added
stringlengths
32
32
created
int64
1,244B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.25
source
stringclasses
1 value
text
stringlengths
324
20.1k
num_lines
int64
16
598
avg_line_length
float64
15.1
58.3
max_line_length
int64
33
179
ast_depth
int64
8
39
length
int64
101
3.8k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.1k
265k
sast_codeql_findings_count
int64
1
45
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
45
rule_ids
listlengths
1
45
confidences
listlengths
1
45
severities
listlengths
1
45
messages
listlengths
1
45
line_starts
listlengths
1
45
line_ends
listlengths
1
45
column_starts
listlengths
1
45
column_ends
listlengths
1
45
2024-11-19T00:40:24.141331+00:00
1,624,197,584,000
7cbd1f8331c37425e899f74eaefa861bee2ccb05
2
{ "blob_id": "7cbd1f8331c37425e899f74eaefa861bee2ccb05", "branch_name": "refs/heads/master", "committer_date": 1624197584000, "content_id": "24b3ae01076d80c41ac15233ace817dfc695795d", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "85b9e9c978a97ef6db97de67c40412069e9957b5", "extension": "p...
2.5
stackv2
from flask import Flask, request, render_template_string, render_template app = Flask(__name__) @app.route('/hello-template-injection') def hello_ssti(): person = {'name':"world", 'secret':"UGhldmJoZj8gYWl2ZnZoei5wYnovcG5lcnJlZg=="} if request.args.get('name'): person['name'] = request.args.get('name') template ...
23
29.57
91
12
194
python
[{"finding_id": "codeql_py/template-injection_d9adfacc3f5b96ff_ad90bc2d", "tool_name": "codeql", "rule_id": "py/template-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This template construction depends on a [user-provided value](1).", "remediation": "", "location": ...
2
true
[ "CWE-074", "CWE-079" ]
[ "py/template-injection", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This template construction depends on a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 11, 11 ]
[ null, null ]
[ 32, 9 ]
[ 40, 56 ]
2024-11-19T01:06:05.806185+00:00
1,557,239,737,000
43b2c67301d397846d2d8cc29822c7c7d5be0e9b
3
{ "blob_id": "43b2c67301d397846d2d8cc29822c7c7d5be0e9b", "branch_name": "refs/heads/master", "committer_date": 1557239737000, "content_id": "a04c5eeb89e68b299260432d77f732fd9f852d4e", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "74b9ddf9f9bef8b1e0a22a4727515b0885b22229", "extension": "p...
2.890625
stackv2
""" Contains all the serializers. """ from sys import exc_info from tempfile import NamedTemporaryFile from io import BytesIO from flask import jsonify, send_file from PIL.Image import open as image_opener from screamshot import generate_bytes_img_wrap from screamshot.errors import BadUrl, BadSelector AUTHORIZED_W...
156
35.01
100
17
1,184
python
[{"finding_id": "codeql_py/stack-trace-exposure_446f292ef079906c_bd22dcde", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 156 ]
[ null ]
[ 24 ]
[ 47 ]
2024-11-19T01:17:10.841732+00:00
1,626,053,915,000
89525e5e9f59fa448deaab3f9b997bb8f6b5d505
3
{ "blob_id": "89525e5e9f59fa448deaab3f9b997bb8f6b5d505", "branch_name": "refs/heads/main", "committer_date": 1626053915000, "content_id": "93fccf7c6847ef991b3033ccd30800628b0bdb79", "detected_licenses": [ "MIT" ], "directory_id": "aa4e2021276b13bdacbcb4a1f173c71911ade72d", "extension": "py", "file...
3.09375
stackv2
import streamlit as st import time from apps.classifier import Classifier from sklearn.preprocessing import LabelEncoder def format_data(data): en = LabelEncoder() with st.empty(): st.info("⏳ Compiling data...") temp = [] result = [] for item in data.values(): if(...
113
30.97
119
17
795
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5442a0fd1d4052c8_42d8a49a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 23, 96 ]
[ null, null ]
[ 15, 19 ]
[ 21, 23 ]
2024-11-19T01:17:16.618557+00:00
1,613,761,586,000
f8b4ffc6682875814362875f0911fecd5478cfb2
3
{ "blob_id": "f8b4ffc6682875814362875f0911fecd5478cfb2", "branch_name": "refs/heads/main", "committer_date": 1613761586000, "content_id": "eeaef1994d75f7ec5b712cacc882b1cfaa4816d3", "detected_licenses": [ "Unlicense" ], "directory_id": "25a5a2d08b05bf703b7c486ba36d4369f7310a9f", "extension": "py", ...
3.125
stackv2
from typing import Optional, List import random import click LETTERS = 'abcdefghijklmnopqrstuvwxyz' SPEC_CHARS = '~!@#$%^&*()_+;:?-=.<>' def random_digit(exclude_similar=False): if exclude_similar: return str(random.randint(2, 9)) else: return str(random.randint(0, 9)) def random_letter(ex...
149
29.09
109
15
994
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e3e2066005ae37c7_610ddfe0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (p...
[ 114, 138 ]
[ null, 145 ]
[ 19, 15 ]
[ 68, 10 ]
2024-11-19T01:17:26.415034+00:00
1,598,219,782,000
3d0f9c143661704963e7f35150a08e64bd3d342c
2
{ "blob_id": "3d0f9c143661704963e7f35150a08e64bd3d342c", "branch_name": "refs/heads/master", "committer_date": 1598219782000, "content_id": "e9b9330ad232b071ed08083555bcc3d743c48590", "detected_licenses": [ "MIT-0" ], "directory_id": "3f132f3af3b89bdefea6bdeb8512b55895febb47", "extension": "py", "...
2.34375
stackv2
# Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. # SPDX-License-Identifier: MIT-0 from diskcache import Cache cache_location ="../db" with Cache(cache_location) as cache: cache[b'speed'] = 0 cache[b'prevspdrevcount'] = 0 cache[b'prevspdevttime'] = 0 cache[b'prevcadrevcount'] = 0 ...
28
35.89
87
12
300
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_70c3f762a660c8b5_44e37cd4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 23 ]
[ null ]
[ 11 ]
[ 64 ]
2024-11-19T01:17:30.107155+00:00
1,606,919,474,000
63aba49daeda8f269be417bca30160be85a75c52
2
{ "blob_id": "63aba49daeda8f269be417bca30160be85a75c52", "branch_name": "refs/heads/master", "committer_date": 1606921212000, "content_id": "776ffcda71c396efc1e5d9673d2e43169a3bf966", "detected_licenses": [ "Apache-2.0" ], "directory_id": "3ad732b23fdbaeb7bec1f33f6787c010508811da", "extension": "py"...
2.484375
stackv2
import logging from config import Config from flask import Flask, request from tasks import add_to_blacklist app = Flask(__name__) # Get config config = Config() config.load() # Disable Flask logs log = logging.getLogger('werkzeug') log.disabled = True app.logger.disabled = True @app.route('/') @app.route('/api/',...
48
19.62
82
12
216
python
[{"finding_id": "codeql_py/log-injection_38796a7c729503be_f91b7035", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 23 ]
[ null ]
[ 18 ]
[ 82 ]
2024-11-19T01:17:55.541891+00:00
1,693,010,949,000
a20fcb0b0bfb61661e42d108f0f45eb57114e384
3
{ "blob_id": "a20fcb0b0bfb61661e42d108f0f45eb57114e384", "branch_name": "refs/heads/master", "committer_date": 1693010949000, "content_id": "9f296e1f179832c0ffe5f138553c0cc6d4a6984d", "detected_licenses": [ "Apache-2.0" ], "directory_id": "38da42ce358b623da629dd087d847db0456528de", "extension": "py"...
2.765625
stackv2
#! /usr/bin/python3 # # Copyright (c) 2017 Intel Corporation # # SPDX-License-Identifier: Apache-2.0 # import hashlib import logging import ttbl class authenticator_localdb_c(ttbl.authenticator_c): """Use a simple DB to authenticate users **THIS MODULE IS DEPRECATED:** use :class:`ttbl.auth_userdb.driver`. ...
105
32.09
78
18
785
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_9474c3cf2d9f4424_fe085cab", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 95 ]
[ null ]
[ 42 ]
[ 66 ]
2024-11-19T00:03:19.367490+00:00
1,625,427,483,000
497ca40ea0b09e0383768594fc4e4d9995847541
3
{ "blob_id": "497ca40ea0b09e0383768594fc4e4d9995847541", "branch_name": "refs/heads/main", "committer_date": 1625427483000, "content_id": "3d70746b4daf4aeeccb6f146290ddddd1556d21a", "detected_licenses": [ "MIT" ], "directory_id": "5348045d91a5f00010c13f8cdd23af1df446317c", "extension": "py", "file...
2.625
stackv2
import os from flask import flash, request, redirect from flask_jwt_extended import jwt_required, get_jwt_identity from flask_restful import Resource, reqparse from werkzeug.utils import secure_filename import pandas as pd from resource.models import CompanyModel, CompanyDailyModel, CompanyHourlyModel from datetime im...
166
42.7
126
24
1,416
python
[{"finding_id": "codeql_py/url-redirection_442868cfabca1d94_62663f94", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 78 ]
[ null ]
[ 33 ]
[ 44 ]
2024-11-19T01:03:40.931969+00:00
1,515,340,032,000
0ca1d8eeb6529d44c81db8fbaeedc2b8ff75ff3f
3
{ "blob_id": "0ca1d8eeb6529d44c81db8fbaeedc2b8ff75ff3f", "branch_name": "refs/heads/master", "committer_date": 1515340032000, "content_id": "1d080b5e461dd9bc381369b07350863a6bd704e6", "detected_licenses": [ "MIT" ], "directory_id": "2d2a0e37c2904fdefe4a9607d0abef3f0bea10d9", "extension": "py", "fi...
2.984375
stackv2
""" Logging support. Sets up logging environment for use by ``gluetool`` and modules. Based on standard library's :py:mod:`logging` module, augmented a bit to support features loke colorized messages and stackable context information. Example usage: .. code-block:: python # initialize logger as soon as possible ...
479
34.19
116
19
3,766
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_bbfa3e4a8a0329cb_01dd24d6", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 306 ]
[ null ]
[ 16 ]
[ 52 ]
2024-11-19T01:15:20.790769+00:00
1,646,446,094,000
0dfb4b8153406386b153b4ae4442ec70329aa319
2
{ "blob_id": "0dfb4b8153406386b153b4ae4442ec70329aa319", "branch_name": "refs/heads/master", "committer_date": 1646446094000, "content_id": "da75f10d546b41fb486fcd1f49a093be78622283", "detected_licenses": [ "MIT" ], "directory_id": "7b5526cf675ae37ec60405b539bd82cf80109cac", "extension": "py", "fi...
2.375
stackv2
#! /usr/bin/env python # Standard library imports. import sys, os, re, cgi, socket, errno import BaseHTTPServer import shutil from SocketServer import ThreadingMixIn from BaseHTTPServer import BaseHTTPRequestHandler from urllib import quote, unquote from posixpath import normpath from cStringIO import StringIO from m...
262
36.32
106
17
2,278
python
[{"finding_id": "codeql_py/polynomial-redos_e98e50088b7ab765_d419005f", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings startin...
4
true
[ "CWE-1333", "CWE-022", "CWE-022", "CWE-022" ]
[ "py/polynomial-redos", "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings starting with 'Content-Disposition' and with many repetitions of 'Content-Disposition'.\nThis [regular expression](1) that depends on a [user-provided value](3) may run slow on strings starting with 'Content-Disposition...
[ 68, 73, 74, 80 ]
[ null, null, null, null ]
[ 79, 30, 23, 24 ]
[ 83, 32, 25, 26 ]
2024-11-19T00:43:41.490255+00:00
1,684,415,466,000
e0567488197dc64a86c46488da942c86d2a80695
3
{ "blob_id": "e0567488197dc64a86c46488da942c86d2a80695", "branch_name": "refs/heads/master", "committer_date": 1684415466000, "content_id": "a036afe2e3820155992045c968719d85042bc7d4", "detected_licenses": [ "Apache-2.0" ], "directory_id": "9af4d1ffe568ad8994451c5a19d0ce7be9871763", "extension": "py"...
2.515625
stackv2
import json import os from dotenv import load_dotenv from .config import Config def get_config_file_path(key): for env in os.environ.get('CONFIG_PATH', '').split(os.pathsep): path = os.path.join(env, key) if os.path.exists(path): return path def get_merged_config(key, default=None, ...
163
30.78
92
19
1,110
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_169f6be18f35cad2_b0f4a622", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive data (secret)](2) as clear text.\nThis expression stores [sensitive data (secret)](3) as clear text.\nThis expression stores [sensitive data (secret)](4) as clear text.\nThis expression stores [sensitive data (sec...
[ 157 ]
[ null ]
[ 28 ]
[ 51 ]
2024-11-19T01:32:03.119796+00:00
1,666,652,028,000
514e99d5b49a61f5ce4903e43cc9b1239e4c7cfe
3
{ "blob_id": "514e99d5b49a61f5ce4903e43cc9b1239e4c7cfe", "branch_name": "refs/heads/master", "committer_date": 1666652028000, "content_id": "4d1a93f88f656bb283b62a48b5d7e7c893e8bab8", "detected_licenses": [ "MIT" ], "directory_id": "4935f8f8c75165cc0191d4bdb261872f38115789", "extension": "py", "fi...
