added
stringlengths
32
32
created
int64
1,244B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.25
source
stringclasses
1 value
text
stringlengths
324
20.1k
num_lines
int64
16
598
avg_line_length
float64
15.1
58.3
max_line_length
int64
33
179
ast_depth
int64
8
39
length
int64
101
3.8k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.1k
265k
sast_codeql_findings_count
int64
1
45
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
45
rule_ids
listlengths
1
45
confidences
listlengths
1
45
severities
listlengths
1
45
messages
listlengths
1
45
line_starts
listlengths
1
45
line_ends
listlengths
1
45
column_starts
listlengths
1
45
column_ends
listlengths
1
45
2024-11-18T19:14:51.495513+00:00
1,615,286,196,000
178cad566f1b39bc87f28cdb5731479b269a8ed4
3
{ "blob_id": "178cad566f1b39bc87f28cdb5731479b269a8ed4", "branch_name": "refs/heads/master", "committer_date": 1615286282000, "content_id": "191a043d8ceae9a854fa53061cf7552abfedc7b9", "detected_licenses": [ "MIT" ], "directory_id": "b1a01db82cc5300d6bd0f37d72a9fbdba141c81e", "extension": "py", "fi...
2.609375
stackv2
#!/bin/python import dataclasses import json import subprocess import click CONFIG_FILE = "/root/Arduino/libraries/Airpixel/config.h" ARDUINO_NANO_33_IOT_FQBN = "arduino:samd:nano_33_iot" class NoDeviceError(Exception): pass def to_bytes(string: str) -> bytes: return bytes(string, "utf-8").decode("unicode...
217
25.66
87
15
1,486
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_a4f4bf7b752243dc_c8d1fe08", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 55, 193 ]
[ null, null ]
[ 21, 11 ]
[ 39, 29 ]
2024-11-18T19:27:40.847808+00:00
1,631,596,124,000
97d8eea1f3a89793e238b64bcf271c3a14307665
2
{ "blob_id": "97d8eea1f3a89793e238b64bcf271c3a14307665", "branch_name": "refs/heads/master", "committer_date": 1631596124000, "content_id": "340cb6c5c73328ad6d637efbc624b7fcb5b6cb32", "detected_licenses": [ "MIT" ], "directory_id": "f345029b0c629f5ae6326d8f636cf1f7a6940771", "extension": "py", "fi...
2.421875
stackv2
import json import logging import math import os from threading import Thread import requests from service.list_reader_service import load_identifier_list_of_type from utils import chunks alma_api_base_url = 'https://api-eu.hosted.exlibrisgroup.com/almaws/v1/' def update_portfolio_list(project): ht_numbers = l...
153
45.71
118
20
1,413
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_db34b696e63dda03_4111a3f3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
4
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 66, 86, 99, 150 ]
[ null, null, null, 151 ]
[ 26, 37, 38, 33 ]
[ 87, 111, 118, 115 ]
2024-11-18T19:27:51.438457+00:00
1,614,324,776,000
9a4073b24eed78d90d1d909761e5e84e562f1176
3
{ "blob_id": "9a4073b24eed78d90d1d909761e5e84e562f1176", "branch_name": "refs/heads/master", "committer_date": 1614324776000, "content_id": "962b57552cb34b0e02f8fe3b6ace80185c9fb7d8", "detected_licenses": [ "MIT" ], "directory_id": "e030f685f993741c04ec0f8fc1c4c82fb5936a1d", "extension": "py", "fi...
2.5625
stackv2
from aiohttp import web import requests import json class GiraService: def __init__(self, serverIp, token): self.serverIp = serverIp self.token = token self.valueCache = dict() def load_cache(self, dpUid): for uid in dpUid: if not uid in self.valueCache: ...
137
39.01
160
21
1,259
python
[{"finding_id": "codeql_py/request-without-cert-validation_2e61ce17e4af24cc_738b2b58", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
7
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 14, 34, 46, 59, 75, 116, 132 ]
[ null, null, null, null, null, null, 136 ]
[ 21, 9, 9, 13, 13, 9, 13 ]
[ 161, 147, 147, 151, 151, 147, 58 ]
2024-11-18T19:38:47.239480+00:00
1,606,574,628,000
c00ba0030d4f908f5a2cbf077e7dc938cd1d7885
2
{ "blob_id": "c00ba0030d4f908f5a2cbf077e7dc938cd1d7885", "branch_name": "refs/heads/master", "committer_date": 1606574628000, "content_id": "f66fa62174c62cf20d8206aba618ca293e5ed044", "detected_licenses": [ "Apache-2.0" ], "directory_id": "77bcfb148670ea7df08b2327617f247e21097df9", "extension": "py"...
2.46875
stackv2
from pathlib2 import Path import json import requests from urllib.parse import quote import aiohttp import asyncio import logging # 初始化日志配置 logger = logging.getLogger(__name__) logger.setLevel(logging.DEBUG) streamHandler = logging.StreamHandler() streamHandler.setLevel(logging.INFO) fileHandler = logging.FileHandler...
312
23.55
88
16
2,355
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_23d664e5288327f5_1a3db29c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
6
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensi...
[ 64, 95, 133, 167, 168, 250 ]
[ null, null, null, null, null, null ]
[ 13, 21, 21, 25, 25, 25 ]
[ 48, 74, 29, 31, 28, 31 ]
2024-11-18T19:38:49.045210+00:00
1,549,588,973,000
bc32633a905b672ec22eed6641f459c29632c308
2
{ "blob_id": "bc32633a905b672ec22eed6641f459c29632c308", "branch_name": "refs/heads/master", "committer_date": 1549588973000, "content_id": "f10ca91c9ab82e71a6cef9c3e9984a4cb860b76f", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "77e4efc20b1ddf775fb87c492df20015e181e4e5", "extension": "p...
2.421875
stackv2
# Copyright (c) 2018 Georgia Tech Research Corporation # Distributed under the terms of the BSD-3-Clause License """ IPython magics for Robot Framework """ import argparse from IPython import get_ipython from IPython.core.magic import Magics, cell_magic, magics_class from ..reporter import KernelReporter from ..runn...
81
29.77
87
18
561
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_80816bc7177a14fa_b4803c49", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 62 ]
[ null ]
[ 20 ]
[ 34 ]
2024-11-18T19:38:51.592111+00:00
1,589,906,108,000
33589364ba57aeec3df56eca7f51ee6a3600c82a
2
{ "blob_id": "33589364ba57aeec3df56eca7f51ee6a3600c82a", "branch_name": "refs/heads/master", "committer_date": 1589906108000, "content_id": "51f22a2a4ead577412fe3af6a38863dd3cac7891", "detected_licenses": [ "MIT" ], "directory_id": "e412262aecdafbf5f108048b4b1064e28fc8ae78", "extension": "py", "fi...
2.3125
stackv2
from stream import DataInputStream LAYER_TYPES = ('objects', 'doodads', 'paths') ANIM_LOOP_TYPES = ('contiguous', 'loop', 'reverse loop') ANIM_CURVE_TYPES = ('linear', 'sin', 'cos') ANIM_TYPES = ('X pos', 'Y pos', 'angle', 'X scale', 'Y scale', 'opacity') NODE_TYPES = ('passthrough', 'stop', 'level', 'change', 'world ...
184
30.11
133
21
2,026
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_5f3824dc76fcab5b_b9989409", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (secret)](1) as clear text.", "This expression stores [sensitive data (secret)](1) as clear text." ]
[ 178, 182 ]
[ null, null ]
[ 11, 11 ]
[ 15, 15 ]
2024-11-18T19:38:52.195193+00:00
1,592,585,681,000
a6618a6c07162f5fba9ff310f82aa673dde479f3
3
{ "blob_id": "a6618a6c07162f5fba9ff310f82aa673dde479f3", "branch_name": "refs/heads/master", "committer_date": 1592585681000, "content_id": "c2a046b74745d58ebe1ab13136e7db88990530f4", "detected_licenses": [ "MIT" ], "directory_id": "e91a2bfd9645f190c675f76ea721f35fe72127d3", "extension": "py", "fi...
2.578125
stackv2
from flask import Flask, render_template, request, redirect, url_for, flash, abort, session, jsonify import json import os.path from werkzeug.utils import secure_filename # to check if the file uploaded is safe or nor app = Flask(__name__) # name of module that is running flask app.secret_key = 'h23h4h3232njrn2jnjt5ng...
71
34.76
100
23
591
python
[{"finding_id": "codeql_py/flask-debug_ec86b3f07174f0f8_68058467", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-022" ]
[ "py/flask-debug", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1)." ]
[ 71, 33 ]
[ null, null ]
[ null, 20 ]
[ 20, 46 ]
2024-11-18T19:38:52.497122+00:00
1,665,503,317,000
88a6970f0b6bd52b6a5591a4ae15c5ffc7d00753
2
{ "blob_id": "88a6970f0b6bd52b6a5591a4ae15c5ffc7d00753", "branch_name": "refs/heads/master", "committer_date": 1665503317000, "content_id": "0ddd40cf3fcecdba09534d891cee85b1da3a6312", "detected_licenses": [ "Apache-2.0" ], "directory_id": "5dc2adf4afe339ac75671de07fcea0a513ac8385", "extension": "py"...
2.40625
stackv2
#! /bin/env python """ A service class for retrieving data from McM using an SSO cookie since it sits behind CERN SSO """ from builtins import str, object import json import os import pycurl import subprocess from io import BytesIO from WMCore.WMException import WMException class McMNoDataError(WMException): ...
122
29.14
104
15
895
python
[{"finding_id": "codeql_py/request-without-cert-validation_b474d2adada0b341_75f43969", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1) by [this value](2)." ]
[ 73 ]
[ null ]
[ 13 ]
[ 46 ]
2024-11-18T20:06:03.391969+00:00
1,621,320,007,000
0b4eaa3628a03a4821f8530cd1dee90df769273f
2
{ "blob_id": "0b4eaa3628a03a4821f8530cd1dee90df769273f", "branch_name": "refs/heads/master", "committer_date": 1621320007000, "content_id": "2fdfe1043fc43b1b696acef6ccfafced4c90c7b8", "detected_licenses": [ "Apache-2.0" ], "directory_id": "21a27683b63e22ef8001a1e7a8f7f76c8e3be04e", "extension": "py"...
2.4375
stackv2
"""General Utility Functions.""" import secrets import urllib.parse import aiohttp from aiohttp_session import get_session from aiohttp import web from aiocache import cached from aiocache.serializers import JsonSerializer from authlib.jose import jwt from authlib.jose.errors import MissingClaimError, InvalidClaimEr...
174
41.44
151
18
1,671
python
[{"finding_id": "codeql_py/stack-trace-exposure_98e4c661fe5bfef6_1dfb5dfa", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
6
true
[ "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information...
[ 37, 60, 149, 151, 153, 155 ]
[ null, null, null, null, null, null ]
[ 48, 48, 41, 41, 38, 38 ]
[ 78, 78, 98, 99, 118, 116 ]
2024-11-18T20:06:15.066877+00:00
1,623,356,903,000
cb96ff199e9adcb4551d986f2d86ad0202093048
3
{ "blob_id": "cb96ff199e9adcb4551d986f2d86ad0202093048", "branch_name": "refs/heads/main", "committer_date": 1623356903000, "content_id": "a3a78ca67cea49b1ee72230b5a598f16aeab7648", "detected_licenses": [ "MIT" ], "directory_id": "6db1592bbec71c1d9678ce52ac1c243e3f3a216b", "extension": "py", "file...
2.921875
stackv2
import pandas as pd import math as m data_path = "Assignment3_data/" df = pd.read_csv(data_path + 'titanic_clean.csv') df.set_index("PassengerId", inplace=True) df_sex_mean = df.groupby(['Sex']).mean() df_paid_most = df.nlargest(10,'Fare') df_ticket = df.groupby(['Ticket']) df_ticket.transform(lambda x: (sum(x) fo...
26
28.5
99
10
219
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f512ecfca140501b_48bd6771", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 24 ]
[ null ]
[ 7 ]
[ 18 ]
2024-11-18T20:06:18.362766+00:00
1,514,511,962,000
b1dc3257766e37571ca879763215f563c909c8a9
2
{ "blob_id": "b1dc3257766e37571ca879763215f563c909c8a9", "branch_name": "refs/heads/master", "committer_date": 1514511962000, "content_id": "db8f3d589c5d04a3ef525672fca7a64f19b53422", "detected_licenses": [ "MIT" ], "directory_id": "92b90789c8c3c27e8ebf13499fece7fd876ecf3e", "extension": "py", "fi...
2.390625
stackv2
#!/usr/bin/env python import json import logging from typing import List from flask import request, Response, Flask, abort import config from app import logic, ura app = Flask(__name__) # Use gunicorn logger gunicorn_error_logger = logging.getLogger('gunicorn.error') app.logger.handlers.extend(gunicorn_error_logge...
121
34.58
110
17
952
python
[{"finding_id": "codeql_py/stack-trace-exposure_752de59477ff6c41_f6d81d7c", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
6
true
[ "CWE-209", "CWE-215", "CWE-117", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/stack-trace-exposure", "py/flask-debug", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "HIGH", "HIGH", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-prov...
[ 112, 121, 32, 39, 47, 61 ]
[ null, null, null, null, null, null ]
[ 9, 5, 58, 61, 48, 26 ]
[ 28, 40, 67, 66, 53, 30 ]
2024-11-18T20:18:18.333447+00:00
1,578,839,878,000
1ba77576848cb49f7bcb0fc021d3a22a68408d0e
3
{ "blob_id": "1ba77576848cb49f7bcb0fc021d3a22a68408d0e", "branch_name": "refs/heads/master", "committer_date": 1578839878000, "content_id": "0711ffbc010ed94b709f120c64d510807486985e", "detected_licenses": [ "MIT" ], "directory_id": "1ebe19998b19fcda64c030f2ae783d31c084cb5a", "extension": "py", "fi...
