added
stringlengths
32
32
created
int64
1,236B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.03
source
stringclasses
1 value
text
stringlengths
330
19.3k
num_lines
int64
16
648
avg_line_length
float64
15.5
59.3
max_line_length
int64
37
179
ast_depth
int64
8
38
length
int64
102
3.79k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.11k
276k
sast_codeql_findings_count
int64
1
33
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
33
rule_ids
listlengths
1
33
confidences
listlengths
1
33
severities
listlengths
1
33
messages
listlengths
1
33
line_starts
listlengths
1
33
line_ends
listlengths
1
33
column_starts
listlengths
1
33
column_ends
listlengths
1
33
2024-11-19T03:44:11.381549+00:00
1,598,391,580,000
deb60c59fbff57da674a2d5c9385e26b81b08ead
3
{ "blob_id": "deb60c59fbff57da674a2d5c9385e26b81b08ead", "branch_name": "refs/heads/master", "committer_date": 1598391580000, "content_id": "59202d678ddb07ce0f4d3cafede6a27ab9423f4a", "detected_licenses": [ "MIT" ], "directory_id": "3fdff6bf3ef0e4b13a1ca028d04e837ced551b4a", "extension": "py", "fi...
2.609375
stackv2
import copy import json import os import re from pprint import pprint temp_dir = os.getcwd() update_courses_dir = os.path.join(temp_dir, "user_data", "courses_for_all_professions", 'IT_courses') def sort_courses_by_num_students(dict_courses_for_job): """ It is how I filter courses with number of students, ...
249
40.72
160
25
1,876
python
[{"finding_id": "codeql_py/overly-large-range_0e182062014dfa02_40b5998a", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 84 ]
[ null ]
[ 24 ]
[ 27 ]
2024-11-19T03:44:19.711516+00:00
1,610,005,842,000
66254ac43c2ee5cdb1eb7e383f0da4239a288634
2
{ "blob_id": "66254ac43c2ee5cdb1eb7e383f0da4239a288634", "branch_name": "refs/heads/main", "committer_date": 1610005842000, "content_id": "5b2a19e74b6f76a4581bb994581b60db2177b6b5", "detected_licenses": [ "Apache-2.0" ], "directory_id": "baef65d4eaf341cc915f4cf16af67e127dd9069d", "extension": "py", ...
2.390625
stackv2
import boto3 from jinja2 import Environment as jEnv from jinja2 import Template, FileSystemLoader import time from src.environment import Environment from src.acm import ACM from src.helpers import Helper from src.route53 import Route53 class CloudFront(): """ Class describes CloudFront interface. """ def __...
118
36.06
102
16
866
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_4756047cea367fa7_25b3b6b2", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 93 ]
[ null ]
[ 15 ]
[ 39 ]
2024-11-19T03:44:23.266250+00:00
1,500,660,670,000
dfad61dd1c1d7eb6c422bbea37da174efe2113ed
3
{ "blob_id": "dfad61dd1c1d7eb6c422bbea37da174efe2113ed", "branch_name": "refs/heads/master", "committer_date": 1500660670000, "content_id": "e5ae1eeaa425f6adfe71f904c67d7e9cf0d0601c", "detected_licenses": [ "MIT" ], "directory_id": "dcfa45dea53a321732727a90b82cb3177ee6c854", "extension": "py", "fi...
2.5625
stackv2
# -*- coding: utf8 -*- """ Exports the exercises blueprint. Currently all this does is embed the already existing external exercises web app as an iframe """ from functools import wraps import flask from zeeguu.model.user import User # we define the blueprint here, and extended it in s...
55
22.09
81
17
289
python
[{"finding_id": "codeql_py/url-redirection_b93cf3b28b367c5c_cb5688fb", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 51 ]
[ null ]
[ 35 ]
[ 44 ]
2024-11-19T03:44:35.933081+00:00
1,692,974,239,000
a5ac2246bdadd605116949e1e70b6dbf62746bbf
2
{ "blob_id": "a5ac2246bdadd605116949e1e70b6dbf62746bbf", "branch_name": "refs/heads/main", "committer_date": 1692974239000, "content_id": "24208d5a8cb6d97ce5cabd664c1c4e702695f4e4", "detected_licenses": [ "Apache-2.0", "BSD-2-Clause" ], "directory_id": "6bb45c5892b4c9692dcc44116fb73dc9e7ab90ff", ...
2.3125
stackv2
import os os.system('python3 -m pip install -U sagemaker xgboost==1.0.1 scikit-learn') import glob import boto3 import json import pathlib import pickle import tarfile from datetime import datetime import joblib import numpy as np import pandas as pd import xgboost import argparse from sklearn.metrics import mean_squ...
81
26.62
102
13
540
python
[{"finding_id": "codeql_py/tarslip_ba0bbf339812df39_127ea4f8", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 50 ]
[ null ]
[ 9 ]
[ 12 ]
2024-11-19T01:44:11.385996+00:00
1,556,845,317,000
caa5ab268de3db10c50be5184306e7ff6e74b592
3
{ "blob_id": "caa5ab268de3db10c50be5184306e7ff6e74b592", "branch_name": "refs/heads/master", "committer_date": 1556845317000, "content_id": "b73f9c80af01ac634a466a693391c784a6277233", "detected_licenses": [ "MIT" ], "directory_id": "26e3d7cec68f96e1ed8686998df4304690dc008a", "extension": "py", "fi...
2.609375
stackv2
''' LF2 ''' import boto3 import json import logging from botocore.vendored import requests from boto3.dynamodb.conditions import Key, Attr logger = logging.getLogger() logger.setLevel(logging.DEBUG) def poll_from_queue(): cuisine = None phone_num = None location = None dining_date = None d...
137
31.99
155
18
1,050
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3b023c6390a119fd_7e103ebe", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text." ]
[ 135 ]
[ null ]
[ 18 ]
[ 76 ]
2024-11-19T02:08:15.466617+00:00
1,560,943,755,000
014971a27c84a9c1e9a32e7904ab5836ca3ba0c5
3
{ "blob_id": "014971a27c84a9c1e9a32e7904ab5836ca3ba0c5", "branch_name": "refs/heads/master", "committer_date": 1560943755000, "content_id": "3b026f98a848006f31825f1665c586afd2e0102e", "detected_licenses": [ "MIT" ], "directory_id": "a287d599b93feaeaadea8362857236de9f5a1d6b", "extension": "py", "fi...
2.65625
stackv2
# 作者:Charles # 公众号:Charles的皮卡丘 # 一些工具函数/类 import os import re import sys import time import click import requests import urllib.parse as urlparse from contextlib import closing # 视频转换 ######################################################################################################################### ''' Function...
238
29.61
136
25
1,921
python
[{"finding_id": "codeql_py/request-without-cert-validation_fd047add5b24564c_0914a5ce", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 100 ]
[ null ]
[ 16 ]
[ 83 ]
2024-11-19T02:08:40.750703+00:00
1,628,986,809,000
5650bb8f82f1a7d4979277ceea5edbf32b70ed84
3
{ "blob_id": "5650bb8f82f1a7d4979277ceea5edbf32b70ed84", "branch_name": "refs/heads/master", "committer_date": 1628986809000, "content_id": "a0590486ad1dc54649b0cc63c2196428c54611b7", "detected_licenses": [ "MIT" ], "directory_id": "a216d836ae9f938a0e0a8019ee05d4db03a37510", "extension": "py", "fi...
2.5625
stackv2
from flask import Flask, request import logging app = Flask(__name__) LOGGER = logging.getLogger('alerthook') @app.route("/", methods=["GET", "POST"]) def echo(): data = request.get_json() LOGGER.info(data) return data if __name__ == "__main__": # Setting up logging LOGGER.setLevel("INFO") ...
29
25.72
63
9
190
python
[{"finding_id": "codeql_py/reflective-xss_3897ce8cccf5e18f_90090f19", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
2
true
[ "CWE-079", "CWE-117" ]
[ "py/reflective-xss", "py/log-injection" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 12, 11 ]
[ null, null ]
[ 12, 17 ]
[ 16, 21 ]
2024-11-19T02:21:37.877178+00:00
1,440,961,632,000
e5f6581b075d8e2469b8bd7f359c0d666a70535e
2
{ "blob_id": "e5f6581b075d8e2469b8bd7f359c0d666a70535e", "branch_name": "refs/heads/master", "committer_date": 1440961632000, "content_id": "76568bd5805de293143df40d0c668553107e470d", "detected_licenses": [ "MIT" ], "directory_id": "7544bbeeebec69cccc7e75bd7246e8af1f63744f", "extension": "py", "fi...
2.46875
stackv2
import bleach import evelink import markdown import arrow from mumble.exceptions import InvalidCorporationError, InvalidAllianceError from mumble.models import redis from six import iteritems try: from urlparse import urlparse, urljoin except ImportError: from urllib.parse import urlparse, urljoin from flask ...
83
28.95
85
15
570
python
[{"finding_id": "codeql_py/url-redirection_ea1aa556f8e98334_d3951e22", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 35 ]
[ null ]
[ 21 ]
[ 58 ]
2024-11-19T03:10:15.465840+00:00
1,651,781,595,000
8348088619f40912f9dca16a56341c44cbece1e7
3
{ "blob_id": "8348088619f40912f9dca16a56341c44cbece1e7", "branch_name": "refs/heads/main", "committer_date": 1651781595000, "content_id": "dcde4851aae5d55dba6ac61ff20c230813d6ba9e", "detected_licenses": [ "MIT" ], "directory_id": "2b03f930b547c79385ee3f9fd04d7299b556733f", "extension": "py", "file...
3
stackv2
#!/usr/bin/python # std libs import sys import socket import ssl import argparse def conn_cleanup(tls_sock): tls_sock.shutdown(socket.SHUT_RDWR) tls_sock.close() def main(): parser = argparse.ArgumentParser(description='Retrieve a password securely.') parser.add_argument('--hostname', required=True, \ h...
85
39.71
132
17
841
python
[{"finding_id": "codeql_py/insecure-protocol_c8d755144e7eb0ee_a07674dd", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/...
1
true
[ "CWE-327" ]
[ "py/insecure-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.create_default_context](1)." ]
[ 35 ]
[ null ]
[ 14 ]
[ 21 ]
2024-11-19T03:22:41.108129+00:00
1,575,876,213,000
3992882a5f54d2f7b254d3afed5b3f8ed682c271
3
{ "blob_id": "3992882a5f54d2f7b254d3afed5b3f8ed682c271", "branch_name": "refs/heads/master", "committer_date": 1575876213000, "content_id": "89be19bc2b5b6a86e758c320117e927f9acbcc63", "detected_licenses": [ "MIT" ], "directory_id": "030c94fc2e52ede95faeabe8df6b036ea029e302", "extension": "py", "fi...
2.765625
stackv2
from urllib.request import urlopen import json url = "http://api.open-notify.org/iss-now.json" jsonurl = urlopen(url) info = json.loads(jsonurl.read()) print(info) longitude = info['iss_position']['longitude'] latitude = info['iss_position']['latitude'] print(longitude) print(latitude) from mpl_toolkits.basemap im...
31
21.87
54
8
204
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1b0279f299102d9b_ad4b7ba8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 13, 14 ]
[ null, null ]
[ 7, 7 ]
[ 16, 15 ]
2024-11-19T03:22:48.344525+00:00
1,501,223,016,000
687c8f9e7695c76cf462883be7979feaa282e8e6
2
{ "blob_id": "687c8f9e7695c76cf462883be7979feaa282e8e6", "branch_name": "refs/heads/master", "committer_date": 1501223016000, "content_id": "c1370787323d23cc1a459472706973baf1dee36e", "detected_licenses": [ "Apache-2.0" ], "directory_id": "f784ebb59a4e75d6f1cdf30246701aba937dcdde", "extension": "py"...
2.4375
stackv2
# coding=utf-8 import os import sys reload(sys) sys.setdefaultencoding("utf-8") import time from flask import request, send_from_directory from flask import Flask, request, redirect, url_for import uuid import tensorflow as tf from classify_image import run_inference_on_image ALLOWED_EXTENSIONS = set(['jpg','JPG', 'jp...
90
30.83
98
14
751
python
[{"finding_id": "codeql_py/reflective-xss_0d8be8ad1ee7f832_7e0560cc", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
2
true
[ "CWE-079", "CWE-022" ]
[ "py/reflective-xss", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 84, 80 ]
[ null, null ]
[ 14, 17 ]
[ 31, 26 ]
2024-11-19T03:23:04.358486+00:00
1,636,226,257,000
5a716504a4e9be5cebe0ef3a1a8353846379e336
2
{ "blob_id": "5a716504a4e9be5cebe0ef3a1a8353846379e336", "branch_name": "refs/heads/main", "committer_date": 1636226257000, "content_id": "bbb4d49a3ea6649bf8f69e17b6787b6475b9ede0", "detected_licenses": [ "MIT" ], "directory_id": "16847739843cd706d0b58516a9267ffed36fca7b", "extension": "py", "file...
2.484375
stackv2
from pathlib import Path from typing import List, Union from datetime import datetime import logging import json import requests import yaml import pandas as pd # show all logs logging.basicConfig(level=logging.DEBUG) # set log level from requests and urllib3 to INFO logging.getLogger("requests").setLevel(logging.I...
419
33.05
97
18
2,835
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f88003c8a512ad1f_c83337dc", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 117 ]
[ null ]
[ 23 ]
[ 38 ]
2024-11-19T01:34:47.269297+00:00
1,660,762,288,000
bd30c826deff1665f75d7bbd80755fddf09ebad8
2
{ "blob_id": "bd30c826deff1665f75d7bbd80755fddf09ebad8", "branch_name": "refs/heads/master", "committer_date": 1660762288000, "content_id": "a5e079f20178b445cebddb0fc6545f0d7e9c6375", "detected_licenses": [ "Apache-2.0" ], "directory_id": "4f15aecfe77e4b505b4219f96306970eb95535c0", "extension": "py"...
