added
stringlengths
32
32
created
int64
1,236B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.03
source
stringclasses
1 value
text
stringlengths
330
19.3k
num_lines
int64
16
648
avg_line_length
float64
15.5
59.3
max_line_length
int64
37
179
ast_depth
int64
8
38
length
int64
102
3.79k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.11k
276k
sast_codeql_findings_count
int64
1
33
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
33
rule_ids
listlengths
1
33
confidences
listlengths
1
33
severities
listlengths
1
33
messages
listlengths
1
33
line_starts
listlengths
1
33
line_ends
listlengths
1
33
column_starts
listlengths
1
33
column_ends
listlengths
1
33
2024-11-19T03:44:25.168880+00:00
1,565,986,745,000
474005d2a1718716c1f0089d6df83573d1c2be2e
2
{ "blob_id": "474005d2a1718716c1f0089d6df83573d1c2be2e", "branch_name": "refs/heads/master", "committer_date": 1565986745000, "content_id": "7f44277dc1bee356c940e3890aa8bc1ad146006b", "detected_licenses": [ "Apache-2.0" ], "directory_id": "2bb733fe51534b8ad27539b80135b694fe9402f0", "extension": "py"...
2.46875
stackv2
#!/usr/bin/python import argparse import json import re import requests import sys def send_data(url, data, timeout, cache): # update cache records = {} with open(cache, 'r') as cf: for line in cf: if not line: continue client, checklist = line.split(':::')...
98
35.65
79
17
769
python
[{"finding_id": "codeql_py/request-without-cert-validation_32a27d643a981af0_1ed6c003", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
3
true
[ "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 24, 42, 45 ]
[ 28, 44, 47 ]
[ 5, 9, 9 ]
[ 35, 41, 41 ]
2024-11-19T03:44:25.672519+00:00
1,605,546,486,000
c43d8af9575c2ae20ea4068aaefa49ec72c187ce
3
{ "blob_id": "c43d8af9575c2ae20ea4068aaefa49ec72c187ce", "branch_name": "refs/heads/main", "committer_date": 1605546486000, "content_id": "db35e7d281271fd99c91381f79100931bfcc3a6a", "detected_licenses": [ "MIT" ], "directory_id": "008f17847c643834bf523c9819b12dc9cd2f4285", "extension": "py", "file...
2.921875
stackv2
from cellulariot import * import time import sys import json # Process the ISS data: lat and long def process_iss_data(modem_response): # 'modem_response' is a string, eg. "+QHTTPGET: 0,200,22323" # Check for HTTP error code, the response = modem_response.split(": ") response = response[1].split(",") ...
73
28.38
113
16
548
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b6c1dad03b163f75_e62f069a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 22, 22 ]
[ null, null ]
[ 35, 77 ]
[ 72, 113 ]
2024-11-19T02:08:15.163498+00:00
1,589,521,532,000
f286831c67e995b580c8025c5825910c5275e3c4
3
{ "blob_id": "f286831c67e995b580c8025c5825910c5275e3c4", "branch_name": "refs/heads/master", "committer_date": 1589521532000, "content_id": "936ddd344ed39f597db9270bc5e7ab1acb4d93c0", "detected_licenses": [ "MIT" ], "directory_id": "217e9399ebfce44b985c6eba68b995e205a95204", "extension": "py", "fi...
2.796875
stackv2
import argparse import logging from bs4 import BeautifulSoup import requests import re import youtube_dl import sys # parse arguments passed from command line def parseArguments(): # set up argument parser parser = argparse.ArgumentParser(description='Downloads video playlists hosted on mediaspace.gatech.edu ...
115
34.17
152
13
964
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_a183a6cc405ff136_93fe068f", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'gatech.edu/playlist/details/', so i...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/incomplete-hostname-regexp", "py/incomplete-hostname-regexp" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'gatech.edu/playlist/details/', so it might match more hosts than expected.", "This regular expression has an unescaped '.' before 'kaltura.com/p', so it might match more hosts than expected." ]
[ 21, 42 ]
[ null, null ]
[ 34, 61 ]
[ 89, 94 ]
2024-11-19T02:08:42.372923+00:00
1,551,187,783,000
57a32cc10f36bd1a1db8dcf6db7a8231d2f938b9
3
{ "blob_id": "57a32cc10f36bd1a1db8dcf6db7a8231d2f938b9", "branch_name": "refs/heads/master", "committer_date": 1551187783000, "content_id": "10a0e8f65f47688c9adfe1c3c198444dda220bd7", "detected_licenses": [ "Unlicense" ], "directory_id": "2e802250a6e76e3c9b7fe517eeba21172361b2ce", "extension": "py",...
2.734375
stackv2
import paramiko import time def ssh_connect(): #Variables ip = '192.168.146.132' username = 'admin' password = 'cisco' #create SSH object remote_ssh = paramiko.SSHClient() #add untrusted hosts to SSH remote_ssh.set_missing_host_key_policy( ...
47
26.64
108
9
317
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_40dd7fd7e235c625_0ecc4c62", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 14 ]
[ 15 ]
[ 9 ]
[ 42 ]
2024-11-19T02:21:26.400706+00:00
1,676,139,610,000
ed698c166ef5b8e5444145f80b23189167977626
3
{ "blob_id": "ed698c166ef5b8e5444145f80b23189167977626", "branch_name": "refs/heads/master", "committer_date": 1676139610000, "content_id": "02e64d9de74ab1028e8b7604a5dd287d0657bd72", "detected_licenses": [ "MIT" ], "directory_id": "255e19ddc1bcde0d3d4fe70e01cec9bb724979c9", "extension": "py", "fi...
2.78125
stackv2
from flask import Flask from flask import request app = Flask(__name__) #Normally this would be an external file like object, but here #it's inlined FORM_PAGE = """ <html> <head> <title>Flask Form</title> </head> <body> <form action="/process" method="POST"> ...
55
34.31
109
14
436
python
[{"finding_id": "codeql_py/reflective-xss_91743ff54941bf93_e5bbcca3", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 52 ]
[ null ]
[ 12 ]
[ 20 ]
2024-11-19T02:21:29.256404+00:00
1,529,634,462,000
ab565b58704e1b129ba0c067d5f6c36452d39b27
3
{ "blob_id": "ab565b58704e1b129ba0c067d5f6c36452d39b27", "branch_name": "refs/heads/master", "committer_date": 1529634462000, "content_id": "ad685e7da7ade6a8bc24b265f66c8b670f4f63fd", "detected_licenses": [ "MIT" ], "directory_id": "870c1a9c569e12918598d3e7eb25e66a7eb667a0", "extension": "py", "fi...
2.734375
stackv2
''' APP层 收发消息的功能事实上是基于layer3的APP,应该整理到这里,而不是放在main里面 而且这样也可以扩展出很多其他APP ''' from .layer3 import P2P from .services.keys import GetKey import rsa class Chat(object): def __init__(self, groupname): self.down = P2P(groupname) def send(self): friends = list(self.down.trust.items()) for i in...
36
31.17
88
15
322
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3b933d27d745bfb3_50216cbf", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 17, 31 ]
[ null, null ]
[ 45, 45 ]
[ 65, 65 ]
2024-11-19T02:21:34.561142+00:00
1,504,249,281,000
57745aeeaa2a0fee7d680c48c3f301cfadc8aa51
2
{ "blob_id": "57745aeeaa2a0fee7d680c48c3f301cfadc8aa51", "branch_name": "refs/heads/master", "committer_date": 1504249281000, "content_id": "78903c760abe29c4cd4ae165ca0594f46215fd5a", "detected_licenses": [ "MIT" ], "directory_id": "45bd296034f2aab55cad2ac04e8821d37029aa46", "extension": "py", "fi...
2.40625
stackv2
#!/usr/bin/env python #CODE HELP FROM https://code.google.com/p/threepress/source/browse/trunk/bookworm/database-backup.py import sys import os.path import os import logging from datetime import datetime from django.conf import settings import boto.s3 logging.basicConfig(level=logging.INFO, stream=sys.stdout) PG_CM...
122
31.99
143
13
1,044
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_96531928ccde9d89_3eed4f71", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 51 ]
[ null ]
[ 19 ]
[ 54 ]
2024-11-19T02:21:39.270755+00:00
1,620,324,487,000
51e5b79d11b182b470923af5abdc7f3d69f77803
3
{ "blob_id": "51e5b79d11b182b470923af5abdc7f3d69f77803", "branch_name": "refs/heads/main", "committer_date": 1620324487000, "content_id": "c8149a1e6d38e05f30d821e0ce10f2020e2333ab", "detected_licenses": [ "Apache-2.0" ], "directory_id": "0a34957ee9c354362f5d8bb21f8f72531808135e", "extension": "py", ...
2.9375
stackv2
import subprocess import optparse def get_arguments(): parser=optparse.OptionParser() parser.add_option("-i","--interface", dest="interface", help="interface to change mac address") parser.add_option("-m","--mac_address", dest="mac_address", help="it will change to new mac address ") (options, argument...
40
24.75
106
11
223
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e9f50f8030968046_f7ccbd08", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 16 ]
[ null ]
[ 11 ]
[ 76 ]
2024-11-19T02:58:15.624667+00:00
1,629,359,675,000
a68e94ec1b9b080f86110aeac7ceac7ae2d4fe68
2
{ "blob_id": "a68e94ec1b9b080f86110aeac7ceac7ae2d4fe68", "branch_name": "refs/heads/master", "committer_date": 1629359675000, "content_id": "e9bcba913ea9bb9dff8b8968cb3ce44ac48cce47", "detected_licenses": [ "MIT" ], "directory_id": "473d5b0f9ad809dbb17f2c63179db36164fe5691", "extension": "py", "fi...
2.390625
stackv2
from slackclient import SlackClient from flask import Flask, request, Response, jsonify import json import requests app = Flask(__name__) SLACK_TOKEN = '---' slack_client = SlackClient(SLACK_TOKEN) slack_token = '---' def send_message(channel_id, message,user): slack_client.api_call( "chat.postMessage",...
48
24.46
51
13
314
python
[{"finding_id": "codeql_py/flask-debug_1c9dc4602e919905_643e4f50", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 48, 27 ]
[ null, null ]
[ 2, 10 ]
[ 47, 43 ]
2024-11-19T03:10:03.420753+00:00
1,576,690,473,000
a85a378db8c55430978fc38e8f460c73699aa933
3
{ "blob_id": "a85a378db8c55430978fc38e8f460c73699aa933", "branch_name": "refs/heads/master", "committer_date": 1576690473000, "content_id": "b225d501acb580fedd337ee900974931a88a7ab7", "detected_licenses": [ "MIT" ], "directory_id": "6ee970f1ec0e61512098005cfede311c8c7ab8a5", "extension": "py", "fi...
2.515625
stackv2
from urllib.request import urlopen from urllib.parse import urlencode from bs4 import BeautifulSoup import multiprocessing as mp from io import StringIO import pandas as pd import sqlite3 import tarfile import shutil import time import json import re import os #Download de arquivo def Download(url, folder="."): fi...
319
40.79
160
22
3,416
python
[{"finding_id": "codeql_py/tarslip_0d88bef8a8f12b76_b467b59f", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 34 ]
[ null ]
[ 5 ]
[ 8 ]
2024-11-19T03:10:09.452432+00:00
1,632,145,044,000
6a3f005d3da2cbda1dff1bc0d727f0a4d6ad9d91
2
{ "blob_id": "6a3f005d3da2cbda1dff1bc0d727f0a4d6ad9d91", "branch_name": "refs/heads/main", "committer_date": 1632145044000, "content_id": "370620842d154430dfa6f41036b0ed002dc56370", "detected_licenses": [ "MIT" ], "directory_id": "f7815aea45dc5dac3b418cee8a543a39a5abf2e3", "extension": "py", "file...
2.40625
stackv2
import hashlib import base64 import os import uuid from datetime import datetime def encrypt_password(password): salt = os.urandom(16) hashed = hashlib.sha512(password.encode('utf8')+salt).digest() return base64.b64encode(salt + hashed) # 108 chars fixed def compare_password(raw, encrypted): try: ...
250
32.88
136
16
2,073
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_1bfae3c878957a9a_dd4d1c1e", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally e...
[ 11, 20 ]
[ null, null ]
[ 29, 33 ]
[ 57, 56 ]
2024-11-19T03:10:19.029680+00:00
1,693,417,914,000
c54fc8688b0d2b7733592f86e91d8cef7420f307
3
{ "blob_id": "c54fc8688b0d2b7733592f86e91d8cef7420f307", "branch_name": "refs/heads/master", "committer_date": 1693417914000, "content_id": "3fd148aa3a4302bc194ba69d6ec95aa482411523", "detected_licenses": [ "CC0-1.0", "MIT" ], "directory_id": "71acb7214efd91c0d327f6d8958e1798eadb4401", "extensio...
2.828125
stackv2
import re from urllib.parse import parse_qs, urlsplit def _get_possible_links(response): yield from response.xpath('//img[contains(@src, "maps/api/staticmap")]/@src').getall() yield from response.xpath('//iframe[contains(@src, "maps/embed")]/@src').getall() yield from response.xpath("//a[contains(@href, '...
