added
stringlengths
32
32
created
int64
1,244B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.25
source
stringclasses
1 value
text
stringlengths
324
20.1k
num_lines
int64
16
598
avg_line_length
float64
15.1
58.3
max_line_length
int64
33
179
ast_depth
int64
8
39
length
int64
101
3.8k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.1k
265k
sast_codeql_findings_count
int64
1
45
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
45
rule_ids
listlengths
1
45
confidences
listlengths
1
45
severities
listlengths
1
45
messages
listlengths
1
45
line_starts
listlengths
1
45
line_ends
listlengths
1
45
column_starts
listlengths
1
45
column_ends
listlengths
1
45
2024-11-19T03:35:19.946750+00:00
1,633,063,693,000
fdf123a8bcd7064eac93d4208eede62515095475
3
{ "blob_id": "fdf123a8bcd7064eac93d4208eede62515095475", "branch_name": "refs/heads/main", "committer_date": 1633063693000, "content_id": "2f01b8a0f744c7c52c659905f2e401c0897097a5", "detected_licenses": [ "MIT" ], "directory_id": "c962eef1c9dd1865862a743034a14f24e8eb82da", "extension": "py", "file...
2.5625
stackv2
import config import pandas as pd import pickle import numpy as np from keras.preprocessing.sequence import pad_sequences from keras.models import load_model import config import re import requests from bs4 import BeautifulSoup import time import json from flask import Flask from flask import request from flask_c...
229
30.09
155
14
1,740
python
[{"finding_id": "codeql_py/polynomial-redos_08f45ce98cf2be58_5121bc9a", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings startin...
2
true
[ "CWE-1333", "CWE-918" ]
[ "py/polynomial-redos", "py/full-ssrf" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings starting with 'http://' and with many repetitions of 'http://a'.", "The full URL of this request depends on a [user-provided value](1)." ]
[ 66, 37 ]
[ null, null ]
[ 54, 12 ]
[ 57, 42 ]
2024-11-19T01:26:45.386665+00:00
1,329,480,561,000
62dacc51211d7ed6c9db1028b8c18cfd72a318ce
2
{ "blob_id": "62dacc51211d7ed6c9db1028b8c18cfd72a318ce", "branch_name": "refs/heads/master", "committer_date": 1329480561000, "content_id": "116aabfce6b7da37a48de722fbb44d4c2afd9324", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "83a7fb7ccaa9072fe8b69a402c63fe8934c99900", "extension": "p...
2.34375
stackv2
# coding: utf-8 import os, sys, urllib, urllib2, hashlib, json, logging, datetime from logging.handlers import SMTPHandler, RotatingFileHandler from .parsexml import xml2dict DEBUG = True #ROOT_DIR = os.path.dirname(os.path.abspath(__file__)) LOG_DIR = '/tmp/toplogs' if not os.path.isdir(LOG_DIR): os.mkdir(LOG_...
144
30.88
104
17
1,037
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_5f0167068c47561d_ad923402", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (secret)](2) is used in a hashing algorithm (MD5) that is insecure." ]
[ 48 ]
[ null ]
[ 28 ]
[ 31 ]
2024-11-19T01:37:40.430992+00:00
1,388,171,628,000
4bbe21369dce94a416ee0818e35d3fb14a2c1f7d
3
{ "blob_id": "4bbe21369dce94a416ee0818e35d3fb14a2c1f7d", "branch_name": "refs/heads/master", "committer_date": 1388171628000, "content_id": "eab0d52a7c0cc1202719633526bbf4343600770a", "detected_licenses": [ "MIT" ], "directory_id": "488fba6998125eb6812b6fce4ca8005072c633ae", "extension": "py", "fi...
2.671875
stackv2
# -*- mode:python; tab-width: 2; coding: utf-8 -*- """ BtlRoute """ from __future__ import absolute_import __author__ = "Carlos Martín" __license__ = "See LICENSE for details" __version__ = "0.12.2" # Import here any required modules. import re __all__ = ['FilterMixin', 'Path'] class Filters(object): """Sing...
266
26.59
82
18
1,799
python
[{"finding_id": "codeql_py/redos_e023a8354e84cc4c_40b12b92", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '<::' and containing many repetiti...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '<::' and containing many repetitions of '='." ]
[ 150 ]
[ null ]
[ 20 ]
[ 28 ]
2024-11-19T01:37:51.046638+00:00
1,491,685,193,000
68b3fece33dc231d74c490ad90deb14c39c64b76
3
{ "blob_id": "68b3fece33dc231d74c490ad90deb14c39c64b76", "branch_name": "refs/heads/master", "committer_date": 1491685193000, "content_id": "3aaef57fc05d8d385ab91f77d649a87f02196fd1", "detected_licenses": [ "MIT" ], "directory_id": "4d3f030d1aeb411ae2963911a1331675b7541b78", "extension": "py", "fi...
2.546875
stackv2
#!/usr/bin/env python __author__ = 'mm' """ Simple HTTP server returning JSON formatted list of data from the router """ import sys sys.path.append('../py') import B593 import datetime import calendar import getopt, os import json from BaseHTTPServer import BaseHTTPRequestHandler, HTTPServer from Queue import Queue...
73
31.58
146
18
566
python
[{"finding_id": "codeql_py/path-injection_4648a348873a01f2_a657b73f", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 35 ]
[ null ]
[ 26 ]
[ 50 ]
2024-11-19T01:37:51.476888+00:00
1,692,877,319,000
3d602aab14b8e30289dfa75dd2a8ee3ebf9aed70
3
{ "blob_id": "3d602aab14b8e30289dfa75dd2a8ee3ebf9aed70", "branch_name": "refs/heads/master", "committer_date": 1692877319000, "content_id": "7d214bf75b9b5a1f3667199ace953b1b2b63766d", "detected_licenses": [ "Apache-2.0" ], "directory_id": "2c7d0bb7332d4006b1d9c5768ee86e2838ebf3a2", "extension": "py"...
2.578125
stackv2
#!/usr/bin/env python3 """This script is used by the "shutdown" hook test, to act as a dummy job being started in a Deployment that belongs to a Krake Application. """ import os.path import time import requests import socketserver from http.server import BaseHTTPRequestHandler endpoint_env = "KRAKE_SHUTDOWN_URL" toke...
68
26.75
87
16
429
python
[{"finding_id": "codeql_py/request-without-cert-validation_e630943dc77f7c85_fe68f6f9", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1) by [this value](2)." ]
[ 40 ]
[ 42 ]
[ 16 ]
[ 6 ]
2024-11-19T01:38:32.944672+00:00
1,612,188,557,000
1fedd9a5f69922fda16f34afeab2d66f7844ea02
2
{ "blob_id": "1fedd9a5f69922fda16f34afeab2d66f7844ea02", "branch_name": "refs/heads/master", "committer_date": 1612188557000, "content_id": "bd83ed580ee241d7bccf7170f916c7c26cd0e7da", "detected_licenses": [ "MIT" ], "directory_id": "69bf0b06f5a417b955d3b1448735dfe14651462d", "extension": "py", "fi...
2.3125
stackv2
import psutil from appJar import gui import config import requests as req import json import platform import sysInfo app = gui(title="CMM Hub", showIcon=False) navBarElements = [] navBarElementsCallName = [] currentContainer = "" def get_size(bytes, suffix="B"): """ Scale bytes to its proper format e.g: ...
77
28.03
88
13
564
python
[{"finding_id": "codeql_py/request-without-cert-validation_024376e2713320f5_24124fe5", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
3
true
[ "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 32, 40, 51 ]
[ null, 41, null ]
[ 15, 15, 15 ]
[ 77, 73, 51 ]
2024-11-19T01:38:40.374691+00:00
1,557,752,354,000
911721b22f017ff4bd0d1b5a8442728f368113cd
3
{ "blob_id": "911721b22f017ff4bd0d1b5a8442728f368113cd", "branch_name": "refs/heads/master", "committer_date": 1557752354000, "content_id": "4e022eaf77fab81b2d88ac03089faeb41a72225c", "detected_licenses": [ "MIT" ], "directory_id": "17e26aaeb019647b4a7f142febc8025f95fee1e6", "extension": "py", "fi...
3.484375
stackv2
#!/usr/bin/env python3.6 import pyperclip from user import User def create_user (account,username,password,email): """ Function for creating a new user object """ new_user= User(account,username,password,email) return new_user def save_user(user): """ Function for saving user """ use...
91
40.58
143
19
822
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b10ebe7c7221ec70_d96cd96a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 49, 67 ]
[ null, null ]
[ 19, 25 ]
[ 140, 107 ]
2024-11-19T01:38:45.257391+00:00
1,548,648,064,000
31a0a58c815d327865274c0e598007f596f8a876
3
{ "blob_id": "31a0a58c815d327865274c0e598007f596f8a876", "branch_name": "refs/heads/master", "committer_date": 1548648064000, "content_id": "29db9a561e24afa6d811aeff05ee249defa2f6e1", "detected_licenses": [ "Apache-2.0" ], "directory_id": "a68ef14a3732fd0c6c237457663a3e6fdb0cbe19", "extension": "py"...
2.640625
stackv2
#!/usr/bin/env python3 # # formatted with black # import json import requests import sys from os import getenv def get_nest_access_token( client_id, client_secret, authorization_code, grant_type="authorization_code", url="https://api.home.nest.com/oauth2/access_token", ): print( "Cli...
129
32.27
87
18
932
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ee5fee01717679e4_3bf5c503", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 21 ]
[ 23 ]
[ 9 ]
[ 10 ]
2024-11-19T01:52:03.695723+00:00
1,530,876,699,000
8b622403fcfa02273486fdcc35933c82fa6a0f3a
4
{ "blob_id": "8b622403fcfa02273486fdcc35933c82fa6a0f3a", "branch_name": "refs/heads/master", "committer_date": 1530876699000, "content_id": "c774cb98a316f9a236300134f2fe45e303b1495c", "detected_licenses": [ "MIT" ], "directory_id": "5f3f6781ae2d55aee04e8bc909b6db2d9d2bfe22", "extension": "py", "fi...
3.984375
stackv2
# -*- coding: utf-8 -*- """ Created on Mon Jun 11 01:37:09 2018 @author: sushy """ secretWord = 'apple' lettersGuessed = ['e', 'i', 'k', 'p', 'r', 's'] def getGuessedWord(sW, lG): ''' sW: string, the word the user is guessing lG: list, what letters have been guessed so far returns: string, comprised ...
37
24.81
102
11
253
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b68b63dd392afe9d_da6d735a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 36 ]
[ null ]
[ 7 ]
[ 49 ]
2024-11-19T01:52:25.966287+00:00
1,541,349,170,000
315edb8d31281fe7e858ec76e5b0d1c4c2fedf7b
2
{ "blob_id": "315edb8d31281fe7e858ec76e5b0d1c4c2fedf7b", "branch_name": "refs/heads/master", "committer_date": 1541349170000, "content_id": "cdbf00932f4b8efc55a29c976d5d25d6fa81a220", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "4c3f27ec4b7a513de1da2956632ace87951a65f9", "extension": "p...
2.5
stackv2
""" Simple server with interface allowing users to submit data for processing and to see status and reports when ready. The purpose of the Frontend is to do the following: 1. Provide an interface for users to upload their data files to the Backend Storage. 2. Provide an interface for users to view the status and resul...
451
31.66
133
17
3,528
python
[{"finding_id": "codeql_py/url-redirection_5297600f9697531f_3c142c9d", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 422 ]
[ null ]
[ 25 ]
[ 36 ]
2024-11-19T01:52:26.158375+00:00
1,523,620,506,000
285189c9b9c920afc253984600e76642f212fff1
2
{ "blob_id": "285189c9b9c920afc253984600e76642f212fff1", "branch_name": "refs/heads/master", "committer_date": 1523620506000, "content_id": "b881ac5e7872f2d2914eca3815e7f73db54d1b51", "detected_licenses": [ "MIT" ], "directory_id": "5d738ec9141cd5d7faba0030f5155b3ab3fc1ea0", "extension": "py", "fi...
2.421875
stackv2
import logging from jinja2 import Environment, FileSystemLoader from .iproute import get_peer_addr from .pingc import PingHost class Bird: def __init__(self, psk, port, ifnames, template_paths=['.']): self._psk = psk self._ifname_addr = dict() self._ifname_stat = dict() self._jinj...
50
34.56
73
17
412
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_e3bceb615ae062a1_35d8340e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 13 ]
[ 15 ]
[ 23 ]
[ 10 ]
2024-11-19T01:52:29.366609+00:00
1,551,104,224,000
6ff60f9348d5b30e43e90740c8fed32075e2b788
3
{ "blob_id": "6ff60f9348d5b30e43e90740c8fed32075e2b788", "branch_name": "refs/heads/master", "committer_date": 1551104224000, "content_id": "e7cef68eb5f055d358a2b8c5e50035ed74b773eb", "detected_licenses": [ "MIT" ], "directory_id": "23433470bcf602226c6bc3a26f18cb9a112e5038", "extension": "py", "fi...
2.53125
stackv2
from flask import Flask, request, render_template # import nltk # nltk.download('stopwords') from interception2 import intrsp from stemmer2 import stemm_match from word_vec2 import wrd_vec_match app = Flask(__name__) @app.route('/') def indx(): # return 'HEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEELP!!' return render...
