added stringlengths 32 32 | created int64 1,236B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.03 | source stringclasses 1
value | text stringlengths 330 19.3k | num_lines int64 16 648 | avg_line_length float64 15.5 59.3 | max_line_length int64 37 179 | ast_depth int64 8 38 | length int64 102 3.79k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.11k 276k | sast_codeql_findings_count int64 1 33 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 33 | rule_ids listlengths 1 33 | confidences listlengths 1 33 | severities listlengths 1 33 | messages listlengths 1 33 | line_starts listlengths 1 33 | line_ends listlengths 1 33 | column_starts listlengths 1 33 | column_ends listlengths 1 33 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-19T00:44:26.148726+00:00 | 1,565,377,838,000 | cbaa271485d15efa74c8fd4ed67a55949faf765b | 3 | {
"blob_id": "cbaa271485d15efa74c8fd4ed67a55949faf765b",
"branch_name": "refs/heads/master",
"committer_date": 1565377838000,
"content_id": "1baf97b0b581515e2ffac3922d55fd995b031d1c",
"detected_licenses": [
"MIT"
],
"directory_id": "93da24d7b83ad02cfd9d19f80ec82230e4bb0484",
"extension": "py",
"fi... | 2.828125 | stackv2 | from datetime import datetime
import googlemaps
import os.path
import re
import xlwt
import yaml
# ---
# Init
# ---
book = xlwt.Workbook(encoding="utf-8")
sheet = book.add_sheet("Kilometers")
file_name_key = "key.txt"
file_name_addresses = "addresses.yaml"
file_name_distances = "distances.yaml"
file_name_data = "dat... | 236 | 27.18 | 149 | 24 | 1,628 | python | [{"finding_id": "codeql_py/redos_aabda4ffe66401dd_b9327e5b", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '0'.", "remediati... | 2 | true | [
"CWE-1333",
"CWE-1333"
] | [
"py/redos",
"py/redos"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '0'.",
"This part of the regular expression may cause exponential backtracking on strings starting with '>' and containing many repetitions of '0'."
] | [
86,
86
] | [
null,
null
] | [
29,
71
] | [
43,
85
] | |
2024-11-19T00:44:30.776272+00:00 | 1,590,606,484,000 | 96a1b6e56d22fb76d7ebb4a7c1392282c7209e5e | 2 | {
"blob_id": "96a1b6e56d22fb76d7ebb4a7c1392282c7209e5e",
"branch_name": "refs/heads/master",
"committer_date": 1590606484000,
"content_id": "555da7d09d627869152af6343d59e4f4d8c278d7",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "6ec33af027d34f3472add0d84e432aeaa0d54c7f",
"extension": "p... | 2.390625 | stackv2 | #! /usr/bin/env python
# -*- coding: utf-8 -*-
# S.D.G
"""
:mod:`lugito.connectors.irc`
======================================
Define an irc connector class
.. currentmodule:: lugito.connectors.irc
"""
# Imports
import ssl
import http
import socket
import logging
import threading
import phabricator
import lugito
fr... | 262 | 30.65 | 93 | 24 | 1,919 | python | [{"finding_id": "codeql_py/insecure-default-protocol_c9a1e1e35740d8a7_bb18d76b", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in... | 1 | true | [
"CWE-327"
] | [
"py/insecure-default-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used."
] | [
66
] | [
67
] | [
21
] | [
63
] | |
2024-11-18T23:05:23.497767+00:00 | 1,560,562,820,000 | b6f32e74b9a279f414e66ab048c7c67366185bc5 | 3 | {
"blob_id": "b6f32e74b9a279f414e66ab048c7c67366185bc5",
"branch_name": "refs/heads/master",
"committer_date": 1560562820000,
"content_id": "0ea0e2ab496dc9fa36d554994e3df809adc1dc3e",
"detected_licenses": [
"MIT"
],
"directory_id": "0eb0c08093e61aae6751fc8de2a49e67730a00f5",
"extension": "py",
"fi... | 3.109375 | stackv2 | #!/usr/bin/env python
#########################################################################################
# NAME: pwnage.py
#
# Website: https://github.com/zloether/pwnage
#
# Description: Checks passwords against the Have I Been Pwned database to see if
# the password has been compromised.
# htt... | 293 | 34.95 | 121 | 22 | 1,954 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_764dd41073f033f3_9fe195c0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 5 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-327"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text.",
"This expression logs [sensitive data (p... | [
132,
149,
207,
214,
128
] | [
null,
null,
null,
null,
null
] | [
15,
19,
23,
15,
24
] | [
55,
83,
67,
23,
47
] | |
2024-11-18T23:05:32.834950+00:00 | 1,555,023,187,000 | fec8598318a392e5bc448f17f62d16b1eb9b59d2 | 3 | {
"blob_id": "fec8598318a392e5bc448f17f62d16b1eb9b59d2",
"branch_name": "refs/heads/master",
"committer_date": 1555023187000,
"content_id": "b070769a5439c87ba41bc96d6c43cff2c7c80eca",
"detected_licenses": [
"MIT"
],
"directory_id": "2cd4d6dd4935447be37050d78578799759ccf98e",
"extension": "py",
"fi... | 2.5625 | stackv2 | import time
from http.server import BaseHTTPRequestHandler, HTTPServer
import urllib.parse as urlparse
import re
import logging
import argparse
import googletrans
import models
import regexps
logger = logging.getLogger(__name__)
class ServerState:
def __init__(self, model, seconds_per_request: float):
s... | 138 | 31.78 | 114 | 16 | 1,045 | python | [{"finding_id": "codeql_py/log-injection_9bf554eb67093e30_6fd88e4e", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 2 | true | [
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](1)."
] | [
57,
72
] | [
null,
null
] | [
25,
21
] | [
62,
45
] | |
2024-11-18T23:05:46.881723+00:00 | 1,633,686,232,000 | 680ae4e6757ec839888354c2204cc9e37e08c881 | 2 | {
"blob_id": "680ae4e6757ec839888354c2204cc9e37e08c881",
"branch_name": "refs/heads/main",
"committer_date": 1633686232000,
"content_id": "c43cc5eee1458a35a056ac19e9c7acc2df4714b4",
"detected_licenses": [
"MIT"
],
"directory_id": "58b838dfa2e130d6890098f4adc25ca5755a5e2f",
"extension": "py",
"file... | 2.484375 | stackv2 | # !/usr/bin/env python
# -*- coding: utf-8 -*-
# @Time : 2021/10/8 13:03
# @Author : AsiHacker
# @File : main
# @Software: PyCharm
# @notice : True masters always have the heart of an apprentice.
import os
import time
import psutil
from flask import Flask, jsonify
from help import check_proxy_ok
app = Flask(... | 81 | 32.27 | 179 | 15 | 925 | python | [{"finding_id": "codeql_py/command-line-injection_a298dce3ff3ce1e3_b2738ffc", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).\nThis command line depends on a [u... | 3 | true | [
"CWE-078",
"CWE-078",
"CWE-215"
] | [
"py/command-line-injection",
"py/command-line-injection",
"py/flask-debug"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This command line depends on a [user-provided value](1).\nThis command line depends on a [user-provided value](2).",
"This command line depends on a [user-provided value](1).\nThis command line depends on a [user-provided value](2).",
"A Flask app appears to be run in debug mode. This may allow an attacker to ... | [
41,
70,
81
] | [
null,
null,
null
] | [
15,
15,
5
] | [
18,
18,
52
] | |
2024-11-18T23:42:54.785049+00:00 | 1,633,978,605,000 | a70d83196df3a017e92586610fdafea1862da9c4 | 3 | {
"blob_id": "a70d83196df3a017e92586610fdafea1862da9c4",
"branch_name": "refs/heads/main",
"committer_date": 1633978605000,
"content_id": "1e24a4bcea7210feea2e64a1a837cdebd8fae380",
"detected_licenses": [
"MIT"
],
"directory_id": "bed6a24c88b61dd1d6b8cc45c7963d54789c11f8",
"extension": "py",
"file... | 2.578125 | stackv2 | from flask import Flask, render_template, request, Response, redirect, url_for
import sqlalchemy
from werkzeug.exceptions import abort
from . import sql
# This global variable is declared with a value of `None`, instead of calling
# `init_connection_engine()` immediately, to simplify testing. In general, it
# is saf... | 120 | 29.67 | 129 | 17 | 853 | python | [{"finding_id": "codeql_py/sql-injection_01decbcd5cc1ce09_ab9996bb", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown... | 1 | true | [
"CWE-089"
] | [
"py/sql-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This SQL query depends on a [user-provided value](1)."
] | [
95
] | [
null
] | [
13
] | [
98
] | |
2024-11-18T23:10:59.657913+00:00 | 1,625,432,181,000 | 07b0d2fac35fffb9cd7bd0042f771fb3c1659e6e | 3 | {
"blob_id": "07b0d2fac35fffb9cd7bd0042f771fb3c1659e6e",
"branch_name": "refs/heads/main",
"committer_date": 1625432181000,
"content_id": "7c1d1f684ebde366213f2fcfe65f8d73fe6633ab",
"detected_licenses": [
"MIT"
],
"directory_id": "dd60e4b7eac52e0f69802c7116a6814698046e00",
"extension": "py",
"file... | 2.65625 | stackv2 | # Author: Igor Ferreira
# License: MIT
# Version: 2.0.0
# Description: WiFi Manager for ESP8266 and ESP32 using MicroPython.
import machine
import network
import usocket
import ure
import utime
class WifiManager:
def __init__(self, ssid = 'WifiManager', password = 'wifimanager'):
self.wlan_sta = network... | 234 | 37.21 | 151 | 24 | 1,955 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_84705af7b849c051_a242292e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
118
] | [
null
] | [
64
] | [
80
] | |
2024-11-19T01:21:37.252335+00:00 | 1,573,728,393,000 | 47f2a38369e61b2314c6b3a17578061350660077 | 3 | {
"blob_id": "47f2a38369e61b2314c6b3a17578061350660077",
"branch_name": "refs/heads/master",
"committer_date": 1573728393000,
"content_id": "f20933936acd04644a2e8bdf215092f91f569a3c",
"detected_licenses": [
"MIT"
],
"directory_id": "1a65a7e690e57d7b30f125dbfb872ffb48eadf1b",
"extension": "py",
"fi... | 2.5625 | stackv2 | from multiprocessing.pool import ThreadPool
from lang import languages
from flask import Flask, jsonify, request
import os
from subprocess import run, PIPE, check_output
import time
from subprocess import Popen, PIPE
import time
from multiprocessing.pool import ThreadPool
from multiprocessing import Pool
import os
impo... | 129 | 30.96 | 97 | 18 | 963 | python | [{"finding_id": "codeql_py/path-injection_5acc66d6e4d4abf4_2af91ac7", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 3 | true | [
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
64,
69,
109
] | [
65,
70,
null
] | [
21,
19,
15
] | [
56,
79,
47
] | |
2024-11-19T01:21:41.178372+00:00 | 1,594,850,037,000 | 9d0f5b376d561827b1106efb8daa7bcb779614b2 | 4 | {
"blob_id": "9d0f5b376d561827b1106efb8daa7bcb779614b2",
"branch_name": "refs/heads/master",
"committer_date": 1594850037000,
"content_id": "964bdbac26527fddbcdd342eed660765e88321d3",
"detected_licenses": [
"MIT"
],
"directory_id": "0e61110cb32e384bcb1919602f198cc719f38d5d",
"extension": "py",
"fi... | 3.59375 | stackv2 | ###################################
# Such seventeen #
# Much prime #
# Very Doge #
###################################
# By C Shi <icydoge@gmail.com> #
###################################
import hashlib
GRID_SIZE = 4
DOOR_DIRECTIONS = {0: 'U', 1: 'D', 2: '... | 84 | 39.39 | 131 | 14 | 907 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c12f51ba111e9d98_b9e9ee14", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-327"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
50,
84,
65
] | [
null,
null,
null
] | [
15,
7,
9
] | [
62,
64,
37
] | |
2024-11-19T01:21:45.604931+00:00 | 1,646,140,600,000 | 279aa59692d9a22ee50f8003dcbd2f3170479bf3 | 4 | {
"blob_id": "279aa59692d9a22ee50f8003dcbd2f3170479bf3",
"branch_name": "refs/heads/master",
"committer_date": 1646140600000,
"content_id": "0e96d9590260937b0a6ee9c66f579267f9ec0a43",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "4dd07a2ec8719d809f3a3f6ceeff00fff658cb34",
"extension": "p... | 4.25 | stackv2 | import datetime
class Employee:
""" Controls the wage of any employee """
def __init__(self, name, fixed_salary):
""" constructor - executing when creating a new Employee object
:param name : name of the Employee
:param fixed_salary : the monthly fixed salary
"""
self.... | 102 | 33.27 | 96 | 15 | 802 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fa7c009d6c4dd7be_92eefcba", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 5 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (p... | [
26,
74,
86,
87,
91
] | [
null,
null,
null,
null,
null
] | [
15,
20,
8,
7,
8
] | [
66,
76,
70,
69,
70
] | |
2024-11-19T01:21:46.712159+00:00 | 1,549,362,399,000 | a3836bb3d48713a44939eb113eef3c2003a208d2 | 3 | {
"blob_id": "a3836bb3d48713a44939eb113eef3c2003a208d2",
"branch_name": "refs/heads/master",
"committer_date": 1549362399000,
"content_id": "e57859b472ae05630358efb235025d920d6b9bd6",
"detected_licenses": [
"MIT"
],
"directory_id": "b56b31a2e4d9bcb8d98dd862385507cc60a0817e",
"extension": "py",
"fi... | 2.9375 | stackv2 | import os
import shutil
import tarfile
import argparse
from datasets.OnlineDataset import OnlineDataset
class PascalVocDataset(OnlineDataset):
""" This dataset contains the Pascal VOC 2006 challenge database which consists over
2618 images of ten categories from http://host.robots.ox.ac.uk/pascal/VOC/d... | 61 | 38.97 | 117 | 13 | 501 | python | [{"finding_id": "codeql_py/tarslip_11bba16e4f6a20c2_1a03eb8c", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
39
] | [
null
] | [
9
] | [
12
] | |
2024-11-19T01:21:51.525850+00:00 | 1,545,841,377,000 | a9d5e7c74f9760b6f28ce033621c11a7955acb26 | 3 | {
"blob_id": "a9d5e7c74f9760b6f28ce033621c11a7955acb26",
"branch_name": "refs/heads/master",
"committer_date": 1545841377000,
"content_id": "6388e1bb7aa54267ef2a2a179c563b12dec2f4ca",
"detected_licenses": [
"Unlicense"
],
"directory_id": "c4d75dbf784f420bc8961b466207a0b5f699eda1",
"extension": "py",... | 2.765625 | stackv2 | import hashlib
import argon2
import sys
from time import sleep
import subprocess
import platform
import json
def sha000(password, circles = 1, type = 'argon2'):
'''
Some defence from rainbow tables. Argon2 is preferable.