96
41.65
103
20
1,072
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_8c19862a6325d6f7_8bea8372", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [maps.apple.com](1) may be at an arbitrary position in ...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [maps.apple.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 81 ]
[ null ]
[ 10 ]
[ 33 ]
2024-11-19T03:22:47.440785+00:00
1,511,265,627,000
40f4ebf613627c2aef01ed269ef40421b3def1dc
3
{ "blob_id": "40f4ebf613627c2aef01ed269ef40421b3def1dc", "branch_name": "refs/heads/master", "committer_date": 1511265627000, "content_id": "e2e7deb337c30c3b92c70c7e143eefa04952e873", "detected_licenses": [ "MIT" ], "directory_id": "29b089355e5f30561e7303e66a5375d521997ccc", "extension": "py", "fi...
3.125
stackv2
# coding=utf-8 # alexa_skill.py # By # # Alexa skill api import logging import os import time from datetime import datetime from random import randint import requests from flask import Flask, render_template from flask_ask import Ask, question, statement __author__ = os.environ.get('author_name') __email__ = os.env...
371
24.17
120
15
2,137
python
[{"finding_id": "codeql_py/flask-debug_bdf968b239fc1257_6615bdc0", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-295", "CWE-295" ]
[ "py/flask-debug", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "HIGH", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This request may run without certificate validation because [it is disabled](1) by [this value](2).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 371, 149, 176 ]
[ null, null, null ]
[ 5, 15, 5 ]
[ 24, 50, 85 ]
2024-11-19T03:22:49.819758+00:00
1,665,754,395,000
b79148339ba45a3dc90033175ddd0846fb822428
3
{ "blob_id": "b79148339ba45a3dc90033175ddd0846fb822428", "branch_name": "refs/heads/master", "committer_date": 1665754395000, "content_id": "92cfae01f1412105c4e967b67391123b6f3f6ea0", "detected_licenses": [ "MIT" ], "directory_id": "c13be69d0960a4af8116e9173a2ad465df0af728", "extension": "py", "fi...
2.546875
stackv2
""" File used to make requests to Google APIs ----------- Generative Adversarial Networks (GAN) research applied to the phishing detection. University of Gloucestershire Author : Pierrick ROBIC--BUTEZ 2019 Copyright (c) 2019 Khuzd """ import logging import time from socket import error import json import requests fro...
117
31.1
119
23
894
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2d210206144b9963_cf3eec48", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 110 ]
[ null ]
[ 15 ]
[ 18 ]
2024-11-19T03:22:57.472711+00:00
1,530,541,768,000
d374060c83f57517e80bbc387a2de00e200ec142
3
{ "blob_id": "d374060c83f57517e80bbc387a2de00e200ec142", "branch_name": "refs/heads/master", "committer_date": 1530541768000, "content_id": "299b1ea515bfa1b605c613ffa8d475051bd8389d", "detected_licenses": [ "MIT" ], "directory_id": "7c8a0b6893f55424e2fa6259f0f8911c207a1823", "extension": "py", "fi...
3.09375
stackv2
class UserData: """ A class that geerates new instances of a user account data """ start=0 users=dict() def __init__(self, username,master_password): ''' Method for defining the instances of the object of the class ''' self.username=username self.master_pa...
36
29.61
102
11
238
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_548e3abb4165bc1c_a18a7b3c", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 35, 30 ]
[ null, null ]
[ 20, 15 ]
[ 28, 102 ]
2024-11-19T03:23:00.044125+00:00
1,635,451,009,000
e097f33dfb1878aac76a2cec83bacf74e245b5c1
2
{ "blob_id": "e097f33dfb1878aac76a2cec83bacf74e245b5c1", "branch_name": "refs/heads/master", "committer_date": 1635451009000, "content_id": "b317945f27f85c8e951b8fdca974777ce5b01881", "detected_licenses": [ "MIT" ], "directory_id": "49335de0b379386e22119b8c5d72601e1f59d3de", "extension": "py", "fi...
2.46875
stackv2
from prefect import task, Flow, Parameter, client from prefect.tasks.secrets import PrefectSecret from prefect.tasks.airtable.airtable import WriteAirtableRow import googlemaps from datetime import datetime airtable_key = PrefectSecret('AIRTABLE') gmaps_key = PrefectSecret('GMAPS') @task def getDrivingDistance(home, ...
40
40.92
128
11
410
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_70ffecec2bb3f863_fe558cd5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 12 ]
[ null ]
[ 11 ]
[ 16 ]
2024-11-19T03:44:01.835891+00:00
1,595,332,099,000
7e9d739dc79bd97e40dbba06348d03beefacf69c
2
{ "blob_id": "7e9d739dc79bd97e40dbba06348d03beefacf69c", "branch_name": "refs/heads/master", "committer_date": 1595332099000, "content_id": "b840dc1168af2d2641335a3a5984d104614a663a", "detected_licenses": [ "Apache-2.0" ], "directory_id": "511e39f07fe444c9cab4c6eede13af8350289cdf", "extension": "py"...
2.328125
stackv2
import collections import contextlib import datetime import multiprocessing import os import shutil import sys import socket import tempfile import threading import jinja2 import yaml @contextlib.contextmanager def temp_dir(): path = tempfile.mkdtemp(dir=os.environ.get('TEMP')) try: yield path fi...
147
25.62
120
21
907
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_8b218973b4e7a885_70695337", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 130 ]
[ 139 ]
[ 11 ]
[ 6 ]
2024-11-19T01:34:53.907620+00:00
1,604,653,091,000
9811ceb9e9036567a89ca84e6a6a5522db0e252d
3
{ "blob_id": "9811ceb9e9036567a89ca84e6a6a5522db0e252d", "branch_name": "refs/heads/master", "committer_date": 1604653091000, "content_id": "76f61c4101ba69dc1d5bbfe0386f6f7b10008120", "detected_licenses": [ "MIT" ], "directory_id": "34ba661c593167e2aaa4da6cda5a638524ea8823", "extension": "py", "fi...
2.9375
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- """ Sample script to get iEL entries via Redfish REST API in Fujitsu PRIMERGY [Usage] - Show all events $ python get_iel.py -i 192.168.10.10 -u admin -p admin - Show all events (ascending) $ python get_iel.py -i 192.168.10.10 -u admin -p admin -r - Show...
105
31.48
105
24
867
python
[{"finding_id": "codeql_py/request-without-cert-validation_d6d79885d1993e98_ec099588", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 36 ]
[ 41 ]
[ 16 ]
[ 6 ]
2024-11-19T01:34:54.305059+00:00
1,609,377,676,000
f4be390cb45e18e8a1a55a652d9742868d4c188a
3
{ "blob_id": "f4be390cb45e18e8a1a55a652d9742868d4c188a", "branch_name": "refs/heads/main", "committer_date": 1609377676000, "content_id": "21ee30982e79207bd9c7b40230537bae4ffda8de", "detected_licenses": [ "MIT" ], "directory_id": "39aa9f4af78b31deb21d669225b4bb97f55b7df9", "extension": "py", "file...
2.734375
stackv2
from secrets import compare_digest from functools import cached_property import sqlite3 from system.data_user import User as du from system.sql import SQLCommands as sqlc from system.info_types import InfoTypes as it class User: """ A real implementation of the user data class """ def __init__(self): ...
103
28.69
74
20
627
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2ae8984ea8c2d759_aed6e540", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 102 ]
[ null ]
[ 7 ]
[ 47 ]
2024-11-19T01:35:05.887513+00:00
1,619,113,952,000
f9e8f6a778852b375d62361ca62c091fa0ce6e7c
3
{ "blob_id": "f9e8f6a778852b375d62361ca62c091fa0ce6e7c", "branch_name": "refs/heads/master", "committer_date": 1619113952000, "content_id": "19a088cc8f507737b80ab71db32f4018b494c0d7", "detected_licenses": [ "Apache-2.0" ], "directory_id": "05ed9ff2d74c4f17d69424be8fffc5746482f8ad", "extension": "py"...
2.703125
stackv2
# #https://medium.com/@lily_su/accessing-s3-bucket-from-google-colab-16f7ee6c5b51 import os import s3fs class AWS(object): def __init__(self, path_config): self.path_config= path_config self.fs = s3fs.S3FileSystem() def generate_session_file(self,service_name,key_id,secret_key,region_n...
26
33.19
81
13
213
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_03e9307f8b5e5e9e_ffb72801", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (secret)](1) as clear text." ]
[ 19 ]
[ null ]
[ 21 ]
[ 25 ]
2024-11-19T02:08:09.024978+00:00
1,538,483,257,000
778ad3dd99325c0e81321814eb7ccf6b9b005946
3
{ "blob_id": "778ad3dd99325c0e81321814eb7ccf6b9b005946", "branch_name": "refs/heads/master", "committer_date": 1538483257000, "content_id": "5519360cfdce129d6a7f3390e83136b21bf8ddb6", "detected_licenses": [ "MIT" ], "directory_id": "945b7bb0b86652c936b40e4a1850188d229aa8e7", "extension": "py", "fi...
2.734375
stackv2
import requests import json url = 'https://localhost:8081/login' data = {'username': 'admin', 'password': 'admin'} try: # Issue is here, gives the error token = requests.post(url, data = json.dumps(data), headers = {'Content-type':'application/json'}) print('Status Code: ', token.status_code) token_json = json....
22
37.95
116
12
210
python
[{"finding_id": "codeql_py/request-without-cert-validation_7bfa4bfbd7d93a19_87dde935", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 17 ]
[ null ]
[ 11 ]
[ 117 ]
2024-11-19T02:17:16.853569+00:00
1,609,074,339,000
6247ddeb0d4b7ee9eafeee5ddd1b4eae88a06828
4
{ "blob_id": "6247ddeb0d4b7ee9eafeee5ddd1b4eae88a06828", "branch_name": "refs/heads/main", "committer_date": 1609074339000, "content_id": "aaf18987a2e3781fb80de060c03c47445d7a66c8", "detected_licenses": [ "MIT" ], "directory_id": "562efe351ea884732d94e93fb6ba6f25b3c2844d", "extension": "py", "file...
3.953125
stackv2
import random import math class SameNumError(Exception): def __init__(self): pass def is_prime_number(n): for i in range(2, n): if n % i == 0: return False return True def make_prime_list(n): prime_list = [] for i in range(2, n): if math.gcd(n, i) == 1: ...
78
23.54
62
12
552
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e70bbcafa291fc05_79eae65d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 68 ]
[ null ]
[ 7 ]
[ 38 ]
2024-11-19T02:18:09.672125+00:00
1,484,571,456,000
087bf57644f55777680937e8627e9c602b4e8667
3
{ "blob_id": "087bf57644f55777680937e8627e9c602b4e8667", "branch_name": "refs/heads/master", "committer_date": 1484571456000, "content_id": "8008e4261d1786173d80c4e773879cf10a207a54", "detected_licenses": [ "MIT" ], "directory_id": "a665d555e7741fa3d6b663283c29287d9d2ade36", "extension": "py", "fi...
2.6875
stackv2
import jinja2 import click import os import yaml @click.command() @click.option('--config', '-c', type=click.File(mode='r'), default='./config.yml', help="Location of the config file. Defaults to ./config.yml") @click.option('--skip-empty/--no-skip-empty', help="When set any template that produces an all whitepace res...
52
47.92
157
22
623
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_87074d196ee77d34_1f97f507", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 22 ]
[ null ]
[ 15 ]
[ 67 ]
2024-11-19T02:19:03.174042+00:00
1,626,117,656,000
a586c8503fab81f37eb72119d682635ef20d636e
3
{ "blob_id": "a586c8503fab81f37eb72119d682635ef20d636e", "branch_name": "refs/heads/main", "committer_date": 1626117656000, "content_id": "58c307307dd73cc587298f65f61e74e37b5c3e5b", "detected_licenses": [ "Apache-2.0" ], "directory_id": "fb8666ba2f687441fb462482ddc2465669ab815f", "extension": "py", ...
2.921875
stackv2
import os import json import requests from pprint import pprint from urllib3.exceptions import InsecureRequestWarning requests.packages.urllib3.disable_warnings(category=InsecureRequestWarning) # Constants, including ID from previously created object BASE_URL = "https://netbox.lasthop.io/api/" # ADDRESS_ID = "51" A...
46
26.61
79
11
313
python
[{"finding_id": "codeql_py/request-without-cert-validation_f5c8441144cc6411_4567d66c", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 31 ]
[ 36 ]
[ 12 ]
[ 6 ]
2024-11-19T02:29:57.206699+00:00
1,677,900,649,000
829ddbc6d8c8e421c6e73abf6b1c04c0f499bc07
3
{ "blob_id": "829ddbc6d8c8e421c6e73abf6b1c04c0f499bc07", "branch_name": "refs/heads/main", "committer_date": 1677900649000, "content_id": "24f3fd94ab922c209c5f701fe7e71a0f366725c1", "detected_licenses": [ "Apache-2.0" ], "directory_id": "3eb78230ac1700a95c0d4fcad3653251088a2b57", "extension": "py", ...
2.609375
stackv2
# Copyright 2022 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # https://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, ...
121
47.51
130
18
1,680
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_ddccf37a44c75503_c312d66d", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [linkedin.com](1) may be at an arbitrary position in th...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [linkedin.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 86 ]
[ null ]
[ 8 ]
[ 60 ]
2024-11-19T02:30:16.051655+00:00
1,687,854,217,000
3f8473a0a26f92f8ea957b09c60997bfa7d9505d
3
{ "blob_id": "3f8473a0a26f92f8ea957b09c60997bfa7d9505d", "branch_name": "refs/heads/master", "committer_date": 1687854217000, "content_id": "87a7bec31ed0463b3e5755c899e7bf18de19cf2a", "detected_licenses": [ "MIT" ], "directory_id": "dbfd72349e10863d3b6bde2605efb04a5a2823cb", "extension": "py", "fi...
