added
stringlengths
32
32
created
int64
1,244B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.25
source
stringclasses
1 value
text
stringlengths
324
20.1k
num_lines
int64
16
598
avg_line_length
float64
15.1
58.3
max_line_length
int64
33
179
ast_depth
int64
8
39
length
int64
101
3.8k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.1k
265k
sast_codeql_findings_count
int64
1
45
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
45
rule_ids
listlengths
1
45
confidences
listlengths
1
45
severities
listlengths
1
45
messages
listlengths
1
45
line_starts
listlengths
1
45
line_ends
listlengths
1
45
column_starts
listlengths
1
45
column_ends
listlengths
1
45
2024-11-18T21:25:48.065305+00:00
1,627,693,727,000
4dcef0b6efb2efaaf12aafe58687a17efabdc5ce
2
{ "blob_id": "4dcef0b6efb2efaaf12aafe58687a17efabdc5ce", "branch_name": "refs/heads/master", "committer_date": 1627693727000, "content_id": "06a14c0f2c1f934a1d83878a7e250392ede0e0f6", "detected_licenses": [ "MIT" ], "directory_id": "6b8eb4e81eddfde60a747fe18cecd06833040ebc", "extension": "py", "fi...
2.5
stackv2
__author__ = 'xiaozong zhou' import base64 from flask import request from flask import Flask import mysql.connector as mysql import os import time app=Flask(__name__, static_folder="./det_results_imgs") #建立一个flask app fire_db = mysql.connect( host = "localhost", user = "", password = "", database = "",...
105
23.89
73
15
707
python
[{"finding_id": "codeql_py/sql-injection_dec92b69b3cd25d4_9b8fe518", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown...
4
true
[ "CWE-089", "CWE-089", "CWE-089", "CWE-089" ]
[ "py/sql-injection", "py/sql-injection", "py/sql-injection", "py/sql-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This SQL query depends on a [user-provided value](1).", "This SQL query depends on a [user-provided value](1).", "This SQL query depends on a [user-provided value](1).", "This SQL query depends on a [user-provided value](1)." ]
[ 54, 66, 85, 97 ]
[ null, null, null, null ]
[ 26, 26, 26, 26 ]
[ 29, 29, 29, 29 ]
2024-11-18T21:26:04.612030+00:00
1,526,412,969,000
98a0d7e22af939e4460944d0b2fd14c6d9095806
2
{ "blob_id": "98a0d7e22af939e4460944d0b2fd14c6d9095806", "branch_name": "refs/heads/master", "committer_date": 1526412969000, "content_id": "7b6a7b9ef5233bd6bb72fd76dd904782230aa244", "detected_licenses": [ "MIT" ], "directory_id": "a5ff734fa46bafc72e2e4e6f9599179c043ec03c", "extension": "py", "fi...
2.5
stackv2
#coding: utf-8 from sqlite3 import dbapi2 as sqlite3 from flask import Flask, render_template, request, g, redirect import requests import json import os # Flask app app = Flask(__name__) app.config.from_object(__name__) app.config.update(dict( DATABASE=os.path.join(app.root_path, '../mcg_radio.db'), BACKEN...
196
26.04
97
19
1,225
python
[{"finding_id": "codeql_py/full-ssrf_df677a2f3db8c7fc_b3f6f4f9", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
1
true
[ "CWE-918" ]
[ "py/full-ssrf" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1)." ]
[ 93 ]
[ null ]
[ 9 ]
[ 31 ]
2024-11-18T21:51:46.863548+00:00
1,614,024,562,000
e79a5f381894a89dcbc7f337e8a011f028ab9ccd
2
{ "blob_id": "e79a5f381894a89dcbc7f337e8a011f028ab9ccd", "branch_name": "refs/heads/master", "committer_date": 1614024562000, "content_id": "565651eb1cb7ad17b47f61fb2cea5b59e2280a1d", "detected_licenses": [ "MIT" ], "directory_id": "c01d93505eabbc2f8d235fa395cf91f9f7b8e977", "extension": "py", "fi...
2.375
stackv2
import jinja2, json, logging, os, yaml class TenxApp(object): config = None # class variable, used as a singleton for the app config def __init__(self, config_fn=None): ''' Tenx App with YAML Config ''' if TenxApp.config is not None: raise Exception("Trying to re-initialize the ...
108
40.14
144
15
1,090
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_31bb224f804cfdbb_2d9317c7", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
3
true
[ "CWE-079", "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 26, 80, 100 ]
[ null, null, null ]
[ 31, 20, 18 ]
[ 56, 47, 43 ]
2024-11-18T20:31:27.383154+00:00
1,671,170,306,000
6764232e287481c4c986ef45d567688b245bc4d6
3
{ "blob_id": "6764232e287481c4c986ef45d567688b245bc4d6", "branch_name": "refs/heads/master", "committer_date": 1671170306000, "content_id": "cc9bc9fa84a0c57b7fb814d5eeea92549b7fd21f", "detected_licenses": [ "MIT" ], "directory_id": "df93b012b717f2ef4e7b6f0979edd1f29bddcc5b", "extension": "py", "fi...
3.4375
stackv2
from hashlib import md5 from typing import Optional, Tuple TEST = 'abc' PUZZLE = 'ffykfhsq' def passwordCharacter(string: str) -> Optional[str]: digest = md5(bytes(string, 'utf-8')).hexdigest() if digest[:5] == '00000': return digest[5] def findPassword(string: str) -> str: result = '' i = ...
55
23.91
64
13
420
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2d596c41785e0625_c5a855ee", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
4
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive...
[ 40, 40, 53, 55 ]
[ null, null, null, null ]
[ 19, 29, 7, 7 ]
[ 27, 37, 25, 25 ]
2024-11-18T20:59:47.311681+00:00
1,386,217,492,000
bcec0867b6f22d3d4cb6268f71a1bf7411668ff2
3
{ "blob_id": "bcec0867b6f22d3d4cb6268f71a1bf7411668ff2", "branch_name": "refs/heads/master", "committer_date": 1386217492000, "content_id": "4710d1e4f879afc6e30c38e4c6738ff93da5e12b", "detected_licenses": [ "MIT" ], "directory_id": "89097f0cce8a864f6f31ed30173489dda34dc68d", "extension": "py", "fi...
2.84375
stackv2
import requests from db_access import * class UserData: def __init__(self, uname, pword): self.username = str(uname) #Because eventually we shouldn't be storing passwords anywhere self.password_hash = str(pword) class LoginError(BaseException): def __init__(self, reason): se...
36
26.08
70
13
225
python
[{"finding_id": "codeql_py/request-without-cert-validation_4e5f3221cc86d301_54aa08e1", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 25 ]
[ null ]
[ 19 ]
[ 67 ]
2024-11-18T21:00:04.775455+00:00
1,575,363,146,000
4b4008346c46fc4f32882b30b8a66a588e640d6b
2
{ "blob_id": "4b4008346c46fc4f32882b30b8a66a588e640d6b", "branch_name": "refs/heads/master", "committer_date": 1575363146000, "content_id": "b1da93f3161b010afacf831a12d97195745db48e", "detected_licenses": [ "MIT" ], "directory_id": "cf8bc9eef83ecbc29e7ccd15b072c405652b12bf", "extension": "py", "fi...
2.359375
stackv2
# coding: utf-8 import csv import io from collections import defaultdict from itertools import groupby from dateutil.parser import parse from django.db import transaction from django.db.models import Count, Sum from qsstats import QuerySetStats from rest_framework import status from rest_framework.exceptions import V...
224
30.17
93
21
1,522
python
[{"finding_id": "codeql_py/stack-trace-exposure_814231ac00183e61_b3a4038f", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 116 ]
[ null ]
[ 29 ]
[ 46 ]
2024-11-18T21:10:26.072749+00:00
1,439,477,123,000
909d40006b2bd1c176e4b373b7160dc3d8f91e4a
2
{ "blob_id": "909d40006b2bd1c176e4b373b7160dc3d8f91e4a", "branch_name": "refs/heads/master", "committer_date": 1439477123000, "content_id": "b7c7996dc1aa94c7c1956d0666332f1e76a75d09", "detected_licenses": [ "Apache-2.0" ], "directory_id": "52e62ab9322585c1125e99981377dda62c711022", "extension": "py"...
2.3125
stackv2
from flask import Flask from SPARQLWrapper import SPARQLWrapper, JSON, Wrapper from flask import request, jsonify from flask.ext.cors import CORS import base64 import logging from logging import StreamHandler app = Flask(__name__) CORS(app) file_handler = StreamHandler() app.logger.setLevel(logging.DEBUG) app.logge...
73
27.55
76
18
477
python
[{"finding_id": "codeql_py/stack-trace-exposure_3fa8aa34f23aa39d_3e9dfe71", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-117" ]
[ "py/stack-trace-exposure", "py/log-injection" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "This log entry depends on a [user-provided value](1)." ]
[ 54, 31 ]
[ null, null ]
[ 32, 22 ]
[ 69, 27 ]
2024-11-18T21:10:28.108206+00:00
1,527,299,245,000
2f657c4986c7dc3ae82ffdd9a9dd30d84e017c6c
3
{ "blob_id": "2f657c4986c7dc3ae82ffdd9a9dd30d84e017c6c", "branch_name": "refs/heads/master", "committer_date": 1527299245000, "content_id": "c01d26f03f83e69c700ef0f8da9c60c27261812f", "detected_licenses": [ "MIT" ], "directory_id": "981f87e66d44c782f6814b852ba1c850507cf4bd", "extension": "py", "fi...
2.875
stackv2
import hashlib from Crypto.PublicKey import RSA from Crypto.Util.randpool import RandomPool class Encrypt: def __init__(self): self.private_key = None self.public_key = None self.outside_public_key = None def generate_key(self): pool = RandomPool(384) pool.stir() ...
45
29.29
92
12
302
python
[{"finding_id": "codeql_py/weak-crypto-key_79b5014db6da63b8_9e84f65f", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",...
1
true
[ "CWE-326" ]
[ "py/weak-crypto-key" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable." ]
[ 18 ]
[ null ]
[ 28 ]
[ 60 ]
2024-11-18T21:10:48.894435+00:00
1,400,718,148,000
2c82bdad24dbea6485032d230d885cb012ea5759
2
{ "blob_id": "2c82bdad24dbea6485032d230d885cb012ea5759", "branch_name": "refs/heads/master", "committer_date": 1400718148000, "content_id": "2bf69c49811855aa9e59265d322dcd640eff54e7", "detected_licenses": [ "MIT" ], "directory_id": "43f05bd446af958b5dce292eff526e0687a1c22a", "extension": "py", "fi...
2.484375
stackv2
# -*- coding: utf-8 -*- from quick_server import serve_and_open import urls from os.path import dirname, abspath, join, isfile, isdir from warnings import warn from urllib2 import urlopen, HTTPError, URLError import json import os import shutil import appdirs import re from jinja2 import Environment, PackageLoader, T...
332
38.57
93
20
2,759
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_1d1c30f3974f42b6_e0b377a8", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 20 ]
[ null ]
[ 7 ]
[ 63 ]
2024-11-18T21:23:45.374853+00:00
1,648,474,940,000
a53fd7f9f7561d690a693106d252e40e7b086fd1
3
{ "blob_id": "a53fd7f9f7561d690a693106d252e40e7b086fd1", "branch_name": "refs/heads/master", "committer_date": 1648474940000, "content_id": "c4211859c644d0b4c9453f280cf1efed5d96c575", "detected_licenses": [ "Apache-2.0" ], "directory_id": "d0475f5d01beff019a561e4c4f9c8cc82d6e1b36", "extension": "py"...
2.640625
stackv2
import datetime from datetime import date import requests import cache import config import time def get_all(daysFromNow, startDate): results = [] for ii in range(0, daysFromNow): targetDate = startDate + datetime.timedelta(days=ii) queryFormattedDate = str(targetDate) entries = lookup...
94
27.44
115
15
623
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_af6ed4e0dc8315c2_130df82a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 42, 81 ]
[ null, null ]
[ 54, 54 ]
[ 59, 59 ]
2024-11-18T21:24:03.699550+00:00
1,524,395,481,000
ad5dbd0eeb600c2756c442eb66785a6ecbea9f8c
2
{ "blob_id": "ad5dbd0eeb600c2756c442eb66785a6ecbea9f8c", "branch_name": "refs/heads/master", "committer_date": 1524395481000, "content_id": "c1273140867f2aa115c4945e973db34422b6725d", "detected_licenses": [ "MIT" ], "directory_id": "c957313801c534b77d172646581c15c6fa5d8f3c", "extension": "py", "fi...
2.46875
stackv2
import binascii import glob import hashlib import json import logging import os from flask import Flask, render_template, request, redirect, flash from werkzeug.utils import secure_filename import settings logger = logging.getLogger(__name__) app = Flask(__name__) # global dictionary of music file hashes and names ...
228
26.15
90
19
1,401
python
[{"finding_id": "codeql_py/url-redirection_92ed5d373f6cc2d7_fd2af2c6", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 206 ]
[ null ]
[ 25 ]
[ 36 ]
2024-11-18T21:37:41.198204+00:00
1,500,231,175,000
adf135412dff3442946b6ba5b6b40976b3d14edd
3
{ "blob_id": "adf135412dff3442946b6ba5b6b40976b3d14edd", "branch_name": "refs/heads/master", "committer_date": 1500231175000, "content_id": "451e8edc7485d4fa5356fd76a3ac7c89d7105cac", "detected_licenses": [ "MIT" ], "directory_id": "1f1f24089a4ba785f4113afb7413a25363f0eff7", "extension": "py", "fi...
