added
stringlengths
32
32
created
int64
1,236B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.03
source
stringclasses
1 value
text
stringlengths
330
19.3k
num_lines
int64
16
648
avg_line_length
float64
15.5
59.3
max_line_length
int64
37
179
ast_depth
int64
8
38
length
int64
102
3.79k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.11k
276k
sast_codeql_findings_count
int64
1
33
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
33
rule_ids
listlengths
1
33
confidences
listlengths
1
33
severities
listlengths
1
33
messages
listlengths
1
33
line_starts
listlengths
1
33
line_ends
listlengths
1
33
column_starts
listlengths
1
33
column_ends
listlengths
1
33
2024-11-18T21:22:40.671239+00:00
1,603,377,253,000
40773463d4da6d7b1d3ca6067111a7d796ad0667
4
{ "blob_id": "40773463d4da6d7b1d3ca6067111a7d796ad0667", "branch_name": "refs/heads/main", "committer_date": 1603377253000, "content_id": "3fd8aa9dd5a5e28ad6031a8a76ffa573f413212e", "detected_licenses": [ "MIT" ], "directory_id": "227f2934ce7bf31a40b4437ff782d005a02869aa", "extension": "py", "file...
3.703125
stackv2
from student import * class StudentManager(object): def __init__(self): # 存储学员数据的列表 self.student_list = [] def run(self): """程序入口方法, 启动程序后执行的方法""" self.load_student() while True: self.show_menu() menu_num = int(input('请输入你需要的功能序号: ')) ...
139
24.17
93
16
927
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8470363e8489662c_99dcc435", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 82, 93, 103 ]
[ null, null, null ]
[ 23, 23, 19 ]
[ 75, 65, 51 ]
2024-11-18T21:23:19.828040+00:00
1,632,457,139,000
5bb7f5d7475e574a9f7d3df4a4b63a398c36c66c
3
{ "blob_id": "5bb7f5d7475e574a9f7d3df4a4b63a398c36c66c", "branch_name": "refs/heads/main", "committer_date": 1632457139000, "content_id": "f62161ac0f865bec89a08092e0b6909afa881173", "detected_licenses": [ "MIT" ], "directory_id": "602a8bfacbbfefcc7fbf539b44a85963bbfc5642", "extension": "py", "file...
2.578125
stackv2
import socket,random,smtplib from email.message import EmailMessage class app: file_name = "database.txt" def __init__(self,ip,port): s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) s.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1) s.bind((ip, port)) s.listen(5) self.conn, self.addr = s.accept()...
34
33.38
85
17
359
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_009113af7fa19c36_0072396d", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 21 ]
[ null ]
[ 12 ]
[ 58 ]
2024-11-18T21:51:11.960493+00:00
1,632,709,047,000
26c39259de039ad3f4b29654dbd9a1df9bb3faf5
3
{ "blob_id": "26c39259de039ad3f4b29654dbd9a1df9bb3faf5", "branch_name": "refs/heads/master", "committer_date": 1632709047000, "content_id": "2133b801814d1d73c8aee3a07bef9e5d2341d81a", "detected_licenses": [ "Apache-2.0" ], "directory_id": "ee1a5e24be68962d3163f6c18571769afc291053", "extension": "py"...
2.96875
stackv2
# copyright (c) 2021 PaddlePaddle Authors. All Rights Reserve. # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applica...
85
27.34
74
13
780
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8a9d02658446b40f_e87e3342", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 32, 33 ]
[ null, null ]
[ 7, 7 ]
[ 45, 45 ]
2024-11-18T21:51:15.224042+00:00
1,533,193,300,000
ed493aa96d555143f089189c9e7bcc0222393a77
4
{ "blob_id": "ed493aa96d555143f089189c9e7bcc0222393a77", "branch_name": "refs/heads/master", "committer_date": 1533193300000, "content_id": "b3c803746a83b774fe8a1c63800502f915553468", "detected_licenses": [ "MIT" ], "directory_id": "e0b95cf25559c5438dc302267f2653f5ffd074f6", "extension": "py", "fi...
3.703125
stackv2
print('====================通讯录====================') print('--------------------李金灿--------------------') print(''' ---1:添加联系人--- ---2:删除联系人--- ---3:修改联系人--- ---4:查询联系人--- ---5:打印所有人--- ---6:退出通讯录--- ''') address_file = '/Users/admin/Desktop/Python/fishc/Address book/str.txt' def add(name,sex,phone): file1 = o...
87
23.02
71
13
574
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_40070ffb85ab1885_ef8dadb6", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text." ]
[ 19 ]
[ null ]
[ 17 ]
[ 60 ]
2024-11-18T21:51:20.860101+00:00
1,691,037,619,000
1fd94cf6d79c3c0865b6c7b963e002824f926b10
3
{ "blob_id": "1fd94cf6d79c3c0865b6c7b963e002824f926b10", "branch_name": "refs/heads/master", "committer_date": 1691037619000, "content_id": "6406b349c63a0f6859919077d0447ba8a4f45aa9", "detected_licenses": [ "Apache-2.0" ], "directory_id": "7dfc958846a98c9dc90829ace237adb0f4e79057", "extension": "py"...
2.859375
stackv2
import json from collections.abc import Mapping import logging from pathlib import Path from reprlib import Repr import yaml from jinja2 import ( Environment, Template, UndefinedError, FileSystemLoader, PackageLoader, StrictUndefined, ) from ploomber.exceptions import RenderError, SourceInitia...
522
31.18
88
18
3,499
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_dae3bd7a72b16753_590066da", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 304, 321 ]
[ 306, 325 ]
[ 20, 15 ]
[ 10, 10 ]
2024-11-18T21:51:31.908409+00:00
1,624,459,227,000
cd64c25292a41d00521556646a254829e1e3d09c
3
{ "blob_id": "cd64c25292a41d00521556646a254829e1e3d09c", "branch_name": "refs/heads/main", "committer_date": 1624466500000, "content_id": "d35f68b5c489e470db91790fcd74d3299f2c99ff", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "041dcaf11ab98d0e0cb537e56b6e119ee5e5b864", "extension": "py"...
2.515625
stackv2
import sys import pikepdf from tqdm import tqdm PDF_FILE_NAME = sys.argv[1] PASSWORDS_FILE_NAME = "passwords.txt" passwords = [ line.strip() for line in open(PASSWORDS_FILE_NAME) ] for password in tqdm(passwords, "HaCkEaNdO o PdF"): try: with pikepdf.open(PDF_FILE_NAME, password=password) as pdf: ...
19
26.37
67
13
154
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7abc6cb675f20555_df366988", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 13 ]
[ null ]
[ 41 ]
[ 49 ]
2024-11-18T21:51:46.029353+00:00
1,448,756,461,000
5e88b122ec130d3fedcecd92045650bb5b23d988
3
{ "blob_id": "5e88b122ec130d3fedcecd92045650bb5b23d988", "branch_name": "refs/heads/master", "committer_date": 1448756461000, "content_id": "c19c76863ce5e13f41dbabebf85bc25d60826120", "detected_licenses": [ "Apache-2.0" ], "directory_id": "1bfc00ccaac4e5815f51030a9546f28bd6191bf9", "extension": "py"...
2.703125
stackv2
from __future__ import with_statement, print_function """Copyright 2013 Justin Hall Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Un...
315
33.07
105
17
2,200
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_9dec4b2441332998_badeb4cd", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 154 ]
[ null ]
[ 38 ]
[ 62 ]
2024-11-18T21:52:04.247470+00:00
1,576,082,774,000
216a7cb321dcb3f73d897b466f4fd53c974befc4
3
{ "blob_id": "216a7cb321dcb3f73d897b466f4fd53c974befc4", "branch_name": "refs/heads/master", "committer_date": 1576082774000, "content_id": "3aaf2b793e0c834cd71db159479ccfd891c1f78a", "detected_licenses": [ "Apache-2.0" ], "directory_id": "2dccfea986a550fbeab588edcd413a544bb9eb02", "extension": "py"...
2.734375
stackv2
import os import logging import shutil import zipfile from flask import Blueprint, jsonify, request, send_file from werkzeug.utils import secure_filename from service.errors import ApiError from service.user.user_service import auth staging_controller = Blueprint('staging', __name__) staging_dir = os.environ['STAGI...
453
26.65
79
18
2,829
python
[{"finding_id": "codeql_py/path-injection_f900869864a1b171_98616808", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
10
true
[ "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-117" ]
[ "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/log-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](...
[ 23, 78, 81, 175, 177, 178, 230, 375, 375, 413 ]
[ null, null, null, null, null, null, null, null, null, null ]
[ 36, 19, 27, 22, 25, 26, 21, 19, 27, 15 ]
[ 44, 67, 75, 30, 33, 34, 75, 25, 33, 68 ]
2024-11-18T22:16:21.252609+00:00
1,522,890,892,000
6f02f97253a122c937fe081cb2a23ad67addc6f3
4
{ "blob_id": "6f02f97253a122c937fe081cb2a23ad67addc6f3", "branch_name": "refs/heads/master", "committer_date": 1522890892000, "content_id": "fcddbf5811a2dd5de41a814b10a94ba621503118", "detected_licenses": [ "Apache-2.0" ], "directory_id": "ccc6db9962655f540da7917ae161fb47a13f57ac", "extension": "py"...
4.1875
stackv2
# 클래스 # 변수와 그것과 관련된 함수를 하나의 이름으로 정의한 것 # 클래스는 메서드, 속성, 클래스 변수, 인스턴스변수로 구성 # 덫붙여 생성자와 소멸자등의 멤버도 존재 # 클래스 정의 # class 이름 : # 클래스 변수 # 생성자 # 함수정의(메서드) # 파이썬에서는 생성자나 메서드 정의시 암시적으로 첫번째 매개변수가 self로 지정되어 있음 # self는 항상 객체 자기 자신을 가리키는 의미로 사용 # 클래스의 멤버변수는 생성자를 통해서 정의 # 파이썬에서는 객체로 생성된 후에도 멤버변수를 추가할 수 있음(비추) class HelloPy...
137
18.21
60
13
980
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4d824a64c051f4ac_a8f2aedb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 51 ]
[ null ]
[ 7 ]
[ 19 ]
2024-11-18T22:16:32.651512+00:00
1,670,016,093,000
af84201e0ebecc0bff6385b2d2845527ce21e019
2
{ "blob_id": "af84201e0ebecc0bff6385b2d2845527ce21e019", "branch_name": "refs/heads/master", "committer_date": 1670019174000, "content_id": "c0f5ce99ed7d880cf2d9ebbe24673953a5d65780", "detected_licenses": [ "MIT" ], "directory_id": "b516f19c1d62ebac2fe47aaff320a09565cb9502", "extension": "py", "fi...
2.5
stackv2
#! /usr/bin/env python3 # Name for experiments directory import sys import argparse import os.path import string import importlib.resources import os class MkPar(object): def __init__(self): self._name = 'mkpar' self._help = 'Create script to run parallel experiments' def _mk_arg_parser(se...
90
31.1
81
17
580
python
[{"finding_id": "codeql_py/overly-permissive-file_b3dcc755da14dfda_da140d91", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to group writable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to group writable." ]
[ 79 ]
[ null ]
[ 9 ]
[ 34 ]
2024-11-18T22:27:49.683358+00:00
1,624,801,132,000
fd1f051736386f0e7354168fe4ec83492e063eb2
3
{ "blob_id": "fd1f051736386f0e7354168fe4ec83492e063eb2", "branch_name": "refs/heads/main", "committer_date": 1624801132000, "content_id": "bd51e9848ddab0554309f3d57061a2fc2b65424b", "detected_licenses": [ "MIT" ], "directory_id": "dec0797f4282096388906c7eff7bca3a0e67464e", "extension": "py", "file...
2.84375
stackv2
''' File [ src/util/generate_lm.py ] Author [ Heng-Jui Chang (NTUEE) ] Synopsis [ Generate text data for masked LM training ] ''' import argparse import csv import pickle import json import numpy as np from tqdm import tqdm from text_normalization import normalize_sent_with_jieba from opencc impo...
111
33.11
83
20
931
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_3337923c1ea67653_ed89a730", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text." ]
[ 83 ]
[ null ]
[ 22 ]
[ 39 ]
2024-11-18T22:28:02.318411+00:00
1,688,924,210,000
a1f6e65de3e90a47ed06ff58cca8ac0ac7affea4
2
{ "blob_id": "a1f6e65de3e90a47ed06ff58cca8ac0ac7affea4", "branch_name": "refs/heads/master", "committer_date": 1688924210000, "content_id": "ac2212e16e173dbf8a161adf611601db70222181", "detected_licenses": [ "Apache-2.0" ], "directory_id": "3f70d57d2995a9fcd57d46d0ab6f05afdbd35a24", "extension": "py"...
2.3125
stackv2
# coding=utf-8 import os import sys import json import requests from flask import Flask, request from flask import render_template from flask import send_file app = Flask(__name__) @app.route('/', methods=['GET']) def verify(): # when the endpoint is registered as a webhook, it must echo back # the 'hub.chal...
239
37.18
132
24
1,951
python
[{"finding_id": "codeql_py/flask-debug_b82dd4a5ccf1abf3_4705c2b8", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-079", "CWE-918" ]
[ "py/flask-debug", "py/reflective-xss", "py/partial-ssrf" ]
[ "HIGH", "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 239, 20, 133 ]
[ null, null, null ]
[ 5, 16, 9 ]
[ 24, 50, 26 ]
2024-11-18T22:28:14.844041+00:00
1,615,456,343,000
1c001cb55553c8b3c57df4eb72554cfa6fd1e8d5
2
{ "blob_id": "1c001cb55553c8b3c57df4eb72554cfa6fd1e8d5", "branch_name": "refs/heads/main", "committer_date": 1615456343000, "content_id": "d665f45a006e4d317b6460fa2e72c5483a0afefc", "detected_licenses": [ "MIT" ], "directory_id": "a7c3c98d4ce0ac21db15dee6245ee5bc90f6ad90", "extension": "py", "file...