'''
if type == 'argon2':
arg = argon2.low_level.hash_secret(
password.encode(), hashli... | 74 | 22.58 | 87 | 21 | 507 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_eaa0a19c30fabc61_6cc57ad2", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computational... | [
16,
25
] | [
null,
null
] | [
39,
33
] | [
56,
50
] | |
2024-11-19T00:11:40.491936+00:00 | 1,611,879,518,000 | 029d46738a1b5947014cc3e9d23bbbb743b93663 | 2 | {
"blob_id": "029d46738a1b5947014cc3e9d23bbbb743b93663",
"branch_name": "refs/heads/main",
"committer_date": 1611879518000,
"content_id": "4442a4aba5531dbf38328fae5464ef1e9b75479f",
"detected_licenses": [
"MIT"
],
"directory_id": "c5f7f61ceeac043753a4c04c4b5f87cbe49f2a93",
"extension": "py",
"file... | 2.359375 | stackv2 | from flask import Flask
from flask import render_template, redirect, request
import requests
from decouple import config
app = Flask(__name__)
links = {
"BR1": "br1.api.riotgames.com",
"EUN1": "eun1.api.riotgames.com",
"EUW1": "euw1.api.riotgames.com",
"JP1": "jp1.api.riotgames.com",
"KR": "kr.api.... | 70 | 29.14 | 78 | 16 | 613 | python | [{"finding_id": "codeql_py/flask-debug_b7f6e0d3c8f940fc_b7bcf180", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-918",
"CWE-918"
] | [
"py/flask-debug",
"py/partial-ssrf",
"py/partial-ssrf"
] | [
"HIGH",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Part of the URL of this request depends on a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
70,
51,
54
] | [
null,
null,
null
] | [
5,
9,
16
] | [
35,
43,
50
] | |
2024-11-19T00:11:51.348087+00:00 | 1,561,109,298,000 | fbd79b0cde52ab4e3f698e0dbf14942207d09384 | 2 | {
"blob_id": "fbd79b0cde52ab4e3f698e0dbf14942207d09384",
"branch_name": "refs/heads/master",
"committer_date": 1561109298000,
"content_id": "9a70af9e131e06ec4a1fb1599386effb6482bf10",
"detected_licenses": [
"MIT"
],
"directory_id": "974a6dea92d274b5c19de6c3bdcaef3ff0cfdb09",
"extension": "py",
"fi... | 2.34375 | stackv2 | #!/usr/bin/python
import os
import socket
import re
import sys
import subprocess
import datetime
import getpass
def handle_mssql(username, password):
try:
install_package("pyodbc")
import pyodbc
pyodbc.connect("UID=" + username + ";PWD=" + password)
# TODO fetch native driver and f... | 199 | 30.33 | 153 | 19 | 1,500 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_3f374cba031eeb85_f7460a74", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
185
] | [
null
] | [
12
] | [
35
] | |
2024-11-19T01:02:20.363482+00:00 | 1,608,694,848,000 | 010deb391b77119f011e99971161909c59020203 | 2 | {
"blob_id": "010deb391b77119f011e99971161909c59020203",
"branch_name": "refs/heads/master",
"committer_date": 1608694848000,
"content_id": "99bcca165687915ffec44ee34c97063a85f51aa9",
"detected_licenses": [
"MIT"
],
"directory_id": "8dc7902014a01cce4220cde2b7bd5dd8044251b4",
"extension": "py",
"fi... | 2.46875 | stackv2 | from flask import render_template, flash, redirect, url_for, request, g, jsonify
from flask_login import current_user, login_user, login_required, logout_user
from app import app, db
from app.models import User, Station
from app.forms import LoginForm, RegistrationForm, EditProfileForm
from werkzeug.urls import url_par... | 107 | 36.05 | 116 | 16 | 851 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_472e9d48033471e9_34b78a67", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 4 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-918"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/partial-ssrf"
] | [
"HIGH",
"HIGH",
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
84,
94,
96,
95
] | [
null,
null,
null,
null
] | [
15,
15,
15,
20
] | [
23,
20,
23,
39
] | |
2024-11-19T01:02:22.899081+00:00 | 1,601,519,647,000 | 6dc97cc548b04c73d76de3844a85a1e232376289 | 2 | {
"blob_id": "6dc97cc548b04c73d76de3844a85a1e232376289",
"branch_name": "refs/heads/master",
"committer_date": 1601519647000,
"content_id": "fc26b334dbc08ae1181cf0d49a51e0521d4f157c",
"detected_licenses": [
"MIT"
],
"directory_id": "41d51ae4bf8f487a34891ea76d9f71eded069191",
"extension": "py",
"fi... | 2.34375 | stackv2 | import os
import secrets
from flask import render_template, url_for, flash, redirect, abort,request
from . import main
from .forms import RegistrationForm, LoginForm, UpdateAccountForm, PostForm, CommentsForm
from ..models import User, Post, Comment,db
from flask_login import login_user, current_user, logout_user, logi... | 171 | 34.58 | 110 | 16 | 1,340 | python | [{"finding_id": "codeql_py/url-redirection_d5a4ec35f18c7605_ac45bb72", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
48
] | [
null
] | [
29
] | [
38
] | |
2024-11-19T00:13:42.673308+00:00 | 1,479,856,312,000 | 349b4a2bd4a44ee705161711cea658db7552c1dc | 3 | {
"blob_id": "349b4a2bd4a44ee705161711cea658db7552c1dc",
"branch_name": "refs/heads/master",
"committer_date": 1479856312000,
"content_id": "bef1f3df4c545f0c9407bfc7d1bcd258f8434447",
"detected_licenses": [
"MIT"
],
"directory_id": "7469f1dbafc9a0d8d6f9e7788f95ec3bec0d44a1",
"extension": "py",
"fi... | 2.890625 | stackv2 | import json
import urllib2
import os
HEADER = '\033[95m'
OKBLUE = '\033[94m'
OKGREEN = '\033[92m'
WARNING = '\033[93m'
FAIL = '\033[91m'
ENDC = '\033[0m'
BOLD = '\033[1m'
UNDERLINE = '\033[4m'
WHITE = '\033[97m'
inputURL = ""
version = "2.0"
release_date = "July 26th, 2016"
path = "/Users/ianthompson/Music/youtube-dl... | 127 | 23.64 | 125 | 16 | 865 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_240ec812b2ce285d_c48c1120", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [http://www.youtube.com](1) may be at an arbitrary posi... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"The string [http://www.youtube.com](1) may be at an arbitrary position in the sanitized URL.",
"The string [https://www.youtube.com](1) may be at an arbitrary position in the sanitized URL."
] | [
94,
94
] | [
null,
null
] | [
8,
48
] | [
44,
85
] | |
2024-11-19T01:51:56.345982+00:00 | 1,623,089,516,000 | 896f3d818c3fb3325087e396ba37186b45896e42 | 3 | {
"blob_id": "896f3d818c3fb3325087e396ba37186b45896e42",
"branch_name": "refs/heads/master",
"committer_date": 1623089516000,
"content_id": "bddeef845bcbfa482dc03a6b6100d4ff7c83dc4b",
"detected_licenses": [
"MIT"
],
"directory_id": "a27976a187ab51d08b536f98140fef316092a049",
"extension": "py",
"fi... | 2.515625 | stackv2 | import os
from pathlib import Path
from typing import Optional
from pydantic import BaseSettings as Settings, conint
from pydantic import EmailStr, validator, DirectoryPath
from jinja2 import Environment, FileSystemLoader
from fastapi_mail.errors import TemplateFolderDoesNotExist
class ConnectionConfig(Settings):
... | 55 | 30.45 | 97 | 14 | 391 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_49ac79cc65af4db5_b5195331", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
44
] | [
null
] | [
24
] | [
68
] | |
2024-11-19T00:55:24.603572+00:00 | 1,552,942,513,000 | e55b2e9f5e5c427d2c24693db65f87509deda3e7 | 3 | {
"blob_id": "e55b2e9f5e5c427d2c24693db65f87509deda3e7",
"branch_name": "refs/heads/master",
"committer_date": 1552942513000,
"content_id": "111889107f93ff0e4f6502988232c61385b75f59",
"detected_licenses": [
"MIT"
],
"directory_id": "60bdd51c36855d4c5ddcefaaa73859c0b8347f0d",
"extension": "py",
"fi... | 2.59375 | stackv2 | # Thanks [https://github.com/jesparza/peepdf]
# Thanks [https://stackoverflow.com/questions/10220497/extract-javascript-from-malicious-pdf]
# Thanks [https://stackoverflow.com/questions/29342542/how-can-i-extract-a-javascript-from-a-pdf-file-with-a-command-line-tool]
# Version 1.0
# Date 03.2019
# USAGE
# python extrac... | 47 | 29.06 | 127 | 14 | 469 | python | [{"finding_id": "codeql_py/overly-large-range_a57bafeb259db9ff_d87cada0", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
42
] | [
null
] | [
58
] | [
61
] | |
2024-11-19T00:55:29.950529+00:00 | 1,389,236,815,000 | 017e7864c91afb14c44df5dc64d49c563bd19c27 | 3 | {
"blob_id": "017e7864c91afb14c44df5dc64d49c563bd19c27",
"branch_name": "refs/heads/master",
"committer_date": 1389236815000,
"content_id": "fba3c5d836d6a5d012255e13dc8fcfdf6ba063c5",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "724f4a8aab0f3853b7cbe792ef5050d9299bc73f",
"extension": "py"... | 2.90625 | stackv2 | """Utility functions
Including functions of get/getbulk/walk/set of snmp for three versions
"""
import imp
import re
import logging
def load_module(mod_name, path, host=None, credential=None):
""" Load a module instance.
:param str mod_name: module name
:param str path: directory of the module
:pa... | 160 | 29.06 | 79 | 17 | 1,109 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_3a14055f7494ae4e_611429f4", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
46
] | [
null
] | [
9
] | [
69
] | |
2024-11-19T01:39:55.548213+00:00 | 1,586,696,969,000 | ade8edbb71eb7325971ab404cc848eeb8d5988e1 | 2 | {
"blob_id": "ade8edbb71eb7325971ab404cc848eeb8d5988e1",
"branch_name": "refs/heads/master",
"committer_date": 1586696969000,
"content_id": "c49d7c026054a433d0b27ea65a3e4a7ad9f29b83",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "8cced97a617f980cca7b5e1342ac15e2ffbf8d33",
"extension": "py"... | 2.3125 | stackv2 | from .auth import Auth
import json
import requests
class Admin():
def __init__(self, host, port=4002):
self._host = host
self._port = port
self._base_path = 'http://{0}/api/v2'
def get_user_list(self, token, host=None, port=None):
if host is None:
base_path... | 321 | 36.97 | 98 | 14 | 2,771 | python | [{"finding_id": "codeql_py/request-without-cert-validation_27806ae2ce0d9d2c_94199951", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 15 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"... | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
21,
41,
62,
83,
104,
125,
146,
166,
186,
207,
228,
248,
268,
289,
310
] | [
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null
] | [
17,
17,
17,
17,
17,
17,
17,
17,
17,
17,
17,
17,
17,
17,
17
] | [
97,
97,
97,
97,
97,
97,
97,
97,
97,
97,
97,
97,
97,
97,
97
] | |
2024-11-19T01:40:02.598274+00:00 | 1,599,013,545,000 | 55c2cae7507deeb3cddbef87d492bd4c61173d1f | 2 | {
"blob_id": "55c2cae7507deeb3cddbef87d492bd4c61173d1f",
"branch_name": "refs/heads/master",
"committer_date": 1599013545000,
"content_id": "3af8dc2109e960b5041324c76f6bf952f64fe5b1",
"detected_licenses": [
"MIT"
],
"directory_id": "a7ad710f17572060bdd660e37899b3640f4938d5",
"extension": "py",
"fi... | 2.453125 | stackv2 | import getopt
import sys
import uuid
import pwd
import jinja2
import random
import os
import string
def randomString(stringLength=16):
letters = string.ascii_lowercase
return ''.join(random.choice(letters) for i in range(stringLength))
def read_conf(f):
ret = {}
f = open(f, "r")
lines = f.readline... | 158 | 27.21 | 92 | 17 | 1,127 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_050bcbfc31511ce5_16f783b5", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 4 | true | [
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially... | [
126,
135,
144,
114
] | [
null,
null,
null,
null
] | [
20,
20,
20,
20
] | [
48,
48,
48,
48
] | |
2024-11-18T23:43:31.401427+00:00 | 1,503,229,658,000 | 939afc2e06896bca60579ac1997884d157b2e72d | 2 | {
"blob_id": "939afc2e06896bca60579ac1997884d157b2e72d",
"branch_name": "refs/heads/master",
"committer_date": 1503229658000,
"content_id": "e4493e2d07fa78e072fa3ed3e23d5e33556e3fac",
"detected_licenses": [
"MIT"
],
"directory_id": "b0449aaa4e90df7d5e0b8e7146f0305b71e78433",
"extension": "py",
"fi... | 2.40625 | stackv2 | import time
import hmac
import hashlib
import urllib
import requests
class Connection:
def __init__(self, api_key='', api_secret=''):
self.api_key = api_key
self.api_secret = api_secret
def __call__(self, command, args={}):
nonce = str(int(time.time()*1000))
method_set = 'accou... | 19 | 36.84 | 102 | 15 | 177 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_12a729cb4048b35e_4509feba", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
18
] | [
null
] | [
54
] | [
74
] | |
2024-11-19T00:32:58.146498+00:00 | 1,614,525,190,000 | 077389799ce1441e08f94fb5dcc1f13a15340333 | 4 | {
"blob_id": "077389799ce1441e08f94fb5dcc1f13a15340333",
"branch_name": "refs/heads/master",
"committer_date": 1614525190000,
"content_id": "35815a796470cf70e8a18f3e2d7284f078aff172",
"detected_licenses": [
"MIT"
],
"directory_id": "208d1f3b5672785f896d0ebddb3716d671aadfda",
"extension": "py",
"fi... | 3.8125 | stackv2 | import string
import random
pass_string = ""
pass_length = None
pass_count = None
max_pass_length = 60
max_pass_count = 30
lowercase = None
uppercase = None
digits = None
pass_types = None
add_space = "-------\n"
# ask user the length of the password
while True:
try:
# ask the user about password length
... | 60 | 32.23 | 138 | 16 | 437 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ddd5c4d33f68b082_dcbbcc8a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
56
] | [
null
] | [
11
] | [
51
] | |
2024-11-19T00:25:36.816111+00:00 | 1,552,183,417,000 | 84900912484edfd9b964d72f9ef4a4f65e3cea29 | 3 | {
"blob_id": "84900912484edfd9b964d72f9ef4a4f65e3cea29",
"branch_name": "refs/heads/master",
"committer_date": 1552183417000,
"content_id": "189c5b3c2c7859084e775daf3d4de7deef4fab76",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "fd132ba890e6f8b98d2139e366f6687fe70b7171",
"extension": "p... | 2.71875 | stackv2 | import logging
import os
import tarfile
import zipfile
from prvsnlib.context import context
from prvsnlib.utils.file import mkdir_p, chown
class UnarchiveAction:
EXTRACT = 'extract'
def unarchive(*args, **kwargs):
if args[0].endswith('.zip'):
unzip(*args, **kwargs)
elif args[0].endswith('.tar.g... | 60 | 24.02 | 77 | 14 | 347 | python | [{"finding_id": "codeql_py/tarslip_d598ea1a01f4509b_6dffb2f5", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
55
] | [
null
] | [
13
] | [
16
] | |
2024-11-19T01:02:54.896851+00:00 | 1,586,354,446,000 | 8d42c173b3608920a4682737a2184f9f0d8b83c7 | 3 | {
"blob_id": "8d42c173b3608920a4682737a2184f9f0d8b83c7",
"branch_name": "refs/heads/master",
"committer_date": 1586354446000,
"content_id": "e0269e339485cc11d01085458123829d1220c645",
"detected_licenses": [
"MIT"
],
"directory_id": "79301a8c17f46924c45838c4c2496e7e898d9a5a",
"extension": "py",
"fi... | 2.53125 | stackv2 | import requests
from requests.auth import HTTPBasicAuth
from dnac_config import DNAC_IP, DNAC_PORT, DNAC_USER, DNAC_PASSWORD
from DNA_Token import get_auth_token
def get_devices():
token = get_auth_token() # Get a Token
url = "https://10.1.100.10/api/v1/network-device" #Network Device endpoint
hdr = {'x-auth-token... | 20 | 35.85 | 86 | 9 | 185 | python | [{"finding_id": "codeql_py/request-without-cert-validation_ccdbaef0c3e461a2_59a21310", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
10
] | [
null
] | [
9
] | [
53
] | |
2024-11-19T00:16:11.187560+00:00 | 1,611,746,674,000 | 6c2461712d05c7e82a7b45801236b7f6f55068e4 | 3 | {
"blob_id": "6c2461712d05c7e82a7b45801236b7f6f55068e4",
"branch_name": "refs/heads/master",
"committer_date": 1611746674000,
"content_id": "f58d1611f79e0f03ff4f47e333dc08e3efe63479",
"detected_licenses": [
"MIT"
],
"directory_id": "27cf6c066ae74754939c9ce46285613922021661",
"extension": "py",
"fi... | 2.765625 | stackv2 | """Generate the menu items."""
