added
stringlengths
32
32
created
int64
1,236B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.03
source
stringclasses
1 value
text
stringlengths
330
19.3k
num_lines
int64
16
648
avg_line_length
float64
15.5
59.3
max_line_length
int64
37
179
ast_depth
int64
8
38
length
int64
102
3.79k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.11k
276k
sast_codeql_findings_count
int64
1
33
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
33
rule_ids
listlengths
1
33
confidences
listlengths
1
33
severities
listlengths
1
33
messages
listlengths
1
33
line_starts
listlengths
1
33
line_ends
listlengths
1
33
column_starts
listlengths
1
33
column_ends
listlengths
1
33
2024-11-19T02:10:32.075588+00:00
1,444,422,043,000
85c02d618eefde45ef1d54092bf2ae1d8641e555
3
{ "blob_id": "85c02d618eefde45ef1d54092bf2ae1d8641e555", "branch_name": "refs/heads/master", "committer_date": 1444422043000, "content_id": "f8442f00b4f1f7c1c03bfbe4d0afa8ca065dbe51", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e21d8158cc647096f2cd9e38e6760669ec8f919c", "extension": "py"...
2.703125
stackv2
# quick and simple extraction of tor nodes from directory # with insert into QRadar reference collections. # # you'll need the TorCtl python package # from https://gitweb.torproject.org/pytorctl.git/ # and you'll need to have tor installed on the same # host where this script runs. # in the config file (tor_referenc...
131
38.11
119
18
1,279
python
[{"finding_id": "codeql_py/request-without-cert-validation_b66afee6ca1646af_2f53d40d", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
3
true
[ "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 58, 60, 72 ]
[ null, null, null ]
[ 20, 24, 20 ]
[ 81, 84, 88 ]
2024-11-19T02:10:38.432003+00:00
1,538,641,048,000
a330c44db795e6fdd17745a7f1ca1218f147c155
2
{ "blob_id": "a330c44db795e6fdd17745a7f1ca1218f147c155", "branch_name": "refs/heads/master", "committer_date": 1538641048000, "content_id": "f913905a34d33c18f3d0aef8c90f545c4ed96c1b", "detected_licenses": [ "MIT" ], "directory_id": "57763770d98626025a0596638da17e0ef1a6c831", "extension": "py", "fi...
2.484375
stackv2
""" Heroku app for GNIB and VISA appointments Also handles Facebook Messenger bot GVisaBot (same page) Author: Harshvardhan Pandit See blog posts at https://harshp.com/dev/projects/gnib-appointments/ The framework used here is bottle. It is small, it is light, it gets the job done. There are two parts being handled ...
342
31.7
79
19
2,757
python
[{"finding_id": "codeql_py/reflective-xss_371aa6b56147a177_f7700eb6", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
5
true
[ "CWE-079", "CWE-079", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/reflective-xss", "py/reflective-xss", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "HIGH", "HIGH", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)...
[ 254, 331, 107, 170, 217 ]
[ null, null, 110, 173, 222 ]
[ 16, 12, 16, 16, 20 ]
[ 46, 26, 54, 54, 62 ]
2024-11-19T02:10:45.019446+00:00
1,546,093,689,000
64a37ad221c3346766f2c56a4f98da093a3cea64
2
{ "blob_id": "64a37ad221c3346766f2c56a4f98da093a3cea64", "branch_name": "refs/heads/master", "committer_date": 1546093689000, "content_id": "34d114db6ce71d2749eb2d621f313fb28102b7be", "detected_licenses": [ "MIT" ], "directory_id": "ebb5955543f6c09d7ee12b8f58d824604ef4606e", "extension": "py", "fi...
2.421875
stackv2
from flask import Flask, request, make_response from server_config import * import random import hashlib import time import pymysql # session表 session = {} session_time = {} MAX_TIME = 10000 # 维护session表 def check_session_time(): for key, value in session_time.items(): now = int(time.time()) if (no...
275
39.55
134
18
2,493
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_72f49acef06a211d_5008a324", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
9
true
[ "CWE-327", "CWE-089", "CWE-089", "CWE-089", "CWE-089", "CWE-089", "CWE-089", "CWE-089", "CWE-089" ]
[ "py/weak-sensitive-data-hashing", "py/sql-injection", "py/sql-injection", "py/sql-injection", "py/sql-injection", "py/sql-injection", "py/sql-injection", "py/sql-injection", "py/sql-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.", "This SQL query depends on a [user-provided value](1).", "This SQL query depends on a [user-provided value](1).", "This SQL query depends on ...
[ 55, 83, 88, 111, 122, 141, 153, 190, 203 ]
[ null, null, null, null, null, null, null, null, null ]
[ 24, 23, 24, 23, 28, 23, 28, 23, 28 ]
[ 77, 26, 71, 26, 31, 26, 31, 26, 31 ]
2024-11-19T02:45:18.482932+00:00
1,616,713,997,000
8af8db3a208c3266664953cf50f94ac1084137f7
3
{ "blob_id": "8af8db3a208c3266664953cf50f94ac1084137f7", "branch_name": "refs/heads/master", "committer_date": 1616713997000, "content_id": "ae19f21eb50ea34ca625f3df6d2f72a3808c00d7", "detected_licenses": [ "MIT" ], "directory_id": "b9b3e4fbf1c160e5f4e19c6088a33bfba68ecd3e", "extension": "py", "fi...
2.75
stackv2
import hashlib from json import dumps, dump from typing import List, Dict, Tuple from pathlib import Path from os import makedirs, listdir from copy import deepcopy from yaml import load from markdown import markdown from emoji import emojize from jinja2 import Template def get_card_files(card_dir: str = "./cards") ...
127
29.68
84
16
963
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_3bea6a291b54da40_e546a5f1", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 67, 73 ]
[ null, null ]
[ 31, 31 ]
[ 77, 76 ]
2024-11-19T03:12:07.064966+00:00
1,602,081,962,000
1f1f9a44a896abea7874bf40832f4118ea51ac99
2
{ "blob_id": "1f1f9a44a896abea7874bf40832f4118ea51ac99", "branch_name": "refs/heads/master", "committer_date": 1602083645000, "content_id": "adb4e201909f1c2be14967dcfc5e01dccd161997", "detected_licenses": [ "Apache-2.0" ], "directory_id": "9f2b60915d0b14c951716d3967e9911729e60334", "extension": "py"...
2.359375
stackv2
#!/usr/bin/env python3 import waiting import requests import utils import deployment_options SERVICE = "assisted-service" TIMEOUT = 60 * 15 REQUEST_TIMEOUT = 2 SLEEP = 3 def handle_arguments(): return deployment_options.load_deployment_options() def wait_for_request(url: str) -> bool: res = requests.get(...
42
27.52
116
11
245
python
[{"finding_id": "codeql_py/request-without-cert-validation_af874e2f75fc9b3f_bede3408", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 20 ]
[ null ]
[ 11 ]
[ 67 ]
2024-11-19T03:12:14.847579+00:00
1,541,671,468,000
f93fdb5605364a3e18f2c750c8bbacc4a0ddd2f6
3
{ "blob_id": "f93fdb5605364a3e18f2c750c8bbacc4a0ddd2f6", "branch_name": "refs/heads/master", "committer_date": 1541671468000, "content_id": "e4661907f634c617ec74e652ff5dd9370ab90009", "detected_licenses": [ "MIT" ], "directory_id": "8b1b1a9d8ed82d9fca94a6b311b57c9b5a736f91", "extension": "py", "fi...
2.546875
stackv2
#coding=utf8 import requests import os ''' 通过mysql的配置文件得知了数据的存储目录。通过直接读取数据库文件可以获取到数据库内的信息。 ''' linux_path_from_root = '''/etc/shadow /etc/sysconfig/network-scripts/ifcfg-eth0 /etc/hosts /etc/my.cnf /proc/self/cmdline /proc/self/environ /proc/verison /proc/self/cwd /proc/net/arp /proc/sched_debug /proc/self/fd/0 /proc...
76
19.92
106
18
473
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_5f3daec27ec0d6b6_17e81100", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 58 ]
[ null ]
[ 18 ]
[ 34 ]
2024-11-19T01:57:29.187954+00:00
1,441,983,510,000
b06be6dd28230c27e54510ef97c3e6fc3e7d1820
3
{ "blob_id": "b06be6dd28230c27e54510ef97c3e6fc3e7d1820", "branch_name": "refs/heads/master", "committer_date": 1441983510000, "content_id": "9eccebaad1d313e56dc6fc4d9a4d344ac8dfd1bc", "detected_licenses": [ "MIT" ], "directory_id": "245cdf87efb544823663503fb14dc515a2c67e2f", "extension": "py", "fi...
2.703125
stackv2
""" CAS module for bottle History : Original module for Cherrypy developped by : James Macdonell and Marc Santoro Bottle Adaptation : SnarkTurne 2013-08-27 : Typos corrections, bug correction in the TestCASAuth method 2013-07-16 : Converted to a real bottle plugin 2013-07-08 : Added redirection to the re...
220
31.28
114
15
1,750
python
[{"finding_id": "codeql_py/partial-ssrf_d4cd15b785c68aa5_74695739", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 185 ]
[ null ]
[ 27 ]
[ 73 ]
2024-11-19T02:10:48.392749+00:00
1,571,469,991,000
4b65188f2ae75ddaedea170f1ac4bd9fced30800
3
{ "blob_id": "4b65188f2ae75ddaedea170f1ac4bd9fced30800", "branch_name": "refs/heads/master", "committer_date": 1571469991000, "content_id": "10c3cb2067c3fb110a77f61ad4c6ad462c5562e5", "detected_licenses": [ "MIT" ], "directory_id": "9795fe1532849a046895cfb0d4b359144ad575dd", "extension": "py", "fi...
2.78125
stackv2
import re from pprint import pprint # comment_pattern = '\/comment(?:s)?(?:\/)?' # comment_regex = re.compile(comment_pattern) # url = 'http://boingboing.net/comments/feed' # result = comment_regex.search(url) # if result: # print(result.string) # r = comment_regex.sub('/', url) # print(r) bracketNameRegex = re...
20
23.85
98
8
140
python
[{"finding_id": "codeql_py/redos_3ff387ca114ed494_4491199d", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of 'a'.", "remediati...
2
true
[ "CWE-1333", "CWE-1333" ]
[ "py/redos", "py/redos" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of 'a'.", "This part of the regular expression may cause exponential backtracking on strings starting with '(' and containing many repetitions of 'a'." ]
[ 15, 15 ]
[ null, null ]
[ 37, 63 ]
[ 40, 66 ]
2024-11-19T02:11:01.601344+00:00
1,587,498,305,000
eabb808ae7cb957d41d1ca434c3de0f63448716a
2
{ "blob_id": "eabb808ae7cb957d41d1ca434c3de0f63448716a", "branch_name": "refs/heads/master", "committer_date": 1587498305000, "content_id": "b2eecafbf94570fca77f6f7b1a32cd1362a4dff5", "detected_licenses": [ "MIT" ], "directory_id": "1bec933de08a67007c1159c86231b9eed418898a", "extension": "py", "fi...
2.40625
stackv2
from flask import request, make_response import requests, json from app import app def ussd_proceed(response): return "CON {}".format(response) def ussd_stop(response): return "END {}".format(response) def get_pin(): response = "Welcome to HealthRadar\n" response += "Enter Please enter PIN to veri...
207
29.86
117
18
1,623
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8cb1acb966ea99ce_04346249", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
3
true
[ "CWE-312", "CWE-312", "CWE-079" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 134, 151, 205 ]
[ null, null, null ]
[ 15, 15, 26 ]
[ 23, 22, 34 ]
2024-11-19T02:11:20.329591+00:00
1,625,239,609,000
09d8bd86cef0d35253215bc52afaa57819655061
2
{ "blob_id": "09d8bd86cef0d35253215bc52afaa57819655061", "branch_name": "refs/heads/master", "committer_date": 1625239609000, "content_id": "b3ed6a1e01704a6f2454d25d6a06ba5aa27184f1", "detected_licenses": [ "MIT" ], "directory_id": "045717b393a584c855828b1c8ce89043bda283fd", "extension": "py", "fi...
2.359375
stackv2
import asyncio from bs4 import BeautifulSoup import requests, re from io import BytesIO from PIL import Image async def download_image(link): return Image.open(BytesIO(requests.get(link).content)).convert("RGB") async def parser_nuklir(nuklir): try: source=requests.get(f"https://nhentai.net/g/{nuklir}"...
30
42.03
97
23
368
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_ff526c88437b7cd8_da644603", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'nhentai.net/galleries/', so it migh...
1
true
[ "CWE-020" ]
[ "py/incomplete-hostname-regexp" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'nhentai.net/galleries/', so it might match more hosts than expected." ]
[ 27 ]
[ null ]
[ 36 ]
[ 78 ]
2024-11-19T02:11:40.748861+00:00
1,479,419,969,000
bb90daa75c2861107f8a6245aed253045e09a5a8
3
{ "blob_id": "bb90daa75c2861107f8a6245aed253045e09a5a8", "branch_name": "refs/heads/master", "committer_date": 1479340770000, "content_id": "c0e128c55514692029153247a6b2331f8f21e092", "detected_licenses": [ "MIT" ], "directory_id": "8ead93f9e4555ef24a31ffa343e0e72d048813d5", "extension": "py", "fi...
3.09375
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- """app.py: challenge #4""" __author__ = "Carlan Calazans" __copyright__ = "Copyright 2016, Carlan Calazans" __credits__ = ["Carlan Calazans"] __license__ = "MIT" __version__ = "1.0.0" __maintainer__ = "Carlan Calazans" __email__ = "carlancalazans at gmail dot com" __status...
