added
stringlengths
32
32
created
int64
1,244B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.25
source
stringclasses
1 value
text
stringlengths
324
20.1k
num_lines
int64
16
598
avg_line_length
float64
15.1
58.3
max_line_length
int64
33
179
ast_depth
int64
8
39
length
int64
101
3.8k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.1k
265k
sast_codeql_findings_count
int64
1
45
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
45
rule_ids
listlengths
1
45
confidences
listlengths
1
45
severities
listlengths
1
45
messages
listlengths
1
45
line_starts
listlengths
1
45
line_ends
listlengths
1
45
column_starts
listlengths
1
45
column_ends
listlengths
1
45
2024-11-18T20:43:40.467709+00:00
1,625,684,080,000
f47a78f99bb063145054d6c1a4909a3604872889
3
{ "blob_id": "f47a78f99bb063145054d6c1a4909a3604872889", "branch_name": "refs/heads/master", "committer_date": 1625684080000, "content_id": "a1a2acce92e204afcd02c3aceac2f5aac70bfc39", "detected_licenses": [ "MIT" ], "directory_id": "eef22868da208704e00cdd56996b8b5aa3e5fbfe", "extension": "py", "fi...
2.921875
stackv2
# -*- coding: utf-8 -*- ''' Author: David J. Morfe Application Name: gomaps.utils Functionality Purpose: Provides utility functions with some also useful for external consumption Version: Beta ''' #5/25/20 import requests, time, os, sys, re import pyppdf.patch_pyppeteer from requests_html import HTMLSession from urlli...
303
36.68
105
18
2,878
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_5861509ce01938d9_9b47d6aa", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This string, which is used as a regular expression [here](1), has an unescaped '.' befor...
5
true
[ "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020" ]
[ "py/incomplete-hostname-regexp", "py/incomplete-hostname-regexp", "py/incomplete-hostname-regexp", "py/incomplete-hostname-regexp", "py/incomplete-hostname-regexp" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This string, which is used as a regular expression [here](1), has an unescaped '.' before 'google.com/map', so it might match more hosts than expected.", "This regular expression has an unescaped '.' before 'google.com/maps/preview/place/', so it might match more hosts than expected.", "This regular expression...
[ 16, 83, 112, 136, 144 ]
[ null, null, null, null, null ]
[ 9, 15, 15, 15, 34 ]
[ 39, 63, 63, 63, 68 ]
2024-11-18T20:43:46.767846+00:00
1,551,027,209,000
dbb8445b7a4968d090b610a7a63e69e3aa0b752b
3
{ "blob_id": "dbb8445b7a4968d090b610a7a63e69e3aa0b752b", "branch_name": "refs/heads/master", "committer_date": 1551027209000, "content_id": "ed08bdcdccea2a016b848ec09c12947be2423970", "detected_licenses": [ "MIT" ], "directory_id": "b6f95db62b7dccb6e721d4df00753893fa6be967", "extension": "py", "fi...
2.671875
stackv2
import json import urllib.request import pandas as pd import dash_app as app config = json.load(open("../api_key.json")) def alpha_url(symbol,interval): base_query = "https://www.alphavantage.co/query" function = "?function=TIME_SERIES_INTRADAY" api_key = "&apikey="+config['alphavantage'] symbol_quer...
24
25.54
84
11
160
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_966dab3438968379_370f1383", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 20 ]
[ null ]
[ 7 ]
[ 10 ]
2024-11-18T20:43:47.680058+00:00
1,515,319,031,000
831c617583bb6e90265a9156c5b926d3a9fe04f2
2
{ "blob_id": "831c617583bb6e90265a9156c5b926d3a9fe04f2", "branch_name": "refs/heads/master", "committer_date": 1515319031000, "content_id": "6e15099ce124ca6015caafab14449e2d29734a92", "detected_licenses": [ "Apache-2.0" ], "directory_id": "757bbc0b7a9aff3ebe426f5bfe606df165fd0735", "extension": "py"...
2.46875
stackv2
#!/usr/bin/python # coding: utf-8 """ File: demo.py Author: zhangxu01 <zhangxu01@zhihu.com> Date: 2017-08-28 22:59 Description: demo """ import random import time import urllib import requests import tornado from tornado import gen, web from tornado.httpclient import AsyncHTTPClient, HTTPRequest @gen.coroutine def ...
102
23.72
97
16
648
python
[{"finding_id": "codeql_py/reflective-xss_1653feac48e4d373_cbdca39e", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 77 ]
[ null ]
[ 20 ]
[ 81 ]
2024-11-18T20:44:06.850587+00:00
1,669,000,724,000
d606314dda61c762ad17ffc869258def04c7e2a1
3
{ "blob_id": "d606314dda61c762ad17ffc869258def04c7e2a1", "branch_name": "refs/heads/master", "committer_date": 1669000724000, "content_id": "fe30c26741c3ef12eca37b6d00d617271b104d84", "detected_licenses": [ "MIT" ], "directory_id": "4cfd9c42794fa07cc3f5a6cb73119604037be347", "extension": "py", "fi...
2.984375
stackv2
#!/usr/bin/env python # (c) Stefan Countryman (2018) """ Take my heirarchically-organized passwords directory and dump everything to a .netrc-formatted file. """ import os SECRETPATH = os.path.expanduser("~/secrets") OUTFILE = os.path.join(SECRETPATH, ".netrc") def load_secrets(secretpath): """Load passwords a...
59
33.8
77
21
469
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_ba09e8be90fff258_3a326180", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive data (secret)](2) as clear text.\nThis expression stores [sensitive data (secret)](3) as clear text.\nThis expression stores [sensitive data (secret)](4) as clear text.", "This expression stores [sensitive data ...
[ 45, 49 ]
[ null, null ]
[ 24, 36 ]
[ 48, 70 ]
2024-11-18T20:57:29.651326+00:00
1,610,032,405,000
21868acaa615bb2b7a2341f68b826fb7013f617c
4
{ "blob_id": "21868acaa615bb2b7a2341f68b826fb7013f617c", "branch_name": "refs/heads/master", "committer_date": 1610032405000, "content_id": "aa6a0def38499f0f7313f40b365916795f2c8949", "detected_licenses": [ "Apache-2.0" ], "directory_id": "6312546e116a8c692890b1fc12e2ca681b7a455a", "extension": "py"...
3.859375
stackv2
class Student(object): __sex = '男' def __init__(self, name, age): self.name = name self.age = age def study(self, course_name): print("%s正在学习%s." %(self.name, course_name)) def watch_movie(self): if (self.age > 16): print('%s在看鬼灭之刃.' %self.name) else: print('%s在看火影忍者.' %self...
30
17.77
48
14
186
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_04ba1871a6149abb_69ec66d8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 23 ]
[ null ]
[ 9 ]
[ 27 ]
2024-11-18T20:57:31.482104+00:00
1,615,267,844,000
a44310d3a7c880513478931cf52be73efcd378cd
3
{ "blob_id": "a44310d3a7c880513478931cf52be73efcd378cd", "branch_name": "refs/heads/master", "committer_date": 1615267844000, "content_id": "e9a054c6bb87d140fab1106785e0b151806be1cd", "detected_licenses": [ "MIT" ], "directory_id": "12b95692086d5c10d956d88647af83a91d279a0e", "extension": "py", "fi...
2.609375
stackv2
from flask import Flask, request, make_response from datetime import datetime, timedelta app = Flask(__name__) @app.route('/') def index(): response = make_response('<h1>This document is response test.</h1>') return response @app.route('/write_cookie/<cv>') def write_cookie(cv): response = make_respons...
32
22
72
11
181
python
[{"finding_id": "codeql_py/cookie-injection_c824a269fb2d5dd8_ece718fb", "tool_name": "codeql", "rule_id": "py/cookie-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cookie is constructed from a [user-supplied input](1).", "remediation": "", "location": {"file_path": "...
2
true
[ "CWE-020", "CWE-079" ]
[ "py/cookie-injection", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cookie is constructed from a [user-supplied input](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 18, 28 ]
[ null, null ]
[ 31, 12 ]
[ 33, 17 ]
2024-11-18T20:57:39.630943+00:00
1,514,466,647,000
308a2accdb646444b2402bdebdbd5e71633d562d
3
{ "blob_id": "308a2accdb646444b2402bdebdbd5e71633d562d", "branch_name": "refs/heads/master", "committer_date": 1514466647000, "content_id": "35a54eeb032a3ae80c2099994a84af5220ac5d04", "detected_licenses": [ "Apache-2.0" ], "directory_id": "12a1a5a0b4e4565f73d893f9340fab5a4664faf6", "extension": "py"...
2.515625
stackv2
"""The registration module contains classes for image registration. Image registration aims to align two images using a particular transformation. miapy currently supports multi-modal rigid registration, i.e. align two images of different modalities using a rigid transformation (rotation, translation, reflection, or t...
111
50.97
139
24
1,190
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_95840f2758c39a0d_0509032d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 61 ]
[ null ]
[ 47 ]
[ 56 ]
2024-11-18T20:57:53.910868+00:00
1,486,578,496,000
e8592199918d127ec0421cd32798201605a9129d
3
{ "blob_id": "e8592199918d127ec0421cd32798201605a9129d", "branch_name": "refs/heads/master", "committer_date": 1486578496000, "content_id": "c9ff2e59e7d34585ce65dbf7dc5107e50a6b7c0d", "detected_licenses": [ "Unlicense" ], "directory_id": "6d92507615e7fa2cf132fed44be5e49290273471", "extension": "py",...
2.875
stackv2
import requests from pyblynkrestapi.BlynkClient import TCP_Client import threading import collections import json import logging class PyBlynkException(Exception): pass PinHandler = collections.namedtuple('PinHandler', 'pin_number handler') class PyBlynkRestApi(object): """ http://docs.blynkapi.apiary.i...
239
32.87
95
15
1,740
python
[{"finding_id": "codeql_py/request-without-cert-validation_932d2834968dd502_be036307", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
3
true
[ "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 105, 198, 236 ]
[ null, null, null ]
[ 13, 20, 20 ]
[ 75, 95, 95 ]
2024-11-18T20:58:03.936446+00:00
1,585,751,880,000
8cf9e6f059648360ababfcee9cea47c8ec837661
3
{ "blob_id": "8cf9e6f059648360ababfcee9cea47c8ec837661", "branch_name": "refs/heads/master", "committer_date": 1585751880000, "content_id": "0dc06b42c7b5d489f549209521e899a83f41e57d", "detected_licenses": [ "Apache-2.0" ], "directory_id": "a8d2258e596a9bf0c25810ec05a250b662f515b1", "extension": "py"...
2.53125
stackv2
import os from django.http import HttpResponse from django.utils.datastructures import MultiValueDictKeyError from rest_framework import status from rest_framework.response import Response from rest_framework.views import APIView from presqt.api_v1.utilities import (get_process_info_data, process_token_validation) fr...
77
33.27
106
17
535
python
[{"finding_id": "codeql_py/path-injection_1dfc65f1b73360d1_8d1e4312", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 71 ]
[ null ]
[ 42 ]
[ 55 ]
2024-11-18T20:58:12.616908+00:00
1,502,045,005,000
a7fc095bfe9738c1e7c60ba38a3fa9e94b85d8f0
3
{ "blob_id": "a7fc095bfe9738c1e7c60ba38a3fa9e94b85d8f0", "branch_name": "refs/heads/master", "committer_date": 1502045005000, "content_id": "c0f2db0278a92dfdf3da0d3ad83f600b0a1a9d09", "detected_licenses": [ "MIT" ], "directory_id": "9785e19de95ee0bf1be3296506db93b304b59ab2", "extension": "py", "fi...
2.875
stackv2
#!/usr/bin/python """Copyright® Anas Yousef 2017""" from urllib.request import urlopen from bs4 import BeautifulSoup from selenium import webdriver from selenium.common.exceptions import * from time import sleep import urllib.parse class RetrieveAdInfo: def __init__(self, keyword, location=None, page=1): ...
194
30.27
120
20
1,311
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_b86d23e37f96fb51_0debf28e", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text." ]
[ 188 ]
[ null ]
[ 24 ]
[ 119 ]
2024-11-18T20:58:14.931038+00:00
1,469,899,427,000
41356ed946627629c778b740ac25176e82c0cdd8
3
{ "blob_id": "41356ed946627629c778b740ac25176e82c0cdd8", "branch_name": "refs/heads/master", "committer_date": 1469899427000, "content_id": "149167f0d57847f49f41e6e1ab7706a66c1ed0c5", "detected_licenses": [ "Apache-2.0" ], "directory_id": "cf19eaebb169ded234e7f659fb668714d5353cce", "extension": "py"...
2.671875
stackv2
""" Rewrite of manager.py Does configuration based on static topology. """ from paramiko import SSHClient, AutoAddPolicy from scp import SCPClient import json import argparse from janus.network.network_driver import JanusNetworkDriver import time ########################################### ################ Globals ##...
148
36.7
136
17
1,431
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_b80bba9af522968d_3f30b896", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 61 ]
[ null ]
[ 5 ]
[ 53 ]
2024-11-18T20:58:19.579637+00:00
1,579,687,772,000
bb6dcc753d3db1bb03b0e16e7114e125575220e1
2
{ "blob_id": "bb6dcc753d3db1bb03b0e16e7114e125575220e1", "branch_name": "refs/heads/master", "committer_date": 1579687772000, "content_id": "351afcc706261b47ff5034cfda3e51a842b3a21c", "detected_licenses": [ "MIT" ], "directory_id": "1f4018ed21de2d7e23bd9f1a8e024656701472bf", "extension": "py", "fi...
2.3125
stackv2
# -------------------------------------------------------------------------------------------- # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the MIT License. See License.txt in the project root for license information. # --------------------------------------------------------------------...
