added
stringlengths
32
32
created
int64
1,236B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.03
source
stringclasses
1 value
text
stringlengths
330
19.3k
num_lines
int64
16
648
avg_line_length
float64
15.5
59.3
max_line_length
int64
37
179
ast_depth
int64
8
38
length
int64
102
3.79k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.11k
276k
sast_codeql_findings_count
int64
1
33
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
33
rule_ids
listlengths
1
33
confidences
listlengths
1
33
severities
listlengths
1
33
messages
listlengths
1
33
line_starts
listlengths
1
33
line_ends
listlengths
1
33
column_starts
listlengths
1
33
column_ends
listlengths
1
33
2024-11-18T19:02:45.134896+00:00
1,575,558,429,000
4b312e6c6e9ec5eac437a3035145fb2b22dbe08b
3
{ "blob_id": "4b312e6c6e9ec5eac437a3035145fb2b22dbe08b", "branch_name": "refs/heads/master", "committer_date": 1575558429000, "content_id": "852fcbc2e47a0809c98a7da74148bf5fb8e76335", "detected_licenses": [ "MIT" ], "directory_id": "d22c4fd032dc2b0d38270f67aeab0bfb69cb1c28", "extension": "py", "fi...
2.515625
stackv2
from controller import Worker import os import time import torch import sys import cv2 import pickle import warnings from PIL import Image from torchvision import transforms from seer_model import EncoderCNN, DecoderRNN from multiprocessing import Pool sys.path.append('utils') import my_pytube class Job: "Model ...
352
37.13
114
19
2,911
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_aeeee1ad11f749b4_9a88cc12", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [youtube.com](1) may be at an arbitrary position in the...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [youtube.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 50 ]
[ null ]
[ 12 ]
[ 39 ]
2024-11-18T19:02:48.602115+00:00
1,527,556,401,000
0cbf5833932cb5c28389922a9b00e7019aefe1cf
3
{ "blob_id": "0cbf5833932cb5c28389922a9b00e7019aefe1cf", "branch_name": "refs/heads/master", "committer_date": 1527556401000, "content_id": "707124655b60050b5759ac079ffc269e0cdae533", "detected_licenses": [ "MIT" ], "directory_id": "36050bf30d362e620e700dff2903c2a266cb3dce", "extension": "py", "fi...
3
stackv2
# -*- coding: utf-8 -*- from xgoogle.search import GoogleSearch import time import random import re DEFAULT_SEARCH_AMOUNT = 30 class GoogleSearchKeyword(GoogleSearch): def get_keywords(self): keywords = {} self.results_per_page = DEFAULT_SEARCH_AMOUNT soup = self._search_and_get_soup() ...
58
34.14
94
23
493
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_3df1658bcdb7d614_155ae2ab", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'yahoo.com', so it might match more ...
1
true
[ "CWE-020" ]
[ "py/incomplete-hostname-regexp" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'yahoo.com', so it might match more hosts than expected." ]
[ 35 ]
[ null ]
[ 45 ]
[ 76 ]
2024-11-18T19:03:03.784436+00:00
1,632,313,948,000
4b31c93bf07d544878c9f603296b4a54632fc306
2
{ "blob_id": "4b31c93bf07d544878c9f603296b4a54632fc306", "branch_name": "refs/heads/main", "committer_date": 1632313948000, "content_id": "493d543310ab4cedd3e6e64e923c4d6fc648139c", "detected_licenses": [ "MIT" ], "directory_id": "83177e497c2fe7ceb16768e3d03e15b7b042969c", "extension": "py", "file...
2.484375
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- """ Basic Dahua RPC wrapper. Forked from https://gist.github.com/48072a72be3a169bc43549e676713201.git Added ANPR Plate Number extraction by Naveen Sakthivel <https://github.com/naveenrobo> Example: from dahua_rpc import DahuaRpc dahua = DahuaRpc(host="192.168.1.10"...
313
28.77
116
15
2,205
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_6acc055843da324e_661e4f7f", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.", "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) t...
[ 91, 95 ]
[ null, null ]
[ 32, 33 ]
[ 42, 44 ]
2024-11-18T19:27:26.570231+00:00
1,439,396,784,000
25b13ff682a4741f031b8999671d135ab012d088
3
{ "blob_id": "25b13ff682a4741f031b8999671d135ab012d088", "branch_name": "refs/heads/master", "committer_date": 1439396784000, "content_id": "99b29e79eef6415c72fbddf5ad399795167f85a7", "detected_licenses": [ "MIT" ], "directory_id": "93226c868fbb355c89798e8b506ce2cc048bf2f7", "extension": "py", "fi...
2.59375
stackv2
import base64 import getpass import socket import string import os import subprocess import time import datetime import inspect def find_exe(name): """ Find an executable with the given name. :param name: :return: """ for path in os.getenv('PATH').split(os.pathsep): for ext in ('',...
84
27.95
98
19
561
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_d493b4d4da6e3732_9d0bebfa", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (secret)](1) as clear text." ]
[ 72 ]
[ null ]
[ 18 ]
[ 24 ]
2024-11-18T19:27:48.739527+00:00
1,557,017,072,000
7397e2dcd9e7d01ecc4528b3d3c3ba94f03bc87e
2
{ "blob_id": "7397e2dcd9e7d01ecc4528b3d3c3ba94f03bc87e", "branch_name": "refs/heads/master", "committer_date": 1557017072000, "content_id": "d1f6579cec71017991420f89b25cb1ff337fd147", "detected_licenses": [ "MIT" ], "directory_id": "aaf2248667c8492787f2ff02dc643202156cab45", "extension": "py", "fi...
2.328125
stackv2
import os import logging import time import ast import requests from flask import Blueprint, jsonify, request, make_response gate = Blueprint('gate', __name__, url_prefix='/api') # Rate Limiting RATE_LIMIT = int(os.getenv("RATE_LIMITING_THRESHOLD")) TIMEOUT = int(os.getenv("BLOCKED_IP_TIMEOUT")) # Logger from Gunic...
107
30.52
87
18
797
python
[{"finding_id": "codeql_py/partial-ssrf_ff1281b8e953a3af_ac5c3362", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
2
true
[ "CWE-918", "CWE-117" ]
[ "py/partial-ssrf", "py/log-injection" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 89, 32 ]
[ null, null ]
[ 16, 26 ]
[ 33, 50 ]
2024-11-18T20:06:10.657577+00:00
1,687,059,361,000
21ec196221dfc7a3969fd32d61d1038810e1f550
2
{ "blob_id": "21ec196221dfc7a3969fd32d61d1038810e1f550", "branch_name": "refs/heads/master", "committer_date": 1687059361000, "content_id": "8155f398842a0826a97dce0b63712c1493d70116", "detected_licenses": [ "MIT" ], "directory_id": "7f05e9b1e49d3220d76f684d3bb1a64d71600def", "extension": "py", "fi...
2.421875
stackv2
import os import re from urllib.parse import urlparse from flask import ( Flask, make_response, render_template, request, ) import praw import markdown import requests from weasyprint import HTML import yaml app = Flask(__name__) file_dir = os.path.dirname(__file__) class Config: def __init__(...
117
33.78
116
16
891
python
[{"finding_id": "codeql_py/polynomial-redos_c6a84bacdf6a337b_b0a01236", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings startin...
1
true
[ "CWE-1333" ]
[ "py/polynomial-redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings starting with '/r/' and with many repetitions of '/r/'." ]
[ 49 ]
[ null ]
[ 93 ]
[ 108 ]
2024-11-18T20:06:11.960907+00:00
1,570,413,952,000
4a9942519a008f452352f4e65d8c923afd7f9b12
3
{ "blob_id": "4a9942519a008f452352f4e65d8c923afd7f9b12", "branch_name": "refs/heads/master", "committer_date": 1570413952000, "content_id": "a32b9286c172ce834b86784e3e74d51dc5b1a7b3", "detected_licenses": [ "MIT" ], "directory_id": "895acb69066b6da8f4a3fa9da340e46c05f025b7", "extension": "py", "fi...
2.96875
stackv2
from lib.data.db.schema.recordsets.recordset import RecordSet from lib.data.db.schema.records.user import User from sqlalchemy.orm.exc import NoResultFound import hashlib class Users(RecordSet): """ A recordset of persisted users. --- This class facades several operations and queries on the user records. ...
78
32.46
142
17
507
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_83287b8ea8184e9e_71345678", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e...
[ 78 ]
[ null ]
[ 31 ]
[ 55 ]
2024-11-18T20:06:33.314695+00:00
1,605,043,030,000
62bf39d931319b82be3aa46f7774dd1f5ca4952a
2
{ "blob_id": "62bf39d931319b82be3aa46f7774dd1f5ca4952a", "branch_name": "refs/heads/master", "committer_date": 1605043030000, "content_id": "c0aa32149e96d301ee6ddd75f016aa04dde5861f", "detected_licenses": [ "MIT" ], "directory_id": "c284a0fecb743ae5bb301007e79f7a72f3ccaec5", "extension": "py", "fi...
2.34375
stackv2
from flask import abort, request, redirect from flask_login import login_user import urllib.parse from app import app, bcrypt, db, render_template from app.db_models import User @app.route("/reset-password/<reset_password_case_id>", methods=["GET", "POST"]) def reset_password(reset_password_case_id): user = User....
49
33.59
115
15
355
python
[{"finding_id": "codeql_py/url-redirection_8fad8d5ab8b16cd1_0408fcea", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 43 ]
[ null ]
[ 29 ]
[ 40 ]
2024-11-18T20:18:11.118619+00:00
1,516,020,853,000
f9b7243debeb92e5f62e4ce3ce7563cc5484bf6a
2
{ "blob_id": "f9b7243debeb92e5f62e4ce3ce7563cc5484bf6a", "branch_name": "refs/heads/master", "committer_date": 1516020853000, "content_id": "bc8af36feee79046fc3edff184917a92d7259b8b", "detected_licenses": [ "Apache-2.0" ], "directory_id": "78176f6c8ac304ae40ed0a7f3f9c7123aed08fdf", "extension": "py"...
2.328125
stackv2
#!/usr/bin/python # # Copyright 2015 Gerard kok # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agr...
67
28.54
83
17
444
python
[{"finding_id": "codeql_py/overly-permissive-file_5af4db790fafd9f2_7bdae8b1", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable." ]
[ 55 ]
[ null ]
[ 9 ]
[ 31 ]
2024-11-18T20:31:16.834294+00:00
1,690,273,388,000
2540918ff8b7c20bb1e54ade0f58ddd4f211d37e
3
{ "blob_id": "2540918ff8b7c20bb1e54ade0f58ddd4f211d37e", "branch_name": "refs/heads/master", "committer_date": 1690273388000, "content_id": "5d2498e008316b134dd3ba2ac7075f668f0d471d", "detected_licenses": [ "MIT" ], "directory_id": "97933c7f0973cb5671a26d28763e2688882b6ba9", "extension": "py", "fi...
3.125
stackv2
#!/usr/bin/env python # -*- coding:utf-8 -*- """ Date: 2022/1/26 15:10 Desc: 福布斯中国-榜单 https://www.forbeschina.com/lists """ import pandas as pd import requests from bs4 import BeautifulSoup def forbes_rank(symbol: str = "2021福布斯中国创投人100") -> pd.DataFrame: """ 福布斯中国-榜单 https://www.forbeschina.com/lists ...
49
25.71
81
14
411
python
[{"finding_id": "codeql_py/request-without-cert-validation_1a21c567f74b1e47_a206f7b3", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 24, 42 ]
[ null, null ]
[ 9, 9 ]
[ 40, 58 ]
2024-11-18T20:31:29.129551+00:00
1,602,076,105,000
21dbdd05f66a5e6e6ac21411ed31e1bcaec3e833
3
{ "blob_id": "21dbdd05f66a5e6e6ac21411ed31e1bcaec3e833", "branch_name": "refs/heads/master", "committer_date": 1602076105000, "content_id": "34b00cbaa3f6c41c6e949372e600cd58d4a2c1b3", "detected_licenses": [ "MIT" ], "directory_id": "c45d1ae5a4b99ab8ae272cd1f25368a1a293981a", "extension": "py", "fi...
2.625
stackv2
# -*- coding:utf-8 -*- import requests, sys, hashlib, time, json, base64, logging import urllib.parse sys.path.append("../../") import settings from util.readImage import readImage from util.log import logging_elapsed_time class netease_ai(object): def __init__(self): self._app_id = settings.NETEASE_APP_I...
106
32.28
99
16
872
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_6ae824d454b1e8cb_328d1931", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 29 ]
[ null ]
[ 32 ]
[ 49 ]
2024-11-18T20:31:31.392847+00:00
1,530,336,909,000
3e4436630bd943d8dd69f603f6b988825b718df4
3
{ "blob_id": "3e4436630bd943d8dd69f603f6b988825b718df4", "branch_name": "refs/heads/master", "committer_date": 1530336909000, "content_id": "90db93b9ae23f3fedf1cb47e71455b591bb043df", "detected_licenses": [ "Apache-2.0" ], "directory_id": "977307cfe26cf7536227808db0583077f724272a", "extension": "py"...
2.734375
stackv2
#!/usr/bin/python3 ''' Unobfuscate the master password from the obfuscated encryptionKey.properties file. yum install python-crypto ''' import base64,sys,traceback from Crypto.Hash import MD5 from Crypto.Cipher import DES,AES pad = b'\xc7\xc7\xc7\xc7\xc7\xc7\xc7\xc7\x99\x99\x99\x99\x99\x99\x99\x99' des_salt = b'\xc7...
75
28.64
86
17
677
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_50e8d6028b2f62e6_8e7f541a", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The cryptographic algorithm DES](1) is broken or weak, and should not be used.", "r...