2.953125
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- import hashlib from notebook.controller import NoteService class NoteBook(object): """NoteBook UI""" def __init__(self): self.controller = NoteService() self.choice = "" self.user = "" self.user_func() def exit_note(self): ...
215
30.35
82
14
1,416
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_ce5040605bb3690d_34f8d129", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.", "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally exp...
[ 60, 71 ]
[ null, null ]
[ 32, 32 ]
[ 40, 40 ]
2024-11-18T20:31:20.723233+00:00
1,636,359,180,000
fc54a4bd261c9fdba280750931b66fb4893610db
2
{ "blob_id": "fc54a4bd261c9fdba280750931b66fb4893610db", "branch_name": "refs/heads/main", "committer_date": 1636359180000, "content_id": "c397c5827064f0c77b9ec69e23fbf0bd33732e4f", "detected_licenses": [ "MIT" ], "directory_id": "4eacbdd3f0612968ae3e621f0a5053202591666e", "extension": "py", "file...
2.375
stackv2
from POIs.functions import pack_attributes import requests from bs4 import BeautifulSoup def scrape_BP(): source_url = "https://balticpetroleum.lt/baltic-petroleum-degalines" html_content = requests.get(source_url, headers = {'User-Agent': 'Mozilla/5.0'}).text websiteContent = BeautifulSoup(html_content, "...
55
32.49
103
19
469
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c3ab7ca49309eba2_bd32e7bc", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 35 ]
[ null ]
[ 7 ]
[ 55 ]
2024-11-18T20:31:26.774753+00:00
1,577,023,156,000
d7aa366fa463997a2a01341d812c2a214feee89c
3
{ "blob_id": "d7aa366fa463997a2a01341d812c2a214feee89c", "branch_name": "refs/heads/master", "committer_date": 1577023156000, "content_id": "961fda4f1ff17cb3f965f292e62ec0ce396dbd87", "detected_licenses": [ "MIT" ], "directory_id": "890844d4d519f5b4cab71bdd86c04ce808b5ca2e", "extension": "py", "fi...
2.84375
stackv2
from flask import Flask, request, make_response, session, redirect, url_for app = Flask(__name__) # 设置session必须设置key app.secret_key = 'Hao' @app.route('/') def hello_world(): user_id = request.cookies.get('user_id') return 'Hello World! %s ' % user_id # 处理上传的数据使用request,一定要使用post # request可以获得的data,file,me...
55
22.13
75
11
390
python
[{"finding_id": "codeql_py/insecure-cookie_69a23628675338d8_7625664a", "tool_name": "codeql", "rule_id": "py/insecure-cookie", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Cookie is added to response without the 'secure' flag being set.", "remediation": "", "location": {"file_path"...
3
true
[ "CWE-614", "CWE-1004", "CWE-079" ]
[ "py/insecure-cookie", "py/client-exposed-cookie", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cookie is added to response without the 'secure' flag being set.", "Sensitive server cookie is set without HttpOnly flag.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 28, 28, 11 ]
[ null, null, null ]
[ 5, 5, 12 ]
[ 51, 51, 40 ]
2024-11-18T20:43:21.877894+00:00
1,596,088,444,000
437e8578625d6dc710dfc94906a475cf22892724
3
{ "blob_id": "437e8578625d6dc710dfc94906a475cf22892724", "branch_name": "refs/heads/master", "committer_date": 1596088444000, "content_id": "f72d0142e44b378e8893afaa8b5bbafa3e81c8da", "detected_licenses": [ "MIT" ], "directory_id": "eafbb2b22962c818b730f555df2090530d4047dc", "extension": "py", "fi...
2.84375
stackv2
from smtplib import SMTP from email.mime.text import MIMEText from email.mime.multipart import MIMEMultipart from jinja2 import Environment, FileSystemLoader import os from_email = 'krbdashboard@outlook.com' password = 'ArushiSinghal' env = Environment( loader=FileSystemLoader('./templates/')) def get_contacts(...
87
24.97
71
14
487
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_797a9e04231cb90d_01411470", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 9 ]
[ 10 ]
[ 7 ]
[ 45 ]
2024-11-18T20:43:30.300239+00:00
1,618,615,445,000
ac1ac463559aac2da7a3191c2692dad0d4f65f09
3
{ "blob_id": "ac1ac463559aac2da7a3191c2692dad0d4f65f09", "branch_name": "refs/heads/master", "committer_date": 1618615445000, "content_id": "2101fb4c58a05de872efb76abe43aafac863b5a2", "detected_licenses": [ "MIT" ], "directory_id": "9f1721da639a11e55f1755365976531a4d0da713", "extension": "py", "fi...
2.734375
stackv2
import sys import pymysql import datetime import hashlib try: import Tkinter as tk except ImportError: import tkinter as tk try: import ttk py3 = False except ImportError: import tkinter.ttk as ttk py3 = True class ventana: def __init__(self, top=None): '''This class configures and ...
115
31.72
129
16
1,069
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_43f1fef3a448653c_0310a109", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 106 ]
[ null ]
[ 14 ]
[ 39 ]
2024-11-18T20:43:31.728952+00:00
1,616,947,138,000
9cba46eb19c88ba4d26a077c8b8cb03203c732ee
3
{ "blob_id": "9cba46eb19c88ba4d26a077c8b8cb03203c732ee", "branch_name": "refs/heads/master", "committer_date": 1616947138000, "content_id": "89ce16bfc90d4d8365d8e4f5bf36168c616e1a89", "detected_licenses": [ "MIT" ], "directory_id": "79fbf7a8eb4585dae49a9a8dc54e50acba6a0a89", "extension": "py", "fi...
2.515625
stackv2
import itertools import random from lxml import etree import os import json import urllib.error import urllib.parse import urllib.request from pyquery import PyQuery as pq from apiclient.discovery import build import requests from settings import * from utils import highlight_sentence, unique_list websterTree = etree...
269
30.93
170
20
2,071
python
[{"finding_id": "codeql_py/request-without-cert-validation_84efbb0753a8863a_11b1f2fb", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
3
true
[ "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 128, 163, 204 ]
[ 133, 164, 209 ]
[ 21, 20, 16 ]
[ 26, 73, 26 ]
2024-11-18T20:43:39.220490+00:00
1,693,598,230,000
5e95f0552fb08715dc4daef23a0ecea0469ad3a8
2
{ "blob_id": "5e95f0552fb08715dc4daef23a0ecea0469ad3a8", "branch_name": "refs/heads/master", "committer_date": 1693598230000, "content_id": "ff59147dc5819b5258f7ff91317b46ab3a7c1708", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "2a5483d51ffe40126844a7673ebfcec6c8ccda7a", "extension": "p...
2.453125
stackv2
from __future__ import absolute_import from __future__ import unicode_literals from jinja2 import Environment, FileSystemLoader def render_template(name, context, template_root): env = Environment(loader=FileSystemLoader(template_root)) return env.get_template(name).render(context) def timeago(tdelta): ...
49
25.55
67
11
371
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_fc193edd3ff54ea4_375b755f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 8 ]
[ null ]
[ 11 ]
[ 62 ]
2024-11-18T20:44:18.196492+00:00
1,560,368,786,000
0fa5e0e2e76bd665f5031315addb2991d3980977
3
{ "blob_id": "0fa5e0e2e76bd665f5031315addb2991d3980977", "branch_name": "refs/heads/master", "committer_date": 1560368786000, "content_id": "72b446e14816810d32ba0420738a724a520f1896", "detected_licenses": [ "MIT" ], "directory_id": "0c59fb4b295cbdb901f5bbb2fa10842f4ee26d11", "extension": "py", "fi...
2.5625
stackv2
from flask import request, render_template, jsonify from flask_cors import CORS from .models import User from .TorchModel import Net from index import app, db from sqlalchemy.exc import IntegrityError from .utils.auth import generate_token, verify_token import pandas as pd import numpy as np import tensorflow as tf imp...
305
35.92
120
18
2,720
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_442b1dbe9f34b208_b5a59ebd", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 182 ]
[ null ]
[ 11 ]
[ 17 ]
2024-11-18T20:57:35.011302+00:00
1,470,250,669,000
eee2898cf73c923650f5b946eb0a1ec695951b42
3
{ "blob_id": "eee2898cf73c923650f5b946eb0a1ec695951b42", "branch_name": "refs/heads/master", "committer_date": 1470250669000, "content_id": "43791a6bafbee627d8ca9652187f0c25518144e7", "detected_licenses": [ "MIT" ], "directory_id": "66e1fc7c2465b8b27255ae28c437989971607fbf", "extension": "py", "fi...
2.515625
stackv2
import os import hashlib import urllib import hmac import base64 import urlparse import datetime import requests import json import api from waypoints import waypoints_config from analisis import config class Segment: base_url = config.googlemaps['base_url'] client_id = config.googlemaps['client_id'] clie...
151
29.35
102
17
1,168
python
[{"finding_id": "codeql_py/request-without-cert-validation_8cdb070de6604a47_0d1c0db1", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 48 ]
[ null ]
[ 17 ]
[ 64 ]
2024-11-18T20:58:07.013497+00:00
1,600,754,228,000
76e7c7cc594072e1f7bc95b991cae3636c18f5a4
3
{ "blob_id": "76e7c7cc594072e1f7bc95b991cae3636c18f5a4", "branch_name": "refs/heads/main", "committer_date": 1600754228000, "content_id": "ada0cbb7af421ce1a2ac8643449d886134c23fea", "detected_licenses": [ "MIT" ], "directory_id": "460175a035dc59fe465eec8b2b43087f35f37748", "extension": "py", "file...
2.703125
stackv2
# Copyright (c) 2020 Wilhelm Shen. See LICENSE for details. """\ ======================================================== :mod:`slowdown.token` -- The python token implementation ======================================================== Example: >>> tokenizer = \\ ... AES_RC4( ... aes_key=Cryp...
257
31.16
73
16
1,871
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_46675ce0513231b3_6dffeac5", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The cryptographic algorithm ARC4](1) is broken or weak, and should not be used.", "...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[The cryptographic algorithm ARC4](1) is broken or weak, and should not be used.", "[The cryptographic algorithm ARC4](1) is broken or weak, and should not be used." ]
[ 182, 239 ]
[ null, null ]
[ 18, 26 ]
[ 44, 44 ]
2024-11-18T20:58:13.117931+00:00
1,541,181,505,000
aca18bb80d1e5bd74c059c90725665c971a221b6
3
{ "blob_id": "aca18bb80d1e5bd74c059c90725665c971a221b6", "branch_name": "refs/heads/master", "committer_date": 1541181505000, "content_id": "cb3bda9af422dd059b777be352f49cd06b88392c", "detected_licenses": [ "MIT", "ISC", "BSD-2-Clause" ], "directory_id": "e8204fd975a970071d19cc8133405740ad7f04...
2.875
stackv2
'''Handling of password input and printing passphrases (using ncurses)''' # Copyright (c) 2012-2016 Tom Willemse <tom@ryuslash.org> # Copyright (c) 2011-2018 Benjamin Althues <benjamin@babab.nl> # # Permission to use, copy, modify, and distribute this software for any # purpose with or without fee is hereby granted,...
162
31.54
77
20
1,162
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_cd20a8730feb44e1_70e5546e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 157, 159 ]
[ null, 160 ]
[ 27, 27 ]
[ 68, 66 ]
2024-11-18T20:58:13.978954+00:00
1,629,900,536,000
cd1c02971f4ec2a04c45a086112b0fe62ae3a2d0
3
{ "blob_id": "cd1c02971f4ec2a04c45a086112b0fe62ae3a2d0", "branch_name": "refs/heads/main", "committer_date": 1629900536000, "content_id": "90e9f257971a0cbd311cfb6da16ad8d5d00336bd", "detected_licenses": [ "MIT" ], "directory_id": "6f2fd86fdcff8e96e11245a17f74fa645e9583a3", "extension": "py", "file...
2.890625
stackv2
import ast from http.server import HTTPServer, BaseHTTPRequestHandler import xml.etree.ElementTree as ET import requests # Création de l'objet Server class Server(BaseHTTPRequestHandler): # Setup du headers def _set_headers(self): """ Fonction qui permet de setup le headers Nom fonction ...
193
42.07
117
27
1,669
python
[{"finding_id": "codeql_py/xml-bomb_484e2539cbabce78_dd6a05a3", "tool_name": "codeql", "rule_id": "py/xml-bomb", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "XML parsing depends on a [user-provided value](1) without guarding against uncontrolled entity expansion.", "remediatio...
1
true
[ "CWE-776" ]
[ "py/xml-bomb" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "XML parsing depends on a [user-provided value](1) without guarding against uncontrolled entity expansion." ]
[ 42 ]
[ null ]
[ 49 ]
[ 53 ]
2024-11-18T21:10:11.856575+00:00
1,465,392,868,000
9bbdab0b3118e281c8bd84b3add91c464aea4d6d
2
{ "blob_id": "9bbdab0b3118e281c8bd84b3add91c464aea4d6d", "branch_name": "refs/heads/master", "committer_date": 1654843787000, "content_id": "03488f5ed4950e3d4149175050f14f6cff25c3a8", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "a0773806514525e722a98c5a93dd7c06b619af54", "extension": "p...
2.46875
stackv2
# Copyright (c) 2010, 2011, Tomaž Muraus # All rights reserved. from face_client import FaceClient import json import csv import time client = FaceClient('88c2f662703642d99d67bce4400bbebf', 'd5d89a3b8a8c42dfafb94a19728a183d') # print response['photos'][0]['tags'][0]['attributes']['gender']['value'] # print response[...