68
48.81
114
12
683
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c1d5cc9934402d64_ff58e900", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 40 ]
[ null ]
[ 26 ]
[ 53 ]
2024-11-18T20:58:35.561916+00:00
1,547,883,187,000
055ef6bedab5b99a1d3547c0def843f8d7a1bc82
2
{ "blob_id": "055ef6bedab5b99a1d3547c0def843f8d7a1bc82", "branch_name": "refs/heads/master", "committer_date": 1547883187000, "content_id": "9baade530ee1cb1aac45f587d1975eea0f4bbc74", "detected_licenses": [ "MIT" ], "directory_id": "50529d41d7b49acbb8b326df9dc8cc84a9f2dd46", "extension": "py", "fi...
2.453125
stackv2
#!C:\Python36\python print("Content-type:text/html") print("") import cgi, cgitb, mysql.connector import datetime print(""" <html> <head> <title>Mess management</title> </head> <body> """) now = datetime.datetime.now() print ("Current date: "+now.strftime("%Y-%m-%d")) ...
40
21.48
88
13
232
python
[{"finding_id": "codeql_py/sql-injection_23e777dc8356fd8b_e0bb7866", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown...
1
true
[ "CWE-089" ]
[ "py/sql-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This SQL query depends on a [user-provided value](1)." ]
[ 31 ]
[ null ]
[ 20 ]
[ 25 ]
2024-11-18T21:10:10.868263+00:00
1,587,376,040,000
bc44df5a5cc12fb1aee098d5fa39e5ee804d761b
3
{ "blob_id": "bc44df5a5cc12fb1aee098d5fa39e5ee804d761b", "branch_name": "refs/heads/master", "committer_date": 1587376040000, "content_id": "2bebcbd74af821cea4d40da891dbcd1b91c97166", "detected_licenses": [ "MIT" ], "directory_id": "00a19ab9cd6378bdf46cbadf0f62b8c8d8b295ac", "extension": "py", "fi...
2.8125
stackv2
""" Simulate the YunTemp. This is an extremely simple server that might be used for testing the arduino webserver interface. It is based on flask. So before running it, you should run a :: pip install flask, flask_basicauth If you want to run it you can just start it through: :: python yuntemp.py This will...
148
26.82
98
15
1,281
python
[{"finding_id": "codeql_py/flask-debug_b03715544a9a1f8a_30f5ff3f", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
6
true
[ "CWE-215", "CWE-079", "CWE-079", "CWE-079", "CWE-079", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability due to a [user-provided value](2).\nCross-site scripting vulnerability due to a [user-pr...
[ 148, 60, 81, 102, 123, 144 ]
[ null, null, null, null, null, null ]
[ 5, 12, 12, 12, 12, 12 ]
[ 35, 32, 32, 32, 32, 32 ]
2024-11-18T21:10:21.989021+00:00
1,604,738,542,000
a911a361da2bda864ad8ce591fcf2118c1c71a98
2
{ "blob_id": "a911a361da2bda864ad8ce591fcf2118c1c71a98", "branch_name": "refs/heads/master", "committer_date": 1604738542000, "content_id": "6b736d3bf92bdbdd00994c0a00e38027b2af3b9c", "detected_licenses": [ "Apache-2.0" ], "directory_id": "34d35c27c7b27e0cc896851366fc148c73c1d2bf", "extension": "py"...
2.484375
stackv2
import argparse import hashlib import io import os import tarfile import time import urllib3 import requests urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning) with open('audio_example.mp3', 'rb') as f: EXAMPLE_HASH = hashlib.sha256(f.read()).hexdigest() class TemplateFiller: def __new__...
254
32.76
113
18
1,886
python
[{"finding_id": "codeql_py/tarslip_29c10bbcbd9747f8_18d4759c", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 208 ]
[ null ]
[ 13 ]
[ 16 ]
2024-11-18T21:10:32.449720+00:00
1,610,900,842,000
fed46df0e78daeade7ae50259bf48c24098dc21c
2
{ "blob_id": "fed46df0e78daeade7ae50259bf48c24098dc21c", "branch_name": "refs/heads/main", "committer_date": 1610900842000, "content_id": "f1f445338124a5fd77ebccd84f2e6f834da4ee30", "detected_licenses": [ "MIT" ], "directory_id": "aefa5e8a6d04305cc86fa38079bf68af77bee565", "extension": "py", "file...
2.421875
stackv2
import os from flask import Flask, render_template, request, redirect, url_for, session, flash from werkzeug.utils import secure_filename import pandas as pd import shutil from flask import send_from_directory import imghdr import HTN1.model23 length = 4 verbose = 0 UPLOAD_FOLDER = 'uploads' allowed_extensions = se...
133
26.34
102
17
846
python
[{"finding_id": "codeql_py/url-redirection_8469f5d1713f1059_b1b2e2ff", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
3
true
[ "CWE-601", "CWE-601", "CWE-601" ]
[ "py/url-redirection", "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 43, 50, 66 ]
[ null, null, null ]
[ 29, 29, 29 ]
[ 40, 40, 40 ]
2024-11-18T21:10:33.878990+00:00
1,551,429,560,000
368246cd304868a49ae2752bf20ebf87f5984e25
3
{ "blob_id": "368246cd304868a49ae2752bf20ebf87f5984e25", "branch_name": "refs/heads/master", "committer_date": 1551429560000, "content_id": "01426fb4cc20dc496f86dc2dbe8536abb4e81b0c", "detected_licenses": [ "MIT" ], "directory_id": "f187c46651c99be86418741eeaf315be8977339e", "extension": "py", "fi...
2.53125
stackv2
from flask import Flask, redirect, render_template, url_for, flash, request import requests import boto3 import os import decision_trees ALLOWED_EXTENSIONS = set(['csv']) render_result = False # initializes app and connect to db app = Flask(__name__) @app.route('/') # Returns the dashboard page which displays all 4 ...
114
37.18
156
14
1,042
python
[{"finding_id": "codeql_py/flask-debug_8b0f2d5232f8a6b9_6396e3a6", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
10
true
[ "CWE-215", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-918" ]
[ "py/flask-debug", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/partial-ssrf" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-pro...
[ 111, 57, 58, 61, 63, 75, 77, 97, 100, 87 ]
[ null, null, null, null, null, null, null, null, null, null ]
[ 5, 24, 20, 20, 19, 20, 19, 16, 16, 11 ]
[ 51, 38, 30, 34, 29, 34, 29, 32, 32, 28 ]
2024-11-18T21:10:51.478884+00:00
1,541,371,451,000
c1f2c19e4a5ca3cc8fdb201f7409f24094ae75cc
3
{ "blob_id": "c1f2c19e4a5ca3cc8fdb201f7409f24094ae75cc", "branch_name": "refs/heads/master", "committer_date": 1541371451000, "content_id": "ca182f621fcc0326d0acb6b6f3787ad01339f9b7", "detected_licenses": [ "Apache-2.0" ], "directory_id": "29a1456effe92a36c93678f186b7575f5eb9fe7f", "extension": "py"...
2.65625
stackv2
from flask import Flask,render_template from flask import jsonify,request from model import Model1 # LR name of file , Model name of class clf1 = Model1() # 5at object mn el class elli hya Model fe clf app = Flask(__name__) #@app.route("/home") #def index(): # return render_template('from.html') @app.route("/rea...
117
22.03
69
15
859
python
[{"finding_id": "codeql_py/reflective-xss_374d7a7362598e09_b8f01f69", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 68 ]
[ 79 ]
[ 9 ]
[ 11 ]
2024-11-18T21:10:59.672090+00:00
1,511,194,045,000
1714d0a92cff0f1015855fcf1fccb2022a63c925
3
{ "blob_id": "1714d0a92cff0f1015855fcf1fccb2022a63c925", "branch_name": "refs/heads/master", "committer_date": 1511194045000, "content_id": "b809cf6f3fb6a7d5cb8fda73cf195b9526f2530d", "detected_licenses": [ "MIT" ], "directory_id": "049c3e71141e336f6e504fe9330c9436a310e4d2", "extension": "py", "fi...
2.5625
stackv2
#!/usr/bin/env python3 # Unique bot import chatServer_snotbot as c import random, re from alle_reviews import reviews # Sleep and output functions def sleep(n): c.sleep(n) def output(s): c.output(s) # Setup and Response function def setup(): global alle_software global level level = 1 ...
422
27.32
176
15
2,816
python
[{"finding_id": "codeql_py/overly-large-range_67e8cbdbe37a70f1_3a80b753", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 411 ]
[ null ]
[ 45 ]
[ 48 ]
2024-11-18T21:11:01.266587+00:00
1,387,383,090,000
ae066982406a3f79eb70e1d0c2daa814c28a4bfd
3
{ "blob_id": "ae066982406a3f79eb70e1d0c2daa814c28a4bfd", "branch_name": "refs/heads/master", "committer_date": 1387383090000, "content_id": "9f0f71aeceb6f800070d44b0b358e7d6104f56f4", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "6ffb56219714b7a58730293bc86b3d0aaa5351ba", "extension": "p...
2.515625
stackv2
# -*- coding: utf-8 -*- # Copyright (c) 2012-2013 Infrae. All rights reserved. # See also LICENSE.txt # Helpers for cs_youtube ... import urlparse from AccessControl import ModuleSecurityInfo module_security = ModuleSecurityInfo( 'Products.SilvaExternalSources.codesources.youtube') # correct urls have a path ...
112
33.7
91
16
1,086
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_de23f0b7f5b8ef69_d138ad28", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [youtube.com](1) may be at an arbitrary position in the...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [youtube.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 92 ]
[ null ]
[ 8 ]
[ 49 ]
2024-11-18T21:11:17.205041+00:00
1,519,355,646,000
92eb76ea19fadb73f7278095a93edcca0c8086a8
3
{ "blob_id": "92eb76ea19fadb73f7278095a93edcca0c8086a8", "branch_name": "refs/heads/master", "committer_date": 1519355646000, "content_id": "958582da9ce6e44a5c4d3f4e136ce7c61b4e205e", "detected_licenses": [ "MIT" ], "directory_id": "0cf08e3c68d0494be6310e16bdc57a086d8a2c7c", "extension": "py", "fi...
3.03125
stackv2
import sys import requests from requests import ConnectionError from .config_reader import ConfigurationReader class NewsPulling: """Pull news from the internet depending on the source specified.""" def __init__(self, source): self.source = source def pull_news(self): config = Configur...
93
35.65
74
19
726
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_223d4b337faea79b_6d91fb58", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
5
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensi...
[ 22, 79, 85, 88, 91 ]
[ null, null, null, null, null ]
[ 19, 23, 23, 23, 23 ]
[ 22, 49, 37, 49, 56 ]
2024-11-18T19:03:18.637538+00:00
1,576,843,463,000
159a3ecfb8bb9488e1b1ca17cf61087910eb37a5
2
{ "blob_id": "159a3ecfb8bb9488e1b1ca17cf61087910eb37a5", "branch_name": "refs/heads/master", "committer_date": 1576843463000, "content_id": "38c8d5c04e4cf8dd7243b78343d9ac27e3fd5d70", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "8e8c5719c80636c390f5bb26b3e5a33ea97ca4e5", "extension": "p...
2.328125
stackv2
#!/usr/bin/env python3 # (c) Copyright IBM Corporation 2016 # LICENSE: BSD-3, https://opensource.org/licenses/BSD-3-Clause # Use the dashDB analytics REST API to check that the dashDB Spark support # is configured and accessible import warnings import sys, os import json, requests from requests.auth import HTTPBasicA...
61
44.51
119
14
696
python
[{"finding_id": "codeql_py/request-without-cert-validation_6119465c77cf2028_1a667c04", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 19, 26 ]
[ 20, 27 ]
[ 12, 17 ]
[ 33, 49 ]
2024-11-18T19:03:28.827667+00:00
1,624,934,840,000
2a51db4ed6e222ae84196487ddd1fff88c274e13
3
{ "blob_id": "2a51db4ed6e222ae84196487ddd1fff88c274e13", "branch_name": "refs/heads/main", "committer_date": 1624934840000, "content_id": "8f3d155d74046d97f9b4b54625ade9029be7fe0f", "detected_licenses": [ "MIT" ], "directory_id": "21c4c2e96b5364088c2295efeef93d54a32147e1", "extension": "py", "file...
2.71875
stackv2
import os import time from gcpprojectautomation import helpers import googleapiclient.discovery import json import pprint import logging as log import googleapiclient.errors class GCPProject(object): """ Class for creating new GCP Projects. Assumes that the following commands have been run: gcloud au...
327
40.92
141
18
2,726
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f802243e5f66013f_9540e0c9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 267 ]
[ null ]
[ 22 ]
[ 67 ]
2024-11-18T19:28:49.985997+00:00
1,533,582,882,000
3a83001ae8bc539058cfcbfc2a54c76b0c8362af
3
{ "blob_id": "3a83001ae8bc539058cfcbfc2a54c76b0c8362af", "branch_name": "refs/heads/master", "committer_date": 1533582882000, "content_id": "8d80d3f6b6d94e274edab39950f874f1173bd879", "detected_licenses": [ "Apache-2.0" ], "directory_id": "fee60412c2d7d0c5c6cd444159823b9cd4777b5c", "extension": "py"...
2.53125
stackv2
"""Make authenticated requests to eclipse backends.""" import functools import multiprocessing import argparse import json import os import requests import math import time import hashlib from common.id_token import get_id_token from common.secret_keys import IDEUM_APP_SECRET def get_arguments(): parser = argpar...
