added
stringlengths
32
32
created
int64
1,236B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.03
source
stringclasses
1 value
text
stringlengths
330
19.3k
num_lines
int64
16
648
avg_line_length
float64
15.5
59.3
max_line_length
int64
37
179
ast_depth
int64
8
38
length
int64
102
3.79k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.11k
276k
sast_codeql_findings_count
int64
1
33
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
33
rule_ids
listlengths
1
33
confidences
listlengths
1
33
severities
listlengths
1
33
messages
listlengths
1
33
line_starts
listlengths
1
33
line_ends
listlengths
1
33
column_starts
listlengths
1
33
column_ends
listlengths
1
33
2024-11-19T00:44:26.148726+00:00
1,565,377,838,000
cbaa271485d15efa74c8fd4ed67a55949faf765b
3
{ "blob_id": "cbaa271485d15efa74c8fd4ed67a55949faf765b", "branch_name": "refs/heads/master", "committer_date": 1565377838000, "content_id": "1baf97b0b581515e2ffac3922d55fd995b031d1c", "detected_licenses": [ "MIT" ], "directory_id": "93da24d7b83ad02cfd9d19f80ec82230e4bb0484", "extension": "py", "fi...
2.828125
stackv2
from datetime import datetime import googlemaps import os.path import re import xlwt import yaml # --- # Init # --- book = xlwt.Workbook(encoding="utf-8") sheet = book.add_sheet("Kilometers") file_name_key = "key.txt" file_name_addresses = "addresses.yaml" file_name_distances = "distances.yaml" file_name_data = "dat...
236
27.18
149
24
1,628
python
[{"finding_id": "codeql_py/redos_aabda4ffe66401dd_b9327e5b", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '0'.", "remediati...
2
true
[ "CWE-1333", "CWE-1333" ]
[ "py/redos", "py/redos" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '0'.", "This part of the regular expression may cause exponential backtracking on strings starting with '>' and containing many repetitions of '0'." ]
[ 86, 86 ]
[ null, null ]
[ 29, 71 ]
[ 43, 85 ]
2024-11-19T00:44:30.776272+00:00
1,590,606,484,000
96a1b6e56d22fb76d7ebb4a7c1392282c7209e5e
2
{ "blob_id": "96a1b6e56d22fb76d7ebb4a7c1392282c7209e5e", "branch_name": "refs/heads/master", "committer_date": 1590606484000, "content_id": "555da7d09d627869152af6343d59e4f4d8c278d7", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "6ec33af027d34f3472add0d84e432aeaa0d54c7f", "extension": "p...
2.390625
stackv2
#! /usr/bin/env python # -*- coding: utf-8 -*- # S.D.G """ :mod:`lugito.connectors.irc` ====================================== Define an irc connector class .. currentmodule:: lugito.connectors.irc """ # Imports import ssl import http import socket import logging import threading import phabricator import lugito fr...
262
30.65
93
24
1,919
python
[{"finding_id": "codeql_py/insecure-default-protocol_c9a1e1e35740d8a7_bb18d76b", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in...
1
true
[ "CWE-327" ]
[ "py/insecure-default-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used." ]
[ 66 ]
[ 67 ]
[ 21 ]
[ 63 ]
2024-11-18T23:05:23.497767+00:00
1,560,562,820,000
b6f32e74b9a279f414e66ab048c7c67366185bc5
3
{ "blob_id": "b6f32e74b9a279f414e66ab048c7c67366185bc5", "branch_name": "refs/heads/master", "committer_date": 1560562820000, "content_id": "0ea0e2ab496dc9fa36d554994e3df809adc1dc3e", "detected_licenses": [ "MIT" ], "directory_id": "0eb0c08093e61aae6751fc8de2a49e67730a00f5", "extension": "py", "fi...
3.109375
stackv2
#!/usr/bin/env python ######################################################################################### # NAME: pwnage.py # # Website: https://github.com/zloether/pwnage # # Description: Checks passwords against the Have I Been Pwned database to see if # the password has been compromised. # htt...
293
34.95
121
22
1,954
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_764dd41073f033f3_9fe195c0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
5
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-327" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text.", "This expression logs [sensitive data (p...
[ 132, 149, 207, 214, 128 ]
[ null, null, null, null, null ]
[ 15, 19, 23, 15, 24 ]
[ 55, 83, 67, 23, 47 ]
2024-11-18T23:05:32.834950+00:00
1,555,023,187,000
fec8598318a392e5bc448f17f62d16b1eb9b59d2
3
{ "blob_id": "fec8598318a392e5bc448f17f62d16b1eb9b59d2", "branch_name": "refs/heads/master", "committer_date": 1555023187000, "content_id": "b070769a5439c87ba41bc96d6c43cff2c7c80eca", "detected_licenses": [ "MIT" ], "directory_id": "2cd4d6dd4935447be37050d78578799759ccf98e", "extension": "py", "fi...
2.5625
stackv2
import time from http.server import BaseHTTPRequestHandler, HTTPServer import urllib.parse as urlparse import re import logging import argparse import googletrans import models import regexps logger = logging.getLogger(__name__) class ServerState: def __init__(self, model, seconds_per_request: float): s...
138
31.78
114
16
1,045
python
[{"finding_id": "codeql_py/log-injection_9bf554eb67093e30_6fd88e4e", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
2
true
[ "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](1)." ]
[ 57, 72 ]
[ null, null ]
[ 25, 21 ]
[ 62, 45 ]
2024-11-18T23:05:46.881723+00:00
1,633,686,232,000
680ae4e6757ec839888354c2204cc9e37e08c881
2
{ "blob_id": "680ae4e6757ec839888354c2204cc9e37e08c881", "branch_name": "refs/heads/main", "committer_date": 1633686232000, "content_id": "c43cc5eee1458a35a056ac19e9c7acc2df4714b4", "detected_licenses": [ "MIT" ], "directory_id": "58b838dfa2e130d6890098f4adc25ca5755a5e2f", "extension": "py", "file...
2.484375
stackv2
# !/usr/bin/env python # -*- coding: utf-8 -*- # @Time : 2021/10/8 13:03 # @Author : AsiHacker # @File : main # @Software: PyCharm # @notice : True masters always have the heart of an apprentice. import os import time import psutil from flask import Flask, jsonify from help import check_proxy_ok app = Flask(...
81
32.27
179
15
925
python
[{"finding_id": "codeql_py/command-line-injection_a298dce3ff3ce1e3_b2738ffc", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).\nThis command line depends on a [u...
3
true
[ "CWE-078", "CWE-078", "CWE-215" ]
[ "py/command-line-injection", "py/command-line-injection", "py/flask-debug" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This command line depends on a [user-provided value](1).\nThis command line depends on a [user-provided value](2).", "This command line depends on a [user-provided value](1).\nThis command line depends on a [user-provided value](2).", "A Flask app appears to be run in debug mode. This may allow an attacker to ...
[ 41, 70, 81 ]
[ null, null, null ]
[ 15, 15, 5 ]
[ 18, 18, 52 ]
2024-11-18T23:42:54.785049+00:00
1,633,978,605,000
a70d83196df3a017e92586610fdafea1862da9c4
3
{ "blob_id": "a70d83196df3a017e92586610fdafea1862da9c4", "branch_name": "refs/heads/main", "committer_date": 1633978605000, "content_id": "1e24a4bcea7210feea2e64a1a837cdebd8fae380", "detected_licenses": [ "MIT" ], "directory_id": "bed6a24c88b61dd1d6b8cc45c7963d54789c11f8", "extension": "py", "file...
2.578125
stackv2
from flask import Flask, render_template, request, Response, redirect, url_for import sqlalchemy from werkzeug.exceptions import abort from . import sql # This global variable is declared with a value of `None`, instead of calling # `init_connection_engine()` immediately, to simplify testing. In general, it # is saf...
120
29.67
129
17
853
python
[{"finding_id": "codeql_py/sql-injection_01decbcd5cc1ce09_ab9996bb", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown...
1
true
[ "CWE-089" ]
[ "py/sql-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This SQL query depends on a [user-provided value](1)." ]
[ 95 ]
[ null ]
[ 13 ]
[ 98 ]
2024-11-18T23:10:59.657913+00:00
1,625,432,181,000
07b0d2fac35fffb9cd7bd0042f771fb3c1659e6e
3
{ "blob_id": "07b0d2fac35fffb9cd7bd0042f771fb3c1659e6e", "branch_name": "refs/heads/main", "committer_date": 1625432181000, "content_id": "7c1d1f684ebde366213f2fcfe65f8d73fe6633ab", "detected_licenses": [ "MIT" ], "directory_id": "dd60e4b7eac52e0f69802c7116a6814698046e00", "extension": "py", "file...
2.65625
stackv2
# Author: Igor Ferreira # License: MIT # Version: 2.0.0 # Description: WiFi Manager for ESP8266 and ESP32 using MicroPython. import machine import network import usocket import ure import utime class WifiManager: def __init__(self, ssid = 'WifiManager', password = 'wifimanager'): self.wlan_sta = network...
234
37.21
151
24
1,955
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_84705af7b849c051_a242292e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 118 ]
[ null ]
[ 64 ]
[ 80 ]
2024-11-19T01:21:37.252335+00:00
1,573,728,393,000
47f2a38369e61b2314c6b3a17578061350660077
3
{ "blob_id": "47f2a38369e61b2314c6b3a17578061350660077", "branch_name": "refs/heads/master", "committer_date": 1573728393000, "content_id": "f20933936acd04644a2e8bdf215092f91f569a3c", "detected_licenses": [ "MIT" ], "directory_id": "1a65a7e690e57d7b30f125dbfb872ffb48eadf1b", "extension": "py", "fi...
2.5625
stackv2
from multiprocessing.pool import ThreadPool from lang import languages from flask import Flask, jsonify, request import os from subprocess import run, PIPE, check_output import time from subprocess import Popen, PIPE import time from multiprocessing.pool import ThreadPool from multiprocessing import Pool import os impo...
129
30.96
97
18
963
python
[{"finding_id": "codeql_py/path-injection_5acc66d6e4d4abf4_2af91ac7", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
3
true
[ "CWE-022", "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 64, 69, 109 ]
[ 65, 70, null ]
[ 21, 19, 15 ]
[ 56, 79, 47 ]
2024-11-19T01:21:41.178372+00:00
1,594,850,037,000
9d0f5b376d561827b1106efb8daa7bcb779614b2
4
{ "blob_id": "9d0f5b376d561827b1106efb8daa7bcb779614b2", "branch_name": "refs/heads/master", "committer_date": 1594850037000, "content_id": "964bdbac26527fddbcdd342eed660765e88321d3", "detected_licenses": [ "MIT" ], "directory_id": "0e61110cb32e384bcb1919602f198cc719f38d5d", "extension": "py", "fi...
3.59375
stackv2
################################### # Such seventeen # # Much prime # # Very Doge # ################################### # By C Shi <icydoge@gmail.com> # ################################### import hashlib GRID_SIZE = 4 DOOR_DIRECTIONS = {0: 'U', 1: 'D', 2: '...
84
39.39
131
14
907
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c12f51ba111e9d98_b9e9ee14", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
3
true
[ "CWE-312", "CWE-312", "CWE-327" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 50, 84, 65 ]
[ null, null, null ]
[ 15, 7, 9 ]
[ 62, 64, 37 ]
2024-11-19T01:21:45.604931+00:00
1,646,140,600,000
279aa59692d9a22ee50f8003dcbd2f3170479bf3
4
{ "blob_id": "279aa59692d9a22ee50f8003dcbd2f3170479bf3", "branch_name": "refs/heads/master", "committer_date": 1646140600000, "content_id": "0e96d9590260937b0a6ee9c66f579267f9ec0a43", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "4dd07a2ec8719d809f3a3f6ceeff00fff658cb34", "extension": "p...
4.25
stackv2
import datetime class Employee: """ Controls the wage of any employee """ def __init__(self, name, fixed_salary): """ constructor - executing when creating a new Employee object :param name : name of the Employee :param fixed_salary : the monthly fixed salary """ self....
102
33.27
96
15
802
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fa7c009d6c4dd7be_92eefcba", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
5
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (p...
[ 26, 74, 86, 87, 91 ]
[ null, null, null, null, null ]
[ 15, 20, 8, 7, 8 ]
[ 66, 76, 70, 69, 70 ]
2024-11-19T01:21:46.712159+00:00
1,549,362,399,000
a3836bb3d48713a44939eb113eef3c2003a208d2
3
{ "blob_id": "a3836bb3d48713a44939eb113eef3c2003a208d2", "branch_name": "refs/heads/master", "committer_date": 1549362399000, "content_id": "e57859b472ae05630358efb235025d920d6b9bd6", "detected_licenses": [ "MIT" ], "directory_id": "b56b31a2e4d9bcb8d98dd862385507cc60a0817e", "extension": "py", "fi...
2.9375
stackv2
import os import shutil import tarfile import argparse from datasets.OnlineDataset import OnlineDataset class PascalVocDataset(OnlineDataset): """ This dataset contains the Pascal VOC 2006 challenge database which consists over 2618 images of ten categories from http://host.robots.ox.ac.uk/pascal/VOC/d...
61
38.97
117
13
501
python
[{"finding_id": "codeql_py/tarslip_11bba16e4f6a20c2_1a03eb8c", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 39 ]
[ null ]
[ 9 ]
[ 12 ]
2024-11-19T01:21:51.525850+00:00
1,545,841,377,000
a9d5e7c74f9760b6f28ce033621c11a7955acb26
3
{ "blob_id": "a9d5e7c74f9760b6f28ce033621c11a7955acb26", "branch_name": "refs/heads/master", "committer_date": 1545841377000, "content_id": "6388e1bb7aa54267ef2a2a179c563b12dec2f4ca", "detected_licenses": [ "Unlicense" ], "directory_id": "c4d75dbf784f420bc8961b466207a0b5f699eda1", "extension": "py",...