2.71875
stackv2
from functools import wraps from flask import jsonify from app.pkgs.errors import Error, HttpStatusCode class JsonResponse(object): def __init__(self, d=None, http_status: int = 200): if d is None: d = {} self.data: dict = d self.http_status = http_status def to_json(self)...
34
27.29
109
19
210
python
[{"finding_id": "codeql_py/stack-trace-exposure_cbb4106b36518708_ef80299d", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 28 ]
[ null ]
[ 45 ]
[ 71 ]
2024-11-19T02:30:24.182537+00:00
1,574,775,516,000
e13dafa7da38ee175b64f77c0b04065176c2f594
2
{ "blob_id": "e13dafa7da38ee175b64f77c0b04065176c2f594", "branch_name": "refs/heads/master", "committer_date": 1574775516000, "content_id": "d3ad400d081628994812bbbf6f554a9847cdfb75", "detected_licenses": [ "MIT" ], "directory_id": "a41542bacafd67f0556436f93ace9dd206bb5029", "extension": "py", "fi...
2.375
stackv2
from flask import render_template, flash, redirect, url_for, request import requests from app import app, db from app.forms import LoginForm, RegistrationForm from app.models import User, Liste_series,Notification from flask_login import current_user, login_user, logout_user, login_required from werkzeug.urls import ur...
341
43.16
142
27
3,374
python
[{"finding_id": "codeql_py/url-redirection_7f645bc88a7cd273_10de8417", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 303 ]
[ null ]
[ 29 ]
[ 38 ]
2024-11-19T02:30:30.498875+00:00
1,634,631,547,000
c3b02f2f1a6cf929deb4fb1ff6430312733e9e86
3
{ "blob_id": "c3b02f2f1a6cf929deb4fb1ff6430312733e9e86", "branch_name": "refs/heads/master", "committer_date": 1634631547000, "content_id": "df6b80cfe06d2551a912940465ebd8a4621bf4d5", "detected_licenses": [ "MIT" ], "directory_id": "034472fa6288d84d79be868514779303349e7603", "extension": "py", "fi...
2.890625
stackv2
from flask import Flask, abort, redirect app = Flask(__name__) import argparse, os, pygments from pygments import highlight from pygments.lexers import guess_lexer from pygments.formatters import HtmlFormatter parser = argparse.ArgumentParser() parser.add_argument("root_dir", help="Path to directory with pastes") arg...
51
25.98
69
14
321
python
[{"finding_id": "codeql_py/path-injection_9eed760292e45c7a_0150b6e1", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 33, 37 ]
[ null, null ]
[ 22, 19 ]
[ 32, 30 ]
2024-11-19T02:30:39.314833+00:00
1,619,976,248,000
a21e1bf67b1ce111232125633ae3c6b9cef3831d
2
{ "blob_id": "a21e1bf67b1ce111232125633ae3c6b9cef3831d", "branch_name": "refs/heads/master", "committer_date": 1619976248000, "content_id": "b1259d063fe93478549d41bb3ad0ad84d8998c2b", "detected_licenses": [ "MIT" ], "directory_id": "12d1e9c367c1276d5d9af82387fedabfc0c10da4", "extension": "py", "fi...
2.3125
stackv2
import os from typing import Any from pydantic import BaseSettings as Settings, conint from pydantic import EmailStr, validator from jinja2 import Environment, FileSystemLoader from fastapi_mail.schemas import validate_path from fastapi_mail.errors import TemplateFolderDoesNotExist class ConnectionConfig(Settings): ...
35
32.6
79
18
285
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_28bba474d522cda8_a45ebe03", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 33 ]
[ 34 ]
[ 32 ]
[ 48 ]
2024-11-19T02:41:42.702350+00:00
1,621,031,180,000
4930c59df3bb84c8d085201265db1168f61c5189
3
{ "blob_id": "4930c59df3bb84c8d085201265db1168f61c5189", "branch_name": "refs/heads/main", "committer_date": 1621031180000, "content_id": "b973efd09fda894d121170a43f0cb9862dd1602d", "detected_licenses": [ "MIT" ], "directory_id": "eb67819e20914b8b400acc87c40c5658ed3039fc", "extension": "py", "file...
2.546875
stackv2
from flask import request, flash, redirect, url_for, Blueprint from sample import db, models, views, app from sample.models import User from werkzeug.security import generate_password_hash, check_password_hash from flask_login import login_user, login_required, logout_user, current_user import logging logging.basicC...
84
36.67
122
19
655
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1a8a9ab305283629_a1a1f545", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-117" ]
[ "py/clear-text-logging-sensitive-data", "py/log-injection" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This log entry depends on a [user-provided value](1)." ]
[ 23, 23 ]
[ null, null ]
[ 23, 23 ]
[ 56, 56 ]
2024-11-19T02:41:56.623461+00:00
1,551,030,684,000
0d6b8ed101a9f17da4d28a01cb80acc072ef1809
2
{ "blob_id": "0d6b8ed101a9f17da4d28a01cb80acc072ef1809", "branch_name": "refs/heads/master", "committer_date": 1551030684000, "content_id": "59eb848d7588fd82eef7cd71e30181208cf20d2d", "detected_licenses": [ "MIT" ], "directory_id": "855dc9fcd4170923e8723b6946c09c5cae68e079", "extension": "py", "fi...
2.34375
stackv2
from __future__ import unicode_literals from contextlib import closing import logging import os import os.path import requests from qiller.utils import ensure_file_dir_exists, retry_action, q_enc logger = logging.getLogger(__name__) def stream_download(destination, response): ensure_file_dir_exists(destinatio...
87
40.57
145
24
794
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_3f0e3f04cb9c6ce9_5fbbc308", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [compute-1.amazonaws.com](1) may be at an arbitrary pos...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [compute-1.amazonaws.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 79 ]
[ null ]
[ 44 ]
[ 82 ]
2024-11-19T02:42:24.145717+00:00
1,686,471,682,000
cb91e3abfee4e02e000da9ee7483fe590c5f0278
2
{ "blob_id": "cb91e3abfee4e02e000da9ee7483fe590c5f0278", "branch_name": "refs/heads/master", "committer_date": 1686471682000, "content_id": "e1e27bb073dbbef2546d4f3ed6893652107ed1ae", "detected_licenses": [ "MIT" ], "directory_id": "01f16569d84dc1f3287b03f7c000c17bb8ea0efa", "extension": "py", "fi...
2.390625
stackv2
import marshmallow from flask import Blueprint, Response, current_app, request from flask_login import login_required from stefan_on_software import post_manager from stefan_on_software.contracts.publish_post import PublishPostContract from stefan_on_software.post_manager import NoSuchPost # Blueprint under which all ...
85
31.89
86
15
627
python
[{"finding_id": "codeql_py/stack-trace-exposure_6d8f3b98c0c2a0e9_85997305", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 18 ]
[ null ]
[ 46 ]
[ 80 ]
2024-11-18T18:05:48.472470+00:00
1,247,873,413,000
a344134e6effcf913ab484c98e844a2605094928
3
{ "blob_id": "a344134e6effcf913ab484c98e844a2605094928", "branch_name": "refs/heads/master", "committer_date": 1247873413000, "content_id": "c9ffacf913f6039a532362ea7ecdbc2abc894617", "detected_licenses": [ "Apache-2.0" ], "directory_id": "fb68aae4c91fb889fe0e6654289a0e0ff3ded258", "extension": "py"...
2.515625
stackv2
#!/usr/bin/env python # # (c) Copyright 2009 Cloudera, Inc. # """ makeJava.py --mainclass className --exec executableName --dir pathName [--javaopts args] creates a script named "executableName" in "pathName" that launches className. Finds the appropriate class path entities for this. """ import os import...
134
23.75
77
14
944
python
[{"finding_id": "codeql_py/overly-permissive-file_827b7ed30cc5ce72_d094129a", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable." ]
[ 117 ]
[ null ]
[ 5 ]
[ 35 ]
2024-11-18T18:05:48.641011+00:00
1,508,562,251,000
d46f7d27e5b01c317f66a7ed7d10c645af8d3698
3
{ "blob_id": "d46f7d27e5b01c317f66a7ed7d10c645af8d3698", "branch_name": "refs/heads/master", "committer_date": 1508562251000, "content_id": "792993ea8996fb8af532a85c389d4c6c70ded691", "detected_licenses": [ "MIT" ], "directory_id": "6a71690c49250dde6885cff48687f23c550afdf0", "extension": "py", "fi...
2.78125
stackv2
import pandas as pd from nltk.stem.porter import PorterStemmer import re import numpy as np import json import sys maxSeqLength = 30 ps = PorterStemmer() def load_data_saved(): with open('stemmed_split_sentences','r') as myfile: data = json.load(myfile) return data def load_data(): #file_path = '/home/rudresh/Des...
169
31.19
86
15
1,598
python
[{"finding_id": "codeql_py/overly-large-range_09e3787a4ff131f7_56864695", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with 0-9 in the same character class, and is equivalent to \\[+...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with 0-9 in the same character class, and is equivalent to \\[+,\\-.\\/0-9:;<=\\]." ]
[ 44 ]
[ null ]
[ 36 ]
[ 39 ]
2024-11-18T18:06:03.838171+00:00
1,516,068,785,000
34301092b860dd88840f8d75a8c7843080861670
2
{ "blob_id": "34301092b860dd88840f8d75a8c7843080861670", "branch_name": "refs/heads/master", "committer_date": 1516068785000, "content_id": "4d88e0f185fb8f293f981733a5dbd01247a08892", "detected_licenses": [ "MIT" ], "directory_id": "89219ee9fb81abe51ac1a161b874bc920aa1bb38", "extension": "py", "fi...
2.40625
stackv2
import os import signal from flask import Flask from flask import render_template app = Flask(__name__) signal.signal(signal.SIGINT, lambda s, f: os._exit(0)) @app.route("/") def cacule(): page = '<html><body><h1>' page += 'Hello world' page += '</h1></body></html>' return page @app.route("/w") def ...
28
19.82
54
11
166
python
[{"finding_id": "codeql_py/reflective-xss_334fac5bccacbacd_57202b66", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability d...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability due to a [user-provided value](2)." ]
[ 25 ]
[ null ]
[ 12 ]
[ 16 ]
2024-11-18T18:15:54.936433+00:00
1,566,472,102,000
008b0e9134b8748ba78a57f7f010bef6b2f7dad9
3
{ "blob_id": "008b0e9134b8748ba78a57f7f010bef6b2f7dad9", "branch_name": "refs/heads/master", "committer_date": 1566472102000, "content_id": "dd873988b9d26b89b070d01c5f264fc53c95caa1", "detected_licenses": [ "Apache-2.0" ], "directory_id": "c5d4b263ec981a8e210d61ab5b92a83e95b0e6cb", "extension": "py"...
2.875
stackv2
import logging from DAL import user_dal from flask import Flask, render_template, request, redirect, url_for import re def first_deploy(): try: username = request.form['username'] password = request.form['password'] re_password = request.form['re_password'] fullname = request.form[...
44
40.27
132
15
385
python
[{"finding_id": "codeql_py/polynomial-redos_147673ef535ec68a_a2b4b68c", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with ma...
1
true
[ "CWE-1333" ]
[ "py/polynomial-redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with many repetitions of 'a'." ]
[ 42 ]
[ null ]
[ 24 ]
[ 32 ]
2024-11-18T19:31:11.558437+00:00
1,476,400,358,000
0405ab8ac75c7e6ef067f47aab2c4c6685fd2740
3
{ "blob_id": "0405ab8ac75c7e6ef067f47aab2c4c6685fd2740", "branch_name": "refs/heads/master", "committer_date": 1476400358000, "content_id": "6cc789c554d005a1c89f67573b0bb66fc5ddfc38", "detected_licenses": [ "Apache-2.0" ], "directory_id": "3872e80dc65030792830e055eec8bddb2b5c9a89", "extension": "py"...
2.640625
stackv2
#!/usr/bin/env python """Juniper PYEZ config operations.""" from getpass import getpass from pprint import pprint from jinja2 import Template from jnpr.junos import Device from jnpr.junos.utils.config import Config from jnpr.junos.op.routes import RouteTable # XML Templates XML_TEMPLATE = """ <configuration> ...
84
25.17
79
10
538
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_07cb16fe79efe455_5c7ce962", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 37 ]
[ null ]
[ 17 ]
[ 39 ]
2024-11-18T20:08:57.681950+00:00
1,545,430,150,000
cd5a36f5a4f8636ff69f62bebb0f564941668e9d
2
{ "blob_id": "cd5a36f5a4f8636ff69f62bebb0f564941668e9d", "branch_name": "refs/heads/master", "committer_date": 1545430150000, "content_id": "5a92c1533560d4e72cfaa6d3aa8826ee6aedacb5", "detected_licenses": [ "Apache-2.0" ], "directory_id": "93135b3ad13be4f361f52ce7892a62631cf99203", "extension": "py"...
2.46875
stackv2
""" Usage: write_manifest.py [options] <study> Arguments: <study> Name of the study to process Options: -v --verbose Verbose logger -d --debug Debug logger -q --quiet Less debuggering """ from docopt import docopt import sys, os, glob, log...
219
33.61
151
18
1,770
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_87756d5bba856bca_71628637", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text." ]
[ 126 ]
[ null ]
[ 24 ]
[ 93 ]
2024-11-18T19:11:47.531159+00:00
1,493,173,382,000
12491cc31c5021a38cb40799492171c2d5b6b978
3
{ "blob_id": "12491cc31c5021a38cb40799492171c2d5b6b978", "branch_name": "refs/heads/master", "committer_date": 1493173411000, "content_id": "2b1f259a83bae568cc2c174067c26a27cb1b72d2", "detected_licenses": [ "MIT" ], "directory_id": "b6fca3e8032fb0b51bb8e1a5653c6fb40b3722fd", "extension": "py", "fi...
