added
stringlengths
32
32
created
int64
1,244B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.25
source
stringclasses
1 value
text
stringlengths
324
20.1k
num_lines
int64
16
598
avg_line_length
float64
15.1
58.3
max_line_length
int64
33
179
ast_depth
int64
8
39
length
int64
101
3.8k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.1k
265k
sast_codeql_findings_count
int64
1
45
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
45
rule_ids
listlengths
1
45
confidences
listlengths
1
45
severities
listlengths
1
45
messages
listlengths
1
45
line_starts
listlengths
1
45
line_ends
listlengths
1
45
column_starts
listlengths
1
45
column_ends
listlengths
1
45
2024-11-19T01:55:21.872897+00:00
1,693,585,381,000
d3b36431460a279c164f64a85c65de1875b21f80
3
{ "blob_id": "d3b36431460a279c164f64a85c65de1875b21f80", "branch_name": "refs/heads/main", "committer_date": 1693585381000, "content_id": "02c6afa11de8234fbffdc7748f0d1779c23a2f1f", "detected_licenses": [ "Apache-2.0", "MIT" ], "directory_id": "d51f530078404a24f1844b53b037bbfed238a784", "extensi...
2.78125
stackv2
# Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. # SPDX-License-Identifier: Apache-2.0 import logging from botocore.exceptions import ClientError from flask_restful import Resource logger = logging.getLogger(__name__) class Analysis(Resource): """ Encapsulates a resource that analyzes im...
44
38.68
90
18
381
python
[{"finding_id": "codeql_py/log-injection_c9c360e5820b8049_24562099", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
2
true
[ "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 38, 41 ]
[ null, null ]
[ 76, 69 ]
[ 85, 78 ]
2024-11-19T01:55:29.754909+00:00
1,477,232,998,000
85852d14ff1cd3e1dd60a3391b6e48ce2e294738
3
{ "blob_id": "85852d14ff1cd3e1dd60a3391b6e48ce2e294738", "branch_name": "refs/heads/master", "committer_date": 1477232998000, "content_id": "c6c2e30c22543f45cbea14b6461efe6e2a024db7", "detected_licenses": [ "MIT" ], "directory_id": "0c5af2015aa56978a11c797184b561ad34d18c9c", "extension": "py", "fi...
2.5625
stackv2
from inputModel.section import Section from inputModel.cp2kinput import CP2Kinput from lxml import objectify from jinja2 import Environment, FileSystemLoader import os import argparse import time def createFile(path, filename, content): if not os.path.exists(path): os.makedirs(path) f = open(path + "/"...
69
34.19
117
11
593
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_00efc64ced534ed5_e7891ad5", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 29 ]
[ null ]
[ 13 ]
[ 62 ]
2024-11-19T02:06:45.011889+00:00
1,584,658,742,000
a23e5575b0b0bfe0dfcd66c2ebbf162ee33b8385
3
{ "blob_id": "a23e5575b0b0bfe0dfcd66c2ebbf162ee33b8385", "branch_name": "refs/heads/master", "committer_date": 1584658742000, "content_id": "b090e45e0d382c7e411dbb8de8409f35cffb9e61", "detected_licenses": [ "MIT" ], "directory_id": "6fe4624efbd8e7f3a7a03b6561b731f552419ef7", "extension": "py", "fi...
2.875
stackv2
# python app/titanic_nosql.py from dotenv import load_dotenv import os import pymongo import pandas as pd import json # LOAD MONGO DATABASE ENV VARS FROM ".env" FILE load_dotenv() DB_USER = os.getenv("MONGO_USER", default="Oooops") DB_PASSWORD = os.getenv("MONGO_PASSWORD", default="Oooops") CLUSTER_NAME = os.geten...
60
26.85
141
11
426
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a29ce2ac7b596aee_1a19013d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 19 ]
[ null ]
[ 15 ]
[ 29 ]
2024-11-19T02:07:09.806492+00:00
1,601,468,212,000
ef514499755c6b3bba69d1b6a88e6a06c3e1163f
2
{ "blob_id": "ef514499755c6b3bba69d1b6a88e6a06c3e1163f", "branch_name": "refs/heads/master", "committer_date": 1601468212000, "content_id": "6a2e8bc0660e6168f8e4f7924f7ddc78b3427d61", "detected_licenses": [ "MIT" ], "directory_id": "160798175c4785c3eeabd69c2b886b1df2ba4269", "extension": "py", "fi...
2.40625
stackv2
#author:九世 #time:2019/1/13 import requests import threading import re import os import time xj=open('domain_file/domain.txt','w') xj.close() def reads(file): dk=open('doc_host/{}'.format(file),'r') for d in dk.readlines(): sc="".join(d.split('\n')) yield sc headers={'user-agent':'Mozilla/5....
55
34.84
161
22
541
python
[{"finding_id": "codeql_py/overly-large-range_20c919b1e40e4bde_611f056f", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 37 ]
[ null ]
[ 36 ]
[ 39 ]
2024-11-19T02:07:24.606876+00:00
1,485,924,583,000
4f715450aef50eb7d384d377e6348424135750ad
3
{ "blob_id": "4f715450aef50eb7d384d377e6348424135750ad", "branch_name": "refs/heads/master", "committer_date": 1485924583000, "content_id": "accb35085c6fe5af4f9e7ebd6b1c7bcb741079ee", "detected_licenses": [ "MIT" ], "directory_id": "fc7a84574ff2f90cce13d14fcefa4c58b1ad1fb8", "extension": "py", "fi...
2.828125
stackv2
import requests; import os; from getpass import getpass; ''' FORMAT: - action: "tunnel" - sub-action: "get"|"post"|"session"|"login_session" ''' class Tunnel: def __init__(self,url=None): self.url="https://www.google.com"; self.session = None; #to be a requests.session object return; def get(self,url=N...
92
23.12
108
18
563
python
[{"finding_id": "codeql_py/request-without-cert-validation_dfb2710026de5b7d_c1045ca9", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
3
true
[ "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 25, 35, 73 ]
[ null, null, null ]
[ 11, 11, 11 ]
[ 41, 42, 56 ]
2024-11-19T02:31:19.103409+00:00
1,489,096,058,000
c1ca0ba5668658c0e40459cdeaecac60830aa398
3
{ "blob_id": "c1ca0ba5668658c0e40459cdeaecac60830aa398", "branch_name": "refs/heads/master", "committer_date": 1489096058000, "content_id": "ae10fc272ca79021fb025f6253b36756f390899d", "detected_licenses": [ "MIT" ], "directory_id": "804aba07d0fcd731d2e07c150817e113dd2766c4", "extension": "py", "fi...
2.671875
stackv2
#!/usr/bin/env python3 # -*- coding: UTF-8 -*- """ Create Etsin API calls from LDF.fi dataset descriptions """ import argparse import copy from collections import defaultdict import json from pprint import pprint import requests from SPARQLWrapper import JSON, SPARQLWrapper ENDPOINT = 'http://ldf.fi/service-descript...
184
30.43
117
22
1,362
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f897224979f4bfba_0da1e654", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 182 ]
[ 183 ]
[ 11 ]
[ 58 ]
2024-11-19T02:31:43.461981+00:00
1,678,727,967,000
a30d2b5d5aed08290ead40ea638f2e5af73e5150
3
{ "blob_id": "a30d2b5d5aed08290ead40ea638f2e5af73e5150", "branch_name": "refs/heads/master", "committer_date": 1678727967000, "content_id": "9a4bb691604d85e885dc08f63ad2a14fb03ef1de", "detected_licenses": [ "MIT" ], "directory_id": "6e11651d3ca74090656cd460cbaec984f65767dd", "extension": "py", "fi...
2.765625
stackv2
''' Library borroeing logic service. 11/25/19 Created ''' import json import requests import argparse from datetime import date, timedelta from flask import Flask from flask import jsonify from flask import abort from flask import make_response from flask import request BORROWING_LIMIT = 4 # User-defined borrowin...
151
29.36
128
16
1,070
python
[{"finding_id": "codeql_py/flask-debug_59e0581975461c22_45c5de52", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-918" ]
[ "py/flask-debug", "py/partial-ssrf" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 150, 76 ]
[ null, null ]
[ 5, 33 ]
[ 54, 109 ]
2024-11-19T02:33:06.702967+00:00
1,571,687,531,000
2103356512a48d995e2b94e8448a2bc1e0065841
3
{ "blob_id": "2103356512a48d995e2b94e8448a2bc1e0065841", "branch_name": "refs/heads/master", "committer_date": 1571687531000, "content_id": "b465d98b1742993d70fde96a9dbcdadcec211700", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "363db3ac4d384adee45c2ce0d92c59f21ef231f7", "extension": "p...
2.859375
stackv2
import requests from bs4 import BeautifulSoup import pandas as pd import functools from tqdm import tqdm import json def scrape(): soup = get_main_page() jumpscares = get_main_table(soup) save_jumpscares(jumpscares) good_links = get_links(soup) data_details = get_detailed_data(good_links) save...
126
38.25
103
24
1,117
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_fff1bac21083f363_be6961f0", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [imdb.com](1) may be at an arbitrary position in the sa...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [imdb.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 74 ]
[ null ]
[ 19 ]
[ 42 ]
2024-11-19T02:33:11.688228+00:00
1,529,942,469,000
9ed33af72bbc95669ab47a0690e59b94362bed96
3
{ "blob_id": "9ed33af72bbc95669ab47a0690e59b94362bed96", "branch_name": "refs/heads/master", "committer_date": 1529942469000, "content_id": "3bbaf5a78405f5250b2b84824f9cbf0d356e8d03", "detected_licenses": [ "MIT" ], "directory_id": "16617077b64f0ca90c1eb4ef317a87c3a1455404", "extension": "py", "fi...
2.6875
stackv2
""" Flask demo server. """ from flask import Flask, request from smsdemo.constants import POST_PATH, SIGNATURE_HEADER_KEY from smsdemo.message import SMSMessage from smsdemo.util import ( ServerConfig, SMSSendError, parse_signature, generate_signature, sync_send, ) app = Flask(__name__) @app.route(POS...
58
26.71
85
12
373
python
[{"finding_id": "codeql_py/log-injection_c4315d5b39c8da22_6098bbe8", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 38 ]
[ null ]
[ 65 ]
[ 68 ]
2024-11-19T02:43:25.081490+00:00
1,585,764,319,000
b1cd212929404087a8eb4b0971b642d9a487fdde
3
{ "blob_id": "b1cd212929404087a8eb4b0971b642d9a487fdde", "branch_name": "refs/heads/master", "committer_date": 1585764319000, "content_id": "5bb29ffa4cd87809df0f56dca228404e2eaf9356", "detected_licenses": [ "MIT" ], "directory_id": "9eaa2c64a777bd24a3cccd0230da5f81231ef612", "extension": "py", "fi...
2.546875
stackv2
from flask import Flask,render_template,request,redirect from flask_sqlalchemy import SQLAlchemy from sqlalchemy import or_ app = Flask(__name__) app.config['SQLALCHEMY_DATABASE_URI']="mysql://root:584023982@127.0.0.1:3306/flask" app.config['SQLALCHEMY_COMMIT_ON_TEARDOWN']=True db = SQLAlchemy(app) # 根据现有的表结构构建模型类 cla...
342
32.12
90
18
3,238
python
[{"finding_id": "codeql_py/flask-debug_794d51adce12a44a_bb86b027", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-601" ]
[ "py/flask-debug", "py/url-redirection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 342, 186 ]
[ null, null ]
[ 5, 21 ]
[ 24, 24 ]
2024-11-19T02:43:25.334839+00:00
1,546,965,816,000
0b3b0c5425a2f8d8aa660825d8d2356bc764b447
3
{ "blob_id": "0b3b0c5425a2f8d8aa660825d8d2356bc764b447", "branch_name": "refs/heads/master", "committer_date": 1546965816000, "content_id": "5252c3c2251f1eac67ae19263e6133688a6dd4c3", "detected_licenses": [ "Unlicense" ], "directory_id": "0fcda5d5cfc7b8a55cb00cc66486e6979bbdcf56", "extension": "py",...
2.640625
stackv2
import binascii import hashlib import hmac def gen_NThash(password): _ntlm = hashlib.new("md4", password.encode("utf-16-le")).digest() ntlm = binascii.hexlify(_ntlm) return ntlm def firstHMAC(username, domain, nthash): concat = (username+domain).upper().encode("utf-16-le").hex() fhash = hmac.n...
18
23.28
98
14
126
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_f90c160fd1a5244b_75c39e5b", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD4) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD4) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 8 ]
[ null ]
[ 32 ]
[ 60 ]
2024-11-19T02:55:27.453770+00:00
1,519,305,526,000
c56f255ed641a20f11334166688bce1fa9872734
2
{ "blob_id": "c56f255ed641a20f11334166688bce1fa9872734", "branch_name": "refs/heads/master", "committer_date": 1519305526000, "content_id": "6ceb3af31d15558e7abc71aec2cb66bbdb5d62c6", "detected_licenses": [ "Apache-2.0" ], "directory_id": "3fa84e5493122f259ef1cf553eefb7be59dc18f9", "extension": "py"...
2.34375
stackv2
from django.contrib.auth import get_user_model from rest_framework import status from rest_framework.authtoken.models import Token from rest_framework.decorators import ( api_view, permission_classes, renderer_classes, ) from rest_framework.permissions import IsAdminUser, IsAuthenticated from rest_framewor...