52
33.87
102
22
475
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_caf77e8a536f0c82_5e8730b3", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.\nThis expression stores [sensitive data (private)](3) as clear text." ]
[ 41 ]
[ null ]
[ 32 ]
[ 45 ]
2024-11-18T21:10:17.654191+00:00
1,519,438,113,000
b6e6c404256d1b93fe08fb79b6784035306e6b6c
3
{ "blob_id": "b6e6c404256d1b93fe08fb79b6784035306e6b6c", "branch_name": "refs/heads/master", "committer_date": 1519438113000, "content_id": "ccbb572e29170faa803cb4e686ddfcb28c0789ca", "detected_licenses": [ "MIT" ], "directory_id": "88ce5f2bbd9cdda9a94b5ad84bc676af9b57caee", "extension": "py", "fi...
2.859375
stackv2
import base64 import glob import json from operator import itemgetter import os from jinja2 import Environment, FileSystemLoader from css_html_js_minify.js_minifier import js_minify_keep_comments from .utils import position_to_latLng from .mapelement import MapElement this_dir, _ = os.path.split(__file__) TEMPLATE_...
195
30.25
87
17
1,375
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_98098285885bf8b7_36dcc42f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 23 ]
[ null ]
[ 11 ]
[ 37 ]
2024-11-18T21:10:44.835054+00:00
1,494,857,555,000
7fdbda0bdbc9a5a802da240012c1c527c24cf7eb
2
{ "blob_id": "7fdbda0bdbc9a5a802da240012c1c527c24cf7eb", "branch_name": "refs/heads/master", "committer_date": 1494857555000, "content_id": "f9fcf8f811fa4c29cf3478ad55298e42183267ee", "detected_licenses": [ "MIT" ], "directory_id": "2d2a2e0463eff0c5042c25e7ab4adf164e86549d", "extension": "py", "fi...
2.34375
stackv2
import logging import sys import io import zmq from PIL import Image from flask import Flask from flask import render_template from flask import jsonify from flask import request from os import environ from zmq import ssh # initialize Flask web server app = Flask(__name__) app.logger.addHandler(logging.StreamHandler(...
50
28.66
108
12
349
python
[{"finding_id": "codeql_py/flask-debug_d89cd6da2d096cb3_262e51fc", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-117" ]
[ "py/flask-debug", "py/log-injection" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This log entry depends on a [user-provided value](1)." ]
[ 50, 37 ]
[ null, null ]
[ 3, 19 ]
[ 41, 103 ]
2024-11-18T21:10:44.881246+00:00
1,556,822,170,000
551d37b4e58768539524cc5a244e650814bb8879
3
{ "blob_id": "551d37b4e58768539524cc5a244e650814bb8879", "branch_name": "refs/heads/master", "committer_date": 1556822170000, "content_id": "66fd5f057016aac7c8517debc9915fc1fbab767f", "detected_licenses": [ "MIT" ], "directory_id": "df806489c1d28adc83e9fe62e98f042f85d8360a", "extension": "py", "fi...
2.828125
stackv2
import xlsxwriter, re from openpyxl import load_workbook from openpyxl.styles import Border, Side, PatternFill, Font, GradientFill, Alignment from IPEDSSEARCH import IPEDSSEARCH class Staff: name = "" gender = "" picture = "" dep = "" email = "" title = "" phone = "" #open xlsx file print('Loading file...') wb...
121
26.79
107
20
977
python
[{"finding_id": "codeql_py/overly-large-range_4467ea718c8062cd_f5e2dbcd", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[\\r\\u000e\\u000f\\u0010\\u0011\\u0012\\u0013\\u0014...
3
true
[ "CWE-020", "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[\\r\\u000e\\u000f\\u0010\\u0011\\u0012\\u0013\\u0014\\u001....", "Suspicious character range that is equivalent to \\[\\r\\u000e\\u000f\\u0010\\u0011\\u0012\\u0013\\u0014\\u001....", "Suspicious character range that is equivalent to \\[\\r\\u000e\\u000f\\u001...
[ 57, 57, 59 ]
[ null, null, null ]
[ 17, 71, 39 ]
[ 20, 74, 42 ]
2024-11-18T21:10:48.214264+00:00
1,450,617,220,000
9fe74844f0065bddb3131b49e7b00aaf94ba5f7b
2
{ "blob_id": "9fe74844f0065bddb3131b49e7b00aaf94ba5f7b", "branch_name": "refs/heads/master", "committer_date": 1450617220000, "content_id": "57d363e5f4840a350c7f51044fb30e57e1bf94eb", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "9cf81356eda225fe196cf863b2544d00a5b37dcd", "extension": "p...
2.46875
stackv2
# -*- coding: utf-8 -*- """ jinja_kit.core ~~~~~~~~~~~~~~ Core jinja_kit wrapper class :copyright: (c) 2009 by the Jinja Team. :copyright: (c) 2012 - 2013 by Alexandr Lispython (alex@obout.ru). :license: BSD, see LICENSE for more details. :github: http://github.com/Lispython/jinja-kit """ from itertools import chain...
162
30.39
85
18
984
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_fb64574bef4655aa_6015f3db", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 37 ]
[ 40 ]
[ 20 ]
[ 54 ]
2024-11-18T21:10:51.193975+00:00
1,622,930,580,000
491340e1666af0983dbf1ad51ce752c90b77ed92
2
{ "blob_id": "491340e1666af0983dbf1ad51ce752c90b77ed92", "branch_name": "refs/heads/main", "committer_date": 1622930580000, "content_id": "f55863a96641018d108e434905a0eb84a69ae145", "detected_licenses": [ "MIT" ], "directory_id": "8c966aaaaf3f653ba6df1b2f132a38f7cd001453", "extension": "py", "file...
2.453125
stackv2
from flask import Flask, request, jsonify, make_response from utils import * app = Flask(__name__) app.config['SECRET_KEY'] = get_secret_key() @app.route("/") def test(): return jsonify({"message": "Hello World"}) @app.route("/predict") @token_required def predict(): try: hardness, prod_rate, qual...
44
23.36
119
18
242
python
[{"finding_id": "codeql_py/stack-trace-exposure_c300c0fd2148fdff_ef455e23", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 24 ]
[ null ]
[ 38 ]
[ 57 ]
2024-11-18T21:11:08.495162+00:00
1,628,867,988,000
e4d298f92610891dc39a660f71c5917c371d9529
3
{ "blob_id": "e4d298f92610891dc39a660f71c5917c371d9529", "branch_name": "refs/heads/master", "committer_date": 1628867988000, "content_id": "c25aa75ad2a072e7f15907d23909c1e504599722", "detected_licenses": [ "MIT" ], "directory_id": "00d7e9321d418a2d9a607fb9376b862119f2bd4e", "extension": "py", "fi...
3.328125
stackv2
#!/usr/bin/env python from getpass import getpass from pbkdf2 import PBKDF2 from Crypto.Cipher import AES import os import base64 import pickle ### Settings ### saltSeed = 'mkhgts465wef4fwtdd' # MAKE THIS YOUR OWN RANDOM STRING PASSPHRASE_FILE = '/home/ken/secret.p' SECRETSDB_FILE = '/home/ken/secrets' PASSPHRASE_...
111
29.24
146
16
895
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_989fd378164a8434_bdaf8e60", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 86 ]
[ null ]
[ 17 ]
[ 45 ]
2024-11-18T21:11:10.528154+00:00
1,563,859,747,000
5c56de2f5413bd214c8f5a5c537c0515298323fd
3
{ "blob_id": "5c56de2f5413bd214c8f5a5c537c0515298323fd", "branch_name": "refs/heads/master", "committer_date": 1563859747000, "content_id": "b15cd84ea57ff5eaf76d532186d92319b777ce93", "detected_licenses": [ "MIT" ], "directory_id": "ce8f6e3be8129c4e5cfca30c7e307e82c6a187cf", "extension": "py", "fi...
2.828125
stackv2
from __future__ import print_function import requests import urllib from bs4 import BeautifulSoup #change to our dest-dir path = 'file/' image_src = [] src = [] url = 'https://people.cs.clemson.edu/~mark/3220.html' r = requests.get(url,verify=False) if r.status_code is 200: print("successfully access the website")...
38
26.5
69
17
288
python
[{"finding_id": "codeql_py/request-without-cert-validation_dc838f0ffaa741d4_10d3164b", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 11, 36 ]
[ null, null ]
[ 5, 16 ]
[ 35, 60 ]
2024-11-18T19:03:18.857255+00:00
1,614,024,804,000
56c1f62e3c91aad72278ca9f3bc9b5d47072d11d
2
{ "blob_id": "56c1f62e3c91aad72278ca9f3bc9b5d47072d11d", "branch_name": "refs/heads/main", "committer_date": 1614024804000, "content_id": "e48d7e0ef8e46628949cb26c99605f7d5ae74687", "detected_licenses": [ "MIT" ], "directory_id": "09b1a43a8cb32152c29c642ac0f84cd01e9feaa2", "extension": "py", "file...
2.34375
stackv2
from flask import Flask, Response import os import sys import traceback import json import yaml import logging application = Flask(__name__) def root_dir(): # pragma: no cover return os.path.abspath(os.path.dirname(__file__)) def get_file(filename): # pragma: no cover try: src = os.path.join(root_d...
27
22.11
53
12
153
python
[{"finding_id": "codeql_py/stack-trace-exposure_9adcd9cb486b7427_3e1bf3e3", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 24 ]
[ null ]
[ 21 ]
[ 28 ]
2024-11-18T19:03:27.725751+00:00
1,626,907,172,000
964992d1e8eaf36942cb2f4dc05363602cfd27e2
2
{ "blob_id": "964992d1e8eaf36942cb2f4dc05363602cfd27e2", "branch_name": "refs/heads/master", "committer_date": 1626907172000, "content_id": "2b25780dfc2c956ec7baf4ec1efeb245e1dbb928", "detected_licenses": [ "MIT" ], "directory_id": "7af209ea47ba82ca8f2cf1a7981690291779ea6f", "extension": "py", "fi...
2.40625
stackv2
from functools import partial import json from typing import Tuple, Iterable import os import os.path from geopy.geocoders import Bing from geopy.extra.rate_limiter import RateLimiter from geopy.point import Point from lac_covid19.geo.paths import DIR_DATA import lac_covid19.const as const import lac_covid19.current_...
88
33.08
79
17
738
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_51fbbd9291e155e9_bb6b7303", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 50 ]
[ null ]
[ 11 ]
[ 65 ]
2024-11-18T19:03:40.676992+00:00
1,534,794,830,000
ff931c2958179949459528dd525a01c6ae0157a4
4
{ "blob_id": "ff931c2958179949459528dd525a01c6ae0157a4", "branch_name": "refs/heads/master", "committer_date": 1534794830000, "content_id": "5bbc6eb4ab5e873a5f6be1e2091a39cdc184e521", "detected_licenses": [ "MIT" ], "directory_id": "8de48852ff0e12afca8f1cc3c6431ca40053df9b", "extension": "py", "fi...
4.28125
stackv2
#!/usr/bin/env python3 import random # Day1 # Hours in a year print(365 * 24) # Minutes ina decade print(10*365*24) # My age in a seconds print(27*365*24*60*60) # Andrea Visanoiu age print(48618000/365/24/60/60) #Day2 # --- #Day3 #Full name greeting first_name = input("What is your fist name? ") middle_name = input("...
143
23.29
87
14
1,056
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_32db605d820bc5aa_be7fb030", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 29 ]
[ null ]
[ 7 ]
[ 82 ]
2024-11-18T19:03:42.596925+00:00
1,402,785,245,000
0972a7710778f32cb1d68d49525080c3b4503568
3
{ "blob_id": "0972a7710778f32cb1d68d49525080c3b4503568", "branch_name": "refs/heads/master", "committer_date": 1402785245000, "content_id": "58fc10e9480bfa3fab44de92b6670d2dfd22482c", "detected_licenses": [ "MIT" ], "directory_id": "e291577cfc6c5a7464865bd538130e04c35cf29a", "extension": "py", "fi...
2.640625
stackv2
from abc import abstractmethod import urllib2 import urllib import hashlib import json from datetime import datetime import logging from controller.exceptions import NotConnectedError from model.File import File from environment import USER_AGENT class ServiceConnector: _endpoint = None def __init__(self, ...
122
28.75
108
18
754
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_2587ccd58962e616_684c2203", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi...
[ 80 ]
[ null ]
[ 33 ]
[ 47 ]
2024-11-18T19:28:36.150153+00:00
1,645,008,660,000
29351afd0014a77f246ccead9838e7bd085a57f1
3
{ "blob_id": "29351afd0014a77f246ccead9838e7bd085a57f1", "branch_name": "refs/heads/main", "committer_date": 1645008660000, "content_id": "5b779cae3528596e5f6d1a8ce49f60faf60a844b", "detected_licenses": [ "Apache-2.0" ], "directory_id": "374c3a629e2dcf24c2c5826e2d67a71ca52eb609", "extension": "py", ...
2.890625
stackv2
"""Utility functions for the Templator.""" import glob import importlib import json import os import shutil from collections import OrderedDict from contextlib import contextmanager from pathlib import Path from jinja2 import Environment, FileSystemLoader, Template from loguru import logger from pytemplator.constant...
220
32.7
98
21
1,488
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_0cad032533a9d675_a86c7269", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
4
true
[ "CWE-079", "CWE-079", "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false", "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially...