44
27.32
107
18
345
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e1ebd2b279d40374_56ea63d0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text." ]
[ 44 ]
[ null ]
[ 8 ]
[ 52 ]
2024-11-19T02:11:51.930322+00:00
1,420,837,889,000
933b021191a217cc2655077886519561140bc47d
2
{ "blob_id": "933b021191a217cc2655077886519561140bc47d", "branch_name": "refs/heads/master", "committer_date": 1420837889000, "content_id": "01a3781a108e0fe68d69f926e53479cdebcdf0ba", "detected_licenses": [ "MIT" ], "directory_id": "79fdeda6e02e8ccd1cee877ed961a5ba05ec5364", "extension": "py", "fi...
2.46875
stackv2
from procyon.starsystemmaker import math_helpers import dna_helpers import json import world import numpy #----------------------------------------- #TODO: Grandparents #TODO: Nanny or Caretaker if ec > high #TODO: What to do with education? Job? #TODO: Create city #TODO: Ranks or royalty #TODO: Adoptions #TODO: Same...
183
41.22
176
23
1,807
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9805359efb53f05f_97fa9f42", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.\nThis expression logs [sensitive data (private)](4) as clear text.\nThis expression logs [sensitive data (private)]...
[ 177 ]
[ null ]
[ 15 ]
[ 18 ]
2024-11-19T02:32:43.439586+00:00
1,283,452,776,000
03f1a017f48a66916a1e852038a230688dbb4e7a
2
{ "blob_id": "03f1a017f48a66916a1e852038a230688dbb4e7a", "branch_name": "refs/heads/master", "committer_date": 1283452776000, "content_id": "835b4a80b59329cae1ceaef333cfb7613463c8ac", "detected_licenses": [ "MIT" ], "directory_id": "f65b780524278af066e8d1bc7021e57554768867", "extension": "py", "fi...
2.4375
stackv2
#!/usr/bin/python import urllib2 from BeautifulSoup import BeautifulSoup import time import re import sys import os email_file = open("hos_email.txt", "w") programNum = 0 foundPID = False for line in sys.stdin: email_file.write(line) #print line findProgram = re.search(r'^Subject: \[Hearts of Space Play...
119
30.75
131
15
1,182
python
[{"finding_id": "codeql_py/overly-permissive-file_9f3b3991d4d0484c_98c30f9f", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world writable." ]
[ 117 ]
[ null ]
[ null ]
[ 30 ]
2024-11-19T02:33:00.708328+00:00
1,675,538,888,000
858c70688ba678e3ff06521819cb33410b681b5a
2
{ "blob_id": "858c70688ba678e3ff06521819cb33410b681b5a", "branch_name": "refs/heads/master", "committer_date": 1675538888000, "content_id": "25894901f2a65279cd298f6f2ef1e0f3e3bacaf9", "detected_licenses": [ "MIT" ], "directory_id": "c3e2321d8fd78a345a04dd6bed68b0c04196c9d5", "extension": "py", "fi...
2.40625
stackv2
import hashlib import shortuuid from django.conf import settings from provider.constants import EXPIRE_DELTA, EXPIRE_DELTA_PUBLIC, EXPIRE_CODE_DELTA from django.utils import timezone def now(): return timezone.now() def short_token(): """ Generate a hash that can be used as an application identifier ...
50
25.62
83
12
305
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_d06f95b49b3f7bc4_753b182b", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (SHA1) that is insecure."...
4
true
[ "CWE-327", "CWE-327", "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (id)](1) is used in a hashing algorithm (SHA1) that is insecure.", "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecure.", "[Sensitive data (id)](1) is used in a hashing algorithm (SHA1) that is insecure.", "[Sensitive data (secret)](1) is used in a hashing alg...
[ 17, 18, 26, 27 ]
[ null, null, null, null ]
[ 25, 17, 25, 17 ]
[ 56, 51, 56, 51 ]
2024-11-19T02:33:28.024043+00:00
1,556,031,284,000
c8221523ad30b28bb9c318d7ca2a10e71f4af627
2
{ "blob_id": "c8221523ad30b28bb9c318d7ca2a10e71f4af627", "branch_name": "refs/heads/master", "committer_date": 1556031284000, "content_id": "83a1c16c6d2ebe75b1caea86e835df60bc970d13", "detected_licenses": [ "MIT" ], "directory_id": "3851c075c2571fa969fed49dc16fbab0d539c406", "extension": "py", "fi...
2.421875
stackv2
# Work with Python 3.6 import logging import discord import datetime from environs import Env from commands import wiki import logging logger = logging.getLogger('discord') logger.setLevel(logging.WARNING) handler = logging.FileHandler(filename='discord.log', encoding='utf-8', mode='w') handler.setFormatter(logging....
87
28.86
111
18
586
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_76a77648bd5c2dbe_a2848476", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [pastebin.com](1) may be at an arbitrary position in th...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [pastebin.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 44 ]
[ null ]
[ 57 ]
[ 90 ]
2024-11-19T02:46:08.603462+00:00
1,502,165,950,000
3a20ac0833a94845efbe7d13562cd21b53c4acb6
3
{ "blob_id": "3a20ac0833a94845efbe7d13562cd21b53c4acb6", "branch_name": "refs/heads/master", "committer_date": 1502165950000, "content_id": "1ca7d16a185f73da4e7d7f8b4124ec78ac5653e3", "detected_licenses": [ "MIT" ], "directory_id": "f364efa2e49e0e61ed7cf616718f8dca4cee7755", "extension": "py", "fi...
3.03125
stackv2
# -*- coding: utf-8 -*- """ Created on Fri Jul 28 23:31:15 2017 @author: jorge """ #%% libraries import pandas as pd import os import numpy as np import csv import sys import random from time import gmtime, strftime from os.path import expanduser import math #%% Clear terminal os.system('clear') #%% chance workdire...
243
27.61
132
17
2,048
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_e13b829801f3ada4_23b300ad", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text." ]
[ 242 ]
[ null ]
[ 16 ]
[ 24 ]
2024-11-19T02:46:15.931697+00:00
1,570,741,043,000
d64b4786a0365897efea4fc786e660fd8cc37613
3
{ "blob_id": "d64b4786a0365897efea4fc786e660fd8cc37613", "branch_name": "refs/heads/master", "committer_date": 1570741043000, "content_id": "5cbb154fe75381e600ae89bef2dd0fae7bb79bbb", "detected_licenses": [ "Apache-2.0" ], "directory_id": "13381dab28b63e11abf7f4fccb6c29a66476b117", "extension": "py"...
2.53125
stackv2
from flask import Flask, request, make_response, jsonify, abort, render_template from produce.fill_queue import publish_to_queue import os import logging logging.basicConfig(level=logging.DEBUG) app = Flask(__name__) app.debug = True @app.errorhandler(404) def not_found(error): return make_response(jsonify({'er...
41
27.88
80
13
268
python
[{"finding_id": "codeql_py/flask-debug_985889bb48f338a4_9392245b", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-117" ]
[ "py/flask-debug", "py/log-injection" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This log entry depends on a [user-provided value](1)." ]
[ 41, 19 ]
[ null, null ]
[ 5, 21 ]
[ 51, 28 ]
2024-11-19T02:59:14.326400+00:00
1,387,065,358,000
452fd13b8f625a2b84c8192ec64b0b6d2749bbdb
3
{ "blob_id": "452fd13b8f625a2b84c8192ec64b0b6d2749bbdb", "branch_name": "refs/heads/master", "committer_date": 1387065358000, "content_id": "bc0f2319b7edb3004e82d82b5ab6a524d0044c35", "detected_licenses": [ "MIT" ], "directory_id": "6c17fb8787b4bf3521795ae0c16e7fde6a7958d4", "extension": "py", "fi...
3.25
stackv2
# -*- coding: utf-8 -*- """ .. module:: tone_sorter :platform: Unix, Windows :synopsis: Takes a CSV file containing Hanzi and Pinyin phrases annotated with tones and sorts them in descending order. Phrases with more syllables gets sorted after phrases with fewer. A phrase ...
133
35.07
89
17
1,165
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_4fd9251e68f69fe1_a2bed20c", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [http://lingomi.com](1) may be at an arbitrary position...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [http://lingomi.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 57 ]
[ null ]
[ 12 ]
[ 53 ]
2024-11-19T02:59:26.512242+00:00
1,515,480,258,000
bab0f8daa82c60372fbc4959f1cb76b011089a35
3
{ "blob_id": "bab0f8daa82c60372fbc4959f1cb76b011089a35", "branch_name": "refs/heads/master", "committer_date": 1515480258000, "content_id": "4a5c35d8d3e5dd270c3bc791478064512968a479", "detected_licenses": [ "MIT" ], "directory_id": "c030117985d5ed1fed2a7b16d839a5cf8cb89313", "extension": "py", "fi...
2.515625
stackv2
# -*- coding:utf-8 -*- from pathlib import Path from datetime import date import logging import click from jinja2 import Environment, FileSystemLoader from git import Repo from .cli import act, ROOT Logger = logging.getLogger(__name__) BASIC_PATH = 'content' JINJA2_ENV = Environment( loader=FileSystemLoader(str(...
48
30.02
78
14
379
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_78bd04ba6d7aa102_ba756b44", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 14 ]
[ 16 ]
[ 14 ]
[ 2 ]
2024-11-19T02:59:46.371273+00:00
1,616,598,138,000
0009fc5f0cac704bdf618b0b3e070acd277c4254
3
{ "blob_id": "0009fc5f0cac704bdf618b0b3e070acd277c4254", "branch_name": "refs/heads/master", "committer_date": 1616598138000, "content_id": "e36c51c50460b267bf7a87352f68b74e9d07218d", "detected_licenses": [ "MIT" ], "directory_id": "af330a4fc9ee17f5249c428a89dcaafb50c5f8f0", "extension": "py", "fi...
2.578125
stackv2
""" Download the Dockerfile and dependency files to build locally or on device. https://docs.microsoft.com/en-us/azure/machine-learning/how-to-deploy-and-where#generate-a-dockerfile-and-dependencies """ from azureml.core import Workspace from azureml.core.model import Model from azureml.core.model import InferenceConf...
53
34.15
118
12
390
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3d9f2f07c531ecbd_d49e1883", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 38 ]
[ null ]
[ 24 ]
[ 36 ]
2024-11-19T02:59:53.623451+00:00
1,634,497,865,000
4abe3ff0e994d87f3c70fbacc4b623a301d8a385
2
{ "blob_id": "4abe3ff0e994d87f3c70fbacc4b623a301d8a385", "branch_name": "refs/heads/master", "committer_date": 1634497865000, "content_id": "59a6f5d44254ed20ada0b9f5241b0db6593eeb46", "detected_licenses": [ "MIT" ], "directory_id": "9ee5c351e72afafbcb2e85ab2180151789b27624", "extension": "py", "fi...
2.421875
stackv2
import requests import html from bs4 import BeautifulSoup from rest_framework.views import APIView from rest_framework.response import Response from rest_framework import authentication, permissions, status from pwa_store_backend.users.models import User import re manifest_regex = r"\/manifest.([^&]*)" class PwaInfoV...
52
32.71
102
16
364
python
[{"finding_id": "codeql_py/full-ssrf_8c9a15c773a5779b_2a5f1099", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
2
true
[ "CWE-918", "CWE-918" ]
[ "py/full-ssrf", "py/full-ssrf" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1).", "The full URL of this request depends on a [user-provided value](1)." ]
[ 20, 43 ]
[ null, null ]
[ 13, 17 ]
[ 41, 34 ]
2024-11-19T02:59:54.756555+00:00
1,629,833,584,000
21edd32fe5c069fd069dc713634ac6d639cc3fb0
4
{ "blob_id": "21edd32fe5c069fd069dc713634ac6d639cc3fb0", "branch_name": "refs/heads/master", "committer_date": 1629833584000, "content_id": "07d264cc2f132e43e4568e5c53f8689efeb294a2", "detected_licenses": [ "MIT" ], "directory_id": "e3a4b7b49706f555b7a38a6ea7da11f8b2d2422b", "extension": "py", "fi...
3.796875
stackv2
from copy import deepcopy class Address: def __init__(self, street, suite, city) -> None: self.street = street self.suite = suite self.city = city def __str__(self) -> str: return f'{self.street}, Suite #{self.suite}, {self.city}' class Employee: def __init__(self, name,...
54
25.37
76
11
335
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_77180803310389dd_038e8e6c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 53, 54 ]
[ null, null ]
[ 11, 11 ]
[ 15, 15 ]
2024-11-19T03:12:11.754300+00:00
1,572,160,904,000
670ee6a4f1087cc4b969758251510146b7618702
2
{ "blob_id": "670ee6a4f1087cc4b969758251510146b7618702", "branch_name": "refs/heads/master", "committer_date": 1572160904000, "content_id": "95d67be74eb932ff04c076fb28617a4792bfb309", "detected_licenses": [ "MIT" ], "directory_id": "ec666f536e7d15de253b64c5eb6228de74669962", "extension": "py", "fi...
2.40625
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- # @Time : 2019/9/19 19:29 # @Author : Lin Luo # @Site : # @File : login # @Software: PyCharm from flask import session from sqlalchemy import and_ from hashlib import sha256 from application import db from common.db_models.users import Users class Authorization...
44
23.91
109
23
270
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_e12bf3902a1205d2_d3bcaed4", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 26 ]
[ null ]
[ 71 ]
[ 95 ]
2024-11-19T03:12:12.880828+00:00
1,693,221,508,000
3e2680a627ac036bc086634a4e3e2abbcded2762
2
{ "blob_id": "3e2680a627ac036bc086634a4e3e2abbcded2762", "branch_name": "refs/heads/main", "committer_date": 1693221508000, "content_id": "445d80111fb1c358ef9c4d7ab1be457c7abd7063", "detected_licenses": [ "Apache-2.0" ], "directory_id": "35b6013c1943f37d1428afd2663c8aba0a02628d", "extension": "py", ...