46
29.87
80
18
278
python
[{"finding_id": "codeql_py/stack-trace-exposure_c7473ceb1581a330_9b084b55", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 46 ]
[ null ]
[ 25 ]
[ 44 ]
2024-11-19T02:55:29.648591+00:00
1,628,218,081,000
c5772c74f7f42144b35b98f2e78baffb00f6f8b8
2
{ "blob_id": "c5772c74f7f42144b35b98f2e78baffb00f6f8b8", "branch_name": "refs/heads/master", "committer_date": 1628218081000, "content_id": "8d9b14a1a5fdbe230b968eacd0cf9270ccdac833", "detected_licenses": [ "MIT" ], "directory_id": "5eb3217437641d3ac62be6b63759edfa3b8b8217", "extension": "py", "fi...
2.359375
stackv2
import logging from os import environ from flask import current_app, request def Logging(): if 'FILENAME' in current_app.config: filename = current_app.config['FILENAME'] else: filename = "request.log" return filename def MaxSizeUpload(): if 'LOG_UPLOAD_LIMIT' in current_app.config: ...
128
30.52
85
26
823
python
[{"finding_id": "codeql_py/log-injection_c84a8bc490e15454_9f5472a4", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 92 ]
[ null ]
[ 27 ]
[ 70 ]
2024-11-19T03:10:19.213924+00:00
1,602,408,421,000
9f4bd85ad0fe775a50e4f171c29451161004101e
3
{ "blob_id": "9f4bd85ad0fe775a50e4f171c29451161004101e", "branch_name": "refs/heads/master", "committer_date": 1602408421000, "content_id": "95853b5b0f2702e6598a6a643d22cd95c422b188", "detected_licenses": [ "MIT" ], "directory_id": "bd864512264121be1c13a84f59fd4bdc33f89429", "extension": "py", "fi...
2.84375
stackv2
from aes.transformations import * from aes.key_expansion import * def do_aes_128(_in, key): rkeys = key_expansion(key) state = add_round_key(_in, rkeys[0]) for i in range(1, 10): state = sub_bytes(state) state = shift_rows(state) state = mix_columns(state) state = add_round_key(state, rkeys[i]) state = ...
28
22.25
62
12
202
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_17081966b2658b16_52450556", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
1
true
[ "CWE-327" ]
[ "py/weak-cryptographic-algorithm" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 28 ]
[ null ]
[ 7 ]
[ 54 ]
2024-11-19T03:10:39.228019+00:00
1,556,312,323,000
5228a826e8b59386700e6ef24af183621b2c9b62
3
{ "blob_id": "5228a826e8b59386700e6ef24af183621b2c9b62", "branch_name": "refs/heads/master", "committer_date": 1556312562000, "content_id": "d8eb4daf0c98dc5af1214116ba647ca7e2a7f2ac", "detected_licenses": [ "Apache-2.0" ], "directory_id": "16054bb3a2783f4f0e2413dcb3b53dac75f43ff1", "extension": "py"...
2.6875
stackv2
#!/bin/env python3 import argparse import base64 import configparser import requests import json import sys def parse_args(): '''Parse commandline arguments and return an argparse.Namespace object''' parser = argparse.ArgumentParser() parser.add_argument('-f', '--config', help="config file", require...
86
30.48
82
13
589
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_43928d450728f37c_a21761a9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 73 ]
[ null ]
[ 15 ]
[ 20 ]
2024-11-19T03:10:54.547380+00:00
1,617,349,439,000
4b494c4c098e524006d067a31abdee694be00553
4
{ "blob_id": "4b494c4c098e524006d067a31abdee694be00553", "branch_name": "refs/heads/main", "committer_date": 1617349439000, "content_id": "a595284f16da9159bc65884500fa0dcffba2d324", "detected_licenses": [ "MIT" ], "directory_id": "938650c8a8191a4203462e44ff9684b01fa61d54", "extension": "py", "file...
3.84375
stackv2
def password_validation(string1): result = '' has_valid_length = False if 6 <= len(string1) <= 10: has_valid_length = True has_valid_characters = True for element in string1: character_validation = False for ref in range(48, 58): if element == chr(ref): ...
47
29.55
74
12
322
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_df86fca490ed3041_96f6b947", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 41 ]
[ null ]
[ 7 ]
[ 14 ]
2024-11-19T03:21:54.539468+00:00
1,617,547,654,000
42e7e1e8e24a92447a5ffa798d9c51c512fd760e
2
{ "blob_id": "42e7e1e8e24a92447a5ffa798d9c51c512fd760e", "branch_name": "refs/heads/master", "committer_date": 1617547654000, "content_id": "d0af7b5123f349b237dbf4e620375d43e268fa2e", "detected_licenses": [ "MIT" ], "directory_id": "becb5119fd04daf8b1b557a69112fd89b90d0538", "extension": "py", "fi...
2.328125
stackv2
from asyncio import sleep from concurrent.futures._base import TimeoutError import datetime from logging import getLogger import os from random import randint from ssl import SSLError import traceback from typing import Optional, List from aiogram import Bot import httpx from proxy_randomizer.providers import Register...
153
35.42
96
16
1,209
python
[{"finding_id": "codeql_py/request-without-cert-validation_11662181abad9b83_b0287a4f", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 137 ]
[ null ]
[ 34 ]
[ 72 ]
2024-11-19T03:22:05.308209+00:00
1,506,431,562,000
030f50cfd57c5797cfb9a62824d87264610dcee9
4
{ "blob_id": "030f50cfd57c5797cfb9a62824d87264610dcee9", "branch_name": "refs/heads/master", "committer_date": 1506431562000, "content_id": "e14f6a8478c8880449220ab6eb26c6df960ac11a", "detected_licenses": [ "MIT" ], "directory_id": "d738b88cbd8957cdf3741eafa9736e29a4231266", "extension": "py", "fi...
3.515625
stackv2
""" A class that handles user details""" class UserDetails(object): """a list that holds all users""" userlist =[] def __init__(self): self.details={} def signup(self,username, email, password): self.username = username self.email = email self.password = password ...
35
26.94
106
14
198
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_97e3ffafe9f80eeb_5612071d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 24 ]
[ null ]
[ 19 ]
[ 32 ]
2024-11-19T03:22:15.347557+00:00
1,619,467,611,000
6068644051ff6ac885109d106a25f1670d7cf77c
3
{ "blob_id": "6068644051ff6ac885109d106a25f1670d7cf77c", "branch_name": "refs/heads/main", "committer_date": 1619467611000, "content_id": "357f7802d655c64065ad8843ab3ef2d49863eb9b", "detected_licenses": [ "MIT" ], "directory_id": "c516df2118000e3abaa61527de7badb94680081e", "extension": "py", "file...
2.953125
stackv2
import requests import json from utilities.get_token import token app_id = 'sample' app_secret = 'test' hostip = '10.132.0.18' headers = {"Content-Type":"application/json"} payload = {"app_id":app_id,"app_secret":app_secret} # Convert to json payload=json.dumps(payload) r = token(app_id,app_secret,hostip) print(r)...
104
21.38
83
8
580
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_07d376530f63bf62_1d371d66", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 24 ]
[ null ]
[ 7 ]
[ 17 ]
2024-11-19T03:22:16.086996+00:00
1,675,435,579,000
3c407b5541c18a04aec5968a579c5186d76ad06e
3
{ "blob_id": "3c407b5541c18a04aec5968a579c5186d76ad06e", "branch_name": "refs/heads/master", "committer_date": 1675435579000, "content_id": "4335de4c09725327b33d218fcf78d1d938076487", "detected_licenses": [ "MIT" ], "directory_id": "618598361ffaa8db8b4489b667636348a79b3e72", "extension": "py", "fi...
2.6875
stackv2
"""Low-level handling of Ceph volumes. This module contains the Volume, Snapshot, and Image classes. Volume represents an RBD volume that is not a snapshot. Image is an abstract base class for both volumes and snapshots. """ import contextlib import json import os import os.path as p import time import rbd from ..u...
377
29.93
80
22
2,699
python
[{"finding_id": "codeql_py/overly-permissive-file_1907ea97996f2290_4c496da3", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ...
2
true
[ "CWE-732", "CWE-732" ]
[ "py/overly-permissive-file", "py/overly-permissive-file" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world writable.", "Overly permissive mask in chmod sets file to group readable." ]
[ 367, 370 ]
[ null, null ]
[ 13, 13 ]
[ 37, 37 ]
2024-11-19T03:43:51.953850+00:00
1,552,130,440,000
57a353acb3a2203991e86a04cca3dabe056478a7
3
{ "blob_id": "57a353acb3a2203991e86a04cca3dabe056478a7", "branch_name": "refs/heads/master", "committer_date": 1552130440000, "content_id": "5508f396efa4e7f92a3f4ec9b9999de762d916d0", "detected_licenses": [ "MIT" ], "directory_id": "8880c1d706b6ed565cd974c1b2155b033911c756", "extension": "py", "fi...
3.078125
stackv2
#!/usr/bin/env python3 import os import datetime import models import models.doctor as doctor from models import patient class Appointment: def __init__(self, time, patient_id, doctor_id, intervention, description): self.__patient = patient_id if not self.__patient: print("[-] Patient ...
451
27.12
88
18
3,044
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_8306e73e2b34d4e6_298ed3e3", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",...
5
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.", "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.\nThis expression stores [sensitive data (private)](3) as clear text.\nThis expression stores [sensitive d...
[ 127, 446, 264, 375, 403 ]
[ null, null, null, null, null ]
[ 16, 20, 11, 11, 11 ]
[ 37, 39, 62, 34, 39 ]
2024-11-19T03:43:57.441928+00:00
1,534,801,334,000
5c610542512213fc718068aa7e7efdab104fb597
3
{ "blob_id": "5c610542512213fc718068aa7e7efdab104fb597", "branch_name": "refs/heads/master", "committer_date": 1534801334000, "content_id": "913c701cd03371f8441f7af5a6c11aac2d277865", "detected_licenses": [ "MIT" ], "directory_id": "644dbd3151a5044ec4030ced21caf847386f2af0", "extension": "py", "fi...
3.078125
stackv2
#!/usr/bin/python2.7 #Gather initialPasswordView details for list of users. #Necessary inputs: # list of users, delineated by newline (\n) # output file # username of OpenIDM user to call API with # password of OpenIDM user import json import getopt import getpass import sys import requests def parseIn...
106
36.04
162
16
1,057
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_015e383cf7b9a9f8_2ce9574b", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 101 ]
[ null ]
[ 24 ]
[ 33 ]
2024-11-19T03:44:10.800702+00:00
1,581,581,104,000
d332726e987148e0a2a8c632b93e9532b0745a86
3
{ "blob_id": "d332726e987148e0a2a8c632b93e9532b0745a86", "branch_name": "refs/heads/master", "committer_date": 1581581104000, "content_id": "ee6f81184fdc128af7c8db59ff5bcfb4f0789978", "detected_licenses": [ "MIT" ], "directory_id": "3e4dc27dfa9b115b5c29c5f3e64dfe8fbb13506c", "extension": "py", "fi...
2.828125
stackv2
""" BluePrint for all Authontication routs and logic Use "from passlib.hash import sha256_crypt" as our encryption library User information stored in the session (Backend) as a dictionary And accessible from any route 30% written by Alex Kohanim 70% written By Akshay Kasar If any questions arise from this blueprint...
152
34.72
84
19
1,124
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1ed7a480865027db_a2c6ac32", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 98, 98 ]
[ null, null ]
[ 19, 30 ]
[ 28, 47 ]
2024-11-19T03:44:29.480065+00:00
1,600,424,005,000
583c0c0ee827682820d8e0cc561530c5dbdd92d5
2
{ "blob_id": "583c0c0ee827682820d8e0cc561530c5dbdd92d5", "branch_name": "refs/heads/master", "committer_date": 1600424005000, "content_id": "fcad8f45f040d8d27d8d4563ef8ba2458fd76b43", "detected_licenses": [ "MIT" ], "directory_id": "f8bc57f9f0e09c7d2d6f8887b9ec657deb47e898", "extension": "py", "fi...
2.40625
stackv2
import time import PIL import numpy as np import torch import torchvision import torchvision.transforms as transforms import torch.nn as nn import torch.nn.functional as F import torch.optim as optim import apex from tqdm import tqdm import multiprocessing num_threads = 2 BATCH_SIZE = 512 EPOCHS = 200 LEARNING_RATE = 0...
142
31.19
94
15
1,116
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_bb47c02cf2564ec6_6ba4d73a", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 134 ]
[ null ]
[ 5 ]
[ 62 ]
2024-11-19T01:44:07.670144+00:00
1,611,267,752,000
44a02ef082cc9aefe83b301b80acf9955a7d2c16
3
{ "blob_id": "44a02ef082cc9aefe83b301b80acf9955a7d2c16", "branch_name": "refs/heads/main", "committer_date": 1611267752000, "content_id": "886aa7ad96b731a4759cf870830e973b206e7518", "detected_licenses": [ "MIT" ], "directory_id": "bd81170f16d9e0615914e17f71f9639fb4991f72", "extension": "py", "file...
2.578125
stackv2
from flask import Flask, send_file, request, jsonify import firebase_admin from firebase_admin import credentials, firestore, storage import cv2 import os import math import uuid import models import warp_image app = Flask(__name__) cap = cv2.VideoCapture(0) config = { "apiKey": "AIzaSyC2qvy80zegkDmLkJM18CSiSj_...
