added
stringlengths
32
32
created
int64
1,244B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.25
source
stringclasses
1 value
text
stringlengths
324
20.1k
num_lines
int64
16
598
avg_line_length
float64
15.1
58.3
max_line_length
int64
33
179
ast_depth
int64
8
39
length
int64
101
3.8k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.1k
265k
sast_codeql_findings_count
int64
1
45
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
45
rule_ids
listlengths
1
45
confidences
listlengths
1
45
severities
listlengths
1
45
messages
listlengths
1
45
line_starts
listlengths
1
45
line_ends
listlengths
1
45
column_starts
listlengths
1
45
column_ends
listlengths
1
45
2024-11-18T21:01:25.872232+00:00
1,619,299,722,000
69f9c67c19f426a22aa9167606f975c2c857c018
3
{ "blob_id": "69f9c67c19f426a22aa9167606f975c2c857c018", "branch_name": "refs/heads/main", "committer_date": 1619299722000, "content_id": "73fa08ac9be333017710321fe321eb33feb4ec2f", "detected_licenses": [ "MIT" ], "directory_id": "c69e6718c2a5cf5f743f82925e2efb4923d5dc74", "extension": "py", "file...
2.5625
stackv2
#dependencies from flask import Response from flask import Flask,jsonify,request from flask import Flask, render_template, redirect import requests import json import pandas as pd from sqlalchemy import create_engine from db_config import password from flask_cors import CORS app = Flask(__name__) CORS(app) #engine an...
143
39.75
175
16
1,357
python
[{"finding_id": "codeql_py/flask-debug_3fbd51bbab15231d_d83f40ca", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-089", "CWE-089" ]
[ "py/flask-debug", "py/sql-injection", "py/sql-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This SQL query depends on a [user-provided value](1).", "This SQL query depends on a [user-provided value](1).\nThis SQL query depends on a [user-provided value](2).\nThis SQL query depends on...
[ 143, 96, 121 ]
[ null, null, null ]
[ 5, 31, 24 ]
[ 24, 110, 148 ]
2024-11-18T21:25:28.237785+00:00
1,631,841,023,000
696dd090697e550b61f13e58a03d69ab51c93763
2
{ "blob_id": "696dd090697e550b61f13e58a03d69ab51c93763", "branch_name": "refs/heads/main", "committer_date": 1631841023000, "content_id": "8658df84abb64b366589c9d26afe477da14b37e8", "detected_licenses": [ "MIT" ], "directory_id": "a8edbb6628e60dfea44fc6f5375040912d5c015c", "extension": "py", "file...
2.34375
stackv2
import os from django.shortcuts import render from django.views import View from django.urls import reverse from django.http import Http404, HttpResponse, HttpResponseNotFound from django.conf import settings from rest_framework.views import APIView from rest_framework.response import Response from rest_framework impo...
178
28.22
112
17
975
python
[{"finding_id": "codeql_py/stack-trace-exposure_42705967659866c6_04fc9bb6", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 140 ]
[ 143 ]
[ 17 ]
[ 18 ]
2024-11-18T21:51:24.711141+00:00
1,693,397,543,000
7c5f1fa1fefd94854df24b083293776efc8c2af1
3
{ "blob_id": "7c5f1fa1fefd94854df24b083293776efc8c2af1", "branch_name": "refs/heads/master", "committer_date": 1693397543000, "content_id": "180dc801583fa49a72507c46b7904e7069a8fc8d", "detected_licenses": [ "MIT" ], "directory_id": "2c5dffdcdb3d9a1df7d318da69339a1dd223c89f", "extension": "py", "fi...
2.546875
stackv2
import datetime from flask import Flask from flask import g from flask import redirect from flask import request from flask import session from flask import url_for, abort, render_template, flash from functools import wraps from hashlib import md5 from peewee import * # config - aside from our database, the rest is f...
314
35.43
89
25
2,497
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_98ab054ecdc656e6_a3b8b133", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.", "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally exp...
[ 201, 218 ]
[ null, null ]
[ 34, 27 ]
[ 76, 67 ]
2024-11-18T21:51:40.028868+00:00
1,534,772,749,000
64cd569a88755f1e1a5dd5942cfb3f34e7f0dda8
3
{ "blob_id": "64cd569a88755f1e1a5dd5942cfb3f34e7f0dda8", "branch_name": "refs/heads/master", "committer_date": 1534772749000, "content_id": "acd823c6b20a5c8e6028d1cea89a391f7032247e", "detected_licenses": [ "MIT" ], "directory_id": "997ebaec8cb0f80cf6332eea5ec99a2c63bbee26", "extension": "py", "fi...
2.75
stackv2
from flask import Flask, jsonify, request from chatbot import ChatBot from bot_model import BotModel import json import os import errno app = Flask(__name__) @app.route('/index', methods=['GET']) def index(): response = { "intro" : "welcome to the chatbot as a service. this end point should guide you thro...
75
32.6
127
15
621
python
[{"finding_id": "codeql_py/path-injection_030464d345b25e96_e4d6d202", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
4
true
[ "CWE-022", "CWE-022", "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 33, 58, 60, 65 ]
[ null, null, null, null ]
[ 27, 27, 25, 15 ]
[ 52, 52, 50, 40 ]
2024-11-18T22:00:18.612747+00:00
1,532,214,334,000
bff2c1d962f5bd1c68c9326f59b6bb3a42677e22
2
{ "blob_id": "bff2c1d962f5bd1c68c9326f59b6bb3a42677e22", "branch_name": "refs/heads/master", "committer_date": 1532214334000, "content_id": "96bdc8f69e3c70f35672852eb73a7be8a8c3463c", "detected_licenses": [ "MIT" ], "directory_id": "cc47f95cfdfd7e10cf2515d6cd41ac0aaab53b12", "extension": "py", "fi...
2.4375
stackv2
# -*- coding: utf-8 -*- __author__ = 'CubexX' import hashlib import time from sqlalchemy import Boolean, Column, Integer, Text from config import CONFIG from confstat import cache from main import make_db_session from . import Base class User(Base): __tablename__ = 'users' id = Column('id', Integer, prim...
94
26.06
85
20
557
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_1383abf4a85222cb_fd5b5b36", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (id)](2) is used in a hashing algorithm (MD5) that is insecure." ]
[ 92 ]
[ null ]
[ 25 ]
[ 50 ]
2024-11-18T22:00:23.510590+00:00
1,677,491,511,000
aa0cb250fee295969b143be18be267968c0ff2c3
2
{ "blob_id": "aa0cb250fee295969b143be18be267968c0ff2c3", "branch_name": "refs/heads/master", "committer_date": 1677491511000, "content_id": "3654cabd6b7e9205c3e898aade6481599be4b6ba", "detected_licenses": [ "MIT" ], "directory_id": "07580ac5f713245ff5ff1f6120afc31cf1d0c017", "extension": "py", "fi...
2.46875
stackv2
#!/usr/bin/env python3 import os import argparse import shutil import json import array import base64 import zipfile import logging from xml.etree import ElementTree as ET from html.parser import HTMLParser import requests from Crypto.Cipher import AES def bytess(arr): assert type(arr) in [list] return array....
260
36
127
21
2,268
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b49c415d069af7e0_0776de0a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 128 ]
[ null ]
[ 37 ]
[ 43 ]
2024-11-18T22:00:48.463118+00:00
1,624,763,799,000
b7df3e2f03268ecf5d55fd658e7f0e4db3649712
3
{ "blob_id": "b7df3e2f03268ecf5d55fd658e7f0e4db3649712", "branch_name": "refs/heads/main", "committer_date": 1624763799000, "content_id": "f25ad8592bf3af161e8132e0c36ee107ec160cb9", "detected_licenses": [ "MIT" ], "directory_id": "7df23c65be385b1fb67a18b374ebce1c3351cdc5", "extension": "py", "file...
2.6875
stackv2
import atexit import ipaddress import json import threading import time import flask import requests from apscheduler.schedulers.background import BackgroundScheduler from flask import request, Flask, jsonify class Client: CLIENT_PORT = 4000 ip: str last_seen: time alive: bool base_url: str i...
161
27.51
113
20
1,042
python
[{"finding_id": "codeql_py/flask-debug_91fc7016b53026b9_cf533732", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-295" ]
[ "py/flask-debug", "py/request-without-cert-validation" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This request may run without certificate validation because [it is disabled](1)." ]
[ 161, 48 ]
[ null, 50 ]
[ 5, 28 ]
[ 66, 81 ]
2024-11-18T22:00:50.160699+00:00
1,546,827,166,000
ee9029ed3d7aad4cfb6bdc46f2612725aaf07a10
3
{ "blob_id": "ee9029ed3d7aad4cfb6bdc46f2612725aaf07a10", "branch_name": "refs/heads/master", "committer_date": 1546827166000, "content_id": "e5fa01c6fefe20987c42f3d9e2252fcfe0e8f704", "detected_licenses": [ "MIT" ], "directory_id": "f41e21fc9bcd61ff85686780a4e873695c060f96", "extension": "py", "fi...
2.578125
stackv2
import time import csv import sys import os from datetime import datetime as dt from selenium import webdriver from selenium.webdriver.common.by import By from selenium.webdriver.support.ui import WebDriverWait from selenium.webdriver.support import expected_conditions as EC from selenium.common.exceptions import NoSuc...
255
37.54
163
22
1,998
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a16118b2a5da5dc7_364df42e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 205 ]
[ null ]
[ 27 ]
[ 64 ]
2024-11-18T22:01:05.913285+00:00
1,613,547,900,000
e679795c90805c9291b9d70642acd43b1a93f84c
3
{ "blob_id": "e679795c90805c9291b9d70642acd43b1a93f84c", "branch_name": "refs/heads/main", "committer_date": 1613547900000, "content_id": "b6b38c1f0c2ca0a0dbafade8aecfa60a92aa5181", "detected_licenses": [ "MIT" ], "directory_id": "8cf35c82d51fced7205e9673806fb27dba98388e", "extension": "py", "file...
2.640625
stackv2
import requests import json from rest_framework.views import APIView from rest_framework.response import Response from django.conf import settings from apps.api.utils import Parser from rest_framework import status from apps.api.errors import TranslateError from apps.api.serializer import WeatherSerializer class Temp...
38
43.11
139
17
344
python
[{"finding_id": "codeql_py/partial-ssrf_9228b6ea4e1deb64_91c64dd8", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depen...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depends on a [user-provided value](2)." ]
[ 23 ]
[ null ]
[ 24 ]
[ 41 ]
2024-11-18T22:15:01.932799+00:00
1,587,706,713,000
82367f2c382117bc8aa73d38de7c234edafa987a
3
{ "blob_id": "82367f2c382117bc8aa73d38de7c234edafa987a", "branch_name": "refs/heads/master", "committer_date": 1587706713000, "content_id": "c33a01eb8de2dd7d47e5f35348b08ef2ab53edbb", "detected_licenses": [ "MIT" ], "directory_id": "ee940b3042b18ebc69624cd1ba7c712056957f24", "extension": "py", "fi...
3.3125
stackv2
import os from credentials import Credentials import pyperclip import time def generate_password(): ''' generate password ''' return os.urandom(8) print("Hello! Welcome to Password app where passwords are found") print("****** Use Yes or No as shortcodes to navigate******") print("Kindly enter yo...
78
28.47
93
13
496
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c3bc7cf2c4ed0c18_54141b3d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 60 ]
[ null ]
[ 15 ]
[ 50 ]
2024-11-18T22:15:02.331071+00:00
1,625,846,868,000
4c4f3e818036e81c4a8631e05e27a9153e69cffa
3
{ "blob_id": "4c4f3e818036e81c4a8631e05e27a9153e69cffa", "branch_name": "refs/heads/master", "committer_date": 1625846868000, "content_id": "c0b3204848d30149c24df11fed2ffda5b6a4ac10", "detected_licenses": [ "Apache-2.0" ], "directory_id": "5e8600eafc97ec079e615de11c958089f72c55e9", "extension": "py"...
2.703125
stackv2
import base64 import getpass import json import sys import requests requests.packages.urllib3.disable_warnings() # https://rowlog.com/docs # https://rowlog.com/docs/authentication BASE_URL = 'https://rokort.dk/api' CLUB_ID = 58 def get_auth_string(): # Get from args if possible, otherwise prompt user if l...
73
21.52
66
12
411
python
[{"finding_id": "codeql_py/request-without-cert-validation_1443f2efcfc180a2_c2ca5361", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 42 ]
[ 46 ]
[ 13 ]
[ 10 ]
2024-11-18T22:15:03.377401+00:00
1,618,398,068,000
e572621401879fa01c056f6ebe22b6fb6634ceb7
3
{ "blob_id": "e572621401879fa01c056f6ebe22b6fb6634ceb7", "branch_name": "refs/heads/main", "committer_date": 1618398068000, "content_id": "7b22a61474f9051851c61ed173815c4d77ebbb96", "detected_licenses": [ "MIT" ], "directory_id": "1ca81a5536a92b87ba7f05093647a685bb6fff43", "extension": "py", "file...
2.65625
stackv2
from recognize_image import recognize_image import os from flask import Flask, render_template, request, url_for app = Flask(__name__) @app.route('/') def home(): return render_template('index.html') @app.route('/recognize', methods=['GET', 'POST']) def recognize(): # Get image if request.method == 'POST'...