3
true
[ "CWE-327", "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[The cryptographic algorithm DES](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used.", "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash fu...
[ 31, 63, 19 ]
[ null, null, null ]
[ 17, 21, 19 ]
[ 38, 76, 27 ]
2024-11-18T20:43:31.967866+00:00
1,692,279,512,000
f6bfbdd9a6b527f6bfce09a4b0c68a0bb3048a23
2
{ "blob_id": "f6bfbdd9a6b527f6bfce09a4b0c68a0bb3048a23", "branch_name": "refs/heads/master", "committer_date": 1692279512000, "content_id": "68950a3f1498a98d684ad0b9d8da436c6cf2c7c1", "detected_licenses": [ "MIT" ], "directory_id": "82a40fd597a3edb2a2edda2a87e055f89ea98a79", "extension": "py", "fi...
2.46875
stackv2
"PubMed interface." import json import os import os.path import re import string import sys import time import unicodedata import xml.etree.ElementTree import requests PUBMED_FETCH_URL = "https://eutils.ncbi.nlm.nih.gov/entrez/eutils/efetch.fcgi?db=pubmed&rettype=abstract&id=%s&retmode=xml" PUBMED_SEARCH_URL = "htt...
414
30.77
123
17
3,230
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_0a0b70f396c4d9f9_e4a52fa0", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive...
[ 132, 81, 121 ]
[ null, null, null ]
[ 31, 27, 27 ]
[ 38, 30, 30 ]
2024-11-18T20:43:38.657238+00:00
1,477,567,243,000
8dc3135a3e3ebc213680020af425ae32e7fb75c9
3
{ "blob_id": "8dc3135a3e3ebc213680020af425ae32e7fb75c9", "branch_name": "refs/heads/master", "committer_date": 1477567243000, "content_id": "ef65c8cea0d2d353f7444866247b46837fc83689", "detected_licenses": [ "Apache-2.0" ], "directory_id": "81991eed7c72bd2c0e232c406af1dc570df64b87", "extension": "py"...
2.578125
stackv2
import errno import os import re import shutil import time from applicake.coreutils.keys import Keys def create_workdir(log, info): if not Keys.WORKDIR in info: log.debug("No WORKDIR requested") return info if info[Keys.WORKDIR] != "": log.debug("Using specified WORKDIR [%s]" % info[...
77
29.31
106
18
628
python
[{"finding_id": "codeql_py/overly-permissive-file_820b5831bde468fe_6ff32bab", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
2
true
[ "CWE-732", "CWE-732" ]
[ "py/overly-permissive-file", "py/overly-permissive-file" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable.", "Overly permissive mask in chmod sets file to world readable." ]
[ 53, 77 ]
[ null, null ]
[ 13, 9 ]
[ 33, 31 ]
2024-11-18T20:43:42.352435+00:00
1,618,866,631,000
5a6bac77dc14548cbe52ca3c34c987be4e932d53
2
{ "blob_id": "5a6bac77dc14548cbe52ca3c34c987be4e932d53", "branch_name": "refs/heads/main", "committer_date": 1618866631000, "content_id": "b3d066a663fa6421da26fec7012ccc1194b1dd0d", "detected_licenses": [ "Apache-2.0" ], "directory_id": "2e9a8973728c2b4566596b0d8c78a8c32355e65a", "extension": "py", ...
2.328125
stackv2
"""Resource module for resultat view.""" import logging from aiohttp import web import aiohttp_jinja2 from sprint_webserver.services import ( InnstillingerService, KjoreplanService, KlasserService, ) class Kjoreplan(web.View): """Class representing the kjoreplan / heatliste resource.""" async d...
71
31.9
88
17
552
python
[{"finding_id": "codeql_py/log-injection_3d3b9638d76e8526_5708af77", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 64 ]
[ null ]
[ 23 ]
[ 70 ]
2024-11-18T20:43:48.389531+00:00
1,619,681,784,000
fb030db06db80906fffd15822a6bc7f820993916
2
{ "blob_id": "fb030db06db80906fffd15822a6bc7f820993916", "branch_name": "refs/heads/main", "committer_date": 1619681784000, "content_id": "8e166ec158cf71a17d49ea737c55aad8d3ce5213", "detected_licenses": [ "MIT" ], "directory_id": "7aeef2e5ebc1cf5a0da427f57873ce0653762d11", "extension": "py", "file...
2.46875
stackv2
from rest_framework.decorators import api_view, permission_classes from rest_framework.permissions import AllowAny from rest_framework.response import Response from requests import get @api_view() @permission_classes([AllowAny]) def ipView(request): ''' IP View ''' ip = get_client_ip(request) response = i...
38
25.82
66
12
245
python
[{"finding_id": "codeql_py/partial-ssrf_7709046a7dceb62d_635e73fa", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depen...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depends on a [user-provided value](2)." ]
[ 27 ]
[ null ]
[ 12 ]
[ 31 ]
2024-11-18T20:43:50.616512+00:00
1,519,763,689,000
692280e7818ac1eb5f66ed8af0554720a7c22a53
3
{ "blob_id": "692280e7818ac1eb5f66ed8af0554720a7c22a53", "branch_name": "refs/heads/master", "committer_date": 1519763689000, "content_id": "1c1d7765e349545f2ad959a320fe3c7842fc2e4e", "detected_licenses": [ "MIT" ], "directory_id": "cdddb09380b2372bbf058715d6fd6fd5cc469919", "extension": "py", "fi...
2.6875
stackv2
import base64 import glob import json from operator import itemgetter import os from jinja2 import Environment, FileSystemLoader from css_html_js_minify.js_minifier import js_minify_keep_comments from .marker import Marker, MarkerCluster from .utils import position_to_latLng, calc_avg_position from .mapelement import...
233
28.53
87
17
1,539
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_c9f36bc9b0b65524_f39f5843", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 24 ]
[ null ]
[ 11 ]
[ 37 ]
2024-11-18T20:44:02.132720+00:00
1,562,051,837,000
503e2508d7a9f2e3b71b4c2544890480b19c852e
3
{ "blob_id": "503e2508d7a9f2e3b71b4c2544890480b19c852e", "branch_name": "refs/heads/master", "committer_date": 1562051837000, "content_id": "2c41208e90ccb0540cdf27fc9890c556ef88668b", "detected_licenses": [ "MIT" ], "directory_id": "1720d18e98a9f4066bdf91851ecc9960ab6f8f0f", "extension": "py", "fi...
2.515625
stackv2
import logging import re import django from django.contrib.auth import authenticate from django.shortcuts import render, redirect from .models import CustomUser def get_logger(): logger = logging.getLogger('views_account') logger.setLevel(logging.DEBUG) ch = logging.StreamHandler() ch.setLevel(loggi...
95
31.98
89
16
594
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fdb9e36d95bfad7e_ab9d96a4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 80 ]
[ null ]
[ 22 ]
[ 41 ]
2024-11-18T20:44:05.577564+00:00
1,600,086,947,000
aed77e90fe6492d65e911d0147254f7dfff006ae
3
{ "blob_id": "aed77e90fe6492d65e911d0147254f7dfff006ae", "branch_name": "refs/heads/master", "committer_date": 1600086947000, "content_id": "d3030e29ce0e4ec52ab9dc86357738a3510047e0", "detected_licenses": [ "MIT" ], "directory_id": "2aa66e8adb105205532ae4a05158265e66d9ed70", "extension": "py", "fi...
2.5625
stackv2
# -*-coding:utf-8-*- ''' @author : qzylalala @file : FaceppApi.py @time : 2020-09-07 19:04 ''' import urllib.request import urllib.error import json import time http_url = 'https://api-cn.faceplusplus.com/facepp/v3/detect' key = "xxx" secret = "xxx" # use your own key and secret key #---------------------------...
71
35.59
144
14
735
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_51075d6732c3845c_7d27330c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 65 ]
[ null ]
[ 15 ]
[ 38 ]
2024-11-18T20:57:30.503166+00:00
1,572,552,454,000
3549830c8e7ed2a836e6317b81621b710ed9737c
3
{ "blob_id": "3549830c8e7ed2a836e6317b81621b710ed9737c", "branch_name": "refs/heads/master", "committer_date": 1572552454000, "content_id": "53a711ddfcf5218e5f991337659b3b7616bfc5f5", "detected_licenses": [ "Apache-2.0" ], "directory_id": "d755154d58f66d8ee428d62fc628c4a57127cec5", "extension": "py"...
2.5625
stackv2
import time import os import re import warnings from argon2 import PasswordHasher from argon2.exceptions import VerifyMismatchError from .error import AbortRequest VALID_PERM_CODES = "W" HEADER = "# username:upload_dir_prefix:permission_flags:password_hash" class SecurityManager(object): """Manages a list of ...
185
33.97
119
18
1,455
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_8815ebebf195e0c6_7391af29", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 102 ]
[ null ]
[ 28 ]
[ 39 ]
2024-11-18T20:57:38.520261+00:00
1,692,465,199,000
ffb1ee6041ac64e15a030f7aba2d6a6e05c43460
3
{ "blob_id": "ffb1ee6041ac64e15a030f7aba2d6a6e05c43460", "branch_name": "refs/heads/master", "committer_date": 1692465199000, "content_id": "1c594e75cbc86d3a96107ed0b5c7c550c2d524bd", "detected_licenses": [ "MIT" ], "directory_id": "632dcb4e37cadd87cb7ff8715b0048df5cd0d11b", "extension": "py", "fi...
2.875
stackv2
import os from jinja2 import Environment, FileSystemLoader from collections import OrderedDict # Capture our current directory def print_rendered_xml(): # Create the jinja2 environment. # Notice the use of trim_blocks, which greatly helps control whitespace. THIS_DIR = os.path.dirname(os.path.abspath(__...
30
24.63
76
11
182
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_079c8d4673489b8b_410aca9c", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 14 ]
[ 15 ]
[ 14 ]
[ 43 ]
2024-11-18T20:58:04.969914+00:00
1,610,123,214,000
432ab5c7f59c0d75dc459e97d7ab0927f7193daf
2
{ "blob_id": "432ab5c7f59c0d75dc459e97d7ab0927f7193daf", "branch_name": "refs/heads/main", "committer_date": 1610123214000, "content_id": "604922dc64c941b6d282019ffea81114b423e617", "detected_licenses": [ "MIT" ], "directory_id": "0df8ca92e221608c08e0a72d642a33db9eabd381", "extension": "py", "file...
2.328125
stackv2
#!/usr/bin/env python3 from flask import Flask, send_file import keyboard import os, os.path app = Flask(__name__) # path to files appPath = app.root_path + '/' @app.route("/") def Interface(): return send_file(appPath + 'interface.html') @app.route("/<name>") def other(name): if not name == '': # key...
36
22.69
59
16
220
python
[{"finding_id": "codeql_py/path-injection_3fc2e130090bbc1c_16ef3d70", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 25, 26 ]
[ null, null ]
[ 31, 34 ]
[ 58, 48 ]
2024-11-18T20:58:14.134131+00:00
1,545,003,404,000
861524dfefaefd0c51cd8e89108f7695cfb64f4f
3
{ "blob_id": "861524dfefaefd0c51cd8e89108f7695cfb64f4f", "branch_name": "refs/heads/master", "committer_date": 1545003404000, "content_id": "57353d66f533dd709955ca7b934161492f0fc087", "detected_licenses": [ "MIT" ], "directory_id": "1e0ae93881658f1ff36d39c93c72b6355ee193da", "extension": "py", "fi...
2.625
stackv2
import flask import json import random random.seed(42) app = flask.Flask('real/fake') app.secret_key = '9)P39f.a2C99d9+wH662[=*@' app.config['SEND_FILE_MAX_AGE_DEFAULT'] = 60 app.jinja_env.globals.update(len=len) app.jinja_env.globals.update(max=max) app.jinja_env.globals.update(zip=zip) def load_data(labels_file, ...
139
31.36
78
18
1,039
python
[{"finding_id": "codeql_py/reflective-xss_c849668e77ac4290_3ae52251", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 103 ]
[ null ]
[ 12 ]
[ 62 ]
2024-11-18T21:10:16.029614+00:00
1,584,551,167,000
8299841658ead773e6394d7b8e083f7ae3cf1362
3
{ "blob_id": "8299841658ead773e6394d7b8e083f7ae3cf1362", "branch_name": "refs/heads/master", "committer_date": 1584551167000, "content_id": "8f713c9620e3fabe4e015c1bafa6eb2d14a6706f", "detected_licenses": [ "MIT" ], "directory_id": "2c953ed3034eb4912b0107fcc94dc417f6d828bc", "extension": "py", "fi...
2.5625
stackv2
#!/usr/bin/env python3 from datetime import date import sys import argparse import requests import random import json from io import StringIO import urllib.request import os from datetime import datetime from dotenv import load_dotenv load_dotenv() def getUserInfo(header, user): r = requests.get(API_URL + "user/"...
110
36.75
177
30
914
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_cdef4a3fc0f3789a_0c3eec78", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.\nThis expression stores [sensitive data (private)](3) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data ...
[ 75, 64 ]
[ null, null ]
[ 35, 27 ]
[ 46, 34 ]
2024-11-18T21:10:18.443265+00:00
1,630,381,376,000
a4607cb9cde42e66b3fb8196b9aba7f3457baa17
2
{ "blob_id": "a4607cb9cde42e66b3fb8196b9aba7f3457baa17", "branch_name": "refs/heads/main", "committer_date": 1630381376000, "content_id": "37ca910aa6b52270cba96dd0781816f10f61083d", "detected_licenses": [ "MIT" ], "directory_id": "a2da13982a46bd9b822b442efa376809715aaf0d", "extension": "py", "file...
