added
stringlengths
32
32
created
int64
1,244B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.25
source
stringclasses
1 value
text
stringlengths
324
20.1k
num_lines
int64
16
598
avg_line_length
float64
15.1
58.3
max_line_length
int64
33
179
ast_depth
int64
8
39
length
int64
101
3.8k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.1k
265k
sast_codeql_findings_count
int64
1
45
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
45
rule_ids
listlengths
1
45
confidences
listlengths
1
45
severities
listlengths
1
45
messages
listlengths
1
45
line_starts
listlengths
1
45
line_ends
listlengths
1
45
column_starts
listlengths
1
45
column_ends
listlengths
1
45
2024-11-19T02:31:56.924527+00:00
1,599,808,740,000
8a41c3ce2ee605653c6dd5ef8b29a981103422ef
3
{ "blob_id": "8a41c3ce2ee605653c6dd5ef8b29a981103422ef", "branch_name": "refs/heads/master", "committer_date": 1599808740000, "content_id": "1296452eba8cf5beae925604bd3955ec686b8bf1", "detected_licenses": [ "MIT" ], "directory_id": "4da68b54a6f21d551e2cab5110b2bd3cb33f1308", "extension": "py", "fi...
2.984375
stackv2
# -*- coding: utf-8 -*- """ Created on Wed Jun 10 12:04:34 2020 @author: 35732 """ # 下载纯文本和xml import requests import xlrd import xlwt class Article_archive_doi: def __init__(self, header, filename, url_publisher, APIKey, arformat, path, text_outpath): self.filename = filename self.url_publisher ...
55
29.98
102
17
458
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_7c0c87f922670e7c_ba7397dd", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 25 ]
[ null ]
[ 17 ]
[ 23 ]
2024-11-19T02:31:58.350498+00:00
1,588,386,424,000
848ceb438fe5d70220dfc595191fba6bf465c074
2
{ "blob_id": "848ceb438fe5d70220dfc595191fba6bf465c074", "branch_name": "refs/heads/master", "committer_date": 1588386424000, "content_id": "aa55f9e4c45740d52aa4b6aa45d3242baca753b3", "detected_licenses": [ "MIT" ], "directory_id": "1687a3b1a3a4c8068c4befdfd436c16bc9a10b2d", "extension": "py", "fi...
2.421875
stackv2
import hashlib import os.path from tcd.settings import UPLOAD_DIR, MEDIA_URL def get_user_path(username): m = hashlib.md5() m.update(username) section = m.hexdigest()[:4] return os.path.join(UPLOAD_DIR, section, username) def get_upload_url(username): m = hashlib.md5() m.update(username) ...
16
24.62
61
9
106
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_62a3e19691b8667a_bf0a5476", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.",...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.", "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 8, 14 ]
[ null, null ]
[ 14, 14 ]
[ 22, 22 ]
2024-11-19T02:32:12.900130+00:00
1,525,887,992,000
89b9748f91f4cfa21f7a904b787ddb1202f473b2
3
{ "blob_id": "89b9748f91f4cfa21f7a904b787ddb1202f473b2", "branch_name": "refs/heads/master", "committer_date": 1525887992000, "content_id": "81397cfd243fd5a641ee9f0ccb5065f88fe888d7", "detected_licenses": [ "MIT" ], "directory_id": "1000a3645234c5e2d16faa2c9ae310b0b567987b", "extension": "py", "fi...
3.453125
stackv2
from Scheduling.Shift import Shift from Scheduling.HourMinute import HourMinute class Day: def __init__(self, *shifts): self.__shifts = None shifts = list(shifts) self.shifts = shifts def __repr__(self): return str(self.shifts) def employeelist(self): employeeli...
56
26.04
65
13
429
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6b88171f7676ec35_e884c945", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 56 ]
[ null ]
[ 11 ]
[ 30 ]
2024-11-19T02:32:14.777738+00:00
1,626,468,795,000
e20a5d137e8ce67d94d917747252965e199cffef
2
{ "blob_id": "e20a5d137e8ce67d94d917747252965e199cffef", "branch_name": "refs/heads/main", "committer_date": 1626468795000, "content_id": "0683341c2e17f57c5b155a1c249b449011f09c01", "detected_licenses": [ "MIT" ], "directory_id": "87b6facfa44bc391fbf834ee934c10ed1f5e1845", "extension": "py", "file...
2.359375
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- # Imports import signal import argparse import logging import socket import re import time from influxdb_client import InfluxDBClient, Point from influxdb_client.client.write_api import SYNCHRONOUS from influxdb_client.rest import ApiException # Logging logging.basicCo...
409
27.04
103
20
2,873
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1be2735ccd85c2b7_5fae0b6a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 238 ]
[ null ]
[ 19 ]
[ 60 ]
2024-11-19T02:32:46.840987+00:00
1,683,404,001,000
7366ada270babdea2801a360b80d5c81c0f10d07
2
{ "blob_id": "7366ada270babdea2801a360b80d5c81c0f10d07", "branch_name": "refs/heads/master", "committer_date": 1683404001000, "content_id": "721dc2aab3728240c7209fa90f495cade9d00297", "detected_licenses": [ "Apache-2.0" ], "directory_id": "c2f46e06c033d612d7d52804ccbc69499f18670e", "extension": "py"...
2.4375
stackv2
import requests import certifi import json from lxml import html from rdflib.namespace import Namespace, NamespaceManager from rdflib import Graph, BNode, RDF, RDFS, URIRef, Literal, XSD import hashlib import os.path import pickle from SPARQLWrapper import SPARQLWrapper, JSON import csv import coloredlogs, logging from...
388
32.02
125
18
3,287
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_a9b76821457dcdaf_d3096095", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [wikipedia.org](1) may be at an arbitrary position in t...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [wikipedia.org](1) may be at an arbitrary position in the sanitized URL." ]
[ 79 ]
[ null ]
[ 12 ]
[ 35 ]
2024-11-19T02:43:25.160308+00:00
1,626,009,953,000
ebd80b76ef7d7438d33d6055c2c5dcc9e767e5df
3
{ "blob_id": "ebd80b76ef7d7438d33d6055c2c5dcc9e767e5df", "branch_name": "refs/heads/main", "committer_date": 1626009953000, "content_id": "40cf44f10f8fd67dd37ee9af4587cc025183c69b", "detected_licenses": [ "MIT" ], "directory_id": "8eeb9b0098a47a49df2283c931e93fba782b0834", "extension": "py", "file...
2.703125
stackv2
from flask_login import UserMixin from time import time from Crypto.Cipher import AES from Crypto.Util.number import long_to_bytes, bytes_to_long from Padding import appendPadding, removePadding from app import db import base64 class Credential(db.Model): id = db.Column(db.Integer, primary_key=True) service =...
31
33.06
64
13
248
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_a9d527154751cd8c_2a82f94f", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 26, 30 ]
[ null, null ]
[ 33, 17 ]
[ 52, 65 ]
2024-11-19T02:43:25.989665+00:00
1,574,230,052,000
ac46d07bd7adc3127b42925759a633b927de6091
3
{ "blob_id": "ac46d07bd7adc3127b42925759a633b927de6091", "branch_name": "refs/heads/master", "committer_date": 1574230052000, "content_id": "dd5eccffe83ec83c21c409f72adbc2e8e15b71cc", "detected_licenses": [ "MIT" ], "directory_id": "56c3dd1d1a46cab82469d698a3546a2075928b3f", "extension": "py", "fi...
2.84375
stackv2
import urllib.request,json from .models import Article, Source,News api_key = None source_url = None everything_url = None search_url = None headlines_url = None def configure_request(app): global api_key,headlines_url,everything_url,source_url api_key = app.config['API_KEY'] source_url = app.config['EV...
129
31.1
93
12
841
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_260e678730daaecc_b589cc0d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 69 ]
[ null ]
[ 11 ]
[ 26 ]
2024-11-19T02:43:27.797157+00:00
1,684,287,966,000
2da6f969d959ed7ff18b7f3ad0026733c7971b8f
3
{ "blob_id": "2da6f969d959ed7ff18b7f3ad0026733c7971b8f", "branch_name": "refs/heads/master", "committer_date": 1684287966000, "content_id": "a2300fd80f06411c1af54078d4b963e15a9f275a", "detected_licenses": [ "MIT" ], "directory_id": "be4a287e48ef2c58d0036788128de837a0d99bf3", "extension": "py", "fi...
2.96875
stackv2
""" list_vm_v3_large.py - list all VMs in a cluster this code sample is designed for compatibility with clusters hosting a large number of VMs 'large', in this context, is more than 500 VMs, although the definition of large will vary from location to location """ from dataclasses import dataclass import requests impor...
346
33.56
86
19
2,469
python
[{"finding_id": "codeql_py/request-without-cert-validation_df19bb7e4629dc51_aa37a96f", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 101 ]
[ 107 ]
[ 27 ]
[ 14 ]
2024-11-19T02:54:55.465087+00:00
1,545,928,179,000
6ce58f61e7d2b35540c79cfb00920e1dca7b1438
3
{ "blob_id": "6ce58f61e7d2b35540c79cfb00920e1dca7b1438", "branch_name": "refs/heads/master", "committer_date": 1545928212000, "content_id": "b792f257eee0309339b628071f7e95fe8cdd7842", "detected_licenses": [ "MIT" ], "directory_id": "995421463ffae04b9a72d1e74dd32e8bbc7546f1", "extension": "py", "fi...
2.75
stackv2
import json import os import logging from random import choice import boto3 from botocore.exceptions import ClientError from postgresql import Postgresql from mysql import Mysql logger = logging.getLogger() logger.setLevel(logging.INFO) def log_error_with_event(err_msg, event, info=False): """Log the error mess...
117
29.58
88
15
775
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_cb94d53f9068057f_88fa6899", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 18, 20 ]
[ null, null ]
[ 40, 41 ]
[ 45, 46 ]
2024-11-19T02:55:02.718813+00:00
1,606,494,100,000
e92b96009e8f65dddad47a915fc229d855f0ac39
2
{ "blob_id": "e92b96009e8f65dddad47a915fc229d855f0ac39", "branch_name": "refs/heads/master", "committer_date": 1606494100000, "content_id": "0c2a210363c9d704b5a9f7c9d38194921b3fce25", "detected_licenses": [ "MIT" ], "directory_id": "a6cbba37783e6f492bf15e9282d7d35571d97fa6", "extension": "py", "fi...
2.421875
stackv2
import requests import urllib3 from .sepal_exception import SepalException urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning) class SepalApi: def __init__(self, host, username, password): self.host = host self.username = username self.password = password def _get(sel...
27
30.44
103
13
183
python
[{"finding_id": "codeql_py/request-without-cert-validation_6dc0898e1631b811_c425d177", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 15 ]
[ 21 ]
[ 16 ]
[ 10 ]
2024-11-19T02:55:03.607295+00:00
1,618,767,872,000
c00cd38a308682f2bcfc654954d92869878092ca
2
{ "blob_id": "c00cd38a308682f2bcfc654954d92869878092ca", "branch_name": "refs/heads/master", "committer_date": 1618767872000, "content_id": "91009f6f3d916aa21992eec9f68fd804e8b8b41c", "detected_licenses": [ "MIT" ], "directory_id": "3e5dadd470412004f3917014dd832faf9d8d53ce", "extension": "py", "fi...
2.375
stackv2
from flask import Blueprint, request, session, redirect, flash from .. import mysql, limiter from ..utils.forms import AddPostForm from ..utils.functions import getActualTime from pathlib import Path import os add_post_blueprint = Blueprint('add_post_blueprint', __name__) ALLOWED_EXTENSIONS = {'png', 'jpg', 'jpeg', '...
67
40.88
112
18
635
python
[{"finding_id": "codeql_py/url-redirection_648b33dcbf32d956_6cd16aae", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 67 ]
[ null ]
[ 21 ]
[ 37 ]
2024-11-19T02:55:20.725227+00:00
1,689,950,508,000
ee3bf328e487df669ffc5e18c793e71cdc8c8e0d
3
{ "blob_id": "ee3bf328e487df669ffc5e18c793e71cdc8c8e0d", "branch_name": "refs/heads/master", "committer_date": 1689950508000, "content_id": "8466d3d89b5d23362a37c07070ab6325bc283e8a", "detected_licenses": [ "Apache-2.0" ], "directory_id": "ac7853e1d932cb5af3e393b255971c245d284637", "extension": "py"...
2.578125
stackv2
#!/usr/bin/env python import errno import os import platform import subprocess import sys import traceback from fcntl import flock, LOCK_EX, LOCK_NB from optparse import OptionParser from os import O_RDWR, O_CREAT, O_WRONLY, O_APPEND from os.path import abspath, basename, dirname, exists, realpath from os.path import...
466
30.35
132
18
3,459
python
[{"finding_id": "codeql_py/overly-permissive-file_33f47c6b826b0e28_62da5962", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in open sets file to world readable.", "remediation": "", "location": {...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in open sets file to world readable." ]
[ 140 ]
[ null ]
[ 12 ]
[ 60 ]
2024-11-19T02:55:21.711911+00:00
1,560,071,873,000
55049b405bb41643f01d8a5c51658484587fe06e
3
{ "blob_id": "55049b405bb41643f01d8a5c51658484587fe06e", "branch_name": "refs/heads/master", "committer_date": 1560071873000, "content_id": "2a192f27bb8e9d55871917059092912ab499a424", "detected_licenses": [ "MIT" ], "directory_id": "cbdc5c28fc485e735f96d6695cd7908781373f39", "extension": "py", "fi...
2.609375
stackv2
from flask import Flask from flask import jsonify from flask import render_template from flask import request from flask import Response import csv import json import math import pandas as pd import collections import numpy as np from IPython import embed app = Flask(__name__) start_path = './data/start.csv' end_path...