import configparser
import json
import os
from pathlib import Path
import re
from typing import Text
import xml.etree.ElementTree as et
from xml.dom import minidom
import shutil
import logging
def add_menu(installdir: Path, name: Text) -> None:
"""Add a submenu to 'VNM' menu.
Pa... | 228 | 36.37 | 118 | 18 | 2,060 | python | [{"finding_id": "codeql_py/overly-permissive-file_cea97a0ad1f8c5b6_f1bb8d59", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 3 | true | [
"CWE-732",
"CWE-732",
"CWE-732"
] | [
"py/overly-permissive-file",
"py/overly-permissive-file",
"py/overly-permissive-file"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable.",
"Overly permissive mask in chmod sets file to world readable.",
"Overly permissive mask in chmod sets file to world readable."
] | [
67,
130,
172
] | [
null,
null,
null
] | [
5,
9,
9
] | [
31,
38,
38
] | |
2024-11-19T00:28:26.160060+00:00 | 1,486,232,795,000 | e30122fe64e454aac81b9c2d55a9a490bda0ae6c | 3 | {
"blob_id": "e30122fe64e454aac81b9c2d55a9a490bda0ae6c",
"branch_name": "refs/heads/master",
"committer_date": 1486232795000,
"content_id": "037e329ab3516d81c23761f2ac8528d86bebca36",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "f61b0a13215511a545ca2c4ce0def00fe101157f",
"extension": "py"... | 2.5625 | stackv2 | import requests
from Queue import Queue
import threading
import argparse
import re
requests.packages.urllib3.disable_warnings()
inputFile = ""
outputFile= ""
thread = ""
def banner():
print ""
print ""
print "Haci Burtay"
print "Twitter : @haciburtay"
print "www.burtay.org"
print "admin@burta... | 87 | 24.05 | 96 | 14 | 626 | python | [{"finding_id": "codeql_py/request-without-cert-validation_ef72a3aca415e509_34a82c4b", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
60
] | [
null
] | [
24
] | [
82
] | |
2024-11-19T00:28:42.512485+00:00 | 1,674,036,633,000 | 2282e8b88781a162700d0b2593f8dd47c8da9c7c | 3 | {
"blob_id": "2282e8b88781a162700d0b2593f8dd47c8da9c7c",
"branch_name": "refs/heads/master",
"committer_date": 1674036633000,
"content_id": "5dbb431d27d275fa10d004c653641c1c1613012c",
"detected_licenses": [
"MIT"
],
"directory_id": "33be4b8a076a83adb73ff6b267d8135dbbdd16fc",
"extension": "py",
"fi... | 3.1875 | stackv2 | #!/usr/bin/env python3
import ftplib
import multiprocessing
def brute_force(ip_address,user,password):
ftp = ftplib.FTP(ip_address)
try:
print("Testing user {}, password {}".format(user, password))
response = ftp.login(user,password)
if "230" in response and "access granted" in respons... | 32 | 31.22 | 68 | 16 | 219 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f614e331bbea2da8_287bd852", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
9,
13
] | [
null,
null
] | [
15,
19
] | [
68,
58
] | |
2024-11-19T01:30:48.546974+00:00 | 1,574,760,270,000 | 4095aa7453f124167c979970e6e98db3df0c4a50 | 3 | {
"blob_id": "4095aa7453f124167c979970e6e98db3df0c4a50",
"branch_name": "refs/heads/master",
"committer_date": 1574760270000,
"content_id": "fd5bf5633c714e593947dad1e155bb12baf8b79c",
"detected_licenses": [
"MIT"
],
"directory_id": "4df2f762571ea18f0e1c8d1c161e5f007ed03e48",
"extension": "py",
"fi... | 2.640625 | stackv2 | # -*- coding: utf-8 -*-
from __future__ import print_function # для единого кода Python2, Python3
__author__ = 'dontsov'
import os
import sys
import argparse
from werkzeug import serving
from flask import Flask, request, send_file
import random
import string
import time
try:
if sys.version_info >= (3, 0):
... | 119 | 29.24 | 112 | 13 | 960 | python | [{"finding_id": "codeql_py/reflective-xss_f480a53960136e1d_69e39434", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 6 | true | [
"CWE-079",
"CWE-022",
"CWE-022",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/reflective-xss",
"py/path-injection",
"py/path-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry... | [
70,
54,
77,
56,
69,
75
] | [
null,
null,
null,
null,
null,
null
] | [
12,
15,
26,
25,
21,
21
] | [
15,
35,
46,
48,
41,
41
] | |
2024-11-19T01:54:55.437819+00:00 | 1,442,755,469,000 | f70828727d03425275fccdca6d23f4fa1b0507ea | 3 | {
"blob_id": "f70828727d03425275fccdca6d23f4fa1b0507ea",
"branch_name": "refs/heads/master",
"committer_date": 1442755469000,
"content_id": "edbae760e891fb3b6104e8185cee4f27094a9442",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "5d8a86c89452d1a6f44491bff837c98e12980290",
"extension": "py"... | 2.515625 | stackv2 | __author__ = 'Duc'
# all the imports
import sqlite3
from flask import Flask, request, session, g, redirect, url_for, \
abort, render_template, flash
from contextlib import closing
# configuration
DATABASE = 'flaskr.db'
DEBUG = True
SECRET_KEY = 'development key'
USERNAME = 'admin'
PASSWORD = 'default'
# appl... | 110 | 26.39 | 91 | 14 | 718 | python | [{"finding_id": "codeql_py/sql-injection_f159eb27deadf5ec_262007a3", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown... | 1 | true | [
"CWE-089"
] | [
"py/sql-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This SQL query depends on a [user-provided value](1)."
] | [
98
] | [
null
] | [
24
] | [
88
] | |
2024-11-19T01:55:00.632673+00:00 | 1,683,328,779,000 | 171d24eb2dbca1043d591b1a03013bd78d65611d | 3 | {
"blob_id": "171d24eb2dbca1043d591b1a03013bd78d65611d",
"branch_name": "refs/heads/master",
"committer_date": 1683329111000,
"content_id": "583bbde68a00338ae5691e21089e24efba75f783",
"detected_licenses": [
"MIT"
],
"directory_id": "6b43d43b8c0dbdb94fbd9146a24c91997bd3897b",
"extension": "py",
"fi... | 2.828125 | stackv2 | """
All function in this module take and return :class:`bytes`
"""
import sys
from os import urandom as random_bytes
from struct import pack
from base64 import b64decode
from Cryptodome.Hash import MD5, SHA1, HMAC
from Cryptodome.PublicKey.RSA import import_key as rsa_import_key, construct as rsa_construct
from Crypto... | 106 | 30.66 | 93 | 14 | 1,002 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_efc950a60b5541fb_238ae15e", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 4 | true | [
"CWE-327",
"CWE-327",
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
52,
61,
73,
88
] | [
null,
null,
null,
null
] | [
12,
12,
18,
12
] | [
60,
50,
64,
63
] | |
2024-11-19T02:01:08.535358+00:00 | 1,580,223,218,000 | b01f58c24c875e15bbb416bbc2a373c7c3e6ebbf | 3 | {
"blob_id": "b01f58c24c875e15bbb416bbc2a373c7c3e6ebbf",
"branch_name": "refs/heads/master",
"committer_date": 1580223218000,
"content_id": "e4e877d744c7407726d4c74e17ef8a00458c70bf",
"detected_licenses": [
"MIT"
],
"directory_id": "f030fdd28cf77402096dfb7073cba5fbc26998ec",
"extension": "py",
"fi... | 2.640625 | stackv2 | """
bokehadauth.py, when hooked into Bokeh server, will require Active Directory login by users.
Currently, it expects the environment variables AD_SERVER and AD_DOMAIN to be set correctly.
This module is meant to be specified as argument to a bokeh server.
bokeh serve --auth-module=bokehadauth.py --cookie-secret YOUR... | 46 | 33.57 | 92 | 15 | 335 | python | [{"finding_id": "codeql_py/url-redirection_79bebb54f24a8512_a52cfed1", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
42
] | [
null
] | [
27
] | [
57
] | |
2024-11-19T00:40:23.095099+00:00 | 1,604,709,439,000 | 48cf79c15f8f9104f831a17b10b479c9c43f5205 | 3 | {
"blob_id": "48cf79c15f8f9104f831a17b10b479c9c43f5205",
"branch_name": "refs/heads/master",
"committer_date": 1604709439000,
"content_id": "6c983260834a721cfabc9d879f383808a4ba549c",
"detected_licenses": [
"MIT"
],
"directory_id": "3243095573cbd3d5b1a2493c6db6a76c80524df2",
"extension": "py",
"fi... | 3.109375 | stackv2 | import re
def clean_text(text, normalize_case=False, normalize_whitespace=True, remove_uris=True, blacklist_regex="non_alpha_numeric_punct"):
"""Clean text to prepare for training and inference.
Args:
text: the text to clean
"""
if blacklist_regex is not None:
if blacklist_regex == "... | 27 | 33.3 | 131 | 12 | 230 | python | [{"finding_id": "codeql_py/overly-large-range_bda08a688bb91e37_e3781f2c", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with 1-9 in the same character class, and overlaps with A-Z in ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with 1-9 in the same character class, and overlaps with A-Z in the same character class, and is equivalent to \\[)*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
13
] | [
null
] | [
56
] | [
59
] | |
2024-11-19T00:40:25.366941+00:00 | 1,612,309,286,000 | a22f9a960a4669d33aabc339131ae703ee9d833f | 3 | {
"blob_id": "a22f9a960a4669d33aabc339131ae703ee9d833f",
"branch_name": "refs/heads/master",
"committer_date": 1612309468000,
"content_id": "6c8f8244c8460cf5acb4e37e8f06fee0512c8005",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "40958222c3222c2cf23d0b8d70e4b3c63f241a6c",
"extension": "py"... | 2.59375 | stackv2 | # Pyserini: Python interface to the Anserini IR toolkit built on Lucene
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by a... | 52 | 35.13 | 94 | 15 | 434 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_b0f27180abe823d3_d82a00b3", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'dropbox.com/', so it might match mo... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-hostname-regexp"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'dropbox.com/', so it might match more hosts than expected."
] | [
33
] | [
null
] | [
35
] | [
64
] | |
2024-11-19T00:40:29.940570+00:00 | 1,584,003,256,000 | 2cf636015beb5621fbaf9e942b1e6116b19f23c3 | 2 | {
"blob_id": "2cf636015beb5621fbaf9e942b1e6116b19f23c3",
"branch_name": "refs/heads/master",
"committer_date": 1584003256000,
"content_id": "40f2c199e5587140054aee9804bd18b13d235837",
"detected_licenses": [
"MIT"
],
"directory_id": "7d3783308b1fecc72c04bd71f18e3f1ad4b288f5",
"extension": "py",
"fi... | 2.375 | stackv2 | import logging
import json
import attr
import requests
from . import conf
from . import serializer
from .exceptions import ApiError, AuthError
logger = logging.getLogger(__name__)
@attr.s
class NovaPoshta(object):
"""
A base API class, that holds shared methods and settings for other models.
