added
stringlengths
32
32
created
int64
1,236B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.03
source
stringclasses
1 value
text
stringlengths
330
19.3k
num_lines
int64
16
648
avg_line_length
float64
15.5
59.3
max_line_length
int64
37
179
ast_depth
int64
8
38
length
int64
102
3.79k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.11k
276k
sast_codeql_findings_count
int64
1
33
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
33
rule_ids
listlengths
1
33
confidences
listlengths
1
33
severities
listlengths
1
33
messages
listlengths
1
33
line_starts
listlengths
1
33
line_ends
listlengths
1
33
column_starts
listlengths
1
33
column_ends
listlengths
1
33
2024-11-18T20:24:12.441607+00:00
1,614,014,736,000
88e7bb103b82dccc80e048d384c9275e2dde50d2
3
{ "blob_id": "88e7bb103b82dccc80e048d384c9275e2dde50d2", "branch_name": "refs/heads/main", "committer_date": 1614014736000, "content_id": "098f53adc6f787dc86522e971127734142088123", "detected_licenses": [ "MIT" ], "directory_id": "4c09da0fe386eff331b88055fe5cfd69f5bf03cb", "extension": "py", "file...
2.921875
stackv2
from keras.models import load_model from keras.preprocessing import image from keras.applications.resnet50 import ResNet50, preprocess_input import pickle import cv2 import numpy as np import os from flask import Flask, render_template, request app = Flask(__name__) # load model and data with open('static/dog_nam...
95
33.48
106
12
775
python
[{"finding_id": "codeql_py/flask-debug_aee01158eae0835c_4701b85e", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-022" ]
[ "py/flask-debug", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1)." ]
[ 95, 40 ]
[ null, null ]
[ 5, 19 ]
[ 51, 24 ]
2024-11-18T21:00:36.666258+00:00
1,476,769,646,000
1aa1957974a75e85fcd74f43ad51a3b31be512de
3
{ "blob_id": "1aa1957974a75e85fcd74f43ad51a3b31be512de", "branch_name": "refs/heads/master", "committer_date": 1476769646000, "content_id": "ec1f22dce9bd331cd58c31c7e259994c935b0f90", "detected_licenses": [ "MIT" ], "directory_id": "893991b18315857511baa271333fbeb77a3080ba", "extension": "py", "fi...
2.75
stackv2
import flask import sqlite3 import sqlalchemy import pandas as pd app = flask.Flask(__name__, static_folder='') sqlite_file = 'sqlite_database.db' db = sqlalchemy.create_engine('sqlite:///%s' % sqlite_file) table_signup = 'signup' key_name = 'name' key_email = 'email' key_skills = 'skills' key_wants = 'wants' def se...
60
31.93
118
12
508
python
[{"finding_id": "codeql_py/flask-debug_49638ef4847c8321_d2c8c53d", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-089" ]
[ "py/flask-debug", "py/sql-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This SQL query depends on a [user-provided value](1)." ]
[ 60, 42 ]
[ null, 44 ]
[ 5, 16 ]
[ 24, 64 ]
2024-11-18T21:00:38.464761+00:00
1,552,783,971,000
e166fbaff341d9dee3689f96137cebd4cb26fbb6
3
{ "blob_id": "e166fbaff341d9dee3689f96137cebd4cb26fbb6", "branch_name": "refs/heads/master", "committer_date": 1552783971000, "content_id": "72ad8909b6b380f062d3edde5c256cf0a410f2c4", "detected_licenses": [ "MIT" ], "directory_id": "f30e7e6313d98d972ea75b499a2caad3a1247c9c", "extension": "py", "fi...
2.515625
stackv2
import dateutil.parser; import mistune; import re; import requests; from capito import changelogs; from capito.changelogs import Changelog, Version; # Define regular expressions to detect changelog parts regex_version = "^(?:[^*#\s-]).*(\d+(?:\.\w+)+).*"; regex_version_name = "(\d+(?:\.\w+)+)"; regex_date = "([0-9].*...
153
37.18
107
18
1,346
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_18191b99d0e1e756_df270f4b", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This string, which is used as a regular expression [here](1), has an unescaped '.' befor...
1
true
[ "CWE-020" ]
[ "py/incomplete-hostname-regexp" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This string, which is used as a regular expression [here](1), has an unescaped '.' before 'githubusercontent.com', so it might match more hosts than expected." ]
[ 17 ]
[ null ]
[ 21 ]
[ 50 ]
2024-11-18T21:25:37.244863+00:00
1,575,169,484,000
631811aeefe261a0dea914896b643667141b1429
2
{ "blob_id": "631811aeefe261a0dea914896b643667141b1429", "branch_name": "refs/heads/master", "committer_date": 1575169484000, "content_id": "03bd97570c0791c6a426c3ad07feda423d7f593c", "detected_licenses": [ "MIT" ], "directory_id": "7565001d283bbd34832ef1d02e183157d6f06c65", "extension": "py", "fi...
2.390625
stackv2
import requests import os import json from bs4 import BeautifulSoup from flask import Flask, request, render_template, send_from_directory app = Flask(__name__) @app.route("/") def index(): return render_template("index.html") @app.route("/wiki_search") def search(): return render_template("wiki_search.html...
107
29.09
103
20
722
python
[{"finding_id": "codeql_py/path-injection_1282292b21bcd367_03c597a1", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
3
true
[ "CWE-022", "CWE-918", "CWE-918" ]
[ "py/path-injection", "py/partial-ssrf", "py/partial-ssrf" ]
[ "HIGH", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 87, 33, 98 ]
[ null, null, null ]
[ 15, 22, 30 ]
[ 45, 79, 86 ]
2024-11-18T21:51:25.286527+00:00
1,637,437,963,000
5fd663abd2a56278ca19fd7fba2e09f1c6311563
3
{ "blob_id": "5fd663abd2a56278ca19fd7fba2e09f1c6311563", "branch_name": "refs/heads/main", "committer_date": 1637437963000, "content_id": "ed7cad412ee598aa189e7c3f105f631831257858", "detected_licenses": [ "MIT" ], "directory_id": "49cfd8442be5ab3d6f3db43a733133a9bc6529ff", "extension": "py", "file...
2.796875
stackv2
import os import getpass import hashlib if __name__=="__main__": #Get number of CPUs cpus_available = int(os.environ['SLURM_CPUS_PER_TASK']) #Get username username = getpass.getuser() #Create Hash Code hash_object = hashlib.md5(username.encode()) #Result for webcampus is print('Y...
17
23.88
113
12
107
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_e71d65e6561bc716_f19e3bba", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.",...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 13 ]
[ null ]
[ 31 ]
[ 48 ]
2024-11-18T21:51:35.245565+00:00
1,628,838,872,000
6c73d7e51c6d523c03696911976a6f3e52e1d292
2
{ "blob_id": "6c73d7e51c6d523c03696911976a6f3e52e1d292", "branch_name": "refs/heads/master", "committer_date": 1628838872000, "content_id": "5b16dd448e33c1fec68fc970d31333d4d798a011", "detected_licenses": [ "Apache-2.0" ], "directory_id": "f0a19130a0f573f506f44369c481b4d0ef2742a2", "extension": "py"...
2.4375
stackv2
#!/usr/bin/env python3 ################################################################################ # # Title: awx_aiqum_inventory # Author: Adrian Bronder # Date: 2020-09-07 # Description: Custom script for inventory collection with AWX from AIQUM # with Ansible modulesdd # # S...
98
35.76
131
18
648
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2ea7b70f5e5321b7_6001df20", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-295" ]
[ "py/clear-text-logging-sensitive-data", "py/request-without-cert-validation" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This request may run without certificate validation because [it is disabled](1)." ]
[ 54, 61 ]
[ null, null ]
[ 34, 36 ]
[ 59, 84 ]
2024-11-18T21:51:37.469268+00:00
1,615,746,938,000
5cd65ea32422a37887fd1b28e387725706b62b3d
3
{ "blob_id": "5cd65ea32422a37887fd1b28e387725706b62b3d", "branch_name": "refs/heads/main", "committer_date": 1615746938000, "content_id": "61fd7383861adb1e8557cfdb0d9cb6e09f9e23d0", "detected_licenses": [ "MIT" ], "directory_id": "0418ec1ab48ab6dd3c7cc2d7b78da95c39a98df3", "extension": "py", "file...
2.515625
stackv2
import os import hashlib from datetime import datetime import json from flask_cors import CORS from flask import Flask, request, jsonify, render_template from bson.objectid import ObjectId from dotenv import load_dotenv load_dotenv() from sendgrid import SendGridAPIClient from sendgrid.helpers.mail import Mail from he...
366
34.99
147
19
2,952
python
[{"finding_id": "codeql_py/flask-debug_f1a1abfd36a9bd60_b6c64a0a", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-327" ]
[ "py/flask-debug", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)]...
[ 364, 43 ]
[ null, null ]
[ 5, 26 ]
[ 24, 41 ]
2024-11-18T22:00:21.354494+00:00
1,532,732,748,000
1de9e6fde29d0e20d9bf858c4ca3133fcae0b3b8
2
{ "blob_id": "1de9e6fde29d0e20d9bf858c4ca3133fcae0b3b8", "branch_name": "refs/heads/master", "committer_date": 1532733458000, "content_id": "d1f1c4eab50e4532a8828b755d79f79bb771c4ea", "detected_licenses": [ "MIT" ], "directory_id": "ca0ae3c54fca60b992330dd546afc47590ddb265", "extension": "py", "fi...
2.3125
stackv2
#!/usr/bin/env python2 from flask import Flask, render_template, request, redirect, Response, jsonify, make_response import kd_tree_test as kd import urllib2 import json app = Flask(__name__, template_folder='.') @app.route('/') def output(): return render_template("index.html") @app.route('/hf_compute', method...
44
30.09
99
16
313
python
[{"finding_id": "codeql_py/partial-ssrf_b1ed7771db273895_2c76779f", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 26 ]
[ null ]
[ 16 ]
[ 93 ]
2024-11-18T22:00:22.062747+00:00
1,593,318,509,000
0f53686489ff753eccc438af1a994666bf492931
4
{ "blob_id": "0f53686489ff753eccc438af1a994666bf492931", "branch_name": "refs/heads/master", "committer_date": 1593318509000, "content_id": "05e2f4793c14c1475ce975f6b78ed62b068480bf", "detected_licenses": [ "MIT" ], "directory_id": "9213a0c84535d843729f56dcdf6f57b391476d0d", "extension": "py", "fi...
3.796875
stackv2
#!/bin/python3 import itertools import collections def sliding_window(n, seq): """ Copied from toolz https://toolz.readthedocs.io/en/latest/_modules/toolz/itertoolz.html#sliding_window A sequence of overlapping subsequences >>> list(sliding_window(2, [1, 2, 3, 4])) [(1, 2), (2, 3), (3, 4)] ...
39
29.74
87
14
321
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0ac7f9ad4dc792a5_23a6bcc1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 39 ]
[ null ]
[ 7 ]
[ 46 ]
2024-11-18T22:00:46.806630+00:00
1,487,646,114,000
269acdfe0fa11f05e04a796ad91c0c21e9026389
3
{ "blob_id": "269acdfe0fa11f05e04a796ad91c0c21e9026389", "branch_name": "refs/heads/master", "committer_date": 1487646114000, "content_id": "c762fcb46816e08b47116bfae2f59d1493265bb4", "detected_licenses": [ "Apache-2.0" ], "directory_id": "77d80eba62237f347fd9a98d7ca4d9f848a8395a", "extension": "py"...
2.609375
stackv2
""" :mod:`apps.kb.models` -- Models for app kb. """ # Std imports import os import logging import re from datetime import datetime from pprint import pformat # Django imports from django.utils.encoding import smart_str from django.db import models from django.core.exceptions import ValidationError from django.utils.t...
205
35.21
123
17
1,531
python
[{"finding_id": "codeql_py/redos_52be78717cc2f08b_bdb03b41", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '+'.", "remediati...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '+'." ]
[ 36 ]
[ null ]
[ 28 ]
[ 47 ]
2024-11-18T22:00:50.367041+00:00
1,493,201,927,000
b34d581c25f170e81ec95668b05418e27fa31a9b
3
{ "blob_id": "b34d581c25f170e81ec95668b05418e27fa31a9b", "branch_name": "refs/heads/master", "committer_date": 1493201941000, "content_id": "25cacab698b315826078288719bc09c26bc0b83f", "detected_licenses": [ "MIT" ], "directory_id": "aacf6824d45ed6b8400c72bf6d51f029b1d05f04", "extension": "py", "fi...
2.65625
stackv2
#!/usr/bin/python # # Authentication proxy app import Api import sys import struct import logging # Logging instance log = logging.getLogger('extauth') class EjabberdInputError(Exception): def __init__(self, value): self.value = value def __str__(self): return repr(self.value) class AuthApp:...
94
22.05
59
19
615
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_cf4dd2ebae94fa1d_2a8c773f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 74 ]
[ null ]
[ 12 ]
[ 37 ]
2024-11-18T22:00:55.183628+00:00
1,631,033,530,000
1f07f0d4b8ee256db8064a57b5d52353a1454a8c
2
{ "blob_id": "1f07f0d4b8ee256db8064a57b5d52353a1454a8c", "branch_name": "refs/heads/master", "committer_date": 1631033530000, "content_id": "44c89f408a39fe906b49c34bec1c724aa605d4de", "detected_licenses": [ "MIT" ], "directory_id": "a6cead13b32d77125388f2b5bee77b377b809f01", "extension": "py", "fi...
2.421875
stackv2
if __name__ == "__main__": import sys import urllib import urllib.request import tarfile import os if len(sys.argv) < 2: print("No arguments given") pass command = sys.argv.pop(1) if command == "download_knowledge_base": FILE_URL = "https://wikidatafiles.nyc3.d...