138
29.89
125
21
1,116
python
[{"finding_id": "codeql_py/flask-debug_730829e5ea6691ce_2bfa6ae5", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-022", "CWE-022" ]
[ "py/flask-debug", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 138, 106, 124 ]
[ null, null, null ]
[ 5, 15, 15 ]
[ 24, 24, 24 ]
2024-11-19T02:55:28.455903+00:00
1,621,446,117,000
f38254e8c003f4ba6d061282d0b107bd7ff523d1
3
{ "blob_id": "f38254e8c003f4ba6d061282d0b107bd7ff523d1", "branch_name": "refs/heads/main", "committer_date": 1621446117000, "content_id": "84780873eb56a2606d4efbc354a8be70d8376eab", "detected_licenses": [ "MIT" ], "directory_id": "9b5ce33b1e902fc617dafb6258ae0d7f44931743", "extension": "py", "file...
2.515625
stackv2
from flask import Flask, jsonify, request import time import urllib.request from urllib.request import Request, urlopen import re import nltk from nltk.stem import PorterStemmer ps = PorterStemmer() from nltk.tokenize import word_tokenize from nltk.stem import WordNetLemmatizer from nltk.corpus import wordnet from nltk...
267
27.21
160
21
1,767
python
[{"finding_id": "codeql_py/full-ssrf_dec4e215ec266a8b_a3286ddc", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
1
true
[ "CWE-918" ]
[ "py/full-ssrf" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1)." ]
[ 98 ]
[ null ]
[ 15 ]
[ 66 ]
2024-11-19T02:55:39.057599+00:00
1,591,868,770,000
61745f6193064ed445638078b9181d867cbd44bb
3
{ "blob_id": "61745f6193064ed445638078b9181d867cbd44bb", "branch_name": "refs/heads/master", "committer_date": 1591872930000, "content_id": "6dd408675651a95d48e0ea16797fe717bb9fe680", "detected_licenses": [ "Unlicense" ], "directory_id": "bdc4ad850efe4fef51bb5004db54ab8a9c90dfdd", "extension": "py",...
2.96875
stackv2
#!/usr/bin/env python3 import os from http.server import HTTPServer, BaseHTTPRequestHandler class StaticServer(BaseHTTPRequestHandler): def do_GET(self): root = os.path.dirname(os.path.abspath(__file__)) filename = os.path.join(root, 'example.html' if self.path == '/' else self.path[1:]) _, ext = os.pa...
49
23.51
88
14
302
python
[{"finding_id": "codeql_py/path-injection_54bb9ff0a4797fc7_428fe2c0", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 17, 25 ]
[ null, null ]
[ 28, 15 ]
[ 36, 23 ]
2024-11-19T02:55:50.593443+00:00
1,686,900,670,000
c5a71132e952bc5001d7978888d4e3ca086d807a
4
{ "blob_id": "c5a71132e952bc5001d7978888d4e3ca086d807a", "branch_name": "refs/heads/main", "committer_date": 1686900670000, "content_id": "d77cbbfaf6434c363de8d7d3197a85bdb0ee7a40", "detected_licenses": [ "MIT" ], "directory_id": "bef8f684c9668b3fe8dc430c4ed9d7c625faec13", "extension": "py", "file...
4
stackv2
# Classes and Objects - Basics print ("Basic Class") class MyClass: pass obj = MyClass() # creating a MyClass object print (obj) print ("\nEmployee Class") class Employee: Id = None salary = None department = None # compile errors without None Steve = Employee() print ("\nProperty outside the Class ...
203
26.3
123
14
1,584
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_202f6a6a0385a4c0_8bf82673", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
5
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.", "This expression logs [sensitive data (p...
[ 21, 37, 43, 120, 123 ]
[ null, null, null, null, null ]
[ 8, 8, 8, 24, 32 ]
[ 44, 44, 42, 38, 50 ]
2024-11-19T02:55:55.819397+00:00
1,618,906,807,000
3811388da501cde67bbf177200b61defa4e4d558
3
{ "blob_id": "3811388da501cde67bbf177200b61defa4e4d558", "branch_name": "refs/heads/master", "committer_date": 1618906807000, "content_id": "1e24e46cd9a066f830963ca438baa3080690cb2f", "detected_licenses": [ "MIT" ], "directory_id": "4cbde4e9bbe01006057043a5ff171b59518c01cb", "extension": "py", "fi...
2.5625
stackv2
import urllib2 import os import tarfile import shutil import glob # Constant dataset_dir = './TransportationData' datasetBalanced = dataset_dir + '/datasetBalanced' rawOriginaldata = dataset_dir + '/_RawDataOriginal' url_list = ['http://cs.unibo.it/projects/us-tm2017/static/dataset/extension/5second/dataset_5secondWin...
53
36.11
117
14
489
python
[{"finding_id": "codeql_py/tarslip_16451f8d6aa44a8b_1acf3b3a", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially untrusted source](1)." ]
[ 46 ]
[ null ]
[ 10 ]
[ 13 ]
2024-11-19T02:55:56.407293+00:00
1,517,852,046,000
638b8601defc5ed5de5aac1e042af7e5a414d7f5
3
{ "blob_id": "638b8601defc5ed5de5aac1e042af7e5a414d7f5", "branch_name": "refs/heads/master", "committer_date": 1517852046000, "content_id": "7760eed29ea571c24a2963f63a372f726dfad5bc", "detected_licenses": [ "Apache-2.0" ], "directory_id": "86a3601cd358dce92a6eaf6a9241e215c19d6669", "extension": "py"...
2.515625
stackv2
# -*- coding:utf-8 -*- from __future__ import print_function import os import paramiko import xml.etree.ElementTree as ET from Crypto.PublicKey import RSA from Crypto.Cipher import PKCS1_OAEP from Crypto import Random from server import config, db_client import smtplib def load_clients(path): """ Load clients...
265
26.59
99
15
1,761
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_f0d70bf9e7c3dc0d_cb083200", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to WarningPolicy may be unsafe.", "r...
2
true
[ "CWE-295", "CWE-326" ]
[ "py/paramiko-missing-host-key-validation", "py/weak-crypto-key" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Setting missing host key policy to WarningPolicy may be unsafe.", "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable." ]
[ 55, 102 ]
[ null, null ]
[ 9, 11 ]
[ 69, 47 ]
2024-11-19T03:10:51.536030+00:00
1,524,225,399,000
bfdd0324a787178e97e24485e69fba317d6198ab
2
{ "blob_id": "bfdd0324a787178e97e24485e69fba317d6198ab", "branch_name": "refs/heads/master", "committer_date": 1524225399000, "content_id": "de38301bd250c3204243169bc80b58000d2e64d9", "detected_licenses": [ "MIT" ], "directory_id": "5d0a0911f03631fb4e5040efcdd1d1dff8ba463d", "extension": "py", "fi...
2.421875
stackv2
#!/usr/bin/python3 # -*- coding: UTF-8 -*- """ @version: ?? @author: xiaoming @license: MIT Licence @contact: xiaominghe2014@gmail.com @site: @software: PyCharm @file: get_cartoons.py @time: 2018/4/18 下午5:19 """ import os import re import json import requests import base64 import multiprocessing import threading s...
166
31.72
106
19
1,306
python
[{"finding_id": "codeql_py/request-without-cert-validation_768cdfbd7487dbe7_d6196f24", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 84 ]
[ null ]
[ 16 ]
[ 76 ]
2024-11-19T03:21:54.417788+00:00
1,617,699,625,000
84213d1fae8507fe3c955475a3b9e46d7d954c02
3
{ "blob_id": "84213d1fae8507fe3c955475a3b9e46d7d954c02", "branch_name": "refs/heads/main", "committer_date": 1617699625000, "content_id": "53d2a1a1b84330b425ed9259f14c31d6cb6215c9", "detected_licenses": [ "MIT" ], "directory_id": "2c06ff0d4f64d1b7691d4bc7e1891506eff43ecd", "extension": "py", "file...
2.921875
stackv2
from flask_restful import Resource, Api from flask import Flask, jsonify from bs4 import BeautifulSoup from boardgamegeek import BGGClient import requests import time app = Flask(__name__) api = Api(app) class DDGames(Resource): def get(self, page="1"): """Inizializza e lancia lo scraping della lista de...
107
30.13
105
18
812
python
[{"finding_id": "codeql_py/flask-debug_b92fc0068141d902_951b85f4", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-918" ]
[ "py/flask-debug", "py/partial-ssrf" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 107, 23 ]
[ null, null ]
[ 5, 20 ]
[ 24, 37 ]
2024-11-19T03:43:54.969382+00:00
1,517,283,521,000
48b9d95cad322f1368ce685f787a004a40a6eebd
2
{ "blob_id": "48b9d95cad322f1368ce685f787a004a40a6eebd", "branch_name": "refs/heads/master", "committer_date": 1517283521000, "content_id": "f785b857499b13e080856ae35bce4f6d490a3030", "detected_licenses": [ "Apache-2.0" ], "directory_id": "bc22466e7caad11d6daa916555cfd1549c7af1da", "extension": "py"...
2.3125
stackv2
#!/usr/bin/env python # -*- encoding: utf-8 -*- # # Common functions # import time import urlparse import re import os import requests import difflib def print_msg(msg): print '[%s] %s' % (time.strftime('%H:%M:%S', time.localtime()), msg) def parse_url(url): _ = urlparse.urlparse(url, 'http') if not _...
201
25.21
133
15
1,480
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_e6af28a921785c7f_0af4c89c", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [asp.net](1) may be at an arbitrary position in the san...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [asp.net](1) may be at an arbitrary position in the sanitized URL." ]
[ 137 ]
[ null ]
[ 8 ]
[ 32 ]
2024-11-19T03:44:07.065322+00:00
1,623,043,074,000
d332e08fa183734d7841149503d15e50543760d9
3
{ "blob_id": "d332e08fa183734d7841149503d15e50543760d9", "branch_name": "refs/heads/master", "committer_date": 1623043074000, "content_id": "b94302ca5181d94d729be9c2305647cbea931bc7", "detected_licenses": [ "MIT" ], "directory_id": "0aafc32985f775478449724519cbd24b736053b8", "extension": "py", "fi...
2.65625
stackv2
import os os.environ['TF_CPP_MIN_LOG_LEVEL'] = '2' import io import tensorflow as tf from tensorflow import keras from tensorflow.keras.preprocessing.image import ImageDataGenerator, load_img, img_to_array import matplotlib.pyplot as plt import numpy as np from PIL import Image from flask import Flask, request, jsoni...
60
24.48
91
17
361
python
[{"finding_id": "codeql_py/stack-trace-exposure_19f718bb15b75733_6575eed5", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-215" ]
[ "py/stack-trace-exposure", "py/flask-debug" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger." ]
[ 54, 60 ]
[ null, null ]
[ 28, 5 ]
[ 45, 24 ]
2024-11-19T03:44:25.643590+00:00
1,552,351,232,000
f46afcb6fb103bf91057304f1d2411975f68970f
3
{ "blob_id": "f46afcb6fb103bf91057304f1d2411975f68970f", "branch_name": "refs/heads/master", "committer_date": 1552351232000, "content_id": "b6f0b3d8c1fa636b1e6eab58ee63b62286ede15b", "detected_licenses": [ "MIT" ], "directory_id": "87eba503bdac86fb5394117f6d92f78ef29ddaff", "extension": "py", "fi...
2.71875
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- """ Created on Sun Feb 12 20:11:05 2017 @author: clesiemo3 """ import os import pygsheets def ya_schedule(): message = '<br>' error_message = '<br> Error: Failed to find schedule data from google sheets. <br>' try: gc = pygsheets.authorize(service_...
40
30.52
101
15
337
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_3db935f4f578dc3d_ae6ec325", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (secret)](1) as clear text." ]
[ 21 ]
[ null ]
[ 27 ]
[ 61 ]
2024-11-19T01:44:09.158326+00:00
1,664,292,970,000
8cc789eb9331ac732f62d83dcbb3116b2d74f434
3
{ "blob_id": "8cc789eb9331ac732f62d83dcbb3116b2d74f434", "branch_name": "refs/heads/master", "committer_date": 1664292970000, "content_id": "46fc1fd34adec84bd54461404de1f6b0578a87ca", "detected_licenses": [ "MIT" ], "directory_id": "95194e6b13031ba404b8ea39789fb96e8463a736", "extension": "py", "fi...
2.578125
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- """ This script reads the ligand-field parameters from a SINGLE_ANISO calculation of the OpenMolcas package of programs. written 2021-2022 by Michael Böhme https://github.com/micb25/chemtools """ import re, sys if len(sys.argv) < 2: sys.exit("Usage: ...
126
26.61
121
18
1,156
python
[{"finding_id": "codeql_py/overly-large-range_7b59ec069d41f0b5_ee49281d", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with 0-9 in the same character class, and is equivalent to \\[+...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with 0-9 in the same character class, and is equivalent to \\[+,\\-.\\/0-9:;<=>?@A-E\\]." ]
[ 36 ]
[ null ]
[ 104 ]
[ 107 ]
2024-11-19T02:08:41.267173+00:00
1,535,361,465,000
59d4411bef06b7770c1af0bbc190628fb55dc964
3
{ "blob_id": "59d4411bef06b7770c1af0bbc190628fb55dc964", "branch_name": "refs/heads/master", "committer_date": 1535361465000, "content_id": "3cdfd482c8b2947f2708b2e60a74192d3f088dd9", "detected_licenses": [ "MIT" ], "directory_id": "24c3d40a18b5e6a60f52d22ce21e282be7904c77", "extension": "py", "fi...
3.328125
stackv2
#!/usr/bin/env python3.6 from termcolor import colored, cprint from credential import Credential print(''' | \/ | / \ |_ _| \ | | | \/ | ____| \ | | | | | | |\/| | / _ \ | || \| | | |\/| | _| | \| | | | | | | | |/ ___ \ | || |\ | | | | | |___| |\ | |_| | |_| |_/_/ \_|___|_| \_| |_| |_|_____|_| \_...