Creates ba... | 123 | 28.66 | 96 | 16 | 784 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b443513fef71792a_f3af29b0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
74
] | [
null
] | [
43
] | [
75
] | |
2024-11-19T01:06:08.687666+00:00 | 1,476,647,375,000 | ff8fddbfd84f13c8c1cd087aa5419bfc711164f7 | 3 | {
"blob_id": "ff8fddbfd84f13c8c1cd087aa5419bfc711164f7",
"branch_name": "refs/heads/master",
"committer_date": 1476647375000,
"content_id": "657774d11bc4abbeff51347f5a206a55fcac1e7f",
"detected_licenses": [
"MIT"
],
"directory_id": "69ebd1e1e226bc271b6129e92b5458d20bca4a6d",
"extension": "py",
"fi... | 2.546875 | stackv2 | # -*- coding: utf-8 -*-
import requests
import json
import os
import re
from flask import Flask, url_for, request, redirect, Response
app = Flask(__name__)
URL = 'https://kotoha-server.herokuapp.com/api/phrases.json'
# Check token if you don't want to conflict with other slash commands
#SLACK_KEY = os.environ['SLAC... | 66 | 30.95 | 89 | 18 | 553 | python | [{"finding_id": "codeql_py/partial-ssrf_8a1db6d2c378c69b_68d3f273", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
40
] | [
null
] | [
37
] | [
54
] | |
2024-11-19T01:06:13.185530+00:00 | 1,688,041,099,000 | 9e735c12ce69b4b2eeed9d73220594202df6dc2b | 3 | {
"blob_id": "9e735c12ce69b4b2eeed9d73220594202df6dc2b",
"branch_name": "refs/heads/main",
"committer_date": 1688041099000,
"content_id": "9e5b1fc3d2558611b2c96c5d5ba8f71c2f0660d4",
"detected_licenses": [
"BSD-2-Clause",
"BSD-3-Clause"
],
"directory_id": "5b6878052e972159a0a0729655598331b06f7469",... | 3.265625 | stackv2 | """Unpack tar/zip archives.
This module is copied from the Python 3.2 standard library.
"""
import os
class ReadError(EnvironmentError):
"""Raised when an archive cannot be read."""
def _ensure_directory(path):
"""Ensure that the parent directory of `path` exists"""
dirname = os.path.dirname(path)
... | 121 | 28.93 | 79 | 16 | 825 | python | [{"finding_id": "codeql_py/tarslip_6de8ddea7f532190_e99ce19b", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
68
] | [
null
] | [
9
] | [
15
] | |
2024-11-19T01:17:32.007692+00:00 | 1,676,139,610,000 | 1759b5d825de1424b212017726d9f1383fa5db3b | 3 | {
"blob_id": "1759b5d825de1424b212017726d9f1383fa5db3b",
"branch_name": "refs/heads/master",
"committer_date": 1676139610000,
"content_id": "3caabf06d81afffa3638b89c8400c50584f543c1",
"detected_licenses": [
"MIT"
],
"directory_id": "255e19ddc1bcde0d3d4fe70e01cec9bb724979c9",
"extension": "py",
"fi... | 2.703125 | stackv2 | import subprocess
import argparse
import re
import sys
import requests
def do_dig(domain):
command = "dig {} | grep IN".format(domain)
try:
output = subprocess.check_output(command, shell=True, stdin=subprocess.PIPE, stderr=subprocess.STDOUT)
return re.findall(r"\b\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{... | 57 | 35.68 | 119 | 18 | 501 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_efa283d35dcb1fc0_8f4d1218", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [amazonaws.com](1) may be at an arbitrary position in t... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [amazonaws.com](1) may be at an arbitrary position in the sanitized URL."
] | [
27
] | [
null
] | [
20
] | [
42
] | |
2024-11-19T01:31:59.464659+00:00 | 1,435,580,900,000 | 70bc6b6d006e55e5d496191a4e2a4b8b3f9bdd92 | 2 | {
"blob_id": "70bc6b6d006e55e5d496191a4e2a4b8b3f9bdd92",
"branch_name": "refs/heads/master",
"committer_date": 1435580900000,
"content_id": "911cde67ddeff759628d4a856224604770080249",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "48894ae68f0234e263d325470178d67ab313c73e",
"extension": "p... | 2.4375 | stackv2 | # -*- coding: utf-8 -*-
##----------------------------------------------------------------------
## HTTP provider
##----------------------------------------------------------------------
## Copyright (C) 2007-2011 The NOC Project
## See LICENSE for details
##-------------------------------------------------------------... | 269 | 33.16 | 79 | 20 | 2,049 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_52cc6cc466ea3127_d1b0655e", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
193
] | [
null
] | [
39
] | [
40
] | |
2024-11-19T01:32:29.796857+00:00 | 1,691,254,293,000 | db1e4fa906b7f1dca49e149750a64f2b83d979f0 | 3 | {
"blob_id": "db1e4fa906b7f1dca49e149750a64f2b83d979f0",
"branch_name": "refs/heads/master",
"committer_date": 1691254293000,
"content_id": "92f6ca261571678702f0bd8948001ef3020d427d",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "b18b01b32e67433a6e749e2aae48fb69bcfc42f9",
"extension": "py"... | 2.875 | stackv2 | """
Simple app that parses predictions from a trained model and displays them.
"""
import argparse
import logging
import os
import re
import random
import sys
import requests
import pandas as pd
from flask import Flask, json, render_template, request, g, jsonify
APP = Flask(__name__)
GITHUB_TOKEN = os.environ['GITHU... | 94 | 27.46 | 94 | 16 | 634 | python | [{"finding_id": "codeql_py/flask-debug_c493097bfa0a0cd4_ded32b97", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-1333",
"CWE-918"
] | [
"py/flask-debug",
"py/polynomial-redos",
"py/full-ssrf"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with many repetitions of 'a'.",
"The full URL of this request depends on a [user-provided value]... | [
94,
24,
25
] | [
null,
null,
28
] | [
3,
22,
10
] | [
54,
31,
7
] | |
2024-11-19T01:32:29.992983+00:00 | 1,531,174,533,000 | 967ff2e7934839b60acade1ac89c46994e6e91d9 | 2 | {
"blob_id": "967ff2e7934839b60acade1ac89c46994e6e91d9",
"branch_name": "refs/heads/master",
"committer_date": 1531174533000,
"content_id": "a4c958726ed2a3e9ddbd1eb710db42d5f89f8d03",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "80702982a7e9ffd7f07bba2d6ba92272fe958b67",
"extension": "py"... | 2.46875 | stackv2 | #!/usr/bin/env python
import glob
import hashlib
import os
import sys
import tempfile
import tarfile
import subprocess
import shutil
VOL_DIRS = ['mri', 'mri/orig', 'mri/tranforms']
SURFACE_DIRS = ['surf']
VOLUMES = ['rawavg.mgz',
'orig.mgz',
'nu.mgz',
'T1.mgz',
'brainmask.mg... | 150 | 34.65 | 83 | 17 | 1,289 | python | [{"finding_id": "codeql_py/tarslip_7072d51e5f1dd768_db2d1f5b", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/tarslip",
"py/tarslip"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1).",
"This file extraction depends on a [potentially untrusted source](1)."
] | [
123,
124
] | [
null,
null
] | [
5,
5
] | [
20,
20
] | |
2024-11-19T01:43:47.018564+00:00 | 1,476,470,901,000 | daa6f3fecc71eecf7bcdbbafdb5607593d887b56 | 2 | {
"blob_id": "daa6f3fecc71eecf7bcdbbafdb5607593d887b56",
"branch_name": "refs/heads/master",
"committer_date": 1476470901000,
"content_id": "f65c983d905605303439a7231d7534dfd3e21185",
"detected_licenses": [
"MIT"
],
"directory_id": "e211562ceacbc18cf1a7c6ad5d200f0aa30cc558",
"extension": "py",
"fi... | 2.375 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
__author__ = 'Jiayi Li'
import time, hashlib, json, urllib
import requests
from flask import current_app, request
from bson.objectid import ObjectId
from app import db
def user_to_cookie(user, max_age=86400):
'''
return cookie from an user dict
'''
... | 128 | 26 | 114 | 15 | 825 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_35e1309105276ef1_5faf0b82", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse... | 3 | true | [
"CWE-327",
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (secret)](2) is used in a hashing algorithm (SHA1) that is insecure.",
"[Sensitive data (password)](1) is used in a hashing algor... | [
21,
45,
78
] | [
null,
null,
null
] | [
49,
33,
17
] | [
76,
58,
41
] | |
2024-11-19T01:44:07.701503+00:00 | 1,449,877,925,000 | 59be321fa0e09623cbb95000ef0a4fa10cd649c8 | 3 | {
"blob_id": "59be321fa0e09623cbb95000ef0a4fa10cd649c8",
"branch_name": "refs/heads/master",
"committer_date": 1449877925000,
"content_id": "093195c3a4411fba5094d038a2432c20e34d964c",
"detected_licenses": [
"MIT"
],
"directory_id": "92b7f56969b590511b0da1966808e060184ee0c4",
"extension": "py",
"fi... | 2.8125 | stackv2 | """
Views that inherit from Django's class-based generic views and add methods
for building flat files.
"""
import os
import six
import sys
import gzip
import shutil
import logging
import mimetypes
from django.conf import settings
from bakery import DEFAULT_GZIP_CONTENT_TYPES
from django.test.client import RequestFacto... | 298 | 30.94 | 78 | 16 | 2,021 | python | [{"finding_id": "codeql_py/url-redirection_4cc07c1950cdec8b_47a3448b", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 3 | true | [
"CWE-601",
"CWE-117",
"CWE-117"
] | [
"py/url-redirection",
"py/log-injection",
"py/log-injection"
] | [
"HIGH",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
283,
259,
286
] | [
null,
262,
289
] | [
16,
22,
22
] | [
19,
10,
10
] | |
2024-11-19T02:19:53.107143+00:00 | 1,688,243,968,000 | 40ac0515b7d48226489873cd4fb35633f42abefa | 3 | {
"blob_id": "40ac0515b7d48226489873cd4fb35633f42abefa",
"branch_name": "refs/heads/main",
"committer_date": 1688243968000,
"content_id": "7e1e699cf112267659dbd54e07e4c29d3ab724bb",
"detected_licenses": [
"MIT"
],
"directory_id": "db43055180800e54526affb7941fc77e0226c4b3",
"extension": "py",
"file... | 3.046875 | stackv2 | import re
from datetime import datetime
from city_scrapers_core.constants import COMMITTEE
from city_scrapers_core.items import Meeting
from city_scrapers_core.spiders import CityScrapersSpider
class ChiSchoolCommunityActionCouncilSpider(CityScrapersSpider):
name = "chi_school_community_action_council"
agenc... | 131 | 36.96 | 109 | 19 | 1,051 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_13580177e01d9ac1_8e11ee9b", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [humboldparkportal.org](1) may be at an arbitrary posit... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [humboldparkportal.org](1) may be at an arbitrary position in the sanitized URL."
] | [
30
] | [
null
] | [
27
] | [
60
] | |
2024-11-19T00:59:40.935075+00:00 | 1,611,778,537,000 | 04e867916d9170e2a101e0dc71fbcb77b56559b2 | 2 | {
"blob_id": "04e867916d9170e2a101e0dc71fbcb77b56559b2",
"branch_name": "refs/heads/master",
"committer_date": 1611778537000,
"content_id": "1be3909bff7fa05141d51a8a96c2f84eec7bd678",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "db0282bd6100a2e4f5169894e92b4a892548b53b",
"extension": "py"... | 2.453125 | stackv2 | # coding: utf-8
from pyramid.view import view_config
from pyramid import httpexceptions as exceptions
from pyramid.authentication import extract_http_basic_credentials
from ..juliette.conexion import parametros, credenciales, autenticacion
from ..juliette.excepciones import AutenticacionException
from ..juliette.mode... | 73 | 31.6 | 86 | 15 | 538 | python | [{"finding_id": "codeql_py/reflective-xss_6894a80cd695da23_c6d161c8", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
50
] | [
null
] | [
12
] | [
21
] | |
2024-11-19T00:59:45.220848+00:00 | 1,690,380,256,000 | 621341fd75a514b6c3db7f858e7bda1451d2d087 | 3 | {
"blob_id": "621341fd75a514b6c3db7f858e7bda1451d2d087",
"branch_name": "refs/heads/master",
"committer_date": 1690380256000,
"content_id": "23c9ebda96c2e677a33883c23e0656237c878b8d",
"detected_licenses": [
"MIT"
],
"directory_id": "480e10ba3c431a52e0bfaa1de81896db80aa8061",
"extension": "py",
"fi... | 2.515625 | stackv2 | """Http Proxy to be used as provider url in verifier."""
from fastapi import FastAPI, status, Request, HTTPException
import uvicorn as uvicorn
import logging
log = logging.getLogger(__name__)
logging.basicConfig(level=logging.DEBUG)
app = FastAPI()
PROXY_PORT = 1234
UVICORN_LOGGING_LEVEL = "error"
items = {
"state... | 58 | 27.38 | 88 | 10 | 377 | python | [{"finding_id": "codeql_py/log-injection_2e4dc11254eaf03b_c4ad1835", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
18
] | [
null
] | [
15
] | [
54
] | |
2024-11-19T01:00:09.453784+00:00 | 1,685,985,338,000 | d05e6dd79a642440b4ff75b7656b2492e55fe91e | 2 | {
"blob_id": "d05e6dd79a642440b4ff75b7656b2492e55fe91e",
"branch_name": "refs/heads/master",
"committer_date": 1685985338000,
"content_id": "19c7452ffc2b026632ca15a89d57a539de518073",
"detected_licenses": [
"MIT"
],
"directory_id": "4cf1fea45f27bbd317c08e73130c9a13bbd13b90",
"extension": "py",
"fi... | 2.421875 | stackv2 | """A file-based pydap server running on Gunicorn.