3.15625
stackv2
# -*- coding: utf-8 -*- import hashlib from base64 import b64encode from datetime import datetime, timedelta from urllib.parse import urlparse def secure_link(baselink, secret, period=30): """ :param baselink: base url for signing :param secret: secret string shared only with web server :param perio...
46
26.41
97
15
319
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_bea8cfbe2baeafb7_342f712f", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (secret)](2) is used in a hashing algorithm (MD5) that is insecure." ]
[ 26 ]
[ null ]
[ 14 ]
[ 49 ]
2024-11-18T21:59:02.327847+00:00
1,609,727,926,000
2ac5d7654856dd1b25b5f5f1589a0abe41211ecc
2
{ "blob_id": "2ac5d7654856dd1b25b5f5f1589a0abe41211ecc", "branch_name": "refs/heads/main", "committer_date": 1609727926000, "content_id": "0d6ac3a560cf65ff9803c419c50806ffca2b4ea9", "detected_licenses": [ "MIT" ], "directory_id": "30bb636e46af62b2b7e8288e1261c2704fee62fc", "extension": "py", "file...
2.375
stackv2
# -*- coding: utf-8 -*- import os import logging import random import re from datetime import datetime, timedelta from utils.classes import Cog import discord import pandas as pd from discord.ext import commands from sklearn.feature_extraction.text import TfidfVectorizer from sklearn.linear_model import LogisticRegres...
161
40.7
119
20
1,593
python
[{"finding_id": "codeql_py/overly-large-range_58e8c5ab7c52399b_d997fb9f", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[#$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].",...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[#$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 21 ]
[ null ]
[ 53 ]
[ 56 ]
2024-11-18T21:59:02.668608+00:00
1,617,042,898,000
025b01a97be64a86cb23232b9f6799a472d06c07
2
{ "blob_id": "025b01a97be64a86cb23232b9f6799a472d06c07", "branch_name": "refs/heads/main", "committer_date": 1617042898000, "content_id": "d81e89165803e232a2485c65ae4e12b9ad3284cd", "detected_licenses": [ "Apache-2.0" ], "directory_id": "180da96989f678f6a3600324fb1869bc94ee5352", "extension": "py", ...
2.46875
stackv2
#!/usr/bin/python3 # -*- coding: utf-8 -*- """ Raw parsing of a dash mpd to display human readable timing info The script does not go into xml and loading data, it is sequential $ python3 mpdtimeline.py [-f filename.mpd] [-o (inline/log)] [-url RepresentationID] pip install python-dateutil pip install isodate Essent...
281
43.74
161
23
2,962
python
[{"finding_id": "codeql_py/request-without-cert-validation_deb7793881d6bea1_98484d96", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 70 ]
[ 71 ]
[ 9 ]
[ 22 ]
2024-11-18T22:24:02.074320+00:00
1,685,091,293,000
996bacaea74da5dee489464d8076d34967c0922e
3
{ "blob_id": "996bacaea74da5dee489464d8076d34967c0922e", "branch_name": "refs/heads/master", "committer_date": 1685091293000, "content_id": "5de57690d93b73d509f8ba566a0cfae1076cf587", "detected_licenses": [ "MIT" ], "directory_id": "34b5b947947ac9ce6e76799c40aad328252e7d8f", "extension": "py", "fi...
2.6875
stackv2
""" Simply execute this file with python. Best use pipenv for the requirements, i.e., pipenv run python3 compile.py """ import jinja2 as jinja2 from folder_compiler import FolderCompiler from folder_compiler.processors import FileCopyProcessor, DevNullProcessor from folder_compiler_static_website import HtmlProces...
38
35.08
88
10
321
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_1414f934cbfa9522_c289b13f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 16 ]
[ 18 ]
[ 9 ]
[ 2 ]
2024-11-18T22:24:07.869408+00:00
1,554,040,308,000
f930d677916bd43f796eb934575c7dff826f3d7b
3
{ "blob_id": "f930d677916bd43f796eb934575c7dff826f3d7b", "branch_name": "refs/heads/master", "committer_date": 1554040308000, "content_id": "3f95bc1f60d796a2ad24a871bfde25efa446e3a9", "detected_licenses": [ "MIT" ], "directory_id": "195c5edccf21d318f9be79454739b8c0f956faaf", "extension": "py", "fi...
3.4375
stackv2
"""Python script to generate fake data with the same format as the example data. Fields relative to out algorithm (Working with children's check, driver, experience and gender) are randomised with 50% chance. Each 'mentor' will preference 4 out of the NUMCLASSES classes (1,2,3,4). Each 'mentor' also has a ...
73
41.67
156
24
1,002
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_7d7463c1f62f3510_aeecafe2", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text." ]
[ 67 ]
[ null ]
[ 23 ]
[ 30 ]
2024-11-18T22:24:09.178864+00:00
1,549,341,176,000
d8c454eafde3d294c8d275591786b31b3d003509
3
{ "blob_id": "d8c454eafde3d294c8d275591786b31b3d003509", "branch_name": "refs/heads/master", "committer_date": 1549341176000, "content_id": "8e1998220a4734b0eae718117548b299d173bf04", "detected_licenses": [ "Apache-2.0" ], "directory_id": "2fdbeec362aaab4c9dcc5153e9adef4ca3d515ee", "extension": "py"...
2.984375
stackv2
from turtle import * import math topdown = Turtle() bgcolor('black') topdown.shape('circle') topdown.resizemode('auto') gc = 266 + ((51+(6.2/60))/60) star_tilt = 7.25 neptune_coors = (344 + (2 + (29.2/60))/60, -(58+(1.4/60))/60, 29.938) pluto_coors = (336 + (2 + (29.2/60))/60, -(13 + (58+(1.4/60))/60), 41) xrange = 72...
339
24.17
112
13
2,962
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_00e300bc1d48b789_ee7c1c12", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (priva...
[ 170, 187 ]
[ null, null ]
[ 11, 11 ]
[ 20, 20 ]
2024-11-18T22:35:57.819631+00:00
1,589,924,543,000
89c51e3eba1feefa66fd51e6207fb49aa78aafce
3
{ "blob_id": "89c51e3eba1feefa66fd51e6207fb49aa78aafce", "branch_name": "refs/heads/master", "committer_date": 1589924763000, "content_id": "e10e1eb4ee22dd2f382550f3b70518246a0eb7fe", "detected_licenses": [ "MIT" ], "directory_id": "66d74253e9e889e0376b83e129bfeae167c828a3", "extension": "py", "fi...
2.6875
stackv2
import time import random from selenium import webdriver from bs4 import BeautifulSoup as bs import re import csv import getpass # Ask user to type username and password # Your login credentials email = input("username[email id]: ") #your email id password = getpass.getpass(prompt='Password: ', stream=None) # Your pa...
80
34.62
106
15
661
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_38cc0d8c8c0a08f1_e72b654c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 66 ]
[ null ]
[ 22 ]
[ 28 ]
2024-11-18T22:36:21.171474+00:00
1,596,551,647,000
b1ec13875e4441e6f787d3c7ce527303a76d9595
3
{ "blob_id": "b1ec13875e4441e6f787d3c7ce527303a76d9595", "branch_name": "refs/heads/master", "committer_date": 1596554391000, "content_id": "704421937542f5722a31bf4c97b36b9eb7f4b55c", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "11717af92835c21bc02e417cdd5aa7566c4ef7cf", "extension": "p...
2.515625
stackv2
import ast import asyncio import re from copy import deepcopy import pyjq from jinja2 import Environment, StrictUndefined, Template, meta from pydantic import Field from toucan_data_sdk.utils.helpers import slugify # Query interpolation RE_PARAM = r'%\(([^(%\()]*)\)s' RE_JINJA = r'{{([^({{)}]*)}}' RE_PARAM_ALONE = ...
206
32.69
100
24
1,546
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_9cd2f0e00a361fe2_4f70eba1", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
4
true
[ "CWE-079", "CWE-079", "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false", "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially...
[ 38, 79, 107, 169 ]
[ null, null, null, null ]
[ 13, 19, 29, 12 ]
[ 26, 34, 80, 27 ]
2024-11-18T22:36:29.407588+00:00
1,520,311,118,000
c69107b17a7cdc2331dd26d64737e64307f8c3c6
3
{ "blob_id": "c69107b17a7cdc2331dd26d64737e64307f8c3c6", "branch_name": "refs/heads/master", "committer_date": 1520311118000, "content_id": "7bc56df753d476b3de3b57076739c5f9773696df", "detected_licenses": [ "MIT" ], "directory_id": "8225f0e97c71ed14448de53cef789fe56cbbd94c", "extension": "py", "fi...
2.515625
stackv2
from globibot.lib.plugin import Plugin from collections import defaultdict from time import time import re URL_PATTERN = re.compile('http[s]?://(?:[a-zA-Z]|[0-9]|[$-_@.&+]|[!*\(\),]|(?:%[0-9a-fA-F][0-9a-fA-F]))+') class Repost(Plugin): def load(self): self.shames = defaultdict(lambda: defaultdict(list)...
49
34.88
106
21
381
python
[{"finding_id": "codeql_py/overly-large-range_1638835a01826759_9c028b00", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 8 ]
[ null ]
[ 57 ]
[ 60 ]
2024-11-18T22:36:43.149904+00:00
1,595,752,336,000
761592b68c843aa7a2a563f192432c2b1a34e119
2
{ "blob_id": "761592b68c843aa7a2a563f192432c2b1a34e119", "branch_name": "refs/heads/master", "committer_date": 1595752336000, "content_id": "4169810f33095d636dfe33f9c8b2eae89b5b2efe", "detected_licenses": [ "MIT" ], "directory_id": "d33be2b13ef522bbd43b9adfedc9c67c3c4aa45d", "extension": "py", "fi...
2.375
stackv2
#!/usr/bin/env python # encoding=utf8 ############################## check_hs3 ######################## # Date: Feb 02 2020 # Author: Geir Rune Grøtan # Help: https://github.com/grotan1/check_hs3 # Licence: MIT License - https://tldrlegal.com/license/mit-license #########################################################...
204
22.27
98
20
1,345
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d7f431182511dd64_68cae796", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 196, 198 ]
[ null, null ]
[ 10, 10 ]
[ 68, 52 ]
2024-11-18T20:23:20.751086+00:00
1,397,421,125,000
cbb208cbda4a369f0f073578807201c748a8a96a
3
{ "blob_id": "cbb208cbda4a369f0f073578807201c748a8a96a", "branch_name": "refs/heads/master", "committer_date": 1397421125000, "content_id": "62f34684dd542029bca1dfad41eaa404e1d249b3", "detected_licenses": [ "ISC" ], "directory_id": "5c768cfdd22678047236e02d7c38c108a07225fd", "extension": "py", "fi...
2.59375
stackv2
# -*- coding: utf-8 -*- # # whereami.py # whereami # """ Use the Core Location framework. """ import os import sys import time import optparse from optparse import OptionValueError from collections import namedtuple from collections import OrderedDict import webbrowser import requests from geoip2.database import R...
326
27.84
105
17
2,015
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_795eee382fb997da_6a9b2f41", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text." ]
[ 73 ]
[ null ]
[ 27 ]
[ 65 ]
2024-11-18T20:23:25.752443+00:00
1,561,878,844,000
ce33c980fdec06cbe909e155dda320cd64f4afc3
3
{ "blob_id": "ce33c980fdec06cbe909e155dda320cd64f4afc3", "branch_name": "refs/heads/master", "committer_date": 1561878844000, "content_id": "592060029b065c94a061e4003c964878934651ea", "detected_licenses": [ "MIT" ], "directory_id": "de4cf465f6f80269993ab36a1b00d3f368b95f9b", "extension": "py", "fi...
3
stackv2
#!/usr/bin/env python3 import geocoder import math from telescope_planner.constants import DEFAULT_LOCATION try: import sys if sys.platform == 'ios': import console import location IS_IOS = True else: IS_IOS = False except: IS_IOS = False from types import SimpleName...
132
27.58
128
18
943
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d305ff4f8f2e2f6a_d27a15f3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 127 ]
[ null ]
[ 9 ]
[ 129 ]
2024-11-18T21:22:27.045401+00:00
1,502,116,084,000
a55cec804550757a453a883c7c5abb476f94af2e
2
{ "blob_id": "a55cec804550757a453a883c7c5abb476f94af2e", "branch_name": "refs/heads/master", "committer_date": 1502116084000, "content_id": "899515811c27c7afd834b3ab56e79e002823f083", "detected_licenses": [ "MIT" ], "directory_id": "fdbb121e66dffc4dffbf3528a1cbac5f1f0d7060", "extension": "py", "fi...
2.3125
stackv2
import os import psycopg2 import logging import requests import time import json import urlparse from bs4 import BeautifulSoup from datetime import datetime from flask import Flask, render_template from flask import request from logging.handlers import RotatingFileHandler from urllib import urlretrieve from youtube_dl...
326
34.56
175
27
2,543
python
[{"finding_id": "codeql_py/partial-ssrf_ea5b2eb2136e36c9_6342d002", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
3
true
[ "CWE-918", "CWE-117", "CWE-117" ]
[ "py/partial-ssrf", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 127, 87, 220 ]
[ null, null, null ]
[ 17, 29, 29 ]
[ 69, 33, 33 ]
2024-11-18T21:22:44.197360+00:00
1,587,911,379,000
40e96517a5031694e3350e4dc5c8c58c48ea7ec5
3
{ "blob_id": "40e96517a5031694e3350e4dc5c8c58c48ea7ec5", "branch_name": "refs/heads/master", "committer_date": 1587911379000, "content_id": "de441f96faaeb88512082f3e0dca4ca765dfb4d5", "detected_licenses": [ "MIT" ], "directory_id": "3f326610c1674ca52a4e70c22af84826f501b164", "extension": "py", "fi...