117
25.82
126
19
693
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_074af8566665424c_bdd16250", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 98 ]
[ null ]
[ 27 ]
[ 103 ]
2024-11-19T02:21:36.848272+00:00
1,619,744,528,000
c7c71bd7d89b8d969dfc8c9563532333389d8cde
3
{ "blob_id": "c7c71bd7d89b8d969dfc8c9563532333389d8cde", "branch_name": "refs/heads/main", "committer_date": 1619744528000, "content_id": "12e3dd9747e1688a366df101ce06ec6a0aa9bef6", "detected_licenses": [ "MIT" ], "directory_id": "3bb58f2b43c4ec95f11f6f536f524985c6967cdd", "extension": "py", "file...
2.609375
stackv2
#!/usr/bin/env python import requests import json import os import sys import argparse class AKIPSAnsibleAWXDevices(object): def __init__(self): self.inventory = {} self.read_cli_args() # Called with `--list`. self.inventory = self.getAKIPSDeviceList() print(json.dumps(self...
84
31.5
125
15
597
python
[{"finding_id": "codeql_py/request-without-cert-validation_e0ccd9f0b5ce050a_347ab558", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 62 ]
[ null ]
[ 31 ]
[ 62 ]
2024-11-19T02:57:56.409074+00:00
1,589,056,341,000
d21c97d3be710b48093b77b55e218d1d4d14d74a
3
{ "blob_id": "d21c97d3be710b48093b77b55e218d1d4d14d74a", "branch_name": "refs/heads/master", "committer_date": 1589056341000, "content_id": "b9710074d1185869034c374fc7bc08a5de536a47", "detected_licenses": [ "MIT" ], "directory_id": "51af31375eedf07f5aaf192bbda4a4cc8fa7077e", "extension": "py", "fi...
3.09375
stackv2
# Create API of ML model using flask ''' This code takes the JSON data while POST request an performs the prediction using loaded model and returns the results in JSON format. ''' # Import libraries import numpy as np from flask import Flask, render_template, request, jsonify import pickle from sklearn.preprocessing i...
97
32.54
120
15
729
python
[{"finding_id": "codeql_py/flask-debug_a7ddff5388e78d6c_799734ec", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-918" ]
[ "py/flask-debug", "py/partial-ssrf" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 97, 42 ]
[ null, null ]
[ 5, 20 ]
[ 24, 121 ]
2024-11-19T02:58:00.431649+00:00
1,620,736,759,000
a3fbb205abebc027a5e205dcf8df9dd8ac3395d1
3
{ "blob_id": "a3fbb205abebc027a5e205dcf8df9dd8ac3395d1", "branch_name": "refs/heads/master", "committer_date": 1620736759000, "content_id": "f75a6a9a24f1245c8d8ef2a74b28cb614d1f8318", "detected_licenses": [ "MIT" ], "directory_id": "79d5835e5cb9d386d1de29e939e65e62714ae6a1", "extension": "py", "fi...
2.625
stackv2
__author__ = "scott" import requests import json import uuid import os AUTHORIZE_URL = "https://twist.com/oauth/authorize" TOKEN_URL = "https://twist.com/oauth/access_token" # callback url specified when the application was defined # e.g. http://dev.twist.test:4567/v3/ CALLBACK_URI = "<<enter the callback url for yo...
73
30.47
76
8
572
python
[{"finding_id": "codeql_py/request-without-cert-validation_762eb1af260864ab_f6b9be5f", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 56, 71 ]
[ 58, null ]
[ 25, 21 ]
[ 2, 77 ]
2024-11-19T02:58:13.637830+00:00
1,483,204,753,000
7c8e32b0c0b15143675adf0b7470c9629fa27b89
2
{ "blob_id": "7c8e32b0c0b15143675adf0b7470c9629fa27b89", "branch_name": "refs/heads/master", "committer_date": 1483204753000, "content_id": "85583035f9dcda099344659fef1e3e9fb4408d34", "detected_licenses": [ "MIT" ], "directory_id": "117e5ce0758a8b437a1ea9e7fb4149f6adce65e7", "extension": "py", "fi...
2.453125
stackv2
import os import sys import random import re import json try: from hashlib import md5 except ImportError: from md5 import md5 import tornado.httpserver import tornado.ioloop import tornado.web from tornado.escape import xhtml_unescape from tornado.options import define, options define("port", default=5000, h...
115
30.65
166
19
915
python
[{"finding_id": "codeql_py/reflective-xss_19aec54978b4c5d9_3f932e8a", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 90 ]
[ null ]
[ 20 ]
[ 166 ]
2024-11-19T02:58:15.412456+00:00
1,360,286,963,000
2b6ca0668f77e4a9410be28dc9c8884f80af04d6
2
{ "blob_id": "2b6ca0668f77e4a9410be28dc9c8884f80af04d6", "branch_name": "refs/heads/master", "committer_date": 1360286963000, "content_id": "a9b7d5fd8c9837e321d47015f9405d9ec5fe5f17", "detected_licenses": [ "MIT" ], "directory_id": "95c836922eaaa1027d933e618133f6510be123d5", "extension": "py", "fi...
2.453125
stackv2
from template import Template class JinjaTemplate(Template): @staticmethod def is_engine_initialized(): return 'jinja2' in globals() def prepare(self): return def initialize_engine(self): global jinja2 import jinja2 def evaluate(self,scope, local_vars, block=None): if not hasattr(self,'output') or n...
27
19
51
16
128
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_384af90d6e2585d6_13c1b343", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 18 ]
[ null ]
[ 11 ]
[ 37 ]
2024-11-19T02:58:16.976379+00:00
1,436,552,241,000
c9940efcfacf9fc34ed7a25e3a2004365225d33a
3
{ "blob_id": "c9940efcfacf9fc34ed7a25e3a2004365225d33a", "branch_name": "refs/heads/master", "committer_date": 1436552241000, "content_id": "0e0f0a60d07ba20ee13a55217c00bacbe61c3215", "detected_licenses": [ "MIT" ], "directory_id": "3d39ff42a5d7212903bb84837f7470e02ce49d8e", "extension": "py", "fi...
2.703125
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- __version__ = '0.1' __author__ = 'Andrey Derevyagin' __copyright__ = 'Copyright © 2014' import urllib2 import time import json import hashlib #from config import GEOIP_SECRET1, GEOIP_SECRET2, GEOIP_SECRET3 GEOIP_CACHE_ONLY = 0 GEOIP_WEB_SERVICE = 1 class GeoIP(object)...
76
29.93
101
19
592
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_178442d57b68561c_48327abe", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (secret)](2) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (secret)](3) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (secret)](4) is used in a hashing algorithm ...
[ 44 ]
[ null ]
[ 28 ]
[ 31 ]
2024-11-19T03:10:05.400060+00:00
1,558,381,146,000
8cd7185ead5b54ef5cfc9f7976e5a803d5dd5e70
2
{ "blob_id": "8cd7185ead5b54ef5cfc9f7976e5a803d5dd5e70", "branch_name": "refs/heads/master", "committer_date": 1558381146000, "content_id": "ee28d7164a47120a0794090e0431c517f690092a", "detected_licenses": [ "MIT" ], "directory_id": "92d8091909f475a63886f0746537439ab3921ee0", "extension": "py", "fi...
2.390625
stackv2
from flask import Flask, render_template, request import requests webserver = Flask(__name__) @webserver.route("/") def home(): return render_template("index.html"), 200 @webserver.route("/go") def go(): r = request.args.get('r') w = requests.request(request.method, r) return w.content, 200 if (__na...
17
21.47
49
10
103
python
[{"finding_id": "codeql_py/flask-debug_5039fa63d1653fb0_fb4f1050", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-918", "CWE-079" ]
[ "py/flask-debug", "py/full-ssrf", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "The full URL of this request depends on a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 17, 13, 14 ]
[ null, null, null ]
[ 5, 9, 12 ]
[ 41, 44, 26 ]
2024-11-19T03:10:34.036585+00:00
1,518,177,959,000
3aa9ae0576c9789e99ab1ab650b35e4832df47fa
2
{ "blob_id": "3aa9ae0576c9789e99ab1ab650b35e4832df47fa", "branch_name": "refs/heads/master", "committer_date": 1518177959000, "content_id": "081482a92cefbc8dc433d2a12d0744bfef5aa9a6", "detected_licenses": [ "Apache-2.0" ], "directory_id": "9f98d366ce95852216128ee02aad7bdaca638708", "extension": "py"...
2.359375
stackv2
from tornado import web import tornado, json, os import subprocess class TwitterHandle(web.RequestHandler): def get(self): try: data = [] os.chmod('./available_handle.txt', 436) with open('available_handle.txt', 'r') as handles: data = handles.read().spl...
39
33.1
65
18
254
python
[{"finding_id": "codeql_py/command-line-injection_de52a0d8c503efd7_04c3abe8", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {...
3
true
[ "CWE-078", "CWE-079", "CWE-732" ]
[ "py/command-line-injection", "py/reflective-xss", "py/overly-permissive-file" ]
[ "HIGH", "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This command line depends on a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Overly permissive mask in chmod sets file to world readable." ]
[ 23, 35, 10 ]
[ null, null, null ]
[ 29, 24, 13 ]
[ 36, 46, 52 ]
2024-11-19T03:10:35.017947+00:00
1,568,655,176,000
d4d9784e4675ad23b9632c0238cf9b6cfff901b3
2
{ "blob_id": "d4d9784e4675ad23b9632c0238cf9b6cfff901b3", "branch_name": "refs/heads/master", "committer_date": 1568655176000, "content_id": "df428f74e4dff0edaffd5c1b8d134cc01fca5a32", "detected_licenses": [ "MIT" ], "directory_id": "dbb72e24aefc8106c808ecf3992f144326658b05", "extension": "py", "fi...
2.34375
stackv2
from __future__ import print_function import cv2 import os import sys import pytesseract import numpy as np import tensorflow as tf import re # ap = argparse.ArgumentParser() # ap.add_argument("-i", "--image", required=True, # help="path to input image to be OCR"d") # args = vars(ap.parse_args()) # pp...
346
25.01
113
20
2,432
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_639aab26052919c8_8da6b814", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
5
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (priva...
[ 173, 180, 184, 208, 227 ]
[ null, null, null, null, null ]
[ 19, 23, 23, 11, 11 ]
[ 50, 51, 54, 44, 52 ]
2024-11-19T03:22:34.597632+00:00
1,636,117,878,000
7e807f972df3ea2ae82807ecc4c39e93d5ae57e9
2
{ "blob_id": "7e807f972df3ea2ae82807ecc4c39e93d5ae57e9", "branch_name": "refs/heads/main", "committer_date": 1636117878000, "content_id": "1b63ba05e4a1a270b60d4c16db347b544e7c14b2", "detected_licenses": [ "MIT" ], "directory_id": "ccc8d481e23ad34fb343041529cb95a1208e5b52", "extension": "py", "file...
2.40625
stackv2
import json, youtube_dl, magic, os from flask import Flask, jsonify, send_file, request, make_response, Response from pathlib import Path from flask_cors import CORS, cross_origin from .errors import errors app = Flask(__name__) cors = CORS(app) app.config['CORS_HEADERS'] = 'Content-Type' app.register_blueprint(errors...
86
25.4
115
15
584
python
[{"finding_id": "codeql_py/command-line-injection_646f41a3cfd870d4_760f1d65", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {...
2
true
[ "CWE-078", "CWE-022" ]
[ "py/command-line-injection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This command line depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 17, 70 ]
[ null, null ]
[ 15, 26 ]
[ 115, 30 ]
2024-11-19T03:22:37.168307+00:00
1,635,056,836,000
f37944d9f2d6ced88950d7da1f28f61cd2699d8b
3
{ "blob_id": "f37944d9f2d6ced88950d7da1f28f61cd2699d8b", "branch_name": "refs/heads/master", "committer_date": 1635056836000, "content_id": "9c21ab56bc9e357f45e95fe1e7d2e60699c22ba7", "detected_licenses": [ "MIT" ], "directory_id": "b2698dace3141c91dee72bcf08de6480b13c39ad", "extension": "py", "fi...
2.90625
stackv2
#!/usr/bin/env python3 # Example of converting from some data into some output html using jinja import os import pprint import sys # pip3 install jinja2 from jinja2 import Environment, FileSystemLoader thisdir = os.path.dirname(os.path.realpath(__file__)) output_dir = os.path.join(thisdir, 'output') # Some example...
40
28.35
72
12
305
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_8dbf2f5d6db8a03c_1a09d3f3", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 30 ]
[ null ]
[ 7 ]
[ 52 ]
2024-11-19T03:22:43.150275+00:00
1,562,662,227,000
b0f90126d112f8cb5a8031b6ab8276de24e876d1
3
{ "blob_id": "b0f90126d112f8cb5a8031b6ab8276de24e876d1", "branch_name": "refs/heads/master", "committer_date": 1562662227000, "content_id": "292fde9da942012beb7d7167e18e299b3dfda9e6", "detected_licenses": [ "Apache-2.0" ], "directory_id": "5696f91a586d8ad7e28be77d7161b7b7e24aba8a", "extension": "py"...
2.515625
stackv2
# This Python file uses the following encoding: utf-8 #!/usr/bin/ import tweepy import os import time import sys from pathlib import Path from datetime import datetime import json import re #------------------------------------------------------# #-------------authentication phase started-------------# #---------------...
