added
stringlengths
32
32
created
int64
1,244B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.25
source
stringclasses
1 value
text
stringlengths
324
20.1k
num_lines
int64
16
598
avg_line_length
float64
15.1
58.3
max_line_length
int64
33
179
ast_depth
int64
8
39
length
int64
101
3.8k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.1k
265k
sast_codeql_findings_count
int64
1
45
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
45
rule_ids
listlengths
1
45
confidences
listlengths
1
45
severities
listlengths
1
45
messages
listlengths
1
45
line_starts
listlengths
1
45
line_ends
listlengths
1
45
column_starts
listlengths
1
45
column_ends
listlengths
1
45
2024-11-18T22:35:56.455796+00:00
1,373,532,872,000
4feccdf7839a59bef17d3f1b79d5f1b0e62555af
3
{ "blob_id": "4feccdf7839a59bef17d3f1b79d5f1b0e62555af", "branch_name": "refs/heads/master", "committer_date": 1373532872000, "content_id": "480a1b20f8b4ad9b9ed1817dd8bc6afa1ba90bd7", "detected_licenses": [ "MIT" ], "directory_id": "07539ecbcee0488ce4a0eb779583da3149cfac7b", "extension": "py", "fi...
2.546875
stackv2
import hashlib from amonone.web.apps.core.basemodel import BaseModel class UserModel(BaseModel): def __init__(self): super(UserModel, self).__init__() self.collection = self.mongo.get_collection('users') def create_user(self, userdata): userdata['password'] = hashlib.sha1(userdata['p...
67
27.06
88
17
390
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_84801ad4639ea425_92376d48", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse...
3
true
[ "CWE-327", "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.", "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally e...
[ 12, 16, 53 ]
[ null, null, null ]
[ 45, 45, 45 ]
[ 65, 65, 61 ]
2024-11-18T22:36:04.464451+00:00
1,629,922,010,000
5792db18699e96f2b19a9125a70bdceb4d447150
3
{ "blob_id": "5792db18699e96f2b19a9125a70bdceb4d447150", "branch_name": "refs/heads/master", "committer_date": 1629922010000, "content_id": "958b29f1fc6ec304f79a2e5a585cb39cfd4ace88", "detected_licenses": [ "MIT" ], "directory_id": "3df543db6266b3eb0fd5647601c6ea6d37b60efd", "extension": "py", "fi...
3.09375
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- """ Created on Mon Jul 8 14:52:08 2019 @author: edoardottt This file contains code for analyze the database. It uses matplotlib library to displays the result. It shows a chart with likes, retweets, followers per day. This file is under MIT License. """ # all librari...
132
42.88
111
28
1,209
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_b16dac08b35de35b_7550e597", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 50 ]
[ null ]
[ 28 ]
[ 52 ]
2024-11-18T22:36:07.964089+00:00
1,561,686,269,000
a5af498b6cbed37b04bef8072568418c5f432877
3
{ "blob_id": "a5af498b6cbed37b04bef8072568418c5f432877", "branch_name": "refs/heads/master", "committer_date": 1561686269000, "content_id": "6f4bb6a284694c6431cc734bd916f83ef1670f2a", "detected_licenses": [ "MIT" ], "directory_id": "a6d99f64037b2b4c8d40c76f6cf78a445d77cd8d", "extension": "py", "fi...
2.5625
stackv2
from flask import Flask, request, flash, render_template from flask_wtf import FlaskForm from wtforms import StringField, PasswordField, SubmitField from wtforms.validators import DataRequired, EqualTo app = Flask(__name__) app.config['WTF_CSRF_ENABLED'] = False app.config['SECRET_KEY'] = 'SECRET_KEY' class RegistF...
37
30.97
106
14
285
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_54a52c370dd7e6ae_a3bc05bc", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
3
true
[ "CWE-312", "CWE-312", "CWE-215" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/flask-debug" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger." ]
[ 26, 26, 37 ]
[ null, null, null ]
[ 25, 35, 5 ]
[ 33, 44, 24 ]
2024-11-18T22:36:49.048148+00:00
1,403,863,431,000
1717dd6472eba7d14384f2c162fe2412f6d3f57f
3
{ "blob_id": "1717dd6472eba7d14384f2c162fe2412f6d3f57f", "branch_name": "refs/heads/master", "committer_date": 1403863431000, "content_id": "b4aab80c84977df7eb7a40cd5fd55617327dc29f", "detected_licenses": [ "MIT" ], "directory_id": "c65827ad7680555b3d2cffcaf2bb76d44fa99210", "extension": "py", "fi...
2.734375
stackv2
#!/usr/bin/python ''' simplecache.py - (C) 2014 Daniel Fairhead <daniel.fairhead@.om.org> Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including ...
82
37.07
86
15
683
python
[{"finding_id": "codeql_py/path-injection_c8c8965c4ee0ea99_e8030c35", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
4
true
[ "CWE-022", "CWE-022", "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 53, 54, 55, 61 ]
[ null, null, null, null ]
[ 23, 27, 26, 19 ]
[ 33, 46, 45, 29 ]
2024-11-18T20:23:27.335109+00:00
1,516,957,296,000
06dafabd5bd9fc3721847bcce198f29f6ca8e94c
4
{ "blob_id": "06dafabd5bd9fc3721847bcce198f29f6ca8e94c", "branch_name": "refs/heads/master", "committer_date": 1516957296000, "content_id": "4c9cc0ea393c2421add8814134006d4555fff595", "detected_licenses": [ "Apache-2.0" ], "directory_id": "c4509e0d8d116403fe83f4dd06a0d31c01701ddf", "extension": "py"...
3.90625
stackv2
import random #18 연봉 계산 salary = int(input("연봉을 입력해주세요(3000)")) isMarried = input("결혼 여부를 입력해주세요(미혼/결혼)") tax = 0 if isMarried=='미혼' : if salary < 3000 : tax = salary * 0.1 else : tax = salary * 0.25 elif isMarried=='결혼' : if salary < 6000: tax = salary * 0.1 else : t...
109
17.35
68
12
883
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_37c12b6dc64710ab_a85e184f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 21 ]
[ null ]
[ 7 ]
[ 68 ]
2024-11-18T20:23:27.436905+00:00
1,506,351,088,000
d433de62d77ad86fabd117083cec034822e7522f
3
{ "blob_id": "d433de62d77ad86fabd117083cec034822e7522f", "branch_name": "refs/heads/master", "committer_date": 1506351088000, "content_id": "73cd6408cf9918ceef69d32d83a35a465883f8c6", "detected_licenses": [ "MIT" ], "directory_id": "7cca2f867a4ea3eb62a9e4e2568a57d290239b5f", "extension": "py", "fi...
2.59375
stackv2
import json import os from flask import Flask from sqlalchemy import create_engine from sqlalchemy import inspect from sqlalchemy import text app = Flask(__name__) def getDbAddress(): if 'DPP_DB_ENGINE' in os.environ: return os.environ['DPP_DB_ENGINE']; return 'postgresql://postgres:123456@localhost:1...
63
32.35
165
20
614
python
[{"finding_id": "codeql_py/sql-injection_ed20664c4d428328_41b97b41", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown...
1
true
[ "CWE-089" ]
[ "py/sql-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This SQL query depends on a [user-provided value](1)." ]
[ 45 ]
[ null ]
[ 16 ]
[ 154 ]
2024-11-18T20:23:31.690228+00:00
1,617,103,975,000
5bf4a2575ceefc035e118d71973c515fbacee62f
2
{ "blob_id": "5bf4a2575ceefc035e118d71973c515fbacee62f", "branch_name": "refs/heads/main", "committer_date": 1617103975000, "content_id": "372216b8171de8537d28821931e9f638f436425a", "detected_licenses": [ "MIT" ], "directory_id": "70b90ca35ce61c439c9e3031096c258358c59496", "extension": "py", "file...
2.328125
stackv2
import os import json import pandas as pd import numpy from flask import Flask, render_template, request, jsonify from pandas.io.json import json_normalize from sklearn.externals import joblib from werkzeug.wrappers import Request, Response app = Flask(__name__) port = int(os.getenv('PORT', 5500)) @app.route('/') d...
35
23.89
58
14
202
python
[{"finding_id": "codeql_py/stack-trace-exposure_188ad7d8003528c7_ee691822", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-215" ]
[ "py/stack-trace-exposure", "py/flask-debug" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger." ]
[ 31, 35 ]
[ null, null ]
[ 21, 2 ]
[ 22, 48 ]
2024-11-18T20:23:32.219868+00:00
1,629,902,909,000
a25ad596d5f699d1ff4e6d71bc4b57c91ec1db4b
3
{ "blob_id": "a25ad596d5f699d1ff4e6d71bc4b57c91ec1db4b", "branch_name": "refs/heads/main", "committer_date": 1629902909000, "content_id": "dffd0608dcf69f9b3c9332c63a459f12d64e92c7", "detected_licenses": [ "MIT" ], "directory_id": "58efd17e84b579d686d2dce575aed72fa4aa08c7", "extension": "py", "file...
2.5625
stackv2
from collections import defaultdict from typing import Any, Dict, List, Text from flask import Flask, json, jsonify, request import api flask = Flask(__name__) MOCK_DATA_HEAP = defaultdict(list) Constraint = List[Dict[Text, Any]] class InvalidUsage(Exception): def __init__(self, message, status_code=None): ...
84
23.05
85
18
474
python
[{"finding_id": "codeql_py/code-injection_067364a7bd8e70d7_ad133f71", "tool_name": "codeql", "rule_id": "py/code-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This code execution depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "...
1
true
[ "CWE-094" ]
[ "py/code-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This code execution depends on a [user-provided value](1)." ]
[ 42 ]
[ null ]
[ 48 ]
[ 76 ]
2024-11-18T20:23:41.359824+00:00
1,664,740,262,000
7616423f972eaafed63160ca073cb9c76b9b9f1a
3
{ "blob_id": "7616423f972eaafed63160ca073cb9c76b9b9f1a", "branch_name": "refs/heads/main", "committer_date": 1664740262000, "content_id": "ebca167520a7454ae00994dcfe2300e176bfc2d7", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e4695f3731fa868a2603cd79682f860d5975e730", "extension": "py", ...
2.703125
stackv2
import hashlib import urllib.request from django.core.exceptions import ValidationError class HaveIBeenPwnedValidator: def validate(self, password, user=None): sha1 = hashlib.sha1() # nosec:required by service. sha1.update(password.encode()) digest = sha1.hexdigest().upper() pref...
24
40.17
87
17
216
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_76077a836776ecbb_f22d68b8", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 10 ]
[ null ]
[ 21 ]
[ 38 ]
2024-11-18T21:22:42.050741+00:00
1,598,082,424,000
bcedb8203b23c1fee75341d0bca28add370f28d0
3
{ "blob_id": "bcedb8203b23c1fee75341d0bca28add370f28d0", "branch_name": "refs/heads/master", "committer_date": 1598082424000, "content_id": "87dda5164883a83ac699ef8b63793817673712d9", "detected_licenses": [ "MIT" ], "directory_id": "e0121af6e951b5612ffb86329a16da5c7765e009", "extension": "py", "fi...
2.703125
stackv2
import spotdl import clipboard import enchant from shutil import copyfile from os import listdir, remove, mkdir from os.path import isfile, join from pathlib import Path, PurePath import ctypes path = Path(Path.home(), "Desktop/Music") def download(url: str): try: ans = ctypes.windll.user32.MessageBoxW(0...
35
37.46
131
18
334
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_430b56d9e7f490c1_b5d8e65f", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [https://open.spotify.com](1) may be at an arbitrary po...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "The string [https://open.spotify.com](1) may be at an arbitrary position in the sanitized URL.", "The string [https://youtu.be](1) may be at an arbitrary position in the sanitized URL." ]
[ 19, 19 ]
[ null, null ]
[ 50, 96 ]
[ 92, 130 ]
2024-11-18T21:22:42.571163+00:00
1,588,805,281,000
ab8470cf0d60fc5b519775efdb2c285ea1e553b0
2
{ "blob_id": "ab8470cf0d60fc5b519775efdb2c285ea1e553b0", "branch_name": "refs/heads/master", "committer_date": 1588805281000, "content_id": "91f1086a92d7f2c6cd720fb5e77aef7cc045202a", "detected_licenses": [ "MIT" ], "directory_id": "9fd0e0a819e94b32c09672d2cd5d0c90f1afbd7c", "extension": "py", "fi...
2.359375
stackv2
############################################################################### # # Zero-Touch Automation utility for Ixia Vision Network Packet Brokers # # File: ixvision_ztp_sysinfo.py # Author: Alex Bortok (https://github.com/bortok) # # Description: A module to inquiry system status # # COPYRIGHT 2018 - 2019 Keysig...
66
33.02
135
14
532
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d61f9de5a9bb9236_67a01d9c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 31 ]
[ null ]
[ 11 ]
[ 59 ]
2024-11-18T21:22:46.086762+00:00
1,604,038,290,000
17e2fd271567bab5f81dc8606bbe64a146df98cd
4
{ "blob_id": "17e2fd271567bab5f81dc8606bbe64a146df98cd", "branch_name": "refs/heads/main", "committer_date": 1604038290000, "content_id": "132c5f31d276dc5e17567ac75d7271f67149923c", "detected_licenses": [ "MIT" ], "directory_id": "ad9815eaf483c7d1c663d024569eecc96d7f1e21", "extension": "py", "file...
3.5625
stackv2
from flask import Flask app = Flask(__name__) @app.route('/') def homepage(): """Shows a greeting to the user.""" return 'Are you there, world? It\'s me, Ducky!' @app.route('/penguins') def penguins(): return 'Penguins are cute!' @app.route('/animal/<users_animal>') def favorite_animal(users_animal): ...