2.375
stackv2
# Copyright 2022 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, s...
163
34.6
106
16
1,259
python
[{"finding_id": "codeql_py/flask-debug_bb5796bab5038d1d_9c4b2731", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-079", "CWE-117" ]
[ "py/flask-debug", "py/reflective-xss", "py/log-injection" ]
[ "HIGH", "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 163, 158, 127 ]
[ null, null, null ]
[ 5, 30, 24 ]
[ 53, 89, 69 ]
2024-11-19T03:12:13.691783+00:00
1,552,130,440,000
97c4913427d7ad91fbe20b30101977dbb05e9377
3
{ "blob_id": "97c4913427d7ad91fbe20b30101977dbb05e9377", "branch_name": "refs/heads/master", "committer_date": 1552130440000, "content_id": "b6ab215f2096df7894165cd024e21a244122ac11", "detected_licenses": [ "MIT" ], "directory_id": "8880c1d706b6ed565cd974c1b2155b033911c756", "extension": "py", "fi...
3.140625
stackv2
#!/usr/bin/env python3 import os import getpass import crypt from models.person import Person class Admin(Person): def __init__(self, name, surname): super().__init__(name, surname) def __str__(self): return super().__str__() + ":admin" def admin_menu(info): while True: ...
128
33.23
96
17
984
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_0c0a7b3b411bd8b2_1f9ae93f", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 122 ]
[ null ]
[ 20 ]
[ 60 ]
2024-11-19T03:12:17.491014+00:00
1,621,339,200,000
d5b50f9591308ac7627c8dfe67c5ca01a08f1b10
3
{ "blob_id": "d5b50f9591308ac7627c8dfe67c5ca01a08f1b10", "branch_name": "refs/heads/main", "committer_date": 1621339200000, "content_id": "0075780408e5fb0346ee917819c012a1cdc3aae4", "detected_licenses": [ "Apache-2.0" ], "directory_id": "6671be3a542925342379d5f6fc691acfebbe281f", "extension": "py", ...
2.609375
stackv2
import logging from typing import Dict from src.database import queries from src.exceptions.exceptions import UnrecognizedEventOperation def _get_user(message: Dict) -> Dict: return { 'id': message.get('user_id'), 'first_name': message.get('first_name'), 'last_name': message.get('last_nam...
49
28.24
64
17
305
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9f5e518682309833_bed08a7b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 37, 41, 45 ]
[ null, null, null ]
[ 26, 26, 26 ]
[ 61, 61, 61 ]
2024-11-19T03:24:56.110782+00:00
1,632,075,226,000
3b6e104830a0070781a6a4e7f5c3b339e344b18e
3
{ "blob_id": "3b6e104830a0070781a6a4e7f5c3b339e344b18e", "branch_name": "refs/heads/main", "committer_date": 1632075226000, "content_id": "26539e6b919dbac2b192db29ea2440c82bd1d620", "detected_licenses": [ "MIT" ], "directory_id": "d94d6ec19fffa86a4c595284275ac92c72dfa624", "extension": "py", "file...
2.625
stackv2
#!/usr/bin/env python # coding: utf-8 # In[ ]: import pandas as pd import nltk nltk.download('punkt') nltk.download('stopwords') nltk.download('averaged_perceptron_tagger') nltk.download('wordnet') import re import string import random from nltk.tokenize import WordPunctTokenizer from nltk.tag import pos_tag from nl...
142
24.58
98
13
1,024
python
[{"finding_id": "codeql_py/overly-large-range_eaf09facd2763463_a27f378e", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "remediatio...
4
true
[ "CWE-020", "CWE-020", "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range ...
[ 89, 89, 89, 89 ]
[ null, null, null, null ]
[ 30, 33, 36, 45 ]
[ 34, 37, 40, 49 ]
2024-11-19T03:35:08.896371+00:00
1,617,744,169,000
a5ab2b8a179efadea854201a42fbad3238ea2424
3
{ "blob_id": "a5ab2b8a179efadea854201a42fbad3238ea2424", "branch_name": "refs/heads/master", "committer_date": 1617744169000, "content_id": "5384e364a5339b478efe4aa60c214149538c4f87", "detected_licenses": [ "MIT" ], "directory_id": "024d6dd6fb7101a0544384a8029b71a3aaad44df", "extension": "py", "fi...
2.6875
stackv2
from flask import Flask, request, redirect from werkzeug.utils import secure_filename import os import json from face_util import compare_faces, face_rec, find_facial_features, find_face_locations import re import base64 app = Flask(__name__) UPLOAD_FOLDER = 'received_files' ALLOWED_EXTENSIONS = ['png', 'jpg', 'jpeg'...
149
37.3
122
19
1,293
python
[{"finding_id": "codeql_py/flask-debug_e0b684e3fd2d599f_fe1b2bc8", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
7
true
[ "CWE-215", "CWE-1333", "CWE-601", "CWE-601", "CWE-601", "CWE-601", "CWE-022" ]
[ "py/flask-debug", "py/polynomial-redos", "py/url-redirection", "py/url-redirection", "py/url-redirection", "py/url-redirection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings starting with '\\r\\n\\r\\n' and with many repetitions of '\\r\\n\\r\\na'.", "Untrusted URL redi...
[ 149, 36, 68, 73, 115, 122, 59 ]
[ null, null, null, null, null, null, null ]
[ null, 89, 33, 33, 29, 29, 23 ]
[ 49, 98, 44, 44, 40, 40, 27 ]
2024-11-19T01:26:44.857603+00:00
1,669,564,287,000
0bcf2afeb10ec107e2045c2c5c621af822029663
3
{ "blob_id": "0bcf2afeb10ec107e2045c2c5c621af822029663", "branch_name": "refs/heads/main", "committer_date": 1669564287000, "content_id": "80e3da9f324322c7378c69784fa6536939b0fbe5", "detected_licenses": [ "MIT" ], "directory_id": "cc6c123ffc1952c705e6a2e480dd30bf270fa088", "extension": "py", "file...
3.203125
stackv2
from typing import Tuple, Union, Dict, List import pandas as pd from pathlib import Path SALARY_COLUMNS = ['Annual Salary at Employment FTE', 'Annual Salary at Full FTE'] FY_COLUMN = 'Fiscal Year' SF_COLUMN = 'State Fund Ratio' UNIQUE_COLUMN = ['Name', 'year', 'uid'] def main(filename: str): ...
270
33.09
83
18
2,200
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_69f594281004dbbc_5556818f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 81 ]
[ null ]
[ 19 ]
[ 49 ]
2024-11-19T01:26:54.827293+00:00
1,595,517,319,000
707d525df29c4194db0cf24faf4ab3684faf777a
3
{ "blob_id": "707d525df29c4194db0cf24faf4ab3684faf777a", "branch_name": "refs/heads/master", "committer_date": 1595517319000, "content_id": "c6c225bc160b66445c2b960b01dc05f1b0c6923c", "detected_licenses": [ "MIT" ], "directory_id": "4128ed43ee0ab84500c160c47ef824394ab73a41", "extension": "py", "fi...
3.046875
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- # Copyright (c) 2020, Marcelo Lares # License: MIT # Full text: https://github.com/mlares/aegis/blob/master/LICENSE """AEGIS: Academic Exam Generator for Interchange and Shuffe. The purpose is to compose a collection of exams from a set of several versions of a number ...
353
31.11
79
20
2,414
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_0c6108076311f14c_aaa412b4", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 91 ]
[ 101 ]
[ 27 ]
[ 68 ]
2024-11-19T01:27:04.128643+00:00
1,612,128,478,000
d6661ca28af94fbbcf77ef273dbe65960c5d1aea
2
{ "blob_id": "d6661ca28af94fbbcf77ef273dbe65960c5d1aea", "branch_name": "refs/heads/main", "committer_date": 1612128478000, "content_id": "af3f113f8b5d2424f72268b0b175e47e6ac039c1", "detected_licenses": [ "MIT" ], "directory_id": "2b7e244e8cdf4d1125f1297174f9417168eaac1d", "extension": "py", "file...
2.328125
stackv2
from fastapi import FastAPI from fastapi.responses import HTMLResponse from yaml import dump, safe_load from jinja2 import Environment, FileSystemLoader, exceptions app = FastAPI() try: with open("app.yaml", "r") as stream: _data = safe_load(stream) except yaml.YAMLError as exc: print(exc) file_loade...
62
25.1
65
13
377
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_65f4692c53f56f5b_93e975b9", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 15 ]
[ null ]
[ 7 ]
[ 38 ]
2024-11-19T01:37:38.984482+00:00
1,615,452,799,000
52955a36cf2ba0bf09e7a31e63d323832a03b92c
3
{ "blob_id": "52955a36cf2ba0bf09e7a31e63d323832a03b92c", "branch_name": "refs/heads/master", "committer_date": 1615452799000, "content_id": "cc3cee208f8d045be7d96ddd071142f994b70be1", "detected_licenses": [ "MIT" ], "directory_id": "d96e3c41a884e8a067f597075c2737b0b9519e43", "extension": "py", "fi...
3.171875
stackv2
#coding: utf-8 ''' 提取12306网站内对应站台名称 使用: python get_station_name.py > station.py ''' import re import requests from pprint import pprint url = 'https://kyfw.12306.cn/otn/resources/js/framework/station_name.js?station_version=1.9081' #发送get请求,不判断证书 response = requests.get(url, verify=False) #使用正则表达式提取所有站点 汉...
25
23.12
95
10
234
python
[{"finding_id": "codeql_py/request-without-cert-validation_e0966f707cea7a09_38536cf6", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 14 ]
[ null ]
[ 12 ]
[ 43 ]
2024-11-19T01:37:39.553186+00:00
1,557,995,648,000
64054d0e52d939667f2dc090c146d45b871a958b
2
{ "blob_id": "64054d0e52d939667f2dc090c146d45b871a958b", "branch_name": "refs/heads/master", "committer_date": 1557995648000, "content_id": "164640ea5e3a6e7e9321014d253f1b5885e8159a", "detected_licenses": [ "Apache-2.0" ], "directory_id": "523fb59f4e08cca7ae2771c84bb40ec0a7b2e66e", "extension": "py"...
2.328125
stackv2
from __future__ import print_function from bottle import post, run, request from urllib2 import HTTPError import json import os import time import inferFCN as infer # -- The following variables should be correctly initialized before starting the service! -- # paths to the model's file and prototxt modelFile = '/home...
127
35.31
129
18
1,115
python
[{"finding_id": "codeql_py/reflective-xss_b41580b427dacdf9_169b7a98", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
2
true
[ "CWE-079", "CWE-022" ]
[ "py/reflective-xss", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 125, 69 ]
[ null, null ]
[ 12, 41 ]
[ 58, 49 ]
2024-11-19T01:37:53.293722+00:00
1,612,626,156,000
937142e400ea25d9293e64ec797b8e9dedc3b142
2
{ "blob_id": "937142e400ea25d9293e64ec797b8e9dedc3b142", "branch_name": "refs/heads/master", "committer_date": 1612626156000, "content_id": "2cec1bc1988846c4d484b22e35f130a45139a1f3", "detected_licenses": [ "MIT" ], "directory_id": "4f674ae175b633fc5b1c5614344fe1ab114c1752", "extension": "py", "fi...
2.453125
stackv2
import flask from flask import request, jsonify import json import joblib import re import requests from pprint import pprint from datetime import datetime import matplotlib.pyplot as plt import seaborn as sns import tensorflow as tf import numpy as np from sklearn.metrics.pairwise import cosine_similarity from tensorf...
200
32.2
105
21
1,595
python
[{"finding_id": "codeql_py/polynomial-redos_11693592bf7cfe0a_4a2cb212", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings startin...
1
true
[ "CWE-1333" ]
[ "py/polynomial-redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings starting with '<' and with many repetitions of '</'." ]
[ 72 ]
[ null ]
[ 34 ]
[ 38 ]
2024-11-19T01:37:54.417805+00:00
1,512,601,831,000
8bf43b6efa9a1f2cdefe0e5bd9a5a9c80ec9d8d5
3
{ "blob_id": "8bf43b6efa9a1f2cdefe0e5bd9a5a9c80ec9d8d5", "branch_name": "refs/heads/master", "committer_date": 1512601831000, "content_id": "cb7e4c5e2abab40247db24ad09abe78a609d764a", "detected_licenses": [ "MIT" ], "directory_id": "b7d8f79073a360378bbd2857d639e921d31ec1d2", "extension": "py", "fi...
3.015625
stackv2
from flask import Flask, jsonify from redis import Redis app = Flask(__name__) redis = Redis(host='redis', port=6379, decode_responses=True) # click count stored in redis db @app.route('/') def hello(): count = redis.incr('hits') return 'Hello World! I have been seen {} times.\n'.format(count) # return txt ...
34
22.21
68
10
220
python
[{"finding_id": "codeql_py/flask-debug_1f7a1556b411cb64_1036af55", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability due to a [user-provided value](2)." ]
[ 34, 24 ]
[ null, null ]
[ 5, 13 ]
[ 40, 60 ]
2024-11-19T01:37:54.768397+00:00
1,543,748,079,000
c7cbe35abdd439e9d0f984e59ab0225c6fa037ce
3
{ "blob_id": "c7cbe35abdd439e9d0f984e59ab0225c6fa037ce", "branch_name": "refs/heads/master", "committer_date": 1543748079000, "content_id": "85137e33a4efc7801dfb8c768db78aebdd9f56fa", "detected_licenses": [ "MIT" ], "directory_id": "fd0bbe26f70fee6c5fe5519463d400c20345f947", "extension": "py", "fi...
2.875
stackv2
# coding:utf-8 """ Baidu Transelation """ import random import json from hashlib import md5 import requests def transelate(text,from_='zh',to_='en'): appid = '20160712000025083' secretKey = 'qHmm1FXf_rp8rhR7O6jh' url = 'https://fanyi-api.baidu.com/api/trans/vip/translate' q = text from_la...