317
40.25
174
28
3,388
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_87b8ceb7638cec27_b50a87d3", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (secret)](1) as clear text." ]
[ 48 ]
[ null ]
[ 25 ]
[ 77 ]
2024-11-19T03:22:48.553055+00:00
1,530,102,547,000
98a60d2697cdc0da4f8e108dac298fc2472ce85a
2
{ "blob_id": "98a60d2697cdc0da4f8e108dac298fc2472ce85a", "branch_name": "refs/heads/master", "committer_date": 1530102547000, "content_id": "947263503dead7329feed1bff1ab3bf012ea7875", "detected_licenses": [ "MIT" ], "directory_id": "801e9fa6f57a3b90b61693d7dcbe56a631b692a7", "extension": "py", "fi...
2.390625
stackv2
# # coding: utf-8 # Copyright (c) 2018 DATADVANCE # # Permission is hereby granted, free of charge, to any person obtaining # a copy of this software and associated documentation files (the # "Software"), to deal in the Software without restriction, including # without limitation the rights to use, copy, modify, merge,...
355
38.88
79
20
2,858
python
[{"finding_id": "codeql_py/tarslip_7cb8ed9b0c0cf607_5b9b4e4a", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 284 ]
[ null ]
[ 17 ]
[ 20 ]
2024-11-19T01:34:46.828255+00:00
1,584,644,109,000
9dbf109ecc03bac54c2cc5800d98b533a730f156
2
{ "blob_id": "9dbf109ecc03bac54c2cc5800d98b533a730f156", "branch_name": "refs/heads/master", "committer_date": 1584644109000, "content_id": "ae5e43faa355c50681021053a4bcd76672c4e09a", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "452c06b03e4f8cc30bec8f6b9340b4622a387f02", "extension": "p...
2.453125
stackv2
#!/usr/bin/python3 from urllib.parse import unquote from tornado import web,gen from tornado.concurrent import run_on_executor from concurrent.futures import ThreadPoolExecutor import requests import os import json dbhost=os.environ["DBHOST"] health_check=os.environ["HEALTH_CHECK"] class HealthHandler(web.RequestHan...
45
27.47
67
17
294
python
[{"finding_id": "codeql_py/stack-trace-exposure_8925e562b8078ee8_d89c638c", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-918" ]
[ "py/stack-trace-exposure", "py/partial-ssrf" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 43, 25 ]
[ null, null ]
[ 20, 15 ]
[ 34, 59 ]
2024-11-19T01:35:02.732612+00:00
1,532,933,087,000
18a1fa10a3dd3958a32144e0ae5a624476926f61
3
{ "blob_id": "18a1fa10a3dd3958a32144e0ae5a624476926f61", "branch_name": "refs/heads/master", "committer_date": 1532933087000, "content_id": "2717c4d6ba3339afa4fc94dbe9b21b1933d494a7", "detected_licenses": [ "MIT" ], "directory_id": "14176920a610e25a1d46e78a9343001471f723e5", "extension": "py", "fi...
2.671875
stackv2
# Simple personal web server for bookstore pages # Usage: # RUNPY books.pysrc webserver --host foobar --port 8080 --rootdir path # This serves pages if they exist, calls methods under /api # Use /stop to kill the server import argparse from http.server import BaseHTTPRequestHandler, HTTPServer import cgi import log...
321
34.74
104
24
2,331
python
[{"finding_id": "codeql_py/path-injection_e9ea18e11f782db9_0f01c2fc", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
11
true
[ "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](...
[ 154, 154, 159, 163, 163, 190, 194, 204, 40, 49, 102 ]
[ null, null, null, null, null, null, null, null, null, null, null ]
[ 31, 55, 39, 31, 56, 34, 34, 31, 27, 27, 27 ]
[ 35, 59, 46, 35, 60, 38, 38, 35, 52, 49, 50 ]
2024-11-19T02:07:59.524308+00:00
1,502,263,052,000
2e2ba7e083caec333623605a659c32140def0d11
3
{ "blob_id": "2e2ba7e083caec333623605a659c32140def0d11", "branch_name": "refs/heads/master", "committer_date": 1502263052000, "content_id": "a5ba7ee12007c391b398369afdb119ec81ce2655", "detected_licenses": [ "MIT" ], "directory_id": "51345466e03e76a1f2b1c91be3f59292c07f2def", "extension": "py", "fi...
2.625
stackv2
#!/usr/bin/python # -*- coding: utf-8 -*- import json import re import warnings import ruamel.yaml as yaml from bs4 import BeautifulSoup from scrapper_helpers.utils import html_decode, replace_all, _float, _int from gratka.utils import get_response_for_url warnings.simplefilter('ignore', yaml.error.UnsafeLoaderWarni...
226
40.54
116
24
2,222
python
[{"finding_id": "codeql_py/redos_5656498e83b603a1_b76343f5", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'dataLayer = \\[{{' and containing...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with 'dataLayer = \\[{{' and containing many repetitions of ' '." ]
[ 56 ]
[ null ]
[ 58 ]
[ 66 ]
2024-11-19T02:17:31.101155+00:00
1,486,731,580,000
4ef0a973ab4f8ccf2384f9e8ac9dce2547310fe6
2
{ "blob_id": "4ef0a973ab4f8ccf2384f9e8ac9dce2547310fe6", "branch_name": "refs/heads/master", "committer_date": 1486731580000, "content_id": "9da4c452a3c1b2ba0e83d5f7ffe32620aaa62b71", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "1c21904cf20444e8c95579670461980890e6e6b2", "extension": "p...
2.421875
stackv2
import os import sys import click import logging from flask import Flask, request, render_template, jsonify, Markup from flask_restful import Resource, Api, abort, reqparse from flask_sqlalchemy import SQLAlchemy from markdown import Markdown from bleach import linkify app = Flask(__name__) api = Api(app) db = SQLAl...
227
28.64
81
15
1,660
python
[{"finding_id": "codeql_py/log-injection_48e3e99f3dc39061_cdee451e", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 147 ]
[ null ]
[ 22 ]
[ 45 ]
2024-11-19T02:17:39.369538+00:00
1,676,892,889,000
a5c18ffd11b30968aaa59210edba8a4f30fb44ea
3
{ "blob_id": "a5c18ffd11b30968aaa59210edba8a4f30fb44ea", "branch_name": "refs/heads/master", "committer_date": 1676892889000, "content_id": "9effc49fc6e036f0fbd964057b0c0ef4901a6a2e", "detected_licenses": [ "Apache-2.0" ], "directory_id": "a7e8c02ce6616d533dbb32ad7ea604d4d6731ede", "extension": "py"...
3.296875
stackv2
# This program is free software; you can redistribute it and/or modify # it under the terms of the (LGPL) GNU Lesser General Public License as # published by the Free Software Foundation; either version 3 of the # License, or (at your option) any later version. # # This program is distributed in the hope that it will b...
108
28.58
76
15
829
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_04cc227c3e5f88de_3f38229f", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [http://www.w3.org](1) may be at an arbitrary position ...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [http://www.w3.org](1) may be at an arbitrary position in the sanitized URL." ]
[ 97 ]
[ null ]
[ 20 ]
[ 57 ]
2024-11-19T02:17:45.083086+00:00
1,605,110,039,000
dfa784f24f6f574b4d7156992d1c41b9e1a83db6
2
{ "blob_id": "dfa784f24f6f574b4d7156992d1c41b9e1a83db6", "branch_name": "refs/heads/main", "committer_date": 1605110039000, "content_id": "d9ed8771e402fe06432bb8453c28bd74e316bfd2", "detected_licenses": [ "MIT" ], "directory_id": "e83db170d65645a65448b0aa0bba7a49a7056fe2", "extension": "py", "file...
2.359375
stackv2
from flask import Flask, render_template, flash, redirect, request, url_for, session, logging from werkzeug.datastructures import ImmutableMultiDict from pdf2image import convert_from_bytes from signature_extractor import get_signatures from tika import parser from pytesseract import image_to_string from flask_sqlalche...
138
32.75
93
16
1,101
python
[{"finding_id": "codeql_py/flask-debug_07ec0ebd937caded_bad0bb93", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-079", "CWE-022" ]
[ "py/flask-debug", "py/reflective-xss", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 138, 56, 99 ]
[ null, null, null ]
[ 5, 20, 22 ]
[ 49, 51, 30 ]
2024-11-19T02:18:12.863041+00:00
1,603,128,681,000
cea5cacb9af76730b6a085d524a941fc1c658f78
3
{ "blob_id": "cea5cacb9af76730b6a085d524a941fc1c658f78", "branch_name": "refs/heads/master", "committer_date": 1603128681000, "content_id": "506c99f83d406ce243f0b10ce3e967b05b6cf957", "detected_licenses": [ "MIT" ], "directory_id": "73b187faba0752ae94023d4d7404c0d56c495422", "extension": "py", "fi...
3.03125
stackv2
""" Module for identifying and parsing ALF file names. An ALF file has the following components (those in brackets are optional): (_namespace_)object.attribute(_timescale)(.extra.parts).ext Note the following: Object attributes may not contain an underscore unless followed by 'times' or 'intervals'. A nam...
226
37.62
98
21
2,254
python
[{"finding_id": "codeql_py/redos_1c63a29dfd7a32ea_d4ca1a65", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'a.0' and containing many repetiti...
2
true
[ "CWE-1333", "CWE-1333" ]
[ "py/redos", "py/redos" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with 'a.0' and containing many repetitions of 'a'.", "This part of the regular expression may cause exponential backtracking on strings starting with 'a.0' and containing many repetitions of '-'." ]
[ 30, 31 ]
[ null, null ]
[ 27, 17 ]
[ 31, 25 ]
2024-11-19T02:18:13.516271+00:00
1,525,062,525,000
fc6fdfb4ffd3d4d0d8c53230143b577ce4d35a6f
3
{ "blob_id": "fc6fdfb4ffd3d4d0d8c53230143b577ce4d35a6f", "branch_name": "refs/heads/master", "committer_date": 1525062525000, "content_id": "c322ce0752d0131cda81c714c7624a4d010d05d1", "detected_licenses": [ "MIT" ], "directory_id": "c290da32544cb4f371e92c7f2c31ee0313b35e93", "extension": "py", "fi...
2.84375
stackv2
from BaseHTTPServer import BaseHTTPRequestHandler, HTTPServer from SocketServer import ThreadingMixIn import cgi, sys, os, threading class RequestHandler(BaseHTTPRequestHandler): def do_GET(self): #Handle GET Request try: filepath = "filehost"+self.path print "Filepath: "+f...
71
29.14
72
17
454
python
[{"finding_id": "codeql_py/path-injection_ef58c27c26836296_d8b0258e", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 12, 44 ]
[ null, null ]
[ 20, 22 ]
[ 28, 42 ]
2024-11-19T02:18:20.450985+00:00
1,507,385,288,000
f8276edd2813dafab2fa03e55e2d9aec1fc36914
3
{ "blob_id": "f8276edd2813dafab2fa03e55e2d9aec1fc36914", "branch_name": "refs/heads/master", "committer_date": 1507385288000, "content_id": "c7befe032bf7a1f6470ee54635e1e6249d788eb7", "detected_licenses": [ "MIT" ], "directory_id": "7f53dd409f03ceba9e6975bf378e570bdf2f93e9", "extension": "py", "fi...
2.671875
stackv2
import sys import dicom import os.path # dicom.debug() if __name__ == "__main__": # CD-ROM root filepath = "X:\\" if os.path.isdir(filepath): # only gave directory, add standard name filepath = os.path.join(filepath, "DICOMDIR") dcmdir = dicom.read_dicomdir(filepath) base_dir = os...
30
35.7
85
20
257
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_10ba6c9441a04560_d9fecfc3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 16 ]
[ 17 ]
[ 19 ]
[ 52 ]
2024-11-19T02:18:30.928317+00:00
1,629,821,755,000
fd131c436675260498d5944e62a455a9f1178fbb
2
{ "blob_id": "fd131c436675260498d5944e62a455a9f1178fbb", "branch_name": "refs/heads/main", "committer_date": 1629821755000, "content_id": "ef714bb722f3cc2c31508754c5f4c674ea9fe95e", "detected_licenses": [ "MIT" ], "directory_id": "1fb2c3eca42b123fedbb2113d5833ae57e8d625b", "extension": "py", "file...
2.34375
stackv2
#!/usr/bin/env python3 from tenable.base.platform import APIPlatform from subprocess import Popen from pathlib import Path from time import sleep import requests import logging import urllib3 import pexpect import typer import yaml urllib3.disable_warnings() app = typer.Typer() class Nessus(APIPlatform): _env_b...
190
31.75
79
22
1,324
python
[{"finding_id": "codeql_py/request-without-cert-validation_a93a95299b12a045_82673a12", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 70 ]
[ 71 ]
[ 17 ]
[ 43 ]
2024-11-19T02:30:06.603198+00:00
1,544,106,414,000
3e38aecfb062769900f5a760de65e174952a1cd4
2
{ "blob_id": "3e38aecfb062769900f5a760de65e174952a1cd4", "branch_name": "refs/heads/master", "committer_date": 1544106414000, "content_id": "6893d20d7da182cc56a5af9c640e5a1fdb13e0af", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "5e89f039e8742ff1adb08ba35534c1e9476abc48", "extension": "p...
2.328125
stackv2
from flask import Flask, render_template, redirect, request, flash import json from flask_login import LoginManager, login_user, logout_user, login_required, current_user from services import user_services from werkzeug.security import generate_password_hash, check_password_hash from config import SECRET_KEY from utils...
158
25.27
102
15
910
python
[{"finding_id": "codeql_py/reflective-xss_42be392475588a3f_bd62564d", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 154 ]
[ null ]
[ 12 ]
[ 77 ]
2024-11-19T02:30:08.533421+00:00
1,535,497,803,000
3c2929ff581623ada34c0e7b86104482d99f84cc
3
{ "blob_id": "3c2929ff581623ada34c0e7b86104482d99f84cc", "branch_name": "refs/heads/master", "committer_date": 1535497803000, "content_id": "c27e213bba873461ad6115b14c37ab1c48ed0b14", "detected_licenses": [ "MIT" ], "directory_id": "bc4b7d114bea578d6cc1931f5213deb7513feedd", "extension": "py", "fi...