2.765625
stackv2
import hashlib import argon2 import sys from time import sleep import subprocess import platform import json def sha000(password, circles = 1, type = 'argon2'): ''' Some defence from rainbow tables. Argon2 is preferable. ''' if type == 'argon2': arg = argon2.low_level.hash_secret( password.encode(), hashli...
74
22.58
87
21
507
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_eaa0a19c30fabc61_6cc57ad2", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.", "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computational...
[ 16, 25 ]
[ null, null ]
[ 39, 33 ]
[ 56, 50 ]
2024-11-19T00:11:40.491936+00:00
1,611,879,518,000
029d46738a1b5947014cc3e9d23bbbb743b93663
2
{ "blob_id": "029d46738a1b5947014cc3e9d23bbbb743b93663", "branch_name": "refs/heads/main", "committer_date": 1611879518000, "content_id": "4442a4aba5531dbf38328fae5464ef1e9b75479f", "detected_licenses": [ "MIT" ], "directory_id": "c5f7f61ceeac043753a4c04c4b5f87cbe49f2a93", "extension": "py", "file...
2.359375
stackv2
from flask import Flask from flask import render_template, redirect, request import requests from decouple import config app = Flask(__name__) links = { "BR1": "br1.api.riotgames.com", "EUN1": "eun1.api.riotgames.com", "EUW1": "euw1.api.riotgames.com", "JP1": "jp1.api.riotgames.com", "KR": "kr.api....
70
29.14
78
16
613
python
[{"finding_id": "codeql_py/flask-debug_b7f6e0d3c8f940fc_b7bcf180", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-918", "CWE-918" ]
[ "py/flask-debug", "py/partial-ssrf", "py/partial-ssrf" ]
[ "HIGH", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Part of the URL of this request depends on a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 70, 51, 54 ]
[ null, null, null ]
[ 5, 9, 16 ]
[ 35, 43, 50 ]
2024-11-19T00:11:51.348087+00:00
1,561,109,298,000
fbd79b0cde52ab4e3f698e0dbf14942207d09384
2
{ "blob_id": "fbd79b0cde52ab4e3f698e0dbf14942207d09384", "branch_name": "refs/heads/master", "committer_date": 1561109298000, "content_id": "9a70af9e131e06ec4a1fb1599386effb6482bf10", "detected_licenses": [ "MIT" ], "directory_id": "974a6dea92d274b5c19de6c3bdcaef3ff0cfdb09", "extension": "py", "fi...
2.34375
stackv2
#!/usr/bin/python import os import socket import re import sys import subprocess import datetime import getpass def handle_mssql(username, password): try: install_package("pyodbc") import pyodbc pyodbc.connect("UID=" + username + ";PWD=" + password) # TODO fetch native driver and f...
199
30.33
153
19
1,500
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_3f374cba031eeb85_f7460a74", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 185 ]
[ null ]
[ 12 ]
[ 35 ]
2024-11-19T01:02:20.363482+00:00
1,608,694,848,000
010deb391b77119f011e99971161909c59020203
2
{ "blob_id": "010deb391b77119f011e99971161909c59020203", "branch_name": "refs/heads/master", "committer_date": 1608694848000, "content_id": "99bcca165687915ffec44ee34c97063a85f51aa9", "detected_licenses": [ "MIT" ], "directory_id": "8dc7902014a01cce4220cde2b7bd5dd8044251b4", "extension": "py", "fi...
2.46875
stackv2
from flask import render_template, flash, redirect, url_for, request, g, jsonify from flask_login import current_user, login_user, login_required, logout_user from app import app, db from app.models import User, Station from app.forms import LoginForm, RegistrationForm, EditProfileForm from werkzeug.urls import url_par...
107
36.05
116
16
851
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_472e9d48033471e9_34b78a67", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
4
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-918" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/partial-ssrf" ]
[ "HIGH", "HIGH", "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 84, 94, 96, 95 ]
[ null, null, null, null ]
[ 15, 15, 15, 20 ]
[ 23, 20, 23, 39 ]
2024-11-19T01:02:22.899081+00:00
1,601,519,647,000
6dc97cc548b04c73d76de3844a85a1e232376289
2
{ "blob_id": "6dc97cc548b04c73d76de3844a85a1e232376289", "branch_name": "refs/heads/master", "committer_date": 1601519647000, "content_id": "fc26b334dbc08ae1181cf0d49a51e0521d4f157c", "detected_licenses": [ "MIT" ], "directory_id": "41d51ae4bf8f487a34891ea76d9f71eded069191", "extension": "py", "fi...
2.34375
stackv2
import os import secrets from flask import render_template, url_for, flash, redirect, abort,request from . import main from .forms import RegistrationForm, LoginForm, UpdateAccountForm, PostForm, CommentsForm from ..models import User, Post, Comment,db from flask_login import login_user, current_user, logout_user, logi...
171
34.58
110
16
1,340
python
[{"finding_id": "codeql_py/url-redirection_d5a4ec35f18c7605_ac45bb72", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 48 ]
[ null ]
[ 29 ]
[ 38 ]
2024-11-19T00:13:42.673308+00:00
1,479,856,312,000
349b4a2bd4a44ee705161711cea658db7552c1dc
3
{ "blob_id": "349b4a2bd4a44ee705161711cea658db7552c1dc", "branch_name": "refs/heads/master", "committer_date": 1479856312000, "content_id": "bef1f3df4c545f0c9407bfc7d1bcd258f8434447", "detected_licenses": [ "MIT" ], "directory_id": "7469f1dbafc9a0d8d6f9e7788f95ec3bec0d44a1", "extension": "py", "fi...
2.890625
stackv2
import json import urllib2 import os HEADER = '\033[95m' OKBLUE = '\033[94m' OKGREEN = '\033[92m' WARNING = '\033[93m' FAIL = '\033[91m' ENDC = '\033[0m' BOLD = '\033[1m' UNDERLINE = '\033[4m' WHITE = '\033[97m' inputURL = "" version = "2.0" release_date = "July 26th, 2016" path = "/Users/ianthompson/Music/youtube-dl...
127
23.64
125
16
865
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_240ec812b2ce285d_c48c1120", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [http://www.youtube.com](1) may be at an arbitrary posi...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "The string [http://www.youtube.com](1) may be at an arbitrary position in the sanitized URL.", "The string [https://www.youtube.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 94, 94 ]
[ null, null ]
[ 8, 48 ]
[ 44, 85 ]
2024-11-19T01:51:56.345982+00:00
1,623,089,516,000
896f3d818c3fb3325087e396ba37186b45896e42
3
{ "blob_id": "896f3d818c3fb3325087e396ba37186b45896e42", "branch_name": "refs/heads/master", "committer_date": 1623089516000, "content_id": "bddeef845bcbfa482dc03a6b6100d4ff7c83dc4b", "detected_licenses": [ "MIT" ], "directory_id": "a27976a187ab51d08b536f98140fef316092a049", "extension": "py", "fi...
2.515625
stackv2
import os from pathlib import Path from typing import Optional from pydantic import BaseSettings as Settings, conint from pydantic import EmailStr, validator, DirectoryPath from jinja2 import Environment, FileSystemLoader from fastapi_mail.errors import TemplateFolderDoesNotExist class ConnectionConfig(Settings): ...
55
30.45
97
14
391
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_49ac79cc65af4db5_b5195331", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 44 ]
[ null ]
[ 24 ]
[ 68 ]
2024-11-19T00:55:24.603572+00:00
1,552,942,513,000
e55b2e9f5e5c427d2c24693db65f87509deda3e7
3
{ "blob_id": "e55b2e9f5e5c427d2c24693db65f87509deda3e7", "branch_name": "refs/heads/master", "committer_date": 1552942513000, "content_id": "111889107f93ff0e4f6502988232c61385b75f59", "detected_licenses": [ "MIT" ], "directory_id": "60bdd51c36855d4c5ddcefaaa73859c0b8347f0d", "extension": "py", "fi...
2.59375
stackv2
# Thanks [https://github.com/jesparza/peepdf] # Thanks [https://stackoverflow.com/questions/10220497/extract-javascript-from-malicious-pdf] # Thanks [https://stackoverflow.com/questions/29342542/how-can-i-extract-a-javascript-from-a-pdf-file-with-a-command-line-tool] # Version 1.0 # Date 03.2019 # USAGE # python extrac...
47
29.06
127
14
469
python
[{"finding_id": "codeql_py/overly-large-range_a57bafeb259db9ff_d87cada0", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 42 ]
[ null ]
[ 58 ]
[ 61 ]
2024-11-19T00:55:29.950529+00:00
1,389,236,815,000
017e7864c91afb14c44df5dc64d49c563bd19c27
3
{ "blob_id": "017e7864c91afb14c44df5dc64d49c563bd19c27", "branch_name": "refs/heads/master", "committer_date": 1389236815000, "content_id": "fba3c5d836d6a5d012255e13dc8fcfdf6ba063c5", "detected_licenses": [ "Apache-2.0" ], "directory_id": "724f4a8aab0f3853b7cbe792ef5050d9299bc73f", "extension": "py"...
2.90625
stackv2
"""Utility functions Including functions of get/getbulk/walk/set of snmp for three versions """ import imp import re import logging def load_module(mod_name, path, host=None, credential=None): """ Load a module instance. :param str mod_name: module name :param str path: directory of the module :pa...
160
29.06
79
17
1,109
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_3a14055f7494ae4e_611429f4", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 46 ]
[ null ]
[ 9 ]
[ 69 ]
2024-11-19T01:39:55.548213+00:00
1,586,696,969,000
ade8edbb71eb7325971ab404cc848eeb8d5988e1
2
{ "blob_id": "ade8edbb71eb7325971ab404cc848eeb8d5988e1", "branch_name": "refs/heads/master", "committer_date": 1586696969000, "content_id": "c49d7c026054a433d0b27ea65a3e4a7ad9f29b83", "detected_licenses": [ "Apache-2.0" ], "directory_id": "8cced97a617f980cca7b5e1342ac15e2ffbf8d33", "extension": "py"...
2.3125
stackv2
from .auth import Auth import json import requests class Admin(): def __init__(self, host, port=4002): self._host = host self._port = port self._base_path = 'http://{0}/api/v2' def get_user_list(self, token, host=None, port=None): if host is None: base_path...
321
36.97
98
14
2,771
python
[{"finding_id": "codeql_py/request-without-cert-validation_27806ae2ce0d9d2c_94199951", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
15
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation"...
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 21, 41, 62, 83, 104, 125, 146, 166, 186, 207, 228, 248, 268, 289, 310 ]
[ null, null, null, null, null, null, null, null, null, null, null, null, null, null, null ]
[ 17, 17, 17, 17, 17, 17, 17, 17, 17, 17, 17, 17, 17, 17, 17 ]
[ 97, 97, 97, 97, 97, 97, 97, 97, 97, 97, 97, 97, 97, 97, 97 ]
2024-11-19T01:40:02.598274+00:00
1,599,013,545,000
55c2cae7507deeb3cddbef87d492bd4c61173d1f
2
{ "blob_id": "55c2cae7507deeb3cddbef87d492bd4c61173d1f", "branch_name": "refs/heads/master", "committer_date": 1599013545000, "content_id": "3af8dc2109e960b5041324c76f6bf952f64fe5b1", "detected_licenses": [ "MIT" ], "directory_id": "a7ad710f17572060bdd660e37899b3640f4938d5", "extension": "py", "fi...
2.453125
stackv2
import getopt import sys import uuid import pwd import jinja2 import random import os import string def randomString(stringLength=16): letters = string.ascii_lowercase return ''.join(random.choice(letters) for i in range(stringLength)) def read_conf(f): ret = {} f = open(f, "r") lines = f.readline...
158
27.21
92
17
1,127
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_050bcbfc31511ce5_16f783b5", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
4
true
[ "CWE-079", "CWE-079", "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false", "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially...
[ 126, 135, 144, 114 ]
[ null, null, null, null ]
[ 20, 20, 20, 20 ]
[ 48, 48, 48, 48 ]
2024-11-18T23:43:31.401427+00:00
1,503,229,658,000
939afc2e06896bca60579ac1997884d157b2e72d
2
{ "blob_id": "939afc2e06896bca60579ac1997884d157b2e72d", "branch_name": "refs/heads/master", "committer_date": 1503229658000, "content_id": "e4493e2d07fa78e072fa3ed3e23d5e33556e3fac", "detected_licenses": [ "MIT" ], "directory_id": "b0449aaa4e90df7d5e0b8e7146f0305b71e78433", "extension": "py", "fi...
2.40625
stackv2
import time import hmac import hashlib import urllib import requests class Connection: def __init__(self, api_key='', api_secret=''): self.api_key = api_key self.api_secret = api_secret def __call__(self, command, args={}): nonce = str(int(time.time()*1000)) method_set = 'accou...
19
36.84
102
15
177
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_12a729cb4048b35e_4509feba", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 18 ]
[ null ]
[ 54 ]
[ 74 ]
2024-11-19T00:32:58.146498+00:00
1,614,525,190,000
077389799ce1441e08f94fb5dcc1f13a15340333
4
{ "blob_id": "077389799ce1441e08f94fb5dcc1f13a15340333", "branch_name": "refs/heads/master", "committer_date": 1614525190000, "content_id": "35815a796470cf70e8a18f3e2d7284f078aff172", "detected_licenses": [ "MIT" ], "directory_id": "208d1f3b5672785f896d0ebddb3716d671aadfda", "extension": "py", "fi...
3.8125
stackv2
import string import random pass_string = "" pass_length = None pass_count = None max_pass_length = 60 max_pass_count = 30 lowercase = None uppercase = None digits = None pass_types = None add_space = "-------\n" # ask user the length of the password while True: try: # ask the user about password length ...
