIT" ], "directory_id": "f7da9677dbea61d7d9fa7a430cf8aa5e79e4f2de", "extension": "py", "fi...
2.765625
stackv2
import requests from pyslaquery import exception as pyslaquery_exceptions class SlackAPIConnection(object): """ Logic abstraction around requests module and connectivity to Slack API. """ def __init__(self, base, token): self.base = base self.token = token def create_post_request...
53
28.87
77
14
341
python
[{"finding_id": "codeql_py/request-without-cert-validation_22604423f3793339_f9b5792e", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 25, 48 ]
[ null, null ]
[ 18, 18 ]
[ 63, 63 ]
2024-11-18T23:46:50.299991+00:00
1,560,433,816,000
e8cd05a61e01a9d2643ee0fcf7f172f458e155a2
3
{ "blob_id": "e8cd05a61e01a9d2643ee0fcf7f172f458e155a2", "branch_name": "refs/heads/master", "committer_date": 1560433816000, "content_id": "4949d70b6f66344535c724aad9433c9c150f170f", "detected_licenses": [ "Apache-2.0" ], "directory_id": "473923c3e0ebbaea5c013b2ab3ce3680c2735ac8", "extension": "py"...
2.5625
stackv2
"""Uploader utility functions.""" import pickle import hashlib import hmac import json import logging import os import shutil from resolwe.utils import BraceMessage as __ def get_upload_id(session_id, file_uid, secret_key): """Return the session identifier used by the request.""" # NOTE: This code path is us...
147
33.56
87
20
1,177
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_340e8cd2b9a5afc9_43d80e62", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecu...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecure.\n[Sensitive data (secret)](2) is used in a hashing algorithm (SHA1) that is insecure.\n[Sensitive data (secret)](3) is used in a hashing algorithm (SHA1) that is insecure.", "[Sensitive data (id)](1) is used in a hashing algorit...
[ 32, 34 ]
[ null, null ]
[ 24, 30 ]
[ 45, 51 ]
2024-11-18T23:48:09.706981+00:00
1,607,689,533,000
c3020f1fe89e32551b4ca3bd21aa140ede23ed5c
3
{ "blob_id": "c3020f1fe89e32551b4ca3bd21aa140ede23ed5c", "branch_name": "refs/heads/main", "committer_date": 1607689533000, "content_id": "47832feb0451bc9ee22599d10a207a0f0a31babe", "detected_licenses": [ "MIT" ], "directory_id": "bc3c4f7fe038a2d1305813ee026ba699a673cd67", "extension": "py", "file...
2.890625
stackv2
from random import SystemRandom from Cryptodome.Cipher import PKCS1_OAEP from Cryptodome.Util import number from Cryptodome.PublicKey import RSA from Cryptodome.Cipher import AES from Cryptodome.Util.Padding import pad import time import os ##################### AUXILIARY FUNCTIONS ########################### # use ...
293
29.51
97
16
2,447
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_912a638f30177cb9_9ce8bf36", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
3
true
[ "CWE-327", "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 201, 212, 263 ]
[ null, null, null ]
[ 26, 13, 13 ]
[ 57, 44, 35 ]
2024-11-19T00:29:35.180687+00:00
1,637,845,390,000
cd640e14e3c2ee695a3f7aff2d4b6aac22412d59
2
{ "blob_id": "cd640e14e3c2ee695a3f7aff2d4b6aac22412d59", "branch_name": "refs/heads/master", "committer_date": 1637845390000, "content_id": "e8525ea3141cfaebb7c6b61dfc80891a7d04b872", "detected_licenses": [ "MIT" ], "directory_id": "1fd3ed9bc67d3eea37b587e94741a94e9d745c7e", "extension": "py", "fi...
2.34375
stackv2
from lxml import html from requests import Session, Request class Attributes(object): """ Page objects """ session = Session() def request(self, url): """ Return page object """ if (url.startswith('http://') or url.startswith('https://') and "gearbest.com" in url): ...
176
42.5
95
30
1,476
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_cb746bff9bca3f7e_48894b7a", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [gearbest.com](1) may be at an arbitrary position in th...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [gearbest.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 12 ]
[ null ]
[ 17 ]
[ 38 ]
2024-11-18T23:23:32.729332+00:00
1,477,961,756,000
a3e5539d046c8e2a936de3c646ab4f62ae4e3279
2
{ "blob_id": "a3e5539d046c8e2a936de3c646ab4f62ae4e3279", "branch_name": "refs/heads/master", "committer_date": 1477961756000, "content_id": "12d4e1fee71c0b76f724608d685dfe29a701979c", "detected_licenses": [ "MIT" ], "directory_id": "e3f0974988c13bca2b8b56caba98ec04a16fbbbd", "extension": "py", "fi...