28
31.96
121
14
224
python
[{"finding_id": "codeql_py/tarslip_e61925dcdc568de0_8c75275c", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 25 ]
[ null ]
[ 9 ]
[ 12 ]
2024-11-18T22:01:06.593980+00:00
1,632,687,712,000
9c3e6201a72176ae904ee419cb9f4257452bbd4d
2
{ "blob_id": "9c3e6201a72176ae904ee419cb9f4257452bbd4d", "branch_name": "refs/heads/master", "committer_date": 1632687712000, "content_id": "dfe9c58a05707e220ccca3adaa0cbba9feff1a58", "detected_licenses": [ "ISC" ], "directory_id": "3b1a49ca739e6af3b56f17220b8f0a138d38fec8", "extension": "py", "fi...
2.40625
stackv2
import config from flask import Flask, request from fenix import fenix_client from database import session_scope, User, init_db app = Flask(__name__) init_db() @app.route('/') def auth(): if 'error' in request.args: return f"{request.args.get('error')}: {request.args.get('error_description')}" try: ...
32
30.56
106
15
221
python
[{"finding_id": "codeql_py/reflective-xss_8e421fbb50641519_9d277af4", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 14 ]
[ null ]
[ 16 ]
[ 87 ]
2024-11-18T22:01:14.661520+00:00
1,479,144,669,000
114edf20dc5ed9f3794116495e9aa1d55128af6d
3
{ "blob_id": "114edf20dc5ed9f3794116495e9aa1d55128af6d", "branch_name": "refs/heads/master", "committer_date": 1479144669000, "content_id": "1a874515315b278270dd696e2b574b2734ee04d2", "detected_licenses": [ "MIT" ], "directory_id": "f25e6f75563f28be32a3180ad330350315bb1bbe", "extension": "py", "fi...
2.703125
stackv2
import tornado.web import tornado.escape import json from pow_comments.config import myapp from pow_comments.models.user import User # # # Base PoW handler (Controller) # automatically adds RESTful routing: # 1 GET /items #=> index # 2 GET /items/1 #=> show # 3 GET /items/new #=>...
307
36.73
131
23
2,542
python
[{"finding_id": "codeql_py/reflective-xss_66229c86a6df3d27_965be406", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 210 ]
[ null ]
[ 20 ]
[ 26 ]
2024-11-18T22:15:06.106076+00:00
1,674,374,018,000
d38f65c7b0afb9116e6d1ac2c0a461efe0fb8661
3
{ "blob_id": "d38f65c7b0afb9116e6d1ac2c0a461efe0fb8661", "branch_name": "refs/heads/master", "committer_date": 1674374018000, "content_id": "5f7e099d95c10013309d9c2e5e4f1774c1f931d1", "detected_licenses": [ "MIT" ], "directory_id": "04f75ffb1333f6538c22ecef087978d4520195ce", "extension": "py", "fi...
3.03125
stackv2
from openpyxl import Workbook, load_workbook import random import string def read_excel(fname): wb = load_workbook(filename=fname) data = wb.active r = data.max_row col = data.max_column item = [] array = [] for i in range(1, r + 1): for j in range(2, col + 1): cell_val...
54
23.43
76
13
322
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7bd936b1360a7061_9b1b8961", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 20 ]
[ null ]
[ 11 ]
[ 16 ]
2024-11-18T22:26:13.166582+00:00
1,693,476,121,000
52f6b087cc6825832735f366baabb4e946c31647
2
{ "blob_id": "52f6b087cc6825832735f366baabb4e946c31647", "branch_name": "refs/heads/master", "committer_date": 1693476121000, "content_id": "7da94f73e48e8a14d2d0a0b3453674eb4e832fe5", "detected_licenses": [ "MIT" ], "directory_id": "8baa789931c40073889ef7bd5f913947deb36bb5", "extension": "py", "fi...
2.484375
stackv2
# -*- coding: utf-8 -*- from six.moves.urllib.parse import quote, unquote, urlparse, urlencode import hmac import time import hashlib import logging from requests.auth import AuthBase from .cos_comm import to_unicode, to_bytes, to_str logger = logging.getLogger(__name__) def filter_headers(data): """只设置host con...
186
37.18
167
20
1,797
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_896b342280f498ed_60dcb3f8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 137 ]
[ null ]
[ 22 ]
[ 48 ]
2024-11-18T22:26:17.949973+00:00
1,625,072,206,000
5cb6a89166d187566b8e13bfb78a291384d358cf
3
{ "blob_id": "5cb6a89166d187566b8e13bfb78a291384d358cf", "branch_name": "refs/heads/main", "committer_date": 1625072206000, "content_id": "fcd1c46d3998639f497791a1b8443b2cb415ff98", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "187f1b4d1cd8076eac3bb2973d01b85512c98e4e", "extension": "py"...
2.90625
stackv2
import sys import shutil import json import subprocess from typing import Union from pathlib import Path from jinja2 import Template class UserModel(): """Handles user-defined model described in python scripts. """ def __init__(self): self.parent = Path(__file__).resolve().parent self.dst...
224
30.03
83
18
1,560
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_7dc7033e74de2f67_98ec1bc6", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 192, 207 ]
[ null, null ]
[ 16, 16 ]
[ 27, 29 ]
2024-11-18T22:26:18.885696+00:00
1,558,938,021,000
303c6e2250c963b0adcc6a2ea69b2f640cb785d2
2
{ "blob_id": "303c6e2250c963b0adcc6a2ea69b2f640cb785d2", "branch_name": "refs/heads/master", "committer_date": 1558938021000, "content_id": "e654b481b5c151ce719deeda16755e698b261c2c", "detected_licenses": [ "MIT" ], "directory_id": "bcc57683b4b7982c8ed011cd18f3f26c222dded6", "extension": "py", "fi...
2.5
stackv2
import datetime as dt import pandas as pd from pandas import DataFrame, Series import os import sys import re import logging import sqlalchemy from configobj import ConfigObj import html from flask import Flask, request class ListManager(object): config = ConfigObj('C:/webapps/listman/listman.conf') MAIL_SERV...
223
43.5
137
22
2,186
python
[{"finding_id": "codeql_py/flask-debug_9d18cf5eb999d02a_0832f98f", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
5
true
[ "CWE-215", "CWE-1333", "CWE-079", "CWE-089", "CWE-089" ]
[ "py/flask-debug", "py/polynomial-redos", "py/reflective-xss", "py/sql-injection", "py/sql-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with many repetitions of '?'.", "Cross-site scripting vulnerability due to a [user-provided valu...
[ 223, 93, 219, 103, 116 ]
[ null, null, null, null, null ]
[ 5, 45, 12, 26, 30 ]
[ 24, 54, 19, 33, 37 ]
2024-11-18T20:40:03.566851+00:00
1,427,063,095,000
4df04c10fefff81196b34f2efe46ee0af47317f5
3
{ "blob_id": "4df04c10fefff81196b34f2efe46ee0af47317f5", "branch_name": "refs/heads/master", "committer_date": 1427063095000, "content_id": "b59e582f2b18b06537ea9df8b5181fa879c172de", "detected_licenses": [ "MIT" ], "directory_id": "efad0656670d7fb5c45fff2b8eb62b7bd9b56bc4", "extension": "py", "fi...
2.625
stackv2
import os.path import tornado.ioloop import tornado.web import re, praw, requests, os, glob, sys from bs4 import BeautifulSoup def addimagetolist(submissions, image_list): # Process all the submissions from the front page for submission in submissions: # Check for all the cases where we will skip a sub...
130
44.52
104
21
1,234
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_38a2d9af3e29fee2_6b9b65e3", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [http://i.imgur.com/](1) may be at an arbitrary positio...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "The string [http://i.imgur.com/](1) may be at an arbitrary position in the sanitized URL.", "The string [http://imgur.com/](1) may be at an arbitrary position in the sanitized URL." ]
[ 29, 40 ]
[ null, null ]
[ 14, 14 ]
[ 53, 51 ]
2024-11-18T20:52:24.814813+00:00
1,624,105,809,000
ec7f5276e90681021ce434a26618775478292b00
3
{ "blob_id": "ec7f5276e90681021ce434a26618775478292b00", "branch_name": "refs/heads/main", "committer_date": 1624105809000, "content_id": "8a5cda44e1bf5816c53eddb1ababdf3bef5c2df6", "detected_licenses": [ "Apache-2.0" ], "directory_id": "45d02ae8c0962284697c1678cac8633141082e9d", "extension": "py", ...
2.796875
stackv2
#python 3.7.1 from time import sleep as sp app=str(input("app: ")) username=str(input("username: ")) import socket host = socket.gethostname() ip = socket.gethostbyname(host) import random lower = "abcdefghijklmnopqrstuvwxyz" upper = "ABCDEFGHIJKLMNOPQRSTUVWXYZ" number = "0123456789" all = lower + upper + number len...
66
19.7
76
11
434
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e82448fe0b8e816c_b22bec1b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 63 ]
[ null ]
[ 11 ]
[ 12 ]
2024-11-18T21:08:06.803376+00:00
1,509,992,216,000
1ece10356f6eaa9cadf8852299ebd2fac9fbf65b
2
{ "blob_id": "1ece10356f6eaa9cadf8852299ebd2fac9fbf65b", "branch_name": "refs/heads/master", "committer_date": 1509992216000, "content_id": "62b078471abe423e4c9a98cd89d0e8e4e0e493aa", "detected_licenses": [ "MIT" ], "directory_id": "8b75737cbc0055e85bcbf6970cdf0619e7394d46", "extension": "py", "fi...
2.359375
stackv2
# pylint: disable=line-too-long import os import logging import docker import hmac from hashlib import sha1 from flask import Flask, jsonify, request, Response from flask_cors import CORS, cross_origin VERSION = '0.0.1' WORKER_INFO = { 'image': os.environ.get('INSTANCE_IMAGE_NAME'), 'source_port': 3000, } d...
117
38.91
127
20
1,044
python
[{"finding_id": "codeql_py/stack-trace-exposure_2b7e2fd15b237261_ae1f54ac", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 102 ]
[ null ]
[ 30 ]
[ 36 ]
2024-11-18T21:08:26.390983+00:00
1,628,496,047,000
53269516393d8af10f9ebec633c2f2a29ed04c52
3
{ "blob_id": "53269516393d8af10f9ebec633c2f2a29ed04c52", "branch_name": "refs/heads/master", "committer_date": 1628496047000, "content_id": "9f7786877634a2d47598deb2e4e87615cbb12e30", "detected_licenses": [ "MIT" ], "directory_id": "5a34ce118ea4503e2497ddd5517da3805cc15690", "extension": "py", "fi...
3.171875
stackv2
import pandas as pd import matplotlib.pyplot as plt # 读取脱发信息文件 df = pd.read_csv(filepath_or_buffer="2019年国内脱发人群抽样信息.csv") # print(df.columns) # Index(['性别', '年龄', '职业', '所在城市', '脱发类型'], dtype='object') # 预处理:分组统计 # 统计不同性别人数 seriesGenderCnt = df["性别"].value_counts() # 也可以按照SQL语句特色来分组、聚合 # 不过,这里需要添加代理码 # df["surrogate"...
57
24.12
105
10
535
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_22ad7f06429ed96d_18148068", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 27 ]
[ 29 ]
[ 7 ]
[ 52 ]
2024-11-18T21:08:32.921249+00:00
1,618,800,030,000
f84d0885e1ea083cc6ee385b62223026b36861a4
3
{ "blob_id": "f84d0885e1ea083cc6ee385b62223026b36861a4", "branch_name": "refs/heads/master", "committer_date": 1618800030000, "content_id": "ebb8bf6750e00f53967bfc42a65b1c5f0af7dc3b", "detected_licenses": [ "MIT" ], "directory_id": "79bd1caf21f7810c3c76379341db36884e617bce", "extension": "py", "fi...
2.5625
stackv2
from selenium.webdriver.common.action_chains import ActionChains from selenium.webdriver.common.keys import Keys from selenium import webdriver from time import sleep from sys import exit import PySimpleGUI as sg import openpyxl import os import docx import socket import logging #logging.basicConfig(filename='LastLog...
149
29.88
123
21
1,143
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fb3ddbdb44cd71fa_d91bbecc", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 109 ]
[ null ]
[ 15 ]
[ 66 ]
2024-11-18T21:31:28.253940+00:00
1,451,973,794,000
43891ce2657b14ce4ecb8f64c51c93c7e2207180
2
{ "blob_id": "43891ce2657b14ce4ecb8f64c51c93c7e2207180", "branch_name": "refs/heads/master", "committer_date": 1451973794000, "content_id": "f2326c30fce96d1e00a03f699afd91bb7d7b91df", "detected_licenses": [ "MIT" ], "directory_id": "3043ce9d80e2451a4231ee33035f821ae1786583", "extension": "py", "fi...
2.453125
stackv2
""" Create the index page. """ import os from os import path import subprocess import csv from jinja2 import Environment, PackageLoader from static_html_demo.utils import (make_local_copy, timestamp_now, mkdir, Opener, include_file) def get_versions(): output = subprocess.ch...
75
35.04
84
15
593
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_73ec7f062882ff69_f41fc9f9", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 60 ]
[ null ]
[ 11 ]
[ 77 ]
2024-11-18T21:31:32.044801+00:00
1,457,917,710,000
14bcfb51255a4c3a39d14e2edb2c76f11af9f62c
3
{ "blob_id": "14bcfb51255a4c3a39d14e2edb2c76f11af9f62c", "branch_name": "refs/heads/master", "committer_date": 1457917710000, "content_id": "e1f84f3801a5b8c252b0a5cf275f27775033931c", "detected_licenses": [ "MIT" ], "directory_id": "1fb7441ab6d6a82102ccb29e87b52b667405eb18", "extension": "py", "fi...