2.5625
stackv2
#!/usr/bin/env python """ DBMooringSummary.py Input: MooringID (eg. 14bsm2a or 14BSM-2A) Output: text file with... mooring charactersistcs instruments deployed, depths, serial numbers History: ======= 2021-3-25: add yaml output for moorings 2020-12-2: python3 only Compatibility: ============== python ...
258
40.7
152
15
2,725
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a3331c077f933492_47173fd8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
4
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 105, 106, 198, 199 ]
[ null, null, null, null ]
[ 11, 11, 11, 11 ]
[ 84, 86, 82, 84 ]
2024-11-19T01:32:05.678058+00:00
1,575,402,931,000
494bd3a07c9873f2f6120a4ddac454fc64ca238c
3
{ "blob_id": "494bd3a07c9873f2f6120a4ddac454fc64ca238c", "branch_name": "refs/heads/master", "committer_date": 1575402931000, "content_id": "e1fb71efad0c28e947c0d30e76be5b1a4b809cab", "detected_licenses": [ "Apache-2.0" ], "directory_id": "77776dc5c02d97dc76fc4461524dca1475ee9970", "extension": "py"...
3.046875
stackv2
#!/usr/bin/env python """ First, we need to import the appropriate libraries and create a login session with the vCenter server """ import requests import json # Here we are disabling the warning about Insecure Requests as we are using a self-signed certificate so we will be disabling the SSL Verification impor...
111
34.54
146
11
818
python
[{"finding_id": "codeql_py/request-without-cert-validation_1ea61ebc112328fd_c9c55e8b", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1) by [this value](2).", "This request may run without certificate validation because [it is disabled](1) by [this value](2)." ]
[ 39, 100 ]
[ 44, 105 ]
[ 16, 16 ]
[ 59, 59 ]
2024-11-19T01:32:16.396607+00:00
1,421,770,585,000
3853a878e81b03dc0125474b63e91e62acd10508
2
{ "blob_id": "3853a878e81b03dc0125474b63e91e62acd10508", "branch_name": "refs/heads/master", "committer_date": 1421770585000, "content_id": "22c466b0312f7f899ae23799eb24c8ab993f5ddc", "detected_licenses": [ "MIT" ], "directory_id": "bce31cc1f6d64a9a564d6466ba1a603bf6895a6b", "extension": "py", "fi...
2.484375
stackv2
from time import time import os import tornado.ioloop import tornado.web import json class Tree: def __init__(self, id, data): self.id = id self.p = data[0] self.d = data[1] self.w = data[2] def __repr__(self): return str(self.id) #return "(p=%s, d=%s, w=%s)" % (self.p, self.d, self.w) def countTWT(tre...
139
19.96
124
18
936
python
[{"finding_id": "codeql_py/path-injection_68e6b081c038e185_de634b47", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 99 ]
[ null ]
[ 60 ]
[ 86 ]
2024-11-19T01:43:47.927772+00:00
1,543,922,303,000
18bb65d05104813fb271801e1f38aecfb5e77282
4
{ "blob_id": "18bb65d05104813fb271801e1f38aecfb5e77282", "branch_name": "refs/heads/master", "committer_date": 1543922303000, "content_id": "cde5c831d2ef5b2283a0baedd5c48ed9f6c7b357", "detected_licenses": [ "MIT" ], "directory_id": "ef2dbd468280dc8f755355b4a2279e3884a83093", "extension": "py", "fi...
3.9375
stackv2
def is_it_included(string, type_of_data): for i in string: if i.lower() in type_of_data: return True return False def password_validator(password): numbers = {"0", "1", "2", "3", "4", "5", "6", "7", "8", "9"} alphabets = { "a", "b", "c", "d", ...
101
16.1
85
13
452
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_707c56ed6fd80cf1_8210c3af", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 98 ]
[ null ]
[ 11 ]
[ 18 ]
2024-11-19T01:44:08.514258+00:00
1,571,482,655,000
3890cba832589db5e72b4133ef3e4ae2df28a8fc
3
{ "blob_id": "3890cba832589db5e72b4133ef3e4ae2df28a8fc", "branch_name": "refs/heads/master", "committer_date": 1571482655000, "content_id": "f24d068c3d31899827dc1fc872df253ffd134c7c", "detected_licenses": [ "MIT" ], "directory_id": "0c8012f62f9226531c2a179e2ac204ce905ddeb7", "extension": "py", "fi...
2.921875
stackv2
from flask import Flask, render_template, request import requests # import json to load JSON data to a python dictionary # urllib.request to make a request to api import urllib.request app= Flask(__name__) @app.route('/', methods =['POST', 'GET']) def weather(): if request.method == 'POST': ...
48
28.33
124
15
368
python
[{"finding_id": "codeql_py/flask-debug_6f57ab33ba7e82ae_1d86d0d7", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-918" ]
[ "py/flask-debug", "py/partial-ssrf" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 46, 28 ]
[ null, null ]
[ null, 16 ]
[ 22, 36 ]
2024-11-19T01:44:11.823967+00:00
1,636,272,337,000
67c7ee7fc9f22acd3640062ffa61941acd0f64c9
2
{ "blob_id": "67c7ee7fc9f22acd3640062ffa61941acd0f64c9", "branch_name": "refs/heads/master", "committer_date": 1636272337000, "content_id": "073d6bc788869a905186404713da1b2cb92a0586", "detected_licenses": [ "MIT" ], "directory_id": "1c5c12c79d57b7288db2199c93e9738c3681307a", "extension": "py", "fi...
2.328125
stackv2
#!/usr/bin/env python3.7 import argparse import logging import pyperclip import getpass from crd.storage import MODELS, NAME_TO_MODEL, init_storage from crd.config import ConfigurationManager def configure_logger(logger_name=None, level='INFO'): # get logger logger = logging.getLogger(logger_name) # c...
184
29.82
135
18
1,373
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e8f5489b401dd8cd_7042de72", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 89 ]
[ null ]
[ 12 ]
[ 32 ]
2024-11-19T00:59:31.835426+00:00
1,608,191,466,000
35d940991fca4722d81ef2298c97af40ea82164c
3
{ "blob_id": "35d940991fca4722d81ef2298c97af40ea82164c", "branch_name": "refs/heads/master", "committer_date": 1608191466000, "content_id": "c94a4c4dde915c2aba6e6f621257e80eacca1aec", "detected_licenses": [ "MIT" ], "directory_id": "4006be0f212f35399d217dd41defb8b56d90e38f", "extension": "py", "fi...
2.890625
stackv2
#!/usr/bin/env python """ Generate the contents (documents, code) """ import os import json from jinja2 import Template # # Constants # _TEMPLATES_DIR = "template" _MAIN_TEMPLATE_FILE = "main.html" _INDEX_FILE = "index.html" _EXPERIMENTS_TEMPLATE_FILE = "experiment.html" _EXPERIMENTS_DIR = "experiments" _EXPERIMEN...
124
27.21
99
14
765
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_8f977abfc269f8da_afed37ad", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 60 ]
[ null ]
[ 20 ]
[ 41 ]
2024-11-19T01:00:08.483293+00:00
1,582,257,859,000
3e952dccc615975e7b296631bbdd68e72d0c1ba3
2
{ "blob_id": "3e952dccc615975e7b296631bbdd68e72d0c1ba3", "branch_name": "refs/heads/master", "committer_date": 1582257859000, "content_id": "1bac7dd63339bbb1ab9ec984fbf8fd8110fc0506", "detected_licenses": [ "MIT" ], "directory_id": "f263ef09bd67d2323d44c96efc44e5cda60b2ace", "extension": "py", "fi...
2.4375
stackv2
import os import pathlib import random import subprocess import sys import click import pinboard def get_config_path(): configdir = pathlib.Path(click.get_app_dir('randpin')) configdir.mkdir(parents=True, exist_ok=True) return configdir / 'apikey.txt' @click.command() @click.option('--save/--no-save',...
66
20.32
88
15
342
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8f9be0809c9bd5a6_1438ff89", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text.\nThis expression logs [sensitive data (passw...
[ 48 ]
[ null ]
[ 19 ]
[ 25 ]
2024-11-19T01:00:12.447855+00:00
1,520,085,680,000
d53d1ca20fe9ebdcc86698e73e9a08cecf3e3f06
3
{ "blob_id": "d53d1ca20fe9ebdcc86698e73e9a08cecf3e3f06", "branch_name": "refs/heads/master", "committer_date": 1520085680000, "content_id": "75cb1bdea724c5a66bc73def0b9bf3f5dc6698d2", "detected_licenses": [ "MIT" ], "directory_id": "fd6f1b969cd99e1850ca2a88ee8b67a6e0661d9c", "extension": "py", "fi...
2.6875
stackv2
from django.shortcuts import render from django.http import JsonResponse from django.views.generic import View from goods.models import GoodsSKU from django_redis import get_redis_connection import json # Create your views here. class CartInfoView(View): """获取购物车数据""" def get(self,request): """提供购物车页...
134
28.99
92
17
1,110
python
[{"finding_id": "codeql_py/cookie-injection_8cb368ecd1b8151a_b0cbcfcc", "tool_name": "codeql", "rule_id": "py/cookie-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cookie is constructed from a [user-supplied input](1).", "remediation": "", "location": {"file_path": "...
1
true
[ "CWE-020" ]
[ "py/cookie-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cookie is constructed from a [user-supplied input](1)." ]
[ 132 ]
[ null ]
[ 41 ]
[ 49 ]
2024-11-19T01:11:50.844077+00:00
1,556,055,155,000
f0de6ade5d2726d6e3389ccc7bc103e19827bfde
2
{ "blob_id": "f0de6ade5d2726d6e3389ccc7bc103e19827bfde", "branch_name": "refs/heads/master", "committer_date": 1556055155000, "content_id": "99dbb981778c26f6c333f5cdfaece7ab48a2be3f", "detected_licenses": [ "Apache-2.0" ], "directory_id": "643ecf15975376427bc85b10c379691f06bd46ec", "extension": "py"...
2.359375
stackv2
import json import logging from functools import wraps import sqlalchemy.orm.exc from tornado.web import HTTPError, RequestHandler from tornado.websocket import WebSocketClosedError, WebSocketHandler from .models import Session, Story, Task logger = logging.getLogger(__file__) class SocketHandler(WebSocketHandler)...
188
27.91
89
17
1,188
python
[{"finding_id": "codeql_py/log-injection_ef9b475681414518_65f8fbbd", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2)...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2).\nThis log entry depends on a [user-provided value](3)." ]
[ 68 ]
[ null ]
[ 55 ]
[ 72 ]
2024-11-19T01:11:57.250872+00:00
1,617,533,606,000
c85c59efdea37c60b4b0f172f14cf7d136a95bed
3
{ "blob_id": "c85c59efdea37c60b4b0f172f14cf7d136a95bed", "branch_name": "refs/heads/master", "committer_date": 1617533606000, "content_id": "fc73ab9511b81d4182aa7a238001beebf73ef211", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "48ec3e51d2e5243a1d3c174837e5361a47e9253f", "extension": "p...
2.59375
stackv2
import os import logging import functools import configparser from solaredge_interface import __env_api_key__ as ENV_API_KEY from solaredge_interface import __env_site_id__ as ENV_SITE_ID from solaredge_interface import __env_output_format__ as ENV_OUTPUT_FORMAT from solaredge_interface import __config_file_user__ as...
109
33.83
114
20
723
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_15d27fc311dcaaeb_8bd3bc67", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 49 ]
[ null ]
[ 30 ]
[ 98 ]
2024-11-19T01:33:46.426105+00:00
1,467,990,754,000
d8d75ea3a5793a73584877eb02fb67e83bcd204a
3
{ "blob_id": "d8d75ea3a5793a73584877eb02fb67e83bcd204a", "branch_name": "refs/heads/master", "committer_date": 1467990754000, "content_id": "ef20ceb818b85ce6435e368652afe3a94184f77c", "detected_licenses": [ "Apache-2.0" ], "directory_id": "46d8618bffd00edc5e49e2a4eed59acb5ee5f159", "extension": "py"...
2.828125
stackv2
#!/usr/bin/env python3 import sys import os from jinja2 import Template DIR = os.path.dirname(os.path.join(os.getcwd(), sys.argv[0])) ROOT_DIR = os.path.dirname(DIR) TEMPLATE = """<span class="NameHighlights" onMouseOver="javascript:this.className='NameHighlightsHover'" """ +\ """onMouseOut="javascript:thi...
39
30.64
113
15
295
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_8d0b1b70766d86e2_b7f3fbe0", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 27 ]
[ null ]
[ 16 ]
[ 87 ]
2024-11-19T01:56:45.690227+00:00
1,525,296,015,000
49744c8fc2c18ce2d9b266b52777eb07cfee3d3b
3
{ "blob_id": "49744c8fc2c18ce2d9b266b52777eb07cfee3d3b", "branch_name": "refs/heads/master", "committer_date": 1525296015000, "content_id": "4f4b3a0595c8f0f9df3ac7c7148704dc5b80e381", "detected_licenses": [ "MIT" ], "directory_id": "a20c843e320b38c55464c3370d2aab5c434d28ab", "extension": "py", "fi...
2.625
stackv2
# swampchurn # by slipperyslope # # TODO: # - Chat monitoring # - Connect monitoring # - Keyword detection # import re import datetime import os.path import sys from urllib.parse import unquote from operator import itemgetter # log file name (optional) rawLogs = "" # take input of filename, return list of all log en...