48
21.29
73
17
327
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_f7c1a331ff6ae455_a0640e76", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 24 ]
[ null ]
[ 15 ]
[ 19 ]
2024-11-19T01:38:05.028773+00:00
1,518,376,715,000
199f5d03f838c6d6875184cb1634ee1945b9698b
2
{ "blob_id": "199f5d03f838c6d6875184cb1634ee1945b9698b", "branch_name": "refs/heads/master", "committer_date": 1518376715000, "content_id": "3ca71de77601ccc27e6b08d76ccb1262b46e582c", "detected_licenses": [ "MIT" ], "directory_id": "546b248c3f124d27b2e9a138561515b00005d283", "extension": "py", "fi...
2.40625
stackv2
from Crypto.PublicKey import RSA from Crypto import Random import base64 from Crypto.Hash import SHA256 def instantwallet(): new_key = RSA.generate(1024, Random.new().read) public_key = new_key.publickey().exportKey("PEM") private_key = new_key.exportKey("PEM") keys = [] wallet_id = SHA256.new(pub...
32
22.19
66
11
211
python
[{"finding_id": "codeql_py/weak-crypto-key_dc4d825b9ed5b3c1_3edf6bd2", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",...
1
true
[ "CWE-326" ]
[ "py/weak-crypto-key" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable." ]
[ 8 ]
[ null ]
[ 15 ]
[ 52 ]
2024-11-19T01:38:47.332050+00:00
1,637,477,487,000
b54209ad5c53a70e2db55ab261b28b5c72af5e8a
3
{ "blob_id": "b54209ad5c53a70e2db55ab261b28b5c72af5e8a", "branch_name": "refs/heads/main", "committer_date": 1637477487000, "content_id": "e3093ebd5b3088945173f624b5dcb827714bdeb1", "detected_licenses": [ "MIT" ], "directory_id": "5292b03998384c0d2bb5858058892d7e45c5365b", "extension": "py", "file...
2.796875
stackv2
#!/usr/bin/env python3 from os import getenv from Crypto.Cipher import AES BLOCK_SIZE = 16 FLAG = getenv("FLAG") KEY = getenv("KEY") padding = lambda msg: msg + "0" * (BLOCK_SIZE - len(msg) % BLOCK_SIZE) encrypt = lambda plain: AES.new(KEY, AES.MODE_ECB).encrypt(plain).hex() print("[SUPPORT] Password Reset") accoun...
23
19.61
71
12
126
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_92b4650726a43086_702caee4", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
1
true
[ "CWE-327" ]
[ "py/weak-cryptographic-algorithm" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 11 ]
[ null ]
[ 25 ]
[ 66 ]
2024-11-19T01:38:47.695136+00:00
1,606,413,117,000
dcca5ab196166d5dc1c11dc7ec4d4eae086e3535
2
{ "blob_id": "dcca5ab196166d5dc1c11dc7ec4d4eae086e3535", "branch_name": "refs/heads/master", "committer_date": 1606413117000, "content_id": "83e636211a40c52f7aff210b9fc26b9ca0e7e180", "detected_licenses": [ "MIT" ], "directory_id": "321dbc32e11315099cad71508896384882ec4c56", "extension": "py", "fi...
2.359375
stackv2
import time import json import hmac import base64 import urllib3 import requests from pprint import pprint from abc import ABCMeta # NOTE: If we remove the `verify=False` parameter from the `requests.request()` # function, we are getting an error when working with a specific wallet # requester (TODO: Verify which on...
127
25.46
79
17
740
python
[{"finding_id": "codeql_py/request-without-cert-validation_21423040c3881f19_9caa84ef", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 52 ]
[ 57 ]
[ 16 ]
[ 10 ]
2024-11-19T01:52:09.838248+00:00
1,537,130,167,000
d290edb499d221ce33887e8dc3126a95f8901829
3
{ "blob_id": "d290edb499d221ce33887e8dc3126a95f8901829", "branch_name": "refs/heads/master", "committer_date": 1537130167000, "content_id": "a5ac2936435d56f6ee85935cc90bd2db1b292e37", "detected_licenses": [ "MIT" ], "directory_id": "b9316a97a3a85d59ffa55f2252372bb4315f57e1", "extension": "py", "fi...
2.828125
stackv2
# -*- coding: utf-8 -*- """ This file contains utility functions for use in the Pyramid view handling """ import hashlib from os.path import exists import datetime def error_dict(error_type='generic_errors', errors=''): """ Create a basic error dictionary for standard use with the intent of being passed to s...
60
32.2
118
11
446
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_4d67563891f53273_0b7577ef", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 42 ]
[ null ]
[ 14 ]
[ 38 ]
2024-11-19T01:52:14.204496+00:00
1,524,775,341,000
a594499f44f5e8572e438fc833b392afa6b69e7d
3
{ "blob_id": "a594499f44f5e8572e438fc833b392afa6b69e7d", "branch_name": "refs/heads/master", "committer_date": 1524775341000, "content_id": "eb136bfc7a112bf2499052a0601746e6a7924c23", "detected_licenses": [ "Apache-2.0" ], "directory_id": "f581fecab505a86118c55bc73946b621430ebdb8", "extension": "py"...
2.6875
stackv2
""" Module that implements SSH client. """ import socket from contextlib import contextmanager from paramiko import SSHClient, AutoAddPolicy, AuthenticationException, \ SSHException from twindb_backup import LOG from twindb_backup.ssh.exceptions import SshClientException class SshClient(object): """ SSH...
196
32.22
77
22
1,282
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_d96f40d7ea4a7db4_e6057d9d", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 47 ]
[ null ]
[ 9 ]
[ 59 ]
2024-11-19T01:52:22.717304+00:00
1,618,248,988,000
e8a1c7622106045fc09c45ba30981de17f9b5626
2
{ "blob_id": "e8a1c7622106045fc09c45ba30981de17f9b5626", "branch_name": "refs/heads/main", "committer_date": 1618248988000, "content_id": "4628b1b2f4900969a14664d0e91fe014c9c6f965", "detected_licenses": [ "MIT" ], "directory_id": "54e8192b80b3c60f5d060ff45fbfb7b8858e46a3", "extension": "py", "file...
2.390625
stackv2
from flask import Flask, render_template, request, session, redirect, Markup, jsonify from sqlalchemy import create_engine from sqlalchemy.orm import scoped_session, sessionmaker import requests from xml.etree import ElementTree app = Flask(__name__ ,template_folder='template') app.secret_key = 'key' app.config["SE...
219
28.22
115
17
1,500
python
[{"finding_id": "codeql_py/xml-bomb_b94c6411ec117293_6e4fa89e", "tool_name": "codeql", "rule_id": "py/xml-bomb", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "XML parsing depends on a [user-provided value](1) without guarding against uncontrolled entity expansion.", "remediatio...
4
true
[ "CWE-776", "CWE-776", "CWE-918", "CWE-918" ]
[ "py/xml-bomb", "py/xml-bomb", "py/partial-ssrf", "py/partial-ssrf" ]
[ "HIGH", "HIGH", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "XML parsing depends on a [user-provided value](1) without guarding against uncontrolled entity expansion.", "XML parsing depends on a [user-provided value](1) without guarding against uncontrolled entity expansion.", "Part of the URL of this request depends on a [user-provided value](1).", "Part of the URL o...
[ 127, 157, 126, 156 ]
[ null, null, null, null ]
[ 35, 35, 11, 11 ]
[ 46, 46, 28, 28 ]
2024-11-19T01:52:24.318677+00:00
1,537,379,067,000
c8b995ff639e58d9fa7f6bcffab6cc53db47cfb1
3
{ "blob_id": "c8b995ff639e58d9fa7f6bcffab6cc53db47cfb1", "branch_name": "refs/heads/master", "committer_date": 1537379067000, "content_id": "e73ae322e7334d0df3215b3818c63c50c6770dbf", "detected_licenses": [ "Apache-2.0" ], "directory_id": "22df28c0c47d856cf751a106607ac8ca98679e93", "extension": "py"...
2.71875
stackv2
#!/usr/bin/env python3 # author: @netmanchris """ Copyright 2015 Hewlett Packard Enterprise Development LP Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/lic...
133
38.83
119
15
1,282
python
[{"finding_id": "codeql_py/request-without-cert-validation_2d706ca5c9f2e515_2b134a4c", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 65, 98 ]
[ null, null ]
[ 17, 13 ]
[ 78, 74 ]
2024-11-19T01:52:27.175773+00:00
1,600,352,318,000
6bb0b06d58fa8fb33b3193243651a82ce2d72cab
3
{ "blob_id": "6bb0b06d58fa8fb33b3193243651a82ce2d72cab", "branch_name": "refs/heads/master", "committer_date": 1600352318000, "content_id": "57cba3eddab698b155f64dc56f53501286729cdb", "detected_licenses": [ "Unlicense" ], "directory_id": "e9bdeadeb5e5dfe7078b0a4bbd4c80cb33e6bf81", "extension": "py",...
2.71875
stackv2
# -*- coding: utf-8 -*- import requests import codecs import os import jinja2 import base64 dirname = os.path.dirname(__file__) # Open LaTeX template file. latex_template_path = os.path.join(dirname, "template.tex") with codecs.open(latex_template_path, "r", "utf-8") as f: latex_template = f.read() # Jinja2 t...
130
25.9
87
16
890
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_9d39343d08408b40_72488d81", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 20 ]
[ 32 ]
[ 13 ]
[ 2 ]
2024-11-19T02:04:20.413119+00:00
1,561,410,866,000
579e11a2192a17adefdc3e0f7792c0c67fcc0931
3
{ "blob_id": "579e11a2192a17adefdc3e0f7792c0c67fcc0931", "branch_name": "refs/heads/master", "committer_date": 1561410866000, "content_id": "893545943fae7a3a59b03942c88e11b9758a5682", "detected_licenses": [ "Apache-2.0" ], "directory_id": "5f1a2083fd30149ee9a4db638229e229b9b07fae", "extension": "py"...
2.65625
stackv2
# Copyright 2018 Flight Lab authors. # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # https://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in w...
97
31.65
80
15
708
python
[{"finding_id": "codeql_py/insecure-temporary-file_3365ff0b40bf4dde_a7677eaa", "tool_name": "codeql", "rule_id": "py/insecure-temporary-file", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated function tempfile.mktemp may be insecure.", "remediation": "", "location": ...
2
true
[ "CWE-377", "CWE-079" ]
[ "py/insecure-temporary-file", "py/jinja2/autoescape-false" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Call to deprecated function tempfile.mktemp may be insecure.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 40, 90 ]
[ null, null ]
[ 24, 18 ]
[ 55, 43 ]
2024-11-19T02:04:48.859739+00:00
1,557,760,034,000
707dfc9311f8907b141fd94d7e09eda840e4a4d0
3
{ "blob_id": "707dfc9311f8907b141fd94d7e09eda840e4a4d0", "branch_name": "refs/heads/master", "committer_date": 1557760034000, "content_id": "6cd99c68e836b6abefca43d547feb3b075a3c116", "detected_licenses": [ "MIT" ], "directory_id": "cfe4e1c14efb5984107be31ebd9084ca5ff78717", "extension": "py", "fi...
3.015625
stackv2
""" IMDB Text Classification AutoKeras May 2019 Vocab from [Stanford](http://ai.stanford.edu/~amaas/data/sentiment/) Preprocessed data from [Keras](https://keras.io/datasets/) """ import os import re import urllib import zipfile import tarfile import numpy as np import pandas as pd import tensorflow as tf from kera...
101
29.98
114
15
853
python
[{"finding_id": "codeql_py/tarslip_1f1cffbe6a9bcf1d_7371f19d", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 54 ]
[ null ]
[ 13 ]
[ 16 ]
2024-11-19T02:04:57.912644+00:00
1,632,155,768,000
a02b1e5449a2364f60d949afec71773aab5f01db
3
{ "blob_id": "a02b1e5449a2364f60d949afec71773aab5f01db", "branch_name": "refs/heads/main", "committer_date": 1632155768000, "content_id": "12a43e3ed2ab2ec5316ccea0bb06fa299a21f2bb", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "a3412a9c6fda7478bd2005935718d21b05b0dd01", "extension": "py"...
2.6875
stackv2
from flask import Flask,request,jsonify import requests from bs4 import BeautifulSoup app = Flask(__name__) star_ratings = [[0,1399,1],[1400,1599,2],[1600,1799,3],[1800,1999,4],[2000,2199,5],[2200,2499,6],[2500,3000,7]] def codechef(username): global star_ratings url = "https://codechef.com/users/{}".format(u...
79
20.49
111
17
544
python
[{"finding_id": "codeql_py/partial-ssrf_535d1eadbb03b9f8_34e43f38", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 14 ]
[ null ]
[ 9 ]
[ 27 ]
2024-11-19T02:28:03.740094+00:00
1,445,445,696,000
a4b91ee75b4b8b7ab8d6ba5ea06438ac501308ac
2
{ "blob_id": "a4b91ee75b4b8b7ab8d6ba5ea06438ac501308ac", "branch_name": "refs/heads/master", "committer_date": 1445445696000, "content_id": "334139ffa7d1b350904940504f9b794f77467634", "detected_licenses": [ "MIT" ], "directory_id": "03b4289c407cf7b2b7e8c2ef59307c1d67fae089", "extension": "py", "fi...
2.328125
stackv2
# coding: utf-8 from django.shortcuts import render, get_object_or_404 from django.utils import timezone # Create your views here. from django.http import HttpResponse from django.views.generic.list import ListView # import the add note form from note.forms import AddForm, NoteForm, NOTETYPE_PRIVATE, NOTETYPE_PUBLI...
221
32.46
99
21
1,765
python
[{"finding_id": "codeql_py/stack-trace-exposure_d10193e59b5c8220_9704f3e7", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 190 ]
[ null ]
[ 37 ]
[ 99 ]
2024-11-19T02:28:07.657591+00:00
1,590,880,377,000
692319aafa0e7097cb76198c28735312ba125660
3
{ "blob_id": "692319aafa0e7097cb76198c28735312ba125660", "branch_name": "refs/heads/master", "committer_date": 1590880377000, "content_id": "d97d48a5ff28f4a71a33d6b5b4f499d53ca07549", "detected_licenses": [ "MIT" ], "directory_id": "26cf4c7bf8c54339f30c38295a88fac175a552cc", "extension": "py", "fi...