2.484375
stackv2
import hashlib import json import logging import shutil import uuid from pathlib import Path import numpy as np from PIL import Image from pycocotools.mask import encode as mask_to_rle import datasetinsights.constants as const from datasetinsights.datasets.transformers.base import DatasetTransformer from datasetinsig...
405
35.36
80
22
3,077
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_f8597d1fbd0ab7e0_dc9040e2", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.",...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 28 ]
[ null ]
[ 25 ]
[ 55 ]
2024-11-19T01:34:53.638818+00:00
1,656,077,074,000
0e1f84c2de1ca1130eebece7d85790c8454a3624
3
{ "blob_id": "0e1f84c2de1ca1130eebece7d85790c8454a3624", "branch_name": "refs/heads/main", "committer_date": 1656077074000, "content_id": "cef0412ea2ccce28b05615ac4ff11b06e57a59c8", "detected_licenses": [ "MIT" ], "directory_id": "da47d77a933930d5355585abaf718201893609db", "extension": "py", "file...
2.53125
stackv2
"""Creates the Flask and Flask-Socketio endpoints for the optimisation backend. """ import pandas as pd import rq from config import FLASK_HOST, FLASK_PORT, REDIS_HOST, REDIS_PORT from flask import Flask, jsonify, request from flask_cors import CORS from flask_socketio import SocketIO, emit from rq.job import Job from ...
432
27.85
87
15
2,973
python
[{"finding_id": "codeql_py/reflective-xss_a1ded9d62bc5e473_88708c91", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 111, 141 ]
[ null, null ]
[ 12, 12 ]
[ 27, 30 ]
2024-11-19T01:34:53.771619+00:00
1,592,714,806,000
3e40f13c34c522c91dd6f6f3b5856d5e39376259
3
{ "blob_id": "3e40f13c34c522c91dd6f6f3b5856d5e39376259", "branch_name": "refs/heads/master", "committer_date": 1592714806000, "content_id": "8c28187224f23cdd5b05586c5166c302289fc36b", "detected_licenses": [ "MIT" ], "directory_id": "d6467f2b5df37f4e5e68122cb63fcd7007cc0e4b", "extension": "py", "fi...
2.796875
stackv2
import cv2 from getpass import getpass import hashlib import os import numpy as np import csv m = input("Enter location of img.npy : ") h = np.load(m) t=[] p=input("Enter location of data.csv file : ") with open(p, 'r') as file: reader = csv.reader(file) for row in reader: t.append(row) file.close...
60
16.47
81
15
331
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_cc97887cf08bc673_f04ff702", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 35 ]
[ null ]
[ 22 ]
[ 68 ]
2024-11-19T01:35:05.338127+00:00
1,589,473,727,000
5406cb9b6a7cbd4dda5025b75db033ca51f58a3d
3
{ "blob_id": "5406cb9b6a7cbd4dda5025b75db033ca51f58a3d", "branch_name": "refs/heads/master", "committer_date": 1589473727000, "content_id": "0cf786a6a77aaaefa3be21662ac38e072d5bdb94", "detected_licenses": [ "MIT" ], "directory_id": "034ed98566bd30977b58b5e350ea93e223f2fcc6", "extension": "py", "fi...
2.921875
stackv2
import sys, os, re, traceback from os.path import isfile from multiprocessing.dummy import Pool from augmentations.fliph import FlipH from augmentations.zoom import Zoom from augmentations.blur import Blur from augmentations.noise import Noise from augmentations.translate import Translate from skimage.io import imread,...
106
34.57
138
20
857
python
[{"finding_id": "codeql_py/redos_78542104d757e424_c976185b", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '__' and containing many repetitio...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '__' and containing many repetitions of 'a__'." ]
[ 23 ]
[ null ]
[ 46 ]
[ 48 ]
2024-11-19T01:55:42.457270+00:00
1,624,567,702,000
c3ab85cbe122954daf415a93bf2d698bc3771eaf
3
{ "blob_id": "c3ab85cbe122954daf415a93bf2d698bc3771eaf", "branch_name": "refs/heads/main", "committer_date": 1624567702000, "content_id": "425b9902021adaecb7eff4242f5e302e771e5408", "detected_licenses": [ "MIT" ], "directory_id": "f6c4847f56a1d48a3bcd9bb12d83ea0edd9785ad", "extension": "py", "file...
2.8125
stackv2
import httpx from core.models import County, Location from django.core.management.base import BaseCommand def derive_county(latitude, longitude): url = "https://us-counties.datasette.io/counties/county_for_latitude_longitude.json" params = {"longitude": longitude, "latitude": latitude, "_shape": "array"} ...
34
36.41
88
17
258
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8ec19de1753dd228_303dcd49", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 31 ]
[ 33 ]
[ 21 ]
[ 22 ]
2024-11-19T02:17:36.739224+00:00
1,683,384,029,000
3abf850603ed6b56cdfa2fb5c04f43aacf2f673b
3
{ "blob_id": "3abf850603ed6b56cdfa2fb5c04f43aacf2f673b", "branch_name": "refs/heads/master", "committer_date": 1683384029000, "content_id": "79fb04daebd09d0cec4b4f671aa42ccf5debdaf6", "detected_licenses": [ "MIT" ], "directory_id": "d89d1f19678e0c2ea6c0d979d1c1978ac0b1eba4", "extension": "py", "fi...
2.875
stackv2
from register import register_solution from hashlib import md5 def find_n_leading_zeros(secret, n): m = md5(secret.encode()) search = '0' * n i = 1 while True: m1 = m.copy() m1.update(str(i).encode()) hsh = m1.hexdigest() if hsh[:n] == search: print(i) ...
26
19.62
39
13
165
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_7f016363186e745c_5d65745a", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 6 ]
[ null ]
[ 13 ]
[ 28 ]
2024-11-19T02:17:37.701168+00:00
1,692,981,330,000
2a67c6a06e2944458ee02a2470a4787f108170b2
2
{ "blob_id": "2a67c6a06e2944458ee02a2470a4787f108170b2", "branch_name": "refs/heads/master", "committer_date": 1692981330000, "content_id": "e53eced85255127bcfde6e5c8fe4bfcd74f514db", "detected_licenses": [ "Apache-2.0" ], "directory_id": "9852bb067fba665bd567aca698165c30fd0ed08a", "extension": "py"...
2.390625
stackv2
import flask from fence.auth import get_user_from_claims from fence.errors import Unauthorized from fence.jwt import token from fence.jwt.errors import JWTError from fence.jwt.validate import validate_jwt from fence.models import UserRefreshToken def create_access_token(user, keypair, api_key, expires_in, scopes): ...
74
33.3
87
14
559
python
[{"finding_id": "codeql_py/stack-trace-exposure_03c075c0e020fe9d_bcdf4ccb", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 17 ]
[ null ]
[ 30 ]
[ 48 ]
2024-11-19T02:18:05.277851+00:00
1,544,466,984,000
67f8e556be9b3d9a6b29aff33e21292ad1a77c5d
3
{ "blob_id": "67f8e556be9b3d9a6b29aff33e21292ad1a77c5d", "branch_name": "refs/heads/master", "committer_date": 1544466984000, "content_id": "3bd74ab61d0c2d1bc13618a02346d01ecf13d2c3", "detected_licenses": [ "MIT", "Python-2.0" ], "directory_id": "62525d1a58fb9ab87b7ef5ebd8da4ff9e009888d", "exten...
3.203125
stackv2
""" SAVE PICTURES FETCHED WITH GOOGLE MAP STATIC API IN LOCAL STORAGE ==> REDUCE THE USE OF GOOGLE MAPS REQUESTS :param (STRING) LONGITUDE AND LATITUDE :return (JPG) FILE """ import json import os import requests # import source url files business_path = "data/output_files/business.json" with open(busine...
73
28.66
95
14
579
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_5c073f7319baaafe_550836c1", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 51 ]
[ null ]
[ 27 ]
[ 37 ]
2024-11-19T02:18:15.659803+00:00
1,522,334,766,000
2c81cd73cce7171355113de842ecc9ecc54b17ec
3
{ "blob_id": "2c81cd73cce7171355113de842ecc9ecc54b17ec", "branch_name": "refs/heads/master", "committer_date": 1522334766000, "content_id": "3a07dc2d94be76320b889286319fc4ca28b94c3e", "detected_licenses": [ "MIT" ], "directory_id": "1e76f2705df32bfe285d27255556b23bc38754b6", "extension": "py", "fi...
2.640625
stackv2
from pymongo import MongoClient import hashlib import random import cal as cp sav = ['1000', '1500', '200', '-1200', '3000', '-100'] client = MongoClient() client = MongoClient('localhost', 27017) db = client['webhealth'] collection = db['login'] def crete_hash(st): pass_text = str(st) hash_obj = hashlib.sha...
114
26.68
109
17
773
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_35bb533ca2f26f69_b9a18e51", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e...
[ 15 ]
[ null ]
[ 31 ]
[ 49 ]
2024-11-19T02:18:15.816441+00:00
1,375,722,389,000
b1d9d0ae452dc4fcf69c1a7112169c33726aba3e
3
{ "blob_id": "b1d9d0ae452dc4fcf69c1a7112169c33726aba3e", "branch_name": "refs/heads/master", "committer_date": 1375722389000, "content_id": "97744af33f5417f124715e618cb3095b84ea7908", "detected_licenses": [ "MIT" ], "directory_id": "57644bd153977c0eafdc8f809eefdfac5555af4b", "extension": "py", "fi...
3.125
stackv2
""" To create a new command for **Tyrant** the ``Command`` class needs to be subclassed for your command and override the ``Command.execute`` method to provide your command execution. The ``Command.__init__`` initialization should be overriden and provide ``ArgumentParser`` args. The following is a reimplementation o...
166
34.1
79
17
1,273
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_5d4ffc8109e7f7f4_c8afee4c", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 117, 144 ]
[ null, null ]
[ 34, 32 ]
[ 48, 46 ]
2024-11-19T02:30:08.014778+00:00
1,531,821,007,000
7e3e1dc3d4fab0bdf1fc3a00437b39be7e538e53
3
{ "blob_id": "7e3e1dc3d4fab0bdf1fc3a00437b39be7e538e53", "branch_name": "refs/heads/master", "committer_date": 1531821007000, "content_id": "9962b081fdf3a712803ea41dd0d1af7a3bef22e3", "detected_licenses": [ "MIT" ], "directory_id": "8ad5ab7236dcb6717b56b4a494eac3fcc08d2c62", "extension": "py", "fi...
2.65625
stackv2
# -*- coding: utf-8 -*- import sys import getpass import click from sqlalchemy.orm.exc import NoResultFound from flask.cli import AppGroup from redap.models.apikey import APIKey from redap.exceptions import InvalidConfiguration try: from redap.api import create_app app = create_app() except InvalidConfigurat...
72
26.19
105
17
483
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9ddb7b7d3418a781_56a6ed0e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 65 ]
[ null ]
[ 30 ]
[ 70 ]
2024-11-19T02:30:14.969195+00:00
1,634,415,244,000
227569fb21287f0320c3d87c00d02888b6ff0bec
3
{ "blob_id": "227569fb21287f0320c3d87c00d02888b6ff0bec", "branch_name": "refs/heads/main", "committer_date": 1634415244000, "content_id": "d51474b11b5edcab37a906e01661c61fac619aae", "detected_licenses": [ "MIT" ], "directory_id": "6cead1f82936762742607a3f984c9d5c35d55bcb", "extension": "py", "file...
3.078125
stackv2
#! python3 from collections import defaultdict import datetime import requests import urllib3 urllib3.disable_warnings() import xmltodict import pytz import pandas as pd from color import GREEN, BLUE class EliaConnector: ''' Connect and make requests to Elia API ''' def __init__(self, verbose=True,...
95
31.01
148
15
705
python
[{"finding_id": "codeql_py/request-without-cert-validation_2b86a55b649a5f75_d87e8be1", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 53 ]
[ null ]
[ 20 ]
[ 51 ]
2024-11-19T02:41:58.561634+00:00
1,552,889,633,000
e6e67bcfe001c817765f1fa47dafa691f4ca1e98
2
{ "blob_id": "e6e67bcfe001c817765f1fa47dafa691f4ca1e98", "branch_name": "refs/heads/master", "committer_date": 1552889633000, "content_id": "ec22c7680c3b6f02053ebdbc891de659281db161", "detected_licenses": [ "MIT" ], "directory_id": "97ac1579be4ffa14c0bf44a6a4bb5aa62b525d5a", "extension": "py", "fi...
2.390625
stackv2
import merge_similarity_inference from flask import Flask, flash, request, jsonify, render_template, send_from_directory, redirect, url_for import os import glob from werkzeug import secure_filename app = Flask(__name__, static_folder='',template_folder='demo') UPLOAD_FOLDER = "data/uploads/" root = '' @app.route('/...
64
32.91
115
19
481
python
[{"finding_id": "codeql_py/url-redirection_df694c34048bc226_828bab67", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
3
true
[ "CWE-601", "CWE-601", "CWE-022" ]
[ "py/url-redirection", "py/url-redirection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 49, 52, 55 ]
[ null, null, null ]
[ 33, 33, 23 ]
[ 44, 44, 65 ]
2024-11-18T18:05:48.577733+00:00
1,690,377,071,000
6a6027b0fcef8cbc8ff73809c79ec7bf2ec97983
3
{ "blob_id": "6a6027b0fcef8cbc8ff73809c79ec7bf2ec97983", "branch_name": "refs/heads/main", "committer_date": 1690377071000, "content_id": "44e7c8eca823802b65f4cdea359891430f2045ef", "detected_licenses": [ "MIT" ], "directory_id": "490c2a2afda7e6caa6406be61a939b95947c8f96", "extension": "py", "file...