58
37.41
104
17
528
python
[{"finding_id": "codeql_py/request-without-cert-validation_e5a2798f55409780_4776cca5", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 32, 40 ]
[ null, null ]
[ 9, 9 ]
[ 71, 69 ]
2024-11-18T19:28:51.996898+00:00
1,441,165,020,000
45523cc1f1418ce16385af2556e636bec369382e
2
{ "blob_id": "45523cc1f1418ce16385af2556e636bec369382e", "branch_name": "refs/heads/master", "committer_date": 1441165020000, "content_id": "01b2f1821ad0b161b2eba80c9a1e71ba3f9f4ca8", "detected_licenses": [ "MIT" ], "directory_id": "aa89d67372cfbd8c85eddbae54eac70e0a6618ae", "extension": "py", "fi...
2.375
stackv2
# -*- coding: utf-8 -*- import json import tornado.httpserver import tornado.ioloop import tornado.options import tornado.web import hashlib from tornado.options import define, options define("port", default=8090, help="run on the given port", type=int) class MainHandler(tornado.web.RequestHandler): def post(self...
39
30.18
68
13
264
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_a4662e1a41e5689f_dc0d707b", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 19 ]
[ null ]
[ 32 ]
[ 62 ]
2024-11-18T19:29:02.486492+00:00
1,496,186,151,000
b046d2b2aab48f6a4e3b4a12c50b4f2e04b69966
3
{ "blob_id": "b046d2b2aab48f6a4e3b4a12c50b4f2e04b69966", "branch_name": "refs/heads/master", "committer_date": 1496186151000, "content_id": "e26383408be045bae07d98bed25ead8754b3b7fc", "detected_licenses": [ "MIT" ], "directory_id": "96281240d2adcd8c5ba028c40a92b48b3a039083", "extension": "py", "fi...
2.765625
stackv2
#!/usr/bin/env python """ Script to check repair status on multiple nodes. Uses SSH to connect to nodes and look for range_repair.py status output file. Aggregates status information for all nodes. Example: ./check_repair_status.py status.json cass-1.example.com cass-2.example.com cass-3.example.com """ import js...
341
33.54
117
16
2,848
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_94ffa9e09d53c7e0_ec07129d", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 328 ]
[ null ]
[ 5 ]
[ 62 ]
2024-11-18T20:18:25.002835+00:00
1,620,288,461,000
6fd081783059d3ab69ec99e0fd1d18f105e41a54
3
{ "blob_id": "6fd081783059d3ab69ec99e0fd1d18f105e41a54", "branch_name": "refs/heads/main", "committer_date": 1620288461000, "content_id": "de88cf4487de85a7125265440a2ff1601ce2537c", "detected_licenses": [ "Apache-2.0" ], "directory_id": "9d33f3525e04b4c8e527c2a1837a8ced83b6ae3d", "extension": "py", ...
2.53125
stackv2
import datetime import time import tkinter as tk from datetime import date from hashlib import sha256 from tkinter import messagebox import requests def get_calendar(): response = requests.get( f"https://cdn-api.co-vin.in/api/v2/appointment/sessions/public/calendarByPin?pincode={PINCODE}&date={date.today...
171
33.25
147
19
1,397
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ddbaf18976665709_a855c7ae", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text." ]
[ 149 ]
[ null ]
[ 11 ]
[ 58 ]
2024-11-18T20:18:58.949870+00:00
1,530,372,529,000
63dfb38f1896a540cdfd6ae5942795d870b7a48b
3
{ "blob_id": "63dfb38f1896a540cdfd6ae5942795d870b7a48b", "branch_name": "refs/heads/master", "committer_date": 1530372529000, "content_id": "1b27e94970f249701b54e766adb87ffcbeefe49b", "detected_licenses": [ "MIT" ], "directory_id": "f5d4228f8ecea6b094eb9d178e8f220827fc180a", "extension": "py", "fi...
3.15625
stackv2
''' Script from Justin Seitz's https://learn.automatingosint.com/ Course and Modified for Python 3 by Micah Hoffman ''' from twitter_keys import * import csv import json import requests import time logfile = 'rockville.csv' latitude = 39.106011097700915 longitude = -77.09330247246095 radius = 2 # # Send requ...
133
23.44
89
18
786
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_52ff41d7cdd312b4_87540cc1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.\nThis expression logs [sensitive data (private)](4) as clear text." ]
[ 124 ]
[ null ]
[ 19 ]
[ 25 ]
2024-11-18T20:29:51.276148+00:00
1,541,499,522,000
16730b57dbbab7d7a878fd2c0e315e3b159ae81b
2
{ "blob_id": "16730b57dbbab7d7a878fd2c0e315e3b159ae81b", "branch_name": "refs/heads/master", "committer_date": 1541499522000, "content_id": "3bfb36b2267be90ce40061da1b61ed09be5019ac", "detected_licenses": [ "MIT" ], "directory_id": "4e9de2eb339cbc6e87cc868a0ec17c9f4f0a85da", "extension": "py", "fi...
2.421875
stackv2
#!/usr/bin/env python from __future__ import print_function import shutil import subprocess import begin import jinja2 import os import sys from os import path import jinja2 from jinja2 import Environment, FileSystemLoader, StrictUndefined script_dir = os.path.realpath(os.path.dirname(os.path.realpath(__file__))) prin...
120
34.88
151
23
878
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_4c6fe1a027a901a0_e7d31d4d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 62 ]
[ 67 ]
[ 11 ]
[ 6 ]
2024-11-18T19:07:04.110446+00:00
1,457,436,103,000
ba20653a3995434ba2ed96ca601c7b315da7b70c
3
{ "blob_id": "ba20653a3995434ba2ed96ca601c7b315da7b70c", "branch_name": "refs/heads/master", "committer_date": 1457436103000, "content_id": "d571b25e7067415075f8a5adc42ba3c422c3f10d", "detected_licenses": [ "MIT" ], "directory_id": "606ee1ed0f44dc1dc1e12d4a8f8c21c06cc84ba6", "extension": "py", "fi...
2.703125
stackv2
#!/usr/bin/env python from __future__ import print_function from collections import namedtuple from common import config from common.response import text_response, populate_html, redirect import os import hashlib import cgi import MySQLdb import Cookie def process_input(): # Load email and password from form ...
137
31.49
77
17
873
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_e65632b85cd04f1f_88d92aaa", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e...
[ 90 ]
[ null ]
[ 42 ]
[ 67 ]
2024-11-18T19:07:06.287251+00:00
1,637,516,607,000
500ac4c871612f48a65aacd2a8db4a3f254c5109
3
{ "blob_id": "500ac4c871612f48a65aacd2a8db4a3f254c5109", "branch_name": "refs/heads/main", "committer_date": 1637516616000, "content_id": "ca8e632237a06f12ec38f0f4d5535a972979fd4d", "detected_licenses": [ "MIT" ], "directory_id": "5d50db581c8c26785eaf3010e31832eab13ade89", "extension": "py", "file...
3.0625
stackv2
from typing import Dict from event_handlers import EventsHandler from config import SIMULATION_END from person import Person import sys from events import ( break_the_ice, generate_initial_popultaion, ) import events as global_vars def run_simul(events: EventsHandler, population: Dict[bytes, Person]): p...
56
27.86
87
18
380
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_eecde35c579f0976_aeef69b5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 38 ]
[ null ]
[ 11 ]
[ 58 ]
2024-11-18T19:07:12.740888+00:00
1,554,907,091,000
ce9549775e410977a2fcf7939d65777e29669bc8
3
{ "blob_id": "ce9549775e410977a2fcf7939d65777e29669bc8", "branch_name": "refs/heads/master", "committer_date": 1554907091000, "content_id": "e85a6be1abd68bfaacf168e8d8931db7278a208c", "detected_licenses": [ "MIT" ], "directory_id": "beab20d8b774139a450e4ba3717fd59797dad099", "extension": "py", "fi...
2.78125
stackv2
#!/usr/bin/env python3 # To use it, # > virtualenv template # > source template/bin/activate # > python template.py -h from configparser import ConfigParser from pprint import pprint import argparse import io import os import sys import jinja2 from jinja2 import Template from jinja2 import Environment def construc...
52
31.81
135
16
394
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_a59f4cbc0c58c920_37dc035d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 42 ]
[ null ]
[ 11 ]
[ 100 ]
2024-11-18T19:07:18.851497+00:00
1,561,413,529,000
0076f26e3e4624f0cc448074f97c3a03f1a6ac25
3
{ "blob_id": "0076f26e3e4624f0cc448074f97c3a03f1a6ac25", "branch_name": "refs/heads/master", "committer_date": 1561413529000, "content_id": "143ed1d2b37bef8d9ebbf26317c138e2895a11fb", "detected_licenses": [ "MIT" ], "directory_id": "4f31f0d4230c25ad72cac25f1d844a7be941cb30", "extension": "py", "fi...
2.984375
stackv2
import os.path import datetime as dt from jinja2 import Environment, FileSystemLoader from notes_parser import MODULE_DIR, parse_file OUTPUT_DIR = os.path.join(MODULE_DIR, 'output') def output_plaintext(clippings_file: str, output_filename: str) -> str: parsed_data = parse_file(clippings_file) output_text...
92
28.73
105
17
666
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_0293399af4d066f6_f797aa61", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 46 ]
[ null ]
[ 11 ]
[ 106 ]
2024-11-18T19:07:32.381157+00:00
1,611,690,861,000
5a61be47eb5ede2a532053db79c39144e3a4cc18
2
{ "blob_id": "5a61be47eb5ede2a532053db79c39144e3a4cc18", "branch_name": "refs/heads/master", "committer_date": 1611690861000, "content_id": "d108ff5e783dc5540ce7cd50755b45a47a2db40c", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "54e3f890369cd9025c15831cc676d31c195992c4", "extension": "p...
2.34375
stackv2
import itertools import os import xml import xmltodict from pk_db import db, cur from pk_logging import logging from pk_tools import canonical_party_name logger_mps = logging.getLogger('mps_data') names_list = [] forces_list = [] mails_list = [] url_list = [] assembly_list = [] dob_list = [] all_mps = sorted(map(i...
145
41.61
132
21
1,583
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3f2fa5fcb5b3377e_183c9739", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 117 ]
[ null ]
[ 27 ]
[ 29 ]
2024-11-18T19:07:37.773221+00:00
1,686,257,721,000
cbf740740b2921e57defd547d31a309e29c34d2d
2
{ "blob_id": "cbf740740b2921e57defd547d31a309e29c34d2d", "branch_name": "refs/heads/master", "committer_date": 1686257721000, "content_id": "15bfe190b67233442a7de79333700c19b4fab05b", "detected_licenses": [ "Apache-2.0" ], "directory_id": "de621146f8931deef6e9ed0836a37d9e4614dc52", "extension": "py"...
2.34375
stackv2
# SPDX-FileCopyrightText: 2023 Geoffrey Lentner # SPDX-License-Identifier: Apache-2.0 """Manage remote connections and data.""" # type annotations from __future__ import annotations from typing import Tuple, Optional, Type, Union, IO from types import TracebackType # standard libs import os import sys from dataclas...
192
34.07
109
21
1,459
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_699ea486088875c5_a5c4d20c", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 103 ]
[ null ]
[ 9 ]
[ 65 ]
2024-11-18T19:07:49.185753+00:00
1,690,361,673,000
482603493cfd3919c9bf2b0f460662db5f654a62
3
{ "blob_id": "482603493cfd3919c9bf2b0f460662db5f654a62", "branch_name": "refs/heads/master", "committer_date": 1690361673000, "content_id": "b9f15be533f2031ebe1de6abc7d5c15587904221", "detected_licenses": [ "MIT" ], "directory_id": "4d1e0a5c4b36c0062b996adccddc85c720470eca", "extension": "py", "fi...
2.703125
stackv2
import hashlib import json from urllib.request import urlopen from urllib.parse import urlencode class PickException(Exception): def __init__(self, message): super().__init__() self.message = message def __str__(self): return self.message class Picker: def __init__(self, key, se...
64
31.08
78
20
507
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_88a6682c51d8ffaf_cba6b444", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 62 ]
[ null ]
[ 18 ]
[ 47 ]
2024-11-18T19:07:53.634605+00:00
1,633,142,806,000
6e0def712e13ef2040d934d2f43c8c29587be646
2
{ "blob_id": "6e0def712e13ef2040d934d2f43c8c29587be646", "branch_name": "refs/heads/main", "committer_date": 1633142806000, "content_id": "81ee22cbbd3b09f473bf56ba13d622eaf10c000b", "detected_licenses": [ "MIT" ], "directory_id": "baf554a9397b89f839928a64eb06df37194c60c2", "extension": "py", "file...
2.4375
stackv2
import functools from flask import Blueprint from flask import g from flask import request from flask import session from flask import abort from flask import jsonify from server.models.users import User bp = Blueprint("auth", __name__, url_prefix="/api/auth") def login_required(view): @functools.wraps(view) ...
76
22.41
79
14
415
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_30561a18de43ac64_4fac45f9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 41 ]
[ null ]
[ 25 ]
[ 33 ]
2024-11-18T19:07:56.459837+00:00
1,513,068,698,000
4c7cc1722c9616cca617016185d1551ac50e3210
3
{ "blob_id": "4c7cc1722c9616cca617016185d1551ac50e3210", "branch_name": "refs/heads/master", "committer_date": 1513068698000, "content_id": "0c2b9ab411333369d4932133cd1ac7455cdfa32e", "detected_licenses": [ "MIT" ], "directory_id": "92249895acbc3186da130e0178923fd3d2e8ea16", "extension": "py", "fi...
3.21875
stackv2
"""Simple Python 3 web crawler, to be scan for s3 buckets in sites. Prerequisites: pip install requests pip install beautifulsoup4 """ import collections import string from timeit import default_timer from urllib.parse import urldefrag, urljoin, urlparse import bs4 import requests import redis import re #---------...
204
32.28
111
18
1,539
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_9e59059edb5d1ec0_2bfb3a97", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'amazonaws.com', so it might match m...