3.015625
stackv2
import numpy as np from PIL import Image import h5py import json import os import io import pickle from torchmeta.utils.data import Dataset, ClassDataset, CombinationMetaDataset from torchvision.datasets.utils import download_file_from_google_drive class TieredImagenet(CombinationMetaDataset): """ The Tiered...
250
40.6
93
19
2,296
python
[{"finding_id": "codeql_py/tarslip_aee94fb65c86f036_154342f6", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 185 ]
[ null ]
[ 13 ]
[ 14 ]
2024-11-18T21:22:52.309683+00:00
1,542,767,523,000
2e9dbe30cbc437f4d0b42feafec92f513ce1ed1d
2
{ "blob_id": "2e9dbe30cbc437f4d0b42feafec92f513ce1ed1d", "branch_name": "refs/heads/master", "committer_date": 1542767523000, "content_id": "cbc6208c4c05b2330849dc5eaab8a7610245100e", "detected_licenses": [ "Apache-2.0" ], "directory_id": "b955745d34abb500b4fe2e5c92d0d1e9b694a71a", "extension": "py"...
2.484375
stackv2
import mkdocs import subprocess import pathlib import os import logging logger = logging.getLogger(__name__) class HelmRepositoryPlugin(mkdocs.plugins.BasePlugin): config_scheme = ( ('chart', mkdocs.config.config_options.Type( mkdocs.utils.string_types, required=True)), ('chart_dir', ...
87
41.38
114
16
820
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_97a9337df9ffe5b2_c5b8f7fd", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [github.com/](1) may be at an arbitrary position in the...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [github.com/](1) may be at an arbitrary position in the sanitized URL." ]
[ 80 ]
[ null ]
[ 12 ]
[ 32 ]
2024-11-18T21:23:07.128626+00:00
1,620,819,455,000
1ef46cb235d2e4d679abdfdc79f724191fed47e5
3
{ "blob_id": "1ef46cb235d2e4d679abdfdc79f724191fed47e5", "branch_name": "refs/heads/main", "committer_date": 1620819455000, "content_id": "2576e9cd14727631b8c67f982fa009100034a6bb", "detected_licenses": [ "Apache-2.0" ], "directory_id": "55a311eb02403f8fa7e4d1e148e9bb5e80619984", "extension": "py", ...
2.9375
stackv2
import logging import re class SelectSqlValidation: def validate_parse_select(self, query): logging.debug("Validating Select query.....") select_query = [] query = self.remove_semicolon(self, query) if query.find("*") > 0: queryMatch = re.search("^select\s[*]\sfrom\s[...
67
33.37
113
15
498
python
[{"finding_id": "codeql_py/redos_e243e08b86bf3a25_ec59f863", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'select' and containing many repet...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with 'select' and containing many repetitions of '0'." ]
[ 19 ]
[ null ]
[ 48 ]
[ 60 ]
2024-11-18T21:23:17.516193+00:00
1,547,094,520,000
7cfcda71d428ad19ab17a8bb5bf2cd78093a8ffa
3
{ "blob_id": "7cfcda71d428ad19ab17a8bb5bf2cd78093a8ffa", "branch_name": "refs/heads/master", "committer_date": 1547094520000, "content_id": "95b0d8e88b89faad2c31f34aac6e255190724e5e", "detected_licenses": [ "MIT-0" ], "directory_id": "195cc290a279c765d9e477c54645c14cdd8c86aa", "extension": "py", "...
2.625
stackv2
import logging import requests from requests.exceptions import RequestException from .error import NetworkException class Wrapper(object): def __init__(self, node_host, api_key=''): self.node_host = node_host self.api_key = api_key def request(self, api, post_data=''): headers = {} ...
30
36.67
95
17
252
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6d1f9456df41e660_be9d9d24", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 23, 26 ]
[ null, null ]
[ 30, 30 ]
[ 83, 69 ]
2024-11-18T21:23:19.154782+00:00
1,582,908,214,000
f4db013b47f60f31b2a39c8c08a945382f381dd8
2
{ "blob_id": "f4db013b47f60f31b2a39c8c08a945382f381dd8", "branch_name": "refs/heads/master", "committer_date": 1582908214000, "content_id": "f9aac4f299555f63dbdd6d1fe498509c59421e30", "detected_licenses": [ "MIT" ], "directory_id": "fbd8bb98d39370d865f349e5a92c47345dc9a8a3", "extension": "py", "fi...
2.3125
stackv2
import os from setuptools.command.install import install import urllib.request def download(url: str, file: str): print(url, file) response = urllib.request.urlopen(url) data = response.read() print(f' >> downloading {file}') with open(file, 'wb') as f: f.write(data) class InstallWrapper(install): ...
29
28.76
102
14
218
python
[{"finding_id": "codeql_py/overly-permissive-file_1a03a5fcdab096c2_e887eabe", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ...
2
true
[ "CWE-732", "CWE-732" ]
[ "py/overly-permissive-file", "py/overly-permissive-file" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world writable.", "Overly permissive mask in chmod sets file to world writable." ]
[ 22, 27 ]
[ null, null ]
[ 13, 13 ]
[ 39, 46 ]
2024-11-18T21:51:16.225051+00:00
1,413,303,945,000
d12e25a60c938a8792abf4734ea400a5dfbc043d
3
{ "blob_id": "d12e25a60c938a8792abf4734ea400a5dfbc043d", "branch_name": "refs/heads/master", "committer_date": 1413303945000, "content_id": "6162e08747df7188d88c440eb48cbca32a156e2f", "detected_licenses": [ "MIT" ], "directory_id": "2d884b4fcda1750ba7400bd42fef42801823e1dc", "extension": "py", "fi...
2.6875
stackv2
import base64 as __b64__ try: import simplejson as __json__ except ImportError: print "Unable to import the simplejson library. Degrading to the built in json module." import json as __json__ import cStringIO import cPickle import gzip as __gzip__ import zlib as __zlib__ import uuid import hashlib from fuze...
213
26.74
96
18
1,478
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_6e46e78c1b513fc6_10463f0b", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.",...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.", "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 35, 42 ]
[ null, null ]
[ 23, 42 ]
[ 40, 59 ]
2024-11-18T21:51:18.346527+00:00
1,445,496,449,000
2fc6710834a40ae3fe508ac0bd95304943db998a
3
{ "blob_id": "2fc6710834a40ae3fe508ac0bd95304943db998a", "branch_name": "refs/heads/master", "committer_date": 1445496449000, "content_id": "b7c4419591077762b95f7304ed27e1fb221883f1", "detected_licenses": [ "Apache-2.0" ], "directory_id": "fc7607893be95a480c29ed21b4499221a9e1ab09", "extension": "py"...
3.296875
stackv2
#!/usr/bin/env python # TODO: Add optional master password argument # TODO: Better help. import string import hashlib import argparse import getpass DEFAULT_ALLOWED_CHARS = string.ascii_letters + string.digits DEFAULT_PASSWORD_LENGTH = 12 def derive_password(master, website, allowed_chars, length): hash_bytes = ...
35
34.09
75
13
262
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_eca9fe9374a90e34_dde3dbc6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text." ]
[ 34 ]
[ 35 ]
[ 7 ]
[ 35 ]
2024-11-18T21:51:27.472589+00:00
1,692,388,421,000
e940b8b61621c29d0ffe9ac66627770f6f38e7cf
3
{ "blob_id": "e940b8b61621c29d0ffe9ac66627770f6f38e7cf", "branch_name": "refs/heads/master", "committer_date": 1692388421000, "content_id": "9f16ae74402ac948154f40cb2c01a59a7d4e5c3f", "detected_licenses": [ "Apache-2.0" ], "directory_id": "bbedb22fd60c719b05e619307a4ee0710478fdf0", "extension": "py"...
2.546875
stackv2
import imagemounter_mitre.exceptions import os from flask import current_app, request from flask_restful import Resource, marshal_with, abort, fields from .exceptions import ( UnexpectedDiskError, NoMountableVolumesError, ImageNotInDatabaseError, DuplicateMountAttemptError ) from .utils import get_mou...
181
34.17
130
17
1,332
python
[{"finding_id": "codeql_py/path-injection_246dca7c80579b89_550335a0", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 168 ]
[ null ]
[ 30 ]
[ 45 ]
2024-11-18T21:51:36.293826+00:00
1,580,563,010,000
839ecc929b1528e89fcd550e1a186fcbec79a8a7
3
{ "blob_id": "839ecc929b1528e89fcd550e1a186fcbec79a8a7", "branch_name": "refs/heads/master", "committer_date": 1580563010000, "content_id": "05181ea2ee374f0ed1d5e6c3a116a9d4cc87515f", "detected_licenses": [ "MIT" ], "directory_id": "28a4f2a1a143127fd0daa2f2ae3361b3b03362ba", "extension": "py", "fi...
3.125
stackv2
class Users: user_database = [] """method to initialize users""" def __init__(self, user_name, user_password): self.user_name = user_name self.user_password = user_password """method to save user information""" def save_user_information(self): file = open("userinfo.txt...
30
19.33
61
12
128
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_a1c1318f7f4aa562_2e24c935", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 17 ]
[ null ]
[ 20 ]
[ 61 ]
2024-11-18T22:27:45.402539+00:00
1,585,590,098,000
745744604d7c591824ffb91d1427879b446d625d
3
{ "blob_id": "745744604d7c591824ffb91d1427879b446d625d", "branch_name": "refs/heads/master", "committer_date": 1585590098000, "content_id": "8202e6afaacf2548b2eb2c0b520090a36fe9f5d3", "detected_licenses": [ "MIT" ], "directory_id": "a43fd6882ff54d1ecf521372b30943edf33d3d85", "extension": "py", "fi...
2.75
stackv2
#!/usr/bin/env python import sys import re # TODO: Handle multi-line __init__() functions. # Groups are required arguments followed by keyword arguments INIT_REGEX = "(\\s*)def __init__\\(self(, [^=]+)*(, .+)*, \\*\\*kwargs\\)" if len(sys.argv) < 2: print("Specify files to update") prog = re.compile(INIT_REGEX) ...
49
39.96
84
21
474
python
[{"finding_id": "codeql_py/redos_a84f0ff4611a40f5_d99bccc1", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'def __init__(self, ' and containi...
2
true
[ "CWE-1333", "CWE-1333" ]
[ "py/redos", "py/redos" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with 'def __init__(self, ' and containing many repetitions of '<, '.", "This part of the regular expression may cause exponential backtracking on strings starting with 'def __init__(self, ' and containing many repetitions ...
[ 7, 7 ]
[ null, null ]
[ 41, 51 ]
[ 46, 53 ]
2024-11-18T22:44:04.843073+00:00
1,538,350,120,000
79eb914e6f3ad72bc0e7d832cb8e81f091627cf7
2
{ "blob_id": "79eb914e6f3ad72bc0e7d832cb8e81f091627cf7", "branch_name": "refs/heads/master", "committer_date": 1538350120000, "content_id": "bdc7613db647ebae6ae4dbd5e01710ce0fda0cb9", "detected_licenses": [ "MIT" ], "directory_id": "e5a8e52658387a1aff8a44014a3e040b160d9db7", "extension": "py", "fi...
2.5
stackv2
#!/usr/bin/env python import os import pickle import logging from flask import Flask, redirect, session, url_for, render_template, request, g, flash, send_from_directory, send_file, Blueprint # from dfx from .data_blueprint import data_bp, df_pickle_path from .annotate import annotate_bp # ##########################...
168
28.98
130
19
1,085
python
[{"finding_id": "codeql_py/path-injection_24f6bd5ac3c1212e_28ba9e3d", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
5
true
[ "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-117" ]
[ "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/log-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 102, 106, 122, 126, 150 ]
[ null, null, null, null, null ]
[ 29, 26, 27, 22, 17 ]
[ 38, 35, 35, 30, 69 ]
2024-11-18T22:44:06.716538+00:00
1,441,760,030,000
2524611592740d0a276776d9fd180cbe7b6881f6
3
{ "blob_id": "2524611592740d0a276776d9fd180cbe7b6881f6", "branch_name": "refs/heads/master", "committer_date": 1441760030000, "content_id": "5c6f7045f8c16509fa27065bec68752c6555896c", "detected_licenses": [ "MIT" ], "directory_id": "a43ef6049c5aee41214c5f7b5f02f96dd2945bde", "extension": "py", "fi...
2.515625
stackv2
from flask import Flask, redirect, make_response, request, render_template import redis import re import random app = Flask(__name__) # redis config r = redis.StrictRedis(host='europa.stsosz.io', port=6380, db=0) ps = re.compile("^https?\:\/\/.*\..*\/.*$") # key generation # character set kc = 'abcdefghijklmnopqrstuvw...
80
29.35
102
19
668
python
[{"finding_id": "codeql_py/polynomial-redos_9ff0aaa51cfa4ab9_76ab6988", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings startin...
2
true
[ "CWE-1333", "CWE-079" ]
[ "py/polynomial-redos", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings starting with 'http://.' and with many repetitions of '.'.\nThis [regular expression](3) that depends on a [user-provided value](2) may run slow on strings starting with 'http://./' and with many repetitions of '/'.", ...
[ 59, 21 ]
[ null, null ]
[ 17, 26 ]
[ 20, 27 ]
2024-11-18T22:44:09.880503+00:00
1,627,849,451,000
a365d3774b6c73b64c4a94c8c9921fabbc277970
4
{ "blob_id": "a365d3774b6c73b64c4a94c8c9921fabbc277970", "branch_name": "refs/heads/master", "committer_date": 1627849451000, "content_id": "5e875a3722613a4be4f414ea1a4443d35e8d310b", "detected_licenses": [ "MIT" ], "directory_id": "d76df0684a064cd41619dd89b1a9d9e75869b953", "extension": "py", "fi...