2.8125
stackv2
""" Functions for creating an overview report of a PEtab problem """ from pathlib import Path from shutil import copyfile from typing import Union import pandas as pd import petab from petab.C import * __all__ = ['create_report'] def create_report( problem: petab.Problem, model_name: str, o...
77
31.95
79
13
564
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_2f653c5205c98e56_cd8ac0b0", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 39 ]
[ null ]
[ 20 ]
[ 62 ]
2024-11-18T18:16:05.089651+00:00
1,691,993,243,000
5accd3679163aa13ee113bf02116aaf28f69b2e3
3
{ "blob_id": "5accd3679163aa13ee113bf02116aaf28f69b2e3", "branch_name": "refs/heads/master", "committer_date": 1691993243000, "content_id": "8e917cb3307b626bc0f1e73c816593365d796051", "detected_licenses": [ "Apache-2.0" ], "directory_id": "bed7dddd44aa776042576bc717858af373b6fdc4", "extension": "py"...
2.609375
stackv2
import gzip import logging import os import shutil import timeit import tarfile import sys import datetime from mongoengine import connect, DoesNotExist, ConnectionFailure from mailingshark.datacollection.basedatacollector import BaseDataCollector from mailingshark.analyzer import ParsedMessage import mailbox from...
256
38.03
117
19
2,151
python
[{"finding_id": "codeql_py/tarslip_33886e2b92e80dcd_64900d95", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 228 ]
[ null ]
[ 17 ]
[ 28 ]
2024-11-18T18:59:40.525632+00:00
1,628,399,929,000
658d871a31997e24a63e352d60537af7a1b4aee9
3
{ "blob_id": "658d871a31997e24a63e352d60537af7a1b4aee9", "branch_name": "refs/heads/main", "committer_date": 1628399929000, "content_id": "e5674e3e5d5e59e6e7365dfa17a5cd7a947d38df", "detected_licenses": [ "MIT" ], "directory_id": "ecdeeaefd2fa10148d90b62eaf24f2712ee70aa8", "extension": "py", "file...
2.578125
stackv2
from flask import Flask, render_template, request import pickle import numpy as np from numpy.core.numeric import moveaxis import pandas as pd # import urllib library from urllib.request import urlopen import os from numpy import load # import json import json app = Flask(__name__) api_key = "" #Your API key if os...
223
30.24
116
15
1,786
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_be7613daaa8f7b89_841f4e93", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
3
true
[ "CWE-312", "CWE-312", "CWE-215" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/flask-debug" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger." ]
[ 60, 79, 220 ]
[ null, null, null ]
[ 11, 11, 5 ]
[ 14, 14, 24 ]
2024-11-18T19:58:17.979558+00:00
1,618,435,625,000
f0890c9b593361b16c248d7bcadf99f3c27c9685
3
{ "blob_id": "f0890c9b593361b16c248d7bcadf99f3c27c9685", "branch_name": "refs/heads/master", "committer_date": 1618435625000, "content_id": "b7e08d5d1272bc9adf7f8f1a29be93cf442c26a6", "detected_licenses": [ "MIT" ], "directory_id": "8369b41d39a9bbb0dd30cd876743788fe9dab735", "extension": "py", "fi...
2.734375
stackv2
# -*- coding: utf-8 -*- import click import logging from pathlib import Path from dotenv import find_dotenv, load_dotenv import requests from hashlib import sha1 import random import string import time import os @click.command() @click.argument("input_filepath", type=click.Path(exists=True)) @click.argument("output_f...
90
30.06
117
20
679
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_e8302efafa84d20e_c24119e1", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expen...
[ 50 ]
[ null ]
[ 13 ]
[ 79 ]
2024-11-18T19:58:30.351623+00:00
1,665,139,555,000
6193b3e7daa04cfcc22e2791f81149995715341f
3
{ "blob_id": "6193b3e7daa04cfcc22e2791f81149995715341f", "branch_name": "refs/heads/master", "committer_date": 1665139555000, "content_id": "67309c84bb147a5f38af664e800b880913136480", "detected_licenses": [ "MIT" ], "directory_id": "32296560e661dd127e650bdd2594184a4fc9a75a", "extension": "py", "fi...
2.9375
stackv2
import re import logging from functools import partial from typing import Match logger = logging.getLogger(__name__) MAX_DEPTH = 5 ALIAS_PATTERN = re.compile(r"@alias\s+(?P<original>(\w|[_])+)\s+(?P<alias>(\w|[_])+)") def handle_import(m: Match, depth: int = 0) -> str: path = m.group("path") logger.debug...
44
24.61
104
13
312
python
[{"finding_id": "codeql_py/redos_403053ade8f6ccc9_a4f4b168", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '@alias ' and containing many repe...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '@alias ' and containing many repetitions of '_'." ]
[ 12 ]
[ null ]
[ 52 ]
[ 61 ]
2024-11-18T19:58:40.396067+00:00
1,618,430,134,000
2a71d243ec316e0b407078c4b4bdcc2999337e9b
2
{ "blob_id": "2a71d243ec316e0b407078c4b4bdcc2999337e9b", "branch_name": "refs/heads/main", "committer_date": 1618430134000, "content_id": "2080fcf721c805402eae6cca3bc03fcec17adb5c", "detected_licenses": [ "MIT" ], "directory_id": "2a4a4d74c61490c9d30dfd420db5a2c43d4a4cf2", "extension": "py", "file...
2.4375
stackv2
from uuid import uuid4 from twisted.internet.protocol import DatagramProtocol from twisted.internet import reactor from random import randint from pycipher import SimpleSubstitution import sqlite3 import hashlib # create connection conn = sqlite3.connect('chatlog.db') # used to generate db file # create cursor c = ...
81
30
78
16
618
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_63197d600fac3fa8_e47053f7", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 78 ]
[ null ]
[ 32 ]
[ 49 ]
2024-11-18T19:34:25.823995+00:00
1,623,433,822,000
a684a60e5af562a1d124daba21d5bb6cb5fc5d1b
3
{ "blob_id": "a684a60e5af562a1d124daba21d5bb6cb5fc5d1b", "branch_name": "refs/heads/master", "committer_date": 1623433822000, "content_id": "8a7e46702f6d1904457411e7cdc6381b1e96b960", "detected_licenses": [ "Apache-2.0" ], "directory_id": "1ba2b2ed2c25225f435088c1e5d90600aee6460a", "extension": "py"...
2.5625
stackv2
#!/usr/bin/env python3 # Flask web app version of the CRDB text index/search example import psycopg2 import psycopg2.errorcodes from bs4 import BeautifulSoup import logging import sys import html import re from collections import defaultdict import urllib.request import requests import os import os.path import ssl im...
220
28.08
129
19
1,857
python
[{"finding_id": "codeql_py/flask-debug_393f635d705c28f2_2361bb33", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
4
true
[ "CWE-215", "CWE-089", "CWE-089", "CWE-918" ]
[ "py/flask-debug", "py/sql-injection", "py/sql-injection", "py/partial-ssrf" ]
[ "HIGH", "HIGH", "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This SQL query depends on a [user-provided value](1).\nThis SQL query depends on a [user-provided value](2).", "This SQL query depends on a [user-provided value](1).\nThis SQL query depends on...
[ 216, 88, 153, 81 ]
[ null, null, null, null ]
[ 3, 19, 19, 9 ]
[ 64, 22, 22, 35 ]
2024-11-18T18:39:23.096989+00:00
1,616,103,911,000
895defb21a661d451f9ac1ee1c8dc4e1cfd4ddb3
3
{ "blob_id": "895defb21a661d451f9ac1ee1c8dc4e1cfd4ddb3", "branch_name": "refs/heads/main", "committer_date": 1616103911000, "content_id": "3c53f858aaa1b2d9c0ef18b514bee5b04442f9c4", "detected_licenses": [ "MIT" ], "directory_id": "9c9b7bd5bef4c2408d6953e14214480c46fc8ef0", "extension": "py", "file...
2.5625
stackv2
import click from django_configuration_management.aws_utils import pull_aws_config_data from django_configuration_management.secrets import ( decrypt_value, encrypt_value, generate_fernet_key, ) from django_configuration_management.utils import gather_user_input, load_env from django_configuration_manageme...
87
28.38
135
12
580
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_585fa9960f2323d9_3a91b084", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 40 ]
[ null ]
[ 15 ]
[ 32 ]
2024-11-18T18:39:29.124223+00:00
1,627,880,751,000
90898e8d66ea84a1330eb95b2fb484982339feae
3
{ "blob_id": "90898e8d66ea84a1330eb95b2fb484982339feae", "branch_name": "refs/heads/master", "committer_date": 1627880751000, "content_id": "b915ad99ad9074787f905e9b4f8e15a870c1b3bd", "detected_licenses": [ "MIT" ], "directory_id": "d35b2a6f368b8908adbbe282c604dffefadc5f69", "extension": "py", "fi...
2.890625
stackv2
import time import pywhatkit import datetime import csv import requests MSG_TEXT = "TEST" def check_connection(): url = "https://www.google.com" timeout = 5 try: request = requests.get(url, timeout=timeout) return True except (requests.ConnectionError, requests.Timeout) as exception: ...
44
25.3
73
16
255
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f6c97cf7f4dbd9a3_ae4c1a51", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 32, 38 ]
[ null, null ]
[ 15, 19 ]
[ 68, 73 ]
2024-11-18T18:39:39.164593+00:00
1,555,524,947,000
bdd8bfac6f53b1f54f70c72cfb132b1241b50abd
2
{ "blob_id": "bdd8bfac6f53b1f54f70c72cfb132b1241b50abd", "branch_name": "refs/heads/master", "committer_date": 1555524947000, "content_id": "7f6869a7f30cb6848f71bfcfc0fd41767886f839", "detected_licenses": [ "MIT" ], "directory_id": "a246024c03bd8e6c3b06c883520b030cf8bc1510", "extension": "py", "fi...
2.328125
stackv2
import re import html PROXIFY_REGEX = (r'((?!https:\/\/imgp.golos)https?:\/\/(?:[\da-zA-Z]{1}' '(?:[\w\-\.]+\.)+(?:[\w]{2,5}))(?:\:[\d]{1,5})?\/?(?:[^\s\/]+' '\/).*?\.(?:jpe?g|gif|png)(?:\?\w+=\w+(?:\&\w+=\w+)*)?)') LINKIFY_REGEX = (r'((?<![\"\(\/])https?:\/\/(?:[\da-zA-Z]{1}(?:[\w...
49
25.92
79
16
446
python
[{"finding_id": "codeql_py/redos_421396ec65487d6b_69f594f7", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '-.'.", "remediat...
2
true
[ "CWE-1333", "CWE-1333" ]
[ "py/redos", "py/redos" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '-.'.", "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '-.'." ]
[ 6, 10 ]
[ null, null ]
[ 22, 64 ]
[ 32, 74 ]
2024-11-18T18:39:41.669117+00:00
1,563,067,690,000
3a206c1be4e994ebd4c4b44757ac643447aadfc5
3
{ "blob_id": "3a206c1be4e994ebd4c4b44757ac643447aadfc5", "branch_name": "refs/heads/master", "committer_date": 1563067690000, "content_id": "6123c9d1232d4ba5c794cc0d828e3ea97a3197ee", "detected_licenses": [ "MIT" ], "directory_id": "12c4f019cf4df3b99e166a756da6a86b95682c70", "extension": "py", "fi...
2.515625
stackv2
import os from base64 import b64encode from datetime import timedelta import uuid import requests from flask import escape, jsonify, abort, redirect from google.cloud import storage from gpx import GpxParser from stats import stats_route from image import image_route_compare, image_route from similarity import simil...
106
25.53
74
11
711
python
[{"finding_id": "codeql_py/flask-debug_8fe18de1f2bd6308_e7f4c9e2", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-918" ]
[ "py/flask-debug", "py/full-ssrf" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "The full URL of this request depends on a [user-provided value](1)." ]
[ 106, 17 ]
[ null, null ]
[ 5, 9 ]
[ 43, 39 ]
2024-11-18T18:39:48.471332+00:00
1,618,167,337,000
726de1c0cf62536d93f2cf52f469a64ec75b444d
4
{ "blob_id": "726de1c0cf62536d93f2cf52f469a64ec75b444d", "branch_name": "refs/heads/master", "committer_date": 1618167337000, "content_id": "8cff4dd2b297630d0478833b6ce01e2692fcaa2e", "detected_licenses": [ "MIT" ], "directory_id": "e31731adf8e99c5cff1ecc3dc164ef04ff8d70cb", "extension": "py", "fi...
3.765625
stackv2
import string import random import sys def generateRandomPassword(password_length): password = [] for i in range(password_length): password.append(random.choice(string.digits + string.ascii_letters + string.punctuation)) return ''.join(password) if __name__ == '__main__': if len(sys.argv)...
27
25.81
97
17
150
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2258027d711bee09_e7a89155", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 25 ]
[ null ]
[ 19 ]
[ 85 ]
2024-11-18T18:39:57.949904+00:00
1,692,278,832,000
a5644d27d74f0ae5d4120ee4f651b8442bb0303b
2
{ "blob_id": "a5644d27d74f0ae5d4120ee4f651b8442bb0303b", "branch_name": "refs/heads/master", "committer_date": 1692278832000, "content_id": "b56facace9f41093e97666ff4669c7aad2124b28", "detected_licenses": [ "MIT" ], "directory_id": "150a7b11cb531f8bc2a045aefcf2ebe1d151efa3", "extension": "py", "fi...