2.46875
stackv2
#coding=utf-8 import hashlib import urllib #请替换appkey和secret appkey = "XXXXXXXX" secret = "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX" apiUrl = "http://api.dianping.com/v1/business/find_businesses" #示例参数 paramSet = [] paramSet.append(("format", "json")) paramSet.append(("city", "上海")) paramSet.append(("latitude", "31.21524"))...
51
21.55
62
11
352
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_927edbd66458f3e3_684b66de", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecu...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecure." ]
[ 39 ]
[ null ]
[ 22 ]
[ 27 ]
2024-11-18T23:05:26.410775+00:00
1,472,850,296,000
593d0997c115909c158e585b5c52d60a0fd53756
2
{ "blob_id": "593d0997c115909c158e585b5c52d60a0fd53756", "branch_name": "refs/heads/master", "committer_date": 1472850296000, "content_id": "8195789f774b372cc57e6ded1373afa3e2dd0c40", "detected_licenses": [ "MIT" ], "directory_id": "fe328aa4eaf907be3808d2e5a5815fb336f38d09", "extension": "py", "fi...
2.484375
stackv2
from lxml import etree from src.Player import Player, Video import praw import re import pickle r = praw.Reddit("filling the database") def contains_video_link(text): return "oddshot" in text or "youtu.be" in text or "twitch.tv" in text or "youtube" in text def get_url(submission): text = submission.selfte...
132
34.23
118
23
952
python
[{"finding_id": "codeql_py/overly-large-range_8431dd3e3469f287_26f38839", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 17 ]
[ null ]
[ 54 ]
[ 57 ]
2024-11-18T23:05:30.922070+00:00
1,593,371,329,000
22fbc8fab09dea0e24577b6af07f06fede4275e0
3
{ "blob_id": "22fbc8fab09dea0e24577b6af07f06fede4275e0", "branch_name": "refs/heads/master", "committer_date": 1593371329000, "content_id": "30e95dde0640f3bd46753cce85dfec265d1332d4", "detected_licenses": [ "MIT" ], "directory_id": "af5638be901ff0036edde49d4793054ef80ea073", "extension": "py", "fi...
3.46875
stackv2
from random import randint version = 0.1 name = "P455w0Rd G3neRaT0r" # Choices letters = "abcdefghjiklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ" umlauts = "åäöÅÄÖ" numbers = "1234567890"*5 symbols = "!@#%&=?"*7 # Welcome message print(f"Welcome to the {name} version: {version}") # Main loop while True: # reset m...
43
26.37
67
16
352
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2c789e3a0029fc92_0d95ba1e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 33 ]
[ null ]
[ 15 ]
[ 47 ]
2024-11-19T00:11:48.127442+00:00
1,490,558,418,000
8304a66e678f3a7b13390aef1e751bc4cb7699ee
2
{ "blob_id": "8304a66e678f3a7b13390aef1e751bc4cb7699ee", "branch_name": "refs/heads/master", "committer_date": 1490558418000, "content_id": "f0f6891fa02e44494c71106728d3722df76b1897", "detected_licenses": [ "MIT" ], "directory_id": "a4f106feac3b81dfb71cd634efcac0625e57d903", "extension": "py", "fi...
2.359375
stackv2
#!/usr/bin/env python import os import jinja2 import webapp2 from models import WineData from google.appengine.ext import blobstore from google.appengine.api import images from google.appengine.api import users from google.appengine.ext.webapp import blobstore_handlers winepy_dir = os.path.join(os.path.dirname(__file_...
219
37.86
101
15
1,888
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_60ae68f6c982eb9f_4ad128ce", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 12 ]
[ null ]
[ 13 ]
[ 93 ]
2024-11-19T00:11:50.641568+00:00
1,546,826,522,000
feb87001b10e30519aa7618f5d27a65df9c1dc22
3
{ "blob_id": "feb87001b10e30519aa7618f5d27a65df9c1dc22", "branch_name": "refs/heads/master", "committer_date": 1546826522000, "content_id": "6631ad2e31540f945fa6499a15353161115b94d1", "detected_licenses": [ "MIT" ], "directory_id": "ff385a281f2ff95e0b32858293c086a5c8e0df93", "extension": "py", "fi...
2.609375
stackv2
from flask import Flask, jsonify, make_response import json import os import requests import settings app = Flask(__name__) DB_PATH = os.path.dirname(os.path.dirname(os.path.realpath(__file__))) with open('{}/db/users.json'.format(DB_PATH), "r") as jsf: USER_LIST = json.load(jsf) @app.route("/", meth...