2.4375
stackv2
import io from cloudinary.uploader import upload import torchvision.transforms as transforms from rest_framework import status from rest_framework.decorators import api_view from rest_framework.response import Response from api import neural_style as ns @api_view(['GET']) def index_page(request): return_data = {...
77
31.82
120
20
525
python
[{"finding_id": "codeql_py/stack-trace-exposure_8e689e9a3cb5fc41_1cbfb911", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 77 ]
[ null ]
[ 21 ]
[ 27 ]
2024-11-18T22:28:15.935452+00:00
1,511,113,350,000
a6b3eddbb64491a3963c2331e550b33900d44f40
3
{ "blob_id": "a6b3eddbb64491a3963c2331e550b33900d44f40", "branch_name": "refs/heads/master", "committer_date": 1511113350000, "content_id": "dbea0a8bba836c677d79500691adcb9339c08408", "detected_licenses": [ "MIT" ], "directory_id": "5ef5fa99c80f0b76f49ac8b9701dce373d0e062b", "extension": "py", "fi...
2.75
stackv2
import os import jinja2 DIR_PATH = os.path.dirname(os.path.realpath(__file__)) TEMPLATE_PATH = os.path.join(DIR_PATH, 'output', 'index.html') def render(data, verbose=False): """ Fill the HTML template with data. :param str data: The encrypted base64 data to put in the template :returns: the templ...
22
24.59
69
16
137
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_fd3f71f1c63ef91f_428e81b6", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 20 ]
[ 22 ]
[ 12 ]
[ 6 ]
2024-11-18T22:28:17.695061+00:00
1,629,379,559,000
5309eb2ec943e928f747bc63daf0e85139d07725
3
{ "blob_id": "5309eb2ec943e928f747bc63daf0e85139d07725", "branch_name": "refs/heads/master", "committer_date": 1629379559000, "content_id": "2cad06de58cb923c495b7b02bfcf51051d9cc091", "detected_licenses": [ "Apache-2.0" ], "directory_id": "267a508bcebc09f7aec8dc500282d680d5183956", "extension": "py"...
2.625
stackv2
#!/usr/bin/python3 import hashlib import time import uuid import requests def generateHash(phoneNumber, smsCode, timestamp): sha = hashlib.sha256() data = phoneNumber + smsCode + "com.tisc.familyasyst2" + timestamp sha.update(data.encode("utf-8")) hashString = sha.hexdigest() return hashString if __name__ == "_...
73
25.64
100
14
601
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_07bcd2f2e2266d5a_f105d167", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 48, 69, 73 ]
[ null, null, null ]
[ 9, 9, 8 ]
[ 24, 24, 30 ]
2024-11-18T22:44:23.217956+00:00
1,606,236,871,000
cec5f862657c48a9702c702fba1f1de85819ba6a
2
{ "blob_id": "cec5f862657c48a9702c702fba1f1de85819ba6a", "branch_name": "refs/heads/master", "committer_date": 1606236871000, "content_id": "eb7c66fa2870eda90428cdbf15748ddbb068aaee", "detected_licenses": [ "MIT" ], "directory_id": "198f7caf8775b3272214bd84a788498327bc4d63", "extension": "py", "fi...
2.5
stackv2
import re import urllib import sys import socket import base64 import ssl from lightbulb.core.utils.common import accept_bool META = { 'author': 'George Argyros, Ioannis Stais', 'name': 'RawHTTPHandler', 'description': 'Performs membership queries in a browser filter', 'type': 'UTIL', 'options': [ ...
109
34.49
149
17
852
python
[{"finding_id": "codeql_py/insecure-default-protocol_5c0dd6ef75fdd469_4309c089", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in...
1
true
[ "CWE-327" ]
[ "py/insecure-default-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used." ]
[ 66 ]
[ null ]
[ 33 ]
[ 51 ]
2024-11-18T20:59:39.004836+00:00
1,627,760,766,000
b2ac73ff20465dcc468003641e2dc9bde441db4b
3
{ "blob_id": "b2ac73ff20465dcc468003641e2dc9bde441db4b", "branch_name": "refs/heads/master", "committer_date": 1627760813000, "content_id": "7161ca22fe45b6194d11f9497919a06e77b6b66c", "detected_licenses": [ "MIT" ], "directory_id": "fc651aeb0bc681e773c16024d6541bfda672dafc", "extension": "py", "fi...
2.5625
stackv2
# -*- coding: utf-8 -*- # hi-rez-API: Smite, Paladins, Realm. import datetime import hashlib import requests import json import os class Err_API(Exception): err_info_hard = True def base_err(self, text): if type(self.err_info_hard) == bool: if self.err_info_hard: raise Err...
277
42.66
119
20
2,907
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_5147ba23b92f9c58_1991981e", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 44 ]
[ null ]
[ 33 ]
[ 62 ]
2024-11-18T21:00:37.415450+00:00
1,515,119,651,000
07f37d308736b98d407acf90071beec6b03017c6
3
{ "blob_id": "07f37d308736b98d407acf90071beec6b03017c6", "branch_name": "refs/heads/master", "committer_date": 1515120136000, "content_id": "d73d75f479d1182d2a0a02617433d909c4bbaa87", "detected_licenses": [ "MIT" ], "directory_id": "a9c11e10e9388978e3127c52013562c2e6a088a6", "extension": "py", "fi...
2.765625
stackv2
import logging from urlparse import urlparse import requests import boto3 from werkzeug.exceptions import ServiceUnavailable from flask import g from flask.globals import _app_ctx_stack log = logging.getLogger(__name__) def fetch_url(url, error_title, expire=None): """ Fetch contents of 'url' and cache the ...
69
31.22
111
14
526
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_66f01f4d834c77d5_222bd184", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [amazonaws.com](1) may be at an arbitrary position in t...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [amazonaws.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 48 ]
[ null ]
[ 8 ]
[ 30 ]
2024-11-18T21:00:58.994613+00:00
1,693,816,756,000
7b5a069deda01f5bda2a8f94408cf9c06610cef9
3
{ "blob_id": "7b5a069deda01f5bda2a8f94408cf9c06610cef9", "branch_name": "refs/heads/master", "committer_date": 1693816756000, "content_id": "84452c075450b0eb21d99e1c8c66308694f66186", "detected_licenses": [ "MIT" ], "directory_id": "a9f63a0746de04b87979107995c94ef46d054f5b", "extension": "py", "fi...
2.5625
stackv2
#!/usr/bin/env python import sys import os import argparse import logging import ast import re from glob import glob from jinja2 import Template logger = logging.getLogger("api_docs_generator") HTTP_METHODS = [ "get", "post", "put", "patch", "delete", "head", "options", "trace" ] def no_parse(line): ...
507
27.75
79
14
3,245
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_01bb26ecced4453a_96e948cf", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 437 ]
[ 503 ]
[ 30 ]
[ 2 ]
2024-11-18T21:01:05.261114+00:00
1,633,025,659,000
c39bdaf252933a00843beb94604b53bff1a37231
3
{ "blob_id": "c39bdaf252933a00843beb94604b53bff1a37231", "branch_name": "refs/heads/master", "committer_date": 1633025659000, "content_id": "2acb17ec53db463ce7a137bd8aac418e998c50c9", "detected_licenses": [ "MIT" ], "directory_id": "6ecb39e83cc80193b123a8fafec6cb0525e35445", "extension": "py", "fi...
2.515625
stackv2
import argparse import os import logging.config import google.cloud.logging from google.cloud.logging.handlers import CloudLoggingHandler from .discord_bot_client import DiscordBotClient from .dictionary_api import OwlBotDictionaryAPI, UnofficialGoogleAPI, MerriamWebsterCollegiateAPI, RapidWordsAPI, MerriamWebsterMedic...
143
39.09
177
17
1,226
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3c07fa3773ff37b8_cc93c4f3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 129 ]
[ null ]
[ 23 ]
[ 133 ]
2024-11-18T21:01:20.561905+00:00
1,601,777,623,000
be6c28ebe2e449f0e5eb57f3f98741ddcf6be446
3
{ "blob_id": "be6c28ebe2e449f0e5eb57f3f98741ddcf6be446", "branch_name": "refs/heads/main", "committer_date": 1601777623000, "content_id": "c245a76d14db5d1c6a50d6e38faa90e18c2695e5", "detected_licenses": [ "MIT" ], "directory_id": "6de714e88093d098d18734288565d2a0673c0242", "extension": "py", "file...
2.671875
stackv2
#!/usr/bin/python3 from flask import Flask, request, render_template, url_for, send_file import os, json app = Flask(__name__) APP_ROOT = os.path.dirname(os.path.abspath(__file__)) @app.route("/") def main(): return render_template("index.html", text="Hello, World!") @app.route("/upload", methods=["POST"]) def ...
55
25.71
95
14
347
python
[{"finding_id": "codeql_py/path-injection_147c9942c1c3c15f_5acc7969", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 36, 52 ]
[ null, null ]
[ 17, 22 ]
[ 28, 30 ]
2024-11-18T21:51:13.941108+00:00
1,636,523,631,000
903874f696a9890627140b52eaf44f0a653311da
3
{ "blob_id": "903874f696a9890627140b52eaf44f0a653311da", "branch_name": "refs/heads/main", "committer_date": 1636523631000, "content_id": "16e1237bc4481e00efbde04842e749d7cea7a96a", "detected_licenses": [ "MIT" ], "directory_id": "16de39d854f5a1c99207e03713b44efe00eb99f6", "extension": "py", "file...
3.484375
stackv2
from LaoCode import lao_decode, lao_encode from LaoPlus import lao_to_plus, plus_to_lao import haversine as hs print("===================== Test lao_to_latlon and reverse =================") while True: lao_string = str(input("Enter a Lao code to convert into Lat/Lon, or 'q' to quit: ")) if lao_string == 'q': ...
89
43.7
111
17
1,072
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_44547677dbf45bed_3f10c811", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 88, 89 ]
[ null, null ]
[ 11, 11 ]
[ 62, 73 ]
2024-11-18T21:51:20.056257+00:00
1,693,599,816,000
652e4a3d1fa139d4c650f315442361eb931d9cfa
3
{ "blob_id": "652e4a3d1fa139d4c650f315442361eb931d9cfa", "branch_name": "refs/heads/main", "committer_date": 1693599816000, "content_id": "7c23313910efe1213ef2ec7c219e0e1b46727b81", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "41ddc89de25a8fc0dcbabbe6bc2772254e991a2b", "extension": "py"...
2.59375
stackv2
import os import re import logging import random import shutil from jinja2 import Template from tethys_cli.cli_colors import write_pretty_output, FG_RED, FG_YELLOW, FG_WHITE from tethys_apps.base.app_base import TethysAppBase, TethysExtensionBase # Constants APP_PREFIX = TethysAppBase.package_namespace EXTENSION_PREF...
448
32.03
115
22
3,126
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_9d928b49d3b04d44_892cf8ca", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 438 ]
[ null ]
[ 32 ]
[ 51 ]
2024-11-18T21:51:37.076075+00:00
1,680,190,653,000
337fd1f409431da54109ed868d57e22c2fcfd1ff
2
{ "blob_id": "337fd1f409431da54109ed868d57e22c2fcfd1ff", "branch_name": "refs/heads/master", "committer_date": 1680190653000, "content_id": "2982fcf6909f7901f95ccca12900905020d426c2", "detected_licenses": [ "MIT" ], "directory_id": "0d54a4227a095c4d88a0f0c4d6a221c8814c6d96", "extension": "py", "fi...
2.3125
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- import argparse import sys import logging from flask import Flask, request import requests from subsonic_api_proxy import __version__ _logger = logging.getLogger(__name__) def parse_args(args): """Parse command line parameters Args: args ([str]): command...
109
23.81
76
14
619
python
[{"finding_id": "codeql_py/reflective-xss_879c8f68b0bb2621_9c01bc38", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
2
true
[ "CWE-079", "CWE-918" ]
[ "py/reflective-xss", "py/partial-ssrf" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 109, 106 ]
[ null, 107 ]
[ 16, 16 ]
[ 68, 68 ]
2024-11-18T22:00:17.536774+00:00
1,556,292,037,000
65a2d5c0ce7efaac642e402e43db3df9dae29f1f
2
{ "blob_id": "65a2d5c0ce7efaac642e402e43db3df9dae29f1f", "branch_name": "refs/heads/master", "committer_date": 1556292037000, "content_id": "c34d275c9977cd44c7e85acb61fd8e34e2928d3b", "detected_licenses": [ "MIT" ], "directory_id": "1b00a464a66ee2cf586df2022a5f7289ee487790", "extension": "py", "fi...
2.484375
stackv2
import os from flask import Flask, render_template, request from flask import send_from_directory from keras.models import load_model from keras.preprocessing import image import numpy as np import cv2 import math from keras.preprocessing import image import tensorflow as tf from sklearn.feature_extraction import image...
108
23.5
105
13
687
python
[{"finding_id": "codeql_py/flask-debug_e1bdab02ee580e60_8ee5630d", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-022" ]
[ "py/flask-debug", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1)." ]
[ 107, 90 ]
[ null, null ]
[ 5, 19 ]
[ 24, 28 ]
2024-11-18T22:00:23.168986+00:00
1,477,172,804,000
313e150b99f73e099a02e7cb3f43ea5e02f640eb
2
{ "blob_id": "313e150b99f73e099a02e7cb3f43ea5e02f640eb", "branch_name": "refs/heads/master", "committer_date": 1477172804000, "content_id": "feac73a2f92693885fcf8190c6207dbaed3eb820", "detected_licenses": [ "MIT" ], "directory_id": "9ab64dabfd1ea60cb3729c3fa0ac4c19e73715eb", "extension": "py", "fi...