2.34375
stackv2
from contextlib import contextmanager import logging import os from ocs_ci.framework import config from ocs_ci.ocs import constants, exceptions logger = logging.getLogger(__name__) @contextmanager def prepare_mirror_openshift_credential_files(): """ This function is a context manager. Prepare local fi...
59
31.14
102
15
397
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_cc8dcc627abb4dfb_9e0bc24c", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 46 ]
[ null ]
[ 31 ]
[ 74 ]
2024-11-18T18:40:00.521857+00:00
1,693,477,536,000
87060ae32308bc423d9ae1b4bcf2280e1e2a37a8
2
{ "blob_id": "87060ae32308bc423d9ae1b4bcf2280e1e2a37a8", "branch_name": "refs/heads/master", "committer_date": 1693477536000, "content_id": "879c112506f1bfb78f0510d693323d6bf6c0b9da", "detected_licenses": [ "MIT" ], "directory_id": "c9500ad778b8521aaa85cb7fe3239989efaa4799", "extension": "py", "fi...
2.421875
stackv2
import insightconnect_plugin_runtime from .schema import ParseTapAlertInput, ParseTapAlertOutput, Input, Output # Custom imports below from html_table_parser import HTMLTableParser from komand_proofpoint_tap.util.tap_formatter import TAP from urlextract import URLExtract from komand_proofpoint_tap.util.helpers import ...
43
40.44
104
17
394
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_53226dc5cfbca01c_ef9e7d7f", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [threatinsight.proofpoint.com](1) may be at an arbitrar...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [threatinsight.proofpoint.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 34 ]
[ null ]
[ 52 ]
[ 93 ]
2024-11-18T18:40:00.568200+00:00
1,648,541,699,000
cf0ec5573dfe8bd0b80fe121a025ce75b375f76b
3
{ "blob_id": "cf0ec5573dfe8bd0b80fe121a025ce75b375f76b", "branch_name": "refs/heads/main", "committer_date": 1648541699000, "content_id": "5fe4ecdb3c03d019af8496acfdb3a4d8745d9ff9", "detected_licenses": [ "MIT" ], "directory_id": "44d30f2846b7999bbdf32e2268bbbdeb926dd43b", "extension": "py", "file...
2.5625
stackv2
import io import logging import os import shutil from tempfile import TemporaryDirectory import av import jsonpickle from flask import Flask, request from tqdm import tqdm logging.basicConfig( level=logging.DEBUG, format='%(asctime)s.%(msecs)03d %(levelname)s %(module)s - %(funcName)s: %(message)s', datef...
112
28.57
90
16
736
python
[{"finding_id": "codeql_py/unsafe-deserialization_c4cc272712b6b7d2_9b22d805", "tool_name": "codeql", "rule_id": "py/unsafe-deserialization", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Unsafe deserialization depends on a [user-provided value](1).", "remediation": "", "locatio...
2
true
[ "CWE-502", "CWE-117" ]
[ "py/unsafe-deserialization", "py/log-injection" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Unsafe deserialization depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 30, 37 ]
[ null, 38 ]
[ 30, 22 ]
[ 34, 49 ]
2024-11-18T20:52:22.379871+00:00
1,687,199,285,000
107703f8ca33b2f316e8d8c718153a60591e1fba
3
{ "blob_id": "107703f8ca33b2f316e8d8c718153a60591e1fba", "branch_name": "refs/heads/master", "committer_date": 1687199285000, "content_id": "7c03252ec58467d7653f99bbc057d94030c096d2", "detected_licenses": [ "MIT" ], "directory_id": "f525d43037793b8bec049143d072aa31a12143a5", "extension": "py", "fi...
2.515625
stackv2
#! /usr/bin/env python # -*- coding: utf-8 -*- # import sys import os from loguru import logger import sys import os.path import tarfile import numpy as np path_to_script = os.path.dirname(os.path.abspath(__file__)) # sys.path.append(os.path.join(path_to_script, "./extern/sPickle")) def get_tar_output_dir(fname):...
42
24.05
86
12
251
python
[{"finding_id": "codeql_py/tarslip_7e17014c6be697e1_05b4cc2e", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 37 ]
[ null ]
[ 9 ]
[ 12 ]
2024-11-18T18:46:57.011960+00:00
1,494,772,356,000
7e497b2ec9f06633cad9c46a314d269c4ac07ba5
3
{ "blob_id": "7e497b2ec9f06633cad9c46a314d269c4ac07ba5", "branch_name": "refs/heads/master", "committer_date": 1494772356000, "content_id": "32e691a14bd64d27e8f698b0962c30961a629e37", "detected_licenses": [ "MIT" ], "directory_id": "f3faf9d29bba85320dedd5cd2b452b0a1efe3c55", "extension": "py", "fi...
2.515625
stackv2
import os, sys, re from collections import OrderedDict from copy import copy import thimbles as tmb from thimbles import workingdataspace as wds class OptionSpecificationError(Exception): pass class EvalError(Exception): pass class OptionTree(object): eval_ns = wds.__dict__ full_path_pattern = re.c...
262
35.88
125
18
2,017
python
[{"finding_id": "codeql_py/overly-large-range_2ef266b6b336de71_93abac56", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 17, 18 ]
[ null, null ]
[ 41, 39 ]
[ 44, 42 ]
2024-11-18T18:47:03.926043+00:00
1,492,760,155,000
7ad2c676c5e427c32657eb157134b5ebd1a84e08
2
{ "blob_id": "7ad2c676c5e427c32657eb157134b5ebd1a84e08", "branch_name": "refs/heads/master", "committer_date": 1492760155000, "content_id": "d5261f8a4e15ae51b90b4fe6ad6e2fa59259c865", "detected_licenses": [ "MIT" ], "directory_id": "4f4c8c80fa03730f88a138351cd1e4794e98ad86", "extension": "py", "fi...
2.328125
stackv2
from flask import Flask, jsonify, request import os import requests from pprint import pprint import json import logging import logstash #added this K #from cfenv import AppEnv #added this K #env = AppEnv() #env.LOG_HOST # 'test-app' #env.LOG_PORT # 5000 if 'LOG_HOST' not in os.environ or 'LOG_PORT' not in os.envi...
50
21.78
101
11
310
python
[{"finding_id": "codeql_py/log-injection_b6bc33ab54951e5a_59b67f52", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 35 ]
[ null ]
[ 44 ]
[ 49 ]
2024-11-18T18:47:05.199231+00:00
1,619,462,452,000
d1ce2d80520c721802a6eb0f372abbcb17bd74bc
3
{ "blob_id": "d1ce2d80520c721802a6eb0f372abbcb17bd74bc", "branch_name": "refs/heads/master", "committer_date": 1619462452000, "content_id": "6cb1b5b8a8f56ff3980697e984c3916f7d8290a4", "detected_licenses": [ "MIT" ], "directory_id": "3a28181a1a3057a903a34a224fb6c531c2de7b70", "extension": "py", "fi...
2.546875
stackv2
import requests, json, sys from pddl_parser_2.pond.parser import Problem from pddl_parser_2.pond.predicate import Predicate from pddl_parser_2.pond.formula import Formula, And, Primitive, Forall, When, Xor, Not, Oneof, Or def doit2(domain, problem): try: prob = Problem(domain, problem) except Exception...
56
34.23
146
19
490
python
[{"finding_id": "codeql_py/request-without-cert-validation_aed3b5abfef605c0_a3f3cb8b", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 40 ]
[ null ]
[ 9 ]
[ 87 ]
2024-11-18T19:10:00.193215+00:00
1,619,024,163,000
396d295132bfe9ebebc6d83c76834332c18b22d9
2
{ "blob_id": "396d295132bfe9ebebc6d83c76834332c18b22d9", "branch_name": "refs/heads/main", "committer_date": 1619024163000, "content_id": "35f90d4e743792b7dd963476ecd77e01bd954608", "detected_licenses": [ "MIT" ], "directory_id": "a1aae9dbcdf39f58e860227f0a5871109068d10c", "extension": "py", "file...
2.4375
stackv2
import os try: from flask import Flask, jsonify, request from flask_restful import Api, Resource import joblib import base64 except: print("[-] Required modules are not installed") print('[+] Installing modules now...') os.system('pip install -r requirements.txt') app = Flask(__name__) api ...
67
34.36
79
19
503
python
[{"finding_id": "codeql_py/command-line-injection_7a3fd61bf87d7297_30dee44f", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {...
5
true
[ "CWE-078", "CWE-078", "CWE-215", "CWE-022", "CWE-022" ]
[ "py/command-line-injection", "py/command-line-injection", "py/flask-debug", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This command line depends on a [user-provided value](1).", "This command line depends on a [user-provided value](1).", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1).", "This path depend...
[ 38, 41, 67, 27, 45 ]
[ 39, 42, null, null, null ]
[ 27, 27, 5, 19, 23 ]
[ 76, 76, 24, 27, 36 ]
2024-11-18T19:10:01.056556+00:00
1,577,977,065,000
669a79f3b1e9d8828de81217791234087716e66a
3
{ "blob_id": "669a79f3b1e9d8828de81217791234087716e66a", "branch_name": "refs/heads/master", "committer_date": 1577977065000, "content_id": "e5605b5d14998252d0b4c5fc79b50189afb2a769", "detected_licenses": [ "Apache-2.0" ], "directory_id": "5688f2e59d5bc669b4aa9ccea4830413d236b1e3", "extension": "py"...
2.546875
stackv2
# -*- coding:utf-8 -*- import tarfile def untar(tarname,tardir): """ 解压tar.gz文件 tarname: 压缩文件名 tardir: 解压缩后的存放路径 """ try: t = tarfile.open(tarname) t.extractall(path=tardir) rig = "已经解压完成" return rig except Exception as e: return e if __name__=="__...
26
21.46
70
10
199
python
[{"finding_id": "codeql_py/tarslip_d4fc0196170a2f6c_ca3ab26a", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 14 ]
[ null ]
[ 9 ]
[ 10 ]
2024-11-18T20:15:57.027088+00:00
1,421,209,178,000
bee73109d4f1ea0f821db76a04eeaef63b1436d3
3
{ "blob_id": "bee73109d4f1ea0f821db76a04eeaef63b1436d3", "branch_name": "refs/heads/master", "committer_date": 1421209178000, "content_id": "7c0d4de449f51ca99b51640e236dce38099be314", "detected_licenses": [ "MIT" ], "directory_id": "8f2eda2e901ad6357fc721fbad4cb46014dfda09", "extension": "py", "fi...
3.03125
stackv2
# Twitter-Sort # main.py # Aaron Taylor # # This sorting technique allows a program to pass this script a list of # numbers, and be returned the sorted version of them. This works by tweeting # the list to Twitter asking for them to be sorted, and when there is a # reply, we check to ensure they're sorted. If they are...
107
26.84
86
28
780
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_0cd46d4982e3f1d4_c38f96eb", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (secret)](1) as clear text." ]
[ 39 ]
[ null ]
[ 17 ]
[ 63 ]
2024-11-18T20:16:00.392044+00:00
1,672,973,017,000
7c8298cdc226b34e15c8ef6ede28f50b67da9df9
2
{ "blob_id": "7c8298cdc226b34e15c8ef6ede28f50b67da9df9", "branch_name": "refs/heads/master", "committer_date": 1672973017000, "content_id": "015c6707869d8578c11c15943f88eac9d78ec845", "detected_licenses": [ "MIT" ], "directory_id": "54cb502fd7488350ae80f100443463fc907b1904", "extension": "py", "fi...
2.390625
stackv2
from lib.plugins import Driver import os from paramiko import SSHClient, RSAKey, AutoAddPolicy from io import StringIO class Ssh(Driver): DEFAULT_KEY_PATH = "~/.ssh/id_rsa" def __init__(self, host, username='root', password = None, key = None, port = 22, path = "/proc"): Driver.__init__(self) self._host = host ...
61
24.38
144
16
428
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_2c1b35f02589ee79_f7609559", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 46 ]
[ null ]
[ 4 ]
[ 55 ]
2024-11-18T20:16:02.991128+00:00
1,514,994,061,000
d50fe989d6edcddc26b509d260ad4d6e8d3441fb
3
{ "blob_id": "d50fe989d6edcddc26b509d260ad4d6e8d3441fb", "branch_name": "refs/heads/master", "committer_date": 1514994061000, "content_id": "262dc07f91eab55de237fc2df7ce9824651946bc", "detected_licenses": [ "MIT" ], "directory_id": "adbcf56e89e16e6a601b126fd59825ef5d10db3c", "extension": "py", "fi...
2.625
stackv2
from transitions.extensions import GraphMachine from bs4 import BeautifulSoup import requests import time import os import re import urllib.request PTT_URL = 'https://www.ptt.cc' class TocMachine(GraphMachine): def __init__(self, **machine_configs): self.machine = GraphMachine( model = self, ...
170
28.65
97
20
1,412
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_6eed502d273193b9_e5171e4c", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'imgur.com', so it might match more ...
1
true
[ "CWE-020" ]
[ "py/incomplete-hostname-regexp" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'imgur.com', so it might match more hosts than expected." ]
[ 134 ]
[ null ]
[ 23 ]
[ 52 ]
2024-11-18T20:16:11.118575+00:00
1,651,941,349,000
43946f0a82ed4f528d4e7a304550552d1de1bf93
3
{ "blob_id": "43946f0a82ed4f528d4e7a304550552d1de1bf93", "branch_name": "refs/heads/main", "committer_date": 1651941349000, "content_id": "6e41b8f154ebb79462e3aae52bfa1af5bc5c2f40", "detected_licenses": [ "MIT" ], "directory_id": "48269e5fe9450cdfdc34296530fedcc0a06aee55", "extension": "py", "file...