2
true
[ "CWE-020", "CWE-295" ]
[ "py/incomplete-hostname-regexp", "py/request-without-cert-validation" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'amazonaws.com', so it might match more hosts than expected.", "This request may run without certificate validation because [it is disabled](1)." ]
[ 135, 54 ]
[ null, null ]
[ 25, 24 ]
[ 57, 67 ]
2024-11-18T19:08:00.648488+00:00
1,599,053,344,000
45174647691d78bd30ae689419fddbf40ad69631
2
{ "blob_id": "45174647691d78bd30ae689419fddbf40ad69631", "branch_name": "refs/heads/master", "committer_date": 1599053344000, "content_id": "be7e5020d5865a05f0e4212c8027a9e7017e38c1", "detected_licenses": [ "BSD-2-Clause", "BSD-3-Clause" ], "directory_id": "7efc23306e80c89cc7f35851786d321bf5949e0b...
2.40625
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- import yaml import lxml.html import requests if __name__ == '__main__': f = open("account.yaml", "r+") conf = yaml.load(f, Loader=yaml.BaseLoader) f.close() session = requests.session() login_url = 'https://healthcare.mb.softbank.jp/v3/web_login' summary_...
34
33.03
90
15
355
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_811463fc13a32598_a4c282f5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 27 ]
[ null ]
[ 13 ]
[ 47 ]
2024-11-18T19:18:13.616693+00:00
1,624,023,365,000
7d2d0aa095836700bab00c47977f68a986fc9fe7
2
{ "blob_id": "7d2d0aa095836700bab00c47977f68a986fc9fe7", "branch_name": "refs/heads/master", "committer_date": 1624023365000, "content_id": "c5e48c91098cb5bfe991674aef8dfc14f95dd1da", "detected_licenses": [ "MIT" ], "directory_id": "ccd9502bfc9739a33c1cca37843dc1298d4ec148", "extension": "py", "fi...
2.5
stackv2
import re import os import sys import crc16 import base64 import qrcode from unicodedata import normalize from amzqr import amzqr from PIL import Image from io import BytesIO def validate_cpf(numbers): cpf = [int(char) for char in numbers if char.isdigit()] if len(cpf) != 11: return False if cpf =...
215
31.89
118
21
1,759
python
[{"finding_id": "codeql_py/overly-large-range_47486a0aa2e6b986_c4ba1b65", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with Z-z in the same character class, and is equivalent to \\[A...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that overlaps with Z-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a\\].", "Suspicious character range that is equivalent to \\[Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 45, 45 ]
[ null, null ]
[ 23, 27 ]
[ 26, 30 ]
2024-11-18T19:18:16.102464+00:00
1,629,395,660,000
7c7ca660187d381fbe296fe9c5e3a709533fad3c
2
{ "blob_id": "7c7ca660187d381fbe296fe9c5e3a709533fad3c", "branch_name": "refs/heads/master", "committer_date": 1629395660000, "content_id": "28c4e2e39dbacbefbcb4893c75931f4679fe6761", "detected_licenses": [ "MIT" ], "directory_id": "f1d5cdb817af2ec9c2230f5329aca854a83500a9", "extension": "py", "fi...
2.390625
stackv2
import os from flask import Flask, request, flash, redirect, render_template from fastai.vision.all import * from fastai.vision.core import PILImage from fastai.vision.all import load_learner from werkzeug.utils import secure_filename from api.utils.constants import UPLOAD_FOLDER, ALLOWED_EXTENSIONS from api.utils.co...
61
32.74
87
16
456
python
[{"finding_id": "codeql_py/url-redirection_c8e22e89a0b44336_e39eacb0", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
2
true
[ "CWE-601", "CWE-601" ]
[ "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 38, 45 ]
[ null, null ]
[ 29, 29 ]
[ 40, 40 ]
2024-11-18T19:18:19.320868+00:00
1,610,956,299,000
cf9d856deb3fb154732888d197ba323e049e8f81
3
{ "blob_id": "cf9d856deb3fb154732888d197ba323e049e8f81", "branch_name": "refs/heads/master", "committer_date": 1610956299000, "content_id": "a901e27ab4f1afda3fcf9b5701cb1917cae1f657", "detected_licenses": [ "MIT" ], "directory_id": "bda67259374747a7e901a7ba5de64e79ecfa747b", "extension": "py", "fi...
2.703125
stackv2
import re def extract_libraries(files): """Extracts a list of imports that were used in the files Parameters ---------- files : []string Full paths to files that need to be analysed Returns ------- dict imports that were used in the provided files, mapped against the lang...
35
26.17
94
14
236
python
[{"finding_id": "codeql_py/overly-large-range_038bcc26b5f0ed7d_2e374201", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 21 ]
[ null ]
[ 40 ]
[ 43 ]
2024-11-18T19:18:21.645064+00:00
1,606,191,340,000
047b19f2175501c063264b7f8fbd1538668a4407
2
{ "blob_id": "047b19f2175501c063264b7f8fbd1538668a4407", "branch_name": "refs/heads/master", "committer_date": 1606191340000, "content_id": "28df7419cb51cc8e2fc06c18410d837a26ec6a53", "detected_licenses": [ "MIT" ], "directory_id": "282bedae1df74d4d922262e371153b8a81813423", "extension": "py", "fi...
2.5
stackv2
import tarfile import os import argparse import io from typing import Optional, Union from mpi4py import MPI KB = 1024 MB = 1024 * KB # Extract buffer size #TAR_BUF_SIZE = 128 * KB # MPI_Bcast buffer size BCAST_BUF_SIZE = 1 * MB # File read buffer size READ_BUF_SIZE = 4 * MB def main(): parser = argparse.Arg...
99
24.09
83
17
583
python
[{"finding_id": "codeql_py/tarslip_5d89fd9b85c68a28_46027ef7", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 35 ]
[ null ]
[ 13 ]
[ 14 ]
2024-11-18T19:18:53.732789+00:00
1,626,728,074,000
f7a4e191f336d0705fadd74914658200e2690e30
2
{ "blob_id": "f7a4e191f336d0705fadd74914658200e2690e30", "branch_name": "refs/heads/master", "committer_date": 1626728074000, "content_id": "f7aa4311fe48bc8845463fb4f42f902f59bd8342", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "17e1dc3cf392321906c4f073a51209cd48398d66", "extension": "p...
2.375
stackv2
#!/usr/bin/env python import jinja2 import os import copy import logging from ansible.module_utils.basic import AnsibleModule from s3vaultlib.metadata.ec2 import EC2Metadata from s3vaultlib.connection.connectionmanager import ConnectionManager from s3vaultlib.s3vaultlib import S3Vault logging.basicConfig(level=logging...
186
32.32
111
14
1,388
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_38314625dc8a1ad4_28538316", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 147 ]
[ null ]
[ 20 ]
[ 58 ]
2024-11-18T19:29:45.332428+00:00
1,498,583,690,000
5d6c9a2cf3ab01eb7f939661487ffe9f43f3384c
3
{ "blob_id": "5d6c9a2cf3ab01eb7f939661487ffe9f43f3384c", "branch_name": "refs/heads/master", "committer_date": 1498583690000, "content_id": "16892b595afa61fabd7648a1575c12ff52d742cc", "detected_licenses": [ "MIT" ], "directory_id": "df88376c864ca81f9829d5d0e927914d5a5cb057", "extension": "py", "fi...
2.546875
stackv2
import re import webbrowser import os dir_path = os.path.dirname(os.path.realpath(__file__)) openJson = open(dir_path + '\\subscriptions.txt') url = openJson.read() writeFile = open(dir_path + '\\outputList.txt', 'w+') urls = re.findall( 'http[s]?://(?:[a-zA-Z]|[0-9]|[$-_@.&+]|[!*\(\),]|(?:%[0-9a-fA-F][0-9a-fA-F...
25
24.52
90
11
190
python
[{"finding_id": "codeql_py/overly-large-range_434ddb026d9a9d68_65e7798b", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 12 ]
[ null ]
[ 36 ]
[ 39 ]
2024-11-18T19:29:52.275829+00:00
1,614,143,606,000
95448c5e7f43c92b3333695fea250894f450cb84
2
{ "blob_id": "95448c5e7f43c92b3333695fea250894f450cb84", "branch_name": "refs/heads/master", "committer_date": 1614143606000, "content_id": "417a928a03fa41ddea4ae3cfd941e353e5fd2aec", "detected_licenses": [ "MIT" ], "directory_id": "6e798e8c687a88151df2a8b5483ffabc0814b559", "extension": "py", "fi...
2.421875
stackv2
import os import sys import json import subprocess import random import configparser from flask import Flask from flask import render_template from flask import jsonify from flask import request from subprocess import PIPE #################################### # Configuration #################################### eosi...
106
29.92
150
15
748
python
[{"finding_id": "codeql_py/command-line-injection_de1485f80520d044_02f61063", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {...
1
true
[ "CWE-078" ]
[ "py/command-line-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This command line depends on a [user-provided value](1)." ]
[ 33 ]
[ null ]
[ 30 ]
[ 37 ]
2024-11-18T19:44:30.860998+00:00
1,407,031,552,000
d7970de4687dd546920d85a6e13d37fa839369f3
3
{ "blob_id": "d7970de4687dd546920d85a6e13d37fa839369f3", "branch_name": "refs/heads/master", "committer_date": 1407816989000, "content_id": "b6c27f3230f85506c14b3de00fd3848d432483e1", "detected_licenses": [ "MIT" ], "directory_id": "54ecef3639f4d6922c878fff6bca6bd465178f87", "extension": "py", "fi...
2.984375
stackv2
#!/usr/bin/python import os import hashlib import getpass import pyperclip from pbkdf2 import crypt password_length = 16 base_phrase = getpass.getpass("Enter base phrase: ") sanity_check = hashlib.sha256() sanity_check.update(base_phrase) print sum([ord(x) for x in sanity_check.digest()]) valid_characters = 'abcd...
33
22.18
119
14
215
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_3dabe6f54cb228bf_ed536ebf", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 14 ]
[ null ]
[ 21 ]
[ 32 ]
2024-11-18T19:57:58.201871+00:00
1,651,089,253,000
fd79756493fe73b64f2e84872f962fae3a1b8e99
3
{ "blob_id": "fd79756493fe73b64f2e84872f962fae3a1b8e99", "branch_name": "refs/heads/master", "committer_date": 1651089253000, "content_id": "66dcbdf4254c941c1182488e4219641601044f33", "detected_licenses": [ "MIT" ], "directory_id": "e38d932eaf0718e864846a9c81192c5d4276d02e", "extension": "py", "fi...
2.875
stackv2
import re import requests import urllib from django.http import JsonResponse from django.views.decorators.csrf import csrf_exempt from rest_framework.decorators import api_view from robots_scraper.models import WebSite @api_view(['GET', 'POST', 'DELETE']) @csrf_exempt def handle_website(request, website_id=None): ...
130
26.75
113
19
783
python
[{"finding_id": "codeql_py/full-ssrf_0f57a13392440c98_6407edc9", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
1
true
[ "CWE-918" ]
[ "py/full-ssrf" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1)." ]
[ 45 ]
[ null ]
[ 13 ]
[ 30 ]
2024-11-18T19:58:23.879731+00:00
1,511,764,149,000
64cb5f6863c88541090f639dd2df059428c4b567
2
{ "blob_id": "64cb5f6863c88541090f639dd2df059428c4b567", "branch_name": "refs/heads/master", "committer_date": 1511764149000, "content_id": "b7b997d44ce741bb6ef36ffdad5b66463826b63e", "detected_licenses": [ "MIT" ], "directory_id": "cebb9bcb10cdf5b216bcb4349dc3fe4cf4c28773", "extension": "py", "fi...
2.421875
stackv2
import requests from bs4 import BeautifulSoup import ast import os.path import datetime import time import smtplib from email.mime.text import MIMEText import pandas as pd import csv import re import pprint import configparser pp = pprint.PrettyPrinter(indent=4) config = configparser.ConfigParser() config.read('config...
176
36.58
122
27
1,541
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_77e1d098318afd19_df724561", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 69 ]
[ null ]
[ 22 ]
[ 28 ]
2024-11-18T20:10:12.400235+00:00
1,567,484,108,000
6b386f8a277787fbb4e94cf19b903ddc27641421
3
{ "blob_id": "6b386f8a277787fbb4e94cf19b903ddc27641421", "branch_name": "refs/heads/master", "committer_date": 1567484108000, "content_id": "8095effd104d5bf28bfb0b3d50a63813eb400806", "detected_licenses": [ "MIT" ], "directory_id": "31322bcbd3eb8db61028b2a34854963438364068", "extension": "py", "fi...
2.59375
stackv2
import time import requests from hashlib import md5 class LoginSohu: """ 搜狐新闻登录 - 采用移动端浏览器Web页面进行登录 - 无验证码,密码采用md5加密 """ # 会话对象 session = requests.session() def __init__(self, username, password, **kwargs): self.username = username self.password_md5 = self._get_passwor...
111
37.23
164
19
1,126
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_35d264853df01496_1fc72f77", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi...
[ 89 ]
[ null ]
[ 20 ]
[ 53 ]
2024-11-18T20:10:25.125618+00:00
1,584,910,631,000
caf5a8f0d8a243afc80631517a81dd9e79e91ef6
2
{ "blob_id": "caf5a8f0d8a243afc80631517a81dd9e79e91ef6", "branch_name": "refs/heads/master", "committer_date": 1584910631000, "content_id": "4e6c44064cf7146e18161b57328ca93d1399029a", "detected_licenses": [ "MIT" ], "directory_id": "e3886b4c32f0b6512fb72a45f803fc6e4c9361d6", "extension": "py", "fi...