25
29.64
145
16
164
python
[{"finding_id": "codeql_py/path-injection_c2cd3cbb50260226_6c7ca4a0", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 21 ]
[ null ]
[ 20 ]
[ 30 ]
2024-11-18T22:26:08.442509+00:00
1,601,120,533,000
e96928d8407a6f9e8fdc81fb46ad306231f33a8f
3
{ "blob_id": "e96928d8407a6f9e8fdc81fb46ad306231f33a8f", "branch_name": "refs/heads/master", "committer_date": 1601120533000, "content_id": "e48e0ec40684fdd2ab5caae4e3929757b71b10a9", "detected_licenses": [ "MIT" ], "directory_id": "05d460acd3e15c42c4b1ddd2eead83dc48f5312f", "extension": "py", "fi...
3.015625
stackv2
import hashlib,uuid,sys def new_password_username(user,password): salt = uuid.uuid4().hex user = hashlib.sha512(user.encode()) print('this is the salt:',salt) file_userd = open('fileu1.txt','a') file_userd.write(user.hexdigest()+':'+salt) file_userd.close() password = salt + password password = hashlib.sha512(...
59
30.03
85
13
461
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_2109151e9c124023_c7ec8fd9", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally e...
[ 11, 31 ]
[ null, null ]
[ 28, 28 ]
[ 45, 45 ]
2024-11-18T22:26:26.060564+00:00
1,519,973,438,000
213a354192c0170f5b7f91eb75bfcc1f26a5e88f
3
{ "blob_id": "213a354192c0170f5b7f91eb75bfcc1f26a5e88f", "branch_name": "refs/heads/master", "committer_date": 1519973438000, "content_id": "c990f590585ef176b2215667895966bf4b5693f3", "detected_licenses": [ "MIT" ], "directory_id": "1a16670a9f53966171c9a667cb54836f1daa12ec", "extension": "py", "fi...
2.671875
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- """ pwstore ~~~~~~~ A commandline-based secure password storage system. :copyright: 2018 by Kharidiron :license: MIT """ __version__ = '1.0' import argparse import base64 import cmd import datetime import getpass import hashlib import logging import she...
527
26.43
79
19
3,335
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_65e0efc29ee6b75e_04ab5746", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 259 ]
[ 260 ]
[ 18 ]
[ 41 ]
2024-11-18T20:40:06.442690+00:00
1,588,696,601,000
c8c19ff513d5f6d8128a05b35baa1793ffde58c5
2
{ "blob_id": "c8c19ff513d5f6d8128a05b35baa1793ffde58c5", "branch_name": "refs/heads/master", "committer_date": 1588696601000, "content_id": "b70a416e70a569f38d6e2c415e743c182d3934ad", "detected_licenses": [ "Apache-2.0" ], "directory_id": "fe71c636114ad503c693d81926a35dee1c9d72b4", "extension": "py"...
2.421875
stackv2
from flask import jsonify, request from flask_classful import FlaskView from flask_jwt_extended import ( create_access_token, jwt_required, set_access_cookies, unset_jwt_cookies ) from ui.blueprints.user.models import User from ui.blueprints.user.schemas import auth_schema class AuthView(FlaskView): ...
79
25.08
74
17
410
python
[{"finding_id": "codeql_py/stack-trace-exposure_57ced92026a85990_77fb997e", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 38 ]
[ null ]
[ 28 ]
[ 36 ]
2024-11-18T20:52:18.109200+00:00
1,538,783,182,000
4eb2ddd75db6c99cca756461a5acff1b445b7f25
2
{ "blob_id": "4eb2ddd75db6c99cca756461a5acff1b445b7f25", "branch_name": "refs/heads/master", "committer_date": 1538783182000, "content_id": "8cb217a3b5ed309940f9a3a45deaddc47b730bdd", "detected_licenses": [ "MIT" ], "directory_id": "b3c75745c41a0c8d77bdaa17421e169873a95262", "extension": "py", "fi...
2.5
stackv2
#!/usr/bin/env python3 from os import listdir, remove, symlink import errno from os.path import isfile, join, splitext from optparse import OptionParser, OptionGroup from time import sleep, time import datetime import subprocess import math import sys import tempfile from shutil import copyfile try: from PIL import...
470
27.3
126
19
3,490
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_fd9ccd561addc984_62c4a390", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 152 ]
[ null ]
[ 3 ]
[ 60 ]
2024-11-18T21:08:12.262364+00:00
1,617,078,126,000
10088fef45eb926c9be1fc6dca1ec2e18c4249d4
3
{ "blob_id": "10088fef45eb926c9be1fc6dca1ec2e18c4249d4", "branch_name": "refs/heads/master", "committer_date": 1617078126000, "content_id": "55bd86a213f7a8a37829d2ee8c7d9230fdcd166b", "detected_licenses": [ "MIT" ], "directory_id": "631d5efc7fbb972ec13a4d8d1b002726d9a69f5b", "extension": "py", "fi...
2.796875
stackv2
from email.mime.multipart import MIMEMultipart from email.mime.text import MIMEText from html2text import HTML2Text from jinja2 import Template html_parser = HTML2Text() def build_from_template(source: str, jinja_env: dict = None) -> MIMEMultipart: """ Build an email from a Jinja template and create a MIMEMu...
36
26.17
119
11
234
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_549a7be46b0ef9f2_c52984dd", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 25 ]
[ null ]
[ 16 ]
[ 30 ]
2024-11-18T21:08:12.702558+00:00
1,606,490,830,000
633dec5ed1a8d9389d6045b67f5ea630405dba22
2
{ "blob_id": "633dec5ed1a8d9389d6045b67f5ea630405dba22", "branch_name": "refs/heads/master", "committer_date": 1606490830000, "content_id": "0022ff8b8708ff4cfdf33174250a5263efab7251", "detected_licenses": [ "MIT" ], "directory_id": "68022d573b4eb207e821d751a3fcecfcac7b4d69", "extension": "py", "fi...
2.375
stackv2
from flask import Flask, send_file from flask import request import os import numpy as np import cv2 import urllib.request as urllib from io import BytesIO from PIL import Image from services.faces import FaceFinder from services.landmarks import LandmarkFinder from services.focus import FocusFinder from services.emot...
150
31.35
143
16
1,364
python
[{"finding_id": "codeql_py/flask-debug_56f9eb866b7d71d5_02d8a67b", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-918" ]
[ "py/flask-debug", "py/full-ssrf" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "The full URL of this request depends on a [user-provided value](1)." ]
[ 150, 28 ]
[ null, null ]
[ null, 9 ]
[ 46, 28 ]
2024-11-18T21:08:17.609148+00:00
1,484,510,103,000
c60b322e05463488812261512042fe9913d6e740
3
{ "blob_id": "c60b322e05463488812261512042fe9913d6e740", "branch_name": "refs/heads/master", "committer_date": 1484510103000, "content_id": "dca9d5b23813dd06ce54ee8b099f9b7f0173a2db", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "8566885316ee1ec3bef911f2b39145946775ecc4", "extension": "p...
2.828125
stackv2
import hashlib from base64 import urlsafe_b64encode from django.core.management.base import BaseCommand def make_hash(input): data1 = bytes(input, 'ascii') hasher1, hasher2 = hashlib.md5(), hashlib.md5() hasher1.update(data1) data2 = hasher1.digest() hasher2.update(data2) data3 = hasher2.digest() return urlsa...
26
22.5
53
11
153
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_77097b843154685e_1015f603", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 10 ]
[ null ]
[ 17 ]
[ 22 ]
2024-11-18T21:08:33.947143+00:00
1,513,244,652,000
e54383bf2851dcf753b90f32405bf705b163b024
3
{ "blob_id": "e54383bf2851dcf753b90f32405bf705b163b024", "branch_name": "refs/heads/master", "committer_date": 1513244652000, "content_id": "5131b8a0f9585a6b3a07e55145ffc809ac1fe8ec", "detected_licenses": [ "MIT" ], "directory_id": "5ab0ebf7b767be37f93c5200cd51992840dd4e24", "extension": "py", "fi...
2.6875
stackv2
##### Much of this is adopted (copy-and-pasted) from ##### ##### https://github.com/edx/edx-ora/blob/master/controller/urls.py ##### import urllib import requests import logging import json import settings import urls log = logging.getLogger(__name__) def xqueue_login(): session = requests.session(...
217
31.22
112
13
1,504
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_93d8aa9d19dab0f5_d7710506", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 31 ]
[ null ]
[ 15 ]
[ 97 ]
2024-11-18T21:31:27.992662+00:00
1,633,856,609,000
55100674b80ec1431cd89ba10e214d5abd9c030e
4
{ "blob_id": "55100674b80ec1431cd89ba10e214d5abd9c030e", "branch_name": "refs/heads/master", "committer_date": 1633856609000, "content_id": "64543f03f12f57f01a0ce28221007eff630d7385", "detected_licenses": [ "MIT" ], "directory_id": "292ebda0d69d4aade0f4367859e3d7e186617635", "extension": "py", "fi...
3.640625
stackv2
# Python program to accept string ending # with only alphanumeric character. # re module provides support # for regular expressions import re # Make a regular expression to accept string # ending with alphanumeric character regex = '[a-zA-z0-9]$' # Define a function for accepting string # endi...
45
18.51
45
11
207
python
[{"finding_id": "codeql_py/overly-large-range_08a0d270c411811d_62d308cf", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 11 ]
[ null ]
[ 14 ]
[ 17 ]
2024-11-18T21:31:29.404811+00:00
1,538,458,961,000
370143490dad13b17badfa916eecefc4096c78d6
4
{ "blob_id": "370143490dad13b17badfa916eecefc4096c78d6", "branch_name": "refs/heads/master", "committer_date": 1538458961000, "content_id": "5e72985eadaf873581ef298fe1f0a59fb3352c98", "detected_licenses": [ "MIT" ], "directory_id": "e14c328e5b9c42d36b4e4f5c1901bb976b1949f4", "extension": "py", "fi...
3.859375
stackv2
#!/usr/bin/python import random def getOptions(option): while True: choice = "" print("{} (y/N): ".format(option), end="") choice = input() if len(choice) == 0: pass elif choice[0].lower() == 'y': return True elif choice[0].lower() == 'n': return False def getLength(): passLength = 0 ...
80
17.98
54
14
456
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0e3b564dfe5b016c_c681fafa", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 76 ]
[ null ]
[ 8 ]
[ 30 ]
2024-11-18T21:31:32.765673+00:00
1,606,261,871,000
2ac7ea912cbf53f01b1bf1ce89dceda436148206
2
{ "blob_id": "2ac7ea912cbf53f01b1bf1ce89dceda436148206", "branch_name": "refs/heads/master", "committer_date": 1606261871000, "content_id": "b51785d9486495523a16ba3afc15fac22132ca94", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "4057b38e8a6d7a40c10789db609ad2d2096e37bb", "extension": "p...
2.421875
stackv2
from urllib.request import urlopen import cv2 import io import aiohttp import re from dotenv import load_dotenv load_dotenv() import os_helper async def find_recent_image(channel_id, message_id): urlRegexImage = "^(?:http(s)?:\/\/)?[\w.-]+(?:\.[\w\.-]+)+[\w\-\._~:\/?#[\]@!\$&'\(\)\*\+,;=.]+(?:png|jpg|jpeg|...
39
30.36
130
16
306
python
[{"finding_id": "codeql_py/redos_6937403c01ca98f5_1d2006d7", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '-.' and containing many repetitio...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '-.' and containing many repetitions of '-.'." ]
[ 15 ]
[ null ]
[ 53 ]
[ 61 ]
2024-11-18T21:32:01.005716+00:00
1,605,980,829,000
4d51ebd32a5f24cb02ce148d12e33d346926fac2
3
{ "blob_id": "4d51ebd32a5f24cb02ce148d12e33d346926fac2", "branch_name": "refs/heads/master", "committer_date": 1605980829000, "content_id": "4901aef9ee57ba9f7462ef7ae864d40892479db0", "detected_licenses": [ "MIT" ], "directory_id": "40756d056501712241ee3f3f45683b3883ef8b5d", "extension": "py", "fi...
2.671875
stackv2
import boto3 import base64 import json import os rekognition_client = boto3.client('rekognition') file = open('man2.jpg','rb').read() response = rekognition_client.detect_faces( Image = { 'Bytes': file }, Attributes = ['ALL'] ) for face in response['FaceDetails']: print('The detected candidate is '+ str(face['G...
41
29.37
122
16
308
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e3b93f7003e1dfca_283f84a5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 16 ]
[ null ]
[ 8 ]
[ 66 ]
2024-11-18T21:32:28.975904+00:00
1,379,859,705,000
bd18f21e87804e360eb966eec19e9df2f0b808b3
2
{ "blob_id": "bd18f21e87804e360eb966eec19e9df2f0b808b3", "branch_name": "refs/heads/master", "committer_date": 1379859705000, "content_id": "77545ab49f590044217905b51f0229dbf90d9f3d", "detected_licenses": [ "MIT" ], "directory_id": "a5375c6610dc4e5b18845fd0d82109fbf88f568a", "extension": "py", "fi...
2.421875
stackv2
from sqlalchemy import Column, Integer, String, DateTime, Text, ForeignKey import datetime from sqlalchemy.sql import select from database import Base import hashlib import string import random class Major(Base): __tablename__ = 'majors' code = Column(String(20), unique=True, primary_key=True) name = Column(String(...
102
22.58
111
16
674
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_bbacdff8bfc2adfe_31a857dc", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e...