60
32.23
138
16
437
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ddd5c4d33f68b082_dcbbcc8a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 56 ]
[ null ]
[ 11 ]
[ 51 ]
2024-11-19T00:25:36.816111+00:00
1,552,183,417,000
84900912484edfd9b964d72f9ef4a4f65e3cea29
3
{ "blob_id": "84900912484edfd9b964d72f9ef4a4f65e3cea29", "branch_name": "refs/heads/master", "committer_date": 1552183417000, "content_id": "189c5b3c2c7859084e775daf3d4de7deef4fab76", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "fd132ba890e6f8b98d2139e366f6687fe70b7171", "extension": "p...
2.71875
stackv2
import logging import os import tarfile import zipfile from prvsnlib.context import context from prvsnlib.utils.file import mkdir_p, chown class UnarchiveAction: EXTRACT = 'extract' def unarchive(*args, **kwargs): if args[0].endswith('.zip'): unzip(*args, **kwargs) elif args[0].endswith('.tar.g...
60
24.02
77
14
347
python
[{"finding_id": "codeql_py/tarslip_d598ea1a01f4509b_6dffb2f5", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 55 ]
[ null ]
[ 13 ]
[ 16 ]
2024-11-19T01:02:54.896851+00:00
1,586,354,446,000
8d42c173b3608920a4682737a2184f9f0d8b83c7
3
{ "blob_id": "8d42c173b3608920a4682737a2184f9f0d8b83c7", "branch_name": "refs/heads/master", "committer_date": 1586354446000, "content_id": "e0269e339485cc11d01085458123829d1220c645", "detected_licenses": [ "MIT" ], "directory_id": "79301a8c17f46924c45838c4c2496e7e898d9a5a", "extension": "py", "fi...
2.53125
stackv2
import requests from requests.auth import HTTPBasicAuth from dnac_config import DNAC_IP, DNAC_PORT, DNAC_USER, DNAC_PASSWORD from DNA_Token import get_auth_token def get_devices(): token = get_auth_token() # Get a Token url = "https://10.1.100.10/api/v1/network-device" #Network Device endpoint hdr = {'x-auth-token...
20
35.85
86
9
185
python
[{"finding_id": "codeql_py/request-without-cert-validation_ccdbaef0c3e461a2_59a21310", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 10 ]
[ null ]
[ 9 ]
[ 53 ]
2024-11-19T00:16:11.187560+00:00
1,611,746,674,000
6c2461712d05c7e82a7b45801236b7f6f55068e4
3
{ "blob_id": "6c2461712d05c7e82a7b45801236b7f6f55068e4", "branch_name": "refs/heads/master", "committer_date": 1611746674000, "content_id": "f58d1611f79e0f03ff4f47e333dc08e3efe63479", "detected_licenses": [ "MIT" ], "directory_id": "27cf6c066ae74754939c9ce46285613922021661", "extension": "py", "fi...
2.765625
stackv2
"""Generate the menu items.""" import configparser import json import os from pathlib import Path import re from typing import Text import xml.etree.ElementTree as et from xml.dom import minidom import shutil import logging def add_menu(installdir: Path, name: Text) -> None: """Add a submenu to 'VNM' menu. Pa...
228
36.37
118
18
2,060
python
[{"finding_id": "codeql_py/overly-permissive-file_cea97a0ad1f8c5b6_f1bb8d59", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
3
true
[ "CWE-732", "CWE-732", "CWE-732" ]
[ "py/overly-permissive-file", "py/overly-permissive-file", "py/overly-permissive-file" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable.", "Overly permissive mask in chmod sets file to world readable.", "Overly permissive mask in chmod sets file to world readable." ]
[ 67, 130, 172 ]
[ null, null, null ]
[ 5, 9, 9 ]
[ 31, 38, 38 ]
2024-11-19T00:28:26.160060+00:00
1,486,232,795,000
e30122fe64e454aac81b9c2d55a9a490bda0ae6c
3
{ "blob_id": "e30122fe64e454aac81b9c2d55a9a490bda0ae6c", "branch_name": "refs/heads/master", "committer_date": 1486232795000, "content_id": "037e329ab3516d81c23761f2ac8528d86bebca36", "detected_licenses": [ "Apache-2.0" ], "directory_id": "f61b0a13215511a545ca2c4ce0def00fe101157f", "extension": "py"...
2.5625
stackv2
import requests from Queue import Queue import threading import argparse import re requests.packages.urllib3.disable_warnings() inputFile = "" outputFile= "" thread = "" def banner(): print "" print "" print "Haci Burtay" print "Twitter : @haciburtay" print "www.burtay.org" print "admin@burta...
87
24.05
96
14
626
python
[{"finding_id": "codeql_py/request-without-cert-validation_ef72a3aca415e509_34a82c4b", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 60 ]
[ null ]
[ 24 ]
[ 82 ]
2024-11-19T00:28:42.512485+00:00
1,674,036,633,000
2282e8b88781a162700d0b2593f8dd47c8da9c7c
3
{ "blob_id": "2282e8b88781a162700d0b2593f8dd47c8da9c7c", "branch_name": "refs/heads/master", "committer_date": 1674036633000, "content_id": "5dbb431d27d275fa10d004c653641c1c1613012c", "detected_licenses": [ "MIT" ], "directory_id": "33be4b8a076a83adb73ff6b267d8135dbbdd16fc", "extension": "py", "fi...
3.1875
stackv2
#!/usr/bin/env python3 import ftplib import multiprocessing def brute_force(ip_address,user,password): ftp = ftplib.FTP(ip_address) try: print("Testing user {}, password {}".format(user, password)) response = ftp.login(user,password) if "230" in response and "access granted" in respons...
32
31.22
68
16
219
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f614e331bbea2da8_287bd852", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 9, 13 ]
[ null, null ]
[ 15, 19 ]
[ 68, 58 ]
2024-11-19T01:30:48.546974+00:00
1,574,760,270,000
4095aa7453f124167c979970e6e98db3df0c4a50
3
{ "blob_id": "4095aa7453f124167c979970e6e98db3df0c4a50", "branch_name": "refs/heads/master", "committer_date": 1574760270000, "content_id": "fd5bf5633c714e593947dad1e155bb12baf8b79c", "detected_licenses": [ "MIT" ], "directory_id": "4df2f762571ea18f0e1c8d1c161e5f007ed03e48", "extension": "py", "fi...
2.640625
stackv2
# -*- coding: utf-8 -*- from __future__ import print_function # для единого кода Python2, Python3 __author__ = 'dontsov' import os import sys import argparse from werkzeug import serving from flask import Flask, request, send_file import random import string import time try: if sys.version_info >= (3, 0): ...
119
29.24
112
13
960
python
[{"finding_id": "codeql_py/reflective-xss_f480a53960136e1d_69e39434", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
6
true
[ "CWE-079", "CWE-022", "CWE-022", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/reflective-xss", "py/path-injection", "py/path-injection", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "HIGH", "HIGH", "HIGH", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry...
[ 70, 54, 77, 56, 69, 75 ]
[ null, null, null, null, null, null ]
[ 12, 15, 26, 25, 21, 21 ]
[ 15, 35, 46, 48, 41, 41 ]
2024-11-19T01:54:55.437819+00:00
1,442,755,469,000
f70828727d03425275fccdca6d23f4fa1b0507ea
3
{ "blob_id": "f70828727d03425275fccdca6d23f4fa1b0507ea", "branch_name": "refs/heads/master", "committer_date": 1442755469000, "content_id": "edbae760e891fb3b6104e8185cee4f27094a9442", "detected_licenses": [ "Apache-2.0" ], "directory_id": "5d8a86c89452d1a6f44491bff837c98e12980290", "extension": "py"...
2.515625
stackv2
__author__ = 'Duc' # all the imports import sqlite3 from flask import Flask, request, session, g, redirect, url_for, \ abort, render_template, flash from contextlib import closing # configuration DATABASE = 'flaskr.db' DEBUG = True SECRET_KEY = 'development key' USERNAME = 'admin' PASSWORD = 'default' # appl...
110
26.39
91
14
718
python
[{"finding_id": "codeql_py/sql-injection_f159eb27deadf5ec_262007a3", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown...
1
true
[ "CWE-089" ]
[ "py/sql-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This SQL query depends on a [user-provided value](1)." ]
[ 98 ]
[ null ]
[ 24 ]
[ 88 ]
2024-11-19T01:55:00.632673+00:00
1,683,328,779,000
171d24eb2dbca1043d591b1a03013bd78d65611d
3
{ "blob_id": "171d24eb2dbca1043d591b1a03013bd78d65611d", "branch_name": "refs/heads/master", "committer_date": 1683329111000, "content_id": "583bbde68a00338ae5691e21089e24efba75f783", "detected_licenses": [ "MIT" ], "directory_id": "6b43d43b8c0dbdb94fbd9146a24c91997bd3897b", "extension": "py", "fi...
2.828125
stackv2
""" All function in this module take and return :class:`bytes` """ import sys from os import urandom as random_bytes from struct import pack from base64 import b64decode from Cryptodome.Hash import MD5, SHA1, HMAC from Cryptodome.PublicKey.RSA import import_key as rsa_import_key, construct as rsa_construct from Crypto...
106
30.66
93
14
1,002
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_efc950a60b5541fb_238ae15e", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
4
true
[ "CWE-327", "CWE-327", "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 52, 61, 73, 88 ]
[ null, null, null, null ]
[ 12, 12, 18, 12 ]
[ 60, 50, 64, 63 ]
2024-11-19T02:01:08.535358+00:00
1,580,223,218,000
b01f58c24c875e15bbb416bbc2a373c7c3e6ebbf
3
{ "blob_id": "b01f58c24c875e15bbb416bbc2a373c7c3e6ebbf", "branch_name": "refs/heads/master", "committer_date": 1580223218000, "content_id": "e4e877d744c7407726d4c74e17ef8a00458c70bf", "detected_licenses": [ "MIT" ], "directory_id": "f030fdd28cf77402096dfb7073cba5fbc26998ec", "extension": "py", "fi...
2.640625
stackv2
""" bokehadauth.py, when hooked into Bokeh server, will require Active Directory login by users. Currently, it expects the environment variables AD_SERVER and AD_DOMAIN to be set correctly. This module is meant to be specified as argument to a bokeh server. bokeh serve --auth-module=bokehadauth.py --cookie-secret YOUR...
46
33.57
92
15
335
python
[{"finding_id": "codeql_py/url-redirection_79bebb54f24a8512_a52cfed1", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 42 ]
[ null ]
[ 27 ]
[ 57 ]
2024-11-19T00:40:23.095099+00:00
1,604,709,439,000
48cf79c15f8f9104f831a17b10b479c9c43f5205
3
{ "blob_id": "48cf79c15f8f9104f831a17b10b479c9c43f5205", "branch_name": "refs/heads/master", "committer_date": 1604709439000, "content_id": "6c983260834a721cfabc9d879f383808a4ba549c", "detected_licenses": [ "MIT" ], "directory_id": "3243095573cbd3d5b1a2493c6db6a76c80524df2", "extension": "py", "fi...
3.109375
stackv2
import re def clean_text(text, normalize_case=False, normalize_whitespace=True, remove_uris=True, blacklist_regex="non_alpha_numeric_punct"): """Clean text to prepare for training and inference. Args: text: the text to clean """ if blacklist_regex is not None: if blacklist_regex == "...
27
33.3
131
12
230
python
[{"finding_id": "codeql_py/overly-large-range_bda08a688bb91e37_e3781f2c", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with 1-9 in the same character class, and overlaps with A-Z in ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with 1-9 in the same character class, and overlaps with A-Z in the same character class, and is equivalent to \\[)*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 13 ]
[ null ]
[ 56 ]
[ 59 ]
2024-11-19T00:40:25.366941+00:00
1,612,309,286,000
a22f9a960a4669d33aabc339131ae703ee9d833f
3
{ "blob_id": "a22f9a960a4669d33aabc339131ae703ee9d833f", "branch_name": "refs/heads/master", "committer_date": 1612309468000, "content_id": "6c8f8244c8460cf5acb4e37e8f06fee0512c8005", "detected_licenses": [ "Apache-2.0" ], "directory_id": "40958222c3222c2cf23d0b8d70e4b3c63f241a6c", "extension": "py"...
2.59375
stackv2
# Pyserini: Python interface to the Anserini IR toolkit built on Lucene # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by a...
52
35.13
94
15
434
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_b0f27180abe823d3_d82a00b3", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'dropbox.com/', so it might match mo...
1
true
[ "CWE-020" ]
[ "py/incomplete-hostname-regexp" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'dropbox.com/', so it might match more hosts than expected." ]
[ 33 ]
[ null ]
[ 35 ]
[ 64 ]
2024-11-19T00:40:29.940570+00:00
1,584,003,256,000
2cf636015beb5621fbaf9e942b1e6116b19f23c3
2
{ "blob_id": "2cf636015beb5621fbaf9e942b1e6116b19f23c3", "branch_name": "refs/heads/master", "committer_date": 1584003256000, "content_id": "40f2c199e5587140054aee9804bd18b13d235837", "detected_licenses": [ "MIT" ], "directory_id": "7d3783308b1fecc72c04bd71f18e3f1ad4b288f5", "extension": "py", "fi...
2.375
stackv2
import logging import json import attr import requests from . import conf from . import serializer from .exceptions import ApiError, AuthError logger = logging.getLogger(__name__) @attr.s class NovaPoshta(object): """ A base API class, that holds shared methods and settings for other models. Creates ba...
123
28.66
96
16
784
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b443513fef71792a_f3af29b0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 74 ]
[ null ]
[ 43 ]
[ 75 ]
2024-11-19T01:06:08.687666+00:00
1,476,647,375,000
ff8fddbfd84f13c8c1cd087aa5419bfc711164f7
3
{ "blob_id": "ff8fddbfd84f13c8c1cd087aa5419bfc711164f7", "branch_name": "refs/heads/master", "committer_date": 1476647375000, "content_id": "657774d11bc4abbeff51347f5a206a55fcac1e7f", "detected_licenses": [ "MIT" ], "directory_id": "69ebd1e1e226bc271b6129e92b5458d20bca4a6d", "extension": "py", "fi...