2.5
stackv2
import re from django.db import DatabaseError from django.http import HttpResponseBadRequest, HttpResponse, JsonResponse from django.shortcuts import render import logging from django.shortcuts import redirect from django.urls import reverse from django.contrib.auth.mixins import LoginRequiredMixin # Create your view...
401
29.39
94
16
3,124
python
[{"finding_id": "codeql_py/url-redirection_dc84663e3310110a_56e438c7", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 209 ]
[ null ]
[ 33 ]
[ 42 ]
2024-11-18T21:11:02.706643+00:00
1,540,403,942,000
3eb21e6ab4afa43c0c467eb7fb380d5afe83a612
2
{ "blob_id": "3eb21e6ab4afa43c0c467eb7fb380d5afe83a612", "branch_name": "refs/heads/master", "committer_date": 1540403942000, "content_id": "0e35ec61bc3a8fe9eba10c3351c6ea0fde93bac8", "detected_licenses": [ "MIT" ], "directory_id": "c8077a0a60f0d76d12e409f751884e52ae361355", "extension": "py", "fi...
2.328125
stackv2
#!/usr/bin/env python """ Generates an arbitrated Ethernet mux with the specified number of ports """ from __future__ import print_function import argparse import math from jinja2 import Template def main(): parser = argparse.ArgumentParser(description=__doc__.strip()) parser.add_argument('-p', '--ports', t...
186
30.12
124
12
1,586
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_cfd878558c24f836_e87cd071", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 41 ]
[ 173 ]
[ 9 ]
[ 5 ]
2024-11-18T21:11:04.977852+00:00
1,476,563,515,000
736700ff5d5f6fab179616ab782e94aee529c46a
2
{ "blob_id": "736700ff5d5f6fab179616ab782e94aee529c46a", "branch_name": "refs/heads/master", "committer_date": 1476563515000, "content_id": "3550a6c41e1d6042c87b2072f413d93586aa22c4", "detected_licenses": [ "Apache-2.0" ], "directory_id": "b693f62e2769e2a317d753c1e09893c3f9bd5b0f", "extension": "py"...
2.46875
stackv2
import os if os.name == 'nt': from . import crypt_windows as crypt else: import crypt import hashlib from struct import pack import six from vertica_python.vertica.messages.message import FrontendMessage from vertica_python.vertica.messages.backend_messages.authentication import Authentication class Pass...
59
32.17
95
18
386
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_54bf11bcf63144e4_e366cc54", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 37 ]
[ null ]
[ 26 ]
[ 59 ]
2024-11-18T19:03:17.978693+00:00
1,565,252,835,000
4054343d0a364beffd8c627bd04ccfee5eaaf670
3
{ "blob_id": "4054343d0a364beffd8c627bd04ccfee5eaaf670", "branch_name": "refs/heads/master", "committer_date": 1565252835000, "content_id": "9f8208acafedef247fc22e9494ea1d0007093831", "detected_licenses": [ "MIT" ], "directory_id": "f2b68cfe0d863013a76da0b4e516fa37b16d035a", "extension": "py", "fi...
2.59375
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- from sys import argv try: from PIL import Image except: from sys import stderr stderr.write('[E] PIL not installed') exit(1) from io import BytesIO from urllib.request import Request, urlopen from urllib.parse import urlencode import json import re import s...
93
29.48
126
16
868
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_f300551066c325dc_346a8c40", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'xkcd.com', so it might match more h...
1
true
[ "CWE-020" ]
[ "py/incomplete-hostname-regexp" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'xkcd.com', so it might match more hosts than expected." ]
[ 29 ]
[ null ]
[ 51 ]
[ 82 ]
2024-11-18T19:28:40.201157+00:00
1,581,518,490,000
3455789882048a1c5b609154a0ad1747b6df27e8
3
{ "blob_id": "3455789882048a1c5b609154a0ad1747b6df27e8", "branch_name": "refs/heads/master", "committer_date": 1581518490000, "content_id": "1b3f21fd1ce3b84419762a3acfa7a91c89fb3c9f", "detected_licenses": [ "MIT" ], "directory_id": "89e908a77dee4196b44d745534b089f0c68f68ce", "extension": "py", "fi...
2.859375
stackv2
import flask import pyodbc # Initializes app and database connection app = flask.Flask('biosphere', template_folder='templates') db_conn = conn = pyodbc.connect( 'Driver={SQL Server};' 'Server=DESKTOP-QR078NF\SQLEXPRESS;' 'Database=BIOSPHERE;' 'Trusted_Connection=yes;' ) # Function to handle the root ...
183
31.15
105
15
1,413
python
[{"finding_id": "codeql_py/sql-injection_dd9fffe1dc95ae7a_4c49fc75", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown...
4
true
[ "CWE-089", "CWE-089", "CWE-089", "CWE-089" ]
[ "py/sql-injection", "py/sql-injection", "py/sql-injection", "py/sql-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This SQL query depends on a [user-provided value](1).", "This SQL query depends on a [user-provided value](1).", "This SQL query depends on a [user-provided value](1).", "This SQL query depends on a [user-provided value](1)." ]
[ 48, 86, 124, 169 ]
[ null, null, null, 173 ]
[ 24, 24, 24, 24 ]
[ 69, 68, 55, 17 ]
2024-11-18T19:28:56.354749+00:00
1,484,190,859,000
593447e3d634bf0e4f58e3d2bf0d93d026c0bf0b
3
{ "blob_id": "593447e3d634bf0e4f58e3d2bf0d93d026c0bf0b", "branch_name": "refs/heads/master", "committer_date": 1484190859000, "content_id": "b7cfd439c6c53f53dd5ee4e57105035b865bb1c9", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "0e2a416d46e3f76a36db29d87a3a50f7f74e90c8", "extension": "p...
2.5625
stackv2
#!/usr/bin/python from jinja2 import Environment, FileSystemLoader import yaml import codecs import sys ENV = Environment(loader=FileSystemLoader('./')) # load yaml file into dictionary with open("data.yaml") as _: dict = yaml.load(_) # Render template and print generated config to console, also set codec so ...
19
25.63
107
10
115
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_9dc968e1a9dfe1e2_814785bc", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 8 ]
[ null ]
[ 7 ]
[ 49 ]
2024-11-18T19:39:33.322809+00:00
1,682,623,785,000
48a322dbeb8d600c1a7f71c3e19b71cc5709e263
3
{ "blob_id": "48a322dbeb8d600c1a7f71c3e19b71cc5709e263", "branch_name": "refs/heads/master", "committer_date": 1682623785000, "content_id": "72ee0425eb2363ab39f85ba9d239891aa0279dcd", "detected_licenses": [ "MIT" ], "directory_id": "3f92c74e40b78cb9a29785f810c4bf6e9a661eca", "extension": "py", "fi...
2.625
stackv2
#!/usr/bin/env python # # Use the raw transactions API to spend bitcoins received on particular addresses, # and send any change back to that same address. # # Example usage: # spendfrom.py # Lists available funds # spendfrom.py --from=ADDRESS --to=ADDRESS --amount=11.00 # # Assumes it will talk to a bitcoind or Bit...
267
36.65
111
23
2,431
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5e60679b13d30973_fb18761a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 77, 81 ]
[ null, null ]
[ 30, 26 ]
[ 84, 75 ]
2024-11-18T19:39:34.422956+00:00
1,636,706,019,000
94bf382ac7675f4d60703d40ea922605f16de12c
3
{ "blob_id": "94bf382ac7675f4d60703d40ea922605f16de12c", "branch_name": "refs/heads/master", "committer_date": 1636706019000, "content_id": "d0db8bf7c9c33f5f463c9f7c0089c5c33249a7d5", "detected_licenses": [ "Apache-2.0" ], "directory_id": "4ee4ba4ce77f2efe29583fbb2a4f991010710627", "extension": "py"...
2.578125
stackv2
from flask import Flask, request, Response import logging import pyfiglet import requests import os try: app = Flask(__name__) logging.basicConfig(level=logging.DEBUG) logging.getLogger('werkzeug').setLevel(logging.ERROR) except Exception as e: logging.exception("Error at startup") @app.route('/ping...
84
22.21
106
15
455
python
[{"finding_id": "codeql_py/stack-trace-exposure_fa031da1861449b5_45803485", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-215" ]
[ "py/stack-trace-exposure", "py/flask-debug" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger." ]
[ 56, 84 ]
[ null, null ]
[ 25, 5 ]
[ 31, 57 ]
2024-11-18T19:39:50.802929+00:00
1,453,209,648,000
ec08b45b08d03d0d61f7df0b9c0fe2df33d9d6ba
2
{ "blob_id": "ec08b45b08d03d0d61f7df0b9c0fe2df33d9d6ba", "branch_name": "refs/heads/master", "committer_date": 1453209648000, "content_id": "b94a39c231f52ed7a4c9370638f0301cf71dc263", "detected_licenses": [ "MIT" ], "directory_id": "a4a78fa4ccb243955a834171313de274bd7152c8", "extension": "py", "fi...
2.421875
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- import os import sys import logging import datetime import subprocess from distutils import spawn import praw import markdown2 from docopt import docopt from jinja2 import Environment, PackageLoader from distutils import spawn USAGE = """reddit2kindle Compiles requested ...
128
31.27
101
17
938
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_139a16b7711fdf7d_626423b4", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 74 ]
[ null ]
[ 11 ]
[ 67 ]
2024-11-18T19:40:01.079768+00:00
1,574,641,880,000
0b6e1f480e086a09845834f018fb9406c59e98e2
2
{ "blob_id": "0b6e1f480e086a09845834f018fb9406c59e98e2", "branch_name": "refs/heads/master", "committer_date": 1574641880000, "content_id": "e682e4cb931e9b4fd36b3196f30ce8e5a1843801", "detected_licenses": [ "MIT", "Apache-2.0" ], "directory_id": "f26b098dcae1f06c68a1bbe8748f440ad12125fd", "exten...
2.4375
stackv2
from google_auth_oauthlib.flow import InstalledAppFlow from google.auth.transport.requests import AuthorizedSession from google.oauth2.credentials import Credentials import json from more_itertools import chunked from pathlib import Path import settings SCOPE = 'https://www.googleapis.com/auth/photoslibrary.appendonl...
92
39
119
18
827
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_17ab49ffcf50d2d2_ee74c68c", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 45, 48 ]
[ null, null ]
[ 34, 19 ]
[ 43, 100 ]
2024-11-18T20:18:30.472347+00:00
1,571,176,846,000
fc62015d790e502118aea51b44c248c53dc56e1d
3
{ "blob_id": "fc62015d790e502118aea51b44c248c53dc56e1d", "branch_name": "refs/heads/master", "committer_date": 1571176846000, "content_id": "4cc46f3b92ff3fa199f85d1733d9311242c6c39a", "detected_licenses": [ "MIT" ], "directory_id": "608e6815e0c3346392cbd3480b4311991ff8b1c8", "extension": "py", "fi...
2.765625
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- from __future__ import absolute_import from __future__ import division from __future__ import print_function import os import gzip import tarfile import numpy as np import six from six.moves import urllib, range from six.moves import cPickle as pickle def standardize(da...
368
35.65
118
17
3,696
python
[{"finding_id": "codeql_py/tarslip_ea78e14faf1107b4_560b6339", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 165 ]
[ null ]
[ 13 ]
[ 16 ]
2024-11-18T20:18:56.543035+00:00
1,366,335,548,000
8f3d5f0ae791a4480ece593447b0d1e1cf17b6df
3
{ "blob_id": "8f3d5f0ae791a4480ece593447b0d1e1cf17b6df", "branch_name": "refs/heads/master", "committer_date": 1366341362000, "content_id": "87e686cd9ca4996a9fbcbd4a9c43ff764db08eaf", "detected_licenses": [ "MIT" ], "directory_id": "de1842b632080567e7f84236f9d3e9ce68901783", "extension": "py", "fi...
2.53125
stackv2
from django.contrib.auth.models import User from django.conf import settings from django.db import models from django.utils import simplejson as json from django.utils import timezone import struct, binascii, ssl from datetime import datetime from socket import socket from importlib import import_module from json_fiel...
198
32.7
96
17
1,453
python
[{"finding_id": "codeql_py/insecure-protocol_4e148a3b6cb99a27_75627f50", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version SSLv3 specified by [call to ssl.wrap_socket](1).", "remediation": "", "l...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/insecure-protocol", "py/insecure-protocol" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Insecure SSL/TLS protocol version SSLv3 specified by [call to ssl.wrap_socket](1).", "Insecure SSL/TLS protocol version SSLv3 specified by [call to ssl.wrap_socket](1)." ]
[ 31, 88 ]
[ 36, 93 ]
[ 13, 13 ]
[ 10, 10 ]
2024-11-18T20:29:36.940268+00:00
1,631,229,916,000
6e48bd56c9218a511805fbad3572d160cf47c525
2
{ "blob_id": "6e48bd56c9218a511805fbad3572d160cf47c525", "branch_name": "refs/heads/main", "committer_date": 1631229916000, "content_id": "abe830fde851df05a442b07f7c123e625a0f3885", "detected_licenses": [ "Apache-2.0" ], "directory_id": "617f2bfbb824ffc7d4ed12e1cb813c5cd398fa81", "extension": "py", ...
2.46875
stackv2
import os import sys from pathlib import Path from typing import Optional import datetime import hashlib from .logger import Logger SESSION_DIR_KEY = 'LAUNCHABLE_SESSION_DIR' DEFAULT_SESSION_DIR = '~/.config/launchable/sessions/' def _session_file_dir() -> Path: return Path(os.environ.get(SESSION_DIR_KEY) or DEF...