[ 40, 94 ]
[ null, null ]
[ 34, 37 ]
[ 42, 52 ]
2024-11-18T21:33:11.284007+00:00
1,638,099,079,000
8445f2e6d167796af2c76ef35d3ce855ef555ce3
3
{ "blob_id": "8445f2e6d167796af2c76ef35d3ce855ef555ce3", "branch_name": "refs/heads/master", "committer_date": 1638099079000, "content_id": "7e1119d7b86b65ec875e09604ef71894855202a8", "detected_licenses": [ "MIT" ], "directory_id": "65525c3b93f273bd3cb7b5562108509b145f7c0d", "extension": "py", "fi...
2.53125
stackv2
from http.server import HTTPServer, BaseHTTPRequestHandler import sys import os count = 0 class SimpleHTTPRequestHandler(BaseHTTPRequestHandler): def do_GET(self): self.send_response(200) self.end_headers() global count global port global folder cwd = os....
40
25.38
92
16
255
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_181262f44edcdddb_6bcdb0d6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 27 ]
[ null ]
[ 15 ]
[ 21 ]
2024-11-18T21:49:04.071878+00:00
1,678,744,463,000
fced46d8dbb3e5f8930168e324a392fdf45b4e68
3
{ "blob_id": "fced46d8dbb3e5f8930168e324a392fdf45b4e68", "branch_name": "refs/heads/master", "committer_date": 1678744463000, "content_id": "a362e7ae21cafc093b00f5b684fcbb30eeecba01", "detected_licenses": [ "MIT" ], "directory_id": "7dfc28944db71d80bd04c6597363591aa08c6687", "extension": "py", "fi...
2.515625
stackv2
import os import pickle import warnings import numpy as np from FeaturesExtractor import FeaturesExtractor from hmmlearn import hmm import pydub import subprocess import speech_recognition as sr from pydub import AudioSegment from subprocess import Popen, PIPE from pydub.silence import split_on_silence, detect_nonsil...
146
39.74
150
19
1,386
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_209f191f0e4dda2f_3a6b8b3d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 84 ]
[ null ]
[ 23 ]
[ 29 ]
2024-11-18T21:49:15.918173+00:00
1,628,847,844,000
dff4ed357c2d486371017828ad626f0543cc3f08
3
{ "blob_id": "dff4ed357c2d486371017828ad626f0543cc3f08", "branch_name": "refs/heads/main", "committer_date": 1628847844000, "content_id": "361847529322c2d4ffae6025c479c3c855567fdc", "detected_licenses": [ "MIT" ], "directory_id": "1f617025454f9ac75f2af7fb7d9fae8ff16d676f", "extension": "py", "file...
2.921875
stackv2
from PIL import Image import os import os.path import numpy as np import tarfile from torchvision.datasets.vision import VisionDataset from torchvision.datasets.utils import extract_archive class CODaN(VisionDataset): """`CODaN <https://github.com/Attila94/CODaN>`_ Dataset. Args: data (string, option...
89
37.58
105
21
764
python
[{"finding_id": "codeql_py/tarslip_1153ee99695707fc_7fb95d0b", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 52 ]
[ null ]
[ 17 ]
[ 20 ]
2024-11-18T22:42:09.581157+00:00
1,525,757,950,000
759c7ee30b9a262d59ce9c6513e7d9d5b13b4a20
3
{ "blob_id": "759c7ee30b9a262d59ce9c6513e7d9d5b13b4a20", "branch_name": "refs/heads/master", "committer_date": 1525757950000, "content_id": "b84792d41f2c9792312acd91f84e291b53ac4fb2", "detected_licenses": [ "MIT" ], "directory_id": "54f9249c0e94787ed5cddbf142e13fe01542344c", "extension": "py", "fi...
2.96875
stackv2
#!/usr/bin/env python3 """ This module creates a HTML report with plots by parsing data from the given log file. """ import os from sys import argv from datetime import timedelta from jinja2 import Environment, FileSystemLoader from classify import Classifier from parse import Parser from plot import create_plots PA...
119
28.66
76
14
776
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_e65ea7c3af567ffa_73bac107", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 17 ]
[ 20 ]
[ 24 ]
[ 23 ]
2024-11-18T20:31:40.571662+00:00
1,454,906,747,000
8d08b802eda8e8a37df1e5d2c379469c9eb0efb5
3
{ "blob_id": "8d08b802eda8e8a37df1e5d2c379469c9eb0efb5", "branch_name": "refs/heads/master", "committer_date": 1454906747000, "content_id": "92aa0f8a9f2682d2f6ce52e7f26e46c5fc2b76e8", "detected_licenses": [ "MIT" ], "directory_id": "179b05d486c1b8efd06134e084b7f1651e146a8b", "extension": "py", "fi...
2.703125
stackv2
#!/usr/bin/env python import argparse import gpxpy import numpy as np import io from pathlib import Path from PIL import Image import urllib.request import urllib.parse import matplotlib matplotlib.use('Agg') import matplotlib.pyplot as plt # Command line option handling parser = argparse.ArgumentParser(description ...
330
34.5
79
21
2,890
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b328e45ab2211536_45343aa4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 78 ]
[ null ]
[ 41 ]
[ 48 ]
2024-11-18T20:31:40.923624+00:00
1,554,808,772,000
68da96baf0d4ea89a3c5acd6c1e8c60f9ac275f6
4
{ "blob_id": "68da96baf0d4ea89a3c5acd6c1e8c60f9ac275f6", "branch_name": "refs/heads/master", "committer_date": 1554808772000, "content_id": "b80856c2bfffe6718756e145b0bba08a6b26839f", "detected_licenses": [ "MIT" ], "directory_id": "593c54233366121603bacc9b7a7a3507edf76a50", "extension": "py", "fi...
3.875
stackv2
import random import csv alphabet = [] def createPassword(length): password = [] for i in range(length): password.append(random.choice(alphabet)) return "".join(password) def getAsciiCharacters(): print("Gaining all characters") for i in range(97,123): alphabet.append(chr(i)) ...
80
28.24
96
16
547
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c951579ff8b8d954_420507af", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 41, 63 ]
[ null, null ]
[ 19, 11 ]
[ 82, 19 ]
2024-11-18T20:53:37.108359+00:00
1,524,140,235,000
a090debd2fbcd3d9f80d4984dd28cbce12767896
2
{ "blob_id": "a090debd2fbcd3d9f80d4984dd28cbce12767896", "branch_name": "refs/heads/master", "committer_date": 1524140235000, "content_id": "218f0ff6738a4fe7791d9696cc06ef4711e13135", "detected_licenses": [ "Apache-2.0" ], "directory_id": "3f4d418d9c182c21ebcb41b133381ffeee6db2b2", "extension": "py"...
2.40625
stackv2
import os import functools import logging import textwrap import requests from flask import request from flask import session as flask_session from flask_oauthlib.client import OAuth, OAuthRemoteApp from connexion.exceptions import OAuthProblem, OAuthResponseProblem, OAuthScopeProblem from app.config import CREDENTI...
147
33.71
120
19
1,015
python
[{"finding_id": "codeql_py/log-injection_8c71e35e0b7e4b6a_6834c22a", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 83 ]
[ null ]
[ 50 ]
[ 61 ]
2024-11-18T21:10:49.141164+00:00
1,511,963,562,000
044e0371d565fc9ba901a918a81a4460de7f8aad
2
{ "blob_id": "044e0371d565fc9ba901a918a81a4460de7f8aad", "branch_name": "refs/heads/master", "committer_date": 1511963562000, "content_id": "5f9b34347470a4c741b5cee9ccb391b88bdbb8ff", "detected_licenses": [ "Apache-2.0" ], "directory_id": "31bbd75b53ce575d38d865c8a843b2e14800688f", "extension": "py"...
2.421875
stackv2
# Copyright (c) 2013 Yogesh Panchal, yspanchal@gmail.com # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law ...
93
30.4
80
18
646
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_c4b3ad8f38f0e7e8_c4e51786", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text." ]
[ 66 ]
[ null ]
[ 25 ]
[ 60 ]
2024-11-18T21:11:14.955022+00:00
1,646,861,833,000
0f963e5b09a636f0cd2157e6858a19b6e23c66bd
3
{ "blob_id": "0f963e5b09a636f0cd2157e6858a19b6e23c66bd", "branch_name": "refs/heads/master", "committer_date": 1646862164000, "content_id": "ea81523c7ad75417e22e250dbf4cb6df4332b60a", "detected_licenses": [ "MIT" ], "directory_id": "3777ee738c3a00c33159c8d7c6f515e8c1a6a1db", "extension": "py", "fi...
2.640625
stackv2
#!/usr/bin/python3 # # See README.md for configuration information import gdata.contacts.client import gdata.contacts.service import gdata.gauth import glob import math import os import re import unidecode import xml.dom.minidom import asteriskhelp OAUTH_CONFIG_FILE = "/etc/asterisk-scripts/client_secrets.json" USER...
194
30.03
88
20
1,319
python
[{"finding_id": "codeql_py/overly-permissive-file_bf500e64f96eae6d_32d676be", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable." ]
[ 169 ]
[ null ]
[ 5 ]
[ 31 ]
2024-11-18T21:11:16.175759+00:00
1,688,579,818,000
7babe3b157c0d0895ece8eacb2deda5c19dd3eef
3
{ "blob_id": "7babe3b157c0d0895ece8eacb2deda5c19dd3eef", "branch_name": "refs/heads/main", "committer_date": 1688579818000, "content_id": "a4f0e0cb6a990ea47369b28c2defef952dfbd9b5", "detected_licenses": [ "MIT" ], "directory_id": "37bac66cd5344166070b5be0f84368b3944671d1", "extension": "py", "file...
2.953125
stackv2
#!/usr/bin/env python3 """A script to import part information from KiCad.""" from pathlib import Path import json import re # We don't want a bunch of `fixme` warnings for this script. # pylint: disable=fixme def parse_part(part): """Converts KiCad's string representation of a part to a dict.""" if not '\...
246
27.72
78
20
1,841
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_ee77fe9f662cf148_c95b14c3", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [www.allegromicro.com/](1) may be at an arbitrary posit...
5
true
[ "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020" ]
[ "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "The string [www.allegromicro.com/](1) may be at an arbitrary position in the sanitized URL.", "The string [www.fairchildsemi.com/](1) may be at an arbitrary position in the sanitized URL.", "The string [www.st.com/](1) may be at an arbitrary position in the sanitized URL.", "The string [www.ti.com/](1) may b...
[ 164, 165, 166, 167, 168 ]
[ null, null, null, null, null ]
[ 8, 9, 9, 9, 9 ]
[ 48, 50, 39, 39, 42 ]
2024-11-18T21:46:31.313689+00:00
1,544,048,477,000
1f0accb54b2767c167a726b9d93269a1de5ee9a4
3
{ "blob_id": "1f0accb54b2767c167a726b9d93269a1de5ee9a4", "branch_name": "refs/heads/master", "committer_date": 1544048477000, "content_id": "18bce0cda3d923c480d5ddbd1b6095de49f45cbe", "detected_licenses": [ "MIT" ], "directory_id": "b645b0d5af437a9b33d5f6531ed2bae572f0f348", "extension": "py", "fi...
2.828125
stackv2
import json import socket import ssl import getpass import datetime import os import hashlib from Helpers import Debug ''' Markerede linje: (225) Tag datoer og tid fra input og konvertér til timestamp ''' # Nuværende socket sock = None # Handshake id client_id = None # Er klienten logget ind? logged_in = False # F...
288
17.16
76
16
1,649
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_28e8029cb5309e6d_14f6ea0c", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.", "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computational...
[ 60, 100 ]
[ null, null ]
[ 31, 31 ]
[ 48, 48 ]
2024-11-18T21:47:33.336686+00:00
1,688,758,855,000
9270730243eca2a2fee52f46f2a760be7240e8e2
3
{ "blob_id": "9270730243eca2a2fee52f46f2a760be7240e8e2", "branch_name": "refs/heads/master", "committer_date": 1688758855000, "content_id": "a73aa7cf7876be4e042df53db8423ea56957219b", "detected_licenses": [ "Apache-2.0" ], "directory_id": "a48bbf8c43121d97be0b8e9b7fbaa667127ed040", "extension": "py"...
2.734375
stackv2
import os from smartystreets_python_sdk import StaticCredentials, ClientBuilder, SharedCredentials from smartystreets_python_sdk.international_street import Lookup as InternationalLookup def run(): # key = "Your SmartyStreets Key here" # hostname = "Your Hostname here" # We recommend storing your secret...
59
40.2
102
12
551
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_51159ef0329fc0ae_f13b6db1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 54, 55 ]
[ null, null ]
[ 11, 11 ]
[ 67, 69 ]
2024-11-18T21:47:34.451712+00:00
1,559,481,653,000
ed4e4b6b5f93c40580ac95e2fe174ecf7e50a9f1
3
{ "blob_id": "ed4e4b6b5f93c40580ac95e2fe174ecf7e50a9f1", "branch_name": "refs/heads/master", "committer_date": 1559481653000, "content_id": "d3bb914c7e47d48aa55bac692eb4386b37bda1df", "detected_licenses": [ "MIT" ], "directory_id": "b24dd9e7588f919047d1563a80cba02c080491c0", "extension": "py", "fi...
2.625
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- import sys import requests from contextlib import contextmanager from collections import namedtuple from typing import Optional, Dict, Iterator, cast from aruba.errors import RequestError, FormatError from aruba.common import _ask_input, _ask_pass, _fill, Config, Settin...