178
33.53
114
22
1,554
python
[{"finding_id": "codeql_py/stack-trace-exposure_f89465d1664d3ce0_26a361f7", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 153, 178 ]
[ null, null ]
[ 24, 24 ]
[ 58, 58 ]
2024-11-19T02:08:54.218062+00:00
1,620,838,647,000
dcb254c62da110c92b9177b879ddf1af116ff17b
3
{ "blob_id": "dcb254c62da110c92b9177b879ddf1af116ff17b", "branch_name": "refs/heads/master", "committer_date": 1620838647000, "content_id": "d6705d7c8309be056ac96f459f12233fe02a1dba", "detected_licenses": [ "Artistic-2.0" ], "directory_id": "0af856b83413d201285bd101996d59c31cd0bfdd", "extension": "p...
2.671875
stackv2
""" This handler listens for TCP/Unix connections from the localhost and from this agent sending us events. We will forward those events to the CorkAPI. """ from . import BaseHandler from dart.common.settings import SettingsManager from dart.common.exceptions import EventValidationException import dart.agent.api from ...
308
43.75
153
21
2,702
python
[{"finding_id": "codeql_py/overly-permissive-file_ba84f13ebc362fda_6036d278", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world writable." ]
[ 99 ]
[ null ]
[ 9 ]
[ 42 ]
2024-11-19T02:58:04.175211+00:00
1,615,320,201,000
33ad2ccad513e4e7fa47624598984520817aed27
3
{ "blob_id": "33ad2ccad513e4e7fa47624598984520817aed27", "branch_name": "refs/heads/main", "committer_date": 1615320201000, "content_id": "e5e2436a4c523ce2b44b1064391c515757a0d74e", "detected_licenses": [ "MIT" ], "directory_id": "d3004e10d4736390b424d2dc0359a3c456ed37d6", "extension": "py", "file...
2.875
stackv2
#!/usr/bin/env python3 # Author: Lucas Roelser <roesler.lucas@gmail.com> # URL: https://github.com/LucasRoesler/ssl-expiry-check # Modified from serverlesscode.com/post/ssl-expiration-alerts-with-lambda/ import datetime import fileinput import os import socket import ssl import time def ssl_expiry_datetime(hostname: ...
69
33.68
77
16
563
python
[{"finding_id": "codeql_py/insecure-protocol_5a2573ad7637e718_891b873a", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/...
1
true
[ "CWE-327" ]
[ "py/insecure-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.create_default_context](1)." ]
[ 17 ]
[ null ]
[ 12 ]
[ 19 ]
2024-11-19T03:10:15.840339+00:00
1,507,809,967,000
f49ec24b4db05293cddcaa746d2e70f591d7edb9
2
{ "blob_id": "f49ec24b4db05293cddcaa746d2e70f591d7edb9", "branch_name": "refs/heads/master", "committer_date": 1507809967000, "content_id": "85ae3b7bec05f8c3fa32e69c3c0b494a193b5971", "detected_licenses": [ "MIT" ], "directory_id": "5f46c0215c09070ec40e31eea90b191e2d67b095", "extension": "py", "fi...
2.359375
stackv2
import requests import logging from hashlib import md5 from urllib.parse import urljoin from urllib.parse import urlencode class Client: def __init__(self, key, secret, api_root='https://kkex.com'): self.key = key self.secret = secret self.api_root = api_root def make_sign(self, params...
137
29.77
75
15
980
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_6d382aaad52d364f_00f21f88", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 17 ]
[ null ]
[ 23 ]
[ 54 ]
2024-11-19T03:10:18.787325+00:00
1,508,497,178,000
c2c9290b640fb5b7f28539311a36346aca84f354
3
{ "blob_id": "c2c9290b640fb5b7f28539311a36346aca84f354", "branch_name": "refs/heads/master", "committer_date": 1508497178000, "content_id": "1b6e00722f67cc8fa186b3979443a4dadc59e989", "detected_licenses": [ "Apache-2.0" ], "directory_id": "c8cbc81f58cc68a34087e7f7aa9f65eb44a5f0fd", "extension": "py"...
2.546875
stackv2
from flask import Blueprint, render_template, request, redirect, session, url_for import bcrypt from user.models import User from user.forms import RegisterForm, LoginForm user_app = Blueprint('user_app',__name__) @user_app.route('/register', methods=('GET', 'POST')) def register(): form = RegisterForm() if ...
57
31.75
81
18
384
python
[{"finding_id": "codeql_py/url-redirection_bf2fa384b57bf96d_147e0e35", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 46 ]
[ null ]
[ 37 ]
[ 41 ]
2024-11-19T03:10:19.593001+00:00
1,602,079,654,000
92a1e3a9f3f599298d65a248d6d3cb7ea0f2303b
2
{ "blob_id": "92a1e3a9f3f599298d65a248d6d3cb7ea0f2303b", "branch_name": "refs/heads/master", "committer_date": 1602079654000, "content_id": "72a65b4dfe934f6f8d4c91f0d01cf231def8c6ae", "detected_licenses": [ "MIT" ], "directory_id": "5e382a50c521e4cd874ed4e94799e5ef062994a1", "extension": "py", "fi...
2.3125
stackv2
""" UNDER DEVELOPMENT for issue #784 (see web/server/diagnostics_monitoring.py) Based on https://github.com/amitsaha/aiohttp-prometheus Clients: - https://github.com/prometheus/client_python - TODO: see https://github.com/claws/aioprometheus """ import logging import time import prometheus_clie...
139
32.11
156
17
993
python
[{"finding_id": "codeql_py/log-injection_8947ab1693ebb575_6ce70782", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
2
true
[ "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 55, 57 ]
[ null, null ]
[ 17, 17 ]
[ 31, 29 ]
2024-11-19T03:10:35.624827+00:00
1,534,044,668,000
64b38dbb83574dc5dea45f1fe7258d12787e8fc6
3
{ "blob_id": "64b38dbb83574dc5dea45f1fe7258d12787e8fc6", "branch_name": "refs/heads/master", "committer_date": 1534044668000, "content_id": "86314694664f84b7337f22c2494602c13cf55bd0", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "0d590b09f807c3f7a76acb93ad99e7b667f76668", "extension": "p...
2.546875
stackv2
"""Flask microframework thermos module viola lets code""" from flask import render_template, url_for, request, redirect, flash, abort from thermos import application, db, login_manager from datetime import datetime from thermos.users import Userobj from thermos.forms import BookmarkForm, LoginForm, SignupForm from th...
148
36.72
115
17
1,221
python
[{"finding_id": "codeql_py/url-redirection_f80a1a68a6291d52_9dac9aef", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 108 ]
[ null ]
[ 29 ]
[ 96 ]
2024-11-19T03:22:35.279088+00:00
1,603,895,592,000
cc8c11ad6941057fd7180411ba607cfc2c61e2f9
3
{ "blob_id": "cc8c11ad6941057fd7180411ba607cfc2c61e2f9", "branch_name": "refs/heads/main", "committer_date": 1603895592000, "content_id": "bd8b9346988da871ca08917741c7d8c574c421e0", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "94824c0bd3a9fa6e3ac636911999fb049e482b5d", "extension": "py"...
3.265625
stackv2
import re class UnitParser(object): def __init__(self): self.__prefixDict = { "femto": "f", "pico": "p", "nano": "n", "micro": "u", "milli": "m", "mili": "m", ...
99
31.72
139
18
714
python
[{"finding_id": "codeql_py/overly-large-range_ad43da65e227de83_a43de2c1", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 47 ]
[ null ]
[ 27 ]
[ 30 ]
2024-11-19T03:22:51.786117+00:00
1,591,412,869,000
1f31dd66bff6a5de033c59cc77782300821ac98a
3
{ "blob_id": "1f31dd66bff6a5de033c59cc77782300821ac98a", "branch_name": "refs/heads/master", "committer_date": 1591412869000, "content_id": "925bc9c3ecad50700ec2bc4faa41da7667638493", "detected_licenses": [ "MIT" ], "directory_id": "6d69d1264197a5d72f3d373a026636e6c04606bd", "extension": "py", "fi...
2.796875
stackv2
#%% from utils.config import Config import pandas as pd #%% c = Config() c.validate_files() #%% df1 = pd.read_csv(c.uid_300K, nrows=1000) #%% # this code need to be refactored into a util # or save a clean file to dataset df1_columns_index = [15, 2,3,5,7,8,9,10,11,12] df1_columns_labels = ['uid','bilayer', 'mo...
97
23.53
138
12
729
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_b9ba78d3d0e1dc0e_5817e47a", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 61 ]
[ null ]
[ 11 ]
[ 52 ]
2024-11-19T03:22:58.453867+00:00
1,570,377,124,000
d14395f0b9f93e759e65ac09781b6f5f8985a342
2
{ "blob_id": "d14395f0b9f93e759e65ac09781b6f5f8985a342", "branch_name": "refs/heads/master", "committer_date": 1570377124000, "content_id": "49059e9ebfefb1d9160c860f4cf7ff10f6b964ee", "detected_licenses": [ "Apache-2.0" ], "directory_id": "cb6001993ad2d30b7174dc2e6d59c9f3ea890af8", "extension": "py"...
2.375
stackv2
from apscheduler.scheduler import Scheduler import requests import json GLOBAL_WEIXIN_TOKEN = "" GLOBAL_WEIXIN_TICKET = "" task = Scheduler() @task.interval_schedule(seconds=0) def startTask(): print("后台任务开始") task.shutdown(wait=False) getWeiXinToken() createTask() task.start() def createTask(): ...
62
26.24
87
12
448
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e1d8a3f37b71fc49_ac53d29c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
8
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-295", "CWE-295" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/request-without-cert-validation", "py/request-without-cert...
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive dat...
[ 34, 38, 41, 51, 55, 57, 31, 48 ]
[ null, null, null, null, null, null, null, null ]
[ 30, 15, 46, 36, 15, 34, 14, 14 ]
[ 44, 34, 81, 50, 35, 69, 42, 42 ]
2024-11-19T03:22:59.719144+00:00
1,483,323,154,000
6cd09de418cbbef433ced230518211d954a11074
3
{ "blob_id": "6cd09de418cbbef433ced230518211d954a11074", "branch_name": "refs/heads/master", "committer_date": 1483323154000, "content_id": "63f8fe2dd9d28d69f0d1edeee0abbca3fdfdf8ce", "detected_licenses": [ "MIT" ], "directory_id": "12cc09585478603e25fd855a5c10f75c06bee77e", "extension": "py", "fi...
2.78125
stackv2
#! /usr/bin/python ''' boilerplate_sparkbot This is a sample boilerplate application that provides the framework to quickly build and deploy an interactive Spark Bot. There are different strategies for building a Spark Bot. This boilerplate is expects that a dedicated Spark Account be provided fo...
248
34.28
91
14
2,108
python
[{"finding_id": "codeql_py/flask-debug_bbe329a6d1fc0c55_df8c0a25", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 247, 99 ]
[ null, null ]
[ 5, 12 ]
[ 58, 38 ]
2024-11-19T01:35:19.200676+00:00
1,554,679,964,000
5e1b9512250656069398a45653fe3c0cdc384417
3
{ "blob_id": "5e1b9512250656069398a45653fe3c0cdc384417", "branch_name": "refs/heads/master", "committer_date": 1554679964000, "content_id": "eee602920cb5d0d0fe1abf57683a646b97adf23f", "detected_licenses": [ "Apache-2.0" ], "directory_id": "b6e73025c4cc1d060e301e38a968506622c4d410", "extension": "py"...
2.609375
stackv2
import hashlib import time import boto3 import json from typing import Any, List, Dict import pydgraph from pydgraph import DgraphClient, DgraphClientStub def parse_s3_event(event) -> str: # Retrieve body of sns message # Decode json body of sns message print('event is {}'.format(event)) msg = json...
186
28.29
94
20
1,341
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_50c26265a59545d7_ac8f7201", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (SHA1) that is insecure.\...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (id)](1) is used in a hashing algorithm (SHA1) that is insecure.\n[Sensitive data (id)](2) is used in a hashing algorithm (SHA1) that is insecure." ]
[ 125 ]
[ null ]
[ 20 ]
[ 37 ]
2024-11-19T02:07:49.329145+00:00
1,609,169,007,000
ae3878fb1e5e464d30bd63b62de3e3e2b7cfe3dc
2
{ "blob_id": "ae3878fb1e5e464d30bd63b62de3e3e2b7cfe3dc", "branch_name": "refs/heads/master", "committer_date": 1609169007000, "content_id": "704a3b046f5a124b2acfbc7106f51268e63db579", "detected_licenses": [ "MIT" ], "directory_id": "b8aba2bb539c731591f86e17f1517861b2ccf218", "extension": "py", "fi...
2.484375
stackv2
# -*- coding: utf-8 -*- """Provider for ScienceDirect Author: G.J.J. van den Burg License: See LICENSE file Copyright: 2020, G.J.J. van den Burg """ import re import bs4 import urllib import json from ._base import Provider from ._info import Informer from ..exceptions import URLResolutionError from ..log import L...
106
31.18
113
15
829
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_55c3b45c0a8670fa_a1d68d75", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This string, which is used as a regular expression [here](1), has an unescaped '.' befor...
1
true
[ "CWE-020" ]
[ "py/incomplete-hostname-regexp" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This string, which is used as a regular expression [here](1), has an unescaped '.' before 'sciencedirect.com/science/article/pii/', so it might match more hosts than expected." ]
[ 43 ]
[ null ]
[ 10 ]
[ 75 ]
2024-11-19T02:08:00.831032+00:00
1,470,748,856,000
398c4630cf31d4e7c5e20b803e52e12850725ea5
2
{ "blob_id": "398c4630cf31d4e7c5e20b803e52e12850725ea5", "branch_name": "refs/heads/master", "committer_date": 1470748856000, "content_id": "ceed0a7d5f06a7c1ef62fe61d8d269a80470c632", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "cf832b4edc1cb013eb425ff6a8562d7c34f883ab", "extension": "p...