59
26.8
84
12
424
python
[{"finding_id": "codeql_py/flask-debug_182790476db20dc7_a0f9b831", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
6
true
[ "CWE-215", "CWE-079", "CWE-079", "CWE-079", "CWE-079", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a ...
[ 59, 17, 21, 27, 36, 45 ]
[ null, null, null, null, null, null ]
[ 5, 12, 12, 16, 16, 12 ]
[ 24, 62, 56, 57, 29, 20 ]
2024-11-18T21:23:18.133251+00:00
1,646,156,770,000
fc1698d8fa259911e73b7a8fb80d590599346ca7
3
{ "blob_id": "fc1698d8fa259911e73b7a8fb80d590599346ca7", "branch_name": "refs/heads/master", "committer_date": 1646156770000, "content_id": "1d05dd245ad187b6af590e8184d651ddd7efe879", "detected_licenses": [ "Apache-2.0" ], "directory_id": "aa64c62a3d246b87f3f1e5810a8f75b1d166aaf6", "extension": "py"...
2.640625
stackv2
import click from .comm import pdserver_request @click.group() @click.pass_context def routers(ctx): """ (deprecated) Access router information on the controller. These commands are deprecated. Please use the equivalent commands under `pdtools cloud --help`. """ ctx.obj['routers_url'] = ctx....
90
24.61
85
14
543
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2c7fee9a028dedb9_c92f5e21", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 74 ]
[ null ]
[ 15 ]
[ 56 ]
2024-11-18T21:23:19.744983+00:00
1,681,836,800,000
8a8b223821834448777ee1a31299ed3d5294b6be
3
{ "blob_id": "8a8b223821834448777ee1a31299ed3d5294b6be", "branch_name": "refs/heads/master", "committer_date": 1681836800000, "content_id": "ff9114b92fdc26c7ad28589a3324c821fde0d19a", "detected_licenses": [ "MIT" ], "directory_id": "9acd360d688177e03a77dff6d391c60ad1b82295", "extension": "py", "fi...
2.734375
stackv2
""" keycloak ~~~~~~~~~~ Keycloak login helpers and management features """ import os from posixpath import join as urljoin import requests from requests import codes import logging import webbrowser from typing import Optional, Dict, List, Any from .exceptions import ServerError, AuthServerError from .utils import ho...
414
35.98
114
17
3,496
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a108670dd76f2e65_c68f83c3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text." ]
[ 55 ]
[ null ]
[ 76 ]
[ 80 ]
2024-11-18T21:51:40.851044+00:00
1,524,606,861,000
16153a687d9d02cd8b2678b8228b76cb3bc4acba
2
{ "blob_id": "16153a687d9d02cd8b2678b8228b76cb3bc4acba", "branch_name": "refs/heads/master", "committer_date": 1524606861000, "content_id": "ddb95e40d350efe5dbcb6ee2f0c1f408ed6aa363", "detected_licenses": [ "MIT" ], "directory_id": "a1b3343ceed9a3a1495cdfbf1e813f06030e8fd6", "extension": "py", "fi...
2.390625
stackv2
#Add all global routes in this file from flask import request from flask import Blueprint import logging from lib.decorators import jsonify, logrequest logger = logging.getLogger() global_routes = Blueprint('global_routes', __name__) @global_routes.route('/', methods=['GET']) @jsonify @logrequest def test(): logg...
18
24.83
82
10
102
python
[{"finding_id": "codeql_py/log-injection_a0760f86869e11d8_2bbe8765", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 16 ]
[ null ]
[ 70 ]
[ 82 ]
2024-11-18T21:51:41.837675+00:00
1,631,915,449,000
03d49580475515ced9115c5274b786a9e0c31bba
3
{ "blob_id": "03d49580475515ced9115c5274b786a9e0c31bba", "branch_name": "refs/heads/master", "committer_date": 1631915449000, "content_id": "eab9cd59b3d04375b8b89b54d37a31a87f28f8dd", "detected_licenses": [ "MIT" ], "directory_id": "cc8461174a59712685768ee2ea77f0b0e3368386", "extension": "py", "fi...
2.578125
stackv2
from flask import Flask, jsonify, send_from_directory, request import os from subprocess import Popen, PIPE app = Flask(__name__) @app.route("/rot") def rot(): chave = request.args.get('chave') texto = request.args.get('texto') try: int(chave) except x: return ":(", 400 processo ...
23
22.91
89
11
149
python
[{"finding_id": "codeql_py/command-line-injection_1127c24e9f11f36c_e4fa573a", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {...
1
true
[ "CWE-078" ]
[ "py/command-line-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This command line depends on a [user-provided value](1)." ]
[ 17 ]
[ null ]
[ 22 ]
[ 46 ]
2024-11-18T21:52:02.903333+00:00
1,594,508,697,000
ae1ad82193225b580948c60573bd5baa02edb20a
2
{ "blob_id": "ae1ad82193225b580948c60573bd5baa02edb20a", "branch_name": "refs/heads/master", "committer_date": 1594508697000, "content_id": "5a0c59ea354c82904a9c3e9e4f1b37c2e8c5b911", "detected_licenses": [ "MIT" ], "directory_id": "563469316290461d709a34c847e592de6800f8c5", "extension": "py", "fi...
2.5
stackv2
#!/usr/bin/env python3 # MIT License ## # Copyright (c) 2017 Sayak Brahmachari ## # Permission is hereby granted, free of charge, to any person obtaining a copy # of this software and associated documentation files (the "Software"), to # deal in the Software without restriction, including without limitation the # righ...
282
35.65
97
34
2,066
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_47846c472268ea27_e12f945e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
3
true
[ "CWE-312", "CWE-200", "CWE-200" ]
[ "py/clear-text-logging-sensitive-data", "py/bind-socket-all-network-interfaces", "py/bind-socket-all-network-interfaces" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "'0.0.0.0' binds a socket to all interfaces.", "'0.0.0.0' binds a socket to all interfaces." ]
[ 41, 61, 65 ]
[ 42, null, null ]
[ 11, null, null ]
[ 46, 26, 37 ]
2024-11-18T22:02:49.911160+00:00
1,619,819,738,000
7b1683707bc7bde1cd20d629b7bccf42d238684b
2
{ "blob_id": "7b1683707bc7bde1cd20d629b7bccf42d238684b", "branch_name": "refs/heads/master", "committer_date": 1619819738000, "content_id": "3c29e8dbd600e6cadd50adc14231f229ff5689e3", "detected_licenses": [ "MIT" ], "directory_id": "3af8e9ca36e1deeff2683907db497772b9051899", "extension": "py", "fi...
2.46875
stackv2
#!/usr/bin/env python # coding: utf-8 from kollektions import app, db, User, Event, Following from kollektions.forms import LoginForm, SignupForm from kollektions.store import get_store from kollektions.utils import pretty_date from flask import render_template, flash, redirect, url_for, session from flask import abor...
434
27.74
78
21
3,037
python
[{"finding_id": "codeql_py/partial-ssrf_344360f4d9535a55_d7da10fb", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 34 ]
[ 35 ]
[ 11 ]
[ 27 ]
2024-11-18T22:27:48.643783+00:00
1,581,079,709,000
2fd81cb42a5ed0e64f4eac3a368f8eb25fe00deb
3
{ "blob_id": "2fd81cb42a5ed0e64f4eac3a368f8eb25fe00deb", "branch_name": "refs/heads/master", "committer_date": 1581079709000, "content_id": "ef3b2a9f026a7ebd8f47732c1be689985f0cda25", "detected_licenses": [ "MIT" ], "directory_id": "dc0a1aa09a6093376fb0b640f245d5e494b7351c", "extension": "py", "fi...
2.8125
stackv2
import os import cv2 import pickle import numpy as np from torch.utils.data import Dataset import random def unpickle_batch(file): with open(file, 'rb') as f: dict_ = pickle.load(f, encoding='bytes') return dict_ def preprocess(img_bgr): # to 32bit img img_bgr = img_bgr.astype(np.float32)/25...
129
34.57
107
22
1,221
python
[{"finding_id": "codeql_py/tarslip_200d32a69e82f805_244854d4", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 92 ]
[ null ]
[ 13 ]
[ 16 ]
2024-11-18T22:28:18.096908+00:00
1,691,311,230,000
b2c22bf2036fa2c5c6d90b1ad1e841ee685d4c7c
2
{ "blob_id": "b2c22bf2036fa2c5c6d90b1ad1e841ee685d4c7c", "branch_name": "refs/heads/PPDM-main", "committer_date": 1691311230000, "content_id": "b0c5030e144ea3ba12fa32fffe84e1f228f31f93", "detected_licenses": [ "Apache-2.0" ], "directory_id": "3bd241c4240347d5ab098cacfa7799404842d971", "extension": "...
2.375
stackv2
#!/usr/bin/env python3 import argparse import requests import urllib3 import sys import json # The purpose of this script is to simplify K8s Credential Management in PowerProtect urllib3.disable_warnings() def get_args(): # Get command line args from the user parser = argparse.ArgumentParser( descri...
176
45.47
116
22
1,904
python
[{"finding_id": "codeql_py/request-without-cert-validation_62643a109c5691d4_348ce41d", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
5
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 43, 76, 98, 113, 129 ]
[ null, null, null, null, null ]
[ 20, 20, 20, 20, 20 ]
[ 83, 83, 83, 71, 69 ]
2024-11-18T22:43:57.623596+00:00
1,419,571,332,000
fd94dbd0f34995da162c31dd810266a9435b237a
2
{ "blob_id": "fd94dbd0f34995da162c31dd810266a9435b237a", "branch_name": "refs/heads/master", "committer_date": 1419571332000, "content_id": "640294468020448a06725cd3b17ec65a365a8f4e", "detected_licenses": [ "MIT" ], "directory_id": "108a7a174913409b934858d43c83064df7aaafb2", "extension": "py", "fi...
2.46875
stackv2
#! /usr/bin/env python3 import sqlite3 import os import hashlib import codecs import bcrypt from Crypto.Cipher import AES from password import encrypt, decrypt, toHex, fromHex import config pwdatabase = config.dbfile '''This utility only needs to be run once to convert from an unencrypted database.''' '''Fill in pa...
36
31.14
108
13
306
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bd1168fcb8126dfa_8eab2984", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 29, 32 ]
[ null, null ]
[ 18, 18 ]
[ 26, 30 ]
2024-11-18T22:44:00.916837+00:00
1,550,557,535,000
022cfba2bac242d1374d0d70cf3b3f9a3e40f226
2
{ "blob_id": "022cfba2bac242d1374d0d70cf3b3f9a3e40f226", "branch_name": "refs/heads/master", "committer_date": 1550557535000, "content_id": "e52b8392476aee925df627fbcb18bdab77d5f272", "detected_licenses": [ "MIT" ], "directory_id": "8727805627d1034073d89e03b135269b3804b6b9", "extension": "py", "fi...
2.390625
stackv2
import sublime import sublime_plugin from .driver.baidu_translate import BaiduTranslate s = sublime.load_settings("HBH-Translator.sublime-settings") appid = s.get('appid') secret_key = s.get('secret_key') print(appid, secret_key) bd_api = BaiduTranslate(appid, secret_key) class TranslateCommand(sublime_plugin.TextCo...
32
32.56
77
15
245
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ab075d4885c2c5b4_17a5a2ac", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 8 ]
[ null ]
[ 14 ]
[ 24 ]
2024-11-18T22:44:14.175065+00:00
1,326,821,638,000
6f433abe3128c4276cf70979e8a10d8d46341332
2
{ "blob_id": "6f433abe3128c4276cf70979e8a10d8d46341332", "branch_name": "refs/heads/master", "committer_date": 1326821638000, "content_id": "8f916bd0f772a2b6ad8d9445c2c5ac94a9f9b63c", "detected_licenses": [ "MIT" ], "directory_id": "848946322a2653184f18883f321ed5b2ed0c0256", "extension": "py", "fi...
2.375
stackv2
# Copyright (c) 2011 anatanokeitai.com(sakurai_youhei) # # Permission is hereby granted, free of charge, to any person obtaining a # copy of this software and associated documentation files (the # "Software"), to deal in the Software without restriction, including # without limitation the rights to use, copy, modify, ...
163
29.11
107
18
1,250
python
[{"finding_id": "codeql_py/insecure-default-protocol_a17679b0817980bd_56a250c7", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in...
1
true
[ "CWE-327" ]
[ "py/insecure-default-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used." ]
[ 157 ]
[ null ]
[ 14 ]
[ 55 ]
2024-11-18T22:44:19.136096+00:00
1,655,990,133,000
55d34f07584633b6f49b5aac1844e9af43660544
2
{ "blob_id": "55d34f07584633b6f49b5aac1844e9af43660544", "branch_name": "refs/heads/master", "committer_date": 1655990133000, "content_id": "1f79eb8748867edf7c975587243d2363e0c784a5", "detected_licenses": [ "MIT" ], "directory_id": "ff914ecce4f7230dcc18b154900b053354f7be96", "extension": "py", "fi...
2.40625
stackv2
from requests import get from requests.exceptions import RequestException from contextlib import closing import xml.etree.ElementTree as xme import time import re import pandas as pd import calendar def getrequest(url): try: with closing(get(url,stream=True)) as resp: if (is_good_response(resp)...
162
48.38
146
22
1,669
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_198ded9678ec354f_04d0145f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-116" ]
[ "py/clear-text-logging-sensitive-data", "py/bad-tag-filter" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "Comments ending with --> are matched differently from comments ending with --!>. The first is matched with capture group 5 and comments ending with --!> are matched with capture group 7." ]
[ 19, 26 ]
[ null, null ]
[ 15, 21 ]
[ 53, 112 ]
2024-11-18T22:44:35.247369+00:00
1,492,619,639,000
ecdd0c890be7aac60958f9048e55fc8f9ea1a916
2
{ "blob_id": "ecdd0c890be7aac60958f9048e55fc8f9ea1a916", "branch_name": "refs/heads/master", "committer_date": 1492619639000, "content_id": "c9041bc2a92a4c0105c3e177882cd3120b64ea70", "detected_licenses": [ "MIT" ], "directory_id": "e4088ae5e991171d1d42ba6db3e045885a73007b", "extension": "py", "fi...