2.765625
stackv2
import webapp2 import jinja2 import os import logging from google.appengine.ext import db from google.appengine.api import memcache jinja_environment = jinja2.Environment( loader=jinja2.FileSystemLoader(os.path.dirname(__file__))) KEY_BASE = "0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ-_" BASE ...
100
31
87
17
715
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_6b641d19ff791941_4c572d5c", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 8 ]
[ 9 ]
[ 21 ]
[ 63 ]
2024-11-19T02:28:19.285241+00:00
1,484,555,227,000
221d04edc11e325e050730c9a45a8ae6c7dc5a82
3
{ "blob_id": "221d04edc11e325e050730c9a45a8ae6c7dc5a82", "branch_name": "refs/heads/master", "committer_date": 1484555227000, "content_id": "b763a82f5aa8f0cc86e795924cd851d709dd674f", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "dd897f1cc598e0c9d7a3c7341fff13bd6fc46d64", "extension": "p...
2.671875
stackv2
# -*- coding: utf-8 -*- import os import tarfile from importlib.util import find_spec from abc import ABCMeta, abstractmethod from tempfile import mkstemp __version__ = "0.0" class IFetcher(metaclass=ABCMeta): def __init__(self, src_container, src_path, dest_path, buffer_len): self.srcContainer = src_co...
171
39.64
146
18
1,400
python
[{"finding_id": "codeql_py/tarslip_0a460625685ddfd5_8a5245c9", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 36 ]
[ null ]
[ 17 ]
[ 18 ]
2024-11-19T02:28:42.425142+00:00
1,687,809,092,000
74d8b60fd08a2a890781427550469b627259cc7e
3
{ "blob_id": "74d8b60fd08a2a890781427550469b627259cc7e", "branch_name": "refs/heads/main", "committer_date": 1687809092000, "content_id": "4cddf9b2b26f7425c5d1d075d86106c2abf026e3", "detected_licenses": [ "MIT" ], "directory_id": "077beb02d73045eb97261a1c5e7021bfe709e55c", "extension": "py", "file...
2.5625
stackv2
import os import sys from do_signin import do_signin parent_path = os.path.dirname( os.path.dirname( os.path.abspath(__file__) ) ) # isort: split if parent_path not in sys.path: sys.path.append(parent_path) from pyonepassword.api.exceptions import ( # noqa: E402 OPItemGetException, OPSig...
44
27.98
84
13
325
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bf0cefa105423c18_8df59657", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 32, 40 ]
[ null, null ]
[ 15, 15 ]
[ 28, 28 ]
2024-11-19T02:36:52.318388+00:00
1,585,992,867,000
e539610413b88281324d4c31632f2ee4d8c6dc33
2
{ "blob_id": "e539610413b88281324d4c31632f2ee4d8c6dc33", "branch_name": "refs/heads/master", "committer_date": 1585992867000, "content_id": "57e630a460ea929cdda035eb5519421717d0d778", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "70ed9058ba87710748c6d6b244c32b2d6fb0fe57", "extension": "p...
2.359375
stackv2
from django.db import models import datetime import random import hashlib class LastFmUser(models.Model): """ Represents a user from that great site, last.fm. """ # As seen on last.fm username = models.CharField(max_length=255, unique=True) # Null if no update wanted, else used to pr...
159
30.71
123
15
1,098
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_27a988ae62b7f8e3_1c43c00d", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.", "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally e...
[ 152, 155 ]
[ null, null ]
[ 34, 42 ]
[ 54, 62 ]
2024-11-19T02:36:54.261494+00:00
1,486,591,293,000
92263c3bb22a5d5f251e36915840ed2da48b5809
2
{ "blob_id": "92263c3bb22a5d5f251e36915840ed2da48b5809", "branch_name": "refs/heads/master", "committer_date": 1486591293000, "content_id": "04a407418e56909b6d029114d30d5d212ab758d5", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "d326efadbb397f9332a62aa12aad53c1aae184fc", "extension": "p...
2.484375
stackv2
import sys from tumblpy import Tumblpy key = raw_input('App Consumer Key: ') secret = raw_input('App Consumer Secret: ') if not 'skip-auth' in sys.argv: t = Tumblpy(key, secret) callback_url = raw_input('Callback URL: ') auth_props = t.get_authentication_tokens(callback_url=callback_url) auth_url =...
47
30.77
106
10
365
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_52159431313906c0_a2b0c1dc", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text." ]
[ 30, 31 ]
[ null, null ]
[ 11, 11 ]
[ 54, 68 ]
2024-11-19T02:36:59.294244+00:00
1,601,102,765,000
a42a077bfea016862141b1f1c9ac7ff9082ccce4
2
{ "blob_id": "a42a077bfea016862141b1f1c9ac7ff9082ccce4", "branch_name": "refs/heads/master", "committer_date": 1601102765000, "content_id": "88db7b735b5b8511971575832a9685f26b1c40e8", "detected_licenses": [ "MIT" ], "directory_id": "812cb375bbdc4b6cc676579c587e2fe3354dd2dd", "extension": "py", "fi...
2.4375
stackv2
from flask import Flask import fastbook fastbook.setup_book() #hide from fastbook import * from fastai.vision.all import * from utils import * from downloadFromGoogleDrive import GoogleDriveDownloader from flask import request, redirect, render_template import os, sys app = Flask(__name__) GOOGLE_DRIVE_MODEL_FILE_...
61
28.57
101
14
450
python
[{"finding_id": "codeql_py/path-injection_5500832419228caa_66f0050e", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 39 ]
[ null ]
[ 20 ]
[ 28 ]
2024-11-19T02:37:09.961322+00:00
1,504,674,294,000
a90f02ed9d5ce18b4963602bbe4628c9562ae5d4
2
{ "blob_id": "a90f02ed9d5ce18b4963602bbe4628c9562ae5d4", "branch_name": "refs/heads/master", "committer_date": 1504674294000, "content_id": "cc36be2d20d1eaa24bb86a7882d436ecd82a3f6d", "detected_licenses": [ "Apache-2.0" ], "directory_id": "af992648b5ee5a8d05ad3b0189bba55485d398a3", "extension": "py"...
2.484375
stackv2
# -*- coding: utf-8 -*- import paramiko import socket import os import pysftp import logging # 控制paramiko日志级别,调试的时候建议改成DEBUG级别 logging.getLogger("paramiko").setLevel(level=logging.INFO) ''' Function Name: paramikoAPI Author: jagerzhang Description: remote command and file transfer API Base on paramiko and sftp Date: ...
209
34.14
142
28
1,415
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_f46a9a2a5f7aab90_c22094f5", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 23 ]
[ null ]
[ 9 ]
[ 69 ]
2024-11-19T02:37:11.499452+00:00
1,611,762,228,000
cbf99c896ed9783e39d409a0973dc5a5d21a94f3
2
{ "blob_id": "cbf99c896ed9783e39d409a0973dc5a5d21a94f3", "branch_name": "refs/heads/main", "committer_date": 1611762236000, "content_id": "c3cfba485c3df49466ed7251e1f27123ab79d38d", "detected_licenses": [ "MIT" ], "directory_id": "031b3b901964c33ac65471bcb7584571eb82436d", "extension": "py", "file...
2.5
stackv2
# !/usr/bin/python # -*- coding: utf-8 -*- # @Time : 2020/9/18 12:02 # @Author : WardenAllen # @File : pluto_ssh.py # @Brief : import paramiko from io import StringIO class PlutoSSH : # paramiko's SSHClient() object. __ssh = object def __init__(self): self.__ssh = paramiko.SSHClient() ...
36
32.67
82
13
330
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_109e2e446acd5bca_da9d8c32", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/paramiko-missing-host-key-validation", "py/paramiko-missing-host-key-validation" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe.", "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 18, 30 ]
[ null, null ]
[ 9, 9 ]
[ 73, 73 ]
2024-11-19T02:37:14.394554+00:00
1,620,188,745,000
6e3a4853912776ed5e2a0495af84f0c6f8cd0a77
3
{ "blob_id": "6e3a4853912776ed5e2a0495af84f0c6f8cd0a77", "branch_name": "refs/heads/main", "committer_date": 1620188745000, "content_id": "179f95d2d7445c6bcaf4c962d8573fbf507a367a", "detected_licenses": [ "MIT" ], "directory_id": "28b4fd2381865b6b9e4da4d2f6c3b5a4f154e943", "extension": "py", "file...
2.71875
stackv2
import json from flask import Flask, request, Response from emotion_analysis import analyze_emotion from polarity_analysis import analyze_polarity from flask_cors import CORS, cross_origin app = Flask(__name__) cors = CORS(app) app.config["CORS_HEADERS"] = "Content-Type" @app.route("/api/emotions", methods=["POST"]) @...
35
28.43
58
14
244
python
[{"finding_id": "codeql_py/stack-trace-exposure_bd61879d3a851952_c2538de9", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 31 ]
[ null ]
[ 13 ]
[ 38 ]
2024-11-19T02:37:43.066443+00:00
1,653,138,333,000
1750e20c9600ae757cdcf7f20f98bbfc2bccc969
3
{ "blob_id": "1750e20c9600ae757cdcf7f20f98bbfc2bccc969", "branch_name": "refs/heads/master", "committer_date": 1653138333000, "content_id": "55e873e19504aac546ecce53440cbeaaffe1ecaf", "detected_licenses": [ "MIT" ], "directory_id": "c8645c4b185097c369070ebc6a476a1a336c0eaa", "extension": "py", "fi...
2.578125
stackv2
import requests import pathlib import sys import os import urllib3 base_url = "https://www.mpba.mp.br/sites/default/files/biblioteca/portal-transparencia/contracheque/" cod_meses = { "01": "", "02": "_0", "03": "_1", "04": "_2", "05": "_3", "06": "_4", "07": "_5", "08": "_6", "09": ...
112
26.49
101
20
755
python
[{"finding_id": "codeql_py/request-without-cert-validation_d2307421611b940a_739bf498", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 74 ]
[ null ]
[ 20 ]
[ 73 ]
2024-11-19T02:37:43.453801+00:00
1,594,231,035,000
2d6b5656c084409f8d2447277e21670151a16911
3
{ "blob_id": "2d6b5656c084409f8d2447277e21670151a16911", "branch_name": "refs/heads/master", "committer_date": 1594231035000, "content_id": "2598d129baad152182ae4fd5c8f67e707b2739bb", "detected_licenses": [ "MIT" ], "directory_id": "d0c8f370fa1b588137d4bbc163c3a74bb8f7974c", "extension": "py", "fi...
2.859375
stackv2
import requests, ctypes, datetime, sys from random import randint SPI_SETDESKWALLPAPER = 20 #note: save your backgrounds in this folder, named [weather]x.jpg x being number of rand range. BACKGROUND_PATH = r'C:\Users\Katherine\Documents\_Python Projects\Set_Background\\' API_KEY = #Your API Key Here API_ADDRESS='htt...
41
32.44
116
16
371
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_304eb33bea8ca676_b9fb0445", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 37 ]
[ null ]
[ 11 ]
[ 22 ]
2024-11-19T02:37:46.442220+00:00
1,509,906,453,000
898d3df2ac9a7b65e6e00505cdd6cd62bf25556a
2
{ "blob_id": "898d3df2ac9a7b65e6e00505cdd6cd62bf25556a", "branch_name": "refs/heads/master", "committer_date": 1509906453000, "content_id": "d5d81b910191237902187201df916e0935243f47", "detected_licenses": [ "MIT" ], "directory_id": "b9d7956c49af807daa5a8841df141675c39073e7", "extension": "py", "fi...
2.4375
stackv2
import re import httplib import urllib2 import urllib from urlparse import urlparse from bs4 import BeautifulSoup from collections import deque import webbrowser import socket import requests import hashlib import logging logging.captureWarnings(True) from whoosh.index import create_in from whoosh.fields import * impor...
65
27.97
114
15
494
python
[{"finding_id": "codeql_py/request-without-cert-validation_2b7c453f8cc70ac6_4e7e8c6c", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 36 ]
[ null ]
[ 14 ]
[ 58 ]
2024-11-19T02:49:16.985033+00:00
1,514,541,511,000
76d12cde13f46b73b3ba4a8310fade81bdd0a2ff
2
{ "blob_id": "76d12cde13f46b73b3ba4a8310fade81bdd0a2ff", "branch_name": "refs/heads/master", "committer_date": 1514541511000, "content_id": "76da77ef5e1e07c0b3a9466a1552c630de68ad21", "detected_licenses": [ "MIT" ], "directory_id": "61aefba322ecc140b6e80737a32c86c7ddb825ff", "extension": "py", "fi...
2.328125
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- ''' Inspired by: https://www.digitalocean.com/community/tutorials/how-to-set-up-an-openvpn-server-on-ubuntu-16-04 Inspired by: https://blog.remibergsma.com/2013/02/27/improving-openvpn-security-by-revoking-unneeded-certificates/ This script will: - generate and register ...
146
31.34
114
15
1,122
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_9bde5948e328a9eb_79a55992", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 48 ]
[ null ]
[ 20 ]
[ 50 ]
2024-11-19T02:49:18.488658+00:00
1,634,550,691,000
0ee054bab57dbcaaf71b8df3ec67e9a403604dd6
3
{ "blob_id": "0ee054bab57dbcaaf71b8df3ec67e9a403604dd6", "branch_name": "refs/heads/master", "committer_date": 1634550691000, "content_id": "f31fb223a731161fed181ecc0db7692da3054cde", "detected_licenses": [ "MIT" ], "directory_id": "9d1ecbe43ce68d6c72c4c1bdeda0d32f4768e916", "extension": "py", "fi...
2.875
stackv2
# -*- coding: utf-8 -*- # 上传代码 import requests import hmac import hashlib import json import time import os class JFile: def __init__(self, app_token, app_key, url): self.url = url self.app_token = app_token self.app_key = app_key self.session = requests.Session() @staticmet...