2.34375
stackv2
from flask import redirect, send_file import sys import redis from jwt import decode, InvalidTokenError from uuid import uuid4 from flask import Flask from flask import request JWT_SECRET = "TESTSECRET" SESSION_ID = "session_id" app = Flask(__name__) db = redis.Redis(host='serwer_redis', port=6380, decode_response...
102
32.19
94
15
901
python
[{"finding_id": "codeql_py/url-redirection_10b920a24dad5aff_0c11207b", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
5
true
[ "CWE-601", "CWE-601", "CWE-601", "CWE-601", "CWE-022" ]
[ "py/url-redirection", "py/url-redirection", "py/url-redirection", "py/url-redirection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).", "This path depends on a [user-provid...
[ 65, 68, 71, 75, 84 ]
[ null, null, null, null, null ]
[ 25, 25, 25, 21, 27 ]
[ 54, 55, 51, 87, 39 ]
2024-11-18T20:10:38.865117+00:00
1,504,089,357,000
1363faf9a8e05e1331d74a38d55c348a5ecafa6f
3
{ "blob_id": "1363faf9a8e05e1331d74a38d55c348a5ecafa6f", "branch_name": "refs/heads/master", "committer_date": 1504089357000, "content_id": "ab7fbc783fdc1a98ae79d5c374394f11a7ddafcd", "detected_licenses": [ "Apache-2.0" ], "directory_id": "4b5dcb620b1df529af2d65b97aff97113f5184d6", "extension": "py"...
2.578125
stackv2
import yaml import os import re from upseto import gitwrapper class Manifest: _FILENAME = "solvent.manifest" def __init__(self, data): assert isinstance(data, dict) assert 'requirements' in data self._data = data self._assertValid() def requirements(self): return ...
79
33.72
108
17
613
python
[{"finding_id": "codeql_py/overly-large-range_256d87c357663829_6ad2dade", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\w in the same character class.", "remediation": "", "loc...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with \\w in the same character class." ]
[ 24 ]
[ null ]
[ 75 ]
[ 78 ]
2024-11-18T20:23:11.383316+00:00
1,464,699,269,000
a2a2db11a640e4c3cc4dd99a8426e98e606a4f01
2
{ "blob_id": "a2a2db11a640e4c3cc4dd99a8426e98e606a4f01", "branch_name": "refs/heads/master", "committer_date": 1464699297000, "content_id": "2907ecf22b35b5259a5be79ff193c80550688c71", "detected_licenses": [ "MIT" ], "directory_id": "5e1bb1efe834d21feb04567180d37aa382662ce1", "extension": "py", "fi...
2.390625
stackv2
#!/usr/bin/env python #coding=utf-8 import numpy as np import matplotlib.pyplot as plt import jinja2 import tempfile import subprocess import shutil import os import pandas as pd import argparse parser = argparse.ArgumentParser() parser.add_argument('participants', help='CSV file with participants') parser.add_argume...
47
27.62
101
12
325
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_2dae978c7772f44e_0d2fd829", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 22 ]
[ null ]
[ 9 ]
[ 52 ]
2024-11-18T20:23:12.255756+00:00
1,635,777,141,000
1eb8069ccba6e6a58493579c1f3fa7b99704dd8e
2
{ "blob_id": "1eb8069ccba6e6a58493579c1f3fa7b99704dd8e", "branch_name": "refs/heads/main", "committer_date": 1635777141000, "content_id": "d627795e45759a12c94cc8e85f1fc113c28f24c0", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "7ccb0479c958d12ca03217ebfb6d83ee36e12013", "extension": "py"...
2.390625
stackv2
''' Created on 17 Mar 2021 @author: thomasgumbricht ''' from sys import exit import os import json from geoimagine.gis import kt_gis as ktgis from geoimagine.zipper import UnZip def JsonParams(jsonPath): ''' ''' # Opening JSON file f = open(jsonPath, "r") # returns JSON ob...
280
26.06
133
21
1,904
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3f1aba761f5f8b7a_60f06fb7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 265 ]
[ null ]
[ 12 ]
[ 19 ]
2024-11-18T20:23:25.588786+00:00
1,635,469,194,000
59603c082a4b286d1c21575078a376d1f4941785
3
{ "blob_id": "59603c082a4b286d1c21575078a376d1f4941785", "branch_name": "refs/heads/main", "committer_date": 1635469194000, "content_id": "91c21487ef718abf958b553fbe4fd63b7eb54ce5", "detected_licenses": [ "Apache-2.0" ], "directory_id": "91622b9643c3204fd98e69c3d65bfb3c93028320", "extension": "py", ...
2.578125
stackv2
#!/usr/bin/env python # -*- encoding: utf-8 -*- """ @Description: 网络代理请求的基类 @Date :2021/09/15 @Author :xhunmon @Mail :xhunmon@gmail.com """ import requests from my_fake_useragent import UserAgent class Net(object): """ 基类,封装常用接口 """ TIMEOUT = 8 def __init__(self, timeout=8): ...
71
35.08
111
14
678
python
[{"finding_id": "codeql_py/request-without-cert-validation_ce5ee001cb575c96_60c02a20", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1) by [this value](2).\nThis request may run without certificate validation because [it is disabled](1) by [this value](3).\nThis request may run without certificate validation because [it is disabled](1) by [this value](4).\nThis request...
[ 67, 70 ]
[ 68, 71 ]
[ 20, 20 ]
[ 66, 49 ]
2024-11-18T20:23:26.956047+00:00
1,591,667,478,000
6ee1a2392faa14b0021a11a7c5c9690ec03370f3
3
{ "blob_id": "6ee1a2392faa14b0021a11a7c5c9690ec03370f3", "branch_name": "refs/heads/master", "committer_date": 1591667478000, "content_id": "0661fa47bcd84a6e5f800e7cb731ce06e207595c", "detected_licenses": [ "MIT" ], "directory_id": "ba48e2272ccb1f087b6ad2500f1e276e396b4437", "extension": "py", "fi...
2.59375
stackv2
from topic.models import Topic from backend.utils import replace from article.models import Article from article.permissions import IsVerified from article.paginators import RecentArticleListAPIPaginator from article.serializers import ArticleListSerializer, ArticleDetailSerializer from django.db.models import QuerySe...
130
33.28
105
22
864
python
[{"finding_id": "codeql_py/stack-trace-exposure_7b32a73753938627_9e5a8117", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 84 ]
[ null ]
[ 21 ]
[ 68 ]
2024-11-18T20:23:30.210557+00:00
1,524,630,762,000
430da1234aec6d085107b2bbb73200f09b19521f
2
{ "blob_id": "430da1234aec6d085107b2bbb73200f09b19521f", "branch_name": "refs/heads/master", "committer_date": 1524630762000, "content_id": "efcc0063a03cff01e27411c2cd3483e25527fcbd", "detected_licenses": [ "MIT" ], "directory_id": "ff3ffad039f127eb530db22abd9ea69f058be131", "extension": "py", "fi...
2.484375
stackv2
#!/usr/bin/python2 from flask import Flask, render_template, make_response, jsonify import datetime, random, time from threading import Timer, Thread import RPi.GPIO as GPIO import serial #from flask_cors import CORS import logging, chromalog, re import random from serial import SerialException chromalog.basicConfig(le...
282
25.81
145
16
2,195
python
[{"finding_id": "codeql_py/flask-debug_8cdacd223715138d_672fce93", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-117", "CWE-117" ]
[ "py/flask-debug", "py/log-injection", "py/log-injection" ]
[ "HIGH", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2).", "This log entry depends on a [user-provided value](1).\nThis log entry depends on...
[ 275, 151, 172 ]
[ null, null, null ]
[ 3, 14, 14 ]
[ 46, 124, 128 ]
2024-11-18T20:23:34.324080+00:00
1,596,670,551,000
4702b2b26418d6366f4d59d750c4f415c4b7c461
2
{ "blob_id": "4702b2b26418d6366f4d59d750c4f415c4b7c461", "branch_name": "refs/heads/master", "committer_date": 1596670551000, "content_id": "ae30b7e4066b7fedca65e68237e05a4b472ff9e0", "detected_licenses": [ "MIT" ], "directory_id": "79b7f4551fc8b9e65b1511a52aec377c6974f68e", "extension": "py", "fi...
2.484375
stackv2
import pdfkit import mongoengine as mongo import celery.decorators import logging from jinja2 import Template import os from ccl_scratch_tools import Scraper from . import common as common from . import scrape, settings connect_db = common.connect_db def convert_cert(template, username, ...
115
34.67
131
15
803
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_132d06f7f6dfe6d3_748df905", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 51 ]
[ null ]
[ 20 ]
[ 68 ]
2024-11-18T20:50:17.986038+00:00
1,597,256,332,000
153194ee06574fbcaaf1040ec636a5d91c5913e6
3
{ "blob_id": "153194ee06574fbcaaf1040ec636a5d91c5913e6", "branch_name": "refs/heads/master", "committer_date": 1597256332000, "content_id": "098fad5791e195bdfa2782a1aa9c258f7edd580c", "detected_licenses": [ "Unlicense" ], "directory_id": "f0e408a2701eddd17393809e0127dfd4c0b4fcb4", "extension": "py",...
3.109375
stackv2
#!/usr/bin/env Python # import requests import sys def getAPICCookie(ip_addr, username, password, usetls): protocol='http' if usetls: protocol='https' url = protocol+'://'+ip_addr+'/api/aaaLogin.xml' xml_string = "<aaaUser name='%s' pwd='%s'/>" % (username, password) req = requests.post(ur...
39
27.21
76
13
307
python
[{"finding_id": "codeql_py/request-without-cert-validation_9d271a0f45e8dfcb_eb83a037", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 13 ]
[ null ]
[ 11 ]
[ 60 ]
2024-11-18T20:50:39.807296+00:00
1,661,013,711,000
b817a1ee4f71fe93650d87a799b8dbe5e747689b
2
{ "blob_id": "b817a1ee4f71fe93650d87a799b8dbe5e747689b", "branch_name": "refs/heads/master", "committer_date": 1661013711000, "content_id": "bcd5c85cd62d3e4fe34f4f11b6b3830a509d0996", "detected_licenses": [ "Apache-2.0", "BSD-3-Clause", "BSD-2-Clause", "MIT" ], "directory_id": "e2b9de8b9be...
2.34375
stackv2
""" Build YAML experiment config from template python data_preparation/make_config.py \ --class_config $CONFIG_CLASS \ --in_template $CONFIG_IN_TEMPLATE \ --out_config_dir $CONFIG_DIR \ --all_datasets_json $DATASETS_JSON_PATH \ --train=$TRAIN \ --valid=$VALID \ --infer $INFER \ --num_epo...
175
29.43
83
16
1,196
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_2b029bd564ba9560_ec4b48e8", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 129 ]
[ 133 ]
[ 11 ]
[ 6 ]
2024-11-18T20:50:43.932781+00:00
1,399,384,966,000
cc1a3571f1dceaf8e83dc33cde963bfb016aca30
3
{ "blob_id": "cc1a3571f1dceaf8e83dc33cde963bfb016aca30", "branch_name": "refs/heads/master", "committer_date": 1399384966000, "content_id": "68ea31e9c252da3676c828afb6b22240a93d5015", "detected_licenses": [ "MIT" ], "directory_id": "1419e1240b900920798e8475086421828e1a259f", "extension": "py", "fi...
2.5625
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- import time import os import hashlib import requests from urllib import quote BASE_LIST = ['http://v%d.api.upyun.com' % i for i in range(4)] BASE_AUTO, BASE_TELECOM, BASE_CNC, BASE_CTT = BASE_LIST def get_datetime(): ''' >>> print get_datetime() ''' retur...
239
28.13
88
19
1,688
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_b511c044c98f4f4b_c2b61ef6", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.", "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally exp...
[ 23, 226 ]
[ null, null ]
[ 35, 27 ]
[ 41, 33 ]
2024-11-18T20:50:45.903281+00:00
1,562,313,676,000
15e93e56b8d12c6455dcf41a4ccfd6ea50319a19
3
{ "blob_id": "15e93e56b8d12c6455dcf41a4ccfd6ea50319a19", "branch_name": "refs/heads/master", "committer_date": 1562313676000, "content_id": "3a19f0746441973e20b6f8dc54497cd276727706", "detected_licenses": [ "MIT" ], "directory_id": "0a6d7a4f375d1bf52374e918daa2c49007deb3a9", "extension": "py", "fi...
2.703125
stackv2
# -*- coding: utf-8 -*- from geopy.geocoders import Bing import pandas as pd import time from geopy.exc import GeopyError import os # Remove Key def removeRow(df, name): print("Removing", name) df = df.set_index("Unnamed: 0") if (name in df.index): df.drop(name, axis=0, inplace=True) df.reset_...
74
38.15
97
18
699
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a2a657c4bfa3c12e_d45c9497", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 50 ]
[ 51 ]
[ 24 ]
[ 70 ]
2024-11-18T20:50:52.661562+00:00
1,618,893,053,000
89b280fa5d6d87d29c01787a2f36f1c9cbbdfa5d
2
{ "blob_id": "89b280fa5d6d87d29c01787a2f36f1c9cbbdfa5d", "branch_name": "refs/heads/master", "committer_date": 1618893053000, "content_id": "d89264cb48aab77de9c5b0db608616833cf07a28", "detected_licenses": [ "Unlicense" ], "directory_id": "2d44d9a11a218b244de3f3c52e8b9103d88a61c6", "extension": "py",...
2.390625
stackv2
#! <venv>/bin python3.8 # -*- coding: utf-8 -*- """ Created on 6/4/21 10:30 am @author: David Wong """ from time import sleep from bs4 import BeautifulSoup from tqdm.auto import tqdm import logging import requests import random import urllib import pendulum class Scraper: """JobsScraper is a simple job postin...