2.484375
stackv2
from json import loads, dumps from datetime import datetime from hashlib import sha256, md5 from base64 import b64encode from os import urandom from elixir import ( Entity, Field, Unicode, DateTime, UnicodeText, OneToMany, ManyToOne ) from pecan import conf from pbkdf2 import PBKDF2 from sqlalchemy import and_...
182
27.41
106
19
1,202
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_f7eef70b98a77f8e_26b7872e", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e...
[ 134 ]
[ null ]
[ 26 ]
[ 41 ]
2024-11-19T02:17:17.640925+00:00
1,508,336,239,000
64f2632190b9fe39690bd7b2b048f7104a38a850
3
{ "blob_id": "64f2632190b9fe39690bd7b2b048f7104a38a850", "branch_name": "refs/heads/master", "committer_date": 1508336239000, "content_id": "3d567adc7a21bbdc789b393ef7aee68c302a6af5", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "de738248bf68b66f4e077bcf904d435aea71ca26", "extension": "p...
2.859375
stackv2
""" Flask Serving This file is a sample flask app that can be used to test your model with an REST API. This app does the following: - Look for sine wave test set - Returns the output file generated at /output POST req: parameter: - file, required, sine waves test set """ from __future__ import p...
138
33.56
116
18
1,249
python
[{"finding_id": "codeql_py/unsafe-deserialization_0b18983734577a93_a7fe9966", "tool_name": "codeql", "rule_id": "py/unsafe-deserialization", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Unsafe deserialization depends on a [user-provided value](1).", "remediation": "", "locatio...
2
true
[ "CWE-502", "CWE-502" ]
[ "py/unsafe-deserialization", "py/unsafe-deserialization" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Unsafe deserialization depends on a [user-provided value](1).", "Unsafe deserialization depends on a [user-provided value](1)." ]
[ 103, 106 ]
[ null, null ]
[ 44, 44 ]
[ 54, 54 ]
2024-11-19T02:17:21.705738+00:00
1,514,234,567,000
edcd8b759a2ed388707e699c93ca19b3738804b2
2
{ "blob_id": "edcd8b759a2ed388707e699c93ca19b3738804b2", "branch_name": "refs/heads/master", "committer_date": 1514234567000, "content_id": "89613c03695f35a866a24ad1af0d5c2626e6ea26", "detected_licenses": [ "MIT" ], "directory_id": "d40a5648e65ced277bf7895b30fec1efe4a8f2d9", "extension": "py", "fi...
2.484375
stackv2
from pathlib import Path from datetime import date import configparser import time import requests import os import redditposts import filehandler from imgurdownloader import ImgurDownloader CONFIG_PATH = "wally.conf" STANDALONE_PATH = "/images/" ALBUM_PATH = "/albums/" def main(): config = configparser.ConfigP...
131
34.02
80
18
938
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_c407574e75547777_1aa0aa71", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [imgur.com](1) may be at an arbitrary position in the s...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [imgur.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 65 ]
[ null ]
[ 12 ]
[ 35 ]
2024-11-19T02:17:31.229226+00:00
1,569,340,121,000
78e15ef89c3d79b0649cd0b0801b15bf4a790484
2
{ "blob_id": "78e15ef89c3d79b0649cd0b0801b15bf4a790484", "branch_name": "refs/heads/master", "committer_date": 1569340121000, "content_id": "a0988196ac828803458d48ba5022e9e1ff9deaf3", "detected_licenses": [ "MIT" ], "directory_id": "8e38a9b233b9c39f0b05b9c4e3e4ab76c59f3646", "extension": "py", "fi...
2.421875
stackv2
#!/usr/bin/env python3 from hermes_python.hermes import Hermes import hermes_python from urls_ayto import urls_dict import json cache_file = "cache.json" # sets the name of the cache file MQTT_IP_ADDR = "localhost" MQTT_PORT = 1883 MQTT_ADDR = "{}:{}".format(MQTT_IP_ADDR, str(MQTT_PORT)) # open the cache file ...
33
25.82
78
10
226
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_682618031af6bbcd_bde8b553", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 19 ]
[ null ]
[ 21 ]
[ 39 ]
2024-11-19T02:17:48.982276+00:00
1,670,512,794,000
2b5e6ac5230144366e08aa44ca7746d2a07ba797
2
{ "blob_id": "2b5e6ac5230144366e08aa44ca7746d2a07ba797", "branch_name": "refs/heads/master", "committer_date": 1670512794000, "content_id": "21e16784ccdf4439bdd2701f6f134b5f01cce1fb", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e5aa5e735d53967862f3cac9ae71640dc85fa498", "extension": "py"...
2.484375
stackv2
import socket import time from paramiko import ( BadHostKeyException, AuthenticationException, SSHException, SSHClient, AutoAddPolicy, Transport, SFTPClient ) from marvin.cloudstackException import internalError from marvin.codes import ( SUCCESS, FAILED, INVALID_INPUT ) from m...
172
37.17
118
18
1,315
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_6b6ff65a521e6809_7922b39f", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 42 ]
[ null ]
[ 9 ]
[ 62 ]
2024-11-19T02:18:21.262271+00:00
1,521,191,458,000
df93a043f260dbdd91d7091808a47257d1202a48
2
{ "blob_id": "df93a043f260dbdd91d7091808a47257d1202a48", "branch_name": "refs/heads/master", "committer_date": 1521191458000, "content_id": "c5b00afb802ad98727c5590fcf916337dab158da", "detected_licenses": [ "MIT" ], "directory_id": "67538f74f62eeb6da65c671f257f695a889fadb5", "extension": "py", "fi...
2.375
stackv2
# coding=utf-8 import os import uuid import magic import urllib import json from random import choice from string import digits, ascii_uppercase, ascii_lowercase from datetime import datetime import cropresize2 from flask import abort, Flask, request, jsonify, redirect, send_file from flask.ext.mako import MakoTemplat...
371
27.83
89
17
2,570
python
[{"finding_id": "codeql_py/path-injection_8899c8cfd25b62d6_2b2d29bd", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
5
true
[ "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 101, 341, 341, 347, 348 ]
[ null, null, null, null, null ]
[ 28, 31, 65, 27, 23 ]
[ 36, 39, 73, 35, 31 ]
2024-11-19T02:29:58.440785+00:00
1,540,536,782,000
ef13e371e76d2348935737bc3675a425ce672abc
2
{ "blob_id": "ef13e371e76d2348935737bc3675a425ce672abc", "branch_name": "refs/heads/master", "committer_date": 1540536782000, "content_id": "2d5e75d0b60a17ec3bd6252a15edcd2d6695f64b", "detected_licenses": [ "Apache-2.0" ], "directory_id": "3bf873f14928493d2153df3244e1df5888191263", "extension": "py"...
2.421875
stackv2
# -*- coding: utf-8 -*- ''' Created on 2018. 5. 11. @author: HyechurnJang ''' import json import requests try: import requests.packages requests.packages.urllib3.disable_warnings() except: pass class Genian: def __init__(self, address, passkey): self.address = address self.passkey = p...
50
36.38
167
15
515
python
[{"finding_id": "codeql_py/request-without-cert-validation_15c50b9df2ad34cf_ffcf55c4", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 26, 43 ]
[ null, null ]
[ 21, 21 ]
[ 168, 116 ]
2024-11-19T02:30:18.414343+00:00
1,581,369,433,000
d05988f4ac3bb4ef550db31a06ad3d80f73fdb51
3
{ "blob_id": "d05988f4ac3bb4ef550db31a06ad3d80f73fdb51", "branch_name": "refs/heads/master", "committer_date": 1581369433000, "content_id": "0aa75c98dd7a3ee3e5fcdf574efb7bf04e9e90a5", "detected_licenses": [ "MIT" ], "directory_id": "8ffdc9a1fad9d7f0f07583427bc16f98b9ffcb68", "extension": "py", "fi...
3.125
stackv2
#!/bin/python3 import math import os import random import re import sys # Complete the birthdayCakeCandles function below. def birthdayCakeCandles(ar): candles = {} biggest = 0 for size in ar: if size not in candles: candles[size] = 1 else: candles[size] += 1 ...
34
17.97
50
16
164
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_55cb938125fd95b0_d6eb2e2f", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text." ]
[ 32 ]
[ null ]
[ 16 ]
[ 34 ]
2024-11-19T02:41:40.098856+00:00
1,534,443,351,000
f483263b9272e722a012980837b336ab2398bb70
2
{ "blob_id": "f483263b9272e722a012980837b336ab2398bb70", "branch_name": "refs/heads/master", "committer_date": 1534443351000, "content_id": "5c34f6a728d222f588256ec96ecc4ea4b6111e05", "detected_licenses": [ "MIT" ], "directory_id": "2112a1945b864fd5d96ea8ea32b0ea2d938449cb", "extension": "py", "fi...
2.3125
stackv2
from __future__ import absolute_import from __future__ import division from __future__ import print_function import collections import hashlib import os.path import re import tarfile import numpy as np import tensorflow as tf from six.moves import urllib from tensorflow.python.framework import graph_util from tensorf...
368
46.98
120
17
3,643
python
[{"finding_id": "codeql_py/tarslip_c13b9f56d943fe90_9a187a52", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 108 ]
[ null ]
[ 5 ]
[ 35 ]
2024-11-19T02:41:44.614840+00:00
1,616,361,588,000
c9cb2ce1fb51c6a94af44b675aebb7a5e906c374
3
{ "blob_id": "c9cb2ce1fb51c6a94af44b675aebb7a5e906c374", "branch_name": "refs/heads/master", "committer_date": 1616361588000, "content_id": "fe348895f4d27624112689cb41356f592fba04ea", "detected_licenses": [ "Apache-2.0" ], "directory_id": "077802aefac503e1bf1f7fd156cdc295522b4e16", "extension": "py"...
2.796875
stackv2
import os import redis from flask import Flask from flask import request app = Flask(__name__) db = redis.Redis(os.environ.get('REDIS_URL', 'localhost')) @app.errorhandler(Exception) def error_handler(error): return str(error), 500 @app.route('/key', methods=['PUT']) def put_key(): pair = request.json ...
46
22.91
78
12
309
python
[{"finding_id": "codeql_py/flask-debug_095cecae741ea52a_8c6de5cc", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
4
true
[ "CWE-215", "CWE-079", "CWE-079", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a ...
[ 42, 28, 35, 38 ]
[ null, null, null, null ]
[ 5, 12, 16, 12 ]
[ 51, 50, 54, 62 ]
2024-11-19T02:41:45.211085+00:00
1,496,357,262,000
38d02182ee70c5b75a017fd442b8c44eccb10968
3
{ "blob_id": "38d02182ee70c5b75a017fd442b8c44eccb10968", "branch_name": "refs/heads/master", "committer_date": 1496357262000, "content_id": "1835a866dbd3ac89aaa594dd80d30949a96cd416", "detected_licenses": [ "MIT" ], "directory_id": "83ab754cb8021cd4ea914d0a04188cebc4edcbaa", "extension": "py", "fi...
3.328125
stackv2
import requests, json def get_ip(): '''finds the useres IP address and returns it.''' ipdata = requests.get('https://jsonip.com/') ipresp = ipdata.json() ip = ipresp.get('ip') return ip def geoip(ip): '''retireves and reports users geoip information''' resp = requests.get('http://freegeoip.net/json/' + ip) d...
39
22.15
70
10
257
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8c6a2b751274e800_2bcefe8e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
4
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (p...
[ 28, 28, 36, 39 ]
[ null, null, null, null ]
[ 11, 16, 7, 7 ]
[ 14, 19, 30, 30 ]
2024-11-19T02:41:58.174287+00:00
1,509,199,130,000
f92a388944348678adc78417b76f2aaf90bfef30
2
{ "blob_id": "f92a388944348678adc78417b76f2aaf90bfef30", "branch_name": "refs/heads/master", "committer_date": 1509199130000, "content_id": "9c7a27309704079e13286126f4ce681425c58aca", "detected_licenses": [ "Apache-2.0" ], "directory_id": "4d9ca0ed1e62795411611b779fd5dff06f52cb01", "extension": "py"...
2.46875
stackv2
import re import mongoengine as me from mist.api.config import BANNED_EMAIL_PROVIDERS ACTIONS = {} # This is a map of action types to action classes. def _populate_actions(): """Populate ACTIONS variable.""" for key, value in globals().iteritems(): if key.endswith('Action') and key != 'Action': ...
114
26.83
79
15
705
python
[{"finding_id": "codeql_py/redos_843c2969ad791e08_8bf610d2", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '-@-.' and containing many repetit...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '-@-.' and containing many repetitions of '-.'." ]
[ 25 ]
[ null ]
[ 41 ]
[ 55 ]
2024-11-19T02:42:21.365254+00:00
1,588,969,226,000
e2e09cee12b363ab43205de133a8f21b4bbf9d77
3
{ "blob_id": "e2e09cee12b363ab43205de133a8f21b4bbf9d77", "branch_name": "refs/heads/master", "committer_date": 1588969226000, "content_id": "24ef86ebf896bb5f0a736774de741e155f8532d2", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "80669f62945ea8894a435ee9a5e350e4c5d50396", "extension": "p...
2.734375
stackv2
''' Koodissa haetaan Steam Web APIn kautta käyttäjien steamID:t ja heidän käyttäjännimensä, jotka yhdistetään kirjastoksi. ''' import pandas as pd import requests import util import json import csv import sys from crawler import get_chrome_driver from review_score_crawler import crawl_review_score def write_to_node...