3.515625
stackv2
#!/usr/bin/env python3.9 from credentials import Credentials from user import User #credentials behaviour functions def create_credentials(platform,email,password): ''' Function to create a new credential ''' new_credentials = Credentials(platform,email,password) return new_credentials def save...
211
26.34
163
21
937
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3f6e3696ce86d378_6ad28291", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
6
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensi...
[ 121, 125, 169, 179, 194, 199 ]
[ null, null, null, null, null, null ]
[ 15, 15, 35, 51, 43, 43 ]
[ 24, 69, 95, 124, 136, 91 ]
2024-11-18T22:44:40.876097+00:00
1,544,483,878,000
bf614de6d4278850f7f03909138947dec1fc4868
2
{ "blob_id": "bf614de6d4278850f7f03909138947dec1fc4868", "branch_name": "refs/heads/master", "committer_date": 1544483878000, "content_id": "48d7f3b10c7a5bfa18f2f1d5d2ff826387711081", "detected_licenses": [ "MIT" ], "directory_id": "8c240a531380eb9a7184f52a20f87122fe0aa0ae", "extension": "py", "fi...
2.4375
stackv2
#dealing with files and paths: import os, tarfile import glob from pathlib import Path import shutil #dealing with data import sqlite3 import pandas as pd import numpy as np import random #translating text to IPA #extracting MFCC data from wavefiles from subprocess import check_output import librosa #own module for...
220
41.99
169
23
2,167
python
[{"finding_id": "codeql_py/tarslip_2a3db59d473b9bfb_71fd4cd8", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 197 ]
[ null ]
[ 25 ]
[ 29 ]
2024-11-18T22:44:44.331556+00:00
1,570,929,035,000
e8e6425e09bdbf76aadcf2cfa65db821396c9d85
3
{ "blob_id": "e8e6425e09bdbf76aadcf2cfa65db821396c9d85", "branch_name": "refs/heads/master", "committer_date": 1571066388000, "content_id": "aa75dd87a05f7f7116d5a7a68ee99e4fed078d8b", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "d4becc77445e49621b8f8c56ce0ebbebde3d92ca", "extension": "p...
2.5625
stackv2
#! /usr/bin/env python3 # # SPDX-License-Identifier: BSD-2-Clause import argparse import binascii import os import sys import hashlib import yubico import hmac import json import logging import time from Crypto.Cipher import AES PHRASE = "Test" CHALLENGE_LENGTH = 20 def do_challenge(yk, state): """ Send a chall...
237
34.52
134
19
2,116
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_dbe592424fa52fb1_fd7ee073", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text." ]
[ 50, 51, 76 ]
[ null, null, null ]
[ 19, 19, 19 ]
[ 68, 61, 49 ]
2024-11-18T20:24:17.484236+00:00
1,572,799,747,000
a4fa82e46b17d59764667afd40f426b350d08c9b
3
{ "blob_id": "a4fa82e46b17d59764667afd40f426b350d08c9b", "branch_name": "refs/heads/master", "committer_date": 1572799747000, "content_id": "25a30293aa7e59445a9dcfb3c4176e7239896c68", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "3944035837a1937bf13b0ffb02f40696bb6537a7", "extension": "p...
2.765625
stackv2
import csv import errno import gzip import hashlib import logging import os import sys import tarfile import zipfile import six import torch import torchaudio from torch.utils.data import Dataset from torch.utils.model_zoo import tqdm def unicode_csv_reader(unicode_csv_data, **kwargs): r"""Since the standard csv...
223
30.55
99
20
1,580
python
[{"finding_id": "codeql_py/tarslip_6070876ff19aecd6_bdd5c4cc", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 147 ]
[ null ]
[ 29 ]
[ 34 ]
2024-11-18T20:24:20.756875+00:00
1,641,464,900,000
8092497779c72de81554cac75ae13dc43e29d821
3
{ "blob_id": "8092497779c72de81554cac75ae13dc43e29d821", "branch_name": "refs/heads/master", "committer_date": 1641464900000, "content_id": "ca12d8b2d9d35a72526f37ce7f0cefff0c502140", "detected_licenses": [ "MIT" ], "directory_id": "8028e644df25d2ff62095193d26ddeaabf8ff961", "extension": "py", "fi...
2.671875
stackv2
# -*- coding: utf-8 -*- import csv from os import path from promrep.models import (Person, Praenomen, PrimarySourceReference, RelationshipAssertion, RelationshipAssertionReference, RelationshipType, SecondarySource, Sex) ICSV_COLUMNS...
293
30.6
88
26
2,047
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_62f91e9af5423f2f_bd84925f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
4
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)]...
[ 129, 131, 133, 149 ]
[ null, null, null, null ]
[ 20, 20, 20, 24 ]
[ 74, 76, 73, 75 ]
2024-11-18T20:24:22.816926+00:00
1,628,116,265,000
5c13b9b69d501707704497d42cde865a5ac3fa79
2
{ "blob_id": "5c13b9b69d501707704497d42cde865a5ac3fa79", "branch_name": "refs/heads/main", "committer_date": 1628116265000, "content_id": "60e91b2bed6c81931c60f286e7e68b5f5f903915", "detected_licenses": [ "MIT" ], "directory_id": "c8443b52a4ec1050ea229174e0f3f6faabebc1d9", "extension": "py", "file...
2.40625
stackv2
import paramiko import time import config print("Which device do you want to send data to? ") ip_addr = input("[r1] or [r2] ") if ip_addr == "r1": ip_addr = config.r1 network_bgp = config.r1_bgp network_ospf = config.r1_ospf elif ip_addr == "r2": ip_addr = config.r2 network_bgp = config.r2_bgp ...
116
36.15
94
13
1,400
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_dafba05c8195c3e2_1a30323c", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 29 ]
[ null ]
[ null ]
[ 57 ]
2024-11-18T20:59:40.125521+00:00
1,623,769,618,000
3035991fc8f349d5cc3cfedcc7d3265ed42ab2b6
2
{ "blob_id": "3035991fc8f349d5cc3cfedcc7d3265ed42ab2b6", "branch_name": "refs/heads/master", "committer_date": 1623769618000, "content_id": "4d839aba55359ee6e134f394db940f2e37ad9fce", "detected_licenses": [ "MIT" ], "directory_id": "b3d6e70c7cd62274b18b0a6efc6c983cab773a58", "extension": "py", "fi...
2.484375
stackv2
import os import pathlib from typing import List, Dict from jinja2 import Template from build_tools.config import DOCSRC_SOURCE_PATH from courses.config import COURSES OUT_FOLDER = DOCSRC_SOURCE_PATH / "lectures" INDEX_TEMPLATE_PATH = DOCSRC_SOURCE_PATH / "index.j2.rst" INDEX_PATH = DOCSRC_SOURCE_PATH / "index.rst" ...
40
29.57
64
14
285
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_e0d14df4350f87e9_170b2110", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 34 ]
[ null ]
[ 16 ]
[ 57 ]
2024-11-18T21:00:36.464099+00:00
1,623,695,571,000
7115c592798cd65e93fdfb15100bf8c0eed61416
4
{ "blob_id": "7115c592798cd65e93fdfb15100bf8c0eed61416", "branch_name": "refs/heads/main", "committer_date": 1623695571000, "content_id": "42e24a34b124c2fdf84756433727853fec11a5c3", "detected_licenses": [ "MIT" ], "directory_id": "1a0f851993edb6f8cfad05c8af85125cea6669a9", "extension": "py", "file...
4.40625
stackv2
# Friends birthdays # Python practice exercises # Course: Automate the Boring Stuff with Python # Developer: Valeriy B. def friends_birthdays(): # Creating a birtday dictionary birthday = {"John": "Dec 12", "Alice": "Sep 3", "Steve": "Jan 22", "Harry": "Aug 2", "Bob": "Oct 15"} while True: na...
33
33.82
106
19
279
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2b8887a1e3202fea_0d449d84", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 20 ]
[ null ]
[ 19 ]
[ 60 ]
2024-11-18T21:00:39.346614+00:00
1,603,758,285,000
3c9711a4882a6012d03ade3903d53df4982ef5e7
2
{ "blob_id": "3c9711a4882a6012d03ade3903d53df4982ef5e7", "branch_name": "refs/heads/master", "committer_date": 1603758285000, "content_id": "e55b057e34ffe565e6c79951b8e9ee632ab65ff7", "detected_licenses": [ "MIT" ], "directory_id": "267ad74e39a0be3708d9e5acac632055488093cc", "extension": "py", "fi...
2.390625
stackv2
""" Implements the logic to read the file store, generate the server config, and start the servers """ import contextlib import os import subprocess import sys import tempfile import gzip from typing import Optional, Dict from urllib.parse import urlparse from io import BytesIO import time import json from bs4 import...
215
44.14
179
24
2,050
python
[{"finding_id": "codeql_py/overly-permissive-file_48a1dc294bbc656b_8b36a978", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in open sets file to world readable.", "remediation": "", "location": {...
3
true
[ "CWE-732", "CWE-732", "CWE-732" ]
[ "py/overly-permissive-file", "py/overly-permissive-file", "py/overly-permissive-file" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Overly permissive mask in open sets file to world readable.", "Overly permissive mask in open sets file to world readable.", "Overly permissive mask in open sets file to world readable." ]
[ 151, 155, 165 ]
[ null, null, null ]
[ 31, 31, 31 ]
[ 82, 82, 82 ]
2024-11-18T21:00:48.480829+00:00
1,638,028,155,000
4b9b18607c9a19f8d92b1738d817859c39e44c8f
3
{ "blob_id": "4b9b18607c9a19f8d92b1738d817859c39e44c8f", "branch_name": "refs/heads/master", "committer_date": 1638028155000, "content_id": "8565ea1609b282bbb48ec1ba4a102da14b7c8d83", "detected_licenses": [ "MIT" ], "directory_id": "6eca0e7fe3978f666744c9bd6ea4d85cf234e0f4", "extension": "py", "fi...
2.6875
stackv2
#!/usr/bin/env python3 import time import paramiko from urllib.parse import urlparse class Ssh_Weakpwd_BaseVerify: def __init__(self, url): self.info = { 'name': 'SSH 弱口令漏洞', 'description': 'SSH 弱口令漏洞', 'date': '', 'exptype': 'check', 'type': 'We...
60
30.87
159
21
447
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_8d4ed8ee339c601b_d8422e55", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 40 ]
[ null ]
[ 17 ]
[ 74 ]
2024-11-18T21:01:13.756607+00:00
1,688,684,594,000
e5e8c2b80377e1b76e4d46a5fdcf73aa81ca8218
2
{ "blob_id": "e5e8c2b80377e1b76e4d46a5fdcf73aa81ca8218", "branch_name": "refs/heads/master", "committer_date": 1688684594000, "content_id": "154313dd12b48c5f94b722dd9dce26638ba2999d", "detected_licenses": [ "NIST-Software", "BSD-3-Clause", "MIT" ], "directory_id": "88a433b6010d625a953a7569a7fa...
2.421875
stackv2
""" rest api views """ import logging from django.http import Http404 from django.utils.decorators import method_decorator from rest_framework import status from rest_framework.exceptions import ValidationError from rest_framework.response import Response from rest_framework.views import APIView from core_main_app.co...
198
26.5
79
16
993
python
[{"finding_id": "codeql_py/stack-trace-exposure_c64451739a57b08a_92f74e9b", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
3
true
[ "CWE-209", "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 57, 109, 171 ]
[ null, null, null ]
[ 17, 17, 17 ]
[ 24, 24, 24 ]
2024-11-18T21:01:28.286289+00:00
1,377,936,615,000
24487184f9d8bb8bf12d5fa96003e31c75a0034e
2
{ "blob_id": "24487184f9d8bb8bf12d5fa96003e31c75a0034e", "branch_name": "refs/heads/master", "committer_date": 1377936615000, "content_id": "5d381cc65475103d427711f7ed3bf5a3b40a7588", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "6d28d17c3d8cc98405df456206005ebd857658b5", "extension": "p...
2.4375
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- # # Output controller gains to .cc and .h files. # # To run: ./generate_cgains.py # import os import sys import jinja2 import yaw_rate_controller as yrc def generate(ccinfile, hinfile): c_data = yrc.design_controller() c_data_sorted = sorted(c_data, key=lambda c:...
71
30.48
69
12
571
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_856d07747c63a1db_b6f58ffc", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 52 ]
[ 54 ]
[ 11 ]
[ 47 ]
2024-11-18T21:25:26.984364+00:00
1,369,416,683,000
de505520782400d3a11a3f61806eb71c016d3bc2
3
{ "blob_id": "de505520782400d3a11a3f61806eb71c016d3bc2", "branch_name": "refs/heads/master", "committer_date": 1369416683000, "content_id": "7ea2e23d413f1773d29c8505daf1ba29656c238f", "detected_licenses": [ "BSL-1.0" ], "directory_id": "4569d707a4942d3451f3bbcfebaa8011cc5a128d", "extension": "py", ...
2.703125
stackv2
# -*- coding: utf-8 -*- # # Date: Mon Jun 22 12:39:48 MDT 2009 # Copyright: 2009 CodeRage # Author: Jonathan Turkanis # # Distributed under the Boost Software License, Version 1.0. (See accompanying # file LICENSE_1_0.txt or copy at http://www.boost.org/LICENSE_1_0.txt) import re from trac.core impo...