2.453125
stackv2
import psycopg2 as psy db = psy.connect(dbname='gkdb', host='gkdb.org') def get_groups(uid): cur = db.cursor() cur.execute(""" SELECT * FROM pg_group WHERE %s = ANY (grolist) ;""", (uid, )) return cur def get_sql_usergroups(): cur = db.cursor() cur.execute(""" S...
35
25.49
72
11
237
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5e6971346181ae28_133b1630", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text." ]
[ 31 ]
[ null ]
[ 21 ]
[ 29 ]
2024-11-18T20:24:07.368237+00:00
1,657,714,617,000
16553e6dff6c267199e1ffa009ef09414c80899b
2
{ "blob_id": "16553e6dff6c267199e1ffa009ef09414c80899b", "branch_name": "refs/heads/master", "committer_date": 1657714617000, "content_id": "74a702306e960aa4a75f4fb6fe02f69921933030", "detected_licenses": [ "Apache-2.0" ], "directory_id": "314e2d33f5d49f2da74a6f2d72cf506cc37bbdba", "extension": "py"...
2.3125
stackv2
import os import re import argparse from jinja2 import Template from shutil import copyfile if __name__ == '__main__': parser = argparse.ArgumentParser('Log Parser arguments!') parser.add_argument("-data_dir", type=str, help="Directory with the all the logs") parser.add_argument("-out_dir", type=str, he...
153
33
152
22
1,192
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_c1edd990caf900e8_288ab3f3", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 148 ]
[ null ]
[ 20 ]
[ 42 ]
2024-11-18T20:24:14.184447+00:00
1,627,853,574,000
a259f8f599e52f5d2e3449152e48fb01606e9058
3
{ "blob_id": "a259f8f599e52f5d2e3449152e48fb01606e9058", "branch_name": "refs/heads/main", "committer_date": 1627853574000, "content_id": "5693a5f4ac8231576b62dac2032771f7a96959c1", "detected_licenses": [ "MIT" ], "directory_id": "667961ed8e9df1fada4ddf00854cb6a9b8fbfb5e", "extension": "py", "file...
2.96875
stackv2
# No puede ser un jupiter, tiene que ser archivo .py from flask import Flask, flash, request, render_template, redirect, url_for import pandas as pd import os import json UPLOAD_FOLDER = os.sep + "static" + os.sep # Flask es una clase cuyo primer atributo es un atributo obligatorio (name): app = Flask(__name__) # E...
42
45.55
118
13
467
python
[{"finding_id": "codeql_py/flask-debug_f0b59bdd91522acd_15242bf6", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 41, 29 ]
[ null, 32 ]
[ 5, 16 ]
[ 71, 59 ]
2024-11-18T21:00:33.812446+00:00
1,605,957,527,000
b48195f271c2e8ea2ccf8e331c0b96c72aea67e7
2
{ "blob_id": "b48195f271c2e8ea2ccf8e331c0b96c72aea67e7", "branch_name": "refs/heads/main", "committer_date": 1605957527000, "content_id": "f33d907556c9b9fc201b71eb8cdc6b8052468813", "detected_licenses": [ "MIT" ], "directory_id": "93ba96a5e3c1ccf829b62f2b5533309f306ce9b6", "extension": "py", "file...
2.34375
stackv2
from ldap_api import retrieve_user_details, ldap_connection from configurations import AUTH_AD_HOST, AUTH_AD_PORT, AUTH_AD_DOMAIN from services import decode from flask_restful import Resource from flask import make_response, request import json import http class UserDetails(Resource): def options(self): ...
52
31.15
69
18
301
python
[{"finding_id": "codeql_py/stack-trace-exposure_ad75275bd91af68f_0a11af52", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 23, 50 ]
[ 25, 52 ]
[ 34, 34 ]
[ 15, 15 ]
2024-11-18T21:01:13.598648+00:00
1,607,439,510,000
247786dbcfe55b5afc11623ed6be5a68bcfb159b
3
{ "blob_id": "247786dbcfe55b5afc11623ed6be5a68bcfb159b", "branch_name": "refs/heads/main", "committer_date": 1607439510000, "content_id": "a428f9fcf148b2bed6c9293777915ff0f2331c6d", "detected_licenses": [ "MIT" ], "directory_id": "25a6da24bae4ed91a559efa3b057165218b91cb2", "extension": "py", "file...
2.6875
stackv2
import random, sys from hashlib import sha256 from tkinter import * from tkinter import Text import tkinter as tk from tkinter.ttk import Combobox from tkinter import messagebox from datetime import datetime #main Window root = tk.Tk() root.title('passwordGenerator') root.resizable(0,0) canvas = tk.Canvas(root, heigh...
169
31.29
113
14
1,592
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_1b7fea3a71e6dbd9_38a0bf24", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e...
[ 32 ]
[ null ]
[ 14 ]
[ 19 ]
2024-11-18T21:01:17.091928+00:00
1,599,767,190,000
03e4bb0ba518ab9d9e63b975ad9e94c01170ead2
3
{ "blob_id": "03e4bb0ba518ab9d9e63b975ad9e94c01170ead2", "branch_name": "refs/heads/master", "committer_date": 1599767190000, "content_id": "26454299628ae8d03b85f9a26045d4cea88cd52c", "detected_licenses": [ "MIT" ], "directory_id": "98789579e97078e99f0dd2c4fd0eb450473a8c33", "extension": "py", "fi...
2.609375
stackv2
import pickle import os from flask import Flask, flash, request, redirect, url_for, g from flask.templating import render_template from werkzeug.utils import secure_filename from HashtagRecommenderModel import HashtagRecommender, join_file MYDIR = os.path.dirname(__file__) UPLOAD_FOLDER = os.path.join('static', 'uploa...
81
37
133
23
676
python
[{"finding_id": "codeql_py/url-redirection_8d741f519f6c2ccf_f05efbab", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
5
true
[ "CWE-601", "CWE-601", "CWE-601", "CWE-601", "CWE-601" ]
[ "py/url-redirection", "py/url-redirection", "py/url-redirection", "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends o...
[ 37, 43, 55, 59, 71 ]
[ null, null, null, null, null ]
[ 29, 29, 33, 25, 25 ]
[ 40, 40, 44, 36, 56 ]
2024-11-18T21:01:29.544799+00:00
1,623,735,066,000
f722625f5b28aac63c36415a17913cf1d1e8003f
2
{ "blob_id": "f722625f5b28aac63c36415a17913cf1d1e8003f", "branch_name": "refs/heads/master", "committer_date": 1623735066000, "content_id": "30d82122a57dfff98cf24ef4f70ae91dc5184544", "detected_licenses": [ "MIT" ], "directory_id": "2a71a577dd2a4f235a70b6e54cdfff9c38764081", "extension": "py", "fi...
2.40625
stackv2
import hashlib import os import base64 import json import subprocess from flask import Flask, request from subprocess import Popen DETACHED_PROCESS = 0x00000008 app = Flask(__name__) class AgentInstance: DEST_PATH = 'C:\\temp' AGENT_KEY = 'ZZ4UNX4MGVSSCQ920O5CFCXR4UOYZ0S1UW70CLF9BC83E1VHA9W9MX0APTQ0WV0G' ...
101
33.95
99
18
870
python
[{"finding_id": "codeql_py/command-line-injection_394d40b5a7db22d9_31af51ee", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {...
3
true
[ "CWE-078", "CWE-022", "CWE-022" ]
[ "py/command-line-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This command line depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 59, 51, 55 ]
[ null, null, null ]
[ 23, 19, 32 ]
[ 26, 35, 48 ]
2024-11-18T21:25:34.822547+00:00
1,520,556,293,000
2e6c6be6b76e21d29a759a58ef818d9011ed6580
4
{ "blob_id": "2e6c6be6b76e21d29a759a58ef818d9011ed6580", "branch_name": "refs/heads/master", "committer_date": 1520556293000, "content_id": "b0ae0310437027c393936f0cd185edf03fdeb898", "detected_licenses": [ "MIT" ], "directory_id": "e937274f730b9c6beb19687cedfe2f118890dc68", "extension": "py", "fi...
3.859375
stackv2
#!/usr/bin/env python3 ''' Code by Stephane Gallet, <gallet.stephane@gmail.com> based on "How to Share a Secret" by Adi Shamir Published by :Communications of the ACM November 1979, Volume 22, Num. 11 ''' import numpy as np import random def split_secret(secret, k, n): ''' Secret in an integer k is the...
113
20.8
71
13
696
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ccbc97ef44b52bdf_37972527", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 88 ]
[ null ]
[ 11 ]
[ 27 ]
2024-11-18T21:51:34.362577+00:00
1,611,329,563,000
0a26405e0f423c1b2b0b35c9fcf8321b3666580c
2
{ "blob_id": "0a26405e0f423c1b2b0b35c9fcf8321b3666580c", "branch_name": "refs/heads/master", "committer_date": 1611329563000, "content_id": "8e9a18a002feee6a8588b4c11768871de3e9bd04", "detected_licenses": [ "MIT" ], "directory_id": "e01656767f7e5f464e40792fb245068d876051dc", "extension": "py", "fi...
2.375
stackv2
#!/usr/bin/python # Copyright (c). 2021-2021. All rights reserved. import getpass import json import re from sys import argv import os import logger import requests import yaml from requests.packages.urllib3.exceptions import InsecureRequestWarning from vmware_pass_update import UpdatePassword requests.packages.url...
549
31.1
84
20
3,777
python
[{"finding_id": "codeql_py/request-without-cert-validation_04ffc2834db59a7a_2e61b0d4", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
6
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 49, 70, 96, 300, 329, 347 ]
[ null, 71, null, 302, 331, null ]
[ 20, 20, 20, 24, 24, 24 ]
[ 67, 47, 75, 64, 63, 85 ]
2024-11-18T22:00:14.387671+00:00
1,580,380,043,000
b79536a9a90bf7a61f02181663cdaf7e73a193de
3
{ "blob_id": "b79536a9a90bf7a61f02181663cdaf7e73a193de", "branch_name": "refs/heads/master", "committer_date": 1580380043000, "content_id": "191a81095a39ab4ffd68c05aee7aaa52557fb28b", "detected_licenses": [ "MIT" ], "directory_id": "04887b8cac1c05f8f069cca203555734bbf182e5", "extension": "py", "fi...
2.75
stackv2
import os import sys ROOT_DIR = os.path.dirname(os.path.abspath(os.path.dirname('__file__'))) sys.path.append(ROOT_DIR) import scipy.io import numpy as np import pandas as pd import imagesize import requests import tarfile local_file_path = os.path.join(ROOT_DIR, 'resources', 'wiki_crop.tar') # path where all the unpa...
94
32.97
108
14
820
python
[{"finding_id": "codeql_py/tarslip_32b0fc6290c8c19a_c17e5cd2", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 28 ]
[ null ]
[ 5 ]
[ 7 ]
2024-11-18T22:00:18.711114+00:00
1,676,722,332,000
19e3c65799a49ca96c47df7bfe6b813d5a93cf81
2
{ "blob_id": "19e3c65799a49ca96c47df7bfe6b813d5a93cf81", "branch_name": "refs/heads/master", "committer_date": 1676722332000, "content_id": "1d2d26fa10205b6819c70b7aab3ac37ef11ee7e3", "detected_licenses": [ "Apache-2.0" ], "directory_id": "bae3254792b2f3ee0d7384794e52ceff66851a29", "extension": "py"...
2.328125
stackv2
# -*- coding: utf-8 -*- # Copyright (c) 2004-2014 Alterra, Wageningen-UR # Allard de Wit (allard.dewit@wur.nl), April 2014 import sys, os import urllib from google.appengine.api import urlfetch from datetime import date, timedelta import numpy as np from ..base_classes import WeatherDataProvider, WeatherDataContainer...
313
40.67
108
20
3,231
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d9d3efe381eb014d_4948476f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.\nThis expression logs [sensitive data (private)](4) as clear text.\nThis expression logs [sensitive data (private)]...
[ 192 ]
[ null ]
[ 15 ]
[ 18 ]
2024-11-18T22:00:22.392007+00:00
1,524,833,221,000
2ea10c377351690d30754175f063e05164a838d7
3
{ "blob_id": "2ea10c377351690d30754175f063e05164a838d7", "branch_name": "refs/heads/master", "committer_date": 1524833221000, "content_id": "dfaa401bd218d84b1dc5c2eec78e6653cbd4d404", "detected_licenses": [ "MIT" ], "directory_id": "88aaad13543ae621272eec34bd2a79a350cb120d", "extension": "py", "fi...
2.671875
stackv2
from BaseHTTPServer import BaseHTTPRequestHandler,HTTPServer from cgi import parse_header, parse_multipart from urlparse import parse_qs import os.path,string,WiFi ADDR = "0.0.0.0" PORT = 8000 WEBCONT = "WebContent/" httpd = None def getWifiOption(): wifiList = WiFi.getAllWifi() result = "" if wifiList ...
78
32.64
94
18
629
python
[{"finding_id": "codeql_py/path-injection_ad6c5b860e7f05da_70043e31", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2).", "remed...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2).", "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2)." ]
[ 49, 51 ]
[ null, null ]
[ 52, 22 ]
[ 59, 29 ]
2024-11-18T22:00:47.266072+00:00
1,512,819,139,000
6e4c4334a83a7229692e2b04c2a99b83ab261902
2
{ "blob_id": "6e4c4334a83a7229692e2b04c2a99b83ab261902", "branch_name": "refs/heads/master", "committer_date": 1512819139000, "content_id": "f885f148f281809ec73f7dba5ff0a59cb41a62a8", "detected_licenses": [ "MIT" ], "directory_id": "ccc385ce597254483613e48a5e6be905e12dcd6a", "extension": "py", "fi...