109
35.62
125
18
1,000
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a2243c87ab4d7381_3bed509f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 47, 64 ]
[ null, null ]
[ 15, 23 ]
[ 55, 28 ]
2024-11-19T02:42:22.782840+00:00
1,550,657,218,000
a6f17453bfa213157873aabb0f66149e5bf8741b
2
{ "blob_id": "a6f17453bfa213157873aabb0f66149e5bf8741b", "branch_name": "refs/heads/master", "committer_date": 1550657218000, "content_id": "e499e1e49d0afe447211859902f5601a98ce5f74", "detected_licenses": [ "Apache-2.0" ], "directory_id": "6ac4cb4b870020270102c1b8d998d36fc825ead9", "extension": "py"...
2.34375
stackv2
# Copyright 2018 Jörg Franke # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, s...
317
38.39
118
23
2,834
python
[{"finding_id": "codeql_py/tarslip_d7d9c7ad72ca7851_4699b129", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 128 ]
[ null ]
[ 21 ]
[ 24 ]
2024-11-18T18:05:57.591648+00:00
1,449,276,678,000
3e0aedd780c8bf4bac76e6c035ddf409fd5ec746
3
{ "blob_id": "3e0aedd780c8bf4bac76e6c035ddf409fd5ec746", "branch_name": "refs/heads/master", "committer_date": 1449276678000, "content_id": "4dff21d36c1deab5268bf64d68db32c1cfac5680", "detected_licenses": [ "MIT" ], "directory_id": "476db59a7947ae40f0f60755c000c901400d5d84", "extension": "py", "fi...
2.765625
stackv2
#! /usr/bin/env python # -*- coding: utf-8 -*- # vim:fenc=utf-8 # # Copyright © 2015 Christopher C. Strelioff <chris.strelioff@gmail.com> # # Distributed under terms of the MIT license. """ previously_approved_key.py ================= A Python 3 example of using the discogs-client with a consumer key and secret, as w...
85
32.42
78
16
694
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1f573eadf788d8b4_c12fcf06", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text." ]
[ 48 ]
[ 54 ]
[ 7 ]
[ 71 ]
2024-11-18T18:06:04.594997+00:00
1,481,826,968,000
4b767f0cd94c8bca079f4c10a308ad172b0571b1
3
{ "blob_id": "4b767f0cd94c8bca079f4c10a308ad172b0571b1", "branch_name": "refs/heads/master", "committer_date": 1481826968000, "content_id": "b4ca2f38198449618b47e45e56009dd6441bfc87", "detected_licenses": [ "MIT" ], "directory_id": "698b4ecc4122062620f199eef734b456e8cdb5d5", "extension": "py", "fi...
3.15625
stackv2
#!/usr/bin/env python3 import hashlib puzzle = b'abbhdwsy' bytes_for = lambda i: i.to_bytes((i.bit_length() // 8) + 1, byteorder='big') bytes_for = lambda i: bytes(str(i), 'ascii') i = 0 g = 0 password = [None] * 8 while g < 8: h = hashlib.md5(puzzle + bytes_for(i)).hexdigest() i += 1 if h.startswith('0...
26
20.58
76
13
180
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a9510702060f1b86_add974c8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 17, 26 ]
[ null, null ]
[ 18, 7 ]
[ 26, 24 ]
2024-11-18T18:16:04.384633+00:00
1,612,401,745,000
875a55748e02f21026a5fc102238121170d4fd3f
3
{ "blob_id": "875a55748e02f21026a5fc102238121170d4fd3f", "branch_name": "refs/heads/master", "committer_date": 1612401745000, "content_id": "1e5a8807365295198c079f098d64ec3a83bd1c5e", "detected_licenses": [ "MIT" ], "directory_id": "156ae17877294d3df6a85f07af963eaacb5235ed", "extension": "py", "fi...
2.6875
stackv2
import os import urllib3 from flask import Flask, request, json, make_response from twilio.twiml.voice_response import VoiceResponse from twilio.rest import Client import watson_transcribe import google_transcribe app = Flask(__name__) @app.route('/twilio', methods=['GET', 'POST']) def twilio(): """ Listen ...
98
33.53
114
12
877
python
[{"finding_id": "codeql_py/flask-debug_729fc457be42c273_4f129ad8", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-918" ]
[ "py/flask-debug", "py/full-ssrf" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "The full URL of this request depends on a [user-provided value](1)." ]
[ 97, 70 ]
[ null, null ]
[ 5, 17 ]
[ 68, 76 ]
2024-11-18T19:31:07.823339+00:00
1,530,202,317,000
63dc8305e1993eda9e740b36caa14ef5f524cfa7
2
{ "blob_id": "63dc8305e1993eda9e740b36caa14ef5f524cfa7", "branch_name": "refs/heads/master", "committer_date": 1530202317000, "content_id": "f8da9d16d261e444891af89eace0a8172e33955a", "detected_licenses": [ "Apache-2.0" ], "directory_id": "497421f9cbe8764f05ad4b62ba80a1d3bf4f50f0", "extension": "py"...
2.3125
stackv2
#!/usr/bin/python # -*- coding: utf-8 -*- ''' Author: vivek Mistry @[Vivek M.]​ Date: 26-04-2018 07:01 Disclaimer: All information, documentation, and code is provided to you AS-IS and should only be used in an internal, non-production laboratory environment. License: Copyright 2017 BlueCat Networks, Inc. Licensed u...
67
31.7
97
12
494
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_982fcb00ab87c8c0_25408623", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 48 ]
[ null ]
[ 7 ]
[ 48 ]
2024-11-18T20:08:58.015361+00:00
1,670,857,854,000
febc28eb87ad72529715fa5885babf0788ad6ede
2
{ "blob_id": "febc28eb87ad72529715fa5885babf0788ad6ede", "branch_name": "refs/heads/master", "committer_date": 1670857854000, "content_id": "1022b7b9992c3aa2e1e562fff70ff8e391cc4fb7", "detected_licenses": [ "MIT" ], "directory_id": "72b65247200e7cc9fd102522e9151ac7a7af3a00", "extension": "py", "fi...
2.484375
stackv2
import os from config import Config from controllers.imageInfo import routes from database import db from database.entities.images import DatabaseImage from database.entities.objectInfo import DatabaseObject from database.models.Cars import Cars from database.models.Coordinates import Coordinates from database.models.O...
105
36.29
109
19
830
python
[{"finding_id": "codeql_py/reflective-xss_06e333df0aaa35f7_6606a9b3", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
2
true
[ "CWE-079", "CWE-022" ]
[ "py/reflective-xss", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 46, 92 ]
[ null, null ]
[ 34, 31 ]
[ 88, 41 ]
2024-11-18T19:11:48.825833+00:00
1,685,744,582,000
e84dc63638f36465eccf42abf9768f1ddf8c4c5e
2
{ "blob_id": "e84dc63638f36465eccf42abf9768f1ddf8c4c5e", "branch_name": "refs/heads/master", "committer_date": 1685744582000, "content_id": "a65ec217dd4fc63db38963a661b1363991752ce7", "detected_licenses": [ "MIT" ], "directory_id": "ff2e1434a8a2cd259b197a7359eefebefb325fba", "extension": "py", "fi...
2.421875
stackv2
from websockets.legacy.server import WebSocketServerProtocol from .kernel import Kernel from .os_components.process import Process from .os_components.wsocket_messaging import Pqueue, TypeMessage from .os_components.programs_constants import TProgs from .os_constants import FileTypes from typing import List, Optional...
407
42.11
144
29
3,227
python
[{"finding_id": "codeql_py/redos_4765919870babc39_56a8f78d", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '.'.", "remediati...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '.'." ]
[ 122 ]
[ null ]
[ 38 ]
[ 45 ]
2024-11-18T19:34:37.425821+00:00
1,490,772,099,000
815d446719cf7a1e31b7c20452313b8f413252a1
3
{ "blob_id": "815d446719cf7a1e31b7c20452313b8f413252a1", "branch_name": "refs/heads/master", "committer_date": 1490772099000, "content_id": "2f0eceb5d1176c7475a372113c486c9cf2e2849f", "detected_licenses": [ "MIT" ], "directory_id": "3d422cb08c5a8173354255e90f1972606995ea03", "extension": "py", "fi...
2.609375
stackv2
from app import app, manager js_urls_template = r""" {% autoescape off %} (function(globals) { var django = globals.django || (globals.django = {}); django.urls = {{ urls_str }}; django.url = function(url_name, args) { var url = django.urls[url_name]; if (!url) { return undefined; } if...
130
22.48
86
13
791
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_b3f9ec6de823e9e1_35cfd80f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 125 ]
[ null ]
[ 16 ]
[ 42 ]
2024-11-18T18:39:51.469873+00:00
1,530,437,291,000
a22743ebe7cd72091748838600d765407c6bc3d3
3
{ "blob_id": "a22743ebe7cd72091748838600d765407c6bc3d3", "branch_name": "refs/heads/master", "committer_date": 1530437291000, "content_id": "15599005bac690c1d186f0d3b828ba66a315db78", "detected_licenses": [ "MIT" ], "directory_id": "04d4b71a09b8cae8fa1f6a1e53ced0fc0f2637d1", "extension": "py", "fi...
2.6875
stackv2
# -*- coding: utf-8 -*- """ Created on Tue Dec 19 14:10:51 2017 @author: 309 """ import numpy as np # linear algebra import dicom import os import scipy.ndimage import matplotlib.pyplot as plt from skimage import measure from mpl_toolkits.mplot3d.art3d import Poly3DCollection import cv2 from sys import argv import di...
297
32.81
119
17
2,756
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_8be0bc435d5d8b8d_413b3403", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text." ]
[ 257 ]
[ null ]
[ 17 ]
[ 27 ]
2024-11-18T18:39:53.251743+00:00
1,631,512,898,000
bd84efd290a77019d9af7c9eea6837987a5a461c
2
{ "blob_id": "bd84efd290a77019d9af7c9eea6837987a5a461c", "branch_name": "refs/heads/master", "committer_date": 1631512898000, "content_id": "ea619a652b42d9e3c03f59b4187435c3b383f0c7", "detected_licenses": [ "Apache-2.0" ], "directory_id": "05402a0cbbf221c461a5b6942eb8ae1404b958b4", "extension": "py"...
2.4375
stackv2
#!/usr/bin/env python # usage: # python scripts/prepare_config.py \ # --in-template=./configs/templates/focal.yml \ # --out-config=./configs/_class.yml \ # --expdir=./src \ # --dataset-path=./data \ # --num-workers=4 \ # --batch-size=64 \ # --max-image-size=224 \ # --balance-strategy=102...
93
25.78
79
14
588
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_7eec2aa3056d5ffd_83049e12", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 55 ]
[ 59 ]
[ 12 ]
[ 6 ]
2024-11-18T18:39:53.526534+00:00
1,539,521,046,000
7a1b370db6677c4062eb98a2f166c7b73ae1a43f
3
{ "blob_id": "7a1b370db6677c4062eb98a2f166c7b73ae1a43f", "branch_name": "refs/heads/master", "committer_date": 1539521046000, "content_id": "38ae4e39187a601002283dbe2fb1a68874ba47e1", "detected_licenses": [ "Unlicense" ], "directory_id": "cb60f8ed61702f23475847b6246d17661f02f8db", "extension": "py",...
3.015625
stackv2
#!/usr/bin/env python import sys flag = 'flag' from bitstring import BitArray import time import signal def write(data, endl='\n'): sys.stdout.write(data + endl) sys.stdout.flush() def readline(): return sys.stdin.readline().strip() def convert_to_bitstream(data): return BitArray(bytes=data).bin ...
76
22
176
11
464
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_713d549f132a7c4d_a6e1fb86", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 11 ]
[ null ]
[ 22 ]
[ 33 ]
2024-11-18T18:39:55.201250+00:00
1,566,461,983,000
52d9dfe9762ddf0fe2be3989bd2063e77f7ac8e7
3
{ "blob_id": "52d9dfe9762ddf0fe2be3989bd2063e77f7ac8e7", "branch_name": "refs/heads/master", "committer_date": 1566461983000, "content_id": "03a774125dea85219ec6c34a639a20fbbb993170", "detected_licenses": [ "MIT" ], "directory_id": "f3584bf1e8e92e77ec98d3fcb8b896f4f2f220cd", "extension": "py", "fi...
2.953125
stackv2
import pyperclip, re # dicky_arya@apps.ipb.ac.id # abc@apps.ipb.ac.id # def@gmail.com # 123-234-345 # 0812-9226-2530 # regex untuk phonenumber phoneRegex = re.compile( r''' ( (\d{3,4}|\(\d{3,4}\)) # area code,group1 (\s|-|\.)? # separator,group2 (\d{3,4}) ...
68
22.38
63
11
495
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1d0c345f12d253e9_058cf382", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 66 ]
[ null ]
[ 11 ]
[ 29 ]
2024-11-18T18:39:56.903356+00:00
1,576,019,123,000
e65f86b95048d11835f5db667aefd086b60da503
2
{ "blob_id": "e65f86b95048d11835f5db667aefd086b60da503", "branch_name": "refs/heads/master", "committer_date": 1576019123000, "content_id": "1971fce2d3037e7d46596d25313355f3650e8abe", "detected_licenses": [ "Apache-2.0" ], "directory_id": "41198b450282c36a1d39f361dd99fe423de989da", "extension": "py"...
2.421875
stackv2
import os import shutil import uuid import subprocess from urllib.parse import urljoin from urllib.request import urlretrieve import mantraml from mantraml.core.management.commands.BaseCommand import BaseCommand import tempfile from pathlib import Path import sys import requests import json def find_artefacts(base_d...