3.171875
stackv2
""" URL Redirection Summary: Sends the HTTP header response based on the code received. Converts the URL received into Location in the response. Example: $ curl -i http://127.0.0.1:5000/301/http://www.google.com HTTP/1.0 301 Moved Permanently Server: BaseHTTP/0.3 Python/2.7.5 Date: Wed, 19 Apr 2017 20:06:11 GMT Locat...
89
23.65
76
14
662
python
[{"finding_id": "codeql_py/http-response-splitting_5d8dd99776b6b49e_1a32eb0b", "tool_name": "codeql", "rule_id": "py/http-response-splitting", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This HTTP header is constructed from a [user-provided value](1).", "remediation": "", "lo...
1
true
[ "CWE-113" ]
[ "py/http-response-splitting" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This HTTP header is constructed from a [user-provided value](1)." ]
[ 74 ]
[ null ]
[ 35 ]
[ 38 ]
2024-11-18T19:23:47.837268+00:00
1,608,139,179,000
2b98fd7c81736e00e33caf523cd5c646831c2940
2
{ "blob_id": "2b98fd7c81736e00e33caf523cd5c646831c2940", "branch_name": "refs/heads/master", "committer_date": 1608139179000, "content_id": "fe2d0991c0d6cb827b153199b19b27ffc3c01a7e", "detected_licenses": [ "MIT" ], "directory_id": "6b97237bfd9647f7a90c1d1c33b4453c07e56839", "extension": "py", "fi...
2.421875
stackv2
"""Push & Pull Actions.""" # Standard Library from typing import Dict from datetime import datetime # Third Party from httpx import AsyncClient # Project from routingpolicy.log import log from routingpolicy.models.switch import Switch async def get_current_config(switch: Switch) -> Dict: """Get the running con...
45
29.78
81
18
277
python
[{"finding_id": "codeql_py/request-without-cert-validation_a1c78669fe8fa84f_f22077c4", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 22 ]
[ 37 ]
[ 21 ]
[ 10 ]
2024-11-18T19:24:02.479274+00:00
1,595,319,634,000
82ccba33d9020fa9579b682cf04bb9f05f0ddced
2
{ "blob_id": "82ccba33d9020fa9579b682cf04bb9f05f0ddced", "branch_name": "refs/heads/master", "committer_date": 1595319634000, "content_id": "60b1e52d24320c71c95c2e256e41d027c365a6c9", "detected_licenses": [ "BSD-3-Clause", "MIT" ], "directory_id": "2cd584dc2ef99b5a60e9fc40022ab71589c5b356", "ext...
2.328125
stackv2
from flask import render_template, url_for, flash, redirect,request from flaskblog import app,db,bcrypt from flaskblog.forms import * from flaskblog.models import User, Complaint from flask_login import login_user,current_user,logout_user,login_required from flask_datepicker import datepicker import os @app.route("/ho...
172
38.19
117
17
1,391
python
[{"finding_id": "codeql_py/url-redirection_0570aa63ffce1633_d9a01afc", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 23 ]
[ null ]
[ 29 ]
[ 38 ]
2024-11-18T19:58:22.550645+00:00
1,693,578,280,000
2607c0dccaee5b730872d399df1428d05b48f81e
3
{ "blob_id": "2607c0dccaee5b730872d399df1428d05b48f81e", "branch_name": "refs/heads/master", "committer_date": 1693804803000, "content_id": "962bf0b583214a4b51e810983269de906ea26065", "detected_licenses": [ "MIT" ], "directory_id": "bec0383f2afd255a72afeb9049a898615e547327", "extension": "py", "fi...
2.671875
stackv2
#!/usr/bin/env python3 # # Electron Cash - a lightweight Bitcoin Cash client # CashFusion - an advanced coin anonymizer # # Copyright (C) 2020 Mark B. Lundeberg # # Permission is hereby granted, free of charge, to any person # obtaining a copy of this software and associated documentation files # (the "Software"), to d...
193
33.28
100
19
1,403
python
[{"finding_id": "codeql_py/insecure-protocol_6470f28229374038_32eb466f", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/...
1
true
[ "CWE-327" ]
[ "py/insecure-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.create_default_context](1)." ]
[ 74 ]
[ null ]
[ 27 ]
[ 37 ]
2024-11-18T19:58:32.861650+00:00
1,390,164,224,000
96540811d9facf16736b4c74ef64948c0f8af35a
3
{ "blob_id": "96540811d9facf16736b4c74ef64948c0f8af35a", "branch_name": "refs/heads/master", "committer_date": 1390164224000, "content_id": "1ad13872affc00a3a73f556f218ac172d194033c", "detected_licenses": [ "MIT" ], "directory_id": "0c12a573f7950bd96cc721227ff8bd558dfc222a", "extension": "py", "fi...
2.609375
stackv2
# encoding: utf-8 import os.path import urllib.parse from abc import ABCMeta, abstractmethod import requests from requests.exceptions import HTTPError from utils import EmptyProgressMonitor class Service(metaclass=ABCMeta): def __init__(self, baseURL, username = '', password = ''): self.baseURL = baseU...
98
40.48
116
21
763
python
[{"finding_id": "codeql_py/request-without-cert-validation_98e88b345282effd_3c0ed1ef", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 78 ]
[ null ]
[ 13 ]
[ 100 ]
2024-11-18T19:58:34.295762+00:00
1,628,254,358,000
7043bd30eb0f6712528c51ef9a00c9ed434ac2d8
3
{ "blob_id": "7043bd30eb0f6712528c51ef9a00c9ed434ac2d8", "branch_name": "refs/heads/master", "committer_date": 1628254358000, "content_id": "7a6e7700ea679d37485b7a2995cfaa8c5158ffbd", "detected_licenses": [ "MIT" ], "directory_id": "95b2a446cb611eb87455b7c265aa28ba0fc80323", "extension": "py", "fi...
3.46875
stackv2
import pyperclip from user_details import User, Credentials def create_user(username,password): ''' Create new user account ''' new_user = User(username,password) return new_user def save_user(user): ''' Save a new user account ''' user.save_user() def verify_user(username,p...
155
27.46
131
26
1,022
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7006ec777c35e3db_61d598cd", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.", "This expression logs [sensitive dat...
[ 72, 117, 125 ]
[ null, null, null ]
[ 10, 13, 15 ]
[ 76, 112, 127 ]
2024-11-18T19:58:37.647517+00:00
1,605,184,746,000
aba6148a464987084379a32595152ef40b7f7356
3
{ "blob_id": "aba6148a464987084379a32595152ef40b7f7356", "branch_name": "refs/heads/main", "committer_date": 1605184746000, "content_id": "464a759a51b6962fd623c503b26c2f6f54cd250f", "detected_licenses": [ "MIT" ], "directory_id": "e52b90b89b31c6deab8151fc53f9043efaab0663", "extension": "py", "file...
2.765625
stackv2
import re # Basic Items def String(obj): return type(obj) == str def Number(obj): return type(obj) == int def List(obj): return type(obj) == list def Dict(obj): return type(obj) == dict # ID Items def WeChatID(obj): return re.compile(r"^[a-zA-Z]{1}[-_a-zA-Z0-9]{5,19}$").match(obj) de...
91
16.12
166
11
588
python
[{"finding_id": "codeql_py/overly-large-range_6977da6b1dd491d4_53d71de9", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 60 ]
[ null ]
[ 29 ]
[ 32 ]
2024-11-18T18:39:32.961000+00:00
1,692,996,663,000
fc93938bd7528001e2fe961b7805c4b3bc0f431c
2
{ "blob_id": "fc93938bd7528001e2fe961b7805c4b3bc0f431c", "branch_name": "refs/heads/master", "committer_date": 1692996663000, "content_id": "851854255cc80d9753725457f33cfa4b4f9fb03d", "detected_licenses": [ "MIT" ], "directory_id": "05d880e660c32c9a4b4754d7246e388f3c59e6e0", "extension": "py", "fi...
2.484375
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- ''' RRFRaptor Learn more about RRF on https://f5nlg.wordpress.com 73 & 88 de F4HWN Armel ''' import settings as s import requests import os import time import datetime import json import sys # Usage def usage(): print('Usage: RRFRaptor.py [options ...]') print()...
141
31.44
111
23
1,137
python
[{"finding_id": "codeql_py/request-without-cert-validation_7d2d1e70d97a0992_317e71ce", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 41 ]
[ null ]
[ 13 ]
[ 82 ]
2024-11-18T18:39:40.093608+00:00
1,563,442,739,000
69c90e44e3bbaa494415a81fd2ab4bb5f790278c
3
{ "blob_id": "69c90e44e3bbaa494415a81fd2ab4bb5f790278c", "branch_name": "refs/heads/master", "committer_date": 1563442739000, "content_id": "f543261ec716677633de64eaabe6946d41527db9", "detected_licenses": [ "MIT" ], "directory_id": "799b8dc58cf64d74d267c76d91a7f87eb459563d", "extension": "py", "fi...
2.59375
stackv2
import argparse import multiprocessing import time import requests import json import os import urllib import hashlib from functools import partial """ Arma 3 Mod Download Script by RealLifeRPG Team - www.realliferpg.de More Info: https://github.com/A3ReallifeRPG/PboSignTool """ def main(): parser = argparse.A...
142
30.05
120
20
1,091
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_325ff85f25cce447_86a1ef61", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text." ]
[ 50, 127 ]
[ null, null ]
[ 11, 23 ]
[ 96, 46 ]
2024-11-18T18:39:45.813105+00:00
1,583,314,969,000
dce8114df903ab93573b22b6487c173c9fe616b4
2
{ "blob_id": "dce8114df903ab93573b22b6487c173c9fe616b4", "branch_name": "refs/heads/master", "committer_date": 1583314969000, "content_id": "079012a47ba9b915fe3b2565084ff7ffa9c44e59", "detected_licenses": [ "MIT" ], "directory_id": "d546db2e57754e3bdae4cf45a978d7b1b823a5c6", "extension": "py", "fi...
2.421875
stackv2
# vim: set ts=4 sw=4 et: -*- coding: utf-8 -*- from __future__ import absolute_import from __future__ import print_function import os import re import sys import json import requests import argparse import time import codecs from datetime import datetime from bs4 import BeautifulSoup from six import u __version__ = '...
262
43.09
147
27
2,863
python
[{"finding_id": "codeql_py/request-without-cert-validation_e6d727e700703528_84cfa2b1", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1) by [this value](2).", "This request may run without certificate validation because [it is disabled](1) by [this value](2)." ]
[ 66, 136 ]
[ 69, null ]
[ 24, 16 ]
[ 18, 78 ]
2024-11-18T18:39:49.557117+00:00
1,452,429,131,000
84d91785b318f944f392a1b1093346c005b03e7c
3
{ "blob_id": "84d91785b318f944f392a1b1093346c005b03e7c", "branch_name": "refs/heads/master", "committer_date": 1452429131000, "content_id": "d07b912877c802ad7f061108c7ca90e57c5b1a8b", "detected_licenses": [ "MIT" ], "directory_id": "8e5e2fbb499ed178785c59f6f8a125d9e0a2501a", "extension": "py", "fi...
3.3125
stackv2
# Name: python_postRequest.py # Haupt-Funktion: sendet die aktuelle Position mit dem Zeitstempel an den Server __author__ = "BKonstantin" __date__ = "$14.12.2015 13:29:04$" #if __name__ == "__main__": # print ("start postRequest...") # Imports: # Die Bibliothek "requests" muss vorher installiert werden. import re...
56
37.12
101
11
595
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5bbf0a860f31471d_82fc6e11", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 19 ]
[ null ]
[ 8 ]
[ 33 ]
2024-11-18T18:39:59.564526+00:00
1,573,882,923,000
f06e146b2373c317333e9ff19622e965a9d562e5
3
{ "blob_id": "f06e146b2373c317333e9ff19622e965a9d562e5", "branch_name": "refs/heads/master", "committer_date": 1573882923000, "content_id": "64a520ce50f6a98d878fc18c5f86782ef17c04e9", "detected_licenses": [ "MIT" ], "directory_id": "c57f5785f2581070fabbe91d2c24a98b63c6e913", "extension": "py", "fi...
2.828125
stackv2
#!/usr/bin/python3.7 from dataclasses import dataclass import re import sys import argparse from pathlib import Path #Convert C header files to nasm NASM_INCLUDE_SUFFIX = ".inc" DIRECTIVE_START_TOKEN = "#" #Currently only #define directives are recognized DIRECTIVE_PATTERN = "#(\t|\s)*define(\t|\s)*(([a-zA-Z0-9_]|[\u...
73
39.96
152
14
740
python
[{"finding_id": "codeql_py/redos_0ce9cc0a6a57daa0_6a32522b", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '#' and containing many repetition...
2
true
[ "CWE-1333", "CWE-1333" ]
[ "py/redos", "py/redos" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '#' and containing many repetitions of '\\t'.", "This part of the regular expression may cause exponential backtracking on strings starting with '\\\\' and containing many repetitions of '\\t'." ]
[ 13, 14 ]
[ null, null ]
[ 23, 21 ]
[ 30, 28 ]
2024-11-18T18:40:03.088521+00:00
1,576,261,075,000
99b894e71c3d60eb1a5c1a1e6b0d168ae94503a4
2
{ "blob_id": "99b894e71c3d60eb1a5c1a1e6b0d168ae94503a4", "branch_name": "refs/heads/master", "committer_date": 1576594575000, "content_id": "b8d580c8d53b1879bf0d45284884e077ab4ffd87", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "506c00ed836a04a902efab514ac9c9637c11a355", "extension": "p...