2.390625
stackv2
#!/usr/bin/env python3 from jinja2 import Environment, PackageLoader, FileSystemLoader from jinja2.exceptions import UndefinedError from markdown import markdown from datetime import datetime import yaml import argparse import traceback def markdown_filter(value, *args, **kwargs): return markdown(value, *args, *...
54
27.48
75
15
330
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_3880d75837d22ee9_f1ae68f9", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 25 ]
[ null ]
[ 15 ]
[ 56 ]
2024-11-18T22:00:50.259473+00:00
1,430,729,423,000
650d3dd74f23cbfdf37c9e59c5db50ff2f80823d
3
{ "blob_id": "650d3dd74f23cbfdf37c9e59c5db50ff2f80823d", "branch_name": "refs/heads/master", "committer_date": 1430729423000, "content_id": "5e3d65f941af92c12157cefbe7753a0e369e5da6", "detected_licenses": [ "MIT" ], "directory_id": "d880d4734b0fd788bb80b84d85d032547b675918", "extension": "py", "fi...
2.671875
stackv2
''' curl -d definition=a+leg+shirt http://localhost:8000/pants curl http://localhost:8000/pants ''' import tornado.httpserver import tornado.ioloop import tornado.options import tornado.web import pymongo from tornado.options import define,options define("port",default=8000,help="run on the given port",type=int) c...
51
25.65
65
14
353
python
[{"finding_id": "codeql_py/reflective-xss_06033f0e879c6806_0a23c8ee", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability d...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability due to a [user-provided value](2)." ]
[ 44 ]
[ null ]
[ 14 ]
[ 22 ]
2024-11-18T22:01:08.139163+00:00
1,538,159,341,000
e150e998e5879246969d6bb60a699de1688678c8
3
{ "blob_id": "e150e998e5879246969d6bb60a699de1688678c8", "branch_name": "refs/heads/master", "committer_date": 1538159341000, "content_id": "7358e76077b64bbba6a773adae0fa27e41b38abe", "detected_licenses": [ "MIT" ], "directory_id": "a95536ffebffff4f095ea93d0c4da784157901ac", "extension": "py", "fi...
3.328125
stackv2
import re import feelyng.utils.logging as l import nltk logger = l.get_logger(__name__) def lower_case(s): """Transforms an input string into its lower case version. Args: s (str): input string Returns: Lower case of 's'. """ return s.lower() def valid_char(s): """Valid...
70
15.46
62
12
263
python
[{"finding_id": "codeql_py/overly-large-range_891a1ba0f0b7d1d5_7ea1f9fc", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 34 ]
[ null ]
[ 25 ]
[ 28 ]
2024-11-18T22:01:09.184859+00:00
1,521,509,385,000
706017777006aab661902409cea6078b37633702
3
{ "blob_id": "706017777006aab661902409cea6078b37633702", "branch_name": "refs/heads/master", "committer_date": 1521509385000, "content_id": "a0cddbf418c3bf3815861838a7517634b9e65b5d", "detected_licenses": [ "MIT" ], "directory_id": "46c6c3022cc3365b2ce171bb498325066f603482", "extension": "py", "fi...
2.5625
stackv2
import re import datetime import discord from src.btcapi import BTCClient from src.utils import load_text_commands class Commands(object): ''' Class containing static methods to handle messages the bot receives. ''' def __init__(self, client): self.client = client self.commands = { 'convert': {'function...
116
36.12
118
21
1,110
python
[{"finding_id": "codeql_py/overly-large-range_72dc2b9ad7c61cfc_44c9c9ed", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 30, 30 ]
[ null, null ]
[ 22, 32 ]
[ 25, 35 ]
2024-11-18T22:15:10.866469+00:00
1,676,139,610,000
2d9384d20f6d1d58d1b2a4c12e2b9c427fc465b1
3
{ "blob_id": "2d9384d20f6d1d58d1b2a4c12e2b9c427fc465b1", "branch_name": "refs/heads/master", "committer_date": 1676139610000, "content_id": "524c85c761967f92e185a55814074a6000f75531", "detected_licenses": [ "MIT" ], "directory_id": "255e19ddc1bcde0d3d4fe70e01cec9bb724979c9", "extension": "py", "fi...
2.75
stackv2
#!/usr/bin/python3 #coding: utf-8 # Download video from tvple.com import re import requests import bs4 def download_file(url, filename, session=requests): r = session.get(url, stream=True) with open(filename, 'wb') as f: for chunk in r.iter_content(chunk_size=1024): if chunk: ...
66
26.14
71
13
454
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_7a9d13082730d4b9_1c981867", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'tvple.com/v1/player/meta', so it mi...
1
true
[ "CWE-020" ]
[ "py/incomplete-hostname-regexp" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'tvple.com/v1/player/meta', so it might match more hosts than expected." ]
[ 27 ]
[ null ]
[ 28 ]
[ 70 ]
2024-11-18T22:25:57.584722+00:00
1,631,660,151,000
d21f40eba57c70591788be011019bfbb59c357e7
3
{ "blob_id": "d21f40eba57c70591788be011019bfbb59c357e7", "branch_name": "refs/heads/main", "committer_date": 1631660151000, "content_id": "70e8a4f9b58e7739b8681713aaedaa47e78c2d10", "detected_licenses": [ "CC0-1.0" ], "directory_id": "2675528c11e38326dc60fcb9a0feeac66f9643d5", "extension": "py", "...
3.109375
stackv2
#! /usr/bin/python3 from astral import LocationInfo import datetime from astral.sun import sun # location from termux-location city = LocationInfo("Belize City", "BZ", "America/Belize",17.5149, -88.2229) print(( f"Information for {city.name}/{city.region}\n" f"Timezone: {city.timezone}\n" f"Latitude: {city...
33
23.21
76
13
298
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fee17d85b3b1e0ec_910f2cac", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 9 ]
[ 11 ]
[ 5 ]
[ 74 ]
2024-11-18T22:26:08.831148+00:00
1,553,267,044,000
64dd4fbe5400c9422ab94d68efc55b41c67058b8
2
{ "blob_id": "64dd4fbe5400c9422ab94d68efc55b41c67058b8", "branch_name": "refs/heads/master", "committer_date": 1553805426000, "content_id": "cb0a0f082ee4762a0ce19dfd8b8a4f82f22e077f", "detected_licenses": [ "Apache-2.0" ], "directory_id": "5890d7a32dcacb41001cee0c9beaa81011f2d490", "extension": "py"...
2.3125
stackv2
from __future__ import print_function import argparse import os import json import requests import re import sys from collections import namedtuple from parallelm.components import ConnectableComponent from parallelm.common import model_connector_constants from parallelm.mlops.models.model import ModelFormat from par...
147
27.48
104
13
894
python
[{"finding_id": "codeql_py/request-without-cert-validation_57cd7a092185d641_0963e85c", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 75, 86 ]
[ null, null ]
[ 9, 9 ]
[ 63, 62 ]
2024-11-18T20:39:40.255887+00:00
1,613,825,636,000
b9dfcdac0f215e3c2d75b85eedad045646b934df
3
{ "blob_id": "b9dfcdac0f215e3c2d75b85eedad045646b934df", "branch_name": "refs/heads/main", "committer_date": 1613825636000, "content_id": "aa1de288283cfaca538b9e76d175d38b01f2b9fd", "detected_licenses": [ "MIT" ], "directory_id": "58c96e78d69407c346f8ce03f753df78d9652f7c", "extension": "py", "file...
3
stackv2
import string from requests import Session s = Session() s.post("http://10.10.10.195/postlogin", data={"username": "guest", "password": "guest"}) def inject(condition): payload = "'),((SELECT CASE WHEN %s THEN 1 ELSE ZEROBLOB(1000000000) END))--" % condition assert len(payload) <= 140 assert all(x not in ...
34
33.68
95
16
352
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e42e25fbd52f8c94_b1063649", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 34 ]
[ null ]
[ 7 ]
[ 34 ]
2024-11-18T20:39:46.677211+00:00
1,689,879,196,000
aed9aa296abd2a3059b90c300fbaf40fb04d8a3e
2
{ "blob_id": "aed9aa296abd2a3059b90c300fbaf40fb04d8a3e", "branch_name": "refs/heads/main", "committer_date": 1689879196000, "content_id": "2499ded625100b56c2620c48442d698da962c9fc", "detected_licenses": [ "BSD-2-Clause", "BSD-3-Clause" ], "directory_id": "061ed9ee920b935de7d96067d140e538cb4afd0c",...
2.359375
stackv2
import os import re import time import json import stat import email try: # python 2 from Queue import Queue except ImportError: # python 3 from queue import Queue import struct import socket import logging import binascii import base64 import datetime import mimetypes import functools import threading impor...
387
35.73
104
19
3,191
python
[{"finding_id": "codeql_py/url-redirection_f754286d76455234_3aaabe8d", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).\nUntrusted URL redirection depends on a ...
9
true
[ "CWE-601", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/url-redirection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).\nUntrusted URL redirection depends on a [user-provided value](2).", "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2).", "This path depends on a [user-provided value](1).\nThis path depends on a [u...
[ 105, 100, 108, 110, 114, 122, 155, 159, 173 ]
[ null, null, null, null, null, null, null, null, null ]
[ 31, 26, 31, 31, 31, 26, 26, 26, 27 ]
[ 54, 33, 38, 38, 38, 33, 79, 55, 104 ]
2024-11-18T21:08:08.140912+00:00
1,543,820,411,000
6182463aea0845024942d137a04da6555b9498c7
3
{ "blob_id": "6182463aea0845024942d137a04da6555b9498c7", "branch_name": "refs/heads/master", "committer_date": 1543820411000, "content_id": "882e770934883d87cf3368d9807107257093565b", "detected_licenses": [ "MIT" ], "directory_id": "99453718c534ede635ac0d9d9f795f63df7f94bf", "extension": "py", "fi...
2.875
stackv2
import os import sys import smtplib import pyAesCrypt import random import string userdetails =[] def key_generator(size=6, chars=string.ascii_uppercase + string.digits): return ''.join(random.choice(chars) for _ in range(size)) def registration(): print("welome to registration") loop = 'true' while(...
68
34.5
102
20
490
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_38a7a16576afbecc_79b53d14", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 67 ]
[ null ]
[ 11 ]
[ 22 ]
2024-11-18T21:08:10.710913+00:00
1,617,820,651,000
27f63e108019d1c9dbc0180e72256c84ee6b46d4
2
{ "blob_id": "27f63e108019d1c9dbc0180e72256c84ee6b46d4", "branch_name": "refs/heads/main", "committer_date": 1617820651000, "content_id": "1ca08e6f80c29d0d3d8add4b2c409c4f4dac027c", "detected_licenses": [ "MIT" ], "directory_id": "536b97c7aa9252c314bd41aa5e3799edf3e5019a", "extension": "py", "file...
2.40625
stackv2
import os import base64 import locale from datetime import datetime from flask import Flask from flask import render_template from flask import request, jsonify, make_response locale.setlocale(locale.LC_TIME, 'ca_ES.ISO8859-15') app = Flask(__name__) plates = list() os.makedirs('detections', exist_ok=True) @app.rou...
47
22.66
62
13
301
python
[{"finding_id": "codeql_py/flask-debug_f206a31360e94a19_33017c96", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-022" ]
[ "py/flask-debug", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1)." ]
[ 47, 33 ]
[ null, null ]
[ 5, 15 ]
[ 45, 23 ]
2024-11-18T21:31:29.099945+00:00
1,594,871,103,000
5e06d48ba351beac5f889a78f17bb01935b664d2
3
{ "blob_id": "5e06d48ba351beac5f889a78f17bb01935b664d2", "branch_name": "refs/heads/master", "committer_date": 1594871103000, "content_id": "1ededee31cfce9ccfc3c010674c0da0dc0b12a50", "detected_licenses": [ "MIT" ], "directory_id": "969c9d3ef1eda05a3bb6e7039a2f7e6d39744009", "extension": "py", "fi...
2.71875
stackv2
import random import json import logging from flask import Flask, request app = Flask(__name__) logging.basicConfig(level=logging.DEBUG) sessionStorage = {} @app.route("/", methods=['POST']) def main(): logging.info('Request: %r', request.json) response = { "version": request.json['version'], ...
105
40.25
113
14
1,313
python
[{"finding_id": "codeql_py/reflective-xss_f5d7d2e14e7afdf8_280e8b39", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
3
true
[ "CWE-079", "CWE-117", "CWE-117" ]
[ "py/reflective-xss", "py/log-injection", "py/log-injection" ]
[ "HIGH", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 23, 13, 22 ]
[ null, null, null ]
[ 12, 33, 34 ]
[ 62, 45, 42 ]
2024-11-18T21:31:32.795074+00:00
1,571,818,798,000
ee25836acc9c328f81fc47674d91995e0c9bac1f
2
{ "blob_id": "ee25836acc9c328f81fc47674d91995e0c9bac1f", "branch_name": "refs/heads/master", "committer_date": 1571818798000, "content_id": "afcd66456a15a8c22969614a4b8ebbd080e4acc3", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e28d3c6d241c2b6b6cfdcf5f1034ce8ceae94e6a", "extension": "py"...
2.3125
stackv2
#!/usr/bin/env python3 import grp import logging import numbers import os import pickle import pwd # TODO: move the dependent function elsewhere import queue import select import threading import traceback INPUTFD = 4 OUTPUTFD = 5 LOGFD = 6 response_queue = queue.Queue() use_globals = globals() class stream_read...