115
35.58
115
13
1,011
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_de8773146b8a11f7_bde02b38", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
2
true
[ "CWE-312", "CWE-295" ]
[ "py/clear-text-logging-sensitive-data", "py/request-without-cert-validation" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.", "This request may run without certificate validation because [it is disabled](1) by [this value](2)." ]
[ 113, 39 ]
[ null, null ]
[ 15, 20 ]
[ 44, 83 ]
2024-11-18T22:29:30.634982+00:00
1,573,461,029,000
b5f69993d07fdf7196e1dedeed3ac710f2b9b5a3
3
{ "blob_id": "b5f69993d07fdf7196e1dedeed3ac710f2b9b5a3", "branch_name": "refs/heads/master", "committer_date": 1573461029000, "content_id": "a146503ee2c449e7a779595ff290cf2ee9be3bde", "detected_licenses": [ "MIT" ], "directory_id": "1201db030924970bb72d4c0e9843369059aa7ba9", "extension": "py", "fi...
3.21875
stackv2
# -*- coding: utf-8 -*- import argparse import hashlib import string import re from rgpg.__version__ import __version__, __description__ def random_generator(str_seed: str): """Simple pseudo-random number generator.""" seed = int(hashlib.md5(str_seed.encode(encoding='utf-8')).hexdigest()[:8], 16) multip...
108
28.44
82
17
826
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_548013346f176ef9_3cd490b2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 100 ]
[ null ]
[ 11 ]
[ 52 ]
2024-11-18T22:29:36.235969+00:00
1,540,555,472,000
9c9ba70bf5dbd5c1021564d6b8064fff9dedfab9
3
{ "blob_id": "9c9ba70bf5dbd5c1021564d6b8064fff9dedfab9", "branch_name": "refs/heads/master", "committer_date": 1540555472000, "content_id": "cfee34f7f6d743b732497dc0723dd884cf61d36b", "detected_licenses": [ "MIT" ], "directory_id": "a5d5326a65daf6f5528aa0248d96ee24858f8252", "extension": "py", "fi...
2.546875
stackv2
# *** Create a new Outgoing Caller ID *** # Code based on https://www.twilio.com/docs/voice/api/outgoing-caller-ids # Download Python 3 from https://www.python.org/downloads/ # Download the Twilio helper library from https://www.twilio.com/docs/python/install import os from twilio.rest import Client #from datetime impo...
49
53.73
120
10
586
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_4f10fc127bdac155_33b599ec", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 47, 36 ]
[ null, null ]
[ 9, 7 ]
[ 72, 38 ]
2024-11-18T22:40:27.914108+00:00
1,358,199,589,000
60533fecc30a05cc0db1b7f5ffe6a8bbb52e3132
2
{ "blob_id": "60533fecc30a05cc0db1b7f5ffe6a8bbb52e3132", "branch_name": "refs/heads/master", "committer_date": 1358199589000, "content_id": "646a338152099cf3c6d80e18d1fb897b71337eae", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "41913d2bb96aed5af283184d9abe4f8a70d40257", "extension": "p...
2.4375
stackv2
""" Author: Christian Laustsen License: BSD (See accompanying LICENSE file) Description: Create a menulet in the system tray, and automate the process of connecting to the K-Net and logging in to the server with ssh. """ import urllib2 import webbrowser import paramiko import threading import time import objc, re, ...
199
32.2
105
16
1,450
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_a9ca40f4763ac7c1_cb57d6d5", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 57 ]
[ null ]
[ 5 ]
[ 62 ]
2024-11-18T22:41:22.977484+00:00
1,469,735,124,000
6c37cf0604169b71316b6ecf2587a61b113d3d9b
2
{ "blob_id": "6c37cf0604169b71316b6ecf2587a61b113d3d9b", "branch_name": "refs/heads/master", "committer_date": 1469735124000, "content_id": "f75f0bf28f9992d3a3bda5c1409a5c3bc8328f79", "detected_licenses": [ "MIT" ], "directory_id": "dd6f63ad5f5d9bfc8f908d1d371d6d8b891d140a", "extension": "py", "fi...
2.390625
stackv2
import hashlib import random import string import os from werkzeug import secure_filename import jinja2 import json from flask import Flask, render_template, request, url_for, redirect, make_response from flask.ext.login import LoginManager, current_user, login_user, logout_user, login_required import mammoth from s...
157
29.06
110
18
1,014
python
[{"finding_id": "codeql_py/flask-debug_ff24f14770afb95a_944e3e0c", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-327" ]
[ "py/flask-debug", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 157, 43 ]
[ null, null ]
[ 5, 14 ]
[ 24, 27 ]
2024-11-18T22:54:28.632181+00:00
1,507,771,301,000
00642d3bb9790158c2984982b091b959742e5be8
2
{ "blob_id": "00642d3bb9790158c2984982b091b959742e5be8", "branch_name": "refs/heads/master", "committer_date": 1507771301000, "content_id": "ef1cbb7f51d4d28bc288550828d63de1f997ccfc", "detected_licenses": [ "MIT" ], "directory_id": "50eefef1dee13b2cc478afcbdfe3dca712e25472", "extension": "py", "fi...
2.453125
stackv2
import os.path, cgi from types import * from datetime import datetime from google.appengine.api import users import webapp2 from jinja2 import Environment, FileSystemLoader, TemplateNotFound from models import CardSets def verifySet(content): cards = [] for (i, pair) in enumerate(content.split("\n")): ...
199
28.82
82
19
1,092
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_b8ed8778c26b8843_2b2a7110", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 37 ]
[ null ]
[ 15 ]
[ 68 ]
2024-11-18T20:55:10.455084+00:00
1,400,988,379,000
58a4928dbaa39c625de17ab969a5f2c2ec2a85c4
3
{ "blob_id": "58a4928dbaa39c625de17ab969a5f2c2ec2a85c4", "branch_name": "refs/heads/master", "committer_date": 1400988379000, "content_id": "8314f633f0ab7f881cedb66ec05a4746c10d0020", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "ee824830b453394c53c16332fedb9d088968caff", "extension": "p...
2.859375
stackv2
""" Copyright (c) 2014, Zane Salvatore. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the follo...
268
31.97
80
15
1,835
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_2a3c0e65a4390ec2_4116f4da", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
5
true
[ "CWE-079", "CWE-079", "CWE-079", "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false", "py/jinja2/autoescape-false", "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially...
[ 97, 98, 190, 217, 226 ]
[ null, 100, 211, 224, 243 ]
[ 33, 30, 16, 16, 21 ]
[ 56, 30, 6, 6, 6 ]
2024-11-18T20:55:12.681098+00:00
1,625,847,365,000
f49cb6b048a712e4cfdb296190a004d422620286
2
{ "blob_id": "f49cb6b048a712e4cfdb296190a004d422620286", "branch_name": "refs/heads/master", "committer_date": 1625847365000, "content_id": "8244fe530fae23dbb391724e8c86c0c0068c2699", "detected_licenses": [ "MIT" ], "directory_id": "7d41a4c02e69887f5d31f8ec41db9c91a455eff3", "extension": "py", "fi...
2.5
stackv2
from django.db import models import re from datetime import date # Create your models here. class UserManager(models.Manager): def user_validator(self, postData): errors = {} if len(postData['Username'])<2: errors['Username'] = "Username must be greater than 2 characters long" e...
30
40.7
82
14
280
python
[{"finding_id": "codeql_py/overly-large-range_03d125e85bea2f2b_f6606d31", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 11 ]
[ null ]
[ 58 ]
[ 61 ]
2024-11-18T21:33:05.030545+00:00
1,637,635,890,000
9814cfb5b14653600c9290b74c09d87b43d62e50
3
{ "blob_id": "9814cfb5b14653600c9290b74c09d87b43d62e50", "branch_name": "refs/heads/master", "committer_date": 1637635890000, "content_id": "c6a8415fcfee31311cc7114bdebcea0fb611cf3f", "detected_licenses": [ "MIT" ], "directory_id": "fb10f5c99d90a41a29cb4c1f866d9d4ca19002fd", "extension": "py", "fi...
2.546875
stackv2
import os import scipy.io as io import shutil import tarfile dataset_path = '~/dataset/stanford_car' dataset_path = os.path.expanduser(dataset_path) if not os.path.exists(dataset_path): os.makedirs(dataset_path, exist_ok=True) def download_file(url, dest=None): if not dest: dest = os.path.join(data...
90
34.17
96
15
810
python
[{"finding_id": "codeql_py/tarslip_cf0bc2a3a58b1dee_18b64016", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
3
true
[ "CWE-022", "CWE-022", "CWE-022" ]
[ "py/tarslip", "py/tarslip", "py/tarslip" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1).", "This file extraction depends on a [potentially untrusted source](1).", "This file extraction depends on a [potentially untrusted source](1)." ]
[ 30, 31, 32 ]
[ null, null, null ]
[ 5, 5, 5 ]
[ 63, 62, 63 ]
2024-11-18T21:33:16.141882+00:00
1,576,060,776,000
17f840d531d4cb103d19cb6e9430def3046cc79c
2
{ "blob_id": "17f840d531d4cb103d19cb6e9430def3046cc79c", "branch_name": "refs/heads/master", "committer_date": 1576060776000, "content_id": "24f8195835ce8c909027755bf4493cb3a4858201", "detected_licenses": [ "MIT" ], "directory_id": "e63831c555efff1741ed21c9fd299d73c3e65ffb", "extension": "py", "fi...
2.421875
stackv2
import os.path import os from dotenv import load_dotenv import sys import platform import requests from zipfile import ZipFile from config import DOWNLOAD_PATH, VERSION_FILE from .list import list_remote """ Download Required Terraform / Terragrunt Versions """ def download_program(args, program, version): opera...
104
33.38
146
16
831
python
[{"finding_id": "codeql_py/overly-permissive-file_32d7fc1771d415e8_d371d5ab", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable." ]
[ 59 ]
[ null ]
[ 9 ]
[ 35 ]
2024-11-18T21:33:16.332600+00:00
1,541,204,305,000
a3ae94b73b78c219235c34e36dbac3b24ae62851
3
{ "blob_id": "a3ae94b73b78c219235c34e36dbac3b24ae62851", "branch_name": "refs/heads/master", "committer_date": 1541204305000, "content_id": "5bdfe24809b0f2fc91fc606439558bdc98850313", "detected_licenses": [ "MIT" ], "directory_id": "a0489f93b4715941c1f3ea41997b328f76de4c9f", "extension": "py", "fi...
2.515625
stackv2
import decimal import random from getpass import getpass import requests import settings import datetime import hashlib import time def checksum(activity_id, ts, token): md5 = hashlib.md5() md5.update(('content_resource/{}/activity'.format(activity_id).encode('utf-8'))) md5.update(ts.encode('utf-8')) ...
161
36.09
110
24
1,322
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_2bd60a8801931478_851a920b", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.",...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 14 ]
[ null ]
[ 17 ]
[ 83 ]
2024-11-18T21:55:52.434512+00:00
1,508,753,358,000
71c767c304e8f5ac7377aa5085d2e14ee6c28fd3
3
{ "blob_id": "71c767c304e8f5ac7377aa5085d2e14ee6c28fd3", "branch_name": "refs/heads/master", "committer_date": 1508753358000, "content_id": "90afee5b59cf631a2dd8edc4394c7b2f8c60f973", "detected_licenses": [ "Apache-2.0" ], "directory_id": "ee7b6ba87d21d463d17a1e8b7a52c80a870eedf9", "extension": "py"...
2.75
stackv2
from __future__ import absolute_import import re import sqlite3 import nltk import codecs import json conn = sqlite3.connect(u'rechtspraak.db') c = conn.cursor() def tokenizing(text): tokenized = nltk.word_tokenize(text) return [w.lower() for w in tokenized if not re.match( u'[^a-zA-uZ\d\s]',w)] rows = ...
34
23.65
87
12
241
python
[{"finding_id": "codeql_py/overly-large-range_fdb90bcc5212b314_21a9594c", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-u\\]." ]
[ 17 ]
[ null ]
[ 66 ]
[ 69 ]
2024-11-18T21:56:07.943039+00:00
1,598,697,615,000
55ed84e0506bd110cd214f1d9c2c24153dda86ac
3
{ "blob_id": "55ed84e0506bd110cd214f1d9c2c24153dda86ac", "branch_name": "refs/heads/master", "committer_date": 1598697615000, "content_id": "98fabe50e1101abe01e31ee4d4547585bec4b4d9", "detected_licenses": [ "MIT" ], "directory_id": "eb1e890531c9b71000cfa0f3b00673520d447b08", "extension": "py", "fi...
2.828125
stackv2
from flask import jsonify from PIL import Image import os from model import predict_date def resize_img(img, size=224): width, height = img.size scale_f = max(width, height) / size width_new = int(width / scale_f) height_new = int(height / scale_f) img = img.resize((width_new, height_new)) ret...
52
22.69
45
12
305
python
[{"finding_id": "codeql_py/command-line-injection_9ed67f74caaaab86_e1fa61c3", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {...
2
true
[ "CWE-078", "CWE-022" ]
[ "py/command-line-injection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This command line depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 32, 29 ]
[ null, null ]
[ 19, 19 ]
[ 35, 27 ]
2024-11-18T21:56:08.066335+00:00
1,595,309,962,000
cd6a3ee7b063a7688cb26f1c29ef72a4e6c7d2a0
3
{ "blob_id": "cd6a3ee7b063a7688cb26f1c29ef72a4e6c7d2a0", "branch_name": "refs/heads/master", "committer_date": 1595309962000, "content_id": "5c2168ec670cdb7c808d66b40fc7e3bd4ed25b08", "detected_licenses": [ "Apache-2.0" ], "directory_id": "f97c7539f564428c98986c4a9ff61acdb13cd7fc", "extension": "py"...