[ 67, 87, 123, 132 ]
[ null, null, 126, null ]
[ 25, 24, 21, 29 ]
[ 45, 48, 10, 47 ]
2024-11-18T19:28:58.748911+00:00
1,608,110,497,000
cbcf130e4488f0b6c682d1462af6e33c50ba75e6
2
{ "blob_id": "cbcf130e4488f0b6c682d1462af6e33c50ba75e6", "branch_name": "refs/heads/master", "committer_date": 1608208196000, "content_id": "9f13c100577208d6f9d436a485b9a64784e3c474", "detected_licenses": [ "Apache-2.0" ], "directory_id": "0f7d5fd644a426e6d66cde38ce20fb907b2cd4e9", "extension": "py"...
2.5
stackv2
import sys, json, asyncio from web3 import Web3 from configparser import ConfigParser from src.data_transfer.interledger import Interledger from src.data_transfer.ethereum import EthereumInitiator, EthereumResponder from src.data_transfer.ksi import KSIResponder # Helper function to read Ethereum related options fro...
238
31.42
114
13
1,777
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9af6a3506b13d57d_7ef53288", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 99, 140 ]
[ null, null ]
[ 11, 11 ]
[ 30, 30 ]
2024-11-18T19:29:01.959790+00:00
1,692,250,445,000
9673c9a8a1325d7e3704db9e67656e017708a516
3
{ "blob_id": "9673c9a8a1325d7e3704db9e67656e017708a516", "branch_name": "refs/heads/master", "committer_date": 1692250445000, "content_id": "502bba8cf51a1815548cce385d3b6c3b363617f4", "detected_licenses": [ "Apache-2.0", "BSD-3-Clause" ], "directory_id": "637c1fb7d20c6f6f0bcfdc398ce663b26a0c5629",...
2.5625
stackv2
#!/usr/bin/env python3 import hashlib from io import BytesIO import logging import socket import pycurl from common import DCOSAuth from lrucache import LRUCache logger = logging.getLogger('utils') # The maximum number of clashes to allow when assigning a port. MAX_CLASHES = 50 class ServicePortAssigner(object):...
437
31.57
79
20
3,295
python
[{"finding_id": "codeql_py/request-without-cert-validation_4f08cd9eec37647b_157a617f", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1) by [this value](2)." ]
[ 182 ]
[ null ]
[ 13 ]
[ 55 ]
2024-11-18T20:18:01.009347+00:00
1,636,391,227,000
81ee786dcf07bab7da44c798401bb913f2b93129
2
{ "blob_id": "81ee786dcf07bab7da44c798401bb913f2b93129", "branch_name": "refs/heads/main", "committer_date": 1636391227000, "content_id": "78d6e8e41e1cbd81cd550843a9d11e7bbbeab80d", "detected_licenses": [ "MIT" ], "directory_id": "f9e17a2fc63e7a9af107984aa60f4df943828949", "extension": "py", "file...
2.359375
stackv2
#!/usr/bin/env python3 ###################################################################### ## Author: Carl Schaefer, Smithsonian Institution Archives ###################################################################### import sys import os import re import db_access as dba import stop_watch import stat import dm...
152
37.7
79
19
1,181
python
[{"finding_id": "codeql_py/overly-permissive-file_58e4a497fdfbb448_4dedde61", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ...
2
true
[ "CWE-732", "CWE-732" ]
[ "py/overly-permissive-file", "py/overly-permissive-file" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world writable.", "Overly permissive mask in chmod sets file to world writable." ]
[ 35, 48 ]
[ null, null ]
[ 11, 7 ]
[ 34, 33 ]
2024-11-18T20:18:07.116031+00:00
1,445,024,035,000
4afd2f32ffdd6b5dcbb7069c9fed10a143f9b9e4
3
{ "blob_id": "4afd2f32ffdd6b5dcbb7069c9fed10a143f9b9e4", "branch_name": "refs/heads/master", "committer_date": 1445024035000, "content_id": "a4d227b1afae7a09b124eb1252dee6cf0ba27faf", "detected_licenses": [ "Apache-2.0" ], "directory_id": "2e1ce7dcfbad3efeed8e71ca372cba4814115274", "extension": "py"...
2.703125
stackv2
''' uFrameEventCollection: - Represents the latest attributes of the uframe endpoint. - Important methods: to_json(id=None): Reaches out to uframe and gets either the complete list of events, or if an id is provided, an individual object. from_json(): Prepares a JSON packet to be sent as...
97
37.06
123
18
774
python
[{"finding_id": "codeql_py/stack-trace-exposure_617a98526eb173a3_1995ee95", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 42 ]
[ null ]
[ 34 ]
[ 118 ]
2024-11-18T20:18:07.512059+00:00
1,604,610,460,000
031b9b7f7e3498a3ee74b1e671c78fe0f49360af
3
{ "blob_id": "031b9b7f7e3498a3ee74b1e671c78fe0f49360af", "branch_name": "refs/heads/main", "committer_date": 1604610460000, "content_id": "52ad539f3d62eec4a3e4c6ebf555340c3377bf19", "detected_licenses": [ "MIT" ], "directory_id": "5a5d5a76a14b0427148435a35adde137f5cb6ac6", "extension": "py", "file...
3.203125
stackv2
import os import sys import string ###### lettercounter = [dict.fromkeys(string.ascii_lowercase, 0) for i in range(8)] # *8 make shallow copies ###### if __name__ == "__main__": with open(os.path.join(sys.path[0],"input.txt"), "r") as f: instructrions = f.readlines() for line in instructrions: ...
21
35.33
105
15
200
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_db9236043e56ed8d_27c8ec8d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 20, 21 ]
[ null, null ]
[ 11, 11 ]
[ 50, 50 ]
2024-11-18T20:18:33.789091+00:00
1,590,784,692,000
80348c2dca3bb7c9d9d9de501c9c172179b0b914
2
{ "blob_id": "80348c2dca3bb7c9d9d9de501c9c172179b0b914", "branch_name": "refs/heads/master", "committer_date": 1590784692000, "content_id": "28f5fb405eb698352219761b1d49a529e4842161", "detected_licenses": [ "MIT" ], "directory_id": "c8299de994811f452f20dca010007abfca5d38e9", "extension": "py", "fi...
2.34375
stackv2
import sys import datetime import json import csv import os from os import path import numpy as np sys.path.append( path.dirname( path.dirname( path.dirname( path.abspath(__file__) ) ) ) ) from utils import loadConfig import utils import generator config = loadConfig.getConfig() def check_aggregates_directory(): ...
160
29.61
89
16
1,187
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_9cff85f692439222_b728da0c", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text." ]
[ 157 ]
[ null ]
[ 16 ]
[ 28 ]
2024-11-18T20:18:43.773765+00:00
1,615,141,494,000
62172141860741a5f154c5944a4f443e34611995
3
{ "blob_id": "62172141860741a5f154c5944a4f443e34611995", "branch_name": "refs/heads/master", "committer_date": 1615141494000, "content_id": "bba086aa6aa32dfb749a95773e40ef2718f642f2", "detected_licenses": [ "Apache-2.0" ], "directory_id": "2c7f3d16d89fa553fa5e700f345e417015a92b9b", "extension": "py"...
2.625
stackv2
""" recovery.py ============== Endpoints for operations related to matching users. All routes start with /api/recovery All incoming request parameters are wrapped in a JSON body. All outgoing response returns are wrapped in a JSON entry with key 'payload', like this: .. code-block:: { "error": "false", ...
122
28.17
96
17
755
python
[{"finding_id": "codeql_py/command-line-injection_2653556b8842f7d5_f4bdad56", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {...
1
true
[ "CWE-078" ]
[ "py/command-line-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This command line depends on a [user-provided value](1)." ]
[ 79 ]
[ null ]
[ 21 ]
[ 84 ]
2024-11-18T20:18:48.928049+00:00
1,586,225,646,000
cc8afc2226a0ecf2e76b716233d0070d90ddc104
3
{ "blob_id": "cc8afc2226a0ecf2e76b716233d0070d90ddc104", "branch_name": "refs/heads/master", "committer_date": 1586225646000, "content_id": "70713bc41bc80530a2b6e7874ead095501d01347", "detected_licenses": [ "MIT" ], "directory_id": "53eb4e334838d0bd3ad463a176b21b97811acb74", "extension": "py", "fi...
2.59375
stackv2
#! /usr/bin/env python # -*- coding:utf-8 -*- # Author: kenny.bai # Date: 2020/4/1 11:23 # File: main.py from selenium import webdriver from selenium.webdriver.support.select import Select from selenium.webdriver.common.action_chains import ActionChains from selenium.webdriver.common.keys import Keys import time impor...
191
34.35
105
18
1,829
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_90e401a00b8657b8_3098ded3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 52 ]
[ null ]
[ 70 ]
[ 85 ]
2024-11-18T20:29:35.654705+00:00
1,629,721,661,000
6afa71e2c951733ecd983e0619db3eef70c9d78f
3
{ "blob_id": "6afa71e2c951733ecd983e0619db3eef70c9d78f", "branch_name": "refs/heads/main", "committer_date": 1629721661000, "content_id": "ec455cb41229da8c8de6f2e99a83cd503e43cea1", "detected_licenses": [ "MIT" ], "directory_id": "49840b9c15292ec5558a6dc4b4cc9e7d00fde9e2", "extension": "py", "file...
2.609375
stackv2
# Original code from # https://riverkangg.github.io/크롤링/crawling-2naverCafe/ # Get appropriate chromedriver from # https://chromedriver.chromium.org/downloads from selenium import webdriver from paths import APP_PATH from scrapper.source.config.naver_cafe import NAVER_ID, NAVER_PASSWORD class NaverCafeScrapper: ...
51
29.29
148
12
436
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1ae6a70523fa5c89_2eb4c294", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 18 ]
[ null ]
[ 25 ]
[ 39 ]
2024-11-18T20:51:24.685157+00:00
1,581,779,975,000
a8bad918bbec91e1290c14840f93d1267c437427
2
{ "blob_id": "a8bad918bbec91e1290c14840f93d1267c437427", "branch_name": "refs/heads/master", "committer_date": 1581779975000, "content_id": "ca61d5fc14d39b7cbae847a0d577153ab7ee3d50", "detected_licenses": [ "MIT" ], "directory_id": "69a92c193f3a6061da04e544348be8bca9c114fa", "extension": "py", "fi...
2.421875
stackv2
from session import generateCredentials from flask import Flask, jsonify import requests app = Flask(__name__) devId = "" sessionId = "" def getSession(): return generateCredentials(devId, sessionId, "createsession").generate_session() # return the signature and timestamp def getSignature(method): return ge...
58
33.81
85
10
416
python
[{"finding_id": "codeql_py/partial-ssrf_845f9cf1e84af7c6_79093881", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depen...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depends on a [user-provided value](2).\nPart of the URL of this request depends on a [user-provided value](3).\nPart of the URL of this request depends on a [user-provided value](4).\nPart of the URL of this req...
[ 18 ]
[ 19 ]
[ 12 ]
[ 81 ]
2024-11-18T20:51:27.966026+00:00
1,619,204,701,000
f4670c1823902e7edfe9f84c769566df8c39862f
2
{ "blob_id": "f4670c1823902e7edfe9f84c769566df8c39862f", "branch_name": "refs/heads/master", "committer_date": 1619204701000, "content_id": "401e34576aa81451471858cd83a9486f59b30468", "detected_licenses": [ "MIT" ], "directory_id": "fc2267a644f6fbcba25bf49a95229d445488b12b", "extension": "py", "fi...
2.5
stackv2
#!/usr/bin/env python3 import jinja2 import sys import os import re TEMPLATE = "template.html" SCRIPTS_DIR = "../src" METADATA_RE = re.compile(r"(?m)^\/\/ @([a-z]+) *(.*)$") def parse_metadata(file): content = open(file).read() metadata = {} for match in METADATA_RE.finditer(content): metadata[ma...
36
23.94
62
15
222
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_7510a4385c6370ca_89ccf916", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 30 ]
[ null ]
[ 12 ]
[ 50 ]
2024-11-18T20:51:32.584074+00:00
1,668,623,733,000
f6c61af4bb8b65b3f0f165dc0c62c10d8c782e01
3
{ "blob_id": "f6c61af4bb8b65b3f0f165dc0c62c10d8c782e01", "branch_name": "refs/heads/main", "committer_date": 1668623733000, "content_id": "c90e72cf90824c21c4a63381fe5bf06b4ec3c261", "detected_licenses": [ "MIT" ], "directory_id": "841ec3a181ef7fd865965d729ed302d3fdb38b60", "extension": "py", "file...
2.71875
stackv2
# -------------------------------------------------------------------------- # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the MIT License. See License.txt in the project root for # license information. # -------------------------------------------------------------------------- # This s...
107
34.61
117
12
766
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_62fca132e58929c4_c658b4f7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 50, 66 ]
[ null, null ]
[ 15, 15 ]
[ 21, 30 ]
2024-11-18T20:51:47.042455+00:00
1,690,570,479,000
f31e72bcf7f259966d0bbf7982df2bce8d9ab1ee
3
{ "blob_id": "f31e72bcf7f259966d0bbf7982df2bce8d9ab1ee", "branch_name": "refs/heads/master", "committer_date": 1690570479000, "content_id": "da2318625a04651bee259b981ae9fbd91f014489", "detected_licenses": [ "Apache-2.0" ], "directory_id": "3f038733e9a03bdd4105ba8319de880924f3af9f", "extension": "py"...
2.875
stackv2
import requests import json import os import logging logging.basicConfig(level=logging.INFO) log = logging.getLogger(__name__) class SlackLib: def __init__( self, base_url="https://slack.com/api", token=os.environ["SLACK_API_TOKEN"].strip(), ): """ Creates a Github uti...