110
35.77
143
18
950
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_dbd8788ff154d9a3_7cd8a405", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (SHA1) that is insecure."...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (id)](1) is used in a hashing algorithm (SHA1) that is insecure." ]
[ 18 ]
[ null ]
[ 48 ]
[ 102 ]
2024-11-18T20:51:46.299501+00:00
1,386,542,927,000
bce579c7d36ccd947d198925414946a4df858ce6
3
{ "blob_id": "bce579c7d36ccd947d198925414946a4df858ce6", "branch_name": "refs/heads/master", "committer_date": 1386542927000, "content_id": "caa795ca8122a86431c4c791b879aca6a8272a8d", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "c5e3fd3a1f38c760a07a0786a5a9e16a3dbd0213", "extension": "p...
2.703125
stackv2
import paramiko import argparse import random import time import getpass class Remote(object): def __init__(self,host,user,path,coord=None,coordport=None): print("Connecting to %s " % host) self.path = path self.host, self.port = str.split(host,':') self.coordip = coord self...
115
30.37
93
14
904
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_f97122a57544f758_b1cca780", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 15 ]
[ 16 ]
[ 9 ]
[ 38 ]
2024-11-18T19:07:13.220388+00:00
1,693,518,570,000
394ffd864a210b2cb675666ab51f2e8d1fec356c
3
{ "blob_id": "394ffd864a210b2cb675666ab51f2e8d1fec356c", "branch_name": "refs/heads/main", "committer_date": 1693518570000, "content_id": "704a87c087c9ca20c93a3915e1fb5a5fd1e70ee1", "detected_licenses": [ "MIT" ], "directory_id": "0dddc0508138396c740901be4a0f9eebefb8fded", "extension": "py", "file...
2.59375
stackv2
#!/usr/bin/env python3 # Copyright (c) Meta Platforms, Inc. and affiliates. # # This source code is licensed under the MIT license found in the # LICENSE file in the root directory of this source tree. import os import pkgutil from typing import List, Optional from ax.plot.render import _js_requires, _load_css_resour...
146
28.01
86
12
982
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_e7f38d1794edf38a_bfa8d3f2", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 146 ]
[ null ]
[ 12 ]
[ 67 ]
2024-11-18T19:07:21.322274+00:00
1,606,941,264,000
02627afe75ef6e0a24f4fb9bfe0d65019789dc45
2
{ "blob_id": "02627afe75ef6e0a24f4fb9bfe0d65019789dc45", "branch_name": "refs/heads/master", "committer_date": 1606941264000, "content_id": "9dd4a0a91ac037349de61b5a4e6fbc66b0622c56", "detected_licenses": [ "Apache-2.0" ], "directory_id": "0b4d1fb57546adbc85659a144742c4ecd9dfe219", "extension": "py"...
2.46875
stackv2
from genie.metaparser import MetaParser from genie.metaparser.util.schemaengine import Any, Or, Optional import re # ====================================================== # Schema for 'show vrrp' # ====================================================== class ShowVrrpSchema(MetaParser): schema = { 'inter...
261
33.62
112
27
2,040
python
[{"finding_id": "codeql_py/redos_21341bb2ec241481_16b45dca", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'Master Router is ' and containing...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with 'Master Router is ' and containing many repetitions of ','." ]
[ 123 ]
[ null ]
[ 52 ]
[ 60 ]
2024-11-18T19:07:29.332031+00:00
1,592,633,802,000
094b5f78f48aa7ba55acea6b66860c1f12e529a0
2
{ "blob_id": "094b5f78f48aa7ba55acea6b66860c1f12e529a0", "branch_name": "refs/heads/master", "committer_date": 1592633802000, "content_id": "956d364be48c12ea2fd3108330014a2a8e16dca0", "detected_licenses": [ "MIT" ], "directory_id": "7b4d3522a5753a06a0e7b997c2b6c67bde5adc49", "extension": "py", "fi...
2.375
stackv2
from flask import Flask from flask import jsonify from flask import request from flask_cors import CORS from flask_pymongo import PyMongo, ObjectId # app modules from app.aula import Aula from app.sala import Sala from app.user import User app = Flask(__name__) CORS(app) app.config['MONGO_DBNAME'] = 'horarios' app.co...
130
20.5
62
12
874
python
[{"finding_id": "codeql_py/stack-trace-exposure_6e56a96a74fe8c4f_2f8323ed", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.\n[S...
2
true
[ "CWE-209", "CWE-215" ]
[ "py/stack-trace-exposure", "py/flask-debug" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.\n[Stack trace information](2) flows to this location and may be exposed to an external user.\n[Stack trace information](3) flows to this location and may be exposed to an external user.\n[Stack trace information](4) flows t...
[ 25, 130 ]
[ null, null ]
[ 17, 5 ]
[ 54, 24 ]
2024-11-18T19:18:33.312633+00:00
1,643,155,834,000
86483272abf46e72758814ccb9fa51e4654943e6
2
{ "blob_id": "86483272abf46e72758814ccb9fa51e4654943e6", "branch_name": "refs/heads/master", "committer_date": 1643155834000, "content_id": "3219f6da7047b5bcf647ea73d6af0d48e504c0e2", "detected_licenses": [], "directory_id": "67a2fea2b3a108a500c3cdd20c4bc23ddcef7aaf", "extension": "py", "filename": "hom...
2.3125
stackv2
import datetime import json from flask import Blueprint, jsonify, request, current_app from flask_login import current_user import db from utils import database from utils.file_manager import FileManager, FileType bp = Blueprint("home", __name__) @bp.route("/ping", methods=["GET"]) def ping(): return jsonify({...
217
33.25
99
18
1,687
python
[{"finding_id": "codeql_py/stack-trace-exposure_151e4eea9be5a366_54352fa6", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 31 ]
[ null ]
[ 24 ]
[ 36 ]
2024-11-18T19:19:07.829467+00:00
1,637,477,487,000
2596d51a076e02510cb155628098a2f6c05dec73
3
{ "blob_id": "2596d51a076e02510cb155628098a2f6c05dec73", "branch_name": "refs/heads/main", "committer_date": 1637477487000, "content_id": "93f02e665ea4f589bafaf2281078cb3c6e230fad", "detected_licenses": [ "MIT" ], "directory_id": "5292b03998384c0d2bb5858058892d7e45c5365b", "extension": "py", "file...
2.875
stackv2
#!/usr/bin/env python3 import subprocess import tempfile import fuckpy3 #pylint:disable=unused-import import os ARCHITECTURES = { "aarch64", "riscv64" } THRESHOLD = int(os.environ.get('THRESHOLD', 1000)) def main(): print("Historically, shellcode was judged by what it could do. This outmoded") print("way of ...
60
44
137
20
696
python
[{"finding_id": "codeql_py/overly-permissive-file_48ee301f379c2fc8_7522224c", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world writable." ]
[ 36 ]
[ null ]
[ 13 ]
[ 36 ]
2024-11-18T19:19:12.666101+00:00
1,549,935,707,000
d2ff5f7a12fca2f0bda491616280031d8f18b9ac
3
{ "blob_id": "d2ff5f7a12fca2f0bda491616280031d8f18b9ac", "branch_name": "refs/heads/master", "committer_date": 1549935707000, "content_id": "2cf33999f0a40685b9d6cbab306c5e56e7263ac6", "detected_licenses": [ "MIT" ], "directory_id": "f711a5a863c6e747f4960ca20555118efba99851", "extension": "py", "fi...
2.75
stackv2
# This file needs to be run in your working directory. From there, this code will create a folder called svhn_pytorch # where all the data will be loaded and converted to images. # The folder structure needed for Dataloader will also be created using this file. import warnings warnings.filterwarnings("ignore") impor...
179
36.43
120
15
1,457
python
[{"finding_id": "codeql_py/overly-permissive-file_f4c695d22f767e30_c5fdc8d1", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ...
4
true
[ "CWE-732", "CWE-732", "CWE-732", "CWE-732" ]
[ "py/overly-permissive-file", "py/overly-permissive-file", "py/overly-permissive-file", "py/overly-permissive-file" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world writable.", "Overly permissive mask in chmod sets file to world writable.", "Overly permissive mask in chmod sets file to world writable.", "Overly permissive mask in chmod sets file to world writable." ]
[ 35, 51, 71, 88 ]
[ null, null, null, null ]
[ 5, 9, 9, 9 ]
[ 33, 37, 37, 37 ]
2024-11-18T19:29:35.650450+00:00
1,624,177,955,000
41da83248b54f09a4ac8f1afd07a5dd0994b16cd
3
{ "blob_id": "41da83248b54f09a4ac8f1afd07a5dd0994b16cd", "branch_name": "refs/heads/master", "committer_date": 1624177955000, "content_id": "f71c1852ffabfd6520c29aa0e5896783707f3f65", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "7f18a68d517cc3711efc4861295f686ac3398337", "extension": "p...
2.96875
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- """ PyHtmlCv is a tool to that can be used to generate HTML CVs from a simple JSON configuration. :copyright: (c) 2012-2019 Janne Enberg :license: BSD """ from argparse import ArgumentParser, ArgumentTypeError import codecs from datetime import datetime from jinja2 import...
347
27.12
86
20
2,132
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_08a7991fc71f7f33_e9c77a2e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 86 ]
[ null ]
[ 11 ]
[ 62 ]
2024-11-18T19:29:42.244656+00:00
1,510,940,933,000
a239267442a822682dddb89348d84c0c5c91190a
2
{ "blob_id": "a239267442a822682dddb89348d84c0c5c91190a", "branch_name": "refs/heads/master", "committer_date": 1510940933000, "content_id": "7ef407ee6e4bb4c7d0534559c5629b3d4485d47b", "detected_licenses": [ "MIT" ], "directory_id": "19d79d39ed05e5893d557d80a86ed12e1a7195f9", "extension": "py", "fi...
2.46875
stackv2
from django.db import transaction from SocialNetwork_API.models import * from SocialNetwork_API.services.base import BaseService from datetime import datetime, timedelta class ApiService(BaseService): @classmethod def save(cls, user, instance=None): try: token = cls.gen_token(user.id) ...
37
27.95
55
16
221
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_046c2881549f6cfb_090b275b", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.",...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 32 ]
[ null ]
[ 35 ]
[ 55 ]
2024-11-18T19:44:18.023386+00:00
1,629,161,487,000
c72e45ffc81cb01b26e2aaa7ccb0e3dff0a17d46
3
{ "blob_id": "c72e45ffc81cb01b26e2aaa7ccb0e3dff0a17d46", "branch_name": "refs/heads/master", "committer_date": 1629161567000, "content_id": "c270d9effd63d5581665556851f1b66e2232fba9", "detected_licenses": [ "MIT" ], "directory_id": "e0e720a01a0cbb9316e525ee57bdbe6b2328345e", "extension": "py", "fi...
2.625
stackv2
import logging import os import threading import time import traceback import webbrowser from argparse import ArgumentParser from pathlib import Path from urllib.request import urlopen from flask import Flask, json, jsonify, request, send_from_directory from flask_cors import CORS import handlers __doc__ = """ A Fla...
181
28.56
87
17
1,190
python
[{"finding_id": "codeql_py/stack-trace-exposure_1b1405fa68059555_b99a77a5", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-022" ]
[ "py/stack-trace-exposure", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "This path depends on a [user-provided value](1)." ]
[ 115, 41 ]
[ null, null ]
[ 13, 8 ]
[ 83, 9 ]
2024-11-18T19:44:31.349096+00:00
1,390,366,035,000
a3f91a623f84055da64b7a65e1230c80adc91b48
3
{ "blob_id": "a3f91a623f84055da64b7a65e1230c80adc91b48", "branch_name": "refs/heads/master", "committer_date": 1390366035000, "content_id": "d7f8480f131fb214731be9271f0cc097446b4da0", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "1542825af8b1b04dd62fa294f9e382972fbca05f", "extension": "p...
2.65625
stackv2
import bottle from bottle import get, put, delete import restware # Holds the data for function that this example API is trying to implement for some one keyStoreD = {} @get("/") def root(): # Returns some documentation for the user to look at # Consider using Sphinx and sphinxcontrib-httpdomain .. but this i...
52
34.33
127
13
486
python
[{"finding_id": "codeql_py/stack-trace-exposure_1061a0452fb64503_2a5aac9a", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 30 ]
[ null ]
[ 16 ]
[ 65 ]
2024-11-18T19:44:41.087539+00:00
1,687,780,470,000
204258bbe8310ac15b39f583f94866dba361b4e4
2
{ "blob_id": "204258bbe8310ac15b39f583f94866dba361b4e4", "branch_name": "refs/heads/main", "committer_date": 1687780470000, "content_id": "a7886b6a07c22b5f9a4ed413d5ce62eb8bf8df24", "detected_licenses": [ "Apache-2.0" ], "directory_id": "34bef62a6f45879233dc302a56d2427d5d02ce73", "extension": "py", ...
2.4375
stackv2
# See the NOTICE file distributed with this work for additional information # regarding copyright ownership. # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.a...
146
39.27
117
16
1,444
python
[{"finding_id": "codeql_py/redos_1c8ad092af05eff4_26e0947f", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'a' and containing many repetition...
2
true
[ "CWE-1333", "CWE-1333" ]
[ "py/redos", "py/redos" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with 'a' and containing many repetitions of 'a'.", "This part of the regular expression may cause exponential backtracking on strings starting with 'a@a' and containing many repetitions of 'a'." ]
[ 23, 23 ]
[ null, null ]
[ 36, 52 ]
[ 39, 55 ]
2024-11-18T19:57:58.749239+00:00
1,623,189,717,000
1e41ef5211ddb805024db37d4beb0ca0f95c88f5
2
{ "blob_id": "1e41ef5211ddb805024db37d4beb0ca0f95c88f5", "branch_name": "refs/heads/main", "committer_date": 1623189717000, "content_id": "669fc242d23c91fdcae1f52cca9c6c99a3217d13", "detected_licenses": [ "Apache-2.0" ], "directory_id": "855e2a135510bc4efcfa92e21b964e17a8778dd7", "extension": "py", ...