Usage:
pydap [options]
Options:
-h --help Show this help message and exit
--version Show version
-i --init DIR Create directory with templates
-b ADDRESS --bind ADDRESS The ip to listen to [default:... | 274 | 31.46 | 79 | 17 | 1,932 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_69e870f45182c1e8_a6884e91", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
57
] | [
null
] | [
20
] | [
61
] | |
2024-11-19T01:11:38.875787+00:00 | 1,563,560,688,000 | 3d96dd159dab5e0162a5e9b9561719b651372d6f | 4 | {
"blob_id": "3d96dd159dab5e0162a5e9b9561719b651372d6f",
"branch_name": "refs/heads/master",
"committer_date": 1563560688000,
"content_id": "05caaaacc72985759bf71220969f8acd32eea5f8",
"detected_licenses": [
"MIT"
],
"directory_id": "041e64a8c3c670ab816705af3ca89cb13bca0b02",
"extension": "py",
"fi... | 3.6875 | stackv2 | # ------------------------------------------------------------------------------------------
# Programa de geraçao de passwords entre 4 e 16 caracteres e que,
# para além de mostrar as passwords na consola, cria ficheiro .txt de output
# NC
# V1.0.0 23-10-2013 : criaçao da primeira versão do programa. Mostra passwords ... | 64 | 33.36 | 92 | 16 | 592 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_519f1676591adaaa_46841cd0", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
40,
50
] | [
null,
null
] | [
17,
20
] | [
32,
28
] | |
2024-11-19T01:21:34.107476+00:00 | 1,687,079,142,000 | 712cb745455d246c1bf95f4f9b75c4f814ee113d | 2 | {
"blob_id": "712cb745455d246c1bf95f4f9b75c4f814ee113d",
"branch_name": "refs/heads/master",
"committer_date": 1687079142000,
"content_id": "73347cce461f938d46aeb9e96e390d55e7cbf86c",
"detected_licenses": [
"MIT"
],
"directory_id": "b7d13929749d1f09383b27ab76bdafcc4c9c540c",
"extension": "py",
"fi... | 2.453125 | stackv2 | #!/usr/bin/env python3
import re
import socket
import asyncio
import hashlib
from base64 import b64encode
from urllib.parse import urlparse
class Rsync_Weakpwd_BaseVerify:
def __init__(self, url):
self.info = {
'name': 'Rsync 弱口令访问漏洞',
'description': 'Rsync 弱口令访问漏洞',
'd... | 154 | 31.09 | 108 | 23 | 1,184 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_02308503944da2f3_7da2b651", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi... | [
80
] | [
null
] | [
27
] | [
42
] | |
2024-11-19T01:21:36.215194+00:00 | 1,654,236,018,000 | ccaafe3f9d44c6226b8d6a62fa8a3d1f782876e9 | 2 | {
"blob_id": "ccaafe3f9d44c6226b8d6a62fa8a3d1f782876e9",
"branch_name": "refs/heads/master",
"committer_date": 1654236018000,
"content_id": "1dcdb4aa95637caf0ecd122d475de254aa0d3653",
"detected_licenses": [
"MIT"
],
"directory_id": "c676d3fd442a318e8479b9749d932165a576ebb8",
"extension": "py",
"fi... | 2.328125 | stackv2 | import requests
from datetime import timedelta
from logging import getLogger
from homeassistant.util import Throttle
_LOGGER = getLogger(__name__)
from homeassistant.components.weather import (
ATTR_WEATHER_HUMIDITY,
ATTR_WEATHER_PRESSURE,
ATTR_WEATHER_TEMPERATURE,
ATTR_WEATHER_VISIBILITY
)
from hom... | 105 | 32.18 | 78 | 16 | 853 | python | [{"finding_id": "codeql_py/request-without-cert-validation_3133bdfd4296205d_d50f679c", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
74,
82
] | [
null,
null
] | [
20,
24
] | [
75,
67
] | |
2024-11-19T02:10:28.231281+00:00 | 1,687,794,171,000 | 41ac2711af7c37d4fa78a0ea6941dbdf98eaf50b | 3 | {
"blob_id": "41ac2711af7c37d4fa78a0ea6941dbdf98eaf50b",
"branch_name": "refs/heads/master",
"committer_date": 1687794171000,
"content_id": "b56a1428621cf7151409e7cbf0b286027c72868b",
"detected_licenses": [
"MIT"
],
"directory_id": "6a37d562cd7d818356a5378fd7d88b934ccf7d66",
"extension": "py",
"fi... | 2.609375 | stackv2 | """
Implements the mumble protocol.
https://mumble-protocol.readthedocs.org/en/latest/index.html
"""
import socket
import ssl
import threading
import time
import struct
from ....logging import get_logger
from ....signals import on_exception
from ... import BaseResponder
from . import mumble_pb2
# Mapping of ... | 308 | 30.52 | 96 | 17 | 2,176 | python | [{"finding_id": "codeql_py/insecure-default-protocol_fd88bdbb0f54e69d_babccdda", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in... | 1 | true | [
"CWE-327"
] | [
"py/insecure-default-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used."
] | [
247
] | [
null
] | [
20
] | [
40
] | |
2024-11-19T02:10:33.487815+00:00 | 1,621,170,110,000 | 2daa7d17c7d2ef4e0e8f4344e6fb8683bfef55a2 | 2 | {
"blob_id": "2daa7d17c7d2ef4e0e8f4344e6fb8683bfef55a2",
"branch_name": "refs/heads/main",
"committer_date": 1621170110000,
"content_id": "c505f4daa8e3cef46e9098fb8525000f152316b7",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e43bf0a95e9396d3331c8e03039e7d13bc9d9fbc",
"extension": "py",
... | 2.40625 | stackv2 | """Command line script for FastMSA."""
import glob
import importlib
import os
import sys
from argparse import ArgumentParser, Namespace, RawTextHelpFormatter
from inspect import getmembers
from pathlib import Path
from textwrap import dedent
from typing import Any, Optional, Sequence, cast
import jinja2
import uvicorn... | 375 | 31.87 | 96 | 20 | 2,979 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_123b1ed933ccfd02_1d28a0a7", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
101
] | [
null
] | [
32
] | [
53
] | |
2024-11-19T02:45:22.926012+00:00 | 1,620,381,537,000 | 59df480e3e7351037e07c8bdaf6e1451602323dd | 3 | {
"blob_id": "59df480e3e7351037e07c8bdaf6e1451602323dd",
"branch_name": "refs/heads/master",
"committer_date": 1620381537000,
"content_id": "1dfddb7a5025a7a0b8f4554b695aba867da21a73",
"detected_licenses": [
"MIT"
],
"directory_id": "32e0843a8a7cef45e98a3a7c913eacf75d66d8b9",
"extension": "py",
"fi... | 2.71875 | stackv2 | from flask import Flask, render_template, url_for, request, redirect
from markupsafe import escape
from flask_sqlalchemy import SQLAlchemy
from datetime import datetime
app = Flask(__name__)
app.config['SQLALCHEMY_DATABASE_URI'] = 'sqlite:///blog.db'
app.config['SQLALCHEMY_TRACK_MODIFICATIONS'] = False
db = SQLAlchemy... | 79 | 24.78 | 68 | 13 | 463 | python | [{"finding_id": "codeql_py/flask-debug_84d7241a79153417_be94e859", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
79,
69
] | [
null,
null
] | [
5,
12
] | [
24,
31
] | |
2024-11-19T02:45:32.223658+00:00 | 1,625,454,838,000 | 2f1e232e36e772e2c01549b02a620cbc6a13b785 | 2 | {
"blob_id": "2f1e232e36e772e2c01549b02a620cbc6a13b785",
"branch_name": "refs/heads/master",
"committer_date": 1625454838000,
"content_id": "e86d5e4c41fc0363b97ba66ff34a2f7de1c35be1",
"detected_licenses": [
"MIT"
],
"directory_id": "d64ed7d94dda2b85fb61c8bb633aadfdc939ab8c",
"extension": "py",
"fi... | 2.40625 | stackv2 | from libs.config import gget, alias, color
from os.path import exists
from requests import post, exceptions
@alias(True)
def run(timeout: float = 2.0):
"""
check
Check if each webshell is alive.
eg: check {timeout=2.0}
"""
if not exists("webshell.log"):
print(color.red("No webshell.L... | 52 | 37.1 | 103 | 21 | 452 | python | [{"finding_id": "codeql_py/request-without-cert-validation_b7b4c5b67a4928da_e494e1c1", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
42
] | [
null
] | [
23
] | [
61
] | |
2024-11-19T02:45:32.445550+00:00 | 1,605,467,717,000 | a08e8806ecf485730de0e5a4db13f8d56cc61d00 | 2 | {
"blob_id": "a08e8806ecf485730de0e5a4db13f8d56cc61d00",
"branch_name": "refs/heads/main",
"committer_date": 1605467717000,
"content_id": "accfaf7f3080f7c621c9c1308565f4d035df74d9",
"detected_licenses": [
"MIT"
],
"directory_id": "1a6dbc08cbec7abc9d12f396c088ca46520c98d1",
"extension": "py",
"file... | 2.34375 | stackv2 | from flask import Blueprint, current_app, abort, request, jsonify
from functools import wraps
from app.db import db, User, Hex, QuestionList, World
from datetime import datetime, timedelta
import numpy
bp = Blueprint('interface', __name__)
def validate_request(f):
@wraps(f)
def decorated_function(*args, **kw... | 130 | 26.67 | 100 | 23 | 904 | python | [{"finding_id": "codeql_py/reflective-xss_f4ca8080c08846a7_6f90f3fc", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
126,
130
] | [
null,
null
] | [
12,
12
] | [
47,
18
] | |
2024-11-19T02:45:34.323720+00:00 | 1,458,587,446,000 | bbdadfb5aa1c4f6dd9ed4aba54ac3e9c1a9b5b69 | 2 | {
"blob_id": "bbdadfb5aa1c4f6dd9ed4aba54ac3e9c1a9b5b69",
"branch_name": "refs/heads/master",
"committer_date": 1458587446000,
"content_id": "4731ab189a497e2ea5d7b9a53326475efec84e4b",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "0f72067064165a62ca81084743de2fbebd7b1242",
"extension": "py"... | 2.34375 | stackv2 | #! /usr/bin/env python
import paramiko
import time
def connect(command, ip, user, passwd, port=22):
remote_conn_pre = paramiko.SSHClient()
remote_conn_pre.set_missing_host_key_policy(paramiko.AutoAddPolicy())
remote_conn_pre.connect(ip, username=user, password=passwd, look_for_keys=False, allow_agent=... | 67 | 19.27 | 114 | 13 | 381 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_973d37de2eda831e_3ce8b4c2", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
11
] | [
null
] | [
5
] | [
74
] | |
2024-11-19T02:57:23.736296+00:00 | 1,514,198,232,000 | a93f077a453471e9503f5c63eb8c9ef9a0b2265c | 2 | {
"blob_id": "a93f077a453471e9503f5c63eb8c9ef9a0b2265c",
"branch_name": "refs/heads/master",
"committer_date": 1514198232000,
"content_id": "3cac3eb8a18c6d44f9db5f51cc25b927cb8c4ca5",
"detected_licenses": [
"MIT"
],
"directory_id": "3a7b140348fb96216d6ae0b18cdd62a811112eea",
"extension": "py",
"fi... | 2.390625 | stackv2 | import time
import hmac
import hashlib
import urllib
import requests
import json
import base64
class Bittrex_Init:
def __init__(self, api_key='', api_secret=''):
self.api_key = api_key
self.api_secret = api_secret
def __call__(self, command, args={}):
nonce = str(int(time.time()*1000))... | 72 | 38.72 | 102 | 17 | 692 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_ea7fdacf00e71d49_9b0fb4ea", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
20
] | [
null
] | [
54
] | [
74
] | |
2024-11-19T01:57:14.999050+00:00 | 1,613,113,011,000 | 56c69e73dec20b61e42754a3c0542085cb1971a2 | 3 | {
"blob_id": "56c69e73dec20b61e42754a3c0542085cb1971a2",
"branch_name": "refs/heads/main",
"committer_date": 1613113011000,
"content_id": "f2e4727e82ba2c147088983cba03eab87aa2f472",
"detected_licenses": [
"Unlicense"
],
"directory_id": "1f0f62af04472749bf1256c0503a39e1b7b693af",
"extension": "py",
... | 2.609375 | stackv2 | from googlesearch import search
from colorama import Fore, init
init()
print(Fore.CYAN)
import time
time.sleep(1)
banner = """
000000000000000000000000000
0 ---- SrchX ---- 0
0 by 0
0 Blacksterhack 0
000000000000000000000000000
"""
print(banner)
Disclaimer = "This program was c... | 136 | 23.14 | 98 | 14 | 1,160 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b73adfc58fdaaac6_c28b3440", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
133,
136
] | [
null,
null
] | [
10,
11
] | [
45,
50
] | |
2024-11-19T01:57:17.181721+00:00 | 1,693,473,051,000 | ef5d9966ffeffed20514746e61840566f4416236 | 2 | {
"blob_id": "ef5d9966ffeffed20514746e61840566f4416236",
"branch_name": "refs/heads/master",
"committer_date": 1693473051000,
"content_id": "6ae9ccb73a4b8814076b95596bfd2ed440332db2",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "f71ea031e1df51e8fbf20899788830ac079c7609",
"extension": "p... | 2.421875 | stackv2 | import hashlib
from boto.s3.connection import S3Connection
from boto.s3.key import Key
from spidermon.exceptions import NotConfigured
from . import CreateReport
DEFAULT_S3_REGION_ENDPOINT = "s3.amazonaws.com"
DEFAULT_S3_CONTENT_TYPE = "text/html"
URL_SECRET_KEY = "The secret to life the universe and everything"
... | 160 | 33.56 | 94 | 18 | 1,160 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_b67e2fa500874353_01fa5522", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (secret)](2) is used in a hashing algorithm (MD5) that is insecure."