186
31.6
134
22
1,500
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8523ecde830ceec8_0fc8acff", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 158 ]
[ null ]
[ 30 ]
[ 55 ]
2024-11-18T20:51:08.689876+00:00
1,599,646,175,000
9381d4d4ea03f25058cfd94e2ccc19027cbce29f
3
{ "blob_id": "9381d4d4ea03f25058cfd94e2ccc19027cbce29f", "branch_name": "refs/heads/master", "committer_date": 1599646175000, "content_id": "51a6b269bff84a70877af5199a5be5259b0d5190", "detected_licenses": [ "MIT" ], "directory_id": "df9b9a6ded45bc745f07c90b636dfb7b51dd0e91", "extension": "py", "fi...
2.859375
stackv2
import requests import json import datetime as dt from typing import List, Tuple from src.utils.timeUtils import convertEpochMsToDt class TempHumApiFetcher(): tokenUrl: str = '' apiBaseUrl: str = '' clientId: str = '' clientSecret: str = '' def __init__(self, tokenUrl, apiBaseUrl, clientId, clien...
56
37.36
115
17
514
python
[{"finding_id": "codeql_py/request-without-cert-validation_3b4977c0a2c58b5c_6c86fd05", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 37, 44 ]
[ 38, 45 ]
[ 33, 21 ]
[ 116, 60 ]
2024-11-18T20:51:23.156972+00:00
1,683,486,871,000
f33a1ae2c735751616ae723d4ffb536697038b5a
4
{ "blob_id": "f33a1ae2c735751616ae723d4ffb536697038b5a", "branch_name": "refs/heads/master", "committer_date": 1690286346000, "content_id": "6a5364e58274bb24a2e59c2255f6158433651a54", "detected_licenses": [ "MIT" ], "directory_id": "126884e6916e9d78201527419681c0369bc61e9a", "extension": "py", "fi...
3.65625
stackv2
import requests import hashlib from decouple import config def send_request(start_char): """ The function sends a request to the API with the URL containing first 5 characters of the hashed password """ # Concatenating first 5 characters of hashed password to the URL url = "https://api.pwnedpa...
77
27.29
80
15
494
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_436a3b905f25334d_bfb61e0a", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expen...
[ 50 ]
[ null ]
[ 29 ]
[ 54 ]
2024-11-18T20:51:24.396627+00:00
1,601,536,004,000
a767e59d23a0ad67d46b064c8ad4f8638d087853
3
{ "blob_id": "a767e59d23a0ad67d46b064c8ad4f8638d087853", "branch_name": "refs/heads/master", "committer_date": 1601536004000, "content_id": "2e44ff77cde5e14e483ca4342a57a1affce7a5e3", "detected_licenses": [ "MIT" ], "directory_id": "08bf1bb59fc5081f3a9c22e14a8a79ffa9b315e6", "extension": "py", "fi...
2.53125
stackv2
#! python3 import re import os import sys import time import json import glob import datetime import urllib3 from getpass import getpass import requests from pprint import pprint from pathlib import Path from bs4 import BeautifulSoup from selenium import webdriver # CONSTANTS # urllib3.disable_warnings(urllib3.excepti...
370
33.74
134
25
3,219
python
[{"finding_id": "codeql_py/request-without-cert-validation_0e3945df1118a10f_623b1c2e", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
4
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 274, 277, 281, 316 ]
[ null, null, null, null ]
[ 16, 16, 16, 34 ]
[ 96, 91, 91, 86 ]
2024-11-18T21:13:45.988276+00:00
1,480,413,743,000
52b374f3754c1689630c862c0b7a104d525dcddf
2
{ "blob_id": "52b374f3754c1689630c862c0b7a104d525dcddf", "branch_name": "refs/heads/master", "committer_date": 1480413743000, "content_id": "7e8841edc86402660646f7804cc186ce86daeb18", "detected_licenses": [ "MIT" ], "directory_id": "845e20f1cfa0980244f68643577dd7ca909194b5", "extension": "py", "fi...
2.4375
stackv2
import json import uuid from django.conf import settings from django.contrib.auth import authenticate, get_user_model, login, logout import requests from rest_framework import permissions, views, response, status from . import exceptions from . import models from . import serializers FACEBOOK_API_BASE_URL = 'https...
361
35.53
79
17
2,557
python
[{"finding_id": "codeql_py/partial-ssrf_66ddb12291b3e976_8086013d", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
2
true
[ "CWE-918", "CWE-918" ]
[ "py/partial-ssrf", "py/partial-ssrf" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 41, 56 ]
[ 45, 60 ]
[ 12, 12 ]
[ 31, 31 ]
2024-11-18T21:13:55.135280+00:00
1,431,452,657,000
f0b77a0b5ab5d264a60546f8d6052abf9a435605
3
{ "blob_id": "f0b77a0b5ab5d264a60546f8d6052abf9a435605", "branch_name": "refs/heads/master", "committer_date": 1431452657000, "content_id": "1615fc29db1cbcf0b7b4d642576f726fe25bb374", "detected_licenses": [ "MIT", "Apache-2.0" ], "directory_id": "63787d06202762d8a4770715a2bde46add21c0b7", "exten...
2.859375
stackv2
"""Utilities for all Let's Encrypt.""" import collections import errno import os import stat from letsencrypt.client import errors Key = collections.namedtuple("Key", "file pem") # Note: form is the type of data, "pem" or "der" CSR = collections.namedtuple("CSR", "file data form") def make_or_verify_dir(directory,...
84
27.56
78
17
568
python
[{"finding_id": "codeql_py/overly-permissive-file_5a99a09c9366ccb7_55dd7720", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in open sets file to world writable.", "remediation": "", "location": {...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in open sets file to world writable." ]
[ 71 ]
[ null ]
[ 22 ]
[ 78 ]
2024-11-18T21:13:56.885758+00:00
1,481,808,044,000
fe3e1ab2cc23bbf5d0cd89cf1b35c500efa05ad1
2
{ "blob_id": "fe3e1ab2cc23bbf5d0cd89cf1b35c500efa05ad1", "branch_name": "refs/heads/master", "committer_date": 1481808044000, "content_id": "aeb0eac663477d345875f8355da5d2a7804ac7e5", "detected_licenses": [ "Apache-2.0" ], "directory_id": "67a13b702c0e1463d286032caaef0e8404081d04", "extension": "py"...
2.375
stackv2
# coding: utf8 import requests from bs4 import BeautifulSoup header = { 'User-Agent': 'Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.112 Safari/537.36', 'Referer': 'http://www.bing.com/', } max_fetch_cnt = 3 def process_baidu(p, titles, answers, scores): url = '...
99
37.02
126
14
1,136
python
[{"finding_id": "codeql_py/request-without-cert-validation_ec7b088870d351e7_0c28f67c", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
6
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 15, 33, 49, 62, 75, 88 ]
[ null, null, null, null, null, null ]
[ 9, 9, 9, 9, 9, 9 ]
[ 71, 71, 71, 71, 71, 71 ]
2024-11-18T21:14:18.725458+00:00
1,425,326,912,000
b932e549112e1e4de8785a6c7914ccb4c5db91b3
3
{ "blob_id": "b932e549112e1e4de8785a6c7914ccb4c5db91b3", "branch_name": "refs/heads/master", "committer_date": 1425326912000, "content_id": "87b4220271163f11c65e19fa7de148e3d1d0a207", "detected_licenses": [ "Apache-2.0" ], "directory_id": "0a25ea42bd8aff27c939b7de9d9a8ea036b0c66f", "extension": "py"...
2.640625
stackv2
# Copyright (C) 2013-2014 Computer Sciences Corporation # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by a...
44
37.48
81
10
412
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_c6e30bf56ecdfbac_218b168f", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The cryptographic algorithm DES](1) is broken or weak, and should not be used.", "r...
3
true
[ "CWE-327", "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[The cryptographic algorithm DES](1) is broken or weak, and should not be used.", "[The cryptographic algorithm DES](1) is broken or weak, and should not be used.", "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expe...
[ 23, 30, 37 ]
[ null, null, null ]
[ 17, 17, 19 ]
[ 43, 47, 27 ]
2024-11-18T21:14:38.062640+00:00
1,535,636,981,000
c22ab24aebd4805577697b03bd57b1aadc282f9a
3
{ "blob_id": "c22ab24aebd4805577697b03bd57b1aadc282f9a", "branch_name": "refs/heads/master", "committer_date": 1535636981000, "content_id": "d8ff135ee1275e66fec46d5bfae619e004f1c133", "detected_licenses": [ "MIT" ], "directory_id": "ddba588a14077e0ff7da53dfba0f68c241a9c188", "extension": "py", "fi...
2.515625
stackv2
from os import remove from sys import argv import sqlite3 import string from random import * import hashlib class bcolors: HEADER = '\033[95m' OKBLUE = '\033[94m' OKGREEN = '\033[92m' WARNING = '\033[93m' FAIL = '\033[91m' ENDC = '\033[0m' BOLD = '\033[1m' UNDERLINE = '\033[4m' conn =...
65
28.43
75
14
570
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_c06860f4c9fa4d42_d25092a3", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 38 ]
[ null ]
[ 13 ]
[ 47 ]
2024-11-18T21:14:39.161460+00:00
1,427,476,439,000
3757100303a3c7b7d526fa59341e8b2890533914
3
{ "blob_id": "3757100303a3c7b7d526fa59341e8b2890533914", "branch_name": "refs/heads/master", "committer_date": 1427476439000, "content_id": "f1779340c812f5ffc7759d573c7489109d1b0709", "detected_licenses": [ "Apache-2.0" ], "directory_id": "d641144662f4ef4951bb7fed6fdc9fed392508be", "extension": "py"...
2.546875
stackv2
import oauth2 as oauth from urllib import urlencode import hashlib import random # TODO: Create test cases for all functionality. API_ROOT = "https://api.linkedin.com/" API_VERSION = "v1" API_ENDPOINTS = { } class LinkedinException(Exception): pass class LinkedinAPI(object): """Method sig: (key, secret...
88
27.41
79
16
491
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_291c44a6c7fd603a_fd87ea33", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 87 ]
[ 88 ]
[ 13 ]
[ 67 ]
2024-11-18T21:14:42.117718+00:00
1,453,322,053,000
fb62fda53ed09493bb17041c0c9426fd42f4a4b6
2
{ "blob_id": "fb62fda53ed09493bb17041c0c9426fd42f4a4b6", "branch_name": "refs/heads/master", "committer_date": 1453322053000, "content_id": "9d96605e9f1b3e6b7641622c578e8925bf0b543d", "detected_licenses": [ "MIT" ], "directory_id": "b7c699b390e33eb194aa43206b3bd149c1087aca", "extension": "py", "fi...
2.34375
stackv2
from flask import Flask from flask import request from Model.Database import Database as DB import Credentials app = Flask(__name__) db = DB(Credentials.user, Credentials.password) @app.route('/') def index(): return 'index' @app.route('/echo', methods=['POST']) def echo(): """ receive data and sent it...
36
16.56
61
10
146
python
[{"finding_id": "codeql_py/reflective-xss_de5c606a3d1af30b_0acd74d7", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 24, 29 ]
[ null, null ]
[ 12, 12 ]
[ 24, 24 ]
2024-11-18T21:14:43.534728+00:00
1,603,021,697,000
393e5f220e5b58329c6a89f65bc6793402ac680c
2
{ "blob_id": "393e5f220e5b58329c6a89f65bc6793402ac680c", "branch_name": "refs/heads/main", "committer_date": 1603021697000, "content_id": "f292082dd765d109ebc65c503370e4c43651f032", "detected_licenses": [ "Apache-2.0" ], "directory_id": "7ce19387d1dce9ab9cf8f6c190e25a8f4c876973", "extension": "py", ...
2.3125
stackv2
from rest_framework.response import Response from rest_framework.decorators import api_view from rest_framework import status import uuid from datetime import datetime from . import models @api_view(['GET']) def get_products(request): return Response({"Addidas Shoes", }, status=status.HTTP_200_OK) @api_view(['PO...
38
37.13
108
14
308
python
[{"finding_id": "codeql_py/stack-trace-exposure_abbfa33551b91548_701dc62a", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 31 ]
[ null ]
[ 25 ]
[ 58 ]
2024-11-18T21:14:45.593234+00:00
1,595,841,840,000
5c7c7171732549886b6d32ee8b1427cd45cf78ce
2
{ "blob_id": "5c7c7171732549886b6d32ee8b1427cd45cf78ce", "branch_name": "refs/heads/master", "committer_date": 1595841840000, "content_id": "7a3d9092dcc1e5a639aacd3c2ca78cca1d66815c", "detected_licenses": [ "MIT" ], "directory_id": "217abebf67b6c303ace85b99180bc34a6521fd65", "extension": "py", "fi...
2.421875
stackv2
#!/usr/bin/python # from BaseHTTPServer import BaseHTTPRequestHandler,HTTPServer from http.server import HTTPServer, BaseHTTPRequestHandler from os import curdir, sep, listdir, path import sqlite3 from datetime import date, datetime, timezone import json import ssl import base64 import zlib PORT_NUMBER = 3000 # wher...
251
34.97
126
23
1,927
python
[{"finding_id": "codeql_py/insecure-default-protocol_10428d2de2632a7c_78fe4cf7", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in...
3
true
[ "CWE-327", "CWE-022", "CWE-022" ]
[ "py/insecure-default-protocol", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used.", "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2).", "This path depends on a [user-provided value](1).\nThis path depends on a [user-prov...