247
27.37
98
17
1,621
python
[{"finding_id": "codeql_py/overly-permissive-file_ffcad4fc8d399ced_2694a93f", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in open sets file to group readable.", "remediation": "", "location": {...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in open sets file to group readable." ]
[ 53 ]
[ 55 ]
[ 19 ]
[ 32 ]
2024-11-18T21:31:59.619535+00:00
1,605,983,410,000
17a7ea431d4c67af0729b8d88b80f2f0f8c85d1c
2
{ "blob_id": "17a7ea431d4c67af0729b8d88b80f2f0f8c85d1c", "branch_name": "refs/heads/master", "committer_date": 1605983410000, "content_id": "dcc8f5a9bb50ba991dfa9e8d89b468b55ccf0638", "detected_licenses": [ "Apache-2.0" ], "directory_id": "89208352bbeae16beea544a15fa0fd29c7f95369", "extension": "py"...
2.484375
stackv2
from flask import Flask, request, redirect, session import flask as f import json import uuid import os import review_db as db import hashlib as h app = Flask(__name__) app.secret_key = "any random string" def hash_pwd(pwd): md5 = h.md5() md5.update(pwd.encode('utf-8')) return md5.digest().hex() def sa...
131
26.05
110
13
825
python
[{"finding_id": "codeql_py/flask-debug_477b22ee41d79a73_2f6665b7", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-327" ]
[ "py/flask-debug", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)]...
[ 131, 15 ]
[ null, null ]
[ 5, 16 ]
[ 53, 35 ]
2024-11-18T21:32:11.276554+00:00
1,549,002,406,000
e0a6d8a0833920011cc737b405cdaac9ea90e7b0
3
{ "blob_id": "e0a6d8a0833920011cc737b405cdaac9ea90e7b0", "branch_name": "refs/heads/master", "committer_date": 1549002406000, "content_id": "af3b9dd6ab0e775e1507d098e52cf93fa2b04b81", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "0f8f69f1e03fc328b218a0a00cc2b2f929a6d2f8", "extension": "p...
2.640625
stackv2
"""This REST service allows real-time curation and belief updates for a corpus of INDRA Statements.""" import sys import pickle import logging import argparse from flask import Flask, request, jsonify, abort, Response from indra.belief import wm_scorer, BeliefEngine from indra.statements import stmts_from_json_file l...
128
35.54
86
21
1,068
python
[{"finding_id": "codeql_py/reflective-xss_94ba586f198c5c7a_4b265e5a", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
2
true
[ "CWE-079", "CWE-117" ]
[ "py/reflective-xss", "py/log-injection" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 47, 59 ]
[ null, null ]
[ 24, 28 ]
[ 68, 61 ]
2024-11-18T21:32:19.273775+00:00
1,553,638,211,000
0cee2b3d48108ae5010bad8d6791163911fd42d9
3
{ "blob_id": "0cee2b3d48108ae5010bad8d6791163911fd42d9", "branch_name": "refs/heads/master", "committer_date": 1553638211000, "content_id": "1ff0d344ad7c0b56d40c9592b1ae3322e58f9154", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "714cfba0ac34f8ebef290984393bdc2e8824caa6", "extension": "p...
2.546875
stackv2
from six.moves import urllib import tarfile import os DOWNLOAD_DIR='http://portal.nersc.gov/project/desi/users/kburleigh/legacyzpts' def fetch_targz(targz_url, outdir): """downloads targz_url file to outdir, then untars it Args: targz_url: like 'http://www.google.com/path/to/data.tar.gz' outd...
31
29.42
78
12
260
python
[{"finding_id": "codeql_py/tarslip_afce70fa5fa67c56_ec50cb6b", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 26 ]
[ null ]
[ 9 ]
[ 12 ]
2024-11-18T21:32:20.093795+00:00
1,691,154,790,000
332bb9fea2d696670f17cb46aefba2bbe843bda9
2
{ "blob_id": "332bb9fea2d696670f17cb46aefba2bbe843bda9", "branch_name": "refs/heads/master", "committer_date": 1691154790000, "content_id": "78781b05b8ddcff8adddf0254f41259b71f188b9", "detected_licenses": [ "Apache-2.0" ], "directory_id": "4491549f0b1bbf5397ae0b56192605a7abcb61b0", "extension": "py"...
2.328125
stackv2
# import re from flask import Flask, render_template, request, url_for, redirect, session, send_from_directory, make_response from json import dumps from db.db import seed_db from db.users import get_user_by_id, get_user, get_user_by_username, create_user, get_customers from db.comments import get_comments, create_co...
153
30.66
113
19
1,067
python
[{"finding_id": "codeql_py/reflective-xss_beac79a2c2faed51_6ac141e0", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 98, 103 ]
[ null, null ]
[ 16, 16 ]
[ 68, 50 ]
2024-11-18T21:32:20.995625+00:00
1,552,854,851,000
26fedc9419de6cba008c57fb906d7e6168e3756b
3
{ "blob_id": "26fedc9419de6cba008c57fb906d7e6168e3756b", "branch_name": "refs/heads/master", "committer_date": 1552854851000, "content_id": "49d01ff1b78c66ca593ac31fb8e8ee8d7135cfdf", "detected_licenses": [ "MIT" ], "directory_id": "876d574998e61444397ca7cb7d944093b7f15332", "extension": "py", "fi...
2.921875
stackv2
import base64 import binascii from Crypto.Cipher import AES from collections import defaultdict def hex_to_base64(msg): msg = bytearray.fromhex(msg) encoded = base64.b64encode(msg) return encoded.decode('utf-8') def xor_hex_strings(str1, str2): str1 = bytearray.fromhex(str1) str2 = bytearray.fromhex(str2) deco...
207
23.55
74
16
1,662
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_d584df873924b17e_981a2afc", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
1
true
[ "CWE-327" ]
[ "py/weak-cryptographic-algorithm" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 180 ]
[ null ]
[ 12 ]
[ 28 ]
2024-11-18T21:32:23.172388+00:00
1,557,768,528,000
dd1fc7ff535ba2d36c384404c2e9ee14255b738f
2
{ "blob_id": "dd1fc7ff535ba2d36c384404c2e9ee14255b738f", "branch_name": "refs/heads/master", "committer_date": 1557768528000, "content_id": "5b1c5e6464cd83947f77c124bc7a9d9012658981", "detected_licenses": [ "Apache-2.0" ], "directory_id": "54d0e2a465fff88b93b4fbca3029d15d9f97ea9b", "extension": "py"...
2.5
stackv2
import cherrypy from hashlib import sha256 from base64 import b64encode from os import urandom from time import time_ns from pymongo.database import Database from api.helpers import Snowflake from api.base import Base # This class is used for registering a user. @cherrypy.expose class Register(Base): def __init_...
41
33.44
75
20
342
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_dce760ed9798c0a6_ba317e48", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 23 ]
[ null ]
[ 34 ]
[ 62 ]
2024-11-18T21:32:26.481938+00:00
1,441,779,163,000
076cb2f9df5eb9a6e2a3138c2e23ec9cb3dc4c1f
2
{ "blob_id": "076cb2f9df5eb9a6e2a3138c2e23ec9cb3dc4c1f", "branch_name": "refs/heads/master", "committer_date": 1441779163000, "content_id": "b5514fed25fa4e3d9f07da00d696112496f7744e", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "a98021b3877e4f87bc4b7f7fa168636f6c037fb4", "extension": "p...
2.453125
stackv2
from twisted.web.server import Site from twisted.web.resource import Resource from twisted.web.static import File from twisted.internet import reactor from twisted.web.resource import NoResource from twisted.web import server, resource, static import subprocess, os import cgi from calendar import calendar from itertoo...
170
34.28
160
21
1,548
python
[{"finding_id": "codeql_py/reflective-xss_d22afb9ca64085b6_74ae5547", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 55 ]
[ null ]
[ 12 ]
[ 90 ]
2024-11-18T21:33:01.259972+00:00
1,597,365,475,000
044d60aa004fa6e3251fd3ec0b95a6982cab307e
3
{ "blob_id": "044d60aa004fa6e3251fd3ec0b95a6982cab307e", "branch_name": "refs/heads/master", "committer_date": 1597365475000, "content_id": "cbda9f58612f2ce8193a2572d28b6fae0bf75dfc", "detected_licenses": [ "MIT" ], "directory_id": "57ef20f1450c09c024b536b14bf9068408cd125b", "extension": "py", "fi...
2.84375
stackv2
from itsdangerous import URLSafeTimedSerializer as utsr, SignatureExpired, BadSignature import base64 import re class Token: def __init__(self,secret_key): self.secret_key = secret_key self.salt = base64.encodebytes(self.secret_key.encode('utf8')).decode('utf8') def generate_validate_token(self...
34
30.29
87
15
297
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6bf9bcee6ed38f31_8f31f0c8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text." ]
[ 30 ]
[ null ]
[ 11 ]
[ 21 ]
2024-11-18T21:33:03.125189+00:00
1,524,470,519,000
b493a5f038c6a2e0460b9115726f2d619c5c1d99
2
{ "blob_id": "b493a5f038c6a2e0460b9115726f2d619c5c1d99", "branch_name": "refs/heads/master", "committer_date": 1524470519000, "content_id": "d8bf700ab8b4a2773ff2c7e986b944802194d4e4", "detected_licenses": [ "MIT" ], "directory_id": "6e557ce904d26575fc825c3256e7d5afbc663967", "extension": "py", "fi...
2.375
stackv2
from flask import Flask, render_template, request, abort from utils.downloader import download_img,download_thumbnail import sys from evaluate import evaluate, mobilenet, nasnet import os import json app = Flask(__name__) fn = "temp/flask_test.jpg" model = mobilenet() model._make_predict_function() #model2 = nasnet() ...
50
25.76
117
15
349
python
[{"finding_id": "codeql_py/stack-trace-exposure_2b2f572476454edf_4c574b1c", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-215" ]
[ "py/stack-trace-exposure", "py/flask-debug" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger." ]
[ 34, 50 ]
[ null, null ]
[ 20, 5 ]
[ 50, 24 ]
2024-11-18T21:33:08.155482+00:00
1,566,868,758,000
f9fd5893285edc1beaf3ef2da905d04a542a33fd
3
{ "blob_id": "f9fd5893285edc1beaf3ef2da905d04a542a33fd", "branch_name": "refs/heads/master", "committer_date": 1566868758000, "content_id": "4e91f3bafd9983bb9f95d92fb959b5ba8c770a94", "detected_licenses": [ "Apache-2.0" ], "directory_id": "7cfc3e68a9d08f154f653656453366e2117563eb", "extension": "py"...
2.78125
stackv2
## ## Generate and manipulate RSA keypair ## import os import socket import posixpath import rsa class KeyPair: def __init__(self, name=socket.gethostname(), path=None): self.KEYSIZE = 1024 self.state = False self.name = name if not self.load_keys(name, path): self....
64
29.14
66
18
471
python
[{"finding_id": "codeql_py/weak-crypto-key_3121fc0cab317a24_ce77b322", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",...
1
true
[ "CWE-326" ]
[ "py/weak-crypto-key" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable." ]
[ 37 ]
[ null ]
[ 34 ]
[ 59 ]
2024-11-18T21:49:29.077387+00:00
1,625,927,981,000
09231389ccb181716cd0c2a4449a3b9c6cf96414
3
{ "blob_id": "09231389ccb181716cd0c2a4449a3b9c6cf96414", "branch_name": "refs/heads/main", "committer_date": 1625927981000, "content_id": "bb3df549a64eee7554475585f5ed6bf4fad99d76", "detected_licenses": [ "CC0-1.0" ], "directory_id": "6b2f845c8a8f817d790f0023a54ccf736cf49802", "extension": "py", "...
2.515625
stackv2
import jinja2 import pathlib from yaml import load, Loader import markdown import requests import gnupg from datetime import datetime,timezone identities = pathlib.Path("identities") with (identities / "conf.yaml").open() as f: conf = load(f, Loader=Loader) def getsign(message): gpg = gnupg.GPG() sign =...
69
24.25
110
16
453
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_ded0f19aa0f6096d_6c0b483e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 52 ]
[ null ]
[ 17 ]
[ 42 ]
2024-11-18T22:42:09.560851+00:00
1,603,591,433,000
d4d2fbd5621b19a6246e96de373e00db7ac45d53
3
{ "blob_id": "d4d2fbd5621b19a6246e96de373e00db7ac45d53", "branch_name": "refs/heads/master", "committer_date": 1603591433000, "content_id": "7c67a2e601dbcda22f85cbe1af74b8eace392715", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "0af90fd332037d85547446fa5c0a4769ba8e987f", "extension": "p...
2.625
stackv2
import click import jinja2 import os import stat import myhacks as myh file_template = """ #!/usr/bin/env python '''No docstring has been added yet.''' import click import os import myhacks as myh @click.command() @click.argument('parameter', required=False) def run_{{ execname }}(parameter): \'\'\'{{ docstri...
61
18.64
81
12
326
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_2c3d9b6d1522a79f_3f2520a1", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 39 ]
[ null ]
[ 16 ]
[ 46 ]
2024-11-18T20:53:43.711799+00:00
1,599,711,965,000
6368de79a4dac83fb68d06ea2c171d9e946f0ff4
3
{ "blob_id": "6368de79a4dac83fb68d06ea2c171d9e946f0ff4", "branch_name": "refs/heads/master", "committer_date": 1599711965000, "content_id": "f7afb1df4dc8682c54d3708fff34533b6c3286db", "detected_licenses": [ "MIT" ], "directory_id": "71f0d61c636c3c17def0cc357c1500c31886b52b", "extension": "py", "fi...