] | [
156
] | [
null
] | [
28
] | [
43
] | |
2024-11-19T01:57:25.159022+00:00 | 1,560,262,708,000 | 576558a3977930fb02a7d707de78feabfd054995 | 3 | {
"blob_id": "576558a3977930fb02a7d707de78feabfd054995",
"branch_name": "refs/heads/master",
"committer_date": 1560262708000,
"content_id": "5f292a4633e424784fc0a8ae01c81b624be0424e",
"detected_licenses": [
"MIT"
],
"directory_id": "23605544a0ab01db6aa39f12da552e79ef09fb57",
"extension": "py",
"fi... | 2.953125 | stackv2 | # Script to automatically downlaod and remove a folder from raspberry pi
from scp import SCPClient
from paramiko import SSHClient
from paramiko import AutoAddPolicy
import os
HOSTNAME = ""
USERNAME = ""
PASSWORD = ""
REMOTE_PATH = ""
LOCAL_PATH = os.path.expanduser("~/Desktop")
# https://stackoverflow.com/... | 52 | 27.54 | 78 | 13 | 349 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_2c25c6aece244f70_c7dd7084", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
30
] | [
null
] | [
5
] | [
53
] | |
2024-11-19T02:11:27.254116+00:00 | 1,614,237,150,000 | 57b7ba83eec4a253b35fec84ba38c7d3a5ff5a94 | 3 | {
"blob_id": "57b7ba83eec4a253b35fec84ba38c7d3a5ff5a94",
"branch_name": "refs/heads/main",
"committer_date": 1614237150000,
"content_id": "f6aceb2ffac9fd6ecba0ddd1da5c981f8d5a161b",
"detected_licenses": [
"MIT"
],
"directory_id": "4379da1e1a9cf9696d7ab57729871830126a87dd",
"extension": "py",
"file... | 2.59375 | stackv2 | import json
import logging
import boto3
from datetime import datetime
from datetime import timedelta
import random
logger = logging.getLogger()
logger.setLevel(logging.INFO)
def sendSMS(phone,faceId,otp):
sns = boto3.client('sns', region_name = 'us-west-2')
url = "https://smart-door-face.s3-us-west-2.amazonaw... | 123 | 26.24 | 104 | 14 | 838 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d232399b11f03710_f86cedb4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
14
] | [
null
] | [
11
] | [
18
] | |
2024-11-19T02:32:44.128972+00:00 | 1,557,777,657,000 | ea4caa1dcc25ad85287ccce6f4b47389a2ff8356 | 2 | {
"blob_id": "ea4caa1dcc25ad85287ccce6f4b47389a2ff8356",
"branch_name": "refs/heads/master",
"committer_date": 1557777657000,
"content_id": "a9cc3078ca6543e45865e01725a688d24e0b6af1",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "f8c671a3fc1475e837a73cd7ad2e624440f3d122",
"extension": "py"... | 2.328125 | stackv2 | # -*- coding: utf-8 -*-
""" standard """
import ConfigParser
from random import randint
import re
import sys
""" custom """
from threatconnect import ThreatConnect
from threatconnect.Config.FilterOperator import FilterSetOperator
# configuration file
config_file = "tc.conf"
# retrieve configuration file
config = Co... | 346 | 33.38 | 95 | 17 | 3,157 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_50834027a0fd7806_daef84cd", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
159
] | [
null
] | [
19
] | [
91
] | |
2024-11-19T02:32:48.100693+00:00 | 1,649,687,185,000 | 0e4e7e6e82bb98eb958a7bdddd4427303d16baaf | 2 | {
"blob_id": "0e4e7e6e82bb98eb958a7bdddd4427303d16baaf",
"branch_name": "refs/heads/master",
"committer_date": 1649687185000,
"content_id": "851bdaeb1999b486df870a458b709494d45454a7",
"detected_licenses": [
"MIT"
],
"directory_id": "0c71be3633a6e2344c33ba434ef60329affb7a21",
"extension": "py",
"fi... | 2.453125 | stackv2 | import os
import fnmatch
import shutil
import re
import datetime
path="U:/2016TigerFiles/2017Files/areawater"
#path="U:/2016TigerFiles/2017Files/addr"
#path ="W:/2016TigerFiles/2018Files/addrfn/test"
#path="C:/Users/mattp/Desktop/WorkFiles/XML Files/ISO Files/2017Files/2017addrfeat"
#path="C:/Users/mattp/Desktop/WorkF... | 186 | 39.3 | 165 | 17 | 2,082 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_05802e28eb525728_5d656a02", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'census.gov/geo/maps-data/data/tiger... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/incomplete-hostname-regexp",
"py/incomplete-hostname-regexp"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'census.gov/geo/maps-data/data/tiger-line', so it might match more hosts than expected.",
"This regular expression has an unescaped '.' before 'census.gov/geo/maps-data/data/tiger-line', so it might match more hosts than expected."
] | [
114,
116
] | [
null,
null
] | [
25,
25
] | [
82,
81
] | |
2024-11-19T02:32:56.996667+00:00 | 1,689,708,333,000 | ece0cfcd788e23f00b1983e78272335e45f2a5c7 | 2 | {
"blob_id": "ece0cfcd788e23f00b1983e78272335e45f2a5c7",
"branch_name": "refs/heads/master",
"committer_date": 1689708333000,
"content_id": "2f925d5ce9be154fa2762bf9ca2f3f9d4a6ab596",
"detected_licenses": [
"MIT"
],
"directory_id": "57e194db1420fea5675d3e9920cdd5dd7ba326bc",
"extension": "py",
"fi... | 2.328125 | stackv2 | import traceback
import uuid
import sys
import flask
import flask.json
import gevent.pywsgi
import pymysql
import redis
from platformshconfig import Config
app = flask.Flask(__name__)
config = Config()
@app.route('/')
def root():
tests = {
"database": wrap_test(test_mysql, config.credentials("database"... | 75 | 20.92 | 80 | 15 | 385 | python | [{"finding_id": "codeql_py/stack-trace-exposure_8988197c2553162d_8e9c8fa0", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
23
] | [
null
] | [
31
] | [
36
] | |
2024-11-19T02:33:22.816429+00:00 | 1,532,971,162,000 | 1ecfbc99313031a42acdaf70c5f5ddbbb6dedc27 | 3 | {
"blob_id": "1ecfbc99313031a42acdaf70c5f5ddbbb6dedc27",
"branch_name": "refs/heads/master",
"committer_date": 1532971162000,
"content_id": "21bef77010b015225d90a3ed6586067ba665d43a",
"detected_licenses": [
"MIT"
],
"directory_id": "111cdba24c3f2bffa6202dc040395144c8cf8ee6",
"extension": "py",
"fi... | 2.984375 | stackv2 | import socket
import base64
from Crypto.Cipher import AES
chave = "0123456789ABCDEF"
aes = AES.new(chave, AES.MODE_ECB)
HOST = ''
PORT = 5000
tcp = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
orig = (HOST, PORT)
tcp.bind(orig)
tcp.listen(1)
while True:
... | 39 | 20.87 | 69 | 15 | 259 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_cc70941fb0a9b67c_8471c4cb", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 3 | true | [
"CWE-327",
"CWE-327",
"CWE-200"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm",
"py/bind-socket-all-network-interfaces"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used.",
"'' binds a socket to all interfaces."
] | [
23,
31,
13
] | [
null,
null,
null
] | [
36,
11,
null
] | [
60,
58,
15
] | |
2024-11-19T02:33:22.923555+00:00 | 1,623,266,102,000 | 5b7b2051ae4cdc31d282aee8e7957cc8ec76385b | 2 | {
"blob_id": "5b7b2051ae4cdc31d282aee8e7957cc8ec76385b",
"branch_name": "refs/heads/main",
"committer_date": 1623266102000,
"content_id": "3f6efe890aca82016e4923a3bb82c3df7a8087b0",
"detected_licenses": [
"MIT"
],
"directory_id": "9cea58b411c722fa987fd9429bff7d35046ffedd",
"extension": "py",
"file... | 2.359375 | stackv2 | from selenium.webdriver.common.keys import Keys
from selenium.webdriver.common.action_chains import ActionChains
from selenium.webdriver.common.by import By
from bs4 import BeautifulSoup
import requests
import time
from selenium.common.exceptions import NoSuchElementException
import re
from selenium import webdriver
im... | 188 | 28.18 | 162 | 14 | 1,287 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_e52aa25acd00a793_b4d829d0", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'dccc.edu/PROD/bwckschd', so it migh... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-hostname-regexp"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'dccc.edu/PROD/bwckschd', so it might match more hosts than expected."
] | [
117
] | [
null
] | [
31
] | [
117
] | |
2024-11-19T02:33:27.161720+00:00 | 1,563,781,190,000 | 0e527648c36e2e6f5b8cea7468856dd1cdbed777 | 3 | {
"blob_id": "0e527648c36e2e6f5b8cea7468856dd1cdbed777",
"branch_name": "refs/heads/master",
"committer_date": 1563781190000,
"content_id": "34c2688364566ce485a46dd5437a9d8282f318be",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "72a067a4d18b0e8d9e0a08f46b680fa2e879162d",
"extension": "py"... | 2.515625 | stackv2 | #!/usr/bin/python
#! -*- encoding=utf-8 -*-
"""
----------------------------------------------------------------------
Copyright 2019 Tigerwing XU (tigerwingxys@qq.com)
Licensed under the Apache License, Version 2.0 (the "License")
you may not use this file except in compliance with the License.
You may obtain a copy ... | 279 | 31.72 | 127 | 26 | 2,041 | python | [{"finding_id": "codeql_py/bad-tag-filter_a9db267dcd2504a9_e0653589", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression only parses --> and not --!> as a HTML comment end tag.", "remediation": "", "location":... | 1 | true | [
"CWE-116"
] | [
"py/bad-tag-filter"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression only parses --> and not --!> as a HTML comment end tag."
] | [
98
] | [
null
] | [
23
] | [
26
] | |
2024-11-19T02:33:36.880396+00:00 | 1,593,873,862,000 | f613e868e2adc9d249be8f7098167cad03089640 | 3 | {
"blob_id": "f613e868e2adc9d249be8f7098167cad03089640",
"branch_name": "refs/heads/master",
"committer_date": 1593873862000,
"content_id": "099c37766487ad9953977ed0a71057f1ceac2211",
"detected_licenses": [
"MIT"
],
"directory_id": "14fe75458b35a251081dca4865caa0f8e67ce8f5",
"extension": "py",
"fi... | 3.140625 | stackv2 | import re
import requests
email = input("User email: ")
age = input("User age like '1986': ")
user_words = [w.strip() for w in input("User key worlds split by ',': ").split(",")]
EMAIL_REGEX = re.compile(r"[^@]+@[^@]+\.[^@]+")
if len(user_words) < 1:
raise Exception("cap alphabet should be more 1", user_words)
i... | 46 | 24.83 | 84 | 12 | 325 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f01c7d7dc513bb68_e96e8819", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
41,
45
] | [
null,
null
] | [
11,
26
] | [
19,
34
] | |
2024-11-19T02:33:39.000839+00:00 | 1,618,544,960,000 | bf587f6529cf79ec27ad409777ffab169af027a5 | 3 | {
"blob_id": "bf587f6529cf79ec27ad409777ffab169af027a5",
"branch_name": "refs/heads/master",
"committer_date": 1618544960000,
"content_id": "d088826f76c77a7dd3cb1e071be1cc2aa99ae036",
"detected_licenses": [
"MIT",
"BSD-3-Clause"
],
"directory_id": "bd26f432ae907b1b85995811aa88ee8dbf6a5923",
"ext... | 2.703125 | stackv2 | """Radiant Voices code generator tool"""
import argparse
import logging
import sys
from importlib import import_module
from pathlib import Path
import genrv
import yaml
from jinja2 import Environment, FileSystemLoader, PrefixLoader
from stringcase import camelcase, pascalcase
log = logging.getLogger(__name__)
DESC... | 81 | 25.1 | 69 | 15 | 516 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_f06b678965f045da_4cabc8b2", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
64
] | [
null
] | [
11
] | [
55
] | |
2024-11-19T02:46:07.592924+00:00 | 1,452,546,279,000 | d8eb797055ee3d072eab095f1c709ce8842d03c8 | 2 | {
"blob_id": "d8eb797055ee3d072eab095f1c709ce8842d03c8",
"branch_name": "refs/heads/master",
"committer_date": 1452546279000,
"content_id": "e68161a2c34ef33d12d17eb084d969646de81539",
"detected_licenses": [
"MIT"
],
"directory_id": "46b49480433d5a391c65b1b63cca89951f4ae228",
"extension": "py",
"fi... | 2.3125 | stackv2 | import os
from dpa.app.entity import Entity, EntityRegistry, EntityError
# -----------------------------------------------------------------------------
class GeomEntity(Entity):
category = 'geom'
CHANNEL_CONFIG = 'config/mari/geom/channels.cfg'
# -------------------------------------------------------... | 105 | 36.36 | 83 | 23 | 692 | python | [{"finding_id": "codeql_py/overly-permissive-file_2ecd378d712d2b8c_6a620b88", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to group writable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to group writable."
] | [
94
] | [
null
] | [
9
] | [
34
] | |
2024-11-19T02:46:24.960446+00:00 | 1,670,329,670,000 | ae8e28fc2c1b9fc0b2a23625a571391eb1e11069 | 4 | {
"blob_id": "ae8e28fc2c1b9fc0b2a23625a571391eb1e11069",
"branch_name": "refs/heads/master",
"committer_date": 1670329670000,
"content_id": "91c2e63be6ef74933afce9c200723b7491fda177",
"detected_licenses": [
"MIT"
],
"directory_id": "9284f2220168b93cfa0251dc38b88705912619c4",
"extension": "py",
"fi... | 3.59375 | stackv2 | # AdventOfCode 2019 day 4 pt 1
# https://adventofcode.com/2019/day/4
# started 7:15-paused 8:00
# started over at 9:05 - 10:00
low, high = [171309,643603]
possiblepasswords = 0
for i in range(low, high+1):
previous = 0
hasdoubledigit = False
# Loop though each digit in the number
for strdigit in str(i):
... | 31 | 25.26 | 85 | 11 | 274 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c471dac175709024_25b60a47", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
30
] | [
null
] | [
7
] | [
24
] | |
2024-11-19T02:59:18.951048+00:00 | 1,681,203,029,000 | 68c5341237d6b932492d2065f3491181de0816f4 | 2 | {
"blob_id": "68c5341237d6b932492d2065f3491181de0816f4",
"branch_name": "refs/heads/master",
"committer_date": 1681203029000,
"content_id": "2a992012b47ce1262c3715006daed54e44651152",
"detected_licenses": [
"MIT"
],
"directory_id": "f5f2580f56f19ef7f8118186f2c2ba4a9f6b61a4",
"extension": "py",
"fi... | 2.375 | stackv2 | from collections import defaultdict
from tqdm import tqdm
from urllib.parse import urlparse
import json
import os
import re
import requests
import sys
import traceback
book_id_re = re.compile(r'/(\d+)(/|$)')
name_nonces = defaultdict(int)
def get_book(dst, gut_id):
book_path = os.path.join(dst, str(gut_id) + '.t... | 110 | 37.53 | 97 | 22 | 943 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_fe134ca0f73053f8_6d22a517", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [gutenberg.org](1) may be at an arbitrary position in t... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [gutenberg.org](1) may be at an arbitrary position in the sanitized URL."
] | [
80
] | [
null
] | [
50
] | [
88
] | |
2024-11-19T02:59:34.245553+00:00 | 1,581,491,318,000 | a4ad39b6b934a293bde3d025cf11f36d988ea552 | 3 | {
"blob_id": "a4ad39b6b934a293bde3d025cf11f36d988ea552",
"branch_name": "refs/heads/master",
"committer_date": 1581491318000,
"content_id": "e9f041edba4f152569525a1f8167ce61a4cbbee7",
"detected_licenses": [],
"directory_id": "790feedb239d0f34f141cb3c19af4623476b27ea",
"extension": "py",
"filename": "Get... | 2.765625 | stackv2 | # This code is based on https://github.com/delucks/gtd.py onboard function,
# especial thanks to: delucks
import yaml
import os
import webbrowser
import trello
import sys
import configuration
from requests_oauthlib import OAuth1Session
from requests_oauthlib.oauth1_session import TokenRequestDenied
import logging
logg... | 190 | 50.75 | 137 | 13 | 2,357 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_83c7e7ac514df414_8e0faba3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (pas... | [
90,
75
] | [
null,
null
] | [
11,
15
] | [
39,
87
] | |
2024-11-19T03:24:42.300712+00:00 | 1,547,845,085,000 | 64f68dd4a99c7379b701895f95de2f3c3c1bb180 | 3 | {
"blob_id": "64f68dd4a99c7379b701895f95de2f3c3c1bb180",
"branch_name": "refs/heads/master",
"committer_date": 1547845085000,
"content_id": "fdcca80439428508d9c139944dcb903b7ac3465a",
"detected_licenses": [
"MIT"
],
"directory_id": "9deb642bf370548fe00fdfbbd880a959e2937872",
"extension": "py",
"fi... | 3.4375 | stackv2 | __author__ = "0016285: Kaddour Alnaasan"
# Aufgabe 2
# read IBAN
iban = input("Geben Sie Ihre IBAN ohne Lerrzeichnen: ")
# Read country Code
country_code = iban[0:2]
# Test if IBAN courrect (Country code and Number)
def is_iban(iban, country, char_num):
while len(iban) != char_num:
print("die", country... | 41 | 28.15 | 64 | 13 | 386 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2086af4ca945b7a0_d81cf59a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.\nThis expression logs [sensitive data (private)](4) as clear text."