50
29.38
131
17
313
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ab6ab821c751cffe_83435c2c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 50 ]
[ null ]
[ 11 ]
[ 56 ]
2024-11-18T19:07:07.575839+00:00
1,508,045,987,000
c03655c5bfe4a8c1829536897ce5fca3c7776f58
2
{ "blob_id": "c03655c5bfe4a8c1829536897ce5fca3c7776f58", "branch_name": "refs/heads/master", "committer_date": 1508045987000, "content_id": "0e68414a8d28d7046b2d5d140f83790e985473b1", "detected_licenses": [ "Apache-2.0" ], "directory_id": "a4f6e67fe8fd6e18868c0842f88945c8ffed83bc", "extension": "py"...
2.484375
stackv2
import shlex import traceback import logging import inspect import json import requests from ConfigParser import SafeConfigParser class Cached(object): def __init__(self, func): self.func = func self.results = {} def __call__(self, *args, **kwargs): # Format hashable key key =...
172
33.06
106
18
1,245
python
[{"finding_id": "codeql_py/request-without-cert-validation_1ef48326493b5735_5694c023", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 94 ]
[ null ]
[ 20 ]
[ 77 ]
2024-11-18T19:07:14.028307+00:00
1,633,771,151,000
4b41f2583bb6b7da84804f620db7f49e8ff25eab
2
{ "blob_id": "4b41f2583bb6b7da84804f620db7f49e8ff25eab", "branch_name": "refs/heads/main", "committer_date": 1633771151000, "content_id": "414ba04b6ac65436c052fd5941aafbb3b68712bb", "detected_licenses": [ "Unlicense" ], "directory_id": "a7d72165fb5b9dafcc75d7f2f8aade265be9cac4", "extension": "py", ...
2.421875
stackv2
import base64 import zlib import json import hashlib from Cryptodome import Random from Cryptodome.Cipher import AES class CDNKeys: key460 = "uRqLnp6p9WUrTJ6nNXlv7z9VZRjbXvRFKEcF/spEn9k=" key470 = "DJ1LTHLgxRNq7v7fsyG3AQONlsdN49gJ+oY9UuVCSzQ=" key500 = "CADqND0WPwViwTPzhAiOjR/IrB5TCFInww+k1cmUg70=" ...
34
29.29
77
14
444
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_15bf8c206b6f0586_26ce2472", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
1
true
[ "CWE-327" ]
[ "py/weak-cryptographic-algorithm" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 23 ]
[ null ]
[ 18 ]
[ 45 ]
2024-11-18T19:07:23.818656+00:00
1,692,631,424,000
fa6d49cf6486e045d805a6e934818cf178318d9a
3
{ "blob_id": "fa6d49cf6486e045d805a6e934818cf178318d9a", "branch_name": "refs/heads/master", "committer_date": 1692631424000, "content_id": "f849f1776718d98eb608a164761245b4c46aacb5", "detected_licenses": [ "MIT" ], "directory_id": "d5a76f4b4ae371aca14e29ecca221fbb5ef7c889", "extension": "py", "fi...
3.015625
stackv2
#!/usr/bin/python # # gps_echo.py # Simple script to read gps from gps device connected to serial port. The output # is meant for constructing a google map location URL based on the lat/lon data # read as shown below. # # https://www.google.com/maps?q=`python gps_echo.py`" # # Author: Arul Selvan # Version:...
41
22.12
82
14
274
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_62e48916ab349d34_bd27e144", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 39 ]
[ null ]
[ 14 ]
[ 17 ]
2024-11-18T19:07:23.975499+00:00
1,494,849,993,000
2d0a6a0b1b6af4df34b4954182566584f36683bc
3
{ "blob_id": "2d0a6a0b1b6af4df34b4954182566584f36683bc", "branch_name": "refs/heads/master", "committer_date": 1494849993000, "content_id": "a567878a2f69446b5de8e43c6787dd911f15d5f2", "detected_licenses": [ "MIT" ], "directory_id": "d30b81d7f9655f7abaeee2ac67d26c248fcfdb11", "extension": "py", "fi...
2.890625
stackv2
""" <Program Name> deploy_server_final.py <Started> July 2009 <Author> n2k8000@u.washington.edu Konstantin Pik <Purpose> This is a fully automated webserver that handles only certain web requests. The server assumes files exist in the locations that they're supposed to exist, and the files are placed th...
539
24.76
114
23
3,189
python
[{"finding_id": "codeql_py/path-injection_102380d86f760cee_3ded265b", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 92, 95 ]
[ null, null ]
[ 27, 41 ]
[ 36, 50 ]
2024-11-18T19:07:46.922343+00:00
1,623,153,934,000
557eb3fd7cc2b024dc3e15fbaf4de5c63dbacbba
3
{ "blob_id": "557eb3fd7cc2b024dc3e15fbaf4de5c63dbacbba", "branch_name": "refs/heads/master", "committer_date": 1623153934000, "content_id": "dd4df509c8bf0e950af455db62562bd4d2ec7d12", "detected_licenses": [ "Apache-2.0" ], "directory_id": "9c07fe211a13e87df51402af4d47c4413401681d", "extension": "py"...
3.3125
stackv2
import requests import re from goose3 import Goose # meta tag의 property의 article:section을 파싱하기 위한 클래스 class Parse_category: def __init__(self,url): req = requests.get(url) self.raw = req.text self.category_names = ["정치","사회","경제"] self.policy = ["정치"] # 후에 정치 서브 카테고리를 채우자 sel...
75
31.12
98
15
653
python
[{"finding_id": "codeql_py/bad-tag-filter_1f00a9ad04305890_621b1cee", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression does not match script end tags like </script >.", "remediation": "", "location": {"file_...
1
true
[ "CWE-116" ]
[ "py/bad-tag-filter" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression does not match script end tags like </script >." ]
[ 17 ]
[ null ]
[ 24 ]
[ 47 ]
2024-11-18T19:18:41.006153+00:00
1,513,618,781,000
0e139dc1a9800b380b09ebe70a14615b7f4cfe82
3
{ "blob_id": "0e139dc1a9800b380b09ebe70a14615b7f4cfe82", "branch_name": "refs/heads/master", "committer_date": 1513618781000, "content_id": "80f4bbf960a40ea1c85c9b645a4e50161c2e1cc0", "detected_licenses": [ "Apache-2.0" ], "directory_id": "422c7c08c458e4485f1cdc8db7514ff678230328", "extension": "py"...
2.921875
stackv2
# Proof of concept of a SSRF vulnerability, written in Python # using Windows's WinHTTP.WinHTTPRequest native methods # to demonstrate how Windows will give out hashes when asked # to authenticate using NTLM. # # written by Julio Cesar Fort, Wildfire Labs /// Blaze Information Security # # Copyright 2016-2017, Blaze I...
43
37
146
16
407
python
[{"finding_id": "codeql_py/stack-trace-exposure_17a6236fa1b0a5c4_8d8134bd", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 36 ]
[ null ]
[ 24 ]
[ 53 ]
2024-11-18T19:18:52.352058+00:00
1,629,735,554,000
c62171d7974b4c868b1807dc4ca05ccea15a0b41
3
{ "blob_id": "c62171d7974b4c868b1807dc4ca05ccea15a0b41", "branch_name": "refs/heads/main", "committer_date": 1629735554000, "content_id": "aa3abbc67c302673fc11790a7fd73fb6fbf00cc5", "detected_licenses": [ "Apache-2.0" ], "directory_id": "0cbdb3941642c257d2d2eb19a1e393bb53991fc5", "extension": "py", ...
2.65625
stackv2
from flask import Flask, jsonify as _j, request, render_template import pandas as pd import numpy as np import pickle import csv heartModel = pickle.load(open("models/heart.dtc", "rb")) spineModel = pickle.load(open("models/spine.dtc", "rb")) app = Flask(__name__) @app.route('/', methods=['GET']) def home(): ret...
85
29.41
91
23
536
python
[{"finding_id": "codeql_py/stack-trace-exposure_0e3c1262cb88fbc8_429d421f", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
4
true
[ "CWE-209", "CWE-215", "CWE-117", "CWE-117" ]
[ "py/stack-trace-exposure", "py/flask-debug", "py/log-injection", "py/log-injection" ]
[ "HIGH", "HIGH", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-prov...
[ 72, 85, 56, 61 ]
[ null, null, null, null ]
[ 19, 5, 30, 34 ]
[ 25, 51, 59, 39 ]
2024-11-18T19:19:02.813707+00:00
1,478,216,681,000
5c95590d1307aa51e2c47d5b23b7ba24a391f575
2
{ "blob_id": "5c95590d1307aa51e2c47d5b23b7ba24a391f575", "branch_name": "refs/heads/master", "committer_date": 1478216681000, "content_id": "e8a7ee72c599a4637a30d745e85f5e0e1d6c94e9", "detected_licenses": [ "Apache-2.0" ], "directory_id": "dcc65a5ad5e42b6035f70613191957f4c93bd702", "extension": "py"...
2.3125
stackv2
#!/usr/bin/env python3 # pylint: disable=C0111,W0212,W0611,E1102,W0703 """ Ingestion Tool Modified from ersa-reporting-ingest """ import base64 import hashlib import json import lzma import os import random import time import requests import concurrent.futures from argparse import ArgumentParser from sys import ex...
224
33.55
141
17
1,774
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_4988d9d864f8ee3a_276755a2", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (secret)](2) is used in a hashing algorithm (MD5) that is insecure." ]
[ 40 ]
[ null ]
[ 34 ]
[ 60 ]
2024-11-18T19:29:52.377403+00:00
1,641,712,614,000
2ae31a286055797ddcdb0f83fd802877a581f151
3
{ "blob_id": "2ae31a286055797ddcdb0f83fd802877a581f151", "branch_name": "refs/heads/master", "committer_date": 1641712614000, "content_id": "0495d7cf4858a3db1a8d77b14803349838c95332", "detected_licenses": [ "MIT" ], "directory_id": "e7a72c1124fc7a52c3594370a8fbafe763f925e0", "extension": "py", "fi...
2.8125
stackv2
# -*- coding: utf-8 -*- """MOOC 课程下载""" import os import sys import re import json import argparse def store_cookies(file_name): """存储并返回 Cookie 字典""" def cookie_to_json(): """将分号分隔的 Cookie 转为字典""" cookies_dict = {} raw_cookies = input('> ') for cookie in raw_cookies.split(...
87
34.15
118
14
830
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_67b780b5d0532e8a_257d3ed9", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'icourse163.org/course/', so it migh...
5
true
[ "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020" ]
[ "py/incomplete-hostname-regexp", "py/incomplete-hostname-regexp", "py/incomplete-hostname-regexp", "py/incomplete-hostname-regexp", "py/incomplete-hostname-regexp" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'icourse163.org/course/', so it might match more hosts than expected.", "This regular expression has an unescaped '.' before 'xuetangx.com/courses/', so it might match more hosts than expected.", "This regular expression has an unescaped '.' before '163.com/c...
[ 60, 63, 67, 71, 74 ]
[ null, null, null, null, null ]
[ 19, 21, 21, 21, 21 ]
[ 54, 63, 56, 51, 59 ]
2024-11-18T19:44:18.142836+00:00
1,547,247,836,000
3645655be0ae7eac8fd522ecf0f48efd80fc7b3e
2
{ "blob_id": "3645655be0ae7eac8fd522ecf0f48efd80fc7b3e", "branch_name": "refs/heads/master", "committer_date": 1547247836000, "content_id": "2a8ee646f46b09246d50e2aab6f4e7dca8d70500", "detected_licenses": [ "Apache-2.0" ], "directory_id": "bb56f9c34944936997ee921c17c4381fb7fd9c1f", "extension": "py"...
2.34375
stackv2
import socket import os import signal from tempfile import NamedTemporaryFile import subprocess from jinja2 import Environment from jinja2 import FileSystemLoader CHROME_PATH = None if os.path.exists('/usr/bin/chrome-browser'): CHROME_PATH = 'chrome-browser' elif os.path.exists('/usr/bin/chromium-browser'): ...
105
30.67
75
17
784
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_be9c772a5e13a9a7_dd4af7e9", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 35 ]
[ null ]
[ 11 ]
[ 75 ]
2024-11-18T19:44:37.213248+00:00
1,435,051,265,000
ba2c3aefc23f8bca05bc456374fd36dd1fa5ceba
3
{ "blob_id": "ba2c3aefc23f8bca05bc456374fd36dd1fa5ceba", "branch_name": "refs/heads/master", "committer_date": 1435051265000, "content_id": "41a347649a3c4ff695c51a183f3af032e203666e", "detected_licenses": [ "Apache-2.0" ], "directory_id": "691e4810fe7204c7ceae81a97dc7f0baf2529ebb", "extension": "py"...
2.578125
stackv2
from thesaurus import fullfil_thesaurus_db from extract_names import extract_names from cache import name_genders, university_locations, university_types import os, sys lib_path = os.path.abspath('../') sys.path.append(lib_path) from model.teseo_model import University from model.dbconnection import dbconfig from sql...
58
37.19
139
14
518
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_49b496f8d278a44b_72bdeaf2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 38 ]
[ null ]
[ 30 ]
[ 85 ]
2024-11-18T19:44:40.450125+00:00
1,554,415,242,000
b43d25d1f59ab50b1132c74df8239073677a2cf0
3
{ "blob_id": "b43d25d1f59ab50b1132c74df8239073677a2cf0", "branch_name": "refs/heads/master", "committer_date": 1554415242000, "content_id": "f7cf861e0b7d0dd1a66039fbcc7d7a80682cd72d", "detected_licenses": [ "MIT" ], "directory_id": "57c4fd22bdf76284678380c20f12f663fdf3d993", "extension": "py", "fi...