61
23.61
149
17
441
python
[{"finding_id": "codeql_py/reflective-xss_87b1dc9278b7ddc8_ab76c0c0", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 21 ]
[ 57 ]
[ 12 ]
[ 4 ]
2024-11-19T01:52:30.475080+00:00
1,600,056,443,000
e74feadd4edb9bf4571129d85ba79ba442d474e7
3
{ "blob_id": "e74feadd4edb9bf4571129d85ba79ba442d474e7", "branch_name": "refs/heads/master", "committer_date": 1600056443000, "content_id": "2c8338ad88e6bf3ca51006def1ce5fa09d38c71f", "detected_licenses": [ "MIT" ], "directory_id": "112329facb543bf2c6c0147060fed2c49e45636a", "extension": "py", "fi...
3.1875
stackv2
import sqlite3 import time import hashlib import re import math import os.path import datetime import random import string from getpass import getpass from command1 import * from command2 import * from command4 import * from command5 import * connection = None cursor = None def connect(path): global connection, ...
219
29.84
156
16
1,554
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_21f047d89d94fbd0_b0fb2fdb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 105 ]
[ null ]
[ 11 ]
[ 68 ]
2024-11-19T02:04:19.375035+00:00
1,620,890,096,000
18199ff5197eb24f1319377564015a74b5717049
2
{ "blob_id": "18199ff5197eb24f1319377564015a74b5717049", "branch_name": "refs/heads/main", "committer_date": 1620890096000, "content_id": "23240e86efbec11fdcadec424c5cf413ee2fc0f5", "detected_licenses": [ "MIT" ], "directory_id": "fa2e0a7c7ee37fc2e656ac7aa98467f6b6386204", "extension": "py", "file...
2.421875
stackv2
#!/usr/bin/env python # -*- coding:UTF-8 -*- # # @AUTHOR: Rabbir # @FILE: /root/Github/rab_python_packages/rab_ssr.py # @DATE: 2021/05/10 Mon # @TIME: 14:11:24 # # @DESCRIPTION: 共通包 Linux 服务器端 SSR 订阅的使用 # 整体是对 https://github.com/senjianlu/auto-SSR-update 的封装 import os import json import base64 import re...
402
29.16
80
22
3,269
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b40a1f3af038af07_f4b15d51", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 269, 358 ]
[ null, null ]
[ 19, 27 ]
[ 27, 35 ]
2024-11-19T02:04:19.649431+00:00
1,540,569,281,000
e93afa5809afd75508faadff82e26a0b463215c4
2
{ "blob_id": "e93afa5809afd75508faadff82e26a0b463215c4", "branch_name": "refs/heads/master", "committer_date": 1540569322000, "content_id": "3ad35288a348df0f0855a387adb1b1faa68c0de2", "detected_licenses": [ "BSD-3-Clause", "Apache-2.0" ], "directory_id": "684c9beb8bd972daeabe5278583195b9e652c0c5",...
2.359375
stackv2
#!/usr/bin/python # # Copyright 2017 The Cobalt Authors. All Rights Reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless req...
159
33.5
80
15
1,262
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_b7ff4937ab76d7bb_baa41019", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 115 ]
[ 116 ]
[ 14 ]
[ 70 ]
2024-11-19T02:04:46.167005+00:00
1,621,294,373,000
57d514a145018a271cdfbe941b720a82a951d6b8
3
{ "blob_id": "57d514a145018a271cdfbe941b720a82a951d6b8", "branch_name": "refs/heads/main", "committer_date": 1621294373000, "content_id": "877256d12104900482bb4d2a63da0cdf06611e6b", "detected_licenses": [ "CC0-1.0" ], "directory_id": "b1c580f5c21ebc4aa8f909f416d1a2bf52348cf8", "extension": "py", "...
2.84375
stackv2
import os import json from pprint import pprint from dateutil.parser import parse as parse_datetime import requests from app import APP_ENV from dotenv import load_dotenv from pgeocode import Nominatim as Geocoder from pandas import isnull load_dotenv() COUNTRY_CODE = os.getenv("COUNTRY_CODE", default="US") ZIP_CODE...
222
37.72
124
17
2,039
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_de40008d4750242d_ef683496", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
9
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging...
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (p...
[ 207, 211, 215, 215, 215, 218, 222, 222, 222 ]
[ null, null, null, null, null, null, null, null, null ]
[ 11, 11, 15, 43, 66, 11, 15, 45, 68 ]
[ 94, 76, 36, 59, 88, 80, 38, 61, 90 ]
2024-11-19T02:04:46.335987+00:00
1,549,562,932,000
fcf8bc7579df44ea7ca3615b8bd2ea3bf2a2649c
2
{ "blob_id": "fcf8bc7579df44ea7ca3615b8bd2ea3bf2a2649c", "branch_name": "refs/heads/master", "committer_date": 1549562932000, "content_id": "4e2411e93d7339567f042ae783ef7a98e5dcf825", "detected_licenses": [ "Apache-2.0" ], "directory_id": "150b9f5a070c2e80e018a98003f01d9cec600eb1", "extension": "py"...
2.359375
stackv2
import time import json import logging import threading from os.path import basename, dirname import paramiko class WatchGerrit(threading.Thread): """ Threaded job; listens for Gerrit events and puts them in a queue """ def __init__(self, options, queue): options['port'] = int(options['port']) # co...
106
39.61
109
22
885
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_efbd390889854f78_93577079", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/paramiko-missing-host-key-validation", "py/paramiko-missing-host-key-validation" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe.", "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 34, 59 ]
[ null, null ]
[ 13, 17 ]
[ 73, 77 ]
2024-11-19T02:04:47.732593+00:00
1,544,332,345,000
ce99aabf507f468aa5f57cfdb7c31470496f031a
4
{ "blob_id": "ce99aabf507f468aa5f57cfdb7c31470496f031a", "branch_name": "refs/heads/master", "committer_date": 1544332345000, "content_id": "4cfb05e327ab49c7db8130db3dbd7b87988f9770", "detected_licenses": [ "Unlicense" ], "directory_id": "ce4633ab17411109562b291f523b60d5089f876c", "extension": "py",...
3.765625
stackv2
import pandas as pd import stats as st import utilities as ut # City & File Mapping CITY_DATA = { 'chicago': 'chicago.csv', 'new york city': 'new_york_city.csv', 'washington': 'washington.csv' } # Cities List Constant CITIES_LIST = ('chicago', 'new york city', 'washington') # Months List Constant MONTHS_LI...
229
31.08
96
19
1,681
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_be6b7baf5f2a88df_5c7ef9e2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 151 ]
[ null ]
[ 27 ]
[ 58 ]
2024-11-19T02:28:34.015804+00:00
1,551,318,940,000
e969c19b2e4db4f3f2faf8752adb4efec66c4370
4
{ "blob_id": "e969c19b2e4db4f3f2faf8752adb4efec66c4370", "branch_name": "refs/heads/master", "committer_date": 1551318940000, "content_id": "1f98b48da715f218a61d98a58b2cdb0691b91442", "detected_licenses": [ "MIT" ], "directory_id": "e4b019d2fd32e8e317dbbf4e440de1ff1686939c", "extension": "py", "fi...
3.640625
stackv2
import glob import os from jinja2 import Template def discover_pages(): print('compiling pages list...') pages = [] all_content_docs = glob.glob("content/*.html") # returns list of filepaths for doc in all_content_docs: # create dictionary with input filepath, output filepath, and title ...
85
28.89
98
17
564
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_b6a87c333f2ee5be_f42115bd", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 52 ]
[ null ]
[ 16 ]
[ 39 ]
2024-11-19T02:28:51.664440+00:00
1,520,550,707,000
a9bd8e0ac46cce5cde5a185048bf27407d5ce3a4
2
{ "blob_id": "a9bd8e0ac46cce5cde5a185048bf27407d5ce3a4", "branch_name": "refs/heads/master", "committer_date": 1520550707000, "content_id": "7c92c3931cbea39e190e88e55125fce32789b9bc", "detected_licenses": [ "BSD-3-Clause", "MIT" ], "directory_id": "12a6c836d4781f4e722aabc2083eb4d0da5b2f73", "ext...
2.390625
stackv2
import paramiko import re import csv import slycat.web.client import getpass import cPickle as pickle parser = slycat.web.client.ArgumentParser() parser.add_argument("file", default="-", help="Input CSV file. Default: %(default)s") parser.add_argument("--port", default=22, help="port number. Default: %(default)s") p...
103
32.04
114
19
849
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_929c922dc2cbee9a_05a91622", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 67 ]
[ null ]
[ 5 ]
[ 65 ]
2024-11-19T02:36:50.653390+00:00
1,691,771,980,000
37106647a12fced25a38543d44fcd682f23b0a4a
3
{ "blob_id": "37106647a12fced25a38543d44fcd682f23b0a4a", "branch_name": "refs/heads/master", "committer_date": 1692017358000, "content_id": "c650100895482c5fb84426ba6db455d2b947eb42", "detected_licenses": [ "MIT" ], "directory_id": "4b5bb05caf4aa20e923029b67084721556ae71dc", "extension": "py", "fi...
3.421875
stackv2
import base64 import hashlib import secrets import string def create(): alphabet = string.digits + string.ascii_letters password = ''.join(secrets.choice(alphabet) for i in range(128)) salt = ''.join(secrets.choice(alphabet) for i in range(64)) hashed_and_salted_bytes = hashlib.pbkdf2_hmac( '...
21
28.9
85
11
172
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_eadd4c4c9710a93d_8cf02ded", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 16 ]
[ null ]
[ 11 ]
[ 43 ]
2024-11-19T02:36:55.631177+00:00
1,608,297,335,000
2564e219b80547a5fd825158e5fba2f6be22a1f4
4
{ "blob_id": "2564e219b80547a5fd825158e5fba2f6be22a1f4", "branch_name": "refs/heads/main", "committer_date": 1608297335000, "content_id": "4692ad8e076294521faaf02d28e79f96bf0ad031", "detected_licenses": [ "MIT" ], "directory_id": "4d2d32c083fd34aa449e822ab0aa38461a380f51", "extension": "py", "file...
3.53125
stackv2
passwordFile = open('passwords.txt', 'r') passwords = passwordFile.readlines() valid = 0 for policy_line in passwords: parts = policy_line.split(" ") range = parts[0].split("-") check1 = int(range[0]) - 1 check2 = int(range[1]) - 1 chr = parts[1].replace(":", "") password = parts[2] if (pa...
21
34.1
122
18
213
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_aecd8e997cddf564_2c4a25f7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 14, 18 ]
[ 15, 19 ]
[ 15, 15 ]
[ 62, 62 ]
2024-11-19T02:37:06.206979+00:00
1,618,319,006,000
248f3ea8612296ad58ea7ed66730dd4634103698
2
{ "blob_id": "248f3ea8612296ad58ea7ed66730dd4634103698", "branch_name": "refs/heads/main", "committer_date": 1618621379000, "content_id": "f04bdff5aa6c04034cce45865cc504e967a95097", "detected_licenses": [ "MIT" ], "directory_id": "6fba889e6e2bfd3236d252037f5a404cdb404e16", "extension": "py", "file...
2.453125
stackv2
#!/usr/bin/python3 import base64 import os import time from enum import Enum from http import HTTPStatus from urllib import parse import requests import urllib3 urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning) DEFAULT_TOKEN_EXPIRE_SECONDS = 7 * (60 * 60 * 24) # default 7 days DEFAULT_RUN_APP_TIME...
364
36.01
128
21
2,864
python
[{"finding_id": "codeql_py/request-without-cert-validation_0d4041ac546800ae_adf14174", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
6
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 345, 347, 349, 351, 360, 362 ]
[ null, null, null, 358, null, null ]
[ 20, 20, 20, 20, 20, 20 ]
[ 90, 103, 102, 14, 79, 101 ]
2024-11-19T02:37:47.290304+00:00
1,595,627,998,000
b9fd3519c8fd89b928a096b46c4d4a3cae13566b
3
{ "blob_id": "b9fd3519c8fd89b928a096b46c4d4a3cae13566b", "branch_name": "refs/heads/master", "committer_date": 1595627998000, "content_id": "8b1420f6bd0c71e0d99924f88a8ea0894a6df8b2", "detected_licenses": [ "MIT" ], "directory_id": "0bde8f7d71458eb7ec7ee0d0fe950c9715250c67", "extension": "py", "fi...
2.640625
stackv2
import os import csv import nltk,re, pprint import pandas as pd from geopy import distance from geopy.geocoders import GoogleV3 def get_senser_data_file(): filePath = r'C:\Users\Alienware\Desktop\master-project\ThessalonikiSharedFolder\TrafficData\Data' List_file = [] List_name_loc = [] for i in os.list...
79
38.43
116
26
785
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_562402bca3f1f0b5_60b89fd6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 21, 78 ]
[ null, null ]
[ 11, 7 ]
[ 24, 53 ]
2024-11-19T02:37:47.462331+00:00
1,629,870,680,000
b88a08bd1b672706aed5eba0271732858fefba05
2
{ "blob_id": "b88a08bd1b672706aed5eba0271732858fefba05", "branch_name": "refs/heads/master", "committer_date": 1629870680000, "content_id": "fe2ed92937314d2f5868ac99169c13239c708e49", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "7d9c3d08cbab3628e9adb3fd93dc07b87c08fecd", "extension": "p...
2.375
stackv2
from __future__ import absolute_import from __future__ import unicode_literals import os from jinja2 import Environment, FileSystemLoader def render_template(name, context, template_root): env = Environment(loader=FileSystemLoader(template_root)) return env.get_template(name).render(context) class Privile...