2.734375
stackv2
"""Emoberta app""" import argparse import logging import os import jsonpickle import torch from flask import Flask, request from transformers import AutoModelForSequenceClassification, AutoTokenizer logging.basicConfig( level=logging.INFO, format="%(asctime)s.%(msecs)03d %(levelname)s %(module)s - %(funcName)...
128
24.2
90
19
781
python
[{"finding_id": "codeql_py/unsafe-deserialization_e30353b6c3876f6d_3a000429", "tool_name": "codeql", "rule_id": "py/unsafe-deserialization", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Unsafe deserialization depends on a [user-provided value](1).", "remediation": "", "locatio...
2
true
[ "CWE-502", "CWE-117" ]
[ "py/unsafe-deserialization", "py/log-injection" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Unsafe deserialization depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 74, 78 ]
[ null, null ]
[ 30, 21 ]
[ 34, 49 ]
2024-11-18T19:23:08.347832+00:00
1,618,664,084,000
b9903e60f77edcdb13cd2d146bb2fac3bf8746e4
2
{ "blob_id": "b9903e60f77edcdb13cd2d146bb2fac3bf8746e4", "branch_name": "refs/heads/main", "committer_date": 1618664084000, "content_id": "d0c807c3dda3de6cce74d5b1ffa205057d7de770", "detected_licenses": [ "MIT" ], "directory_id": "f18c166ebf131c0ae1cb2fd43ef6bbcf3da019ac", "extension": "py", "file...
2.4375
stackv2
import os import fcntl import hashlib import tempfile from contextlib import contextmanager, suppress from datetime import datetime @contextmanager def file_lock(fd, cmd): try: fcntl.lockf(fd, cmd) yield except IOError: yield finally: fcntl.lockf(fd, fcntl.LOCK_UN) class ...
46
24.07
78
21
275
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_1f5354f1ecebaa1a_6af582ed", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 22 ]
[ null ]
[ 34 ]
[ 64 ]
2024-11-18T19:38:12.947768+00:00
1,632,604,732,000
d5a38e67360faf229faee21572a2b7891079c4d5
3
{ "blob_id": "d5a38e67360faf229faee21572a2b7891079c4d5", "branch_name": "refs/heads/main", "committer_date": 1632604732000, "content_id": "8b78b251291eeb52a84c37d470834cc88a08f8cd", "detected_licenses": [ "MIT" ], "directory_id": "fbe6d11f722929b83cfc5f72e9cdb8bf16c526b7", "extension": "py", "file...
2.75
stackv2
import logging from flask import Flask, request app = Flask(__name__) app.logger.setLevel(logging.DEBUG) @app.route("/") def root(): app.logger.info(f'Request user agent: {request.user_agent}') app.logger.info(f'Request host: {request.host}') return ''' <html> <h1>I like cats.</h1> ...
17
23.24
69
11
105
python
[{"finding_id": "codeql_py/log-injection_07968bb98ba28b72_a8624f90", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 10 ]
[ null ]
[ 21 ]
[ 64 ]
2024-11-18T19:38:37.607400+00:00
1,508,650,171,000
3c6901931d93e5a3c72ed8e35ef66132b5dfa12c
3
{ "blob_id": "3c6901931d93e5a3c72ed8e35ef66132b5dfa12c", "branch_name": "refs/heads/master", "committer_date": 1508650171000, "content_id": "65887243d0e4a864b50115719e322daff3eff056", "detected_licenses": [ "MIT" ], "directory_id": "7a5c24b4d8fb0caf0b22a534ea34531ddee7ebd7", "extension": "py", "fi...
2.71875
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- """ zipcode : returns Japanese zipcode or address """ import re from flask import Flask, request, json, g, Response, abort import sqlite3 app = Flask(__name__) app.config.from_object('config') def connect_db(): con = sqlite3.connect(app.config['DATABASE']) app....
112
29.19
73
17
757
python
[{"finding_id": "codeql_py/log-injection_9f91db771ef1d975_e08c359f", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
3
true
[ "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 41, 43, 75 ]
[ null, null, null ]
[ 53, 46, 29 ]
[ 57, 50, 52 ]
2024-11-18T20:10:58.781773+00:00
1,429,457,596,000
65fa110e76e7cea73ed79d3671ce4fb71d7b6eb7
2
{ "blob_id": "65fa110e76e7cea73ed79d3671ce4fb71d7b6eb7", "branch_name": "refs/heads/master", "committer_date": 1429457596000, "content_id": "910da55ad80f2bed42b34d8b872a0b043ae9bf84", "detected_licenses": [ "MIT" ], "directory_id": "6d8f9c847bedc534e0e5d794b613da4a08d0c3c7", "extension": "py", "fi...
2.3125
stackv2
import os.path from flask import Flask, abort, redirect, url_for, jsonify, request from contextProvider import ContextProvider from robotIPFinder import RobotFinder from vision.robotLocator import RobotLocator import requests import json import constants as cte from questionanswering.question_processor import QuestionP...
180
29.54
106
16
1,245
python
[{"finding_id": "codeql_py/code-injection_8d48e0f5e0058b4b_2b2ac65c", "tool_name": "codeql", "rule_id": "py/code-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This code execution depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "...
2
true
[ "CWE-094", "CWE-295" ]
[ "py/code-injection", "py/request-without-cert-validation" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This code execution depends on a [user-provided value](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 79, 139 ]
[ null, null ]
[ 21, 24 ]
[ 33, 68 ]
2024-11-18T20:26:08.420047+00:00
1,586,498,320,000
8783e4fb9cc95b0ada9a6e78df5db4e433dace79
3
{ "blob_id": "8783e4fb9cc95b0ada9a6e78df5db4e433dace79", "branch_name": "refs/heads/master", "committer_date": 1586498320000, "content_id": "8153eadabd3692f567cc78e0c5ede0a9f028dfb5", "detected_licenses": [ "MIT" ], "directory_id": "c84463d658e4da7943b1e818ce2e28e2a8350b96", "extension": "py", "fi...
2.859375
stackv2
import json from datetime import datetime import base64 import zlib import hashlib import string import random default = { 'name': 'Account Name', 'age': 0, 'user': 'user', 'pass': '5e884898da28047151d0e56f8dc6292773603d0d6aabbdd62a11ef721d1542d8', 'balance': 0, 'loan': [], 'history': [] } ...
208
19.48
102
16
1,129
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_7337e8a2e610c8a9_e6c4b37d", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.", "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computational...
[ 85, 122 ]
[ null, null ]
[ 33, 46 ]
[ 50, 63 ]
2024-11-18T20:26:10.083120+00:00
1,538,855,208,000
94a0b839eb069f052a80bca25acbc5a103a77d9f
2
{ "blob_id": "94a0b839eb069f052a80bca25acbc5a103a77d9f", "branch_name": "refs/heads/master", "committer_date": 1538855208000, "content_id": "894e1369cc040478b7dee3a81a123a7296cd1556", "detected_licenses": [ "MIT" ], "directory_id": "530e2ee28ab24d724443ef72c098f6d47541f70c", "extension": "py", "fi...
2.484375
stackv2
""" REST Api server built on flask. """ import json import logging import os import random import flask from flask.ext.restful import Resource from flask.ext.restful import Api from flask_limiter import Limiter import rauth import raottt from raottt import Game from raottt import Player from raottt import Score from...
346
33.78
84
21
2,472
python
[{"finding_id": "codeql_py/log-injection_c60b88ec33f2a1ad_99d4b61f", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
5
true
[ "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 71, 82, 101, 156, 317 ]
[ null, null, null, null, null ]
[ 42, 63, 69, 41, 38 ]
[ 60, 66, 72, 59, 56 ]
2024-11-18T20:26:18.215880+00:00
1,631,482,603,000
47b583744ce9280f37c8be8f711fb27fa7c003fe
3
{ "blob_id": "47b583744ce9280f37c8be8f711fb27fa7c003fe", "branch_name": "refs/heads/main", "committer_date": 1631482603000, "content_id": "919795c53dd3cfb403f9227c4bfbc123a99321d7", "detected_licenses": [ "MIT" ], "directory_id": "91dbcaca6b047dd56cde4ddce1323aeb62a2182e", "extension": "py", "file...
2.828125
stackv2
from models.Modalidade import Modalidade from tinydb import Query from extensions.database import modalidades as table_modalidades from flask import jsonify def cadastra_modalidade(modalidade: dict): nova_modalidade = Modalidade( **modalidade ) modalidades_query = Query() existe_modalidade = t...
29
38.03
119
18
277
python
[{"finding_id": "codeql_py/stack-trace-exposure_089b7043f4499cfc_e45e2cd1", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 21, 29 ]
[ null, null ]
[ 28, 24 ]
[ 105, 114 ]
2024-11-18T20:26:48.982727+00:00
1,686,657,089,000
d0c6fde306c5d982fb5ee83ebefce71588d92af4
3
{ "blob_id": "d0c6fde306c5d982fb5ee83ebefce71588d92af4", "branch_name": "refs/heads/master", "committer_date": 1686657089000, "content_id": "80f8483b8e65f6de0a539e1d5572431ce4c81205", "detected_licenses": [ "MIT" ], "directory_id": "f27bee560cc8323d841f768f9cf3dd772af65ee0", "extension": "py", "fi...
2.640625
stackv2
#!/usr/bin/env python3 # -*- coding: utf8 -*- import re import sys from pathlib import Path from paleomix.common.argparse import ArgumentParser from paleomix.common.formats import FormatError # Standard nucleotides + UIPAC codes _VALID_CHARS_STR = b"ACGTN" b"RYSWKMBDHV" _VALID_CHARS = frozenset(_VALID_CHARS_STR.upper...
123
33.35
86
19
943
python
[{"finding_id": "codeql_py/overly-large-range_17db4f6a7413be60_f5ce637e", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[+,\\-.\\/0-9:;<\\].", "remediation": "", "location":...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[+,\\-.\\/0-9:;<\\]." ]
[ 15 ]
[ null ]
[ 36 ]
[ 39 ]
2024-11-18T20:52:17.707293+00:00
1,634,200,956,000
1686afaead2a7442c5a41678090c129a163aec69
3
{ "blob_id": "1686afaead2a7442c5a41678090c129a163aec69", "branch_name": "refs/heads/main", "committer_date": 1634200956000, "content_id": "3426860789996b32fe932aae171b3497700b4c83", "detected_licenses": [ "MIT" ], "directory_id": "2ab078b4f2e336116d78f7a879a71a0d605e2be2", "extension": "py", "file...
2.625
stackv2
import os from werkzeug.utils import secure_filename from flask import Flask,flash,request,redirect,send_file,render_template UPLOAD_FOLDER = '/home/pi/Desktop/AFKZenCoders/PS12/uploads/' #app = Flask(__name__) app = Flask(__name__, template_folder='/home/pi/Desktop/AFKZenCoders/PS12/templates') app.config['UPLOAD_F...
51
32.49
85
17
377
python
[{"finding_id": "codeql_py/flask-debug_869f904ca5f51312_fa224eb1", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
4
true
[ "CWE-215", "CWE-601", "CWE-601", "CWE-022" ]
[ "py/flask-debug", "py/url-redirection", "py/url-redirection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 51, 20, 26, 47 ]
[ null, null, null, null ]
[ 5, 29, 29, 22 ]
[ 53, 40, 40, 31 ]
2024-11-18T20:52:23.231181+00:00
1,412,972,918,000
c168bee24df2925763142a6c93fd4650670779d1
2
{ "blob_id": "c168bee24df2925763142a6c93fd4650670779d1", "branch_name": "refs/heads/master", "committer_date": 1412972918000, "content_id": "d6ec17eb646b65f5be4dd7eb2268217bef0bef3e", "detected_licenses": [ "MIT" ], "directory_id": "43fd322955be047148cf323363d6885056e1f589", "extension": "py", "fi...
2.390625
stackv2
from romeo_auth import app, ldaptools from romeo_auth.authutils import group_required from flask import render_template, request, redirect, flash from flask.ext.login import login_required from ldap import MOD_ADD, MOD_DELETE, MOD_REPLACE @app.route("/admin") @login_required @group_required("admin") def admin(): retu...
100
35.2
111
15
899
python
[{"finding_id": "codeql_py/url-redirection_7a1d901657cc8644_96d606c8", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 25 ]
[ null ]
[ 18 ]
[ 59 ]
2024-11-18T20:52:27.416418+00:00
1,583,200,675,000
1281ded73fa7ff17d3ae856d1acbaa5781aee45e
3
{ "blob_id": "1281ded73fa7ff17d3ae856d1acbaa5781aee45e", "branch_name": "refs/heads/master", "committer_date": 1583200675000, "content_id": "77cec7dcb9904c5b2545a1db8285816ac352449e", "detected_licenses": [ "Apache-2.0" ], "directory_id": "db1a32c35e4755473ea8efe7328c473cf777787c", "extension": "py"...
2.546875
stackv2
import json import requests class NsgAPI: def __init__(self, log, url, token, netid) -> None: self.log = log self.url = url self.token = token self.netid = netid def query(self, nsgql): full_url = self.concatenate_url('v2/query/net/{0}/data'.format(self.netid)) ...
109
36.87
118
16
931
python
[{"finding_id": "codeql_py/request-without-cert-validation_24cbb3269b4d8abc_86bac794", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
4
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 19, 48, 66, 74 ]
[ null, null, null, null ]
[ 14, 14, 14, 14 ]
[ 103, 106, 94, 106 ]
2024-11-18T20:52:40.241910+00:00
1,692,196,067,000
3d6a6a1806837563e0436ec9cc1381ed22479f95
2
{ "blob_id": "3d6a6a1806837563e0436ec9cc1381ed22479f95", "branch_name": "refs/heads/master", "committer_date": 1692196067000, "content_id": "dc4cbb5eed428a504071bcafb40cba5e72e73ec5", "detected_licenses": [ "Apache-2.0" ], "directory_id": "c2cdc996fe2858e8814c8bd552b0ff67179275d5", "extension": "py"...