65
22.86
73
15
347
python
[{"finding_id": "codeql_py/reflective-xss_15215853056ce78b_0586a712", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
2
true
[ "CWE-079", "CWE-918" ]
[ "py/reflective-xss", "py/partial-ssrf" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 55, 43 ]
[ null, 46 ]
[ 16, 15 ]
[ 20, 11 ]
2024-11-19T00:36:56.479639+00:00
1,551,348,818,000
03aa31ee41b79fecf030c1192c2bc399d7ff0899
2
{ "blob_id": "03aa31ee41b79fecf030c1192c2bc399d7ff0899", "branch_name": "refs/heads/master", "committer_date": 1551348818000, "content_id": "7675748d44ae1989e9a247604e550246434181e4", "detected_licenses": [ "MIT" ], "directory_id": "9a9a42b213563caf966fbff61c8625196d77f7e2", "extension": "py", "fi...
2.328125
stackv2
#!/usr/bin/env python2 # -*- coding: utf-8 -*- # # Author: Eric Vandecasteele 2018 # http://blog.onlinux.fr # # # Import required Python libraries import os import logging import logging.config from thermostat import Thermostat from thermostat import Constants from hermes_python.hermes import Hermes from snipshelpers...
246
37.59
129
25
2,151
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7157e4c0ca6f332f_4f54306d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 86 ]
[ null ]
[ 18 ]
[ 52 ]
2024-11-19T00:36:57.835772+00:00
1,562,581,730,000
151b77aeb440c157bf3e1efde0d5cc9e854160c6
2
{ "blob_id": "151b77aeb440c157bf3e1efde0d5cc9e854160c6", "branch_name": "refs/heads/master", "committer_date": 1562581730000, "content_id": "361901bbb77a6d4edf6638aecfb1961072195cdd", "detected_licenses": [ "Apache-2.0" ], "directory_id": "3b5d4a92c8eabf36400e9541eeb38b8e0bae87c2", "extension": "py"...
2.390625
stackv2
#!/usr/bin/env python3 import argparse, sys, logging, re, json, urllib.parse from subprocess import check_output, STDOUT logger = logging.getLogger('sample') verbose = 0 host = '' def call_api(api, cmd): if verbose > 0: logger.info(api + ': cmd=' + cmd) try: resp_str = check_output(cmd, shell...
108
36.54
115
19
1,044
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_97635b3eaad9a21a_eacb5e8f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text." ]
[ 12 ]
[ null ]
[ 21 ]
[ 41 ]
2024-11-19T00:37:02.871082+00:00
1,624,131,104,000
b9befb4eae525122c40aace3e1cca0ed64c6213f
2
{ "blob_id": "b9befb4eae525122c40aace3e1cca0ed64c6213f", "branch_name": "refs/heads/master", "committer_date": 1624131104000, "content_id": "76b68bc76d0f71cb0ceaa6c3e9fe2dc93251dd3a", "detected_licenses": [ "MIT" ], "directory_id": "e8c286341691ee07142b9d8f2510d344cab3747e", "extension": "py", "fi...
2.328125
stackv2
#!/usr/bin/env python import json import traceback import time import sys import threading import imp from cStringIO import StringIO from SocketServer import ThreadingMixIn from BaseHTTPServer import HTTPServer, BaseHTTPRequestHandler PORT = 8004 def log(text): print "[Python] %s" % text class HTTPHandler(BaseH...
81
33.94
122
23
626
python
[{"finding_id": "codeql_py/code-injection_9ec6dbf727f6758e_e005359f", "tool_name": "codeql", "rule_id": "py/code-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This code execution depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "...
2
true
[ "CWE-094", "CWE-094" ]
[ "py/code-injection", "py/code-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This code execution depends on a [user-provided value](1).", "This code execution depends on a [user-provided value](1)." ]
[ 59, 60 ]
[ null, null ]
[ 30, 30 ]
[ 80, 49 ]
2024-11-18T23:49:53.821894+00:00
1,622,045,839,000
1e41f74bcb9a0236813a1b521285d3a3bcd7c94e
3
{ "blob_id": "1e41f74bcb9a0236813a1b521285d3a3bcd7c94e", "branch_name": "refs/heads/main", "committer_date": 1622045839000, "content_id": "fab0b4d921ffc2f728fd358e4751cda2845af4d2", "detected_licenses": [ "MIT" ], "directory_id": "a6ccb05d0b8a7c3df0547599e07af39e6978a248", "extension": "py", "file...
2.65625
stackv2
from requests import Session class Luca(): def __init__(self) -> None: self.logged_in = False self.mute = False self.s = Session() self.s.headers.update({"User-Agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:88.0) Gecko/20100101 Firefox/88.0", 'Accept': '*/*', 'Accept-Language': 'en-...