96
28.08
111
14
718
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_7be008e4c423870f_f58fe0d1", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 10 ]
[ null ]
[ 11 ]
[ 62 ]
2024-11-19T03:00:16.154779+00:00
1,686,694,082,000
3f271cde7daece79a87c4b63b1ce2e813555f503
3
{ "blob_id": "3f271cde7daece79a87c4b63b1ce2e813555f503", "branch_name": "refs/heads/main", "committer_date": 1686694082000, "content_id": "882009c83b1b42b89fc4186ad3dba4f5652e04d9", "detected_licenses": [ "MIT" ], "directory_id": "f4bcc3ace24d84ab7326043d086ce7effdfd1a8f", "extension": "py", "file...
2.921875
stackv2
# -*- coding: utf-8 -*- from datetime import datetime from operator import itemgetter from pathlib import Path from string import ascii_lowercase from typing import Any, Dict, Union from jinja2 import Environment, FileSystemLoader from markupsafe import escape from logya.util import cache env = Environment( lst...
122
34.37
119
16
1,020
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_c9d44adecba7ce45_b51f2a1d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 14 ]
[ 17 ]
[ 7 ]
[ 2 ]
2024-11-19T03:11:30.450561+00:00
1,644,176,150,000
52966d3dc17088a63947905730c4dbd72011aff8
2
{ "blob_id": "52966d3dc17088a63947905730c4dbd72011aff8", "branch_name": "refs/heads/master", "committer_date": 1644176150000, "content_id": "b680fb0b2e8d7f70ceb3f3daf72ba74e88abb9e9", "detected_licenses": [ "MIT" ], "directory_id": "0e905c7ae1169f9e00fa4f3cafad360051aa5d50", "extension": "py", "fi...
2.484375
stackv2
import os from pathlib import Path from threading import Thread import atexit from time import sleep from anki_export import ApkgReader import pyexcel_xlsxwx from flask import Flask, request, Response, send_from_directory, jsonify TMP_PREFIX = "tmp_" app = Flask(__name__) @app.get("/<path:path>") def download_file...
80
25.29
80
19
472
python
[{"finding_id": "codeql_py/flask-debug_76e51684d6435ec7_06b11dac", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
5
true
[ "CWE-215", "CWE-022", "CWE-022", "CWE-022", "CWE-022" ]
[ "py/flask-debug", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-pro...
[ 80, 23, 43, 25, 56 ]
[ null, null, null, null, null ]
[ 5, 12, 12, 14, 15 ]
[ 35, 49, 39, 41, 36 ]
2024-11-19T03:11:32.398394+00:00
1,557,850,051,000
072737f028f92a04ad4a743d4f9788373a16afc8
2
{ "blob_id": "072737f028f92a04ad4a743d4f9788373a16afc8", "branch_name": "refs/heads/master", "committer_date": 1557850051000, "content_id": "01c7ddab83fca0aad283ad559305db5651a48cf6", "detected_licenses": [ "MIT" ], "directory_id": "7ccc1cddb3628d905f8c950780e76c90471d0566", "extension": "py", "fi...
2.390625
stackv2
#!/usr/bin/perl # -*- coding:utf-8 -*- import os import random import subprocess import pexpect import time from flask import Flask, request if 'SPEAKER_MAC' not in os.environ: print('Environment SPEAKER_MAC must be set.') exit(1) if 'PLAYLIST' not in os.environ: print('Environment PLAYLIST must be set.') ex...
181
22.39
60
18
1,201
python
[{"finding_id": "codeql_py/reflective-xss_fd4dca62aef66c3e_96c2ee2d", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 156 ]
[ null ]
[ 10 ]
[ 21 ]
2024-11-19T03:11:43.156978+00:00
1,689,089,854,000
613145686851f36e91992c1a83aac5755ca83da1
3
{ "blob_id": "613145686851f36e91992c1a83aac5755ca83da1", "branch_name": "refs/heads/master", "committer_date": 1689089854000, "content_id": "d7786c80bd039f5cfcff281c9485cbf54bf9149a", "detected_licenses": [ "BSD-3-Clause", "BSD-2-Clause" ], "directory_id": "8d585fa3b2419d9b993be2f2652e448cfeedc8b2...
2.671875
stackv2
""" *** Modified generic daemon class *** Author: http://www.jejik.com/articles/2007/02/a_simple_unix_linux_daemon_in_python/ www.boxedice.com www.datadoghq.com License: http://creativecommons.org/licenses/by-sa/3.0/ """ # Core modules from contextlib import...
378
32.05
134
21
2,623
python
[{"finding_id": "codeql_py/overly-permissive-file_d65d222d366983ad_ee69d08e", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable." ]
[ 367 ]
[ null ]
[ 13 ]
[ 41 ]
2024-11-19T03:11:59.017838+00:00
1,422,809,470,000
3ad2cbfe89ab907a552961cfc6de0845d7cf6661
3
{ "blob_id": "3ad2cbfe89ab907a552961cfc6de0845d7cf6661", "branch_name": "refs/heads/master", "committer_date": 1422809470000, "content_id": "9e6b43205bc3cb1b6ce9586dec4d04313e62e9a4", "detected_licenses": [ "Apache-2.0" ], "directory_id": "9f15474b328c0fcb5ea061cd7205bd3613b86383", "extension": "py"...
3.390625
stackv2
import re def remove_urls(text): """ Remove all URLs from a `text`. Return clean text and URLs list. Parameters: text -- the text to be cleaned. """ # Regex to identify URLs regex = ('http[s]?://(?:[a-zA-Z]|[0-9]|[$-_@.&+]|[!*\(\),]|' '(?:%[0-9a-fA-F][0-9a-fA-F]))+') urls...
19
23.26
67
11
135
python
[{"finding_id": "codeql_py/overly-large-range_40f0cfea7514bc9f_184e876b", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 12 ]
[ null ]
[ 45 ]
[ 49 ]
2024-11-19T03:12:00.431691+00:00
1,571,830,048,000
e05fd28a54555000d5f63f2a8c58dbcbca88406c
2
{ "blob_id": "e05fd28a54555000d5f63f2a8c58dbcbca88406c", "branch_name": "refs/heads/master", "committer_date": 1571830048000, "content_id": "8f6341d26d2fb6c73e4dc866aef739201d479c40", "detected_licenses": [ "MIT" ], "directory_id": "5a8d6ea029248e1cd0f97e20d7e8ac98c53c2705", "extension": "py", "fi...
2.453125
stackv2
#!/usr/bin/env python # encoding: utf-8 import random import hashlib from api import NetEase cookie_path = "~/.netease-music_api/cookie" def md5(passwd): md = hashlib.md5() md.update(passwd) return md.hexdigest() def change_user(): #file = open('163.md') file = open('account.txt') try: ...
34
17.91
43
12
166
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_9ad10fe8ebb00e87_b1004f8e", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (id)](2) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (id)](3) is used in a hashing algorithm (MD5) that ...
[ 12 ]
[ null ]
[ 15 ]
[ 21 ]
2024-11-19T03:12:08.502694+00:00
1,602,466,970,000
7bb071085298651752b571394ba836b27deee809
3
{ "blob_id": "7bb071085298651752b571394ba836b27deee809", "branch_name": "refs/heads/master", "committer_date": 1602466970000, "content_id": "abf8c79619c4cb9fcc2fb09c8cc3496b63cf7c2d", "detected_licenses": [ "Apache-2.0" ], "directory_id": "4944178c246ab0811939b32cd192b7ce692b93cd", "extension": "py"...
2.609375
stackv2
#!/usr/bin/env python3 # Licensed to the Apache Software Foundation (ASF) under one # or more contributor license agreements. See the NOTICE file # distributed with this work for additional information # regarding copyright ownership. The ASF licenses this file # to you under the Apache License, Version 2.0 (the # "...
275
43.83
115
22
2,430
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_bc846378603814de_a33ff845", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.\nT...
6
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.", "This expression logs [sensitive data (s...
[ 270, 104, 112, 132, 161, 166 ]
[ null, null, null, null, 162, 167 ]
[ 23, 38, 38, 34, 25, 34 ]
[ 49, 113, 99, 76, 79, 90 ]
2024-11-19T03:12:08.875710+00:00
1,598,916,760,000
dfd595a3ebdc18535a7e53c4013495af78f952dd
2
{ "blob_id": "dfd595a3ebdc18535a7e53c4013495af78f952dd", "branch_name": "refs/heads/master", "committer_date": 1598916760000, "content_id": "46317ad90d9d713de17c66cf06743fcffe8fad4a", "detected_licenses": [ "MIT" ], "directory_id": "7fae9557bf3ffde771a1b84eb0560427a5714faf", "extension": "py", "fi...
2.4375
stackv2
import winsound import requests import glob import os from os.path import join import threading import time from argparse import ArgumentParser VERSION = "1.3" print("SayThat {} (C)Mya-Mya(2020)".format(VERSION)) CWD = os.path.dirname(__file__) SOUNDS_DIR = join(CWD, "sounds", "") VOICE_CACHES_DIR = join(CWD, "voice_...
139
29.95
115
16
1,247
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_0118b18cb97c91c5_02654ae5", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 88 ]
[ null ]
[ 28 ]
[ 33 ]
2024-11-19T03:12:14.050346+00:00
1,628,768,563,000
1d0ed6b02d09b43c22d4ca2a4ec7aa6249542237
5
{ "blob_id": "1d0ed6b02d09b43c22d4ca2a4ec7aa6249542237", "branch_name": "refs/heads/master", "committer_date": 1628768563000, "content_id": "59c7b2cce0dfa62f99f6448235d21a5d42312298", "detected_licenses": [ "Unlicense" ], "directory_id": "e1ea171018f0a32f0149da127ee2d3e5c69cb2f6", "extension": "py",...
4.65625
stackv2
#!/usr/bin/env python3 """ Exercise 01: Number Guessing Game A simple guessing game, showing basic input / output and use of a function from a built-in module. """ from random import randint def guessing_game(): secret = randint(0, 100) while True: guess = int(input('Enter your guess: ')) ...
28
22.89
102
14
160
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_653f6b47607afb93_5e1adcd0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 19 ]
[ null ]
[ 19 ]
[ 79 ]
2024-11-19T03:12:39.275514+00:00
1,626,150,944,000
361a180457cd2c00737f4b57bd0cdccdc57dffc3
3
{ "blob_id": "361a180457cd2c00737f4b57bd0cdccdc57dffc3", "branch_name": "refs/heads/main", "committer_date": 1626150944000, "content_id": "b3d1a774903e842f7a7e53a4ff8d51180ae40d72", "detected_licenses": [ "MIT" ], "directory_id": "b2c3bf9266888ba8a511f1d87179b8e70f1a1584", "extension": "py", "file...
3.171875
stackv2
import os import re import sys # Get the source directory while True: try: pwd = input("Choose the main folder with the tasks files: ") if re.match(re.compile(r'/[a-zA-z0-9]+/*'), pwd): break else: print("\nThis is not a folder! " + "Try something ...
40
29.43
70
16
289
python
[{"finding_id": "codeql_py/overly-large-range_1c039ba2cd1522d9_fa6409ed", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 10 ]
[ null ]
[ 39 ]
[ 42 ]
2024-11-19T03:12:53.886177+00:00
1,608,776,908,000
a5b57822cc2c0e2d6b2dd77cf2b53b920bcded11
2
{ "blob_id": "a5b57822cc2c0e2d6b2dd77cf2b53b920bcded11", "branch_name": "refs/heads/master", "committer_date": 1608776908000, "content_id": "ea4e7cf37c23e30bc3131d187466c5d92de7404c", "detected_licenses": [ "MIT" ], "directory_id": "3c3ed5ac26edbd8e4607283412cc5b56c0ef0569", "extension": "py", "fi...
2.328125
stackv2
# #!/usr/bin/python # -*- coding: utf-8 -*- # ScrapHacks # Web Scrapping Examples # # Copyright 2017-2018 Isaac de la Pena <isaacdlp@agoraeafi.com> # # Licensed under the MIT License (the "License") # you may not use this file except in compliance with the License. # # Unless required by applicable law or agreed to i...
112
35.67
120
19
1,145
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_2768620243c55c26_668c2a85", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [www.quefondos.com](1) may be at an arbitrary position ...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [www.quefondos.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 80 ]
[ null ]
[ 18 ]
[ 44 ]
2024-11-19T03:25:17.946866+00:00
1,631,715,152,000
49a9c474225a97ccba13cd7a9acc157d098faf0e
2
{ "blob_id": "49a9c474225a97ccba13cd7a9acc157d098faf0e", "branch_name": "refs/heads/main", "committer_date": 1631715152000, "content_id": "eee1e4b15a369e342fa27f754d31d44f8bcbb34d", "detected_licenses": [ "MIT" ], "directory_id": "85f7fdc67860ab9c2e13891755e44aa381ad1b4c", "extension": "py", "file...
2.484375
stackv2
import urllib3 import bs4 ORACC_PROJECT_NAME = "" SUPERSCRIPTS_TO_UNICODE_CHARS = { "<super>1</super>": "\U0001F600", "<super>m</super>": "\U0001F600", "<super>d</super>": "\U0001F601", "<super>f</super>": "\U0001F602", "<super>ki</super>": "\U0001F603", "<super>kur</super>": "\U0001F604", ...
144
30.48
111
16
1,368
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_c25115dc0387a806_2e544e36", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [oracc.org](1) may be at an arbitrary position in the s...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "The string [oracc.org](1) may be at an arbitrary position in the sanitized URL.", "The string [oracc.museum.upenn.edu](1) may be at an arbitrary position in the sanitized URL." ]
[ 35, 35 ]
[ null, null ]
[ 13, 44 ]
[ 40, 84 ]
2024-11-19T03:25:22.184997+00:00
1,654,443,654,000
283e0b353c3d40c8ecfa1e760ef8c9a5d01c4393
3
{ "blob_id": "283e0b353c3d40c8ecfa1e760ef8c9a5d01c4393", "branch_name": "refs/heads/main", "committer_date": 1654443654000, "content_id": "928f73f74d4265c29019a324b56e1a9fbe0e9dec", "detected_licenses": [ "MIT" ], "directory_id": "ec279d450c7ef443d6c6daa925140363cadda78f", "extension": "py", "file...