2.390625
stackv2
""" Copyright (c) 2019 Red Hat, Inc All rights reserved. This software may be modified and distributed under the terms of the BSD license. See the LICENSE file for details. Downloads and unpacks the source code archive from Cachito and sets appropriate build args. """ from __future__ import absolute_import import t...
50
31.32
91
14
330
python
[{"finding_id": "codeql_py/tarslip_623e146e39c4d156_7aeb7af2", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 45 ]
[ null ]
[ 13 ]
[ 15 ]
2024-11-18T20:52:23.833563+00:00
1,590,261,682,000
de404b376d9e6f5370747a13399abae74a0fabf1
3
{ "blob_id": "de404b376d9e6f5370747a13399abae74a0fabf1", "branch_name": "refs/heads/master", "committer_date": 1590261682000, "content_id": "bd8e65d0928a485ec449331f37e0e5cf5edc0c6a", "detected_licenses": [ "MIT" ], "directory_id": "a46b064486b703b5424a5e59fb6d567a0c08d480", "extension": "py", "fi...
2.8125
stackv2
""" IPython magic function to provide notifications via PushBullet Author: Nicholas Youngblut <nyoungb2@gmail.com> [6~License: MIT """ from __future__ import print_function import os import sys import re import time import subprocess import IPython from socket import gethostname from IPython.core.magic import Magics ...
221
32.94
125
18
1,650
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d6268de786e6c9d9_972a886d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 144 ]
[ null ]
[ 19 ]
[ 64 ]
2024-11-18T20:15:48.449573+00:00
1,592,340,417,000
b3100ae2d3e71059780e9455aa565c0b655ff4ea
3
{ "blob_id": "b3100ae2d3e71059780e9455aa565c0b655ff4ea", "branch_name": "refs/heads/master", "committer_date": 1592340417000, "content_id": "d0e8f60a24305dcfa958e9016bf1b54bc950c4d0", "detected_licenses": [ "MIT" ], "directory_id": "79b05ea38c5d06d1b9554796176fe256d369954f", "extension": "py", "fi...
2.609375
stackv2
from flask import Flask, request, jsonify import re import string import requests from bs4 import BeautifulSoup from sklearn.feature_extraction.text import CountVectorizer, TfidfTransformer import joblib import numpy as np app = Flask(__name__) # load the model clf = joblib.load('models/voting_model.pkl') def remove...
41
23.95
77
13
242
python
[{"finding_id": "codeql_py/full-ssrf_a867342f6aa76cc2_a60989f1", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
1
true
[ "CWE-918" ]
[ "py/full-ssrf" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1)." ]
[ 24 ]
[ null ]
[ 12 ]
[ 29 ]
2024-11-18T19:23:08.058636+00:00
1,641,757,863,000
2fc2d0d6f9400c40792ebe02edd71a68290f4697
3
{ "blob_id": "2fc2d0d6f9400c40792ebe02edd71a68290f4697", "branch_name": "refs/heads/master", "committer_date": 1641757863000, "content_id": "b920bc175a93cce813b7ea7603c126b625eb1d86", "detected_licenses": [ "MIT" ], "directory_id": "8a5d20b5e9b3d9a5360ed6be168df4c79449fc96", "extension": "py", "fi...
2.625
stackv2
from difflib import SequenceMatcher from c_shared import * def StrSimilar( a,b ): return SequenceMatcher( None, a, b ).ratio() class RelationshipType( IntEnum ): ROMANTIC = 0, PLATONIC = 1 class Relationship: def __init__( self, characters, type ): self.characters = characters self.ty...
312
37.1
140
22
3,114
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_99bcb752a62c023c_9c71402b", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [www.fanfiction.net/](1) may be at an arbitrary positio...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "The string [www.fanfiction.net/](1) may be at an arbitrary position in the sanitized URL.", "The string [archiveofourown.org/](1) may be at an arbitrary position in the sanitized URL." ]
[ 126, 128 ]
[ null, null ]
[ 12, 14 ]
[ 40, 43 ]
2024-11-18T19:38:38.983191+00:00
1,524,439,530,000
948b9b251cb69ce020f0929aa108de1575a4146c
3
{ "blob_id": "948b9b251cb69ce020f0929aa108de1575a4146c", "branch_name": "refs/heads/master", "committer_date": 1524439530000, "content_id": "9a55e4246d65305ee9d36429daddf81b9172cd12", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "50894d5f93d3d3334dc284ab04679143292aaf85", "extension": "p...
2.546875
stackv2
# -*- coding: utf-8 -*- import paramiko import sys from scp import SCPClient import time import random class sshObject(): def __init__(self, ipAddress=None, user=None, password=None, port=22, ssh_key=None): self.ipAddress = ipAddress self.user = user self.password = password self.s...
55
25.09
107
15
330
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_f977097ebd729554_d84e1d87", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 38 ]
[ null ]
[ 13 ]
[ 70 ]
2024-11-18T20:10:38.223807+00:00
1,628,769,677,000
9af48a580f98c4928b648f71a8e31330e173fb0a
2
{ "blob_id": "9af48a580f98c4928b648f71a8e31330e173fb0a", "branch_name": "refs/heads/main", "committer_date": 1628769677000, "content_id": "d4de3dac7071c747cc2e5f37f2cd4339761cbdfc", "detected_licenses": [ "MIT" ], "directory_id": "170d78048845de95179689b06a76358dafe8248b", "extension": "py", "file...
2.328125
stackv2
from flask import * from db import login_mysql mydb, cursor = login_mysql.login() app = Flask(__name__) @app.route("/main") def mainpage(): from db import queries influencer = queries.main_influencer() brand = queries.main_brand() ##influencer, brand = jsonify(influencer, brand) return render_tem...
29
21.9
81
9
166
python
[{"finding_id": "codeql_py/flask-debug_9e85cd3b603690b9_6434230f", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 28, 19 ]
[ null, null ]
[ null, 12 ]
[ 31, 32 ]
2024-11-18T20:10:39.671817+00:00
1,411,193,655,000
7b2593b288e13fd821a546a2792479e973727580
2
{ "blob_id": "7b2593b288e13fd821a546a2792479e973727580", "branch_name": "refs/heads/master", "committer_date": 1411193655000, "content_id": "953a730d154855f54615cc6d98ae95a6767eb42a", "detected_licenses": [ "MIT" ], "directory_id": "a17b4761f5cc9148ed65748bcab79cc0a54067f7", "extension": "py", "fi...
2.328125
stackv2
#!/usr/bin/python # coding: utf-8 import os import sys import urllib import codecs import glob import commands import time import re import BaseHTTPServer import SocketServer wwwpath = sys.argv[1] pypath = os.path.realpath(sys.path[0]) actions = { "/editor":"/html/editor.html", "/":"/html/index.html", } de...
163
29.72
90
18
1,148
python
[{"finding_id": "codeql_py/polynomial-redos_07216f4e1107b2e1_40ee8aee", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings startin...
4
true
[ "CWE-1333", "CWE-022", "CWE-022", "CWE-022" ]
[ "py/polynomial-redos", "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings starting with 'Content-Disposition' and with many repetitions of 'Content-Disposition'.\nThis [regular expression](1) that depends on a [user-provided value](3) may run slow on strings starting with 'Content-Disposition...
[ 120, 62, 63, 131 ]
[ null, null, null, null ]
[ 79, 27, 22, 24 ]
[ 83, 29, 24, 29 ]
2024-11-18T20:10:42.641928+00:00
1,658,741,208,000
5b22ba4ccd80aae060c3266c15a1131694ec1727
2
{ "blob_id": "5b22ba4ccd80aae060c3266c15a1131694ec1727", "branch_name": "refs/heads/master", "committer_date": 1658741208000, "content_id": "4a15e4c15324eaf081f48978013234f10610c5cb", "detected_licenses": [ "MIT" ], "directory_id": "17129a158a4c1eba65dcda16033a44062df5f38a", "extension": "py", "fi...
2.328125
stackv2
#from flask import Flask #from flask import render_template #from flask import request #from PIL import Image from prediction import * import os import cv2 from flask import Flask, render_template, request,jsonify from PIL import Image import tensorflow as tf #import jinja2 app=Flask(__name__) #app.jinja_env.line_state...
61
27.92
76
17
350
python
[{"finding_id": "codeql_py/flask-debug_ef3823e45b8ffc33_77de50b4", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-022" ]
[ "py/flask-debug", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1)." ]
[ 61, 31 ]
[ null, null ]
[ 5, 27 ]
[ 24, 28 ]
2024-11-18T20:10:49.706628+00:00
1,584,126,208,000
e3b0a5833fb053be978083ea4eb42da5b8d95c6e
3
{ "blob_id": "e3b0a5833fb053be978083ea4eb42da5b8d95c6e", "branch_name": "refs/heads/master", "committer_date": 1584126208000, "content_id": "981f98976a4302106e2fe746ed949c657a4e4ac2", "detected_licenses": [ "MIT" ], "directory_id": "322ac7676c4af546f6cf2500a8daacfdbc04d1e5", "extension": "py", "fi...
3.078125
stackv2
''' This script guides users to answer questions and fills in the details in config and settings files as appropriate. ''' import os import glob import sys import re from jinja2 import Environment, FileSystemLoader from Crypto.Cipher import DES def take_inputs(): params = {} print('Please enter inputs as pr...
187
42.84
142
15
1,814
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_213e6196599c2a1c_f70898c7", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 162, 173 ]
[ null, null ]
[ 11, 15 ]
[ 59, 65 ]
2024-11-18T20:11:08.018136+00:00
1,624,239,504,000
3705b568503d1b305d53fc4b5ea27549f7be9116
4
{ "blob_id": "3705b568503d1b305d53fc4b5ea27549f7be9116", "branch_name": "refs/heads/main", "committer_date": 1624239504000, "content_id": "10a69fc85cb6273c2277059e255063af561c3c70", "detected_licenses": [ "MIT" ], "directory_id": "17deb76479a63682ba72d8e141c45c98dff8407f", "extension": "py", "file...
4.09375
stackv2
import random import string def generate_password(): """ Generate a password formed from randomized uppercase and lowercase letters, numbers, and symbols. Make it as long as the user wants. Print out the password. """ while True: valid_lengths = list(range(1, 95)) valid_lengths...
35
26.74
71
13
201
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_927fa0a933ee36f1_806e079a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 30 ]
[ null ]
[ 19 ]
[ 45 ]
2024-11-18T20:26:04.682111+00:00
1,576,672,002,000
ff2bbed549d5718e3c74c375bdc6b52227a5aa6d
3
{ "blob_id": "ff2bbed549d5718e3c74c375bdc6b52227a5aa6d", "branch_name": "refs/heads/master", "committer_date": 1576672002000, "content_id": "feb2f6b39fa94406d72e9f0eec3eaaea1da5de4e", "detected_licenses": [ "MIT" ], "directory_id": "8bcf3479416767f75ee65ffb144cfb375842eda4", "extension": "py", "fi...
2.796875
stackv2
# coding: utf-8 """ @author: zc12345 @contact: 18292885866@163.com @file: 02_end2end_ml_project.py @time: 2019/4/22 22:02 @description: """ import os import tarfile from six.moves import urllib import pandas as pd from pandas.plotting import scatter_matrix import matplotlib.pyplot as plt from sklearn.model_selectio...
144
31.12
98
13
1,256
python
[{"finding_id": "codeql_py/tarslip_03f8d91777f2d1e2_f8fba5d3", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 31 ]
[ null ]
[ 5 ]
[ 13 ]
2024-11-18T20:26:24.807864+00:00
1,529,690,606,000
b8768e59736b7a1e02ad8e8ec4fdcdeadfb903e6
3
{ "blob_id": "b8768e59736b7a1e02ad8e8ec4fdcdeadfb903e6", "branch_name": "refs/heads/master", "committer_date": 1529690606000, "content_id": "f88599fa0a766e9de4d140834b8771a340547fd4", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "f9e1cb63cf064c092b2a8cfe6d05d6559466ab92", "extension": "p...
2.875
stackv2
#!/usr/bin/python3 from abc import ABC, abstractmethod import base64 from getpass import getpass from hashlib import sha384 from os import environ from sys import argv, exit import bcrypt filestore = '/etc/openvpn/server/store.txt' # abstract out implementation backends class PassStore(ABC): @abstractmethod ...
77
24.94
106
25
499
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_85c8bcab1e2729d5_d2510abc", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA384) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA384) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 53 ]
[ null ]
[ 72 ]
[ 83 ]
2024-11-18T20:26:37.054634+00:00
1,503,659,650,000
0157f7236c58e44afdde565fbd2d2c5004990d76
2
{ "blob_id": "0157f7236c58e44afdde565fbd2d2c5004990d76", "branch_name": "refs/heads/master", "committer_date": 1503659650000, "content_id": "e6e39f80b013f1b21a3e49d3eec1f8f832156618", "detected_licenses": [ "MIT" ], "directory_id": "d0057dd617061d51f02f47928a57fb8fd59400f0", "extension": "py", "fi...
2.4375
stackv2
from flask import Flask from flask import render_template, flash, request, redirect, url_for, session from werkzeug.utils import secure_filename from passlib.hash import pbkdf2_sha512 from functools import wraps import datetime import paramiko import os from bson.objectid import ObjectId from dbconnect import connec...