147
24.03
124
16
1,069
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7aa0a4500caf6446_709f6955", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 37 ]
[ null ]
[ 9 ]
[ 13 ]
2024-11-18T23:50:01.202205+00:00
1,591,204,399,000
39fa3dee435fce45720ad8e211528f21a3b97e60
3
{ "blob_id": "39fa3dee435fce45720ad8e211528f21a3b97e60", "branch_name": "refs/heads/master", "committer_date": 1591204399000, "content_id": "c7c4031e42998c63338eff74bfe042627eae5e91", "detected_licenses": [ "Apache-2.0" ], "directory_id": "5a982702e5fff41127db966f7dd4f4f1368671f6", "extension": "py"...
2.875
stackv2
import requests import datetime import time from time import strptime from datetime import timedelta, datetime import os from flask import Flask, render_template, request app = Flask(__name__) @app.route('/', methods=['GET', 'POST']) def city_weather(): if request.method == 'POST': city_name = request.fo...
49
26.29
95
15
315
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fa383304e6da370f_0b278c48", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-918" ]
[ "py/clear-text-logging-sensitive-data", "py/partial-ssrf" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 29, 22 ]
[ null, null ]
[ 11, 16 ]
[ 19, 51 ]
2024-11-19T00:13:39.560704+00:00
1,622,735,508,000
31e303b4015b8c4e9bc8807903f1fac7548d7f0c
3
{ "blob_id": "31e303b4015b8c4e9bc8807903f1fac7548d7f0c", "branch_name": "refs/heads/main", "committer_date": 1622735508000, "content_id": "e2248fa4aa3e5ef04ffae6506c11a6ca2d5ede6d", "detected_licenses": [ "MIT" ], "directory_id": "3de935f78bbbf8d26cec8b3ee422aa050fde0e6d", "extension": "py", "file...
2.96875
stackv2
""" Implementation of :py:class:`Dataset` object. A folder containing a set of subjects with CT and RS in dicom format is converted into nii format. A new folder is created keeping the same organization. """ import os import numpy as np from dcmrtstruct2nii import dcmrtstruct2nii, list_rt_structs class Dataset: ...
111
35.79
118
23
915
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8e7b69bcddd01d41_539c05b1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 93, 109 ]
[ null, null ]
[ 19, 23 ]
[ 82, 75 ]
2024-11-19T01:26:12.344047+00:00
1,691,610,427,000
397c8cf35a78e362236f945c0af2a1e3560350ce
3
{ "blob_id": "397c8cf35a78e362236f945c0af2a1e3560350ce", "branch_name": "refs/heads/master", "committer_date": 1691610427000, "content_id": "96e7244cce06543f184d1786cd23ad2a92f6c1e4", "detected_licenses": [ "MIT" ], "directory_id": "ecf289b81f0e2486ab65c541fc8b6fd7f93a3109", "extension": "py", "fi...
2.75
stackv2
""" Accepts Jamf Pro Computer IDs from an AWS SQS queue and unmanages them. The list of computers should include machines that have not checked in within a designated timeframe. """ import os import json import requests import logging import boto3 from botocore.exceptions import ClientError from http.client import H...
187
31.12
172
13
1,420
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e0643b2e3711d30a_4c982df7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 47, 64, 147 ]
[ null, null, null ]
[ 22, 18, 18 ]
[ 36, 41, 41 ]
2024-11-19T01:39:57.409764+00:00
1,379,194,421,000
d6c1a5f7dbffe1ea5a0e9506217a2952aca80808
3
{ "blob_id": "d6c1a5f7dbffe1ea5a0e9506217a2952aca80808", "branch_name": "refs/heads/master", "committer_date": 1379194421000, "content_id": "bedfc1ee7ac9b8729f886de2056a69fe1d3257f8", "detected_licenses": [ "Apache-2.0" ], "directory_id": "09b6f1280920c5174a0aea0d44306f2321aafe42", "extension": "py"...
2.515625
stackv2
import traceback import hashlib import urlparse import urllib import cPickle import cgi import logging from w3lib.url import safe_url_string from requests import api, sessions, get, post, models try: # Python 2.7+ from logging import NullHandler except ImportError: class NullHandler(logging.Handler): ...
211
35.93
140
15
1,804
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_e732eea89299338c_8ecb7f92", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [yahoo.com](1) may be at an arbitrary position in the s...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [yahoo.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 204 ]
[ null ]
[ 28 ]
[ 51 ]
2024-11-18T23:43:09.272523+00:00
1,684,833,259,000
ce8ed3d00efe5b8ce10a667e5d4787b0cc4f4a2d
3
{ "blob_id": "ce8ed3d00efe5b8ce10a667e5d4787b0cc4f4a2d", "branch_name": "refs/heads/master", "committer_date": 1684833259000, "content_id": "58f4d02da11e3836320db8a0adb67c5fbcee603b", "detected_licenses": [ "MIT" ], "directory_id": "61a5fa3e2ff47b4a163f32d18e7a02f09ccb061e", "extension": "py", "fi...