107
30.21
95
19
786
python
[{"finding_id": "codeql_py/redos_3dce0e0ebace3120_b62a3380", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'deny((,' and containing many repe...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with 'deny((,' and containing many repetitions of ' (,'." ]
[ 44 ]
[ null ]
[ 69 ]
[ 72 ]
2024-11-18T21:51:13.431395+00:00
1,560,770,112,000
2239cafc5728011cbe410a3e74ee065acc4e2b6f
2
{ "blob_id": "2239cafc5728011cbe410a3e74ee065acc4e2b6f", "branch_name": "refs/heads/master", "committer_date": 1560770112000, "content_id": "f5cdbca2c4833b3025dfa5631b2f39e89e5d99f9", "detected_licenses": [ "MIT" ], "directory_id": "8682519c3d7ae98ceef3372e41447dff4d407d01", "extension": "py", "fi...
2.3125
stackv2
from .import auth from flask import render_template,redirect,url_for, flash,request from ..models import User from flask_login import login_user,logout_user,login_required from .forms import LoginForm,RegistrationForm,RequestResetForm,ResetPasswordForm from ..import db from ..email import mail_message @auth.route('/lo...
112
34.66
139
19
803
python
[{"finding_id": "codeql_py/url-redirection_8fc02ce82dada2d5_7f1b18e8", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 41 ]
[ null ]
[ 33 ]
[ 82 ]
2024-11-18T21:51:19.730902+00:00
1,609,236,030,000
2c6b9722829df63c19ee1fef2c4f2a4229911172
3
{ "blob_id": "2c6b9722829df63c19ee1fef2c4f2a4229911172", "branch_name": "refs/heads/master", "committer_date": 1609236030000, "content_id": "ef6705709f30070124edba2a3034dc4f8bc2f32e", "detected_licenses": [ "MIT" ], "directory_id": "4be0b49c9c34b2ba4f392b1a8215bb02f28177a4", "extension": "py", "fi...
2.75
stackv2
#!/usr/bin/env python # coding=utf-8 from tree_struct_config import ( IntLeaf, StringLeaf, BooleanLeaf, ListLeaf, Branch, Root, SerializationFormat, SerializationDecodeError, ) class Config(Root): version = StringLeaf('0.1.0') class Auth(Branch): username = StringL...
111
19.41
67
15
543
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c77dd8ed4695143e_79c2e943", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 89, 91, 99 ]
[ null, null, null ]
[ 7, 7, 7 ]
[ 34, 34, 34 ]
2024-11-18T21:51:24.993478+00:00
1,684,791,297,000
16b34c7a22fb5ec36b560e7b1682a35303638b66
3
{ "blob_id": "16b34c7a22fb5ec36b560e7b1682a35303638b66", "branch_name": "refs/heads/master", "committer_date": 1687253496000, "content_id": "e077dbfe904e985ee8c0e07d848bcc4529e2c955", "detected_licenses": [ "Apache-2.0" ], "directory_id": "79d1d778b25d7aef8bfb762635bb52fb976f52af", "extension": "py"...
2.796875
stackv2
import requests from icalendar import Calendar, Event import pytz import datetime import hashlib import os import re def sha1(data): return hashlib.sha1(data.encode('utf-8')).hexdigest() def get_jmu_sid(username, password): password = sha1(password) request_data = {'flag': 1, 'unitid': 55, 'encrypt': 1,...
141
39.1
115
15
1,443
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_e44fd76e648409ee_a28d511d", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expen...
[ 11 ]
[ null ]
[ 25 ]
[ 45 ]
2024-11-18T22:00:14.324916+00:00
1,623,105,376,000
4d0b0fb41cec97547832446ea62c5da7ad8d1d49
3
{ "blob_id": "4d0b0fb41cec97547832446ea62c5da7ad8d1d49", "branch_name": "refs/heads/main", "committer_date": 1623105376000, "content_id": "0e9ecabb2098e458a5819af163ded8be913bfcc2", "detected_licenses": [ "MIT" ], "directory_id": "05533cf378c9562208577daab42c31bc709e4380", "extension": "py", "file...
2.640625
stackv2
from uuid import uuid4 from flask import Flask, jsonify, request from static.chain import BlockChain from static.constants import STANDARD_TRANS_KEYS # rev the Node app = Flask(__name__) node_id = str(uuid4()).replace('-', '') # starting the chain blockchain = BlockChain() @app.route('/mine', methods=['GET']) d...
78
24.47
115
13
465
python
[{"finding_id": "codeql_py/flask-debug_4123602a352f9df6_a04ff44c", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 78, 53 ]
[ null, null ]
[ 5, 16 ]
[ 35, 108 ]
2024-11-18T22:00:26.811572+00:00
1,546,455,829,000
1bc8b1a66868e6f0ca35452c20eefb5467940376
3
{ "blob_id": "1bc8b1a66868e6f0ca35452c20eefb5467940376", "branch_name": "refs/heads/master", "committer_date": 1546455829000, "content_id": "8a5713f29babcd912232333e86228bb0b5981d51", "detected_licenses": [ "MIT" ], "directory_id": "f1ae2b4f78e09580488fc039328cb0204a77c1a3", "extension": "py", "fi...
3.0625
stackv2
import os import sys import json import h5py import tarfile import numpy as np import pandas as pd import seaborn as sns from tqdm import tqdm import matplotlib.pyplot as plt from PIL import Image, ImageDraw from unpacker import DigitStructWrapper from scipy.ndimage import imread from scipy.misc import imresize #TODO ...
337
32.07
90
16
2,899
python
[{"finding_id": "codeql_py/tarslip_2aa96532ccfd76ec_a5746fa4", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 31 ]
[ null ]
[ 9 ]
[ 12 ]
2024-11-18T22:00:48.335513+00:00
1,513,863,577,000
50fb76bf89e46c67bb2531d49fcefa9dfa4c9e7f
3
{ "blob_id": "50fb76bf89e46c67bb2531d49fcefa9dfa4c9e7f", "branch_name": "refs/heads/master", "committer_date": 1513863577000, "content_id": "d3eb5e98eaabe1da21cc3aff0a44184801fdcd71", "detected_licenses": [ "MIT" ], "directory_id": "0bf0911bdb62acc117e9902dd3a5bddd2d7228eb", "extension": "py", "fi...
2.59375
stackv2
#! /usr/bin/env python # -*- coding: utf-8 -*- import json import requests PROTOCOL = 'http' # or https RVISION = '127.0.0.1' # ip or hostname USERNAME = 'admin' # any user login PASSWORD = 'admin' requests.packages.urllib3.disable_warnings() s = requests.Session() # Авторизируемся login = s.post( PROTOCOL ...
65
19.91
97
10
440
python
[{"finding_id": "codeql_py/request-without-cert-validation_3ba5e34bd225eec3_8b36ca7c", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 17, 57 ]
[ 24, 61 ]
[ 9, 13 ]
[ 2, 2 ]
2024-11-18T22:00:55.666088+00:00
1,419,664,526,000
78d9b3ed3357f3bfb9204847be6dff00a7883b27
3
{ "blob_id": "78d9b3ed3357f3bfb9204847be6dff00a7883b27", "branch_name": "refs/heads/master", "committer_date": 1419664526000, "content_id": "c2d6d6c1d1ae5cd266fd81b5252b13634e2bec75", "detected_licenses": [ "MIT" ], "directory_id": "e91dd5c6e36dbe378734bd3af403785896fb9a88", "extension": "py", "fi...
3.234375
stackv2
import random class Person: def __init__(self,Name='None',Age=0,Gender='None',Address='None',PhNo='None',TrID='None'): self.Name=Name self.Age=Age self.Gender=Gender self.Address=Address self.PhNo=PhNo self.TrID=TrID self.PNR=self.GenPNR() def GenP...
33
21.15
94
12
200
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_028d7881b90e7ee4_a4c3b47a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 18 ]
[ null ]
[ 27 ]
[ 38 ]
2024-11-18T22:01:02.740779+00:00
1,617,992,304,000
ad6c197c798fe433efc81a41d8a6144ee0a4b4fb
3
{ "blob_id": "ad6c197c798fe433efc81a41d8a6144ee0a4b4fb", "branch_name": "refs/heads/master", "committer_date": 1617992304000, "content_id": "cbb2a08eccccbe1ecd4434d934841492ebfa6eff", "detected_licenses": [ "MIT" ], "directory_id": "95ad6275fb347fcf9320891b84597ab499c8edc9", "extension": "py", "fi...
2.6875
stackv2
import sys import bcrypt import logging import uuid from database.AuthSchema import Auth LOG_FORMAT = "%(levelname)s %(asctime)s %(message)s" logging.basicConfig( filename="./logs/api-authentication-credentials.log", level=logging.INFO, format=LOG_FORMAT, ) logger = logging.getLogger() def create_api_cr...
57
25.6
97
11
345
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1f4d6d9099c72251_ebe485e4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 24, 37, 42 ]
[ 33, null, null ]
[ 9, 17, 17 ]
[ 12, 82, 45 ]
2024-11-18T22:15:09.655950+00:00
1,604,158,377,000
a23b35f02937eade42261b0e4b7516482fd38258
3
{ "blob_id": "a23b35f02937eade42261b0e4b7516482fd38258", "branch_name": "refs/heads/main", "committer_date": 1604158377000, "content_id": "d9eae52b05b46e1a74a72aec0884bd67b9269151", "detected_licenses": [ "MIT" ], "directory_id": "46be9bbb665fba4abc1af47a7b885c267d8ff66f", "extension": "py", "file...
2.640625
stackv2
#https://github.com/bigevilbeard/dnac-device-info import json import requests import urllib3 from requests.auth import HTTPBasicAuth from prettytable import PrettyTable urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning) dnac = { "host": "sandboxdnac2.cisco.com", "port": 443, "username":...
53
25.81
127
12
349
python
[{"finding_id": "codeql_py/request-without-cert-validation_7964ebe316a9dd7f_d9922a66", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 31, 39 ]
[ 32, null ]
[ 16, 16 ]
[ 63, 64 ]
2024-11-18T22:26:02.539353+00:00
1,589,878,847,000
2c814ed4e3bd733e41914af52e9dd1a7c659d715
2
{ "blob_id": "2c814ed4e3bd733e41914af52e9dd1a7c659d715", "branch_name": "refs/heads/master", "committer_date": 1589878847000, "content_id": "a622e609150e4b0fc5db717a6c68e150cca783ad", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "87914d8bb02a7c1db05c0838faa8348422b97179", "extension": "p...
2.40625
stackv2
#!/usr/bin/env python2.7 import Tkinter as tk import tkMessageBox import tkFileDialog import os import re import xml.etree.ElementTree import requests import time import paramiko import subprocess import signal class ScriptFile: def __init__(self, url): self.url = url self.status_ok = False self.message = "...
293
31.85
166
22
2,625
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_0e4ef34f70160c8a_0e9395f3", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 192 ]
[ null ]
[ 3 ]
[ 70 ]
2024-11-18T22:26:03.288228+00:00
1,627,873,926,000
6be9d1f8ecbdc27f4fb975cdf547392f2be9003d
3
{ "blob_id": "6be9d1f8ecbdc27f4fb975cdf547392f2be9003d", "branch_name": "refs/heads/master", "committer_date": 1627873926000, "content_id": "2ceedd0364c07bf7f19b141269772aac83c5e358", "detected_licenses": [ "Apache-2.0" ], "directory_id": "44cadf7498ba40a290a950b7b1adde3f0b5eb3e4", "extension": "py"...
2.90625
stackv2
import json import requests import time import streamlit as st from PIL import Image from utils.serve import encode_image, decode_image def detect(image, url, token): encoded_img = encode_image(image) data = json.dumps({"encoded_img": encoded_img}) headers = {"Content-Type": "application/json"} if ...
51
26.57
67
13
340
python
[{"finding_id": "codeql_py/full-ssrf_483ad2697b9c8445_213a784a", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
1
true
[ "CWE-918" ]
[ "py/full-ssrf" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1)." ]
[ 19 ]
[ null ]
[ 16 ]
[ 62 ]
2024-11-18T22:26:10.823068+00:00
1,539,845,482,000
75d83c21737c3237667446bd160702d52ce49caf
2
{ "blob_id": "75d83c21737c3237667446bd160702d52ce49caf", "branch_name": "refs/heads/master", "committer_date": 1539845482000, "content_id": "e79caf7ea49e874f16814be75e5edbcb03acbd92", "detected_licenses": [ "ISC" ], "directory_id": "c273662b77e5c023a7c867c882a06d34dc7addd1", "extension": "py", "fi...
2.375
stackv2
# -*- coding: utf-8 -*- import sys from urllib.request import urlopen from urllib.request import Request from urllib.request import urlretrieve import datetime import json import math import argparse import os def get_results(url,headers): try: req = Request(url,headers=headers) response = urlope...
59
28.71
127
12
402
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_08e99ebb60225d1a_5c90b2aa", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (password)](3) as clear text." ]
[ 55 ]
[ null ]
[ 17 ]
[ 30 ]
2024-11-18T22:26:26.194097+00:00
1,693,528,081,000
5c02df65219f84a8f478ee0ba73a5e8c551b5e69
3
{ "blob_id": "5c02df65219f84a8f478ee0ba73a5e8c551b5e69", "branch_name": "refs/heads/main", "committer_date": 1693528081000, "content_id": "2528e2163339430015cf940853a203b5ac8a2eca", "detected_licenses": [ "Apache-2.0" ], "directory_id": "6a8bc7da3104726f894ae360fce6a43a54b30812", "extension": "py", ...
2.6875
stackv2
import gradio as gr from pydub import AudioSegment from time import sleep with gr.Blocks() as demo: input_audio = gr.Audio(label="Input Audio", type="filepath", format="mp3") with gr.Row(): with gr.Column(): stream_as_file_btn = gr.Button("Stream as File") format = gr.Radio(["wa...