2.96875
stackv2
# -*- coding: utf8 -*- # # Created by 'myth' on 10/19/15 import os from sys import stderr, stdout from jinja2 import Template from pepper8.models import FileResult from pepper8.parser import Parser class HtmlGenerator(object): """ The HTML Generator generates the HTML report based off of the data retrieved ...
146
34.33
107
21
1,040
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_fc1efc740d4502a7_48c29401", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 82 ]
[ null ]
[ 20 ]
[ 45 ]
2024-11-18T19:58:06.509201+00:00
1,499,328,485,000
46693adad8b901016d4d78ea10d7323f9f609861
2
{ "blob_id": "46693adad8b901016d4d78ea10d7323f9f609861", "branch_name": "refs/heads/master", "committer_date": 1499328485000, "content_id": "ddcdbc0ba24d10beb82111ce715e6a1035c25019", "detected_licenses": [ "MIT" ], "directory_id": "4308a0fe0697f18533d04aefc1d65e68690decf3", "extension": "py", "fi...
2.3125
stackv2
import os import sys import logging import argparse import sqlalchemy as sa from sqlalchemy import ( Table, Column, Integer, String, TEXT, ForeignKey, PrimaryKeyConstraint, MetaData ) import config # engine = sa.create_engine('sqlite:///dblp.sql', echo=False) connection_string = 'postgresql://%s:%s@...
82
25.66
78
12
498
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_411b5bc90d5a2655_92212f9e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 24 ]
[ null ]
[ 14 ]
[ 74 ]
2024-11-18T20:10:19.213178+00:00
1,588,305,066,000
4e3e6c7baac780e36c548c9ed97dbcd8fd43e898
3
{ "blob_id": "4e3e6c7baac780e36c548c9ed97dbcd8fd43e898", "branch_name": "refs/heads/master", "committer_date": 1588305066000, "content_id": "bd04d803109ca64266a1adb2cb2cb96fa5aa1857", "detected_licenses": [ "MIT" ], "directory_id": "91cc883f4901d6731801a901b1e2c89f2c3c1fcc", "extension": "py", "fi...
2.625
stackv2
from structures import * from threading import Event as ThreadEvent from os import urandom import flask, math, json database = Database() cache = Cache() app = flask.Flask(__name__) app.secret_key = urandom(32).hex() stopEvent = ThreadEvent() print(f'Secrety Key: {app.secret_key}') def updateAllPortfolios(): all...
282
26.44
150
19
1,982
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_52ff4aa2f4e69115_59a3902a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
2
true
[ "CWE-312", "CWE-215" ]
[ "py/clear-text-logging-sensitive-data", "py/flask-debug" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger." ]
[ 14, 282 ]
[ null, null ]
[ 7, 2 ]
[ 39, 21 ]
2024-11-18T20:10:38.779674+00:00
1,656,441,040,000
086b038a5a29dadc8b8ac1c5bb7ed43001783f83
3
{ "blob_id": "086b038a5a29dadc8b8ac1c5bb7ed43001783f83", "branch_name": "refs/heads/master", "committer_date": 1656441040000, "content_id": "67cd8b16af702fefc735dd097221d07a1779cf7a", "detected_licenses": [ "MIT" ], "directory_id": "0ef6f868c60bf7a54d0a48fbcf5992acc7d47d61", "extension": "py", "fi...
2.703125
stackv2
# ####################################################################### # # Task : KeePass Interaction # # ####################################################################### """ Creates the autoIT stub code to be passed into the master compile : Takes a supplied text file for the Sheepl to type : the mas...
349
31.96
126
22
2,302
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_20220035c9441b6a_abf9780a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 158, 233 ]
[ null, null ]
[ 15, 19 ]
[ 45, 79 ]
2024-11-18T20:23:35.970065+00:00
1,628,674,007,000
84a9df1204d3a2348be985b33c74f68d7d2c9319
2
{ "blob_id": "84a9df1204d3a2348be985b33c74f68d7d2c9319", "branch_name": "refs/heads/main", "committer_date": 1628674007000, "content_id": "775c10f525290eb5f70aded3e0e89637d94a7306", "detected_licenses": [ "MIT" ], "directory_id": "4dca81f7e7c3ae60397c40fde44faec71b720b17", "extension": "py", "file...
2.421875
stackv2
# -*-coding:utf-8-*- # @File : 2021/7/31 上午10:11 # @Author : Rosetta0 # @File : 3.5_kaggle_house.py import hashlib import os import tarfile import zipfile import requests import numpy as np import pandas as pd import torch from torch import nn from d2l import torch as d2l ###################数据集下载#####...
225
33.56
114
16
2,176
python
[{"finding_id": "codeql_py/tarslip_3798e0cac97eb6ba_c35e8112", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 54 ]
[ null ]
[ 5 ]
[ 7 ]
2024-11-18T20:49:15.580284+00:00
1,403,689,353,000
45878f865215b23a7ebb15f197e4190ab65d4ac5
3
{ "blob_id": "45878f865215b23a7ebb15f197e4190ab65d4ac5", "branch_name": "refs/heads/master", "committer_date": 1403689353000, "content_id": "ea817d3f9fe63967adf3a3e58572dc7c9bd3e7e5", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "321e43415d42a2214710b3cc6a1d48b955c2c507", "extension": "p...
2.59375
stackv2
import logging from django import forms from django.utils.translation import ugettext as _ from django.contrib.auth import get_user_model from django.core.exceptions import ObjectDoesNotExist from models import EmailUpdate # Instantiate logger. logger = logging.getLogger(__name__) class UserForm(forms.Form): ""...
95
38.23
142
22
700
python
[{"finding_id": "codeql_py/log-injection_d5a912f223956f48_faa53373", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 55 ]
[ null ]
[ 34 ]
[ 130 ]
2024-11-18T20:49:17.937039+00:00
1,589,045,076,000
7a3b7cbe1367fb34fb3b70f3c818856fe6e3e257
3
{ "blob_id": "7a3b7cbe1367fb34fb3b70f3c818856fe6e3e257", "branch_name": "refs/heads/master", "committer_date": 1589045076000, "content_id": "6bdfb0fc49fbbce3a27992dee3935e024d60e7e9", "detected_licenses": [ "ISC" ], "directory_id": "aeb7c59477f5145480a0542081e14e1ff86551c2", "extension": "py", "fi...
2.6875
stackv2
import os import string from demosys.management.base import CreateCommand class Command(CreateCommand): help = "Create a project" def add_arguments(self, parser): parser.add_argument("name", help="Name of the project") def handle(self, *args, **options): self.project_name = options['nam...
78
32.82
88
15
538
python
[{"finding_id": "codeql_py/overly-permissive-file_4b271cd1b7566255_224984cf", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world writable." ]
[ 57 ]
[ null ]
[ 9 ]
[ 37 ]
2024-11-18T20:49:38.624047+00:00
1,638,565,961,000
8b8ee3e87337c29964864e81c8053e1111c34ddc
3
{ "blob_id": "8b8ee3e87337c29964864e81c8053e1111c34ddc", "branch_name": "refs/heads/main", "committer_date": 1638565961000, "content_id": "8ee95547a23f5270216049f9410e28583acc3506", "detected_licenses": [ "MIT" ], "directory_id": "b9fa9e6810179d049c96cf3b28d74b6f2d006080", "extension": "py", "file...
2.890625
stackv2
import hashlib from flask import Blueprint from flask import jsonify # for return from flask import request # for url parameter and password import db user_bp = Blueprint('user', __name__) ''' Logs users into their profile request body: {"username": ..., "password": ...} return: {"valid": true/false} ...
91
25.77
79
16
576
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_af8ae2a12c87c4f6_976857f8", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
3
true
[ "CWE-327", "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.", "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally exp...
[ 19, 42, 73 ]
[ null, null, null ]
[ 28, 28, 28 ]
[ 57, 57, 57 ]
2024-11-18T20:49:52.192569+00:00
1,417,994,155,000
65cec68587bcdcbf88b2a68d739cdd4c9b4d9fc4
2
{ "blob_id": "65cec68587bcdcbf88b2a68d739cdd4c9b4d9fc4", "branch_name": "refs/heads/master", "committer_date": 1417994155000, "content_id": "04e56d37bc7714c99c0bf8dfaa649999b3e58a86", "detected_licenses": [ "MIT" ], "directory_id": "0ab13caa4070b34734f6695a17fa595cf4eb39c0", "extension": "py", "fi...
2.484375
stackv2
#!/usr/bin/env python import logging import tornado.ioloop import tornado.options import tornado.web import json from tornado.options import define, options define("port", default=8888, help="run on the given port", type=int) class MainHandler(tornado.web.RequestHandler): def get(self): try: ...
104
26.95
76
16
620
python
[{"finding_id": "codeql_py/reflective-xss_db816e8ca3c7cd0c_9b1843f7", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
2
true
[ "CWE-079", "CWE-601" ]
[ "py/reflective-xss", "py/url-redirection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 66, 64 ]
[ null, null ]
[ 24, 27 ]
[ 28, 38 ]
2024-11-18T20:49:57.281874+00:00
1,566,897,879,000
c799d60c2eabf772e45f981a0ec52ae00590c86a
3
{ "blob_id": "c799d60c2eabf772e45f981a0ec52ae00590c86a", "branch_name": "refs/heads/master", "committer_date": 1566897879000, "content_id": "4008c6902819fcd187931d4150431ad7c08d23e0", "detected_licenses": [ "MIT" ], "directory_id": "7c5ea48fc7fa42640db9c494dfabb4b874f5260f", "extension": "py", "fi...
2.609375
stackv2
from rest_framework import serializers class ReplaceableField(object): pass class WritableField(object): pass def ReplaceableNestedField(*args, serializer=None, **kwargs): class List(serializers.ListSerializer, ReplaceableField): def validate_nested(self, data): queryset = self.child...
432
36.96
107
21
2,952
python
[{"finding_id": "codeql_py/stack-trace-exposure_47480415f512ce04_8567dc4e", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
3
true
[ "CWE-209", "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 303, 309, 363 ]
[ null, null, null ]
[ 59, 59, 59 ]
[ 66, 66, 62 ]
2024-11-18T20:50:04.128833+00:00
1,606,778,788,000
167c7f86ff4ecad9225e2e19b81486d3fd32a97a
2
{ "blob_id": "167c7f86ff4ecad9225e2e19b81486d3fd32a97a", "branch_name": "refs/heads/master", "committer_date": 1606778788000, "content_id": "0647fa33a65ddf8fde875f55180e38ead7c1710e", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "a298190b5b65051a1ba0d227fcf7428a3c1c22f1", "extension": "p...
2.453125
stackv2
#!/usr/bin/env python3 ########################################################################### # Stupid basic, ugly website that allows logins to view a secret web page # # Probably not secure # #####################################################################...
88
26.51
76
16
525
python
[{"finding_id": "codeql_py/flask-debug_1667fa592953ab06_2015553f", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 88, 83 ]
[ null, null ]
[ 5, 12 ]
[ 40, 16 ]
2024-11-18T20:50:06.386571+00:00
1,606,919,474,000
7a688245aac6432c7a38a4684fdc5230f1875640
3
{ "blob_id": "7a688245aac6432c7a38a4684fdc5230f1875640", "branch_name": "refs/heads/master", "committer_date": 1606920254000, "content_id": "fb41b2aabed8606ef1f43ad2e213ce8c6120a20e", "detected_licenses": [ "Apache-2.0" ], "directory_id": "313e63cce7abf271af345cbce8bdafb22963e643", "extension": "py"...
2.5625
stackv2
import os from colorama import Fore, init from twilio.rest import Client from twilio.base.exceptions import TwilioRestException # Current file directory details file = os.path.realpath(__file__) filedir = os.path.dirname(file) parentdir = os.path.dirname(filedir) # Initialise colors for terminal init() # Print out h...
61
35.44
130
14
579
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_73673693c9d6de22_c9c19777", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text." ]
[ 56 ]
[ null ]
[ 13 ]
[ 65 ]
2024-11-18T20:50:07.985672+00:00
1,678,040,170,000
3070890efa1a8346961fbd1bb777f6aa2c5d9803
2
{ "blob_id": "3070890efa1a8346961fbd1bb777f6aa2c5d9803", "branch_name": "refs/heads/master", "committer_date": 1678040170000, "content_id": "be591375d6527e48870071748061a1ecc4ad6f6b", "detected_licenses": [ "MIT" ], "directory_id": "4022d3dd583ea0324f0d38d90421d2dccbd3d47f", "extension": "py", "fi...
2.375
stackv2
from flask import g, Blueprint, flash, redirect, url_for, render_template, request from flask_login import current_user, login_user, logout_user, login_required from conekt import login_manager, db from conekt.helpers.url import is_safe_url from conekt.models.users import User from conekt.forms.login import LoginForm ...
142
29.98
115
18
901
python
[{"finding_id": "codeql_py/url-redirection_a2dc3613730191b6_a7d7645c", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 105 ]
[ null ]
[ 33 ]
[ 42 ]
2024-11-18T20:50:36.848586+00:00
1,691,263,458,000
2b3e69296ac6bc95881b1ffd235af3c2116f66e5
2
{ "blob_id": "2b3e69296ac6bc95881b1ffd235af3c2116f66e5", "branch_name": "refs/heads/master", "committer_date": 1691263458000, "content_id": "4043ddadcac179ba03757553a5f63ff57edaa18f", "detected_licenses": [ "MIT" ], "directory_id": "f5de163623c0e1f2207104a69fea499b2d4b3948", "extension": "py", "fi...
2.375
stackv2
#!/usr/bin/env python """Script to convert templates from Mako to Jinja2.""" import io import glob import sys import os import re import json import shutil import tempfile import jinja2 dumb_replacements = [ ["{% if any(post.has_math for post in posts) %}", '{% if posts|selectattr("has_math")|list %}'], ["js...