2.6875
stackv2
from fumblr.keys import IMGUR_SECRET, IMGUR_ID from imgurpython import ImgurClient, helpers import os import base64 API_URL = 'https://api.imgur.com/3/' def get_client(): """ Get an API client for Imgur Returns: Imgur client if it is available """ try: return ImgurClient(IMGUR_ID...
142
19.65
83
13
733
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2e76f80a852b6429_812dd291", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 19 ]
[ null ]
[ 15 ]
[ 83 ]
2024-11-18T21:10:33.561290+00:00
1,515,119,651,000
cc925997ca08a8c66efe5e3300fd52a115ad7bad
2
{ "blob_id": "cc925997ca08a8c66efe5e3300fd52a115ad7bad", "branch_name": "refs/heads/master", "committer_date": 1515120136000, "content_id": "be1678b573a6545dd82c7aff3670258709435d5c", "detected_licenses": [ "MIT" ], "directory_id": "a9c11e10e9388978e3127c52013562c2e6a088a6", "extension": "py", "fi...
2.34375
stackv2
import logging import httplib import requests from werkzeug.exceptions import Unauthorized from flask import request from flask_restful import abort from drift.auth import get_provider_config from drift.core.extensions.schemachecker import check_schema log = logging.getLogger(__name__) # Oculus provider details s...
83
29.53
128
15
531
python
[{"finding_id": "codeql_py/partial-ssrf_8e9011f4164c998f_8227c331", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
2
true
[ "CWE-918", "CWE-117" ]
[ "py/partial-ssrf", "py/log-injection" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 68, 74 ]
[ null, null ]
[ 15, 92 ]
[ 73, 102 ]
2024-11-18T21:10:49.071247+00:00
1,396,547,956,000
ab4012eb4f7aecfc6c6df84423a77ec996737360
3
{ "blob_id": "ab4012eb4f7aecfc6c6df84423a77ec996737360", "branch_name": "refs/heads/master", "committer_date": 1396547983000, "content_id": "f097eea0d6a20b7c74361b74bfd3206b5235b328", "detected_licenses": [ "Apache-2.0" ], "directory_id": "3932c2f0412042c8c1d66705d290de93d82191be", "extension": "py"...
2.53125
stackv2
from copy import deepcopy from datetime import datetime from hashlib import sha1 import json import os import subprocess LOCK_FILE = ".kap10.db.lock" class LockError(RuntimeError): pass class Database(object): def __init__(self, filename): self.filename = filename self.update() self.console = None ...
93
26.13
127
17
613
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_086cd9982a09fed7_d17715eb", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 26 ]
[ null ]
[ 14 ]
[ 22 ]
2024-11-18T21:47:18.922346+00:00
1,625,176,603,000
c6a1b851660cb74507d73efaba99883b04fa9c0c
2
{ "blob_id": "c6a1b851660cb74507d73efaba99883b04fa9c0c", "branch_name": "refs/heads/main", "committer_date": 1625176603000, "content_id": "44d68c65b7dfb5ade20b3dc8a9e3f406faa0270a", "detected_licenses": [ "Unlicense" ], "directory_id": "544320c3df282d33c065c1507cfd1e5ac76f3165", "extension": "py", ...
2.40625
stackv2
import os import toml import requests import shutil from jinja2 import Environment, FileSystemLoader, StrictUndefined from datetime import datetime from rcssmin import cssmin REDIRECTS_PATH = "redirects.toml" TEMPLATE_FOLDER_PATH = "./template" TEMPLATE_HTML = "index.j2" TEMPLATE_CONF = "redirects.j2" UNIA_CSS = "un...
87
25.91
84
15
580
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_89c4ad381424ea27_46ac8e46", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 44, 59 ]
[ 47, 62 ]
[ 11, 11 ]
[ 6, 6 ]
2024-11-18T22:29:00.651163+00:00
1,637,477,487,000
0935a15bad7ca1c8f8a2c7c9adb55e8b65799112
3
{ "blob_id": "0935a15bad7ca1c8f8a2c7c9adb55e8b65799112", "branch_name": "refs/heads/main", "committer_date": 1637477487000, "content_id": "46b50acfd96c23269075a3d8218da477964118ef", "detected_licenses": [ "MIT" ], "directory_id": "5292b03998384c0d2bb5858058892d7e45c5365b", "extension": "py", "file...
2.859375
stackv2
#!/usr/bin/python3 import json import Crypto.Cipher.AES as aes import Crypto.Random as rand from binascii import * import struct import string import sys def debug_print(err): sys.stderr.write(err) from RARsecrets import secrets_server def validate(value, check, minimum=None, maximum=None): valid_types = ["...
222
38.66
178
21
2,352
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ec156dd0c6a7e132_a076cd93", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text.\nThis expression logs [sensitive data (secret)](4) as clear text.\nThis expression logs [sensitive data (secret)](5) a...
[ 193 ]
[ null ]
[ 15 ]
[ 28 ]
2024-11-18T22:29:04.028523+00:00
1,622,006,809,000
bc188b57cb461f012224edfcac32beddf5f12d82
3
{ "blob_id": "bc188b57cb461f012224edfcac32beddf5f12d82", "branch_name": "refs/heads/main", "committer_date": 1622006809000, "content_id": "92901c457049bcfa0b75ddeac529f93305a824b8", "detected_licenses": [ "MIT" ], "directory_id": "487a89c6f1c36836a22ae1c4745c942b67244854", "extension": "py", "file...
3.078125
stackv2
# -*- coding: utf-8 -*- import argparse import re import cloudscraper from bs4 import BeautifulSoup def parse_books(url: str, source: str) -> str: """ Parse the list of titles from a URL. """ scraper = cloudscraper.CloudScraper() data = scraper.get(url).text soup = BeautifulSoup(data, 'html.p...
107
29.14
109
18
813
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_06d053b1d7a8ca60_02d0457c", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [https://www.amazon](1) may be at an arbitrary position...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [https://www.amazon](1) may be at an arbitrary position in the sanitized URL." ]
[ 69 ]
[ null ]
[ 37 ]
[ 78 ]
2024-11-18T22:29:19.994555+00:00
1,536,163,191,000
e37b3ff72208823403bfde8bd5b624c5ee05f842
3
{ "blob_id": "e37b3ff72208823403bfde8bd5b624c5ee05f842", "branch_name": "refs/heads/master", "committer_date": 1536163191000, "content_id": "754e41b7308101242f9445265f4dfdec03f42097", "detected_licenses": [ "Apache-2.0" ], "directory_id": "65c00da42d4e347a3540e6d7815066615858c434", "extension": "py"...
2.609375
stackv2
from pykwalifire.core import Core as yaml_validate from pykwalifire.errors import SchemaError, SchemaConflict import re import requests import yaml import sys import contextlib import requests CFF_CORE_SCHEMA_URL = ("https://raw.githubusercontent.com/citation-file-format" "/schema/{0}/CFF-Core/...
216
29.49
114
19
1,446
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_b40281331bc7edc2_124708df", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [https://github.com](1) may be at an arbitrary position...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [https://github.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 67 ]
[ null ]
[ 12 ]
[ 53 ]
2024-11-18T22:29:21.164073+00:00
1,611,843,605,000
af42b42758260da28eff012f1ebb2fe1696f7ffe
2
{ "blob_id": "af42b42758260da28eff012f1ebb2fe1696f7ffe", "branch_name": "refs/heads/master", "committer_date": 1611843605000, "content_id": "42580767cdce9b61242bc96a2749e8983548f17d", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "ecd75525b29ee54d6b5cde41da4f7e0f5dc3b2f8", "extension": "p...
2.34375
stackv2
import re import logging from functools import wraps # flask inports from flask import abort, request from flask_login import current_user, AnonymousUserMixin from werkzeug.local import LocalProxy # own modules from app import app from app.models.user_models import User from app.controllers import user_controller, p...
192
29.71
120
20
1,247
python
[{"finding_id": "codeql_py/polynomial-redos_f66d43ec20078ff8_228e7537", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with ma...
1
true
[ "CWE-1333" ]
[ "py/polynomial-redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with many repetitions of 'a'." ]
[ 21 ]
[ null ]
[ 31 ]
[ 43 ]
2024-11-18T22:29:33.616498+00:00
1,466,330,936,000
c0e5074b89563cdf2198217e5d9080b67b405be8
3
{ "blob_id": "c0e5074b89563cdf2198217e5d9080b67b405be8", "branch_name": "refs/heads/master", "committer_date": 1466330936000, "content_id": "5b9102c826e08f7d5c6b91f0f28486cde40fd626", "detected_licenses": [ "MIT" ], "directory_id": "b3c287e7bdbea3906a3f0454ea9489484ee03930", "extension": "py", "fi...
2.671875
stackv2
#!/usr/bin/env python import sys import socket import select import ssl import argparse from cgi import parse_qs from BaseHTTPServer import BaseHTTPRequestHandler, HTTPServer class ProxyRequestHandler(BaseHTTPRequestHandler): sockets = {} BUFFER = 1024*50 SOCKET_TIMEOUT = 50 def _get_connection_id(self): retu...
134
26.51
129
19
1,011
python
[{"finding_id": "codeql_py/insecure-default-protocol_5a67a69e45a6b361_c81fa1e0", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in...
1
true
[ "CWE-327" ]
[ "py/insecure-default-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used." ]
[ 130 ]
[ null ]
[ 18 ]
[ 116 ]
2024-11-18T22:29:40.759262+00:00
1,609,431,810,000
a63ed903d6ef52e03a5c707396b1d9529ad182ef
3
{ "blob_id": "a63ed903d6ef52e03a5c707396b1d9529ad182ef", "branch_name": "refs/heads/main", "committer_date": 1609431810000, "content_id": "92b867081c35bb8305c42d020e6fcad7f01f785c", "detected_licenses": [ "MIT" ], "directory_id": "e25866922e6d6b417b6d919aa23e1b817dc22bb9", "extension": "py", "file...
3.171875
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- # https://docs.python.org/3/library/hashlib.html # https://raw.githubusercontent.com/danielmiessler/SecLists/master/Passwords/Common-Credentials/10-million-password-list-top-10000.txt # ministry: 3e98ecfa6a4c765c5522f897a4a8de23 # amigos: c2b592488a765722513420108c466524 ...
53
28.08
160
16
493
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bfdf0b6b40a617f6_45ab7761", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 19 ]
[ null ]
[ 9 ]
[ 160 ]
2024-11-18T22:29:46.590531+00:00
1,615,561,868,000
7d12ab6ac5f249540c74b087628c96a37e80f8b4
3
{ "blob_id": "7d12ab6ac5f249540c74b087628c96a37e80f8b4", "branch_name": "refs/heads/master", "committer_date": 1615561868000, "content_id": "c7150ea7d6481c3c891df88e9ce9f34cb33cb6a1", "detected_licenses": [ "MIT" ], "directory_id": "87ebd5bd04fbc7981adbc768dc9a72023a747264", "extension": "py", "fi...
2.765625
stackv2
from encryption import password_decrypt from getpass import getpass from argparse import ArgumentParser from nfilepicker import select_file, select_folder import sqlite3 import os import hashlib import sys import datetime import os.path import base64 def decrypt_db(): values = get_data() all_done = True p...
114
30.96
112
16
890
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_c9538a8c0b49a135_41b74d6d", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 25 ]
[ null ]
[ 28 ]
[ 31 ]
2024-11-18T22:40:37.001907+00:00
1,532,142,375,000
73ac9438958d2800fff63c4333e4bceb2498904c
2
{ "blob_id": "73ac9438958d2800fff63c4333e4bceb2498904c", "branch_name": "refs/heads/master", "committer_date": 1532142375000, "content_id": "9aecca25ec13ff9c9429250376ae07b45bfdebb6", "detected_licenses": [ "Apache-2.0" ], "directory_id": "afe04cd22c2a839668dd0f29c314cc4b35bc7345", "extension": "py"...
2.40625
stackv2
# coding: utf-8 import hashlib import time import urllib2 # 请替换appkey和secret import requests def useproxy(url,headers,postdata=None,post=False): appkey = "" secret = "c978952ede1661bd5342b34ca0bf561e" paramMap = { "app_key": appkey, "timestamp": time.strftime("%Y-%m-%d %H:%M:%S") # 如果你的程序在...
43
29.33
98
17
411
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_0fa3109966587698_2bb3a6c5", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 21 ]
[ null ]
[ 24 ]
[ 29 ]
2024-11-18T22:54:20.816053+00:00
1,693,477,536,000
74dacaff0e469216d556cdcd136958b73ac1640f
2
{ "blob_id": "74dacaff0e469216d556cdcd136958b73ac1640f", "branch_name": "refs/heads/master", "committer_date": 1693477536000, "content_id": "cecdc3b9b7686d0d04d73f62c46874dee36badb7", "detected_licenses": [ "MIT" ], "directory_id": "c9500ad778b8521aaa85cb7fe3239989efaa4799", "extension": "py", "fi...
2.328125
stackv2
import komand from .schema import DemoteInput, DemoteOutput # Custom imports below import requests class Demote(komand.Action): def __init__(self): super(self.__class__, self).__init__( name="demote", description="Demote admin to ordinary user", input=DemoteInput(), ...
45
34.78
109
17
326
python
[{"finding_id": "codeql_py/request-without-cert-validation_e822b95d8e181401_0c008179", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 22, 39 ]
[ 27, 41 ]
[ 24, 24 ]
[ 14, 14 ]
2024-11-18T22:54:33.078547+00:00
1,612,969,713,000
1fc6d8c92cd2bc109de2e9f7bb26b9eb46088499
3
{ "blob_id": "1fc6d8c92cd2bc109de2e9f7bb26b9eb46088499", "branch_name": "refs/heads/main", "committer_date": 1612969713000, "content_id": "9e0c5e236d2f655d48578e6f9baac4cb9074fbed", "detected_licenses": [ "Apache-2.0" ], "directory_id": "6eb56f2e3f14f2373be07fe95b1c6fedf1e2d49f", "extension": "py", ...