136
32.33
149
18
1,212
python
[{"finding_id": "codeql_py/redos_d8a5908f833082c2_eba2f21e", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '\\[' and containing many repetiti...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '\\[' and containing many repetitions of '99'." ]
[ 25 ]
[ null ]
[ 38 ]
[ 42 ]
2024-11-19T01:56:51.756541+00:00
1,539,178,321,000
c28cfbae3447dc9b9c4ec57d2b9e3e6d317e9178
2
{ "blob_id": "c28cfbae3447dc9b9c4ec57d2b9e3e6d317e9178", "branch_name": "refs/heads/master", "committer_date": 1539178321000, "content_id": "04563eed51bfcb963ff764db756944feee87cd9d", "detected_licenses": [ "MIT" ], "directory_id": "bb6ba22c1eb5cf9e25af1619c37be8146216ed65", "extension": "py", "fi...
2.34375
stackv2
from urllib.parse import unquote, quote import uuid import hashlib import logging from sanic import Sanic from sanic.response import json from sanic_jwt.decorators import protected from sanic_jwt import exceptions from sanic_jwt import initialize SALT = b'q9890as89dfh' PAGE_SIZE = 10 MAX_PAGES = 100 logger = None ap...
253
28.31
78
18
1,644
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_478a11bbe54e37f3_c0a5defb", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally e...
[ 37 ]
[ null ]
[ 9 ]
[ 40 ]
2024-11-19T02:45:20.260900+00:00
1,602,499,533,000
3e3d1aadb24f070c2842fc0085e166d631ae234f
3
{ "blob_id": "3e3d1aadb24f070c2842fc0085e166d631ae234f", "branch_name": "refs/heads/master", "committer_date": 1602499533000, "content_id": "f1d1a415531755d1fb1fcfe2a90bb91309debc5d", "detected_licenses": [ "Apache-2.0" ], "directory_id": "f946d146d9b487ab1edeaad10bf6b3a17cd549f0", "extension": "py"...
2.65625
stackv2
""" SYNOPSIS: Script to perform power control on device managed by OM Enterprise DESCRIPTION: This script exercises the OME REST API to perform power control operations. For authentication X-Auth is used over Basic Authentication. Note that the credentials entered are not stored to disk. EXAMPLE: python...
279
37.55
85
19
2,505
python
[{"finding_id": "codeql_py/request-without-cert-validation_a1ede061fe38b6a6_d0473fa4", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
7
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 46, 144, 161, 177, 191, 212, 266 ]
[ 48, null, null, 179, null, null, 268 ]
[ 17, 14, 21, 22, 21, 20, 20 ]
[ 47, 66, 78, 48, 79, 68, 53 ]
2024-11-19T02:45:26.172966+00:00
1,427,909,822,000
81b0daabb41c709d73458ba25dbd8d2686a85f44
2
{ "blob_id": "81b0daabb41c709d73458ba25dbd8d2686a85f44", "branch_name": "refs/heads/master", "committer_date": 1427909822000, "content_id": "68269629d22b2302a1a870199840096a9c97540c", "detected_licenses": [ "MIT" ], "directory_id": "9a4dcb467d452973ec462e41e7e354944c0e581e", "extension": "py", "fi...
2.484375
stackv2
import pymongo import tornado from tornado import web, ioloop, httpserver from tornado.options import define, options PORT = 8000 DB_CONFIG = { 'HOST':'localhost', 'PORT':27017, 'DB':'example', 'USERNAME':'', 'PASSWORD':'' } define("port",default=PORT,help='tornado run at %s' % PORT,type=int) class Applicati...
58
22.67
68
15
374
python
[{"finding_id": "codeql_py/reflective-xss_1269e9397ab09a5e_d429748c", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability d...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability due to a [user-provided value](2)." ]
[ 53 ]
[ null ]
[ 14 ]
[ 22 ]
2024-11-19T02:45:27.343605+00:00
1,514,716,428,000
f7bd668cf8946fe13da753ba25af55cbe8b103ba
3
{ "blob_id": "f7bd668cf8946fe13da753ba25af55cbe8b103ba", "branch_name": "refs/heads/master", "committer_date": 1514716428000, "content_id": "8f627ec46b9ccccb2cc38e3e4fe5abda321d3a68", "detected_licenses": [ "MIT" ], "directory_id": "7c28640e152dad3843423d04c96a3a37015bd9ba", "extension": "py", "fi...
2.546875
stackv2
# coding: utf-8 """ OpenSSH client for stash. ssh attempts to login with user provided password or looks for a valid key generated buy ssh-keygen in ~/.ssh/ You can open an interactive shell by not passing a command. If a command is passed, the single command is ran with output then ssh exits. usage: ssh [-h] [--pass...
303
32.78
99
19
2,286
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_d9b29c7ed24e9f78_e8986332", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 71 ]
[ null ]
[ 9 ]
[ 74 ]
2024-11-19T02:45:45.982613+00:00
1,493,280,026,000
a38ee49c4952a7ecafc4962d81aedd8f58d97d75
3
{ "blob_id": "a38ee49c4952a7ecafc4962d81aedd8f58d97d75", "branch_name": "refs/heads/master", "committer_date": 1493280026000, "content_id": "a1c923ae48330dd23535dbb61d0b599654095557", "detected_licenses": [ "MIT" ], "directory_id": "22651c96a57a53b37bf757be8f0fa8d1cf6cfdad", "extension": "py", "fi...
2.765625
stackv2
#!/usr/bin/env python import re import base64 import argparse import bcrypt from hashlib import sha256 from Crypto.Cipher import AES from lxml import etree from enum import Enum MAGIC = b'::::MAGIC::::' OUTPUT_WIDTH = 80 DEBUG = False class DecryptType(Enum): unknown = 1 hudson_secret_key = 2 passwor...
279
29.69
112
17
1,770
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4fe7b9022561c3e4_f1bcfff4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
3
true
[ "CWE-312", "CWE-327", "CWE-327" ]
[ "py/clear-text-logging-sensitive-data", "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.", "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 276, 68, 162 ]
[ null, null, null ]
[ 15, 9, 9 ]
[ 31, 37, 21 ]
2024-11-19T02:45:49.597421+00:00
1,532,361,887,000
5f97a42ef941c80e297ef4efa9112a672952e488
3
{ "blob_id": "5f97a42ef941c80e297ef4efa9112a672952e488", "branch_name": "refs/heads/master", "committer_date": 1532361887000, "content_id": "fd09289144e1f9604afc90ba09d6efc85eda7f96", "detected_licenses": [ "MIT" ], "directory_id": "7f7ef1f47cead0466ccdfe4655f61a7016e1a5e3", "extension": "py", "fi...
2.546875
stackv2
import numpy as np import os import pickle import re import skimage.io from mrcnn import config, utils from os.path import join, isfile, exists from sklearn.model_selection import train_test_split __all__ = ['class_names', 'classes_to_index', 'index_to_classes', 'index_to_class_names', 'WADConfig', 'WADDataset'] ##...
323
34.41
116
21
2,573
python
[{"finding_id": "codeql_py/overly-large-range_7eb819057c73652f_17995d0a", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 118 ]
[ null ]
[ 47 ]
[ 50 ]
2024-11-19T02:57:07.300340+00:00
1,409,394,127,000
6b17f4f4803074371f9a613ff613b91db63b8791
3
{ "blob_id": "6b17f4f4803074371f9a613ff613b91db63b8791", "branch_name": "refs/heads/master", "committer_date": 1409394127000, "content_id": "5afcba5ff145aec1bcb351363ae94094078332a7", "detected_licenses": [ "Unlicense" ], "directory_id": "8feee8c96a8e03ce90e30c6690bff5325ad2dead", "extension": "py",...
2.65625
stackv2
#!/usr/bin/python # coding: utf-8 import requests from bs4 import BeautifulSoup import itertools # from time import sleep # from random import randrange headers = {"User-Agent": "Mozilla/5.0 (iPad; U; CPU OS 3_2_1 like Mac OS X; en-us) AppleWebKit/531.21.10 (KHTML, like Gecko) Mobile/7B405", "Referer": "www.wowhead.com...
27
30.04
170
11
267
python
[{"finding_id": "codeql_py/request-without-cert-validation_f7819f3f19b46018_565476f0", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 12 ]
[ null ]
[ 14 ]
[ 95 ]
2024-11-19T02:57:18.315900+00:00
1,688,454,663,000
22b937c011afaa2fe4063a2cbfd931ef4cd47c79
2
{ "blob_id": "22b937c011afaa2fe4063a2cbfd931ef4cd47c79", "branch_name": "refs/heads/master", "committer_date": 1688454663000, "content_id": "753382ce416b8922d6042037c7eca5317c905594", "detected_licenses": [ "MIT", "ISC" ], "directory_id": "1194fe679b552cf1c8b63282cf59ffefa3923288", "extension": ...
2.5
stackv2
import os import oss2 from flask import jsonify, request from lin import Failed, ParameterError, Redprint, Success, db, get_random_str, lin_config from .model import OSS api = Redprint("oss") @api.route("/upload_to_local", methods=["POST"]) def upload(): image = request.files.get("image", None) if not imag...
88
32.19
112
22
655
python
[{"finding_id": "codeql_py/path-injection_e49cd883d68f99f5_280d4b7e", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 19 ]
[ null ]
[ 20 ]
[ 24 ]
2024-11-19T02:57:22.911375+00:00
1,576,557,321,000
092aabbcda2376ebcce66ae03d2473999bcb66ad
2
{ "blob_id": "092aabbcda2376ebcce66ae03d2473999bcb66ad", "branch_name": "refs/heads/master", "committer_date": 1576557321000, "content_id": "027df2252b93ad536d9af0733853ba0e25c4a84b", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "710b0bc052d33cfc22b3c5905143e4c19322896a", "extension": "p...
2.484375
stackv2
#!/usr/bin/env python import datetime import json import os import random import time import click import paho.mqtt.client as mqtt import yaml DEFAULT_CONFIG_FILE_PATH = os.path.join(os.path.dirname(__file__), 'config.yml') MQTT_BROKER_HOST = 'mqtt.eclipse.org' MQTT_BROKER_PO...
80
29.8
75
16
536
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2009a7613bac4d89_873d2de4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 52 ]
[ null ]
[ 15 ]
[ 54 ]
2024-11-19T03:12:15.189154+00:00
1,537,727,186,000
2c6935ac659a0feaffb09a608b9e4d38429d20b9
3
{ "blob_id": "2c6935ac659a0feaffb09a608b9e4d38429d20b9", "branch_name": "refs/heads/master", "committer_date": 1537727186000, "content_id": "37c5f0e58bb6f888cfec600d2df83f54fdd1827b", "detected_licenses": [ "MIT" ], "directory_id": "ca5e6bd4dee7d76fc8f835eab483e6cc7db502ef", "extension": "py", "fi...
2.84375
stackv2
from credentials import data as creds import json import urllib from errors import NoResultException class GeocodingService(object): """ This class abstracts a geo-coding service that can resolve lat-long given an address. Multiple locations could be found by a given search text from external services, along...
89
33.1
128
18
657
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e8b917fffaf1a8aa_9cabc9ed", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 28 ]
[ null ]
[ 15 ]
[ 18 ]
2024-11-19T03:12:20.128513+00:00
1,613,720,467,000
f9f52de0b11d8b95babe3cf8f21c18509cf045e9
3
{ "blob_id": "f9f52de0b11d8b95babe3cf8f21c18509cf045e9", "branch_name": "refs/heads/master", "committer_date": 1613720467000, "content_id": "ef3ca910fe172c3022b2e28efd6074e4b9195573", "detected_licenses": [ "MIT" ], "directory_id": "1c1ccda1ec99b2d14dc559b7f34eb1bff94804e8", "extension": "py", "fi...
3.34375
stackv2
#!/usr/bin/env python3.8 import random from user import User from user import Credentials def save_credentials(user): user.save_created_credential() def create_credentials(username, password): new_credential = User(username, password) return new_credential def save_existing_credential(user): user.sav...
167
28.95
111
19
931
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9dbe6b496257121c_9432c438", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 54, 121, 142 ]
[ null, null, null ]
[ 19, 31, 19 ]
[ 111, 65, 80 ]
2024-11-19T01:33:53.858347+00:00
1,607,526,330,000
f25e59e5fe70eb70086996f35a4bb7d828e1bbda
3
{ "blob_id": "f25e59e5fe70eb70086996f35a4bb7d828e1bbda", "branch_name": "refs/heads/main", "committer_date": 1607526330000, "content_id": "3893a5ec0fea11cf146c12bb0e8f98974ead6b66", "detected_licenses": [ "MIT" ], "directory_id": "339321660e4d4e0fbb82e1833c8c93d10b85eb94", "extension": "py", "file...
2.671875
stackv2
import pandas as pd from sklearn.experimental import enable_iterative_imputer from sklearn import datasets, impute from sklearn.feature_selection import SelectKBest, chi2 from sklearn.model_selection import train_test_split from sklearn.preprocessing import LabelEncoder, StandardScaler, MinMaxScaler from sklearn.ensemb...
287
46.32
120
13
3,513
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9de1a6c2cda49c94_0c401d54", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 101 ]
[ null ]
[ 11 ]
[ 34 ]
2024-11-19T01:57:17.958537+00:00
1,556,187,390,000
47f808c4b5e7c86ff63fa02a7b612ae578771d9c
3
{ "blob_id": "47f808c4b5e7c86ff63fa02a7b612ae578771d9c", "branch_name": "refs/heads/master", "committer_date": 1556187390000, "content_id": "4c183f41e356e88071d29e9b375d3108f94ceaeb", "detected_licenses": [ "Apache-2.0" ], "directory_id": "66bacb0f67d6fa46159f33597b93d5a6eda48bd0", "extension": "py"...