2.640625
stackv2
#!/usr/bin/env python3 from bs4 import BeautifulSoup from flask import Flask from flask import request import datetime import requests import json import re # The URLs for the login page and the main timetable page CURRENT_YEAR = datetime.datetime.now().year LOGIN_PAGE = 'https://timetable.jcu.edu.au/%i/Login.aspx' % ...
298
35.79
174
21
2,811
python
[{"finding_id": "codeql_py/stack-trace-exposure_6b025a57b18da88e_322c3b4e", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-730" ]
[ "py/stack-trace-exposure", "py/regex-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "This regular expression depends on a [user-provided value](1) and is executed by [re.match](2)." ]
[ 295, 77 ]
[ null, null ]
[ 16, 42 ]
[ 45, 52 ]
2024-11-18T21:31:34.919304+00:00
1,617,807,023,000
66a89ab40a32f6797b2be8dd823d5e3b21dab9a8
3
{ "blob_id": "66a89ab40a32f6797b2be8dd823d5e3b21dab9a8", "branch_name": "refs/heads/main", "committer_date": 1617807023000, "content_id": "2d6ca528ad6c5ba454c83eacf4194c1399f9fca4", "detected_licenses": [ "Apache-2.0" ], "directory_id": "faecc8e9a6e42114ea9738f1954e35570710fd82", "extension": "py", ...
2.8125
stackv2
""" UserController.py Sprinkle Created by LeeKW on 2021/02/04. """ from sprinkle.models.User import User class UserController(): def __init__(self): self.user = User() def createUser(self, userInfo): """ 새로운 사용자 정보를 Database에 저장하는 메소드 기존에 동일한 정보가 있는지 확인하고 없다면 새로 저장한다. ...
73
27.4
74
18
555
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_381fdae31a6ded52_9fbed576", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 29 ]
[ null ]
[ 15 ]
[ 23 ]
2024-11-18T21:32:15.074336+00:00
1,600,583,069,000
31f70f2e4e1ae7785f69317dbff21fed9575b40d
3
{ "blob_id": "31f70f2e4e1ae7785f69317dbff21fed9575b40d", "branch_name": "refs/heads/master", "committer_date": 1600583069000, "content_id": "2b19caef77215654a3b33e4b76a658be717f1358", "detected_licenses": [ "Apache-2.0" ], "directory_id": "338883a2aa0ebc0555e9f33497bb28cfa9614a27", "extension": "py"...
2.53125
stackv2
from flask import Flask from flask import render_template,request from jinja2 import Template import re app = Flask(__name__, template_folder='templates') compression = r"\"|ca|mor|hea|tai|\{%|\\" def black_list(string): global compression print(re.findall(compression,string)) if re.findall(compression,st...
33
24.94
63
14
204
python
[{"finding_id": "codeql_py/template-injection_d88bb64a608b70e5_bb4153d9", "tool_name": "codeql", "rule_id": "py/template-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This template construction depends on a [user-provided value](1).", "remediation": "", "location": ...
2
true
[ "CWE-074", "CWE-079" ]
[ "py/template-injection", "py/jinja2/autoescape-false" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This template construction depends on a [user-provided value](1).", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 25, 25 ]
[ null, null ]
[ 32, 23 ]
[ 63, 64 ]
2024-11-18T21:32:17.130366+00:00
1,657,375,515,000
25dd4ab52e00f86bb7c33977b1b18821c2b73f93
3
{ "blob_id": "25dd4ab52e00f86bb7c33977b1b18821c2b73f93", "branch_name": "refs/heads/master", "committer_date": 1657375515000, "content_id": "27697f797a96d0ba5b7b72b8326f1fdd58551666", "detected_licenses": [ "MIT" ], "directory_id": "39656b7cefe1569987ef00456b592fbeccd8fb25", "extension": "py", "fi...
2.578125
stackv2
import jinja2 import typing class TemplateGenerator: def __init__(self, *, dirname: str): self.template_loader = jinja2.FileSystemLoader(searchpath=dirname) def render(self, *, path: str, payload: typing.Dict, filters: typing.Optional[typing.Dict] = None) ...
20
31.55
74
12
126
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_9e422da353677e52_0cf751fc", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 15 ]
[ null ]
[ 24 ]
[ 71 ]
2024-11-18T21:32:27.494879+00:00
1,571,681,307,000
42dff47ac43ffbe2b365e3fc0365341d1ea74841
2
{ "blob_id": "42dff47ac43ffbe2b365e3fc0365341d1ea74841", "branch_name": "refs/heads/master", "committer_date": 1571681307000, "content_id": "17a021a08d010a549b56905b59ee2d4d8ba76523", "detected_licenses": [ "MIT" ], "directory_id": "52ca6c98d8cb44c5e7bcf1484354f75111cacedd", "extension": "py", "fi...
2.453125
stackv2
import urllib.request, urllib.parse, urllib.error #import json from bs4 import BeautifulSoup import os from flask import Flask from flask import request from flask import make_response # Flask app should start in global layout app = Flask(__name__) @app.route('/webhook', methods=['POST']) def webhook(): req = re...
112
29.77
145
19
825
python
[{"finding_id": "codeql_py/partial-ssrf_3730d4f2e7b19fa6_e72e236b", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
2
true
[ "CWE-918", "CWE-918" ]
[ "py/partial-ssrf", "py/partial-ssrf" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 32, 42 ]
[ null, null ]
[ 12, 12 ]
[ 44, 39 ]
2024-11-18T21:32:44.356584+00:00
1,691,399,521,000
dc784ff812836e9ec0085f65e98d53f6f3787f92
3
{ "blob_id": "dc784ff812836e9ec0085f65e98d53f6f3787f92", "branch_name": "refs/heads/master", "committer_date": 1691399521000, "content_id": "9223908940906c0cd2f14c8345be28d2220ddb26", "detected_licenses": [ "MIT" ], "directory_id": "6b5ffc003053d4aaacbf200c119cf2344c289da2", "extension": "py", "fi...
2.515625
stackv2
import os import socket import sys import boto3 sys.path.append(os.path.abspath(os.path.join(__file__, "../../../"))) import logging import v2.utils.utils as utils from botocore.client import Config log = logging.getLogger() class Auth(object): """ This class is used to perform authentication. The fun...
171
29.53
81
15
1,081
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_061fedbaf4118d20_1d0910f5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text." ]
[ 55 ]
[ null ]
[ 18 ]
[ 52 ]
2024-11-18T21:33:11.734914+00:00
1,512,976,263,000
324285eaea67fb63bf305eabd69225ebad3c6118
3
{ "blob_id": "324285eaea67fb63bf305eabd69225ebad3c6118", "branch_name": "refs/heads/master", "committer_date": 1512976263000, "content_id": "654d13bb6c1b608734ca8c181c582e80f353b591", "detected_licenses": [ "Apache-2.0" ], "directory_id": "b524eafac75ce50461176bea4dd5397a70ff6e67", "extension": "py"...
2.625
stackv2
#usr/bin/python3 import os print("********* file operate *************") print("is file : ", os.path.isfile("text.txt")) print("is abs: ", os.path.isabs("text.txt")) print("is abs: ", os.path.isabs("/d")) print("exists", os.path.exists("/d/soft")) print("exists .", os.path.exists(".")) print("exists .. ", os.p...
126
24.1
88
12
866
python
[{"finding_id": "codeql_py/overly-permissive-file_79752c7af3658525_ded82a00", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ...
2
true
[ "CWE-732", "CWE-732" ]
[ "py/overly-permissive-file", "py/overly-permissive-file" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world writable.", "Overly permissive mask in chmod sets file to world writable." ]
[ 68, 72 ]
[ null, null ]
[ 5, 5 ]
[ 34, 40 ]
2024-11-18T21:49:05.520075+00:00
1,595,449,080,000
3d863e7b9780bae68f2548509c2bdf5866bcf0ae
3
{ "blob_id": "3d863e7b9780bae68f2548509c2bdf5866bcf0ae", "branch_name": "refs/heads/master", "committer_date": 1595449080000, "content_id": "cbdad800d4dbee07bf9858f4b827a6e58db6facb", "detected_licenses": [ "MIT" ], "directory_id": "69647e2a24ee342a9fe59b04ff4b9d9400ce2ffd", "extension": "py", "fi...
3.234375
stackv2
#!/usr/bin/env python3 """ Advent of Code 2016: Day 5 """ import hashlib decrypted = [ "00000fe1e92080b9951b053e70e31fcb", "000007c827126c81fa664211693f2540", "000007880153f1b804481a39a6d2e86a", "00000a6e225253b6aaa8f20efbaad8b5", "00000096164643e2e0fbf5a91bfd7f06", "00000e77a8b223b2d149990fb63...
84
23.45
81
19
735
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8cb20e2f6152c3b4_7c3db4b6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 75, 77 ]
[ null, null ]
[ 11, 11 ]
[ 20, 20 ]
2024-11-18T21:49:08.699280+00:00
1,667,714,621,000
7ad08cce66574062e94557bd2783eace7b7e25db
3
{ "blob_id": "7ad08cce66574062e94557bd2783eace7b7e25db", "branch_name": "refs/heads/master", "committer_date": 1667714621000, "content_id": "4f30e0bcd27b635b1ab6c87ecfb24fc673c94f4d", "detected_licenses": [ "MIT" ], "directory_id": "7fc455fd780d67fc0685850da82cb508e34c4de5", "extension": "py", "fi...
2.609375
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- import os def main(): for path, dirnames, filenames in os.walk('.'): for dname in dirnames: try: os.chmod(os.path.join(path, dname), 0775) except OSError as e: print('set {} error: {}'.format(dname, e)) ...
23
26.7
58
17
151
python
[{"finding_id": "codeql_py/overly-permissive-file_fb7f55591251684f_0243d7ad", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
2
true
[ "CWE-732", "CWE-732" ]
[ "py/overly-permissive-file", "py/overly-permissive-file" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable.", "Overly permissive mask in chmod sets file to world readable." ]
[ 9, 16 ]
[ null, null ]
[ 17, 17 ]
[ 58, 58 ]
2024-11-18T22:42:12.238617+00:00
1,634,011,374,000
ee6a0e5f17444dc6376b2da309cfe29e31d78753
3
{ "blob_id": "ee6a0e5f17444dc6376b2da309cfe29e31d78753", "branch_name": "refs/heads/master", "committer_date": 1634011374000, "content_id": "a62686570bc6f67c52f98649cf46cb35e6af30f5", "detected_licenses": [ "Apache-2.0" ], "directory_id": "c0933acba30c172c3e4fa1edeba7159b0a5b32db", "extension": "py"...
2.828125
stackv2
# Copyright 2016, 2020 John J. Rofrano. All Rights Reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # https://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable ...
84
34.54
88
13
623
python
[{"finding_id": "codeql_py/stack-trace-exposure_0a4a6c4b0858763c_bb8be6f9", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 71 ]
[ null ]
[ 30 ]
[ 43 ]
2024-11-18T20:31:26.778657+00:00
1,666,569,906,000
b221cf8f47a74e4d41fe79e67f6dc55354420cc2
3
{ "blob_id": "b221cf8f47a74e4d41fe79e67f6dc55354420cc2", "branch_name": "refs/heads/main", "committer_date": 1666569906000, "content_id": "84c70eafd8570dd3ad9d36f1f3a285137c0d65ce", "detected_licenses": [], "directory_id": "9be8d7b4db213990ae0d10ffee3705f210651371", "extension": "py", "filename": "utils...
3.09375
stackv2
#!/usr/bin/env python """Import required modules.""" import os import re from typing import TypedDict, Tuple import meraki # Constant variables declaration API_KEY = os.environ['MERAKI_API_KEY_HH'] # API_KEY = os.environ['MERAKI_API_KEY_SYD_TRAINING'] BASE_URL = "https://api.meraki.com/api/v0" PRODUCT_TYPES = { 'm...
238
36.99
79
20
2,119
python
[{"finding_id": "codeql_py/overly-large-range_ddd4bac0206c9218_9ac698b5", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[)*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", "reme...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[)*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 96 ]
[ null ]
[ 52 ]
[ 55 ]
2024-11-18T20:31:39.586508+00:00
1,644,056,429,000
761b45673d5d0c6c9c37fafd762e3396eec7901d
2
{ "blob_id": "761b45673d5d0c6c9c37fafd762e3396eec7901d", "branch_name": "refs/heads/master", "committer_date": 1644056429000, "content_id": "ec9682c8a1a644703bfb126eedc0f1e573166d6f", "detected_licenses": [ "BSD-3-Clause", "BSD-2-Clause" ], "directory_id": "0585739ed6a2251ade7b2a6116f803b2e4d1f544...
2.421875
stackv2
# Copyright (c) 2009 Tim Dumol # Copyright (c) 2013- The Spyder Development Team and Docrepr Contributors # # Distributed under the terms of the BSD BSD 3-Clause License """ Process docstrings with Sphinx. AUTHORS: - Tim Joseph Dumol (2009-09-29): initial version - The Spyder Development Team: Maintenance Copyright ...
489
30.01
79
16
3,576
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_d22841947259dc9f_64326d8c", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 74, 479 ]
[ null, null ]
[ 11, 11 ]
[ 24, 24 ]
2024-11-18T20:31:41.982997+00:00
1,530,701,219,000
008ce4c31634cd66ae777e972dcda513eefbc267
3
{ "blob_id": "008ce4c31634cd66ae777e972dcda513eefbc267", "branch_name": "refs/heads/master", "committer_date": 1530701219000, "content_id": "06bf361bd34a9d0b1bcd95ec63d30bf078ac0e78", "detected_licenses": [ "MIT" ], "directory_id": "0f38a82775850bbc1072f62fd1a50b879f6b95b7", "extension": "py", "fi...