2.359375
stackv2
import os import re from typing import Mapping, Sequence import pulumi_aws as aws from typing_extensions import Final import pulumi # This will be incorporated into various infrastructure object names. DEPLOYMENT_NAME = pulumi.get_stack() def _validate_deployment_name() -> None: # ^ and $ capture the whole str...
120
29.94
120
14
909
python
[{"finding_id": "codeql_py/redos_e2b499f19ffdd5c7_e734b3f7", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'a' and containing many repetition...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with 'a' and containing many repetitions of '0'." ]
[ 19 ]
[ null ]
[ 43 ]
[ 52 ]
2024-11-18T19:58:05.488381+00:00
1,610,696,818,000
c218f8221cdc939219999bfcd49c451f09a2d3b5
3
{ "blob_id": "c218f8221cdc939219999bfcd49c451f09a2d3b5", "branch_name": "refs/heads/master", "committer_date": 1610696818000, "content_id": "7a68658ab1a2a2d3c4a54e83966eed577c08cdff", "detected_licenses": [ "MIT" ], "directory_id": "356e489fc479f39583235dd4450ace4c93db260c", "extension": "py", "fi...
3.28125
stackv2
import os from Crypto.Cipher import AES key = os.urandom(16) cipher = AES.new(key, AES.MODE_ECB) plaintext1 = "this is a secret that must be always kept hidden" plaintext2 = " that can be revealed to anyone!" cipertext1 = cipher.encrypt(plaintext1) cipertext2 = cipher.encrypt(plaintext2) print cipher.decrypt(cipert...
25
25.92
63
8
185
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_767f6407257876bb_6ed4927a", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
3
true
[ "CWE-327", "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 10, 11, 13 ]
[ null, null, null ]
[ 14, 14, 7 ]
[ 40, 40, 51 ]
2024-11-18T19:58:06.087420+00:00
1,528,046,283,000
d20e1d3f8fae8f610bb5c460becf3f62047a6a7c
3
{ "blob_id": "d20e1d3f8fae8f610bb5c460becf3f62047a6a7c", "branch_name": "refs/heads/master", "committer_date": 1528046283000, "content_id": "0ff2267875710d2c97c60702f5f7340c05b64bd9", "detected_licenses": [ "MIT" ], "directory_id": "7fdc32256d8cb0a269fa98b25d508b29f0f2d8ce", "extension": "py", "fi...
3.09375
stackv2
import hashlib from auth.auth_exceptions import UserAlreadyExistException, UserNotExistException, \ PasswordMissmatchException, PasswordTooShortException, NotLoggedInError, NotPermittedError class User: def __init__(self, username, password): self.username = username self.pwd = self.encr_pwd(...
94
29.78
94
14
578
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_6f00f53f11b4673c_0a818c1b", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e...
[ 20 ]
[ null ]
[ 31 ]
[ 42 ]
2024-11-18T19:58:13.016014+00:00
1,378,477,811,000
eb0c3bdc2d04bc37570146f9b0946a5e7a40ab4d
3
{ "blob_id": "eb0c3bdc2d04bc37570146f9b0946a5e7a40ab4d", "branch_name": "refs/heads/master", "committer_date": 1378477811000, "content_id": "f95d7260126e3886b418c6a47120824c142e8bb6", "detected_licenses": [ "Apache-2.0" ], "directory_id": "699fd9b6d59d095a2034ac88c42e23a90a09cd38", "extension": "py"...
2.984375
stackv2
#!/usr/bin/python '''Return the data for a shadow-hash file suitable for use in MacOS X''' __version__ = 371 # formerly: int('$Revision: 452 $'.split(" ")[1]) def getShadowHashData(password, seedIntInput=None): import random, struct, hashlib '''A python re-write of the shadowHash PHP script by Pete Akins, Cincin...
71
36.1
160
15
696
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_978bb6ff689c2f3d_8a1f8f27", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
3
true
[ "CWE-312", "CWE-312", "CWE-327" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](1) as clear text.", "[Sensitive data (password)](1) ...
[ 66, 69, 20 ]
[ null, null, null ]
[ 19, 9, 33 ]
[ 33, 23, 54 ]
2024-11-18T19:58:22.454395+00:00
1,550,222,245,000
ec199b451bcb2b3c29e430589d56b6b4cadaccf2
2
{ "blob_id": "ec199b451bcb2b3c29e430589d56b6b4cadaccf2", "branch_name": "refs/heads/master", "committer_date": 1550222245000, "content_id": "f6b190dc15ade17087868dd480090b6116cfb756", "detected_licenses": [ "MIT" ], "directory_id": "a88fb62ae1d1a2b13c54f312bd83cf608a33cc34", "extension": "py", "fi...
2.328125
stackv2
from time import time from flask import request, jsonify from .models import User, UserToken, Timer, Task from .core import db def get_user(): token = request.args.get('token') or \ request.headers.get('Authorization', '').replace('Bearer ', '') if not token: raise Exception('no token') ...
123
27.78
99
15
892
python
[{"finding_id": "codeql_py/stack-trace-exposure_1eae73e35a137f7a_89824951", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
7
true
[ "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information...
[ 25, 37, 52, 67, 86, 101, 117 ]
[ null, null, null, null, null, null, null ]
[ 24, 24, 24, 24, 24, 24, 24 ]
[ 41, 41, 41, 41, 41, 41, 41 ]
2024-11-18T20:10:16.558016+00:00
1,530,528,533,000
986dc9e07f5728b48dee6c0873e414b4bd4880c1
2
{ "blob_id": "986dc9e07f5728b48dee6c0873e414b4bd4880c1", "branch_name": "refs/heads/master", "committer_date": 1530528533000, "content_id": "4ca1aafb20c2e5851c43724e92c07a907cc3a3b9", "detected_licenses": [ "MIT" ], "directory_id": "626d59667c6cb98a8cb58b0e6c64303177f64e2b", "extension": "py", "fi...
2.375
stackv2
import json from flask import jsonify from flask import request from flask import redirect from flask import render_template from app import app import os import time import subprocess import sqlite3 from itsdangerous import TimedJSONWebSignatureSerializer as Serializer import itsdangerous SECRET_KEY = 'I love you mor...
233
25.94
101
14
1,537
python
[{"finding_id": "codeql_py/path-injection_b6c42003bc9a506c_9d3fb34d", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 170 ]
[ null ]
[ 49 ]
[ 53 ]
2024-11-18T20:10:33.806989+00:00
1,581,934,442,000
1e01d6b2cde8bb13d856d16d14252de1ab53fc59
3
{ "blob_id": "1e01d6b2cde8bb13d856d16d14252de1ab53fc59", "branch_name": "refs/heads/master", "committer_date": 1581934442000, "content_id": "ee629adeefdb7011591dc47e6fe94d4951e593cd", "detected_licenses": [ "MIT" ], "directory_id": "b8b5a9dda6e2400432c3d8cf92d9ba4dde47742f", "extension": "py", "fi...
3.25
stackv2
#!/usr/bin/env python3.6 import random import string import pyperclip from userData import UserData from required_data import RequiredData import sys sys.setrecursionlimit(10**6) def new_users(name_first, name_two, email_adress, user_name, pass_word): """ It creates a new user """ new_user = UserData(...
192
26.76
129
19
1,006
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e1c5a94d5a509ac7_e16b64f4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text.", "This expression logs [sensitive data (p...
[ 115, 165, 177 ]
[ null, null, null ]
[ 19, 19, 25 ]
[ 65, 60, 125 ]
2024-11-18T20:23:16.862275+00:00
1,599,014,389,000
c2105dc708f58782ed11d1055287baede5877766
3
{ "blob_id": "c2105dc708f58782ed11d1055287baede5877766", "branch_name": "refs/heads/master", "committer_date": 1599014389000, "content_id": "e8daf897752e4de86dd3cf36ff7b67716e122a70", "detected_licenses": [ "MIT" ], "directory_id": "31d1d6a0c888645d64b9134833fdb95e23bfd63e", "extension": "py", "fi...
2.5625
stackv2
#### # Author: Max Miller # Last Modified: Sept 1st, 2020 # About: # This script launches a new AWS EC2 instance with a running base Django application. #### import boto3 as bt import botocore as bc import paramiko import time client = bt.client('ec2') resource = bt.resource('ec2') key_name = 'ec2' max_ssh_attempts...
84
30.12
87
16
616
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_2c1f967c18fb0945_22156816", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 37 ]
[ null ]
[ null ]
[ 61 ]
2024-11-18T20:49:25.305415+00:00
1,691,007,356,000
b47ad0db27f1ba4a1779c113075460c808896730
3
{ "blob_id": "b47ad0db27f1ba4a1779c113075460c808896730", "branch_name": "refs/heads/main", "committer_date": 1691007356000, "content_id": "7447b4284346e60ec5e131a2060cd4ea8d86d146", "detected_licenses": [ "ECL-2.0" ], "directory_id": "c5cfdd597888fa2281cf7169b914203454c8f14e", "extension": "py", "...
2.578125
stackv2
""" create patron record via Koha REST API """ import urllib3 import requests from koha_mappings import category from .config import config # ByWater's SSL cert causes problems so every request has verify=False # and we do this to silence printed warnings urllib3.disable_warnings(urllib3.exceptions.InsecureRequestW...
69
27.99
79
11
463
python
[{"finding_id": "codeql_py/request-without-cert-validation_cfe6224088dcf563_6b372381", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 24, 49 ]
[ 25, 50 ]
[ 16, 16 ]
[ 54, 73 ]
2024-11-18T20:50:12.483035+00:00
1,409,656,018,000
e92db3fdb3002e19444096f71599fa622a5ce06e
2
{ "blob_id": "e92db3fdb3002e19444096f71599fa622a5ce06e", "branch_name": "refs/heads/master", "committer_date": 1409656018000, "content_id": "abf23bc31355742ef78251da9b2d3f3790d88b0c", "detected_licenses": [ "MIT" ], "directory_id": "ea269a7f969f1c67ac8acd4ea070a374c02fe581", "extension": "py", "fi...
2.328125
stackv2
# -*- coding: utf-8 -*- from flask import Flask from flask import request, Response import xmltodict import requests import json import urllib app = Flask(__name__) # Add zoomvalues to the JSON result addZoomValues = True # Dictionary holding navnetype and zoomlevel zoomValues = { u"By": 12, u"Kommune": 1...
84
22.3
77
18
589
python
[{"finding_id": "codeql_py/request-without-cert-validation_b22ce613c2acb54c_3cc1a48f", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 61 ]
[ null ]
[ 9 ]
[ 40 ]
2024-11-18T20:50:16.969938+00:00
1,240,611,665,000
50cd7b9491a77a1aa5380df227137b990d559742
2
{ "blob_id": "50cd7b9491a77a1aa5380df227137b990d559742", "branch_name": "refs/heads/master", "committer_date": 1240611665000, "content_id": "add6ba10642ce70bfbbaa4dc47799b010a70d31c", "detected_licenses": [ "MIT" ], "directory_id": "78bab5f84e4f69b5c5ecabc13f792b8145243443", "extension": "py", "fi...
2.375
stackv2
# bot.py # # Pubsub Client Bot - Listens to pubsub events for new blog entries. # import time import datetime import os import cPickle as pickle import sqlite3 from twisted.python import log from twisted.internet import defer, task, reactor from twisted.words.xish import domish, xpath from wokkel.pubsub import PubSubC...
249
29.76
95
17
1,698
python
[{"finding_id": "codeql_py/overly-permissive-file_5992a57ebd72a6d2_990476d0", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable." ]
[ 131 ]
[ null ]
[ 9 ]
[ 34 ]
2024-11-18T20:51:17.990703+00:00
1,609,572,372,000
58c49cabac03a4b89885bc23159faccb43c1b1fa
2
{ "blob_id": "58c49cabac03a4b89885bc23159faccb43c1b1fa", "branch_name": "refs/heads/master", "committer_date": 1609572372000, "content_id": "65737c116f183fde351e23dfd8bef080f6dc5f65", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "89c8741533b37d8408e441c1cb883b6d0e887535", "extension": "p...
2.328125
stackv2
# -*- coding:utf-8 -*- import binascii import click, logging, os, sys from datetime import datetime from server import create_app from flask.cli import FlaskGroup, ScriptInfo from server.module import db from sqlalchemy_utils import database_exists, create_database from server.models.user import User, Permission from j...
164
37.85
83
16
1,382
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_bc6b08e45093d651_0566921b", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 111 ]
[ 113 ]
[ 18 ]
[ 6 ]
2024-11-18T20:51:23.133652+00:00
1,625,028,548,000
3048207fd1b196dc752cb8b416d7c3803e35f6c9
2
{ "blob_id": "3048207fd1b196dc752cb8b416d7c3803e35f6c9", "branch_name": "refs/heads/master", "committer_date": 1625028548000, "content_id": "5218af02f4b6aa6f53069c56f2dd9e2a21ecb668", "detected_licenses": [ "MIT" ], "directory_id": "af7e55f59ef6590facaaf7f3baccbc1ea7ff8672", "extension": "py", "fi...
2.4375
stackv2
# -*- coding: utf-8 -*- from http.server import BaseHTTPRequestHandler, HTTPServer import socketserver import os, sys, json, io, gc, base64 from PyPDF2 import PdfFileWriter, PdfFileReader from reportlab.pdfgen import canvas from reportlab.lib.units import mm from reportlab.pdfbase import pdfmetrics from reportlab.p...