331
31.86
145
24
2,381
python
[{"finding_id": "codeql_py/url-redirection_d437aabe899a1864_07fccd09", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 196 ]
[ null ]
[ 29 ]
[ 40 ]
2024-11-18T20:26:37.495942+00:00
1,501,228,286,000
4c62d742ae26eeee72a282113282d4e789ec1977
2
{ "blob_id": "4c62d742ae26eeee72a282113282d4e789ec1977", "branch_name": "refs/heads/master", "committer_date": 1502039645000, "content_id": "061b23a6456d8878b2a71b34627dbe36ac06fb9f", "detected_licenses": [ "Apache-2.0" ], "directory_id": "8d6e30eb770e9ebb409ba50726e72c04caec5cb3", "extension": "py"...
2.3125
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- # # Copyright 2016, 2017 Kairo Araujo # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unl...
265
39.01
79
31
2,213
python
[{"finding_id": "codeql_py/overly-large-range_fe6e16b9927a55ba_20866ef6", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with 0-9 in the same character class.", "remediation": "", "loc...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with 0-9 in the same character class." ]
[ 222 ]
[ null ]
[ 47 ]
[ 50 ]
2024-11-18T20:26:48.062011+00:00
1,651,730,868,000
06f59d2fdf12a062635924b6625fd3ba4ee43827
3
{ "blob_id": "06f59d2fdf12a062635924b6625fd3ba4ee43827", "branch_name": "refs/heads/master", "committer_date": 1651730868000, "content_id": "efc7e293be936dbd77ade3e7cd47967f2a438e2c", "detected_licenses": [ "MIT" ], "directory_id": "5dc830740b6735ddb1b720bb36c45b9337f56968", "extension": "py", "fi...
2.59375
stackv2
from flask import flash, redirect, render_template, request, url_for from flask_login import current_user, login_required from flaskeddit.auth import auth_blueprint, auth_service from flaskeddit.auth.forms import LoginForm, RegisterForm @auth_blueprint.route("/register", methods=["GET", "POST"]) def register(): ...
57
34.93
86
16
412
python
[{"finding_id": "codeql_py/url-redirection_e34dbc54a0bc5d09_8dec77a1", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 42 ]
[ null ]
[ 29 ]
[ 42 ]
2024-11-18T20:27:04.684171+00:00
1,571,023,450,000
50fb6d84956a6099fb27417f9bb1fb4c2bcf6582
2
{ "blob_id": "50fb6d84956a6099fb27417f9bb1fb4c2bcf6582", "branch_name": "refs/heads/master", "committer_date": 1571023450000, "content_id": "33a012f37d9d966667772acff9df5b98fa761611", "detected_licenses": [ "Apache-2.0" ], "directory_id": "b491b2c01e11f36cb34eac1d0cd7e5597f960237", "extension": "py"...
2.484375
stackv2
#!/usr/bin/env python3 from flask import Flask, request, abort, jsonify from timeout_decorator import timeout import logging import socket import platform import os # App for uwsgi app = Flask(__name__) ENDPOINT = os.getenv('ENDPOINT', '192.168.1.104') ENDPOINT_PORT = 8899 INTERNAL_ADDRESS = [0x11, 0x0e, 0x59] BUFFE...
205
33.18
155
17
1,786
python
[{"finding_id": "codeql_py/log-injection_78925a6321ba1dec_b735d1f3", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2)...
7
true
[ "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends o...
[ 91, 101, 101, 101, 101, 101, 101 ]
[ null, null, null, null, null, null, null ]
[ 50, 9, 15, 20, 27, 33, 40 ]
[ 54, 13, 18, 25, 31, 38, 50 ]
2024-11-18T20:52:07.157288+00:00
1,671,574,166,000
c4399a53c25e43b8fdb324f135c32e83cb6e697b
2
{ "blob_id": "c4399a53c25e43b8fdb324f135c32e83cb6e697b", "branch_name": "refs/heads/main", "committer_date": 1671574166000, "content_id": "a929ed681246d4ffc8b8a58ec8c2378318fa854a", "detected_licenses": [ "ISC" ], "directory_id": "7113b9475f09687620afa54b6f8d7a591e6f9765", "extension": "py", "file...
2.375
stackv2
#!/usr/bin/env python import configparser import requests import sys from argparse import ArgumentParser from chopt import chopt from pathlib import Path from urllib3.exceptions import InsecureRequestWarning # Suppress only the single warning from urllib3 needed. requests.packages.urllib3.disable_warnings(category=In...
246
27.81
88
27
1,537
python
[{"finding_id": "codeql_py/request-without-cert-validation_c9d192eb45ea6d88_b5db69a1", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
6
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 80, 105, 141, 159, 176, 183 ]
[ 84, 109, 145, 163, 178, 187 ]
[ 20, 20, 16, 12, 12, 20 ]
[ 10, 10, 10, 6, 6, 10 ]
2024-11-18T20:52:19.151202+00:00
1,580,400,828,000
531ccc4a3b438b979ac0fc62694db6c4be936ffb
3
{ "blob_id": "531ccc4a3b438b979ac0fc62694db6c4be936ffb", "branch_name": "refs/heads/master", "committer_date": 1580400828000, "content_id": "9fa06520e638ed843832b33c87e224c8146bb49a", "detected_licenses": [ "MIT" ], "directory_id": "576150a5ae18e78be2ac3d0188029587ebdf6926", "extension": "py", "fi...
2.65625
stackv2
import json import datetime import logging.config import boto3 import uuid fleet = [ {"Name": "Bucephalus", "Color": "Golden", "Gender": "Male",}, {"Name": "Shadowfax", "Color": "White", "Gender": "Male",}, {"Name": "Rocinante", "Color": "Yellow", "Gender": "Female",}, ] FORMAT = "%(asctime)s - %(name)s ...
76
23.41
66
15
465
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3c61bf8f6948892c_7c1cac97", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 45 ]
[ 46 ]
[ 9 ]
[ 41 ]
2024-11-18T20:52:28.481545+00:00
1,374,844,520,000
fa83f1b9f24fb8c3a8b53d13cbcf3f6680211837
2
{ "blob_id": "fa83f1b9f24fb8c3a8b53d13cbcf3f6680211837", "branch_name": "refs/heads/master", "committer_date": 1374844520000, "content_id": "83e9e51a9ecf736284b74bae70be8253bb1710a4", "detected_licenses": [ "MIT" ], "directory_id": "1ad91af6931ef6367e9277f950303714af405410", "extension": "py", "fi...
2.390625
stackv2
from wsgiref.util import setup_testing_defaults from wsgiref.simple_server import make_server import os def callXemark(fullpath): return os.popen("./xemark < %s" % fullpath).read() def xemarkapp(environ, start_response): status = '200 OK' headers = [('Content-Type', 'text/html')] file_requested = environ['PATH_...
37
25.89
65
11
279
python
[{"finding_id": "codeql_py/command-line-injection_3c455418c14cc07b_b46a7ea1", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {...
2
true
[ "CWE-078", "CWE-022" ]
[ "py/command-line-injection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This command line depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 6, 28 ]
[ null, null ]
[ 18, 32 ]
[ 44, 50 ]
2024-11-18T19:02:32.853742+00:00
1,566,909,790,000
289492333c59c1b0bf20eb371a09391b20f63b65
4
{ "blob_id": "289492333c59c1b0bf20eb371a09391b20f63b65", "branch_name": "refs/heads/master", "committer_date": 1566909790000, "content_id": "edcbee11407d7ab2738b79399e97b70ffc47b477", "detected_licenses": [ "Apache-2.0" ], "directory_id": "197d545a51ee3aa6985f2c9f334a2f9216ee6e7d", "extension": "py"...
3.84375
stackv2
# 练习一 name = " alberT" # 1 移除 name 变量对应的值两边的空格,并输出处理结果 print(name.strip()) # 2 判断 name 变量对应的值是否以 "al" 开头,并输出结果 print(name.strip().find('al', 0, 2)) print(name.startswith('al')) # 3 判断 name 变量对应的值是否以 "T" 结尾,并输出结果 print(name.strip().find('T', -1)) print(name.endswith('T')) # 4 将 name 变量对应的值中的 “l” 替换为 “p”,并输出结果 print(name...
198
21.34
87
17
1,631
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3ae4c849cafe680a_e9843cc5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 101 ]
[ null ]
[ 7 ]
[ 8 ]
2024-11-18T19:02:47.169877+00:00
1,624,462,239,000
27886a8f2cccd089024a6e3b6a2a4ece4e670b00
2
{ "blob_id": "27886a8f2cccd089024a6e3b6a2a4ece4e670b00", "branch_name": "refs/heads/main", "committer_date": 1624462239000, "content_id": "f85a01fdd02dd9c4182290bcb82ea3e0a231c6da", "detected_licenses": [ "MIT" ], "directory_id": "880ef0bb367228d487680dd8bace85938b9057ab", "extension": "py", "file...
2.484375
stackv2
# import the necessary packages from color_descriptor import ColorDescriptor from searcher import Searcher import cv2 from flask import Flask, request, jsonify import os import uuid app = Flask(__name__) @app.route('/upload/', methods=['POST']) def upload(): if request.method == 'POST': file = request.f...
44
27.23
62
14
284
python
[{"finding_id": "codeql_py/flask-debug_ceb2c07738cd9d82_addc4e75", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-022", "CWE-022" ]
[ "py/flask-debug", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 44, 19, 38 ]
[ null, null, null ]
[ 5, 19, 19 ]
[ 35, 49, 36 ]
2024-11-18T19:02:53.743958+00:00
1,638,440,787,000
d177239d6c4932bb7905741666d47234f36a9f0a
3
{ "blob_id": "d177239d6c4932bb7905741666d47234f36a9f0a", "branch_name": "refs/heads/master", "committer_date": 1638440787000, "content_id": "c6e33bddba1ca25faa4fcd1c6c8ba335d69ffc24", "detected_licenses": [ "BSD-3-Clause", "Apache-2.0" ], "directory_id": "5096efbc24cf77d3b9798582c5878dd7af3cf431",...
3.03125
stackv2
import hmac import json from hashlib import sha1 from http import HTTPStatus from typing import Callable, Optional, Dict, Any, Tuple from flask import Flask, request, Response PayloadType = Dict[str, Any] HandleFuncReturnType = Tuple[str, HTTPStatus] class Listener: def __init__(self, name: str, ...
119
34.06
88
16
887
python
[{"finding_id": "codeql_py/reflective-xss_67aec03a9e9851a8_52fdcc79", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 76 ]
[ null ]
[ 34 ]
[ 41 ]
2024-11-18T19:03:04.936595+00:00
1,621,262,581,000
5f7b1c96c6f726ead869270173fbb3333c54c8b1
3
{ "blob_id": "5f7b1c96c6f726ead869270173fbb3333c54c8b1", "branch_name": "refs/heads/main", "committer_date": 1621262581000, "content_id": "afecac61d9fb02770ca4c9172bc40b13a2269705", "detected_licenses": [ "MIT" ], "directory_id": "89dab9fb60ae882910d7ac9e1be10c4ce6ffcf24", "extension": "py", "file...
3.015625
stackv2
import socket import sys import string import itertools path = "hacking\passwords.txt" f =open(path,'r') password = f.read().split("\n") class Connection(): def __init__(self, host, port): self.hostname = host self.port = int(port) self.sock = socket.socket() self.myList = list(strin...
45
28.31
89
24
288
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_640a41e5a8bf5516_d42bed5d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 40 ]
[ null ]
[ 27 ]
[ 34 ]
2024-11-18T19:14:33.390958+00:00
1,541,421,000,000
3a50db722af62a5a8e8cdee69abde98cc204190f
2
{ "blob_id": "3a50db722af62a5a8e8cdee69abde98cc204190f", "branch_name": "refs/heads/master", "committer_date": 1541421000000, "content_id": "a09ea8352619e16defe396437993bbb285e4ed91", "detected_licenses": [ "MIT" ], "directory_id": "714fcefc8358454a2e7c305a6842b0798ac00cb2", "extension": "py", "fi...
2.390625
stackv2
import json from aiohttp import web import logging import json # Content-Type CONTENT_TYPE = 'Content-Type' CONTENT_TYPE_HTML = {'Content-Type': 'text/html'} CONTENT_TYPE_JSON = {'Content-Type': 'application/json'} async def content_type_json_check(request): if request.content_type != 'application/json': ...
35
27.91
75
16
209
python
[{"finding_id": "codeql_py/stack-trace-exposure_8880ba389e6cb6a9_f29bac08", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 35 ]
[ null ]
[ 30 ]
[ 36 ]
2024-11-18T19:14:33.441591+00:00
1,509,610,179,000
8de26755048580f003b75e42e5705c00e6b5e95a
2
{ "blob_id": "8de26755048580f003b75e42e5705c00e6b5e95a", "branch_name": "refs/heads/master", "committer_date": 1509610179000, "content_id": "5b1bb31d37c04bb95b6ad42b435e79550dcf1bc6", "detected_licenses": [ "MIT" ], "directory_id": "b4b3c3f7bf06b0d98455668ff6a10e2732193091", "extension": "py", "fi...
2.484375
stackv2
# -*- coding: utf8 -*- ''' Simple Write MD Server Program Provide list, query, edit, save, etc ''' import os import codecs from flask import Flask from flask import render_template from flask import jsonify from flask import request from flask import abort app = Flask(__name__) app.config.from_object('config') @ap...