2.75
stackv2
from . import auth_blueprint from app.models import User, Access_token from flask import make_response, request, jsonify from flask.views import MethodView class RegistrationView(MethodView): """this class will handle registration of users""" def post(self): """this method will handle post requests ...
142
40.9
116
19
1,059
python
[{"finding_id": "codeql_py/stack-trace-exposure_fe93996a792b9f3b_9f6817a6", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 71, 107 ]
[ null, null ]
[ 46, 42 ]
[ 54, 50 ]
2024-11-18T21:10:00.480046+00:00
1,629,205,752,000
670638d8ac1d89b134f55affc74ecc1ed67cd863
3
{ "blob_id": "670638d8ac1d89b134f55affc74ecc1ed67cd863", "branch_name": "refs/heads/main", "committer_date": 1629205752000, "content_id": "d88a485bf558869f344bedba4231a71b550eae80", "detected_licenses": [ "Unlicense" ], "directory_id": "8faeb260b8ddc5b2f1ce2887e25c03b98ab1ad4d", "extension": "py", ...
2.515625
stackv2
import inspect import os from difflib import SequenceMatcher from logging import getLogger from typing import List, Union import requests import unidecode from covid_data.db import queries from covid_data.errors import ( PlaceInfoFetchException, PlaceInfoNotCompleteException, PlaceNameNotProvidedException,...
310
30.36
115
16
2,124
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3034a3327f8c4491_f5449683", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 46 ]
[ null ]
[ 22 ]
[ 37 ]
2024-11-18T21:10:22.771188+00:00
1,585,723,208,000
9777884e116fa4c59e4df56bbf62701fbdf9d2ef
2
{ "blob_id": "9777884e116fa4c59e4df56bbf62701fbdf9d2ef", "branch_name": "refs/heads/master", "committer_date": 1585723208000, "content_id": "3cc0da3aa52621822a012b00d141541679151d14", "detected_licenses": [ "Apache-2.0" ], "directory_id": "d4044bd9c5cf70c491df3b1da5bd2d16063717bf", "extension": "py"...
2.375
stackv2
import pyeapi import yaml from getpass import getpass from pprint import pprint def myfunc_yaml_output(filename): with open(filename) as f: device_dict = yaml.load(f) return device_dict def myfunc_show_arp(output): arp_entry = output[0]['result']['ipV4Neighbors'] print("IP Address MAC ...
21
27.19
52
14
140
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d98fc9c711843668_0035e07c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 19 ]
[ null ]
[ 32 ]
[ 40 ]
2024-11-18T21:10:32.089959+00:00
1,610,043,052,000
efa98dcfff333599e1557674a548a065e4e5927e
3
{ "blob_id": "efa98dcfff333599e1557674a548a065e4e5927e", "branch_name": "refs/heads/main", "committer_date": 1610043052000, "content_id": "5c6d63458d43a1783aa4c7b3986bb77591c0705d", "detected_licenses": [ "MIT" ], "directory_id": "6c9de356a00c276646cbeaba3e0305dd969f0142", "extension": "py", "file...
2.65625
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- # # Copyright (c) Igor Lesik 2020 import sys, os, re, markdown, argparse from jinja2 import Template import verilog_parser as parser import render_html def parse_args(): parser = argparse.ArgumentParser(description='Generate Verilog documentation.') parser.add_ar...
238
27.11
88
17
1,443
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_8a5cf03c792af262_5d2a0fe2", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 141 ]
[ null ]
[ 16 ]
[ 46 ]
2024-11-18T21:10:32.349502+00:00
1,530,688,738,000
96f20caa093b93421f05f82817d39919e41b5992
2
{ "blob_id": "96f20caa093b93421f05f82817d39919e41b5992", "branch_name": "refs/heads/master", "committer_date": 1530688738000, "content_id": "a567abaad5ed7fa26b2546ac5af0ad7966393e12", "detected_licenses": [ "BSD-3-Clause", "Apache-2.0" ], "directory_id": "08ec866f78484b951e80f4444dead0e150d61b9f",...
2.375
stackv2
# Copyright (c) 2012 The Chromium Authors. All rights reserved. # Use of this source code is governed by a BSD-style license that can be # found in the LICENSE file. import re class CSSChecker(object): def __init__(self, input_api, output_api, file_filter=None): self.input_api = input_api self.output_api ...
249
36.61
80
25
2,634
python
[{"finding_id": "codeql_py/redos_65c439d8c39b728f_89eb2c9e", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '0%{{-:' and containing many repet...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '0%{{-:' and containing many repetitions of '-'." ]
[ 65 ]
[ null ]
[ 52 ]
[ 66 ]
2024-11-18T21:11:14.227769+00:00
1,639,315,196,000
c2ef12720098a406a7702af305df98df27760ad1
3
{ "blob_id": "c2ef12720098a406a7702af305df98df27760ad1", "branch_name": "refs/heads/master", "committer_date": 1639315196000, "content_id": "68937a4267375c612b2dc203f632749d4e56b744", "detected_licenses": [ "Unlicense" ], "directory_id": "3beec068158598234412d94ae89c652705cc08b8", "extension": "py",...
3.4375
stackv2
#!/usr/bin/env python3 import hashlib input = "ojvtpuvg" password1 = "" passwordLength1 = 8 password2 = ["g"] * 8 passwordLength2 = 8 i = 0 while passwordLength1 > 0 or passwordLength2 > 0: value = "%s%i" % (input, i) m = hashlib.md5(value.encode()) if m.hexdigest()[0:5] == "00000": print("%s%i %s" % (input, i, ...
28
24.68
56
15
247
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8c9936b4372f181d_cc6a131b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (passw...
[ 16, 27, 28 ]
[ null, null, null ]
[ 9, 7, 7 ]
[ 50, 16, 25 ]
2024-11-18T21:46:30.631875+00:00
1,574,794,682,000
a8b414ea6ede955ab6f15fec11ad4ff7d5a77242
3
{ "blob_id": "a8b414ea6ede955ab6f15fec11ad4ff7d5a77242", "branch_name": "refs/heads/master", "committer_date": 1574794682000, "content_id": "fd5a419ba714160b7cba4623e0619ae46f148fe8", "detected_licenses": [ "MIT" ], "directory_id": "6a3e9a726bb2d554d6d8156dd8aa258792c1fe49", "extension": "py", "fi...
3.265625
stackv2
import getpass from auth import AuthBankAccount from cash_machine import CashMachineWithdraw, CashMachineInsertMoneyBill, CashMachineGetter class AuthBankAccountConsole: @staticmethod def is_auth(): account_number_typed = input("Digite sua conta: ") password_typed = getpass.getpass("Digite su...
102
35.62
110
16
821
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c508b215f85ec1d0_a183a4d3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 28 ]
[ null ]
[ 19 ]
[ 110 ]
2024-11-18T21:46:35.567840+00:00
1,553,735,633,000
5ca0f410cbdb6baf0002eb3237f039d509ed129b
4
{ "blob_id": "5ca0f410cbdb6baf0002eb3237f039d509ed129b", "branch_name": "refs/heads/master", "committer_date": 1553735633000, "content_id": "a5792147d27301474a5aa9eb06554fa0fd3d1e2e", "detected_licenses": [ "MIT" ], "directory_id": "fae2175e4fca335216f0ee9d66cc9a850b4c2abb", "extension": "py", "fi...
4.5
stackv2
# Problem Set 2, hangman.py # Name: # Collaborators: # Time spent: # Hangman Game # ----------------------------------- # Helper code # You don't need to understand this helper code, # but you will have to know how to use the functions # (so be sure to read the docstrings!) import random import string WORDLIST_FILENAM...
349
37.11
85
16
2,853
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5067ea5226b882d9_1247918b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
17
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging...
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text.", "This expression logs [sensitive data (secre...
[ 114, 129, 134, 142, 148, 153, 157, 171, 174, 262, 281, 286, 294, 300, 305, 309, 326 ]
[ null, null, null, null, null, 154, 158, null, null, null, null, null, null, null, 306, 310, null ]
[ 66, 23, 33, 23, 23, 35, 60, 19, 66, 66, 23, 33, 23, 23, 35, 60, 66 ]
[ 77, 69, 79, 69, 69, 64, 64, 74, 77, 77, 69, 79, 69, 69, 64, 64, 77 ]
2024-11-18T21:46:37.082314+00:00
1,634,042,651,000
dd9fcb087ba3ff51fc3935d08f988ae722a73cbe
2
{ "blob_id": "dd9fcb087ba3ff51fc3935d08f988ae722a73cbe", "branch_name": "refs/heads/master", "committer_date": 1634042651000, "content_id": "5c11823056b6f15df52381284ab9e704dc1f5a1b", "detected_licenses": [ "MIT" ], "directory_id": "40fc4f549bcd4b7dd9b185af62cc424628cf8ef6", "extension": "py", "fi...
2.328125
stackv2
from ply import lex, yacc from . import rules, utils, definitions, config from jinja2 import Template class Costflow: def __init__(self, conf=None): if conf is not None: config.config = conf self.parser = yacc.yacc(module=rules) self.lexer = lex.lex(module=rules) def comp...
59
29.53
70
15
381
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_eab0f7ee1b16a3dd_a7f1884d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 22 ]
[ null ]
[ 16 ]
[ 33 ]
2024-11-18T21:47:30.007487+00:00
1,389,258,172,000
cec92f7666d60bb5ab4bb301bf24f30fdcd0b0da
3
{ "blob_id": "cec92f7666d60bb5ab4bb301bf24f30fdcd0b0da", "branch_name": "refs/heads/master", "committer_date": 1389258172000, "content_id": "973d63dba5e7f4b96b80ecc4aa1817863e13561a", "detected_licenses": [ "MIT" ], "directory_id": "204242ff30045e5c5ee51de33f5b85a9d1cd20bd", "extension": "py", "fi...
2.53125
stackv2
import tornado import tornado.web import tornado.gen import tornadoredis from tornado import httpclient from urlcache.core import RedisBank, UrlCacher from utils import Router from utils import message_encode, message_decode import json import logging try: import atm_settings except: raise('Please create atm...
209
29.72
115
18
1,347
python
[{"finding_id": "codeql_py/log-injection_3abe7b918a17c1e0_ea6c94da", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
2
true
[ "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 80, 94 ]
[ null, null ]
[ 21, 25 ]
[ 29, 55 ]
2024-11-18T21:47:39.860872+00:00
1,422,574,848,000
3b7df0e296f71b6e9d147389fd7ef15af21f618c
2
{ "blob_id": "3b7df0e296f71b6e9d147389fd7ef15af21f618c", "branch_name": "refs/heads/master", "committer_date": 1422574848000, "content_id": "f365f86e416a82ef0f641d5a92fabe7cb9de0ed7", "detected_licenses": [ "MIT" ], "directory_id": "55a26acef4076eef83a10875d386f7991192fb6d", "extension": "py", "fi...
2.390625
stackv2
import os from sqlite3 import dbapi2 as sqlite3 from flask import Flask from flask import render_template from flask import request from flask import g from werkzeug import secure_filename # config app = Flask(__name__) app.config.from_object(__name__) app.config.update({ 'DATABASE': os.path.join(app.root_pat...
79
29.11
145
19
551
python
[{"finding_id": "codeql_py/sql-injection_f535329217b661a0_0bb904b4", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown...
1
true
[ "CWE-089" ]
[ "py/sql-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This SQL query depends on a [user-provided value](1)." ]
[ 69 ]
[ null ]
[ 24 ]
[ 29 ]
2024-11-18T22:28:59.848730+00:00
1,634,281,752,000
bb16654c744f0980fb39fde47755cbfb5f3fa8ba
3
{ "blob_id": "bb16654c744f0980fb39fde47755cbfb5f3fa8ba", "branch_name": "refs/heads/master", "committer_date": 1634281752000, "content_id": "4b0e0ce08631d2b7f59a6b756571579a1eadc2cc", "detected_licenses": [ "Apache-2.0" ], "directory_id": "bd9aafb330c6c0f778f57217bd6236461a30829d", "extension": "py"...
2.671875
stackv2
# coding=utf-8 # !/usr/bin/python import paramiko import threading """ ssh 到服务器并执行bash command """ def ssh2(ip, username, passwd, cmd): """ ssh 服务器并执行bash command :param ip: :param username: :param passwd: :param cmd: :return: """ try: ssh = paramiko.SSHClient() s...
74
24.3
93
15
561
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_4c31a56aaaeed79f_64fd316a", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 21 ]
[ null ]
[ 9 ]
[ 66 ]
2024-11-18T22:29:03.263064+00:00
1,415,587,963,000
22d7187417999b3bc8531b6fa7b121fa8def2aca
3
{ "blob_id": "22d7187417999b3bc8531b6fa7b121fa8def2aca", "branch_name": "refs/heads/master", "committer_date": 1415587963000, "content_id": "0e27705d7de9ed57d9891c23ee0ad5ad930ff396", "detected_licenses": [ "MIT" ], "directory_id": "84b69842977ca08dc7119f3e9f3d81422bcb5b22", "extension": "py", "fi...
2.84375
stackv2
from flask import Flask,request from multiprocessing import Process,Queue import logging import os import signal app = Flask(__name__) # Development Mode logging.basicConfig(level=logging.DEBUG) # Global datastructures - lifetime of the server pid_table = {} class Container(object): def __init__(self, data): ...