2.5
stackv2
import os if __name__ == '__main__': entries = set() with open('actual.txt', 'r') as playlist, open('parsed.sh', 'w') as output: output.write('#!/usr/bin/env bash\n\n') for line in playlist: try: sections = line.split('/') artist = sections[3] ...
31
30.32
145
22
241
python
[{"finding_id": "codeql_py/overly-permissive-file_a72ba07b60ce1154_0020c1db", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable." ]
[ 31 ]
[ null ]
[ 5 ]
[ 33 ]
2024-11-18T22:01:02.317899+00:00
1,689,353,215,000
4c91eee58b0a787287b0e0df804885705445f76f
3
{ "blob_id": "4c91eee58b0a787287b0e0df804885705445f76f", "branch_name": "refs/heads/master", "committer_date": 1689353215000, "content_id": "328784399ee5bb38422d09fe93d5320d8e78d8f3", "detected_licenses": [ "MIT" ], "directory_id": "6ba72ce01fe8c08a10a7607536858cfd40b2dc16", "extension": "py", "fi...
2.65625
stackv2
from django.conf import settings from django.core.exceptions import ValidationError from django.forms.fields import Field, CharField from django.utils.translation import gettext_lazy as _ import decimal from decimal import Decimal, InvalidOperation import re class ItemPriceField(Field): default_error_messages =...
102
32.09
101
18
758
python
[{"finding_id": "codeql_py/polynomial-redos_58be8c71ef77fc67_99c49922", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with ma...
1
true
[ "CWE-1333" ]
[ "py/polynomial-redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with many repetitions of '9'." ]
[ 77 ]
[ null ]
[ 47 ]
[ 51 ]
2024-11-18T22:01:10.713493+00:00
1,623,948,010,000
3c9f22bac11ca17c72a3d4ef849a62dba4ca8638
3
{ "blob_id": "3c9f22bac11ca17c72a3d4ef849a62dba4ca8638", "branch_name": "refs/heads/master", "committer_date": 1623948010000, "content_id": "6c39e90044fe82e42cfeb4ae59e53c51fdae8a9c", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "02be689be654331033d3e1370237343c09f4385e", "extension": "p...
2.84375
stackv2
#!/usr/bin/env python # coding: utf-8 """ Source-level RSA using a searchlight on fMRI data ================================================= This example demonstrates how to perform representational similarity analysis (RSA) on volumetric fMRI data, using a searchlight approach. In the searchlight approach, represe...
89
44.08
79
10
919
python
[{"finding_id": "codeql_py/tarslip_1092633fcd8f993b_157bd1c6", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 39 ]
[ null ]
[ null ]
[ 4 ]
2024-11-18T22:15:11.243513+00:00
1,668,197,007,000
390c9fc0b13b7e71359a4a9c4686e0902d5a89cb
2
{ "blob_id": "390c9fc0b13b7e71359a4a9c4686e0902d5a89cb", "branch_name": "refs/heads/main", "committer_date": 1668197007000, "content_id": "569f09459eb429795c4a63e0d9176d99bc6a1cc2", "detected_licenses": [ "MIT" ], "directory_id": "6cd49642145b9ccbea0837e4f4427f16eed7a9f4", "extension": "py", "file...
2.3125
stackv2
import os import random from flask import Flask, jsonify, flash, request, redirect, url_for,send_from_directory,make_response from werkzeug.utils import secure_filename from flask_cors import CORS import uuid as myuuid import cv2 import glob import datetime import numpy as np import png, pydicom from ast import literal...
159
34.96
120
19
1,370
python
[{"finding_id": "codeql_py/url-redirection_4eea728f5f1fa971_87142d64", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 85 ]
[ null ]
[ 25 ]
[ 36 ]
2024-11-18T22:26:12.273950+00:00
1,610,283,861,000
b7b57695d3b77dbcf74d391d4a1884c02c55a0dd
3
{ "blob_id": "b7b57695d3b77dbcf74d391d4a1884c02c55a0dd", "branch_name": "refs/heads/master", "committer_date": 1610283861000, "content_id": "4fa32b4762eb2239f8566c2df3b6e27b913b91b6", "detected_licenses": [ "MIT" ], "directory_id": "4b51df3145fefb8e594aa26375e3a9d829c39c6a", "extension": "py", "fi...
2.515625
stackv2
import logging.config from lxml import etree import requests import yaml from flask import Flask, abort, jsonify, render_template, request logging.config.dictConfig(yaml.safe_load(""" version: 1 formatters: simple: format: "%(levelname)s from %(name)s: %(message)s" handlers: stream_handler: c...
101
26.21
88
16
635
python
[{"finding_id": "codeql_py/reflective-xss_6b0f45c41dcadf57_d1f3c945", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
6
true
[ "CWE-079", "CWE-918", "CWE-918", "CWE-918", "CWE-117", "CWE-117" ]
[ "py/reflective-xss", "py/partial-ssrf", "py/partial-ssrf", "py/partial-ssrf", "py/log-injection", "py/log-injection" ]
[ "HIGH", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1).", "This log ent...
[ 55, 54, 61, 77, 78, 83 ]
[ null, null, null, null, null, null ]
[ 12, 21, 21, 21, 38, 74 ]
[ 57, 68, 68, 68, 48, 84 ]
2024-11-18T22:26:12.650618+00:00
1,559,498,677,000
988d0aac6766c3ba760245526da68e9a7c15cd6f
3
{ "blob_id": "988d0aac6766c3ba760245526da68e9a7c15cd6f", "branch_name": "refs/heads/master", "committer_date": 1559498677000, "content_id": "57e96dafb66f2b0ac59f9e48102a9f891328ea3a", "detected_licenses": [ "MIT" ], "directory_id": "3ba8a81fb2ef7bcdf3a28957fac8577bbed3e9a5", "extension": "py", "fi...
2.734375
stackv2
from dataclasses import dataclass from datetime import datetime from typing import List, Tuple, Optional import logging import pytz import requests from requests import HTTPError from marshmallow import Schema, fields, post_load # Because this is a library, we don't want to force logs on people if they # don't confi...
301
29.95
79
16
1,979
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8417f5099e2e136f_2dba0df0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
7
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (p...
[ 190, 222, 241, 246, 273, 292, 297 ]
[ null, null, null, null, null, null, null ]
[ 22, 43, 26, 26, 43, 26, 26 ]
[ 41, 46, 55, 60, 46, 55, 60 ]
2024-11-18T20:39:52.488846+00:00
1,555,933,182,000
1767df03b3e7f418bb33ffcde267aea5deb1d6bb
3
{ "blob_id": "1767df03b3e7f418bb33ffcde267aea5deb1d6bb", "branch_name": "refs/heads/master", "committer_date": 1555933182000, "content_id": "b67b1a4254556f62f551fc1f2b444e0ee6993d0a", "detected_licenses": [ "MIT" ], "directory_id": "831c8360eb9ddf10b912f2a7b39127143c48f0d2", "extension": "py", "fi...
2.703125
stackv2
from telegram.ext import Updater from telegram.ext import CommandHandler, MessageHandler, Filters from pprint import pprint as pp import requests from conf import * API_URL = ('http://api.openweathermap.org/data/2.5/weather?q={}&mode=json&units=metric&appid={}') API_URL_LOC = "http://api.openweathermap.org/data/2.5/w...
84
35.75
149
16
730
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d6b5b5cde3cdf28e_60465b9e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 50 ]
[ null ]
[ 15 ]
[ 89 ]
2024-11-18T21:31:31.686281+00:00
1,634,430,788,000
8833e343123ee0da7a82bf8c019a95728cb9ffe0
3
{ "blob_id": "8833e343123ee0da7a82bf8c019a95728cb9ffe0", "branch_name": "refs/heads/master", "committer_date": 1634430788000, "content_id": "26abf067159515a813e5a74a18f599ba56c712bc", "detected_licenses": [ "MIT" ], "directory_id": "9a6594f0225c161cc67f32680d3705ef4884e38c", "extension": "py", "fi...
3.171875
stackv2
import phonenumbers from phonenumbers import geocoder from phonenumbers import carrier import pyfiglet def show_details(number): try: phone_number = phonenumbers.parse(number) number_location = geocoder.description_for_number(phone_number, 'en') service_provider = carrier.name_for_number(p...
33
25.91
87
13
214
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_86ae1e0ca4f6c24b_50c899e2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 13, 15 ]
[ null, null ]
[ 15, 15 ]
[ 43, 40 ]
2024-11-18T21:31:57.819263+00:00
1,557,768,528,000
c7df055e5e825b71233d66d86bf3865ef7ef8f04
3
{ "blob_id": "c7df055e5e825b71233d66d86bf3865ef7ef8f04", "branch_name": "refs/heads/master", "committer_date": 1557768528000, "content_id": "c057218af95c6f886636c646ea2f2af2817ec5d9", "detected_licenses": [ "Apache-2.0" ], "directory_id": "54d0e2a465fff88b93b4fbca3029d15d9f97ea9b", "extension": "py"...
2.6875
stackv2
import cherrypy from base64 import b64encode from hashlib import sha256 from os import urandom from time import time_ns from pymongo.database import Database from api.base import Base # This class is used for authorizing users with tokens. @cherrypy.expose class Authenticate(Base): def __init__(self, db: Databas...
46
33.15
79
23
376
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_6cd7b304040e088a_79730f41", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 21 ]
[ null ]
[ 34 ]
[ 62 ]
2024-11-18T21:32:11.966616+00:00
1,618,080,422,000
c746022617293d08dd25fddbbeda9ba08fdd2412
3
{ "blob_id": "c746022617293d08dd25fddbbeda9ba08fdd2412", "branch_name": "refs/heads/main", "committer_date": 1618080422000, "content_id": "b1cedd9bb9ab3c77333880e7ebd56c6df27668b2", "detected_licenses": [ "Apache-2.0" ], "directory_id": "c6ba92f2111632d25a22fbc1cbcd75480dca63bf", "extension": "py", ...
3.4375
stackv2
from Crypto.Cipher import DES import binascii #we can use the DES algorithm like this #there are several modes (7 modes) # 1.) ECB: "Electronic Code Book" -> we use DES on every 64 bits long plaintext block # these blocks are independnt of each other so we use DES seperately on every block # 2.) CBC: "Cipher...
58
35.43
134
11
518
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_1921efc8f64a1b79_68ed12d7", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.\n[The cryptograph...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.\n[The cryptographic algorithm DES](2) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used.\n[The cryptographic algorithm DES](2) is broken or weak, and should not be used." ]
[ 39, 43 ]
[ null, null ]
[ 12, 12 ]
[ 34, 35 ]
2024-11-18T21:32:19.195551+00:00
1,671,495,976,000
255b19a7826859579bbb1d5de51cffec2ab6fff0
3
{ "blob_id": "255b19a7826859579bbb1d5de51cffec2ab6fff0", "branch_name": "refs/heads/master", "committer_date": 1671495976000, "content_id": "2531953d33ca0efc83a89255bcb5d18bec97c73f", "detected_licenses": [ "Apache-2.0" ], "directory_id": "705622f26400cfb205bbdea85b82d46c81c07263", "extension": "py"...
2.546875
stackv2
import logging from hashlib import sha1 from typing import Optional from django.conf import settings from django.contrib.auth.models import User from itsdangerous import BadSignature, TimedJSONWebSignatureSerializer logger = logging.getLogger("atlas") def generate_token(user: User, expires_in: int = 3600 * 24 * 30)...
37
29.54
76
16
276
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_550e9cac8d5c6ed1_5ab664cf", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 37 ]
[ null ]
[ 17 ]
[ 64 ]
2024-11-18T21:32:19.707794+00:00
1,554,272,298,000
ef05fe0a78527334217f6ef612fa2969cd1895d6
3
{ "blob_id": "ef05fe0a78527334217f6ef612fa2969cd1895d6", "branch_name": "refs/heads/master", "committer_date": 1554272298000, "content_id": "ca7b75da15246c036159435f7251b9c11783466f", "detected_licenses": [ "MIT" ], "directory_id": "cd77533244aada190434f2d493fa6d40ae0765a1", "extension": "py", "fi...
2.53125
stackv2
import warnings warnings.filterwarnings("ignore") from flask import Flask, request, Response, redirect, jsonify import jsonpickle, os import numpy as np import pickle, cv2, uuid, datetime import ElRoiApp.roi_backbone.api as face_recognition import ElRoiApp.roi_backbone.mlearning_knn_model as mlearning import dlib det...
137
34.78
110
15
1,191
python
[{"finding_id": "codeql_py/url-redirection_6f493578322f693f_9598113c", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
2
true
[ "CWE-601", "CWE-601" ]
[ "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 34, 39 ]
[ null, null ]
[ 29, 29 ]
[ 40, 40 ]
2024-11-18T21:32:21.314837+00:00
1,449,415,838,000
ea030e55edf9f372c2ee5a0c5fec845178ba1376
3
{ "blob_id": "ea030e55edf9f372c2ee5a0c5fec845178ba1376", "branch_name": "refs/heads/master", "committer_date": 1449415838000, "content_id": "64eb88c5148bc8e8e5ce25a69a0fca570f2052fe", "detected_licenses": [ "MIT" ], "directory_id": "f3545d695c0dde854598d66a308b67e15727085c", "extension": "py", "fi...
2.6875
stackv2
"""Copyright (c) 2012 Charles Kaminski (CharlesKaminski@gmail.com) Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify...
414
30.15
80
16
3,516
python
[{"finding_id": "codeql_py/bad-tag-filter_3fc2437f4440ddc9_b83da5f7", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression does not match script end tags like </script >.", "remediation": "", "location": {"file_...