] | [
27
] | [
null
] | [
44
] | [
48
] | |
2024-11-19T03:35:13.998714+00:00 | 1,525,156,873,000 | afd58861c748b656deab68690908d3f3597248a3 | 3 | {
"blob_id": "afd58861c748b656deab68690908d3f3597248a3",
"branch_name": "refs/heads/master",
"committer_date": 1525156873000,
"content_id": "16a18c7b66dff85c093a317f1844bce707934d4d",
"detected_licenses": [
"MIT"
],
"directory_id": "ab7a5fdc5375e63e2483ef29dfdb994b687da972",
"extension": "py",
"fi... | 2.59375 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
'''
.. module:: _generator
.. moduleauthor:: Julien Spronck
.. created:: April 2018
'''
from jinja2 import Template
def generate_file(publisher, rating=True, reviews=True, preptime=True,
cooktime=True, difficulty=True):
'''Generate a scraper file
... | 113 | 27.24 | 75 | 13 | 770 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_4e949b09d87a5636_061e42d3", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
22
] | [
null
] | [
20
] | [
40
] | |
2024-11-19T01:27:00.506302+00:00 | 1,503,002,882,000 | 3d59de74cc06700e66cf97f59ed4612acd3a6d9f | 3 | {
"blob_id": "3d59de74cc06700e66cf97f59ed4612acd3a6d9f",
"branch_name": "refs/heads/master",
"committer_date": 1503002882000,
"content_id": "f4447f7dabc4a7bbd0edec36adb2db41787b983c",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "efe81a2e1897b83c2454a1d0517e9852568c0e4c",
"extension": "p... | 2.671875 | stackv2 | import h2
import socket
import ssl
import h2.connection
import time
import sys
def determine_sent(sockhost, host, port, path):
frames=grab_frames(sockhost, host,port, path)
origin_sent=False
for frame in frames:
if frame[0]==12:
origin_sent=True
return origin_sent
def get_url_conn(... | 67 | 29.75 | 87 | 16 | 564 | python | [{"finding_id": "codeql_py/insecure-protocol_cb5bf21d7123f98a_b38b63e8", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol... | 1 | true | [
"CWE-327"
] | [
"py/insecure-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.SSLContext](1)."
] | [
22
] | [
null
] | [
9
] | [
16
] | |
2024-11-19T01:27:03.354109+00:00 | 1,651,822,864,000 | 0354bbef01eb17546e87e76417c8b5c9026ae32d | 2 | {
"blob_id": "0354bbef01eb17546e87e76417c8b5c9026ae32d",
"branch_name": "refs/heads/master",
"committer_date": 1651822864000,
"content_id": "ae3b2753a2d871cd954cad708865a61b484e06fa",
"detected_licenses": [
"MIT"
],
"directory_id": "b88fb1610f08db5c239446293e4f6c41acb27750",
"extension": "py",
"fi... | 2.390625 | stackv2 | import os
import tarfile
import torch
import torch.utils.data as data
import numpy as np
import h5py
from PIL import Image
from scipy import io
from torchvision.datasets.utils import download_url
DATASET_YEAR_DICT = {
'2012': {
'url': 'http://host.robots.ox.ac.uk/pascal/VOC/voc2012/VOCtrainval_11-May-2012... | 372 | 36.58 | 105 | 16 | 3,667 | python | [{"finding_id": "codeql_py/tarslip_b4b541bcb9ff8ed6_d73f1ea6", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
338
] | [
null
] | [
9
] | [
12
] | |
2024-11-19T01:38:14.198243+00:00 | 1,499,326,169,000 | 372d0741007c3f484f1a105fc833d31ed9b17b88 | 3 | {
"blob_id": "372d0741007c3f484f1a105fc833d31ed9b17b88",
"branch_name": "refs/heads/master",
"committer_date": 1499326169000,
"content_id": "d026198e108e0b228b8bdf19abb2000e5058aed8",
"detected_licenses": [
"MIT"
],
"directory_id": "9474c9ca9507b35216bfeb6a1caff204d27e88b1",
"extension": "py",
"fi... | 2.546875 | stackv2 | '''
@author: Rahul Tanwani
@summary: A module to perform batch request processing.
'''
import json
from django.core.urlresolvers import resolve
from django.http.response import HttpResponse, HttpResponseBadRequest,\
HttpResponseServerError
from django.template.response import ContentNotRenderedError
from django.... | 144 | 33.33 | 113 | 17 | 1,061 | python | [{"finding_id": "codeql_py/stack-trace-exposure_d64f5417676eae4d_b007b30d", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
37
] | [
null
] | [
48
] | [
51
] | |
2024-11-19T01:38:15.910149+00:00 | 1,657,140,795,000 | bb92886bd9b32d5219c54da7692182236291e9aa | 3 | {
"blob_id": "bb92886bd9b32d5219c54da7692182236291e9aa",
"branch_name": "refs/heads/master",
"committer_date": 1657140795000,
"content_id": "c8944ad1a29c8a0a874daf083213b95e4e08a626",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "1d42f73775b5e50ab17806ca99ad4479cccb25fa",
"extension": "py"... | 2.84375 | stackv2 | #!/usr/bin/env python3
# Copyright 2016 Netfishers
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law... | 49 | 35.92 | 83 | 13 | 459 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_c978cae790c75433_5b926ae3", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
41
] | [
null
] | [
22
] | [
38
] | |
2024-11-19T01:38:40.526749+00:00 | 1,594,825,602,000 | 3c18f58ff33356ec155200b018d6c177221bff0e | 3 | {
"blob_id": "3c18f58ff33356ec155200b018d6c177221bff0e",
"branch_name": "refs/heads/master",
"committer_date": 1594825602000,
"content_id": "5927486e7146889458e7fc592b24a9739905cfb4",
"detected_licenses": [
"MIT"
],
"directory_id": "1aacf84f6c8106f04ea03da0a790bce33b22f8b2",
"extension": "py",
"fi... | 2.625 | stackv2 | import requests
import json
from FirepowerFMC.Get_Token import get_access_token
import urllib3
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)
def get_access_policy(token=False):
url = "https://fmcrestapisandbox.cisco.com/api/fmc_config/v1/domain/e276abec-e0f2-11e3-8169-6d9ed49b625f/policy/ac... | 52 | 26.67 | 141 | 19 | 349 | python | [{"finding_id": "codeql_py/request-without-cert-validation_fb36fb14b7927408_6acffeb7", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
14,
25
] | [
null,
null
] | [
16,
24
] | [
46,
57
] | |
2024-11-19T01:51:56.726491+00:00 | 1,644,071,346,000 | c50b49bab62d3df3c04cb96812b6830d5c47baff | 4 | {
"blob_id": "c50b49bab62d3df3c04cb96812b6830d5c47baff",
"branch_name": "refs/heads/master",
"committer_date": 1644071346000,
"content_id": "f112792036a8eb354e1a8ec80bf6b6acbc53a769",
"detected_licenses": [
"MIT"
],
"directory_id": "89d5dbdc6ad03fd0bb54fc83f39bb8b94f514e48",
"extension": "py",
"fi... | 3.875 | stackv2 | print('any time if you want to exit the program just press "q"')
from random import randint
from time import sleep
n = []
while True :
name = input('Enter your name : ')
if name == 'q' :
print('the program has stoped!')
sleep(2)
break
if name == ' ' :
print('the program has s... | 47 | 28.19 | 98 | 14 | 335 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_eca8f77bd1b426bb_734e0c7e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (priva... | [
33,
36,
38
] | [
null,
null,
null
] | [
60,
19,
26
] | [
71,
63,
32
] | |
2024-11-19T01:52:12.038523+00:00 | 1,623,818,205,000 | b619112fa6173278658b0d0375bf9b1bfa64b345 | 3 | {
"blob_id": "b619112fa6173278658b0d0375bf9b1bfa64b345",
"branch_name": "refs/heads/main",
"committer_date": 1623818205000,
"content_id": "2d07e408a107abc7bf30ca995705956d49bcf4d3",
"detected_licenses": [
"MIT"
],
"directory_id": "7984ca81eadbdddaa88c5fe928bd9341391b7af6",
"extension": "py",
"file... | 2.84375 | stackv2 | import os, re
### HTML
patt_del_comment_html = re.compile(r'(<!--.*?-->)') # 删掉注释
patt_del_space_html = re.compile(r'(\s+)') # 删除多余的空格,只保留一个
### CSS
patt_del_comment_css = re.compile(r'(/[*].*?[*]/)')
patt_del_space_css = re.compile(r'(\s+)')
### JS
patt_del_comment_js = re.compile(r'(/[*].*?[*]/)')
patt_del_space_j... | 85 | 30.02 | 65 | 18 | 672 | python | [{"finding_id": "codeql_py/bad-tag-filter_99fe757a0a29d043_e0739501", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression does not match comments containing newlines.", "remediation": "", "location": {"file_pat... | 1 | true | [
"CWE-116"
] | [
"py/bad-tag-filter"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression does not match comments containing newlines."
] | [
4
] | [
null
] | [
38
] | [
50
] | |
2024-11-19T02:04:42.955732+00:00 | 1,471,583,538,000 | deaf31b6388404dfae4c73adab10baacf6e6c428 | 3 | {
"blob_id": "deaf31b6388404dfae4c73adab10baacf6e6c428",
"branch_name": "refs/heads/master",
"committer_date": 1471583538000,
"content_id": "624cd53f2be6e452a0c6b11dfe578453ed3e38ca",
"detected_licenses": [
"MIT"
],
"directory_id": "b136f6162b4c83116a826b37c2753fa29e904bf4",
"extension": "py",
"fi... | 2.796875 | stackv2 | '''
Futuwear python client
The client's role is to connect to the Futuwear
'''
from __future__ import print_function
import bluetooth_handler as bt
import sys
from socketIO_client import SocketIO, LoggingNamespace
import json, requests
import hashlib
socketServer = "futuwear.tunk.org"
registerUrl = 'http://futuwe... | 118 | 30.08 | 130 | 19 | 786 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_00f1762be204398e_7b29f039", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (id)](2) is used in a hashing algorithm (MD5) that is insecure."
] | [
65
] | [
null
] | [
45
] | [
69
] | |
2024-11-19T02:28:27.887614+00:00 | 1,572,905,431,000 | 83236cb9c79c4d71c9bb5a72e8f6d466f5b4c65a | 2 | {
"blob_id": "83236cb9c79c4d71c9bb5a72e8f6d466f5b4c65a",
"branch_name": "refs/heads/master",
"committer_date": 1572905431000,
"content_id": "514a74d1e371529bbf3e8cdd67cd758536c65df5",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "336b3d6fb3f1c2dd6f37a6b52707d1bf16376ddd",
"extension": "p... | 2.40625 | stackv2 | import datetime
import json
import logging
import requests
import boto3
CONFIG_FILE = 'config.json'
logger = logging.getLogger('main')
logger.setLevel(logging.DEBUG)
# debug logs from HTTP requests include the query params,
# which may contain access tokens: suppress them.
logging.getLogger("requests").setLevel(logg... | 187 | 28.14 | 117 | 14 | 1,186 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9b3703cea3324ac2_c2e10a4e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
154
] | [
null
] | [
21
] | [
69
] | |
2024-11-19T02:28:30.987779+00:00 | 1,636,547,144,000 | edbc3651718e3649885d21fb25120086c361b95f | 2 | {
"blob_id": "edbc3651718e3649885d21fb25120086c361b95f",
"branch_name": "refs/heads/main",
"committer_date": 1636547144000,
"content_id": "b90fea3dd6aef076a18e768614d712e44164ff60",
"detected_licenses": [
"MIT"
],
"directory_id": "dbdcf75a38b7f96c1f2b3e48a1eac9fe3ca71b12",
"extension": "py",
"file... | 2.34375 | stackv2 | #!/usr/bin/env python
import os
import ssl
import argparse
from dsvpwa.server import VulnHTTPServer
from dsvpwa.handlers import VulnHTTPRequestHandler
BUILD_VER = os.getenv('BUILD_VER') or '0.0.1'
BUILD_REV = os.getenv('BUILD_REV') or 'dev'
def main():
parser = argparse.ArgumentParser(prog='DSVPWA',
de... | 56 | 36.02 | 100 | 13 | 533 | python | [{"finding_id": "codeql_py/insecure-protocol_b0a00308bf88da33_e14b8f1c", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version SSLv3 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol... | 1 | true | [
"CWE-327"
] | [
"py/insecure-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Insecure SSL/TLS protocol version SSLv3 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.SSLContext](1)."