2.796875
stackv2
#!/usr/bin/python3 import sys import yaml import jinja2 class XtermColors(object): increments = (0, 95, 135, 175, 215, 255) def __init__(self): self.palette = {} i = 16 for r in self.increments: for g in self.increments: for b in self.increments: ...
73
28.77
70
19
578
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_830798e81d919052_25991469", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 42 ]
[ 46 ]
[ 10 ]
[ 6 ]
2024-11-19T03:35:43.684648+00:00
1,670,547,015,000
d17a836796bdafff1b6e20e61770571867c6d2b3
3
{ "blob_id": "d17a836796bdafff1b6e20e61770571867c6d2b3", "branch_name": "refs/heads/master", "committer_date": 1670547015000, "content_id": "a37ec51050092db06754acea11cb4074da7f7b31", "detected_licenses": [ "MIT" ], "directory_id": "4803733b75ab7825409317d131574325fddb0c99", "extension": "py", "fi...
3.1875
stackv2
import sys import re from typing import List def is_valid(cand: str) -> bool: if not re.match(r'.*((.)\2.*){2}', cand): return False values = list(map(ord, cand)) ascend_strs = zip(*(values[i:] for i in range(3))) for ascend_str in ascend_strs: pairs = zip(*(ascend_str[i:] for i in ra...
44
23.23
79
15
286
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c8d55407eecf60a4_856ad493", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 40 ]
[ null ]
[ 15 ]
[ 47 ]
2024-11-19T03:35:45.919135+00:00
1,598,351,477,000
e22f2cd5246dff5ac6ab4f745f1a273b8ee4f6d1
3
{ "blob_id": "e22f2cd5246dff5ac6ab4f745f1a273b8ee4f6d1", "branch_name": "refs/heads/master", "committer_date": 1598351477000, "content_id": "bd1a8bc5f67db74f7fa3bc3020dec78357ed182c", "detected_licenses": [ "MIT" ], "directory_id": "aeaa0e28061b2d34eb20b273f78de25837921f5b", "extension": "py", "fi...
2.578125
stackv2
import socket import struct import binascii STRING_ONE_TAB="\t" STRING_TWO_TAB="\t\t" STRING_THREE_TAB="\t\t\t" def get_mac_addr(mac_raw): byte_str = map('{:02x}'.format, mac_raw) mac_addr = ':'.join(byte_str).upper() return mac_addr class Ethernet(): """class for separate ethernet frame""" def...
152
36.94
154
14
1,506
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d606cd8646abe198_754a183b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (priva...
[ 24, 70, 71 ]
[ null, null, null ]
[ 13, 15, 15 ]
[ 116, 118, 123 ]
2024-11-19T01:28:46.107680+00:00
1,532,048,082,000
f02bbf0b4769b7ec665a6a2b489117da467db744
3
{ "blob_id": "f02bbf0b4769b7ec665a6a2b489117da467db744", "branch_name": "refs/heads/master", "committer_date": 1532048082000, "content_id": "c8c704db4c69fefd90dcca3a32d4ad687fbf732e", "detected_licenses": [ "Apache-2.0" ], "directory_id": "ecc87e6a23ffb71e8b1e7a8d0f0946e5e7bcec79", "extension": "py"...
2.75
stackv2
from flask import Blueprint, url_for, request, render_template, make_response, Response, redirect, abort from flask.json import jsonify from jinja2 import Template blue = Blueprint('first_blue', __name__) @blue.route('/') def index(): return "Hello Flask" @blue.route('/hello/<int:a>') def hello(a): print(a...
112
18.96
104
11
627
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_133adafb31fc4288_eaf14d04", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 62 ]
[ null ]
[ 12 ]
[ 46 ]
2024-11-19T01:28:48.526493+00:00
1,614,245,244,000
a0e84ef5a0fc58a020a06b88db8a5e500b26f7e4
3
{ "blob_id": "a0e84ef5a0fc58a020a06b88db8a5e500b26f7e4", "branch_name": "refs/heads/main", "committer_date": 1614245244000, "content_id": "df6cc5f5929a96173c55aed64d6ae3eb2c47ab07", "detected_licenses": [ "MIT" ], "directory_id": "b24c548ae145c61edaecfdc306a8434f18250e24", "extension": "py", "file...
3.046875
stackv2
#!/usr/bin/env python3 ''' this code has been taken from the following link: "https://github.com/pakesson/diy-ecb-penguin/blob/master/encrypt_image.py" and updated slightly 128 bit aes encryption is used in this code ''' from PIL import Image from cryptography.hazmat.primitives.ciphers import Cipher,algorithms,...
63
28.43
74
13
467
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_fffb09eacbae358a_e38a691a", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode CBC](1) is broken or weak, and should not be used.\n[The block mode ...
1
true
[ "CWE-327" ]
[ "py/weak-cryptographic-algorithm" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[The block mode CBC](1) is broken or weak, and should not be used.\n[The block mode ECB](2) is broken or weak, and should not be used." ]
[ 34 ]
[ null ]
[ 16 ]
[ 45 ]
2024-11-19T01:29:29.834731+00:00
1,615,517,706,000
8eb1b8a086079e0ddd2bc1706a165e5102708146
3
{ "blob_id": "8eb1b8a086079e0ddd2bc1706a165e5102708146", "branch_name": "refs/heads/master", "committer_date": 1615517706000, "content_id": "0e445c2ed0a0e706f570c35273344cad26d7d9ea", "detected_licenses": [ "MIT" ], "directory_id": "f0a54fa8580357d129f6701a107fe02d063e0ea7", "extension": "py", "fi...
3.03125
stackv2
""" 需求: 就是设计一个爬虫,给功能如下, 1.抓取网页上关于光电企业信息(岗位,各岗位的薪资、技能要求、工资、地点等信息) 2.将这些信息存入数据库 3.对数据库的数据进一步分析,提炼,并将信息转换为散点图和柱状图,并加入了tkinter图形操作界面 ps:拉钩网的cookie很容易失效,所以要特别注意 """ import json import time import requests from tqdm import tqdm # 1.1、先爬取拉勾的数据,是一个ajax动态加载的网站 headers = { 'Host': 'ww...
85
35.69
134
34
973
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_6652bc03c6a90612_2724d694", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text." ]
[ 68 ]
[ null ]
[ 25 ]
[ 32 ]
2024-11-19T01:29:33.722841+00:00
1,643,430,461,000
251496446374064791ae6f64d37293c606750c12
2
{ "blob_id": "251496446374064791ae6f64d37293c606750c12", "branch_name": "refs/heads/master", "committer_date": 1643430461000, "content_id": "ac4c74a40b3312c2dc36115cf825e9f4fe691485", "detected_licenses": [ "Apache-2.0" ], "directory_id": "b858793614fad1ab610a67347faf4d04353c356b", "extension": "py"...
2.4375
stackv2
# -*- coding: utf-8 -*- """ ------------------------------------------------- File Name: queue Description : queue view Author : JHao date: 2018/8/27 ------------------------------------------------- Change Activity: 2018/8/27: queue view -------------------------...
142
36.15
106
14
1,181
python
[{"finding_id": "codeql_py/cookie-injection_77747a1d3e18a4a1_821bb41e", "tool_name": "codeql", "rule_id": "py/cookie-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cookie is constructed from a [user-supplied input](1).", "remediation": "", "location": {"file_path": "...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/cookie-injection", "py/cookie-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cookie is constructed from a [user-supplied input](1).", "Cookie is constructed from a [user-supplied input](1)." ]
[ 41, 114 ]
[ null, null ]
[ 29, 29 ]
[ 43, 38 ]
2024-11-19T01:30:10.278862+00:00
1,518,633,968,000
e9c31b6eb490b728d62414dbf3bb89a52105ce00
3
{ "blob_id": "e9c31b6eb490b728d62414dbf3bb89a52105ce00", "branch_name": "refs/heads/master", "committer_date": 1518633968000, "content_id": "c9504293bc46314acb610f2ea08ceb204eea7979", "detected_licenses": [ "MIT" ], "directory_id": "33a704bedd001cd0985518f4ec0ac4083993a150", "extension": "py", "fi...
2.609375
stackv2
from utils import ( create_folder, set_name, unique_everseen, is_valid_url, get_html, get_elements, get_page_links, get_image_links, get_imagebam_htmlcode_links ) import os import re import sys import urllib def download_file(url, name, dest=".", number=1): print " {0}) In: {1...
164
28.47
85
17
1,171
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_c09728a31fdba0ef_f23a2f96", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [imagebam.com](1) may be at an arbitrary position in th...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "The string [imagebam.com](1) may be at an arbitrary position in the sanitized URL.", "The string [imagevenue.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 59, 117 ]
[ null, null ]
[ 47, 43 ]
[ 66, 64 ]
2024-11-19T01:30:14.247803+00:00
1,675,953,919,000
fb1a1350a3b5aedad4df973d333083694d209980
3
{ "blob_id": "fb1a1350a3b5aedad4df973d333083694d209980", "branch_name": "refs/heads/master", "committer_date": 1675953919000, "content_id": "4449f7778938a463f03036b7ddabf586c1f7f99a", "detected_licenses": [ "Apache-2.0" ], "directory_id": "3ad26eac4ed1465de5c405f5c4bd35e9ad6f755e", "extension": "py"...
2.890625
stackv2
#!/usr/bin/python3 # BY NOMO from netmiko import Netmiko from getpass import getpass from datetime import datetime import re import os import sys import socket # Function for DNS resolution def hostnameLookup(hostname): try: socket.gethostbyname(hostname) return 1 # If lo...
93
21.66
80
15
499
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6f0d0655e74cf871_ef902e8f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 75, 93 ]
[ null, null ]
[ 11, 7 ]
[ 54, 75 ]
2024-11-19T01:30:25.972606+00:00
1,573,513,563,000
52b3795fb52c2c29358d338814d434a756059553
2
{ "blob_id": "52b3795fb52c2c29358d338814d434a756059553", "branch_name": "refs/heads/master", "committer_date": 1573513563000, "content_id": "7e471e0017351134567960cb4830bb12985cb90a", "detected_licenses": [ "MIT" ], "directory_id": "1c286eaf9d5a9338343efeb7fe16c98c06ebdc30", "extension": "py", "fi...
2.390625
stackv2
# -*- coding: utf-8 -*- from __future__ import unicode_literals from django.db import models import datetime import time import random from hashlib import sha512 from player.Logger import Logger # Create your models here. USER_TYPE_WEB = 1 USER_TYPE_SKYPE = 2 USER_TYPES = ( (USER_TYPE_WEB, 'Web'), (USER_TYPE_SKYP...
156
26.75
98
18
1,044
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_95a07557ef01f187_78a7d5dd", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally e...
[ 39 ]
[ null ]
[ 17 ]
[ 47 ]
2024-11-19T01:55:08.054771+00:00
1,588,165,161,000
f14124c9ebcb0702f2ac9e4f8f4c7ec07f32283c
3
{ "blob_id": "f14124c9ebcb0702f2ac9e4f8f4c7ec07f32283c", "branch_name": "refs/heads/master", "committer_date": 1588165161000, "content_id": "532c6c4f5cf58d02baf790069de14f6134924431", "detected_licenses": [ "MIT" ], "directory_id": "7fb46a8df03990089e3e09602fbbf00e2b9ec294", "extension": "py", "fi...
2.71875
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- import hashlib import pandas as pd import numpy as np from urlparse import urlparse, urljoin from flask import request, flash, redirect, url_for def md5(password): return hashlib.md5(password).hexdigest() def get_data_array(mydate,myvalue): return [mydate.encode(...
62
26.56
68
15
501
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_2c587f6f1cce76c9_724917c9", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 11 ]
[ null ]
[ 24 ]
[ 32 ]
2024-11-19T02:06:57.635295+00:00
1,630,659,756,000
f93c41008a6a77927da28ce45091eff0c2e7e5a1
2
{ "blob_id": "f93c41008a6a77927da28ce45091eff0c2e7e5a1", "branch_name": "refs/heads/main", "committer_date": 1630659756000, "content_id": "77de35ce4ddff15ac1695adb50e8654c698ad856", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e98e55957ee6aff35a0cd095b45b621a9f87008b", "extension": "py", ...
2.375
stackv2
# # Copyright (c) 2021 Facebook, Inc. and its affiliates. # # This file is part of NeuralDB. # See https://github.com/facebookresearch/NeuralDB for further info. # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy...
165
36.12
104
23
1,331
python
[{"finding_id": "codeql_py/overly-large-range_dbdb83cb80f59e3f_7f11d8f5", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with 0-9 in the same character class, and is equivalent to \\[+...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with 0-9 in the same character class, and is equivalent to \\[+,\\-.\\/0-9:\\]." ]
[ 57 ]
[ null ]
[ 97 ]
[ 100 ]
2024-11-19T02:07:10.201128+00:00
1,567,097,049,000
53d565e0a80e8d6fd95202c0f3fca705b9fe18c7
3
{ "blob_id": "53d565e0a80e8d6fd95202c0f3fca705b9fe18c7", "branch_name": "refs/heads/master", "committer_date": 1567097049000, "content_id": "2eedccf3bf2cfb54d9efd19220774948cc630ad1", "detected_licenses": [ "MIT" ], "directory_id": "f4ddba94acd7584abf4de2a64fc3974a56619ddf", "extension": "py", "fi...