50
26.78
113
14
313
python
[{"finding_id": "codeql_py/log-injection_b281a1d10dca8347_ee0c77b8", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
2
true
[ "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 33, 47 ]
[ null, null ]
[ 19, 19 ]
[ 50, 113 ]
2024-11-18T22:29:24.829078+00:00
1,614,013,928,000
c6936af94c7d374af44d6ac8e5e69118ff3d05a6
3
{ "blob_id": "c6936af94c7d374af44d6ac8e5e69118ff3d05a6", "branch_name": "refs/heads/master", "committer_date": 1614013928000, "content_id": "dba0ab7feb9b0f1f06f733ef048e8a1aa5355e67", "detected_licenses": [ "MIT" ], "directory_id": "ee4f1dc6a39fca8ec1ef5560e2cc269f2993a1da", "extension": "py", "fi...
3.03125
stackv2
import urllib.request,json from .models import News import requests News = News # Getting api key api_key = None # Getting the news base url base_url = None base_url2 = None def configure_request(app): global api_key,base_url,base_url2 api_key = app.config['NEWS_API_KEY'] base_url = app.config['NEWS_API...
96
25.51
109
12
549
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fd0736920e6e2184_89d4afe1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 25, 27 ]
[ null, null ]
[ 11, 11 ]
[ 23, 28 ]
2024-11-18T22:29:29.323802+00:00
1,412,687,075,000
802f0ac506066a0634458bee8bd7b9a0ad07e503
3
{ "blob_id": "802f0ac506066a0634458bee8bd7b9a0ad07e503", "branch_name": "refs/heads/master", "committer_date": 1412687075000, "content_id": "bf6e7ea4f4d2dedbb0c6c88cd90d0908c6edadc0", "detected_licenses": [ "MIT" ], "directory_id": "3b3cf2a345038706d7370d1db53195c60c90aaa8", "extension": "py", "fi...
2.53125
stackv2
#!/usr/bin/env python2 import json import logging import logging.handlers import os import subprocess from datetime import datetime from flask import Flask, request try: # Python 3 from configparser import RawConfigParser except ImportError: # Python 2 from ConfigParser import RawConfigParser confi...
102
34.25
140
17
739
python
[{"finding_id": "codeql_py/command-line-injection_a152ff420eaebacb_840259ed", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {...
6
true
[ "CWE-078", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-117" ]
[ "py/command-line-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/log-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This command line depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This log entry depends on a [user-pro...
[ 55, 68, 70, 74, 80, 48 ]
[ null, null, null, null, null, null ]
[ 41, 32, 31, 31, 27, 23 ]
[ 45, 46, 35, 56, 48, 111 ]
2024-11-18T22:29:34.825205+00:00
1,526,602,927,000
a92df726a945656569b1aa81c63ea058fc7da3e6
3
{ "blob_id": "a92df726a945656569b1aa81c63ea058fc7da3e6", "branch_name": "refs/heads/master", "committer_date": 1526602927000, "content_id": "bac883414b39c0ea74eb8d58efa1cc36cbbc2751", "detected_licenses": [ "MIT" ], "directory_id": "10eb70672f74271613845ba8c36c7cc52ead79f2", "extension": "py", "fi...
3.390625
stackv2
import os import yaml from jinja2 import Environment, PackageLoader def render_document(template_name, data_name, output_name): """ Combines a MarkDown template file from the aide_document package with a local associated YAML data file, then outputs the rendered combination to a local MarkDown output file. ...
37
41.16
179
14
324
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_83f41f178baf6491_975f38e8", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 32 ]
[ null ]
[ 11 ]
[ 61 ]
2024-11-18T22:29:39.834024+00:00
1,426,375,193,000
d8c3d07f9735b56c5349955b1bc1a691f4ed7759
2
{ "blob_id": "d8c3d07f9735b56c5349955b1bc1a691f4ed7759", "branch_name": "refs/heads/master", "committer_date": 1426375193000, "content_id": "483426f0cc7b0fe7ece56a4ed2b053243fa26e08", "detected_licenses": [ "MIT" ], "directory_id": "e21e432f73ecbe15a6cb3bb52a7d21a4917f4e4d", "extension": "py", "fi...
2.328125
stackv2
from bs4 import BeautifulSoup from datetime import datetime from django.contrib.auth import authenticate from django.shortcuts import get_object_or_404 from django.http import HttpResponse, HttpResponseServerError, HttpResponseForbidden from django.views.decorators.csrf import csrf_exempt from models import Blog, Categ...
137
34.42
93
16
1,001
python
[{"finding_id": "codeql_py/stack-trace-exposure_baa7e98a1f5bfdf9_890f07b1", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 66, 90 ]
[ null, null ]
[ 40, 40 ]
[ 46, 46 ]
2024-11-18T22:40:27.059177+00:00
1,531,177,717,000
c16a6aee2fdcf5d5cbea6389eb1f432744c48eb3
2
{ "blob_id": "c16a6aee2fdcf5d5cbea6389eb1f432744c48eb3", "branch_name": "refs/heads/master", "committer_date": 1531177717000, "content_id": "37a2df741a8999af059ab1d529e50ea814a5c27a", "detected_licenses": [ "MIT" ], "directory_id": "4a93fc8e6964aedef6b94ceb02a9d2a107f821f6", "extension": "py", "fi...
2.359375
stackv2
from flask import Flask, request, render_template, jsonify from flask_restful import Resource, Api import MySQLdb app = Flask(__name__) api = Api(app) def getConnection(): connection = MySQLdb.connect( host = 'localhost', user = 'root', passwd = '****', db = '***' ) return ...
82
22.94
83
10
480
python
[{"finding_id": "codeql_py/sql-injection_996c0be56f0e7f8d_dbbabb81", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown...
1
true
[ "CWE-089" ]
[ "py/sql-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This SQL query depends on a [user-provided value](1)." ]
[ 25 ]
[ null ]
[ 20 ]
[ 25 ]
2024-11-18T22:40:27.897687+00:00
1,551,806,700,000
bb02d208f3d0f26a682fc3a413b109f4c4ff7f39
3
{ "blob_id": "bb02d208f3d0f26a682fc3a413b109f4c4ff7f39", "branch_name": "refs/heads/master", "committer_date": 1551806700000, "content_id": "8071ebdf657ad7e9b167e58dbe46fa37c1677cac", "detected_licenses": [ "MIT" ], "directory_id": "42e0311166f5b8dd5908cc3e078ad225cb14d7e5", "extension": "py", "fi...
2.75
stackv2
# -*- coding: utf-8 -*- import argparse, mechanize, os, sys, socks, socket from time import sleep from subprocess import call from selenium import webdriver from selenium.webdriver.common.keys import Keys from selenium.webdriver.support.ui import WebDriverWait from pyvirtualdisplay import Display from urllib import ur...
266
24.94
123
25
1,499
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2147b8cb701beb97_8a2f4499", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (p...
[ 239, 233, 215 ]
[ null, null, null ]
[ 23, 23, 31 ]
[ 100, 99, 109 ]
2024-11-18T22:40:32.048525+00:00
1,501,778,062,000
b67f2e7dbdc4f36c68f83a1bac189737ba24e0d1
3
{ "blob_id": "b67f2e7dbdc4f36c68f83a1bac189737ba24e0d1", "branch_name": "refs/heads/master", "committer_date": 1501778062000, "content_id": "531fb9e1824b507a589bf0511bdc5e7554686d94", "detected_licenses": [ "MIT" ], "directory_id": "81c52e0679800b94fc7010a713451a27048b487f", "extension": "py", "fi...
2.546875
stackv2
import os import sys import random from pymongo import MongoClient import pprint from flask_socketio import SocketIO, emit, join_room, leave_room from flask import Flask, render_template, request, session, redirect from flask_bcrypt import Bcrypt app = Flask(__name__) app.config['SECRET_KEY'] = os.urandom(24).encode('h...
200
28.86
103
20
1,511
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ad2ad2313339de06_670c907f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 127, 145 ]
[ null, null ]
[ 9, 11 ]
[ 75, 72 ]
2024-11-18T22:40:56.420806+00:00
1,565,016,282,000
1de270ce7784388e7db55016c44ee6df7be9f0f7
3
{ "blob_id": "1de270ce7784388e7db55016c44ee6df7be9f0f7", "branch_name": "refs/heads/master", "committer_date": 1565016282000, "content_id": "f97c06f5403755fcb07ccf8e070aa981168e36a1", "detected_licenses": [ "Apache-2.0" ], "directory_id": "25c5b6666e0a325d7bc65d21c528d8329982ac4b", "extension": "py"...
2.65625
stackv2
#! /usr/bin/env python3 # -*- coding: utf-8 -*- # # Copyright 2019 Matt Post <post@cs.jhu.edu> # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2...
126
37.19
132
16
1,114
python
[{"finding_id": "codeql_py/overly-permissive-file_552369505e79bd58_02008e0a", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable." ]
[ 109 ]
[ null ]
[ 9 ]
[ 35 ]
2024-11-18T22:41:01.456328+00:00
1,562,130,848,000
ff4d3cb1f204670edb6c56efb75a26eb371fe180
3
{ "blob_id": "ff4d3cb1f204670edb6c56efb75a26eb371fe180", "branch_name": "refs/heads/master", "committer_date": 1562130848000, "content_id": "b88e468b904ef8cd3b8cecc52c09ab50c250c2a6", "detected_licenses": [ "MIT" ], "directory_id": "3d73ebd2cfe87a84c86b500f653ac7fe69bde51b", "extension": "py", "fi...
2.609375
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- """ Git embedding plugin for Pelican ================================= This plugin allows you to embbed `git` file into your posts. """ from __future__ import unicode_literals import os, re, logging, hashlib, codecs, copy from bs4 import BeautifulSoup import collections...
148
31.56
120
16
1,059
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_9b8f0b0a7d95888a_36653c63", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 18 ]
[ null ]
[ 12 ]
[ 87 ]
2024-11-18T22:41:17.153631+00:00
1,602,308,708,000
2aad3583cd854b0614d6027022da06332d2a53f3
3
{ "blob_id": "2aad3583cd854b0614d6027022da06332d2a53f3", "branch_name": "refs/heads/master", "committer_date": 1602308708000, "content_id": "e25705dca4e42e484b7847af39949460c8165384", "detected_licenses": [ "MIT" ], "directory_id": "2ddbe0b310dd2ce86277c484844e5a534d3adac5", "extension": "py", "fi...
2.59375
stackv2
import json from bot.settings import EVENT_API_KEY class Event: def __init__(self, bot): self.bot = bot # event api url self.event_url = "https://app.ticketmaster.com/discovery/v2/events.json?" async def show_events(self, artist): artist_find = ("-").join(artist.split(" ")) ...
21
33.43
126
15
160
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_89a198d460801eca_563af19a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 15 ]
[ null ]
[ 15 ]
[ 29 ]
2024-11-18T22:54:19.863984+00:00
1,500,376,716,000
c40cc818b0b6512c6a82ba86588a7a080f83751a
3
{ "blob_id": "c40cc818b0b6512c6a82ba86588a7a080f83751a", "branch_name": "refs/heads/master", "committer_date": 1500376716000, "content_id": "3783dbc27c3217190c1ed5c64d6ac18078e08e4a", "detected_licenses": [ "MIT" ], "directory_id": "7d735c5ba68cd65244d2475acc1bd9e8a83a51f9", "extension": "py", "fi...
2.546875
stackv2
""" PC5 Linux Fileserver A customised Python HTTP Server with basic features such as downloading and deleting multiple files when listing directories. Copyright (c) 2017 Giovanni Grieco <giovanni.grc96@gmail.com>, Poliba Corse <polibacorse@poliba.it> Permission is hereby granted, free of charge, to any person o...
153
37.33
73
19
1,260
python
[{"finding_id": "codeql_py/path-injection_5ff30b0ff22c650b_eaa354f0", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
3
true
[ "CWE-022", "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 139, 140, 143 ]
[ null, null, null ]
[ 35, 31, 39 ]
[ 43, 39, 50 ]
2024-11-18T22:54:19.940548+00:00
1,631,768,140,000
38e0576b292ea4e8be2f53b8658d1c53e11c864e
3
{ "blob_id": "38e0576b292ea4e8be2f53b8658d1c53e11c864e", "branch_name": "refs/heads/main", "committer_date": 1631768140000, "content_id": "d2d67bf5589b199f86b80b5270a8f94c576db739", "detected_licenses": [ "MIT" ], "directory_id": "7447354d41c37f857af06e5bdd7c63a6b11fbb94", "extension": "py", "file...
2.796875
stackv2
import requests # module for https request to the League Server import json import collections APIKEY = "RGAPI-7cbe79bb-e9ef-44db-a8ed-4eb28ca29645" # Riot will give you a key, key has to be renewed daily def requestSummonerName(name): summonerName = getSummonerName(name) # Parse the name into correct format URL =...
270
32.8
122
17
2,482
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_61acd9809e2c961f_178a91fa", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 199, 220, 225 ]
[ null, null, null ]
[ 8, 11, 11 ]
[ 33, 19, 19 ]
2024-11-18T22:54:24.056320+00:00
1,471,447,766,000
8032643f3cb23bafbb1eb80f96dcac33884924ee
2
{ "blob_id": "8032643f3cb23bafbb1eb80f96dcac33884924ee", "branch_name": "refs/heads/master", "committer_date": 1471447766000, "content_id": "a5207927ce86351928d362e25cb5971414f8be2e", "detected_licenses": [ "MIT" ], "directory_id": "5dd75a0b8366f491d68a9579653a8a23f6b3759a", "extension": "py", "fi...
2.40625
stackv2
#!/usr/local/bin/python # coding: utf-8 __author__ = 'spouk' from wtforms import * from wtforms.widgets.html5 import EmailInput from wtforms.widgets.core import CheckboxInput, SubmitInput from wtforms.csrf.core import CSRF from wtforms.validators import DataRequired from hashlib import md5 import uuid import random im...