136
35.01
139
23
1,135
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_cedf8f85dd311d7b_663a7768", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [github.com](1) may be at an arbitrary position in the ...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [github.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 90 ]
[ null ]
[ 12 ]
[ 52 ]
2024-11-18T18:40:00.876286+00:00
1,475,741,700,000
242cd362e61953e45ac4bc46c986c79b1c9c3b43
3
{ "blob_id": "242cd362e61953e45ac4bc46c986c79b1c9c3b43", "branch_name": "refs/heads/master", "committer_date": 1475741700000, "content_id": "550860f889604185f14b8c24fb7d8282a56ab1d8", "detected_licenses": [ "MIT" ], "directory_id": "afdef398a385ab51861d130805b9a30ae6eeb85f", "extension": "py", "fi...
2.734375
stackv2
#: vim set encoding=utf-8 : ## # Paper # Develop apps for Pythonista using HTML, CSS and JavaScript # # author 0x77 # version 0.4 ## # Imports import os import sys import json import traceback import webbrowser from types import ModuleType from bottle import run, route, get, post, static_file, request __all__ ...
410
29.57
83
26
2,450
python
[{"finding_id": "codeql_py/stack-trace-exposure_442582d09610a488_1510a2b8", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.\n[S...
3
true
[ "CWE-209", "CWE-209", "CWE-079" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.\n[Stack trace information](2) flows to this location and may be exposed to an external user.\n[Stack trace information](3) flows to this location and may be exposed to an external user.\n[Stack trace information](4) flows t...
[ 390, 400, 390 ]
[ null, null, null ]
[ 24, 24, 24 ]
[ 40, 40, 40 ]
2024-11-18T20:52:24.348772+00:00
1,626,865,483,000
82940fcdf642dd96bb77dc81a054d7c78cedda85
2
{ "blob_id": "82940fcdf642dd96bb77dc81a054d7c78cedda85", "branch_name": "refs/heads/main", "committer_date": 1626865483000, "content_id": "ffb1a7dad311662b5975f07a92d7588e81da6721", "detected_licenses": [ "Apache-2.0" ], "directory_id": "6b5fbd6abf843c1208a37421c26c68f61eef901c", "extension": "py", ...
2.453125
stackv2
from flask import Flask, render_template, request import secrets import os import colourmodel import base64 import urllib.request __DIR__ = os.path.dirname(__file__) app = Flask(__name__) # Create directories if not os.path.exists(os.path.join(__DIR__, "static/img/uploads")): os.makedirs(os.path.join(__DIR__, "...
111
30.32
105
20
708
python
[{"finding_id": "codeql_py/flask-debug_9de3270f11d11d8a_cdde1aaf", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
5
true
[ "CWE-215", "CWE-918", "CWE-079", "CWE-022", "CWE-022" ]
[ "py/flask-debug", "py/full-ssrf", "py/reflective-xss", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "The full URL of this request depends on a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "This path depends on a [user-provided value](1...
[ 111, 71, 98, 67, 85 ]
[ null, null, null, null, null ]
[ 5, 29, 20, 28, 31 ]
[ 24, 72, 106, 79, 82 ]
2024-11-18T20:58:17.377671+00:00
1,658,782,096,000
078b14d310ee51f019ffbd4c35b0de9c230c2da8
3
{ "blob_id": "078b14d310ee51f019ffbd4c35b0de9c230c2da8", "branch_name": "refs/heads/master", "committer_date": 1658782096000, "content_id": "e77e96d480a557bf0391e67d418882c9d6d6fbe0", "detected_licenses": [ "MIT" ], "directory_id": "7387482e248675cc8733c55b590bd84029d84439", "extension": "py", "fi...
3.453125
stackv2
# Implementation of the password generation algorithm of Mega Man IV and V # as documented by Ross Angle at https://www.rocketnia.com/password-cracks/ # TODO Game state selection, sanity check, modularize, prettify, pythonify # Although Mega Man IV and V for the most part use the same algorithm, there # are some mino...
132
40.38
92
17
1,590
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6806fa4a43c821d2_c35843bf", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (p...
[ 103, 115, 132 ]
[ null, null, null ]
[ 11, 15, 7 ]
[ 38, 42, 11 ]
2024-11-18T20:15:51.741076+00:00
1,544,835,901,000
6cc6834de91c8e8120c4b59547477acbb7849c6e
3
{ "blob_id": "6cc6834de91c8e8120c4b59547477acbb7849c6e", "branch_name": "refs/heads/master", "committer_date": 1544835901000, "content_id": "9742a6331a49ed700e4e23ab40845efd25143c96", "detected_licenses": [ "MIT" ], "directory_id": "26281a199908c026ff86fdc5034ec9e7d4118728", "extension": "py", "fi...
2.765625
stackv2
import os import flask import stagger import json app = flask.Flask(__name__) tagcycle = ["album", "artist", "track", "year", "title"] @app.route("/upload", methods=["POST"]) def upload(): user_file = flask.request.files.getlist("user_file")[0] new_metadata = flask.request.form.to_dict() new_file = handle...
52
31.37
77
13
428
python
[{"finding_id": "codeql_py/flask-debug_722ecbda4cf204e4_5268af58", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-022", "CWE-022" ]
[ "py/flask-debug", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 51, 41, 42 ]
[ null, null, null ]
[ 5, 23, 32 ]
[ 49, 32, 41 ]
2024-11-18T20:16:00.973969+00:00
1,441,632,153,000
75a9a420ffb4f56b5f9e589336c6fc9da1510b37
3
{ "blob_id": "75a9a420ffb4f56b5f9e589336c6fc9da1510b37", "branch_name": "refs/heads/master", "committer_date": 1441632153000, "content_id": "3d2383982d74802502dfa80a52005cc455b59f2a", "detected_licenses": [ "MIT" ], "directory_id": "58dab1dbd8150060523d57b14bd9b5372b3efc3f", "extension": "py", "fi...
2.515625
stackv2
from datetime import datetime from flask import Flask, render_template, redirect, url_for, request import os import ConfigParser import logging from logging.handlers import RotatingFileHandler #http://stackoverflow.com/questions/20646822/how-to-serve-static-files-in-flask app = Flask(__name__, static_url_path='') Conf...
107
31.77
160
22
877
python
[{"finding_id": "codeql_py/path-injection_562445667743ce91_92881901", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 25, 54 ]
[ null, null ]
[ 19, 19 ]
[ 28, 28 ]
2024-11-18T19:23:08.729256+00:00
1,401,592,216,000
9919e5166900563ea6ecdc4837666d70cf2ed164
3
{ "blob_id": "9919e5166900563ea6ecdc4837666d70cf2ed164", "branch_name": "refs/heads/master", "committer_date": 1401592216000, "content_id": "ea5c8ee1d48920dffdc579e10d87103c8d8cff75", "detected_licenses": [ "MIT" ], "directory_id": "35c8ccf75c4dc6c24e65ccddc870c4b24b3d4cc7", "extension": "py", "fi...
3.484375
stackv2
# coding=utf-8 import codecs import os import re from nltk import bigrams, ngrams def get_trigrams_from_text(text): """ Creates trigrams form text and returns them. @param text: the text to create trigrams from. @return: list of trigrams """ # if we have no words to work with, return empty lis...
219
30.8
117
21
1,732
python
[{"finding_id": "codeql_py/overly-large-range_3f4e32dcb2ab156f_670f50a8", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", "remedia...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 205 ]
[ null ]
[ 26 ]
[ 29 ]
2024-11-18T19:38:37.115151+00:00
1,550,772,550,000
96953bbfb060961061cf8e08a661ad06b407997d
3
{ "blob_id": "96953bbfb060961061cf8e08a661ad06b407997d", "branch_name": "refs/heads/master", "committer_date": 1550772550000, "content_id": "dc226f382e91673e5b0503395811800382fc6a41", "detected_licenses": [ "MIT" ], "directory_id": "7cc326466e66eff1b7e7113334e15652b789dc63", "extension": "py", "fi...
3.390625
stackv2
from flask import Flask, request app = Flask(__name__) @app.route("/") def hello(): return "<p>Hello World!</p><h1>Your name is: " + request.args.get('name', 'Jordan') + '</h1>' @app.route("/dog") def dog(): print(request.args) html = ''' <link rel="stylesheet" href="https://stackpath.bootstrapcdn....
66
28.26
107
17
499
python
[{"finding_id": "codeql_py/reflective-xss_fce71e5fe26e63f5_98b40b30", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 8, 66 ]
[ null, null ]
[ 12, 12 ]
[ 98, 16 ]
2024-11-18T20:10:39.190797+00:00
1,528,345,381,000
78a4a8572dd808c7a2ce664ac5c2fffb88038e4b
3
{ "blob_id": "78a4a8572dd808c7a2ce664ac5c2fffb88038e4b", "branch_name": "refs/heads/master", "committer_date": 1528345381000, "content_id": "850bf745de4a80b7f86794a436945432269093a6", "detected_licenses": [ "MIT" ], "directory_id": "bdfbee26a48b73f8d629f08ddbf375cf00d4ada3", "extension": "py", "fi...
3.390625
stackv2
from collections import defaultdict import numpy as np import re import sys class Vocab(object): """ Class to process one text file """ def __init__(self): self.word2index = {} self.index2word = {} self.word_freq = defaultdict(int) self.total_words = 0 self.unkn...
241
31.21
102
26
1,964
python
[{"finding_id": "codeql_py/overly-large-range_c426cd42adfd0815_a9fdda6d", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
4
true
[ "CWE-020", "CWE-020", "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious chara...
[ 163, 169, 169, 169 ]
[ null, null, null, null ]
[ 53, 15, 18, 21 ]
[ 56, 19, 22, 25 ]
2024-11-18T20:26:02.221821+00:00
1,603,787,970,000
c3a146ad39508b6ff89fb89080f95dbb1658755c
2
{ "blob_id": "c3a146ad39508b6ff89fb89080f95dbb1658755c", "branch_name": "refs/heads/master", "committer_date": 1603787970000, "content_id": "adaeb053cd9e24074e78a434f55e8de3f7097887", "detected_licenses": [ "MIT" ], "directory_id": "4e6af22f928c0d6618cd553c391f80ec2c4f406f", "extension": "py", "fi...
2.34375
stackv2
from io import BytesIO import time from pathlib import Path import traceback from flask import Blueprint, jsonify, request from modtpy.api.gcode_optimization import GcodeOptimizer from modtpy.api.modt import ModT, Mode import logging from queue import LifoQueue printer = Blueprint('printer', __name__) class WebLog...
127
26.45
95
22
762
python
[{"finding_id": "codeql_py/stack-trace-exposure_372c5cf1c9a4a80c_68fc9db6", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 70 ]
[ null ]
[ 34 ]
[ 40 ]
2024-11-18T20:26:25.661864+00:00
1,565,456,716,000
303482f58b1958ca94b4290655466a9868ca29d5
3
{ "blob_id": "303482f58b1958ca94b4290655466a9868ca29d5", "branch_name": "refs/heads/master", "committer_date": 1565456716000, "content_id": "f608bd5df5c4b1f806c8d7ef97585b0657a8ee8f", "detected_licenses": [ "Apache-2.0" ], "directory_id": "70bfc97fb0ff98d817f72f27775a7b467ae66c39", "extension": "py"...
2.515625
stackv2
import network, time, machine, consts sta_if = network.WLAN(network.STA_IF) defaultSsid = machine.nvs_getstr("system", "wifi.ssid") or consts.WIFI_SSID defaultPassword = machine.nvs_getstr("system", "wifi.password") # Password is empty for unencrypted networks, so a simple or statement won't do if defaultPassword is...
51
21.57
79
10
310
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ce4f8d82acdfab20_2dfb1881", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text." ]
[ 22 ]
[ null ]
[ 31 ]
[ 39 ]
2024-11-18T20:26:44.043120+00:00
1,540,911,096,000
f98232b4b14c696456c371c4efc20d361f994ae7
3
{ "blob_id": "f98232b4b14c696456c371c4efc20d361f994ae7", "branch_name": "refs/heads/master", "committer_date": 1540911096000, "content_id": "08aac48e26f165cdceb6b12184bace2df9edeb4f", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "12976b50eaeb88635a3dae404f77d3e2b6b37945", "extension": "p...
2.78125
stackv2
"""API functions related to Services. Providers are inferred by aggregating information from service plugins. """ from ..util import save_settings, get_settings, update_settings, parse_service_uri from quest.database.database import get_db, db_session from ..plugins import load_providers import requests import os de...
226
26.96
90
18
1,297
python
[{"finding_id": "codeql_py/request-without-cert-validation_4b018ada930632d0_21035af1", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 116 ]
[ null ]
[ 13 ]
[ 45 ]
2024-11-18T20:26:51.217111+00:00
1,561,152,459,000
2f73ed3389e51b4b0200b6d1c38febf85c78453d
3
{ "blob_id": "2f73ed3389e51b4b0200b6d1c38febf85c78453d", "branch_name": "refs/heads/master", "committer_date": 1561152459000, "content_id": "4d241f322c5c875518b9604b2c0a6209e5cdebee", "detected_licenses": [ "MIT" ], "directory_id": "230c116cf2d2fc793068f15a515fc26a5d85811a", "extension": "py", "fi...
3.203125
stackv2
# TO RUN THIS SCRIPT COPY THIS COMMAND INTO THE TERMINAL -----> python robo_advisor.py packages_setup = [''' conda create -n stocks-env python=3.7 # (first time only) conda activate stocks-env pip install -r requirements.txt pip install pytest # (only if you'll be writing tests) python robo_advisor.py '''] # Exa...