2.703125
stackv2
""" This module adds a :class:`UsernameDigestToken` for use with SOAP services. .. versionadded:: 0.2.0 """ import hashlib from base64 import b64encode from datetime import datetime from suds.sax.element import Element from suds.wsse import UsernameToken from suds.wsse import wssens from suds.wsse import wsuns cl...
95
27.62
75
17
665
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_e4ab312ae4009fb9_8ccb4ffb", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (id)](2) is used in a hashing algorithm (MD5) that is insecure.", "[Sensitive data (password)](1) is used in a hashing algorithm (...
[ 45, 72 ]
[ null, null ]
[ 22, 18 ]
[ 34, 47 ]
2024-11-18T23:43:31.027911+00:00
1,632,236,428,000
b739a0235bce3afd701a79a234697f94069f6b60
3
{ "blob_id": "b739a0235bce3afd701a79a234697f94069f6b60", "branch_name": "refs/heads/main", "committer_date": 1632236428000, "content_id": "dddbe23eaac0e3102cce2ef3b8b6a64738f28f95", "detected_licenses": [ "MIT" ], "directory_id": "e93c6e93f612bca7f192adf539b4f489ad114ab5", "extension": "py", "file...
2.953125
stackv2
import re from random import choice re_mac_address = r"^([0-9A-Fa-f]{2}[:-]?){5}([0-9A-Fa-f]{2})$" re_ip_address = ( r"^(([0-9]|[1-9][0-9]|1[0-9]{2}|2[0-4][0-9]|25[0-5])\.){3}" + r"([0-9]|[1-9][0-9]|1[0-9]{2}|2[0-4][0-9]|25[0-5])$" ) re_hostname = ( r"^(([a-zA-Z0-9]|[a-zA-Z0-9][a-zA-Z0-9\-]*[a-zA-Z0-9])\.)...
47
32.55
108
15
546
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0b26004fb44e1a5a_5e8b7cff", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 35, 44 ]
[ null, null ]
[ 11, 19 ]
[ 73, 93 ]
2024-11-19T00:32:58.812568+00:00
1,631,854,394,000
eec924f80aabf975f7d2306204c5ed6ee355a45f
3
{ "blob_id": "eec924f80aabf975f7d2306204c5ed6ee355a45f", "branch_name": "refs/heads/master", "committer_date": 1631854394000, "content_id": "7a81ffa9f2e1487d3e116224eda7c1bad4f4e517", "detected_licenses": [ "MIT" ], "directory_id": "b2ff37406e50976b8db1c75bde4297f5039f7391", "extension": "py", "fi...
2.6875
stackv2
from flask import Flask, render_template, request, redirect app = Flask(__name__) @app.route('/', methods=['GET', 'POST']) def home(): if request.method == 'POST': name = request.form.get('username') age = request.form.get('age') return redirect(f'/result/{name}/{age}') # return r...
21
24.71
61
12
122
python
[{"finding_id": "codeql_py/flask-debug_f0ee2c020c8b224b_70e7f6a5", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-601" ]
[ "py/flask-debug", "py/url-redirection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 21, 11 ]
[ null, null ]
[ null, 25 ]
[ 20, 48 ]
2024-11-19T00:33:02.308458+00:00
1,636,648,861,000
507d497e58134a2d84445cc9f3bfaf9045273ec5
2
{ "blob_id": "507d497e58134a2d84445cc9f3bfaf9045273ec5", "branch_name": "refs/heads/main", "committer_date": 1636648861000, "content_id": "5e64413bb4e61eb54b74edbf976a04a86a5fe557", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "f6db6c04704061b25fb86e3489dde95a97c28af8", "extension": "py"...
2.5
stackv2
from datetime import date from getpass import getpass from netmiko import ConnectHandler username = input("Username: ").strip() password = getpass("Password: ") # You can press enter to leave enable password empty enable_pass = getpass("Enable password: ") with open("iplist.txt", "r") as f: iplist = f.read().spl...
41
29.95
82
17
290
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_05634c444230e9b7_24f177e9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive dat...
[ 31, 37, 41 ]
[ null, null, null ]
[ 19, 15, 15 ]
[ 49, 64, 78 ]
2024-11-19T00:33:06.746643+00:00
1,601,566,466,000
dd60a0763b5f6dd795e05c5d0daf0f82b4908aaa
3
{ "blob_id": "dd60a0763b5f6dd795e05c5d0daf0f82b4908aaa", "branch_name": "refs/heads/master", "committer_date": 1601566466000, "content_id": "575b909c9385382f3a2ece49fc019179bddaad1a", "detected_licenses": [ "MIT" ], "directory_id": "d173cc816e8f0bb3cb65e32b5f2eb2c2fdb9b1c5", "extension": "py", "fi...