83
33.72
105
21
706
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_39fdfc2450e7d638_9535a990", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 28 ]
[ null ]
[ 22 ]
[ 93 ]
2024-11-18T20:54:59.911214+00:00
1,570,979,667,000
e05f41578c85c017d4d0a549e446f5cc882fb3a7
3
{ "blob_id": "e05f41578c85c017d4d0a549e446f5cc882fb3a7", "branch_name": "refs/heads/master", "committer_date": 1570979667000, "content_id": "c04ccf09f879e8973ec3ee523d35b463f6825ec1", "detected_licenses": [ "MIT" ], "directory_id": "a36ea63a76128513a8fd65c7de0ac37fb6140709", "extension": "py", "fi...
2.984375
stackv2
from flask import Flask, request, render_template import urllib.request import requests as rq from google.cloud import language from google.cloud.language import enums from google.cloud.language import types app = Flask(__name__) smiley = "smile" frowny = "frown" meh = "meh" def failed(): return """ ...
89
23.19
118
13
509
python
[{"finding_id": "codeql_py/full-ssrf_7eea6089b8d2fe65_92c71f6c", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
1
true
[ "CWE-918" ]
[ "py/full-ssrf" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1)." ]
[ 36 ]
[ null ]
[ 10 ]
[ 37 ]
2024-11-18T20:55:11.885520+00:00
1,623,601,593,000
b2278388960035990bac20a9003f42cd5643fd4a
2
{ "blob_id": "b2278388960035990bac20a9003f42cd5643fd4a", "branch_name": "refs/heads/main", "committer_date": 1623601593000, "content_id": "2538104e29e812ac8627f0b819e30b20ec164a24", "detected_licenses": [ "MIT" ], "directory_id": "f67119166a25a452966df8c00fcbe34f46e347ff", "extension": "py", "file...
2.375
stackv2
from flask import Flask, redirect, render_template import random import string from flask_socketio import SocketIO, send, emit import time app = Flask(__name__, template_folder="../build", static_folder="../build/static", static_url_path="/static") app.config['SECRET_KEY'] = 'secret!' app.config['TEMPLATES_AUTO_RELO...
83
20.17
109
12
457
python
[{"finding_id": "codeql_py/reflective-xss_3445a8423d8ddeef_73be97a6", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 66, 79 ]
[ 74, null ]
[ 12, 12 ]
[ 4, 50 ]
2024-11-18T20:55:12.092250+00:00
1,487,561,009,000
50db0a0fd0151c7843f9e1d85b2397c85eb76727
2
{ "blob_id": "50db0a0fd0151c7843f9e1d85b2397c85eb76727", "branch_name": "refs/heads/master", "committer_date": 1487561009000, "content_id": "82aa5686bac320647c1e6a5f8da221c2e59413dd", "detected_licenses": [ "MIT" ], "directory_id": "ba2084b00f4e43fb08aea26614549b320ce0b01b", "extension": "py", "fi...
2.390625
stackv2
import random import hashlib import requests from cachecontrol import CacheControl class Session: uid = None token = None organization = None session = None netid = None _init = False _logged_in = False _BASE_URL = 'https://tv.byu.edu/' _TIMEOUT = 5 def __init__(self): ...
94
29.82
97
18
704
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_52725eaab0abcba6_bb82bed6", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.",...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 32 ]
[ 33 ]
[ 13 ]
[ 55 ]
2024-11-18T21:07:33.100812+00:00
1,562,581,677,000
ee7f15459c1321bc1ba271192d6ba1696278f2cf
2
{ "blob_id": "ee7f15459c1321bc1ba271192d6ba1696278f2cf", "branch_name": "refs/heads/master", "committer_date": 1562581677000, "content_id": "1095a6e87baf66a30706ff8bc6d8f5621efff170", "detected_licenses": [ "Apache-2.0" ], "directory_id": "45b9d10d3bac5469f2e847b3fd03f4540dc2d478", "extension": "py"...
2.328125
stackv2
# -*- coding: utf-8 -*- import logging from os import path import jinja2 from invoke import task # 项目根目录 BASE_DIR = path.dirname(path.dirname(path.dirname(path.realpath(__file__)))) # 模板所在目录 TEMPLATE_DIR = path.join(BASE_DIR, "nebula_sniffer/templates") def jinja2_render(template_name, **context): u""" jin...
54
21.72
76
12
334
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_c166594082de3e14_41a9f5d0", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 23 ]
[ null ]
[ 11 ]
[ 44 ]
2024-11-18T21:33:08.287667+00:00
1,543,922,303,000
a5a49b98aa9a96f262d1bb84e6985a6785ab3571
4
{ "blob_id": "a5a49b98aa9a96f262d1bb84e6985a6785ab3571", "branch_name": "refs/heads/master", "committer_date": 1543922303000, "content_id": "eeadf0cd459ecb5c77cb9ff82990c9ca69297d09", "detected_licenses": [ "MIT" ], "directory_id": "ef2dbd468280dc8f755355b4a2279e3884a83093", "extension": "py", "fi...
4.125
stackv2
import random def generate_password(number_of_symbols, number_of_numbers, remain_length): numbers = ["0", "1", "2", "3", "4", "5", "6", "7", "8", "9"] alphabets = [ "a", "b", "c", "d", "e", "f", "g", "h", "i", "j", "k", ...
142
16.91
75
12
650
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7b0fa421e8ad4e88_2f91b712", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 134, 137 ]
[ null, null ]
[ 11, 15 ]
[ 31, 24 ]
2024-11-18T21:33:13.653636+00:00
1,685,146,022,000
6d1cb9e32b228620766cfa22aa2a9dcd147ca6b8
4
{ "blob_id": "6d1cb9e32b228620766cfa22aa2a9dcd147ca6b8", "branch_name": "refs/heads/master", "committer_date": 1685146022000, "content_id": "7d59cd5a9e15fcb847e28b8fb3ddc2b5d0c7642f", "detected_licenses": [ "MIT" ], "directory_id": "57138ba30706cf790b9f3cc31863909fa50023e4", "extension": "py", "fi...
3.5625
stackv2
from random import choice from time import sleep import sys from unidecode import unidecode from utils import ler_arquivo, ler_letra, forca print(f"{'#'*20} BEM VINDO AO JOGO DA ADIVINHAÇÃO {'#'*20}") # Obtêm arquivo com as profissões profissoes = ler_arquivo("profissoes.txt") if not profissoes: print("Erro ao ...
73
28.3
77
14
603
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8718f3d011e843e1_2d7ff4e7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text.\nThis expression logs [sensitive data (secret)](...
[ 38, 43, 67 ]
[ null, null, null ]
[ 15, 15, 19 ]
[ 54, 57, 58 ]
2024-11-18T21:33:14.567492+00:00
1,531,216,570,000
334243f494b813e36ded44bdba06b07d2c827915
3
{ "blob_id": "334243f494b813e36ded44bdba06b07d2c827915", "branch_name": "refs/heads/master", "committer_date": 1531216570000, "content_id": "cf78df80a42a5b31eddde9e9e651306767de560b", "detected_licenses": [ "MIT" ], "directory_id": "f5291138d0f192b98761ce5d42d1627d2f5c6669", "extension": "py", "fi...
2.609375
stackv2
from dao import GameDao from models import Game, User from flask import Flask, render_template, request, redirect, session, flash, \ url_for from flask_mysqldb import MySQL app = Flask(__name__) app.secret_key = 'testing_flask' app.config['MYSQL_HOST'] = "172.17.0.2" app.config['MYSQL_USER'] = "root" app.config['...
77
28.01
84
16
584
python
[{"finding_id": "codeql_py/flask-debug_e83f39a94ddab565_64969356", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-601" ]
[ "py/flask-debug", "py/url-redirection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 77, 66 ]
[ null, null ]
[ null, 29 ]
[ 20, 33 ]
2024-11-18T21:33:15.642823+00:00
1,685,342,343,000
a2437183a4bc7c09aad1e748dedc4f418bf34ae0
3
{ "blob_id": "a2437183a4bc7c09aad1e748dedc4f418bf34ae0", "branch_name": "refs/heads/master", "committer_date": 1685342343000, "content_id": "5fddd675ed47c4cc2d0d3dad45b8b4b49177d959", "detected_licenses": [ "MIT" ], "directory_id": "a95236e2dccd588627c6f0a1542f37e26f6899f3", "extension": "py", "fi...
2.921875
stackv2
""" 成绩管理系统程序 运行后,使用浏览器打开http://localhost:5050/ 需要flask、matplotlib、zodb库 """ # zodb from dataclasses import dataclass import ZODB from BTrees.OOBTree import BTree import transaction import io from flask import Flask, render_template, request, Response import csv from matplotlib.backends.backend_agg import FigureCanv...
234
22.69
80
16
1,398
python
[{"finding_id": "codeql_py/reflective-xss_50968fa5becf0122_53bc1ad6", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
4
true
[ "CWE-079", "CWE-079", "CWE-079", "CWE-079" ]
[ "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 88, 135, 147, 162 ]
[ null, null, null, null ]
[ 16, 16, 16, 16 ]
[ 34, 38, 38, 38 ]
2024-11-18T21:33:17.709097+00:00
1,691,761,725,000
09563a91f83d163b96d08396bbc73fa949d65fac
2
{ "blob_id": "09563a91f83d163b96d08396bbc73fa949d65fac", "branch_name": "refs/heads/master", "committer_date": 1691761725000, "content_id": "74555137b3a9037ba6bd3a2f08cabeb9423b5a2f", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "743110fee1163ea0fffbd0ff3d102d2f12c5e0a6", "extension": "p...
2.359375
stackv2
# -*- coding: utf-8 -*- # # This file is part of hepcrawl. # Copyright (C) 2016, 2017 CERN. # # hepcrawl is a free software; you can redistribute it and/or modify it # under the terms of the Revised BSD License; see LICENSE file for # more details. """Spider for Hindawi.""" from __future__ import absolute_import, div...
239
32.95
117
18
1,940
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_1e5ef716723ffa9d_4edcc219", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [dx.doi.org](1) may be at an arbitrary position in the ...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [dx.doi.org](1) may be at an arbitrary position in the sanitized URL." ]
[ 131 ]
[ null ]
[ 18 ]
[ 46 ]
2024-11-18T21:33:26.486561+00:00
1,478,725,920,000
1d58f57b8f5852193b901c6113e82aed4a327627
3
{ "blob_id": "1d58f57b8f5852193b901c6113e82aed4a327627", "branch_name": "refs/heads/master", "committer_date": 1478725920000, "content_id": "9a66cb020ea4a0a67848bb26b8ea7eae8c32eb78", "detected_licenses": [ "MIT" ], "directory_id": "564b038051f5df6d064cee0dbb5611f2d8e20d63", "extension": "py", "fi...
2.984375
stackv2
import os import requests address = "1850 N 53rd st, Seattle 98103" api_key = os.environ.get('GOOGLE_MAPS_API_KEY') geocode_url = 'https://maps.googleapis.com/maps/api/geocode/json?address=' url = '{0}{1}&key={2}'.format(geocode_url, address, api_key) api_response = requests.get(url) api_response_dict = api_response....
16
36.19
78
12
159
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_08ea57e9149d8af5_6432d695", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 15, 16 ]
[ null, null ]
[ 25, 26 ]
[ 33, 35 ]
2024-11-18T21:33:26.897393+00:00
1,511,445,978,000
d2567264e4fcf85ba33cbcf883af8e8664f0aa1d
2
{ "blob_id": "d2567264e4fcf85ba33cbcf883af8e8664f0aa1d", "branch_name": "refs/heads/master", "committer_date": 1511445978000, "content_id": "d563091a63f174a57f706a07b2ff7a210df31504", "detected_licenses": [ "MIT" ], "directory_id": "d93c904715df39d0c432a72819fbac3f8e266b36", "extension": "py", "fi...
2.375
stackv2
import hashlib import json import sys from time import time import requests from flask import Flask, jsonify, request import black import channel import authority app = Flask(__name__) @app.route('/join', methods=['POST']) def join_channel(): values = request.get_json() required = ['remote_node', 'local_no...
177
27.12
99
15
1,221
python
[{"finding_id": "codeql_py/partial-ssrf_2b251faa23517cf5_0a940f5b", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 27 ]
[ 31 ]
[ 16 ]
[ 6 ]
2024-11-18T21:55:48.133371+00:00
1,617,146,846,000
b02b3a410bbcf9042cac63beafebfe41188353fd
3
{ "blob_id": "b02b3a410bbcf9042cac63beafebfe41188353fd", "branch_name": "refs/heads/master", "committer_date": 1617146846000, "content_id": "1ff8074923011c178ceecf399dd6ea7342a9eab7", "detected_licenses": [ "MIT" ], "directory_id": "5618cd9b05d94c60acb5ff1fc919e16dddc09316", "extension": "py", "fi...
3
stackv2
import base64 import hashlib def generate_url_token(url, secret_key): md5_digest = hashlib.md5( ("%s %s" % (url, secret_key)).encode("utf-8") ).digest() base64_encoded = base64.b64encode(md5_digest).decode("utf-8") # Make the key look like Nginx expects. token = base64_encoded.replace('+', '-').replace('...
25
25.8
72
15
194
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_b0e56034ea62d4b0_82adb2b4", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (secret)](2) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (secret)](3) is used in a hashing algorithm (MD5) that is insecure." ]
[ 6 ]
[ null ]
[ 5 ]
[ 50 ]
2024-11-18T21:55:56.344972+00:00
1,553,895,295,000
2c113f12897f11cc67d7e18e274cac8d733db2aa
3
{ "blob_id": "2c113f12897f11cc67d7e18e274cac8d733db2aa", "branch_name": "refs/heads/master", "committer_date": 1553895295000, "content_id": "1acf5ada7793239ffa9577c703edf3a9a5775575", "detected_licenses": [ "MIT" ], "directory_id": "875bf5959f9220000e29ecb3261b3ca540233c4a", "extension": "py", "fi...