234
41.18
156
13
2,305
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e284db6da7ea938f_c52d9fe3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 191, 196 ]
[ null, null ]
[ 7, 7 ]
[ 48, 44 ]
2024-11-18T20:26:59.143627+00:00
1,452,380,812,000
f0af4bb4f49b57b43ad1ce06896db6c160b3f206
2
{ "blob_id": "f0af4bb4f49b57b43ad1ce06896db6c160b3f206", "branch_name": "refs/heads/master", "committer_date": 1452380812000, "content_id": "6da6a7d9dc17a276cc82e529e0afa8936dc15877", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "c1ff7f090dec3617514eb467cd7c5b8ba510ff4a", "extension": "p...
2.5
stackv2
from django.db.models import Q from django_reclass.models import Reclass, ReclassTemplate from rest_framework import authentication, permissions from rest_framework.response import Response from rest_framework.views import APIView from .serializers import ReclassSerializer, ReclassTemplateSerializer def get_path(pa...
55
28.33
100
22
324
python
[{"finding_id": "codeql_py/stack-trace-exposure_4ae899a101c39a57_3c83c59f", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 51 ]
[ null ]
[ 37 ]
[ 54 ]
2024-11-18T20:52:37.409724+00:00
1,621,482,365,000
478135718f8bfe23baa9bb6d85bd9155e7915d21
3
{ "blob_id": "478135718f8bfe23baa9bb6d85bd9155e7915d21", "branch_name": "refs/heads/master", "committer_date": 1621482365000, "content_id": "bafe233d4904d8a6197b2692d93ac1219a48b6dd", "detected_licenses": [ "MIT" ], "directory_id": "096d28e30a77ffd5475e6cc3f1c3d1497bef05c0", "extension": "py", "fi...
2.8125
stackv2
import argparse import sqlite3 from pathlib import Path from typing import Dict from argon2 import PasswordHasher DB_FILE = "modernrelay.db" USER_AND_PASSWORD: Dict[str, str] = { "test": "test", "test2": "test2" } class ParseKwargs(argparse.Action): def __call__(self, parser, namespace, values, option_s...
52
30.5
110
14
401
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_af836c1c23435009_12912493", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 46 ]
[ null ]
[ 15 ]
[ 53 ]
2024-11-18T20:52:39.957321+00:00
1,480,225,045,000
b181ea8d88f74edd08e773ecff1e6f8b94b90d0a
3
{ "blob_id": "b181ea8d88f74edd08e773ecff1e6f8b94b90d0a", "branch_name": "refs/heads/master", "committer_date": 1480225045000, "content_id": "dfd24c720a003adb6a149546f6f2233e95d37663", "detected_licenses": [ "MIT" ], "directory_id": "e839d7b6bf1dbaf130075ff4b093ff807d89ee91", "extension": "py", "fi...
2.5625
stackv2
import json from urllib import request from flask import Flask from feedgen.feed import FeedGenerator app = Flask(__name__) class Api: base_url = 'http://zhuanlan.zhihu.com' base_api_url = base_url + '/api/columns' def __init__(self, column_id): self.column_id = column_id self.info = se...
64
27.86
100
16
469
python
[{"finding_id": "codeql_py/partial-ssrf_58f12d0a750d1fcc_ad6be8b7", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
2
true
[ "CWE-918", "CWE-918" ]
[ "py/partial-ssrf", "py/partial-ssrf" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 29, 37 ]
[ null, null ]
[ 10, 10 ]
[ 35, 36 ]
2024-11-18T20:52:59.082057+00:00
1,614,350,599,000
157c45218869da26dd88ef0a8a5986677f5e5dcf
3
{ "blob_id": "157c45218869da26dd88ef0a8a5986677f5e5dcf", "branch_name": "refs/heads/main", "committer_date": 1614350599000, "content_id": "e94e4517611d27b955415a07ba74dd2fcb133b5a", "detected_licenses": [ "MIT" ], "directory_id": "becfe8ec93a0d03c8cb570a0914657f880bdfd33", "extension": "py", "file...
2.578125
stackv2
import argparse import os import subprocess import tempfile import yaml from pprint import pprint as pp import sys from ansible.parsing.vault import VaultLib from ansible.constants import DEFAULT_VAULT_ID_MATCH from ansible.parsing.vault import VaultSecret, AnsibleVaultError class AnsibleVault(): @classmethod ...
174
35.02
118
19
1,318
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_92653750ec80c4d3_f67b0df0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text." ]
[ 41 ]
[ null ]
[ 27 ]
[ 35 ]
2024-11-18T19:02:45.917247+00:00
1,606,598,439,000
f4cd8b2c160bc909d9d75a0d1b53689cb4b41920
3
{ "blob_id": "f4cd8b2c160bc909d9d75a0d1b53689cb4b41920", "branch_name": "refs/heads/master", "committer_date": 1606598439000, "content_id": "7013cb0a304bb5eceb508678a5535e1f6d4b1ac8", "detected_licenses": [ "MIT" ], "directory_id": "fe2f13ad424ccd2df2e566890682aa11d7e35620", "extension": "py", "fi...
2.875
stackv2
import csv import requests import time from datetime import datetime from bs4 import BeautifulSoup # https://www.indeed.com/jobs?q={search+query}&l={location}&start={10/1000} # Functions: # Get inputs # One for all # One per page # One per job # One per parameter indeed = "https://www.indeed.com/jobs?q=" """ Returns...
258
28.64
148
16
1,978
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_b4e95d288580d6ba_f62e9857", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [greenhouse.io](1) may be at an arbitrary position in t...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "The string [greenhouse.io](1) may be at an arbitrary position in the sanitized URL.", "The string [myworkdayjobs.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 146, 148 ]
[ null, null ]
[ 10, 10 ]
[ 32, 36 ]
2024-11-18T19:02:47.136535+00:00
1,601,525,622,000
8a9e9bd7695c3cf1ac3393859a0351759a3bd4a4
2
{ "blob_id": "8a9e9bd7695c3cf1ac3393859a0351759a3bd4a4", "branch_name": "refs/heads/master", "committer_date": 1601525622000, "content_id": "348f5925457925af1d36dae5fd408100185b853d", "detected_licenses": [ "Apache-2.0" ], "directory_id": "4de03eecadc4c69caf792f4773571c2f6dbe9d68", "extension": "py"...
2.421875
stackv2
# (c) 2009-2014 Martin Wendt and contributors; see WsgiDAV https://github.com/mar10/wsgidav # Original PyFileServer (c) 2005 Ho Chun Wei. # Licensed under the MIT license: http://www.opensource.org/licenses/mit-license.php """ WSGI middleware for HTTP basic and digest authentication. Usage:: from http_authenticato...
410
41.72
156
21
3,774
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_df5bfa0406a1d82b_fa02f68f", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi...
[ 395 ]
[ null ]
[ 20 ]
[ 24 ]
2024-11-18T19:02:52.664749+00:00
1,577,780,464,000
3324e161685bd48430e261b97c66ffc2b8fd58bf
2
{ "blob_id": "3324e161685bd48430e261b97c66ffc2b8fd58bf", "branch_name": "refs/heads/master", "committer_date": 1577780464000, "content_id": "92734958c6d2175ad00baf64a2fe5231f3a181f4", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "15b05b728f2e039b8a5054a21136642495d144df", "extension": "p...
2.390625
stackv2
"""Created originally by Ethan Chiu 10/25/16 v2.0.0 created on 8/4/18 Complete redesign for efficiency and scalability Uses Python 3 now v2.1.0 created on 5/10/19 Improve efficiency and design """ from flask import Response, Flask, render_template, request, jsonify, session, redirect, url_for from flask_socketio impo...
283
30.01
128
19
2,238
python
[{"finding_id": "codeql_py/command-line-injection_399543986a2d3107_f8c13f1c", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {...
18
true
[ "CWE-078", "CWE-078", "CWE-078", "CWE-078", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022" ]
[ "py/command-line-injection", "py/command-line-injection", "py/command-line-injection", "py/command-line-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path...
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This command line depends on a [user-provided value](1).", "This command line depends on a [user-provided value](1).", "This command line depends on a [user-provided value](1).", "This command line depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).\nThis path depends...
[ 219, 221, 223, 237, 102, 105, 108, 151, 166, 168, 172, 176, 224, 225, 226, 241, 244, 245 ]
[ null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null ]
[ 19, 19, 19, 19, 27, 83, 15, 15, 27, 27, 15, 15, 27, 25, 25, 19, 27, 22 ]
[ 22, 22, 22, 22, 40, 96, 28, 28, 38, 37, 26, 25, 51, 47, 47, 50, 37, 32 ]
2024-11-18T19:03:03.908404+00:00
1,419,112,281,000
858a8c3cf8af4f33c91dd8af802064d716f35bd7
3
{ "blob_id": "858a8c3cf8af4f33c91dd8af802064d716f35bd7", "branch_name": "refs/heads/master", "committer_date": 1419112281000, "content_id": "769287fa273899109d0e261beca2fde6cf143e65", "detected_licenses": [ "MIT" ], "directory_id": "b17a47481e84a51dbb4c27a5522f4889f3d84f1e", "extension": "py", "fi...
3.125
stackv2
# # &copy; 2011 Christopher Arndt, MIT License # import re import time from distill import PY2, PY3 class cached_property(object): # pragma: no cover """Decorator for read-only properties evaluated only once within TTL period. It can be used to created a cached property like this:: import random ...
186
27.39
80
16
1,325
python
[{"finding_id": "codeql_py/overly-large-range_4b32d1703e0a732a_59846895", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 64, 64 ]
[ null, null ]
[ 25, 30 ]
[ 28, 33 ]
2024-11-18T19:14:52.786683+00:00
1,592,498,508,000
cd8e90c5b3fc317f92eba5f2d5982a952efcc373
4
{ "blob_id": "cd8e90c5b3fc317f92eba5f2d5982a952efcc373", "branch_name": "refs/heads/master", "committer_date": 1592498508000, "content_id": "892942d328fbe0502ddc3aa7537d7513309e3d3c", "detected_licenses": [ "MIT" ], "directory_id": "6e27f8494393b06eb39a45dcb1738cf188c0d23e", "extension": "py", "fi...
3.96875
stackv2
""" Read file into texts and calls. It's ok if you don't understand how to read files. """ import csv with open('texts.csv', 'r') as f: reader = csv.reader(f) texts = list(reader) with open('calls.csv', 'r') as f: reader = csv.reader(f) calls = list(reader) """ TASK 3: (080) is the area code for fixe...
100
30.67
111
14
804
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_16917837e1207ede_3fd67772", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 71 ]
[ null ]
[ 11 ]
[ 15 ]
2024-11-18T19:27:36.011891+00:00
1,568,999,835,000
60d4a5a05dbd5517a67976a8fbca18dc2006c5d8
3
{ "blob_id": "60d4a5a05dbd5517a67976a8fbca18dc2006c5d8", "branch_name": "refs/heads/master", "committer_date": 1568999835000, "content_id": "ee148ab1a5814fc80983eec1db0ed989ed6306b8", "detected_licenses": [ "MIT" ], "directory_id": "61650399840f2fc322cb65ba741a2dfeaf800f25", "extension": "py", "fi...
2.625
stackv2
#!/usr/bin/env python3 import argparse from datetime import datetime from jinja2 import ( FileSystemLoader, Environment, ) import os root = os.path.dirname(os.path.abspath(__file__)) template_dir = os.path.join(root, 'templates') env = Environment( loader=FileSystemLoader(template_dir), keep_trailing_n...
149
27.2
79
19
882
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_205ab9a0ee330c6e_27402e05", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 12 ]
[ 15 ]
[ 7 ]
[ 2 ]
2024-11-18T19:27:39.684616+00:00
1,620,838,647,000
f8c47d69b16398f2761fe41690fb5018f87712f5
3
{ "blob_id": "f8c47d69b16398f2761fe41690fb5018f87712f5", "branch_name": "refs/heads/master", "committer_date": 1620838647000, "content_id": "da33dc0a041f71ec907d1fe7d386f54165146604", "detected_licenses": [ "Artistic-2.0" ], "directory_id": "0af856b83413d201285bd101996d59c31cd0bfdd", "extension": "p...
2.5625
stackv2
""" This handler listens for TCP connections from the world. Those connections will send us messages for actions to perform such as rereading configurations, rewriting configurations, starting or stopping a process, or updating supervisord. All connections must come in with a valid and authorized client certificate. ""...
279
46.79
160
27
2,452
python
[{"finding_id": "codeql_py/insecure-protocol_7ec613c669813b76_ce022038", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/...
1
true
[ "CWE-327" ]
[ "py/insecure-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.create_default_context](1)." ]
[ 64 ]
[ null ]
[ 34 ]
[ 37 ]
2024-11-18T19:38:34.220110+00:00
1,599,053,689,000
e485f8c2a3d1ed5f56721bfcf52bbadcac78acdb
3
{ "blob_id": "e485f8c2a3d1ed5f56721bfcf52bbadcac78acdb", "branch_name": "refs/heads/master", "committer_date": 1599053689000, "content_id": "5bcaf7ed6969fc5806dcf75bbb2813a115eaecf4", "detected_licenses": [ "Apache-2.0" ], "directory_id": "5fe72bb13baf3649058ebe11aa86ad4fc56c69ed", "extension": "py"...
2.6875
stackv2
import argparse from collections import Counter import csv import os import torch from torch.autograd import Variable import torch.nn as nn import torch.optim as optim import torch.utils.data as data import tarfile import time import urllib.request ''' This trains a classifier using Embedding -> tanh -> Linear -> Cros...