3.390625
stackv2
import re def insert_inform(): validation = False print('=====고객 정보 입력=====') # while validation != True: name = input("이름 : ") # if not re.match(r'[a-zA-Zㄱ-ㅎ]', name): # print("올바른 이름입력이 아닙니다. 다시 시도해주세요") # else: # vlaidation = True validation = False while validation !...
141
31.47
117
20
1,282
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_97557879fe3007fc_a1e7ee42", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 74 ]
[ null ]
[ 23 ]
[ 66 ]
2024-11-19T02:10:57.172792+00:00
1,602,587,969,000
b37411d749ceab306757f737c5acc8abacf1beb7
2
{ "blob_id": "b37411d749ceab306757f737c5acc8abacf1beb7", "branch_name": "refs/heads/main", "committer_date": 1602587969000, "content_id": "225a7f3ebf1b4ff045dab33030f0d1da691cd5db", "detected_licenses": [ "MIT" ], "directory_id": "09e67967dac6fdae5b5e969520db878f883a0640", "extension": "py", "file...
2.46875
stackv2
__all__ = ["download", "create_cache", "get_file", "ShellUtils"] import os import pathlib import logging import shutil import tarfile import zipfile from dataclasses import dataclass, field from typing import Union, Sequence import tqdm import requests from . import gdrive def download(url, path, progress=False, b...
252
38.64
80
20
2,103
python
[{"finding_id": "codeql_py/tarslip_c1b58fec699b92ce_298aaa64", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 197 ]
[ null ]
[ 13 ]
[ 14 ]
2024-11-19T02:11:18.005124+00:00
1,628,431,039,000
d812695ed55f338b6c4fdd404a034f638b286b75
3
{ "blob_id": "d812695ed55f338b6c4fdd404a034f638b286b75", "branch_name": "refs/heads/main", "committer_date": 1628431039000, "content_id": "f802b3f37508fd92834b3843d2d3e3077443ee92", "detected_licenses": [ "MIT" ], "directory_id": "be199c876160d343bd33547b3f83864f5219dddd", "extension": "py", "file...
2.703125
stackv2
# See: http://docs.aws.amazon.com/general/latest/gr/sigv4_signing.html '''This program creates a presigned url of the Api Gateway endpoint.''' import os import base64 import datetime import hashlib import hmac import urllib import boto3 import json from botocore.exceptions import ClientError def generate_presigned_ur...
164
40.71
112
20
1,617
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6ac62f86c668425a_977ce332", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text.\nThis expression logs [sensitive data (secret)](4) as clear text.\nThis expression logs [sensitive data (secret)](5) a...
[ 90, 114 ]
[ null, null ]
[ 15, 15 ]
[ 55, 47 ]
2024-11-19T02:11:50.493059+00:00
1,623,902,976,000
d419e1217a0e1c6b17a1b8be4d7a79394b673a16
2
{ "blob_id": "d419e1217a0e1c6b17a1b8be4d7a79394b673a16", "branch_name": "refs/heads/main", "committer_date": 1623902976000, "content_id": "b20e7d89663f601544fafeed508ca7d167871fc4", "detected_licenses": [ "Apache-2.0" ], "directory_id": "945fb818bac19868716d9823d1a4cc15a252d367", "extension": "py", ...
2.3125
stackv2
import hashlib import importlib import os import os.path as osp import pkg_resources import re import subprocess import tarfile import typing from collections import defaultdict from distutils.version import LooseVersion from pkg_resources import parse_version from typing import Any, List, Optional, Tuple, Union impor...
530
27.62
77
18
3,678
python
[{"finding_id": "codeql_py/tarslip_bace2e47ed210b4c_72844830", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 508 ]
[ null ]
[ 9 ]
[ 17 ]
2024-11-19T02:32:42.519943+00:00
1,635,407,723,000
68d961e190c2d2a0396418ad01ba03c85eb7feee
3
{ "blob_id": "68d961e190c2d2a0396418ad01ba03c85eb7feee", "branch_name": "refs/heads/main", "committer_date": 1635407723000, "content_id": "99a9cb7b14bf2814dc2c6bf9535c4521d5a9b831", "detected_licenses": [ "MIT" ], "directory_id": "08ef8eb91e25e18a038152c28093f334a7066913", "extension": "py", "file...
2.703125
stackv2
import json import random import hashlib from urllib import parse import http.client class BaiduTranslate: def __init__(self,fromLang,toLang): self.url = "/api/trans/vip/translate" self.appid="20191123000359756" #申请的账号 self.secretKey = 'QW58Hvcvuhso9X3VEMk4'#账号密码 self.fromLang = fro...
41
34.56
74
21
390
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_85e4319ece0761d4_76dd1d1c", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 19 ]
[ null ]
[ 19 ]
[ 48 ]
2024-11-19T02:33:27.428244+00:00
1,627,940,653,000
1e7adc18e8401835fcad23dd83662d1a0c088b98
3
{ "blob_id": "1e7adc18e8401835fcad23dd83662d1a0c088b98", "branch_name": "refs/heads/master", "committer_date": 1627940653000, "content_id": "ac8fbaf04fb523edc37531dec7331b3e40956c6a", "detected_licenses": [ "MIT" ], "directory_id": "5ff4a3151b0f4b6becbcc492d67fd0eb0f99c7bb", "extension": "py", "fi...
3.125
stackv2
"""A wrapper for various shell based functions found in the os & shutil modules.""" import os import shutil import platform import tarfile import hashlib import sys __author__ = 'PencilShavings' __version__ = '0.0.9' def envar_parser(path): """Parses environment variables from strings.""" if str(path).star...
407
22.9
112
23
2,300
python
[{"finding_id": "codeql_py/tarslip_8cdfa76d4c9509e6_e7d404f1", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 400 ]
[ null ]
[ 13 ]
[ 16 ]
2024-11-19T02:33:34.713163+00:00
1,588,599,237,000
8f1754c1cde5a502574f02540aedb42528834818
2
{ "blob_id": "8f1754c1cde5a502574f02540aedb42528834818", "branch_name": "refs/heads/master", "committer_date": 1588599237000, "content_id": "3f9bc0e53ad0234c61dcc1049bc6024a105e7758", "detected_licenses": [ "MIT" ], "directory_id": "97d43ddd6ecae189f231a87488e071e61f9d828e", "extension": "py", "fi...
2.3125
stackv2
# -*- coding: utf-8 -*- """ Created on Mon, March 23 13:13:13 2020 @author: Ahmad H. Mirza scriptVersion = 1.0..0 """ from flask import current_app as app from flask import Blueprint, render_template,url_for from flask import request,redirect,make_response,send_from_directory from werkzeug.utils import secure_filename ...
170
36.06
116
18
1,244
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5e750cb8a2e47b33_84ed9d1e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 132 ]
[ null ]
[ 25 ]
[ 55 ]
2024-11-19T02:46:18.839415+00:00
1,567,728,704,000
63cbc8840c9950c6bab635fcc9447650c1b485ca
3
{ "blob_id": "63cbc8840c9950c6bab635fcc9447650c1b485ca", "branch_name": "refs/heads/master", "committer_date": 1567728704000, "content_id": "2ee22de3c1c78d2e2ce832e8ce552cc6ef4399ba", "detected_licenses": [ "MIT" ], "directory_id": "dac2ddfbe770829312292a4e057d88532590d393", "extension": "py", "fi...
2.765625
stackv2
import os import uuid from logging.config import dictConfig from flask import Flask, jsonify, request, abort from flask_sqlalchemy import SQLAlchemy from sqlalchemy.dialects.postgresql import UUID dictConfig({ 'version': 1, 'formatters': {'default': { 'format': '[%(asctime)s] %(levelname)s in %(module...
77
29.17
115
15
549
python
[{"finding_id": "codeql_py/log-injection_959b358b3ec57502_35c40150", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
4
true
[ "CWE-117", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 45, 45, 47, 51 ]
[ null, null, null, null ]
[ 76, 92, 62, 89 ]
[ 90, 100, 70, 97 ]
2024-11-19T02:46:21.098248+00:00
1,622,650,768,000
dcc450b6170007fca7d3724e0cbecd1ed376d4c1
3
{ "blob_id": "dcc450b6170007fca7d3724e0cbecd1ed376d4c1", "branch_name": "refs/heads/master", "committer_date": 1622650768000, "content_id": "6722e6bddba162951935a8dd13fbe6fad6db336c", "detected_licenses": [ "MIT" ], "directory_id": "fdbd4b7743833c2f82b95c8c9732a9cea1ac6937", "extension": "py", "fi...
2.71875
stackv2
from __future__ import absolute_import, division, print_function, unicode_literals import logging import os import re import sys import traceback import jinja2 from pathlib import Path from datetime import datetime from subprocess import Popen, PIPE def print_line(line, ignore_text=False, newline=True, status='ok')...
274
28.99
94
16
2,017
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_8e4017af0d039cbd_31e3afed", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 215 ]
[ null ]
[ 15 ]
[ 48 ]
2024-11-19T02:59:16.268083+00:00
1,615,219,504,000
dc7f44c22ae69432c578c4b8b636dd22a652ac9f
4
{ "blob_id": "dc7f44c22ae69432c578c4b8b636dd22a652ac9f", "branch_name": "refs/heads/main", "committer_date": 1615219504000, "content_id": "72b1d6dad54ca9e0d306af3dfbe983a64f2ca49f", "detected_licenses": [ "MIT" ], "directory_id": "513c5880752eb1617a466f3e233b62868c4bea14", "extension": "py", "file...
3.53125
stackv2
import requests import os import json import seaborn as sns import matplotlib.pyplot as plt import pandas as pd from datetime import datetime from pandas import DataFrame from dotenv import load_dotenv def to_usd(my_price): """ Converts a numeric value to usd-formatted string, for printing and display purposes...
116
32.08
131
13
995
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ce25da12801b91ad_a06a0fc7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
7
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensi...
[ 87, 90, 92, 93, 94, 95, 104 ]
[ null, null, null, null, null, null, null ]
[ 7, 7, 7, 7, 7, 7, 7 ]
[ 43, 39, 31, 43, 40, 39, 118 ]
2024-11-19T02:59:18.858973+00:00
1,632,371,565,000
fed75ee3c9d0ab55f42bd14c108f6413d064b773
2
{ "blob_id": "fed75ee3c9d0ab55f42bd14c108f6413d064b773", "branch_name": "refs/heads/master", "committer_date": 1632371565000, "content_id": "b276462429dd6b888eeeb7f4c64bbd1568d0534b", "detected_licenses": [ "Apache-2.0" ], "directory_id": "ad7eed12964a9ec93ac791e0c64e4fbd62f2b0b0", "extension": "py"...
2.421875
stackv2
#!/usr/bin/env python3 # chmod +x login.py make the file executable import cgi, cgitb from cookie import set_cookie import secret from templates import after_login_incorrect, secret_page form = cgi.FieldStorage() username = form.getvalue("username") password = form.getvalue("password") if (username == secret.usern...
28
25.32
79
8
177
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2a65a373830db380_c58bab38", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 26 ]
[ null ]
[ 7 ]
[ 79 ]
2024-11-19T02:59:22.265340+00:00
1,688,449,912,000
63f2ed4e15a3567b3ca711ac7fc44bc7c4c4b138
3
{ "blob_id": "63f2ed4e15a3567b3ca711ac7fc44bc7c4c4b138", "branch_name": "refs/heads/master", "committer_date": 1688453376000, "content_id": "3e157c962b2bf7d11f20e8a77998a9ba4b9fcf73", "detected_licenses": [ "Apache-2.0" ], "directory_id": "3d7dece5254e42059e8a2cb1e72b295460284983", "extension": "py"...
2.515625
stackv2
import lvgl as lv import wifi_module import _thread import font_Alibaba_PuHuiTi RESOURCES_ROOT = "S:/data/pyamp/images/" wifiSSID = "" wifiPassword = "" def wifi_connect(): global wifiSSID global wifiPassword result = False result = wifi_module.wifi_connect(wifiSSID, wifiPassword) if (result ==...
66
23.65
63
11
479
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ab1f3b09d68902e2_a258dbe4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text." ]
[ 37 ]
[ null ]
[ 31 ]
[ 43 ]
2024-11-19T02:59:49.359243+00:00
1,616,255,456,000
b1ce36078af5957e98d4694689832b5b7887a247
3
{ "blob_id": "b1ce36078af5957e98d4694689832b5b7887a247", "branch_name": "refs/heads/master", "committer_date": 1616255456000, "content_id": "ecfed87facd4b38a56b3a446868929ca1f463c21", "detected_licenses": [ "Apache-2.0" ], "directory_id": "f22b3ff6df693cd6df712a196951aea8025b1dec", "extension": "py"...
2.625
stackv2
""" Copyright 2021 Ext-Creators Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to i...
155
29.67
124
15
984
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_459606f64fbda1aa_60101dd5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 85, 130 ]
[ null, null ]
[ 48, 34 ]
[ 55, 41 ]
2024-11-19T02:59:50.498933+00:00
1,595,288,737,000
190ee5f3c8b2a443fc977e16eb60406fdb28fcda
3
{ "blob_id": "190ee5f3c8b2a443fc977e16eb60406fdb28fcda", "branch_name": "refs/heads/master", "committer_date": 1595288737000, "content_id": "85e0355e9d05bfbd3a82626169adbb80d08bb74c", "detected_licenses": [ "MIT" ], "directory_id": "98652dd19d0b63c0e00bc41a88118077855a0547", "extension": "py", "fi...