1
true
[ "CWE-116" ]
[ "py/bad-tag-filter" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression does not match script end tags like </script >." ]
[ 35 ]
[ null ]
[ 13 ]
[ 46 ]
2024-11-18T21:33:02.637845+00:00
1,593,260,115,000
6fa21a238e7d52658f7679ed28338e73d49ac3e4
3
{ "blob_id": "6fa21a238e7d52658f7679ed28338e73d49ac3e4", "branch_name": "refs/heads/master", "committer_date": 1593260115000, "content_id": "c536f33fc4792915009506afece3c22c889d9392", "detected_licenses": [ "MIT" ], "directory_id": "7c1572cff5c78b587ada922a25ccbbd23978def4", "extension": "py", "fi...
2.953125
stackv2
from Crypto.Cipher import PKCS1_OAEP from Crypto.PublicKey import RSA import base64 def genrateKeys(private_key_path, public_key_path): private_key = RSA.generate(1024) public_key = private_key.publickey() private_pem = private_key.exportKey().decode() public_pem = public_key.exportKey().decode() ...
40
30.93
75
15
342
python
[{"finding_id": "codeql_py/weak-crypto-key_0b8693d0332dee66_32ad343d", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",...
1
true
[ "CWE-326" ]
[ "py/weak-crypto-key" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable." ]
[ 7 ]
[ null ]
[ 19 ]
[ 37 ]
2024-11-18T21:49:06.631666+00:00
1,622,575,048,000
3c0e49bcb598dd221d068343e6ffe92f1c32910f
3
{ "blob_id": "3c0e49bcb598dd221d068343e6ffe92f1c32910f", "branch_name": "refs/heads/main", "committer_date": 1622575048000, "content_id": "3af717511067a9b5ca611f4ab05ced8c7f8110af", "detected_licenses": [ "Unlicense" ], "directory_id": "67889387912976b86c282d9a5adc1f9e16913ba7", "extension": "py", ...
2.765625
stackv2
# -*- coding: utf-8 -*- """ File: pwned_password.py Description: Tasks related to API calls to pwnedpasswords.com. For more info on the API docs, see https://haveibeenpwned.com/API/v2 Author: E. Chris Pedro Created: 2020-01-20 This is free and unencumbered software released into the public domain. Anyone is free to...
70
34.81
79
15
611
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_b6eace94dd222b14_19fc1d15", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 57 ]
[ null ]
[ 25 ]
[ 47 ]
2024-11-18T22:42:15.085468+00:00
1,589,727,113,000
4a40b001bc5fccc5d7611838da9103640cb68f64
4
{ "blob_id": "4a40b001bc5fccc5d7611838da9103640cb68f64", "branch_name": "refs/heads/master", "committer_date": 1589727113000, "content_id": "92587e16d34ca9ec9e345f2f0259f529305cfc9c", "detected_licenses": [ "MIT" ], "directory_id": "996ec3531fa8ed6d389b5199300f235df9e3e0c4", "extension": "py", "fi...
3.640625
stackv2
from amnesiac import blurry_memory import random import string class Chromosome: """ CLass to define password. Sequence refers to the password string. Fitness refers to the fitness value received for the password from blurry_memory method """ def __init__(self, sequence, fitness=None): ...
150
36.06
105
13
1,263
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_31ef52a92af01cff_9b54e294", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 148 ]
[ null ]
[ 26 ]
[ 39 ]
2024-11-18T20:31:24.088798+00:00
1,482,343,724,000
309a43eabdc2a4e7f8f48c139f47628a8b3954f9
2
{ "blob_id": "309a43eabdc2a4e7f8f48c139f47628a8b3954f9", "branch_name": "refs/heads/master", "committer_date": 1482343729000, "content_id": "c1d221e1f213b1e3ee5b309ebde0ff961638a5b3", "detected_licenses": [ "MIT" ], "directory_id": "a2f67937ab7ef9519572b573e73da5654b891362", "extension": "py", "fi...
2.3125
stackv2
# Copyright (C) 2016 Codethink Limited # # This program is free software: you can redistribute it and/or modify # it under the terms of the GNU Affero General Public License as published by # the Free Software Foundation, either version 3 of the License, or # (at your option) any later version. # # This program is dist...
85
30.69
93
21
616
python
[{"finding_id": "codeql_py/bad-tag-filter_0c9e7601d311df0c_16e662f2", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression only parses --> and not --!> as a HTML comment end tag.", "remediation": "", "location":...
1
true
[ "CWE-116" ]
[ "py/bad-tag-filter" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression only parses --> and not --!> as a HTML comment end tag." ]
[ 70 ]
[ null ]
[ 28 ]
[ 37 ]
2024-11-18T20:31:35.777765+00:00
1,607,650,454,000
493d680889fd991218eb9e0376932e251ce61a4a
2
{ "blob_id": "493d680889fd991218eb9e0376932e251ce61a4a", "branch_name": "refs/heads/master", "committer_date": 1607650454000, "content_id": "72466deb9028ee3e22de90c4f14b2a41c6a162f2", "detected_licenses": [ "MIT" ], "directory_id": "fb748834fe2f16e360a4de6b89dca84b148ae2fa", "extension": "py", "fi...
2.390625
stackv2
import requests import json try: requests.packages.urllib3.disable_warnings() except: pass hostname = "198.18.133.27" username = "admin" password = "C1sco12345" endpoint_name = "IOT_Assets" endpoint_description = "PLCs, HMIs, and other IOT Assets" print(f"\n==> Creates a new endpoint group.") if __name__ ==...
37
27.92
131
15
269
python
[{"finding_id": "codeql_py/request-without-cert-validation_91cc49e17d61b431_290cc619", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 29 ]
[ null ]
[ 20 ]
[ 132 ]
2024-11-18T20:31:36.169008+00:00
1,591,381,368,000
de99cda1f8a8ed32faf71a38ee1264419642d48e
3
{ "blob_id": "de99cda1f8a8ed32faf71a38ee1264419642d48e", "branch_name": "refs/heads/master", "committer_date": 1591381368000, "content_id": "80ef132a3cb12645f9b719bdae25f3a514377fd8", "detected_licenses": [ "MIT" ], "directory_id": "16b42d0f6fac8ae6009b23683633aa837bab6f1f", "extension": "py", "fi...
2.609375
stackv2
from flask import Flask,request from flask_cors import CORS,cross_origin app = Flask(__name__) cors=CORS(app) queue = [] RFID = [] count = 0 if __name__ == '__main__': app.run() @app.route('/') @cross_origin() def hello(): return "Server Working Fine!!!" @app.route('/airportInfo/<string:name>') @cross_ori...
70
21.94
81
13
389
python
[{"finding_id": "codeql_py/reflective-xss_ddef0e6eeaf69e6d_089dfee3", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
3
true
[ "CWE-079", "CWE-079", "CWE-079" ]
[ "py/reflective-xss", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 22, 27, 32 ]
[ null, null, null ]
[ 12, 12, 12 ]
[ 56, 52, 67 ]
2024-11-18T20:53:34.835302+00:00
1,610,630,905,000
32982bf5d17bd3725ee74b7049112c3e37b3cb87
3
{ "blob_id": "32982bf5d17bd3725ee74b7049112c3e37b3cb87", "branch_name": "refs/heads/main", "committer_date": 1610630905000, "content_id": "3d01926ee8477b800a26bda49fd1b6e6e36104b5", "detected_licenses": [ "MIT" ], "directory_id": "deeca3b09a3a40ea84005268980d34a14ec82b72", "extension": "py", "file...
3.265625
stackv2
import random import secrets import hashlib import uuid def hash_function(password): #generate a random uuid as salt salt = uuid.uuid4().hex print("\nsalt = "+salt) return hashlib.sha256(salt.encode("ascii", "replace")+password.encode("ascii", "replace")).hexdigest()+':'+salt def check_password(ha...
30
40.63
125
15
219
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7a4e60cab97ddd53_5af9a636", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
4
true
[ "CWE-312", "CWE-312", "CWE-327", "CWE-327" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[...
[ 22, 29, 12, 17 ]
[ null, null, null, null ]
[ 7, 8, 27, 39 ]
[ 31, 40, 94, 113 ]
2024-11-18T20:53:38.249633+00:00
1,676,139,610,000
4525af595d249342f431392a7d2518626b826e08
3
{ "blob_id": "4525af595d249342f431392a7d2518626b826e08", "branch_name": "refs/heads/master", "committer_date": 1676139610000, "content_id": "c8c3266516e19f1e9ec32e84e151d824212c78d6", "detected_licenses": [ "MIT" ], "directory_id": "255e19ddc1bcde0d3d4fe70e01cec9bb724979c9", "extension": "py", "fi...
3.046875
stackv2
# This program is free software: you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation, either version 3 of the License, or # (at your option) any later version. # # This program is distributed in the hope that it will be useful, # b...
115
40.9
128
11
1,920
python
[{"finding_id": "codeql_py/overly-large-range_f432b605c5d5952d_3fd9c61d", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\d in the same character class.", "remediation": "", "loc...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with \\d in the same character class." ]
[ 58 ]
[ null ]
[ 47 ]
[ 50 ]
2024-11-18T21:10:20.904608+00:00
1,625,042,016,000
612d1489b6654e12ba7ab5561ab59b92ef6cb0c2
3
{ "blob_id": "612d1489b6654e12ba7ab5561ab59b92ef6cb0c2", "branch_name": "refs/heads/main", "committer_date": 1625042016000, "content_id": "b306db8cfde608f7c8bcbe954e0643f8f251b0b3", "detected_licenses": [ "MIT" ], "directory_id": "a228cd9bd9a2a650736e2b944d6d95a9bfbf0850", "extension": "py", "file...
2.703125
stackv2
import requests from bs4 import BeautifulSoup as bs from datetime import datetime url = "http://sejong.korea.ac.kr/campuslife/facilities/dining/weeklymenu" def get_bob_image(): res = requests.get(url, verify=False) soup = bs(res.text, 'html.parser') for a in soup.select('a'): if a.text == "교직원식당 ...
37
29.89
73
23
288
python
[{"finding_id": "codeql_py/request-without-cert-validation_814c8ac6051ab7a9_c9b02175", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 8, 17 ]
[ null, null ]
[ 11, 11 ]
[ 42, 42 ]
2024-11-18T21:10:22.915785+00:00
1,580,934,154,000
e63a4b77607bd5bfe5710a42007629c3e97146df
3
{ "blob_id": "e63a4b77607bd5bfe5710a42007629c3e97146df", "branch_name": "refs/heads/master", "committer_date": 1580934154000, "content_id": "124a2e8454bb2b1d96c090f6cef9b642fb28d1f4", "detected_licenses": [ "MIT" ], "directory_id": "c6e20198e54d2bdb361640aee0fd5811b3d49978", "extension": "py", "fi...
2.609375
stackv2
import json import os VCR_ANNOTS_DIR = '/mnt/home/yangshao/vcr/train_val_data' GENDER_NEUTRAL_NAMES = ['Casey', 'Riley', 'Jessie', 'Jackie', 'Avery', 'Jaime', 'Peyton', 'Kerry', 'Jody', 'Kendall', 'Peyton', 'Skyler', 'Frankie', 'Pat', 'Quinn'] def tokenize(tokenized_sent, obj_to_type): res =...
37
40.3
117
17
414
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_89645384b421936c_277a0324", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text." ]
[ 31 ]
[ null ]
[ 25 ]
[ 59 ]
2024-11-18T21:10:34.664109+00:00
1,558,507,397,000
b53d84df915c2b06d530629b61d52cfcb47dc0fa
3
{ "blob_id": "b53d84df915c2b06d530629b61d52cfcb47dc0fa", "branch_name": "refs/heads/master", "committer_date": 1558507397000, "content_id": "2ea608c74b5f4982884c705a8fe9f8dc2d6a2d75", "detected_licenses": [ "MIT" ], "directory_id": "eb6eeb0b983b76e89443c02ff98fb4cd5fde48cb", "extension": "py", "fi...
3.34375
stackv2
import hashlib class User(object): def __init__(self, username, password): self.username = username self.password = self._encrypt_pw(password) self.is_logged_in = False def _encrypt_pw(self, password): hash_string = (self.username + password) hash_string = hash_string...
28
23.46
58
11
141
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_242f9142713ad4c1_747ca5dc", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e...
[ 14 ]
[ null ]
[ 31 ]
[ 42 ]
2024-11-18T21:11:12.081770+00:00
1,550,465,485,000
4f7e5ec57c33bbf16e3a658e91d51c2849643ca5
3
{ "blob_id": "4f7e5ec57c33bbf16e3a658e91d51c2849643ca5", "branch_name": "refs/heads/master", "committer_date": 1550465485000, "content_id": "3a0619f504711a33edf920d1e97d341ac8375709", "detected_licenses": [ "MIT" ], "directory_id": "fa5112354ad4f3f73c2e2532f8689aefe605f3ea", "extension": "py", "fi...
2.96875
stackv2
from flask import Flask, request, jsonify from .processor import Processor import json def create_app(): import nltk nltk.download('punkt') # Download nltk data used for newspaper NLP app = Flask(__name__) @app.route('/') def hello_world(): return jsonify({ "ok": True }) @app.route...
34
24.09
71
16
184
python
[{"finding_id": "codeql_py/stack-trace-exposure_0a853ec4089fa661_0cd86426", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 28 ]
[ null ]
[ 28 ]
[ 38 ]
2024-11-18T21:47:36.256011+00:00
1,645,324,610,000
60f4bdee7e32222c3475504e526b336b71fe81e2
3
{ "blob_id": "60f4bdee7e32222c3475504e526b336b71fe81e2", "branch_name": "refs/heads/master", "committer_date": 1645324610000, "content_id": "1f58ff5b1ac08afbac6ea33fc59c18b7f28529f4", "detected_licenses": [ "MIT" ], "directory_id": "7fbda7ec849047ef3af3d34b10ecfd9c0e75aa50", "extension": "py", "fi...