2.75
stackv2
from bs4 import BeautifulSoup import requests import csv source = requests.get( 'https://www.knowles.com/subdepartment/dpt-microphones/subdpt-sisonic-surface-mount-mems', verify=False).text soup = BeautifulSoup(source, 'lxml') # print(soup.prettify().encode('utf8')) csv_file = open('kevin_scrape_knpart.csv', 'w'...
31
33.94
113
17
267
python
[{"finding_id": "codeql_py/request-without-cert-validation_6ec9903dd825b4d7_ffc19ebd", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 5 ]
[ 6 ]
[ 10 ]
[ 109 ]
2024-11-19T02:31:14.080480+00:00
1,606,835,148,000
fc02dbc4f19fd80f09484e2322504555feeac6eb
3
{ "blob_id": "fc02dbc4f19fd80f09484e2322504555feeac6eb", "branch_name": "refs/heads/master", "committer_date": 1606835148000, "content_id": "aff5361b082d67ec571c768ee2298183f4fa9492", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "6bf3f959f56bca0a05fe174c10f7ee97cb545899", "extension": "p...
2.875
stackv2
import aiorcon import asyncio import string import time import sys import getopt from itertools import chain, product ip = "127.0.0.1" port = "20175" chars = "string.ascii_lowercase" lenght = 4 def ip_port_parse(ip_input): global ip global port ip = ip_input.split(':', 1)[0] port = ip_input[ip_input....
76
23.14
71
15
461
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e26ea9762edf7efe_042b6208", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 38 ]
[ null ]
[ 31 ]
[ 43 ]
2024-11-19T02:31:15.795879+00:00
1,687,675,916,000
eeff2b5a3fbff93b62d6d49e4c96c302ee24e2a6
2
{ "blob_id": "eeff2b5a3fbff93b62d6d49e4c96c302ee24e2a6", "branch_name": "refs/heads/master", "committer_date": 1687675916000, "content_id": "5225032566c07cbd72794c8fbbf41c09f47da5d9", "detected_licenses": [ "Apache-2.0" ], "directory_id": "8cae186abe4880375ccbea9b404a2f5f349a40ab", "extension": "py"...
2.359375
stackv2
import os from typing import Optional import uvicorn from diskcache import Cache from fastapi import FastAPI from fastapi import File from fastapi import UploadFile from starlette.middleware.cors import CORSMiddleware from starlette.requests import Request from starlette.responses import FileResponse from operations.co...
123
31.34
97
14
982
python
[{"finding_id": "codeql_py/stack-trace-exposure_6e950fee99ccd09f_65947d6d", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
7
true
[ "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-022" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information...
[ 49, 59, 70, 81, 98, 120, 46 ]
[ null, null, null, null, null, null, null ]
[ 16, 16, 16, 16, 16, 16, 29 ]
[ 48, 48, 48, 48, 48, 48, 37 ]
2024-11-19T02:32:00.618511+00:00
1,567,675,198,000
b74e55bd349de547c38026e8780a3bdf8a56babe
3
{ "blob_id": "b74e55bd349de547c38026e8780a3bdf8a56babe", "branch_name": "refs/heads/master", "committer_date": 1567675198000, "content_id": "327a81524de588f8151b09ae480e0dc5152bfdbe", "detected_licenses": [ "MIT" ], "directory_id": "2d0fece181a920e3a862bfbd9537b685376a6321", "extension": "py", "fi...
2.921875
stackv2
import requests import os def get_credentials(filepath='credentials.txt', debug=0): with open(filepath, "r") as f: data = f.readlines() username = data[0].strip() password = data[1].strip() if (debug): print("Fetched username [%r] and password [%r]" % (username, password)) ...
32
26
108
11
217
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2e44a0901b512f76_ec77a639", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-295" ]
[ "py/clear-text-logging-sensitive-data", "py/request-without-cert-validation" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This request may run without certificate validation because [it is disabled](1)." ]
[ 11, 24 ]
[ null, null ]
[ 15, 13 ]
[ 79, 50 ]
2024-11-19T02:32:01.777275+00:00
1,439,493,910,000
f0ee89d711830d6534b8f8f5f8e15f4f34efb70b
3
{ "blob_id": "f0ee89d711830d6534b8f8f5f8e15f4f34efb70b", "branch_name": "refs/heads/master", "committer_date": 1439493910000, "content_id": "769a0774d7e6dab960d40ce87429200281cc23b3", "detected_licenses": [ "MIT" ], "directory_id": "f17e5ab56de5a41c4f777f6057b2eea4972e41c2", "extension": "py", "fi...
2.78125
stackv2
import os import shutil import jinja2 from saliere.core import UsageError class Templatizer: """Template manager. Handles all the template related operations. """ def __init__(self, template_path_list=None, template_type=None): """Initializer. :param template_path_list: the list o...
174
36.68
119
18
1,283
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_0a677fafe1a887e5_a9f137e7", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 63 ]
[ null ]
[ 25 ]
[ 95 ]
2024-11-19T02:32:19.101569+00:00
1,686,710,351,000
0e9c6227dd2a12527403c933051a924c26433a23
4
{ "blob_id": "0e9c6227dd2a12527403c933051a924c26433a23", "branch_name": "refs/heads/master", "committer_date": 1686710351000, "content_id": "f397ade110e233d2a0f8be6335a12be2cc41ea88", "detected_licenses": [ "MIT" ], "directory_id": "9df9957c066dffd2ef44461412361d03c3fdc9d7", "extension": "py", "fi...
3.875
stackv2
import random import string def generate_password(length): """Generate a random password with the given length.""" characters = string.ascii_letters + string.digits + string.punctuation password = ''.join(random.choice(characters) for _ in range(length)) return password def save_password(username, pas...
22
33.18
78
11
161
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_b7670753da7f1444_c52cd8fe", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (password)](3) as clear text." ]
[ 13 ]
[ null ]
[ 17 ]
[ 44 ]
2024-11-19T02:32:46.660000+00:00
1,451,420,670,000
25adc91c208df986161d88ca6ea373ff137b3a69
3
{ "blob_id": "25adc91c208df986161d88ca6ea373ff137b3a69", "branch_name": "refs/heads/master", "committer_date": 1451420670000, "content_id": "77888ef26490a5c50513cb2ba56914953b12cd24", "detected_licenses": [ "MIT" ], "directory_id": "6dad21adece86687a165472fb107153215553d82", "extension": "py", "fi...
2.703125
stackv2
import six import json import time import hashlib from six.moves import urllib from . import exceptions def set_key(key): if len(key) != 32: raise exceptions.MixpanelKeyInvalid( "API key must be 32 characters long.") Request._api_key = key def set_secret(secret): if len(secret) != 3...
167
27.76
76
18
1,038
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_816fd8cdd6cc3682_8493a812", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 123 ]
[ null ]
[ 25 ]
[ 40 ]
2024-11-19T02:32:52.211458+00:00
1,558,362,205,000
5d9304c65c03e873db76553fe9115a6101cc96a1
2
{ "blob_id": "5d9304c65c03e873db76553fe9115a6101cc96a1", "branch_name": "refs/heads/master", "committer_date": 1558362205000, "content_id": "61c92e87e5ab4bc9473fe5fada99de4b2bf0509b", "detected_licenses": [ "Apache-2.0" ], "directory_id": "b65de565d19980c9002c672dc4342728e279babf", "extension": "py"...
2.34375
stackv2
import requests from flask import Flask, request, Response import os import json import datetime import logger as log import dateutil.relativedelta app = Flask(__name__) logger = log.init_logger("dynamic-url-proxy", os.environ.get("LOGLEVEL", "INFO")) methods = [ "GET", "POST", "PUT", "DELETE", "...
109
27.61
83
18
684
python
[{"finding_id": "codeql_py/stack-trace-exposure_14b6342bcf3b98ae_1c79f869", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
4
true
[ "CWE-209", "CWE-094", "CWE-215", "CWE-918" ]
[ "py/stack-trace-exposure", "py/code-injection", "py/flask-debug", "py/full-ssrf" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "This code execution depends on a [user-provided value](1).", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "The full URL of this request depe...
[ 31, 58, 87, 63 ]
[ null, null, 91, 70 ]
[ 18, 40, 9, 13 ]
[ 31, 45, 52, 31 ]
2024-11-19T02:32:54.223272+00:00
1,621,492,255,000
4547981433552bfa255912740be9b900548fb79e
2
{ "blob_id": "4547981433552bfa255912740be9b900548fb79e", "branch_name": "refs/heads/master", "committer_date": 1621492255000, "content_id": "1a10d3717369b46c10936f4aa9a3889ffb597ab2", "detected_licenses": [ "MIT" ], "directory_id": "eec83dac18ddecd0b8ee8679f9b9d10f7506b64b", "extension": "py", "fi...
2.484375
stackv2
import sys import ConfigParser import os from io import StringIO from neo4j.v1 import GraphDatabase, basic_auth, CypherError from passlib.hash import argon2 def setup_neo4j_driver(host, port, password): default_password = 'neo4j' # Travis will use a fresh Neo4j, with the default password. local_password = pas...
52
37.96
122
17
508
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_328e755558fc7229_f3dbb8a4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 31 ]
[ null ]
[ 83 ]
[ 97 ]
2024-11-19T02:32:56.689544+00:00
1,689,348,860,000
414436c7bdf53e13fb24f69ca29aab525330772f
2
{ "blob_id": "414436c7bdf53e13fb24f69ca29aab525330772f", "branch_name": "refs/heads/master", "committer_date": 1689348860000, "content_id": "e982dd22a83fbc5fb5ea0a4138d6744204690f0d", "detected_licenses": [ "MIT" ], "directory_id": "f6bc15034ee1809473279c87e13cc3131bc3675c", "extension": "py", "fi...
2.359375
stackv2
"""Database models for the users app.""" from __future__ import annotations from hashlib import blake2b from pathlib import PurePath from secrets import token_hex from django.conf import settings from django.contrib.auth.models import User from django.db import models from django.urls import reverse from MangAdvent...
146
26.77
75
18
915
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_46979b66bfa4df9f_b042ea3a", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (BLAKE2B) that is i...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (BLAKE2B) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 77 ]
[ null ]
[ 17 ]
[ 30 ]
2024-11-19T02:43:29.362431+00:00
1,502,469,488,000
ddf50aba836260d93ca494c0855a47eaf5c62589
3
{ "blob_id": "ddf50aba836260d93ca494c0855a47eaf5c62589", "branch_name": "refs/heads/master", "committer_date": 1502469488000, "content_id": "52adbd8da456fc8f2b7aa1aa4e5097c258170bc7", "detected_licenses": [ "MIT" ], "directory_id": "d7b5940c376b758c47bf3e06a5bd013380c72b1d", "extension": "py", "fi...
2.8125
stackv2
import hashlib from web_interface import persistents def login_persistent(username: str, password: str) -> bool: db = persistents.get_connection() cursor = db.cursor() cursor.execute("""SELECT `password` FROM `users` WHERE `username`=%s;""", username) result = cursor.fetchone() if result: ...
19
27.32
87
11
138
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_246b435ce611f30d_e1be20dc", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 18 ]
[ null ]
[ 14 ]
[ 40 ]
2024-11-19T02:43:34.425794+00:00
1,620,654,499,000
2c46634edf23310df51f31836e218446925db38c
3
{ "blob_id": "2c46634edf23310df51f31836e218446925db38c", "branch_name": "refs/heads/main", "committer_date": 1620654499000, "content_id": "8c8f8b8f3e8f2fb29b2aeb138a97a71673649e41", "detected_licenses": [ "Apache-2.0" ], "directory_id": "14c7357a7fca6bb06b01bfc5a895b5809db26da5", "extension": "py", ...
2.734375
stackv2
# Have Cassandra running, run this a server (python3 capAnalysis.py), and use HTTP requests to run a writer or reader off of it ("http://localhost:5000/{{path}}"). # Imports import os, sys, datetime, time, string, random, uuid, csv, subprocess, requests from datetime import datetime as dt # pip3 install cassandra-driv...
132
39.89
177
19
1,151
python
[{"finding_id": "codeql_py/path-injection_f1a93b855dc0bd4c_59fb1a08", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
4
true
[ "CWE-022", "CWE-089", "CWE-089", "CWE-089" ]
[ "py/path-injection", "py/sql-injection", "py/sql-injection", "py/sql-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This SQL query depends on a [user-provided value](1).", "This SQL query depends on a [user-provided value](1).", "This SQL query depends on a [user-provided value](1)." ]
[ 93, 38, 47, 54 ]
[ null, null, null, null ]
[ 15, 21, 21, 28 ]
[ 23, 26, 26, 76 ]
2024-11-19T02:54:50.543077+00:00
1,620,054,465,000
053edbfd1d82e1688bbb124e751039c859d5b672
3
{ "blob_id": "053edbfd1d82e1688bbb124e751039c859d5b672", "branch_name": "refs/heads/master", "committer_date": 1620054465000, "content_id": "6465aaff3e1db7898ee24717cedac1afd474ed06", "detected_licenses": [ "MIT" ], "directory_id": "762577e133e930480c297b92eda63598f5a6f13e", "extension": "py", "fi...
2.75
stackv2
import gzip import socket import ssl import sys import zlib try: import brotli except ImportError: brotli = None def request(url): # 1. Parse scheme scheme, url = url.split(":", 1) assert scheme in ["http", "https", "data"], f"Unknown scheme {scheme}" port = 80 if scheme == "http" else 443 ...