2.484375
stackv2
import requests import base64 import json class Device42Api: def __init__(self, config, options): self.username = config['username'] self.password = config['password'] self.host = config['host'] self.debug = options['debug'] self.dry_run = options['dry_run'] def _poste...
95
30.59
94
16
746
python
[{"finding_id": "codeql_py/request-without-cert-validation_bef8104c7a49928a_7c4502f4", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
3
true
[ "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 20, 41, 61 ]
[ null, null, null ]
[ 13, 13, 13 ]
[ 76, 76, 64 ]
2024-11-18T20:52:47.944777+00:00
1,478,038,218,000
0cad11b6ad664ed443ed3bbbb43bae3f61019e09
3
{ "blob_id": "0cad11b6ad664ed443ed3bbbb43bae3f61019e09", "branch_name": "refs/heads/master", "committer_date": 1478038218000, "content_id": "03e3b244dbe00c7fccf51e310a8a5f18b2cdc391", "detected_licenses": [ "MIT" ], "directory_id": "56189818056fcff6dc55bb3befa0047a277b226d", "extension": "py", "fi...
3.046875
stackv2
from DataGeneration import DatabaseHandler from MapboxAPIWrapper import MapboxAPIWrapper from MapboxAPIWrapper import MapboxAPIError import math import requests class DataGenerator: def __init__(self, handler=DatabaseHandler(db_file_name='db.sqlite3'), stops=None, ...
98
41.95
80
19
787
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1bc9aa35d71cadde_2e20ee70", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 58, 72 ]
[ 59, 73 ]
[ 23, 19 ]
[ 78, 65 ]
2024-11-18T19:02:46.069543+00:00
1,588,001,962,000
84f0a21ec80a71e525170bdd226fdd71982b88d6
3
{ "blob_id": "84f0a21ec80a71e525170bdd226fdd71982b88d6", "branch_name": "refs/heads/master", "committer_date": 1588001962000, "content_id": "c2b71a298a1dfc89ff0de2d9d15ef2d42ff26957", "detected_licenses": [ "MIT" ], "directory_id": "dfc4e90ad1ed2b332cfc17cdd8d9916fbf1c38da", "extension": "py", "fi...
2.6875
stackv2
from apps.froms import BaseForm from wtforms import StringField from wtforms.validators import DataRequired, Regexp, Length import hashlib # TODO: 发送短信验证码Form表单校验 class SMSCaptchaForm(BaseForm): salt = 'q3423805gdflvbdfvhsdoa`#$%' # TODO: 前后端约定的加密盐 telephone = StringField(validators=[Regexp(r'1[356789]\d{9}'...
30
41.8
106
19
370
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_7c6fd4995c995c1a_876b4097", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (private)](1) is used in a hashing algorithm (MD5) that is insecu...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (private)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 24 ]
[ null ]
[ 33 ]
[ 89 ]
2024-11-18T19:14:34.547867+00:00
1,480,434,745,000
2828855fbdf09b1f11081bac583bc1a8fe6de094
3
{ "blob_id": "2828855fbdf09b1f11081bac583bc1a8fe6de094", "branch_name": "refs/heads/master", "committer_date": 1480434745000, "content_id": "3bd6c399de283cdddb6b99250356805fe23e27c3", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "559648706452a3e73b6b95d07b418934162dff1a", "extension": "p...
2.640625
stackv2
# -*- coding: utf-8 -*- """ Command to do a database dump using database's native tools. Originally inspired by http://djangosnippets.org/snippets/823/ """ import os import time import sys import subprocess from django.core.management.base import BaseCommand, CommandError from django.conf import settings class Com...
258
31.12
115
15
1,757
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2e456e5a545000e4_44da19d7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 191 ]
[ null ]
[ 19 ]
[ 26 ]
2024-11-18T19:14:39.234990+00:00
1,649,866,615,000
67ad151f29b815da288ae4167da4f13c34b004bd
2
{ "blob_id": "67ad151f29b815da288ae4167da4f13c34b004bd", "branch_name": "refs/heads/master", "committer_date": 1649866615000, "content_id": "74cb57aeb97967694c7fea96af1daf7d3947924a", "detected_licenses": [ "MIT" ], "directory_id": "41eebb6d1d1f826927f7106b81f49473692ba570", "extension": "py", "fi...
2.3125
stackv2
#!/usr/bin/env python # Copyright 2019 Pascal Audet # # This file is part of RfPy. # # Permission is hereby granted, free of charge, to any person obtaining a copy # of this software and associated documentation files (the "Software"), to deal # in the Software without restriction, including without limitation the rig...
412
33
82
20
3,275
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_954eb0116b4b44a4_f584d1e9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 307 ]
[ 308 ]
[ 15 ]
[ 41 ]
2024-11-18T19:14:52.116920+00:00
1,507,079,343,000
6cf991a2774ebbabc87ee21a22706c6b026306d4
3
{ "blob_id": "6cf991a2774ebbabc87ee21a22706c6b026306d4", "branch_name": "refs/heads/master", "committer_date": 1507079343000, "content_id": "dca5339fa1c2992af46d5b472598d4706cab0574", "detected_licenses": [ "Apache-2.0" ], "directory_id": "7a4797d43e6bb5b2f0633d1a035e93a59238726d", "extension": "py"...
2.703125
stackv2
from flask import Flask, request from redis import Redis import os import socket app = Flask(__name__) host = socket.gethostname() user = "unknown" card_num = "1234-5667-2468-1357" @app.route('/') def hello(): try: # Parse out the user from the request. user = request.args.get("user") except: ...
31
27.55
100
13
237
python
[{"finding_id": "codeql_py/reflective-xss_ba81f8fc60081e00_094bbf04", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 28 ]
[ null ]
[ 12 ]
[ 93 ]
2024-11-18T19:27:51.772932+00:00
1,618,048,622,000
8c18faae927d3c3917fe6bd3b3520f8e9429f0bf
2
{ "blob_id": "8c18faae927d3c3917fe6bd3b3520f8e9429f0bf", "branch_name": "refs/heads/master", "committer_date": 1618048622000, "content_id": "6c23d283913a0866609be97ffdd602b7712807a3", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "4af569c5c2f64c9c266e88b2b8ac2a4993014a4b", "extension": "p...
2.40625
stackv2
# -*- coding: utf-8 -*- import os import string import yaml from html import escape from functools import partial from random import choice import bottle from bottle import (TEMPLATE_PATH, jinja2_template as template, Bottle) from bottle import HTTPResponse, request, abort from jinja2 import En...
163
30.09
98
17
1,157
python
[{"finding_id": "codeql_py/stack-trace-exposure_07ca9c954dc1a1f7_196cc607", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.\n[S...
6
true
[ "CWE-209", "CWE-074", "CWE-074", "CWE-022", "CWE-079", "CWE-079" ]
[ "py/stack-trace-exposure", "py/template-injection", "py/template-injection", "py/path-injection", "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.\n[Stack trace information](2) flows to this location and may be exposed to an external user.\n[Stack trace information](3) flows to this location and may be exposed to an external user.", "This template construction depen...
[ 152, 31, 128, 122, 27, 117 ]
[ null, 32, null, null, null, null ]
[ 12, 45, 32, 19, 18, 18 ]
[ 63, 98, 48, 58, 31, 31 ]
2024-11-18T19:38:57.588457+00:00
1,579,996,439,000
545f991d586d5da392485a92bdace1c2bbd13786
3
{ "blob_id": "545f991d586d5da392485a92bdace1c2bbd13786", "branch_name": "refs/heads/master", "committer_date": 1579996439000, "content_id": "fdcf8ccb868ba5035adf3c4369897ad3de05dfab", "detected_licenses": [ "MIT" ], "directory_id": "8432bebb5e01b97ab62316ddb883ed2d83bf6333", "extension": "py", "fi...
2.8125
stackv2
# -*- coding: utf-8 -*- from paramiko import SSHClient import paramiko from .helpers import print_lines, print_error, print_info class RemoteSsh: def __init__(self): self.ssh = SSHClient() self.ssh.load_system_host_keys() self.ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy()) ...
48
31.12
103
15
322
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_ad68b8a10e08917d_c3912c44", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 13 ]
[ null ]
[ 9 ]
[ 71 ]
2024-11-18T20:06:01.359144+00:00
1,564,772,150,000
272ff5fa50f00773312b28c2f2df018e346a29c8
3
{ "blob_id": "272ff5fa50f00773312b28c2f2df018e346a29c8", "branch_name": "refs/heads/master", "committer_date": 1564772150000, "content_id": "68eef327acca32774451759d0cabccc81a63fb67", "detected_licenses": [ "MIT" ], "directory_id": "0958980db8b25f1bdd2ae3a61596e578b7441bee", "extension": "py", "fi...
3.015625
stackv2
# -*- coding: utf-8 -*- import logging logging.basicConfig(filename='log.log', format='%(asctime)s - %(levelname)s - %(message)s', level=logging.INFO) logger = logging.getLogger('Info') import pandas as pd import database import language_support #The json file of currently supported language responses jsonresponse = l...
202
42.63
151
20
2,106
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_26065c0ea3045db3_1c9adb36", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 137 ]
[ null ]
[ 42 ]
[ 66 ]
2024-11-18T20:06:15.878495+00:00
1,587,111,775,000
1ea4c22f990b41b677d1b4ff6824ccfb1b5857c1
2
{ "blob_id": "1ea4c22f990b41b677d1b4ff6824ccfb1b5857c1", "branch_name": "refs/heads/master", "committer_date": 1587111775000, "content_id": "4e00f34e00f7d477c097dea673c05937cc744598", "detected_licenses": [ "MIT" ], "directory_id": "8e69eee9b474587925e22413717eb82e4b024360", "extension": "py", "fi...
2.34375
stackv2
from hashlib import md5 import logging log = logging.getLogger(__name__) from otp.ai.passlib.utils.binary import h64 from otp.ai.passlib.utils.compat import u, uascii_to_str, unicode import otp.ai.passlib.utils.handlers as uh __all__ = [ 'phpass'] class phpass(uh.HasManyIdents, uh.HasRounds, uh.HasSalt, uh.GenericHan...
47
32.91
112
16
455
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_6cf54f2c91de5d1e_234f034d", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (secret)](2) is used in a hashing algorithm (MD5) that is insecure.", "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (secret)](2) is used in a hashing algori...
[ 41, 44 ]
[ null, null ]
[ 22, 26 ]
[ 56, 41 ]
2024-11-18T20:06:24.065965+00:00
1,573,518,304,000
487488119c670052a81485221fa7c9ea7cbcb528
3
{ "blob_id": "487488119c670052a81485221fa7c9ea7cbcb528", "branch_name": "refs/heads/master", "committer_date": 1573518304000, "content_id": "7dab7b6626fd2aeae40af14411e41a3f62bd8d4a", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "f2199f0102fafe6addc33d086ce31c5cb4edc183", "extension": "p...
2.578125
stackv2
from rest_framework import status, response, views from foundation.models import StudentDB class AddAPIView(views.APIView): def post(self, request): student_first_name = request.data.get('fname', None) student_last_name = request.data.get('lname', None) student_mark = request.data.get('mark...
110
38.29
129
21
822
python
[{"finding_id": "codeql_py/stack-trace-exposure_f2eb0722b3095f3e_6fa1ca01", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 96 ]
[ 98 ]
[ 22 ]
[ 23 ]
2024-11-18T20:06:29.447299+00:00
1,559,678,954,000
fc11dc218711c9f62c32f2f53b6a30ffc730cd10
2
{ "blob_id": "fc11dc218711c9f62c32f2f53b6a30ffc730cd10", "branch_name": "refs/heads/master", "committer_date": 1559678954000, "content_id": "75be02644b03218fec4576ca8b3cc5fa35a985fd", "detected_licenses": [ "MIT" ], "directory_id": "1138dbe22b7b80585c3fcbf5e94c585b519952a0", "extension": "py", "fi...
2.359375
stackv2
from flask import Flask, render_template, request, send_from_directory from werkzeug.utils import secure_filename import socket import os, hashlib import requests import glob app = Flask(__name__) hostname = socket.gethostname() BLOCKSIZE = 65536 hasher = hashlib.md5() @app.route('/verifica', methods = ['GET', 'POST'...
45
26.38
77
17
393
python
[{"finding_id": "codeql_py/flask-debug_e07254729fafac9d_a1ccb157", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-022" ]
[ "py/flask-debug", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1)." ]
[ 45, 20 ]
[ null, null ]
[ 4, 13 ]
[ 78, 53 ]
2024-11-18T20:18:11.294859+00:00
1,577,111,336,000
73aca9b545e0d2df1ac34f5975e43e15f869ba77
4
{ "blob_id": "73aca9b545e0d2df1ac34f5975e43e15f869ba77", "branch_name": "refs/heads/master", "committer_date": 1577111336000, "content_id": "9ae4efbe32b5c90296cf2c6424d6ed80f1fca36c", "detected_licenses": [ "MIT" ], "directory_id": "87ecd800421c6078a5ecf643f48e4ce74c07d96e", "extension": "py", "fi...
3.59375
stackv2
#!/usr/bin/env python3 import r1d19_generators class SchoolMember: '''''' def __init__(self, name, time=None): '''''' self.name = name self.time = time print(f'(New School Member: {self.name})') def tell(self): '''''' print(f'My name is {self.name}.', end=...