3.390625
stackv2
import sqlite3 connect = sqlite3.connect('C:/Users/Donaldo/Downloads/northwind_small.sqlite3') cursor = connect.cursor() expensive_items = """SELECT ProductName, UnitPrice FROM Product ORDER BY UnitPrice DESC""" expensive_items = cursor.execute(expensive_items).fetchmany(10) # Top 10 most expensive items for item in...
40
31.8
79
9
302
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f47b0d9cf6af26d9_82b9bfd8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 17 ]
[ null ]
[ 7 ]
[ 27 ]
2024-11-18T21:56:01.371350+00:00
1,499,105,863,000
e742d6c70475a27eafda63111caed2815c06d082
3
{ "blob_id": "e742d6c70475a27eafda63111caed2815c06d082", "branch_name": "refs/heads/master", "committer_date": 1499105863000, "content_id": "0c62656faf0b404a584ad900d339ad9f1861ac8d", "detected_licenses": [ "MIT" ], "directory_id": "9fde2bd6294436dbaf05b659de8f6ff958964fa6", "extension": "py", "fi...
2.546875
stackv2
from app import app, BASE_URL from flask import jsonify, request import urllib2 import json import datetime as dt @app.route('/') def landing_message(): return 'Refer to github.com/hitendesai/WeatherService-API for more info.' @app.route('/weather/', methods=['GET']) def weather_default(): return jsonify(get_...
34
31.06
115
13
278
python
[{"finding_id": "codeql_py/partial-ssrf_c906e7351a20c6a2_48b0bd07", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 34 ]
[ null ]
[ 23 ]
[ 43 ]
2024-11-18T21:56:05.002647+00:00
1,557,408,460,000
7f3992a569aa849c5afcf64842a460a7af4436db
2
{ "blob_id": "7f3992a569aa849c5afcf64842a460a7af4436db", "branch_name": "refs/heads/master", "committer_date": 1557438332000, "content_id": "0ec8ce2f1784f25221ba6a4e464deb6f45d4b549", "detected_licenses": [ "Apache-2.0" ], "directory_id": "7d8d28784c93f37282fd4a27b8ba8fa420db055d", "extension": "py"...
2.328125
stackv2
# Copyright 2018 Datawire Inc. # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing...
169
33.51
120
17
1,300
python
[{"finding_id": "codeql_py/flask-debug_28c65cb9b040162e_6faa0ad9", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
6
true
[ "CWE-215", "CWE-327", "CWE-327", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/flask-debug", "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "HIGH", "HIGH", "HIGH", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (passwor...
[ 169, 94, 99, 92, 96, 105 ]
[ null, null, null, null, null, null ]
[ 5, 31, 37, 63, 67, 59 ]
[ 51, 80, 61, 71, 75, 67 ]
2024-11-18T22:39:34.083293+00:00
1,518,065,664,000
139fe5e510e9bfeb2e4e07cd4626deca55458570
3
{ "blob_id": "139fe5e510e9bfeb2e4e07cd4626deca55458570", "branch_name": "refs/heads/master", "committer_date": 1518065664000, "content_id": "0a71b947c8af4a504529603a85aa23e3b866378c", "detected_licenses": [ "MIT" ], "directory_id": "1a0e14df6b89fe26df7a301cb37579cd64a382f4", "extension": "py", "fi...
2.734375
stackv2
import json from zabexceptions import * from connection import ConnManager, CredentialStore from Crypto.Cipher import DES from requests import exceptions class ZabbixMethodManager(ConnManager): def __init__(self): self.rediscredentials = CredentialStore() self.rediscredentials.redisConnection() self.rediscre...
88
30.53
104
18
711
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_41712892ea9e5c1c_1c05635c", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.\n[The cryptograph...
1
true
[ "CWE-327" ]
[ "py/weak-cryptographic-algorithm" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.\n[The cryptographic algorithm DES](2) is broken or weak, and should not be used." ]
[ 82 ]
[ null ]
[ 11 ]
[ 40 ]
2024-11-18T22:39:39.119563+00:00
1,687,274,758,000
875ac59b28d6ec9128c67d4397ddddd64ed05216
3
{ "blob_id": "875ac59b28d6ec9128c67d4397ddddd64ed05216", "branch_name": "refs/heads/master", "committer_date": 1687274758000, "content_id": "0dc8e3a422eaebc5b07a6400b36f86c57e897802", "detected_licenses": [ "Apache-2.0" ], "directory_id": "2eb76a71733a5795426cc4a62434743edd2d7b23", "extension": "py"...
2.609375
stackv2
#!/usr/bin/env python2 import getpass import json import requests import sys requests.packages.urllib3.disable_warnings() def racker_auth(): password = getpass.getpass("Password: ") url = 'https://identity-internal.api.rackspacecloud.com/v2.0/tokens' data = { "auth": { "RAX-AUTH:domai...
80
27.1
82
14
550
python
[{"finding_id": "codeql_py/request-without-cert-validation_8e01ddc85e6e6be3_77ee6574", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
3
true
[ "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 28, 49, 60 ]
[ null, null, null ]
[ 11, 11, 11 ]
[ 83, 83, 59 ]
2024-11-18T22:54:57.616810+00:00
1,578,862,224,000
19b86b87b190a88c31ef610f27fe9d9e6b43f09e
2
{ "blob_id": "19b86b87b190a88c31ef610f27fe9d9e6b43f09e", "branch_name": "refs/heads/master", "committer_date": 1578862224000, "content_id": "9cd7d01bacd1de98db4eb4f74cc5c052c118c19e", "detected_licenses": [ "MIT" ], "directory_id": "c8f33dc4b93fd0e94a04a25b0e2cda7244b7ffbf", "extension": "py", "fi...
2.453125
stackv2
from flask import Flask, escape, url_for, render_template, request, jsonify import glob # TensorFlow and tf.keras import tensorflow as tf #from tensorflow import keras import matplotlib.pyplot as plt import numpy as np import os #from tensorflow.keras.models import Model, load_model from skimage.io import imread, ims...
101
28.97
90
12
852
python
[{"finding_id": "codeql_py/reflective-xss_de6ce79997cbe766_47da4742", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 92 ]
[ null ]
[ 11 ]
[ 28 ]
2024-11-18T22:55:01.865357+00:00
1,347,445,528,000
f8d726342e8be5913a06a33bad6ab9e2f52523da
3
{ "blob_id": "f8d726342e8be5913a06a33bad6ab9e2f52523da", "branch_name": "refs/heads/master", "committer_date": 1347445528000, "content_id": "911f07fd2a0b18d5e95ac27c8cc48979f570931e", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "5b166e7bb66bec25126ce6622162075956397d07", "extension": "p...
2.8125
stackv2
import re import urllib def do_spotify(bot, user, channel, dataurl, type): f = urllib.urlopen(dataurl) songinfo = f.read() f.close() if type == "track": artist, album, song = songinfo.split("/", 2) return bot.say(channel, "[Spotify] %s - %s (%s)" % (artist.strip(), song.strip()...
28
34.75
107
14
285
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_b9541a7b8d65a46d_5eeeb8fb", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'spotify.com', so it might match mor...
1
true
[ "CWE-020" ]
[ "py/incomplete-hostname-regexp" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'spotify.com', so it might match more hosts than expected." ]
[ 23 ]
[ null ]
[ 20 ]
[ 47 ]
2024-11-18T23:06:13.193854+00:00
1,691,153,383,000
edbc47b1b11279c43ae0358ccaa56a9ffb399a45
3
{ "blob_id": "edbc47b1b11279c43ae0358ccaa56a9ffb399a45", "branch_name": "refs/heads/master", "committer_date": 1691153383000, "content_id": "63230b12942d3ae1fb166159c7327de9dc68cf2f", "detected_licenses": [ "MIT" ], "directory_id": "aa32c0bc26488a9c31e28e090cd36865cedeb482", "extension": "py", "fi...
2.71875
stackv2
try: import gzip except ImportError: gzip = None try: import zlib except ImportError: zlib = None import hashlib import hmac import logging import pickle import sys from huey.exceptions import ConfigurationError from huey.utils import encode logger = logging.getLogger('huey.serializer') if gzip is ...
133
30.51
79
16
892
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_eebf854cf815f493_a05bb0b2", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecu...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecure." ]
[ 109 ]
[ null ]
[ 34 ]
[ 57 ]
2024-11-18T23:06:16.797751+00:00
1,469,333,204,000
7cad1e9b82873fd9628607af855746a78227cf68
3
{ "blob_id": "7cad1e9b82873fd9628607af855746a78227cf68", "branch_name": "refs/heads/master", "committer_date": 1469333204000, "content_id": "808cd431d8913b8667c030723887d8f406a970bf", "detected_licenses": [ "MIT" ], "directory_id": "24b75e6eff196e0dc32d8c6c314a808e9c725d4f", "extension": "py", "fi...
2.671875
stackv2
import tornado.ioloop import tornado.web import tornado.httpclient import json import lxml.html from lxml import etree import collections class MainHandler(tornado.web.RequestHandler): @tornado.web.asynchronous def post(self): self.set_header("Access-Control-Allow-Origin", "*") if not self.ge...
47
28.85
86
18
330
python
[{"finding_id": "codeql_py/xpath-injection_efd19e28d547e460_ccacec2e", "tool_name": "codeql", "rule_id": "py/xpath-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "XPath expression depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
1
true
[ "CWE-643" ]
[ "py/xpath-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "XPath expression depends on a [user-provided value](1)." ]
[ 25 ]
[ null ]
[ 24 ]
[ 50 ]
2024-11-18T23:06:21.456968+00:00
1,463,068,908,000
cb7bc9961451521e2f1394bbcc6078d6ec753b8b
2
{ "blob_id": "cb7bc9961451521e2f1394bbcc6078d6ec753b8b", "branch_name": "refs/heads/master", "committer_date": 1463068908000, "content_id": "748296bb5ed0576b0b120ff2b4717455c4dde11e", "detected_licenses": [ "MIT" ], "directory_id": "0660f18b77375a44ff7550a5abdc9be0861dfde8", "extension": "py", "fi...
2.453125
stackv2
"""Added views for a bitserv server.""" from rest_framework import status from rest_framework.viewsets import ViewSet from rest_framework.response import Response from . import payment class PaymentAPIError(Exception): """Generic error for exceptions encountered during payment negotiation.""" pass class Ba...
108
34.27
93
16
725
python
[{"finding_id": "codeql_py/stack-trace-exposure_dccea9750dc8f339_f84fb50d", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
4
true
[ "CWE-209", "CWE-209", "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information...
[ 52, 60, 83, 108 ]
[ null, null, null, null ]
[ 29, 29, 29, 29 ]
[ 46, 34, 46, 46 ]
2024-11-18T23:06:22.014930+00:00
1,591,940,158,000
4009188b2631d860ea340382e5a86d46b421f9c3
4
{ "blob_id": "4009188b2631d860ea340382e5a86d46b421f9c3", "branch_name": "refs/heads/master", "committer_date": 1591940158000, "content_id": "094a28e7cf552d8ab3d422f0e238f1cc52195ca2", "detected_licenses": [ "Apache-2.0" ], "directory_id": "195d531a31aa93444abb1b16ddf78771ef88c754", "extension": "py"...
4.4375
stackv2
## We oftrn need current date and time when logging errors and saving data # to get current date and time # You need to use the datetime library from datetime import datetime current_date = datetime.now() #the now function returns a datetime object print('Today is: ' + str(current_date)) ## There are functions you ca...
36
30.06
86
9
258
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e433779bd1f9164f_0a399bfb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 36 ]
[ null ]
[ 7 ]
[ 40 ]
2024-11-18T20:56:54.936161+00:00
1,605,045,116,000
0d3432c3a8338b61144d39575ae404ce438abb16
2
{ "blob_id": "0d3432c3a8338b61144d39575ae404ce438abb16", "branch_name": "refs/heads/master", "committer_date": 1605045116000, "content_id": "a698347b501a223841e3d1a3a26d3f4251696a9c", "detected_licenses": [ "MIT" ], "directory_id": "ade4775c4284fd1ab298e3d27844be5658a812b4", "extension": "py", "fi...
2.40625
stackv2
import http.client import hashlib import json import urllib import random import opencc import pdb import time from baidu_ids import ids def translate(content , id_use = "id1" , src_lan = "zh" , tar_lan = "en"): appid = ids[id_use][0] secretKey = ids[id_use][1] httpClient = None myurl = '/api/trans/vip/translate' ...
51
23.57
74
19
387
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_e90ee052e06cceb8_1f35f6a8", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 19 ]
[ null ]
[ 21 ]
[ 34 ]
2024-11-18T22:44:05.620248+00:00
1,628,172,278,000
f843819812df0cc6b4fccc1e31569ead8bee22b5
3
{ "blob_id": "f843819812df0cc6b4fccc1e31569ead8bee22b5", "branch_name": "refs/heads/master", "committer_date": 1628172278000, "content_id": "aedc3e93f84e2385b85cd7c66e32da121d51a8ed", "detected_licenses": [ "Apache-2.0" ], "directory_id": "5c5fbc8547bca3ee2cd147186a3a8ce40e75dbc3", "extension": "py"...
3.40625
stackv2
import functools user = {"username": "anna", "access_level": "user"} def make_secure(func): @functools.wraps(func) def secure_function(*args, **kwargs): if user["access_level"] == "admin": return func(*args, **kwargs) else: return f"No admin permissions for {user['user...