[ 242, 145, 151 ]
[ null, null, null ]
[ 17, 36, 26 ]
[ 93, 59, 50 ]
2024-11-18T21:14:45.711561+00:00
1,661,514,131,000
dfc96a63f559d10c0f208de1715c8b09dcb58abb
3
{ "blob_id": "dfc96a63f559d10c0f208de1715c8b09dcb58abb", "branch_name": "refs/heads/main", "committer_date": 1661514131000, "content_id": "22110063894611e60174346e56677011e78a75ee", "detected_licenses": [ "MIT" ], "directory_id": "cd5488da6366c98f33dbc8372189306daed49eea", "extension": "py", "file...
2.515625
stackv2
#! /usr/bin/env python3.6 """ server.py Stripe Sample. Python 3.6 or newer required. """ import stripe import json import os from flask import Flask, render_template, jsonify, request, send_from_directory from dotenv import load_dotenv, find_dotenv # Setup Stripe python client library load_dotenv(find_dotenv()) str...
95
35.22
122
16
711
python
[{"finding_id": "codeql_py/stack-trace-exposure_42bd2fc8f359f186_48e5b764", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 76 ]
[ null ]
[ 30 ]
[ 36 ]
2024-11-18T20:10:39.075646+00:00
1,632,139,049,000
869ac19c8fbe599ac886759a3d5a24d5c451e430
3
{ "blob_id": "869ac19c8fbe599ac886759a3d5a24d5c451e430", "branch_name": "refs/heads/main", "committer_date": 1632139049000, "content_id": "435d22602220831423c0c52443533209ef453176", "detected_licenses": [ "Apache-2.0" ], "directory_id": "92224b8a8f444ff6aec56cc77ea1a9022748df33", "extension": "py", ...
2.625
stackv2
from text_processing import text_normalizer import re class AuthorNormalizer: def __init__(self): self.affiliation_markers =["universit", "institu", "college", "academy", "r&d", "foundation", "research center", "hochschul", \ "centre", "center", "organisat", "dept", "department", "wo...
110
52.65
172
25
1,356
python
[{"finding_id": "codeql_py/redos_a898bdf04b3cda90_530f9654", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '9'.", "remediati...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '9'." ]
[ 65 ]
[ null ]
[ 40 ]
[ 43 ]
2024-11-18T20:10:47.580821+00:00
1,558,200,462,000
9302d2f330afce89d3053364f9584d412d00423a
3
{ "blob_id": "9302d2f330afce89d3053364f9584d412d00423a", "branch_name": "refs/heads/master", "committer_date": 1558200462000, "content_id": "038dc4ba9acda815a57deffd9a2cfffccc1fb7ac", "detected_licenses": [ "Apache-2.0" ], "directory_id": "3a8640051b2a38701972ecb5abc4cf70d45265c2", "extension": "py"...
2.65625
stackv2
#!/usr/bin/env python # coding: utf-8 import os from flask import request, abort, jsonify from app.auxiliary.query_tools import initialProcessing, logFail, logSuccess # Загрузка компонента @initialProcessing def storage_upload(parameters, start_time, query_id): if 'file' not in request.files or not request.files...
133
31.23
93
16
1,032
python
[{"finding_id": "codeql_py/path-injection_f0a0f2191206ff1e_cb488bb6", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
8
true
[ "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](...
[ 28, 33, 59, 64, 66, 92, 93, 95 ]
[ null, null, null, null, null, null, null, null ]
[ 23, 32, 27, 15, 32, 23, 19, 32 ]
[ 40, 49, 44, 32, 49, 40, 36, 49 ]
2024-11-18T20:48:14.131721+00:00
1,612,316,278,000
787165e5d8939a1f7da06e21b2688c3248e25161
2
{ "blob_id": "787165e5d8939a1f7da06e21b2688c3248e25161", "branch_name": "refs/heads/master", "committer_date": 1612316278000, "content_id": "e29111a3fcf3a0861997a36c7797af26bdf9ade6", "detected_licenses": [ "Apache-2.0" ], "directory_id": "6974a05d9dad610eb5acddfe800418d3f407011b", "extension": "py"...
2.5
stackv2
#!/usr/bin/env python # # # For debugging we use the bottom left corner pixel and: # # show red dot if failed to get data # show blue dot if failed to refresh the cookie. # show orange when we start refreshing data. # show yellow when login fails. # # # ver 1.1 added dispaly of ip address on boot in...
219
21.74
89
18
1,408
python
[{"finding_id": "codeql_py/request-without-cert-validation_d41d85d0b440d29a_6bbcb4ef", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
3
true
[ "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 90, 114, 175 ]
[ null, null, null ]
[ 14, 8, 22 ]
[ 67, 66, 90 ]
2024-11-18T21:25:49.536118+00:00
1,631,012,259,000
43228c4adcfa7194cd0b3ce5003b99aab5f2568b
2
{ "blob_id": "43228c4adcfa7194cd0b3ce5003b99aab5f2568b", "branch_name": "refs/heads/main", "committer_date": 1631012259000, "content_id": "55e3c0254e1b22857418b2206ff70961f1d66a8c", "detected_licenses": [ "Apache-2.0" ], "directory_id": "78d820008a9212c44fe7f5bda79a52f9480a2490", "extension": "py", ...
2.40625
stackv2
from flask import Flask, request, jsonify from common.initialize_blockchain import initialize_blockchain from common.io_blockchain import get_blockchain_from_memory from node.new_block_validation.new_block_validation import NewBlock, NewBlockException from node.transaction_validation.transaction_validation import Tran...
204
36.9
109
14
1,794
python
[{"finding_id": "codeql_py/stack-trace-exposure_afea1ad4b2dfbc48_09eafb55", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 42, 58 ]
[ null, null ]
[ 16, 16 ]
[ 45, 47 ]
2024-11-18T21:26:08.826597+00:00
1,690,212,521,000
2f05a8fbda798de1b4358d9bcf4ae6f93fc235be
2
{ "blob_id": "2f05a8fbda798de1b4358d9bcf4ae6f93fc235be", "branch_name": "refs/heads/main", "committer_date": 1690212521000, "content_id": "463d8f19b47e9cf1a217e04be34bdd9026c1acf6", "detected_licenses": [ "MIT" ], "directory_id": "aba557099e087f9068bfff60e9274d0fd54c08a5", "extension": "py", "file...
2.34375
stackv2
# -*- coding: utf-8 -*- #!/usr/bin/python # import copy # import getopt import json import os.path # import re import sys import codecs from jinja2 import Environment, FileSystemLoader from openpyxl import load_workbook from enum import Enum class OpType(Enum): cs = 1 json = 2 all_json_data_list = [] def...
283
32.39
90
22
2,196
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_0b64765437d023d8_409351dc", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
5
true
[ "CWE-079", "CWE-079", "CWE-079", "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false", "py/jinja2/autoescape-false", "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially...
[ 83, 124, 159, 169, 180 ]
[ null, null, null, null, null ]
[ 11, 11, 11, 11, 11 ]
[ 53, 53, 53, 53, 53 ]
2024-11-18T21:52:15.819275+00:00
1,592,883,061,000
7a3f65073c4a5262afd4f47ebb54e264b4dbe8fa
2
{ "blob_id": "7a3f65073c4a5262afd4f47ebb54e264b4dbe8fa", "branch_name": "refs/heads/master", "committer_date": 1592883061000, "content_id": "979cfebb5e05d9b12ddfcdf66600aa20a05ad9a1", "detected_licenses": [ "MIT" ], "directory_id": "11451e28df549695a79848b9976659b483d1b305", "extension": "py", "fi...
2.4375
stackv2
import pymongo import random import datetime handler = pymongo.MongoClient().mongo_cyh.people_info last_name_list = '王,张,李,赵,朱,慕容,夏侯,诸葛,公孙,南宫,欧阳'.split(',') first_name_list = '一,二,三,四,六,七,八,九,十,十一,十二,十三,十四,十五,十六,十七,十八,十九,二十'.split(',') place_list = [ '山东济南', '贵州贵阳', '广东广州', '河北邯郸', '四川成都', '...
42
26.79
78
14
325
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_aeb1e9e3aec8909b_a355edff", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 41 ]
[ null ]
[ 7 ]
[ 16 ]
2024-11-18T21:52:17.672490+00:00
1,608,765,164,000
3ad4e855432b376d045bcc9f69e7fec34ed95b05
3
{ "blob_id": "3ad4e855432b376d045bcc9f69e7fec34ed95b05", "branch_name": "refs/heads/main", "committer_date": 1608765164000, "content_id": "72aaa40e1f8519f9961637bdcff9f01b3cbbe6ce", "detected_licenses": [ "MIT" ], "directory_id": "dfa3e0ed7bd9e1f28ab0a7876b889f22c205ed3b", "extension": "py", "file...
2.59375
stackv2
#!/usr/bin/python3 import os import sys import json import requests import urllib3 import logging from pythonjsonlogger import jsonlogger urllib3.disable_warnings() def setup_logging(log_level): logger = logging.getLogger(__name__) logger.setLevel(log_level) logHandler = logging.StreamHandler(sys.stdo...
268
35.12
120
20
2,031
python
[{"finding_id": "codeql_py/request-without-cert-validation_092d486b66a2bbd9_a82fb8ab", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
5
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 33, 102, 130, 165, 196 ]
[ 34, 107, 134, 172, 201 ]
[ 24, 40, 34, 33, 39 ]
[ 87, 35, 24, 28, 32 ]
2024-11-18T21:52:19.548185+00:00
1,590,999,428,000
c83c766bc7971c0b2fdf0b46f3d85d442f6d62f2
3
{ "blob_id": "c83c766bc7971c0b2fdf0b46f3d85d442f6d62f2", "branch_name": "refs/heads/master", "committer_date": 1590999428000, "content_id": "9173bfee0cf3fc045e3d892421dfb043d14dcd2e", "detected_licenses": [ "Apache-2.0" ], "directory_id": "133e8c9df1d1725d7d34ea4317ae3a15e26e6c66", "extension": "py"...
2.78125
stackv2
# -*- coding: utf-8 -*- import tornado.httpserver import tornado.options import tornado.web import tornado.ioloop from tornado.options import define, options define("port", default=8000, help="run on the given port", type=int) #定义处理类型 class IndexHandler(tornado.web.RequestHandler): #添加一个处理get请求方式的方法 def get(...
28
26.75
68
12
208
python
[{"finding_id": "codeql_py/reflective-xss_1ef8d80b6d8fc303_2cd8b6bd", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 17 ]
[ null ]
[ 20 ]
[ 49 ]
2024-11-18T21:52:29.867871+00:00
1,620,055,036,000
b469290f65382c858ffe76e669a4f575dc1f1254
3
{ "blob_id": "b469290f65382c858ffe76e669a4f575dc1f1254", "branch_name": "refs/heads/main", "committer_date": 1620055036000, "content_id": "b42b3e5fdccf7db9ad7bba7c7dfc58cf3f504f26", "detected_licenses": [ "MIT" ], "directory_id": "628ef23809589f6bff6e8591fbba3341bcb5d32d", "extension": "py", "file...
3.40625
stackv2
import sys valid_password = 0 for line in sys.stdin: (count, char, password) = line.rstrip().split(" ") (min, max) = count.split("-") min = int(min) -1 max = int(max) -1 char = char.replace(":", '') or_pass = (password[min] == char) or (password[max] == char) and_pass = (password[min] == ...
38
22.53
66
12
236
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_dcbe0b3a9225ceca_f4fdff63", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 38, 22 ]
[ null, null ]
[ 11, 7 ]
[ 25, 21 ]
2024-11-18T21:52:32.515729+00:00
1,581,442,209,000
9f7897e7ffca61109d748a2dc41b70233b0c8a5d
3
{ "blob_id": "9f7897e7ffca61109d748a2dc41b70233b0c8a5d", "branch_name": "refs/heads/master", "committer_date": 1581442209000, "content_id": "76411d51833b5760847c32c0d3cb2827e0bdd1e4", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "2bd906cea0b84c73235fade7b4093ad3334f4cd0", "extension": "p...
2.71875
stackv2
#!/usr/bin/env python3 ############################################################################## # Dump data from Tesla Powerwall ############################################################################## # Simon Moore, Nov 2019 ############################################################################## # ...
90
34.8
97
17
737
python
[{"finding_id": "codeql_py/request-without-cert-validation_76c5e30699a56322_6c0e672a", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
3
true
[ "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 34, 38, 42 ]
[ null, null, null ]
[ 16, 16, 16 ]
[ 90, 98, 90 ]
2024-11-18T20:31:28.838290+00:00
1,596,414,430,000
c17de6972a4e6583584733dfbd8422196a9d88ae
3
{ "blob_id": "c17de6972a4e6583584733dfbd8422196a9d88ae", "branch_name": "refs/heads/master", "committer_date": 1596414430000, "content_id": "504ccf9fd6e2264b2f61b52dafd9af43dfb2130c", "detected_licenses": [ "MIT" ], "directory_id": "c2e3ad610498312000564141c14ae3d9e9c8b254", "extension": "py", "fi...
3.484375
stackv2
# Python program to find current # weather details of any city # using openweathermap api # import required modules import requests, json from astral.sun import sun from astral import LocationInfo from datetime import datetime, timedelta, date #Load the config file with open("config.json") as f: configs = js...
83
28.87
120
25
618
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_070301235b1669ba_2ab47e7d", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 79, 83 ]
[ null, null ]
[ 17, 11 ]
[ 25, 12 ]
2024-11-18T20:59:44.853091+00:00
1,675,073,725,000
fab48e15e5b56213d9f5257f7580b07409e7e8a9
2
{ "blob_id": "fab48e15e5b56213d9f5257f7580b07409e7e8a9", "branch_name": "refs/heads/master", "committer_date": 1675073725000, "content_id": "0ba855523f58dc28cbc9c555ab1285552de5aafe", "detected_licenses": [ "MIT" ], "directory_id": "754b5b837d8aabb9eaddde5ea48898a2aaa54dd0", "extension": "py", "fi...