2.546875
stackv2
# -*- coding: utf-8 -*- import requests import json import os import re from flask import Flask, url_for, request, redirect, Response app = Flask(__name__) URL = 'https://kotoha-server.herokuapp.com/api/phrases.json' # Check token if you don't want to conflict with other slash commands #SLACK_KEY = os.environ['SLAC...
66
30.95
89
18
553
python
[{"finding_id": "codeql_py/partial-ssrf_8a1db6d2c378c69b_68d3f273", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 40 ]
[ null ]
[ 37 ]
[ 54 ]
2024-11-19T01:06:13.185530+00:00
1,688,041,099,000
9e735c12ce69b4b2eeed9d73220594202df6dc2b
3
{ "blob_id": "9e735c12ce69b4b2eeed9d73220594202df6dc2b", "branch_name": "refs/heads/main", "committer_date": 1688041099000, "content_id": "9e5b1fc3d2558611b2c96c5d5ba8f71c2f0660d4", "detected_licenses": [ "BSD-2-Clause", "BSD-3-Clause" ], "directory_id": "5b6878052e972159a0a0729655598331b06f7469",...
3.265625
stackv2
"""Unpack tar/zip archives. This module is copied from the Python 3.2 standard library. """ import os class ReadError(EnvironmentError): """Raised when an archive cannot be read.""" def _ensure_directory(path): """Ensure that the parent directory of `path` exists""" dirname = os.path.dirname(path) ...
121
28.93
79
16
825
python
[{"finding_id": "codeql_py/tarslip_6de8ddea7f532190_e99ce19b", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 68 ]
[ null ]
[ 9 ]
[ 15 ]
2024-11-19T01:17:32.007692+00:00
1,676,139,610,000
1759b5d825de1424b212017726d9f1383fa5db3b
3
{ "blob_id": "1759b5d825de1424b212017726d9f1383fa5db3b", "branch_name": "refs/heads/master", "committer_date": 1676139610000, "content_id": "3caabf06d81afffa3638b89c8400c50584f543c1", "detected_licenses": [ "MIT" ], "directory_id": "255e19ddc1bcde0d3d4fe70e01cec9bb724979c9", "extension": "py", "fi...
2.703125
stackv2
import subprocess import argparse import re import sys import requests def do_dig(domain): command = "dig {} | grep IN".format(domain) try: output = subprocess.check_output(command, shell=True, stdin=subprocess.PIPE, stderr=subprocess.STDOUT) return re.findall(r"\b\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{...
57
35.68
119
18
501
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_efa283d35dcb1fc0_8f4d1218", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [amazonaws.com](1) may be at an arbitrary position in t...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [amazonaws.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 27 ]
[ null ]
[ 20 ]
[ 42 ]
2024-11-19T01:31:59.464659+00:00
1,435,580,900,000
70bc6b6d006e55e5d496191a4e2a4b8b3f9bdd92
2
{ "blob_id": "70bc6b6d006e55e5d496191a4e2a4b8b3f9bdd92", "branch_name": "refs/heads/master", "committer_date": 1435580900000, "content_id": "911cde67ddeff759628d4a856224604770080249", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "48894ae68f0234e263d325470178d67ab313c73e", "extension": "p...
2.4375
stackv2
# -*- coding: utf-8 -*- ##---------------------------------------------------------------------- ## HTTP provider ##---------------------------------------------------------------------- ## Copyright (C) 2007-2011 The NOC Project ## See LICENSE for details ##-------------------------------------------------------------...
269
33.16
79
20
2,049
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_52cc6cc466ea3127_d1b0655e", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 193 ]
[ null ]
[ 39 ]
[ 40 ]
2024-11-19T01:32:29.796857+00:00
1,691,254,293,000
db1e4fa906b7f1dca49e149750a64f2b83d979f0
3
{ "blob_id": "db1e4fa906b7f1dca49e149750a64f2b83d979f0", "branch_name": "refs/heads/master", "committer_date": 1691254293000, "content_id": "92f6ca261571678702f0bd8948001ef3020d427d", "detected_licenses": [ "Apache-2.0" ], "directory_id": "b18b01b32e67433a6e749e2aae48fb69bcfc42f9", "extension": "py"...
2.875
stackv2
""" Simple app that parses predictions from a trained model and displays them. """ import argparse import logging import os import re import random import sys import requests import pandas as pd from flask import Flask, json, render_template, request, g, jsonify APP = Flask(__name__) GITHUB_TOKEN = os.environ['GITHU...
94
27.46
94
16
634
python
[{"finding_id": "codeql_py/flask-debug_c493097bfa0a0cd4_ded32b97", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-1333", "CWE-918" ]
[ "py/flask-debug", "py/polynomial-redos", "py/full-ssrf" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with many repetitions of 'a'.", "The full URL of this request depends on a [user-provided value]...
[ 94, 24, 25 ]
[ null, null, 28 ]
[ 3, 22, 10 ]
[ 54, 31, 7 ]
2024-11-19T01:32:29.992983+00:00
1,531,174,533,000
967ff2e7934839b60acade1ac89c46994e6e91d9
2
{ "blob_id": "967ff2e7934839b60acade1ac89c46994e6e91d9", "branch_name": "refs/heads/master", "committer_date": 1531174533000, "content_id": "a4c958726ed2a3e9ddbd1eb710db42d5f89f8d03", "detected_licenses": [ "Apache-2.0" ], "directory_id": "80702982a7e9ffd7f07bba2d6ba92272fe958b67", "extension": "py"...
2.46875
stackv2
#!/usr/bin/env python import glob import hashlib import os import sys import tempfile import tarfile import subprocess import shutil VOL_DIRS = ['mri', 'mri/orig', 'mri/tranforms'] SURFACE_DIRS = ['surf'] VOLUMES = ['rawavg.mgz', 'orig.mgz', 'nu.mgz', 'T1.mgz', 'brainmask.mg...
150
34.65
83
17
1,289
python
[{"finding_id": "codeql_py/tarslip_7072d51e5f1dd768_db2d1f5b", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/tarslip", "py/tarslip" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1).", "This file extraction depends on a [potentially untrusted source](1)." ]
[ 123, 124 ]
[ null, null ]
[ 5, 5 ]
[ 20, 20 ]
2024-11-19T01:43:47.018564+00:00
1,476,470,901,000
daa6f3fecc71eecf7bcdbbafdb5607593d887b56
2
{ "blob_id": "daa6f3fecc71eecf7bcdbbafdb5607593d887b56", "branch_name": "refs/heads/master", "committer_date": 1476470901000, "content_id": "f65c983d905605303439a7231d7534dfd3e21185", "detected_licenses": [ "MIT" ], "directory_id": "e211562ceacbc18cf1a7c6ad5d200f0aa30cc558", "extension": "py", "fi...
2.375
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- __author__ = 'Jiayi Li' import time, hashlib, json, urllib import requests from flask import current_app, request from bson.objectid import ObjectId from app import db def user_to_cookie(user, max_age=86400): ''' return cookie from an user dict ''' ...
128
26
114
15
825
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_35e1309105276ef1_5faf0b82", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse...
3
true
[ "CWE-327", "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (secret)](2) is used in a hashing algorithm (SHA1) that is insecure.", "[Sensitive data (password)](1) is used in a hashing algor...
[ 21, 45, 78 ]
[ null, null, null ]
[ 49, 33, 17 ]
[ 76, 58, 41 ]
2024-11-19T01:44:07.701503+00:00
1,449,877,925,000
59be321fa0e09623cbb95000ef0a4fa10cd649c8
3
{ "blob_id": "59be321fa0e09623cbb95000ef0a4fa10cd649c8", "branch_name": "refs/heads/master", "committer_date": 1449877925000, "content_id": "093195c3a4411fba5094d038a2432c20e34d964c", "detected_licenses": [ "MIT" ], "directory_id": "92b7f56969b590511b0da1966808e060184ee0c4", "extension": "py", "fi...
2.8125
stackv2
""" Views that inherit from Django's class-based generic views and add methods for building flat files. """ import os import six import sys import gzip import shutil import logging import mimetypes from django.conf import settings from bakery import DEFAULT_GZIP_CONTENT_TYPES from django.test.client import RequestFacto...
298
30.94
78
16
2,021
python
[{"finding_id": "codeql_py/url-redirection_4cc07c1950cdec8b_47a3448b", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
3
true
[ "CWE-601", "CWE-117", "CWE-117" ]
[ "py/url-redirection", "py/log-injection", "py/log-injection" ]
[ "HIGH", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 283, 259, 286 ]
[ null, 262, 289 ]
[ 16, 22, 22 ]
[ 19, 10, 10 ]
2024-11-19T02:19:53.107143+00:00
1,688,243,968,000
40ac0515b7d48226489873cd4fb35633f42abefa
3
{ "blob_id": "40ac0515b7d48226489873cd4fb35633f42abefa", "branch_name": "refs/heads/main", "committer_date": 1688243968000, "content_id": "7e1e699cf112267659dbd54e07e4c29d3ab724bb", "detected_licenses": [ "MIT" ], "directory_id": "db43055180800e54526affb7941fc77e0226c4b3", "extension": "py", "file...
3.046875
stackv2
import re from datetime import datetime from city_scrapers_core.constants import COMMITTEE from city_scrapers_core.items import Meeting from city_scrapers_core.spiders import CityScrapersSpider class ChiSchoolCommunityActionCouncilSpider(CityScrapersSpider): name = "chi_school_community_action_council" agenc...
131
36.96
109
19
1,051
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_13580177e01d9ac1_8e11ee9b", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [humboldparkportal.org](1) may be at an arbitrary posit...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [humboldparkportal.org](1) may be at an arbitrary position in the sanitized URL." ]
[ 30 ]
[ null ]
[ 27 ]
[ 60 ]
2024-11-19T00:59:40.935075+00:00
1,611,778,537,000
04e867916d9170e2a101e0dc71fbcb77b56559b2
2
{ "blob_id": "04e867916d9170e2a101e0dc71fbcb77b56559b2", "branch_name": "refs/heads/master", "committer_date": 1611778537000, "content_id": "1be3909bff7fa05141d51a8a96c2f84eec7bd678", "detected_licenses": [ "Apache-2.0" ], "directory_id": "db0282bd6100a2e4f5169894e92b4a892548b53b", "extension": "py"...
2.453125
stackv2
# coding: utf-8 from pyramid.view import view_config from pyramid import httpexceptions as exceptions from pyramid.authentication import extract_http_basic_credentials from ..juliette.conexion import parametros, credenciales, autenticacion from ..juliette.excepciones import AutenticacionException from ..juliette.mode...
73
31.6
86
15
538
python
[{"finding_id": "codeql_py/reflective-xss_6894a80cd695da23_c6d161c8", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 50 ]
[ null ]
[ 12 ]
[ 21 ]
2024-11-19T00:59:45.220848+00:00
1,690,380,256,000
621341fd75a514b6c3db7f858e7bda1451d2d087
3
{ "blob_id": "621341fd75a514b6c3db7f858e7bda1451d2d087", "branch_name": "refs/heads/master", "committer_date": 1690380256000, "content_id": "23c9ebda96c2e677a33883c23e0656237c878b8d", "detected_licenses": [ "MIT" ], "directory_id": "480e10ba3c431a52e0bfaa1de81896db80aa8061", "extension": "py", "fi...
2.515625
stackv2
"""Http Proxy to be used as provider url in verifier.""" from fastapi import FastAPI, status, Request, HTTPException import uvicorn as uvicorn import logging log = logging.getLogger(__name__) logging.basicConfig(level=logging.DEBUG) app = FastAPI() PROXY_PORT = 1234 UVICORN_LOGGING_LEVEL = "error" items = { "state...
58
27.38
88
10
377
python
[{"finding_id": "codeql_py/log-injection_2e4dc11254eaf03b_c4ad1835", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 18 ]
[ null ]
[ 15 ]
[ 54 ]
2024-11-19T01:00:09.453784+00:00
1,685,985,338,000
d05e6dd79a642440b4ff75b7656b2492e55fe91e
2
{ "blob_id": "d05e6dd79a642440b4ff75b7656b2492e55fe91e", "branch_name": "refs/heads/master", "committer_date": 1685985338000, "content_id": "19c7452ffc2b026632ca15a89d57a539de518073", "detected_licenses": [ "MIT" ], "directory_id": "4cf1fea45f27bbd317c08e73130c9a13bbd13b90", "extension": "py", "fi...
2.421875
stackv2
"""A file-based pydap server running on Gunicorn. Usage: pydap [options] Options: -h --help Show this help message and exit --version Show version -i --init DIR Create directory with templates -b ADDRESS --bind ADDRESS The ip to listen to [default:...
274
31.46
79
17
1,932
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_69e870f45182c1e8_a6884e91", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 57 ]
[ null ]
[ 20 ]
[ 61 ]
2024-11-19T01:11:38.875787+00:00
1,563,560,688,000
3d96dd159dab5e0162a5e9b9561719b651372d6f
4
{ "blob_id": "3d96dd159dab5e0162a5e9b9561719b651372d6f", "branch_name": "refs/heads/master", "committer_date": 1563560688000, "content_id": "05caaaacc72985759bf71220969f8acd32eea5f8", "detected_licenses": [ "MIT" ], "directory_id": "041e64a8c3c670ab816705af3ca89cb13bca0b02", "extension": "py", "fi...
3.6875
stackv2
# ------------------------------------------------------------------------------------------ # Programa de geraçao de passwords entre 4 e 16 caracteres e que, # para além de mostrar as passwords na consola, cria ficheiro .txt de output # NC # V1.0.0 23-10-2013 : criaçao da primeira versão do programa. Mostra passwords ...