2.8125
stackv2
import os import shutil import tarfile import urllib.request import h5py import numpy as np import scipy.io DATA_URL = ('http://deepsea.princeton.edu/media/code/' 'deepsea_train_bundle.v0.9.tar.gz') DIR_PATH = './deepsea_train' NUM_TRAIN_SETS = 10 def download(): print(f'Downloading deepsea train bu...
98
24.59
78
13
675
python
[{"finding_id": "codeql_py/tarslip_34fd1fbafdbe6370_d54dcec6", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 27 ]
[ null ]
[ 9 ]
[ 10 ]
2024-11-19T03:24:55.701664+00:00
1,490,543,601,000
bd6d99eba5326b20637549c99bae7481d79b7b7b
2
{ "blob_id": "bd6d99eba5326b20637549c99bae7481d79b7b7b", "branch_name": "refs/heads/master", "committer_date": 1490543601000, "content_id": "016db4ffc12d358eee66647f0a88d2f8603df98c", "detected_licenses": [ "MIT" ], "directory_id": "f3fa81b4beb80307bc9a6340498d4d69966d032f", "extension": "py", "fi...
2.46875
stackv2
from flask import Flask, request from PIL import Image # from twilio import twiml import auth import requests from io import BytesIO app = Flask(__name__) client = auth.client details = { "Size": "", "Topping1": "", "Topping2": "" } def get_size_type(imgurl): response = requests.get(imgurl) img ...
85
23.87
79
13
607
python
[{"finding_id": "codeql_py/flask-debug_1138d24d7f950217_edf2191f", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-918", "CWE-918" ]
[ "py/flask-debug", "py/full-ssrf", "py/full-ssrf" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "The full URL of this request depends on a [user-provided value](1).", "The full URL of this request depends on a [user-provided value](1)." ]
[ 85, 19, 32 ]
[ null, null, null ]
[ 5, 16, 16 ]
[ 24, 36, 36 ]
2024-11-19T03:35:14.191026+00:00
1,610,142,773,000
6499bc9a7aba74e3adf2eb854aa187fbf173dc28
3
{ "blob_id": "6499bc9a7aba74e3adf2eb854aa187fbf173dc28", "branch_name": "refs/heads/main", "committer_date": 1610142773000, "content_id": "d2c1aa9e46f241cf5241cefa450fdbfe77b3417a", "detected_licenses": [ "MIT" ], "directory_id": "ba3e7850b87a59311f4acc6e4567a5671448682c", "extension": "py", "file...
3.203125
stackv2
# -*- coding: utf-8 -*- #!/usr/bin/env python3 # Filename: plf_requests.py """PLF is a simple password leak checker that checks if your password has ever been leaked.""" __version__ = '0.1' __author__ = 'Adrian Gąsior' import requests import hashlib import sys def req_api_data(query_char): url = 'https://api....
45
27.33
94
15
325
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_2d1c19be2e24493f_9cab981c", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expen...
[ 34 ]
[ null ]
[ 9 ]
[ 33 ]
2024-11-19T01:26:53.017425+00:00
1,634,842,004,000
7e6795e99234f6a56e04e92977ff0fbd3573e914
3
{ "blob_id": "7e6795e99234f6a56e04e92977ff0fbd3573e914", "branch_name": "refs/heads/main", "committer_date": 1634842004000, "content_id": "bba5a4176bb9e7601bbbc77c38e407a5a340eb97", "detected_licenses": [ "MIT" ], "directory_id": "c934e5208ead7f05ff903c947d5335587a7db3a4", "extension": "py", "file...
3.171875
stackv2
import functools user = {'name': 'Jose', 'access_level': 'guest'} def make_secure(func): @ functools.wraps(func) def secure_function(): if user['access_level'] == 'admin': return func() else: return f"{user['name']} does not have admin permisison" return secure_function @make_secure def get_admin_pass...
24
18.38
58
15
112
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_35a8922933d012ee_a0a54916", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 21 ]
[ null ]
[ 7 ]
[ 27 ]
2024-11-19T01:37:39.489895+00:00
1,527,864,164,000
217b48e0db04b506bff4b17e9dc8f38eef2c37fb
2
{ "blob_id": "217b48e0db04b506bff4b17e9dc8f38eef2c37fb", "branch_name": "refs/heads/master", "committer_date": 1527864164000, "content_id": "203fa0c7f50f95b2129d70125dd379a04afcd743", "detected_licenses": [ "MIT" ], "directory_id": "149834c00994e5e61f05cb7805ce12e808c29b7b", "extension": "py", "fi...
2.359375
stackv2
# -*- coding: utf-8 -*- from __future__ import unicode_literals import re from django.utils.translation import ugettext as _ from django.shortcuts import render from django.views.decorators.cache import never_cache # from .forms import NamingForm, Suri81Form, Suri81ResultForm from .forms import NamingForm, Suri81Form...
155
30.41
90
18
1,252
python
[{"finding_id": "codeql_py/overly-large-range_2ffb4f168aaaed7b_1b888149", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 74 ]
[ null ]
[ 22 ]
[ 25 ]
2024-11-19T01:38:28.908360+00:00
1,418,472,054,000
aeb089254284011d41c2146a49d3451a4f386bdd
3
{ "blob_id": "aeb089254284011d41c2146a49d3451a4f386bdd", "branch_name": "refs/heads/master", "committer_date": 1418472275000, "content_id": "38ad90b4b8bf5f54160ff6ea5b8bc3198f94a05a", "detected_licenses": [ "MIT" ], "directory_id": "ffa95a407fa6ac01e4c1fa45ba16b90d69af9be6", "extension": "py", "fi...
2.53125
stackv2
import urllib import webapp2 import jinja2 import os import datetime from google.appengine.ext import db import cgi jinja_environment = jinja2.Environment( loader=jinja2.FileSystemLoader(os.path.dirname(__file__))) class MainPage(webapp2.RequestHandler): def get(self): """Handle GET requests to the root...
70
26.06
77
14
435
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_800a6a360dc61851_324e5f3f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 12 ]
[ 13 ]
[ 21 ]
[ 63 ]
2024-11-19T01:38:36.607983+00:00
1,557,674,486,000
a3c9e9cc1f73fba00fe12ae512cafadc3fefaa24
4
{ "blob_id": "a3c9e9cc1f73fba00fe12ae512cafadc3fefaa24", "branch_name": "refs/heads/master", "committer_date": 1557674486000, "content_id": "9d54050e7d029bba8a3155db5b548ce8e3d43355", "detected_licenses": [ "MIT" ], "directory_id": "6c9f320d2e7cb6f9daeda4c431b3ee10ef062035", "extension": "py", "fi...
3.828125
stackv2
""" Read file into texts and calls. It's ok if you don't understand how to read files """ import csv with open('texts.csv', 'r') as f: reader = csv.reader(f) texts = list(reader) with open('calls.csv', 'r') as f: reader = csv.reader(f) calls = list(reader) """ TASK 2: Which telephone number spent the ...
124
31.23
120
14
1,498
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e52318a5327bd152_0e585db8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.\nThis expression logs [sensitive data (private)](4) as clear text." ]
[ 57 ]
[ null ]
[ 11 ]
[ 120 ]
2024-11-19T01:38:48.160282+00:00
1,610,955,921,000
3de732f23b44a98c183b5caeb1f8d2c6c9609f2c
3
{ "blob_id": "3de732f23b44a98c183b5caeb1f8d2c6c9609f2c", "branch_name": "refs/heads/master", "committer_date": 1610955921000, "content_id": "a6cddec7d1894dc697f683254c16591660d808cb", "detected_licenses": [ "MIT" ], "directory_id": "0542a4488c98a62dd01ea5430566f6108941aa01", "extension": "py", "fi...
2.75
stackv2
#!/usr/bin/env python3 import getpass import paramiko HOSTNAME = 'ssh_server' PORT = 22 def run_ssh_cmd(username, password, command, hostname=HOSTNAME,port=PORT): ssh_client = paramiko.SSHClient() ssh_client.set_missing_host_key_policy(paramiko.AutoAddPolicy()) ssh_client.load_system_host_keys() ssh_client.conne...
24
28.5
74
10
169
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_e5fa665b7e512277_543807d0", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 11 ]
[ null ]
[ 2 ]
[ 66 ]
2024-11-19T01:38:51.566632+00:00
1,582,027,424,000
2def74da42e2b39fe07c5bffcd4ea12994201df6
2
{ "blob_id": "2def74da42e2b39fe07c5bffcd4ea12994201df6", "branch_name": "refs/heads/master", "committer_date": 1582027424000, "content_id": "9116702d6dd0f128e3624c225955b3e043274165", "detected_licenses": [ "MIT" ], "directory_id": "793e8c0c38a833dca1b6714db86ad5884bccc637", "extension": "py", "fi...
2.359375
stackv2
import redis from django.http import HttpResponse, HttpResponseServerError from django.db import connection from django.conf import settings class HealthCheckMiddleware(object): def __init__(self, get_response): self.get_response = get_response def __call__(self, request): if request.method =...
45
33.91
89
14
274
python
[{"finding_id": "codeql_py/stack-trace-exposure_40b572474eb22e9e_c96ced99", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 28 ]
[ null ]
[ 44 ]
[ 77 ]
2024-11-19T01:52:10.405088+00:00
1,602,122,087,000
b0c81cd317c3f11f110d1ee6d2f1dd646f334d2e
2
{ "blob_id": "b0c81cd317c3f11f110d1ee6d2f1dd646f334d2e", "branch_name": "refs/heads/main", "committer_date": 1602122087000, "content_id": "e7644fdab0c4a9b50eee5d91aea28e8217d777e4", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "d539953aeab6fdc71a6d4b27fa968047af619a59", "extension": "py"...
2.5
stackv2
import asyncio import logging from enum import Enum import zmq import zmq.asyncio from fastapi import FastAPI, HTTPException logger = logging.getLogger(__name__) class ZMQComm: def __init__(self, zmq_host="localhost", zmq_port="5555"): self._loop = asyncio.get_event_loop() # ZeroMQ communicatio...
397
28.67
97
20
2,588
python
[{"finding_id": "codeql_py/stack-trace-exposure_cbb62223a543b922_4354c91a", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
24
true
[ "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure",...
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information...
[ 168, 177, 186, 195, 205, 216, 230, 240, 249, 258, 267, 276, 285, 295, 305, 324, 333, 342, 351, 360, 369, 378, 387, 397 ]
[ null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null ]
[ 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12 ]
[ 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15 ]
2024-11-19T01:52:22.645290+00:00
1,535,512,650,000
e4c655762974fe46c6363a2465bdafc2ab5befdb
2
{ "blob_id": "e4c655762974fe46c6363a2465bdafc2ab5befdb", "branch_name": "refs/heads/master", "committer_date": 1535512650000, "content_id": "cec712586beca3968206647437e5cacf8e4b1d80", "detected_licenses": [ "MIT" ], "directory_id": "a1c34bb63533f79abc845d1869503185fa26a54e", "extension": "py", "fi...
2.4375
stackv2
import csv import json import logging import os import time import webbrowser from optparse import OptionParser import markdown2 from jinja2 import Template from livereload import Server from watchdog.events import LoggingEventHandler, FileSystemEventHandler from watchdog.observers import Observer VERSION = '0.2.0' ...
226
32.71
107
23
1,469
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_3817eea73ea4dbe7_118c3d22", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
3
true
[ "CWE-079", "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 58, 102, 122 ]
[ null, null, null ]
[ 24, 24, 28 ]
[ 54, 60, 64 ]
2024-11-19T02:04:24.330004+00:00
1,585,925,031,000
46f4875d032b6f64eadd39780d799fc9fc6493f2
3
{ "blob_id": "46f4875d032b6f64eadd39780d799fc9fc6493f2", "branch_name": "refs/heads/master", "committer_date": 1585925031000, "content_id": "f7c307658c3455c313677d269a8648f6697b4a82", "detected_licenses": [ "Apache-2.0" ], "directory_id": "b2fee3b968cecc138f17bf31751024e13b557d85", "extension": "py"...
2.8125
stackv2
# # Page Cache maintains a collection of cached files on disk # # It has a concept of 'version'. If provided, it will store # the data in a subdirectory. # # It is extracted from my scanner so it has functionality that # doesn't apply in a web content. # import os import shutil import re import datetime impor...
235
30.07
98
15
1,758
python
[{"finding_id": "codeql_py/request-without-cert-validation_7d1a119dfc6fdd82_b1478413", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 90 ]
[ null ]
[ 20 ]
[ 52 ]
2024-11-19T02:04:51.654167+00:00
1,632,843,990,000
7d030ca4255fc9e0d49b02a41931cc27a45299fc
2
{ "blob_id": "7d030ca4255fc9e0d49b02a41931cc27a45299fc", "branch_name": "refs/heads/main", "committer_date": 1632843990000, "content_id": "3718c3c2c83ac89e842c9bc566f566735a161293", "detected_licenses": [ "MIT" ], "directory_id": "109fd207c59b774c551f2261ddb821369c77691a", "extension": "py", "file...