272
36.33
115
17
2,710
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_f9e618d775118973_124e9f03", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 53 ]
[ null ]
[ 14 ]
[ 34 ]
2024-11-18T20:50:49.708718+00:00
1,557,457,514,000
266127033ae95dbd2a116bd3fe6ae49689eb3b9d
3
{ "blob_id": "266127033ae95dbd2a116bd3fe6ae49689eb3b9d", "branch_name": "refs/heads/master", "committer_date": 1557457514000, "content_id": "ce1987a46ba7b279747216145613b4ff266df72b", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "ed3dbed9193ee0cf133b0e905ac6bb72cd975709", "extension": "p...
2.546875
stackv2
from django.conf import settings from django.db import models from django.utils.functional import cached_property from Crypto.Cipher import DES from Crypto.Hash import MD5 import struct __all__ = ['EncryptedPKModel'] import logging log = logging.getLogger('gravy.db.models.crypto') def base36encode(number): nu...
87
27.69
81
19
623
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_a1e22c3767a247f3_71d607d3", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 69 ]
[ null ]
[ 38 ]
[ 57 ]
2024-11-18T20:51:10.709179+00:00
1,581,093,981,000
989e4d5d51c888c2904d3071cd072a7200473ca6
3
{ "blob_id": "989e4d5d51c888c2904d3071cd072a7200473ca6", "branch_name": "refs/heads/master", "committer_date": 1581093981000, "content_id": "507929b827ea74d7585659d479de07b4de64a559", "detected_licenses": [ "MIT" ], "directory_id": "4cb0996baa8a3f8b45c8ed64dfb26fe1e7d0ef06", "extension": "py", "fi...
2.8125
stackv2
from flask import Blueprint, current_app, request, jsonify from .model import City from .serializer import CitySchema from requests import get, post import json from datetime import date, datetime from sqlalchemy import desc, func from unidecode import unidecode bp_citys = Blueprint('citys', __name__) @bp_citys....
165
30.61
122
23
1,276
python
[{"finding_id": "codeql_py/partial-ssrf_c24eed02da73a89d_54a060d6", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 19 ]
[ null ]
[ 9 ]
[ 26 ]
2024-11-18T20:51:15.663862+00:00
1,616,924,805,000
6c565912cc566e780dc781ab21587303148441f1
3
{ "blob_id": "6c565912cc566e780dc781ab21587303148441f1", "branch_name": "refs/heads/master", "committer_date": 1616924805000, "content_id": "7e81e0610760d74dfb1d5204ae7f8d215f5d5509", "detected_licenses": [ "MIT" ], "directory_id": "b73a69e313f3f1e2c6860682354f346720019b27", "extension": "py", "fi...
2.9375
stackv2
import os import pwd import json import re from src import config # aliases for path to use later on user = pwd.getpwuid(os.getuid())[0] path = "/home/"+user+"/.atom/" def inplace_change(filename, old_string, new_string): """@params: config - config to be written into file path - the path where t...
78
32.26
96
15
637
python
[{"finding_id": "codeql_py/overly-large-range_ed166450b0df9009_f0ec09c2", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with A-z in the same character class, and is equivalent to \\[A...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that overlaps with A-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 51, 51 ]
[ null, null ]
[ 40, 45 ]
[ 43, 48 ]
2024-11-18T21:14:24.315482+00:00
1,365,649,529,000
4100897e162d84835eb9a2f9e83724998fddcd8a
3
{ "blob_id": "4100897e162d84835eb9a2f9e83724998fddcd8a", "branch_name": "refs/heads/master", "committer_date": 1365649529000, "content_id": "688c64b533ea673d7b65a418f38a8208baf3e2b2", "detected_licenses": [ "MIT" ], "directory_id": "b38842fd2728550e322be0d7b17c7b54f3b8535d", "extension": "py", "fi...
2.640625
stackv2
import hmac import random import string import hashlib from pymongo.errors import OperationFailure, DuplicateKeyError import bson import sys from exceptions import DoesNotExist, UserPasswordNotMatch def make_salt(): salt = "" for i in range(5): salt = salt + random.choice(string.ascii_letters) ret...
116
22.03
71
13
649
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_32bacc1ae64b2c7e_4cd56f39", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e...
[ 21 ]
[ null ]
[ 27 ]
[ 36 ]
2024-11-18T21:14:24.418956+00:00
1,586,786,250,000
fd867cb27f024f8d291ffe4597f194538d3fedfe
3
{ "blob_id": "fd867cb27f024f8d291ffe4597f194538d3fedfe", "branch_name": "refs/heads/master", "committer_date": 1586786250000, "content_id": "0f04aa9fb81d1351046899876819f84a6a385264", "detected_licenses": [ "MIT" ], "directory_id": "9991cd7103f2d58578e31c48b93cdc9c6d4c05c0", "extension": "py", "fi...
3.15625
stackv2
import sys from sqlalchemy import create_engine import re import numpy as np import pandas as pd import nltk nltk.download('stopwords') from nltk.tokenize import word_tokenize from nltk.stem import WordNetLemmatizer from nltk.corpus import stopwords from sklearn.pipeline import Pipeline from sklearn.model_selection...
164
28.56
115
14
1,052
python
[{"finding_id": "codeql_py/overly-large-range_a817b19d2e905b73_8f95c3a7", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 71 ]
[ null ]
[ 48 ]
[ 51 ]
2024-11-18T21:14:34.505404+00:00
1,605,990,431,000
411a3d9f78373f01caca3b4e68190b6c3abfbb68
2
{ "blob_id": "411a3d9f78373f01caca3b4e68190b6c3abfbb68", "branch_name": "refs/heads/main", "committer_date": 1605990431000, "content_id": "691fe2e67bf00eb68c1df91940b38320732696f5", "detected_licenses": [ "MIT" ], "directory_id": "f6fc5c4bff712492743840febbcbbfd98ddc8de7", "extension": "py", "file...
2.328125
stackv2
import sys import sqlite3 from PyQt5.QtGui import QIcon import appWidgets from hashlib import md5 from appWidgets import CONNECT from PyQt5.QtWidgets import QApplication, QMainWindow from PyQt5.QtWidgets import QPushButton, QLineEdit from PyQt5.QtWidgets import QWidget, QLabel from PyQt5 import uic class Auth(QMai...
110
31.77
83
19
746
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_1a243546a6699dba_2b21807d", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.", "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally exp...
[ 29, 45 ]
[ null, null ]
[ 40, 37 ]
[ 57, 54 ]
2024-11-18T20:10:42.053031+00:00
1,305,301,839,000
50b7a910d39b97697a62fbc8d4cfaad575b3f914
3
{ "blob_id": "50b7a910d39b97697a62fbc8d4cfaad575b3f914", "branch_name": "refs/heads/master", "committer_date": 1305301839000, "content_id": "d5ef32ce216e1c003f0648bf70bf98c5a59b5cb0", "detected_licenses": [ "MIT" ], "directory_id": "5cf6034c353ffd4f30c468df22a31c0176ce7507", "extension": "py", "fi...
2.640625
stackv2
import json import tornado.httpserver import tornado.ioloop import tornado.options import tornado.web import logging logger = logging.getLogger('trinity.' + __name__) class NodeNotFoundError(Exception): pass class JPypeJSONEncoder(json.JSONEncoder): """JSONEncoder subclass that knows how to encode JPype. """ ...
87
31.3
78
15
599
python
[{"finding_id": "codeql_py/log-injection_6cb3995823ae9bc4_f6ec50d3", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2)...
3
true
[ "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2).", "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2).", "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [use...
[ 60, 73, 77 ]
[ null, 74, null ]
[ 26, 26, 22 ]
[ 29, 75, 70 ]
2024-11-18T20:10:48.848454+00:00
1,596,375,003,000
00c9bc0459989ac66d8b9f60aa1248b7285d85b7
3
{ "blob_id": "00c9bc0459989ac66d8b9f60aa1248b7285d85b7", "branch_name": "refs/heads/master", "committer_date": 1596375003000, "content_id": "ed731eb45273d08d06f9829c235449fcb0726f96", "detected_licenses": [ "MIT" ], "directory_id": "d72df1cd00bf246739025352d4884771d5277186", "extension": "py", "fi...
3.484375
stackv2
# -------------- #Header files import pandas as pd import numpy as np import matplotlib.pyplot as plt #path of the data file- path data=pd.read_csv(path) data['Gender'].replace('-', 'Agender',inplace=True) gender_count=data['Gender'].value_counts() print(gender_count) gender_count.plot(kind='bar') plt.xlabel('Gender'...
72
20.62
57
9
436
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_443b23ef17cc3a38_34fdb220", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 12 ]
[ null ]
[ 7 ]
[ 19 ]
2024-11-18T20:10:50.262363+00:00
1,506,355,170,000
2fa313440d36580c898db3d83216cc8bb28af5a3
3
{ "blob_id": "2fa313440d36580c898db3d83216cc8bb28af5a3", "branch_name": "refs/heads/master", "committer_date": 1506355170000, "content_id": "7c750e61cef8e4c678a69d3eddf65462da5b8378", "detected_licenses": [ "MIT" ], "directory_id": "b6409c427748811f23fd6988e03c015c8c781d28", "extension": "py", "fi...
2.625
stackv2
#! /usr/bin/python # generate server.xml with the following command: # openssl req -new -x509 -keyout server.pem -out server.pem -days 365 -nodes # run as follows: # python https.py # then in your browser, visit: # https://localhost:4443 # curl -X POST --data "one two three four" localhost:8080/store.json # c...
51
34.24
91
17
429
python
[{"finding_id": "codeql_py/insecure-default-protocol_760b3acbd6dcb0fc_963405e8", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in...
1
true
[ "CWE-327" ]
[ "py/insecure-default-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used." ]
[ 50 ]
[ null ]
[ 17 ]
[ 91 ]
2024-11-18T20:10:54.339910+00:00
1,400,021,240,000
59162c2c37e88def1945e16e1439862190bc479d
2
{ "blob_id": "59162c2c37e88def1945e16e1439862190bc479d", "branch_name": "refs/heads/master", "committer_date": 1400021240000, "content_id": "e613b213468b7489f4b617021d33c90800714140", "detected_licenses": [ "MIT" ], "directory_id": "b6416d9bc53794bcbeeb32f350d13d69130f1b1b", "extension": "py", "fi...
2.40625
stackv2
from django.conf.urls import patterns, url from django.http import HttpResponse, HttpResponseForbidden, HttpResponseBadRequest from django.views.generic.base import View from django.shortcuts import get_object_or_404 import json from django.forms.models import model_to_dict from django.views.decorators.csrf import csrf...
190
30.66
125
20
1,561
python
[{"finding_id": "codeql_py/stack-trace-exposure_2ae537f7fbd0c03d_c2fc3c97", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 123 ]
[ null ]
[ 35 ]
[ 54 ]
2024-11-18T20:10:59.759525+00:00
1,590,371,339,000
9b208973aac67814b040d3d32a670fe5028777ef
3
{ "blob_id": "9b208973aac67814b040d3d32a670fe5028777ef", "branch_name": "refs/heads/master", "committer_date": 1590371339000, "content_id": "9944494868d81fb997f728566625445f88c29d7e", "detected_licenses": [ "MIT" ], "directory_id": "6e238722688d383a70207ee01e52f2cc97945a56", "extension": "py", "fi...
2.546875
stackv2
# coding: utf-8 """ Helper functions for filename and URL generation. """ import sys import os import subprocess import urllib.request import urllib.error import logging import tarfile import zipfile from io import BytesIO __author__ = 'Yeongbin Jo <yeongbin.jo@pylab.co>' def get_geckodriver_filename(): """ ...
210
30.36
125
19
1,528
python
[{"finding_id": "codeql_py/overly-permissive-file_497cc9f5e243e56a_37fa8fa7", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
2
true
[ "CWE-732", "CWE-022" ]
[ "py/overly-permissive-file", "py/tarslip" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable.", "This file extraction depends on a [potentially untrusted source](1)." ]
[ 193, 204 ]
[ null, null ]
[ 9, 9 ]
[ 46, 12 ]
2024-11-18T20:11:00.089853+00:00
1,588,981,843,000
652c35bde0e6963aa4e0ff877b385136b69a4fdd
3
{ "blob_id": "652c35bde0e6963aa4e0ff877b385136b69a4fdd", "branch_name": "refs/heads/main", "committer_date": 1588981843000, "content_id": "484506503cd85a7d201c747148059fc208c96c44", "detected_licenses": [ "MIT" ], "directory_id": "0a2d02cee77f0a12e75d459a706d64f5e3d13d26", "extension": "py", "file...
3.296875
stackv2
#!/usr/bin/python3 import base64 import crypt import argparse import json import random import string import sys DEFAULT_CHARSET = string.ascii_letters + string.digits + string.punctuation DEFAULT_LENGTH = 16 MINIMUM_LENGTH = 12 assert DEFAULT_LENGTH >= MINIMUM_LENGTH, \ "Password default length is not >= the...
109
26.31
75
16
635
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ab2bd2905b2cc424_cbe2b84e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 75 ]
[ null ]
[ 15 ]
[ 66 ]
2024-11-18T20:48:09.380962+00:00
1,493,244,212,000
381646d3c82ba68c00fdc2249982c7fed27f52c8
3
{ "blob_id": "381646d3c82ba68c00fdc2249982c7fed27f52c8", "branch_name": "refs/heads/master", "committer_date": 1493244212000, "content_id": "973301c1f905ef254ee4a18d72412446283a9ca4", "detected_licenses": [ "Unlicense" ], "directory_id": "1e1ba8eff29ff566e698078981dab49ba080dfec", "extension": "py",...