3
stackv2
from collections import namedtuple from Crypto import Random from Crypto.Cipher import AES from Crypto.Hash import HMAC from Crypto.Hash import SHA256 from Crypto.Protocol import KDF EncryptedKey = namedtuple('EncryptedKey', ['salt', 'rounds', 'encrypted_key']) class PBKDF2SHA256AES256(object): KDF_NAME = 'PBK...
63
35.89
78
17
559
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_bd351febaa7f2732_bb590863", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 46, 62 ]
[ null, null ]
[ 25, 15 ]
[ 48, 62 ]
2024-11-18T21:47:40.365241+00:00
1,643,706,550,000
8f051d4862810c5028fb895a68710efa06b0986b
3
{ "blob_id": "8f051d4862810c5028fb895a68710efa06b0986b", "branch_name": "refs/heads/main", "committer_date": 1643706550000, "content_id": "de4ba40b647278e5945043c25dd98bd139669b03", "detected_licenses": [ "MIT" ], "directory_id": "8e2162cb9e763badfd10ede3ea8bbd852dc0aebe", "extension": "py", "file...
2.65625
stackv2
from PIL import Image from os import path from collections import Counter from wordcloud import WordCloud, STOPWORDS, ImageColorGenerator, get_single_color_func from matplotlib.patches import Patch #NEW import matplotlib.pyplot as plt import numpy as np from matplotlib import cm, colors from urllib import parse as pars...
213
34.62
102
16
1,874
python
[{"finding_id": "codeql_py/request-without-cert-validation_7cd649af5d268be9_ea4827ce", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 28 ]
[ null ]
[ 14 ]
[ 53 ]
2024-11-18T22:28:48.110927+00:00
1,467,622,508,000
f89b744b7ad789ea923d838847acbf93dc6e7f60
2
{ "blob_id": "f89b744b7ad789ea923d838847acbf93dc6e7f60", "branch_name": "refs/heads/master", "committer_date": 1467622508000, "content_id": "4bb58f7467291fc91badc9731fa979d1b2ad7559", "detected_licenses": [ "Apache-2.0" ], "directory_id": "bd9b4e3793862e8f611b1af33fe925f619a930fa", "extension": "py"...
2.46875
stackv2
import asyncio import hashlib from aiohttp import web from leela.core.service import LeelaService from leela.core.decorators import leela_post SESSION_USER_KEY = '_leela_user' class authorization(object): def __init__(self, *roles): self.__roles = set(roles) def allowed_roles(self): return...
73
28.36
76
15
438
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_20bc0c019d0296f8_37251832", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.", "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally e...
[ 30, 35 ]
[ null, null ]
[ 35, 35 ]
[ 52, 52 ]
2024-11-18T22:29:30.754786+00:00
1,595,347,148,000
7b73edfd9c1b29db117adba23706dcbca59d1933
2
{ "blob_id": "7b73edfd9c1b29db117adba23706dcbca59d1933", "branch_name": "refs/heads/master", "committer_date": 1595347148000, "content_id": "32e01241c42863a164d2f0858bcc6eb6ed29e3f5", "detected_licenses": [ "MIT" ], "directory_id": "f430b97a90639906c1d6f879a9107bd3b488ae0f", "extension": "py", "fi...
2.4375
stackv2
#!/usr/bin/env python3 from multiprocessing import shared_memory import logging import signal import json from flask import Flask, request from multiprocessing import Process from mqtt2timescale.postgres_connector import TimescaleConnector from mqtt2timescale.mqtt_app import setup_mqtt from utils.environment import M...
59
31.08
103
14
449
python
[{"finding_id": "codeql_py/log-injection_0d86c24100ea9221_39ef9b32", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 27 ]
[ null ]
[ 22 ]
[ 40 ]
2024-11-18T22:29:37.812621+00:00
1,450,920,455,000
5aeb04c1fa25bd6998ac2f1de0abd974b714ee38
2
{ "blob_id": "5aeb04c1fa25bd6998ac2f1de0abd974b714ee38", "branch_name": "refs/heads/master", "committer_date": 1450920455000, "content_id": "3b0af94ae539e4790bfa812c0623cbb8abb7e86c", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "551721b32c5808f12d413d5fb0c3f2ad6395ad4f", "extension": "p...
2.421875
stackv2
#from gevent import monkey #monkey.patch_all() import socket import httplib import time import Queue import os import errno import logging import utils import ssl class Connection(): def __init__(self, sock): self.sock = sock self.create_time = time.time() def close(self): self.sock....
169
32.64
135
20
1,233
python
[{"finding_id": "codeql_py/insecure-default-protocol_1201d9f9ff1ee776_cf0d1410", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/insecure-default-protocol", "py/insecure-default-protocol" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used.", "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used." ]
[ 51, 53 ]
[ null, null ]
[ 32, 32 ]
[ 103, 83 ]
2024-11-18T22:29:41.034054+00:00
1,550,551,014,000
b71f93d2568a2c5d5f46aeeae20c2e8964737539
2
{ "blob_id": "b71f93d2568a2c5d5f46aeeae20c2e8964737539", "branch_name": "refs/heads/master", "committer_date": 1550551014000, "content_id": "5c1657177275024d2c34be3d912d84ee53122f8b", "detected_licenses": [ "Apache-2.0" ], "directory_id": "f134311292b98506f9d3d2ece2ac2e7e295a2496", "extension": "py"...
2.484375
stackv2
from django.shortcuts import render, redirect from django.views import View from tf_identification.forms import UploadFileForm from webapp.settings import BASE_DIR from django.utils.crypto import get_random_string import time, os, random def handle_uploaded_file(f, filename, gorilla, topTF): ''' Handle and process...
96
46
172
17
927
python
[{"finding_id": "codeql_py/command-line-injection_13618e0ecc3d84c5_e8dbef9b", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {...
3
true
[ "CWE-078", "CWE-022", "CWE-022" ]
[ "py/command-line-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This command line depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 18, 67, 70 ]
[ null, null, null ]
[ 15, 27, 27 ]
[ 92, 83, 83 ]
2024-11-18T22:40:37.278451+00:00
1,476,701,703,000
8218bbd1a8746001fe7d6d0f23cdf5c6a08acc63
2
{ "blob_id": "8218bbd1a8746001fe7d6d0f23cdf5c6a08acc63", "branch_name": "refs/heads/master", "committer_date": 1476701703000, "content_id": "ca538b29b20fad05aa43b1dff7f066d34a155ecf", "detected_licenses": [ "MIT" ], "directory_id": "0aebf6e8bdf6de43f038dea01741645a4febd451", "extension": "py", "fi...
2.4375
stackv2
import requests import json class Connection: def __init__(self, serverUrl): self.url = serverUrl self.auth = "" def get_token(self, nutzer, passwd): requestString = self.url + "/gettoken" r = requests.post(requestString, data={'nutzer': nutzer, '...
122
27.33
156
14
845
python
[{"finding_id": "codeql_py/request-without-cert-validation_86c1c67688bf2a3d_f6a7bd22", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
7
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 16, 32, 48, 64, 80, 96, 111 ]
[ 17, 33, 49, 65, 81, 97, 112 ]
[ 13, 13, 13, 13, 13, 13, 13 ]
[ 82, 137, 81, 97, 157, 75, 64 ]
2024-11-18T22:41:16.845048+00:00
1,389,446,625,000
76ec47e4038b90dc92706217cdd534551977567c
3
{ "blob_id": "76ec47e4038b90dc92706217cdd534551977567c", "branch_name": "refs/heads/master", "committer_date": 1389446625000, "content_id": "3a5d2a4dbd55173ed13451a1ac318058d99d259d", "detected_licenses": [ "Apache-2.0" ], "directory_id": "c8e2b03672f71b83ae1c064b3cfc0550ee849399", "extension": "py"...
2.59375
stackv2
#!/usr/bin/env python from RibParser import RibDump from optparse import OptionParser from pybgpdump import BGPDump from os import listdir from os.path import isfile, join import pygal import tarfile from operator import itemgetter import math resourcesPath="../../resources/" bgpUpdatesPath = resourcesPath + "updat...
221
36.15
176
17
2,096
python
[{"finding_id": "codeql_py/tarslip_97c470e5fd20b8ba_8221b9b9", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 29 ]
[ null ]
[ 5 ]
[ 10 ]
2024-11-18T22:54:05.005306+00:00
1,531,307,986,000
ff11fb2a09cbfd0ef55ebb956c02f8220c8058b7
2
{ "blob_id": "ff11fb2a09cbfd0ef55ebb956c02f8220c8058b7", "branch_name": "refs/heads/master", "committer_date": 1531307986000, "content_id": "b131fdef4dac4c3d85daa2260d08204d455de773", "detected_licenses": [ "MIT" ], "directory_id": "714f0b053cfb18e473097b33dc80a593e1cf7350", "extension": "py", "fi...
2.390625
stackv2
import sys import os import re import jinja2 as jj from .params import Params class Template: """ """ def __init__(self, params=None, iframe=True): """ """ dir_file = os.path.dirname(os.path.abspath(__file__)) dir_template = os.path.joi...
43
23.49
61
13
194
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_b0b0df2d8f3354b6_3eff6589", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 25 ]
[ 30 ]
[ 15 ]
[ 31 ]
2024-11-18T22:54:05.652798+00:00
1,600,752,443,000
7ecd9eeb4e4068fcd431f9e7134d50dfcc8a4ce3
3
{ "blob_id": "7ecd9eeb4e4068fcd431f9e7134d50dfcc8a4ce3", "branch_name": "refs/heads/master", "committer_date": 1600752443000, "content_id": "cafe19f3a6eb63bc85745de0bc7a287e226f1141", "detected_licenses": [ "MIT" ], "directory_id": "89aa88c7e458c545de2fd01f9cb81216da4bdda7", "extension": "py", "fi...
2.640625
stackv2
from flask import Flask, render_template, request, url_for from pymongo import MongoClient import datetime, pprint, os app = Flask(__name__) client = MongoClient('localhost', 27017) db = client.test_database collection = db.test_collection @app.route("/hello") @app.route('/hello/<name>') def hello(name=None): re...
44
28.27
101
14
306
python
[{"finding_id": "codeql_py/path-injection_0cacce18aebf410c_f7786bb4", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 32 ]
[ null ]
[ 16 ]
[ 34 ]
2024-11-18T20:55:05.153939+00:00
1,565,683,031,000
2ec53b5f1243e54a9215373fb36ebd4c3b7372c9
2
{ "blob_id": "2ec53b5f1243e54a9215373fb36ebd4c3b7372c9", "branch_name": "refs/heads/master", "committer_date": 1565683031000, "content_id": "eba5021099e3e00b809502c6a38dcb3e9e85598b", "detected_licenses": [ "MIT" ], "directory_id": "6fe88652de578f5a5b5fa8cd11ff824b7bd3af9c", "extension": "py", "fi...
2.375
stackv2
from flask import render_template, redirect, url_for, flash, request from . import auth from flask_login import login_required, login_user, logout_user from ..models import Writer from .forms import RegistrationForm, LoginForm from .. import db from ..writer import writer_user @auth.route('/login', methods=['GET', 'PO...
36
39.75
114
16
309
python
[{"finding_id": "codeql_py/url-redirection_fe464a2e8c6f43c2_dc7f779e", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 17 ]
[ null ]
[ 29 ]
[ 89 ]
2024-11-18T20:55:06.714562+00:00
1,601,846,670,000
15db09a244768d4d9b49be70d00e4c8b65be98df
2
{ "blob_id": "15db09a244768d4d9b49be70d00e4c8b65be98df", "branch_name": "refs/heads/master", "committer_date": 1601846670000, "content_id": "18551516b3800e7e501208407e12061b7a8f5431", "detected_licenses": [ "MIT" ], "directory_id": "8a1d2e6946f3c9c8003ddf3b96cb5ba06762c62c", "extension": "py", "fi...
2.328125
stackv2
import paramiko import sys import argparse, time arg_parser = argparse.ArgumentParser() arg_parser.add_argument('hostname', type=str) arg_parser.add_argument('username', type=str) arg_parser.add_argument('password', type=str) args = arg_parser.parse_args() ## EDIT SSH DETAILS ## SSH_COMMAND = "uname -a" ## CODE BE...
32
24.53
89
11
190
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_759033da3b87282f_ac2a4e92", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 19 ]
[ null ]
[ null ]
[ 58 ]
2024-11-18T21:33:16.201116+00:00
1,531,911,765,000
1a3b1b43b2d12f0aab1901e62e2366baf896d12e
2
{ "blob_id": "1a3b1b43b2d12f0aab1901e62e2366baf896d12e", "branch_name": "refs/heads/master", "committer_date": 1531911765000, "content_id": "d58343db6c4f2902f618ed92a478985791693a40", "detected_licenses": [ "MIT" ], "directory_id": "d6b357f7551db033c96fefe3083bd1e2563160d8", "extension": "py", "fi...
2.421875
stackv2
import graphene from db import db_session from schema_models import PeopleCredentialSchemaModel from db_models import PeopleCredentialDBModel import jwt class LoginParams(graphene.InputObjectType): username = graphene.String(description='username or email.', required=True) password = graphene.String(required...
70
29.47
81
18
400
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_ab2269fb6d9bc3df_422393e9", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e...
[ 28 ]
[ null ]
[ 41 ]
[ 49 ]
2024-11-18T21:56:07.419287+00:00
1,559,066,815,000
312fbaf4e4a4cbc8222af449ce188116fa04be23
3
{ "blob_id": "312fbaf4e4a4cbc8222af449ce188116fa04be23", "branch_name": "refs/heads/master", "committer_date": 1559066815000, "content_id": "8907339dc6a1a27e4d3eddce56fc99f6b98d723f", "detected_licenses": [ "MIT" ], "directory_id": "c7aa860868f150226ec3290489e73307223a5677", "extension": "py", "fi...