55
36.2
88
19
411
python
[{"finding_id": "codeql_py/path-injection_c9a59e70fab71333_0ae2a4ad", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 44 ]
[ null ]
[ 27 ]
[ 37 ]
2024-11-18T20:39:53.577678+00:00
1,602,604,902,000
797cd7f1ffbc578c4b2ec41c2f077b275ef83e82
2
{ "blob_id": "797cd7f1ffbc578c4b2ec41c2f077b275ef83e82", "branch_name": "refs/heads/master", "committer_date": 1602604902000, "content_id": "7a5b0548430e5940ba0e98aaa3349a9375a33fc2", "detected_licenses": [ "MIT" ], "directory_id": "26c7b6f0fe8f46f14107a86ccf3b6d473c94c9fd", "extension": "py", "fi...
2.328125
stackv2
import os from flask import Flask, flash, Response, request, send_file, redirect, url_for, render_template, send_from_directory from werkzeug.utils import secure_filename from PIL import Image import time import json from pubmex.pubmexinference import PubMexInference UPLOAD_FOLDER = '/home/appuser/detectron2_repo/app...
100
35.81
117
23
755
python
[{"finding_id": "codeql_py/path-injection_dfd0c0bbde8f89d0_1537f3c6", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 89, 90 ]
[ null, null ]
[ 19, 19 ]
[ 57, 71 ]
2024-11-18T21:08:20.092663+00:00
1,604,648,150,000
faca6366b8d449c895221fb624990a11c78b7237
3
{ "blob_id": "faca6366b8d449c895221fb624990a11c78b7237", "branch_name": "refs/heads/master", "committer_date": 1604648150000, "content_id": "64c545fd8e4b41d439f9518f03c9e3c332e16580", "detected_licenses": [ "MIT" ], "directory_id": "33d84328a6472c97c60f0b6b70485dee248f842d", "extension": "py", "fi...
2.703125
stackv2
import re from bs4 import BeautifulSoup import requests from urllib.parse import urlparse, urljoin from simhash import Simhash # The simhash module is from https://github.com/1e0ng/simhash unique_urls = set() # set of unique urls project_subdomains = ("ics.uci.edu", "cs.uci.edu", "informatics.uci.edu", "stat.uci.edu"...
144
34.74
109
27
1,641
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_c26ab1dfcd0b8071_72dc6ae4", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [today.uci.edu](1) may be at an arbitrary position in t...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [today.uci.edu](1) may be at an arbitrary position in the sanitized URL." ]
[ 96 ]
[ null ]
[ 6 ]
[ 38 ]
2024-11-18T21:08:28.437223+00:00
1,607,983,240,000
94cd74d0b758f49502dea31db4fa6decc61adf2b
3
{ "blob_id": "94cd74d0b758f49502dea31db4fa6decc61adf2b", "branch_name": "refs/heads/main", "committer_date": 1607983240000, "content_id": "05c2a374cd33aaee551766ee91f4b2509bc8b57a", "detected_licenses": [ "Apache-2.0" ], "directory_id": "6f7931d58c45a6a003c537ee42bef6c7291a74ab", "extension": "py", ...
3.015625
stackv2
import hashlib import streamlit as st from SessionState import session_get def authentication(usr_name, password): '''Valid the uer_name and password''' m=hashlib.sha256() m.update(str(usr_name).encode()) m.update(str(password).encode()) if m.hexdigest() == '7bdc616cc8db6935847e5fb6add88de1f470f96c...
38
40.05
99
19
331
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_27978c7d44f9d33d_f82f118e", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e...
[ 9 ]
[ null ]
[ 14 ]
[ 36 ]
2024-11-18T21:08:33.263655+00:00
1,675,947,267,000
f79438821f843c3dde7aca89e1493f235bbc7c2b
3
{ "blob_id": "f79438821f843c3dde7aca89e1493f235bbc7c2b", "branch_name": "refs/heads/master", "committer_date": 1675947267000, "content_id": "79c8c1b8de7c69ae9617dc62f8bc42e85ce81ebe", "detected_licenses": [ "Apache-2.0", "Python-2.0" ], "directory_id": "570ecd3aceba4f099f724f25f668e78d89891137", ...
2.546875
stackv2
# -*- coding: utf-8 -*- # # Copyright 2020. Huawei Technologies Co., Ltd. All rights reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2....
55
32.87
101
14
430
python
[{"finding_id": "codeql_py/request-without-cert-validation_0a4a94835e15e736_3778d5bb", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1) by [this value](2)." ]
[ 33 ]
[ null ]
[ 20 ]
[ 102 ]
2024-11-18T21:32:10.344829+00:00
1,536,771,673,000
44a9bb4d74d2e694f252d8726647bca13baa4df5
2
{ "blob_id": "44a9bb4d74d2e694f252d8726647bca13baa4df5", "branch_name": "refs/heads/master", "committer_date": 1536771673000, "content_id": "883bd9e509a33ecfb8bf08657c922e081ece66bb", "detected_licenses": [ "MIT" ], "directory_id": "d0106f6d39e383cd361e356f9ffd9647f9c6f049", "extension": "py", "fi...
2.375
stackv2
import tornado.ioloop import tornado.web import json import utils class BaseHandler(tornado.web.RequestHandler): def set_default_headers(self): self.set_header("Access-Control-Allow-Origin", "*") self.set_header("Access-Control-Allow-Headers", "x-requested-with") class CondaHandler(BaseHandler): ...
51
28.06
75
17
305
python
[{"finding_id": "codeql_py/path-injection_6e0bef4630954321_221f9385", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 13 ]
[ null ]
[ 19 ]
[ 47 ]
2024-11-18T21:32:26.247642+00:00
1,519,247,414,000
e5154f5f283d24261da94f56334a44aa2cb5d26d
3
{ "blob_id": "e5154f5f283d24261da94f56334a44aa2cb5d26d", "branch_name": "refs/heads/master", "committer_date": 1519247414000, "content_id": "bea4a39b57e329d625d5cc9fa5272ae3655801eb", "detected_licenses": [ "Apache-2.0" ], "directory_id": "18f7a1a68267630d12b78a202251234b62575c3c", "extension": "py"...
2.703125
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- """ Project: RandomPass Copyright 2018, Korvin F. Ezüst Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0...
149
33.41
79
14
1,092
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1f38f75efdcfa6e7_d8554a28", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 122, 124, 149 ]
[ null, null, null ]
[ 19, 19, 15 ]
[ 65, 22, 35 ]
2024-11-18T21:32:29.462403+00:00
1,628,867,019,000
0e5e7ae0032e65ee203eb1634bd6fdf0bf3e2504
3
{ "blob_id": "0e5e7ae0032e65ee203eb1634bd6fdf0bf3e2504", "branch_name": "refs/heads/main", "committer_date": 1628867019000, "content_id": "0dd96c01b6573518dec5743535505bc172e2d099", "detected_licenses": [ "MIT" ], "directory_id": "f31ceb46ad470fff4033df796a22900b04782715", "extension": "py", "file...
2.96875
stackv2
import flask from flask import request, jsonify import random from flask_limiter import Limiter, HEADERS from flask_limiter.util import get_remote_address app = flask.Flask(__name__) limiter = Limiter(app, key_func=get_remote_address) # Set the ratelimiting strategy (Uses IP adress) @app.route('/api/message', method...
44
57.86
153
18
568
python
[{"finding_id": "codeql_py/flask-debug_ef7c0190e17935ea_73b89ac4", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 44, 22 ]
[ null, null ]
[ null, 18 ]
[ 20, 57 ]
2024-11-18T21:32:59.809789+00:00
1,488,901,145,000
5c146ce190d33255dcf420c38bf9f0f6da151f6f
3
{ "blob_id": "5c146ce190d33255dcf420c38bf9f0f6da151f6f", "branch_name": "refs/heads/master", "committer_date": 1488901145000, "content_id": "e3ab9fd7b6a7d11fe76e0b4217c6714f23419538", "detected_licenses": [ "Apache-2.0" ], "directory_id": "ced6b819d7c494f3181f9c9b5dcd00ad3ba5b43d", "extension": "py"...
3.109375
stackv2
import bagit import os import shutil from slugify import slugify class Baggee(object): '''Base class for an item to be bagged. Extending classes will most likely want to override :meth:`object_id`, :meth:`object_title`, and :meth:`data_files`. ''' #: rough title length, for truncating long titl...
280
36.9
78
14
2,296
python
[{"finding_id": "codeql_py/overly-permissive-file_d6df6d660ca959a2_665830f6", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable." ]
[ 137 ]
[ null ]
[ 13 ]
[ 64 ]
2024-11-18T21:49:04.645971+00:00
1,545,400,486,000
6ba5cb85f57c2fd0d295fb20cb9798729c4d806b
3
{ "blob_id": "6ba5cb85f57c2fd0d295fb20cb9798729c4d806b", "branch_name": "refs/heads/master", "committer_date": 1545400486000, "content_id": "537e426f1d389d4251ff63452076d169847bbec4", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "32dc2fd79c9f84df666a845dd62b344e6c246fa8", "extension": "p...
2.75
stackv2
import argparse import json import os.path # pprint used to make the output easier to read import pprint from flask import Flask, request import requests # Iniatilise global variables so they can be used in the handled messages DOWNLOAD_DIR = 'objects' CHUNK_SIZE = 10 * 1024 * 1024 app = Flask(__name__) ARGS = None ...
97
35.16
84
15
787
python
[{"finding_id": "codeql_py/full-ssrf_5676f06faf6b6a74_8817069d", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
3
true
[ "CWE-918", "CWE-022", "CWE-918" ]
[ "py/full-ssrf", "py/path-injection", "py/partial-ssrf" ]
[ "HIGH", "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 68, 25, 24 ]
[ null, null, null ]
[ 9, 15, 9 ]
[ 41, 26, 56 ]
2024-11-18T22:42:11.779263+00:00
1,626,225,676,000
607a5e406996097b4aa9d55d980036d96e58e060
2
{ "blob_id": "607a5e406996097b4aa9d55d980036d96e58e060", "branch_name": "refs/heads/main", "committer_date": 1626225676000, "content_id": "c62f2aa19b3252dc1bf232f8141f295d7bf1ae94", "detected_licenses": [ "MIT", "BSD-2-Clause" ], "directory_id": "2fc8c90331480a2fe76437a524db928c518bcd0b", "exten...
2.328125
stackv2
#Copyright 2021 Purdue University, University of Virginia. #All rights reserved. import sys import jinja2 from dbUtil import * cursor = None def gen_sig_implications(cursor,table_name,threshold): queryDual = f"SELECT first_parent, first_child, second_parent, second_child FROM {table_name} WHERE zScore>={thresh...
138
30.41
125
16
1,025
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_5316ece85d138075_15b14841", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 94 ]
[ null ]
[ 12 ]
[ 71 ]
2024-11-18T22:42:15.860466+00:00
1,671,566,848,000
9516ef2c9c4c5001cd15fc9e8379c871945b6bf3
3
{ "blob_id": "9516ef2c9c4c5001cd15fc9e8379c871945b6bf3", "branch_name": "refs/heads/master", "committer_date": 1671566848000, "content_id": "cab929dbca2b767925f018e09056e3c90514ce50", "detected_licenses": [ "Unlicense" ], "directory_id": "34ddec647d6ad357c1527cf713eaeaee4eb575aa", "extension": "py",...
3.421875
stackv2
from sys import argv filename = argv[1] with open(filename) as f: instructions = [line[:-1] for line in f] def swap_pos(arr, x, y): temp = arr[x] arr[x] = arr[y] arr[y] = temp return arr def swap_letter(arr, a, b): index1 = arr.index(a) index2 = arr.index(b) return swap_pos(arr, inde...
71
24.99
69
14
549
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e61debe1240519f7_be8d737f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text.\nThis expression logs [sensitive data (passw...
[ 71 ]
[ null ]
[ 7 ]
[ 64 ]
2024-11-18T22:42:16.017090+00:00
1,613,114,141,000
e4d6fab2c1ff9c0f85d428ab6f26854837506b81
3
{ "blob_id": "e4d6fab2c1ff9c0f85d428ab6f26854837506b81", "branch_name": "refs/heads/master", "committer_date": 1613114141000, "content_id": "bee947928d57fc15753da2752d11fda49c9d1ac7", "detected_licenses": [ "MIT" ], "directory_id": "caf423dc5abcebff487e4152fffcd4eeb8073c30", "extension": "py", "fi...
2.921875
stackv2
"""contains extra funcs for app""" from dataclasses import dataclass from configparser import ConfigParser from hashlib import sha256 from typing import Dict import json from flask import abort FileIndexData = Dict[str, Dict[str, str]] config = ConfigParser() config.read("./fs_config.cfg") @dataclass(frozen=Tr...
75
22.21
86
16
413
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_eac96df3b0634e19_c87f024c", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.", "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computational...
[ 27, 40 ]
[ null, null ]
[ 9, 24 ]
[ 60, 56 ]
2024-11-18T22:42:17.233319+00:00
1,570,472,058,000
ef8776d786a3212336a3216a5b35681c7ecb1dd5
3
{ "blob_id": "ef8776d786a3212336a3216a5b35681c7ecb1dd5", "branch_name": "refs/heads/main", "committer_date": 1570472058000, "content_id": "0d3d47d013b36000a4a88258fa7b9c15700c2482", "detected_licenses": [ "Apache-2.0" ], "directory_id": "002b6317b653a79736dd70a917c022cb5510d487", "extension": "py", ...