147
28.88
84
17
992
python
[{"finding_id": "codeql_py/path-injection_8fbcd4b2c7cf86e7_7c364324", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 123, 135 ]
[ null, null ]
[ 19, 27 ]
[ 23, 37 ]
2024-11-18T20:51:25.805817+00:00
1,422,944,627,000
0c04d95ef673cd4a67869c9e34d2cef236f08eaf
3
{ "blob_id": "0c04d95ef673cd4a67869c9e34d2cef236f08eaf", "branch_name": "refs/heads/master", "committer_date": 1422944627000, "content_id": "d6dc7c8c22e98a1dc710f14a3f66345de65b1bb9", "detected_licenses": [ "MIT" ], "directory_id": "35cc80dd1b43e5a02a074e0010b298bc66b10af1", "extension": "py", "fi...
2.78125
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- import sys from urllib import urlencode, urlopen __version__ = '0.2.0' help = """ %s program [status | login | logout] status show login status login login logout logout """ % __version__ class MD6(object): def mc(self, a): ret =...
144
23.77
55
20
926
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_007caaa75e644d68_74165915", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 112 ]
[ null ]
[ 19 ]
[ 44 ]
2024-11-18T20:51:26.541794+00:00
1,658,852,434,000
a8ceb07249c0101fc1aae14f2894616a6b07aa7b
3
{ "blob_id": "a8ceb07249c0101fc1aae14f2894616a6b07aa7b", "branch_name": "refs/heads/master", "committer_date": 1658852434000, "content_id": "f7398cd89e326e9453c3ce94ad448b5d8dce5e1c", "detected_licenses": [ "Apache-2.0" ], "directory_id": "724330fcec05309b64762c65b0aab6a8e9404097", "extension": "py"...
2.515625
stackv2
#!/usr/bin/env python # note we'll use glue to assemble a css sprite # for now we use this to pickup the images we want, convert # from svg to png in our preferred size import click import cairosvg import os from pathlib import Path from jinja2 import Template from apichanges.icons import ICON_SERVICE_MAP CSS_BUILD...
80
28.55
70
18
540
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_ec0c85ad8898fecf_49d7932e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 73 ]
[ 74 ]
[ 18 ]
[ 61 ]
2024-11-18T20:51:30.832339+00:00
1,380,775,193,000
a73235151cda432ea9da01efd45e42ddd72f927d
3
{ "blob_id": "a73235151cda432ea9da01efd45e42ddd72f927d", "branch_name": "refs/heads/master", "committer_date": 1380775193000, "content_id": "87bd6e08d0d686ec4d54af078ffcf28551cc65a8", "detected_licenses": [ "MIT" ], "directory_id": "51722958a06d777ac1666fd60ea34975447b2541", "extension": "py", "fi...
2.53125
stackv2
#!/usr/bin/env python # encoding=utf-8 import os import sys import uuid from flask import Flask, render_template, request, send_file import concatss INPUT_DIR = os.path.dirname(os.path.abspath(__file__)) + '/input' OUTPUT_DIR = os.path.dirname(os.path.abspath(__file__)) + '/output' IMAGE_NAME_PREFIX = 'image' ACCEPT...
59
33.19
78
18
418
python
[{"finding_id": "codeql_py/flask-debug_a54dc1e2b39890af_4db94a43", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-022" ]
[ "py/flask-debug", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1)." ]
[ 59, 25 ]
[ null, null ]
[ 5, 22 ]
[ 40, 43 ]
2024-11-18T21:13:59.810299+00:00
1,602,834,468,000
fdf5ec42caaad7d401f39caed55e16ec6da30cac
3
{ "blob_id": "fdf5ec42caaad7d401f39caed55e16ec6da30cac", "branch_name": "refs/heads/master", "committer_date": 1602834468000, "content_id": "1195bc1b797f2a8373d412b319d73de8a8faec70", "detected_licenses": [ "MIT" ], "directory_id": "c8a716889ced199354f2b877cb8b50d4df8af081", "extension": "py", "fi...
2.78125
stackv2
import os import platform import sys from flask import Flask from flask import render_template from flask import request from flask import abort, redirect, url_for app = Flask(__name__, template_folder='templates') def sys_setup(): """ Checking the platform on which the script is running and setting up for ...
66
24.05
79
13
384
python
[{"finding_id": "codeql_py/command-line-injection_d46b6261e27bac62_3cce7579", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {...
1
true
[ "CWE-078" ]
[ "py/command-line-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This command line depends on a [user-provided value](1)." ]
[ 56 ]
[ null ]
[ 25 ]
[ 32 ]
2024-11-18T21:14:22.276399+00:00
1,462,467,060,000
3f0f650a53220979cb73caafa2fee55d8f57af2e
2
{ "blob_id": "3f0f650a53220979cb73caafa2fee55d8f57af2e", "branch_name": "refs/heads/master", "committer_date": 1462467060000, "content_id": "7852a67225fc6e3b589d3f76552df904d35ec6fb", "detected_licenses": [ "Apache-2.0" ], "directory_id": "8330b39fdb22e8c537c668861e81c099094051b4", "extension": "py"...
2.390625
stackv2
""" This file contains user management functions that get called directly from the browser through angular. """ import string import random from django.conf import settings from django.http import JsonResponse, HttpResponse from django.shortcuts import redirect from swiftclient import client from swiftbrowser.utils im...
135
29.51
78
15
884
python
[{"finding_id": "codeql_py/stack-trace-exposure_dbd0983498ad7537_34ff1c75", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
4
true
[ "CWE-209", "CWE-209", "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information...
[ 49, 79, 104, 133 ]
[ null, null, null, null ]
[ 29, 29, 29, 29 ]
[ 30, 30, 30, 30 ]
2024-11-18T20:10:50.392273+00:00
1,632,496,816,000
3ff0284a5fc64080246c26906fac65ced74415ee
2
{ "blob_id": "3ff0284a5fc64080246c26906fac65ced74415ee", "branch_name": "refs/heads/master", "committer_date": 1632496816000, "content_id": "3016be9504790f8faef55c881a377863f3b650ad", "detected_licenses": [ "MIT" ], "directory_id": "5e0570044906a7395b9ea617ccf7ad4ec8c7aff2", "extension": "py", "fi...
2.421875
stackv2
from flask import Flask, send_file, send_from_directory, request from werkzeug.utils import secure_filename import subprocess import random import string import tempfile import tarfile class CompileError(ValueError): pass def get_random_filename(length=15): result = ''.join((random.choice(string.ascii_low...
153
30.52
84
18
1,178
python
[{"finding_id": "codeql_py/stack-trace-exposure_e8936b58c2f531cd_31d484ed", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 115 ]
[ 117 ]
[ 20 ]
[ 14 ]
2024-11-18T20:10:53.386994+00:00
1,630,239,658,000
822ec2871fa361ff55f004944c7040b88ba43f11
3
{ "blob_id": "822ec2871fa361ff55f004944c7040b88ba43f11", "branch_name": "refs/heads/main", "committer_date": 1630239658000, "content_id": "f24896994e93735ed62880b41d7c6b3606042972", "detected_licenses": [ "MIT" ], "directory_id": "accc9921ffb9761cd235e40aefdaa577047ec01a", "extension": "py", "file...
2.953125
stackv2
import os import pickle print( "///////////////****************//////////////*****************/////////////////*****************///////////////////******************//////////") print( "----------------------------------------------------- 5 STAR HOTEL AND RESORTS ----------------------------------------------...
327
24.19
151
20
2,172
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b4e57eca0c1827ce_95cca899", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 153, 302 ]
[ null, null ]
[ 30, 48 ]
[ 44, 59 ]
2024-11-18T21:11:33.002060+00:00
1,682,511,684,000
6bac32a65e1511da39a5834cd815d7e34844a9bb
2
{ "blob_id": "6bac32a65e1511da39a5834cd815d7e34844a9bb", "branch_name": "refs/heads/master", "committer_date": 1682511684000, "content_id": "f06ed7734fff99100c8491b5baa8f05b19d7f5ed", "detected_licenses": [ "MIT" ], "directory_id": "62c7fa206bd6dcdd70c25c49247eb8d93776810f", "extension": "py", "fi...
2.390625
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- import base64 import json import logging import os import re import requests import sys import urllib import jinja2 import sys VARIABLES = { "CONCOURSE_URL": "The URL through which we'll force resource checks", "SLACK_WEBHOOK_URL": "The URL of the Slack webhook ...
128
31.19
119
15
927
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_13f0b338eff73b5d_bc22b740", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 32 ]
[ null ]
[ 11 ]
[ 44 ]
2024-11-18T21:11:36.203208+00:00
1,531,777,623,000
66396f95ff0c6d451751b28b674afd715cfa960f
3
{ "blob_id": "66396f95ff0c6d451751b28b674afd715cfa960f", "branch_name": "refs/heads/master", "committer_date": 1531777623000, "content_id": "aad8ab9cec1486026051f4fd8fa58d8595c5dfd6", "detected_licenses": [ "MIT" ], "directory_id": "075cbf6d8ef760d553a2b752f378f1cc965e70ea", "extension": "py", "fi...
2.765625
stackv2
''' MIT License Copyright (c) 2018 Greg James Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, di...
73
33.26
89
13
584
python
[{"finding_id": "codeql_py/partial-ssrf_900a9cfcc4d5ef88_466e375f", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 30 ]
[ null ]
[ 16 ]
[ 36 ]
2024-11-18T21:11:45.122666+00:00
1,664,218,587,000
cd9989c7b263b519780f19e903b12e60a7ee71f4
3
{ "blob_id": "cd9989c7b263b519780f19e903b12e60a7ee71f4", "branch_name": "refs/heads/master", "committer_date": 1664218587000, "content_id": "c6fc96391928a8e2a2b30aedfb41842717e1a17a", "detected_licenses": [ "MIT" ], "directory_id": "3d29a9ecd12c439141921945177c5226c789c671", "extension": "py", "fi...
2.703125
stackv2
import json import requests import logging.config from datetime import datetime logging.config.fileConfig("logging.ini", disable_existing_loggers=False) logger = logging.getLogger(__name__) # Dark Sky API DARK_SKY_KEY = "81c07948c439765d630c4c60fc56634e" def dark_sky_temp_time_series(lat, lon): forecast_url = "...
70
33.11
108
12
560
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8afe04c3e6fefa6e_faf8c731", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 26 ]
[ null ]
[ 17 ]
[ 108 ]
2024-11-18T21:25:52.200114+00:00
1,497,215,575,000
3e9798aa40ab13b85ddda8a6965aa67d15feb324
2
{ "blob_id": "3e9798aa40ab13b85ddda8a6965aa67d15feb324", "branch_name": "refs/heads/master", "committer_date": 1497215575000, "content_id": "b67eb495c43c64bd99122149de5f98a8537692b0", "detected_licenses": [ "Apache-2.0" ], "directory_id": "1bb24262a34bcfd43a0dedc82b22248307614777", "extension": "py"...
2.375
stackv2
from __future__ import print_function from geoInfo.MaxMindRepo import MaxMindRepo import sys import traceback #if len(sys.argv) != 2: # print('Give me an IP to geolocate.') maxmind = MaxMindRepo('/home3/akshah/akshah_cron_bin/latest_maxmind_bin') #maxmind = MaxMindRepo() print('Using bin file: '+maxmind.binFileLoca...
25
34.32
89
22
237
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d117a72abb73b549_b5f77a5c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 21 ]
[ 22 ]
[ 15 ]
[ 85 ]
2024-11-18T21:26:10.479552+00:00
1,609,691,069,000
086909fbb5759d7cfde1265392026412a3360220
3
{ "blob_id": "086909fbb5759d7cfde1265392026412a3360220", "branch_name": "refs/heads/main", "committer_date": 1609691069000, "content_id": "5b487683c92b4ac798afb746ab158c900e5763e2", "detected_licenses": [ "MIT" ], "directory_id": "abfa65aec5dc5c8c6fc9242a3df880cf7630f810", "extension": "py", "file...
2.875
stackv2
import sqlite3 import streamlit as st import pandas as pd usage_mode = st.text def get_current_date_and_time(): # it will get the time zone # of the specified location IST = pytz.timezone('Asia/Kolkata') datetime_ist = datetime.now(IST) return datetime_ist.strftime('%Y:%m:%d %H:%M:%S') s...
85
32.27
108
14
681
python
[{"finding_id": "codeql_py/sql-injection_dede6d7a6524a648_2ca636f9", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown...
1
true
[ "CWE-089" ]
[ "py/sql-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This SQL query depends on a [user-provided value](1)." ]
[ 61 ]
[ null ]
[ 32 ]
[ 51 ]
2024-11-18T21:52:17.517819+00:00
1,690,909,021,000
fbdbf52854d56fe8b37a9bcf199cb9340ded4605
3
{ "blob_id": "fbdbf52854d56fe8b37a9bcf199cb9340ded4605", "branch_name": "refs/heads/master", "committer_date": 1690909021000, "content_id": "030a9630f649043f20609bc9d3480a4890e50b7e", "detected_licenses": [ "MIT" ], "directory_id": "65d405aa1f44b91c6fb421c2310edbdf5727c9e3", "extension": "py", "fi...
2.6875
stackv2
from __future__ import annotations import re from hashlib import sha1 from html.entities import name2codepoint # Implementation directly copied from Anki (anki/anki/utils.py). # Only a bit of PEP8ing and making things private. _reComment = re.compile("(?s)<!--.*?-->") _reStyle = re.compile("(?si)<style.*?>.*?</style...
77
25.42
75
21
546
python
[{"finding_id": "codeql_py/bad-tag-filter_c5a74bc6a3542afa_07c04b0f", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression does not match script end tags like </script >.", "remediation": "", "location": {"file_...