101
21.88
94
18
624
python
[{"finding_id": "codeql_py/path-injection_362c132957a682b7_46a66331", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
6
true
[ "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](...
[ 40, 45, 46, 47, 76, 94 ]
[ null, null, null, null, null, null ]
[ 22, 44, 32, 34, 27, 17 ]
[ 64, 51, 39, 41, 73, 24 ]
2024-11-18T19:14:46.283968+00:00
1,632,335,711,000
cd12f022fd87aa291f69c7d4a12f5f1d528c94c7
2
{ "blob_id": "cd12f022fd87aa291f69c7d4a12f5f1d528c94c7", "branch_name": "refs/heads/master", "committer_date": 1632335711000, "content_id": "43c141c7c0b9a56728af88f002a7ded77b18d854", "detected_licenses": [ "Apache-2.0" ], "directory_id": "745f58a02e94343f67fa5b5af5915aee2b2c9aa7", "extension": "py"...
2.46875
stackv2
import os import logging from datetime import datetime, timezone from ibm_botocore.credentials import DefaultTokenManager from lithops.utils import is_lithops_worker from lithops.config import load_yaml_config, dump_yaml_config from lithops.constants import CACHE_DIR logger = logging.getLogger(__name__) class IBMTo...
78
43.63
109
19
740
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_12fd8480d4a48487_b4d4acd8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (p...
[ 23, 32, 72 ]
[ null, null, null ]
[ 26, 26, 26 ]
[ 102, 107, 89 ]
2024-11-18T19:27:45.740543+00:00
1,542,207,829,000
d833e9c02188496ddea7b4b0f5c443dce2086c16
3
{ "blob_id": "d833e9c02188496ddea7b4b0f5c443dce2086c16", "branch_name": "refs/heads/master", "committer_date": 1542207829000, "content_id": "4204bdc3f9ca310e54a356f0d1b1bb9c2c46aaa0", "detected_licenses": [ "MIT" ], "directory_id": "f6e5c235841c62c8c8de79b6c0ccb5bc229a4d4f", "extension": "py", "fi...
2.65625
stackv2
import logging from datetime import date, timedelta from operator import methodcaller from pathlib import Path from typing import Optional, NamedTuple, Tuple, List import dateparser import requests from lxml.html import fromstring from selenium import webdriver from selenium.webdriver.common.by import By from selenium...
165
37.26
93
19
1,452
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4595a9d00c9e9fd6_7b98fec3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text." ]
[ 45 ]
[ null ]
[ 63 ]
[ 71 ]
2024-11-18T19:27:55.290505+00:00
1,493,826,595,000
609ee86fb7ddd3856eee9fe338356281e237da95
3
{ "blob_id": "609ee86fb7ddd3856eee9fe338356281e237da95", "branch_name": "refs/heads/master", "committer_date": 1493826595000, "content_id": "c1de46a03ad4774371bc2e846ab29786b9895bb2", "detected_licenses": [ "MIT" ], "directory_id": "768b2e4a1a3e231aa28b0adb9ac52722add1863f", "extension": "py", "fi...
2.5625
stackv2
#!/usr/bin/env python import codecs import logging import logging.handlers import ssl import socket class SSLSysLogHandler(logging.handlers.SysLogHandler): # We need to paste all this in because __init__ bitches otherwise # This all comes from logging.handlers.SysLogHandler LOG_EMERG = 0 # system...
157
29.6
76
15
1,339
python
[{"finding_id": "codeql_py/insecure-default-protocol_439102b6151907f1_a6320749", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/insecure-default-protocol", "py/insecure-default-protocol" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used.", "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used." ]
[ 112, 116 ]
[ 114, null ]
[ 21, 21 ]
[ 65, 64 ]
2024-11-18T19:38:30.286411+00:00
1,606,661,619,000
60766ef7b17857cacc06c44a52da0662abb114be
3
{ "blob_id": "60766ef7b17857cacc06c44a52da0662abb114be", "branch_name": "refs/heads/master", "committer_date": 1606661619000, "content_id": "1af33dbb36340113db9d960bcac903f13e42fc30", "detected_licenses": [ "MIT" ], "directory_id": "4964705b804b7c46b996116064d80c12f7d1484e", "extension": "py", "fi...
2.890625
stackv2
import csv from numpy import array, asarray, zeros from keras.preprocessing.text import one_hot, Tokenizer from keras.preprocessing.sequence import pad_sequences from keras.models import Sequential from keras.layers import Dense, SpatialDropout1D, LSTM from keras.layers import Flatten from keras.layers.embeddings impor...
81
31.37
114
12
704
python
[{"finding_id": "codeql_py/overly-large-range_81bd16175cc2ebff_7a94e264", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 18 ]
[ null ]
[ 53 ]
[ 56 ]
2024-11-18T19:38:48.673990+00:00
1,610,474,323,000
72993890ab84a94970b524d814d74deca2095d2c
4
{ "blob_id": "72993890ab84a94970b524d814d74deca2095d2c", "branch_name": "refs/heads/main", "committer_date": 1610474323000, "content_id": "598d5af7d18091d9c358d0af17d2128fbf5084f6", "detected_licenses": [ "MIT" ], "directory_id": "efe329252385fc21d27ec57f1a2e56b190c6f564", "extension": "py", "file...
3.890625
stackv2
# Title : Multiple Inheritance # Author : Kiran Raj R. # Date : 08:11:2020 class EmployeeDetail: def __init__(self, emp_id, name, age, email_id, position): self.emp_id = emp_id self.name = name self.age = age self.email_id = email_id self.position = position def...
47
30.49
122
13
397
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_74e3cfe25e8841f0_613d4a8a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 42 ]
[ null ]
[ 15 ]
[ 39 ]
2024-11-18T19:38:52.128664+00:00
1,627,273,710,000
5f043266bc0d7c835b10771e47de63938cfd555b
4
{ "blob_id": "5f043266bc0d7c835b10771e47de63938cfd555b", "branch_name": "refs/heads/main", "committer_date": 1627273710000, "content_id": "c4a1357fcf5a343eafc710062cbe17c364b71be7", "detected_licenses": [ "MIT" ], "directory_id": "cb980f2c540f75b727e7feb56f7389a48b66f060", "extension": "py", "file...
3.8125
stackv2
database = {'entries': []} SRNO = 'srno' NAME = 'name' AGE = 'age' GENDER = 'gender' OCCUPATION = 'occupation' def get_serial_no(): return len(database['entries']) + 1 def add_entry(entry): entry = { 'srno': get_serial_no(), 'name': entry['name'], 'age': entry['age'], 'gender'...
133
30.95
79
17
967
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2add739c8a8dd6f3_e818c9cb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 47 ]
[ null ]
[ 11 ]
[ 39 ]
2024-11-18T20:06:03.548214+00:00
1,501,829,678,000
b8f6e060c3ffbed97b49cb68456ce335edb98438
2
{ "blob_id": "b8f6e060c3ffbed97b49cb68456ce335edb98438", "branch_name": "refs/heads/master", "committer_date": 1501829678000, "content_id": "ce39d5c6cd47b74f489ed1542d7e90b5c83c37e8", "detected_licenses": [ "MIT" ], "directory_id": "de29b523a65d7e02c096cc7353f5b544b39efe9f", "extension": "py", "fi...
2.5
stackv2
#!/usr/bin/python3.6 import lxml.etree as ET import re number_pattern = r'[0-9]+' class ListMBeans(): def __init__(self, path='scheduler-service.xml'): self.mbeans = list() self.commented_mbeans = list() self.path = path try: self.etree = ET.parse(path) except ...
158
36.14
104
24
1,289
python
[{"finding_id": "codeql_py/bad-tag-filter_d2b03103254ee2c0_d96dd9e3", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression does not match comments containing newlines.", "remediation": "", "location": {"file_pat...
1
true
[ "CWE-116" ]
[ "py/bad-tag-filter" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression does not match comments containing newlines." ]
[ 24 ]
[ null ]
[ 32 ]
[ 41 ]
2024-11-18T20:06:11.477759+00:00
1,606,260,895,000
d0e0728ed63a9b356c74e9a69680b7bd7e7ab18f
3
{ "blob_id": "d0e0728ed63a9b356c74e9a69680b7bd7e7ab18f", "branch_name": "refs/heads/master", "committer_date": 1606260895000, "content_id": "9b461b072395e4e1af15412e7417c3a2aa32414f", "detected_licenses": [ "MIT" ], "directory_id": "ace11052f663a5c3469aaea3d6da135b78b0164a", "extension": "py", "fi...
3.09375
stackv2
import requests as rq import json import time class SupremeMonitor: def __init__(self, item_id, colour, size): self.headers = {'user-agent': 'Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_5) AppleWebKit/537.36 (KHTML, ' 'like Gecko) Chrome/83.0.4103.116 Safari/537.36'}...
56
39.36
136
31
494
python
[{"finding_id": "codeql_py/request-without-cert-validation_84db2b5dc5be6850_03c6208d", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 19 ]
[ null ]
[ 20 ]
[ 137 ]
2024-11-18T20:18:14.026383+00:00
1,567,348,500,000
201061603186f8e3bf3be8e2e81982b902412452
3
{ "blob_id": "201061603186f8e3bf3be8e2e81982b902412452", "branch_name": "refs/heads/master", "committer_date": 1567348500000, "content_id": "719d32a01a3a399b69f6d837064b0a02706e2c08", "detected_licenses": [ "MIT" ], "directory_id": "559464bf444d348b06956421d93d8e0af2955ecb", "extension": "py", "fi...
3.03125
stackv2
"""AES Encryption implementation (including a Fernet suit).""" __all__ = ( "AESEncryption", ) import base64 import hashlib from django.conf import settings from cryptography.fernet import Fernet from rest_multi_factor.encryption.abstract import AbstractEncryption class AESEncryption(AbstractEncryption): ...
71
21.13
68
14
337
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_6f07e143b888d1a2_91944668", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 42 ]
[ null ]
[ 30 ]
[ 58 ]
2024-11-18T20:18:20.218852+00:00
1,692,716,824,000
a32fca4acf43ffa1a3ae484492e2a1f4afcb3d5f
2
{ "blob_id": "a32fca4acf43ffa1a3ae484492e2a1f4afcb3d5f", "branch_name": "refs/heads/master", "committer_date": 1692716824000, "content_id": "abb41a8ab520652f218f51cf2ec068dacf9143f3", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "4ebeaa3d8dbe4f5ecb1c9d69530f2cee2539c7d4", "extension": "p...
2.3125
stackv2
# -*- coding: utf-8 -*- # @Time : 2020/11/16 11:37 # @File : util.py # @Author : Rocky C@www.30daydo.com import datetime import random import smtplib import time import warnings from email.mime.text import MIMEText from email.header import Header from email.utils import parseaddr, formataddr import json import pandas ...
241
25.84
116
16
1,751
python
[{"finding_id": "codeql_py/weak-crypto-key_7686e86ac3742a32_649403b6", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",...
1
true
[ "CWE-326" ]
[ "py/weak-crypto-key" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable." ]
[ 91 ]
[ null ]
[ 25 ]
[ 42 ]
2024-11-18T20:31:11.001555+00:00
1,635,343,965,000
9f42f9463e911b5afb42671f621a4f303311a663
3
{ "blob_id": "9f42f9463e911b5afb42671f621a4f303311a663", "branch_name": "refs/heads/master", "committer_date": 1635343965000, "content_id": "83a4dcc009c2994cf367edbe1a0ea932f48f998a", "detected_licenses": [ "CC0-1.0" ], "directory_id": "ef59f94c6e99a84429b8e328bc2ba82cc1eacbb7", "extension": "py", ...
2.609375
stackv2
from copy import deepcopy from datetime import date from hashlib import md5 import re from django import forms from django.db import models from django.utils.translation import ugettext_lazy as _, ugettext from collab.settings import AUTH_USER_MODEL from django.core.exceptions import ValidationError from django.core.u...
260
39.92
79
16
1,930
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_ff1d7ef0559b3430_deff414d", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (id)](2) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (id)](3) is used in a hashing algorithm (MD5) that is insecure." ]
[ 227 ]
[ null ]
[ 20 ]
[ 43 ]
2024-11-18T20:31:22.713144+00:00
1,585,764,740,000
6bdca2946d6bed5598499421b520946f05ef44b2
2
{ "blob_id": "6bdca2946d6bed5598499421b520946f05ef44b2", "branch_name": "refs/heads/master", "committer_date": 1585764740000, "content_id": "142e97c682991267b10da83f12c2a73205b0c727", "detected_licenses": [ "MIT" ], "directory_id": "3d55ccd1cdb98d9859b7bfe8b250d09a740cd847", "extension": "py", "fi...
2.484375
stackv2
# coding=utf-8 from Crypto.Cipher import DES3 from Crypto.Random import get_random_bytes from Crypto import Random while True: try: key = DES3.adjust_key_parity(get_random_bytes(16)) break except ValueError: pass out = open("../distrib/key", "wb") out.write(key) out.close() iv = Random.new().read(DES3.block...
31
19.94
59
12
179
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_fb1dbf3b83e56cad_efb85d8f", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The cryptographic algorithm DES3](1) is broken or weak, and should not be used.", "...