2.734375
stackv2
#!/usr/bin/env python3 import os import json import sys import requests import configparser cfg = configparser.ConfigParser() cfg.read(os.path.join(os.path.expanduser('~'), 'google.cfg')) api_key = cfg['maps']['api_key'] def get_coordinates(address): url = 'https://maps.googleapis.com/maps/api/geocode/json?addre...
38
25.32
100
11
251
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bfa4f1e440bce8d9_c0809765", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 15, 18, 33 ]
[ null, null, null ]
[ 11, 11, 11 ]
[ 14, 20, 16 ]
2024-11-18T20:53:31.391963+00:00
1,614,181,199,000
52da1e3298c25fbaa9941810c2c468a4f6744137
3
{ "blob_id": "52da1e3298c25fbaa9941810c2c468a4f6744137", "branch_name": "refs/heads/master", "committer_date": 1614181199000, "content_id": "c7b848b6ac9ade5874e62327b0b9124d1952fc6a", "detected_licenses": [ "MIT" ], "directory_id": "50008b3b7fb7e14f793e92f5b27bf302112a3cb4", "extension": "py", "fi...
2.6875
stackv2
#!/usr/local/bin/python26 """ Python Session Handling Note: A user must have cookies enabled! TODO: * Support Named Sessions Copyright 2010 - Sunjay Varma Latest Version: http://www.sunjay.ca/download/session.py """ import cgi import os import time import errno import hashlib import datetime from Cookie import Si...
328
24
76
17
2,164
python
[{"finding_id": "codeql_py/path-injection_d88483c7a393cde8_878089ff", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
4
true
[ "CWE-022", "CWE-022", "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 114, 115, 120, 137 ]
[ null, null, null, null ]
[ 21, 14, 14, 13 ]
[ 30, 23, 23, 22 ]
2024-11-18T20:53:40.773949+00:00
1,633,421,169,000
04bb39f7e607c5e3b3d3fd76a7a7c5bf94fb4dd0
3
{ "blob_id": "04bb39f7e607c5e3b3d3fd76a7a7c5bf94fb4dd0", "branch_name": "refs/heads/main", "committer_date": 1633421169000, "content_id": "1b423f3ab9e84e3a1ef7c3b562554aed7a9b5ad8", "detected_licenses": [ "MIT" ], "directory_id": "8c05155506e2baab38d431975f5add29d14a67e5", "extension": "py", "file...
3.25
stackv2
from string import ascii_letters, digits from secrets import choice alphabet = ascii_letters + digits + "!#$%&()*+,-.:;<=>?@[]_{|}" def generate_password(length): return "".join(choice(alphabet) for i in range(length)) if __name__ == "__main__": import sys try: length = int(sys.argv[1] if len(...
18
25.5
87
15
123
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_52e4bb133f7d7c96_71cb48a9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 16 ]
[ null ]
[ 15 ]
[ 87 ]
2024-11-18T20:53:44.141365+00:00
1,410,422,562,000
6cb48d2945352500a2963c85797b721cb1859f2f
2
{ "blob_id": "6cb48d2945352500a2963c85797b721cb1859f2f", "branch_name": "refs/heads/master", "committer_date": 1410422562000, "content_id": "0cd3204594b014e6c7f307560096be56c3de7d13", "detected_licenses": [ "MIT" ], "directory_id": "c76925f91ce94cc3ff900591adce6b4d4f063a60", "extension": "py", "fi...
2.34375
stackv2
#!/usr/bin/env python import hashlib import logging import urllib from tornado import gen from tornado import httpclient from tornado.escape import json_decode from tornado.httputil import url_concat class RenrenGraphMixin(object): _OAUTH_AUTHORIZE_URL = "https://graph.renren.com/oauth/authorize" _OAUTH_ACC...
221
34.19
86
19
1,557
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_aa23b7850735ca33_7c6a407e", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (secret)](2) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (secret)](3) is used in a hashing algorithm (MD...
[ 212 ]
[ null ]
[ 27 ]
[ 28 ]
2024-11-18T21:10:19.676945+00:00
1,483,820,257,000
30b1d501e1c0b8b179903344a2abc9cec389fe47
3
{ "blob_id": "30b1d501e1c0b8b179903344a2abc9cec389fe47", "branch_name": "refs/heads/master", "committer_date": 1483820257000, "content_id": "5037d03b0cdbe80b2606fedba1ca869385747fad", "detected_licenses": [ "CC0-1.0" ], "directory_id": "3a5a36a89f14fbd62fe3b05add3cdb4849540888", "extension": "py", ...
2.96875
stackv2
""" Generates a set of standalone markdown files from DayOne entries. Assumes that this script is run on a Mac that has iCloud Drive Enabled and DayOne has been setup to Sync with iCloud and that the Folder is the default, "Journal_dayone". Requires python 2.7 and the external pytz module. """ import argparse import ...
165
30.93
84
14
1,193
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_414bd6a1af84b5d6_e5fb0740", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text." ]
[ 140 ]
[ null ]
[ 17 ]
[ 44 ]
2024-11-18T21:10:21.521604+00:00
1,606,499,014,000
f0fddca15bbba19718d3c78958ad72aeb50a5b9a
3
{ "blob_id": "f0fddca15bbba19718d3c78958ad72aeb50a5b9a", "branch_name": "refs/heads/master", "committer_date": 1606499014000, "content_id": "85fe42b21df5fd160b10871d9b6da9e28e2865ca", "detected_licenses": [ "Unlicense" ], "directory_id": "58921ba123e3739c8ce0abe16b7a1756d4f6a696", "extension": "py",...
2.78125
stackv2
# ================================================================== # from random import randint from colorama import Fore, Back, Style import hashlib import colorama import sys # ================================================================== # # | CONFIG # Prompt Colors normal_background = Fore.LIGHTGREEN_EX +...
121
30.26
106
16
913
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_bacc42ce6dba2529_f684c7dd", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
3
true
[ "CWE-312", "CWE-312", "CWE-327" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (password)](3) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive d...
[ 116, 102, 90 ]
[ null, null, null ]
[ 24, 15, 35 ]
[ 35, 70, 62 ]
2024-11-18T21:10:24.224138+00:00
1,534,782,014,000
09c246abf84948036873b850ebd7cb4d2242a280
2
{ "blob_id": "09c246abf84948036873b850ebd7cb4d2242a280", "branch_name": "refs/heads/master", "committer_date": 1534782014000, "content_id": "734d8b1f922026b0ac7fe77c0ef3024590682658", "detected_licenses": [ "Apache-2.0" ], "directory_id": "4514b39e7be94c6512331cf3e43b143e9bf32048", "extension": "py"...
2.484375
stackv2
#!/usr/bin/python3 from flask import Flask, request, jsonify from flask_restful import Resource, Api from json import dumps import requests import os import operator from scripts.label_image import main app = Flask(__name__) api = Api(app) CLAVES = { "0": "Acquiarium", "1": "AmusementPark", "2": "ArtGalle...
68
26.34
76
21
449
python
[{"finding_id": "codeql_py/full-ssrf_ab0d4f2157858648_a5858ab3", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
1
true
[ "CWE-918" ]
[ "py/full-ssrf" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1)." ]
[ 42 ]
[ null ]
[ 28 ]
[ 45 ]
2024-11-18T21:10:29.786309+00:00
1,581,597,487,000
9bee3caf1c46baeb4f465323bbf5e32b56195e42
3
{ "blob_id": "9bee3caf1c46baeb4f465323bbf5e32b56195e42", "branch_name": "refs/heads/master", "committer_date": 1581597487000, "content_id": "a79d8af0c5ef4b4455e55515046ab1dbc1643b27", "detected_licenses": [ "MIT" ], "directory_id": "7fb33759546979db262710bba97ccb2cf4197314", "extension": "py", "fi...
3.046875
stackv2
from github import Github from github.GithubException import GithubException from getpass import getpass if __name__ == "__main__": gitHubUsername = input("Please enter your Github username: ").strip() gitHubPassword = getpass("Please enter your Github password: ").strip() gitUser = Github(gitHubUsern...
35
43.51
154
14
373
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ca0cfcb86be81ed4_e7cc8ac0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 23 ]
[ null ]
[ 15 ]
[ 144 ]
2024-11-18T21:10:31.716133+00:00
1,677,170,377,000
d24e5e88605f8e24e3e3e9d00ca1a3570be96f35
3
{ "blob_id": "d24e5e88605f8e24e3e3e9d00ca1a3570be96f35", "branch_name": "refs/heads/master", "committer_date": 1677170377000, "content_id": "e1d589bf53b52bf4ef477b853fa4b262e284a1a3", "detected_licenses": [ "MIT" ], "directory_id": "3315a6a8a44633dba4a81a75562f9bf821b66a29", "extension": "py", "fi...
2.578125
stackv2
from abc import ABC, abstractmethod from datetime import datetime, time from distutils.dir_util import copy_tree from http.server import SimpleHTTPRequestHandler from multiprocessing import Pool from pathlib import Path from dateutil import tz from jinja2 import Environment, FileSystemLoader from kart.ext.markdown im...
227
37.33
93
21
2,009
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_9b9a527f41568d9d_6386a76f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 108 ]
[ null ]
[ 20 ]
[ 78 ]
2024-11-18T21:10:50.194128+00:00
1,543,742,863,000
3ec99fba2485c78e492e67486af396c5e82e0433
4
{ "blob_id": "3ec99fba2485c78e492e67486af396c5e82e0433", "branch_name": "refs/heads/master", "committer_date": 1543742863000, "content_id": "6ea68e70134ce90bccf4277786626d8b3197c2fa", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e008adba23ca69badad0776bcb914925e69b9be1", "extension": "py"...
4.125
stackv2
class Person: name = '' #外部定义的都是作为类变量,相当于其他语言中的static age = 0 def __init__(self, name, age): #self,每一个成员方法第一个参数必须是self,只需要在定义的时候写,函数调用的时候不用写 #init相当于构造函数 self.name = name #在实例中定义了同名的self.name覆盖了类对象的name self.age = 20 self.height = 1.9 #这个是在实例对象中定义...
60
19.6
82
12
443
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_691b966314c92f8a_717e2dba", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 27 ]
[ null ]
[ 15 ]
[ 33 ]
2024-11-18T21:11:11.252026+00:00
1,598,117,469,000
da72e99f67ad50ba1df3c20d3b69063ac9d042e4
2
{ "blob_id": "da72e99f67ad50ba1df3c20d3b69063ac9d042e4", "branch_name": "refs/heads/master", "committer_date": 1598117469000, "content_id": "2c7878f6679da9fb60e38ea9225b09c8ffd506f7", "detected_licenses": [ "MIT" ], "directory_id": "9e62fb4fab9271771219b58425068aeb8f2b03ac", "extension": "py", "fi...
2.5
stackv2
#!/usr/bin/env python2 import os from sendgrid import SendGridAPIClient from sendgrid.helpers.mail import Mail from sendgrid.helpers.mail import To from flask import Flask from flask import request app = Flask(__name__) @app.route('/', methods=['GET']) def email_server(): print('sending email...') print(reque...
42
26.02
103
13
322
python
[{"finding_id": "codeql_py/flask-debug_a0ed1baa06cfe742_983b5364", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 42, 38 ]
[ null, null ]
[ 5, 16 ]
[ 53, 50 ]
2024-11-18T21:11:12.507593+00:00
1,544,227,205,000
e9c39e3d74a232aca2ee208be3870d625888a407
4
{ "blob_id": "e9c39e3d74a232aca2ee208be3870d625888a407", "branch_name": "refs/heads/master", "committer_date": 1544227205000, "content_id": "bd6a290eb7d4b2962f81ac5dd5726906ef06df90", "detected_licenses": [ "MIT" ], "directory_id": "f73afaa4e76f560da49a7d8c21f5e455a8d2ecdd", "extension": "py", "fi...
4
stackv2
class Node (object): password = "" count = -1 next = None # Constructor for a Node def __init__(self, password, count, next): self.password = password self.count = count self.next = next # Linked List class. class LinkedList: #Constructor for a Linked List def __i...
234
26.94
88
16
1,441
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8210bcbbd5b6a40b_de80cc95", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text." ]
[ 45, 221 ]
[ null, null ]
[ 19, 11 ]
[ 56, 54 ]
2024-11-18T21:47:37.060482+00:00
1,392,615,030,000
326a63c919f32633bb1206356dad2a90cb801417
4
{ "blob_id": "326a63c919f32633bb1206356dad2a90cb801417", "branch_name": "refs/heads/master", "committer_date": 1392615030000, "content_id": "425daf9be87f0646cde4d6ac418e7ae7dc323493", "detected_licenses": [ "MIT" ], "directory_id": "e9fe8447ba00852ddf13e88766f768938bf77d15", "extension": "py", "fi...
3.859375
stackv2
#!/usr/bin/python #def birthday(amount=365): # n = 1 # for i in range(1, amount): # n *= (1 - (float(i) / amount)) # print("%i: %.2f" % (i, 100-(n*100))) def fact(n): n = int(n) factorial = 1 for number in range(1, n + 1): factorial *= number return factorial def ...
23
20.52
62
12
166
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5d4dd9ed776a532e_d51faf26", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 23 ]
[ null ]
[ 11 ]
[ 21 ]
2024-11-18T21:47:38.795880+00:00
1,692,121,841,000
f7ccdc334244018ca0cc6375616020d19deb0dae
3
{ "blob_id": "f7ccdc334244018ca0cc6375616020d19deb0dae", "branch_name": "refs/heads/master", "committer_date": 1692121841000, "content_id": "f13ae3343815b9a233b3bbf5a363289366d6631b", "detected_licenses": [ "MIT" ], "directory_id": "0f3125015ab1f484d22ff77705e464f1ff844370", "extension": "py", "fi...