151
27.63
87
16
1,074
python
[{"finding_id": "codeql_py/insecure-protocol_d926d0b75de3eb54_ee401567", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/...
1
true
[ "CWE-327" ]
[ "py/insecure-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.create_default_context](1)." ]
[ 37 ]
[ null ]
[ 18 ]
[ 21 ]
2024-11-19T02:55:07.316825+00:00
1,389,174,712,000
21ea4e51e0e9137cf55c9a03661fe4dd68571acf
2
{ "blob_id": "21ea4e51e0e9137cf55c9a03661fe4dd68571acf", "branch_name": "refs/heads/master", "committer_date": 1389174712000, "content_id": "4c7293eefa81c2d3538a587a274b1e191c9be45b", "detected_licenses": [ "MIT" ], "directory_id": "1b6931e6cc61962f06b7d10d52a2607b863b76ef", "extension": "py", "fi...
2.3125
stackv2
import webapp2 import jinja2 from google.appengine.api import users from google.appengine.ext.blobstore import blobstore from models import Album, Photo, Comment from utils import get_user, DEFAULT_DOMAIN_KEY from photos import delete_photo env = jinja2.Environment( loader=jinja2.FileSystemLoader('templates') )...
409
24.23
89
16
2,103
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_6d0c593b4ef247e9_e1492c8f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 12 ]
[ 14 ]
[ 7 ]
[ 2 ]
2024-11-19T02:55:22.464564+00:00
1,513,246,917,000
8ea10c19c46ca08730b1160624c67dbd13dc0cf2
2
{ "blob_id": "8ea10c19c46ca08730b1160624c67dbd13dc0cf2", "branch_name": "refs/heads/master", "committer_date": 1513246917000, "content_id": "070334e6e1582bd75aad004cd8728f92d8930025", "detected_licenses": [ "Apache-2.0" ], "directory_id": "ec5a5879a6c99aa8fdcd0f952fa7f7a6ea4801b0", "extension": "py"...
2.453125
stackv2
import json import uuid from flask import Flask, request, redirect, url_for, jsonify, send_from_directory from flask_cors import CORS from werkzeug.utils import secure_filename import os from utils.mongoUtil import get_mongo_client UPLOAD_FOLDER = '../../data/files' ALLOWED_EXTENSIONS = set(['txt', 'pdf', 'png', 'jpg...
169
30.4
151
19
1,355
python
[{"finding_id": "codeql_py/flask-debug_2b2e26e5ad43af39_228c4d3c", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
4
true
[ "CWE-215", "CWE-601", "CWE-601", "CWE-022" ]
[ "py/flask-debug", "py/url-redirection", "py/url-redirection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 165, 39, 46, 77 ]
[ 169, null, null, null ]
[ 5, 29, 29, 15 ]
[ 6, 40, 40, 23 ]
2024-11-19T02:55:29.605583+00:00
1,600,216,488,000
6bcc05314c7f5f763220a51c28247892bda08b81
3
{ "blob_id": "6bcc05314c7f5f763220a51c28247892bda08b81", "branch_name": "refs/heads/master", "committer_date": 1600216488000, "content_id": "59bc6c8dea722de5a3b19cacbdca2d74ba544163", "detected_licenses": [ "Apache-2.0" ], "directory_id": "798ec3fbb9ef7cb376616a58427e9359c323ba89", "extension": "py"...
2.703125
stackv2
"""Orange and Rockland Utility Smart Energy Meter""" import requests import logging import asyncio from pyppeteer import launch import os import json import pyotp _LOGGER = logging.getLogger(__name__) class MeterError(Exception): pass class Meter(object): """A smart energy meter of Orange and Rockland Util...
151
39.95
152
15
1,405
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_97a94de57bff8a74_f4994791", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 47 ]
[ null ]
[ 40 ]
[ 53 ]
2024-11-19T02:55:37.879356+00:00
1,571,081,910,000
555b22d6ef0ad9272d73bb95964c87358dfbfc66
3
{ "blob_id": "555b22d6ef0ad9272d73bb95964c87358dfbfc66", "branch_name": "refs/heads/master", "committer_date": 1571081910000, "content_id": "db6246a6677b4cf9b9e4dd0efcb261d625c3598a", "detected_licenses": [ "MIT" ], "directory_id": "c3261fb977ae26d7a40e619dace8fa06df738882", "extension": "py", "fi...
2.859375
stackv2
#!/python """ Download script for google drive shared links Thank you @turdus-merula and Andrew Hundt! https://stackoverflow.com/a/39225039/623735 """ import sys import requests from tqdm import tqdm from nlpia.loaders import get_url_title def get_url_filename(url=None, driveid=None): url = url or 'https://dri...
72
31.5
110
22
592
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_43e55cbf67ce1596_fc8c5fea", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [https://drive.google.com](1) may be at an arbitrary po...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [https://drive.google.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 15 ]
[ null ]
[ 8 ]
[ 50 ]
2024-11-19T02:55:48.762599+00:00
1,476,954,738,000
d4efabea4a0da4a7f3e891edb4338210af17ee2a
2
{ "blob_id": "d4efabea4a0da4a7f3e891edb4338210af17ee2a", "branch_name": "refs/heads/master", "committer_date": 1476954738000, "content_id": "e64952cd639d96affe46c5ce4f5e487ac7bfc940", "detected_licenses": [ "Apache-2.0" ], "directory_id": "0f4e6f36eb4f651fc725191f242f217fef0f667d", "extension": "py"...
2.484375
stackv2
#!/usr/bin/python # -*- coding: utf-8 -*- DOCUMENTATION = ''' --- module: ipa_sudocmd author: Thomas Krahn (@Nosmoht) short_description: Manage FreeIPA sudo command description: - Add, modify or delete sudo command within IPA server using IPA API. options: sudocmd: description: - Sudo Command. aliases: [...
244
30.03
119
21
1,796
python
[{"finding_id": "codeql_py/request-without-cert-validation_dbbc45823c91e820_bc5ea766", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 108, 128 ]
[ null, null ]
[ 17, 17 ]
[ 81, 120 ]
2024-11-19T02:55:54.755190+00:00
1,600,057,345,000
ba50a3d1f2721da10f63d6445ad3d8bf5933143c
2
{ "blob_id": "ba50a3d1f2721da10f63d6445ad3d8bf5933143c", "branch_name": "refs/heads/master", "committer_date": 1600057345000, "content_id": "f2110dd5a156da3685680754986e5a688374bd0a", "detected_licenses": [ "MIT" ], "directory_id": "25257c49dd6caeb708de5be93f705a928db2fc35", "extension": "py", "fi...
2.375
stackv2
from updater import Receiver from flask import Flask from symbols import SymbolManager import tornado.ioloop import tornado.web import json import time import argparse import logging import sys logFormatter = logging.Formatter("%(asctime)s [%(threadName)-12.12s] [%(levelname)-5.5s] %(message)s") log = logging.getLo...
131
31.7
107
16
948
python
[{"finding_id": "codeql_py/log-injection_6097990511913514_8682978c", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 30 ]
[ null ]
[ 18 ]
[ 69 ]
2024-11-19T03:10:23.112685+00:00
1,511,999,316,000
13fbc6e257b4ef597d9572fedcee70600959a41d
3
{ "blob_id": "13fbc6e257b4ef597d9572fedcee70600959a41d", "branch_name": "refs/heads/master", "committer_date": 1511999316000, "content_id": "73c301cc3ae66bd7a47e549cf56ab8331570e003", "detected_licenses": [ "MIT" ], "directory_id": "235d1ba278f62e73d40eb61d3d7627ce332847b3", "extension": "py", "fi...
2.609375
stackv2
import paramiko, getpass from paramiko_server import ParamikoServer import time class LoginServer(ParamikoServer): def __init__(self, utup, cpus, roots, credentials): super(LoginServer, self).__init__(utup, cpus, roots, credentials) if 'password' not in credentials: credentials['passwor...
57
41.11
128
18
587
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_2153f842c51a3320_1f928c8e", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 13 ]
[ null ]
[ 9 ]
[ 69 ]
2024-11-19T03:10:51.162821+00:00
1,612,534,924,000
473cb47ce3c0547f3389b5345e11ae6192586209
3
{ "blob_id": "473cb47ce3c0547f3389b5345e11ae6192586209", "branch_name": "refs/heads/master", "committer_date": 1612534924000, "content_id": "f70285bf0c127bd9449019b899b0766290314975", "detected_licenses": [ "Apache-2.0" ], "directory_id": "72576634167525e0f39c5e87f706ab7aeaf14f36", "extension": "py"...
2.859375
stackv2
import argparse, subprocess, os, re from jinja2 import Environment, FileSystemLoader def GetBaseName(full_path): return os.path.basename(full_path) class PlantUMLCodeGeneration(): class StateType(): def __init__(self): self.entry = None self.during = None self.exit...
255
42.45
117
23
2,340
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_1c7e7151f40960f1_76e0d4dd", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 216 ]
[ 218 ]
[ 15 ]
[ 10 ]
2024-11-19T03:21:44.389401+00:00
1,596,983,909,000
bf7243aae3650b14461bed5a1b0a11b69b9dfc73
3
{ "blob_id": "bf7243aae3650b14461bed5a1b0a11b69b9dfc73", "branch_name": "refs/heads/master", "committer_date": 1596983909000, "content_id": "cf862328b34e87e29deb93f806da2302d8f8e364", "detected_licenses": [ "MIT" ], "directory_id": "b2fae8c81889ba3d693d0a64be29d4bc1d857555", "extension": "py", "fi...
2.53125
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- import codecs import os import shutil from update_archive import update_archive headers = {'Accept': '*/*', 'Accept-Language': 'en-US,en;q=0.8', 'Cache-Control': 'max-age=0', 'User-Agent': 'Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/5...
263
37.84
152
29
2,455
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_bb41961989857f66_d00fc541", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [v.qq.com](1) may be at an arbitrary position in the sa...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [v.qq.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 114 ]
[ null ]
[ 30 ]
[ 52 ]
2024-11-19T03:22:15.686126+00:00
1,445,980,126,000
11f152904a45a47a108afe247739dd50785a0f11
2
{ "blob_id": "11f152904a45a47a108afe247739dd50785a0f11", "branch_name": "refs/heads/master", "committer_date": 1445980126000, "content_id": "0426b50a1f114aea638f619ca42ac552699d2e87", "detected_licenses": [ "MIT" ], "directory_id": "311df915ca62ea3c5d57a18e6844cd425f262870", "extension": "py", "fi...
2.390625
stackv2
#!/usr/bin/env python # # This file is part of ravstack. Ravstack is free software available under # the terms of the MIT license. See the file "LICENSE" that was provided # together with this source file for the licensing terms. # # Copyright (c) 2015 the ravstack authors. See the file "AUTHORS" for a # complete list....
174
30.79
87
16
1,305
python
[{"finding_id": "codeql_py/overly-permissive-file_b768eb668f03e18c_1cd4460f", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable." ]
[ 80 ]
[ null ]
[ 9 ]
[ 33 ]
2024-11-19T03:22:23.510670+00:00
1,668,183,595,000
645ad86bc9b5420a0aae52cdfeb21363deda84fd
3
{ "blob_id": "645ad86bc9b5420a0aae52cdfeb21363deda84fd", "branch_name": "refs/heads/master", "committer_date": 1668183595000, "content_id": "60206ac63a3bb50ce86818af585b609d1c08f4c3", "detected_licenses": [ "MIT" ], "directory_id": "b4df029484ef5e4e2ae6027920cb12de7a6bc5ff", "extension": "py", "fi...
3.234375
stackv2
import re from typing import List def is_increasing(text: str) -> bool: return text == "".join(sorted(text)) def matches_pattern(text: str) -> bool: return re.search(r'(\d)\1', text) is not None def get_number_of_matching_passwords(passwords: List[str]) -> int: return len([p for p in passwords if is_inc...
23
35.74
88
12
231
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fb70c2d87c94c18f_e196dbe3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 22, 23 ]
[ null, null ]
[ 11, 11 ]
[ 54, 61 ]
2024-11-19T03:43:56.183962+00:00
1,526,857,263,000
1b45b534bbe67819795c872d7871166d051b6b27
3
{ "blob_id": "1b45b534bbe67819795c872d7871166d051b6b27", "branch_name": "refs/heads/master", "committer_date": 1526857263000, "content_id": "83612026052a4064c281ae3bf5c7718a2d8d001b", "detected_licenses": [ "MIT" ], "directory_id": "f0a935d0ec6febe9d5480ecc5c3bd7c990db9d29", "extension": "py", "fi...
2.875
stackv2
import sqlite3 import flask import jinja2 import sys import json app = flask.Flask(__name__) class Product: def __init__(self, prod_id): conn = sqlite3.connect('product.db') c = conn.cursor() statement = "SELECT * FROM product WHERE product.product_id = '{}';".format(prod_id)...
76
26.22
94
14
486
python
[{"finding_id": "codeql_py/flask-debug_c4a8bcf2a0692379_302af64b", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-089" ]
[ "py/flask-debug", "py/sql-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This SQL query depends on a [user-provided value](1)." ]
[ 75, 16 ]
[ null, null ]
[ 5, 19 ]
[ 35, 28 ]
2024-11-19T03:44:26.877728+00:00
1,581,333,533,000
12d2fdda0e98c0ce295ded06f75391d2be28fa72
3
{ "blob_id": "12d2fdda0e98c0ce295ded06f75391d2be28fa72", "branch_name": "refs/heads/master", "committer_date": 1581333533000, "content_id": "75c0072b82c4cac725a7cdc239fd8b5be5556625", "detected_licenses": [ "MIT" ], "directory_id": "3bf3eb0ddd454f9afa6728d5dee28e04ae2e104e", "extension": "py", "fi...