2.734375
stackv2
import json import re import requests from bs4 import BeautifulSoup, NavigableString from constants import SEARCH_OBJECT_TYPE, OPEN_SEARCH, TOOLTIP, Q_COLORS, TOOLTIP_ARGS from tooltip import build_tooltip class OpenSearchError(Exception): pass class SearchObjectError(Exception): pass class OpenSearch: ...
254
39.12
152
26
2,063
python
[{"finding_id": "codeql_py/overly-large-range_41961f7e4daaf857_7cce1241", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 51 ]
[ null ]
[ 51 ]
[ 54 ]
2024-11-18T22:39:33.047839+00:00
1,499,322,368,000
6f125d830efc7f290bdf8a57fc765772f5c39e97
3
{ "blob_id": "6f125d830efc7f290bdf8a57fc765772f5c39e97", "branch_name": "refs/heads/master", "committer_date": 1499322368000, "content_id": "db2259ddc303ec76ca85a75a6464dcc024fc7301", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e5499f5c1bd0ddfc15c8178efbb828185a980391", "extension": "py"...
2.609375
stackv2
"""Compile the website""" import os.path import glob import jinja2 import subprocess import json from gul import task from gul import run @task('html') def html(): write_html( source='src/html/*.html', dest='dist', context=json.load(open('src/data/global.json'))) def write_html(source:...
55
24.42
66
15
328
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_ce921907ba8489c8_1b1f9543", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 24 ]
[ null ]
[ 11 ]
[ 67 ]
2024-11-18T22:39:40.637463+00:00
1,622,599,584,000
0f314ee0e9ec4f11ebd38e4fe588ebc138df97b7
2
{ "blob_id": "0f314ee0e9ec4f11ebd38e4fe588ebc138df97b7", "branch_name": "refs/heads/main", "committer_date": 1622599584000, "content_id": "1a94ca08c8323ed4c3d4237039fd6c5e094d334b", "detected_licenses": [ "MIT" ], "directory_id": "90f223fecb93da48cccaeec51b99b23e77a05b43", "extension": "py", "file...
2.328125
stackv2
from flask import Blueprint, Response, jsonify, request from flask_cors import CORS from routes.analizer import interpreter tables = Blueprint('tables', __name__) CORS(tables) @tables.route('/create/<db>/<name>', methods=['GET']) def create(db, name): return {"msg": f'table {name} created'}, 200 @tables.route('/s...
23
30.09
55
11
193
python
[{"finding_id": "codeql_py/reflective-xss_46d130f1ec60532f_f8cebac0", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 9 ]
[ null ]
[ 12 ]
[ 49 ]
2024-11-18T22:54:59.443566+00:00
1,463,293,550,000
0f7c721d301e8c2ddfceaa69e97ebe076ceceb0b
3
{ "blob_id": "0f7c721d301e8c2ddfceaa69e97ebe076ceceb0b", "branch_name": "refs/heads/master", "committer_date": 1463293550000, "content_id": "fa6802eb90ead014e26a6d246561f3285e9f4707", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "dea439d3f49922448e97e11147eba2ca14a63c9b", "extension": "p...
2.5625
stackv2
# coding: utf-8 # This is an example of registering a python web service. You can access the a service which # is registered by name /python-web by http://localhost/app/python-web # In[ ]: #This creates a web service located off import tornado.web class MainHandler(tornado.web.RequestHandler): def get(sel...
146
19.53
98
11
764
python
[{"finding_id": "codeql_py/reflective-xss_f99239faf8ffdea1_39d623b8", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 15 ]
[ null ]
[ 24 ]
[ 58 ]
2024-11-18T22:55:04.105955+00:00
1,631,647,664,000
a0d3109a19aa7664c1bc97e8647e69c2cc5d32fe
2
{ "blob_id": "a0d3109a19aa7664c1bc97e8647e69c2cc5d32fe", "branch_name": "refs/heads/main", "committer_date": 1631647664000, "content_id": "73763f8c6c8e9542675647c193fa8f85b1b6f424", "detected_licenses": [ "MIT" ], "directory_id": "901888d95a32287d63dcf6fa70e77324b55345b9", "extension": "py", "file...
2.4375
stackv2
import os import gpxpy import numpy as np import pandas as pd import geo from flask import Flask, flash, request, redirect, url_for, render_template, send_from_directory from werkzeug.utils import secure_filename from gpxpy.geo import distance, Location from pathlib import Path os.chdir(os.path.dirname(os.path.abspath...
183
33.35
155
17
1,592
python
[{"finding_id": "codeql_py/flask-debug_de44d72a532c3c3a_9584c107", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-601", "CWE-601" ]
[ "py/flask-debug", "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 183, 123, 129 ]
[ null, null, null ]
[ 5, 29, 29 ]
[ 40, 40, 40 ]
2024-11-18T22:44:14.950794+00:00
1,548,790,664,000
7f734179dcaa1a829501d2ee30aa3a2ef89ef41a
3
{ "blob_id": "7f734179dcaa1a829501d2ee30aa3a2ef89ef41a", "branch_name": "refs/heads/master", "committer_date": 1548790664000, "content_id": "c3e6c0601373546e1d3eec8eb6b88099db478be1", "detected_licenses": [ "MIT" ], "directory_id": "3d26e4da25a9b0938c523bae8d6c6a05e41bff87", "extension": "py", "fi...
2.625
stackv2
''' City display app ''' from climates import weather from utilities import get_latin from datetime import datetime, timedelta from flask import Flask, redirect, render_template import json import random import re app = Flask(__name__) import glob seeds = [c[-1] for c in glob.glob(app.static_folder + '/data/*')] see...
219
28.47
78
16
1,621
python
[{"finding_id": "codeql_py/flask-debug_dfd91f70470594f1_e7d94bce", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
4
true
[ "CWE-215", "CWE-022", "CWE-022", "CWE-022" ]
[ "py/flask-debug", "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 218, 51, 53, 55 ]
[ null, null, null, null ]
[ 5, 13, 13, 13 ]
[ 51, 63, 62, 66 ]
2024-11-18T23:10:45.058651+00:00
1,674,429,471,000
49b4e0b91d57155a69ce4080265a0ee06dd8bf3c
3
{ "blob_id": "49b4e0b91d57155a69ce4080265a0ee06dd8bf3c", "branch_name": "refs/heads/main", "committer_date": 1674429471000, "content_id": "f827dc3151deda496a84de6fc9aa5809d377ab0e", "detected_licenses": [ "MIT" ], "directory_id": "159d4ae61f4ca91d94e29e769697ff46d11ae4a4", "extension": "py", "file...
2.984375
stackv2
import tarfile import zipfile class Archive(object): def __init__(self, path: str): self.file_path = path def unpack(self, directory): if self.file_path.endswith(".zip"): return self.__extract_zip(directory) elif self.file_path.endswith(".tar.gz"): return self...
33
30.67
102
15
235
python
[{"finding_id": "codeql_py/tarslip_70a40397fcce4863_2f7341c1", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially untrusted source](2)." ]
[ 31 ]
[ null ]
[ 9 ]
[ 12 ]
2024-11-18T23:25:02.103048+00:00
1,595,339,253,000
af80390c91a30876f4bb05f47655206e9b0470ef
3
{ "blob_id": "af80390c91a30876f4bb05f47655206e9b0470ef", "branch_name": "refs/heads/master", "committer_date": 1595339253000, "content_id": "630e5656d88f12982a58f1dda4f59f34285973fb", "detected_licenses": [ "Apache-2.0" ], "directory_id": "f5b0f3856444d7bcb07aa36ef069859802ca0aa3", "extension": "py"...
2.8125
stackv2
#!/usr/bin/env python # cardinal_pythonlib/cmdline.py """ =============================================================================== Original code copyright (C) 2009-2020 Rudolf Cardinal (rudolf@pobox.com). This file is part of cardinal_pythonlib. Licensed under the Apache License, Version 2.0 (the...
103
32.91
127
17
888
python
[{"finding_id": "codeql_py/redos_7427172ea0a96dc9_c02d0c87", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '\"' and containing many repetitio...
2
true
[ "CWE-1333", "CWE-1333" ]
[ "py/redos", "py/redos" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '\"' and containing many repetitions of '\\\\\\\\'.", "This part of the regular expression may cause exponential backtracking on strings starting with '\"' and containing many repetitions of '\\\\\\\\'." ]
[ 56, 58 ]
[ null, null ]
[ 28, 28 ]
[ 45, 48 ]
2024-11-18T22:29:58.026086+00:00
1,506,385,974,000
4dbe80ffd589bc31adc4e0407eff2217fa1e0edf
2
{ "blob_id": "4dbe80ffd589bc31adc4e0407eff2217fa1e0edf", "branch_name": "refs/heads/master", "committer_date": 1506385974000, "content_id": "f7936c949fe33a2359c7e2bb804dbfbd8dc9f62c", "detected_licenses": [ "Apache-2.0" ], "directory_id": "319decdac56310a2e1d85a88a6c230a51aeefe72", "extension": "py"...
2.359375
stackv2
import flask from flask import render_template from flask import request from flask import Flask from flask import g app = Flask(__name__,static_url_path='/static') from netaddr import * import time import os import json import random import sys import traceback import sqlite3 import models_elastic as nweb from nmap_...
133
23.42
93
19
861
python
[{"finding_id": "codeql_py/stack-trace-exposure_c21eb0f41e419f4c_f41b387b", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-079" ]
[ "py/stack-trace-exposure", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 122, 132 ]
[ null, null ]
[ 12, 10 ]
[ 61, 94 ]
2024-11-18T22:30:02.218166+00:00
1,667,838,107,000
13aa629064d835626ade16ef99ed19cb34da941e
3
{ "blob_id": "13aa629064d835626ade16ef99ed19cb34da941e", "branch_name": "refs/heads/master", "committer_date": 1667838107000, "content_id": "79492cade74844c8535c1bb5848e831ddfedc302", "detected_licenses": [ "Apache-2.0", "BSD-2-Clause" ], "directory_id": "cc127478f47a3af9d9ac3d4418cd2643ed510ded",...
2.609375
stackv2
# ****************************************************************************** # Copyright 2017-2018 Intel Corporation # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apa...
324
31.85
95
20
2,313
python
[{"finding_id": "codeql_py/tarslip_7472f17184e55a16_8157c09a", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 192 ]
[ null ]
[ 17 ]
[ 20 ]
2024-11-18T22:30:03.223772+00:00
1,612,518,903,000
3fd55e2c9e3c6807f4045b1b7d79a68e8f52d45d
2
{ "blob_id": "3fd55e2c9e3c6807f4045b1b7d79a68e8f52d45d", "branch_name": "refs/heads/main", "committer_date": 1612518903000, "content_id": "9ad0f220d470c82e3c71254d2bb6e5c0d1b86fd4", "detected_licenses": [ "MIT" ], "directory_id": "18af8b0a51015bf2aaa674261d08ab603a0997a8", "extension": "py", "file...
2.359375
stackv2
from flask import Flask, render_template, request, redirect, make_response import base64, glob, secrets app = Flask(__name__) app.secret_key = secrets.token_hex() def is_number(s): try: float(s) return True except ValueError: return False @app.route("/") @app.route("/index.html") def ...
57
21.28
97
17
323
python
[{"finding_id": "codeql_py/cookie-injection_e62be1e0ecb239f9_ddae0f33", "tool_name": "codeql", "rule_id": "py/cookie-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cookie is constructed from a [user-supplied input](1).", "remediation": "", "location": {"file_path": "...
3
true
[ "CWE-020", "CWE-215", "CWE-022" ]
[ "py/cookie-injection", "py/flask-debug", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cookie is constructed from a [user-supplied input](1).", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1)." ]
[ 23, 57, 45 ]
[ null, null, null ]
[ 35, 5, 17 ]
[ 68, 24, 21 ]
2024-11-18T23:10:10.777642+00:00
1,395,499,875,000
b131fb5c127a51457e3c86ec39ab68ce0f41ae37
3
{ "blob_id": "b131fb5c127a51457e3c86ec39ab68ce0f41ae37", "branch_name": "refs/heads/master", "committer_date": 1395499915000, "content_id": "6ef29383b92320af3bdbf92ea60e30fc5246de4c", "detected_licenses": [ "MIT" ], "directory_id": "f8c73bc49d6269988b1897ab426319454ddad74e", "extension": "py", "fi...
2.65625
stackv2
import os import sys import threading import SimpleHTTPServer import SocketServer import shutil import enaml from enaml.qt.qt_application import QtApplication from PyQt4.QtCore import QFileSystemWatcher from atom.api import Atom, Unicode, observe, Typed, Property, Int, Value from btsync import BTSync import logging ...
269
31.06
107
18
1,804
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9f0aee4325bf343f_4ddc74f4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text.\nThis expression logs [sensitive data (secret)](4) as clear text.\nThis expression logs [sensitive data (secret)](5) a...
[ 81, 116 ]
[ null, null ]
[ 22, 22 ]
[ 66, 50 ]
2024-11-18T23:21:53.719278+00:00
1,628,001,895,000
364d06b335b08eec87687a0c098970c5409c37b2
4
{ "blob_id": "364d06b335b08eec87687a0c098970c5409c37b2", "branch_name": "refs/heads/main", "committer_date": 1628001895000, "content_id": "80585c56745b1d106595fbaf60d282d4bdc9d682", "detected_licenses": [ "MIT" ], "directory_id": "3fbfabfaaada7b9b77e8a1df8fed4de444070d49", "extension": "py", "file...
4.125
stackv2
# sorting using custom key employees = [ {'Name': 'Alan Turing', 'age': 25, 'salary': 10000}, {'Name': 'Sharon Lin', 'age': 30, 'salary': 8000}, {'Name': 'John Hopkins', 'age': 18, 'salary': 1000}, {'Name': 'Mikhail Tal', 'age': 40, 'salary': 15000}, ] # custom functions to get employee info def get_n...