2.90625
stackv2
import pandas as pd import requests import matplotlib.pyplot as plt G_API = '#ADD GOOGLE API KEY' # reading csv file def filter_dataframe(df, column_name, value): return df.loc[df[column_name] == value] def get_address(lat, long): URL = 'https://maps.googleapis.com/maps/api/geocode/json?latlng=' + str(lat)...
92
43.86
116
13
857
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2ace3bc46d94ff31_8f312506", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 27, 27 ]
[ null, null ]
[ 15, 32 ]
[ 30, 48 ]
2024-11-18T21:47:39.828082+00:00
1,635,199,755,000
e9ff72ecffaf4dc9690103d8fc13ffa2634fe664
3
{ "blob_id": "e9ff72ecffaf4dc9690103d8fc13ffa2634fe664", "branch_name": "refs/heads/main", "committer_date": 1635199755000, "content_id": "c5b84fd4a3d0d9cdabbfe6894669c45d2db5475d", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "32ef6ea8f2dff9f50047c3158dea488c1f71a61c", "extension": "py"...
3.078125
stackv2
#!/usr/bin/env python3 import os import hashlib from base64 import b64encode from argparse import ArgumentParser from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes from cryptography.hazmat.primitives import padding from cryptography.hazmat.backends import default_backend class AES: def _...
56
29.3
106
15
441
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_b5fcbd3e7b680ccf_69d1ce0c", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e...
[ 16 ]
[ null ]
[ 29 ]
[ 46 ]
2024-11-18T21:47:40.362735+00:00
1,420,577,187,000
aaf14c668efc4e2c178fff7e80fac9fc7bd56142
3
{ "blob_id": "aaf14c668efc4e2c178fff7e80fac9fc7bd56142", "branch_name": "refs/heads/master", "committer_date": 1420577187000, "content_id": "709655b15d4fafaa9dde9f3e71f098e604459f3f", "detected_licenses": [ "MIT" ], "directory_id": "338389b2d475803df372fa7a2aa8d1e7a0f89aca", "extension": "py", "fi...
2.640625
stackv2
# This Python file is the basic file to create the web services with Tornado # Author: Gustavo Martin Vela import tornado.ioloop import tornado.web import datetime import MySQLdb as mdb import json import time #from collections import OrderedDict import RGB # Global variables VERSION = "0.1" SW_NAME = "M2More" AUTHO...
122
37.63
160
16
1,170
python
[{"finding_id": "codeql_py/sql-injection_91181640202247fd_c98aca00", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).\nThis SQL query depends on a [user-provided value](2)."...
1
true
[ "CWE-089" ]
[ "py/sql-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This SQL query depends on a [user-provided value](1).\nThis SQL query depends on a [user-provided value](2)." ]
[ 58 ]
[ null ]
[ 25 ]
[ 30 ]
2024-11-18T22:29:03.439989+00:00
1,419,237,844,000
f297de2efb5b0662f6d96c57ec8111c4100fa75d
3
{ "blob_id": "f297de2efb5b0662f6d96c57ec8111c4100fa75d", "branch_name": "refs/heads/master", "committer_date": 1419237844000, "content_id": "4da0254b1e48ad2d35f7e9d4bdcc2f634b657c07", "detected_licenses": [ "MIT" ], "directory_id": "2020fff14c4a79cfd77dc791166ae5ca2d3cd505", "extension": "py", "fi...
2.671875
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- """SpoofMAC Usage: spoof-mac list [--wifi] spoof-mac randomize [--local] <devices>... spoof-mac set <mac> <devices>... spoof-mac reset <devices>... spoof-mac normalize <mac> spoof-mac -h | --help spoof-mac --version Options: -h --help ...
136
28.74
101
20
888
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0f04f206417568cb_4abcd6be", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 118 ]
[ null ]
[ 15 ]
[ 51 ]
2024-11-18T22:29:27.828289+00:00
1,532,352,746,000
aa1856a0ea53e4f6e65676d7893c560b6997cdd4
3
{ "blob_id": "aa1856a0ea53e4f6e65676d7893c560b6997cdd4", "branch_name": "refs/heads/master", "committer_date": 1532352746000, "content_id": "943236775108a7103d6083da14e0e8bab2db3482", "detected_licenses": [ "MIT" ], "directory_id": "275f3a3dce44f35a5dc1a626e2052c006bdb71bf", "extension": "py", "fi...
3
stackv2
import sys from collections import defaultdict sys.setrecursionlimit(10000) memory = defaultdict(list) def passwordCracker(passwd, attempt): # Complete this function if attempt == '': return True, [] new_attempt = attempt for p in passwd: if new_attempt.startswith(p): ...
36
29.31
74
16
233
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7d85fce18365c2a3_d8663a37", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text." ]
[ 34 ]
[ null ]
[ 19 ]
[ 40 ]
2024-11-18T22:40:35.304030+00:00
1,412,181,326,000
21d2925009d96ee9e83bb6d171a14ae4280d72bc
3
{ "blob_id": "21d2925009d96ee9e83bb6d171a14ae4280d72bc", "branch_name": "refs/heads/master", "committer_date": 1412181326000, "content_id": "fd0aced37931990f2b2a999c000e477b61350e95", "detected_licenses": [ "MIT" ], "directory_id": "09165f56de7fee937f7dddd9bb25ba87071b9e27", "extension": "py", "fi...
2.953125
stackv2
""" DESCRIPTION: Extracts SciTech links and OSTI identifiers from XML files. INSTRUCTIONS: First download XML files into a folder with download_xml_services.py. To obtain a text file with all links out of the downloaded files, use the --identifier_links option, as this one is more reliable than the direct extractio...
131
34.82
105
14
1,147
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_7898f8492cba13c0_888fa252", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'osti.gov/scitech/servlets/purl/', s...
1
true
[ "CWE-020" ]
[ "py/incomplete-hostname-regexp" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'osti.gov/scitech/servlets/purl/', so it might match more hosts than expected." ]
[ 91 ]
[ null ]
[ 35 ]
[ 80 ]
2024-11-18T22:40:37.136102+00:00
1,688,757,739,000
2abfb5eecd5368f747c5ae2ec0448f7a744982e2
3
{ "blob_id": "2abfb5eecd5368f747c5ae2ec0448f7a744982e2", "branch_name": "refs/heads/master", "committer_date": 1688757739000, "content_id": "37f8a5c8ff5e291b17c49ad009939f92879f9872", "detected_licenses": [ "Apache-2.0" ], "directory_id": "4f70a7b1180e87d121c01e15843df4f968caf966", "extension": "py"...
2.625
stackv2
""" Flask HTTP gateway module. """ import functools from io import BytesIO import json import logging import hashlib import numpy import flask from flask import Flask, make_response from utils import tagged_logger # pylint: disable=import-error # Not designed to be installed in vision, yet from requests_toolbelt im...
253
37.06
102
17
1,951
python
[{"finding_id": "codeql_py/reflective-xss_95302d381fbf48b5_75c18ae6", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
2
true
[ "CWE-079", "CWE-117" ]
[ "py/reflective-xss", "py/log-injection" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 135, 134 ]
[ null, null ]
[ 34, 26 ]
[ 37, 29 ]
2024-11-18T22:41:19.137850+00:00
1,519,175,922,000
e6a992610979fa26139be06f5e0335623634dda9
3
{ "blob_id": "e6a992610979fa26139be06f5e0335623634dda9", "branch_name": "refs/heads/master", "committer_date": 1519175922000, "content_id": "13da9db5388be1948f2b683a527f407411664216", "detected_licenses": [ "MIT" ], "directory_id": "284796e63dba49ee83babcf2c3ce953c5c836ac4", "extension": "py", "fi...
2.859375
stackv2
#!/bin/python import codecs import sys def test(argv): with open(argv[1], "rb") as f: hexdump = [] for chunk in iter(lambda: f.read(1), b''): hexdump.append(codecs.encode(chunk, 'hex')) i = 68608 char = hexdump[i] password = "" while char != b'00': ...
67
24.03
117
17
473
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bcc13039f6780ece_6ce98b2f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 22, 61 ]
[ null, null ]
[ 15, 19 ]
[ 23, 44 ]
2024-11-18T22:41:19.669347+00:00
1,651,156,404,000
334dcc068aadf2c793e2e0b1c6c088acc0339225
3
{ "blob_id": "334dcc068aadf2c793e2e0b1c6c088acc0339225", "branch_name": "refs/heads/master", "committer_date": 1651156404000, "content_id": "81c1940d2ca4ec8b3099fbe9589e8e3402496c02", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "684ab490f3e0d778a1e204e6b190b9ea587261a3", "extension": "p...
2.546875
stackv2
#!/usr/bin/env python import sys, os sys.path.append(os.path.join(os.path.dirname(__file__), '..')) import messagebird # ACCESS_KEY = '' # PHONE_NUMBER = '' try: ACCESS_KEY except NameError: print('You need to set an ACCESS_KEY constant in this file') sys.exit(1) try: PHONE_NUMBER except NameError: print...
56
34.3
73
13
523
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9ec0232933bbccae_3b593b8e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 33 ]
[ null ]
[ 9 ]
[ 60 ]
2024-11-18T22:54:12.342450+00:00
1,521,116,233,000
b1b90a5dffabc642f021e294d19b27d35a97b42f
3
{ "blob_id": "b1b90a5dffabc642f021e294d19b27d35a97b42f", "branch_name": "refs/heads/master", "committer_date": 1521116233000, "content_id": "4e68692179b9b752b00d9ff0ab5f8772cde007da", "detected_licenses": [ "MIT" ], "directory_id": "6e4802194f5cfc058a73a8437b47401c9ddd0558", "extension": "py", "fi...
3.109375
stackv2
import pandas as pd train=pd.read_csv('/home/ankita/Desktop/Python files/Titanic/train.csv') test=pd.read_csv('/home/ankita/Desktop/Python files/Titanic/test.csv') #Comparing Columns with #survived #male or #female P_male_yes=0 P_fem_yes=0 P_male_no=0 P_fem_no=0 for i,rowi in train.iloc[:].iterrows(): if rowi['Su...
168
29.05
72
13
1,653
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e00e0708821ab13a_cf25a00e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 21 ]
[ null ]
[ 15 ]
[ 26 ]
2024-11-18T22:54:16.413269+00:00
1,360,545,331,000
c282fc4dba40c8bfa493c33687ca02d760256f2a
2
{ "blob_id": "c282fc4dba40c8bfa493c33687ca02d760256f2a", "branch_name": "refs/heads/master", "committer_date": 1360545331000, "content_id": "bbf5029273f0b9be196089f0aeea2a89a606573a", "detected_licenses": [ "MIT" ], "directory_id": "549ded5d0502580ab419a900e61981acbb19cd81", "extension": "py", "fi...
2.4375
stackv2
#!/usr/bin/env python ''' Copyright (C) Kalan MacRow, 2013 This code is distributed with jquery.instagram.js under the MIT license. https://github.com/kmacrow/jquery.instagram.js ''' import os import cgi import sys import cgitb import urllib2 # Base URL for Instagram API endpoints INSTAGRAM_BASE = 'https://...
51
21.27
62
11
295
python
[{"finding_id": "codeql_py/partial-ssrf_40c435c88ae2c406_5decdb03", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 48 ]
[ 49 ]
[ 10 ]
[ 50 ]
2024-11-18T21:33:03.841578+00:00
1,518,287,017,000
f2bbc8698cce051a55c60d601c56a00b68c2d506
3
{ "blob_id": "f2bbc8698cce051a55c60d601c56a00b68c2d506", "branch_name": "refs/heads/master", "committer_date": 1518287017000, "content_id": "12ef5c30b8a96bc45bfb892dddd4f788ad831246", "detected_licenses": [ "MIT" ], "directory_id": "e1fcb71eaffdd76336db0b5134f6a4579393663a", "extension": "py", "fi...
3.375
stackv2
""" UK income tax calculator Functions: get_net_adjusted_income -- return gross income after salary sacrifice get_personal_allowance -- return the income tax personal allowance applicable get_total_taxable_income -- return the portion of income subject to tax get_tax_breakdown -- return the amount paid in each band fo...
335
30.86
99
20
2,605
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_65501294f02a2c62_f0e336a6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 267, 272 ]
[ null, null ]
[ 15, 15 ]
[ 97, 83 ]
2024-11-18T21:33:28.825403+00:00
1,563,896,235,000
be97af4bd74dc534f5bee67ab69af09a8abe1e40
3
{ "blob_id": "be97af4bd74dc534f5bee67ab69af09a8abe1e40", "branch_name": "refs/heads/master", "committer_date": 1563896235000, "content_id": "a4e482cbdec24ef6958d8f6e5f5b77b9e4ec0727", "detected_licenses": [ "Apache-2.0" ], "directory_id": "adcc59bda80f5c534bc07ec952c8e843c32cb7cf", "extension": "py"...
3.390625
stackv2
''' 功能:采集河北金融学院的新闻,地址为:https://www.hbfu.edu.cn/news/queryListForPage 分析,通过抓包: 得到新闻列表的接口为:https://www.hbfu.edu.cn/news/queryListForPage post模式,form数据为:start: 20 limit: 20 type: 1。 其中type、limit 不变;start从0开始,20为步长进行增长。 新闻详情页的接口为:https://www.hbfu.edu.cn/news/findById post方式,form表单数据为id,ID就是新闻的ID号,通过进一步分析, ...
45
36.2
130
18
582
python
[{"finding_id": "codeql_py/request-without-cert-validation_b2566eac57e873a2_42b62586", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 22, 28 ]
[ null, null ]
[ 15, 21 ]
[ 124, 124 ]