2.59375
stackv2
#!/usr/bin/env python """ Python Client/SDK for querying AirPal for headless statistics. Airpal provides user access control and management for PrestoDB. This client was created to allow a scriptable client interface to Airpal, so that automated queries can have the same UAC as interactive data mining. """ import req...
381
40.21
120
27
2,983
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_631e981cf31c2dd7_8c4efbfe", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 283 ]
[ null ]
[ 76 ]
[ 80 ]
2024-11-19T02:30:19.957447+00:00
1,555,977,427,000
d94d5bf45ff11c94922bae656d6beee7e2548a1e
2
{ "blob_id": "d94d5bf45ff11c94922bae656d6beee7e2548a1e", "branch_name": "refs/heads/master", "committer_date": 1555977427000, "content_id": "c28bde5a846518809915c6c51d620049951985f0", "detected_licenses": [ "MIT" ], "directory_id": "ce7dadb062570bfb41b7df485407df4e5e5448d0", "extension": "py", "fi...
2.3125
stackv2
from jinja2 import Environment as JinjaEnvironment from jinja2 import PackageLoader as JinjaPackageLoader from ...plugin import Plugin class JsonPlugin(Plugin): @staticmethod def get_name(): return 'json' @classmethod def get_output_file_extension(cls): return 'json' def __init_...
29
24.79
68
14
157
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_cb02e73b170d9b62_5b1eafc1", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 18 ]
[ 22 ]
[ 29 ]
[ 10 ]
2024-11-19T02:30:26.261398+00:00
1,474,297,296,000
26690ea424b02ff28f649d4e17691a1f97b374da
2
{ "blob_id": "26690ea424b02ff28f649d4e17691a1f97b374da", "branch_name": "refs/heads/master", "committer_date": 1474297296000, "content_id": "affb160e5590631802b71f8c13b3142b1bd1b793", "detected_licenses": [ "Apache-2.0" ], "directory_id": "5769394caee260a3c1e6073e1156fa072c484f0d", "extension": "py"...
2.484375
stackv2
import logging import time from flask import Blueprint, request, jsonify from recommendation.api import filters from recommendation.api import candidate_finders from recommendation.api import pageviews from recommendation.api import specification from recommendation.utils import event_logger from recommendation.utils ...
83
30.19
101
14
575
python
[{"finding_id": "codeql_py/stack-trace-exposure_4f1a54e02d9b83e9_e813a123", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 22 ]
[ null ]
[ 30 ]
[ 36 ]
2024-11-19T02:30:30.851861+00:00
1,583,685,954,000
7f4d13c96ca70f456d7143d8a13b9ed173f564a4
2
{ "blob_id": "7f4d13c96ca70f456d7143d8a13b9ed173f564a4", "branch_name": "refs/heads/master", "committer_date": 1583685954000, "content_id": "2cf90fe8a8dbc3d7b1c63d162531207d47abb12f", "detected_licenses": [ "MIT" ], "directory_id": "b56560e14791e2a3f6cdd2b68ce9828664c4cd70", "extension": "py", "fi...
2.375
stackv2
# -*- coding: utf-8 -*- """ Class to encapsulate all the emitter logic """ import json from jinja2 import Template from tilty.emitters import datadog, influxdb, webhook def emit(config, tilt_data): """ Find and call emitters from config config (dict): configuration file loaded from disk tilt_data (dict...
82
36.96
175
17
731
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_098dcc737c9755a1_18c4dab0", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
3
true
[ "CWE-079", "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 25, 48, 49 ]
[ null, null, null ]
[ 21, 29, 33 ]
[ 68, 85, 93 ]
2024-11-19T02:30:34.576715+00:00
1,572,428,815,000
cc8de583ea4a2897d4d455ae6d3df6ecde8df0f6
3
{ "blob_id": "cc8de583ea4a2897d4d455ae6d3df6ecde8df0f6", "branch_name": "refs/heads/master", "committer_date": 1572428815000, "content_id": "bbcac3640a2b8692b179843e8a30331764e162c7", "detected_licenses": [ "Apache-2.0" ], "directory_id": "10fa0773b0c8ca68643d9005eeede344c1aa0386", "extension": "py"...
2.578125
stackv2
""" bitcoind related functionality """ from subprocess import call, run, PIPE, STDOUT, DEVNULL import os import pathlib import shutil from noma import rpcauth def start(): """Start bitcoind docker compose container""" from noma.node import is_running if is_running("bitcoind"): print("bitcoind is ...
311
31.23
79
18
2,303
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_de79ea322a602757_72eb29b5", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
6
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-732", "CWE-732" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/overly-permissive-file", "py/overly-permissive-file" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (password)](3) as clear text.\nThis expression stores [sensitive data (password)](4) as clear text.", "This expression stores [sensiti...
[ 218, 303, 297, 307, 55, 58 ]
[ 220, null, null, null, null, null ]
[ 17, 24, 15, 23, 17, 17 ]
[ 18, 58, 62, 55, 63, 58 ]
2024-11-19T02:30:37.753638+00:00
1,690,229,608,000
534b078b8d50b8e9f3e0fcbac64edfc336b9df01
3
{ "blob_id": "534b078b8d50b8e9f3e0fcbac64edfc336b9df01", "branch_name": "refs/heads/main", "committer_date": 1690229608000, "content_id": "426cc6e97bdd6948ef658f45bf8bd785aefa8f29", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "1268eb2ae1cbb233f2b92ad7292a6bccb1a236cc", "extension": "py"...
2.765625
stackv2
# ----------------------------------------------------------------------------- # Copyright (c) 2019-2021, NeXpy Development Team. # # Author: Paul Kienzle, Ray Osborn # # Distributed under the terms of the Modified BSD License. # # The full license is in the file COPYING, distributed with this software. # ------------...
248
32.62
79
19
1,626
python
[{"finding_id": "codeql_py/overly-permissive-file_74e2c54c0d19b59e_f4d08dfb", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world writable." ]
[ 133 ]
[ null ]
[ 17 ]
[ 48 ]
2024-11-19T02:30:38.741904+00:00
1,660,229,956,000
f381b2a28c28875d7776a8ae8fb6936a535d833e
3
{ "blob_id": "f381b2a28c28875d7776a8ae8fb6936a535d833e", "branch_name": "refs/heads/master", "committer_date": 1660229956000, "content_id": "f5d1bdce29dc75052ef103b8889fdd7bd224c72e", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "37e93c58a63dcf0c059c5a8b4e71a87449d62ac4", "extension": "p...
3.0625
stackv2
#! /usr/bin/env python # -*- coding: UTF-8 -*- """A command line utility for recursively extracting nested tar archives.""" __author__ = "Pushpak Dagade (पुष्पक दगड़े)" __date__ = "$4 July, 2011 3:00:00 PM$" import os import sys import re import tarfile import gzip from argparse import ArgumentParser major_version...
197
40.86
80
19
1,873
python
[{"finding_id": "codeql_py/tarslip_fb6bc35b26fe3ec4_ff456ee6", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 124 ]
[ null ]
[ 13 ]
[ 16 ]
2024-11-19T02:42:23.777068+00:00
1,609,849,469,000
1250c013247960053117afcdb66a08d232ec39db
3
{ "blob_id": "1250c013247960053117afcdb66a08d232ec39db", "branch_name": "refs/heads/master", "committer_date": 1609849469000, "content_id": "844f1337c530d36bd943adb8db2174c9bf5c4f43", "detected_licenses": [ "MIT" ], "directory_id": "d10fedd25f7b7e31486aacf73bc84f2323397695", "extension": "py", "fi...
2.546875
stackv2
from flask import render_template,request,abort,current_app as app,jsonify import traceback import json from utils import get_face_details,landmark_calc,face_compare from .models import Child,Match from . import db from flask_cors import CORS,cross_origin """ Routes for the backend api """ @app.route("/") @cross_origi...
144
32.76
133
20
1,053
python
[{"finding_id": "codeql_py/stack-trace-exposure_e17d790cb3767bad_0dbfbd22", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
7
true
[ "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information...
[ 39, 45, 76, 83, 102, 139, 144 ]
[ null, null, null, null, null, null, null ]
[ 28, 24, 36, 24, 24, 28, 24 ]
[ 38, 55, 46, 56, 56, 38, 56 ]
2024-11-18T18:05:48.004534+00:00
1,488,074,797,000
7c395cf8bf31ae0a55dc1f91bd62a9b26a06d67c
3
{ "blob_id": "7c395cf8bf31ae0a55dc1f91bd62a9b26a06d67c", "branch_name": "refs/heads/master", "committer_date": 1488074797000, "content_id": "6939426884b56086f16941dae9303f5eda17c381", "detected_licenses": [ "MIT" ], "directory_id": "7b08124fc67b1ac8ad3cbcd083233b6419acc149", "extension": "py", "fi...
2.8125
stackv2
from bs4 import BeautifulSoup import urllib import RAKE import re import cgi from flask import Flask, render_template from flask import request app = Flask(__name__) # endpoints have get post put patch delete etc http protocol. default is get # @app.route('/') # def parse_url(): # return get_keywords(url) @app.rou...
84
19.7
108
11
463
python
[{"finding_id": "codeql_py/flask-debug_ebbc0ab6a1094caf_4b0b4823", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 79, 30 ]
[ null, null ]
[ 2, 9 ]
[ 21, 12 ]
2024-11-18T18:05:52.066651+00:00
1,505,677,251,000
1dc19f6e55f1c4d8f902a927f7732462cc36af5c
3
{ "blob_id": "1dc19f6e55f1c4d8f902a927f7732462cc36af5c", "branch_name": "refs/heads/master", "committer_date": 1505677251000, "content_id": "f29d016a901bdd908a282af442af1923fe6d1e06", "detected_licenses": [ "MIT" ], "directory_id": "05ca02e779cc3fe1c146f923d552234e48787225", "extension": "py", "fi...
3.109375
stackv2
import re import pickle import time import unittest timing = {} def get_time(f, args=[]): """ After using timeit we can get the duration of the function f when it was applied in parameters args. Normally it is expected that args is a list of parameters, but it can be also a single parameter. :ty...
178
24.37
77
17
1,177
python
[{"finding_id": "codeql_py/overly-large-range_4fabe6f8e105b9a5_15dab3c7", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "remediatio...
3
true
[ "CWE-020", "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class." ]
[ 167, 167, 167 ]
[ null, null, null ]
[ 38, 41, 44 ]
[ 42, 45, 48 ]
2024-11-18T18:05:54.956884+00:00
1,618,468,674,000
2aa3f9db3a6b0a186c81bee23af308d044d7c05d
3
{ "blob_id": "2aa3f9db3a6b0a186c81bee23af308d044d7c05d", "branch_name": "refs/heads/master", "committer_date": 1618468674000, "content_id": "bd291887610980ca542c665dc5abd5fcf8f20178", "detected_licenses": [ "MIT" ], "directory_id": "001412f54fcfbf635349a1397430a29113909b94", "extension": "py", "fi...
2.875
stackv2
# -*- encoding: utf-8 -*- from __future__ import absolute_import, unicode_literals import re import six import uuid import hashlib from datetime import datetime from addonpayments.exceptions import SdkError from addonpayments.logger import Logger logger = Logger().get_logger(__name__) class GenerationUtils(objec...
162
30.26
117
19
1,057
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_f09f538cab4962a9_82c0b631", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecu...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecure." ]
[ 37 ]
[ null ]
[ 29 ]
[ 104 ]
2024-11-18T18:05:57.688433+00:00
1,575,623,851,000
797fb22fb4168916e622f2441cc58d477da0f9c5
3
{ "blob_id": "797fb22fb4168916e622f2441cc58d477da0f9c5", "branch_name": "refs/heads/master", "committer_date": 1575623851000, "content_id": "2b85f5105ffc4604ecfade1a94ae2916ed5f2d8f", "detected_licenses": [ "MIT" ], "directory_id": "632772fb477fd5a1ffce7955b2ad683e2b822c87", "extension": "py", "fi...
2.640625
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- import pyhaproxy.config as config class Render(object): """Do rendering the config.Config object to a str Attributes: configuration (config.Configuration): """ def __init__(self, configuration): self.configuration = configuration def...
180
31.63
79
15
1,229
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_086284ad43212698_d9e6e4e2", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text." ]
[ 41 ]
[ null ]
[ 21 ]
[ 48 ]
2024-11-18T18:05:58.803109+00:00
1,628,346,675,000
9934eea03cd6553b916c6217ffc3f5aa46d9a74f
3
{ "blob_id": "9934eea03cd6553b916c6217ffc3f5aa46d9a74f", "branch_name": "refs/heads/main", "committer_date": 1628346675000, "content_id": "ea64fc26f67150cc47baf3531d1d17d145eef511", "detected_licenses": [ "MIT" ], "directory_id": "5c52e64424a57b1ddf8b3d09dc98ada658739e58", "extension": "py", "file...
3.203125
stackv2
#!/usr/bin/env python """ 5. Building on the script from exercise 4, add a description to the the IP address object that you just created. Accomplish this using an HTTP PUT. The HTTP PUT operation will require all of the mandatory fields in the object (in this case, the "address" field). Print the status code and th...
63
27.97
127
11
458
python
[{"finding_id": "codeql_py/request-without-cert-validation_a8420ab03b506742_6b52b2c2", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 32, 44 ]
[ null, 46 ]
[ 16, 20 ]
[ 77, 6 ]
2024-11-18T18:05:59.755830+00:00
1,632,922,829,000
fdf4b2f984ee84f0986d37d32d8c7190b3cafcb9
3
{ "blob_id": "fdf4b2f984ee84f0986d37d32d8c7190b3cafcb9", "branch_name": "refs/heads/main", "committer_date": 1632923187000, "content_id": "576eb57e63541360ed23e6d19ea22c93c3465eaf", "detected_licenses": [ "MIT" ], "directory_id": "f2cf03c4fc1318e1607ffc73314d35088834f6fa", "extension": "py", "file...