3.375
stackv2
# -*- coding:utf-8 import datetime,argparse,csv # 获取身份证号码最后一位 # 根据前17位进行计算 # Parameter: # id:前17位的字符串列表 def get_lastnumber(id): weight=[7,9,10,5,8,4,2,1,6,3,7,9,10,5,8,4,2] if len(weight) != len(id): print("计算最后一位时出错!") print(id) return 0 sum = 0 for i in range(len(weight)): ...
148
28.04
114
20
1,284
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_53de41a18d07fac2_6c0b7702", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.\nThis expression stores [sensitive data (private)](3) as clear text.\nThis expression stores [sensitive data (private)](4) as clear text.\nThis expression stores [sensitive data ...
[ 126, 13, 129 ]
[ null, null, null ]
[ 34, 15, 31 ]
[ 36, 17, 33 ]
2024-11-18T22:55:03.218099+00:00
1,589,580,174,000
c3d182a04ec55f0141e3d597cb39d428d1bfbec7
4
{ "blob_id": "c3d182a04ec55f0141e3d597cb39d428d1bfbec7", "branch_name": "refs/heads/master", "committer_date": 1589580174000, "content_id": "6ce7f4e87d571ce54537c953ef4242006b10d77e", "detected_licenses": [ "MIT" ], "directory_id": "4b896d31de2aa5c8097a03952430750205206708", "extension": "py", "fi...
3.546875
stackv2
import random def jogar(): apresentação() randomizar = carrega_txt(txt='palavras.txt') palavra_secreta = randomizar.lower() letras_acertadas = ['_' for letra in palavra_secreta] letras_erradas = [] letras_certas = [] enforcou = False acertou = False erros = 0 while not enfo...
191
29.79
86
18
1,528
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_db6a749a1cc62ccb_27362091", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text." ]
[ 108, 128 ]
[ null, null ]
[ 11, 11 ]
[ 48, 48 ]
2024-11-18T23:06:22.296884+00:00
1,610,108,679,000
78f9b8a9315eb62498f82d5c82815f751e152b00
3
{ "blob_id": "78f9b8a9315eb62498f82d5c82815f751e152b00", "branch_name": "refs/heads/main", "committer_date": 1610108679000, "content_id": "542b1e92a209a6350409702bdb6e01217e57d0c4", "detected_licenses": [ "MIT" ], "directory_id": "787a11e4db9f5f9cd6f0571edc609c68db550299", "extension": "py", "file...
2.84375
stackv2
from pandas.io.json import json_normalize import folium from geopy.geocoders import Nominatim import requests import pandas as pd import folium from folium import plugins import math geolocator = Nominatim(user_agent="foursquare_agent") ny_location = geolocator.geocode("New York, USA") ny_latitude = ny_location.latit...
55
29.07
169
16
473
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_05f95f9206a5bdc1_e14871fa", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 16, 16 ]
[ null, null ]
[ 30, 69 ]
[ 41, 81 ]
2024-11-18T23:06:23.078124+00:00
1,551,810,179,000
243c25436f659af9003f608d64b0d63171c362db
3
{ "blob_id": "243c25436f659af9003f608d64b0d63171c362db", "branch_name": "refs/heads/master", "committer_date": 1551810179000, "content_id": "ed1314c30ec6725ed65c27d31aefcdc66f9487e7", "detected_licenses": [ "MIT" ], "directory_id": "0291837e28e472fc842661e3c0f6af3604a25849", "extension": "py", "fi...
3.140625
stackv2
import re import base64 import json import hashlib users = {} def load_users(path): with open(path) as f: users.update(json.load(f)) def authorized(token): if not token: print(f'Token is empty') return False m = re.match(r'^Basic (.*)', token) if not m: print(f'Toke...
43
19.65
78
14
210
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_7be231b15d01465e_2e7e64a5", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 41 ]
[ null ]
[ 26 ]
[ 43 ]
2024-11-18T20:56:50.120914+00:00
1,628,350,847,000
cf75754d7a9fe73ae600d9033fc9c7f77138002e
4
{ "blob_id": "cf75754d7a9fe73ae600d9033fc9c7f77138002e", "branch_name": "refs/heads/master", "committer_date": 1628350847000, "content_id": "13e05a9af92e961c1ffcb3849e99fea172414f5c", "detected_licenses": [ "Apache-2.0" ], "directory_id": "d53eb96e95ade4deb5d8cfba229a16f7fa0538d6", "extension": "py"...
4.46875
stackv2
# 对象的初始化方法--定义对象的属性 class Chinese(): def __init__(self): # 构造方法、魔法方法、初始化方法 init方法后边不需要调用,会在创建对象的时候直接初始化 print('init') self.nationality = 'China' # 为对象本身创建初始化属性 self.complexion = 'yellow' def eat(self): print('吃东西') def sleep(self): print('睡觉') xiaoming = Ch...
36
22.83
104
10
287
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2f42ce0de517e8a6_eb3dfa1e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text." ]
[ 21, 35 ]
[ null, null ]
[ 7, 7 ]
[ 27, 26 ]
2024-11-18T22:43:29.202657+00:00
1,543,263,859,000
96d2e0fa30242216dbf863bef454ecfbee673cae
2
{ "blob_id": "96d2e0fa30242216dbf863bef454ecfbee673cae", "branch_name": "refs/heads/main", "committer_date": 1543263859000, "content_id": "d8e346babb5abc00cc58227dd7e2ca549f9d5264", "detected_licenses": [ "Apache-2.0" ], "directory_id": "6dd9696a49e2367942d7168c990afb9cab4c84d2", "extension": "py", ...
2.328125
stackv2
#!/usr/bin/env python from google.appengine.ext import ndb from jinja2 import Environment, FileSystemLoader from json import dumps from os import path from re import compile from sets import Set from webapp2 import RequestHandler, WSGIApplication JINJA_ENVIRONMENT = Environment( loader=FileSystemLoader(path.dirn...
115
32.12
113
18
763
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_0356344af443d2a3_d2a0d89c", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 12 ]
[ 13 ]
[ 21 ]
[ 53 ]
2024-11-18T22:43:33.404920+00:00
1,627,943,127,000
8b434bc67429884aa2c94550666e3d60d33f137b
3
{ "blob_id": "8b434bc67429884aa2c94550666e3d60d33f137b", "branch_name": "refs/heads/main", "committer_date": 1627943127000, "content_id": "2f3536f2c79bd9dd9db8746164d9a26a5d5efa3e", "detected_licenses": [ "Apache-2.0" ], "directory_id": "0643fcb7e32b98b86d4f8e6e6467a07a3ff9206c", "extension": "py", ...
2.96875
stackv2
""" Provides access to a secret store via dapr. Starts and manages a dapr process, which provides HTTP access to the store. Assumes daprd executable in same directory as currently running process. Usage: * open() * read_value() -- as needed * close() -- Must terminate the daprd process! Copyright 2021 ba...
87
29.4
95
17
610
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6b4e3d66d2827923_cdcfa041", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 69, 81 ]
[ null, null ]
[ 15, 23 ]
[ 51, 55 ]
2024-11-18T22:29:37.301923+00:00
1,590,479,640,000
d0967bdaef7397ef986376f3d26519cd176e213e
4
{ "blob_id": "d0967bdaef7397ef986376f3d26519cd176e213e", "branch_name": "refs/heads/master", "committer_date": 1590479640000, "content_id": "d7f72d88dc117b72e7e7b8d0d72413d5ebe01ca9", "detected_licenses": [ "MIT" ], "directory_id": "1d173c06b5cc9f926608913eef6ef5fa006efb4c", "extension": "py", "fi...
3.59375
stackv2
from user import User from credentials import Credentials import random def create_user(username, password): ''' Function to create a new user ''' new_user = User(username, password) return new_user def create_account(account_name, account_password): ''' Function to create a new account ...
194
24.61
154
21
963
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d0857b7643379ff9_23170b61", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 136, 177, 181 ]
[ null, null, null ]
[ 17, 21, 21 ]
[ 154, 69, 65 ]
2024-11-18T22:29:56.023899+00:00
1,547,445,268,000
b3fde6b38d6339191cb37c02a4a53eef87615d38
2
{ "blob_id": "b3fde6b38d6339191cb37c02a4a53eef87615d38", "branch_name": "refs/heads/master", "committer_date": 1547445268000, "content_id": "0843a130aadbb2992c0515112efcff1d518bdd0b", "detected_licenses": [ "MIT" ], "directory_id": "6e10cab54775efef85e21707f7f43aa0fb110121", "extension": "py", "fi...
2.484375
stackv2
from flask import Flask, Blueprint, jsonify, json, request from datetime import datetime from functools import wraps from app.models import User,USERS,FLAGS,Redflag from uuid import uuid4 from werkzeug.security import generate_password_hash, check_password_hash from .users import loggedinuser flags = Blueprint('flag',...
85
30.58
91
17
617
python
[{"finding_id": "codeql_py/stack-trace-exposure_a1c0c1794b0a87c1_0787c00a", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 63 ]
[ null ]
[ 24 ]
[ 58 ]
2024-11-18T23:21:51.022217+00:00
1,599,487,973,000
46a596ed9ce4e62a99e19db9c3c959695a762517
3
{ "blob_id": "46a596ed9ce4e62a99e19db9c3c959695a762517", "branch_name": "refs/heads/master", "committer_date": 1599487973000, "content_id": "3693e72b012b2970513049f6b1e6ec6e0dd1a089", "detected_licenses": [ "MIT" ], "directory_id": "f8db353042d7474c3e4b3e9446f989fdd552c9f3", "extension": "py", "fi...
2.796875
stackv2
"""Manage LDAP objects """ import logging import ldap import ldap.modlist from .utils import list_get, configuration_manager as cm logger = logging.getLogger(__name__) class LdapObject(): """Define a simple LDAP object. """ def __init__(self, base: str): """Create the object. Arg: ...
407
33.98
109
21
3,434
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_77aa35858ef37a46_d50194ec", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 228 ]
[ null ]
[ 26 ]
[ 108 ]
2024-11-18T21:33:31.760793+00:00
1,616,829,530,000
af323a655b0e62ff6e368a91b104ac37c98e4522
3
{ "blob_id": "af323a655b0e62ff6e368a91b104ac37c98e4522", "branch_name": "refs/heads/main", "committer_date": 1616829530000, "content_id": "2055b936d8388521661c45cb12da81dca7827dbd", "detected_licenses": [ "MIT" ], "directory_id": "6b314edc1bcf669878eb6726d072d6148aabc449", "extension": "py", "file...
2.96875
stackv2
import requests import argparse import time import pandas as pd import numpy as np from mac import mac from tabulate import tabulate url = 'http://standards-oui.ieee.org/oui/oui.csv' print("[*] Welcome") # # Function to get the interface name # def get_arguments(): # # This will give user a neat CLI...
105
27.9
76
15
719
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ddef4407a3afe05d_344a144b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 99 ]
[ null ]
[ 23 ]
[ 73 ]
2024-11-18T21:33:36.474157+00:00
1,629,876,808,000
ca3afb97d66f3bf72f404654c4a67551cd544c0b
3
{ "blob_id": "ca3afb97d66f3bf72f404654c4a67551cd544c0b", "branch_name": "refs/heads/master", "committer_date": 1629876808000, "content_id": "45f3f80ed90c0e61b3d1f1228565cf0efb5c2492", "detected_licenses": [ "MIT" ], "directory_id": "869d921242191b4142c15733d5c3ede1d59fbdb2", "extension": "py", "fi...
3.140625
stackv2
#!/usr/bin/env/ python # encoding: utf-8 """Handle operations supporting blocks here.""" import math import matasano.util import matasano.prng from typing import Tuple from Crypto.Cipher import AES __author__ = 'aldur' class BadPaddingException(Exception): """ Throw this exception while detecting that a ...
329
24.19
80
14
2,290
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_4b7503f6cecc2b84_c509f9a2", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
3
true
[ "CWE-327", "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 245, 245, 324 ]
[ null, null, null ]
[ 12, 47, 13 ]
[ 26, 61, 37 ]
2024-11-18T21:33:44.186877+00:00
1,596,375,266,000
1139bbd7e95ca598590295c21542bd7b8d70b60e
3
{ "blob_id": "1139bbd7e95ca598590295c21542bd7b8d70b60e", "branch_name": "refs/heads/master", "committer_date": 1596375266000, "content_id": "298d0673805581c8811460c272e1154df6c5f19a", "detected_licenses": [ "MIT" ], "directory_id": "b0658195f8c37f1c9392bc60c6bf026b2d5d6c84", "extension": "py", "fi...
2.625
stackv2
from pathlib import Path from click import secho # Usually we'd use requests, but here we're making everything async # the main async HTTP client is aiohttp, but httpx is new and shiny # https://github.com/encode/httpx import httpx from .auth import telegram_bot_token, telegram_user_chat_id # https://core.telegram.o...