2.484375
stackv2
import discord, re, os, json, asyncio #, requests from discord.ext import commands, tasks from discord_slash import cog_ext, SlashCommandOptionType, SlashContext from discord_slash.client import SlashCommand import youtube_dl from discord_slash.utils.manage_commands import create_option class yt(commands.Cog): UR...
193
37.9
127
23
1,737
python
[{"finding_id": "codeql_py/overly-large-range_556fe7cf8962b4e0_cedc8bd7", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 10 ]
[ null ]
[ 60 ]
[ 63 ]
2024-11-19T02:28:42.607024+00:00
1,617,265,826,000
569133139cee0b68c90b1848083260bb91b8ae24
3
{ "blob_id": "569133139cee0b68c90b1848083260bb91b8ae24", "branch_name": "refs/heads/main", "committer_date": 1617265826000, "content_id": "caa866423de0e13bc23a7f14d2bd59bea9ece53d", "detected_licenses": [ "MIT" ], "directory_id": "d18abd71a7867eb40c5227e96295059ef14a78b2", "extension": "py", "file...
2.578125
stackv2
# coding: utf-8 import os import time import signal import random import logging import argparse import requests import threading from flask import Flask, request, jsonify logging.basicConfig(level=logging.INFO) werkzeug = logging.getLogger('werkzeug') werkzeug.setLevel(logging.WARNING) logger = logging.getLogger('...
238
29.58
101
17
1,694
python
[{"finding_id": "codeql_py/log-injection_062486f24eb4c62d_8853cd16", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
2
true
[ "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 187, 190 ]
[ null, null ]
[ 56, 57 ]
[ 73, 64 ]
2024-11-19T02:28:44.858695+00:00
1,692,970,818,000
dba23b39ac8b3a3a979e6e8695776b078d09a79b
2
{ "blob_id": "dba23b39ac8b3a3a979e6e8695776b078d09a79b", "branch_name": "refs/heads/master", "committer_date": 1692970818000, "content_id": "7960bd38375bcb26637c6adc0161b4932ee6f85b", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "29e127a0299534f39da21bfdc3db6e716c73a341", "extension": "p...
2.359375
stackv2
#!/usr/bin/env python3 import os import sys import argparse parser = argparse.ArgumentParser() parser.add_argument("--vault-id", type=str) args = parser.parse_args() if args.vault_id is None or args.vault_id == "None" or args.vault_id == "default": if os.environ.get('VAULT_PASSWORD_ALL') is not None and os.enviro...
24
33.58
103
11
220
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_cf48eef4753ef0f4_fbf11b0b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 21 ]
[ null ]
[ 11 ]
[ 40 ]
2024-11-19T02:28:54.579182+00:00
1,527,093,716,000
47de62124b4469208c118395936572719f6f126c
3
{ "blob_id": "47de62124b4469208c118395936572719f6f126c", "branch_name": "refs/heads/master", "committer_date": 1527093716000, "content_id": "02eb7459f8f61f0d9f9c85d67260c633a271df27", "detected_licenses": [ "MIT" ], "directory_id": "de0c9564f4cd407ec4846565067021bae4b0fb5a", "extension": "py", "fi...
2.75
stackv2
from flask import Flask, jsonify, request from nltk.tokenize import word_tokenize import os app = Flask(__name__) @app.route('/') def index(): return "hello world" @app.route('/addToCart', methods = ["POST"]) def addToCart(): req_json = request.json table_id = req_json['TABLE_ID'] dish_name = req_jso...
29
23.9
83
15
197
python
[{"finding_id": "codeql_py/flask-debug_6b9fee8d01d2c7ca_8b42de07", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-022" ]
[ "py/flask-debug", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1)." ]
[ 29, 19 ]
[ null, null ]
[ 2, 14 ]
[ 55, 42 ]
2024-11-19T02:36:44.239169+00:00
1,607,812,102,000
0b409d77f8ca465730fe7e6fe730378165968540
2
{ "blob_id": "0b409d77f8ca465730fe7e6fe730378165968540", "branch_name": "refs/heads/main", "committer_date": 1607812102000, "content_id": "ebf31195dc60296b35f89e693b954cba0e2ed116", "detected_licenses": [ "Apache-2.0" ], "directory_id": "f50f48c8b4787378bf6720fd47a26d0d5e838a8f", "extension": "py", ...
2.421875
stackv2
from flask import Flask,redirect,url_for,render_template,request from pytube import YouTube import requests as req # Github @hammerinformation app=Flask(__name__) def download_video(url): YouTube(url).streams.filter(file_extension='mp4',progressive=True).first().download() @app.route('/',methods=['GET']) def ho...
41
24.29
89
16
219
python
[{"finding_id": "codeql_py/flask-debug_a80442acf2b89bbc_438409dd", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-918" ]
[ "py/flask-debug", "py/full-ssrf" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "The full URL of this request depends on a [user-provided value](1)." ]
[ 41, 20 ]
[ null, null ]
[ 5, 21 ]
[ 34, 33 ]
2024-11-19T02:37:25.770153+00:00
1,566,895,816,000
7851bee9f6eb5e4458c6d4caa1a45df7e5b35827
3
{ "blob_id": "7851bee9f6eb5e4458c6d4caa1a45df7e5b35827", "branch_name": "refs/heads/master", "committer_date": 1566895816000, "content_id": "7a3bafcfeed276513670810954eefb2b36901378", "detected_licenses": [ "MIT" ], "directory_id": "ddd5dcd63be7237b44d2befc3574cd433f0404fe", "extension": "py", "fi...
3.0625
stackv2
from tkinter import * from tkinter import Text import tkinter as tk import random import string import sys window = Tk() window.geometry("400x430") stringLenght = 6 def randomStringDigits(stringLength=6): zevergay = e2.get() stringLength2 = int(zevergay) var1IF = var1.get() var2IF = var2.get() ...
92
26.92
86
14
696
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c33b341d25460659_5adda964", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 49 ]
[ null ]
[ 11 ]
[ 29 ]
2024-11-19T02:49:10.847081+00:00
1,515,813,616,000
0f3398914fe9c578a97b9856f84daa124d7b38c8
2
{ "blob_id": "0f3398914fe9c578a97b9856f84daa124d7b38c8", "branch_name": "refs/heads/master", "committer_date": 1515813616000, "content_id": "93019cce57b9eadc39fd342c0898acb68de2f68b", "detected_licenses": [ "MIT" ], "directory_id": "b383e3f618c1452ece35c1bc050d2dd18f3999d6", "extension": "py", "fi...
2.421875
stackv2
import cv2 import numpy as np import pytesseract import re import imutils import pkg_resources from PIL import Image from details import Alliance, OngoingMatchDetails class Livescore: def __init__(self, options={}): local_path = pkg_resources.resource_filename(__name__, 'tessdata') template_path ...
158
39.78
108
17
1,466
python
[{"finding_id": "codeql_py/overly-large-range_3d2d47b2fe89418e_9ecc27bf", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 138 ]
[ null ]
[ 29 ]
[ 32 ]
2024-11-19T03:00:26.636657+00:00
1,562,587,137,000
1d18349d775d57cea7e0cd020f138650f38aa014
3
{ "blob_id": "1d18349d775d57cea7e0cd020f138650f38aa014", "branch_name": "refs/heads/master", "committer_date": 1562587137000, "content_id": "64324ea6ad44d1de69200bb80685444d43181a20", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "22d66628728a40c96abefd618378c6d82918b1c5", "extension": "p...
2.71875
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- from werkzeug.routing import BaseConverter from flask import Flask ''' DEFAULT_CONVERTERS = { 'default': UnicodeConverter, 'string': UnicodeConverter, 'any': AnyConverter, 'path': PathConverter, 'int': ...
42
20.81
50
10
245
python
[{"finding_id": "codeql_py/reflective-xss_aba8463549d4926a_caab0799", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 24, 38 ]
[ null, null ]
[ 12, 12 ]
[ 43, 49 ]
2024-11-19T03:00:26.797099+00:00
1,523,901,429,000
84feb465b956cabe6641f0cb32b2e5f46816eba1
2
{ "blob_id": "84feb465b956cabe6641f0cb32b2e5f46816eba1", "branch_name": "refs/heads/master", "committer_date": 1523901429000, "content_id": "46d0c6b23b5e9f55074933410b12058acd16806d", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "d48b6ffeb1efbad3e766abccde907d97c9348098", "extension": "p...
2.390625
stackv2
#!/usr/bin/python """Provides configuration management/handling for managing freeradius.""" import argparse import os import shutil import hashlib import json import subprocess import random import string import filecmp import pwd import urllib.parse import urllib.request import datetime import ssl import hashlib # us...
77
22.73
74
15
430
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_26238812720691f0_f4f24209", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 58 ]
[ null ]
[ 17 ]
[ 40 ]
2024-11-19T03:11:33.290114+00:00
1,618,863,044,000
300f6a9e11fbcbbcad629797dda70a0de4241f82
2
{ "blob_id": "300f6a9e11fbcbbcad629797dda70a0de4241f82", "branch_name": "refs/heads/main", "committer_date": 1618863044000, "content_id": "3fb9c0e207dbdd6715fac72456ba099c09fca278", "detected_licenses": [ "MIT" ], "directory_id": "7e93f09d9ec4cd333fc53ff6a0e01ee946199bba", "extension": "py", "file...
2.453125
stackv2
from loadimagesfrombytes import LoadImagesFromBytes import detect_custom as dc import base64 import os import flask from flask import Flask, request import requests import json #print(os.listdir()) #with open('3700214610015.jpg', "rb") as imageFile: #img = base64.b64encode(imageFile.read()) #dataset = LoadImagesF...
50
28.02
96
12
422
python
[{"finding_id": "codeql_py/full-ssrf_d2675aede0eea86d_93b3f4af", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
2
true
[ "CWE-918", "CWE-079" ]
[ "py/full-ssrf", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 35, 47 ]
[ null, null ]
[ 25, 12 ]
[ 42, 25 ]
2024-11-19T03:11:52.736287+00:00
1,547,309,583,000
95f4dacc09469f6f10070be04decf23da39a2a9e
3
{ "blob_id": "95f4dacc09469f6f10070be04decf23da39a2a9e", "branch_name": "refs/heads/master", "committer_date": 1547309583000, "content_id": "780b91018e298341c7888dfc18c576425353694b", "detected_licenses": [ "MIT" ], "directory_id": "83b6cacc603ff7a7eb4fba2691d77d60c40145b2", "extension": "py", "fi...
2.953125
stackv2
import uuid import time import hashlib import requests import webbrowser from fake_useragent import UserAgent class ImageBam: def __init__(self, key, secret): """ :param key: API key provided by ImageBam :type key: string :param secret: API secret provided by ImageBam :typ...
198
33.47
79
15
1,455
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_306975b96165fc26_f7028bfb", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi...
[ 42 ]
[ null ]
[ 28 ]
[ 44 ]
2024-11-19T03:11:56.840593+00:00
1,577,087,309,000
0e9f83b9d92ea31942e464047a6f6bc840f6659a
3
{ "blob_id": "0e9f83b9d92ea31942e464047a6f6bc840f6659a", "branch_name": "refs/heads/master", "committer_date": 1577087309000, "content_id": "0a16532358c8908af6f429cd7c206d382a2dc305", "detected_licenses": [ "MIT" ], "directory_id": "0afb5671b1d433695b7ed4053181b4172bf59288", "extension": "py", "fi...
2.765625
stackv2
users = [] posts = [] reciver_list = [] Email = input("Email - ") Password = input("Password - ") if Email == 'benchuk2004@gmail.com': print("Hey Benchuk2004") if Password == 'roonaldinio12': print("You logged in!") class User(object): def __init__(self,name,email,password,friend_list): friend_list = [] posts ...
111
28
171
21
871
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3364bb6929f22372_441e0526", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 34 ]
[ null ]
[ 9 ]
[ 171 ]
2024-11-19T03:11:58.190891+00:00
1,398,018,772,000
caca57a14c5d31f4b3747a332fce508f46d43cc5
2
{ "blob_id": "caca57a14c5d31f4b3747a332fce508f46d43cc5", "branch_name": "refs/heads/master", "committer_date": 1398018772000, "content_id": "fcfba966af6621f876439110edfa45236d1ea650", "detected_licenses": [ "MIT" ], "directory_id": "21d909f79772130a9e2fbaade2233504d5ba2ef4", "extension": "py", "fi...
2.3125
stackv2
from sqlobject import * from sqlobject.inheritance import InheritableSQLObject from webmux.ssh import SSH from webmux.web_terminal import WebTerminal from twisted.python import log import hashlib sqlhub.processConnection = connectionForURI('sqlite:webmux.db') factory = None MAX_TERM_HISTORY = 10000 class User(S...
376
26.07
115
19
2,277
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_83b748037c15490a_85f36f98", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.", "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally exp...
[ 26, 42 ]
[ null, null ]
[ 65, 34 ]
[ 73, 42 ]
2024-11-19T03:11:58.955225+00:00
1,613,103,724,000
c2123654adda349865b4caa78e53f4d806121731
4
{ "blob_id": "c2123654adda349865b4caa78e53f4d806121731", "branch_name": "refs/heads/main", "committer_date": 1613103724000, "content_id": "679517259b5eb56be8527fae52b0333c8a10c4e3", "detected_licenses": [ "MIT" ], "directory_id": "02833306a04a01579ace024df6c70bf8babd1f42", "extension": "py", "file...