2.78125
stackv2
import boto3 import paramiko import time import uuid import datetime import os import xbow class ConnectedInstance(object): """ An Instance you can talk to""" def __init__(self, instance, username=None, key_filename=None): """ Create a ConnectedInstance. Args: instance (bo...
298
37.43
157
18
2,287
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_5d1e56315bf35610_61f0c47f", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/paramiko-missing-host-key-validation", "py/paramiko-missing-host-key-validation" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe.", "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 38, 220 ]
[ null, null ]
[ 9, 5 ]
[ 77, 68 ]
2024-11-19T01:44:09.158528+00:00
1,579,221,197,000
d9e9068fe69cc2d5194743a94197ccec11f5e783
3
{ "blob_id": "d9e9068fe69cc2d5194743a94197ccec11f5e783", "branch_name": "refs/heads/master", "committer_date": 1579221197000, "content_id": "acdca10a045aec326c92a1ef1bcd67f693469ad5", "detected_licenses": [ "MIT" ], "directory_id": "e47e807fe01f0bbfc00bc0f008d18766eb8d4c0c", "extension": "py", "fi...
2.671875
stackv2
#!/usr/bin/python import argparse import json import re import readline import requests import sys import time cmdlist = ["exit", "help", "dump_old", "dump_new", "postgresqli", "mysqli", "mssqli", "nosqli", "mutation", "edges", "node", "$regex", "$ne", "__schema"] def auto_completer(text, state): options = [x fo...
62
39.53
179
15
676
python
[{"finding_id": "codeql_py/request-without-cert-validation_d43dd328124fa4c9_cd8edfeb", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 33, 38 ]
[ null, null ]
[ 13, 13 ]
[ 73, 90 ]
2024-11-19T02:57:56.965738+00:00
1,610,952,174,000
4962089b4b5cb8ece1b9bf85f7ed15eaa7d9a574
3
{ "blob_id": "4962089b4b5cb8ece1b9bf85f7ed15eaa7d9a574", "branch_name": "refs/heads/main", "committer_date": 1610952174000, "content_id": "163cc0678a911ba7ca34dd1bd9945ebff006921a", "detected_licenses": [ "MIT" ], "directory_id": "ee229768cb61e1c303d601431bf71861533a1038", "extension": "py", "file...
3.0625
stackv2
#Importing all the packages import math import json import statistics import time # Asking user to select for modes print("===Welcome to Hospital Management===") print("Select your login option.") print("★ Admin") print("★ Doctor") print("★ Patient") print("====================================") # Login Function wor...
167
25.11
125
13
1,099
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4250096d86d671c5_6a18a597", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 142 ]
[ null ]
[ 90 ]
[ 105 ]
2024-11-19T02:57:57.544256+00:00
1,628,795,358,000
f690b3cd3b2a99926963604c4e00f2eea3cdb584
3
{ "blob_id": "f690b3cd3b2a99926963604c4e00f2eea3cdb584", "branch_name": "refs/heads/main", "committer_date": 1628795358000, "content_id": "25d3300205169361723967775be68663e49b3866", "detected_licenses": [ "MIT" ], "directory_id": "e63c2b260a8dbc2a61243761f7c8e41a474dcf88", "extension": "py", "file...
2.53125
stackv2
import os, csv, io from flask import Flask from flask import request, redirect, url_for from werkzeug.utils import secure_filename from csv_test import * # UPLOAD_FOLDER = '/home/pi/flaskproject/hackthehack/uploads' app = Flask(__name__) # app.config['UPLOAD_FOLDER'] = UPLOAD_FOLDER def allowed_file(filename): r...
46
28.67
72
18
337
python
[{"finding_id": "codeql_py/url-redirection_9abbc39990dc7daa_c39981c9", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
2
true
[ "CWE-601", "CWE-601" ]
[ "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 24, 29 ]
[ null, null ]
[ 20, 20 ]
[ 31, 31 ]
2024-11-19T03:22:41.698590+00:00
1,580,625,927,000
61e98a7921095a8567bc4d223404ec7929439439
2
{ "blob_id": "61e98a7921095a8567bc4d223404ec7929439439", "branch_name": "refs/heads/master", "committer_date": 1580625927000, "content_id": "2d83364df011411eb319f847688c16e9858f4ecc", "detected_licenses": [ "MIT" ], "directory_id": "08d54bd3934dbbd6ae28dbf77833c53733169ca1", "extension": "py", "fi...
2.359375
stackv2
import json import os import typing as t from urllib.parse import urljoin from Cryptodome.Hash import SHA1 from Cryptodome.PublicKey import RSA from Cryptodome.Signature import PKCS1_v1_5 from requests import Response, request def get_url(path: str) -> str: return urljoin(os.environ.get("BASE_URL", ""), path) ...
49
28.71
78
12
376
python
[{"finding_id": "codeql_py/weak-crypto-key_2d4efd67ab34375c_e86be250", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",...
1
true
[ "CWE-326" ]
[ "py/weak-crypto-key" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable." ]
[ 20 ]
[ null ]
[ 11 ]
[ 49 ]
2024-11-19T03:22:59.047973+00:00
1,609,960,024,000
86beaf7396dba944c719c95cc963921bb0c393b4
2
{ "blob_id": "86beaf7396dba944c719c95cc963921bb0c393b4", "branch_name": "refs/heads/master", "committer_date": 1609960024000, "content_id": "0b5f02f2b4138084c68d64e477822a03e742a7cf", "detected_licenses": [ "Apache-2.0" ], "directory_id": "9a167f56c823a4d5b8a63a5139dc68fa141b539a", "extension": "py"...
2.46875
stackv2
# Copyright 2020 Google LLC # # Licensed under the Apache License, Version 2.0 (the License); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # https://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, sof...
113
26.86
80
9
747
python
[{"finding_id": "codeql_py/redos_30d4076846fe6d44_6dbc0c46", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'A_' and containing many repetitio...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with 'A_' and containing many repetitions of '_'." ]
[ 33 ]
[ null ]
[ 58 ]
[ 60 ]
2024-11-19T03:44:11.351560+00:00
1,619,462,815,000
7144289b9e9b6f23e908982c39458bae5c092e53
3
{ "blob_id": "7144289b9e9b6f23e908982c39458bae5c092e53", "branch_name": "refs/heads/master", "committer_date": 1619462815000, "content_id": "6ac73944379d0ce71302e106c15276cd77b6223d", "detected_licenses": [ "MIT" ], "directory_id": "bfff7f7aee7c4cb87854b159f1b79a897678f6a9", "extension": "py", "fi...
3.0625
stackv2
import random as rn import string from enum import Enum import sys import os from PIL import Image, ImageDraw, ImageFont class OutOfRange(Exception): pass class Utils: def exit(self): return sys.exit() def clear(self): os.system("cls" if os.name == "nt" else "clear") class Picker: ...
267
29.72
122
20
1,780
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9e88cf3b86516a2a_b26d01e7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 227 ]
[ null ]
[ 15 ]
[ 67 ]
2024-11-19T01:34:43.959400+00:00
1,540,810,469,000
87ad1ca99bdb79fda49af2c4717e9019e62f7c2c
2
{ "blob_id": "87ad1ca99bdb79fda49af2c4717e9019e62f7c2c", "branch_name": "refs/heads/master", "committer_date": 1540810469000, "content_id": "2382bbf9601c9299481e2d428cf6fa8c76d249c8", "detected_licenses": [ "MIT" ], "directory_id": "b36a6a0cbd53e420129615f6b1576e1f56169c63", "extension": "py", "fi...
2.4375
stackv2
# coding=utf-8 import logging import datetime import re from collections import defaultdict, OrderedDict from copy import copy import requests from .models import Route, DataProviderUrl,\ DataProviderTypes as p_types, RouteTypes, Point, Platform, Directions, RoutePoint, RouteWeekDimension, GeoDirections, \ ...
436
28.66
123
24
2,760
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b0d3678194f010a1_1b7d7136", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text.", "This expression logs [sensitive data (p...
[ 244, 253 ]
[ null, null ]
[ 25, 32 ]
[ 67, 83 ]
2024-11-19T01:34:53.548542+00:00
1,452,949,877,000
2d6b67bd2e53489de4babf72bb7944482b45ceec
3
{ "blob_id": "2d6b67bd2e53489de4babf72bb7944482b45ceec", "branch_name": "refs/heads/master", "committer_date": 1452950113000, "content_id": "980e24f41564cb294a327fa9c8026fda8acb4a7d", "detected_licenses": [ "MIT" ], "directory_id": "1d9a5fc68bdae20c95a6239cf9db84acc5417cbb", "extension": "py", "fi...
2.53125
stackv2
#! /usr/bin/env python3 import cherrypy import os import configparser import json from database import Database from jinja2 import Environment, FileSystemLoader class Server(): ''' Server Configuration: comic_url -> Base URL specified in server.conf transcript_url -> Transcipt URL specifie...
134
32.66
79
18
954
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_3c859b96dcdc697c_78b77563", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 111 ]
[ null ]
[ 11 ]
[ 51 ]
2024-11-19T01:35:09.095186+00:00
1,421,765,532,000
139d8713ba09005e9ec374ab5587191e324c88cf
2
{ "blob_id": "139d8713ba09005e9ec374ab5587191e324c88cf", "branch_name": "refs/heads/master", "committer_date": 1421765532000, "content_id": "2dadecd3f50fa883ae9c0303f6135bcbb973ab5a", "detected_licenses": [ "MIT" ], "directory_id": "a65208db8be9970ac8adab4167687589a6564808", "extension": "py", "fi...
2.328125
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- '''URL handlers''' import tornado.web from tornado.options import options import os from io import BytesIO import model import plist def get_manifest_url(identifier): '''Get manifest url''' url_format = 'https://{}/manifest/{}.plist' return url_format.form...
122
23.78
74
14
653
python
[{"finding_id": "codeql_py/reflective-xss_50f5db7ea1866a0a_340e40e2", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
3
true
[ "CWE-079", "CWE-079", "CWE-022" ]
[ "py/reflective-xss", "py/reflective-xss", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 54, 80, 87 ]
[ null, null, null ]
[ 24, 24, 23 ]
[ 70, 71, 47 ]
2024-11-19T01:55:44.672957+00:00
1,632,582,877,000
6d8dc175541eded1fe5183c9ea4e5d768cd77831
2
{ "blob_id": "6d8dc175541eded1fe5183c9ea4e5d768cd77831", "branch_name": "refs/heads/main", "committer_date": 1632582877000, "content_id": "dd2f67c4b2e4896dfc0df22b1035493837c2b9d6", "detected_licenses": [ "MIT" ], "directory_id": "939da916db5e9e4b6aa417ae5ecf2f387dfe686e", "extension": "py", "file...
2.421875
stackv2
from datetime import datetime, timedelta, date import re import aiohttp from async_timeout import timeout import logging import json logger = logging.getLogger(__name__) from voluptuous import Optional BASEURL="https://www.alphaess.com/api" HEADER = { "Content-Type": "application/json", "Connection": "keep-...
241
34.6
134
25
1,607
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bf883d588d277ef6_4df28d99", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 40 ]
[ null ]
[ 87 ]
[ 95 ]
2024-11-19T02:17:16.046439+00:00
1,507,175,842,000
546ec4b20566ab46aa9a582fee926fb188b5c8ee
3
{ "blob_id": "546ec4b20566ab46aa9a582fee926fb188b5c8ee", "branch_name": "refs/heads/master", "committer_date": 1507175842000, "content_id": "e32346ab761d7db0ece3b766f2a8f1ba781a642a", "detected_licenses": [ "MIT" ], "directory_id": "1e8bc69a1c308cba736991231c2e536ad0d35832", "extension": "py", "fi...
2.796875
stackv2
from collections import defaultdict import random from tqdm import tqdm random.seed(2324) kb = defaultdict(list) id2str = defaultdict(str) def readFB(filename): print("Reading file from 2M Freebase") fin = open(filename) lineid = 0 for line in tqdm(fin.readlines()): linesplit = line.strip().s...
130
33.88
133
21
1,098
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_fbd0ccfb380b61ab_91442057", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [www.freebase.com](1) may be at an arbitrary position i...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [www.freebase.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 44 ]
[ null ]
[ 8 ]
[ 45 ]
2024-11-19T02:17:35.931095+00:00
1,445,352,847,000
2b5c44253f0ea1ab1e0bdcec111f6fe14904fb24
2
{ "blob_id": "2b5c44253f0ea1ab1e0bdcec111f6fe14904fb24", "branch_name": "refs/heads/master", "committer_date": 1445352847000, "content_id": "d6a14283b6dd52776623d522bcccf01f1f44987b", "detected_licenses": [ "MIT" ], "directory_id": "cc58a89d909fc205a8c9863092da89d1ac635f9f", "extension": "py", "fi...
2.484375
stackv2
#!/usr/bin/env python from flask import Flask from flask.ext import restful from flask import request from flask.ext.cors import CORS import pandas as pd import sqlite3 import os currentpath = os.getcwd() conn = sqlite3.connect(currentpath+'/example.db') app = Flask("sqlproxy") api = restful.Api(app) cors = CORS(app)...
35
25.46
75
14
223
python
[{"finding_id": "codeql_py/sql-injection_a679a3bf895cd61d_288250bf", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown...