1
true
[ "CWE-116" ]
[ "py/bad-tag-filter" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression does not match script end tags like </script >." ]
[ 12 ]
[ null ]
[ 25 ]
[ 53 ]
2024-11-18T20:31:22.835309+00:00
1,629,297,847,000
ffe4da2379df4d93f3e0c38d340f6f4572cc0c50
2
{ "blob_id": "ffe4da2379df4d93f3e0c38d340f6f4572cc0c50", "branch_name": "refs/heads/main", "committer_date": 1629297847000, "content_id": "7241ceea4d6ea47ad28fb74113fcfb8391db7420", "detected_licenses": [ "Apache-2.0" ], "directory_id": "50f3930d34cd2522fcef1e40f9d990e2baf1cb39", "extension": "py", ...
2.4375
stackv2
import json import random import hashlib from urllib import parse import http.client from tqdm import tqdm from collections import defaultdict from bs4 import BeautifulSoup as bs class BaiduTranslate: def __init__(self, fromLang, toLang): self.url = "/api/trans/vip/translate" self.appid = "202003...
82
27.98
91
22
602
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_d83ce35772611c85_1d6c994a", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 24 ]
[ null ]
[ 19 ]
[ 48 ]
2024-11-18T20:31:32.601908+00:00
1,412,283,449,000
2d161f99014eb3ac03a0223846af4a92f1806de1
3
{ "blob_id": "2d161f99014eb3ac03a0223846af4a92f1806de1", "branch_name": "refs/heads/master", "committer_date": 1412283449000, "content_id": "45dbf8ae0a2ee8e69b7eeea501ce7d1be71ff10f", "detected_licenses": [ "BSD-3-Clause", "MIT" ], "directory_id": "c464524ce4a83d18b676f6d04fd00650d9c27a2b", "ext...
2.6875
stackv2
# Copyright 2013, Sandia Corporation. Under the terms of Contract # DE-AC04-94AL85000 with Sandia Corporation, the U.S. Government retains certain # rights in this software. """Functions for managing cached remote ssh sessions. Slycat makes extensive use of ssh to communicate with remote resources, such as the high p...
194
33.55
172
18
1,564
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_a0114166781e1def_1ce40dfe", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 123 ]
[ null ]
[ 5 ]
[ 62 ]
2024-11-18T20:59:45.253591+00:00
1,559,481,653,000
0ffa3e12221997f2134eab8652de5d572ed45044
2
{ "blob_id": "0ffa3e12221997f2134eab8652de5d572ed45044", "branch_name": "refs/heads/master", "committer_date": 1559481653000, "content_id": "8ea56ac62653dcd97bc6e865741abe67fc1e68ca", "detected_licenses": [ "MIT" ], "directory_id": "b24dd9e7588f919047d1563a80cba02c080491c0", "extension": "py", "fi...
2.5
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- import sys import requests import json from aruba import Config, clearpass # Ejemplo de conexión básica, con módulo Aruba. # Realiza una conexión REST a un Clearpass # Desactivo el log de certificado autofirmado. import logging logging.captureWarnings(True) # Inicio un...
29
29.59
96
11
212
python
[{"finding_id": "codeql_py/request-without-cert-validation_49f36bbd41826334_fbb90677", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 24 ]
[ null ]
[ 16 ]
[ 97 ]
2024-11-18T21:00:02.195825+00:00
1,378,693,134,000
db2f52d8f9bb2801937985f29c883c2512f4cf55
3
{ "blob_id": "db2f52d8f9bb2801937985f29c883c2512f4cf55", "branch_name": "refs/heads/master", "committer_date": 1378693134000, "content_id": "164a27929b499fb1735d1c172904ada0941211e6", "detected_licenses": [ "MIT" ], "directory_id": "6955702ecc5231d4f43caa0a82925f7c5bc88a44", "extension": "py", "fi...
2.90625
stackv2
import urllib2 from BeautifulSoup import * import urlparse from collections import deque from networkx import * import matplotlib.pyplot as plt import networkx as nx import socket g=nx.Graph() root_ip=socket.gethostbyname(urlparse.urlparse('http://clemson.edu').netloc) g.add_node(root_ip) done=set() link_dic={} link_...
129
29.33
103
29
1,070
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_30ed051935e3df87_88a1aa6a", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [clemson.edu](1) may be at an arbitrary position in the...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "The string [clemson.edu](1) may be at an arbitrary position in the sanitized URL.", "The string [clemson.edu](1) may be at an arbitrary position in the sanitized URL." ]
[ 28, 120 ]
[ null, null ]
[ 6, 51 ]
[ 36, 81 ]
2024-11-18T21:23:47.907729+00:00
1,493,245,740,000
54755d32207e34acfbddd4c37ab8fb775c861102
3
{ "blob_id": "54755d32207e34acfbddd4c37ab8fb775c861102", "branch_name": "refs/heads/master", "committer_date": 1493245740000, "content_id": "e141b952b08ffee26dd476665607977ff93b63fa", "detected_licenses": [ "MIT" ], "directory_id": "8cb1a6d6f83c31cc9407d204afdd409d922b6ab1", "extension": "py", "fi...
2.671875
stackv2
def isSelfpost(argData): if "reddit.com" in argData["data"]["url"] and not "np.reddit.com" in argData["data"]["url"]: return True else: return False def isPreview(argData): try: i = argData["data"]["preview"] return True except: return False def determineType(ar...
73
31.55
125
19
610
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_75d841b6af9697eb_b94635c5", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [reddit.com](1) may be at an arbitrary position in the ...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "The string [reddit.com](1) may be at an arbitrary position in the sanitized URL.", "The string [np.reddit.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 2, 2 ]
[ null, null ]
[ 8, 55 ]
[ 46, 96 ]
2024-11-18T21:23:51.335500+00:00
1,508,836,926,000
9b9be3ceaed313f600c6233d51b4dce001e067c8
2
{ "blob_id": "9b9be3ceaed313f600c6233d51b4dce001e067c8", "branch_name": "refs/heads/master", "committer_date": 1508836926000, "content_id": "8f39d18cf37be6b5fd5d267304cf44caf24000b1", "detected_licenses": [ "Apache-2.0" ], "directory_id": "dfc1738679ba45e22c232d1f573dc55814247cda", "extension": "py"...
2.484375
stackv2
#!/usr/bin/env python3 # -*- coding: UTF-8 -*- import os,sys,time import paramiko import csv import logging import logging.config # Read host list from CVS file def readCVS(filename): csv_reader = csv.reader(open(filename, 'r')) return csv_reader # Login Server def loginServer(host,username,password): st...
113
38.87
126
21
884
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_4b4bab0107ed9f03_b4b778d8", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 19 ]
[ null ]
[ 5 ]
[ 62 ]
2024-11-18T21:24:00.206600+00:00
1,604,811,082,000
49a43a4cf9e8b8f74b760feeb820096412cbf383
3
{ "blob_id": "49a43a4cf9e8b8f74b760feeb820096412cbf383", "branch_name": "refs/heads/main", "committer_date": 1604811082000, "content_id": "116ebf9035498326b0feb7789778b0ccddfbf606", "detected_licenses": [ "MIT" ], "directory_id": "d1df67c321b26b130207d95716767dd4cd828dec", "extension": "py", "file...
3.28125
stackv2
import logging from os import makedirs, listdir, getcwd, rename import os.path as path from shutil import rmtree from subprocess import run, TimeoutExpired, CalledProcessError from re import compile, findall, match, search, sub from time import gmtime, strftime putils_logger = logging.getLogger(__name__) def create_d...
428
37.83
127
17
3,355
python
[{"finding_id": "codeql_py/overly-large-range_24460bb110ac9e64_89eb25bb", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 364 ]
[ null ]
[ 20 ]
[ 23 ]
2024-11-18T21:24:02.043638+00:00
1,500,914,995,000
05623b52455f54170a7613e39843a7d12ef13a4c
3
{ "blob_id": "05623b52455f54170a7613e39843a7d12ef13a4c", "branch_name": "refs/heads/master", "committer_date": 1500914995000, "content_id": "127bee6765c545e96e7c499e59944c175986dc99", "detected_licenses": [ "Apache-2.0" ], "directory_id": "fc00da63c8bef5fbb11847e9055036dc03e283d0", "extension": "py"...
2.734375
stackv2
"""Process YAML crowdsale definition files.""" import datetime import time from collections import OrderedDict from typing import Dict import ruamel.yaml import jinja2 from eth_utils.currency import to_wei from ruamel.yaml.comments import CommentedMap from web3 import Web3 from web3.contract import Contract from ico...
125
26.74
120
15
798
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_f426247ec5d4acaf_716d20ba", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 89 ]
[ null ]
[ 13 ]
[ 69 ]
2024-11-18T21:37:45.531272+00:00
1,488,792,553,000
f7a7342a23fb2516c07520b3373da386e64f228a
3
{ "blob_id": "f7a7342a23fb2516c07520b3373da386e64f228a", "branch_name": "refs/heads/master", "committer_date": 1488792553000, "content_id": "dd116037033f2b82a2a49705734bef25f3194260", "detected_licenses": [ "MIT" ], "directory_id": "86c9f8f8a47ff268264460c196624ce52cab0a98", "extension": "py", "fi...
2.515625
stackv2
import urlparse from flask import Flask from flask import request import hashlib import requests import json public_token = "" app = Flask(__name__) @app.route('/') def home(): request_token = str(request.args.get("request_token")) api_key = "dn9ld7rvexwulult" api_secret = "cedkw4emw3c8ybdqoewturi131rv4...
34
23.91
87
12
215
python
[{"finding_id": "codeql_py/flask-debug_9c9a7c1a8f38bef7_7e4319f8", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-327" ]
[ "py/flask-debug", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 34, 22 ]
[ null, null ]
[ 5, 24 ]
[ 24, 60 ]
2024-11-18T21:59:09.284708+00:00
1,503,490,962,000
e06db3abe465912d3c96a22c66be1a7f74de36ae
3
{ "blob_id": "e06db3abe465912d3c96a22c66be1a7f74de36ae", "branch_name": "refs/heads/master", "committer_date": 1503490962000, "content_id": "8373031c736eb3877cb3d03d18fe6f318f961a14", "detected_licenses": [ "MIT" ], "directory_id": "8afce592d78ab01a7388aaed4621e8c8d426659b", "extension": "py", "fi...
2.546875
stackv2
import collections import random import string import json import sys import logging import uuid from django.http import HttpResponse from django.db.models.fields.files import ImageFieldFile logger = logging.getLogger("maced") BAD_ITEM_NAME_CHARACTERS = ( "!", '"', "#", "$", "%", "&", "'", "(", ")", "*", "+", ",...
195
34.11
119
30
1,360
python
[{"finding_id": "codeql_py/stack-trace-exposure_323ec773a0bc76d8_53616212", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 145, 150 ]
[ null, null ]
[ 37, 37 ]
[ 44, 44 ]
2024-11-18T21:59:12.214148+00:00
1,631,045,562,000
f688178507fc2862af30d328eee12eb6fa132a92
2
{ "blob_id": "f688178507fc2862af30d328eee12eb6fa132a92", "branch_name": "refs/heads/master", "committer_date": 1631045562000, "content_id": "166997348f8fa2c807c01e2ee0ea5315b4e26524", "detected_licenses": [ "MIT" ], "directory_id": "af1436c9b30457fc99eab23c5fe65d399394a41e", "extension": "py", "fi...
2.328125
stackv2
#!/usr/bin/python3 from bottle import post, get, route, run, template, request, response, default_app import json, requests, time, traceback, random, os, base64, urllib, jwt # Change working directory so relative paths (and template lookup) work again os.chdir(os.path.dirname(__file__)) def process_roles(header): ...
36
33.42
100
12
328
python
[{"finding_id": "codeql_py/reflective-xss_ea4aeb958e2f56dd_9fb20f86", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 27 ]
[ null ]
[ 12 ]
[ 30 ]
2024-11-18T21:59:21.030104+00:00
1,533,479,282,000
4f6a98c8bb45d6c53ee3c235a48bbf56800e962e
3
{ "blob_id": "4f6a98c8bb45d6c53ee3c235a48bbf56800e962e", "branch_name": "refs/heads/master", "committer_date": 1533479282000, "content_id": "cfdf44659e7d2687f3f17f0c20710f873e13889e", "detected_licenses": [ "MIT" ], "directory_id": "39da6b5f8d665a6ca3d1fc1408fb680aa0868dd3", "extension": "py", "fi...
2.75
stackv2
#!/usr/bin/python3 # 用于接受写入日记本的内容并写入数据库 import cgi import codecs import sys import os import pymysql import traceback import cgitb from config import * # 用于连接并写入数据库 def write(title, content, ip): db = pymysql.connect(host=mysql.host,user=mysql.user, password=mysql.password, port=mysql.port, db=mysql.database) curs...
60
19.23
115
10
383
python
[{"finding_id": "codeql_py/sql-injection_8b8d667fe2298a50_f52094ef", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown...
1
true
[ "CWE-089" ]
[ "py/sql-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This SQL query depends on a [user-provided value](1)." ]
[ 22 ]
[ null ]
[ 18 ]
[ 21 ]
2024-11-18T22:11:33.062517+00:00
1,584,336,991,000
57aa70499b33d109667d86dbd7e7193c57b21e56
3
{ "blob_id": "57aa70499b33d109667d86dbd7e7193c57b21e56", "branch_name": "refs/heads/master", "committer_date": 1584336991000, "content_id": "8ed0645fd7984f1d80853dad71e583a9a4dbabce", "detected_licenses": [ "MIT" ], "directory_id": "297cc60784a9b976cb1cb3259d2f9da6f676ff09", "extension": "py", "fi...
2.78125
stackv2
from flask import Flask, request, jsonify, render_template import os import dialogflow import requests import json import sqlite3 from sqlite3 import Error app = Flask(__name__) @app.route('/') def index(): return render_template('index.html') @app.route('/webhook', methods=['POST']) def webhook(): data = r...