105
30.05
95
16
807
python
[{"finding_id": "codeql_py/request-without-cert-validation_c5390758a60be8bb_e8c14dda", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
4
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 19, 38, 57, 88 ]
[ 26, 46, 65, null ]
[ 19, 19, 19, 23 ]
[ 10, 10, 10, 58 ]
2024-11-18T23:15:51.300845+00:00
1,575,478,531,000
8b6eed5f14453f8c2ed739c8638df8d2143da156
2
{ "blob_id": "8b6eed5f14453f8c2ed739c8638df8d2143da156", "branch_name": "refs/heads/master", "committer_date": 1575478531000, "content_id": "f1c716bcaa775a85cb0a2649a992de24f4f39134", "detected_licenses": [ "MIT" ], "directory_id": "5b0326dc1c6f8195193386bb4434b4965a518bb0", "extension": "py", "fi...
2.375
stackv2
from os.path import join, exists from os import mkdir import logging import config from flask import Flask, request, redirect, send_file, jsonify from plotting import plot_audio, plt_spectrogram from noise_filter import noise_filter from save_audio import wavwrite, process_request app = Flask(__name__) @app.route(...
79
28.77
80
14
571
python
[{"finding_id": "codeql_py/path-injection_63c2179aae7dc464_029928b6", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
2
true
[ "CWE-022", "CWE-117" ]
[ "py/path-injection", "py/log-injection" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 37, 36 ]
[ null, null ]
[ 22, 21 ]
[ 58, 48 ]
2024-11-18T22:30:13.166574+00:00
1,481,935,914,000
28054f538c3ed6a32c60618d3ce86d07ed2b40ae
2
{ "blob_id": "28054f538c3ed6a32c60618d3ce86d07ed2b40ae", "branch_name": "refs/heads/master", "committer_date": 1481935914000, "content_id": "da13d8f4bbb4cb5b761fc2a3048a58cd0d22b34a", "detected_licenses": [ "MIT" ], "directory_id": "bc65f55716200d8e2ae7889aad985e7590403f86", "extension": "py", "fi...
2.3125
stackv2
#!/usr/bin/env python #coding:utf-8 import sys import urllib2 import json def getFreeSsInfos(): url = "http://api.jiasu.im/api/apiv2.php?op=tourist" try: # url = "https://api.mianvpn.com/ajax.php?verify=true&mod=getfreess" response = urllib2.urlopen(url, timeout=10) result = json.load...
38
25.03
76
13
256
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8e509473329add8c_2198bf1f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 38 ]
[ null ]
[ 11 ]
[ 27 ]
2024-11-18T22:30:16.937827+00:00
1,564,936,391,000
e28e6e463c98b3677853b6a1f30e961603b095a1
2
{ "blob_id": "e28e6e463c98b3677853b6a1f30e961603b095a1", "branch_name": "refs/heads/master", "committer_date": 1564936391000, "content_id": "74a421318fb474211fdb4f593ab6379fa42bb5cd", "detected_licenses": [ "MIT" ], "directory_id": "69fc4f12e4359232e17db150975997368ace174f", "extension": "py", "fi...
2.4375
stackv2
# -*- coding: utf-8 -*- import time import os import boto3 import paramiko def lambda_handler(event, context): statusMessage = "Wrong Password Given" if event["serverPassword"] == os.getenv("MinePass"): ec2 = boto3.client('ec2', region_name=os.getenv("Region")) statusMessage = manageServer(ec2...
143
37.83
172
20
1,253
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_c7e47c399553e051_0738b83d", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 121 ]
[ null ]
[ 5 ]
[ 68 ]
2024-11-18T22:44:49.147143+00:00
1,457,308,554,000
cf29e4b196c7e26003ef0e747f232ef5d7adb234
2
{ "blob_id": "cf29e4b196c7e26003ef0e747f232ef5d7adb234", "branch_name": "refs/heads/master", "committer_date": 1457308554000, "content_id": "566ff77de42832c52b0eff28652b3fcd1765a59a", "detected_licenses": [ "MIT" ], "directory_id": "2af31f3c3d3c8b0b62e1d213d80beb66f7c0816f", "extension": "py", "fi...
2.34375
stackv2
""" Local "web app" for the PA unit database. See http://localhost:8080/list """ # Step 0: Make sure we have Bottle. If not, download it. try: import bottle except ImportError: def get_bottle(): import urllib.request import os.path savename = os.path.join(os.path.split(os.path.abspath(_...
328
35.41
111
17
2,915
python
[{"finding_id": "codeql_py/log-injection_3e51fdc4b2806aaa_8510251f", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
2
true
[ "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 195, 202 ]
[ 196, 203 ]
[ 13, 17 ]
[ 69, 69 ]
2024-11-18T23:36:48.031286+00:00
1,587,761,053,000
3973aea9ea0cf19c9667d8c02c7dac0ec0c348d4
2
{ "blob_id": "3973aea9ea0cf19c9667d8c02c7dac0ec0c348d4", "branch_name": "refs/heads/master", "committer_date": 1587761053000, "content_id": "5455ba94b1ba7ddcf4ef1faa43a91dbabaa3f3be", "detected_licenses": [ "MIT" ], "directory_id": "7dcc6d0eb866b3315bf729ec00dfd71db6847ce2", "extension": "py", "fi...
2.421875
stackv2
from wiserSmartAPI.wiserSmart import wiserSmart import logging import json import time import datetime _LOGGER = logging.getLogger(__name__) _LOGGER.setLevel(logging.DEBUG) # Get Wiser Parameters from keyfile with open("wisersmart.params", "r") as f: data = f.read().split("\n") wiserkey = "" wiserip = "" # Get w...
92
36.3
133
16
808
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6ef13294973c5641_25908f9d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 28 ]
[ null ]
[ 7 ]
[ 133 ]
2024-11-18T23:36:53.713053+00:00
1,620,720,359,000
314fd18e1681ed3a9116e7d588cae0f390a14fcc
3
{ "blob_id": "314fd18e1681ed3a9116e7d588cae0f390a14fcc", "branch_name": "refs/heads/master", "committer_date": 1620720359000, "content_id": "63096aa30e340bf6e4fa55ca8ea20e0117a30be0", "detected_licenses": [ "MIT" ], "directory_id": "17b82e7a84400ae823801c937cb5b18541e4418c", "extension": "py", "fi...
2.5625
stackv2
from django.core.management.base import BaseCommand, CommandError from main.models import EventAction, PositionUncertainty, PositionSource from django.conf import settings from main import utils # This file is part of https://github.com/cpina/science-cruise-data-management # # This project was programmed in a hurry w...
100
45.94
169
19
949
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b78c073e359d9367_dd8353fd", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.\nThis expression logs [sensitive data (private)](4) as clear text.", "This expression logs [sensitive data (priva...
[ 81, 86 ]
[ 82, null ]
[ 19, 19 ]
[ 134, 125 ]
2024-11-18T23:36:56.418195+00:00
1,510,339,776,000
fbbc5d94b5a25b01b4050a7624da18a26ec02b83
3
{ "blob_id": "fbbc5d94b5a25b01b4050a7624da18a26ec02b83", "branch_name": "refs/heads/master", "committer_date": 1510339776000, "content_id": "2fb2d8d11886ae814aeb158e8a6cff52581541e1", "detected_licenses": [ "MIT" ], "directory_id": "edf06b3a23260e0e115dd3a72aed218dc83048d6", "extension": "py", "fi...
3
stackv2
import hashlib import sys import requests from .base import NanoBase if sys.version_info < (3, 0, 0): # We're on Py2, get Py3-style super() from builtins import super class User(NanoBase): """ A NanoBase object for representing NaNoWriMo participants. """ # Endpoint URLs for user objects...
126
23.27
78
16
720
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_6797178bc2e5a5ee_f56dc0a3", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecu...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecure." ]
[ 80 ]
[ null ]
[ 22 ]
[ 34 ]
2024-11-18T23:36:56.709607+00:00
1,527,090,012,000
4d16a4c03b9f42f3bc6e87ccf45ba7ce137afc5f
2
{ "blob_id": "4d16a4c03b9f42f3bc6e87ccf45ba7ce137afc5f", "branch_name": "refs/heads/master", "committer_date": 1527090012000, "content_id": "26f75445b004f56390b58a4c743e72d74fce49ae", "detected_licenses": [ "MIT" ], "directory_id": "10ce54aae328a14df82805faf2931cade2df558d", "extension": "py", "fi...
2.484375
stackv2
from rest_framework import serializers from django.contrib.auth import get_user_model from django.contrib.auth.password_validation import validate_password from rest_framework.exceptions import ValidationError UserModel = get_user_model() class UserSerializer(serializers.ModelSerializer): def validate_password...
35
29.86
77
14
194
python
[{"finding_id": "codeql_py/stack-trace-exposure_41b1f184e447581e_4da7583a", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 16 ]
[ null ]
[ 47 ]
[ 55 ]
2024-11-18T21:14:04.545612+00:00
1,624,244,228,000
4f937c559887d55483d8508d9225a363ed49a8ff
3
{ "blob_id": "4f937c559887d55483d8508d9225a363ed49a8ff", "branch_name": "refs/heads/master", "committer_date": 1624244228000, "content_id": "fa679eb5fb15c7b5948ca00bef3b01237e3346cb", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "91d42246402e3bf7057df314dc7e329f0037d7a9", "extension": "p...
2.765625
stackv2
# -*- coding: utf-8 -*- from urllib.parse import quote, unquote, urlencode from collections import namedtuple from Crypto.Cipher import AES import base64, hashlib, os import axolotl_curve25519 as Curve25519 KeyPairCurve = namedtuple('KeyPair', ['private_key', 'public_key', 'nonce']) AESKeyAndIV = namedtuple('AESKey', ...
82
37.07
80
14
808
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_e092df8c340b8ffc_fa8978a0", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 33, 37 ]
[ null, null ]
[ 16, 16 ]
[ 39, 43 ]
2024-11-18T21:14:13.871618+00:00
1,410,571,700,000
f553057ebda2bc6931ca0ff318d00cd21716903a
3
{ "blob_id": "f553057ebda2bc6931ca0ff318d00cd21716903a", "branch_name": "refs/heads/master", "committer_date": 1410571700000, "content_id": "cfafcd4a9833a91f9e3a8990d0fa6b5f63bea8c3", "detected_licenses": [ "MIT" ], "directory_id": "a869093fd9d379865b890b07f70de16c4c57550f", "extension": "py", "fi...
2.90625
stackv2
import string import base64 from Crypto.Cipher import AES def b64ToByteString(b64): return base64.b64decode(b64) def hexStringToByteArray(hexString): return stringToByteArray(hexString, 2, lambda x: int(x, 16)) def stringToByteArray(s, byteSize=1, convert=lambda x: ord(x)): for i in xrange(0, len(s), byteSize):...
91
24.69
83
13
728
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_430f8259ade1828d_3f2b6ba1", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 26, 33 ]
[ null, null ]
[ 14, 16 ]
[ 45, 42 ]
2024-11-18T21:57:29.624618+00:00
1,555,243,050,000
a5ed143b1099ccb05199bdcbb2d6112c9c0359cf
3
{ "blob_id": "a5ed143b1099ccb05199bdcbb2d6112c9c0359cf", "branch_name": "refs/heads/master", "committer_date": 1555243127000, "content_id": "a0444b955042397bdf8bb469d59b5053a6a77cfe", "detected_licenses": [ "MIT" ], "directory_id": "df6e5b1cff3ad134b5a1f1dbb0e295186818bc2f", "extension": "py", "fi...
2.53125
stackv2
import logging from flask import request from flask_restful import Resource, marshal_with from core.interface import recordingDeviceFields from ..common.accelerometer import RecordingDeviceStatus logger = logging.getLogger('recorder.recordingDevices') class RecordingDevices(Resource): def __init__(self, **kwar...
122
34.25
100
18
873
python
[{"finding_id": "codeql_py/log-injection_474d5c25804d9bee_2068138b", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](1)...
2
true
[ "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-pr...
[ 89, 104 ]
[ null, null ]
[ 38, 38 ]
[ 79, 88 ]
2024-11-18T21:57:33.169137+00:00
1,608,586,509,000
c044c3089b46932ae712ef5e3303c723d2186db7
3
{ "blob_id": "c044c3089b46932ae712ef5e3303c723d2186db7", "branch_name": "refs/heads/master", "committer_date": 1608586509000, "content_id": "dc76ab320bf744bd2e7e68e0fabf7c29de438960", "detected_licenses": [ "Apache-2.0" ], "directory_id": "c98f0c21bbc19784a513a1efededba0172bd8baa", "extension": "py"...
2.5625
stackv2
from flask import Flask,render_template import socket import string import uuid from datetime import datetime TIMERS = {} STASH = {} app = Flask(__name__) @app.route('/startNamedTimer/<name>') def start_timer_by_name(name): now = datetime.now() thisTime = now.strftime("%d/%m/%Y %H:%M:%S") TIMERS[name] = t...
73
23.34
76
12
483
python
[{"finding_id": "codeql_py/reflective-xss_d24e2aaee8cfa72b_07d94d3b", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 16, 55 ]
[ null, null ]
[ 12, 12 ]
[ 29, 35 ]
2024-11-18T21:57:34.054896+00:00
1,599,615,648,000
2ff5447bf29b965ef3cb4154e7e5aadd3bcd7a07
4
{ "blob_id": "2ff5447bf29b965ef3cb4154e7e5aadd3bcd7a07", "branch_name": "refs/heads/master", "committer_date": 1599615648000, "content_id": "3706e62bcb632da3399dd7e2fcedc0d5c4c8654c", "detected_licenses": [ "MIT" ], "directory_id": "e053e251d44a6d25297b807fbc64d0a0bfdc3eff", "extension": "py", "fi...