64
33.36
92
16
592
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_519f1676591adaaa_46841cd0", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 40, 50 ]
[ null, null ]
[ 17, 20 ]
[ 32, 28 ]
2024-11-19T01:21:34.107476+00:00
1,687,079,142,000
712cb745455d246c1bf95f4f9b75c4f814ee113d
2
{ "blob_id": "712cb745455d246c1bf95f4f9b75c4f814ee113d", "branch_name": "refs/heads/master", "committer_date": 1687079142000, "content_id": "73347cce461f938d46aeb9e96e390d55e7cbf86c", "detected_licenses": [ "MIT" ], "directory_id": "b7d13929749d1f09383b27ab76bdafcc4c9c540c", "extension": "py", "fi...
2.453125
stackv2
#!/usr/bin/env python3 import re import socket import asyncio import hashlib from base64 import b64encode from urllib.parse import urlparse class Rsync_Weakpwd_BaseVerify: def __init__(self, url): self.info = { 'name': 'Rsync 弱口令访问漏洞', 'description': 'Rsync 弱口令访问漏洞', 'd...
154
31.09
108
23
1,184
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_02308503944da2f3_7da2b651", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi...
[ 80 ]
[ null ]
[ 27 ]
[ 42 ]
2024-11-19T01:21:36.215194+00:00
1,654,236,018,000
ccaafe3f9d44c6226b8d6a62fa8a3d1f782876e9
2
{ "blob_id": "ccaafe3f9d44c6226b8d6a62fa8a3d1f782876e9", "branch_name": "refs/heads/master", "committer_date": 1654236018000, "content_id": "1dcdb4aa95637caf0ecd122d475de254aa0d3653", "detected_licenses": [ "MIT" ], "directory_id": "c676d3fd442a318e8479b9749d932165a576ebb8", "extension": "py", "fi...
2.328125
stackv2
import requests from datetime import timedelta from logging import getLogger from homeassistant.util import Throttle _LOGGER = getLogger(__name__) from homeassistant.components.weather import ( ATTR_WEATHER_HUMIDITY, ATTR_WEATHER_PRESSURE, ATTR_WEATHER_TEMPERATURE, ATTR_WEATHER_VISIBILITY ) from hom...
105
32.18
78
16
853
python
[{"finding_id": "codeql_py/request-without-cert-validation_3133bdfd4296205d_d50f679c", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 74, 82 ]
[ null, null ]
[ 20, 24 ]
[ 75, 67 ]
2024-11-19T02:10:28.231281+00:00
1,687,794,171,000
41ac2711af7c37d4fa78a0ea6941dbdf98eaf50b
3
{ "blob_id": "41ac2711af7c37d4fa78a0ea6941dbdf98eaf50b", "branch_name": "refs/heads/master", "committer_date": 1687794171000, "content_id": "b56a1428621cf7151409e7cbf0b286027c72868b", "detected_licenses": [ "MIT" ], "directory_id": "6a37d562cd7d818356a5378fd7d88b934ccf7d66", "extension": "py", "fi...
2.609375
stackv2
""" Implements the mumble protocol. https://mumble-protocol.readthedocs.org/en/latest/index.html """ import socket import ssl import threading import time import struct from ....logging import get_logger from ....signals import on_exception from ... import BaseResponder from . import mumble_pb2 # Mapping of ...
308
30.52
96
17
2,176
python
[{"finding_id": "codeql_py/insecure-default-protocol_fd88bdbb0f54e69d_babccdda", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in...
1
true
[ "CWE-327" ]
[ "py/insecure-default-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used." ]
[ 247 ]
[ null ]
[ 20 ]
[ 40 ]
2024-11-19T02:10:33.487815+00:00
1,621,170,110,000
2daa7d17c7d2ef4e0e8f4344e6fb8683bfef55a2
2
{ "blob_id": "2daa7d17c7d2ef4e0e8f4344e6fb8683bfef55a2", "branch_name": "refs/heads/main", "committer_date": 1621170110000, "content_id": "c505f4daa8e3cef46e9098fb8525000f152316b7", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e43bf0a95e9396d3331c8e03039e7d13bc9d9fbc", "extension": "py", ...
2.40625
stackv2
"""Command line script for FastMSA.""" import glob import importlib import os import sys from argparse import ArgumentParser, Namespace, RawTextHelpFormatter from inspect import getmembers from pathlib import Path from textwrap import dedent from typing import Any, Optional, Sequence, cast import jinja2 import uvicorn...
375
31.87
96
20
2,979
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_123b1ed933ccfd02_1d28a0a7", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 101 ]
[ null ]
[ 32 ]
[ 53 ]
2024-11-19T02:45:22.926012+00:00
1,620,381,537,000
59df480e3e7351037e07c8bdaf6e1451602323dd
3
{ "blob_id": "59df480e3e7351037e07c8bdaf6e1451602323dd", "branch_name": "refs/heads/master", "committer_date": 1620381537000, "content_id": "1dfddb7a5025a7a0b8f4554b695aba867da21a73", "detected_licenses": [ "MIT" ], "directory_id": "32e0843a8a7cef45e98a3a7c913eacf75d66d8b9", "extension": "py", "fi...
2.71875
stackv2
from flask import Flask, render_template, url_for, request, redirect from markupsafe import escape from flask_sqlalchemy import SQLAlchemy from datetime import datetime app = Flask(__name__) app.config['SQLALCHEMY_DATABASE_URI'] = 'sqlite:///blog.db' app.config['SQLALCHEMY_TRACK_MODIFICATIONS'] = False db = SQLAlchemy...
79
24.78
68
13
463
python
[{"finding_id": "codeql_py/flask-debug_84d7241a79153417_be94e859", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 79, 69 ]
[ null, null ]
[ 5, 12 ]
[ 24, 31 ]
2024-11-19T02:45:32.223658+00:00
1,625,454,838,000
2f1e232e36e772e2c01549b02a620cbc6a13b785
2
{ "blob_id": "2f1e232e36e772e2c01549b02a620cbc6a13b785", "branch_name": "refs/heads/master", "committer_date": 1625454838000, "content_id": "e86d5e4c41fc0363b97ba66ff34a2f7de1c35be1", "detected_licenses": [ "MIT" ], "directory_id": "d64ed7d94dda2b85fb61c8bb633aadfdc939ab8c", "extension": "py", "fi...
2.40625
stackv2
from libs.config import gget, alias, color from os.path import exists from requests import post, exceptions @alias(True) def run(timeout: float = 2.0): """ check Check if each webshell is alive. eg: check {timeout=2.0} """ if not exists("webshell.log"): print(color.red("No webshell.L...
52
37.1
103
21
452
python
[{"finding_id": "codeql_py/request-without-cert-validation_b7b4c5b67a4928da_e494e1c1", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 42 ]
[ null ]
[ 23 ]
[ 61 ]
2024-11-19T02:45:32.445550+00:00
1,605,467,717,000
a08e8806ecf485730de0e5a4db13f8d56cc61d00
2
{ "blob_id": "a08e8806ecf485730de0e5a4db13f8d56cc61d00", "branch_name": "refs/heads/main", "committer_date": 1605467717000, "content_id": "accfaf7f3080f7c621c9c1308565f4d035df74d9", "detected_licenses": [ "MIT" ], "directory_id": "1a6dbc08cbec7abc9d12f396c088ca46520c98d1", "extension": "py", "file...
2.34375
stackv2
from flask import Blueprint, current_app, abort, request, jsonify from functools import wraps from app.db import db, User, Hex, QuestionList, World from datetime import datetime, timedelta import numpy bp = Blueprint('interface', __name__) def validate_request(f): @wraps(f) def decorated_function(*args, **kw...
130
26.67
100
23
904
python
[{"finding_id": "codeql_py/reflective-xss_f4ca8080c08846a7_6f90f3fc", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 126, 130 ]
[ null, null ]
[ 12, 12 ]
[ 47, 18 ]
2024-11-19T02:45:34.323720+00:00
1,458,587,446,000
bbdadfb5aa1c4f6dd9ed4aba54ac3e9c1a9b5b69
2
{ "blob_id": "bbdadfb5aa1c4f6dd9ed4aba54ac3e9c1a9b5b69", "branch_name": "refs/heads/master", "committer_date": 1458587446000, "content_id": "4731ab189a497e2ea5d7b9a53326475efec84e4b", "detected_licenses": [ "Apache-2.0" ], "directory_id": "0f72067064165a62ca81084743de2fbebd7b1242", "extension": "py"...
2.34375
stackv2
#! /usr/bin/env python import paramiko import time def connect(command, ip, user, passwd, port=22): remote_conn_pre = paramiko.SSHClient() remote_conn_pre.set_missing_host_key_policy(paramiko.AutoAddPolicy()) remote_conn_pre.connect(ip, username=user, password=passwd, look_for_keys=False, allow_agent=...
67
19.27
114
13
381
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_973d37de2eda831e_3ce8b4c2", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 11 ]
[ null ]
[ 5 ]
[ 74 ]
2024-11-19T02:57:23.736296+00:00
1,514,198,232,000
a93f077a453471e9503f5c63eb8c9ef9a0b2265c
2
{ "blob_id": "a93f077a453471e9503f5c63eb8c9ef9a0b2265c", "branch_name": "refs/heads/master", "committer_date": 1514198232000, "content_id": "3cac3eb8a18c6d44f9db5f51cc25b927cb8c4ca5", "detected_licenses": [ "MIT" ], "directory_id": "3a7b140348fb96216d6ae0b18cdd62a811112eea", "extension": "py", "fi...
2.390625
stackv2
import time import hmac import hashlib import urllib import requests import json import base64 class Bittrex_Init: def __init__(self, api_key='', api_secret=''): self.api_key = api_key self.api_secret = api_secret def __call__(self, command, args={}): nonce = str(int(time.time()*1000))...
72
38.72
102
17
692
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_ea7fdacf00e71d49_9b0fb4ea", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 20 ]
[ null ]
[ 54 ]
[ 74 ]
2024-11-19T01:57:14.999050+00:00
1,613,113,011,000
56c69e73dec20b61e42754a3c0542085cb1971a2
3
{ "blob_id": "56c69e73dec20b61e42754a3c0542085cb1971a2", "branch_name": "refs/heads/main", "committer_date": 1613113011000, "content_id": "f2e4727e82ba2c147088983cba03eab87aa2f472", "detected_licenses": [ "Unlicense" ], "directory_id": "1f0f62af04472749bf1256c0503a39e1b7b693af", "extension": "py", ...
2.609375
stackv2
from googlesearch import search from colorama import Fore, init init() print(Fore.CYAN) import time time.sleep(1) banner = """ 000000000000000000000000000 0 ---- SrchX ---- 0 0 by 0 0 Blacksterhack 0 000000000000000000000000000 """ print(banner) Disclaimer = "This program was c...
136
23.14
98
14
1,160
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b73adfc58fdaaac6_c28b3440", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 133, 136 ]
[ null, null ]
[ 10, 11 ]
[ 45, 50 ]
2024-11-19T01:57:17.181721+00:00
1,693,473,051,000
ef5d9966ffeffed20514746e61840566f4416236
2
{ "blob_id": "ef5d9966ffeffed20514746e61840566f4416236", "branch_name": "refs/heads/master", "committer_date": 1693473051000, "content_id": "6ae9ccb73a4b8814076b95596bfd2ed440332db2", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "f71ea031e1df51e8fbf20899788830ac079c7609", "extension": "p...
2.421875
stackv2
import hashlib from boto.s3.connection import S3Connection from boto.s3.key import Key from spidermon.exceptions import NotConfigured from . import CreateReport DEFAULT_S3_REGION_ENDPOINT = "s3.amazonaws.com" DEFAULT_S3_CONTENT_TYPE = "text/html" URL_SECRET_KEY = "The secret to life the universe and everything" ...
160
33.56
94
18
1,160
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_b67e2fa500874353_01fa5522", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (secret)](2) is used in a hashing algorithm (MD5) that is insecure." ]
[ 156 ]
[ null ]
[ 28 ]
[ 43 ]
2024-11-19T01:57:25.159022+00:00
1,560,262,708,000
576558a3977930fb02a7d707de78feabfd054995
3
{ "blob_id": "576558a3977930fb02a7d707de78feabfd054995", "branch_name": "refs/heads/master", "committer_date": 1560262708000, "content_id": "5f292a4633e424784fc0a8ae01c81b624be0424e", "detected_licenses": [ "MIT" ], "directory_id": "23605544a0ab01db6aa39f12da552e79ef09fb57", "extension": "py", "fi...
2.953125
stackv2
# Script to automatically downlaod and remove a folder from raspberry pi from scp import SCPClient from paramiko import SSHClient from paramiko import AutoAddPolicy import os HOSTNAME = "" USERNAME = "" PASSWORD = "" REMOTE_PATH = "" LOCAL_PATH = os.path.expanduser("~/Desktop") # https://stackoverflow.com/...
52
27.54
78
13
349
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_2c25c6aece244f70_c7dd7084", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 30 ]
[ null ]
[ 5 ]
[ 53 ]
2024-11-19T02:11:27.254116+00:00
1,614,237,150,000
57b7ba83eec4a253b35fec84ba38c7d3a5ff5a94
3
{ "blob_id": "57b7ba83eec4a253b35fec84ba38c7d3a5ff5a94", "branch_name": "refs/heads/main", "committer_date": 1614237150000, "content_id": "f6aceb2ffac9fd6ecba0ddd1da5c981f8d5a161b", "detected_licenses": [ "MIT" ], "directory_id": "4379da1e1a9cf9696d7ab57729871830126a87dd", "extension": "py", "file...
2.59375
stackv2
import json import logging import boto3 from datetime import datetime from datetime import timedelta import random logger = logging.getLogger() logger.setLevel(logging.INFO) def sendSMS(phone,faceId,otp): sns = boto3.client('sns', region_name = 'us-west-2') url = "https://smart-door-face.s3-us-west-2.amazonaw...