3.515625
stackv2
#!/usr/bin/env python """ File to common methods exposed as static under Common class. """ import logging logger = logging.getLogger(__name__) class Common(object): """ Class handle the common utility methods. ******** Methods: -------- get_secret: Method to get the se...
111
36.99
90
16
724
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c586756ab76e3332_3dc7663e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 74 ]
[ null ]
[ 17 ]
[ 90 ]
2024-11-19T03:11:59.126924+00:00
1,627,211,922,000
ba1417e45d4df19a0cb42d8d1f825d78c012dcf4
2
{ "blob_id": "ba1417e45d4df19a0cb42d8d1f825d78c012dcf4", "branch_name": "refs/heads/main", "committer_date": 1627211922000, "content_id": "140dee4a296dfa4e1b6355f41e4d8ed82887c29c", "detected_licenses": [ "MIT" ], "directory_id": "ff8ece7b16cd2207f749df600e9ef076063d0a7a", "extension": "py", "file...
2.421875
stackv2
import logging from fastapi import FastAPI, HTTPException, status from fastapi.responses import JSONResponse from celery.result import AsyncResult from celery.exceptions import SoftTimeLimitExceeded from .celery_server import app as cel_app, add, is_prime, check_task_in_queue app = FastAPI() # This is the default ...
96
32.58
122
15
709
python
[{"finding_id": "codeql_py/log-injection_b4908b744b2996b6_15667a31", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2)...
3
true
[ "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2).", "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2).", "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [use...
[ 67, 75, 93 ]
[ null, null, null ]
[ 42, 43, 66 ]
[ 49, 50, 73 ]
2024-11-19T03:12:21.286432+00:00
1,547,388,659,000
bf164a638d6df250a85949b7771c270d51695f63
3
{ "blob_id": "bf164a638d6df250a85949b7771c270d51695f63", "branch_name": "refs/heads/master", "committer_date": 1547388659000, "content_id": "7fe325ccd160cee07ab42338ce64ff62e9890f32", "detected_licenses": [ "MIT" ], "directory_id": "6a7ab3807bfba7c2e4601c16c67669da1d5a68be", "extension": "py", "fi...
2.65625
stackv2
''' A simple REST datastore API. Once running, go to the root URL to explore the API using [swaggerui](http://swagger.io/swagger-ui/). ''' import logging import sys import argparse from flask import Flask, request from flask_restplus import Resource, Api, fields log = logging.getLogger(__name__) app = Flask(__name_...
160
30.06
79
15
1,106
python
[{"finding_id": "codeql_py/log-injection_5f97944f25ea0b4e_3dcaaba5", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
3
true
[ "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 96, 123, 132 ]
[ null, null, null ]
[ 38, 39, 39 ]
[ 43, 44, 44 ]
2024-11-19T03:12:40.720520+00:00
1,562,188,147,000
b4fc9803049e55e96dd3e5a6a74b13d9259a79d8
2
{ "blob_id": "b4fc9803049e55e96dd3e5a6a74b13d9259a79d8", "branch_name": "refs/heads/master", "committer_date": 1562188147000, "content_id": "8b2411949afb0a5a0c431f284f93b7eca727e14c", "detected_licenses": [ "MIT" ], "directory_id": "d6259bfa86381e887ea47e9431bb065035925b15", "extension": "py", "fi...
2.484375
stackv2
#!/bin/python3 import math import urllib.request import http.server import json import codecs import shlex import argparse import datetime import collections import pickle import os import threading import contextlib date = datetime.date from _secret_birthbot import HOOK, TOKEN def to_slack(msg : str): req = url...
307
27.21
147
20
2,048
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ffe11222cc1129c2_0d9deede", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 195 ]
[ null ]
[ 43 ]
[ 46 ]
2024-11-19T03:25:40.709211+00:00
1,605,613,817,000
2da1401d32b20802ca4e05be624fc83e4c249fe2
2
{ "blob_id": "2da1401d32b20802ca4e05be624fc83e4c249fe2", "branch_name": "refs/heads/master", "committer_date": 1605613817000, "content_id": "3a8ce65ff67160f7fa8741fc8d50f9800a0efe36", "detected_licenses": [ "MIT" ], "directory_id": "4347c8d8b792bfa478defbb54cf3110d4364d126", "extension": "py", "fi...
2.40625
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- """ Simple scripts to interact with Polylogyx's Api. :copyright: (c) 2019 by PolyLogyx. :license: MIT, see LICENSE for more details. """ import argparse import ast import os import tarfile import time import glob import sys sys.path.insert(0, os.path.dirname(os.path.dirnam...
167
42.86
179
21
1,449
python
[{"finding_id": "codeql_py/tarslip_abe3df24049a2065_87777ebc", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 39 ]
[ null ]
[ 5 ]
[ 8 ]
2024-11-19T03:35:58.862693+00:00
1,585,610,014,000
df458214cc63f00cfaa79fbe0d3e0959bbfd6837
2
{ "blob_id": "df458214cc63f00cfaa79fbe0d3e0959bbfd6837", "branch_name": "refs/heads/master", "committer_date": 1585610014000, "content_id": "6b64d91de6dcc184ae7eb1d008a70111543fafc2", "detected_licenses": [ "Apache-2.0" ], "directory_id": "43dea3ac2f12cad95c2b94a5f037c4edd2ac3679", "extension": "py"...
2.421875
stackv2
# pylint: disable=too-many-instance-attributes, no-self-use """Update Role""" from flask import request from library.common import Common from library.postgresql_queries import PostgreSQL class UpdateVesselINIFiles(Common): """Class for Update Vessel INI Files""" # INITIALIZE def __init__(self): ...
101
28.62
91
21
702
python
[{"finding_id": "codeql_py/path-injection_fe078e6ed1d4fc1d_6b5949a2", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 95 ]
[ null ]
[ 27 ]
[ 31 ]
2024-11-19T01:28:43.240545+00:00
1,560,989,144,000
314ffcd645d8e2175b24a6cc61d217b3210b7b7e
3
{ "blob_id": "314ffcd645d8e2175b24a6cc61d217b3210b7b7e", "branch_name": "refs/heads/master", "committer_date": 1560989144000, "content_id": "0b6d72025957637c2816348dca928de9dfd5b0ff", "detected_licenses": [ "MIT" ], "directory_id": "664038873fb73c13505241f487adeaf88f3b57fa", "extension": "py", "fi...
3.1875
stackv2
# app/robo_advisor.py import csv import json import os import datetime import requests from dotenv import load_dotenv load_dotenv() def to_usd(my_price): return "${0:.2f}".format(my_price) ALPHAVANTAGE_API_KEY = os.environ.get("ALPHAVANTAGE_API_KEY", "OOPS, please set env var called 'ALPHAVANTAGE_API_KEY'") d...
108
30.94
136
13
858
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_57ca9bddc5c9f382_0c4e69ca", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 89 ]
[ null ]
[ 7 ]
[ 47 ]
2024-11-19T01:29:00.703278+00:00
1,591,538,947,000
44b24f6120b0adc10feafb9f289d88d036ff8bf3
3
{ "blob_id": "44b24f6120b0adc10feafb9f289d88d036ff8bf3", "branch_name": "refs/heads/master", "committer_date": 1591538947000, "content_id": "6415f2f565319cde7eb17dac534a5292c802da38", "detected_licenses": [ "MIT" ], "directory_id": "1aace1f1391ea95ec44af0b6f9239e976bcf9690", "extension": "py", "fi...
2.96875
stackv2
from flask import Flask, jsonify from flask import request app = Flask(__name__) @app.route('/') def hello(): return "Hello World!" ''' This method expects a json content. Use header: 'Content-Type: application/json' ''' @app.route('/post', methods=['POST']) def post_method(): req = request.get_json() ...
29
17.66
49
11
138
python
[{"finding_id": "codeql_py/reflective-xss_f56e49f04a91f3ba_606fa2a2", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 25 ]
[ null ]
[ 12 ]
[ 36 ]
2024-11-19T01:29:22.741533+00:00
1,473,385,875,000
f078e5ca3bf7ef3d8e52d17fe826cc425fb18a70
2
{ "blob_id": "f078e5ca3bf7ef3d8e52d17fe826cc425fb18a70", "branch_name": "refs/heads/master", "committer_date": 1473385875000, "content_id": "c0a1cbfc3eefd4ecdab68e2f25fba4f1997e81fc", "detected_licenses": [ "MIT" ], "directory_id": "2cf101fe7ca9ae4e0368b8144adfeaf2ca3f2972", "extension": "py", "fi...
2.4375
stackv2
import re from django import forms from django.contrib.auth import get_user_model from django.conf import settings class SignUpForm(forms.ModelForm): def __init__(self, *args, **kwargs): super(SignUpForm, self).__init__(*args, **kwargs) self.fields['email'].required = True class Meta: ...
41
30.9
89
13
289
python
[{"finding_id": "codeql_py/polynomial-redos_8c3ea3e366fc0b8e_e6e0c7cc", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with ma...
1
true
[ "CWE-1333" ]
[ "py/polynomial-redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with many repetitions of '?'." ]
[ 38 ]
[ null ]
[ 44 ]
[ 51 ]
2024-11-19T01:29:37.131743+00:00
1,625,474,858,000
535e349b151125aafc5c5e2f8e5fc81be96fc679
2
{ "blob_id": "535e349b151125aafc5c5e2f8e5fc81be96fc679", "branch_name": "refs/heads/master", "committer_date": 1625474858000, "content_id": "1459092d03b08403c2683cced6f1e85b9bf0a86e", "detected_licenses": [ "MIT" ], "directory_id": "b39874c65dc5da92d85daee33a9e1bd1139dba78", "extension": "py", "fi...
2.3125
stackv2
# !/usr/bin/env python3 # Copyright 2020 Florian Pigorsch, Kevin Eifinger & Contributors. All rights reserved. # # Use of this source code is governed by a MIT-style # license that can be found in the LICENSE file. """A (Python) script to remotely set device profiles of an AVM Fritz!Box""" import argparse import hash...
324
34.11
88
17
2,531
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_5c8003f24c4c7843_70e054cc", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi...
[ 40 ]
[ null ]
[ 24 ]
[ 51 ]
2024-11-19T01:29:58.083500+00:00
1,403,676,312,000
aff4d3014d031eedb819c346416a9cc7a78d1408
2
{ "blob_id": "aff4d3014d031eedb819c346416a9cc7a78d1408", "branch_name": "refs/heads/master", "committer_date": 1403676312000, "content_id": "b0fd2d13385101dd1a216247be410788c5b51f70", "detected_licenses": [ "MIT" ], "directory_id": "828d1987257419caacbb709db182e5e02ead0666", "extension": "py", "fi...
2.390625
stackv2
#!/usr/bin/env python3 import argparse import os import requests import multiprocessing import sys from gigacluster import CACHE def build_readability_url(url, token): return 'http://www.readability.com/api/content/v1/parser?url={}&token={}'.format(url, token) def fetch(job): url, path = job #print('Fet...
51
28.27
103
21
356
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_564a50bb3240746d_22d6ac72", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 18 ]
[ null ]
[ 17 ]
[ 39 ]
2024-11-19T01:30:15.807768+00:00
1,501,906,383,000
91b9cf6e1b083c22fc437248a94cfb49abab72ec
3
{ "blob_id": "91b9cf6e1b083c22fc437248a94cfb49abab72ec", "branch_name": "refs/heads/master", "committer_date": 1501906383000, "content_id": "7f57afd604215cbba7ea269f12e45bb8263a9933", "detected_licenses": [ "MIT" ], "directory_id": "4ef875f428ead5244edaa3588f05a8b0c5138562", "extension": "py", "fi...
3.21875
stackv2
#!/usr/bin/python # local imports from session import session from settings import settings # python modules import struct from geopy.geocoders import GoogleV3 from geopy.exc import GeocoderTimedOut, GeocoderServiceError ''' Note: This module serves as a handler of 'locations'. A location is something with a GPS lat...
108
23.07
89
18
698
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7abe2a4027acd135_b15a9de4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 94 ]
[ null ]
[ 11 ]
[ 89 ]
2024-11-19T01:30:28.669078+00:00
1,515,392,749,000
30a694e292f5c6522c653f7c44095a7792802a1e
2
{ "blob_id": "30a694e292f5c6522c653f7c44095a7792802a1e", "branch_name": "refs/heads/master", "committer_date": 1515392749000, "content_id": "c22db28b08729c51ac5033b7c6b0742b76e524d2", "detected_licenses": [ "Apache-2.0" ], "directory_id": "c09d0f8c5a3d81e1a78acc910cc59317a3c9ae71", "extension": "py"...
2.34375
stackv2
import json import os from flask import Flask from flask import request from flask import make_response app = Flask(__name__) @app.route('/webhook', methods=['POST']) def webhook(): req = request.get_json(silent=True, force=True) print("Request: ") print(json.dumps(req, indent=4)) res = MakeWebReque...
46
23.98
98
11
307
python
[{"finding_id": "codeql_py/flask-debug_9be189d6e63e66d3_4886e0d2", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 44, 19 ]
[ null, null ]
[ 5, 23 ]
[ 51, 26 ]
2024-11-19T01:54:57.645407+00:00
1,463,405,548,000
2a47c8e21fdb1142687d36be3e3c673048c2fcb7
3
{ "blob_id": "2a47c8e21fdb1142687d36be3e3c673048c2fcb7", "branch_name": "refs/heads/master", "committer_date": 1463405548000, "content_id": "481541cabd54266c0e7a758fe4519195f01dce08", "detected_licenses": [ "Apache-2.0" ], "directory_id": "fec39a990b6324531a42e8211bec6f28f8944a4e", "extension": "py"...