144
35.11
109
22
1,253
python
[{"finding_id": "codeql_py/tarslip_20cd927be6bdd59a_8d06fcfc", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 112 ]
[ null ]
[ 9 ]
[ 11 ]
2024-11-18T19:38:57.741595+00:00
1,615,112,003,000
0d4243fb87d0a534759053f54185c14a9e110e5a
3
{ "blob_id": "0d4243fb87d0a534759053f54185c14a9e110e5a", "branch_name": "refs/heads/main", "committer_date": 1615112003000, "content_id": "a362b71a18eddbf847cec23b6b96fff560420f27", "detected_licenses": [ "MIT" ], "directory_id": "5f9753a9153be538295d9b852fadc5f29ebf9277", "extension": "py", "file...
2.59375
stackv2
import os import codecs import io import yagmail import htmlmin from jinja2 import Template, Environment, FileSystemLoader from mailer.config import config from mailer import minifier class Mailer: PREFIX='[Pyworks Mailer]' TEMPLATES_ROOT_DIR = config.MAIL_TEMPLATES_ROOT TEMPLATE_USER_REGISTERED = 'user...
108
33.71
108
17
827
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_88a545bb72961a72_5f33b7d4", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 87 ]
[ null ]
[ 15 ]
[ 46 ]
2024-11-18T20:06:25.497511+00:00
1,547,982,909,000
d6163bace7a481c24f18942fd2c8e0ae8e2fcd75
2
{ "blob_id": "d6163bace7a481c24f18942fd2c8e0ae8e2fcd75", "branch_name": "refs/heads/master", "committer_date": 1547982909000, "content_id": "214e88dc960e726fede8407b2f6fceaf1d186217", "detected_licenses": [ "MIT" ], "directory_id": "7b8f4b3779fe93a4b1e83fb9d47fb02e1bd7b9ed", "extension": "py", "fi...
2.421875
stackv2
# @Time :2018/10/29 16:57 # @Author :lvjunjie import hashlib import re import requests class LoginApi(object): @staticmethod def logindmp(username, password): """ dmp平台账号密码登录 """ session_sso = requests.Session() cookie = { "OUTFOX_SEARCH_USER_ID_NCOO": ...
80
36.9
120
19
880
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_d82797277f695d86_84099235", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 76 ]
[ null ]
[ 18 ]
[ 43 ]
2024-11-18T20:18:16.447754+00:00
1,597,956,165,000
148ba8aacac7a84f6d9a017660a00b12347cc2f6
3
{ "blob_id": "148ba8aacac7a84f6d9a017660a00b12347cc2f6", "branch_name": "refs/heads/master", "committer_date": 1597956165000, "content_id": "92d8a03fb572e5728dbc4996debef84e50b3b62d", "detected_licenses": [ "Apache-2.0" ], "directory_id": "283739c2dd298652a5358c5a2eea84d3e83bb334", "extension": "py"...
2.515625
stackv2
import time import requests from requests.exceptions import SSLError timeout = 75 def wait_for_fineract(): seconds = 0 while seconds < timeout: try: res = requests.get('https://127.0.0.1:8443/api-docs/apiLive.htm', verify=False) if res.ok: print('Available aft...
25
20.32
91
16
127
python
[{"finding_id": "codeql_py/request-without-cert-validation_652df636bc075c66_8c77007e", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 13 ]
[ null ]
[ 19 ]
[ 92 ]
2024-11-18T20:31:13.224309+00:00
1,584,855,228,000
add8df6b00188ca965eae84cf713ee54391ed7f2
2
{ "blob_id": "add8df6b00188ca965eae84cf713ee54391ed7f2", "branch_name": "refs/heads/master", "committer_date": 1584855228000, "content_id": "a5501eaa1bc13cc791a0112e0f0eff94ef144dcd", "detected_licenses": [ "MIT" ], "directory_id": "dcfcfcb00bd7550f583b007b4dd70457af21e5bb", "extension": "py", "fi...
2.3125
stackv2
from django.shortcuts import redirect from django.views.generic import TemplateView from social_django.models import UserSocialAuth from datetime import datetime, date from django.views.generic.edit import FormView from forms import PatientCheckInForm, PatientUpdateProfileForm from django.core.urlresolvers import rever...
186
37.25
117
20
1,484
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_727e2a91500bf243_51db1079", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 73, 85, 126 ]
[ null, null, null ]
[ 15, 34, 43 ]
[ 65, 58, 68 ]
2024-11-18T20:31:17.120159+00:00
1,674,289,511,000
7e36988a6ba77328345ac32afcea16b405354388
3
{ "blob_id": "7e36988a6ba77328345ac32afcea16b405354388", "branch_name": "refs/heads/master", "committer_date": 1674289877000, "content_id": "1f7158568a13bd3908ff9978af38e8943c023755", "detected_licenses": [ "MIT" ], "directory_id": "adaa387eb5a359058f9b724d01d92d4c3799f865", "extension": "py", "fi...
2.75
stackv2
#!/usr/bin/env python3 import os from http.server import BaseHTTPRequestHandler, HTTPServer import urllib import ev3dev.ev3 as ev3 import time import random import sys SPEED=500 HAND_SPEED=300 lm1 = ev3.LargeMotor('outD') lm2 = ev3.LargeMotor('outB') m1 = ev3.Motor('outA') def driveMotor(motor, speed): print("spe...
115
22.79
84
14
757
python
[{"finding_id": "codeql_py/path-injection_d8926c9ada9267fa_1ac12f6d", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 61, 73 ]
[ null, null ]
[ 27, 15 ]
[ 35, 23 ]
2024-11-18T20:31:20.469038+00:00
1,689,882,548,000
4be7b6183b7e5191738577375eb01f9141b3a510
2
{ "blob_id": "4be7b6183b7e5191738577375eb01f9141b3a510", "branch_name": "refs/heads/main", "committer_date": 1689882548000, "content_id": "38dda64b43985686a21fccb40489e4cbb3b12791", "detected_licenses": [ "Apache-2.0" ], "directory_id": "f42cd8413ac5bec6526cc1013253d00fd9becc62", "extension": "py", ...
2.390625
stackv2
# Copyright 2020 Planet Labs, Inc. # Copyright 2022 Planet Labs PBC. # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by a...
271
30.1
79
16
1,797
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_c34d6ee03f1eb5c6_8a008ce6", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive data (secret)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 256, 94 ]
[ null, null ]
[ 22, 26 ]
[ 42, 79 ]
2024-11-18T20:31:37.869818+00:00
1,579,069,639,000
cc4e885623a0108493ee96206ebf6c36152f0c79
3
{ "blob_id": "cc4e885623a0108493ee96206ebf6c36152f0c79", "branch_name": "refs/heads/master", "committer_date": 1579069639000, "content_id": "dc63ddd67152d54650774a79c4a9b1acab49f010", "detected_licenses": [ "MIT" ], "directory_id": "89eee9c6be277947b61544a922c96311f04a8683", "extension": "py", "fi...
2.625
stackv2
#!/usr/bin/env python2 """ Server code to track number of visitors. """ import logging import json import time from flask import Flask, request, send_from_directory, g, redirect, url_for from flask import jsonify from pymongo import MongoClient QUIZ_TYPES = set(['men', 'women']) app = Flask(__name__) def connect_db...
183
25.73
75
16
1,076
python
[{"finding_id": "codeql_py/log-injection_793ae355babfd859_c58c19d4", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
4
true
[ "CWE-117", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 48, 56, 90, 104 ]
[ null, null, null, 105 ]
[ 18, 25, 19, 25 ]
[ 62, 70, 31, 23 ]
2024-11-18T20:44:07.273841+00:00
1,635,511,015,000
72ef619b38d9eae5ae4f53f9c893d1d0c803b9c3
2
{ "blob_id": "72ef619b38d9eae5ae4f53f9c893d1d0c803b9c3", "branch_name": "refs/heads/main", "committer_date": 1635511015000, "content_id": "4a567efb2a0ae78bcacabe6c7a769eeffc9b3189", "detected_licenses": [ "Apache-2.0" ], "directory_id": "b96dd329eea7b5aa8d795d57c983d947c4b3bd3f", "extension": "py", ...
2.4375
stackv2
import hashlib import lxml.html from typing import Optional, List from . import atserver from . import atconnect from . import aterrors class Client: def __init__( self, username:str, md5:Optional[str]=None, password:Optional[str]=None) -> None: if (password == None) and (md5 == None): raise AttributeEr...
62
23.58
67
21
415
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_976bdab1737d3661_53dd9e41", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi...
[ 22 ]
[ null ]
[ 21 ]
[ 45 ]
2024-11-18T20:44:13.782591+00:00
1,526,326,138,000
5a8bf050c45f068d52b779f2d72cb23a6ace2f6c
3
{ "blob_id": "5a8bf050c45f068d52b779f2d72cb23a6ace2f6c", "branch_name": "refs/heads/master", "committer_date": 1526326138000, "content_id": "320a7a41aa50963da5d9482b81c631e09c8eb8dd", "detected_licenses": [ "MIT", "Python-2.0" ], "directory_id": "0266f371319c28227a948fb105440ef74a3c583d", "exten...
2.609375
stackv2
"""Class that handles the interaction with the CentraXX REST API and XML import""" import os import codecs import requests from requests.auth import HTTPBasicAuth class CXXConnectException(Exception): """Exception class for raising CentraXX connection related exceptions""" class CXXConnect(): def __init...
68
39.4
106
13
618
python
[{"finding_id": "codeql_py/request-without-cert-validation_c6c0ffbba003a859_9a8e1c52", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
4
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 26, 48, 56, 67 ]
[ null, null, null, null ]
[ 20, 20, 20, 20 ]
[ 85, 107, 90, 72 ]
2024-11-18T20:44:14.633423+00:00
1,599,162,584,000
35ecee8c8d21c9faf4cb947358f30b2257069643
2
{ "blob_id": "35ecee8c8d21c9faf4cb947358f30b2257069643", "branch_name": "refs/heads/master", "committer_date": 1601753451000, "content_id": "f254e8d33f7962e468fa8434f6644c650363e3f3", "detected_licenses": [ "MIT" ], "directory_id": "395db06167c256bf0eb6a09ba54842f569fb8986", "extension": "py", "fi...
2.4375
stackv2
# standard package import os # 3rd party packages import json from aiohttp import web # local package from video_downscaler import VideoDownscaler async def downscale(request): try: reader = await request.multipart() # reader.next() will `yield` the fields of the form field = await reader.next() filenam...
52
20.69
64
17
305
python
[{"finding_id": "codeql_py/stack-trace-exposure_aa940a6186a3d578_83e5d2c4", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 41 ]
[ null ]
[ 28 ]
[ 52 ]
2024-11-18T20:44:17.640200+00:00
1,530,342,994,000
11b8f8a0fdc78a022cbafbe273ecde3c941eeea9
2
{ "blob_id": "11b8f8a0fdc78a022cbafbe273ecde3c941eeea9", "branch_name": "refs/heads/master", "committer_date": 1530342994000, "content_id": "ff9586f0e807d25e70c989640c320db11a50b250", "detected_licenses": [ "MIT" ], "directory_id": "10e01fa3e7ad61959cb162bb28c3e96473a9965f", "extension": "py", "fi...
2.3125
stackv2
#!/usr/bin/env python3 import argparse import os import configparser import requests import getpass import json from bs4 import BeautifulSoup __VERSION__ = '1.0.0' UA_STRING = 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) ' \ 'AppleWebKit/537.36 (KHTML, like Gecko) ' \ 'Chrome/67.0.3396.87 ' \ ...
240
31.68
119
13
1,905
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7241ca362f7a3e7a_43d133ed", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 62 ]
[ null ]
[ 15 ]
[ 45 ]
2024-11-18T20:58:07.422410+00:00
1,684,849,962,000
a9ebec0844b6ccfb8840d6fa32e5a388039f7804
3
{ "blob_id": "a9ebec0844b6ccfb8840d6fa32e5a388039f7804", "branch_name": "refs/heads/master", "committer_date": 1684849962000, "content_id": "e2be4c02f27d316da84bce8b3a76e78d59169417", "detected_licenses": [ "MIT" ], "directory_id": "4b0a1d7bdd8a7e48ddecd8c933a64a707c4e6ef7", "extension": "py", "fi...
2.640625
stackv2
""" :copyright: (c) 2015-2018 Damien Tougas :license: MIT, see LICENSE.txt for more details """ import argparse import pprint import sqlite3 import sys import feedparser from jinja2 import Environment, FileSystemLoader import requests from settings import DEFAULTS class SendyRSSPublisher(object): def _...
404
30.96
80
16
2,843
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_0619a986ddf58765_0ece52a5", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 24 ]
[ null ]
[ 29 ]
[ 78 ]
2024-11-18T20:58:10.674372+00:00
1,616,439,264,000
dcd2dd5c57a281e2e4093e02eaef91117d41d2db
3
{ "blob_id": "dcd2dd5c57a281e2e4093e02eaef91117d41d2db", "branch_name": "refs/heads/main", "committer_date": 1616439264000, "content_id": "1a9fb15c38012398e0a9dad6074633496adcf6a1", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "ee9ea53684d23e8299d6aa9e49a05dade29edc5f", "extension": "py"...
3.125
stackv2
#!/usr/bin/python3 import requests # site: https://badssl.com # state should be: good # verification: disabled # comment: warning on command line output on disabled verification badssl_startsite = "https://rc4.badssl.com" https_verification = False def verification_on(): if https_verification: print("Ve...
36
31.67
95
13
251
python
[{"finding_id": "codeql_py/request-without-cert-validation_9e8ba5252f2eb17f_f0c163ba", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1) by [this value](2)." ]
[ 22 ]
[ null ]
[ 9 ]
[ 68 ]