222
24.6
158
14
1,595
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_82139cb630fa0ddf_aab1ad90", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 34 ]
[ null ]
[ 15 ]
[ 44 ]
2024-11-18T20:18:14.515667+00:00
1,632,341,964,000
c527a8c5e361a61477a2aa129c38e5b71ad64629
2
{ "blob_id": "c527a8c5e361a61477a2aa129c38e5b71ad64629", "branch_name": "refs/heads/main", "committer_date": 1632341964000, "content_id": "0c46d35e8835fd4c7e4d545dfa9c1b6eca42d22d", "detected_licenses": [ "MIT" ], "directory_id": "14f130d3f769651513296b7dd3fe851c478c43ea", "extension": "py", "file...
2.484375
stackv2
import requests from flask import render_template, redirect, request, session from flask_login import LoginManager from flask_session import Session from tempfile import mkdtemp from config import * from model.Models import User, Book, user_book from helpers import login_required # Configure session to use filesystem...
149
31.28
109
18
1,047
python
[{"finding_id": "codeql_py/partial-ssrf_27763d412bea983a_2f9a14b0", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 79 ]
[ null ]
[ 20 ]
[ 37 ]
2024-11-18T20:18:23.508243+00:00
1,545,225,901,000
700505213d4679c972cbe07b32c0233fc3491d0f
3
{ "blob_id": "700505213d4679c972cbe07b32c0233fc3491d0f", "branch_name": "refs/heads/master", "committer_date": 1545225901000, "content_id": "8ca107decd6cd24e7c16cc8ac17a0746b6b42303", "detected_licenses": [ "Apache-2.0" ], "directory_id": "018f1a87157f009250c659aa9b1cf66ab4b1bf14", "extension": "py"...
2.625
stackv2
from flask import Flask, jsonify, request from flask_restful import Resource, Api from pymongo import MongoClient import bcrypt import numpy import requests import subprocess import json app = Flask(__name__) api = Api(app) client = MongoClient("mongodb://db:27017") db = client.ImageClassiferDB users = db["Users"] d...
156
25.41
109
16
942
python
[{"finding_id": "codeql_py/full-ssrf_096afb322e36f06a_364dcc4b", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
1
true
[ "CWE-918" ]
[ "py/full-ssrf" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1)." ]
[ 92 ]
[ null ]
[ 13 ]
[ 30 ]
2024-11-18T20:18:31.784763+00:00
1,560,802,293,000
d76a997d7aa43ab414fdfe492f28d210416f190b
4
{ "blob_id": "d76a997d7aa43ab414fdfe492f28d210416f190b", "branch_name": "refs/heads/master", "committer_date": 1560802293000, "content_id": "c0b6400b6ed9f79059ee8b45793a5626980aafdf", "detected_licenses": [ "MIT" ], "directory_id": "2abe7c793f2f544878630f335c4731fa205dc450", "extension": "py", "fi...
3.640625
stackv2
import pyperclip from user import User from credentials import Credentials #To add an account def create_contact(first_name,last_name,email,phone,password): ''' Function to create a new account ''' new_user = User(first_name,last_name,email,phone,password) return new_user #To save a user def save_u...
137
26.2
127
19
811
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_67947a4a077df300_620fa48e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 106, 124 ]
[ null, null ]
[ 27, 23 ]
[ 89, 71 ]
2024-11-18T20:31:09.837202+00:00
1,626,769,193,000
2c302c57225c10c03aa36e64532b3fcc660d40c2
2
{ "blob_id": "2c302c57225c10c03aa36e64532b3fcc660d40c2", "branch_name": "refs/heads/master", "committer_date": 1626769193000, "content_id": "cb77210efe9839e322c5938583333df97afcb1a2", "detected_licenses": [ "MIT", "Python-2.0" ], "directory_id": "cc4a185841fdc4c95b9f3e3df0f2639031b1c65b", "exten...
2.46875
stackv2
import json import urllib.parse import os import boto3 import botocore import logging from neo4j import GraphDatabase logger = logging.getLogger() logger.setLevel(logging.INFO) logger.info('Loading function') s3_client = boto3.client('s3') sm_client = boto3.client('secretsmanager') def lambda_handler(event, contex...
88
31.49
148
14
744
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_edeb863073f9273a_b9f5a304", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 83 ]
[ null ]
[ 17 ]
[ 42 ]
2024-11-18T20:43:23.575642+00:00
1,625,182,835,000
c0ed9eabefe8e1b9e4d817da21e3a16c89460c45
3
{ "blob_id": "c0ed9eabefe8e1b9e4d817da21e3a16c89460c45", "branch_name": "refs/heads/main", "committer_date": 1625182835000, "content_id": "d0c9fd2248a296af3e3cb245c4b368146fb0b769", "detected_licenses": [ "Unlicense" ], "directory_id": "a4f70e8f7e7ebcbb22f98c9f45b5ef1de173d39e", "extension": "py", ...
2.75
stackv2
import time import requests from datetime import datetime from tqdm import tqdm s = requests.Session() # User configuration GCP_API_KEY = 'YOUR_API_KEY' # https://developers.google.com/youtube/v3/getting-started # Script configuration PLAYLIST_IDS_FILE = 'playlists.txt' UNLISTED_IDS_BEFORE_2017_FILE = 'unlisted-befo...
52
32.38
173
18
432
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_8c4ed5ed6c35a671_d9b4b5ac", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 45, 30 ]
[ null, null ]
[ 25, 19 ]
[ 57, 27 ]
2024-11-18T20:43:24.803331+00:00
1,494,676,866,000
ef627877c21ea33def586edcb7494858415294d0
2
{ "blob_id": "ef627877c21ea33def586edcb7494858415294d0", "branch_name": "refs/heads/master", "committer_date": 1494676866000, "content_id": "ad4949999868d0d82de64b96c8789225224d0b23", "detected_licenses": [ "MIT" ], "directory_id": "8243c698df81815204741af0df9e7b281c5e26e7", "extension": "py", "fi...
2.5
stackv2
"""IGV Server This app dynamically builds experiment and sample menus for IGV, using an Airtable database. Clicking on a sample in the IGV server will load the BAM directly from an S3 bucket (set as environment variable). AWS credentials must be set in a format that boto3 can recognize. The Airtable database must hav...
193
31.57
80
15
1,554
python
[{"finding_id": "codeql_py/reflective-xss_f9be57cee861dc64_2543b1b4", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 170 ]
[ null ]
[ 20 ]
[ 63 ]
2024-11-18T20:43:46.064463+00:00
1,627,265,376,000
2b1864bb41b7a453835f985290a63167d41fe86c
2
{ "blob_id": "2b1864bb41b7a453835f985290a63167d41fe86c", "branch_name": "refs/heads/master", "committer_date": 1627265376000, "content_id": "6b90ce7e9788548dbc5c5834fd9797eaeaffd3e6", "detected_licenses": [ "MIT" ], "directory_id": "fbd9f6daa554a055b473d40a819f0014d69cad23", "extension": "py", "fi...
2.3125
stackv2
from flask import Flask, Response, url_for app = Flask(__name__) @app.route('/') def services_list(): services_list = '' from thirdpartyauth import services for service in services: services_list += ( '<a href="' + url_for('sign_in', service=service) + '">' + service + '</a><br>' ) return Response(...
116
22.83
71
17
735
python
[{"finding_id": "codeql_py/reflective-xss_baad846a0c3416d3_a04093f0", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 80 ]
[ 84 ]
[ 3 ]
[ 17 ]
2024-11-18T20:43:54.108806+00:00
1,683,300,571,000
d07692da0f2fe51c22231e55d589a0fd1ea91f4c
4
{ "blob_id": "d07692da0f2fe51c22231e55d589a0fd1ea91f4c", "branch_name": "refs/heads/master", "committer_date": 1683300571000, "content_id": "ca656b713292a82d8d397d4a1d515df0511fa4e0", "detected_licenses": [ "Unlicense" ], "directory_id": "c35460c50233ab5c53612965d08b9b67aa55ff1e", "extension": "py",...
3.53125
stackv2
#!/usr/bin/env python3 # script to demonstrate mod10 Message + Key = Ciphertext # by vjek, 20200426, updated 20230422 ### from getpass import getpass import random,hashlib,sys def getphrase(): #get sha512 of passphrase, use it as rand seed to generate OTP of any length #if you wanted true OTP, add ISO 8601 met...
70
34.7
149
13
723
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_f632b2036961ef56_f604a13c", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 16 ]
[ null ]
[ 33 ]
[ 59 ]
2024-11-18T20:44:04.204610+00:00
1,538,879,317,000
528a9e71864b90daf33f07437188c88b75af4f92
3
{ "blob_id": "528a9e71864b90daf33f07437188c88b75af4f92", "branch_name": "refs/heads/master", "committer_date": 1538879317000, "content_id": "c7ff7e4e2c873caf9d542c1ab7b673ab3e0e9058", "detected_licenses": [ "MIT" ], "directory_id": "4aac3c78266f0929582a068d36d3035e7ddb1fd0", "extension": "py", "fi...
2.828125
stackv2
''' * Vendor: Artica Soluciones Tecnologicas * Product: Integria IMS Server * Version: 5.0 MR56 Package 58 and probably earlier * Category: CWE-640 Weak Password Recovery Mechanism * Reported: 3/14/17 * Patched: 6/20/17 * Disclosed: 5/14/18 * Researcher: Carl Pearson * CVE: TBD * Reference: https://cp270.wordpress.com...
124
39.24
176
14
1,287
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_92098c30c615bf1a_67075f1d", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 103 ]
[ null ]
[ 12 ]
[ 40 ]
2024-11-18T20:58:00.429221+00:00
1,689,912,169,000
bb592c3be0af71a0ac3a8bcbe2d9a1f236ab7d59
3
{ "blob_id": "bb592c3be0af71a0ac3a8bcbe2d9a1f236ab7d59", "branch_name": "refs/heads/main", "committer_date": 1689912169000, "content_id": "a8cf27a16c79949ef73b1ea68d2004e07ddd9a4f", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "0ed62eec4eea9931f08f383cf657f3ca1a3ef4f9", "extension": "py"...
2.75
stackv2
#!/usr/bin/python3 # Utility to download biosamples metadata from EBI's API and store them into a folder in multiple files import json import requests from requests.packages.urllib3.exceptions import InsecureRequestWarning import os import arm_constants requests.packages.urllib3.disable_warnings(InsecureRequestWarni...
97
42.23
169
21
953
python
[{"finding_id": "codeql_py/request-without-cert-validation_67745286f61b3a25_371d18d1", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 28 ]
[ null ]
[ 16 ]
[ 89 ]
2024-11-18T20:58:19.614912+00:00
1,579,781,183,000
34bd24ea1473d008c6516e6736fc9f7e29199c4c
3
{ "blob_id": "34bd24ea1473d008c6516e6736fc9f7e29199c4c", "branch_name": "refs/heads/master", "committer_date": 1579781183000, "content_id": "14832a5fd26125b03774cdf5371260e7aa534b23", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "b2933c228900b157b4996ae0fccd20fecd9de07f", "extension": "p...
2.796875
stackv2
#!/usr/bin/env python3 import html import sys import urllib.request import requests from pathlib import Path import urllib3 import click from habu.lib.web_screenshot import web_screenshot urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning) @click.command() @click.option('-v', 'verbose', is_flag=Tru...
92
31.65
135
21
692
python
[{"finding_id": "codeql_py/request-without-cert-validation_c53d7657123a4749_6d6efb6b", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 66 ]
[ null ]
[ 28 ]
[ 71 ]
2024-11-18T20:58:39.955404+00:00
1,600,442,707,000
a2afd02b2cc4217969044cc353054a297d9c0034
3
{ "blob_id": "a2afd02b2cc4217969044cc353054a297d9c0034", "branch_name": "refs/heads/master", "committer_date": 1600442707000, "content_id": "f0c81f19ec97f694fe6a088f57bbe6ccd5f0c168", "detected_licenses": [ "MIT" ], "directory_id": "15990cc7458a926a44cdcb04bd6002dc9a713f00", "extension": "py", "fi...
2.578125
stackv2
#!/usr/bin/env python import json import requests hostname = 'r1.lab.local' user = 'wwt' password = 'WWTwwt1!' # Suppress SSL certificate verification errors # Using self-signed certificates in lab and therefore will otherwise report verbos # SSL validation errors requests.packages.urllib3.disable_warnings() res...
58
24.9
84
14
371
python
[{"finding_id": "codeql_py/request-without-cert-validation_05a6914f36a14807_be8511f5", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 48 ]
[ 50 ]
[ 16 ]
[ 6 ]
2024-11-18T20:58:41.271843+00:00
1,619,836,753,000
dce374a02828d8af1ba6044004309d101e6d69d0
2
{ "blob_id": "dce374a02828d8af1ba6044004309d101e6d69d0", "branch_name": "refs/heads/main", "committer_date": 1619836753000, "content_id": "ec91cbef97fa2b137e00ef5535b2b29889e8f60d", "detected_licenses": [ "MIT" ], "directory_id": "813c9ad598903d56465a835a2f044aa3cbb0b46a", "extension": "py", "file...
2.5
stackv2
from database.database import db from database.search import search import secrets import hashlib class Error(Exception): pass class EmailAlreadyUsedError(Error): pass def emailAvailable(email): return not usersCollection.where('email', email).exists() def createUser(name, password, email): '''Crea...
139
25.43
79
14
868
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_b021040ba4971a02_5e884316", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA3256) that is i...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA3256) that is insecure for password hashing, since it is not a computationally expensive hash function.", "[Sensitive data (password)](1) is used in a hashing algorithm (SHA3256) that is insecure for password hashing, since it is not a computation...