2
true
[ "CWE-089", "CWE-089" ]
[ "py/sql-injection", "py/sql-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This SQL query depends on a [user-provided value](1).", "This SQL query depends on a [user-provided value](1)." ]
[ 21, 28 ]
[ null, null ]
[ 36, 36 ]
[ 41, 41 ]
2024-11-19T02:18:06.630666+00:00
1,627,985,363,000
4a4a04f322608e206b6ccf3b375ea4339ce225c5
2
{ "blob_id": "4a4a04f322608e206b6ccf3b375ea4339ce225c5", "branch_name": "refs/heads/main", "committer_date": 1627985363000, "content_id": "b9d293bbd9121bdf4a8770433dbaa1bc95eead21", "detected_licenses": [ "Apache-2.0" ], "directory_id": "78e3a2a69ea889f83dcafa05050656d7f68e2cfc", "extension": "py", ...
2.359375
stackv2
import ssl from django.shortcuts import render from django.http import HttpResponse, JsonResponse from django.views.decorators.csrf import csrf_exempt from django.conf import settings import json import os import requests import yaml from ephem import * from datetime import datetime, timedelta import datetime from wea...
263
37.84
142
18
2,392
python
[{"finding_id": "codeql_py/request-without-cert-validation_f904459e1d68bf62_71322e56", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
3
true
[ "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 35, 52, 69 ]
[ null, null, null ]
[ 22, 18, 17 ]
[ 65, 61, 48 ]
2024-11-19T02:18:21.923949+00:00
1,567,025,889,000
36629484783a4e2652dbdbda4c59cc993cf1cfb6
2
{ "blob_id": "36629484783a4e2652dbdbda4c59cc993cf1cfb6", "branch_name": "refs/heads/master", "committer_date": 1567026152000, "content_id": "4c554ce1cd462b7bab4bddd50b412ec34bb89a30", "detected_licenses": [ "MIT" ], "directory_id": "2059cbbc305dbb3816b67a5a6d756ae6c4bc4630", "extension": "py", "fi...
2.484375
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- """Core functionality.""" import os import sys import argparse import importlib from pkg_resources import require, resource_filename, resource_listdir import cclib from jinja2 import Environment, FileSystemLoader, TemplateNotFound __version__ = require(__name__)[0].ver...
344
28.11
93
21
2,397
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_ffdec563bb5196cd_afe5a59f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 330 ]
[ 332 ]
[ 17 ]
[ 6 ]
2024-11-19T02:30:10.135141+00:00
1,446,797,416,000
34621f486d44ce1bbc914f061ffa85f0627ae1f2
3
{ "blob_id": "34621f486d44ce1bbc914f061ffa85f0627ae1f2", "branch_name": "refs/heads/master", "committer_date": 1446797416000, "content_id": "93a3a8f043d8accd0d4fd5a8694cbebe84d4ac55", "detected_licenses": [ "Apache-2.0" ], "directory_id": "19f62f881c042a7b34fa9cd5af7466bd32680f57", "extension": "py"...
2.96875
stackv2
""" generate-cdc-pyspark.py generate-cdc-script.py is a Python module which reads dataset config from a YAML document (see config.yaml in this project) , and then creates a Spark program in either PigLatin or PySpark which compares incoming text based delimited datasets with current versions of the same object stored...
120
39.49
159
12
1,352
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_2a2d14b926d1c669_0d93d0f6", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 99 ]
[ null ]
[ 15 ]
[ 58 ]
2024-11-19T02:30:35.001395+00:00
1,440,779,620,000
d1a9efe926c0e48156cd74be032d5ad6d1be419a
3
{ "blob_id": "d1a9efe926c0e48156cd74be032d5ad6d1be419a", "branch_name": "refs/heads/master", "committer_date": 1440779620000, "content_id": "257eb34dd2d85fb20a7b8b5f8f543f79a719bb6f", "detected_licenses": [ "MIT" ], "directory_id": "2c4e01e80a5733d800f89afa457d573d69352e7e", "extension": "py", "fi...
2.625
stackv2
#!/usr/bin/python # -*- coding: utf-8 -*- import sys import re import MDToLatexTemplates as Templates import subprocess def match(string, regex): return True if re.match(re.compile(regex), string) else False def ConvertMetadata(text): metadata_regex = r'^---\n(.*\n)+---$' if match(text, metadata_regex): metadat...
145
26.61
101
21
1,187
python
[{"finding_id": "codeql_py/redos_c2abad5d5ef1ad5c_0e05d29e", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '|' and containing many repetition...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '|' and containing many repetitions of '|'." ]
[ 47 ]
[ null ]
[ 22 ]
[ 24 ]
2024-11-19T02:31:15.717506+00:00
1,415,082,636,000
7c1cbd00834a71219493fbfa2b7fa21d8e7b77f6
2
{ "blob_id": "7c1cbd00834a71219493fbfa2b7fa21d8e7b77f6", "branch_name": "refs/heads/master", "committer_date": 1415082636000, "content_id": "fcead2abdda747496f103ea435b9b7556b95ff86", "detected_licenses": [ "Apache-2.0" ], "directory_id": "3fdc7d0ea9c526b00e55a0ba6f97e2b15eb6e6ca", "extension": "py"...
2.34375
stackv2
from datetime import datetime import flask import json import requests from sharebears import app import authn_google import authz import db from db import PaginatedSequence import filters from github_client import GitHubClient from post_processor import PostProcessor from renderable_item import RenderablePost import...
200
29.84
109
14
1,445
python
[{"finding_id": "codeql_py/url-redirection_e5305a19e42f3f3a_dc943f59", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 172 ]
[ null ]
[ 25 ]
[ 33 ]
2024-11-19T02:41:54.942004+00:00
1,574,644,947,000
92721c214a8d4eb60b4f21269acc78c4211951c4
3
{ "blob_id": "92721c214a8d4eb60b4f21269acc78c4211951c4", "branch_name": "refs/heads/master", "committer_date": 1574644947000, "content_id": "9f65ed27b69e4e86a1be79ef37824e92c7957031", "detected_licenses": [ "Apache-2.0" ], "directory_id": "2462e0d46b4ce8639dda517a4eb3edab59adbaf0", "extension": "py"...
2.828125
stackv2
#!/usr/bin/env python """ This is an example application of how to make use of Bottle to provide sub-request authentication with NGINX, particularly with a Gitea SQLite3 database. Copyright (c) 2019, Robert Cope/Cope Systems. License: Apache (see LICENSE file) """ from vendor import bottle from sqlite3 import dbapi2 a...
170
27.45
86
18
1,068
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_904d65f02e2c51a1_ead69d71", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 71 ]
[ 73 ]
[ 13 ]
[ 37 ]
2024-11-19T02:41:58.231905+00:00
1,565,692,352,000
ed10432af0154549d231b5ba594a36ebc8666419
3
{ "blob_id": "ed10432af0154549d231b5ba594a36ebc8666419", "branch_name": "refs/heads/master", "committer_date": 1565692352000, "content_id": "c270f3902e7c027f776d7dc032f94848f0276528", "detected_licenses": [ "MIT" ], "directory_id": "cb936481b04270d1574a355ecef016dc2fd0df28", "extension": "py", "fi...
2.625
stackv2
from flask import render_template,redirect,url_for,flash,request from . import auth from ..models import User from .forms import RegistrationForm,LoginForm from .. import db from flask_login import login_user,logout_user,login_required @auth.route('/create_account', methods = ['GET','POST']) def register(): """ ...
44
31.89
104
16
306
python
[{"finding_id": "codeql_py/url-redirection_e7d11657af248fa2_519a9731", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 33 ]
[ null ]
[ 29 ]
[ 78 ]
2024-11-19T02:42:24.284727+00:00
1,688,589,423,000
156feb6611a3258f3b013f3b1fe9e144dda47600
3
{ "blob_id": "156feb6611a3258f3b013f3b1fe9e144dda47600", "branch_name": "refs/heads/master", "committer_date": 1688589423000, "content_id": "f9bbcc5cd89a6e83e2dceb05b64c636aab081340", "detected_licenses": [ "MIT" ], "directory_id": "fd5c2d6e8a334977cda58d4513eb3385b431a13a", "extension": "py", "fi...
2.6875
stackv2
from jinja2 import Environment, FileSystemLoader import unicodedata import psycopg2 import re import os.path EXCLUDED_SUMMARY_LEVELS = ['190'] # if they don't work, put 'em here def write_profile_sitemaps(output_dir,db_connect_string='postgresql://census:censuspassword@localhost:5432/census'): ''' Builds sitemap ...
167
34.87
137
25
1,505
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_3825b6c5a093e462_17f73e7d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 78 ]
[ null ]
[ 11 ]
[ 54 ]
2024-11-19T02:50:45.578667+00:00
1,542,109,373,000
8aa9cc10ba083ba52d353bf3e24a3a71e8cecc31
3
{ "blob_id": "8aa9cc10ba083ba52d353bf3e24a3a71e8cecc31", "branch_name": "refs/heads/master", "committer_date": 1542109373000, "content_id": "6920907d4ad6e19292d37508bad75f1c1e47fc9d", "detected_licenses": [ "MIT" ], "directory_id": "17e16fbd0d8f2286a4650ef7afab5436b110dcaa", "extension": "py", "fi...
2.671875
stackv2
from flask import Flask, render_template, request, session from flask_session import Session import sys import datetime app = Flask(__name__) app.config["SESSION_PERMANENT"] = False app.config["SESSION_TYPE"] = "filesystem" Session(app) # notes = [] # global variable, not a good implementation @app.route("/") def...
81
22.23
67
14
451
python
[{"finding_id": "codeql_py/reflective-xss_e2c72b9da22246fe_2e6626b9", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 26 ]
[ null ]
[ 12 ]
[ 39 ]
2024-11-18T18:05:57.525880+00:00
1,553,022,348,000
8a43408b665d5577742802e15b616a5b207f4c3f
2
{ "blob_id": "8a43408b665d5577742802e15b616a5b207f4c3f", "branch_name": "refs/heads/master", "committer_date": 1553022348000, "content_id": "501f373dd525cad2aabefca061a4abfce3ceeff8", "detected_licenses": [ "MIT" ], "directory_id": "2bf629f8314314aac716841c07a4ef096499171e", "extension": "py", "fi...
2.5
stackv2
# import necessary libraries # import pandas as pd # import numpy as np from sqlalchemy.ext.automap import automap_base from sqlalchemy.orm import Session from sqlalchemy import create_engine, func from sqlalchemy import MetaData from sqlalchemy import inspect from sqlalchemy import Column, Integer, String, Float from...
116
27.39
111
14
766
python
[{"finding_id": "codeql_py/sql-injection_d2b3e3d1b42ad2f8_8f2af73d", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown...
1
true
[ "CWE-089" ]
[ "py/sql-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This SQL query depends on a [user-provided value](1)." ]
[ 100 ]
[ null ]
[ 70 ]
[ 73 ]
2024-11-18T18:06:02.149314+00:00
1,557,370,014,000
b50af62a121f88e1c0449733076c412decf0a06f
2
{ "blob_id": "b50af62a121f88e1c0449733076c412decf0a06f", "branch_name": "refs/heads/master", "committer_date": 1557370014000, "content_id": "0b15b27d39f4ca749956b29210a69338690ba153", "detected_licenses": [ "Apache-2.0" ], "directory_id": "c701117930e431c6c29a7c4d39eee31451babc83", "extension": "py"...
2.4375
stackv2
import asyncio from datetime import datetime as dt import discord from discord.ext import commands from gw2api import Gw2API, requestGW2AccountData from cogs.utils.checks import embed_perms from database import database as db from utils.api import * with open('./database/db_settings.json') as json_file: config_da...
294
47.56
129
21
3,250
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_cefaecc01d1ad30e_56ed927a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 291 ]
[ null ]
[ 23 ]
[ 29 ]
2024-11-18T18:16:09.556468+00:00
1,624,305,752,000
575fc5ccae7b52c58bcbb51c76c0bd545a0dda8c
2
{ "blob_id": "575fc5ccae7b52c58bcbb51c76c0bd545a0dda8c", "branch_name": "refs/heads/main", "committer_date": 1624305752000, "content_id": "4f6763b80eb7206275dafe36672a2f3bc4bbee68", "detected_licenses": [ "MIT" ], "directory_id": "775ef6f866f774152b8b4e1bd14b132ab10d2933", "extension": "py", "file...
2.328125
stackv2
# -*- coding: utf-8 -*- #!/usr/bin/python3.9 ################################################################################ ## Crypto tools and control flows for hacking - Vintage 2021 Python 3.9 ## ################################################################################ # Licenced under...
420
38
153
17
3,618
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_6080f285a6f41591_688617f0", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
3
true
[ "CWE-327", "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.", "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally ...
[ 322, 328, 334 ]
[ null, null, null ]
[ 21, 21, 21 ]
[ 29, 29, 29 ]
2024-11-18T19:31:08.675992+00:00
1,548,738,117,000
c6d2be81fb784772c4bdd1d289cd1f1890626415
3
{ "blob_id": "c6d2be81fb784772c4bdd1d289cd1f1890626415", "branch_name": "refs/heads/master", "committer_date": 1548738117000, "content_id": "c2cb0fa6e7af177b46e1768ad5682005e8131de5", "detected_licenses": [ "Apache-2.0" ], "directory_id": "210e1cffcd8a705c2a8a1485ed5532b9169f5d10", "extension": "py"...
2.515625
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- """ Convenience utility functions for whoville, not really intended for external use """ from __future__ import absolute_import, unicode_literals import logging import json import time import copy import base64 import six from six.moves import reduce import os import ruam...
421
34.31
88
20
3,436
python
[{"finding_id": "codeql_py/request-without-cert-validation_fbecdac4c08449a7_bb25d478", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1) by [this value](2)." ]
[ 205 ]
[ null ]
[ 20 ]
[ 61 ]