2.6875
stackv2
import os import json import requests import tempfile import traceback from pydub import AudioSegment from excp.exception import ConnectionLostException from excp.exception import NotUnderstoodException class Google_STT: """ This class uses Google's Speech to Text engine to convert passed flac(audio) to text...
61
32.89
103
15
485
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2f16e5f47b43152b_2d3dba50", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 40, 56 ]
[ null, null ]
[ 15, 19 ]
[ 47, 60 ]
2024-11-19T01:18:03.976702+00:00
1,690,889,920,000
27800a214e6ddae8658a9d265e6c5a2663c53462
3
{ "blob_id": "27800a214e6ddae8658a9d265e6c5a2663c53462", "branch_name": "refs/heads/main", "committer_date": 1690889920000, "content_id": "4c6d702b271d0e1c480a6e4468b069252dfc8597", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "02be78d245f7c54ef5abc85829ad6df6b0e52cd3", "extension": "py"...
2.546875
stackv2
import argparse import hashlib import os import platform import sys import tarfile import textwrap import warnings import zipfile from urllib.request import HTTPError, urlopen, urlretrieve machine_map = { "x86_64": "amd64", } def checksum_file(path): """Compute the sha256 checksum of a path""" hasher = h...
188
28.44
110
15
1,329
python
[{"finding_id": "codeql_py/overly-permissive-file_4eef6bf3a3e39f4f_27248425", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable." ]
[ 96 ]
[ null ]
[ 5 ]
[ 33 ]
2024-11-19T00:02:46.017580+00:00
1,674,839,035,000
0df4ea928241447316ee70900f90ce82158b7fb2
2
{ "blob_id": "0df4ea928241447316ee70900f90ce82158b7fb2", "branch_name": "refs/heads/master", "committer_date": 1674839035000, "content_id": "3e55998dad8f397461d276494a3c3e4dc8836b30", "detected_licenses": [ "MIT" ], "directory_id": "ca27b4fa0ae958094827d3c6ef76f314008974d3", "extension": "py", "fi...
2.390625
stackv2
import binascii import logging import os from django.core.management.base import BaseCommand from django.db import IntegrityError from oidc_provider.models import Client from oidc_provider.models import ResponseType logger = logging.getLogger(__name__) """ Usage example: kolibri manage oidccreateclient --name="hooo...
91
32.85
116
16
596
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c144eda81017374b_31e8baa9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text." ]
[ 76 ]
[ 78 ]
[ 17 ]
[ 18 ]
2024-11-19T00:15:30.912296+00:00
1,489,921,508,000
2cca57a032a400b0146d91390505ef1447a4535d
3
{ "blob_id": "2cca57a032a400b0146d91390505ef1447a4535d", "branch_name": "refs/heads/master", "committer_date": 1489921508000, "content_id": "0d20fa0d6540e259f3769c578995b228dac7d1fe", "detected_licenses": [ "MIT" ], "directory_id": "d9258ece16e39d83d2e7e38805456aa4510e29d7", "extension": "py", "fi...
2.609375
stackv2
import discord import asyncio import os import cv2 import numpy as np import re import math from PIL import Image import requests from io import BytesIO client = discord.Client() face_cascade = cv2.CascadeClassifier('haarcascade_frontalface_alt.xml') eye_cascade = cv2.CascadeClassifier('haarcascade_eye.xml') img_face...
162
28.51
124
17
1,191
python
[{"finding_id": "codeql_py/overly-large-range_aa6931c43e360f82_0035f2e9", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 28 ]
[ null ]
[ 58 ]
[ 61 ]
2024-11-19T00:15:31.296899+00:00
1,633,516,918,000
9e828ce6adfe94f57c3ad2d626e2fcd84d528838
4
{ "blob_id": "9e828ce6adfe94f57c3ad2d626e2fcd84d528838", "branch_name": "refs/heads/main", "committer_date": 1633516918000, "content_id": "8453e309d28d7e5498d05238196626cebf4cf144", "detected_licenses": [ "MIT" ], "directory_id": "be88287edb378ec24f00d85096977aa6e8cbdf32", "extension": "py", "file...
3.984375
stackv2
import random numbers = "0123456789" upper = "ABCDEFGHIJKLMNOPQRSTUVWXYZ" lower = "abcdefghijklmnopqrstuvwxyz" symbols = "[]{}()*;/,._-" # Add the number, character and symbols sum = lower + upper + numbers + symbols # Ask the user to enter length of the password length = int(input("Enter the password length: ")) #...