64
22.56
138
17
345
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_213d9bc88cd27956_d26196bb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
4
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 58, 59, 63, 64 ]
[ null, null, null, null ]
[ 7, 7, 7, 7 ]
[ 27, 31, 27, 31 ]
2024-11-18T22:44:12.660376+00:00
1,656,720,335,000
8dea9ab7c9844936287f69f6a07a5c5d92af6476
3
{ "blob_id": "8dea9ab7c9844936287f69f6a07a5c5d92af6476", "branch_name": "refs/heads/master", "committer_date": 1656720335000, "content_id": "1c7adb6d929d6d80cb2bedf9d8506321df8510a7", "detected_licenses": [ "MIT" ], "directory_id": "b6ad7a2e9e7abb319f8f0f14876a9952ec8ac020", "extension": "py", "fi...
2.65625
stackv2
import os import shutil import winbrew.util import zipfile import tarfile import urllib import subprocess class Archive: """ Archive describes the type of package to download. Typically, some kind of compressed file (tar, zip) or a git repository. """ @staticmethod def create(url, work_dir, pa...
153
29.03
98
16
1,108
python
[{"finding_id": "codeql_py/tarslip_bde0fdbe6c1d44d7_c800907c", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 104 ]
[ null ]
[ 36 ]
[ 38 ]
2024-11-18T22:44:13.975377+00:00
1,615,810,093,000
c6b0949541d048d4b4499771706e4acc78342845
3
{ "blob_id": "c6b0949541d048d4b4499771706e4acc78342845", "branch_name": "refs/heads/main", "committer_date": 1615810093000, "content_id": "2e3e572a6825a4fc1070ed5b9b7cd183e9e7c924", "detected_licenses": [ "MIT" ], "directory_id": "8477e6d50febc895de08382e02c8d49ffacc42d2", "extension": "py", "file...
3.109375
stackv2
from hashlib import sha256 import arrow def get_local_isoformat(time: float, timezone: str) -> str: """Get localtime isoformat string from unix time""" return str(arrow.get(time).to(timezone).isoformat()) def generate_user_entry(username: str, password: str) -> str: """Generate user:password_hash line"...
24
29.29
65
13
168
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_77f312df6eb647e5_92d0370d", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.", "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computational...
[ 14, 22 ]
[ null, null ]
[ 19, 19 ]
[ 36, 36 ]
2024-11-18T23:10:39.031919+00:00
1,555,511,497,000
8d6dcd4e643ddffbb50b561a17e254e50b5f0cbc
3
{ "blob_id": "8d6dcd4e643ddffbb50b561a17e254e50b5f0cbc", "branch_name": "refs/heads/master", "committer_date": 1555511497000, "content_id": "d7a2589709057211e00af9e90533820d0b498fb0", "detected_licenses": [ "MIT" ], "directory_id": "ddb09330eb51f823c1dc66617b363affd4e23290", "extension": "py", "fi...
3.140625
stackv2
import redis import time # r = redis.Redis(host='127.0.0.1', port=6379, decode_responses=True) # r.set('name', 'redis_test') # print(dir(r)) # print(r['name']) # print(r.get('name')) # 连接池 pool = redis.ConnectionPool(host='127.0.0.1', port=6379, decode_responses=True) r = redis.Redis(connection_pool=pool) r.set('gend...
24
26.62
79
8
261
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_efaea929b30c368e_08f1a6fc", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 14 ]
[ null ]
[ 7 ]
[ 22 ]
2024-11-18T23:10:48.978546+00:00
1,688,136,297,000
07869be55681bae524fa2bcfa12c2d0a9d3401d7
2
{ "blob_id": "07869be55681bae524fa2bcfa12c2d0a9d3401d7", "branch_name": "refs/heads/master", "committer_date": 1688136297000, "content_id": "58cf82550d0e83fcd22a7c77d0fca8401be35d12", "detected_licenses": [ "MIT" ], "directory_id": "e28454cb69890999189311163d30bd7c178451a6", "extension": "py", "fi...
2.453125
stackv2
#!/usr/bin/env python """ Script to get data_internal from KPI data_internalbase and render dashboard HTML files. """ import click from datetime import datetime from distutils.dir_util import copy_tree import logging import jinja2 import json import os import urllib.request import yaml logging.basicConfig(level=logg...
106
36.93
109
16
952
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_e058a52071799844_785da28b", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 70 ]
[ null ]
[ 15 ]
[ 80 ]
2024-11-18T23:10:51.496186+00:00
1,591,699,578,000
70a7ffd49c13535cfa1356e849a3e62b53d03ffe
2
{ "blob_id": "70a7ffd49c13535cfa1356e849a3e62b53d03ffe", "branch_name": "refs/heads/master", "committer_date": 1591699578000, "content_id": "af96619d1e0e06ea4e41b75f8f16c1a76cec8a6c", "detected_licenses": [ "Apache-2.0" ], "directory_id": "9f3ce954bd6e2ca716ac36f5cc4b151aae0c617e", "extension": "py"...
2.359375
stackv2
#!/usr/bin/env python3 import os import sys import logging import tarfile import requests import argparse import tempfile log = logging.getLogger(__name__) KUBEBUILDER_URL = "https://github.com/kubernetes-sigs/kubebuilder/releases/download/v1.0.5/kubebuilder_1.0.5_linux_amd64.tar.gz" KUSTOMIZE_URL = "https://github....
76
31.66
128
15
631
python
[{"finding_id": "codeql_py/overly-permissive-file_914119b109b36254_5e904c15", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ...
2
true
[ "CWE-732", "CWE-732" ]
[ "py/overly-permissive-file", "py/overly-permissive-file" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world writable.", "Overly permissive mask in chmod sets file to world writable." ]
[ 61, 65 ]
[ null, null ]
[ 5, 5 ]
[ 62, 56 ]
2024-11-18T22:29:56.549076+00:00
1,462,649,944,000
089a673216dfaa958cd4a54a76f5ec11d8657e19
2
{ "blob_id": "089a673216dfaa958cd4a54a76f5ec11d8657e19", "branch_name": "refs/heads/master", "committer_date": 1462649970000, "content_id": "5e593f33965c31527c84db0cd8c99bc6236fd3eb", "detected_licenses": [ "MIT" ], "directory_id": "22aab6c333c16feb6815bbfca27c1cb259c1c42b", "extension": "py", "fi...
2.359375
stackv2
#!/usr/bin/env python import cgi import http.client import json import sys import urllib import cgitb cgitb.enable() def do_julia(): print("Content-Type: application/json") print() form = cgi.FieldStorage() method = form.getvalue("method", "GET") cmd = form.getvalue("cmd") if cmd == 'eval...
51
23.08
68
16
306
python
[{"finding_id": "codeql_py/partial-ssrf_a3f289fddfd9186d_4bb750bd", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 42 ]
[ null ]
[ 5 ]
[ 51 ]
2024-11-18T22:29:57.739723+00:00
1,633,274,340,000
796fdfdf0267ff4a5602d05e856dd671fd452c8f
3
{ "blob_id": "796fdfdf0267ff4a5602d05e856dd671fd452c8f", "branch_name": "refs/heads/main", "committer_date": 1633274340000, "content_id": "6c220bddedcb90d349d8356ce42be4c91d1255a5", "detected_licenses": [ "MIT" ], "directory_id": "7656ab276d0cbb8bec2ffa83319de3d1f56a1fc0", "extension": "py", "file...
2.765625
stackv2
import tornado.ioloop import tornado.web class MainHandler(tornado.web.RequestHandler): def get(self): self.write("Hello, world") class MyFormHandler(tornado.web.RequestHandler): def get(self): self.write('<html><body><form action="/myform" method="post">' '<input type="te...
32
24.88
70
13
196
python
[{"finding_id": "codeql_py/reflective-xss_c75e389a630144fa_3152c178", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 19 ]
[ null ]
[ 20 ]
[ 69 ]
2024-11-18T23:10:10.757291+00:00
1,519,826,598,000
28e35170baca916c808c35e426a57df48d3f7bc9
3
{ "blob_id": "28e35170baca916c808c35e426a57df48d3f7bc9", "branch_name": "refs/heads/master", "committer_date": 1519826598000, "content_id": "d584e7a84453d34a6007aca4b68294a246d960d2", "detected_licenses": [ "MIT" ], "directory_id": "78afd6bfa90074e947b97a8dc6dc6cd59cbff716", "extension": "py", "fi...
3.015625
stackv2
#!/usr/bin/python # Creted by Yunindyo Prabowo import json import requests city = "Semarang" # Adding your city api_key = "Your Api Key" # Adding your Api Key weather2 = requests.get("http://api.openweathermap.org/data/2.5/weather?q={}&APPID={}".format(city, api_key)) result = json.loads(weather2.text) city = ...
19
24.11
109
11
148
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_192af349d6ee670e_e0da3645", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 19 ]
[ null ]
[ 8 ]
[ 48 ]
2024-11-18T23:10:11.551311+00:00
1,492,426,983,000
e3a5ccc53cb98b7cc15f93b7d253aab8e0aa7e0b
2
{ "blob_id": "e3a5ccc53cb98b7cc15f93b7d253aab8e0aa7e0b", "branch_name": "refs/heads/master", "committer_date": 1492426983000, "content_id": "97b05b7f29f54257833b4c9ef1191778871f472f", "detected_licenses": [ "MIT" ], "directory_id": "48be2421478fb28d94ba4ce9e4266c4da9048337", "extension": "py", "fi...
2.4375
stackv2
# -*- coding:utf-8 -*- import sys import os import argparse from jinja2 import FileSystemLoader, Environment import cococrawler from cococrawler.config import get_project_config import importlib CRAWLER_PATH = 'crawlers' PATH = os.path.dirname(os.path.abspath(cococrawler.__file__)) TEMPLATE_ENVIRONMENT = Environment( ...
124
30.3
89
17
869
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_70cb811bcf4f10a8_1059936f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 12 ]
[ 15 ]
[ 24 ]
[ 23 ]
2024-11-18T23:10:19.522561+00:00
1,525,757,515,000
f76821cf33e8e8c8d349ee3bbefd80273f8b5206
2
{ "blob_id": "f76821cf33e8e8c8d349ee3bbefd80273f8b5206", "branch_name": "refs/heads/master", "committer_date": 1525757515000, "content_id": "59514edab01382d127c84276a17183d615e25010", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "4db61dec3e7aa6f7191ce937f2b096c7a0a609bc", "extension": "p...
2.4375
stackv2
# -*- coding: utf-8 -*- """ Created on 26.11.2009 @author: ivbeg """ import dns.resolver, dns.exception from bs4 import UnicodeDammit import io import pycurl from urllib.parse import urlparse import datetime from .consts import SERVER_APACHE, DEFAULT_NAMESERVERS class HttpHeaders: """Class of HTTP headers""" ...
197
28.66
110
26
1,438
python
[{"finding_id": "codeql_py/request-without-cert-validation_9ac6b8fb7a16c70b_2f5fb60b", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1) by [this value](2)." ]
[ 174 ]
[ null ]
[ 5 ]
[ 39 ]
2024-11-18T23:21:52.640858+00:00
1,449,469,262,000
d6dad44bc7e076a91787ecf3a1382143aba31774
3
{ "blob_id": "d6dad44bc7e076a91787ecf3a1382143aba31774", "branch_name": "refs/heads/master", "committer_date": 1449469261000, "content_id": "dd3060cd0ba47e96a3fb31d3450db0b3165018c5", "detected_licenses": [ "MIT" ], "directory_id": "280bbf0bcef46b5a947349d5010c7122e0ecdb11", "extension": "py", "fi...
2.96875
stackv2
"""Methods for reading and writing spk files""" from Crypto.Cipher import AES from Crypto.PublicKey import RSA import constants import util def parse(data): """Parses an spk file Returns: The contained apk data """ encryptedKey, encryptedData = parseContainer(data) key = decryptKey(encryptedKey) return decr...
55
31.47
123
12
431
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_158369dcf4dcc2dc_c9c47156", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 50, 55 ]
[ null, null ]
[ 28, 17 ]
[ 42, 64 ]
2024-11-18T21:33:29.134760+00:00
1,397,069,259,000
b0a391c3b172bd94a8ed9df9275cc8650b4129f7
3
{ "blob_id": "b0a391c3b172bd94a8ed9df9275cc8650b4129f7", "branch_name": "refs/heads/master", "committer_date": 1397069259000, "content_id": "ce58626855e822f3c72f4fcc71274193369cb791", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "02e1972c15616f6fc80da7e3a302bec93c8784b6", "extension": "p...
2.671875
stackv2
# -*- coding: utf-8 -*- ''' Created on 2014-04-09 This logger saves the information into file system. @author: Krzysztof Langner ''' import datetime import json import os from flask import Flask from flask import request from iclogger.example_settings import FILE_STORAGE app = Flask(__name__) @app.route("/") def lo...
35
25.86
69
14
238
python
[{"finding_id": "codeql_py/path-injection_b6f7af077badddb5_7579736a", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
3
true
[ "CWE-022", "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 24, 26, 27 ]
[ null, null, null ]
[ 25, 21, 25 ]
[ 33, 46, 33 ]
2024-11-18T21:33:29.675950+00:00
1,669,134,755,000
71e854e85b2cf4282a4028714d3e06e97299e177
3
{ "blob_id": "71e854e85b2cf4282a4028714d3e06e97299e177", "branch_name": "refs/heads/main", "committer_date": 1669134755000, "content_id": "f98a4aa0269e364658f01a35a96aa41e4009cdde", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "4d5534b32af2f75e49c4cd72284195eaf9de8848", "extension": "py"...
2.75
stackv2
"""An example flask application demonstrating server-sent events.""" from hashlib import sha1 from shutil import rmtree from stat import S_ISREG, ST_CTIME, ST_MODE import json import os import time from PIL import Image, ImageFile from gevent.event import AsyncResult from gevent.queue import Empty, Queue from gevent....
285
29.8
117
16
2,118
python
[{"finding_id": "codeql_py/stack-trace-exposure_3cb9c0c8d04bfcee_01272046", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 114 ]
[ null ]
[ 16 ]
[ 38 ]