123
26.24
104
14
838
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d232399b11f03710_f86cedb4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 14 ]
[ null ]
[ 11 ]
[ 18 ]
2024-11-19T02:32:44.128972+00:00
1,557,777,657,000
ea4caa1dcc25ad85287ccce6f4b47389a2ff8356
2
{ "blob_id": "ea4caa1dcc25ad85287ccce6f4b47389a2ff8356", "branch_name": "refs/heads/master", "committer_date": 1557777657000, "content_id": "a9cc3078ca6543e45865e01725a688d24e0b6af1", "detected_licenses": [ "Apache-2.0" ], "directory_id": "f8c671a3fc1475e837a73cd7ad2e624440f3d122", "extension": "py"...
2.328125
stackv2
# -*- coding: utf-8 -*- """ standard """ import ConfigParser from random import randint import re import sys """ custom """ from threatconnect import ThreatConnect from threatconnect.Config.FilterOperator import FilterSetOperator # configuration file config_file = "tc.conf" # retrieve configuration file config = Co...
346
33.38
95
17
3,157
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_50834027a0fd7806_daef84cd", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 159 ]
[ null ]
[ 19 ]
[ 91 ]
2024-11-19T02:32:48.100693+00:00
1,649,687,185,000
0e4e7e6e82bb98eb958a7bdddd4427303d16baaf
2
{ "blob_id": "0e4e7e6e82bb98eb958a7bdddd4427303d16baaf", "branch_name": "refs/heads/master", "committer_date": 1649687185000, "content_id": "851bdaeb1999b486df870a458b709494d45454a7", "detected_licenses": [ "MIT" ], "directory_id": "0c71be3633a6e2344c33ba434ef60329affb7a21", "extension": "py", "fi...
2.453125
stackv2
import os import fnmatch import shutil import re import datetime path="U:/2016TigerFiles/2017Files/areawater" #path="U:/2016TigerFiles/2017Files/addr" #path ="W:/2016TigerFiles/2018Files/addrfn/test" #path="C:/Users/mattp/Desktop/WorkFiles/XML Files/ISO Files/2017Files/2017addrfeat" #path="C:/Users/mattp/Desktop/WorkF...
186
39.3
165
17
2,082
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_05802e28eb525728_5d656a02", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'census.gov/geo/maps-data/data/tiger...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/incomplete-hostname-regexp", "py/incomplete-hostname-regexp" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'census.gov/geo/maps-data/data/tiger-line', so it might match more hosts than expected.", "This regular expression has an unescaped '.' before 'census.gov/geo/maps-data/data/tiger-line', so it might match more hosts than expected." ]
[ 114, 116 ]
[ null, null ]
[ 25, 25 ]
[ 82, 81 ]
2024-11-19T02:32:56.996667+00:00
1,689,708,333,000
ece0cfcd788e23f00b1983e78272335e45f2a5c7
2
{ "blob_id": "ece0cfcd788e23f00b1983e78272335e45f2a5c7", "branch_name": "refs/heads/master", "committer_date": 1689708333000, "content_id": "2f925d5ce9be154fa2762bf9ca2f3f9d4a6ab596", "detected_licenses": [ "MIT" ], "directory_id": "57e194db1420fea5675d3e9920cdd5dd7ba326bc", "extension": "py", "fi...
2.328125
stackv2
import traceback import uuid import sys import flask import flask.json import gevent.pywsgi import pymysql import redis from platformshconfig import Config app = flask.Flask(__name__) config = Config() @app.route('/') def root(): tests = { "database": wrap_test(test_mysql, config.credentials("database"...
75
20.92
80
15
385
python
[{"finding_id": "codeql_py/stack-trace-exposure_8988197c2553162d_8e9c8fa0", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 23 ]
[ null ]
[ 31 ]
[ 36 ]
2024-11-19T02:33:22.816429+00:00
1,532,971,162,000
1ecfbc99313031a42acdaf70c5f5ddbbb6dedc27
3
{ "blob_id": "1ecfbc99313031a42acdaf70c5f5ddbbb6dedc27", "branch_name": "refs/heads/master", "committer_date": 1532971162000, "content_id": "21bef77010b015225d90a3ed6586067ba665d43a", "detected_licenses": [ "MIT" ], "directory_id": "111cdba24c3f2bffa6202dc040395144c8cf8ee6", "extension": "py", "fi...
2.984375
stackv2
import socket import base64 from Crypto.Cipher import AES chave = "0123456789ABCDEF" aes = AES.new(chave, AES.MODE_ECB) HOST = '' PORT = 5000 tcp = socket.socket(socket.AF_INET, socket.SOCK_STREAM) orig = (HOST, PORT) tcp.bind(orig) tcp.listen(1) while True: ...
39
20.87
69
15
259
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_cc70941fb0a9b67c_8471c4cb", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
3
true
[ "CWE-327", "CWE-327", "CWE-200" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm", "py/bind-socket-all-network-interfaces" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used.", "'' binds a socket to all interfaces." ]
[ 23, 31, 13 ]
[ null, null, null ]
[ 36, 11, null ]
[ 60, 58, 15 ]
2024-11-19T02:33:22.923555+00:00
1,623,266,102,000
5b7b2051ae4cdc31d282aee8e7957cc8ec76385b
2
{ "blob_id": "5b7b2051ae4cdc31d282aee8e7957cc8ec76385b", "branch_name": "refs/heads/main", "committer_date": 1623266102000, "content_id": "3f6efe890aca82016e4923a3bb82c3df7a8087b0", "detected_licenses": [ "MIT" ], "directory_id": "9cea58b411c722fa987fd9429bff7d35046ffedd", "extension": "py", "file...
2.359375
stackv2
from selenium.webdriver.common.keys import Keys from selenium.webdriver.common.action_chains import ActionChains from selenium.webdriver.common.by import By from bs4 import BeautifulSoup import requests import time from selenium.common.exceptions import NoSuchElementException import re from selenium import webdriver im...
188
28.18
162
14
1,287
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_e52aa25acd00a793_b4d829d0", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'dccc.edu/PROD/bwckschd', so it migh...
1
true
[ "CWE-020" ]
[ "py/incomplete-hostname-regexp" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'dccc.edu/PROD/bwckschd', so it might match more hosts than expected." ]
[ 117 ]
[ null ]
[ 31 ]
[ 117 ]
2024-11-19T02:33:27.161720+00:00
1,563,781,190,000
0e527648c36e2e6f5b8cea7468856dd1cdbed777
3
{ "blob_id": "0e527648c36e2e6f5b8cea7468856dd1cdbed777", "branch_name": "refs/heads/master", "committer_date": 1563781190000, "content_id": "34c2688364566ce485a46dd5437a9d8282f318be", "detected_licenses": [ "Apache-2.0" ], "directory_id": "72a067a4d18b0e8d9e0a08f46b680fa2e879162d", "extension": "py"...
2.515625
stackv2
#!/usr/bin/python #! -*- encoding=utf-8 -*- """ ---------------------------------------------------------------------- Copyright 2019 Tigerwing XU (tigerwingxys@qq.com) Licensed under the Apache License, Version 2.0 (the "License") you may not use this file except in compliance with the License. You may obtain a copy ...
279
31.72
127
26
2,041
python
[{"finding_id": "codeql_py/bad-tag-filter_a9db267dcd2504a9_e0653589", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression only parses --> and not --!> as a HTML comment end tag.", "remediation": "", "location":...
1
true
[ "CWE-116" ]
[ "py/bad-tag-filter" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression only parses --> and not --!> as a HTML comment end tag." ]
[ 98 ]
[ null ]
[ 23 ]
[ 26 ]
2024-11-19T02:33:36.880396+00:00
1,593,873,862,000
f613e868e2adc9d249be8f7098167cad03089640
3
{ "blob_id": "f613e868e2adc9d249be8f7098167cad03089640", "branch_name": "refs/heads/master", "committer_date": 1593873862000, "content_id": "099c37766487ad9953977ed0a71057f1ceac2211", "detected_licenses": [ "MIT" ], "directory_id": "14fe75458b35a251081dca4865caa0f8e67ce8f5", "extension": "py", "fi...
3.140625
stackv2
import re import requests email = input("User email: ") age = input("User age like '1986': ") user_words = [w.strip() for w in input("User key worlds split by ',': ").split(",")] EMAIL_REGEX = re.compile(r"[^@]+@[^@]+\.[^@]+") if len(user_words) < 1: raise Exception("cap alphabet should be more 1", user_words) i...
46
24.83
84
12
325
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f01c7d7dc513bb68_e96e8819", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 41, 45 ]
[ null, null ]
[ 11, 26 ]
[ 19, 34 ]
2024-11-19T02:33:39.000839+00:00
1,618,544,960,000
bf587f6529cf79ec27ad409777ffab169af027a5
3
{ "blob_id": "bf587f6529cf79ec27ad409777ffab169af027a5", "branch_name": "refs/heads/master", "committer_date": 1618544960000, "content_id": "d088826f76c77a7dd3cb1e071be1cc2aa99ae036", "detected_licenses": [ "MIT", "BSD-3-Clause" ], "directory_id": "bd26f432ae907b1b85995811aa88ee8dbf6a5923", "ext...
2.703125
stackv2
"""Radiant Voices code generator tool""" import argparse import logging import sys from importlib import import_module from pathlib import Path import genrv import yaml from jinja2 import Environment, FileSystemLoader, PrefixLoader from stringcase import camelcase, pascalcase log = logging.getLogger(__name__) DESC...
81
25.1
69
15
516
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_f06b678965f045da_4cabc8b2", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 64 ]
[ null ]
[ 11 ]
[ 55 ]
2024-11-19T02:46:07.592924+00:00
1,452,546,279,000
d8eb797055ee3d072eab095f1c709ce8842d03c8
2
{ "blob_id": "d8eb797055ee3d072eab095f1c709ce8842d03c8", "branch_name": "refs/heads/master", "committer_date": 1452546279000, "content_id": "e68161a2c34ef33d12d17eb084d969646de81539", "detected_licenses": [ "MIT" ], "directory_id": "46b49480433d5a391c65b1b63cca89951f4ae228", "extension": "py", "fi...
2.3125
stackv2
import os from dpa.app.entity import Entity, EntityRegistry, EntityError # ----------------------------------------------------------------------------- class GeomEntity(Entity): category = 'geom' CHANNEL_CONFIG = 'config/mari/geom/channels.cfg' # -------------------------------------------------------...
105
36.36
83
23
692
python
[{"finding_id": "codeql_py/overly-permissive-file_2ecd378d712d2b8c_6a620b88", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to group writable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to group writable." ]
[ 94 ]
[ null ]
[ 9 ]
[ 34 ]
2024-11-19T02:46:24.960446+00:00
1,670,329,670,000
ae8e28fc2c1b9fc0b2a23625a571391eb1e11069
4
{ "blob_id": "ae8e28fc2c1b9fc0b2a23625a571391eb1e11069", "branch_name": "refs/heads/master", "committer_date": 1670329670000, "content_id": "91c2e63be6ef74933afce9c200723b7491fda177", "detected_licenses": [ "MIT" ], "directory_id": "9284f2220168b93cfa0251dc38b88705912619c4", "extension": "py", "fi...
3.59375
stackv2
# AdventOfCode 2019 day 4 pt 1 # https://adventofcode.com/2019/day/4 # started 7:15-paused 8:00 # started over at 9:05 - 10:00 low, high = [171309,643603] possiblepasswords = 0 for i in range(low, high+1): previous = 0 hasdoubledigit = False # Loop though each digit in the number for strdigit in str(i): ...
31
25.26
85
11
274
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c471dac175709024_25b60a47", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 30 ]
[ null ]
[ 7 ]
[ 24 ]
2024-11-19T02:59:18.951048+00:00
1,681,203,029,000
68c5341237d6b932492d2065f3491181de0816f4
2
{ "blob_id": "68c5341237d6b932492d2065f3491181de0816f4", "branch_name": "refs/heads/master", "committer_date": 1681203029000, "content_id": "2a992012b47ce1262c3715006daed54e44651152", "detected_licenses": [ "MIT" ], "directory_id": "f5f2580f56f19ef7f8118186f2c2ba4a9f6b61a4", "extension": "py", "fi...
2.375
stackv2
from collections import defaultdict from tqdm import tqdm from urllib.parse import urlparse import json import os import re import requests import sys import traceback book_id_re = re.compile(r'/(\d+)(/|$)') name_nonces = defaultdict(int) def get_book(dst, gut_id): book_path = os.path.join(dst, str(gut_id) + '.t...
110
37.53
97
22
943
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_fe134ca0f73053f8_6d22a517", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [gutenberg.org](1) may be at an arbitrary position in t...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [gutenberg.org](1) may be at an arbitrary position in the sanitized URL." ]
[ 80 ]
[ null ]
[ 50 ]
[ 88 ]
2024-11-19T02:59:34.245553+00:00
1,581,491,318,000
a4ad39b6b934a293bde3d025cf11f36d988ea552
3
{ "blob_id": "a4ad39b6b934a293bde3d025cf11f36d988ea552", "branch_name": "refs/heads/master", "committer_date": 1581491318000, "content_id": "e9f041edba4f152569525a1f8167ce61a4cbbee7", "detected_licenses": [], "directory_id": "790feedb239d0f34f141cb3c19af4623476b27ea", "extension": "py", "filename": "Get...
2.765625
stackv2
# This code is based on https://github.com/delucks/gtd.py onboard function, # especial thanks to: delucks import yaml import os import webbrowser import trello import sys import configuration from requests_oauthlib import OAuth1Session from requests_oauthlib.oauth1_session import TokenRequestDenied import logging logg...
190
50.75
137
13
2,357
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_83c7e7ac514df414_8e0faba3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (pas...