] | [
41
] | [
null
] | [
28
] | [
31
] | |
2024-11-19T02:28:41.323787+00:00 | 1,497,895,913,000 | 2d1a4c7059d0b6963e61045dc987cc183858e332 | 2 | {
"blob_id": "2d1a4c7059d0b6963e61045dc987cc183858e332",
"branch_name": "refs/heads/master",
"committer_date": 1497896227000,
"content_id": "ba8b2018a6421399c6f8e48260c7094b2c08c03b",
"detected_licenses": [
"MIT"
],
"directory_id": "c03d8fc76e2748f46b1b7e49750286c8648134de",
"extension": "py",
"fi... | 2.46875 | stackv2 | from cryptography.hazmat.backends import default_backend
from cryptography.hazmat.primitives import padding
from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes
from feedback import FeedbackForm
from flask_bootstrap import Bootstrap
from flask import Flask, request, redirect, url_for, render_tem... | 76 | 26 | 83 | 16 | 501 | python | [{"finding_id": "codeql_py/stack-trace-exposure_72326cdae00df5b1_7ec20d6e", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
23
] | [
null
] | [
34
] | [
56
] | |
2024-11-19T02:28:42.007897+00:00 | 1,571,752,204,000 | 86fd329fdc7ff9db56fc5cecf03b602d8a34f37d | 3 | {
"blob_id": "86fd329fdc7ff9db56fc5cecf03b602d8a34f37d",
"branch_name": "refs/heads/master",
"committer_date": 1571752204000,
"content_id": "f2552a07730068c3fd824541d1e448274f440377",
"detected_licenses": [
"MIT"
],
"directory_id": "9a1e1c523a4e7f186b02511f3e159e202be37549",
"extension": "py",
"fi... | 2.671875 | stackv2 | #!/usr/bin/env python
from __future__ import print_function
from dnac_utils import dnac_token, create_url
import requests
import json
# Entry point for program.
if __name__ == '__main__':
# get an authentication token. The username and password is obtained from an environment file
token = dnac_token()
h... | 28 | 29.79 | 98 | 17 | 191 | python | [{"finding_id": "codeql_py/request-without-cert-validation_baf88e5c6cc42d53_66e9fc1b", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
19
] | [
null
] | [
16
] | [
64
] | |
2024-11-19T02:36:51.064642+00:00 | 1,502,685,185,000 | 67e37623a1d4b2a7a31ffc23d8ee5d21bc78e718 | 3 | {
"blob_id": "67e37623a1d4b2a7a31ffc23d8ee5d21bc78e718",
"branch_name": "refs/heads/master",
"committer_date": 1502685185000,
"content_id": "44f7e21e162923a8929a867578338f6e238ecb75",
"detected_licenses": [
"Apache-2.0",
"BSD-3-Clause",
"MIT"
],
"directory_id": "f62fd455e593a7ad203a5c268e23129... | 2.6875 | stackv2 | """
(c) Copyright 2014,2015 Hewlett-Packard Development Company, L.P.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable l... | 156 | 32.5 | 78 | 16 | 1,103 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_b4f6d2e8a29c9afb_0eed3b77", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
72
] | [
null
] | [
9
] | [
66
] | |
2024-11-19T02:36:52.420257+00:00 | 1,619,446,077,000 | 4ab94c621734042f91f3bd778c550a238df7e8b4 | 2 | {
"blob_id": "4ab94c621734042f91f3bd778c550a238df7e8b4",
"branch_name": "refs/heads/master",
"committer_date": 1619446077000,
"content_id": "c9679c416ffdbe3cf5402f90acef28b25c6c3a8d",
"detected_licenses": [
"MIT"
],
"directory_id": "348d0304b6b49af0f3e231456c94db147a2b4cad",
"extension": "py",
"fi... | 2.375 | stackv2 | # -*- coding: utf-8 -*-
"""
Resources below '/<api_base>/token'
"""
import os
import logging
from flask import request
from flask_restful import Resource
from flask_jwt_extended import jwt_refresh_token_required, create_access_token, create_refresh_token, get_jwt_identity
from http import HTTPStatus
from .. import se... | 96 | 28.43 | 118 | 15 | 561 | python | [{"finding_id": "codeql_py/log-injection_2065e7421d351e85_57c4c561", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 4 | true | [
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
60,
66,
70,
73
] | [
null,
null,
null,
null
] | [
18,
27,
23,
18
] | [
57,
30,
26,
62
] | |
2024-11-19T02:36:57.017496+00:00 | 1,522,098,631,000 | bb43facbdd98ba3684758b060673ee776570fdf7 | 3 | {
"blob_id": "bb43facbdd98ba3684758b060673ee776570fdf7",
"branch_name": "refs/heads/master",
"committer_date": 1522102741000,
"content_id": "d9500641323a969e793607d33d06ce5b77d6db18",
"detected_licenses": [
"MIT"
],
"directory_id": "df5f7fbac5b07ea13c2dda0bcb57794e9f32ca14",
"extension": "py",
"fi... | 3.078125 | stackv2 | # -*- coding: utf-8 -*-
# @package: disciplina.py
# @author: Guilherme N. Ramos (gnramos@unb.br)
#
# Funções de extração de informações de relatórios de Planejamento do Sistema
# de Graduação da UnB (SIGRA).
import re
from sigra import utils
def listagem(arquivo):
'''Retorna um dicionário com as informaç... | 93 | 34.6 | 79 | 19 | 866 | python | [{"finding_id": "codeql_py/overly-large-range_4c1d57c4474fc1db_07a919a2", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
38
] | [
null
] | [
34
] | [
37
] | |
2024-11-19T02:37:17.281785+00:00 | 1,578,453,801,000 | 81bde9581e0189908e1c5953c44890d1607411df | 2 | {
"blob_id": "81bde9581e0189908e1c5953c44890d1607411df",
"branch_name": "refs/heads/master",
"committer_date": 1578453801000,
"content_id": "be6fab598e34182b733bfab2e0d5b97455b005d2",
"detected_licenses": [
"MIT"
],
"directory_id": "808f98a53e6afde67684195badee6cf630c69c08",
"extension": "py",
"fi... | 2.4375 | stackv2 | from flask import Flask, jsonify, make_response, request, abort, redirect, send_file, render_template
import logging
import base64
import os
import cv2
import sys
localpath = sys.path[0].replace("/src","")
sys.path.append(localpath)
from src.emotion_recognition import process_image
app = Flask(__name__)
@app.route... | 53 | 29.23 | 139 | 13 | 397 | python | [{"finding_id": "codeql_py/flask-debug_898817e46f44972b_84dc6e88", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-022",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
53,
36,
40
] | [
null,
null,
null
] | [
5,
15,
15
] | [
51,
29,
29
] | |
2024-11-19T02:37:48.230372+00:00 | 1,556,641,034,000 | 4463515d985092577a59d51b7e116ad950c068da | 3 | {
"blob_id": "4463515d985092577a59d51b7e116ad950c068da",
"branch_name": "refs/heads/master",
"committer_date": 1556641034000,
"content_id": "11030f936ed69a793b1646b52591a77b24bb4ca3",
"detected_licenses": [
"MIT"
],
"directory_id": "2c0e9f7e57b8b1fd56e42697eaf83208cc64007f",
"extension": "py",
"fi... | 2.765625 | stackv2 | import arcgis.network as network
import arcgis.geocoding as geocoding
from arcgis.gis import *
from arcgis.geometry import Point
from arcgis.geocoding import geocode, reverse_geocode
from arcgis.features.feature import FeatureSet, Feature
import json
import datetime
import pandas as pd
from flask import Flask
import... | 128 | 34.11 | 139 | 17 | 1,326 | python | [{"finding_id": "codeql_py/stack-trace-exposure_9bda2ba20f0ffd05_f36b6e09", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-918"
] | [
"py/stack-trace-exposure",
"py/partial-ssrf"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
122,
120
] | [
null,
null
] | [
16,
13
] | [
53,
30
] | |
2024-11-19T02:37:51.617291+00:00 | 1,691,594,614,000 | 0c9d19f8d919b7598819d0e6be83d393995c166a | 2 | {
"blob_id": "0c9d19f8d919b7598819d0e6be83d393995c166a",
"branch_name": "refs/heads/master",
"committer_date": 1691594614000,
"content_id": "a2ebd2b9e8094e71c6dec594dd9ee52dda431229",
"detected_licenses": [
"MIT"
],
"directory_id": "979afc46ba685030d2780cdbb678d61d0af33f79",
"extension": "py",
"fi... | 2.421875 | stackv2 | # -*- coding: utf-8 -*-
from re import IGNORECASE
from re import compile as re_compile
HOST_REGEX = re_compile(
# max length for domain name labels is 63 characters per RFC 1034
r'((?:[A-Z0-9](?:[A-Z0-9-]{0,61}[A-Z0-9])?\.)+)'
r'(?:[A-Z0-9-]{2,63}(?<!-))\Z',
IGNORECASE
)
LITERAL_REGEX = re_compile(
... | 27 | 23.78 | 72 | 8 | 306 | python | [{"finding_id": "codeql_py/overly-large-range_21e4346e41aeedc8_d4b0d1c1", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-f\\].", "remediation": "", "lo... | 2 | true | [
"CWE-020",
"CWE-1333"
] | [
"py/overly-large-range",
"py/redos"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-f\\].",
"This part of the regular expression may cause exponential backtracking on strings starting with '\"' and containing many repetitions of '\\\\013'."
] | [
15,
24
] | [
null,
null
] | [
11,
10
] | [
14,
85
] | |
2024-11-19T02:49:10.227131+00:00 | 1,584,468,930,000 | e4af8db854e642d55edde46ed0ec372c2d325c5c | 3 | {
"blob_id": "e4af8db854e642d55edde46ed0ec372c2d325c5c",
"branch_name": "refs/heads/master",
"committer_date": 1584468930000,
"content_id": "07a40521eb3a97a7f5d84276f379f08f95a2c046",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "07c8401d4aea56e5627dc3225733ed67b49e550a",
"extension": "py"... | 3.015625 | stackv2 |
""" Generate random images that compress better.
By replacing the larger images with more compressable equivalents. """
from __future__ import absolute_import
from __future__ import division
from __future__ import print_function
import os
import sys
import tempfile
import tarfile
import zipfile
import PIL.Image
im... | 123 | 30.02 | 76 | 18 | 865 | python | [{"finding_id": "codeql_py/tarslip_777fb8f11ad4ba18_544c1e60", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
85
] | [
null
] | [
7
] | [
10
] | |
2024-11-19T02:49:12.225881+00:00 | 1,419,619,711,000 | 02d1b1f12dce2b4c63464b105a42a104702dde92 | 3 | {
"blob_id": "02d1b1f12dce2b4c63464b105a42a104702dde92",
"branch_name": "refs/heads/master",
"committer_date": 1419619711000,
"content_id": "e4f370de3b43eb18cd14fdb4d529b3da38457ac9",
"detected_licenses": [
"MIT"
],
"directory_id": "0d83051766ac4e6c2caf3d1b70be376a2ea1fc30",
"extension": "py",
"fi... | 2.90625 | stackv2 | #!/usr/bin/python
from BaseHTTPServer import BaseHTTPRequestHandler,HTTPServer
from os import curdir, sep
import cgi
import RPi.GPIO as GPIO
from time import sleep
import logging
import logging.handlers
import sys
#constants
PORT_NUMBER = 8080
LOG_FILENAME = "/tmp/GarageDoorOpener.log"
LOG_LEVEL = logging.INFO # Coul... | 127 | 31.32 | 105 | 14 | 894 | python | [{"finding_id": "codeql_py/path-injection_da055f9c6c1ffe78_dd39fe70", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
24
] | [
null
] | [
18
] | [
39
] | |
2024-11-19T03:00:03.069834+00:00 | 1,611,509,477,000 | ec4bf2ab89f2958f816102c23f760be8b103ff23 | 3 | {
"blob_id": "ec4bf2ab89f2958f816102c23f760be8b103ff23",
"branch_name": "refs/heads/main",
"committer_date": 1611509477000,
"content_id": "96abbfdc01506a05f45fc1fade836bba77c86e3b",
"detected_licenses": [
"MIT"
],
"directory_id": "473e4d4b6d2c7fd1c43a7e9e48a7fb22781e6b83",
"extension": "py",
"file... | 2.625 | stackv2 | from django.db import models
import hashlib
# Account data model (Account)
class Account(models.Model):
# id (never change)
id = models.models.AutoField(primary_key=True)
# Account number (id)
accountID = models.CharField(max_length=24)
# Account nickname (name)
accountName = models.CharFi... | 93 | 27.94 | 88 | 26 | 590 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_eae7218de8b009ac_77b668c1", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
83
] | [
null
] | [
40
] | [
51
] | |
2024-11-19T03:00:05.816609+00:00 | 1,668,791,456,000 | d60bb933ea1cb94ce7c327983a025bb789dd4ced | 2 | {
"blob_id": "d60bb933ea1cb94ce7c327983a025bb789dd4ced",
"branch_name": "refs/heads/master",
"committer_date": 1668791456000,
"content_id": "4f084130001a6d2f0f4236a127377b7a729a2799",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "0d0d833b154e78babc52388ff246617fe02ce4fd",
"extension": "py"... | 2.328125 | stackv2 | from datetime import datetime, timedelta
import logging
import time
from typing import Tuple
import flask
from typing import List, Optional
from implicitdict import ImplicitDict
from . import webapp, basic_auth
from .database import db, Query, QueryState
logging.basicConfig()
_logger = logging.getLogger('atproxy.ha... | 92 | 32.62 | 113 | 19 | 683 | python | [{"finding_id": "codeql_py/stack-trace-exposure_05ed22e3fc4794bf_6c146e0c", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
83
] | [
null
] | [
30
] | [
90
] | |
2024-11-19T03:00:06.252739+00:00 | 1,507,667,564,000 | e5de7f1141a036545cae5ca3f7a70c26d217e650 | 3 | {
"blob_id": "e5de7f1141a036545cae5ca3f7a70c26d217e650",
"branch_name": "refs/heads/master",
"committer_date": 1507667564000,
"content_id": "b90e740e481ee70ec80e4a58b4a2b3176b490c98",
"detected_licenses": [
"MIT"
],
"directory_id": "554c71ed615b4d541f24678bdd7de9a8d52b5310",
"extension": "py",
"fi... | 2.78125 | stackv2 | # Created by Max Yurchenko on 07.10.2017
# email: joker0071911@gmail.com
# feel free to ask any questions)
# Copyright(C) 2017
from crypto import *
from commonFunctions import *
import os
class Authorisation:
users = {}
def __init__(self):
printOSinfo()
input()
self.parse_user_da... | 56 | 29.86 | 83 | 16 | 387 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_ed5f56c2a6161eb0_a4b61f0e", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
55
] | [
null
] | [
30
] | [
65
] | |
2024-11-19T03:00:14.649971+00:00 | 1,649,828,816,000 | 7c17c0a76fce75c9be12c9513a3aff70a6be343f | 3 | {
"blob_id": "7c17c0a76fce75c9be12c9513a3aff70a6be343f",
"branch_name": "refs/heads/master",
"committer_date": 1649828816000,
"content_id": "00b0272a6c83fe145905bb6fac09056bd151af92",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "7ededf9636370f226f3153882ec0261b76bcf267",
"extension": "py"... | 2.609375 | stackv2 | #!/usr/bin/env python
#-*- coding:utf-8; mode:python; indent-tabs-mode: nil; c-basic-offset: 2; tab-width: 2 -*-
import os, os.path as path
from collections import namedtuple
from bes.fs.file_util import file_util
class install(object):
item = namedtuple('item', 'filename,dest_dir,mode')
@classmethod
def i... | 22 | 27.27 | 90 | 13 | 161 | python | [{"finding_id": "codeql_py/overly-permissive-file_24e9b024173423ae_e7b7bac9", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable."
] | [
17
] | [
null
] | [
5
] | [
50
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.