231
35.69
120
17
2,094
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_cd107f907555f7f3_13ed1d79", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e...
[ 99, 161 ]
[ null, null ]
[ 59, 59 ]
[ 84, 84 ]
2024-11-19T02:49:19.891472+00:00
1,471,543,369,000
51060ebd4daee02e489c411f82ebad74f55a76a5
3
{ "blob_id": "51060ebd4daee02e489c411f82ebad74f55a76a5", "branch_name": "refs/heads/master", "committer_date": 1471543369000, "content_id": "20e4452a8e8d72a53fc546306ab2f47b4a6031ec", "detected_licenses": [ "MIT" ], "directory_id": "66b348706641bf6c0fdc24bdb6a3f024194b5c5e", "extension": "py", "fi...
2.78125
stackv2
""" Secret rendering """ import os from jinja2 import Template from aomi.helpers import problems def template(client, src, dest, vault_path): """Writes a template using variables from a vault path""" template_src = Template(open(os.path.abspath(src), 'r').read()) secrets = client.read(vault_path) if n...
75
34.53
75
18
639
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_b1a171f96a57fbea_3c668080", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ...
5
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-079" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/jinja2/autoescape-false" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.", "Using jinja2 templates with autoe...
[ 35, 52, 54, 62, 9 ]
[ null, null, null, null, null ]
[ 52, 19, 23, 15, 20 ]
[ 58, 50, 45, 75, 68 ]
2024-11-19T03:00:14.113693+00:00
1,594,897,435,000
f3f032f7809e0cf417c616a89bfea8d32e753880
3
{ "blob_id": "f3f032f7809e0cf417c616a89bfea8d32e753880", "branch_name": "refs/heads/master", "committer_date": 1594897435000, "content_id": "4457e9ae9dbd8c03f149c3c5e2238e151da92706", "detected_licenses": [ "Apache-2.0" ], "directory_id": "6e19bd92cff11242dc5af87b491471e6a5eddbc8", "extension": "py"...
2.703125
stackv2
# stdlib import datetime # libs # local COMMAND_COLOUR = '\033[0m' DEFAULT_COLOUR = '\033[93m' PROMPT_COLOUR = '\033[92m' ROCKY_COLOUR = '\033[1;36m' SUCCESS_COLOUR = '\033[32m' WARNING_COLOUR = '\033[91m' def colour(string: str) -> str: """ Converts string to its coloured version """ string = strin...
123
28.15
111
18
948
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_b1d1dd012c7ae540_a5d8ca02", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text." ]
[ 122 ]
[ null ]
[ 26 ]
[ 30 ]
2024-11-19T03:00:26.641413+00:00
1,635,489,833,000
e840ecf854ed9088a8bb3760d12e485a1aec685a
3
{ "blob_id": "e840ecf854ed9088a8bb3760d12e485a1aec685a", "branch_name": "refs/heads/main", "committer_date": 1635489833000, "content_id": "a854cc07bc0d3a100db3f5aa94845b45d3b4b2e3", "detected_licenses": [ "MIT" ], "directory_id": "7450507347f0dab2b4241506b370c4b9c94ba1d2", "extension": "py", "file...
2.75
stackv2
''' @author Kamal Kant @date OCT 28 2021 @description flask app for handling audio and text of the asr ''' from flask import Flask,render_template,request,jsonify import os app = Flask(__name__) UPLOAD_ROOT_FOLDER = 'waves/english/' # ALLOWED_EXTENSIONS = {'wav', 'mp3'} @app.route("/") def hello(): return ren...
33
23.06
62
11
194
python
[{"finding_id": "codeql_py/flask-debug_05fa0b7a0ee28c48_4f7bf9fc", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-022" ]
[ "py/flask-debug", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1)." ]
[ 33, 29 ]
[ null, null ]
[ null, 12 ]
[ 22, 54 ]
2024-11-19T03:00:30.573907+00:00
1,560,110,956,000
89b37dcdce09eaf25747f5eff3909d66496c5632
3
{ "blob_id": "89b37dcdce09eaf25747f5eff3909d66496c5632", "branch_name": "refs/heads/master", "committer_date": 1560110956000, "content_id": "a29f2f379718ea725e1348915c6d7c6b37dc203f", "detected_licenses": [ "Apache-2.0" ], "directory_id": "ffa4b9bd50470a53aca6eecaa63df8c8e231e36a", "extension": "py"...
3.25
stackv2
#!/usr/bin/env python3 """Simple script to query mac address with macaddress.io API Script flow is * Read arguments * Query API * Print Company Name as Output Example: ./mac_addr_tool.py $(cat .api_key) 4F:3B:61:34:FD:E0 """ import argparse import re import requests import sys def main(): parser = argparse.Arg...
56
33.3
100
13
523
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5b4ab77e208d04ab_a917ee0c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
5
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data ...
[ 33, 42, 46, 50, 53 ]
[ null, null, null, null, null ]
[ 11, 15, 15, 15, 15 ]
[ 67, 55, 49, 79, 49 ]
2024-11-19T03:00:31.062605+00:00
1,462,467,060,000
0816773a5a09d0e19d83b3c90ee5b79ef7af7b8a
2
{ "blob_id": "0816773a5a09d0e19d83b3c90ee5b79ef7af7b8a", "branch_name": "refs/heads/master", "committer_date": 1462467060000, "content_id": "81859a853fc41ed36fa2820bd3cfc9a4c93f8384", "detected_licenses": [ "Apache-2.0" ], "directory_id": "8330b39fdb22e8c537c668861e81c099094051b4", "extension": "py"...
2.46875
stackv2
""" This file contains functions to facilitate the uploading of Static Large Objects (SLO). """ import os import json from tempfile import NamedTemporaryFile from django.conf import settings from django.http import JsonResponse, HttpResponse from django.shortcuts import render_to_response from django.template import R...
315
32.09
79
19
2,179
python
[{"finding_id": "codeql_py/stack-trace-exposure_ebb693f8087ac451_93aa30f7", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
3
true
[ "CWE-209", "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 88, 101, 269 ]
[ null, null, null ]
[ 29, 29, 29 ]
[ 30, 30, 30 ]
2024-11-19T03:11:22.230172+00:00
1,577,640,571,000
49c1957d403ee9fad709d744c80d634f6cced2d4
2
{ "blob_id": "49c1957d403ee9fad709d744c80d634f6cced2d4", "branch_name": "refs/heads/master", "committer_date": 1577640571000, "content_id": "c69fccc73481a3b36845de0fe9016c0e25fa1240", "detected_licenses": [ "MIT" ], "directory_id": "c5af4a9e23fba9fe61c7f105f6512c9b64e84501", "extension": "py", "fi...
2.390625
stackv2
from flask import Flask, jsonify, abort, make_response from flask_restful import Api, Resource, reqparse, marshal from flasgger import swag_from from flask_jwt_extended import jwt_required, get_jwt_identity from app import db from models import models from utils.secure_creds import get_hashed_password from resources....
64
47.58
126
17
616
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c01fcd1334e500cf_3104d71d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 42 ]
[ null ]
[ 15 ]
[ 24 ]
2024-11-19T03:11:26.755995+00:00
1,524,833,664,000
697427340cc518607d94997599ff91839349cd3d
3
{ "blob_id": "697427340cc518607d94997599ff91839349cd3d", "branch_name": "refs/heads/master", "committer_date": 1525248457000, "content_id": "cb3edbcd77cf05ed5b25235b7c04c74a1ab51f80", "detected_licenses": [ "Apache-2.0" ], "directory_id": "6caf80a79f396fe3190719797c0525e8bd5f60f9", "extension": "py"...
2.703125
stackv2
import sys, csv, re, gzip from os import listdir, sep splitter = re.compile(r"[?!.]") data_size = 0 def read_sentences(file_path): global data_size print('reading sentences from {}'.format(file_path)) g = gzip.open(file_path, 'r') for l in g: dicti = eval(l) grade = dicti['overall'] line = dicti...
57
22.68
89
21
406
python
[{"finding_id": "codeql_py/overly-large-range_5e085d8096a6be96_49b7a1a8", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with A-\\u00d6 in the same character class.", "remediation": ""...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that overlaps with A-\\u00d6 in the same character class.", "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z{{|}}~\\u007f\\u0080\\u0081\\u0082\\u0083...." ]
[ 19, 19 ]
[ null, null ]
[ 33, 36 ]
[ 36, 39 ]
2024-11-19T03:11:39.472493+00:00
1,688,583,611,000
693dd78587f39dd4c8c181f6a90448b4572e2bc5
2
{ "blob_id": "693dd78587f39dd4c8c181f6a90448b4572e2bc5", "branch_name": "refs/heads/master", "committer_date": 1688583611000, "content_id": "a03514293714b8cdf72fa25e0c740bb53580204d", "detected_licenses": [ "MIT" ], "directory_id": "6ca924d3c3b56e12e838e7c271da25fc91b5687a", "extension": "py", "fi...
2.3125
stackv2
# coding: utf-8 """ Base para desarrollo de modulos externos. Para obtener el modulo/Funcion que se esta llamando: GetParams("module") Para obtener las variables enviadas desde formulario/comando Rocketbot: var = GetParams(variable) Las "variable" se define en forms del archivo package.json Para modifica...
387
31.15
156
23
2,653
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_ea0acdc482bb39db_46b2ba52", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [database.windows.net](1) may be at an arbitrary positi...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [database.windows.net](1) may be at an arbitrary position in the sanitized URL." ]
[ 80 ]
[ null ]
[ 12 ]
[ 56 ]
2024-11-19T03:11:50.306660+00:00
1,609,818,556,000
8901c39c3133ebe37b4c593718a5026b9de84a49
2
{ "blob_id": "8901c39c3133ebe37b4c593718a5026b9de84a49", "branch_name": "refs/heads/main", "committer_date": 1609818556000, "content_id": "bf6c4ab5e190769f9feb389f0b085008b46e7455", "detected_licenses": [ "MIT" ], "directory_id": "024527d4565061c746ca8fc611213fbf2b37e5ac", "extension": "py", "file...
2.453125
stackv2
import os from flask import Flask from flask import ( request, json ) import requests def create_app(test_config=None): # create and configure the app app = Flask(__name__, instance_relative_config=True) app.config.from_mapping( SECRET_KEY='dev', DATABASE=os.path.join(app.instance_p...
78
26.58
103
20
452
python
[{"finding_id": "codeql_py/partial-ssrf_147598b416b5b7d4_caba3c03", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 60 ]
[ null ]
[ 21 ]
[ 38 ]
2024-11-19T03:11:53.639517+00:00
1,511,584,480,000
6f59e8b68a34c6c9e2a6448e10f0172528e222d2
3
{ "blob_id": "6f59e8b68a34c6c9e2a6448e10f0172528e222d2", "branch_name": "refs/heads/master", "committer_date": 1511584480000, "content_id": "06ea41bf03ce495bf48cb15e690cff1eb614fdc1", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "8110353305c60a5ae8adce62aaf53eda2676177e", "extension": "p...
2.703125
stackv2
# Imports a tab delimited data file containing # reactor data to output formatted input for # Cycamore Reactors. from pyne import nucname as nn import csv import jinja2 import os import sys def import_csv(in_csv, delimit): """ Imports contents of a comma delimited csv file to a 2D list. Parameters ---...
354
30.22
78
20
2,487
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_9f28cd0c3f7a34a5_2c8dac43", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 46 ]
[ null ]
[ 27 ]
[ 58 ]
2024-11-19T03:12:14.426673+00:00
1,614,256,753,000
a18dfd3991194fb03f751c9b40968952dd3e2486
3
{ "blob_id": "a18dfd3991194fb03f751c9b40968952dd3e2486", "branch_name": "refs/heads/main", "committer_date": 1614256753000, "content_id": "854e17e9805fe300dfbc2d20bc487b09267def69", "detected_licenses": [ "MIT" ], "directory_id": "0e2704eb41a028a3e76c03c4eccc01653f8034fc", "extension": "py", "file...
2.703125
stackv2
#!/usr/bin/python import subprocess import time import logging import os import glob import sys # append the path to the main script to the system path so other modules can get pulled in when executing via cron sys.path.append(os.path.split(os.path.realpath(__file__))[0]) start_time = time.time() # Some critical bu...
189
37.56
126
17
1,705
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_666bee20f1e81c53_25b3482b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
6
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive dat...
[ 74, 84, 116, 119, 121, 175 ]
[ 75, null, null, null, null, null ]
[ 22, 13, 21, 30, 23, 13 ]
[ 50, 88, 70, 59, 73, 98 ]
2024-11-19T03:12:18.220466+00:00
1,324,020,222,000
2a6e34b33ab80acf7168ddb6bbaf17e8d368fb05
3
{ "blob_id": "2a6e34b33ab80acf7168ddb6bbaf17e8d368fb05", "branch_name": "refs/heads/master", "committer_date": 1324020222000, "content_id": "97d5e1a60e0fb392b2b1667d26a135336173020a", "detected_licenses": [ "ZPL-2.1" ], "directory_id": "af5e25b019c7d2ab7d5a961ae2e8bacc1cde2045", "extension": "py", ...
2.8125
stackv2
import re from cssmin import cssmin class KeywordMapper: def __init__(self, regexp, encoder): if isinstance(regexp, (str, unicode)): self.regexp = re.compile(regexp) else: self.regexp = regexp self.encoder = encoder self.mapping = {} def analyseKeywords...
397
38.84
134
20
3,639
python
[{"finding_id": "codeql_py/redos_d104125e01d9641d_beb54c7e", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with ''' and containing many repetition...
4
true
[ "CWE-1333", "CWE-1333", "CWE-1333", "CWE-1333" ]
[ "py/redos", "py/redos", "py/redos", "py/redos" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with ''' and containing many repetitions of '\\\\\\n'.", "This part of the regular expression may cause exponential backtracking on strings starting with '\"' and containing many repetitions of '\\\\\\n'.", "This part of...