[ 90, 75 ]
[ null, null ]
[ 11, 15 ]
[ 39, 87 ]
2024-11-19T03:24:42.300712+00:00
1,547,845,085,000
64f68dd4a99c7379b701895f95de2f3c3c1bb180
3
{ "blob_id": "64f68dd4a99c7379b701895f95de2f3c3c1bb180", "branch_name": "refs/heads/master", "committer_date": 1547845085000, "content_id": "fdcca80439428508d9c139944dcb903b7ac3465a", "detected_licenses": [ "MIT" ], "directory_id": "9deb642bf370548fe00fdfbbd880a959e2937872", "extension": "py", "fi...
3.4375
stackv2
__author__ = "0016285: Kaddour Alnaasan" # Aufgabe 2 # read IBAN iban = input("Geben Sie Ihre IBAN ohne Lerrzeichnen: ") # Read country Code country_code = iban[0:2] # Test if IBAN courrect (Country code and Number) def is_iban(iban, country, char_num): while len(iban) != char_num: print("die", country...
41
28.15
64
13
386
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2086af4ca945b7a0_d81cf59a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.\nThis expression logs [sensitive data (private)](4) as clear text." ]
[ 27 ]
[ null ]
[ 44 ]
[ 48 ]
2024-11-19T03:35:13.998714+00:00
1,525,156,873,000
afd58861c748b656deab68690908d3f3597248a3
3
{ "blob_id": "afd58861c748b656deab68690908d3f3597248a3", "branch_name": "refs/heads/master", "committer_date": 1525156873000, "content_id": "16a18c7b66dff85c093a317f1844bce707934d4d", "detected_licenses": [ "MIT" ], "directory_id": "ab7a5fdc5375e63e2483ef29dfdb994b687da972", "extension": "py", "fi...
2.59375
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- ''' .. module:: _generator .. moduleauthor:: Julien Spronck .. created:: April 2018 ''' from jinja2 import Template def generate_file(publisher, rating=True, reviews=True, preptime=True, cooktime=True, difficulty=True): '''Generate a scraper file ...
113
27.24
75
13
770
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_4e949b09d87a5636_061e42d3", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 22 ]
[ null ]
[ 20 ]
[ 40 ]
2024-11-19T01:27:00.506302+00:00
1,503,002,882,000
3d59de74cc06700e66cf97f59ed4612acd3a6d9f
3
{ "blob_id": "3d59de74cc06700e66cf97f59ed4612acd3a6d9f", "branch_name": "refs/heads/master", "committer_date": 1503002882000, "content_id": "f4447f7dabc4a7bbd0edec36adb2db41787b983c", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "efe81a2e1897b83c2454a1d0517e9852568c0e4c", "extension": "p...
2.671875
stackv2
import h2 import socket import ssl import h2.connection import time import sys def determine_sent(sockhost, host, port, path): frames=grab_frames(sockhost, host,port, path) origin_sent=False for frame in frames: if frame[0]==12: origin_sent=True return origin_sent def get_url_conn(...
67
29.75
87
16
564
python
[{"finding_id": "codeql_py/insecure-protocol_cb5bf21d7123f98a_b38b63e8", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol...
1
true
[ "CWE-327" ]
[ "py/insecure-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.SSLContext](1)." ]
[ 22 ]
[ null ]
[ 9 ]
[ 16 ]
2024-11-19T01:27:03.354109+00:00
1,651,822,864,000
0354bbef01eb17546e87e76417c8b5c9026ae32d
2
{ "blob_id": "0354bbef01eb17546e87e76417c8b5c9026ae32d", "branch_name": "refs/heads/master", "committer_date": 1651822864000, "content_id": "ae3b2753a2d871cd954cad708865a61b484e06fa", "detected_licenses": [ "MIT" ], "directory_id": "b88fb1610f08db5c239446293e4f6c41acb27750", "extension": "py", "fi...
2.390625
stackv2
import os import tarfile import torch import torch.utils.data as data import numpy as np import h5py from PIL import Image from scipy import io from torchvision.datasets.utils import download_url DATASET_YEAR_DICT = { '2012': { 'url': 'http://host.robots.ox.ac.uk/pascal/VOC/voc2012/VOCtrainval_11-May-2012...
372
36.58
105
16
3,667
python
[{"finding_id": "codeql_py/tarslip_b4b541bcb9ff8ed6_d73f1ea6", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 338 ]
[ null ]
[ 9 ]
[ 12 ]
2024-11-19T01:38:14.198243+00:00
1,499,326,169,000
372d0741007c3f484f1a105fc833d31ed9b17b88
3
{ "blob_id": "372d0741007c3f484f1a105fc833d31ed9b17b88", "branch_name": "refs/heads/master", "committer_date": 1499326169000, "content_id": "d026198e108e0b228b8bdf19abb2000e5058aed8", "detected_licenses": [ "MIT" ], "directory_id": "9474c9ca9507b35216bfeb6a1caff204d27e88b1", "extension": "py", "fi...
2.546875
stackv2
''' @author: Rahul Tanwani @summary: A module to perform batch request processing. ''' import json from django.core.urlresolvers import resolve from django.http.response import HttpResponse, HttpResponseBadRequest,\ HttpResponseServerError from django.template.response import ContentNotRenderedError from django....
144
33.33
113
17
1,061
python
[{"finding_id": "codeql_py/stack-trace-exposure_d64f5417676eae4d_b007b30d", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 37 ]
[ null ]
[ 48 ]
[ 51 ]
2024-11-19T01:38:15.910149+00:00
1,657,140,795,000
bb92886bd9b32d5219c54da7692182236291e9aa
3
{ "blob_id": "bb92886bd9b32d5219c54da7692182236291e9aa", "branch_name": "refs/heads/master", "committer_date": 1657140795000, "content_id": "c8944ad1a29c8a0a874daf083213b95e4e08a626", "detected_licenses": [ "Apache-2.0" ], "directory_id": "1d42f73775b5e50ab17806ca99ad4479cccb25fa", "extension": "py"...
2.84375
stackv2
#!/usr/bin/env python3 # Copyright 2016 Netfishers # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law...
49
35.92
83
13
459
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_c978cae790c75433_5b926ae3", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 41 ]
[ null ]
[ 22 ]
[ 38 ]
2024-11-19T01:38:40.526749+00:00
1,594,825,602,000
3c18f58ff33356ec155200b018d6c177221bff0e
3
{ "blob_id": "3c18f58ff33356ec155200b018d6c177221bff0e", "branch_name": "refs/heads/master", "committer_date": 1594825602000, "content_id": "5927486e7146889458e7fc592b24a9739905cfb4", "detected_licenses": [ "MIT" ], "directory_id": "1aacf84f6c8106f04ea03da0a790bce33b22f8b2", "extension": "py", "fi...
2.625
stackv2
import requests import json from FirepowerFMC.Get_Token import get_access_token import urllib3 urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning) def get_access_policy(token=False): url = "https://fmcrestapisandbox.cisco.com/api/fmc_config/v1/domain/e276abec-e0f2-11e3-8169-6d9ed49b625f/policy/ac...
52
26.67
141
19
349
python
[{"finding_id": "codeql_py/request-without-cert-validation_fb36fb14b7927408_6acffeb7", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 14, 25 ]
[ null, null ]
[ 16, 24 ]
[ 46, 57 ]
2024-11-19T01:51:56.726491+00:00
1,644,071,346,000
c50b49bab62d3df3c04cb96812b6830d5c47baff
4
{ "blob_id": "c50b49bab62d3df3c04cb96812b6830d5c47baff", "branch_name": "refs/heads/master", "committer_date": 1644071346000, "content_id": "f112792036a8eb354e1a8ec80bf6b6acbc53a769", "detected_licenses": [ "MIT" ], "directory_id": "89d5dbdc6ad03fd0bb54fc83f39bb8b94f514e48", "extension": "py", "fi...
3.875
stackv2
print('any time if you want to exit the program just press "q"') from random import randint from time import sleep n = [] while True : name = input('Enter your name : ') if name == 'q' : print('the program has stoped!') sleep(2) break if name == ' ' : print('the program has s...
47
28.19
98
14
335
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_eca8f77bd1b426bb_734e0c7e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (priva...
[ 33, 36, 38 ]
[ null, null, null ]
[ 60, 19, 26 ]
[ 71, 63, 32 ]
2024-11-19T01:52:12.038523+00:00
1,623,818,205,000
b619112fa6173278658b0d0375bf9b1bfa64b345
3
{ "blob_id": "b619112fa6173278658b0d0375bf9b1bfa64b345", "branch_name": "refs/heads/main", "committer_date": 1623818205000, "content_id": "2d07e408a107abc7bf30ca995705956d49bcf4d3", "detected_licenses": [ "MIT" ], "directory_id": "7984ca81eadbdddaa88c5fe928bd9341391b7af6", "extension": "py", "file...
2.84375
stackv2
import os, re ### HTML patt_del_comment_html = re.compile(r'(<!--.*?-->)') # 删掉注释 patt_del_space_html = re.compile(r'(\s+)') # 删除多余的空格,只保留一个 ### CSS patt_del_comment_css = re.compile(r'(/[*].*?[*]/)') patt_del_space_css = re.compile(r'(\s+)') ### JS patt_del_comment_js = re.compile(r'(/[*].*?[*]/)') patt_del_space_j...
85
30.02
65
18
672
python
[{"finding_id": "codeql_py/bad-tag-filter_99fe757a0a29d043_e0739501", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression does not match comments containing newlines.", "remediation": "", "location": {"file_pat...
1
true
[ "CWE-116" ]
[ "py/bad-tag-filter" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression does not match comments containing newlines." ]
[ 4 ]
[ null ]
[ 38 ]
[ 50 ]
2024-11-19T02:04:42.955732+00:00
1,471,583,538,000
deaf31b6388404dfae4c73adab10baacf6e6c428
3
{ "blob_id": "deaf31b6388404dfae4c73adab10baacf6e6c428", "branch_name": "refs/heads/master", "committer_date": 1471583538000, "content_id": "624cd53f2be6e452a0c6b11dfe578453ed3e38ca", "detected_licenses": [ "MIT" ], "directory_id": "b136f6162b4c83116a826b37c2753fa29e904bf4", "extension": "py", "fi...
2.796875
stackv2
''' Futuwear python client The client's role is to connect to the Futuwear ''' from __future__ import print_function import bluetooth_handler as bt import sys from socketIO_client import SocketIO, LoggingNamespace import json, requests import hashlib socketServer = "futuwear.tunk.org" registerUrl = 'http://futuwe...
118
30.08
130
19
786
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_00f1762be204398e_7b29f039", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (id)](2) is used in a hashing algorithm (MD5) that is insecure." ]
[ 65 ]
[ null ]
[ 45 ]
[ 69 ]
2024-11-19T02:28:27.887614+00:00
1,572,905,431,000
83236cb9c79c4d71c9bb5a72e8f6d466f5b4c65a
2
{ "blob_id": "83236cb9c79c4d71c9bb5a72e8f6d466f5b4c65a", "branch_name": "refs/heads/master", "committer_date": 1572905431000, "content_id": "514a74d1e371529bbf3e8cdd67cd758536c65df5", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "336b3d6fb3f1c2dd6f37a6b52707d1bf16376ddd", "extension": "p...
2.40625
stackv2
import datetime import json import logging import requests import boto3 CONFIG_FILE = 'config.json' logger = logging.getLogger('main') logger.setLevel(logging.DEBUG) # debug logs from HTTP requests include the query params, # which may contain access tokens: suppress them. logging.getLogger("requests").setLevel(logg...
187
28.14
117
14
1,186
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9b3703cea3324ac2_c2e10a4e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 154 ]
[ null ]
[ 21 ]
[ 69 ]
2024-11-19T02:28:30.987779+00:00
1,636,547,144,000
edbc3651718e3649885d21fb25120086c361b95f
2
{ "blob_id": "edbc3651718e3649885d21fb25120086c361b95f", "branch_name": "refs/heads/main", "committer_date": 1636547144000, "content_id": "b90fea3dd6aef076a18e768614d712e44164ff60", "detected_licenses": [ "MIT" ], "directory_id": "dbdcf75a38b7f96c1f2b3e48a1eac9fe3ca71b12", "extension": "py", "file...
2.34375
stackv2
#!/usr/bin/env python import os import ssl import argparse from dsvpwa.server import VulnHTTPServer from dsvpwa.handlers import VulnHTTPRequestHandler BUILD_VER = os.getenv('BUILD_VER') or '0.0.1' BUILD_REV = os.getenv('BUILD_REV') or 'dev' def main(): parser = argparse.ArgumentParser(prog='DSVPWA', de...
56
36.02
100
13
533
python
[{"finding_id": "codeql_py/insecure-protocol_b0a00308bf88da33_e14b8f1c", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version SSLv3 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol...
1
true
[ "CWE-327" ]
[ "py/insecure-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Insecure SSL/TLS protocol version SSLv3 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.SSLContext](1)." ]
[ 41 ]
[ null ]
[ 28 ]
[ 31 ]
2024-11-19T02:28:41.323787+00:00
1,497,895,913,000
2d1a4c7059d0b6963e61045dc987cc183858e332
2
{ "blob_id": "2d1a4c7059d0b6963e61045dc987cc183858e332", "branch_name": "refs/heads/master", "committer_date": 1497896227000, "content_id": "ba8b2018a6421399c6f8e48260c7094b2c08c03b", "detected_licenses": [ "MIT" ], "directory_id": "c03d8fc76e2748f46b1b7e49750286c8648134de", "extension": "py", "fi...
2.46875
stackv2
from cryptography.hazmat.backends import default_backend from cryptography.hazmat.primitives import padding from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes from feedback import FeedbackForm from flask_bootstrap import Bootstrap from flask import Flask, request, redirect, url_for, render_tem...
76
26
83
16
501
python
[{"finding_id": "codeql_py/stack-trace-exposure_72326cdae00df5b1_7ec20d6e", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 23 ]
[ null ]
[ 34 ]
[ 56 ]
2024-11-19T02:28:42.007897+00:00
1,571,752,204,000
86fd329fdc7ff9db56fc5cecf03b602d8a34f37d
3
{ "blob_id": "86fd329fdc7ff9db56fc5cecf03b602d8a34f37d", "branch_name": "refs/heads/master", "committer_date": 1571752204000, "content_id": "f2552a07730068c3fd824541d1e448274f440377", "detected_licenses": [ "MIT" ], "directory_id": "9a1e1c523a4e7f186b02511f3e159e202be37549", "extension": "py", "fi...