2.84375
stackv2
from bs4 import BeautifulSoup import requests params = {'page': 1} pages = 2 n = 1 params['page'] += 1 while params['page'] <= pages: url = 'https://career.habr.com/vacancies/?page=1' response = requests.get(url, params=params) content = response.content soup = BeautifulSoup(content, 'lxml') cards ...
57
43.12
124
17
674
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_78a1f2a7028a0964_bfa9ca08", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 54 ]
[ null ]
[ 17 ]
[ 124 ]
2024-11-18T18:06:03.792459+00:00
1,690,250,414,000
3de5936f27da1316d7375e68804622543ec200e0
2
{ "blob_id": "3de5936f27da1316d7375e68804622543ec200e0", "branch_name": "refs/heads/main", "committer_date": 1690250414000, "content_id": "eb14ac65d6e457684f11dd93483186c4855f210d", "detected_licenses": [ "MIT" ], "directory_id": "156f46142b313ae0bbd9c5fa052f8e3e308b68d8", "extension": "py", "file...
2.5
stackv2
import json import base64 import urllib3 import logging import hashlib import requests from Crypto import Random from Crypto.Cipher import DES3 from Crypto.PublicKey import RSA from Crypto.Cipher import PKCS1_v1_5 from Crypto.Util.Padding import pad, unpad random_generator = Random.new().read urllib3.disable_warnings(...
184
31.15
95
21
1,498
python
[{"finding_id": "codeql_py/weak-crypto-key_d2e8a0b8d3632a0f_079555af", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",...
5
true
[ "CWE-326", "CWE-327", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/weak-crypto-key", "py/weak-cryptographic-algorithm", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "HIGH", "HIGH", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "[The cryptographic algorithm DES3](1) is broken or weak, and should not be used.", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validat...
[ 18, 36, 79, 130, 166 ]
[ null, null, 86, 138, 174 ]
[ 11, 16, 16, 16, 16 ]
[ 47, 75, 26, 26, 26 ]
2024-11-18T17:59:49.975099+00:00
1,611,929,270,000
b84bcab10ef0efd5d20c6b25f6d66e679a9f99b0
3
{ "blob_id": "b84bcab10ef0efd5d20c6b25f6d66e679a9f99b0", "branch_name": "refs/heads/master", "committer_date": 1611929270000, "content_id": "71bb6276a798fde3d04b15ae296ea5a147334248", "detected_licenses": [ "MIT" ], "directory_id": "8ee9c5c47268b5c683d06fcc75b101a9e69ccac3", "extension": "py", "fi...
3.421875
stackv2
class CreditCard: def __init__(self, customer, bank, accnt, limit): self.__customer = customer self.__bank = bank self.__account= accnt self.__limit = limit self.__balance = 0 def get_customer(self): return self.__customer def get_bank(self): ...
45
23.67
71
12
270
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6315395294ca644f_55551040", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 44 ]
[ null ]
[ 11 ]
[ 13 ]
2024-11-18T19:11:48.859752+00:00
1,598,286,420,000
5b6e3199ab3b05fa52a886bd5fd55c7675595277
2
{ "blob_id": "5b6e3199ab3b05fa52a886bd5fd55c7675595277", "branch_name": "refs/heads/master", "committer_date": 1598286420000, "content_id": "f473d7e65a56cd8878d5f0ccbe384683a83bf993", "detected_licenses": [ "Apache-2.0" ], "directory_id": "9c7962d8bf05af11b038871811cfd95c70084bea", "extension": "py"...
2.453125
stackv2
from flask import Flask, render_template, redirect app = Flask(__name__) @app.route('/') def index(): return """ <h1>Hello World</h1> <h1>Hello World</h1> <h1>Hello World</h1> <h1>Hello World</h1> <h1>Hello World</h1> <h1>Hello World</h1> <h1>Hello World</h1> """ @app.route('/logi...
29
17.97
50
9
162
python
[{"finding_id": "codeql_py/flask-debug_f522591689fa67d9_9a17d227", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 29, 20 ]
[ null, null ]
[ 5, 12 ]
[ 34, 39 ]
2024-11-18T19:11:50.687463+00:00
1,580,586,715,000
685a8ae65b8e516ee61f623a46a6fec477300216
3
{ "blob_id": "685a8ae65b8e516ee61f623a46a6fec477300216", "branch_name": "refs/heads/master", "committer_date": 1580586715000, "content_id": "c51da77a5c564c0684d565fef564012c7732ec00", "detected_licenses": [ "MIT" ], "directory_id": "da7c4ab97525a45285cd23225d2e02e63a2db2a9", "extension": "py", "fi...
2.71875
stackv2
""" This module provides access the Tesla Motors Owner API and handles OAuth 2.0 password granting and bearer token renewal. Tokens are saved to disk for reuse. API endpoints are loaded from 'endpoints.json'. Credentials to teslamotors.com and client ID and secret are required. """ # Author: Tim Dorssers import json ...
321
42.54
80
19
3,022
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bcde6f2067f03e9a_61ec11a1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-295" ]
[ "py/clear-text-logging-sensitive-data", "py/request-without-cert-validation" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text.\nThis expression logs [sensitive data (secret)](...
[ 164, 260 ]
[ null, 261 ]
[ 27, 20 ]
[ 61, 60 ]
2024-11-18T19:11:54.023717+00:00
1,556,906,945,000
87a5aa708d218cc085088c64baed8cae777f78c5
3
{ "blob_id": "87a5aa708d218cc085088c64baed8cae777f78c5", "branch_name": "refs/heads/master", "committer_date": 1556906945000, "content_id": "3cadcb58a078b01c8419e47de74e445e565d099f", "detected_licenses": [ "MIT" ], "directory_id": "63d185e33571783e1c8420dd9c443df585b6b006", "extension": "py", "fi...
2.671875
stackv2
from cryptography import x509 from cryptography.x509.oid import NameOID from cryptography.hazmat.primitives import hashes from cryptography.hazmat.backends import default_backend from cryptography.hazmat.primitives import serialization from cryptography.hazmat.primitives.asymmetric import padding, rsa import datetime f...
237
26.84
103
17
1,536
python
[{"finding_id": "codeql_py/weak-crypto-key_80feb793952f801e_5b8e9af6", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1000](1) bits, which is below 2048 and considered breakable.", "remediation": "",...
1
true
[ "CWE-326" ]
[ "py/weak-crypto-key" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Creation of an RSA key uses [1000](1) bits, which is below 2048 and considered breakable." ]
[ 26 ]
[ 29 ]
[ 21 ]
[ 39 ]
2024-11-18T19:23:59.589547+00:00
1,574,646,551,000
ac18867f9f601bda4b0a8b94cb427e92fbbbc48d
3
{ "blob_id": "ac18867f9f601bda4b0a8b94cb427e92fbbbc48d", "branch_name": "refs/heads/master", "committer_date": 1574646551000, "content_id": "1fc5e03be7320b0632c6f82d35b22dda1d22a440", "detected_licenses": [ "MIT" ], "directory_id": "a838ca1ae056db0a91481f7826d73c67b106abf3", "extension": "py", "fi...
2.921875
stackv2
from datetime import datetime class Submission: """Class for text submittion""" def __init__(self, text): self.text = text self.timestamp = datetime.now() def get_readable_timestamp(self): return self.timestamp.strftime("%b %d %Y") def __str__(self): return "text: {}\n...
99
30.78
80
14
656
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a8087fd34a2492f9_eb9c6a06", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 61 ]
[ null ]
[ 15 ]
[ 70 ]
2024-11-18T19:24:00.153226+00:00
1,425,067,076,000
133e841562397b8152afe65be9b230e355eb73e8
2
{ "blob_id": "133e841562397b8152afe65be9b230e355eb73e8", "branch_name": "refs/heads/master", "committer_date": 1425067076000, "content_id": "7b0ff5dcb918ef0d326e0b77457b53d5407b90c5", "detected_licenses": [ "MIT" ], "directory_id": "fdde0fa76eea56f9aac6b944a42072dd93e5d71e", "extension": "py", "fi...
2.375
stackv2
__author__ = 'Blake' import os import re import json import time import types import mimetypes import markdown import yaml from jinja2 import Template from synpost.fn.conversions import pretty_size, convert_sysdate, \ flatten_list, path_to_asset, clean_filename, merge_dicts # bootstrap mimetypes table with MARK...
243
30.75
118
21
1,688
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_3846b049425278fc_119a87ae", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 169, 241 ]
[ null, null ]
[ 20, 20 ]
[ 40, 68 ]
2024-11-18T19:24:04.898037+00:00
1,429,876,772,000
c9f90a21b4921fc53d12a740c80b0803803ef182
2
{ "blob_id": "c9f90a21b4921fc53d12a740c80b0803803ef182", "branch_name": "refs/heads/master", "committer_date": 1429876772000, "content_id": "e041755f9ac3aabad5184512fbad79a4e6806ad3", "detected_licenses": [ "MIT" ], "directory_id": "7f07770868bad766d5b18e4bc5dbff30f86234c7", "extension": "py", "fi...
2.421875
stackv2
#!/usr/bin/env python3 import argparse import configparser import hashlib import logging import magic import os import requests import time import sys import zipfile from tempfile import TemporaryDirectory from fnmatch import fnmatch def setup_cli(args): """ Configure command-line arguements """ description...
266
37.55
159
21
2,324
python
[{"finding_id": "codeql_py/request-without-cert-validation_a04615b9a4c4b2b6_382014cb", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 88, 141 ]
[ null, null ]
[ 20, 28 ]
[ 82, 103 ]
2024-11-18T19:58:32.449107+00:00
1,615,595,708,000
68f518435991e2dd99c0360281bfe630277e0d4a
2
{ "blob_id": "68f518435991e2dd99c0360281bfe630277e0d4a", "branch_name": "refs/heads/master", "committer_date": 1615595708000, "content_id": "24a7b4cc8ad20fd9cca9abe8b4d4d1f5f788ba3b", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "81d4337314591e98670169e4dd0905d7c87f2219", "extension": "p...
2.5
stackv2
# This script is part of pyroglancer (https://github.com/SridharJagannathan/pyroglancer). # This code was adapted using the cors_webserver module present in the neuroglancer package # for serving data from a local directory via http port. # The implementation for the range requests was adapted from RangeHTT...
255
33.13
107
16
1,959
python
[{"finding_id": "codeql_py/http-response-splitting_393bf396975c5d97_8fe2f6d1", "tool_name": "codeql", "rule_id": "py/http-response-splitting", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This HTTP header is constructed from a [user-provided value](1).\nThis HTTP header is con...
1
true
[ "CWE-113" ]
[ "py/http-response-splitting" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This HTTP header is constructed from a [user-provided value](1).\nThis HTTP header is constructed from a [user-provided value](2)." ]
[ 117 ]
[ null ]
[ 26 ]
[ 68 ]
2024-11-18T19:34:25.330562+00:00
1,557,900,860,000
ac6d0f40468c7cf6612cb2da525440da4ea2547f
3
{ "blob_id": "ac6d0f40468c7cf6612cb2da525440da4ea2547f", "branch_name": "refs/heads/master", "committer_date": 1557900860000, "content_id": "d60c73b5156220e7261de7c74afeda3498e86549", "detected_licenses": [ "MIT" ], "directory_id": "1144021893c3ae9620ac4fae39cd3223003038a9", "extension": "py", "fi...
2.65625
stackv2
import json import logging class SymConfig: # initialize object by passing in path to config file # store configuration data in variable data def __init__(self, path_to_config): self.path_to_config = path_to_config self.data = {} # load RSA configuration variables into SymConfig data ...
65
52.45
121
17
780
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2c1b5ea10857abc7_581f048d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text.\nThis expression logs [sensitive data (passw...
[ 64 ]
[ null ]
[ 23 ]
[ 63 ]
2024-11-18T18:39:42.643775+00:00
1,565,498,383,000
6b88559791a30a3453a27a1e1264fee7ecee0769
2
{ "blob_id": "6b88559791a30a3453a27a1e1264fee7ecee0769", "branch_name": "refs/heads/master", "committer_date": 1565498383000, "content_id": "1dba67ea9ea31b98a41e31e11d19b057efbc8007", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "c2ae432b1598c0820c67188159bc94cbea937b5a", "extension": "p...
2.328125
stackv2
from dset.dataset import SequenceDataset import urllib import tarfile import os import sys import scipy if sys.version_info[0] >= 3: from urllib.request import urlretrieve else: from urllib import urlretrieve class HPatches_Dataset(SequenceDataset): def __init__(self,root_dir = './datasets/', download_f...
93
37.86
141
17
753
python
[{"finding_id": "codeql_py/tarslip_c553cd4e7c7be220_f3a77e15", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 37 ]
[ null ]
[ 13 ]
[ 16 ]
2024-11-18T18:39:54.320245+00:00
1,560,163,923,000
a5f0794eb0ec9e7accb4d6176600669b391ecd0c
2
{ "blob_id": "a5f0794eb0ec9e7accb4d6176600669b391ecd0c", "branch_name": "refs/heads/master", "committer_date": 1560163923000, "content_id": "3e7ef733347c041041bf6816ad756ef0d2bdaf8b", "detected_licenses": [ "MIT" ], "directory_id": "febb4062f35fee96e9318bf60b5353b7125f85f2", "extension": "py", "fi...
2.421875
stackv2
"""Server exposing endpoints for uploading and downloading tracks, extracting their encodings and returning the mapped visual parameters """ import data_processor as dp import train import models import mapping_utils import commons import fma_utils from flask import Flask, request, jsonify, send_file from flask_cors ...