[ 301, 302, 345, 346 ]
[ null, null, null, null ]
[ 32, 32, 28, 28 ]
[ 48, 48, 44, 44 ]
2024-11-19T03:12:53.611356+00:00
1,460,011,851,000
73ce8eb4ab5f791e96cb303fdc8e8aa44fb67f5b
2
{ "blob_id": "73ce8eb4ab5f791e96cb303fdc8e8aa44fb67f5b", "branch_name": "refs/heads/master", "committer_date": 1460011851000, "content_id": "d157bf200440fcf7dd04d117e0dedc436b7f3a18", "detected_licenses": [ "MIT" ], "directory_id": "5a15828b57bbaa8b41716a274be6b92e72e8d672", "extension": "py", "fi...
2.453125
stackv2
# MobiBook.py import os import sys from glob import glob from urllib import urlencode import subprocess import httplib import re from time import sleep from bs4 import BeautifulSoup from mobi.mobi import Mobi from customexceptions import * class MobiBook(object): amazonASINPat = re.compile(r'data\-asin=\"([a-zA-z...
194
36.28
144
19
1,724
python
[{"finding_id": "codeql_py/overly-large-range_152ab424528d3816_5fe455c1", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 16 ]
[ null ]
[ 52 ]
[ 55 ]
2024-11-19T03:35:47.612302+00:00
1,511,506,760,000
8cee31d0e5cb6578811e4f8503c24022999946f7
3
{ "blob_id": "8cee31d0e5cb6578811e4f8503c24022999946f7", "branch_name": "refs/heads/master", "committer_date": 1511506760000, "content_id": "4dddbbf61365e66f9e77f4f44580738c0cbf9a95", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "473df8252b80b24823456be24a6cd26b543b448d", "extension": "p...
2.796875
stackv2
from bs4 import BeautifulSoup import re import os import shutil from utils import * source_dir = "files" results_dir = "clean" base_url = "https://ce3-wiki.herokuapp.com/" wiki_url = "http://eop.wikidot.com/" def setup_dir(directory): if not os.path.exists(directory): os.makedirs(directory) else: ...
93
24.11
70
17
539
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_184cf2e6a7cf6340_5d0c74ed", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This string, which is used as a regular expression [here](1), has an unescaped '.' befor...
1
true
[ "CWE-020" ]
[ "py/incomplete-hostname-regexp" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This string, which is used as a regular expression [here](1), has an unescaped '.' before 'wikidot.com/', so it might match more hosts than expected." ]
[ 10 ]
[ null ]
[ 13 ]
[ 36 ]
2024-11-19T01:29:19.688172+00:00
1,446,655,339,000
a13859b9769f3c5a44e0c855dfd1676818ed8d4e
3
{ "blob_id": "a13859b9769f3c5a44e0c855dfd1676818ed8d4e", "branch_name": "refs/heads/master", "committer_date": 1446655339000, "content_id": "fe93867a26f017d7b0c514eea8185ef7b36540d2", "detected_licenses": [ "MIT" ], "directory_id": "b3f53748ed5d09ed646b47f87e2306921c2efbd5", "extension": "py", "fi...
2.515625
stackv2
from xml.etree import ElementTree import yaml from jinja2 import Template class Pipeline(object): def __init__(self, settings_file): self.pipeline_group = None self.structure = None self.element = None self.materials = None self.stage = None self.job = None s...
102
38.35
86
19
795
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_e0d52af870865a5e_a5d29305", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 19 ]
[ null ]
[ 24 ]
[ 75 ]
2024-11-19T01:30:13.487224+00:00
1,623,772,574,000
a45e6c3d2b79b2d4a67a55750c5c456bdfbc0ca1
4
{ "blob_id": "a45e6c3d2b79b2d4a67a55750c5c456bdfbc0ca1", "branch_name": "refs/heads/main", "committer_date": 1623772574000, "content_id": "4cd4bc2e5beb3c43cd7839ea2e03df23f68d4f05", "detected_licenses": [ "MIT" ], "directory_id": "081e0928e4f3130a71427425f82638973a76c5b8", "extension": "py", "file...
3.5
stackv2
# working with GIT # git config --global user.name "Krystof Edouwossi" # git config --global user.email "kwadjooe@gmail.com" # git init # git add *.* # git status # git commit -m "Initial commit" # git log # git log --oneline # git log --online -n 3 # git checkout hash_number identify [Detach from the master branch]...
54
30.72
87
11
473
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0e5a5711efdca6c1_aa80439e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 33 ]
[ null ]
[ 7 ]
[ 85 ]
2024-11-19T01:30:18.119988+00:00
1,493,046,739,000
c887ce17266654b9b0cdded21bd091660a8a415a
3
{ "blob_id": "c887ce17266654b9b0cdded21bd091660a8a415a", "branch_name": "refs/heads/master", "committer_date": 1493046739000, "content_id": "85543eba16bb3d9c4f732f9c71028b28fe497033", "detected_licenses": [ "MIT" ], "directory_id": "e9482f69dba6b0bf777b755690e5c9900ac62f2e", "extension": "py", "fi...
2.578125
stackv2
from threading import Timer from packtpub import PacktpubController import time, base64, cherrypy class Root(object): def __init__(self, pull_delay): cherrypy.engine.subscribe('stop', self.stop) self.status = "" self.timer = None self.users = []; self.next_pull_time = 0 self.pull_delay = pull_delay def ...
127
26.82
101
19
1,018
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_b1b64f062c05d08b_5eb6ced1", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 82 ]
[ null ]
[ 22 ]
[ 42 ]
2024-11-19T01:30:34.720797+00:00
1,570,603,712,000
76b5d366238ab737db761b511ada56a6df1d9b4e
3
{ "blob_id": "76b5d366238ab737db761b511ada56a6df1d9b4e", "branch_name": "refs/heads/master", "committer_date": 1570603712000, "content_id": "84b01480b7e29825e0ceee3021b69c84e3fe218a", "detected_licenses": [ "MIT" ], "directory_id": "d0006f6334136db2240806e0557164e7989187a1", "extension": "py", "fi...
2.609375
stackv2
import gmail import requests # import ConfigParser import configparser import os import html2text from library.config_parser import configSectionParser from openpyxl import load_workbook, worksheet from flask import Flask from flask import jsonify #INIT CONFIG config = configparser.ConfigParser() config.read("config/...
144
24.79
80
18
843
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_753f47d59c8ba712_ad5f9f5d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 45 ]
[ null ]
[ 23 ]
[ 52 ]
2024-11-19T01:54:56.206277+00:00
1,523,140,777,000
4ca9c9f7699f8c58aa688e9ccda38542d601fd81
2
{ "blob_id": "4ca9c9f7699f8c58aa688e9ccda38542d601fd81", "branch_name": "refs/heads/master", "committer_date": 1523140777000, "content_id": "bc334749699505fa9f49cb94a81f7f3dfcc3985c", "detected_licenses": [ "MIT" ], "directory_id": "b64b8974658451c3dead32d76137cfc35b09eb14", "extension": "py", "fi...
2.390625
stackv2
from flask import Flask, request from flask_restful import Api import os from src.PdfHandler import PdfHandler app = Flask(__name__) api = Api(app) local_dir = 'C:/test/local/' pdf_handler = PdfHandler() @app.route('/tasks', methods=['POST', 'DELETE']) def api_task(): if request.method == 'POST': print...
35
21.74
79
17
195
python
[{"finding_id": "codeql_py/path-injection_fe8fa0bf259c5766_f91a27f5", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 21, 27 ]
[ null, null ]
[ 35, 19 ]
[ 45, 77 ]
2024-11-19T01:54:56.973505+00:00
1,605,253,690,000
7c07c1f862d7c03bac74badd74e5187c1797ae6a
3
{ "blob_id": "7c07c1f862d7c03bac74badd74e5187c1797ae6a", "branch_name": "refs/heads/main", "committer_date": 1605253690000, "content_id": "0a818b7dc072b58c7de83a21598084050011d0a9", "detected_licenses": [ "MIT" ], "directory_id": "747139140194a79f6eefe519e84f4adf544109e9", "extension": "py", "file...
2.65625
stackv2
#!/usr/local/bin/python # -*- coding: utf-8 -*- __author__ = 'mvheimburg' from concurrent import futures import sys from os import environ, path import flask from flask import request, jsonify from flask_cors import CORS import yaml from pythonpath import add_dir_to_pythonpath from definitions import ROOT_DIR dat...
114
26.71
76
13
789
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_808bcf71bf57a689_7be1ff10", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
5
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secre...
[ 50, 65, 66, 67, 68 ]
[ null, null, null, null, null ]
[ 11, 7, 7, 7, 7 ]
[ 21, 25, 27, 33, 35 ]
2024-11-19T01:55:09.220924+00:00
1,551,540,879,000
474c110e90c8eede86778ed323238150b828daba
3
{ "blob_id": "474c110e90c8eede86778ed323238150b828daba", "branch_name": "refs/heads/master", "committer_date": 1551540879000, "content_id": "b90a10c9808ab4fc7a4d03131c46fddf41379252", "detected_licenses": [ "MIT" ], "directory_id": "78b7e9e7c58324e77a151e8fb3ae55709605900b", "extension": "py", "fi...
2.640625
stackv2
import csv from weibo_data.models import * def run(): weibo_datas = WeiboData.objects.all() weibo_users = WbUser.objects.all() uid2weibo_user = {w.uid: w for w in weibo_users} head = ['微博id', '用户id', '昵称', '性别', '生日', '所在地', '简介', '注册时间', '关注数', '粉丝数', '微博数', '头像', '联系信息', '教育信息', '工作信息', ...
48
33.65
97
14
452
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_111e49f936472ae8_eac39b6e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 47 ]
[ null ]
[ 19 ]
[ 23 ]
2024-11-19T01:55:09.645769+00:00
1,629,466,743,000
5ac9dbefdce8fadd2cf7589469c34674e19e3f46
3
{ "blob_id": "5ac9dbefdce8fadd2cf7589469c34674e19e3f46", "branch_name": "refs/heads/main", "committer_date": 1629466743000, "content_id": "291dab652cedfdb46cb0015e73ef9b9ee5a33653", "detected_licenses": [ "MIT" ], "directory_id": "62cde56e54ee6f166f3e84c3adf8d1687bee035f", "extension": "py", "file...
2.59375
stackv2
from mediaaccount import MediaAccountClient import sys,getopt import logging logging.basicConfig( level=logging.DEBUG, format="%(asctime)s [%(levelname)s] %(message)s", handlers=[ logging.StreamHandler(sys.stdout) ] ) def main(argv): verbose = False apiKey = None all = Fals...
59
25.83
102
15
416
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d8259ed5e45f15d4_a4fc4b03", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 47 ]
[ null ]
[ 11 ]
[ 42 ]
2024-11-19T02:06:44.893877+00:00
1,620,046,732,000
d9b2eae2222344643aa8b3bc8f21e3075b9bc5b7
2
{ "blob_id": "d9b2eae2222344643aa8b3bc8f21e3075b9bc5b7", "branch_name": "refs/heads/master", "committer_date": 1620046732000, "content_id": "b7e961723f2550ed7e2086e37353deaf68b647d4", "detected_licenses": [ "MIT" ], "directory_id": "6a305c526bb20d648bc2a750406fa5bfcc0daf81", "extension": "py", "fi...
2.359375
stackv2
from flask import Blueprint, request from databases.models import shipstationAddresses import requests import dropbox import csv import os import json import pandas as pd from datetime import date, datetime from appdb import db # Blueprint Configuration ss_bp = Blueprint('ssaddresses_bp', __name__, ...
75
36.92
144
17
703
python
[{"finding_id": "codeql_py/stack-trace-exposure_ad33eb9eb316c964_843d347f", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-918" ]
[ "py/stack-trace-exposure", "py/full-ssrf" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "The full URL of this request depends on a [user-provided value](1)." ]
[ 49, 31 ]
[ null, null ]
[ 25, 16 ]
[ 38, 77 ]
2024-11-19T02:07:00.754219+00:00
1,612,481,476,000
6bf47858b5569b9f5d9884021fb7a0dae611cf69
2
{ "blob_id": "6bf47858b5569b9f5d9884021fb7a0dae611cf69", "branch_name": "refs/heads/main", "committer_date": 1612481476000, "content_id": "2e60283db39d9f25facd6d5c6d2413e68ec42eb8", "detected_licenses": [ "MIT" ], "directory_id": "2a0545bd4cc8137334007d49763f0ec6dce0f5f8", "extension": "py", "file...
2.4375
stackv2
""" This python script defines a PolicyGenerator, which is used to generates iam yaml files for all the users """ import logging import re import sys from collections import defaultdict from pathlib import ( Path, PurePath, ) from policy import INDENT from policy_group import ( PolicyGroup, ) from person...
219
34.46
102
18
1,616
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_946724b26d604c17_20259e45", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 151, 94 ]
[ null, 95 ]
[ 28, 30 ]
[ 35, 75 ]
2024-11-19T02:07:16.395060+00:00
1,617,527,183,000
84e32f201143807c9338061c3f261de6a72600a0
2
{ "blob_id": "84e32f201143807c9338061c3f261de6a72600a0", "branch_name": "refs/heads/main", "committer_date": 1617527183000, "content_id": "4780981da7da35dfd61304aadd0a1d2d476cfda2", "detected_licenses": [ "MIT" ], "directory_id": "22389b45317289e52249b875c288ec253057752b", "extension": "py", "file...
2.359375
stackv2
import requests import json def setu_api(r18): # 单个插件测试请将API_KEY.json复制到api目录下 # 0为非 R18,1为 R18,2为混合 with open("API_KEY.json",'r') as load_f: load_dict = json.load(load_f) key = load_dict["LDST_API_KEY"] json_con = requests.get(f"https://api.lolicon.app/setu/?apikey={key}&r18={r18}") ...