34
21.94
56
8
227
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_abd4bf2ad25357f7_9cfa369e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 25, 29, 33 ]
[ null, null, null ]
[ 7, 7, 7 ]
[ 16, 16, 16 ]
2024-11-18T21:33:32.816606+00:00
1,490,363,552,000
1a20e2e975dfec764b22bf78dfe6e1caa4086c82
2
{ "blob_id": "1a20e2e975dfec764b22bf78dfe6e1caa4086c82", "branch_name": "refs/heads/master", "committer_date": 1490363552000, "content_id": "6f403c51e7e7063a5921a78f9be0e8a9bc1d9e2f", "detected_licenses": [ "MIT" ], "directory_id": "bc61aca3346eb98e41d1a54e9ac730cad7af7eb0", "extension": "py", "fi...
2.375
stackv2
# -*- coding: utf-8 -*- import json import datetime import redis import logging from tornado import web, websocket from Handlers.BaseHandler import BaseHandler logger = logging.getLogger(__name__) def verif_planning(planning): timestamp = datetime.datetime.now().timestamp() hour = datetime.datetime.now().ho...
115
34.17
105
17
837
python
[{"finding_id": "codeql_py/log-injection_6c7c27d1c639a9ef_958ea7f8", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 65 ]
[ null ]
[ 21 ]
[ 66 ]
2024-11-18T21:33:41.858272+00:00
1,630,251,358,000
1b2b559be715a5980475ecc73033ea7148464ad4
3
{ "blob_id": "1b2b559be715a5980475ecc73033ea7148464ad4", "branch_name": "refs/heads/main", "committer_date": 1630251358000, "content_id": "e157d761798116a158a1aa2dd599fc5b3750f749", "detected_licenses": [ "MIT" ], "directory_id": "603656f8631018e435fa6e2c978d71f18f7d36d7", "extension": "py", "file...
3.484375
stackv2
""" Utilility functions for the main script """ import sys from random import randint from getpass import getpass from typing import Union from itertools import cycle from functools import reduce from operator import xor def get_password(): """ Requests for and reads password invisibly """ pwd = getpass("En...
131
34.48
101
19
1,151
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_369eb492ef332cfb_0752128d", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (secret)](1) as clear text." ]
[ 89 ]
[ 98 ]
[ 21 ]
[ 11 ]
2024-11-18T21:33:44.290754+00:00
1,655,875,357,000
3ad269a5d12a42e6199c28bbbe7c496ac864dc94
3
{ "blob_id": "3ad269a5d12a42e6199c28bbbe7c496ac864dc94", "branch_name": "refs/heads/master", "committer_date": 1655875357000, "content_id": "92b15f875e3b245acc289ee018186cbd54475e00", "detected_licenses": [ "MIT" ], "directory_id": "08ad52ed4d6b33d464d245273f060bd0722029ea", "extension": "py", "fi...
3.046875
stackv2
""" Utility functions and classes to deal with language models. """ # Core Library modules import logging import os import tarfile import tempfile from argparse import ArgumentDefaultsHelpFormatter, ArgumentParser from decimal import Decimal, getcontext # Third party modules import pkg_resources getcontext().prec = ...
208
33.25
88
28
1,586
python
[{"finding_id": "codeql_py/tarslip_c9bedfeef896ab40_bd35e46c", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 167 ]
[ null ]
[ 9 ]
[ 12 ]
2024-11-18T23:15:54.143202+00:00
1,554,479,514,000
d71014fabf21bca540832baa194fa19254ee2aaf
4
{ "blob_id": "d71014fabf21bca540832baa194fa19254ee2aaf", "branch_name": "refs/heads/master", "committer_date": 1554479514000, "content_id": "5e57b5eac0a4d38be16261781203e444f193b5a6", "detected_licenses": [ "MIT" ], "directory_id": "541d11d4c2927a834eac379a2d8cf93fce05fc52", "extension": "py", "fi...
3.84375
stackv2
import random secretNumber = random.randrange(1, 101) print(secretNumber) # cheat to win 😝 print("What's your guess?") userNumber = int(input("> ")) while userNumber != secretNumber: if userNumber > secretNumber: print("That too high!") if userNumber < secretNumber: print("That too low!") ...
19
21.89
57
11
109
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4c45773f2f31e5e0_7bbbeb22", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 4 ]
[ null ]
[ 7 ]
[ 19 ]
2024-11-18T23:15:55.701138+00:00
1,676,473,951,000
5d2fc06f6c565b5112374774706d29ee5d14355d
3
{ "blob_id": "5d2fc06f6c565b5112374774706d29ee5d14355d", "branch_name": "refs/heads/master", "committer_date": 1676473951000, "content_id": "d800eefa5d07a201890f784a8fe60d8c503a4de7", "detected_licenses": [ "MIT" ], "directory_id": "fad9727f199d7b5cd1157513c6437f70fe2266df", "extension": "py", "fi...
2.75
stackv2
import tempfile from typing import Tuple import jinja2 import os import settings from emails import EmailSender from gsheets import read_spreadsheet_as_csv from generate_report import dataframe_to_image, generate_report_from_csv_str TEMP_DIR = tempfile.gettempdir() TMP_FILENAME = os.path.join(TEMP_DIR, 'graph.png') ...
50
33.68
107
11
374
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_645485f39a56f395_8b8aeee5", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 18 ]
[ null ]
[ 20 ]
[ 62 ]
2024-11-18T22:30:16.094292+00:00
1,460,318,270,000
33061779379e19a8002235080f88ff0b8c2ec73d
3
{ "blob_id": "33061779379e19a8002235080f88ff0b8c2ec73d", "branch_name": "refs/heads/master", "committer_date": 1460318270000, "content_id": "7bbc9c94e4b5aa818e9953ee52cab54a6324a20d", "detected_licenses": [ "MIT" ], "directory_id": "f4e6f9f024ee89da99dbe0b57831f947c1dfd002", "extension": "py", "fi...
3
stackv2
#!/usr/bin/env python import click import csv import geocoder import geojson import os import time import webbrowser from jinja2 import Environment, PackageLoader def make_point(name, data, address): g = geocoder.bing(address) point = geojson.Point((g.lng, g.lat)) feature = geojson.Feature(geometry=point, ...
147
32.63
125
19
1,098
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_ec04486e250210d7_c8cd4e83", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 134 ]
[ null ]
[ 11 ]
[ 72 ]
2024-11-18T22:30:19.646996+00:00
1,477,240,262,000
0fe9dfd2463346a471b7cbf18e7c5e0f3de715a2
3
{ "blob_id": "0fe9dfd2463346a471b7cbf18e7c5e0f3de715a2", "branch_name": "refs/heads/master", "committer_date": 1477240262000, "content_id": "1ac6a9e2cf511ab0d93c95fd965b58501ad4f2b6", "detected_licenses": [ "MIT" ], "directory_id": "2c2fbf9183644ab043c2394766ad60d04a587afb", "extension": "py", "fi...
2.765625
stackv2
#!/usr/bin/env python2.7 """The purpose of this module is to allow messaging via screen. It needs you to install enum module as `pip install enum`. This module is executed as: .. code-block:: bash $ python ScreenLoggerServer.py [zmq_transport] It uses a default ZeroMQ transport if the argument is not given. Onc...
102
30.6
79
15
720
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4c8ba6c3676b114c_aa6ff9e5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 63 ]
[ null ]
[ 26 ]
[ 36 ]
2024-11-18T22:44:45.384112+00:00
1,548,768,640,000
2189889b9790d173a82c3d84f65709285697cd53
3
{ "blob_id": "2189889b9790d173a82c3d84f65709285697cd53", "branch_name": "refs/heads/master", "committer_date": 1548768640000, "content_id": "7cfacd5dd2d078925a16735a9618d5546dedb1c4", "detected_licenses": [ "Apache-2.0" ], "directory_id": "727c1f042945d50f08696b52975ff0ec7fe18262", "extension": "py"...
2.734375
stackv2
import requests def download_aip(aip_url, temp_dir): print('AIP downloading...') for key, value in aip_url.items(): responce = requests.get(value) with open(temp_dir + "/" + key + '.pdf', 'wb') as file: file.write(responce.content) print('AIP download completed.') def downloa...
29
29.79
90
16
223
python
[{"finding_id": "codeql_py/request-without-cert-validation_2b6a1f86d83eeb8a_6b07f395", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 25 ]
[ null ]
[ 16 ]
[ 50 ]
2024-11-18T23:36:53.885871+00:00
1,645,310,375,000
62a3d963121bb6356f5eb905b94ecb12bcba29a4
3
{ "blob_id": "62a3d963121bb6356f5eb905b94ecb12bcba29a4", "branch_name": "refs/heads/master", "committer_date": 1645310375000, "content_id": "4b9fc0f46e20d8bf3b4296bba845fc43df217b2d", "detected_licenses": [ "MIT" ], "directory_id": "c0039280993c64bb61d49cd33fdca73136402217", "extension": "py", "fi...
3.046875
stackv2
import sopel.module here_url = "https://geocoder.api.here.com/6.2/geocode.json" here_app_id = "" here_app_code = "" darksky_url = "https://api.darksky.net/forecast" darksky_key = "" def unix_to_localtime(t, tz="US/Eastern"): """ Convert unix timestamp to local time. """ from datetime import datetim...
81
25.31
90
13
552
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_942b892c27c27170_6a280a4e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 81 ]
[ null ]
[ 11 ]
[ 36 ]
2024-11-18T21:14:12.874631+00:00
1,587,824,127,000
eb0154c6f9f3920cb301c4bbafea3c39d7db8115
3
{ "blob_id": "eb0154c6f9f3920cb301c4bbafea3c39d7db8115", "branch_name": "refs/heads/master", "committer_date": 1587824127000, "content_id": "8173b7642635fe8a82ec04a022edac53faa1c910", "detected_licenses": [ "MIT" ], "directory_id": "be49c1421a56577ef90096a3136015b744e27b63", "extension": "py", "fi...
2.625
stackv2
import datetime import logging from tabulate import tabulate from . import utils # TODO: fix navigation bar def build_tables(data, replaces, template_env, config): for table in data: table_replaces = replaces.copy() table_replaces["datatable"] = data[table] build_html(template_env, tabl...
126
29.29
76
17
876
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_3fb8e5b6942b5ddf_12fc138d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 64 ]
[ 66 ]
[ 16 ]
[ 6 ]
2024-11-18T21:58:04.428784+00:00
1,486,136,740,000
dff785f6072a446da86d06df0d5c398eca15237c
2
{ "blob_id": "dff785f6072a446da86d06df0d5c398eca15237c", "branch_name": "refs/heads/master", "committer_date": 1486136740000, "content_id": "a5049805a98ed6c3c06885f6b09734a784f6cd49", "detected_licenses": [ "MIT-0" ], "directory_id": "645014cfd568b28f140f8ccc6b9fe6ee518d9e7e", "extension": "py", "...
2.46875
stackv2
import functools import re import logging logger = logging.getLogger(__name__) @functools.lru_cache() def is_key_match(url): # This is a circular dependency! So it must be loaded late. from ..apibeard import APIBeard match = re.match(r"/key([A-z]+)/.*", url) key = match.group(1) logger.debug("M...
22
21.41
63
11
124
python
[{"finding_id": "codeql_py/overly-large-range_7b509c36b071cc05_7614ceda", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 14 ]
[ null ]
[ 30 ]
[ 33 ]
2024-11-18T21:58:26.998120+00:00
1,637,373,938,000
616216e6da78587a3d1d49c4d9ca38b3b54768b3
2
{ "blob_id": "616216e6da78587a3d1d49c4d9ca38b3b54768b3", "branch_name": "refs/heads/master", "committer_date": 1637373938000, "content_id": "671a07227d52df7ae394c272e05cd1b71cdc04e2", "detected_licenses": [ "Apache-2.0" ], "directory_id": "6ee06ad2bbc15cc0f829f99198947ffe8cffe395", "extension": "py"...
2.421875
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- from .Base import Base import requests import json class TargetOption(Base): def __init__(self, api_base_url, api_key): super().__init__(api_base_url, api_key) self.excluded_hours_dict = { 'default': '', '9am_to_5pm': 'cb869c...
303
34.78
136
17
2,494
python
[{"finding_id": "codeql_py/request-without-cert-validation_bfa4e96971e9f4ee_d5348faa", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
9
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation"...
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 41, 65, 89, 126, 158, 191, 224, 260, 296 ]
[ null, null, null, null, 159, null, null, 261, null ]
[ 24, 24, 24, 24, 24, 24, 24, 24, 24 ]
[ 111, 110, 114, 110, 64, 109, 118, 67, 107 ]
2024-11-18T21:58:31.965183+00:00
1,600,988,903,000
620158ac953411033735b3dadcc03d6eae85cd1b
3
{ "blob_id": "620158ac953411033735b3dadcc03d6eae85cd1b", "branch_name": "refs/heads/master", "committer_date": 1600988903000, "content_id": "9826ac3a73faf3cf25d34a9cbee4c12fe7210235", "detected_licenses": [ "MIT" ], "directory_id": "d5ded3ea87fedd24ef5ec24e7dfe3a4e2349c7ba", "extension": "py", "fi...
3.25
stackv2
import json # Reads from geoList and ipList to get the GeoIP and IP data respectively and writes to newGeo.txt to copy as data for Google GeoChart usage text = open("ipList.txt", "r") geoInfo = open("geoList.json", "r") newGeo = open("newGeo.txt", "w") d = dict() geoList = [] # Loop through each line of the ipList to...
30
31.9
140
17
272
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_a4c20ef8ea47cbee_cb01f0dc", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text." ]
[ 30 ]
[ null ]
[ 18 ]
[ 121 ]