2.59375
stackv2
import db import os import base64 import hashlib from cryptography.fernet import Fernet, InvalidToken from cryptography.exceptions import InvalidSignature from cryptography.hazmat.primitives import hashes from cryptography.hazmat.backends import default_backend from cryptography.hazmat.primitives.kdf.pbkdf2 import PBK...
43
27.07
67
12
298
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_c40b3bf2ec19cd26_72856244", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 16 ]
[ null ]
[ 22 ]
[ 34 ]
2024-11-18T21:25:45.945012+00:00
1,617,826,444,000
79f983e8348e9bd2d440a6715fdbb445e296e5e5
3
{ "blob_id": "79f983e8348e9bd2d440a6715fdbb445e296e5e5", "branch_name": "refs/heads/master", "committer_date": 1617826444000, "content_id": "127791703c09911fd2acfdb21ade25312c2de652", "detected_licenses": [ "MIT" ], "directory_id": "d882967d55c6e730ecdf37419d3e34f7bc69ad2c", "extension": "py", "fi...
2.546875
stackv2
import re from pathlib import Path from .config import DATASET, INPUT, SRC_FILES from .data_reader import ManySStuBs4J def check_line(lines, line_number): """This function tries to extract the complete bug line when it is expanded on multiple lines or the line number in the dataset is pointing to somewhe...
123
32.63
151
16
959
python
[{"finding_id": "codeql_py/redos_56109895df8e3c3f_2f283f11", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '/*' and containing many repetitio...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '/*' and containing many repetitions of ' '." ]
[ 17 ]
[ null ]
[ 27 ]
[ 35 ]
2024-11-18T21:26:07.325627+00:00
1,397,255,856,000
58bdc63fcc3f7fecf23a61fee7f6093ceda70f60
3
{ "blob_id": "58bdc63fcc3f7fecf23a61fee7f6093ceda70f60", "branch_name": "refs/heads/master", "committer_date": 1397268088000, "content_id": "64ea714dc61c01f8db4fdc1e710db75df7ae6520", "detected_licenses": [ "MIT" ], "directory_id": "0055fb1d50cca904ff2325d0bdd8b9f5d8a1f04d", "extension": "py", "fi...
2.71875
stackv2
import logging import re import time import sys from selenium import webdriver from selenium.webdriver.common.keys import Keys browser = webdriver.Firefox() log = logging.getLogger(__name__) def login(account_id, username, password): log.info('Logging in as %s for account %s...', username, account_id) bro...
92
32.32
109
13
745
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4df0639750b7c6bd_aa722837", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 26 ]
[ null ]
[ 59 ]
[ 66 ]
2024-11-18T21:51:47.343434+00:00
1,463,068,908,000
7ddc889f5da410d965c946ee084e94a008557be8
2
{ "blob_id": "7ddc889f5da410d965c946ee084e94a008557be8", "branch_name": "refs/heads/master", "committer_date": 1463068908000, "content_id": "00eac37be2c2eaadc07ec6875c7178382be195d7", "detected_licenses": [ "MIT" ], "directory_id": "0660f18b77375a44ff7550a5abdc9be0861dfde8", "extension": "py", "fi...
2.5
stackv2
"""Django bitserv payment library for selling 402 API endpoints.""" import os from functools import wraps from rest_framework import status from rest_framework.response import Response from rest_framework.exceptions import ParseError import two1.bitserv as bitserv class PaymentRequiredResponse(Response): """Paym...
93
41.65
106
25
777
python
[{"finding_id": "codeql_py/stack-trace-exposure_452785178544687b_bd353a03", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 91 ]
[ null ]
[ 38 ]
[ 44 ]
2024-11-18T21:52:04.597830+00:00
1,627,143,969,000
2ea3601fad3b175edd28c372ab48f750b58d68f1
3
{ "blob_id": "2ea3601fad3b175edd28c372ab48f750b58d68f1", "branch_name": "refs/heads/main", "committer_date": 1627143969000, "content_id": "6b0e0768ef676134d75d4759bf2e2805770e7831", "detected_licenses": [ "MIT" ], "directory_id": "fdb44e88d9ece9279d1653a7662f28eb3b93300b", "extension": "py", "file...
3.34375
stackv2
import markdown from jinja2 import Environment, FileSystemLoader import os class Report(): def __init__(self, title=None, name=None, desc=None) -> None: self.title = title self.name = name self.desc = desc self.links = '' # html string self.content = '' # html string ...
74
30.16
100
13
567
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_f718acea406709c9_84c025fc", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 36 ]
[ null ]
[ 15 ]
[ 57 ]
2024-11-18T21:52:05.868982+00:00
1,624,277,079,000
1702502b0db1642740f9ea369e735e2f8dde8ecd
3
{ "blob_id": "1702502b0db1642740f9ea369e735e2f8dde8ecd", "branch_name": "refs/heads/main", "committer_date": 1624277079000, "content_id": "9dfdaf6706ac441b4f588e2bf675ff2c4ea0d49a", "detected_licenses": [ "MIT" ], "directory_id": "6f28755b25258b7728e60845a5fd32fb8bc64813", "extension": "py", "file...
3.09375
stackv2
from __future__ import annotations import abc from src.articles.domain.entities import exceptions from src.articles.domain.entities.encryptor import Encryptor, AbstractEncryptor from src.articles.domain.values.password import Password class AbstractCredential(abc.ABC): username: str password: str active:...
67
24.42
79
12
355
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b71d6bda8e3de42b_b2e1cf65", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 66 ]
[ null ]
[ 11 ]
[ 22 ]
2024-11-18T20:31:35.716128+00:00
1,554,816,514,000
66eef3e1704aeef8c624f79ff93e367d0945b1f6
3
{ "blob_id": "66eef3e1704aeef8c624f79ff93e367d0945b1f6", "branch_name": "refs/heads/master", "committer_date": 1554816514000, "content_id": "7f456b48bd5d20536bdd6b0ae6467340654bf2bb", "detected_licenses": [ "MIT" ], "directory_id": "39e4524aa50606f6989634b8770ef1d07f645a28", "extension": "py", "fi...
2.640625
stackv2
#!/usr/bin/env python3 # -*- coding:utf-8 -*- import subprocess import os import sys from pathlib import Path from datetime import datetime from jinja2 import Environment, FileSystemLoader from xml.sax.saxutils import * class PXUnit: """ xUnitもどきクラス """ def __init__(self, testee_path, answer_path, test...
152
29.97
84
17
1,183
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_b973ccd8e5b4eeb9_09f817c8", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 94 ]
[ null ]
[ 11 ]
[ 70 ]
2024-11-18T20:59:43.390828+00:00
1,628,157,502,000
2afa4f6210ba41c23e1b57a6ac78771e51a1e097
3
{ "blob_id": "2afa4f6210ba41c23e1b57a6ac78771e51a1e097", "branch_name": "refs/heads/master", "committer_date": 1628157502000, "content_id": "7d2ec69ffb212513521224dc1e2fc28605b3995a", "detected_licenses": [ "MIT" ], "directory_id": "315596e2f614910d981264506e9817f0e0a939e9", "extension": "py", "fi...
2.546875
stackv2
from flask import Flask, render_template, request,jsonify from py2neo import Graph # from neo4j.v1 import GraphDatabase # import sys # # sys.path.append('/Users/sunchao/PycharmProjects/KG/QASystemOnMedicalKG') # from chatbot_graph import ChatBotGraph # # # handler = ChatBotGraph() app = Flask(__name__) graph = Graph(...
56
28.39
105
12
437
python
[{"finding_id": "codeql_py/flask-debug_77b65117ab423324_3fb5a7cd", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 56, 37 ]
[ null, null ]
[ 5, 12 ]
[ 26, 25 ]
2024-11-18T21:10:32.029932+00:00
1,624,252,461,000
45046c0c8fc160bcb2756d77b2465b80fb5f3132
2
{ "blob_id": "45046c0c8fc160bcb2756d77b2465b80fb5f3132", "branch_name": "refs/heads/main", "committer_date": 1624252461000, "content_id": "a8ee1d7728aebf99a791229afa03af59e077cde8", "detected_licenses": [ "MIT" ], "directory_id": "0e3c16d6ce8955f2143a11feeaf26bf351fa6c0e", "extension": "py", "file...
2.5
stackv2
#!/usr/bin/env python # -*- coding: utf8 -*- #import cjson import os import logging import json import click import socket socket.setdefaulttimeout(50) from orgprofile.builder import SOURCES_MAP from orgprofile.builder import build_profile def list_profiles(): profiles = list(SOURCES_MAP.keys()) profiles.so...
74
23.49
103
13
492
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_8f0c39ba69aeed8e_da641ec0", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 54 ]
[ null ]
[ 13 ]
[ 28 ]
2024-11-18T21:10:53.569638+00:00
1,591,280,747,000
3b94707de99f76a1c44158a5a20ae0e0d8035fcd
4
{ "blob_id": "3b94707de99f76a1c44158a5a20ae0e0d8035fcd", "branch_name": "refs/heads/master", "committer_date": 1591280747000, "content_id": "dd603970b7929dbbfcd210bd23df3f8725d79975", "detected_licenses": [ "MIT" ], "directory_id": "c6dcecd43edf7ee1488be38779a59b41781b8371", "extension": "py", "fi...
4.40625
stackv2
#Created by Josh Tseng, 2 June 2020 #This file illustrates how if-statements can be used to determine if a key exists in a dictionary phone_numbers = { "John": "90904454", "Ellie": "90234056", "Raj": "94456654" } print("Welcome! Search for a person's phone number.") user_search = input("Type a person's name: ") if u...
26
36.08
146
11
266
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_34d28cfa620f2d96_1772bdaa", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 14 ]
[ null ]
[ 11 ]
[ 87 ]
2024-11-18T21:10:56.507237+00:00
1,619,205,356,000
57c42faa61bb7a08b75099a6494d4406d1253d3a
4
{ "blob_id": "57c42faa61bb7a08b75099a6494d4406d1253d3a", "branch_name": "refs/heads/main", "committer_date": 1619205356000, "content_id": "6d965215ad9658078eb56731f83dad1992fac7aa", "detected_licenses": [ "MIT" ], "directory_id": "234458aada8348533041bfb39a5807a49e2eabd6", "extension": "py", "file...
4.15625
stackv2
#py_calendar.py import calendar #create a TextCalendar instance cal = calendar.TextCalendar() print("We just produced a {}.\n".format(type(cal))) print("Let's check out the calendar for April, 2016\n") calendar.prmonth(2016,4) print() #what day of the week was I born? birthday_year=1957 birthday_month=5 birthday_d...
24
25.58
78
9
171
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_48f3a01b4358ffe9_ad389eb9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 24 ]
[ null ]
[ 7 ]
[ 71 ]
2024-11-18T21:23:45.308564+00:00
1,616,195,991,000
e3e12a883a7182c67faa516e0873cdef0d229fbe
3
{ "blob_id": "e3e12a883a7182c67faa516e0873cdef0d229fbe", "branch_name": "refs/heads/master", "committer_date": 1616195991000, "content_id": "f6c0ccbe6cc7fae8de5e044976edcda23528df1a", "detected_licenses": [ "MIT" ], "directory_id": "cd8d6718e9603efc08181710974f10586d7a3757", "extension": "py", "fi...
3.46875
stackv2
"""Symple Fields plotting. This module provides tools allowing for somebody to quickly and easily plot a direction field for a given symbolic equation. Possible uses include plotting direction fields of first order differential equations. """ from __future__ import division import re from math import sqrt import mult...
230
33.21
85
18
1,766
python
[{"finding_id": "codeql_py/redos_f7c2b20e2f31b335_c1b93365", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of ' '.", "remediati...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of ' '." ]
[ 41 ]
[ null ]
[ 14 ]
[ 31 ]
2024-11-18T21:24:00.042896+00:00
1,691,876,137,000
e6e1a08f7cc21a91cd9b0be6661b16b25c160e47
2
{ "blob_id": "e6e1a08f7cc21a91cd9b0be6661b16b25c160e47", "branch_name": "refs/heads/master", "committer_date": 1691876137000, "content_id": "eb1c64b3de7fbf2a6f4a5d07efac2ae84863cd82", "detected_licenses": [ "MIT" ], "directory_id": "8999a82b8cdeec9ce3b0d29196326c404ce1a6cb", "extension": "py", "fi...
2.34375
stackv2
''' This set of routes is in place to handle migration from the old PHP-based website. Once requests to any old URLs dry up, it can be safely removed. ''' from flask import redirect, url_for, request from alchemyst import app from alchemyst.ui.note import note_view from alchemyst.api.routes import note from alchemyst...
77
32.25
103
21
610
python
[{"finding_id": "codeql_py/url-redirection_abde88bf50953a13_5da32ed8", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 17 ]
[ null ]
[ 21 ]
[ 29 ]
2024-11-18T21:37:51.506014+00:00
1,578,466,316,000
679e3563cafddad1cbd8003cffc7e3aa38b6b72a
3
{ "blob_id": "679e3563cafddad1cbd8003cffc7e3aa38b6b72a", "branch_name": "refs/heads/master", "committer_date": 1578466316000, "content_id": "6b5bbaac836ff2ea8b2643679bc195fefbbc0587", "detected_licenses": [ "MIT" ], "directory_id": "c39cd00f14fea69798ef67947ac405b382e05f43", "extension": "py", "fi...
2.765625
stackv2
import sqlite3 as sql class job: def __init__(self,desc=None,salary=None,duration=None): #self.utype=utype self.desc=desc self.salary=salary self.duration=duration #CARE SEEKER SPECIFIC def create(self,utype): if utype==1: print("You Have Access ...
44
24.66
59
13
292
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3443f66694196ff3_970ce639", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 13 ]
[ null ]
[ 47 ]
[ 58 ]