22
30.77
84
11
226
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f443020f6ea0d124_69a2b586", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 22 ]
[ null ]
[ 11 ]
[ 22 ]
2024-11-19T02:31:36.032893+00:00
1,524,498,944,000
d8c305768f401fb3b3bd56037857e435b86bca28
3
{ "blob_id": "d8c305768f401fb3b3bd56037857e435b86bca28", "branch_name": "refs/heads/master", "committer_date": 1524498944000, "content_id": "175ed291c497cf7c34aa6429bbcc03f84f2f7c6c", "detected_licenses": [ "MIT" ], "directory_id": "fa87a6440b735c135703acdd757531d5fc6a5049", "extension": "py", "fi...
3.265625
stackv2
import socket import hashlib from Crypto.Cipher import AES import ssl KEY = hashlib.sha256("some random password").digest() #this will convert any pnemonic string which the user wants to choose as password to a 32 bit encrypted object IV = "abcdefghijklmnop" #Initialization vector should always be 16 bit obj = AES.n...
35
35.91
164
11
349
python
[{"finding_id": "codeql_py/insecure-default-protocol_f037677a73abf8c9_d9af606a", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in...
1
true
[ "CWE-327" ]
[ "py/insecure-default-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used." ]
[ 16 ]
[ null ]
[ 13 ]
[ 84 ]
2024-11-19T02:31:58.584306+00:00
1,543,230,153,000
a798dbb7a1ea449442ed1cfa77c2f01b1fa26f3f
2
{ "blob_id": "a798dbb7a1ea449442ed1cfa77c2f01b1fa26f3f", "branch_name": "refs/heads/master", "committer_date": 1543230153000, "content_id": "c36b52a2a1db2fa71ea5ff1dfaf849842e67dce1", "detected_licenses": [ "MIT" ], "directory_id": "c5658dcc258b35610e40bb3bbe416f16423b5413", "extension": "py", "fi...
2.40625
stackv2
#!/bin/env/python3 # -*- coding: utf-8 -*- import re import copy from random import choice from datetime import datetime import requests import pandas as pd requests.packages.urllib3.disable_warnings() session = requests.Session() login_url = "https://cas.dgut.edu.cn/home/Oauth/getToken/appid/shixun.html" id_url = "...
102
29.67
110
13
926
python
[{"finding_id": "codeql_py/request-without-cert-validation_deeb699438923a5e_3b68119b", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
6
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 58, 61, 62, 67, 81, 95 ]
[ null, null, null, null, null, null ]
[ 18, 18, 5, 15, 25, 19 ]
[ 58, 76, 73, 52, 68, 94 ]
2024-11-19T02:32:40.872389+00:00
1,557,408,287,000
0c28988d28108e8ff8c2bcf3582e2050199f424d
2
{ "blob_id": "0c28988d28108e8ff8c2bcf3582e2050199f424d", "branch_name": "refs/heads/master", "committer_date": 1557408287000, "content_id": "17951703a6c3aeb8da06591a2341aba89cb8a810", "detected_licenses": [ "MIT" ], "directory_id": "d7cfcb21216999ea71e064c1d7470da6918e5fe5", "extension": "py", "fi...
2.359375
stackv2
""" Routes and views for the flask application. """ from datetime import datetime from flask import render_template, jsonify, request, session, redirect, url_for import json from FlaskWebProject import app from PgoInventories import PgoInventories import hashlib pi = PgoInventories() app.config['JSON_AS_ASCII'] = Fal...
117
31.69
127
21
962
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_1757d79b7d0dc91e_908ca204", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 36 ]
[ null ]
[ 29 ]
[ 115 ]
2024-11-19T02:32:48.489807+00:00
1,434,545,256,000
592587a36d22e62b93fa017231f79f9faab600df
2
{ "blob_id": "592587a36d22e62b93fa017231f79f9faab600df", "branch_name": "refs/heads/master", "committer_date": 1434545256000, "content_id": "e397cadfc5db6d773a1ad747f90eb61bb43c1f29", "detected_licenses": [ "MIT" ], "directory_id": "a4509a288077562104532e397902b5f726d1eac2", "extension": "py", "fi...
2.46875
stackv2
# coding: utf-8 from flask import send_file, Flask, make_response, request, render_template from werkzeug import secure_filename app = Flask(__name__) INTERNAL_IP = '192.168.31.159' INTERNAL_PORT = '5000' INTERNAL_URL = 'http://{}:{}/get_files'.format(INTERNAL_IP, INTERNA...
40
29.23
90
17
290
python
[{"finding_id": "codeql_py/path-injection_1c41c464025ba7e8_5be24710", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 31 ]
[ null ]
[ 23 ]
[ 49 ]
2024-11-19T02:32:48.869563+00:00
1,634,064,777,000
85b2a4173d733339ee03344777d573853386cd41
3
{ "blob_id": "85b2a4173d733339ee03344777d573853386cd41", "branch_name": "refs/heads/master", "committer_date": 1634064777000, "content_id": "7ec5bd839081cebbff6a9a51ac009f4b8f40bb02", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "f82ea50d91fd10f69853ebe563040d48f3d684b7", "extension": "p...
2.609375
stackv2
from __future__ import unicode_literals import array from collections import defaultdict import io import logging import os import zipfile import six from six.moves.urllib.request import urlretrieve import torch from tqdm import tqdm import tarfile from .utils import reporthook logger = logging.getLogger(__name__) ...
400
40.2
98
22
3,794
python
[{"finding_id": "codeql_py/tarslip_744014190d89e70f_e98b4aaf", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 262 ]
[ null ]
[ 25 ]
[ 28 ]
2024-11-19T02:33:01.908775+00:00
1,612,863,917,000
3ed5a56971a31812b517828a5394d9a692d10dd4
3
{ "blob_id": "3ed5a56971a31812b517828a5394d9a692d10dd4", "branch_name": "refs/heads/main", "committer_date": 1612863917000, "content_id": "f8156d833ba2cf60153f2014e85c940ac2bd2e4d", "detected_licenses": [ "MIT" ], "directory_id": "4c7ce27e5ca0a058b7abe7d495fa19f0ded8e348", "extension": "py", "file...
2.9375
stackv2
import os import threading import time import serial import micropyGPS import subprocess import pigpio import bme280 from output1_csv import write_position from acc import bmx055 # pi = pigpio.pi() #ポート番号の定義 Sw_pin = 23 #変数"Sw_pin"に23を格納 pi.set_mode( Sw_pin, pigpio.INPUT ) pi.set_pull_up_do...
162
28.23
127
13
1,724
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_09a18439d2be584f_e841853b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 85 ]
[ null ]
[ 15 ]
[ 73 ]
2024-11-19T02:43:29.303034+00:00
1,607,501,811,000
57dafdf10adea93c92726e88b81e7a78e48c45fa
2
{ "blob_id": "57dafdf10adea93c92726e88b81e7a78e48c45fa", "branch_name": "refs/heads/master", "committer_date": 1607501811000, "content_id": "ea1afa5d25817eccf1294e126b2947cb86697602", "detected_licenses": [ "MIT" ], "directory_id": "5df88ebfa3dd3a9dfb750f46cc29a075dc22b0e3", "extension": "py", "fi...
2.46875
stackv2
#!/usr/bin/env python3 import subprocess import psutil from PIL import Image import ST7735 from bme280 import BME280 from ltr559 import LTR559 from pms5003 import PMS5003 from pms5003 import ReadTimeoutError as pmsReadTimeoutError from enviroplus import gas from fastapi import FastAPI app = FastAPI() pms5003 = PMS5...
136
22.54
98
17
917
python
[{"finding_id": "codeql_py/stack-trace-exposure_7236e1fcf4b6ee52_a79ae976", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
4
true
[ "CWE-209", "CWE-209", "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information...
[ 53, 70, 102, 120 ]
[ 56, 73, 105, 123 ]
[ 16, 16, 16, 16 ]
[ 10, 10, 10, 10 ]
2024-11-19T02:54:55.877806+00:00
1,626,845,089,000
a73f8364bf3b0381766960d58afe8312335f5136
2
{ "blob_id": "a73f8364bf3b0381766960d58afe8312335f5136", "branch_name": "refs/heads/master", "committer_date": 1626845089000, "content_id": "d997d09dfe1a1a35d92c9051b5a96c97641708fa", "detected_licenses": [ "MIT" ], "directory_id": "1e3c667895b672871ac9b5601cd84e62d30f6d60", "extension": "py", "fi...
2.34375
stackv2
from sklearn.feature_extraction.text import CountVectorizer from sklearn.metrics.pairwise import cosine_similarity import numpy as np import nltk from nltk.tokenize import word_tokenize from nltk.corpus import stopwords import textract from itertools import chain from pyresparser import ResumeParser from flask import F...
173
28.78
102
17
1,245
python
[{"finding_id": "codeql_py/reflective-xss_7d0a5d278b384570_fa8bce4e", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 161 ]
[ null ]
[ 12 ]
[ 17 ]
2024-11-19T02:54:56.443311+00:00
1,627,917,523,000
972242a08fbac2181e0e35b83c913e9ad6f9a8d3
3
{ "blob_id": "972242a08fbac2181e0e35b83c913e9ad6f9a8d3", "branch_name": "refs/heads/main", "committer_date": 1627917523000, "content_id": "94918800deb86325d3ede178fa989e89d115218c", "detected_licenses": [ "MIT" ], "directory_id": "ff792a8033a09d4edc9edb00a31935e6a70d2d1f", "extension": "py", "file...
2.53125
stackv2
#!/usr/bin/python # -*- coding: latin-1 -*- from __future__ import division # need for seconds calculation (could be removed with Python 2.7) __author__ = 'fermin' # This program stores everything it receives by HTTP in a given URL (pased as argument), # Then return the accumulated data upon receiving 'GET <host>:<...
382
28.17
137
23
2,892
python
[{"finding_id": "codeql_py/reflective-xss_25941360e0ed99c1_6df67440", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 313 ]
[ null ]
[ 12 ]
[ 14 ]
2024-11-19T02:55:10.542957+00:00
1,441,408,413,000
266367cf4a569da61de5b5a2b1081e6c91091845
3
{ "blob_id": "266367cf4a569da61de5b5a2b1081e6c91091845", "branch_name": "refs/heads/master", "committer_date": 1441408413000, "content_id": "1312a4046f392dadf0a4e438b1f5d1e3d1f68fdb", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "d62bd8dc71370f0f77b0c36c95ff4e31960b45a6", "extension": "p...
2.546875
stackv2
import copy import os import tarfile import urllib2 import zipfile from calcrepo import index from calcrepo import output class CalcRepository: """A class for adding new calcpkg repositories""" def __init__(self, name, url): self.name = name self.url = url self.output = output.CalcpkgOutput(True, False) ...
188
28.64
121
21
1,436
python
[{"finding_id": "codeql_py/tarslip_d93d8fb44546bd0f_08140066", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially untrusted source](1)." ]
[ 152 ]
[ null ]
[ 6 ]
[ 13 ]
2024-11-19T02:55:36.789166+00:00
1,522,568,697,000
4931ab6b055ea7d2ced80bd74fcd8ffd6c1431c8
2
{ "blob_id": "4931ab6b055ea7d2ced80bd74fcd8ffd6c1431c8", "branch_name": "refs/heads/master", "committer_date": 1522568888000, "content_id": "2d26ecbcc9a291bf81dc48e1145fb175a853eba3", "detected_licenses": [ "MIT" ], "directory_id": "c5b093fc2267235ac058e14de78ca1e67a4658ee", "extension": "py", "fi...
2.34375
stackv2
#!/usr/bin/env python from flask import Flask, request, Response import requests import xml.etree.ElementTree as et import logging import sys import os from urlparse import urlparse, parse_qs import kml2bmw logging.basicConfig(filename='/var/log/kml2bmw/kml2bmw.log',level=logging.DEBUG) app = Flask(__name__) @app....
57
24.07
85
16
338
python
[{"finding_id": "codeql_py/log-injection_31ed76abc1985199_531f7474", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 21 ]
[ null ]
[ 22 ]
[ 55 ]
2024-11-19T02:55:38.731219+00:00
1,515,485,676,000
66dee6db71152ff73e0b95b075bd5a869e0dcdf1
2
{ "blob_id": "66dee6db71152ff73e0b95b075bd5a869e0dcdf1", "branch_name": "refs/heads/master", "committer_date": 1515485676000, "content_id": "067dd1a06e24ae55dfc3b2f243c70fb4ac2e76d4", "detected_licenses": [ "MIT" ], "directory_id": "23a56e0555d6b27aa444d8396ec32f9d2b678a39", "extension": "py", "fi...
2.453125
stackv2
import yaml import json import logging from timeit import default_timer as timer from multiprocessing import Process, Manager from BaseHTTPServer import BaseHTTPRequestHandler, HTTPServer from compas_fabrication.fabrication.robots.rfl import SimulationCoordinator, SimulationError logging.basicConfig(format='%(process)...
101
38.61
113
20
930
python
[{"finding_id": "codeql_py/log-injection_4924e862c7e3dd01_2c5eef69", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 39 ]
[ null ]
[ 39 ]
[ 48 ]
2024-11-19T02:56:00.530063+00:00
1,454,671,087,000
7f53a571e72627509d2b0f45ce9f797b44865b95
3
{ "blob_id": "7f53a571e72627509d2b0f45ce9f797b44865b95", "branch_name": "refs/heads/master", "committer_date": 1454671087000, "content_id": "618387c7a9cd016c69a6034faf54c20f1898fd47", "detected_licenses": [ "MIT" ], "directory_id": "77a26359b319cd5e127a93a130b28f641b1caf51", "extension": "py", "fi...
2.765625
stackv2
import json import base64 def load_docker_conf(dockercfg_path): dockercfg_json = None with open(dockercfg_path) as data_file: dockercfg_json = json.load(data_file) return dockercfg_json def generate_secret(dockercfg_json): auths_removed_dict = dockercfg_json.get('auths') if not auths_...
75
23.73
151
13
488
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_37a2c16ac190e98a_94a62480", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive data (secret)](2) as clear text." ]
[ 28 ]
[ null ]
[ 41 ]
[ 52 ]