20
21.75
50
9
110
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2166d7a17016f4b3_3662e4de", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 20 ]
[ null ]
[ 7 ]
[ 15 ]
2024-11-19T00:25:32.139699+00:00
1,613,269,615,000
2977737f9b0cdee4207b7d68ae23572427ce0fdc
2
{ "blob_id": "2977737f9b0cdee4207b7d68ae23572427ce0fdc", "branch_name": "refs/heads/main", "committer_date": 1613269615000, "content_id": "4a6f1740c8b033343ec237cdc029fa47e4b0f0f1", "detected_licenses": [ "Apache-2.0" ], "directory_id": "42d4872c3d7e078c1418131df53569f1e16ff6e2", "extension": "py", ...
2.3125
stackv2
from flask import Flask, render_template, request, Markup, session, jsonify from flask_wtf.csrf import CSRFProtect from nornir_control import nornir_inv, nornir_run import yaml import traceback import ydata from os import urandom from uuid import uuid4 app = Flask(__name__, template_folder='templates', static_folder=...
102
27.31
84
15
704
python
[{"finding_id": "codeql_py/stack-trace-exposure_1e9dab44c4b98b10_b228073f", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 101 ]
[ null ]
[ 20 ]
[ 36 ]
2024-11-19T00:25:38.045230+00:00
1,566,318,516,000
7c83311f65068b3c1ea3c0305f28992077018538
3
{ "blob_id": "7c83311f65068b3c1ea3c0305f28992077018538", "branch_name": "refs/heads/master", "committer_date": 1566318516000, "content_id": "d2e1f2d273c9367051a2a39b1f0be920a1ea5202", "detected_licenses": [ "Unlicense" ], "directory_id": "1c4c3daf165c4e71de36748ac948704295be63b3", "extension": "py",...
3.15625
stackv2
from os import system import psycopg2 from operation.connector import conn from operation.validation.userValidation import ( employeeNameValidation as employee_name_validation) from statement.sqlmainstatement import get_delete_data_statement def delete_data(employee_name): try: connect = conn() ...
40
30.75
69
13
255
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7416643446e62499_f05e2701", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 15, 24 ]
[ null, null ]
[ 47, 41 ]
[ 60, 54 ]
2024-11-19T00:15:59.912460+00:00
1,631,866,531,000
b2e40c7f20d10d632864e521ef38a2d2a414237b
3
{ "blob_id": "b2e40c7f20d10d632864e521ef38a2d2a414237b", "branch_name": "refs/heads/main", "committer_date": 1631866531000, "content_id": "76a74e30bd53e38c3422427114339512e7b46eab", "detected_licenses": [ "MIT" ], "directory_id": "a740129d5df4aba27660a556a818ef69182b4400", "extension": "py", "file...
2.609375
stackv2
from seviceLayer.Managers.AuthorizationManager import AuthorizationManager from repository.VerificationRepository import VerificationRepository from Domain.models.RegisterUserDomainModel import RegisterUserDomainModel import re import datetime import hashlib class RegisterService: repository: VerificationReposito...
54
30.69
95
22
307
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_b95aadf895eab250_cf797a9a", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 27 ]
[ null ]
[ 51 ]
[ 83 ]
2024-11-19T00:28:34.181733+00:00
1,628,083,880,000
99bfaf58252a24d8c9690832d9308086db2050a8
3
{ "blob_id": "99bfaf58252a24d8c9690832d9308086db2050a8", "branch_name": "refs/heads/main", "committer_date": 1628083880000, "content_id": "6a9c4f3b26950c956f32eb44359502fdb9fbf284", "detected_licenses": [ "MIT" ], "directory_id": "b8f31f5480418f1d06a49691cca6fd67d2ee6ff3", "extension": "py", "file...
2.65625
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- from flask import Flask, request, redirect, url_for, send_from_directory, render_template, make_response from werkzeug.utils import secure_filename import re import os import xml.sax import base64 import pickle UPLOAD_FOLDER = '.' ALLOWED_EXTENSIONS = set(['xml']) app = Fl...
160
27.02
104
18
1,123
python
[{"finding_id": "codeql_py/unsafe-deserialization_ce95fd78ae143585_7400966d", "tool_name": "codeql", "rule_id": "py/unsafe-deserialization", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Unsafe deserialization depends on a [user-provided value](1).", "remediation": "", "locatio...
14
true
[ "CWE-502", "CWE-079", "CWE-079", "CWE-079", "CWE-079", "CWE-079", "CWE-079", "CWE-079", "CWE-079", "CWE-079", "CWE-601", "CWE-601", "CWE-601", "CWE-022" ]
[ "py/unsafe-deserialization", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/url-redirection", "py/url-redirection", "py/url-redirection", "py/pa...
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Unsafe deserialization depends on a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vu...