2.671875
stackv2
#!/usr/bin/env python from __future__ import print_function from dnac_utils import dnac_token, create_url import requests import json # Entry point for program. if __name__ == '__main__': # get an authentication token. The username and password is obtained from an environment file token = dnac_token() h...
28
29.79
98
17
191
python
[{"finding_id": "codeql_py/request-without-cert-validation_baf88e5c6cc42d53_66e9fc1b", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 19 ]
[ null ]
[ 16 ]
[ 64 ]
2024-11-19T02:36:51.064642+00:00
1,502,685,185,000
67e37623a1d4b2a7a31ffc23d8ee5d21bc78e718
3
{ "blob_id": "67e37623a1d4b2a7a31ffc23d8ee5d21bc78e718", "branch_name": "refs/heads/master", "committer_date": 1502685185000, "content_id": "44f7e21e162923a8929a867578338f6e238ecb75", "detected_licenses": [ "Apache-2.0", "BSD-3-Clause", "MIT" ], "directory_id": "f62fd455e593a7ad203a5c268e23129...
2.6875
stackv2
""" (c) Copyright 2014,2015 Hewlett-Packard Development Company, L.P. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable l...
156
32.5
78
16
1,103
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_b4f6d2e8a29c9afb_0eed3b77", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 72 ]
[ null ]
[ 9 ]
[ 66 ]
2024-11-19T02:36:52.420257+00:00
1,619,446,077,000
4ab94c621734042f91f3bd778c550a238df7e8b4
2
{ "blob_id": "4ab94c621734042f91f3bd778c550a238df7e8b4", "branch_name": "refs/heads/master", "committer_date": 1619446077000, "content_id": "c9679c416ffdbe3cf5402f90acef28b25c6c3a8d", "detected_licenses": [ "MIT" ], "directory_id": "348d0304b6b49af0f3e231456c94db147a2b4cad", "extension": "py", "fi...
2.375
stackv2
# -*- coding: utf-8 -*- """ Resources below '/<api_base>/token' """ import os import logging from flask import request from flask_restful import Resource from flask_jwt_extended import jwt_refresh_token_required, create_access_token, create_refresh_token, get_jwt_identity from http import HTTPStatus from .. import se...
96
28.43
118
15
561
python
[{"finding_id": "codeql_py/log-injection_2065e7421d351e85_57c4c561", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
4
true
[ "CWE-117", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 60, 66, 70, 73 ]
[ null, null, null, null ]
[ 18, 27, 23, 18 ]
[ 57, 30, 26, 62 ]
2024-11-19T02:36:57.017496+00:00
1,522,098,631,000
bb43facbdd98ba3684758b060673ee776570fdf7
3
{ "blob_id": "bb43facbdd98ba3684758b060673ee776570fdf7", "branch_name": "refs/heads/master", "committer_date": 1522102741000, "content_id": "d9500641323a969e793607d33d06ce5b77d6db18", "detected_licenses": [ "MIT" ], "directory_id": "df5f7fbac5b07ea13c2dda0bcb57794e9f32ca14", "extension": "py", "fi...
3.078125
stackv2
# -*- coding: utf-8 -*- # @package: disciplina.py # @author: Guilherme N. Ramos (gnramos@unb.br) # # Funções de extração de informações de relatórios de Planejamento do Sistema # de Graduação da UnB (SIGRA). import re from sigra import utils def listagem(arquivo): '''Retorna um dicionário com as informaç...
93
34.6
79
19
866
python
[{"finding_id": "codeql_py/overly-large-range_4c1d57c4474fc1db_07a919a2", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 38 ]
[ null ]
[ 34 ]
[ 37 ]
2024-11-19T02:37:17.281785+00:00
1,578,453,801,000
81bde9581e0189908e1c5953c44890d1607411df
2
{ "blob_id": "81bde9581e0189908e1c5953c44890d1607411df", "branch_name": "refs/heads/master", "committer_date": 1578453801000, "content_id": "be6fab598e34182b733bfab2e0d5b97455b005d2", "detected_licenses": [ "MIT" ], "directory_id": "808f98a53e6afde67684195badee6cf630c69c08", "extension": "py", "fi...
2.4375
stackv2
from flask import Flask, jsonify, make_response, request, abort, redirect, send_file, render_template import logging import base64 import os import cv2 import sys localpath = sys.path[0].replace("/src","") sys.path.append(localpath) from src.emotion_recognition import process_image app = Flask(__name__) @app.route...
53
29.23
139
13
397
python
[{"finding_id": "codeql_py/flask-debug_898817e46f44972b_84dc6e88", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-022", "CWE-022" ]
[ "py/flask-debug", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 53, 36, 40 ]
[ null, null, null ]
[ 5, 15, 15 ]
[ 51, 29, 29 ]
2024-11-19T02:37:48.230372+00:00
1,556,641,034,000
4463515d985092577a59d51b7e116ad950c068da
3
{ "blob_id": "4463515d985092577a59d51b7e116ad950c068da", "branch_name": "refs/heads/master", "committer_date": 1556641034000, "content_id": "11030f936ed69a793b1646b52591a77b24bb4ca3", "detected_licenses": [ "MIT" ], "directory_id": "2c0e9f7e57b8b1fd56e42697eaf83208cc64007f", "extension": "py", "fi...
2.765625
stackv2
import arcgis.network as network import arcgis.geocoding as geocoding from arcgis.gis import * from arcgis.geometry import Point from arcgis.geocoding import geocode, reverse_geocode from arcgis.features.feature import FeatureSet, Feature import json import datetime import pandas as pd from flask import Flask import...
128
34.11
139
17
1,326
python
[{"finding_id": "codeql_py/stack-trace-exposure_9bda2ba20f0ffd05_f36b6e09", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-918" ]
[ "py/stack-trace-exposure", "py/partial-ssrf" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 122, 120 ]
[ null, null ]
[ 16, 13 ]
[ 53, 30 ]
2024-11-19T02:37:51.617291+00:00
1,691,594,614,000
0c9d19f8d919b7598819d0e6be83d393995c166a
2
{ "blob_id": "0c9d19f8d919b7598819d0e6be83d393995c166a", "branch_name": "refs/heads/master", "committer_date": 1691594614000, "content_id": "a2ebd2b9e8094e71c6dec594dd9ee52dda431229", "detected_licenses": [ "MIT" ], "directory_id": "979afc46ba685030d2780cdbb678d61d0af33f79", "extension": "py", "fi...
2.421875
stackv2
# -*- coding: utf-8 -*- from re import IGNORECASE from re import compile as re_compile HOST_REGEX = re_compile( # max length for domain name labels is 63 characters per RFC 1034 r'((?:[A-Z0-9](?:[A-Z0-9-]{0,61}[A-Z0-9])?\.)+)' r'(?:[A-Z0-9-]{2,63}(?<!-))\Z', IGNORECASE ) LITERAL_REGEX = re_compile( ...
27
23.78
72
8
306
python
[{"finding_id": "codeql_py/overly-large-range_21e4346e41aeedc8_d4b0d1c1", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-f\\].", "remediation": "", "lo...
2
true
[ "CWE-020", "CWE-1333" ]
[ "py/overly-large-range", "py/redos" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-f\\].", "This part of the regular expression may cause exponential backtracking on strings starting with '\"' and containing many repetitions of '\\\\013'." ]
[ 15, 24 ]
[ null, null ]
[ 11, 10 ]
[ 14, 85 ]
2024-11-19T02:49:10.227131+00:00
1,584,468,930,000
e4af8db854e642d55edde46ed0ec372c2d325c5c
3
{ "blob_id": "e4af8db854e642d55edde46ed0ec372c2d325c5c", "branch_name": "refs/heads/master", "committer_date": 1584468930000, "content_id": "07a40521eb3a97a7f5d84276f379f08f95a2c046", "detected_licenses": [ "Apache-2.0" ], "directory_id": "07c8401d4aea56e5627dc3225733ed67b49e550a", "extension": "py"...
3.015625
stackv2
""" Generate random images that compress better. By replacing the larger images with more compressable equivalents. """ from __future__ import absolute_import from __future__ import division from __future__ import print_function import os import sys import tempfile import tarfile import zipfile import PIL.Image im...
123
30.02
76
18
865
python
[{"finding_id": "codeql_py/tarslip_777fb8f11ad4ba18_544c1e60", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 85 ]
[ null ]
[ 7 ]
[ 10 ]
2024-11-19T02:49:12.225881+00:00
1,419,619,711,000
02d1b1f12dce2b4c63464b105a42a104702dde92
3
{ "blob_id": "02d1b1f12dce2b4c63464b105a42a104702dde92", "branch_name": "refs/heads/master", "committer_date": 1419619711000, "content_id": "e4f370de3b43eb18cd14fdb4d529b3da38457ac9", "detected_licenses": [ "MIT" ], "directory_id": "0d83051766ac4e6c2caf3d1b70be376a2ea1fc30", "extension": "py", "fi...
2.90625
stackv2
#!/usr/bin/python from BaseHTTPServer import BaseHTTPRequestHandler,HTTPServer from os import curdir, sep import cgi import RPi.GPIO as GPIO from time import sleep import logging import logging.handlers import sys #constants PORT_NUMBER = 8080 LOG_FILENAME = "/tmp/GarageDoorOpener.log" LOG_LEVEL = logging.INFO # Coul...
127
31.32
105
14
894
python
[{"finding_id": "codeql_py/path-injection_da055f9c6c1ffe78_dd39fe70", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 24 ]
[ null ]
[ 18 ]
[ 39 ]
2024-11-19T03:00:03.069834+00:00
1,611,509,477,000
ec4bf2ab89f2958f816102c23f760be8b103ff23
3
{ "blob_id": "ec4bf2ab89f2958f816102c23f760be8b103ff23", "branch_name": "refs/heads/main", "committer_date": 1611509477000, "content_id": "96abbfdc01506a05f45fc1fade836bba77c86e3b", "detected_licenses": [ "MIT" ], "directory_id": "473e4d4b6d2c7fd1c43a7e9e48a7fb22781e6b83", "extension": "py", "file...
2.625
stackv2
from django.db import models import hashlib # Account data model (Account) class Account(models.Model): # id (never change) id = models.models.AutoField(primary_key=True) # Account number (id) accountID = models.CharField(max_length=24) # Account nickname (name) accountName = models.CharFi...
93
27.94
88
26
590
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_eae7218de8b009ac_77b668c1", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 83 ]
[ null ]
[ 40 ]
[ 51 ]
2024-11-19T03:00:05.816609+00:00
1,668,791,456,000
d60bb933ea1cb94ce7c327983a025bb789dd4ced
2
{ "blob_id": "d60bb933ea1cb94ce7c327983a025bb789dd4ced", "branch_name": "refs/heads/master", "committer_date": 1668791456000, "content_id": "4f084130001a6d2f0f4236a127377b7a729a2799", "detected_licenses": [ "Apache-2.0" ], "directory_id": "0d0d833b154e78babc52388ff246617fe02ce4fd", "extension": "py"...
2.328125
stackv2
from datetime import datetime, timedelta import logging import time from typing import Tuple import flask from typing import List, Optional from implicitdict import ImplicitDict from . import webapp, basic_auth from .database import db, Query, QueryState logging.basicConfig() _logger = logging.getLogger('atproxy.ha...
92
32.62
113
19
683
python
[{"finding_id": "codeql_py/stack-trace-exposure_05ed22e3fc4794bf_6c146e0c", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 83 ]
[ null ]
[ 30 ]
[ 90 ]
2024-11-19T03:00:06.252739+00:00
1,507,667,564,000
e5de7f1141a036545cae5ca3f7a70c26d217e650
3
{ "blob_id": "e5de7f1141a036545cae5ca3f7a70c26d217e650", "branch_name": "refs/heads/master", "committer_date": 1507667564000, "content_id": "b90e740e481ee70ec80e4a58b4a2b3176b490c98", "detected_licenses": [ "MIT" ], "directory_id": "554c71ed615b4d541f24678bdd7de9a8d52b5310", "extension": "py", "fi...
2.78125
stackv2
# Created by Max Yurchenko on 07.10.2017 # email: joker0071911@gmail.com # feel free to ask any questions) # Copyright(C) 2017 from crypto import * from commonFunctions import * import os class Authorisation: users = {} def __init__(self): printOSinfo() input() self.parse_user_da...
56
29.86
83
16
387
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_ed5f56c2a6161eb0_a4b61f0e", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 55 ]
[ null ]
[ 30 ]
[ 65 ]
2024-11-19T03:00:14.649971+00:00
1,649,828,816,000
7c17c0a76fce75c9be12c9513a3aff70a6be343f
3
{ "blob_id": "7c17c0a76fce75c9be12c9513a3aff70a6be343f", "branch_name": "refs/heads/master", "committer_date": 1649828816000, "content_id": "00b0272a6c83fe145905bb6fac09056bd151af92", "detected_licenses": [ "Apache-2.0" ], "directory_id": "7ededf9636370f226f3153882ec0261b76bcf267", "extension": "py"...
2.609375
stackv2
#!/usr/bin/env python #-*- coding:utf-8; mode:python; indent-tabs-mode: nil; c-basic-offset: 2; tab-width: 2 -*- import os, os.path as path from collections import namedtuple from bes.fs.file_util import file_util class install(object): item = namedtuple('item', 'filename,dest_dir,mode') @classmethod def i...
22
27.27
90
13
161
python
[{"finding_id": "codeql_py/overly-permissive-file_24e9b024173423ae_e7b7bac9", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable." ]
[ 17 ]
[ null ]
[ 5 ]
[ 50 ]