2.546875
stackv2
import random from django.http import HttpResponse, JsonResponse from django.shortcuts import render # Create your views here. from django.utils.decorators import method_decorator from django.views import View from .models import UserProfile import json import hashlib import jwt import time from django.conf import s...
184
30.18
73
20
1,515
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_1c64ae38aab082b2_5e5714ea", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 91 ]
[ null ]
[ 20 ]
[ 39 ]
2024-11-18T22:54:34.655345+00:00
1,555,027,198,000
4cbdf93e87e6f478c391879c1e68ec1760af4326
2
{ "blob_id": "4cbdf93e87e6f478c391879c1e68ec1760af4326", "branch_name": "refs/heads/master", "committer_date": 1555027198000, "content_id": "a1470aef3fd73a78470df1c2937d123de7886f3e", "detected_licenses": [ "MIT" ], "directory_id": "f3d757f421497e19f2de0d3be21b9ae381511577", "extension": "py", "fi...
2.34375
stackv2
import hashlib import random from django.core.exceptions import ObjectDoesNotExist from django.db import models from django.utils import timezone from django.contrib.sites.models import Site from . import sms from .signals import phone_confirmed from .utils import digits_only class PhoneNumberManager(models.Manage...
79
29.38
78
18
453
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_99f0e0760e282f31_6863aa72", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (private)](1) is used in a hashing algorithm (SHA1) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (private)](1) is used in a hashing algorithm (SHA1) that is insecure." ]
[ 59 ]
[ null ]
[ 13 ]
[ 62 ]
2024-11-18T20:55:10.734803+00:00
1,532,456,766,000
0fadbd647f644330ba9ffce925d08263fb70eee8
3
{ "blob_id": "0fadbd647f644330ba9ffce925d08263fb70eee8", "branch_name": "refs/heads/master", "committer_date": 1532456766000, "content_id": "9ec548d0926ac39d9e44e920a437e42ac7fdc18f", "detected_licenses": [ "MIT" ], "directory_id": "0d8f787bd03f47a7472943d2ddad5a75dc9e599b", "extension": "py", "fi...
2.703125
stackv2
from paramiko import SSHClient from scp import SCPClient from subprocess import CalledProcessError import logging import os import paramiko import subprocess import sys class Resource: """ Represents a Virtual Machine object that can execute commands. This class is used to encapsulate all the complexities...
206
39.37
142
18
1,839
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_326ab38161c72d20_7973ae61", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 46 ]
[ null ]
[ 9 ]
[ 69 ]
2024-11-18T20:55:12.480340+00:00
1,539,681,324,000
507f5711a22b39c721a4392aba9d76a0d653e6bc
2
{ "blob_id": "507f5711a22b39c721a4392aba9d76a0d653e6bc", "branch_name": "refs/heads/master", "committer_date": 1539681324000, "content_id": "039b53b57f2403bdb78ce211204f441a32df62d4", "detected_licenses": [ "Unlicense" ], "directory_id": "b13a58ea41c7c0828140af92f0fab655ab45def2", "extension": "py",...
2.359375
stackv2
from flask import render_template, url_for, request, redirect, flash, abort from flask_login import login_required, login_user, logout_user, current_user from thermos import app, db, login_manager from thermos.forms import BookmarkForm, LoginForm, SignupForm from thermos.models import User, Bookmark, Tag @login_ma...
119
30.08
86
17
862
python
[{"finding_id": "codeql_py/url-redirection_8ca0a9343ce2357e_15b10e67", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 80 ]
[ null ]
[ 20 ]
[ 86 ]
2024-11-18T21:07:34.433008+00:00
1,606,690,123,000
275440dc8e382ca8e593505c82b030d640b2e396
3
{ "blob_id": "275440dc8e382ca8e593505c82b030d640b2e396", "branch_name": "refs/heads/main", "committer_date": 1606690123000, "content_id": "0a64e609be8d1f98da958cb1794d40b48cc16685", "detected_licenses": [ "MIT" ], "directory_id": "d97c0cc0af8705f1f7f51ba4cfcdc7719176d122", "extension": "py", "file...
3.078125
stackv2
import hashlib from aocd import data as door_id password1 = '' password2 = [None]*8 password2_found = False index = 0 indicies = set() while not password2_found: door_hash = hashlib.md5(f'{door_id}{index}'.encode()).hexdigest() if door_hash[:5] == '0'*5: if len(password1) != 8: password...
29
21.93
76
14
195
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7cf7e839cfa62f0f_fc33cecf", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 28, 29 ]
[ null, null ]
[ 18, 18 ]
[ 27, 36 ]
2024-11-18T21:33:08.234192+00:00
1,632,925,811,000
5e6af0ba3548e2b59969f2142d5a9becb331ba9a
3
{ "blob_id": "5e6af0ba3548e2b59969f2142d5a9becb331ba9a", "branch_name": "refs/heads/main", "committer_date": 1632925811000, "content_id": "fcb4545e3e064960578a331eb070459872f2e62b", "detected_licenses": [ "MIT" ], "directory_id": "f1661c65e801a845242a9b5977db490f06f14ed0", "extension": "py", "file...
2.515625
stackv2
# -*- coding: utf-8 -*- import sys import os.path import json import getpass import argparse import requests from dotenv import dotenv_values __author__ = 'Victor Knell' __copyright__ = 'Copyright 2021, Palo Alto Networks' __license__ = 'MIT' __version__ = '0.1.0' __maintainer__ = 'Victor Knell' __email__ = 'vknell@...
263
31.08
165
15
1,884
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c739ba994fac30a0_f73a8772", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text.\nThis expression logs [sensitive data (secret)](4) as clear text.\nThis expression logs [sensitive data (secret)](5)...
[ 219, 226 ]
[ null, null ]
[ 19, 19 ]
[ 40, 41 ]
2024-11-18T21:33:15.857615+00:00
1,590,502,991,000
0212b403eb75a02e08e207f572ca9a9d6c054bae
3
{ "blob_id": "0212b403eb75a02e08e207f572ca9a9d6c054bae", "branch_name": "refs/heads/master", "committer_date": 1590502991000, "content_id": "b6feb0ee6f73821afd3462d84fa888f77b7b7cc1", "detected_licenses": [ "MIT" ], "directory_id": "be65a78519d09ee6f8623fa4b5e7670615ffc6c2", "extension": "py", "fi...
2.890625
stackv2
# -*- coding: utf-8 -*- """ Created on Tue May 19 10:31:29 2020 @author: Vincent """ # ============================================================================= # Récupération du csv avec plages de salaire # Ajout de 3 colonnes avec salaire min / max / moyen mensuel -- en cours # =================================...
100
33.05
94
18
861
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_012983015ac77622_87f9f485", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 79 ]
[ null ]
[ 15 ]
[ 20 ]
2024-11-18T21:33:16.824963+00:00
1,604,679,997,000
e013498c2aa2d6513b6920566a0b4247fb3278ff
3
{ "blob_id": "e013498c2aa2d6513b6920566a0b4247fb3278ff", "branch_name": "refs/heads/master", "committer_date": 1604679997000, "content_id": "ac9f97757c9bd4b3be219eed3661674de06cf9e6", "detected_licenses": [ "Apache-2.0" ], "directory_id": "7aebdd6af3c1b39766de9211973a223a56298cfe", "extension": "py"...
2.59375
stackv2
import random import math import config import wavelink import re import time import asyncio from youtube_title_parse import get_artist_title from modules import format_time, database from .spotify_link import SpotifyLink db = database.Connection() class Song(wavelink.Track): def __init__(self, song, song_type=N...
340
33.79
138
20
2,562
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_17c09bc466b1d5eb_3af9762e", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [https://open.spotify.com](1) may be at an arbitrary po...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/incomplete-url-substring-sanitization", "py/overly-large-range" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "The string [https://open.spotify.com](1) may be at an arbitrary position in the sanitized URL.", "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 225, 268 ]
[ null, null ]
[ 16, 45 ]
[ 51, 48 ]
2024-11-18T21:33:32.607937+00:00
1,579,532,845,000
d28660cc294560600bacd42435a11a0e2ec2dfb3
3
{ "blob_id": "d28660cc294560600bacd42435a11a0e2ec2dfb3", "branch_name": "refs/heads/master", "committer_date": 1579532845000, "content_id": "6df8a985bf6a2b5d3e98bf191cdb7953360b3571", "detected_licenses": [ "MIT" ], "directory_id": "e2ca1989dfb79a6f71182767b57e6fe5bc8997ae", "extension": "py", "fi...
2.65625
stackv2
#!/usr/bin/env python3 from cgi import parse_header, parse_multipart from html import escape from http.server import BaseHTTPRequestHandler, HTTPServer from subprocess import PIPE, Popen from urllib.parse import parse_qs INDEX_HTML = """<html> <head><title>CppFormatter</title></head> <body> <textarea name="code" for...
77
30.25
83
16
612
python
[{"finding_id": "codeql_py/command-line-injection_73cbb7ff85a282e2_cd603c18", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {...
1
true
[ "CWE-078" ]
[ "py/command-line-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This command line depends on a [user-provided value](1)." ]
[ 59 ]
[ null ]
[ 19 ]
[ 26 ]
2024-11-18T21:55:41.250258+00:00
1,600,242,245,000
0cdae2aa382595e4c672da116c01f489fe9ad55b
4
{ "blob_id": "0cdae2aa382595e4c672da116c01f489fe9ad55b", "branch_name": "refs/heads/master", "committer_date": 1600242245000, "content_id": "b64c1c293e7f098605459d8e557c0e028048355c", "detected_licenses": [ "MIT" ], "directory_id": "53592c4ce1dad7f96779a2b44c772692a0f46fc3", "extension": "py", "fi...
4.4375
stackv2
# --------python函数 a = 1.238913 result = round(a,2) print(result) # 1.24 会进行4舍5入 # --------函数练习 # 1.实现两个数字的相加 # 2.打印输入的参数 def add(x,y): sum = x+y return sum def print_code(code): print(code) # 相加 b = add(1,2) c = print_code('python') print(b,c) # 执行结果 # python # 3 None # --解释: # 第一个python结果是为在定义print_co...
94
16.65
51
11
746
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fe842832dcedb465_f51d3ba7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 84 ]
[ null ]
[ 11 ]
[ 26 ]
2024-11-18T21:55:42.312108+00:00
1,490,034,864,000
69b820621576a99c3419f6ae972bc9cd05c698ee
3
{ "blob_id": "69b820621576a99c3419f6ae972bc9cd05c698ee", "branch_name": "refs/heads/master", "committer_date": 1490034864000, "content_id": "82963100a7ca2f9419d6d165d2acbc43990ef7c3", "detected_licenses": [ "MIT" ], "directory_id": "34bd8ef71ab211032714253280e1016008ef931a", "extension": "py", "fi...
2.625
stackv2
from lib.util import * import hashlib import lib.util import getpass # TODO Make this work import sys import os loggedUser = "NULL" permissions = "" def addUser(username, password, ftp): currId = 0 for i in open("users.txt", "r"): try: if (i.split(";")[1] == username): re...
103
37.14
167
23
965
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_1e234d186ad00ecc_f85cc85e", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 27 ]
[ null ]
[ 64 ]
[ 88 ]
2024-11-18T22:39:33.136189+00:00
1,575,562,455,000
b0f228ff5e1609190f0b727002ce86f1c711e51f
4
{ "blob_id": "b0f228ff5e1609190f0b727002ce86f1c711e51f", "branch_name": "refs/heads/master", "committer_date": 1575562455000, "content_id": "6d07f6f5f3af0e305dcc4bde05bc6bfd06805984", "detected_licenses": [ "MIT" ], "directory_id": "4046daf6b12fdda5f71550d73dfc9181858f9004", "extension": "py", "fi...
3.5
stackv2
def is_valid_credit_card(number): reversed = str(number)[::-1] is_odd = 0 even_sum = 0 odd_sum = 0 for digit in reversed: if (is_odd % 2 == 0): odd_sum += int(digit) is_odd = 1 else: twice = 2 * int(digit) sum_digits = twice % 10 + twic...
18
25.5
49
14
142
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_431df84b553c2389_f8507d9e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 17 ]
[ null ]
[ 7 ]
[ 31 ]
2024-11-18T22:39:34.559028+00:00
1,564,718,281,000
59559b1051950c45b91a94903e9e6326ed2f0274
2
{ "blob_id": "59559b1051950c45b91a94903e9e6326ed2f0274", "branch_name": "refs/heads/master", "committer_date": 1564718281000, "content_id": "57ab940265276610f5f53baf8d6241d464d4937b", "detected_licenses": [ "MIT" ], "directory_id": "f6dd2dfdb5a374c4db12c15831475b0a641ceee4", "extension": "py", "fi...
2.484375
stackv2
# -------------------------------------------------------- # object detection restful api # author:wang lei # update time:2018-9-21 # -------------------------------------------------------- import sys sys.path.append('../') import cv2 from flask import Flask, jsonify from flask_restful import Resource, Api from flas...