4.03125
stackv2
import requests from bs4 import BeautifulSoup from verify import verify_university, verify_year def write_file(information, university, year): """"""""""""""""""""""""""""""""""""""""""""""""""""""""" Writes information to a text file. Title contains the university's name and the year (both are ...
118
39.08
104
12
1,144
python
[{"finding_id": "codeql_py/request-without-cert-validation_3002e2dd01237407_607a1d81", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 39, 72 ]
[ null, null ]
[ 12, 12 ]
[ 87, 105 ]
2024-11-18T21:57:57.005799+00:00
1,623,418,213,000
545b9c954012424f0dae69a2cca1cb93d86756af
3
{ "blob_id": "545b9c954012424f0dae69a2cca1cb93d86756af", "branch_name": "refs/heads/master", "committer_date": 1623418213000, "content_id": "174ca53933ed1b15e5fc3b76eead4cd5f8c39b22", "detected_licenses": [ "Apache-2.0" ], "directory_id": "dbd3f562768ded628d5d8d7ee3e05a3e88970a8d", "extension": "py"...
3.046875
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- import sys import imp imp.reload(sys) sys.setdefaultencoding('utf8') import base64 # print None # i=None # print i is None # from addict import Dict # body = Dict() # body.query.filtered.query.match.description = 'addictive' # body.query.filtered.filter.term.created_by ...
126
18.62
64
12
969
python
[{"finding_id": "codeql_py/weak-crypto-key_c1a0950ed70ba8fe_e9717862", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",...
1
true
[ "CWE-326" ]
[ "py/weak-crypto-key" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable." ]
[ 34 ]
[ null ]
[ 21 ]
[ 38 ]
2024-11-18T21:58:01.513428+00:00
1,609,929,087,000
a4814f90461a3aa20c7cebd6514ce2d0a8bb9cfc
3
{ "blob_id": "a4814f90461a3aa20c7cebd6514ce2d0a8bb9cfc", "branch_name": "refs/heads/master", "committer_date": 1609929087000, "content_id": "fad2c809c3450050fbacdf6dcb37b5058bcf1726", "detected_licenses": [ "MIT" ], "directory_id": "f3646538e70fa52e55ebfcb85d9bf5e131cb158d", "extension": "py", "fi...
3.03125
stackv2
import base64 from Crypto.Cipher import AES def get_keystream(key, nonce): #https: // en.wikipedia.org / wiki / Block_cipher_mode_of_operation # Counter_(CTR) # we can use a block cipher to make a keystream # we will use library ECB (note that we xor our keystream with the message # so we don't have t...
23
45.61
114
16
342
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_7caa66aac696f231_73f75dfb", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
1
true
[ "CWE-327" ]
[ "py/weak-cryptographic-algorithm" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 11 ]
[ null ]
[ 20 ]
[ 106 ]
2024-11-18T21:58:35.449559+00:00
1,632,073,234,000
7e5e3a10f681080dc82afd3c3306e8cace253acb
2
{ "blob_id": "7e5e3a10f681080dc82afd3c3306e8cace253acb", "branch_name": "refs/heads/main", "committer_date": 1632073234000, "content_id": "b57c14210d3025b0a92ea658b1a302e7383877b6", "detected_licenses": [ "MIT" ], "directory_id": "b44c5bd2393e9ec049878a50284bf1da97f66f58", "extension": "py", "file...
2.328125
stackv2
this_file = "venv/bin/activate_this.py" exec(open(this_file).read(), {"__file__": this_file}) from flask import Flask, render_template, send_file application = Flask(__name__) # Config options - Make sure you created a 'config.py' file. # application.config.from_object('config') # To get one variable, tape app...
50
15.44
60
10
197
python
[{"finding_id": "codeql_py/path-injection_08857d3b5d72dcbd_ddf5ff81", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2).\nThis pa...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2).\nThis path depends on a [user-provided value](3)." ]
[ 26 ]
[ null ]
[ 22 ]
[ 30 ]
2024-11-18T21:58:46.859953+00:00
1,581,307,551,000
000d3273efae934946ccde0742760527200ca99e
3
{ "blob_id": "000d3273efae934946ccde0742760527200ca99e", "branch_name": "refs/heads/master", "committer_date": 1581307551000, "content_id": "c472b3e77af102f77f196409f05334478cd3114f", "detected_licenses": [ "MIT" ], "directory_id": "c54b3219943772e045f3073a8277323b4bd4b102", "extension": "py", "fi...
2.59375
stackv2
### Conda environment ### pip install pymongo ### pip install dnspython # import pymongo # connnection_uri = pymongo.MongoClient("mongodb+srv://user456:<password>@cluster0-k9md8.mongodb.net/test?retryWrites=true&w=majority") # print("URI:", connection_url) # client = pymongo.MongoClient(connection_uri) # print("CLI...
56
24.36
135
10
350
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f08e80903e7f4931_37e1446c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 30 ]
[ null ]
[ 15 ]
[ 29 ]
2024-11-18T23:11:02.049180+00:00
1,551,715,447,000
5ec62c5a01528d495262a31f2d3ef36daeca88ef
3
{ "blob_id": "5ec62c5a01528d495262a31f2d3ef36daeca88ef", "branch_name": "refs/heads/master", "committer_date": 1551715447000, "content_id": "1605117500756d40bf8be9ecb7e7a0b50a383d25", "detected_licenses": [ "MIT" ], "directory_id": "a638bcf3c21ad47120e9eb5d772873063c801612", "extension": "py", "fi...
2.78125
stackv2
''' Made By Sai Harsha Kottapalli Tested on python3 About : SSH Reverse Command for Windows Use with: server.py Note : roles of client and server are reversed (i.e.)server send command to client , for ssh server (Windows) ''' import sys import paramiko import subprocess import argparse from threading import ...
55
28.53
112
16
414
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_cec173ebbfa37eeb_a63a2dcd", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 21 ]
[ null ]
[ 2 ]
[ 62 ]
2024-11-18T22:05:55.186236+00:00
1,529,949,475,000
e23babedc3e8e10a3cfc88c1374935973594df8b
3
{ "blob_id": "e23babedc3e8e10a3cfc88c1374935973594df8b", "branch_name": "refs/heads/master", "committer_date": 1529949475000, "content_id": "59b76752c48e921a66da62099c21e1819154f8cc", "detected_licenses": [ "MIT" ], "directory_id": "da658aa89257459e712119d704615eb3b59dddac", "extension": "py", "fi...
2.546875
stackv2
import discord from discord.ext import commands from .utils.dataIO import dataIO, fileIO import os import asyncio import re import urllib.parse as urlparse import requests import json creditIcon = "https://i.imgur.com/TP8GXZb.png" credits = "Bot by GR8 | Titan" class friendlink: """friendlink!""" def __init_...
84
33.9
143
19
721
python
[{"finding_id": "codeql_py/overly-large-range_bd5db916ec327552_47950ab3", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 27 ]
[ null ]
[ 57 ]
[ 60 ]
2024-11-18T22:05:57.310977+00:00
1,440,772,866,000
f5a1bead35d7052c0b7f05ad75ad36f32eb495da
3
{ "blob_id": "f5a1bead35d7052c0b7f05ad75ad36f32eb495da", "branch_name": "refs/heads/master", "committer_date": 1440772866000, "content_id": "e5e017aae34e7f980e09724cf9fe07b0e5a82e0a", "detected_licenses": [ "MIT" ], "directory_id": "e555c8f71c3e587269a00166a9bb98c114446cce", "extension": "py", "fi...
2.578125
stackv2
"""Jinja2-Git Template Loader""" from subprocess import check_output, CalledProcessError import os import json from mimetypes import guess_type import jinja2 from flask import request, current_app, g def git_show(base,revid): """Git show the base/revid.""" if revid.startswith('@'): revid = revid[1:...
52
32.88
80
19
421
python
[{"finding_id": "codeql_py/command-line-injection_4621ef5219447287_ead22cfc", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {...
1
true
[ "CWE-078" ]
[ "py/command-line-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This command line depends on a [user-provided value](1)." ]
[ 18 ]
[ null ]
[ 30 ]
[ 63 ]
2024-11-18T22:35:54.146849+00:00
1,604,021,412,000
5e27a98646a5437724bac97d30d24205d997e479
4
{ "blob_id": "5e27a98646a5437724bac97d30d24205d997e479", "branch_name": "refs/heads/master", "committer_date": 1604021412000, "content_id": "04343f20d58bef5c22024525f92d1254050e33b0", "detected_licenses": [ "MIT" ], "directory_id": "47ce3e81bd3825cc02bdb7a94355509465a5d4a6", "extension": "py", "fi...
4.15625
stackv2
from random import randint """ Proceso: - Se fija un numero primo p largo (600 digitos o 2000 bits) - Se fija un entero g que esta entre {1, ...., p} - Alice elige aleatoriamente un numero a entre {1, ...., p-1} - Alice calcula A = g^a (mod p) y se lo envia a Bob - Bob calcula B = g^b (mod p) y se lo envia a Alice - *...
50
28.56
148
9
513
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_80be6479cc863abc_8f0ec691", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 48, 50 ]
[ null, null ]
[ 7, 7 ]
[ 49, 45 ]
2024-11-18T23:25:54.337962+00:00
1,623,746,839,000
ce429a5e940924a97d22174757ac2359e1e0a2eb
2
{ "blob_id": "ce429a5e940924a97d22174757ac2359e1e0a2eb", "branch_name": "refs/heads/main", "committer_date": 1623746839000, "content_id": "5cfd2cca9839bd5c44d32086e6e822c09b915aa2", "detected_licenses": [ "MIT" ], "directory_id": "92586a963688bd07d52be28ce530ba62dfc8268f", "extension": "py", "file...
2.40625
stackv2
import logging import time from flask import Flask, request from flask.logging import create_logger from prometheus_flask_exporter import PrometheusMetrics from . import __version__ app = Flask(__name__) # Logger Setup LOGGER = create_logger(app) LOGGER.setLevel(logging.INFO) # Metrics set-up metrics = PrometheusMe...
66
30.24
100
10
502
python
[{"finding_id": "codeql_py/reflective-xss_0cfedaed7f9ebae1_23ac7aad", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 31 ]
[ null ]
[ 12 ]
[ 54 ]
2024-11-18T22:27:36.631586+00:00
1,602,411,033,000
af5b826a03478bdc6b9adef8f9bc3d47581a0168
3
{ "blob_id": "af5b826a03478bdc6b9adef8f9bc3d47581a0168", "branch_name": "refs/heads/main", "committer_date": 1602411033000, "content_id": "4aba4e7c4a73b568ddae28009bb7c3a73417b8ba", "detected_licenses": [ "MIT" ], "directory_id": "6d6e8f4ccc15573dc5e908bc38c022e98f0d517f", "extension": "py", "file...
2.578125
stackv2
import datetime import re import os import requests from config.headers import * from config.cookies_config import cookie_list import json import threading from queue import Queue from threading import Lock page_infos = Queue(maxsize=65535) image_infos = Queue(maxsize=65535) THREAD_NUM = 32 save_picture_path = "D:\Scr...
119
30.95
148
16
961
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_71bd71e22e0ede91_167b5cd5", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'pximg.net/img-master/img/', so it m...
1
true
[ "CWE-020" ]
[ "py/incomplete-hostname-regexp" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'pximg.net/img-master/img/', so it might match more hosts than expected." ]
[ 61 ]
[ null ]
[ 44 ]
[ 123 ]
2024-11-18T22:39:32.457008+00:00
1,574,731,459,000
8912e3737aaca29d496a70f17a9ca347f36e9a3e
3
{ "blob_id": "8912e3737aaca29d496a70f17a9ca347f36e9a3e", "branch_name": "refs/heads/master", "committer_date": 1574731459000, "content_id": "bb4d6ccfc1b723ca9994f577ffc66e95ac58fb24", "detected_licenses": [ "MIT" ], "directory_id": "35e18508aa26a58a0940ab185dd366ebd7ae30d8", "extension": "py", "fi...
2.796875
stackv2
#!/usr/bin/python """format_symphony_user.py Text manipulation tool to take a properly formatted CSV containing user data and convert to SirsiDynix Symphony supported ASCII LDUSER format. To be used to create and update users with a load users report. Option to upload resulting text file to SFTP server with '--sftp/-...
269
33.01
113
18
2,153
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_b0f61962887867b6_f79c386b", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.\nThis expression stores [sensitive data (private)](3) as clear text.", "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive d...
[ 68, 73 ]
[ null, null ]
[ 20, 24 ]
[ 37, 56 ]
2024-11-18T22:15:02.946349+00:00
1,612,905,303,000
7ff0c5f9b63449fab1cc48258cfff9e03b76c94f
3
{ "blob_id": "7ff0c5f9b63449fab1cc48258cfff9e03b76c94f", "branch_name": "refs/heads/master", "committer_date": 1612905303000, "content_id": "3c66c6332f82b5832bb10f8d60efbebd702e186f", "detected_licenses": [ "MIT" ], "directory_id": "c74b746b86394754a69a9f4fe1c0d2a25120cd5f", "extension": "py", "fi...
3.484375
stackv2
import csv def parseCSV(file_name): myList = [] with open(file_name, 'r') as file_o_data: #csv_data = csv.reader(file_o_data)#gives an iterable for row in csv.reader(file_o_data): myList.append(row) print(myList) return myList processed_data = {'M':[], ...