189
33.98
111
19
1,489
python
[{"finding_id": "codeql_py/log-injection_d14756f7aa78c04e_766b4747", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 168 ]
[ null ]
[ 37 ]
[ 87 ]
2024-11-18T18:40:07.764282+00:00
1,509,466,869,000
256bbd6a2a237cfd15e88fbacfb9444a9f69e812
2
{ "blob_id": "256bbd6a2a237cfd15e88fbacfb9444a9f69e812", "branch_name": "refs/heads/master", "committer_date": 1509466869000, "content_id": "f0aaf46545b98abe2f8bd61fd7357ffb2f440aef", "detected_licenses": [ "MIT" ], "directory_id": "63e8e9ecb75436e5be1006c2acd275ad32234487", "extension": "py", "fi...
2.4375
stackv2
import os import datetime from flask import Flask, request, redirect, url_for, flash from flask_cors import CORS from werkzeug import secure_filename import httplib2 from apiclient import discovery from apiclient.http import MediaFileUpload from oauth2client import client from oauth2client import tools from oauth2c...
165
31.12
111
17
1,215
python
[{"finding_id": "codeql_py/flask-debug_ca64272fb08024ec_57d80f9f", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-601", "CWE-601" ]
[ "py/flask-debug", "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 165, 96, 102 ]
[ null, null, null ]
[ 5, 29, 29 ]
[ 51, 40, 40 ]
2024-11-18T20:52:23.129303+00:00
1,395,677,957,000
949335e22a31b7a731d8d2efcaeea1a6e4c1a097
3
{ "blob_id": "949335e22a31b7a731d8d2efcaeea1a6e4c1a097", "branch_name": "refs/heads/master", "committer_date": 1395677957000, "content_id": "6996073737f255d98044c1f18ea2df9ad53d0a1d", "detected_licenses": [ "Apache-2.0" ], "directory_id": "b85c8edaf0d4edbc4ce820f19c9ecc7abcb2e3bc", "extension": "py"...
2.890625
stackv2
#!/usr/bin/env python2.7 # name: 399crypto_analysis.py # author: Chad Hobbs # created: 140322 # # description: ## import os from Crypto.Cipher import DES3 from Crypto import Random # ---------------------------------------------------------------------------------------- # Function Name: encrypt_file(in_filen...
72
33.71
90
21
567
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_2e06ff0db354b1d4_d2e7dd0b", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The cryptographic algorithm DES3](1) is broken or weak, and should not be used.", "...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[The cryptographic algorithm DES3](1) is broken or weak, and should not be used.", "[The cryptographic algorithm DES3](1) is broken or weak, and should not be used." ]
[ 30, 47 ]
[ null, null ]
[ 32, 32 ]
[ 51, 51 ]
2024-11-18T20:52:23.894407+00:00
1,558,322,037,000
326bd4728631f446cc1b120a9783d781353a95d7
2
{ "blob_id": "326bd4728631f446cc1b120a9783d781353a95d7", "branch_name": "refs/heads/master", "committer_date": 1558322037000, "content_id": "b02da6b22c198180c7bd702f2d43ca0deac4efda", "detected_licenses": [ "MIT" ], "directory_id": "1f353b89eb4280a9bce874f8c411983a2f7e637d", "extension": "py", "fi...
2.4375
stackv2
# -*- coding: utf-8 -*- import scrapy from mobile_phone.items import MobilePhoneItem class HonorSpider(scrapy.Spider): name = 'honor' allowed_domains = ['www.mobilephonesspecs.com'] start_urls = ['https://www.mobilephonesspecs.com/'] temp_url = 'http://www.mobilephonesspecs.com/{}/page/{}' page =...
49
37
111
18
410
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_387624ebd5977a38_0de62704", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 48 ]
[ null ]
[ 15 ]
[ 19 ]
2024-11-18T18:47:02.575853+00:00
1,552,635,401,000
4f6361a1daddd0f2016c91d8dfe446fa2ca7e701
2
{ "blob_id": "4f6361a1daddd0f2016c91d8dfe446fa2ca7e701", "branch_name": "refs/heads/master", "committer_date": 1552635401000, "content_id": "36637b8c3cf0cf32f7280ef642bb8479b7358fd1", "detected_licenses": [ "MIT" ], "directory_id": "220647ab931701baf7f55a0b6bb560a546a95d0a", "extension": "py", "fi...
2.34375
stackv2
# -*- coding: utf-8 -*- import requests import json from xml.etree import ElementTree import mashery_api debug = False def get(url, headers, payload = None, ssl = False): if payload: if not "?" in url: parameters = "?" elif url[-1] != "&": parameters = "&" else: parameters = "" for k, v in payload...
123
20.15
74
14
781
python
[{"finding_id": "codeql_py/request-without-cert-validation_46d177fb792a2ce0_9584d1b7", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1) by [this value](2).", "This request may run without certificate validation because [it is disabled](1) by [this value](2)." ]
[ 33, 98 ]
[ null, null ]
[ 8, 8 ]
[ 58, 61 ]
2024-11-18T19:10:00.202081+00:00
1,604,186,708,000
c05f3603622d3c9548a219d5561bd29d9291b253
2
{ "blob_id": "c05f3603622d3c9548a219d5561bd29d9291b253", "branch_name": "refs/heads/main", "committer_date": 1604186708000, "content_id": "189b5108cb0f255ece0a85a23f5f38d081d0d0b7", "detected_licenses": [ "Apache-2.0" ], "directory_id": "b042ac9e0604aef7a15c712ad4562387df16fffb", "extension": "py", ...
2.375
stackv2
#!/usr/bin/env python3 from flask import Flask from flask import render_template from flask import make_response from flask import request app = Flask(__name__) @app.route('/') def start(): id = request.cookies.get('userID') allowed = False if id is None: id = '0' elif id == '1': allo...
26
18.88
72
12
129
python
[{"finding_id": "codeql_py/insecure-cookie_9fbb7e986017239d_4240adcf", "tool_name": "codeql", "rule_id": "py/insecure-cookie", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Cookie is added to response without the 'secure' flag being set.", "remediation": "", "location": {"file_path"...
3
true
[ "CWE-614", "CWE-020", "CWE-1004" ]
[ "py/insecure-cookie", "py/cookie-injection", "py/client-exposed-cookie" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cookie is added to response without the 'secure' flag being set.", "Cookie is constructed from a [user-supplied input](1).", "Sensitive server cookie is set without HttpOnly flag." ]
[ 20, 20, 20 ]
[ null, null, null ]
[ 5, 31, 5 ]
[ 34, 33, 34 ]
2024-11-18T20:15:51.125721+00:00
1,621,670,522,000
df623c6564512110e207f7f889faa8bae1e23127
3
{ "blob_id": "df623c6564512110e207f7f889faa8bae1e23127", "branch_name": "refs/heads/master", "committer_date": 1621670522000, "content_id": "e91272d07b1945bcc7b1bbb7c90969df786c1722", "detected_licenses": [ "MIT" ], "directory_id": "6c42c62775e2edacf5786e00345d63c3d8f179b1", "extension": "py", "fi...
3.09375
stackv2
#!/usr/bin/env python3 import sys import re from collections import OrderedDict import unicodedata # Modified from https://stackoverflow.com/a/49146722/4327513 # This isn't a perfect solution, but it just has to catch all the emoji in the input data blacklist_unicode = re.compile(r'[' u'£€' u'\U0001F600-\U000...
129
30.26
136
23
1,145
python
[{"finding_id": "codeql_py/overly-large-range_01d4b194ddf3572e_738f7e75", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "remediatio...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class." ]
[ 12, 12 ]
[ null, null ]
[ 7, 10 ]
[ 11, 14 ]
2024-11-18T19:38:17.635218+00:00
1,609,198,474,000
8676f8f859de78ea82be24d15fe9e242af544740
3
{ "blob_id": "8676f8f859de78ea82be24d15fe9e242af544740", "branch_name": "refs/heads/main", "committer_date": 1609198474000, "content_id": "a44b286d99631bbfafe01c2ac14908334fa06817", "detected_licenses": [ "MIT" ], "directory_id": "7d79e6e08c56071516b55a01761fd8b30077cb13", "extension": "py", "file...
2.671875
stackv2
from typing import List, \ Tuple from common.file_reader import FileReader from day_2_tobogan.old_policy import OldPolicy def count_valid_password(registry: List[Tuple[OldPolicy, str]]) -> int: return [line[0].is_password_valid(line[1]) for line in registry].count(True) if __name__ == '__main__': file_...
17
29.94
80
12
119
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5fcabdd9ad85f4b6_2ad0828a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 17 ]
[ null ]
[ 11 ]
[ 48 ]
2024-11-18T19:38:21.368592+00:00
1,551,561,129,000
18f707bb80e2f4b3124be8e038eed1a4c4b011f1
2
{ "blob_id": "18f707bb80e2f4b3124be8e038eed1a4c4b011f1", "branch_name": "refs/heads/master", "committer_date": 1551561129000, "content_id": "78856c56448bd02653ce0a759e16c2eda2eb4082", "detected_licenses": [ "MIT" ], "directory_id": "938ecdd3b93d5ceeaff9f34e018b6365cc933d7a", "extension": "py", "fi...
2.4375
stackv2
import flickr_api import codecs import os import subprocess # TODO: Figure out how to download videos. Sometimes it downloads as a jpg? sometimes it fails? # Ex: edrabbit, Stupid brush turkey, Video Original, http://www.flickr.com/photos/77866964@N00/8253619402 # IOError: [Errno 2] No such file or directory: u'saved/e...
149
36.34
149
15
1,491
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_040feedf33de5944_6c229662", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.", "This expression stores [sensitive data (secret)](1) as clear text." ]
[ 102, 104 ]
[ null, null ]
[ 18, 18 ]
[ 44, 50 ]
2024-11-18T19:38:37.733973+00:00
1,515,186,149,000
0a85e564cd8acd41bd9d91c756994c0fe550e6d3
3
{ "blob_id": "0a85e564cd8acd41bd9d91c756994c0fe550e6d3", "branch_name": "refs/heads/master", "committer_date": 1515186149000, "content_id": "b846c0efcc8c45a6867262094ca55c5c1b3f733b", "detected_licenses": [ "Apache-2.0" ], "directory_id": "46c20b80f9a3d603a3bef24dc589fc74c3cc25f1", "extension": "py"...
2.734375
stackv2
import requests from bs4 import BeautifulSoup import re import js class Quora_Crawler(): ''' basic crawler ''' def __init__(self, url, option="print_data_out"): ''' initialize the crawler ''' self.option = option self.url = url self.header = {} ...
130
33.38
112
17
995
python
[{"finding_id": "codeql_py/request-without-cert-validation_7f0f1f1ce71ac751_4af1e1bd", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 32 ]
[ 33 ]
[ 17 ]
[ 64 ]
2024-11-18T19:38:38.631022+00:00
1,442,218,338,000
2e4cfd401dd4fcef1ba40c4a9b93cca405baa7c2
3
{ "blob_id": "2e4cfd401dd4fcef1ba40c4a9b93cca405baa7c2", "branch_name": "refs/heads/master", "committer_date": 1442218338000, "content_id": "94fbbf78290c655ee97ce29855c95ad20071d0f7", "detected_licenses": [ "MIT" ], "directory_id": "d0caa9d4022e2680034778f30472ba2b52376a86", "extension": "py", "fi...
2.59375
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- """ Decorators for API input validation Created by: Rui Carmo (https://github.com/rcarmo) """ import os, sys, re, functools, logging from bottle import request, abort from utils.netstats import valid_ip_address, valid_mac_address log = logging.getLogger() def valid_iden...
55
31.51
87
17
417
python
[{"finding_id": "codeql_py/log-injection_cdceeaf489b053a1_b2ab88ca", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 50 ]
[ null ]
[ 23 ]
[ 74 ]
2024-11-18T20:10:37.738201+00:00
1,622,834,554,000
f84f485e086c117fa7eac33610dd374a17728418
3
{ "blob_id": "f84f485e086c117fa7eac33610dd374a17728418", "branch_name": "refs/heads/main", "committer_date": 1622834554000, "content_id": "46cd60ca6cb849a45643a6b600f6dc8de86087a9", "detected_licenses": [ "Apache-2.0" ], "directory_id": "8fb9b99e5f05ffdc1e690bcc3bdcb6bcad4ec077", "extension": "py", ...
2.546875
stackv2
import pickle import os import glob from dotmap import DotMap import matplotlib.pyplot as plt from jinja2 import Environment, FileSystemLoader import pandas as pd import requests import uuid from weasyprint import HTML def draw_matrix(data, norm = False): if norm: v_bounds = {'vmin' : -1, 'vmax': 1} ...
97
28.92
125
12
785
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_0c04b5f8a675b848_735885f7", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 78 ]
[ null ]
[ 11 ]
[ 52 ]
2024-11-18T20:26:24.816141+00:00
1,440,022,382,000
ce25d4896f99bf5d4b9d3e431b25718c27f71c30
2
{ "blob_id": "ce25d4896f99bf5d4b9d3e431b25718c27f71c30", "branch_name": "refs/heads/master", "committer_date": 1440022382000, "content_id": "12a2050f515b8f12b6413e71f32f1740e9ab5e9d", "detected_licenses": [ "MIT" ], "directory_id": "8d7d9891dd8a3985ae6ae1de93d04cd4915a4529", "extension": "py", "fi...
2.375
stackv2
import tornado.web from tornado.log import app_log import tornado.escape import pprint import os import json from tinydb import TinyDB, where class BaseHandler(tornado.web.RequestHandler): # # Base Handler for the Controllers # def get_current_user(self): return self.get_secure_cookie("logi...