2.40625
stackv2
import sys import json import requests from flask import Flask from flask import request from lib.tracing import init_tracer, flask_to_scope import opentracing from opentracing.ext import tags from opentracing_instrumentation.client_hooks import install_all_patches from flask_opentracing import FlaskTracer app = Flas...
58
24.83
72
13
372
python
[{"finding_id": "codeql_py/partial-ssrf_d0ddfa671d379d51_d30850d1", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 52 ]
[ null ]
[ 9 ]
[ 41 ]
2024-11-18T21:10:52.888907+00:00
1,558,197,109,000
0f3355a4754157b08f8348864179a40e10553112
3
{ "blob_id": "0f3355a4754157b08f8348864179a40e10553112", "branch_name": "refs/heads/master", "committer_date": 1558197109000, "content_id": "c0e08257c4f764a67a55113ee0bdef185d90ca34", "detected_licenses": [ "MIT" ], "directory_id": "32fe3550b3c3cd9e586833141d26941996e04bc0", "extension": "py", "fi...
2.671875
stackv2
#!/usr/bin/env python3 """ Installer of Unlock, a daemon to decrypt CoreStorage (HFS+) and APFS volumes automatically when macOS starts. """ import sys import os import pathlib import shutil import argparse script_name = "com.juanjonol.unlock.py" plist_name = "com.juanjonol.unlock.plist" script_folder = "/Library/Pr...
70
30.26
109
12
529
python
[{"finding_id": "codeql_py/overly-permissive-file_40bf290c6784cda7_ee6d0d14", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
2
true
[ "CWE-732", "CWE-732" ]
[ "py/overly-permissive-file", "py/overly-permissive-file" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable.", "Overly permissive mask in chmod sets file to world readable." ]
[ 52, 58 ]
[ null, null ]
[ 2, 2 ]
[ 29, 28 ]
2024-11-18T21:23:36.302736+00:00
1,598,503,977,000
a060e6b5ca339e1854b665a33219d97e3039d4d2
3
{ "blob_id": "a060e6b5ca339e1854b665a33219d97e3039d4d2", "branch_name": "refs/heads/master", "committer_date": 1598503977000, "content_id": "4759cda779f103be230813e6f0f70fa48d27a9f7", "detected_licenses": [ "MIT" ], "directory_id": "dcc2b1930f62dca1911ff4496e2c6f996fe49773", "extension": "py", "fi...
2.53125
stackv2
from typing import List from urllib.parse import urljoin from uuid import UUID import requests import urllib3 from urllib3 import exceptions from .utils import parse_int urllib3.disable_warnings(exceptions.InsecureRequestWarning) class MachineInfo(object): def __init__(self, parsed_json: dict): self._s...
130
30.3
85
13
927
python
[{"finding_id": "codeql_py/request-without-cert-validation_ae69fc2c3f2b7433_ad0a0942", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
4
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 110, 116, 122, 128 ]
[ null, null, null, null ]
[ 16, 16, 16, 16 ]
[ 74, 74, 74, 74 ]
2024-11-18T21:37:21.598213+00:00
1,399,044,405,000
5039300e5beae14acf45962abeee68059b55c4a8
2
{ "blob_id": "5039300e5beae14acf45962abeee68059b55c4a8", "branch_name": "refs/heads/master", "committer_date": 1399044405000, "content_id": "357fdfb40f98cb3bffe4ecb44a63d08591bf988a", "detected_licenses": [ "MIT" ], "directory_id": "9d6793fc743be3f2b4a88530a39b441eb5aa9512", "extension": "py", "fi...
2.4375
stackv2
#!/usr/bin/env python from random import choice from tornado.ioloop import IOLoop from tornado.web import Application, RequestHandler class StatusHandler(RequestHandler): def prepare(self): status = choice([x for x in self.request.uri.split('/') if x != '']) self.set_status(int(status)) se...
21
23.67
76
16
119
python
[{"finding_id": "codeql_py/reflective-xss_1a4b8ca39a994758_e6c4ce86", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 11 ]
[ null ]
[ 20 ]
[ 26 ]
2024-11-18T21:37:42.906237+00:00
1,388,082,605,000
be046403b41461ca94782db3313b1330a8cc5fff
3
{ "blob_id": "be046403b41461ca94782db3313b1330a8cc5fff", "branch_name": "refs/heads/master", "committer_date": 1388082605000, "content_id": "f2bc2f2541cf174d4b35d78f3d5d89bcf3a99240", "detected_licenses": [ "MIT" ], "directory_id": "f9cb962e3b889a981a79b5c3cf0f32097d48896f", "extension": "py", "fi...
2.5625
stackv2
import hashlib import time import requests from requests.auth import AuthBase class MasheryAuth(AuthBase): """ Adds ``apikey`` and ``sig`` query parameters to the request """ def __init__(self, key, secret): self.key = key self.secret = secret def __call__(self, r): para...
72
21.36
83
12
372
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_a270a87a543cfe1e_6fd499e8", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 31 ]
[ null ]
[ 18 ]
[ 29 ]
2024-11-18T21:59:00.197234+00:00
1,514,298,457,000
f31b494d07e6ad676c059b9ce932cc56e6b4dcd3
3
{ "blob_id": "f31b494d07e6ad676c059b9ce932cc56e6b4dcd3", "branch_name": "refs/heads/master", "committer_date": 1514298457000, "content_id": "a3b47f241b48cce5c703a84bd8797c77b74c313f", "detected_licenses": [ "MIT" ], "directory_id": "8c1638a363c0abed46506f8e87aa652e0153711b", "extension": "py", "fi...
3.109375
stackv2
import hashlib, binascii, getpass max_iter = 100000 def blocking_func(block, size_t): for i in range(0, len(block), size_t): yield block[i: i + size_t] ''' The function generate_tuples generates two keys and XOR them to produce the final key. ''' def generate_tuples(h, w): ...
102
24.91
103
13
901
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_bb5e6acf73592c40_d97e56a6", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expen...
[ 38 ]
[ null ]
[ 29 ]
[ 41 ]
2024-11-18T22:11:26.352779+00:00
1,538,252,373,000
c8627e75b95a86ad40e30847d19119b4df0e49ef
3
{ "blob_id": "c8627e75b95a86ad40e30847d19119b4df0e49ef", "branch_name": "refs/heads/master", "committer_date": 1538252373000, "content_id": "f07d4e5ee4f75508bbf735311d545b40398bf6ff", "detected_licenses": [ "MIT" ], "directory_id": "f32f431f63be7dff9e385ced4b5a24e66a7ce27f", "extension": "py", "fi...
2.515625
stackv2
import base64 import datetime import json import re import time import zlib from decimal import Decimal import hmac import hashlib from kaira.baseconv import base62 _PROTECTED_TYPES = ( type(None), int, float, Decimal, datetime.datetime, datetime.date, datetime.time, ) _SEP_UNSAFE = re.compile(r'^[A-z0-9-_=]*$') ...
214
32.6
91
15
1,772
python
[{"finding_id": "codeql_py/overly-large-range_b6d1a16b11ae925c_6781f8d5", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo...
2
true
[ "CWE-020", "CWE-327" ]
[ "py/overly-large-range", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecure.\n[Sensitive data (secret)](2) is used in a hashing algorithm (SHA1) that is insecure.\n[Sensitive data (secret)](3) is used in a hashing algorith...
[ 16, 74 ]
[ null, null ]
[ 30, 24 ]
[ 33, 41 ]
2024-11-18T22:11:56.157998+00:00
1,587,911,379,000
0b0a636fe83e48bc6c17607b70e650c58563b9b0
3
{ "blob_id": "0b0a636fe83e48bc6c17607b70e650c58563b9b0", "branch_name": "refs/heads/master", "committer_date": 1587911379000, "content_id": "ae16f3c7d9252af2bce93719bdcdc24dfa2ee340", "detected_licenses": [ "MIT" ], "directory_id": "3f326610c1674ca52a4e70c22af84826f501b164", "extension": "py", "fi...
2.78125
stackv2
import numpy as np from PIL import Image import os import io import json import glob import h5py from torchmeta.utils.data import Dataset, ClassDataset, CombinationMetaDataset from torchvision.datasets.utils import download_url from torchmeta.datasets.utils import get_asset class CUB(CombinationMetaDataset): """...
241
38.66
95
22
2,207
python
[{"finding_id": "codeql_py/tarslip_7730de01fcfbbc1f_d9c47de5", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 186 ]
[ null ]
[ 13 ]
[ 14 ]
2024-11-18T22:35:55.831658+00:00
1,539,209,579,000
6459b2b002e3c72c330b622c6b27e27c7ab814e9
2
{ "blob_id": "6459b2b002e3c72c330b622c6b27e27c7ab814e9", "branch_name": "refs/heads/master", "committer_date": 1539209579000, "content_id": "40921f4dc2b50b548d4053dbf66fc809b5891f6e", "detected_licenses": [ "Apache-2.0" ], "directory_id": "2af0517e42ca4136ccfe4e8c921ac1ccf3789ca9", "extension": "py"...
2.4375
stackv2
#!/usr/bin/env python # # Copyright 2018-2018, 2018 The Python-SportRadar Developers # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless ...
59
34.29
117
16
477
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_cf6881952b488da6_22dde60b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 59 ]
[ null ]
[ 23 ]
[ 35 ]
2024-11-18T22:35:57.026480+00:00
1,569,175,199,000
d03708b443261f83beadebd85a6a4c065426b670
3
{ "blob_id": "d03708b443261f83beadebd85a6a4c065426b670", "branch_name": "refs/heads/master", "committer_date": 1569175199000, "content_id": "bd896e0f21e575969a27a7d749c0e132b3968213", "detected_licenses": [ "Unlicense" ], "directory_id": "20f0f7ad99206c6d81b353cddfa3ccc699cb4741", "extension": "py",...
3.09375
stackv2
import serial # Parts of the code, copy modified from: # | http://www.danmandle.com/blog/getting-gpsd-to-work-with-python/ # | Written by Dan Mandle http://dan.mandle.me September 2012 # | License: GPL 2.0 from gps import * from time import * import time import threading gpsd = None #seting the global variab...
63
30.94
96
16
497
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_edb43e0f8a734961_4c732ddd", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text." ]
[ 55 ]
[ null ]
[ 28 ]
[ 32 ]
2024-11-18T22:36:31.349587+00:00
1,576,439,980,000
07ff8a25ddce0244d8246ad1f62fa9335c5c8176
3
{ "blob_id": "07ff8a25ddce0244d8246ad1f62fa9335c5c8176", "branch_name": "refs/heads/master", "committer_date": 1576439980000, "content_id": "c1e826ea73f6c1dd8439c24ca9cbb262e9358b92", "detected_licenses": [], "directory_id": "1b635b357bec29ac3841657b18fbf50b276221da", "extension": "py", "filename": "app...
2.53125
stackv2
from flask import Flask, request, jsonify, json, make_response from prediction import get_prediction_from_url import requests, urllib2 app = Flask(__name__) @app.route("/") def home(): return "Hello, World!" @app.route("/localPrediction/",methods=['GET', 'POST']) def check(): content=request.json url = content[...
53
26.55
119
16
397
python
[{"finding_id": "codeql_py/full-ssrf_26222ebf8e0bb77c_4919d4bd", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
1
true
[ "CWE-918" ]
[ "py/full-ssrf" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1)." ]
[ 39 ]
[ null ]
[ 10 ]
[ 71 ]
2024-11-18T22:36:32.803599+00:00
1,594,134,916,000
23f4bdf47a4c1ad7286de1490ad75749c0417919
3
{ "blob_id": "23f4bdf47a4c1ad7286de1490ad75749c0417919", "branch_name": "refs/heads/master", "committer_date": 1594134916000, "content_id": "2fa2f58de0a61f44101f702794f2816ed85826c6", "detected_licenses": [ "MIT" ], "directory_id": "bf02c24bb92e834debee16b94a46ddd44a5a9bf2", "extension": "py", "fi...
2.578125
stackv2
#!/usr/bin/env python3 import os import sys from itertools import zip_longest from platform import release import yaml from jinja2 import Environment, FileSystemLoader, Template, TemplateNotFound from git import Repo, GitConfigParser, Remote, Blob, Object class RestrictedFileSystemLoader(FileSystemLoader): def ...
235
32.85
123
18
1,780
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_4e16cf24a7b705c8_281f6212", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 54 ]
[ 62 ]
[ 20 ]
[ 10 ]
2024-11-18T22:36:42.127884+00:00
1,684,079,210,000
1be5bcc67c842a65ce5e1241efcc030c0104fee4
3
{ "blob_id": "1be5bcc67c842a65ce5e1241efcc030c0104fee4", "branch_name": "refs/heads/master", "committer_date": 1684079210000, "content_id": "5174dc5749f5dad467f23b6c19318955fcc9493c", "detected_licenses": [ "MIT" ], "directory_id": "63f5bb00e4a2cf72b7b7c6c102d011094eb52a26", "extension": "py", "fi...
2.65625
stackv2
import concurrent.futures import argparse import shutil import os from typing import Dict, List from flask import Flask from flask_cors import CORS import magic from termcolor import cprint from tempfile import TemporaryDirectory import imagehash from PIL import Image, ExifTags import sqlite3 from jinja2 import FileSys...
447
28.69
79
21
3,010
python
[{"finding_id": "codeql_py/path-injection_5720d67697e3d2e9_70fdd8d8", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
3
true
[ "CWE-022", "CWE-022", "CWE-079" ]
[ "py/path-injection", "py/path-injection", "py/jinja2/autoescape-false" ]
[ "HIGH", "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 313, 313, 343 ]
[ null, null, null ]
[ 21, 32, 15 ]
[ 30, 67, 63 ]