137
28.14
125
19
856
python
[{"finding_id": "codeql_py/sql-injection_5bdb7a63eb992dc8_aa708df3", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown...
1
true
[ "CWE-089" ]
[ "py/sql-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This SQL query depends on a [user-provided value](1)." ]
[ 82 ]
[ null ]
[ 21 ]
[ 24 ]
2024-11-18T22:11:33.954092+00:00
1,637,243,257,000
569b499b71259569389470aaaf307c96658e37f5
3
{ "blob_id": "569b499b71259569389470aaaf307c96658e37f5", "branch_name": "refs/heads/main", "committer_date": 1637243257000, "content_id": "bfd580dcba65003f940cfdd6334410941fcf713f", "detected_licenses": [ "MIT" ], "directory_id": "00af17538ca4f43453e673dc28060f4d3631b692", "extension": "py", "file...
3.046875
stackv2
import subprocess from time import sleep import platform from zipfile import * print(''' ░██████╗████████╗███████╗░█████╗░██╗░░░░░███████╗██████╗░░░░███████╗██╗░░██╗███████╗ ██╔════╝╚══██╔══╝██╔════╝██╔══██╗██║░░░░░██╔════╝██╔══██╗░░░██╔════╝╚██╗██╔╝██╔════╝ ╚█████╗░░░░██║░░░█████╗░░███████║██║░░░░░█████╗░░██████╔╝░░...
60
28.82
84
11
674
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_5abd67f064b589fd_daa9e0d0", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 26 ]
[ null ]
[ 17 ]
[ 18 ]
2024-11-18T22:11:39.156365+00:00
1,625,349,262,000
f235b9dde40a3f425538b10511c1013a54d9b5ee
4
{ "blob_id": "f235b9dde40a3f425538b10511c1013a54d9b5ee", "branch_name": "refs/heads/master", "committer_date": 1625349262000, "content_id": "cdea596a90bf09a280bd108b8496019963a7ed74", "detected_licenses": [ "Unlicense" ], "directory_id": "2d544366ada4294769951e446956427991833a4e", "extension": "py",...
4.125
stackv2
from abc import ABC, abstractmethod class Employee(ABC): def __init__(self): self.name = "" @abstractmethod def display(self): print("{}".format(self.name)) @abstractmethod def get_paycheck(self): return 0 class HourlyEmployee(Employee): def __init__(self): ...
73
23.63
105
16
400
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d4d90da86647beae_bee8c34f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 37 ]
[ null ]
[ 15 ]
[ 65 ]
2024-11-18T22:23:59.166259+00:00
1,666,684,557,000
ff029f070517b1984d6d2e945fa88ee0b57d22d0
2
{ "blob_id": "ff029f070517b1984d6d2e945fa88ee0b57d22d0", "branch_name": "refs/heads/master", "committer_date": 1666684557000, "content_id": "c88d20cd9ebff5735884056f7358d43e7841879e", "detected_licenses": [ "MIT" ], "directory_id": "cb1e1f963d252ac1a9d51d457c924af6e2039a24", "extension": "py", "fi...
2.359375
stackv2
# -*- coding: utf-8 -*- import base64 import hashlib import hmac import re def to_smtp_credentials(_password, region=None, relayhost=None, password_conversion_mode=None, **kv): if password_conversion_mode == None or password_conversion_mode == "aws_ses_v4": return to_smtp_credentials_aws_ses_v4(_password, ...
44
40.43
132
17
506
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_65b3f01488ee67ef_4132bbac", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 44 ]
[ null ]
[ 11 ]
[ 66 ]
2024-11-18T22:36:29.138026+00:00
1,693,898,753,000
8f2d5122178085a7283e9119c22ab90d4dbeb538
2
{ "blob_id": "8f2d5122178085a7283e9119c22ab90d4dbeb538", "branch_name": "refs/heads/master", "committer_date": 1693898753000, "content_id": "392e23da6ee6de4f79ac355a8cfdcb6404e111ed", "detected_licenses": [ "Apache-2.0" ], "directory_id": "88aca3340574f733b9ecd6f76708ecd2d57cb07e", "extension": "py"...
2.375
stackv2
from flask import Flask, render_template, redirect, url_for, request,make_response from pymongo import MongoClient from bson.objectid import ObjectId import socket import os import json app = Flask(__name__) LINK=os.environ.get('LINK', "www.cloudyuga.guru") TEXT1=os.environ.get('TEXT1', "CloudYuga") TEXT2=os.environ....
105
30.31
110
15
848
python
[{"finding_id": "codeql_py/flask-debug_23e8b2ae68b566d2_a9bbb7ec", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 105, 89 ]
[ null, null ]
[ 5, 16 ]
[ 40, 52 ]
2024-11-18T22:36:37.381036+00:00
1,442,117,175,000
516b6195bf914f3aa506e32280eec498c16bac6b
3
{ "blob_id": "516b6195bf914f3aa506e32280eec498c16bac6b", "branch_name": "refs/heads/master", "committer_date": 1442117175000, "content_id": "3ad342fc058310d97b641e048d154bf4894ac557", "detected_licenses": [ "MIT" ], "directory_id": "9544fa236ac0c10c3011bb74cc7639722d01a6cc", "extension": "py", "fi...
2.859375
stackv2
import requests import re from untitled import Agent, NewCommand agent = Agent() def foo(): print('foooooooo') agent.run_command(NewCommand(foo)) agent.register_command('foo', NewCommand(foo)) agent.call_by_keyword('foo') @agent.register('bar') def bar(): print('Que?') urlRegex = 'http[s]?://(?:[a-zA-Z]|[0-9]|...
44
17.84
91
14
246
python
[{"finding_id": "codeql_py/overly-large-range_08ce5bc79c6b3a7f_1a0b7c8a", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 20 ]
[ null ]
[ 43 ]
[ 46 ]
2024-11-18T22:36:47.237713+00:00
1,523,771,233,000
0b9267f409ca33cd9e897f2f854ff01673997649
2
{ "blob_id": "0b9267f409ca33cd9e897f2f854ff01673997649", "branch_name": "refs/heads/master", "committer_date": 1523771233000, "content_id": "04cbb9f624ac290087f6d9b85b9194f6a2cda965", "detected_licenses": [ "Apache-2.0" ], "directory_id": "5f5f2e80b97ea9933e2e9e7064727b27f5c1ba04", "extension": "py"...
2.328125
stackv2
# Copyright 2017 Google Inc. # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, ...
314
31.95
91
27
1,906
python
[{"finding_id": "codeql_py/log-injection_b86e0c68e82fdc30_60713808", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
2
true
[ "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 43, 64 ]
[ null, null ]
[ 22, 18 ]
[ 74, 22 ]
2024-11-18T20:23:13.667596+00:00
1,549,157,630,000
b92a253047545c45fa225c4320fb35d3e6f03040
3
{ "blob_id": "b92a253047545c45fa225c4320fb35d3e6f03040", "branch_name": "refs/heads/master", "committer_date": 1549157630000, "content_id": "37f67c331064f3838bb0ae2995c1bab708860d15", "detected_licenses": [ "MIT" ], "directory_id": "a1645b990317bbab4f373588f11a398745a5475f", "extension": "py", "fi...
3.109375
stackv2
# database python file # Copyright (c) 2019 Joan Chirinos import uuid from datetime import datetime import sqlite3 # enable control of an sqlite database DB_FILE = "data/main.db" def create_db(): ''' Creates the database ''' db = sqlite3.connect(DB_FILE) c = db.cursor() c.execute("CREATE ...
161
23.84
116
11
964
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e475080382c4876f_798a1f78", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 59 ]
[ null ]
[ 11 ]
[ 116 ]
2024-11-18T20:23:16.727062+00:00
1,601,546,228,000
5bc8b1e125ca2e0c791c291a1e066db0c0358d19
2
{ "blob_id": "5bc8b1e125ca2e0c791c291a1e066db0c0358d19", "branch_name": "refs/heads/master", "committer_date": 1601546228000, "content_id": "d0b1ab0b9edaf78fee52c94d0c6eb97ae1f89418", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "9a5505ebc6a4a9f7d710e1ef8ce488b578b63c6e", "extension": "p...
2.390625
stackv2
# -*- coding: utf-8 -*- """ sqldns.py - Prints Data Source Name on stdout Copied, Trimmed, and Modified from django-extensions module Copyright (c) 2007 Michael Trier Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to ...
125
37.1
131
17
1,043
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_da7491d4826ea85f_ca527438", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 97 ]
[ null ]
[ 30 ]
[ 51 ]
2024-11-18T20:23:19.087880+00:00
1,578,618,011,000
cc8bff9b2d798efc81ae5805d9a8a46700829dd4
2
{ "blob_id": "cc8bff9b2d798efc81ae5805d9a8a46700829dd4", "branch_name": "refs/heads/master", "committer_date": 1578618011000, "content_id": "8a1910c1ad9a9a3b682715b183ab75f869a33013", "detected_licenses": [ "MIT" ], "directory_id": "18461ac26e3f09106a2a8475102a06749594dc09", "extension": "py", "fi...
2.40625
stackv2
from flask import Flask, request, jsonify import os # <start> Pieces from notebook prototyping.. # from watson_developer_cloud import VisualRecognitionV3 import json import re from PIL import Image model_id = "" # <-- PASTE YOUR MODEL ID HERE apikey = "" # <-- PASTE YOUR APIKEY HERE visual_recognition = VisualRe...
85
33.75
112
14
789
python
[{"finding_id": "codeql_py/flask-debug_18a3c7ef65388c47_4d8dd208", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
7
true
[ "CWE-215", "CWE-1333", "CWE-1333", "CWE-022", "CWE-022", "CWE-022", "CWE-022" ]
[ "py/flask-debug", "py/polynomial-redos", "py/polynomial-redos", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings starting with '.' and with many repetitions of '.'.", "This [regular expression](1) that depends...
[ 85, 37, 38, 27, 51, 80, 81 ]
[ null, null, null, null, null, null, null ]
[ 5, 43, 42, 16, 16, 20, 20 ]
[ 52, 55, 54, 30, 24, 32, 31 ]
2024-11-18T20:23:27.716646+00:00
1,545,719,646,000
1eae78cb74f87720c522127233717b9495b538fc
3
{ "blob_id": "1eae78cb74f87720c522127233717b9495b538fc", "branch_name": "refs/heads/master", "committer_date": 1545719646000, "content_id": "093b58eacac32a14a0b99872b74ecd013db8be3e", "detected_licenses": [ "MIT" ], "directory_id": "5c9d178c41577422351a2f7ed69ce9713c38a8b4", "extension": "py", "fi...
3.140625
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- """Advent of Code 2018 day 24 module.""" from __future__ import division, print_function import re from copy import deepcopy from itertools import count try: from tqdm import tqdm except ImportError: tqdm = None class UnitGroup(object): def __init__(self, ...
236
29.88
174
20
1,705
python
[{"finding_id": "codeql_py/redos_147160c89dde290e_7bd58d71", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of 'a'.", "remediati...
2
true
[ "CWE-1333", "CWE-1333" ]
[ "py/redos", "py/redos" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of 'a'.", "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of 'a'." ]
[ 113, 113 ]
[ null, null ]
[ 38, 72 ]
[ 42, 76 ]
2024-11-18T20:23:30.396902+00:00
1,656,386,411,000
c07e6be5fa7aa1aba9bcb58514d8869d4a139872
2
{ "blob_id": "c07e6be5fa7aa1aba9bcb58514d8869d4a139872", "branch_name": "refs/heads/master", "committer_date": 1656386411000, "content_id": "f100fe675323517132a6f1c8756d8f68399258be", "detected_licenses": [ "Apache-2.0" ], "directory_id": "977b17b2ea54c1a961d206a9f01e63391cc37a7c", "extension": "py"...
2.453125
stackv2
import os from milvus_helpers import MilvusHelper from mysql_helpers import MySQLHelper from config import UPLOAD_PATH from logs import LOGGER from operations.load import do_load from operations.search import do_search from operations.count import do_count from operations.drop import do_drop from fastapi import FastAPI...
138
33.27
97
15
1,139
python
[{"finding_id": "codeql_py/stack-trace-exposure_d1f91e6b8af096cf_b0e1a0e4", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
8
true
[ "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-209", "CWE-022" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information...
[ 47, 57, 72, 95, 113, 124, 135, 44 ]
[ null, null, null, null, null, null, null, null ]
[ 16, 16, 16, 16, 16, 16, 16, 29 ]
[ 48, 48, 48, 48, 48, 48, 48, 39 ]
2024-11-18T21:23:10.950873+00:00
1,394,198,199,000
05cf1d8377ff26b1447a7bc8f71c33457732820f
3
{ "blob_id": "05cf1d8377ff26b1447a7bc8f71c33457732820f", "branch_name": "refs/heads/master", "committer_date": 1394198199000, "content_id": "e6fcfe4b08519025dd3eab83472e202d6d799e45", "detected_licenses": [ "MIT" ], "directory_id": "a2cbb28a6abee229efd106e24a49197e4d73f19e", "extension": "py", "fi...
3.03125
stackv2
import re import operator import math ### Code for identifying characters filename = input("Enter name of the text file: ") f = open(filename, 'r') text = f.read() lines = text.splitlines() characters = dict() punctuation = [',', '.', '\'', '\"', '!', '?', '...', ':', ')', '(', '[', ']', '&'] chars_inorder = [] for...
182
24.51
174
22
1,555
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a1d2c5e7ee57302c_57b4250a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
4
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 117, 120, 123, 123 ]
[ null, null, null, null ]
[ 9, 9, 9, 28 ]
[ 30, 79, 21, 82 ]