3.390625
stackv2
#!/usr/bin/env python """ This script will randomly generate a cluster.txt in the appropriate format for testing purposes (so that scripts that work with it can be validated without needing to be tested on actual cluster.txt files that may contain privileged information). cluster.txt layout: column 1: node name colu...
85
28.34
77
17
590
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_cf50af56981445a0_43415ece", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 81 ]
[ null ]
[ 15 ]
[ 29 ]
2024-11-19T01:55:07.865160+00:00
1,528,805,618,000
529744a82d8bfec4bdeb9e3f736a6b7f86da7c52
2
{ "blob_id": "529744a82d8bfec4bdeb9e3f736a6b7f86da7c52", "branch_name": "refs/heads/master", "committer_date": 1528805618000, "content_id": "5a9d419a4eb8451198891cca6f916fea25d76824", "detected_licenses": [ "MIT" ], "directory_id": "de75adc1056d30bd3998cf74268ab454a96b0e1f", "extension": "py", "fi...
2.390625
stackv2
# secret_wallet.py # create blockchain.info wallet without exposing your IP # # HingOn Miu # https://blockchain.info/api/blockchain_wallet_api import io import pycurl import random import string import json import stem.process from stem.util import term # https://blog.blockchain.com/2014/12/03/improved-security-for...
119
26.82
100
13
856
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_888ab0b3a8852901_fa8ade7c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 81, 109 ]
[ null, null ]
[ 9, 9 ]
[ 47, 47 ]
2024-11-19T01:55:08.794582+00:00
1,541,426,046,000
6bde635940a77398c094413be95f7ae0e0b8eddb
3
{ "blob_id": "6bde635940a77398c094413be95f7ae0e0b8eddb", "branch_name": "refs/heads/master", "committer_date": 1541426046000, "content_id": "31382dacf837729ece54a888c0c52358ba3c4e8b", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "4cf78f428d143bfab578f85ce181ee5bf748045c", "extension": "p...
3
stackv2
#!/usr/bin/env python #Use flot JavaScript plotting library to visualize a single order plot import numpy as np import json import jinja2 def np_to_json(arr0, arr1): ''' Take two numpy arrays, as in a plot, and return the JSON serialization for flot. ''' data = np.array([arr0, arr1]).T #Transpose the...
127
32.18
118
13
1,046
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_fb3b9d4324032fe5_56fbd5ef", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 38 ]
[ null ]
[ 19 ]
[ 60 ]
2024-11-19T01:55:21.681684+00:00
1,364,325,946,000
8651e537ca3ad866436bebb8c2b89af1c9678ce3
3
{ "blob_id": "8651e537ca3ad866436bebb8c2b89af1c9678ce3", "branch_name": "refs/heads/master", "committer_date": 1364325946000, "content_id": "6de2792217e4c3365b38ead9deac1105e50f53e0", "detected_licenses": [ "Apache-2.0" ], "directory_id": "befd7618c77b178d000b701a52809195b2d1f620", "extension": "py"...
2.609375
stackv2
#!/usr/bin/env python # encoding: utf-8 """ decorators.py Created by Jason Elbourne on 2012-07-02. Copyright (c) 2012 Jason Elbourne. All rights reserved. """ from models.oauth_models import OAuth_Token import logging def oauth_required(scope=None, realm='portal'): """ This is a decorator to be used with RequestHan...
55
34.58
137
20
482
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4dfb965b72cbef67_aaf18ccf", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 28 ]
[ null ]
[ 19 ]
[ 42 ]
2024-11-19T01:55:21.855184+00:00
1,475,391,735,000
06e5018b12fb96fcc3402c5bb2d3fc564c4a6dcf
3
{ "blob_id": "06e5018b12fb96fcc3402c5bb2d3fc564c4a6dcf", "branch_name": "refs/heads/master", "committer_date": 1475391735000, "content_id": "af57d7e9df3ecae9fa08745b721a8385838102a7", "detected_licenses": [ "MIT" ], "directory_id": "86ac3b2904003f9e58948cb732c3c13cef50b30b", "extension": "py", "fi...
2.78125
stackv2
#!/usr/bin/env python from jinja2 import Environment, FileSystemLoader import os, sys if __name__ == '__main__' : if len(sys.argv) <= 1: print "usage: renderConfigFile.py $filename $args" sys.exit(-1) THIS_DIR = os.path.dirname(os.path.abspath(__file__)) j2_env = Environment(loader=FileSy...
39
24.05
77
13
250
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_59d2df9965758967_19cf1ebb", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 12 ]
[ null ]
[ 14 ]
[ 78 ]
2024-11-19T02:06:40.751657+00:00
1,626,112,679,000
2198488f2264fa8d42be5c3d609815b4539630fc
3
{ "blob_id": "2198488f2264fa8d42be5c3d609815b4539630fc", "branch_name": "refs/heads/master", "committer_date": 1626112679000, "content_id": "30c7fed4376e9cb74b1f7f51c407ef703d07c874", "detected_licenses": [ "MIT" ], "directory_id": "448f565c5b146ed2abe9b50853f6c0934cc7079a", "extension": "py", "fi...
2.578125
stackv2
import binascii import json from collections import OrderedDict from uuid import uuid4 import Crypto from Crypto.Hash import SHA from Crypto.PublicKey import RSA from Crypto.Signature import PKCS1_v1_5 from django.http import JsonResponse from rest_framework.response import Response from rest_framework import status,...
134
29.59
119
18
819
python
[{"finding_id": "codeql_py/weak-crypto-key_58bc10b6be18e4d5_cb9ca27d", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",...
1
true
[ "CWE-326" ]
[ "py/weak-crypto-key" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable." ]
[ 112 ]
[ null ]
[ 23 ]
[ 53 ]
2024-11-19T02:06:44.226013+00:00
1,612,861,188,000
c30ea664a69427b6bcdd5e49ec33fb4af2c35812
2
{ "blob_id": "c30ea664a69427b6bcdd5e49ec33fb4af2c35812", "branch_name": "refs/heads/master", "committer_date": 1612861188000, "content_id": "92ea4c9cfeae01593a9284bed520b7ac0317c852", "detected_licenses": [ "Apache-2.0" ], "directory_id": "1b7f3ab42639ef4993cddb5c767b8ab86aeeeb88", "extension": "py"...
2.359375
stackv2
#!/usr/bin/env python """ Very simple HTTP server in python (Updated for Python 3.7) Usage: ./dummy-web-server.py -h ./dummy-web-server.py -l localhost -p 8000 Send a GET request: curl http://localhost:8000 Send a HEAD request: curl -I http://localhost:8000 Send a POST request: curl -d "foo=...
127
33.71
118
20
1,062
python
[{"finding_id": "codeql_py/command-line-injection_9c15c74d7c513a79_0fbd7b7e", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {...
2
true
[ "CWE-078", "CWE-022" ]
[ "py/command-line-injection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This command line depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 90, 59 ]
[ null, null ]
[ 38, 19 ]
[ 41, 27 ]
2024-11-19T02:06:46.323641+00:00
1,546,496,614,000
679389627e76e03761cccae86b5a19cf2243dd77
2
{ "blob_id": "679389627e76e03761cccae86b5a19cf2243dd77", "branch_name": "refs/heads/master", "committer_date": 1546496614000, "content_id": "9f68163210426916ce50023b739048a2c24fda32", "detected_licenses": [ "MIT" ], "directory_id": "a303929774cc1fd9ddf726ff340d298896de599b", "extension": "py", "fi...
2.4375
stackv2
# -*- coding: utf-8 -*- """A simple bot script, built on Pyramid using Cornice. This sample script leverages the Pyramid web framework https://trypyramid.com/ with Cornice https://cornice.readthedocs.io. By default the web server will be reachable at port 6543 you can change this default if desired (see `pyramidWebe...
160
31.29
79
16
1,217
python
[{"finding_id": "codeql_py/request-without-cert-validation_867502fef1753b4e_97381afd", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 94 ]
[ null ]
[ 16 ]
[ 57 ]
2024-11-19T02:06:54.784871+00:00
1,611,745,369,000
20d791a1902c72c767071db0952c1349350c33d8
3
{ "blob_id": "20d791a1902c72c767071db0952c1349350c33d8", "branch_name": "refs/heads/main", "committer_date": 1611745369000, "content_id": "220025e5007b0111d840f0dc06b94338ff4ddb33", "detected_licenses": [ "MIT" ], "directory_id": "abd2397c0b2f99b0d1232e0385b9af00ab3399f4", "extension": "py", "file...
2.59375
stackv2
import omegaml as om import json # No need to specify in the setup file (NNtS) import dash # (NNtS) import dash_bootstrap_components as dbc # Specify in the setup file ? import dash_core_components as dcc # (NNtS) import dash_html_components as html # (NNtS) import numpy as np # (NNtS) import omegaml as om # (NNt...
406
38.15
175
21
2,906
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_19c5e95340a92d94_7086cdea", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 294 ]
[ null ]
[ 15 ]
[ 33 ]
2024-11-19T02:07:35.456183+00:00
1,595,164,173,000
ef80b160e0e4a1b624f96ef6cfc15c58e5b79142
2
{ "blob_id": "ef80b160e0e4a1b624f96ef6cfc15c58e5b79142", "branch_name": "refs/heads/master", "committer_date": 1595164173000, "content_id": "3a925f4134698648da6fa8a483ebfa3948fbc283", "detected_licenses": [ "MIT" ], "directory_id": "81007ab5618d9395f0bf1563c18bd9c7823b90fc", "extension": "py", "fi...
2.46875
stackv2
from zoodb import * from debug import * import hashlib import random import pbkdf2 def newtoken(db, person): hashinput = "%s%.10f" % (person.password, random.random()) person.token = hashlib.md5(hashinput).hexdigest() db.commit() return person.token def login(username, password): db_person = perso...
64
25.47
62
11
433
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_585bb00008854a5a_0d032859", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi...
[ 9 ]
[ null ]
[ 32 ]
[ 41 ]
2024-11-19T02:31:16.915915+00:00
1,576,752,026,000
f8b875595f336a2d7ad29db2b2f6051f5340f82d
4
{ "blob_id": "f8b875595f336a2d7ad29db2b2f6051f5340f82d", "branch_name": "refs/heads/master", "committer_date": 1576752026000, "content_id": "578ec0799405244f0be8571bb8a479aefb71f6a1", "detected_licenses": [ "Unlicense" ], "directory_id": "084976caf539439a4a552093a76934eec9eb8128", "extension": "py",...
3.609375
stackv2
birthdays = {'rachel':'26th Sept 2006', 'ryan':'9th Jan 2003', 'chris':'28th Jan 1973', 'medha':'8th Sep 1973', 'rita':'14th July 1940'} while True: print('enter a name: (blank to quit]') name = input() if name == '': break if name in birthdays: print(birthdays[name] + ' is the birthda...
17
31.65
136
12
168
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_981e4c77db719204_f411728b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 10 ]
[ null ]
[ 15 ]
[ 62 ]
2024-11-19T02:31:42.970897+00:00
1,612,575,126,000
bd79b9e7c5a5cd9462bd1dfcc1841c2198275992
3
{ "blob_id": "bd79b9e7c5a5cd9462bd1dfcc1841c2198275992", "branch_name": "refs/heads/main", "committer_date": 1612575126000, "content_id": "df7835adfa42b2ced3f45603558418c71b4ef850", "detected_licenses": [ "MIT" ], "directory_id": "89cbd6a4bb6e010328aab4d5ed113ee079aa6711", "extension": "py", "file...
2.65625
stackv2
import re import numpy as np # linear algebra import pandas as pd # data processing, CSV file I/O (e.g. pd.read_csv) df_train = pd.read_csv('./uncased_processed_train.csv', index_col='id') df_testa = pd.read_csv('./uncased_processed_testa.csv', index_col='id') df_testb = pd.read_csv('./uncased_processed_testb.csv', i...
79
30.25
78
13
759
python
[{"finding_id": "codeql_py/overly-large-range_8b74f61a7412b149_ce5acceb", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "remediatio...
4
true
[ "CWE-020", "CWE-020", "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range ...
[ 14, 14, 14, 14 ]
[ null, null, null, null ]
[ 30, 33, 36, 45 ]
[ 34, 37, 40, 49 ]
2024-11-19T02:31:48.284143+00:00
1,518,059,189,000
6f1c5c3ddeaa8037dea16f03632f4b2c7642e453
3
{ "blob_id": "6f1c5c3ddeaa8037dea16f03632f4b2c7642e453", "branch_name": "refs/heads/master", "committer_date": 1518059189000, "content_id": "7ecdcf5bd794d831e01b3b35782a873ac2ac337d", "detected_licenses": [ "MIT" ], "directory_id": "244cbb74069b8201e83fb9b593ee0f9ad8332a83", "extension": "py", "fi...
2.71875
stackv2
"""Wrappers for GPG/Keybase functionality we need""" from __future__ import print_function import collections import itertools as IT import sys import atexit import os import re from shutil import rmtree from base64 import b64encode, b64decode import logging import json from tempfile import mkstemp, mkdtemp import subp...
460
29.85
78
18
3,422
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_74a8b4cd2308f9af_15cf1367", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (password)](3) as clear text.\nThis expression stores [sensitive data (password)](4) as clear text.\nThis expression stores [sensitive d...
[ 146 ]
[ null ]
[ 24 ]
[ 34 ]