63
27.75
83
19
428
python
[{"finding_id": "codeql_py/stack-trace-exposure_ec847f49ed3a281e_e2b93241", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 49 ]
[ null ]
[ 28 ]
[ 67 ]
2024-11-18T22:39:34.677667+00:00
1,524,709,156,000
6151c5102255187fd473f0835e803021be0dcb65
2
{ "blob_id": "6151c5102255187fd473f0835e803021be0dcb65", "branch_name": "refs/heads/master", "committer_date": 1524709156000, "content_id": "100a2e815848fe7a0601c8b05fceaa1ebc8e480d", "detected_licenses": [ "MIT" ], "directory_id": "1007b08fbdbe7f446f5ed65a0be4a599afd9a5c4", "extension": "py", "fi...
2.5
stackv2
#!/usr/bin/env python import ssl from urllib import request from lulu.common import ( match1, url_info, get_content, ) from lulu.extractor import VideoExtractor class Infoq(VideoExtractor): name = 'InfoQ infoq.com' stream_types = [ {'id': 'video'}, {'id': 'audio'}, {'id'...
70
29.27
78
14
572
python
[{"finding_id": "codeql_py/insecure-protocol_b5e4b0214ecf31e9_25f9f006", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 specified by [call to ssl.SSLContext](1).", "remediation": "", "lo...
1
true
[ "CWE-327" ]
[ "py/insecure-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Insecure SSL/TLS protocol version TLSv1 specified by [call to ssl.SSLContext](1)." ]
[ 41 ]
[ null ]
[ 21 ]
[ 55 ]
2024-11-18T22:55:02.788000+00:00
1,638,408,905,000
58a2293954481351c602c461d146246a34392baa
2
{ "blob_id": "58a2293954481351c602c461d146246a34392baa", "branch_name": "refs/heads/master", "committer_date": 1638408905000, "content_id": "d080fd7e89ba9e8740005dc28823a60070e388ba", "detected_licenses": [ "Apache-2.0" ], "directory_id": "70b178e8edf88110afc03b1b99cd03cfc52daa1a", "extension": "py"...
2.421875
stackv2
from flask import Blueprint main = Blueprint('main', __name__) import json from engine import RecommendationEngine import logging logging.basicConfig(level=logging.INFO) logger = logging.getLogger(__name__) from flask import Flask, request @main.route("/<int:user_id>/ratings/top/<int:count>", methods=["GET"]) d...
51
34.63
86
15
410
python
[{"finding_id": "codeql_py/log-injection_3c90afb3c2134dca_89652ed0", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
3
true
[ "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 15, 21, 21 ]
[ null, null, null ]
[ 51, 59, 68 ]
[ 58, 66, 76 ]
2024-11-18T23:06:16.000795+00:00
1,581,373,316,000
564c8a202aed4213493965a7c0992dfdd7ef7381
3
{ "blob_id": "564c8a202aed4213493965a7c0992dfdd7ef7381", "branch_name": "refs/heads/master", "committer_date": 1581373316000, "content_id": "cb86a215ed40faa0bfeda3f6f3f3139fb62bbfcd", "detected_licenses": [ "MIT" ], "directory_id": "d352279c9fddef92654eb7037b8318af1bbea3a1", "extension": "py", "fi...
2.75
stackv2
#!/usr/bin/python import mysql.connector from mysql.connector import errorcode from datetime import datetime ##=============================================== class DatabaseUtility: def __init__(self, database, tableName): self.db = database self.tableName = tableName f = open('C:\\Users\\susha\\Desktop\\pa...
93
24.55
79
16
609
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ebd7b637af30b607_1efd2c5f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 57, 62 ]
[ null, null ]
[ 10, 11 ]
[ 35, 24 ]
2024-11-18T20:56:54.884835+00:00
1,487,193,057,000
38c2b0c0d60ca0214a6cd896089bb0126871957c
3
{ "blob_id": "38c2b0c0d60ca0214a6cd896089bb0126871957c", "branch_name": "refs/heads/master", "committer_date": 1487193057000, "content_id": "3dd041c59ac57b8f66824f6594229b502cfb9bdc", "detected_licenses": [ "Apache-2.0" ], "directory_id": "f1d1e4bbb373ec6b92c3f0c126b3df95c7d5618a", "extension": "py"...
2.546875
stackv2
import httplib import urllib import ssl from os import path def main_microsoft(args): prediction = {} # Request headers headers = { 'Content-Type': 'application/json', 'Ocp-Apim-Subscription-Key': args.microsoft_key } # Request parameters params = urllib.urlencode({ '...
44
25.45
94
13
287
python
[{"finding_id": "codeql_py/insecure-protocol_d07c6bcbe450ae38_9623ab3c", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 specified by [call to ssl.SSLContext](1).", "remediation": "", "lo...
1
true
[ "CWE-327" ]
[ "py/insecure-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Insecure SSL/TLS protocol version TLSv1 specified by [call to ssl.SSLContext](1)." ]
[ 30 ]
[ null ]
[ 20 ]
[ 54 ]
2024-11-18T20:56:59.898691+00:00
1,561,550,377,000
f16902748aa1528517f8a5c80aacc74af75e04ad
3
{ "blob_id": "f16902748aa1528517f8a5c80aacc74af75e04ad", "branch_name": "refs/heads/master", "committer_date": 1561550377000, "content_id": "11c1ca092157ef009bc0e5aa75637ad948c7f604", "detected_licenses": [ "MIT" ], "directory_id": "31df96388bef38aa3df1fba9e5b1737c27da535e", "extension": "py", "fi...
2.515625
stackv2
from django.shortcuts import render from django.views import View import json, pickle, base64 from django import http from goods.models import SKU from meiduo_mall.utils.response_code import RETCODE from django_redis import get_redis_connection class CarsView(View): """添加购物车""" def post(self, request): ...
324
33.91
99
19
2,687
python
[{"finding_id": "codeql_py/unsafe-deserialization_6f5ac1694274f0a0_b3a0841d", "tool_name": "codeql", "rule_id": "py/unsafe-deserialization", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Unsafe deserialization depends on a [user-provided value](1).", "remediation": "", "locatio...
6
true
[ "CWE-502", "CWE-502", "CWE-502", "CWE-502", "CWE-502", "CWE-502" ]
[ "py/unsafe-deserialization", "py/unsafe-deserialization", "py/unsafe-deserialization", "py/unsafe-deserialization", "py/unsafe-deserialization", "py/unsafe-deserialization" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Unsafe deserialization depends on a [user-provided value](1).", "Unsafe deserialization depends on a [user-provided value](1).", "Unsafe deserialization depends on a [user-provided value](1).", "Unsafe deserialization depends on a [user-provided value](1).", "Unsafe deserialization depends on a [user-provi...
[ 57, 108, 171, 224, 270, 307 ]
[ null, null, null, null, null, null ]
[ 42, 42, 43, 43, 42, 43 ]
[ 52, 77, 79, 79, 78, 79 ]
2024-11-18T20:57:01.018676+00:00
1,518,396,995,000
1e56dfad12b0ca9e35b9e13553720b6655d052cc
3
{ "blob_id": "1e56dfad12b0ca9e35b9e13553720b6655d052cc", "branch_name": "refs/heads/master", "committer_date": 1518396995000, "content_id": "cab62072ee3729261207c555229fe464ebeedf91", "detected_licenses": [ "MIT" ], "directory_id": "f8817c6013b2fff656ac9b21ad8227a05a8d6235", "extension": "py", "fi...
2.515625
stackv2
#!/usr/bin/env python3 from io import StringIO import pandas as pd import traceback import psycopg2 import boto3 import sys import os import pandas._libs.lib as lib from pandas.core.dtypes.missing import isna def connect_to_redshift(dbname, host, user, password, port = 5439): # connect to redshift global conne...
192
36.02
114
20
1,564
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_cb8e34bbca71cc7d_7dd2c6cb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 155 ]
[ null ]
[ 15 ]
[ 24 ]
2024-11-18T22:43:26.838539+00:00
1,565,923,749,000
4c4bed192c80dec927ff41aaf404d6e1cfecff35
2
{ "blob_id": "4c4bed192c80dec927ff41aaf404d6e1cfecff35", "branch_name": "refs/heads/master", "committer_date": 1565923749000, "content_id": "9d19d32ba39259ce78c356523afcbdc559e6b391", "detected_licenses": [ "MIT" ], "directory_id": "8790f93e36e41061cdbed0a168168c469c192c16", "extension": "py", "fi...
2.40625
stackv2
""" Created by yan on 2018/9/27 15:14 """ import os import filetype from flask import request, jsonify import app from app.web import web __author__ = 'yan' basedir = os.path.abspath(os.path.dirname(os.path.dirname(__file__))) @web.route('/upload',methods=['POST']) def upload(): resp = {'code': 200, 'msg': ''...
26
23.65
69
11
183
python
[{"finding_id": "codeql_py/path-injection_82ce1071a37ec688_e544e99a", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 24 ]
[ null ]
[ 15 ]
[ 47 ]
2024-11-18T22:43:33.305362+00:00
1,568,191,697,000
d05f7241cc8648629f6231fc663230a5a81c0525
3
{ "blob_id": "d05f7241cc8648629f6231fc663230a5a81c0525", "branch_name": "refs/heads/master", "committer_date": 1568191697000, "content_id": "d9504a3a888ab991d16267c61dcf27b8a7c60f4b", "detected_licenses": [ "Apache-2.0" ], "directory_id": "1f1b62a23e9267fba41a5f9dc757d2c107d3d7c1", "extension": "py"...
3.109375
stackv2
from Crypto.Cipher import DES class MyDESCrypt: key = chr(11)+chr(11)+chr(11)+chr(11)+chr(11)+chr(11)+chr(11)+chr(11) iv = chr(22)+chr(22)+chr(22)+chr(22)+chr(22)+chr(22)+chr(22)+chr(22) def __init__(self,key='',iv=''): if len(key)> 0: self.key = key if len(iv)>0 : ...
36
28.72
73
18
311
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_92812c7ccfce39fd_89320c18", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The cryptographic algorithm DES](1) is broken or weak, and should not be used.", "r...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[The cryptographic algorithm DES](1) is broken or weak, and should not be used.", "[The cryptographic algorithm DES](1) is broken or weak, and should not be used." ]
[ 22, 33 ]
[ null, null ]
[ 16, 17 ]
[ 43, 37 ]
2024-11-18T22:43:37.814595+00:00
1,556,997,313,000
b2024be2368e2b96f9598f76778ce329defa7d61
2
{ "blob_id": "b2024be2368e2b96f9598f76778ce329defa7d61", "branch_name": "refs/heads/master", "committer_date": 1556997313000, "content_id": "7909e0ffec49b0bf73dd169d12190aee676388b8", "detected_licenses": [ "MIT" ], "directory_id": "2c9e55ca7b9f5ec7348f4ecd094d4258daba9af8", "extension": "py", "fi...
2.5
stackv2
import json from flask import Flask, request, Response, send_from_directory, redirect, flash from flask_login import LoginManager, current_user, login_user from flask_wtf import FlaskForm from wtforms import StringField, PasswordField, BooleanField, SubmitField from wtforms.validators import DataRequired from ..models ...
32
31.72
80
13
217
python
[{"finding_id": "codeql_py/url-redirection_ea9653e89d882035_a234cd94", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 32 ]
[ null ]
[ 25 ]
[ 35 ]
2024-11-18T22:44:09.695737+00:00
1,597,851,367,000
e6c32eb0c8c352c840fce1a3ee4da3f8f75759a0
3
{ "blob_id": "e6c32eb0c8c352c840fce1a3ee4da3f8f75759a0", "branch_name": "refs/heads/master", "committer_date": 1597851367000, "content_id": "64817fa1669b516f2f8387c40c3f1659dd9683b4", "detected_licenses": [ "MIT" ], "directory_id": "785367a9c36571041ce205d33c68fcb880d3a590", "extension": "py", "fi...
2.640625
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- ### Settings ### # Attemp to reconstruct media paths, set to False if you get errors while extracting TRY_PATH_RECONSTRUCT = True # If one of the headers is corrupted, these can help FORCE_NEW_HEADER = False FORCE_OLD_HEADER = False # Name of the output directory EXPORT_...
274
30.08
116
23
2,184
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_70c315ad34e828c0_e8b66cdc", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
1
true
[ "CWE-327" ]
[ "py/weak-cryptographic-algorithm" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 112 ]
[ null ]
[ 18 ]
[ 38 ]
2024-11-18T22:44:11.722651+00:00
1,680,226,379,000
82a2babfec616902303cfef89b497abc78628f9d
2
{ "blob_id": "82a2babfec616902303cfef89b497abc78628f9d", "branch_name": "refs/heads/master", "committer_date": 1680226379000, "content_id": "de80875220116cd5176da8648e2e7e5aaa56ce4c", "detected_licenses": [ "Apache-2.0" ], "directory_id": "1da9347deb8e22971abe791f877e47f4e20b3fe1", "extension": "py"...
2.34375
stackv2
# Copyright 2021 Red Hat # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software...
79
28.67
75
13
515
python
[{"finding_id": "codeql_py/overly-permissive-file_8ba5cc6c5ed8d270_8020100b", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world writable." ]
[ 78 ]
[ null ]
[ 9 ]
[ 34 ]
2024-11-18T22:44:12.964128+00:00
1,554,745,942,000
fed845c3261bd39f5a76d34b5bfdce00e60d7aff
2
{ "blob_id": "fed845c3261bd39f5a76d34b5bfdce00e60d7aff", "branch_name": "refs/heads/master", "committer_date": 1554745942000, "content_id": "e338ee93dd33f06b46322796102b0f3b0d4d1f8f", "detected_licenses": [ "MIT" ], "directory_id": "bcddf027f168a2e1e873117c3f9bcb5b0acf3db9", "extension": "py", "fi...