[ 150, 75, 84, 98, 104, 117, 121, 125, 129, 133, 63, 69, 138, 91 ]
[ null, null, null, null, null, null, null, null, null, null, null, null, null, null ]
[ 35, 10, 12, 10, 10, 10, 10, 10, 10, 10, 25, 25, 19, 13 ]
[ 67, 33, 34, 31, 38, 15, 31, 31, 31, 38, 36, 36, 43, 18 ]
2024-11-19T02:00:48.205693+00:00
1,536,480,295,000
c92c310f5b7cf334660e7d7dcf2a3e6cdf1ee6c4
3
{ "blob_id": "c92c310f5b7cf334660e7d7dcf2a3e6cdf1ee6c4", "branch_name": "refs/heads/master", "committer_date": 1536480295000, "content_id": "5dbf3aa93a996a751205dbe529cbd80b4e09a03a", "detected_licenses": [ "MIT" ], "directory_id": "de50888f6ecefa208e0103979eb84eae7c9014c3", "extension": "py", "fi...
3.28125
stackv2
#! /usr/bin/env python3.6 from user import User from profile import Profile import string import random def create_user(username, password): #create user ''' Method that creates a user ''' new_user = User(username, password) return new_user def create_profile(account, password): #create profile ''' M...
123
32.05
157
21
778
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_59cfaf711e059546_0bb2e104", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 72, 87, 95 ]
[ null, null, null ]
[ 19, 23, 31 ]
[ 110, 67, 130 ]
2024-11-19T02:00:57.385009+00:00
1,524,542,118,000
23bdbeb143832a649022f647c5dc5f61c5759b91
3
{ "blob_id": "23bdbeb143832a649022f647c5dc5f61c5759b91", "branch_name": "refs/heads/master", "committer_date": 1524542118000, "content_id": "4ffbff85fa1a4f47cd8aa60f46d67a3444695a20", "detected_licenses": [ "MIT" ], "directory_id": "d78c550a715ff75045b71783afd8da7f3f208581", "extension": "py", "fi...
2.734375
stackv2
from flask import Flask, render_template, request, make_response app = Flask(__name__) @app.route('/') def index(): return render_template('index.html') @app.route('/guardarcookie', methods=['POST']) def guardarcookie(): if request.method == 'POST': id = request.form['id'] respuesta = make_res...
22
26.09
69
14
139
python
[{"finding_id": "codeql_py/cookie-injection_5b550534c38af92e_1bac7f25", "tool_name": "codeql", "rule_id": "py/cookie-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cookie is constructed from a [user-supplied input](1).", "remediation": "", "location": {"file_path": "...
2
true
[ "CWE-020", "CWE-079" ]
[ "py/cookie-injection", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cookie is constructed from a [user-supplied input](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 13, 19 ]
[ null, null ]
[ 36, 12 ]
[ 38, 44 ]
2024-11-19T02:00:58.392295+00:00
1,600,273,166,000
9fc43ed439650430f8041e92d90aab5b15996962
3
{ "blob_id": "9fc43ed439650430f8041e92d90aab5b15996962", "branch_name": "refs/heads/master", "committer_date": 1600273166000, "content_id": "47909418ff74a48e2eb90a9043e6e194f6092638", "detected_licenses": [ "MIT" ], "directory_id": "a297827b4cf213dfa65bd4d6627155cc10bd1bcf", "extension": "py", "fi...
2.71875
stackv2
#run command "pip install -r requirements.txt" to install all the python dependencies required for these scripts import pandas as pd import json import base64 import logging import requests import csv import os from requests.packages.urllib3.exceptions import InsecureRequestWarning requests.packages.urllib3.disable_war...
96
45.28
156
20
1,040
python
[{"finding_id": "codeql_py/request-without-cert-validation_6383e5ab361cfa06_b882749b", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
3
true
[ "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 35, 39, 86 ]
[ 36, 40, 87 ]
[ 25, 21, 19 ]
[ 71, 75, 74 ]
2024-11-19T00:27:19.840001+00:00
1,657,533,392,000
73cf09523a918c2408c69e70455c8e6d861a4b63
2
{ "blob_id": "73cf09523a918c2408c69e70455c8e6d861a4b63", "branch_name": "refs/heads/master", "committer_date": 1657533392000, "content_id": "ee01aa186ede9668722d235c87babd66ab888bdd", "detected_licenses": [ "Apache-2.0" ], "directory_id": "4ec5af4def6bb64d268795779ad2d5ebd2f02c27", "extension": "py"...
2.40625
stackv2
import binascii import hashlib import logging import os import string from base64 import b64decode from random import choice import boto3 from botocore.exceptions import ClientError from cfn_resource_provider import ResourceProvider from past.builtins import basestring import ssm_parameter_name log = logging.getLog...
276
33.38
102
19
1,967
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_7ed415dec24724d1_541a3b3d", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 219 ]
[ null ]
[ 37 ]
[ 67 ]