103
34.39
121
20
778
python
[{"finding_id": "codeql_py/reflective-xss_7a1ea1bfd2b06ef8_a1436ae2", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 30, 40 ]
[ null, null ]
[ 20, 20 ]
[ 74, 67 ]
2024-11-18T20:26:33.896915+00:00
1,536,056,667,000
bef563b0530d5645d2d93f6c9dbe8f8731884dd8
3
{ "blob_id": "bef563b0530d5645d2d93f6c9dbe8f8731884dd8", "branch_name": "refs/heads/master", "committer_date": 1536056667000, "content_id": "cedf652b67bd14f18c746bb52fded8b9b352cab8", "detected_licenses": [ "MIT" ], "directory_id": "6745cbb726a1a783b95d6a7360e466dcfe6a7883", "extension": "py", "fi...
2.921875
stackv2
# from app import app import urllib.request,json from .models import Source from .models import Article # getting the api key apiKey = None #getting the source base urlli base_url = None #getting the article url articleBase_url = None def configure_request(app): global apiKey,base_url,articleBase_url apiKey...
108
29.06
96
12
654
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_efce58b0e8b83179_ba7cc285", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 69 ]
[ null ]
[ 11 ]
[ 26 ]
2024-11-18T20:26:38.341886+00:00
1,606,383,273,000
1b1b024a3cc62c4a7d088b55bd070defac9e82c1
2
{ "blob_id": "1b1b024a3cc62c4a7d088b55bd070defac9e82c1", "branch_name": "refs/heads/master", "committer_date": 1606383300000, "content_id": "ab0be7f895ff3df0f810d8d69f7df9453f4e66c6", "detected_licenses": [ "MIT" ], "directory_id": "c21bc9e4a4f58493cf71de96b353da376d79ab8d", "extension": "py", "fi...
2.375
stackv2
import json import base64 from urllib.parse import quote_from_bytes, unquote, urlunparse, urlparse, urlencode, parse_qs from django.conf import settings from django.core.paginator import InvalidPage from rest_framework import pagination, serializers from rest_framework.exceptions import NotFound from rest_framework.re...
490
31.48
114
21
3,751
python
[{"finding_id": "codeql_py/stack-trace-exposure_9db989261aaee72a_01a5b3de", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 425 ]
[ null ]
[ 28 ]
[ 31 ]
2024-11-18T20:26:49.091242+00:00
1,599,148,415,000
87fb3dfa7370f56379c886ea51ad303c335be3b7
3
{ "blob_id": "87fb3dfa7370f56379c886ea51ad303c335be3b7", "branch_name": "refs/heads/master", "committer_date": 1599148415000, "content_id": "7e8cfff83f74a7fe0376a7c369f029a71beed571", "detected_licenses": [ "MIT" ], "directory_id": "871846247c7dc797eeeaf87928a7b88be6e04f88", "extension": "py", "fi...
2.703125
stackv2
#!/usr/bin/python3 """ # Author: Scott Chubb scott.chubb@netapp.com # Written for Python 3.4 and above # No warranty is offered, use at your own risk. While these scripts have # been tested in lab situations, all use cases cannot be accounted for. # This script connects to a cluster or node and does some basic error...
85
41.16
91
20
735
python
[{"finding_id": "codeql_py/request-without-cert-validation_fd88f0a9bd267f73_54ba7acf", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 22 ]
[ 26 ]
[ 20 ]
[ 50 ]
2024-11-18T20:26:55.789262+00:00
1,687,966,427,000
df604b338fa6b7d4ab06aef1632e3f5d12d8d184
3
{ "blob_id": "df604b338fa6b7d4ab06aef1632e3f5d12d8d184", "branch_name": "refs/heads/master", "committer_date": 1687966427000, "content_id": "a6819e17d571e5f436ed78c6aab455e4919cf8bc", "detected_licenses": [ "MIT" ], "directory_id": "50203b4a349dcb2ed1e72c9f5463d84db8a6e983", "extension": "py", "fi...
2.640625
stackv2
""" api_get_namespace_metric_count.py """ import logging from flask import request from functions.metrics.get_namespace_metric_count import get_namespace_metric_count # @added 20230131 - Feature #4838: functions.metrics.get_namespace_metric.count # Task #2732: Prometheus to Skyline # ...
55
41.05
128
16
499
python
[{"finding_id": "codeql_py/log-injection_c58bf35b996843ba_1f9c47d0", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 32 ]
[ null ]
[ 29 ]
[ 100 ]
2024-11-18T20:26:59.551257+00:00
1,596,113,560,000
3032b4be5c73d15d689024c73f51675766b20892
3
{ "blob_id": "3032b4be5c73d15d689024c73f51675766b20892", "branch_name": "refs/heads/master", "committer_date": 1596113560000, "content_id": "e9d820ef37244ac164350795e848bab5b7fb0b65", "detected_licenses": [ "MIT" ], "directory_id": "feeacdbbb7429b8178b2cccc12765c43a40ff9e6", "extension": "py", "fi...
2.671875
stackv2
import secrets import getpass import os import hashlib from appdirs import user_data_dir from permon import config data_dir = user_data_dir('permon', 'bminixhofer') secret_path = os.path.join(data_dir, 'SECRET_KEY') def get_secret_key(): """ Get the secret key. This key is created once and stays the same aft...
48
24.62
79
14
264
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_82a0406483232dcf_d2fd116f", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e...
[ 30 ]
[ null ]
[ 27 ]
[ 51 ]
2024-11-18T20:27:01.853750+00:00
1,583,759,489,000
8c8f1c5b369b8a745eb6be73236348e401d9eeab
2
{ "blob_id": "8c8f1c5b369b8a745eb6be73236348e401d9eeab", "branch_name": "refs/heads/master", "committer_date": 1583759489000, "content_id": "fe511e184d91ee5f4cd9660d9d371bf7ddf4b31e", "detected_licenses": [ "Apache-2.0" ], "directory_id": "37829728f3727af6e202984402727463eb8b5239", "extension": "py"...
2.328125
stackv2
from jinja2 import Environment, FileSystemLoader import os import sys def check_dir(dir_path): """Get directory path to overrides.""" dir = dir_path if dir == '.': dir = os.getcwd() if not os.path.exists(dir): print("directory does not exist, exiting") os._exit(1) return di...
48
33.42
76
13
363
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_6c8ac9d91a0a7f20_3b3149af", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 22 ]
[ 24 ]
[ 11 ]
[ 42 ]
2024-11-18T20:52:09.636415+00:00
1,501,770,534,000
6507125b83d0d85ea4f002ef47f70403616088b6
3
{ "blob_id": "6507125b83d0d85ea4f002ef47f70403616088b6", "branch_name": "refs/heads/master", "committer_date": 1501770534000, "content_id": "8e3f6007cd6799daff854fdb168db51791d43b99", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "7fefde83f43e35ddcddceb552e2d63d0df4c2bf5", "extension": "p...
2.640625
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- # ****************************************************************************** # Argon Design Ltd. Project P9000 Argon # (c) Copyright 2017 Argon Design Ltd. All rights reserved. # # Module : maybot # Author : Steve Barlow # $Id: maybot.py 18334 2017-06-18 18:58:50Z sjb $...
67
33.81
103
15
575
python
[{"finding_id": "codeql_py/log-injection_5f825ad4beb6c922_08b6a31b", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 43 ]
[ null ]
[ 21 ]
[ 50 ]
2024-11-18T20:52:13.405144+00:00
1,521,400,542,000
2813bffde704cc2ffccc9eecc46d8e27f8ec9f81
3
{ "blob_id": "2813bffde704cc2ffccc9eecc46d8e27f8ec9f81", "branch_name": "refs/heads/main", "committer_date": 1521400542000, "content_id": "1ed92e245ade02ebdb144f63d354479bddfb9a0b", "detected_licenses": [ "MIT" ], "directory_id": "f8de8621cd04799367979681d9ce8786482cab2f", "extension": "py", "file...
3.1875
stackv2
import argparse import itertools import logging import multiprocessing import random def get_response(guess, secret): bulls, cows = 0, 0 for g, s in zip(guess, secret): if g == s: bulls += 1 elif g in secret: cows += 1 return (bulls, cows) _solver_classes = set() class SolverRegistry(typ...
170
26.58
79
15
1,137
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0a8a9f18d7527d29_e1dbe876", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secre...
[ 68, 142, 144 ]
[ null, null, null ]
[ 39, 38, 41 ]
[ 45, 51, 52 ]
2024-11-18T20:52:26.563222+00:00
1,572,065,366,000
f9b732aac1f7222ccc7e975e9974ef1918abe0e0
2
{ "blob_id": "f9b732aac1f7222ccc7e975e9974ef1918abe0e0", "branch_name": "refs/heads/master", "committer_date": 1572065366000, "content_id": "429424f0e86d65bf64f36a40533d7bbfbfebdd7c", "detected_licenses": [ "MIT" ], "directory_id": "62d1e0b8fefb9183307f347b3aacc1475383823c", "extension": "py", "fi...
2.484375
stackv2
# The MIT License (MIT) # # Permission is hereby granted, free of charge, to any person obtaining a copy # of this software and associated documentation files (the "Software"), to deal # in the Software without restriction, including without limitation the rights # to use, copy, modify, merge, publish, distribute, subl...
111
32.31
118
18
872
python
[{"finding_id": "codeql_py/tarslip_3ed824bd24289205_02409064", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 36 ]
[ null ]
[ 9 ]
[ 12 ]
2024-11-18T20:52:38.548048+00:00
1,623,642,098,000
1e03257c3a67707e11cf9c4f1029fc7acfd3f491
2
{ "blob_id": "1e03257c3a67707e11cf9c4f1029fc7acfd3f491", "branch_name": "refs/heads/main", "committer_date": 1623642098000, "content_id": "219a35970f890e4ebc7989fadcf88dbb0dcbd7de", "detected_licenses": [ "CC0-1.0" ], "directory_id": "803a037da8a09b1698d7bc5a28bae3b923257fbc", "extension": "py", "...
2.40625
stackv2
from sys import displayhook import requests import xml.etree.ElementTree as ET from parametros import gho_ind from datetime import datetime # Se utilizó código de respuestas del siguiente link: https://stackoverflow.com/questions/29810572/save-xml-response-from-get-call-using-python/29810645 def get_country_file(coun...
104
35.43
152
18
948
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a55c00bc8266e2e9_cee34b46", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 53, 84 ]
[ null, null ]
[ 19, 23 ]
[ 35, 39 ]
2024-11-18T20:52:55.069972+00:00
1,492,701,434,000
169f4db8023c8190f39980b0a91cb2cae8f27d58
3
{ "blob_id": "169f4db8023c8190f39980b0a91cb2cae8f27d58", "branch_name": "refs/heads/master", "committer_date": 1492701434000, "content_id": "8e6e5c8effd59b50eae90a707f7cad204778cc04", "detected_licenses": [ "MIT" ], "directory_id": "8d6038a6d22c14803ead7cd9f65c703b5a6894b1", "extension": "py", "fi...
2.71875
stackv2
# basic CAS. An extension could use multiple disks + redis and manage # redundancy to make best effort use of all disk space. # TODO deal with: (in base class, NotImplementedError) # TODO scrub method could deal with one ref at a time to enable a web progress bar (be a Job) # TODO atomic writes (not that important) ...
227
29.04
93
18
1,565
python
[{"finding_id": "codeql_py/overly-permissive-file_42b03c33032c34f1_677d9d44", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
2
true
[ "CWE-732", "CWE-732" ]
[ "py/overly-permissive-file", "py/overly-permissive-file" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable.", "Overly permissive mask in chmod sets file to world readable." ]
[ 55, 69 ]
[ null, null ]
[ 9, 13 ]
[ 28, 32 ]
2024-11-18T19:14:27.393266+00:00
1,357,624,768,000
833396102211b84056104efcdf2becfd1e4b6309
3
{ "blob_id": "833396102211b84056104efcdf2becfd1e4b6309", "branch_name": "refs/heads/master", "committer_date": 1357624768000, "content_id": "58e95756263119730b87d4350fd5b88453160f64", "detected_licenses": [ "Apache-2.0" ], "directory_id": "a81956301f80a7f2aee1d7264de47c7390924198", "extension": "py"...
2.640625
stackv2
# -*- coding: utf-8 -*- """ heso.model ~~~~~~~~~~ Implements the model. :copyright: (c) 2011 lanius :license: Apache License, Version 2.0, see LICENSE for more details. """ from hashlib import sha1 import os from uuid import uuid4 from peewee import Model, CharField, Q from database import data...
68
22.22
72
14
359
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_25b5af1049b65559_6105d61e", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expen...
[ 44, 58 ]
[ null, null ]
[ 21, 28 ]
[ 53, 61 ]
2024-11-18T19:14:32.894282+00:00
1,441,694,863,000
55d1e18f3c68107d02142bffa2de688b4fbf6deb
3
{ "blob_id": "55d1e18f3c68107d02142bffa2de688b4fbf6deb", "branch_name": "refs/heads/master", "committer_date": 1441694863000, "content_id": "190c532aa20bf44d5c2f3c33d1f4d481d16f3157", "detected_licenses": [ "MIT" ], "directory_id": "aed12f37fe5cfc66d435290a0c0ff6a55dc3a447", "extension": "py", "fi...
3.25
stackv2
#!/usr/bin/env python """ The tiniest Nagios dashboard. Scrapes status.cgi, returns ANSI-colored host & service counts. Not guaranteed to work at all. For best chance of results, use url akin to https://myhost/nagios3/cgi-bin/status.cgi Sam Merwin, March 2014 smerwin@gmail.com """ import requests from random import...
111
27.12
80
14
808
python
[{"finding_id": "codeql_py/request-without-cert-validation_a54348d806022860_3f00c219", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 83 ]
[ null ]
[ 5 ]
[ 74 ]