2.5
stackv2
import base64 import json import os import sys import requests import pyotp from loguru import logger CONFIG_PATH = 'boilerkey_config.json' COUNTER_PATH = 'boilerkey_counter.json' # DO NOT LOSE YOUR WAAAAAAY! __license__ = "WTFPL" __author__ = "Russian election hackers" __credits__ = ['ITaP', 'Mitch Daniels'] de...
152
26.66
79
16
1,017
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_77459e29d7295a56_fb16236b", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [m-1b9bef70.duosecurity.com](1) may be at an arbitrary ...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [m-1b9bef70.duosecurity.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 65 ]
[ null ]
[ 16 ]
[ 52 ]
2024-11-18T23:10:42.724432+00:00
1,591,456,552,000
5f08e396e454f37579bfaeebaf1735cd085b60fa
3
{ "blob_id": "5f08e396e454f37579bfaeebaf1735cd085b60fa", "branch_name": "refs/heads/master", "committer_date": 1591456552000, "content_id": "6eab6d566d97ba8cecc879daf0699f6d5be256dd", "detected_licenses": [ "MIT" ], "directory_id": "ab60d83558f0af545bd83ab026a5d81d1aae6167", "extension": "py", "fi...
2.53125
stackv2
#!/usr/bin/env python import threading import os import json import time import logging import urllib import urllib2 import sh from hashlib import sha256 from uuid import getnode as get_mac logger = logging.getLogger('dcnow') API_ROOT = "https://dcnow-2016.appspot.com" UPDATE_END_POINT = "/api/update/{mac_address}...
112
28.39
108
22
740
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7ec771652363a2d9_9b9f590c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 92 ]
[ null ]
[ 21 ]
[ 64 ]
2024-11-18T23:25:02.141749+00:00
1,552,738,494,000
191a876965a6206023d60d0dcac403b6acd7895f
2
{ "blob_id": "191a876965a6206023d60d0dcac403b6acd7895f", "branch_name": "refs/heads/master", "committer_date": 1552738494000, "content_id": "3e64b88f97ad07687b786d396ff8155ab486d0d3", "detected_licenses": [ "MIT" ], "directory_id": "91b556fc6b83d20939417fed5e3e398308b69080", "extension": "py", "fi...
2.3125
stackv2
import time import hashlib import os import random import re import string import fooster.db import mcp.config import mcp.error users_allowed = '[0-9a-zA-Z-_+][0-9a-zA-Z-_+.]*' key_length = 24 salt_length = 8 token_length = 16 token_lifetime = 4*3600 rand_chars = string.ascii_letters + string.digits rand_rng = ran...
148
22.53
162
14
823
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_c7747a57e89c1a56_6b5ea0cc", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e...
[ 24 ]
[ null ]
[ 27 ]
[ 60 ]
2024-11-18T22:29:31.714432+00:00
1,686,901,173,000
89ecfdadc8cfbdd629c6c157dc88bba984422663
3
{ "blob_id": "89ecfdadc8cfbdd629c6c157dc88bba984422663", "branch_name": "refs/heads/main", "committer_date": 1687259094000, "content_id": "1133f94cbfe08e36d259a516cede0924d8198469", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "1126985fc98d13356a45ed3fd7717afcb490db3f", "extension": "py"...
2.5625
stackv2
#!/usr/bin/env python3 """ Parse the xNVMe header files for auto-generation purposes """ from __future__ import print_function import argparse import copy import logging import os import sys from subprocess import PIPE, Popen import jinja2 DECLARATIONS = { "func": [], "macro": [], "struct": [], "...
199
23.09
79
16
1,191
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_5dd1c86f34812945_6c15b36b", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 139 ]
[ null ]
[ 20 ]
[ 62 ]
2024-11-18T22:29:31.885005+00:00
1,469,950,965,000
05f5df347e09daf030882f4e53f09bdb7f15f7bc
2
{ "blob_id": "05f5df347e09daf030882f4e53f09bdb7f15f7bc", "branch_name": "refs/heads/master", "committer_date": 1469950965000, "content_id": "6e2c171c8bf9651ea05a190043a5399c1d5388ce", "detected_licenses": [ "Apache-2.0" ], "directory_id": "947cc5f04fabf1f094b21c84e257c2850d52e47a", "extension": "py"...
2.421875
stackv2
import urllib.request import urllib.parse import json from Admit import Data # number:the number of a student # birthday: the student's birthday, like 9301 # try_time: the request reconnect times when it broken. def get_admit_result_by_number_and_birthday(number, birthday, try_times=3): if try_times == 0: ...
53
44.7
154
22
750
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_83aead5c47d6c81b_1a48ea91", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.", "This expression stores [sensitive data (private)](1) as clear text." ]
[ 14, 50 ]
[ null, null ]
[ 20, 24 ]
[ 48, 111 ]
2024-11-18T22:29:53.911090+00:00
1,629,821,043,000
75cc5734a9e9b311f2896f02a8434ff301fb474a
3
{ "blob_id": "75cc5734a9e9b311f2896f02a8434ff301fb474a", "branch_name": "refs/heads/master", "committer_date": 1629821043000, "content_id": "2e44f7b6050269265951cdf048fb6304dc564293", "detected_licenses": [ "MIT" ], "directory_id": "8f074fd16c7dfe6a0df4d9dcd0c2351117e52193", "extension": "py", "fi...
3.15625
stackv2
""" lipydomics/util.py Dylan H. Ross 2020/03/17 description: Miscellaneous utility functions that do not quite fit in with other modules """ import re from numpy import sqrt, nan, inf, mean, abs, array from datetime import datetime def abbreviate_sheet(sheet_name): """ abbreviate_sheet ...
285
44.83
157
22
3,580
python
[{"finding_id": "codeql_py/redos_3c89d235dda9fa4f_c189f66a", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '1(0:00:' and containing many repe...
2
true
[ "CWE-1333", "CWE-1333" ]
[ "py/redos", "py/redos" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '1(0:00:' and containing many repetitions of '000:'.", "This part of the regular expression may cause exponential backtracking on strings starting with '1(0:00:' and containing many repetitions of '000:'." ]
[ 154, 154 ]
[ null, null ]
[ 109, 145 ]
[ 115, 151 ]
2024-11-18T22:30:05.640409+00:00
1,555,501,984,000
1722f21843fe01354b4f5ff3130ea5b02b30278c
3
{ "blob_id": "1722f21843fe01354b4f5ff3130ea5b02b30278c", "branch_name": "refs/heads/master", "committer_date": 1555501984000, "content_id": "da55206ed1459f305ea0eb1acf8f879a0a070c6e", "detected_licenses": [ "MIT" ], "directory_id": "e0add23cbed12377bf356bb33495ed2088920a15", "extension": "py", "fi...
2.515625
stackv2
import re import os import toml import json from jinja2 import Template from toca.entity.api import Api from toca.entity.group import Group from toca.entity.service import Service from toca.utils.errors import HTTPMethodError from toca.utils.functions import loadJsonFromFile, getRandomName, getRandomInt, fileObject, g...
152
43.5
108
24
1,242
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_74dc3a5f96950fc5_abfa5665", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 58 ]
[ null ]
[ 19 ]
[ 36 ]
2024-11-18T23:10:12.188589+00:00
1,490,579,345,000
738e9c5e2f6e77b574ffddbf6fa9a0fd16b08e7f
2
{ "blob_id": "738e9c5e2f6e77b574ffddbf6fa9a0fd16b08e7f", "branch_name": "refs/heads/master", "committer_date": 1490579345000, "content_id": "cc7e7df5523a90a7b7132efb9f4e46a520eb7027", "detected_licenses": [ "Apache-2.0" ], "directory_id": "ce15bf73e4b4e31c7b4dfd664d5c229bd7cf44fb", "extension": "py"...
2.484375
stackv2
# -*- coding: utf-8 -*- from flask import Flask, request import sqlite3 import json from sqlite3 import OperationalError app = Flask(__name__) app_name = "/t-helper" def get_daily_word_by_id(id): conn = sqlite3.connect("./t-helper.sqlite") cur = conn.cursor() try: cur.execute("select * from daily...
39
25.1
169
12
290
python
[{"finding_id": "codeql_py/stack-trace-exposure_efe94f098b34a05a_399fb424", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
3
true
[ "CWE-209", "CWE-215", "CWE-089" ]
[ "py/stack-trace-exposure", "py/flask-debug", "py/sql-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This SQL query depends on a [user-provided value](1)." ]
[ 34, 38, 15 ]
[ null, null, null ]
[ 12, 5, 21 ]
[ 31, 51, 61 ]
2024-11-18T23:10:12.865195+00:00
1,615,326,825,000
efecd666a75b96b0fad2f4bc089fa85b19f6d8bc
3
{ "blob_id": "efecd666a75b96b0fad2f4bc089fa85b19f6d8bc", "branch_name": "refs/heads/main", "committer_date": 1615326825000, "content_id": "e28875feb51f5d2bd875b414cce531e82ad58ac8", "detected_licenses": [ "MIT" ], "directory_id": "d4b36f04cd0dc3d97ac0b425e91afc461ee61729", "extension": "py", "file...
3.09375
stackv2
#!/usr/bin/python import argparse import json import requests # reference : https://realpython.com/python-requests/ if __name__ == '__main__': parser = argparse.ArgumentParser( description='Inserts example json into backend using the POST request') parser.add_argument('jsonFile', help='Library data ...
25
26.04
103
10
157
python
[{"finding_id": "codeql_py/request-without-cert-validation_c3575de4b87e16fe_7f00cf76", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 23 ]
[ null ]
[ 16 ]
[ 60 ]
2024-11-18T23:10:17.686188+00:00
1,596,796,186,000
ed3d3ae9c48774710a2fd2bb8f962e7a794af410
3
{ "blob_id": "ed3d3ae9c48774710a2fd2bb8f962e7a794af410", "branch_name": "refs/heads/master", "committer_date": 1596796186000, "content_id": "825d102686c4bc18324877548463192b99f757e7", "detected_licenses": [ "MIT" ], "directory_id": "8cff3912016bfd1a2a877f454484e8ba4776ddff", "extension": "py", "fi...
3
stackv2
import csv import argparse import re parser = argparse.ArgumentParser() parser.add_argument('original') parser.add_argument('noblank') parser.add_argument('result') args = parser.parse_args() def restoreText(original): text = re.sub('[-=+,#/\?:^\n-❛˓◞˂̵✧$.@*\"※~&%ㆍ!』\\‘|\(\)\[\]\<\>`\'…》]', '', original) retu...
37
28.7
90
19
266
python
[{"finding_id": "codeql_py/overly-large-range_63ef78cbd7e75820_15a9f6e0", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[\\n\\u000b\\u000c\\r\\u000e\\u000f\\u0010\\u0011\\u0...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[\\n\\u000b\\u000c\\r\\u000e\\u000f\\u0010\\u0011\\u0012\\u0...." ]
[ 12 ]
[ null ]
[ 31 ]
[ 34 ]
2024-11-18T23:21:45.518307+00:00
1,350,685,312,000
23f91668d64c93881bd8f9a7f21e7dc281faab03
3
{ "blob_id": "23f91668d64c93881bd8f9a7f21e7dc281faab03", "branch_name": "refs/heads/master", "committer_date": 1350685312000, "content_id": "6d48687cf8622ced6a11d41dd42157bac89360ba", "detected_licenses": [ "MIT" ], "directory_id": "1326c24130c225b49b652d5c726329e575284c27", "extension": "py", "fi...
2.609375
stackv2
# -*- coding: utf-8 -*- u""" Contact form class definitions. """ import logging from smtplib import SMTPException from django import forms from django.core import mail from django.template.loader import render_to_string from django.utils.translation import ugettext_lazy as _ from envelope import settings, signals ...
191
31.77
92
17
1,229
python
[{"finding_id": "codeql_py/log-injection_9427b9dc12d36584_81a99301", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 81 ]
[ 82 ]
[ 25 ]
[ 51 ]
2024-11-18T21:33:28.760646+00:00
1,577,414,887,000
e9758285654eff69449a5b4e20126f05f2f27eef
2
{ "blob_id": "e9758285654eff69449a5b4e20126f05f2f27eef", "branch_name": "refs/heads/master", "committer_date": 1577414887000, "content_id": "97196415257dce68531b1c8b8042cde4fd90a20b", "detected_licenses": [ "MIT", "BSD-3-Clause" ], "directory_id": "56abf87c04f7e49989870a327c5e59bec40b4cd1", "ext...
2.3125
stackv2
import os import time import argparse import json import shutil import torch from torch.utils.data.distributed import DistributedSampler from torch.nn import DataParallel from torch.utils.data import DataLoader from distributed import init_distributed, apply_gradient_allreduce, reduce_tensor import math import numpy ...
246
32.07
97
19
1,724
python
[{"finding_id": "codeql_py/overly-permissive-file_2beaa556d382f4f0_727fc271", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world writable." ]
[ 64 ]
[ null ]
[ 13 ]
[ 46 ]
2024-11-18T21:33:31.612691+00:00
1,658,946,170,000
d537f6229c9797bba93c147abe1fad09a58ef216
2
{ "blob_id": "d537f6229c9797bba93c147abe1fad09a58ef216", "branch_name": "refs/heads/master", "committer_date": 1658946170000, "content_id": "32e50b39378be583df443fc6156976f8722a8c9e", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "f5d6e591a9684db43ec6c97c5ab06613ee7e2ec6", "extension": "p...
2.453125
stackv2
import os import re import zipfile from abc import abstractmethod from pathlib import Path from typing import Iterator, Any, Awaitable, Callable, Tuple, Optional, List import asyncpg import click from jinja2 import Environment, FileSystemLoader from settings import AppConfig from .aodataparser import AoDataParser fro...
262
35.66
114
23
2,189
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_72263f730ff49721_e653e1a1", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 139 ]
[ null ]
[ 24 ]
[ 83 ]