[ 41, 65 ]
[ null, null ]
[ 31, 31 ]
[ 64, 64 ]
2024-11-18T21:10:14.183482+00:00
1,571,612,630,000
78540b6aee18092b75acec021240dc1a022aa94d
2
{ "blob_id": "78540b6aee18092b75acec021240dc1a022aa94d", "branch_name": "refs/heads/master", "committer_date": 1571612630000, "content_id": "53e91a1d26002c567e9ce4dd69082804a2e55292", "detected_licenses": [ "MIT" ], "directory_id": "401b79c9b8f16da44352c5509390663ec2239ac5", "extension": "py", "fi...
2.3125
stackv2
import RPi.GPIO as GPIO import time import subprocess import datetime import pprint import os import led import gpsdata import gpstime import imudata BCM_led = 18 BCM_btn = 22 led.BCM_led = BCM_led GPIO.setmode(GPIO.BCM) GPIO.setwarnings(False) GPIO.setup(BCM_led, GPIO.OUT) GPIO.setup(BCM_btn, GPIO.IN, pull_up_down...
110
22.56
136
19
740
python
[{"finding_id": "codeql_py/overly-permissive-file_6906d3c9d6a4cc8e_7dcb7952", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world writable." ]
[ 73 ]
[ null ]
[ 5 ]
[ 30 ]
2024-11-18T21:10:16.137122+00:00
1,615,501,290,000
0ed51c531a82ffa6229f0a0f94f61ffbb50be046
2
{ "blob_id": "0ed51c531a82ffa6229f0a0f94f61ffbb50be046", "branch_name": "refs/heads/master", "committer_date": 1615501290000, "content_id": "3a66ef8bd39ec639992107d64c05de6118601c47", "detected_licenses": [ "MIT" ], "directory_id": "89fc945e93c9cfacaab0d3bac0071ee95c86f81d", "extension": "py", "fi...
2.3125
stackv2
import os import sys import re import time import logging import hashlib import threading from configparser import ConfigParser from pathlib import Path from contextlib import contextmanager from datetime import timedelta from typing import NamedTuple, List from docopt import docopt from natural.date import compress as...
466
30.46
99
20
3,300
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_db33a819b25a32c1_0a53ff27", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 102, 116 ]
[ null, null ]
[ 39, 39 ]
[ 47, 47 ]
2024-11-18T21:10:22.647236+00:00
1,570,351,910,000
0257cb53ca2d38ec5afd656c783d239d4c14383e
4
{ "blob_id": "0257cb53ca2d38ec5afd656c783d239d4c14383e", "branch_name": "refs/heads/master", "committer_date": 1570351910000, "content_id": "3e17832e403f125d11d41a7d0204d9bd0680d5a9", "detected_licenses": [ "MIT" ], "directory_id": "2d048d96bbd6ea4993e037852f3861e11e4377fa", "extension": "py", "fi...
3.5625
stackv2
#!/usr/bin/env python3.6 from user import User from credentials import Credentials from tkinter import * import pyfiglet ascii_banner = pyfiglet.figlet_format("- Password -\n ** Vault **") print(ascii_banner) # creating an account def create_user(fname,sname,password): """ function to create a new user acco...
194
24.5
153
19
991
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_43c3b30bacd402bc_79eb7941", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 163, 170 ]
[ null, null ]
[ 19, 27 ]
[ 46, 86 ]
2024-11-18T21:10:27.170579+00:00
1,617,692,228,000
c631e2829637863ba29cc99d46728b57eaffe71c
3
{ "blob_id": "c631e2829637863ba29cc99d46728b57eaffe71c", "branch_name": "refs/heads/master", "committer_date": 1617692228000, "content_id": "da04166f8bc3a9ddaf96e6115ee9fdd7cd93825c", "detected_licenses": [ "MIT" ], "directory_id": "7ca270b75dfae3de4d76fd9c4bbebcbb1e419532", "extension": "py", "fi...
2.5625
stackv2
#!/bin/python """ Pranas Grigaitis, 2019-2020 Dept. Modelling of Biological Processes, BioQuant/COS Heidelberg, Heidelberg University & Systems Biology Lab, AIMMS, VU Amsterdam pranas.grigaitis@bioquant.uni-heidelberg.de p.grigaitis@vu.nl """ """ Usage: python main.py <SBML_file> Requirements: - Python modules: pandas...
133
40.07
167
17
1,361
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_9d51da5252be8666_689f7fc4", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 75 ]
[ null ]
[ 33 ]
[ 47 ]
2024-11-18T21:10:38.453784+00:00
1,600,607,448,000
044629af7abc3828bbbda9858de3c45309df7ddf
3
{ "blob_id": "044629af7abc3828bbbda9858de3c45309df7ddf", "branch_name": "refs/heads/master", "committer_date": 1603710732000, "content_id": "f01753404d44eceb5d2c733733178db57beffd5f", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "10a33a3c3bb3258a14f72286009936eb38609a2b", "extension": "p...
2.71875
stackv2
""" Module used to provide controls and status of the BrickBatteryController via a web API """ import datetime import logging import math from collections import deque from ruamel.yaml import YAML from aiohttp import web LOGGER = logging.getLogger('battery_api') class BrickBatteryHTTPServer: """ An asynchron...
261
42.43
90
17
2,430
python
[{"finding_id": "codeql_py/log-injection_59db86acd4614cd9_97ed4339", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 85 ]
[ null ]
[ 21 ]
[ 89 ]
2024-11-18T21:10:59.325909+00:00
1,410,976,540,000
3057ecfbd1444174d0ec8534509e5b6e9094a067
2
{ "blob_id": "3057ecfbd1444174d0ec8534509e5b6e9094a067", "branch_name": "refs/heads/master", "committer_date": 1410976540000, "content_id": "d613712a316e3659421fda9331027fdcbf2b9ea7", "detected_licenses": [ "MIT" ], "directory_id": "c2abdf7ad833d50a83d5d31afbe687a1bff015df", "extension": "py", "fi...
2.484375
stackv2
import arrow import codecs import collections import json import os import sys from jinja2 import Template, Environment, FileSystemLoader CUR_DIR = os.path.dirname(os.path.realpath(__file__)) DATA_DIR = os.path.join(CUR_DIR, 'data') JSON_DIR = os.path.join(CUR_DIR, 'output/json') HTML_DIR = os.path.join(CUR_DIR, 'out...
232
35.1
99
13
2,085
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_66047f2ecf760cb2_4c1ed6f5", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 16 ]
[ null ]
[ 7 ]
[ 20 ]
2024-11-18T21:10:59.425800+00:00
1,680,032,345,000
a9e2627a3d52d58d9ecf33f6dc73b4d3839842d8
3
{ "blob_id": "a9e2627a3d52d58d9ecf33f6dc73b4d3839842d8", "branch_name": "refs/heads/main", "committer_date": 1680033272000, "content_id": "2cbacd3f9cebefc0b99b347d1fb40214a7c12aa6", "detected_licenses": [ "Apache-2.0" ], "directory_id": "3f5f2bad9f6ab4acd56c4e2929cee1af4a242e57", "extension": "py", ...
2.640625
stackv2
# # _author_ = Mahendran P <Mahendran_P@Dell.com> # # Copyright (c) 2022 Dell EMC Corporation # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2...
232
47.21
164
22
2,264
python
[{"finding_id": "codeql_py/request-without-cert-validation_795b0140c332a19d_74f06340", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 110, 134 ]
[ 112, 136 ]
[ 24, 44 ]
[ 54, 71 ]
2024-11-18T21:11:08.786234+00:00
1,618,061,407,000
fd07b4a3edf691d8b13310935c83766a5f6ab542
3
{ "blob_id": "fd07b4a3edf691d8b13310935c83766a5f6ab542", "branch_name": "refs/heads/master", "committer_date": 1618061407000, "content_id": "2fd2742a78fb1fdecaed8d7840f7e656275abb81", "detected_licenses": [ "MIT" ], "directory_id": "8b83dd273e7ee6c68356d6f85cc4279b4990ac7d", "extension": "py", "fi...
2.84375
stackv2
import logging import re import requests # TODO: Add throttling for youtube API reque class YoutubeApiException(Exception): "Expcetion for when we fail to deal with response from the Youtube API." pass def form_get_request_to_list_playlists_of_channel(channel_id, api_key, page_token='', max_results='50'):...
219
36.21
145
20
1,771
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1b571ae563954d12_9504f386", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
4
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive dat...
[ 57, 103, 139, 166 ]
[ null, null, null, null ]
[ 13, 13, 18, 18 ]
[ 117, 114, 112, 109 ]
2024-11-18T21:11:13.219233+00:00
1,573,825,104,000
f6adde0974dfc09fda8d30a932c88ae4501225ce
2
{ "blob_id": "f6adde0974dfc09fda8d30a932c88ae4501225ce", "branch_name": "refs/heads/master", "committer_date": 1573825104000, "content_id": "bb15b1db6dabee8a5081e2e290bad40837436d6d", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "9191b2f4aa6dec912beb7771110649dd8cd101bb", "extension": "p...
2.3125
stackv2
import mysql.connector from mysql.connector import errors import logging log = logging.getLogger(__name__) from ..agent_core import IAgentCore class Logic(IAgentCore): def __init__(self, options): self.host = options.get('host') self.port = int(options.get('port', 3306)) self.user = option...
43
40.35
152
14
361
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_628389dc5467e062_f0a1413d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 22 ]
[ null ]
[ 23 ]
[ 70 ]
2024-11-18T19:03:27.555430+00:00
1,564,648,799,000
d826c072fcfc467ec5b46faced6955bb2789a882
3
{ "blob_id": "d826c072fcfc467ec5b46faced6955bb2789a882", "branch_name": "refs/heads/master", "committer_date": 1564648799000, "content_id": "fec0e50e0764333afdd3e7772cac331fd6b2fe85", "detected_licenses": [ "Apache-2.0" ], "directory_id": "ed54290846b5c7f9556aacca09675550f0af4c48", "extension": "py"...
2.5625
stackv2
import os from flask import render_template,Flask,abort import json from flask_sqlalchemy import SQLAlchemy from sqlalchemy import Column, Integer, String,Text from sqlalchemy import create_engine from pymongo import MongoClient app = Flask(__name__) app.config['SQLALCHEMY_DATABASE_URI'] = 'mysql://root:@localhost/te...
115
27.37
162
16
781
python
[{"finding_id": "codeql_py/sql-injection_aa2ccc9ae16985dc_e3ca735e", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown...
1
true
[ "CWE-089" ]
[ "py/sql-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This SQL query depends on a [user-provided value](1)." ]
[ 91 ]
[ null ]
[ 28 ]
[ 151 ]
2024-11-18T19:28:36.893763+00:00
1,675,072,007,000
266b84a6aa4c97040b765856c94a97172eb77aa6
3
{ "blob_id": "266b84a6aa4c97040b765856c94a97172eb77aa6", "branch_name": "refs/heads/master", "committer_date": 1675072007000, "content_id": "bc40eeba135cbf5300fbb99d2fcc22563890eaf5", "detected_licenses": [ "MIT" ], "directory_id": "9bd49e3373a88a95b82df6278cc4d4b0ef5fbc1d", "extension": "py", "fi...
3.4375
stackv2
import tkinter as tk class LoginApp(tk.Tk): def __init__(self): super().__init__() self.username = tk.Entry(self) self.password = tk.Entry(self, show="*") self.login_btn = tk.Button(self, text="Log in", command=self.print_login) self.clear_...
28
31.82
67
14
192
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_081aa821a18be195_d6b8972e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 19 ]
[ null ]
[ 15 ]
[ 57 ]
2024-11-18T19:28:59.071537+00:00
1,566,302,959,000
0d41c6580db8b3da9fce419daaadb4411f9c261d
2
{ "blob_id": "0d41c6580db8b3da9fce419daaadb4411f9c261d", "branch_name": "refs/heads/master", "committer_date": 1566302959000, "content_id": "a79a78b4977d8539c6e8ceb8b0626413ca31284c", "detected_licenses": [ "MIT" ], "directory_id": "5b63e07ce466cae1855d7989f9effc1f680ba2f8", "extension": "py", "fi...
2.390625
stackv2
#!/usr/bin/python3 import os def set_proxy(host_ip, host_port, auth_choice, pc_username, username, password ): check = os.path.isdir('/etc/dnf') if check == True : file_temp = open('/etc/dnf/dnf.conf_temp', 'w+') file_ob = open('/etc/dnf/dnf.conf', 'r') for line in file_ob.readlines():...
38
37.68
88
15
350
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_d575661585bb716c_21016c39", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 18 ]
[ null ]
[ 33 ]
[ 61 ]
2024-11-18T19:39:57.060846+00:00
1,633,700,981,000
9068d8d06bf77347a3bcb2c86c7c58bcb0c9ebda
3
{ "blob_id": "9068d8d06bf77347a3bcb2c86c7c58bcb0c9ebda", "branch_name": "refs/heads/master", "committer_date": 1633700981000, "content_id": "f9bf4261f839f6d253c2ef0c2ccc6523bd372c32", "detected_licenses": [ "MIT" ], "directory_id": "707f9912b547c70955e73fa310b180c9302c4a81", "extension": "py", "fi...
2.65625
stackv2
# coding=utf-8 from os import path import random from jinja2 import Environment import datetime def datetimeformat(value, format='%d/%m/%Y %H:%M'): """ Jinja filter used to format date :param value: :param format: :return: """ return value.strftime(format) JINJA_ENV = Environment() JINJA...
102
35.73
119
19
817
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_d25521ec1a540207_c0e6e9b4", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 18 ]
[ null ]
[ 13 ]
[ 26 ]