1
true
[ "CWE-327" ]
[ "py/weak-cryptographic-algorithm" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[The cryptographic algorithm DES3](1) is broken or weak, and should not be used." ]
[ 25 ]
[ null ]
[ 7 ]
[ 40 ]
2024-11-18T20:31:26.866534+00:00
1,491,888,202,000
e2fdc9630d0bfa60fcad1772a693314f7ab0503a
3
{ "blob_id": "e2fdc9630d0bfa60fcad1772a693314f7ab0503a", "branch_name": "refs/heads/master", "committer_date": 1491888202000, "content_id": "1c101bc19f9744b30d3c0b62e6b1e4b7b2c2bf0a", "detected_licenses": [ "MIT" ], "directory_id": "9c8f73723482361cc8d04f0ce1650dccc8b7bea6", "extension": "py", "fi...
2.84375
stackv2
import os import re from flask import request, Response from slackclient import SlackClient from flask_classy import FlaskView, route from urlparse import urljoin class WebexSlashCommandController(FlaskView): route_base = '/' __slack_token = os.environ.get('SLACK_TOKEN') __slack_webhook_secret = os.enviro...
51
40
99
19
470
python
[{"finding_id": "codeql_py/reflective-xss_8b2f57bb84105a76_5a59dc97", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 30 ]
[ 31 ]
[ 33 ]
[ 82 ]
2024-11-18T20:43:41.749064+00:00
1,624,270,127,000
85a27d60ac48fa6b4848253a03ff298b4eeadab3
3
{ "blob_id": "85a27d60ac48fa6b4848253a03ff298b4eeadab3", "branch_name": "refs/heads/main", "committer_date": 1624270127000, "content_id": "30bfdc3053a02e7b6811e9ee50e4d5ea066a9d35", "detected_licenses": [ "MIT" ], "directory_id": "819ede7cb2fdc6640dd47d26d9dd114805346e1f", "extension": "py", "file...
3.09375
stackv2
import re from exceptions.availability_checker_exception import AvailabilityCheckerException class Client: def __init__(self, name, mobile, email, pincode): self.name = name self.mobile = mobile self.email = email self.pincode = pincode @property def name(self): re...
55
25.93
82
14
341
python
[{"finding_id": "codeql_py/redos_59e2c6b2e54cb74d_968dc3f8", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '_'.", "remediati...
2
true
[ "CWE-1333", "CWE-1333" ]
[ "py/redos", "py/redos" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '_'.", "This part of the regular expression may cause exponential backtracking on strings starting with 'a@' and containing many repetitions of '_'." ]
[ 39, 39 ]
[ null, null ]
[ 15, 32 ]
[ 29, 46 ]
2024-11-18T20:57:35.108614+00:00
1,548,784,772,000
b008d0a488bc6d50d27548c480785c8603472167
2
{ "blob_id": "b008d0a488bc6d50d27548c480785c8603472167", "branch_name": "refs/heads/master", "committer_date": 1548784772000, "content_id": "b698b3636eb707ce9d7101109f6e17ba42925e96", "detected_licenses": [ "MIT" ], "directory_id": "af33e6fe0fce08b617fa63dc6eb9c1ffa75f8640", "extension": "py", "fi...
2.375
stackv2
import os import requests import tarfile import tempfile import shutil from . import arango_client, spec_loader from .config import get_config def download_latest(init_collections=True): """Check and download the latest spec and extract it to the spec path.""" config = get_config() # Remove the spec dire...
97
37.64
92
15
842
python
[{"finding_id": "codeql_py/tarslip_1b5c6170b13b3c86_c52fb29b", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 63 ]
[ null ]
[ 9 ]
[ 12 ]
2024-11-18T20:57:41.471335+00:00
1,614,221,503,000
cfc6483fe5dda56239af20a157d3d864d83c5544
2
{ "blob_id": "cfc6483fe5dda56239af20a157d3d864d83c5544", "branch_name": "refs/heads/master", "committer_date": 1614221503000, "content_id": "0086fb16897bd3639c509ebeb0cba03befbd1e38", "detected_licenses": [ "MIT" ], "directory_id": "a4a18abbfae9584116a847bec4a1dfb9e9d3d306", "extension": "py", "fi...
2.328125
stackv2
from flask import Flask, request, make_response from slack_sdk.oauth import AuthorizeUrlGenerator from slack_sdk.oauth.installation_store import FileInstallationStore, Installation from slack_sdk.oauth.state_store import FileOAuthStateStore from slack_sdk.web import WebClient import settings # A lot of code taken fr...
78
36.06
105
18
596
python
[{"finding_id": "codeql_py/reflective-xss_68521961337ca2aa_5e3461dd", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 62 ]
[ null ]
[ 26 ]
[ 86 ]
2024-11-18T20:58:37.653535+00:00
1,633,550,593,000
896d589cc145558b5c2703510aa9cbd5849509c7
3
{ "blob_id": "896d589cc145558b5c2703510aa9cbd5849509c7", "branch_name": "refs/heads/main", "committer_date": 1633550593000, "content_id": "74b5591fb6510a69a19fa5c2700cc762560baaa4", "detected_licenses": [ "MIT" ], "directory_id": "715ea56fd4966b9982167df5cc678005a98de23c", "extension": "py", "file...
2.828125
stackv2
import requests def login_to_recnet(username, password): # REQUEST SESSION session = requests.Session() # GET REQUEST VERIFICATION TOKEN r = session.get("https://auth.rec.net/Account/Login") login_html = str(r.content) # Save the HTML from the login page # Gather the request verification tok...
76
40.29
119
15
846
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_be45e0cc6a6f69f0_d333acd4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 58 ]
[ null ]
[ 32 ]
[ 40 ]
2024-11-18T21:10:14.890763+00:00
1,567,505,106,000
9766ef97159b56424c903e467857655caf9dec45
3
{ "blob_id": "9766ef97159b56424c903e467857655caf9dec45", "branch_name": "refs/heads/master", "committer_date": 1567505106000, "content_id": "751c5cf045ad72b3eb5cd85f4595a00edf3c66ee", "detected_licenses": [ "MIT" ], "directory_id": "b0350d319b916ae670c902b50accd7b2ed403fff", "extension": "py", "fi...
3.34375
stackv2
# import pyperclip from user_credentials import User, Credential def create_user(firstname,lastname,password): ''' Function to create a new user account ''' new_user = User(firstname,lastname,password) return new_user def save_user(user): ''' Function to save a new user account ''' User.save_user(user) def...
161
27.75
131
27
1,082
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ea2f831eacb9cb1d_eadcb2dd", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.", "This expression logs [sensitive dat...
[ 77, 122, 130 ]
[ null, null, null ]
[ 10, 13, 15 ]
[ 89, 112, 125 ]
2024-11-18T21:10:25.407851+00:00
1,598,279,488,000
254c4c51b2e5585901c1e20faad3e5c37d08968d
2
{ "blob_id": "254c4c51b2e5585901c1e20faad3e5c37d08968d", "branch_name": "refs/heads/master", "committer_date": 1598279488000, "content_id": "b58a12ee00f9827e1211ffcf3fb872fcef261265", "detected_licenses": [ "Apache-2.0" ], "directory_id": "9e8daec9b79a118f52ce32f8de0ac4e3feb5f2f7", "extension": "py"...
2.34375
stackv2
from bmc import bmc_app, db from bmc.forms import LoginForm, RegistrationForm from bmc.library import Library from bmc.models import User, Practice from flask import render_template, request from flask import request, flash, redirect, url_for from flask_login import current_user, login_user, logout_user, login_required...
130
34
82
21
1,009
python
[{"finding_id": "codeql_py/url-redirection_4dd355cfcf9387b6_df68d30a", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
2
true
[ "CWE-601", "CWE-022" ]
[ "py/url-redirection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 109, 53 ]
[ null, null ]
[ 25, 15 ]
[ 34, 37 ]
2024-11-18T21:10:26.937511+00:00
1,441,060,592,000
6f0007b4b3ac7931f403aac29b32c3d4fbf7db14
3
{ "blob_id": "6f0007b4b3ac7931f403aac29b32c3d4fbf7db14", "branch_name": "refs/heads/master", "committer_date": 1441060592000, "content_id": "0de101f60a956a751000e7df375f13b40a9a977c", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "8fbe5c37e4fe781f6c301d79b782462491a6e2cb", "extension": "p...
3.3125
stackv2
#!/usr/bin/env python """ get_password function that displays asterisks instead of the actual characters. With the addition of a ControlT shortcut to hide/show the input. """ from __future__ import unicode_literals from prompt_toolkit.shortcuts import get_input from prompt_toolkit.key_binding.manager import KeyBindingM...
31
31.32
79
13
207
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0d8e7e52ac5bbce6_f71b2104", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 27 ]
[ null ]
[ 11 ]
[ 36 ]
2024-11-18T21:10:30.807600+00:00
1,692,017,646,000
4bedfeab416824b9a71b41190bbc7e19f0e2e5d3
2
{ "blob_id": "4bedfeab416824b9a71b41190bbc7e19f0e2e5d3", "branch_name": "refs/heads/master", "committer_date": 1692621741000, "content_id": "f2288d60024a82c55e571c0b15cdf8fbc3311719", "detected_licenses": [ "Apache-2.0" ], "directory_id": "3bba998ece193dd4594059025d0ebdc86a982e18", "extension": "py"...
2.3125
stackv2
# -*- coding: utf-8 -*- # Copyright European Organization for Nuclear Research (CERN) since 2012 # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-...
249
43.78
167
20
2,538
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_0486a4fc9b48f141_bf792c72", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e...
[ 57, 91 ]
[ null, null ]
[ 35, 35 ]
[ 50, 50 ]
2024-11-18T21:11:04.349108+00:00
1,492,651,065,000
24256af8fe14395d7a10b460531b8f5643d056f8
2
{ "blob_id": "24256af8fe14395d7a10b460531b8f5643d056f8", "branch_name": "refs/heads/master", "committer_date": 1492651065000, "content_id": "a27fb79cf4664c162660d09fef51a46e76ed5c1e", "detected_licenses": [ "MIT" ], "directory_id": "bc72c492b621f89d5f0202bdc79bf4a301bdd8d4", "extension": "py", "fi...
2.40625
stackv2
import requests import json from pprint import pprint import re import time import sys #getdata = requests.get(geturl) #pprint (vars(getdata)) from bs4 import BeautifulSoup from geopy.geocoders import Nominatim if len(sys.argv) != 4: print(sys.argv[0]+" <item> <location> <num items>") exit() #get list of prod...
110
28.79
159
19
922
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f28f901efb691453_31f359ec", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 70 ]
[ null ]
[ 8 ]
[ 44 ]
2024-11-18T19:03:21.918946+00:00
1,541,523,089,000
3917387dcb4797c0653c7e5ddc058942f457d957
3
{ "blob_id": "3917387dcb4797c0653c7e5ddc058942f457d957", "branch_name": "refs/heads/master", "committer_date": 1541523089000, "content_id": "412ef73c946090c0e291f05190df704445f8cf9f", "detected_licenses": [ "ISC" ], "directory_id": "7f73a911170c2ea7f892ec5d71ae24fdf18f7f46", "extension": "py", "fi...
2.578125
stackv2
import os import pathlib from cryptography.hazmat.backends import default_backend from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes import nacl from nacl.encoding import RawEncoder from nacl.signing import SigningKey from aeternity import hashing, utils # imports for keystore from datetime im...
216
36.88
115
16
1,809
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_32517ff7825a3f67_6d19486d", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 174, 193 ]
[ null, null ]
[ 25, 25 ]
[ 56, 54 ]
2024-11-18T19:03:37.133976+00:00
1,497,474,598,000
970ccfcd71202909eabf1105fccd748e1e52cc2b
3
{ "blob_id": "970ccfcd71202909eabf1105fccd748e1e52cc2b", "branch_name": "refs/heads/master", "committer_date": 1497474598000, "content_id": "fc6093ba43ad6cfcc69be3108cc1a24dac280d10", "detected_licenses": [ "MIT" ], "directory_id": "6c179681f5eb8259f24a0dcf57052c2a8e253fff", "extension": "py", "fi...
2.671875
stackv2
#!/usr/bin/env python3 import datetime as dt import requests import smtplib import socket import ssl class SiteCheckException(Exception): def __init__(self, message): self.message = message class SslCertException(SiteCheckException): pass class PingException(SiteCheckException): pass def p...
140
25.24
72
24
756
python
[{"finding_id": "codeql_py/insecure-protocol_eec4447e86b82a81_08a2c5b4", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/...
1
true
[ "CWE-327" ]
[ "py/insecure-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.create_default_context](1)." ]
[ 48 ]
[ null ]
[ 18 ]
[ 25 ]
2024-11-18T19:28:48.648273+00:00
1,623,007,871,000
77e57dc37250c79c7972d65845b318b063e7f4b2
3
{ "blob_id": "77e57dc37250c79c7972d65845b318b063e7f4b2", "branch_name": "refs/heads/master", "committer_date": 1623007871000, "content_id": "b0ecebd290e45b205b5dccb589b24ce098d930cb", "detected_licenses": [ "MIT" ], "directory_id": "f755238a8d8fc359c6d017b8cffbcd6d30bb9d28", "extension": "py", "fi...
3.015625
stackv2
import re # Nested Form data deserializer utility class # -------------------------------------------- class UtilityMixin(object): _nested_re = re.compile(r'((.+)\[(.*)\]+)|(\[(.*)\]{2,})') _namespace_re = re.compile(r'^([\w]+)(?=\[)') _list_re = re.compile(r'\[([0-9]+)\]') _number_re = re.compile(r'...
187
28.16
85
18
1,110
python
[{"finding_id": "codeql_py/redos_1486eebc7a126eac_d73e88ab", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '\\[' and containing many repetiti...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '\\[' and containing many repetitions of '/'." ]
[ 12 ]
[ null ]
[ 45 ]
[ 52 ]