153
34.46
161
21
1,267
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8594a9a01520f3cf_bd552696", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 129 ]
[ null ]
[ 11 ]
[ 93 ]
2024-11-18T23:32:13.744707+00:00
1,545,045,071,000
547c772a18c95f6dfba2ab3c2c734494aa678450
2
{ "blob_id": "547c772a18c95f6dfba2ab3c2c734494aa678450", "branch_name": "refs/heads/master", "committer_date": 1545045071000, "content_id": "88941c41132afafba7785e30edce52ab764406ad", "detected_licenses": [ "MIT" ], "directory_id": "8b35ad0fecd554dd00ca8c45ed081732547f8869", "extension": "py", "fi...
2.46875
stackv2
##### Huawei 4G Model reboot script using web API ##### Tested on model B310s-927 ##### See resource.txt for links and API details ##### Use your own username, password and IP (baseurl variable) !!! #!/usr/bin/env python from __future__ import unicode_literals import requests import re import hashlib import base64...
66
36.42
176
15
686
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_9a0a2aa29db9d3a7_49fa52c7", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e...
[ 47 ]
[ null ]
[ 18 ]
[ 38 ]
2024-11-18T22:43:31.915670+00:00
1,484,193,463,000
fa603eaca320567c5e027aa093565627f561f10f
3
{ "blob_id": "fa603eaca320567c5e027aa093565627f561f10f", "branch_name": "refs/heads/master", "committer_date": 1484193463000, "content_id": "bd039e8583dfe537759815ed3e3e9df1ac7b19e7", "detected_licenses": [ "MIT" ], "directory_id": "72c1b263db070ce507221b07ec2670536d3202df", "extension": "py", "fi...
2.515625
stackv2
#! /usr/bin/env python # ! coding=utf-8 # ! author kbdancer @92ez.com import threading import requests import sqlite3 import Queue import json import sys import re reload(sys) sys.setdefaultencoding('utf8') W = '\033[0m' # white (normal) R = '\033[31m' # red G = '\033[32m' # green def bThread(urllist): thr...
170
27.42
144
20
1,348
python
[{"finding_id": "codeql_py/request-without-cert-validation_2ffaa0b4724fb90d_1ac059d2", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 57, 88 ]
[ null, null ]
[ 15, 18 ]
[ 79, 82 ]
2024-11-18T23:18:13.792009+00:00
1,613,468,442,000
a717f12ac8517d0ce3b80cfec3f0cbc319f2a77d
3
{ "blob_id": "a717f12ac8517d0ce3b80cfec3f0cbc319f2a77d", "branch_name": "refs/heads/main", "committer_date": 1613468442000, "content_id": "09199bd8817637a92d14baa5a2c25025cc019343", "detected_licenses": [ "MIT" ], "directory_id": "81218ada21ab18f4757e14fd6492fa80ba2d2deb", "extension": "py", "file...
3.078125
stackv2
import re # res = ["i love hackerrank","hackerrank is an awesome place for programmers","hackerrank","i think hackerrank is a great place to hangout"] size = int(input()) for _ in range(size): st = input() # st = res[_] # st = "hackerrank" if re.search(r'^(hackerrank)(.*hackerrank)?$', st) : ...
21
22.71
140
11
154
python
[{"finding_id": "codeql_py/redos_400fa792fa1be7c9_e364127f", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of ' '.", "remediati...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of ' '." ]
[ 15 ]
[ null ]
[ 22 ]
[ 29 ]
2024-11-18T23:18:14.107387+00:00
1,571,142,221,000
db302bb9dc5313f47e4bfe67e159e713b3bddd96
3
{ "blob_id": "db302bb9dc5313f47e4bfe67e159e713b3bddd96", "branch_name": "refs/heads/master", "committer_date": 1571142221000, "content_id": "e5d4306971d4bb8acdc7686a9996dda9e68c1b0b", "detected_licenses": [ "MIT" ], "directory_id": "93dd2dea86b0efb05ae60d2c8fae9a221f4d1de8", "extension": "py", "fi...
3.109375
stackv2
import random import re import uuid # a regular expression for validating an Email regex = '^\w+([\.-]?\w+)*@\w+([\.-]?\w+)*(\.\w{2,3})+$' class UtilityFunctions: @staticmethod def is_email_valid(email): if re.search(regex, email): return True else: return False ...
28
20.25
55
12
145
python
[{"finding_id": "codeql_py/redos_3749eb3d1c443cd0_ac452259", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'a' and containing many repetition...
2
true
[ "CWE-1333", "CWE-1333" ]
[ "py/redos", "py/redos" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with 'a' and containing many repetitions of 'a'.", "This part of the regular expression may cause exponential backtracking on strings starting with 'a@a' and containing many repetitions of 'a'." ]
[ 6, 6 ]
[ null, null ]
[ 21, 37 ]
[ 24, 40 ]
2024-11-18T23:18:23.532665+00:00
1,591,296,913,000
126e9d0c87065a5aec896032ae616f381e01745a
3
{ "blob_id": "126e9d0c87065a5aec896032ae616f381e01745a", "branch_name": "refs/heads/master", "committer_date": 1591296913000, "content_id": "29758937dc2e05461496a68376cd1463989b19b9", "detected_licenses": [ "MIT" ], "directory_id": "e03a152da29009949e9babecb10c6f214702f672", "extension": "py", "fi...
2.609375
stackv2
import rest_methods import json ## NOTES TO AARON & NEIL ## ### 11/1/17 - Setup script to handle pagination from AMP ### 11/1/17 - Modify scripts to use the stream API for events in AMP # ******* SETUP SECTION *********** ##Import variables to get configuration config = json.loads(open("parameters.json").read()...
211
41.26
152
16
2,305
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_e870e29f565aa438_eaa6d53f", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
4
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.", "This expression stores [sensitive data (password)](1) as clear text.", "This expression stores [sensitive data (password)](1) as clear text.", "This expression stores [sensitive data (password)](1) as clear text." ]
[ 67, 155, 42, 89 ]
[ null, null, null, null ]
[ 12, 12, 12, 12 ]
[ 60, 60, 60, 60 ]
2024-11-19T00:07:08.215078+00:00
1,623,672,152,000
f14d0948aef146b96556620b227665f1ae17903d
3
{ "blob_id": "f14d0948aef146b96556620b227665f1ae17903d", "branch_name": "refs/heads/main", "committer_date": 1623672152000, "content_id": "e553df7c1555b0038789146d903813c6db08682d", "detected_licenses": [ "MIT" ], "directory_id": "f5ef41bfbeecbd5b7a4e1c26de6e8c0bc3e66403", "extension": "py", "file...
2.828125
stackv2
import os import pandas as pd import geopandas as gpd import itertools from shapely.geometry import Point, Polygon, MultiPolygon, box import numpy as np from sklearn.neighbors import BallTree import requests import boto3 import botocore from datetime import datetime class SpatialIndex: def __init__(self, fname=N...
236
38.86
81
19
2,193
python
[{"finding_id": "codeql_py/request-without-cert-validation_b4328fcafb4f3b68_d445b777", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 176 ]
[ null ]
[ 16 ]
[ 67 ]
2024-11-19T00:07:31.365697+00:00
1,519,995,073,000
0c5f07760c9433ab342b9c1c9b8ba93c7cd7422d
2
{ "blob_id": "0c5f07760c9433ab342b9c1c9b8ba93c7cd7422d", "branch_name": "refs/heads/master", "committer_date": 1519995073000, "content_id": "677f2a311aa245e2f16f4d76d328f198be6eeaeb", "detected_licenses": [ "MIT" ], "directory_id": "441bad916a7f2059feaf38b36d8d78a868dc2fb3", "extension": "py", "fi...
2.359375
stackv2
import base64 from Crypto.Cipher import DES3 import hashlib from pyrave.base import BaseRaveAPI class RaveEncryption(BaseRaveAPI): """ Base Encryption Class Encrypts User Details and returns pubkey, client and algo """ def __init__(self): super(RaveEncryption, self).__init__() def enc...
72
37.93
141
15
646
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_145c5268c2399306_530ced8e", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.\n[The cryptograph...
1
true
[ "CWE-327" ]
[ "py/weak-cryptographic-algorithm" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.\n[The cryptographic algorithm DES3](2) is broken or weak, and should not be used." ]
[ 66 ]
[ null ]
[ 33 ]
[ 59 ]
2024-11-19T00:34:33.730185+00:00
1,403,561,095,000
a8d1d1fecb71d4804051f780171a9a699851bb2c
3
{ "blob_id": "a8d1d1fecb71d4804051f780171a9a699851bb2c", "branch_name": "refs/heads/master", "committer_date": 1403561095000, "content_id": "f9d261fa7820e970f7e231b3dead0eab0ee482a7", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "96833e806ad9df91c5b4c9dbabd9ca659ff76da2", "extension": "p...
2.609375
stackv2
#!/usr/bin/python import cgi, os import cgitb; cgitb.enable() #import msvcrt #msvcrt.setmode (0, os.O_BINARY) #stdin = 0 #msvcrt.setmode (1, os.O_BINARY) #stdout = 1 form = cgi.FieldStorage() def fbuffer(f, chunk_size=10000): while True: chunk = f.read(chunk_size) if not chunk: brea...
53
22.96
91
12
353
python
[{"finding_id": "codeql_py/path-injection_cd08fa92950cad6d_a30ca8f1", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 30 ]
[ null ]
[ 13 ]
[ 20 ]
2024-11-19T00:45:04.681523+00:00
1,578,089,073,000
4dd34ef09032f4dcaa1006cfa5a13b5aeafa2827
2
{ "blob_id": "4dd34ef09032f4dcaa1006cfa5a13b5aeafa2827", "branch_name": "refs/heads/master", "committer_date": 1578089073000, "content_id": "47c03758f79a0436a275ace517552c1399f977e4", "detected_licenses": [ "MIT" ], "directory_id": "d44fc964585cea065bd29186df0e3bf4743c9180", "extension": "py", "fi...
2.3125
stackv2
from rest_framework import status, permissions from rest_framework.response import Response from rest_framework.views import APIView from authentication.serializers import UserChangePasswordSerializer import utils import logging logger = logging.getLogger('authentication') class ChangePassword(APIView): http_me...
46
34.78
129
17
315
python
[{"finding_id": "codeql_py/log-injection_c475d482b445aaf0_577bc7d8", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
2
true
[ "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 33, 41 ]
[ null, null ]
[ 29, 25 ]
[ 129, 120 ]
2024-11-18T23:28:37.090769+00:00
1,578,993,876,000
98b549da077361477e1af0e82e5c45ac7b60f086
3
{ "blob_id": "98b549da077361477e1af0e82e5c45ac7b60f086", "branch_name": "refs/heads/master", "committer_date": 1578993876000, "content_id": "d6b00c55ffe4f538c41a531170f038a5ceb73f5a", "detected_licenses": [ "MIT" ], "directory_id": "5957f746da591dbb4e9adb3d29a7d957b5078faa", "extension": "py", "fi...
2.90625
stackv2
import matplotlib import matplotlib.pyplot as plt import json import jinja2 import os def _get_node_names(df): ''' :param df: pandas DataFrame, each column represents a state :return: dictionary of (column name, column unique value list) which means (state name, unique values in t...
227
35.48
102
21
1,857
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_b315e317aee504d9_697e6ee7", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 207 ]
[ null ]
[ 16 ]
[ 37 ]
2024-11-19T00:31:56.352380+00:00
1,615,502,103,000
252686f384e7835c9d998e21e72c3d1d5b74c8b3
4
{ "blob_id": "252686f384e7835c9d998e21e72c3d1d5b74c8b3", "branch_name": "refs/heads/main", "committer_date": 1615502103000, "content_id": "b98bf3a7979967b5c46233d958b1eef878a84306", "detected_licenses": [ "Unlicense" ], "directory_id": "45dbeb0ac279b80606530f6a74eab0f7ab982c79", "extension": "py", ...
3.78125
stackv2
import time import pandas as pd import numpy as np CITY_DATA = { 'chicago': 'chicago.csv', 'new york city': 'new_york_city.csv', 'washington': 'washington.csv' } def get_filters(): """ Asks user to specify a city, month, and day to analyze. Returns: (str) city - name o...
315
27.07
120
18
2,311
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8dcf6c559d6c4977_964ac932", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 245 ]
[ null ]
[ 12 ]
[ 25 ]
2024-11-19T01:11:19.637726+00:00
1,603,456,715,000
d46d902e449453b1fd0e0077c0925ed856471f4d
2
{ "blob_id": "d46d902e449453b1fd0e0077c0925ed856471f4d", "branch_name": "refs/heads/master", "committer_date": 1603456715000, "content_id": "01504f5b8692fb35d310b75de4402065ec637cab", "detected_licenses": [ "Apache-2.0" ], "directory_id": "ab1dfc351cfb3928674f8ed9d938f1b131f74838", "extension": "py"...
2.5
stackv2
''' @Author: hua @Date: 2019-02-10 09:55:10 @description: 工具类,封装一些通用方法 @LastEditors : hua @LastEditTime : 2020-01-21 15:37:52 ''' from app import CONST from Cryptodome.PublicKey import RSA from Cryptodome.Cipher import PKCS1_v1_5 from app.env import ALLOWED_EXTENSIONS from app.Lang.zh_CN.validation import validation...
240
28.36
127
18
1,777
python
[{"finding_id": "codeql_py/weak-crypto-key_9031c9d938d1cf46_ebecfd95", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",...
1
true
[ "CWE-326" ]
[ "py/weak-crypto-key" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable." ]
[ 188 ]
[ null ]
[ 15 ]
[ 33 ]