added stringlengths 32 32 | created int64 1,236B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.03 | source stringclasses 1
value | text stringlengths 330 19.3k | num_lines int64 16 648 | avg_line_length float64 15.5 59.3 | max_line_length int64 37 179 | ast_depth int64 8 38 | length int64 102 3.79k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.11k 276k | sast_codeql_findings_count int64 1 33 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 33 | rule_ids listlengths 1 33 | confidences listlengths 1 33 | severities listlengths 1 33 | messages listlengths 1 33 | line_starts listlengths 1 33 | line_ends listlengths 1 33 | column_starts listlengths 1 33 | column_ends listlengths 1 33 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-18T21:58:35.299064+00:00 | 1,693,200,041,000 | 0adff3c3a83a1fbfdcc0526a801b081b6f481d3e | 2 | {
"blob_id": "0adff3c3a83a1fbfdcc0526a801b081b6f481d3e",
"branch_name": "refs/heads/master",
"committer_date": 1693200041000,
"content_id": "6bc71ab35a44ff6ad27d7f29a5cea4f1dbe89c03",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "1040b320168c49e3fd784d93ff30923527582d26",
"extension": "py"... | 2.375 | stackv2 | import os
from jinja2 import Environment, PackageLoader
from calm.dsl.builtins import read_file
from calm.dsl.log import get_logging_handle
from calm.dsl.config import get_context
LOG = get_logging_handle(__name__)
def render_runbook_template(runbook_name):
schema_file = "runbook.py.jinja2"
loader = Packa... | 78 | 26.31 | 74 | 15 | 511 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_7c429f6336378945_399539b9", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
16
] | [
null
] | [
11
] | [
37
] | |
2024-11-18T21:58:38.941056+00:00 | 1,342,158,104,000 | f8cd77a2b7a3b5f0285220feea25d9c9eb80ac11 | 3 | {
"blob_id": "f8cd77a2b7a3b5f0285220feea25d9c9eb80ac11",
"branch_name": "refs/heads/master",
"committer_date": 1342158104000,
"content_id": "4c1d76ecf0cb7e8b4da979e9a80fa4ed664ba415",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "471a036309c05b59243033f2480e27e19268ec55",
"extension": "p... | 3.0625 | stackv2 | """
Many portions of code inside this file were copied from Django 1.4 and modified for our needs.
Copyright (c) Django Software Foundation and individual contributors. All rights reserved.
"""
import re
import hashlib
import hmac
from london.conf import settings
EXP_ENCRYPTED = re.compile('^(sha1|md5|crypt)\$(\w{12})... | 112 | 34.64 | 113 | 13 | 916 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_6a8d3dc315ec6b71_def5e14a", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 3 | true | [
"CWE-327",
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi... | [
72,
74,
91
] | [
null,
null,
null
] | [
28,
29,
24
] | [
47,
48,
41
] | |
2024-11-18T21:58:40.848298+00:00 | 1,683,743,253,000 | 06f402e6be7ef9af4a846b652328eb42776060a4 | 3 | {
"blob_id": "06f402e6be7ef9af4a846b652328eb42776060a4",
"branch_name": "refs/heads/master",
"committer_date": 1683743253000,
"content_id": "df80e9d8aed425dee09797f348693be91aca83d0",
"detected_licenses": [
"MIT"
],
"directory_id": "db5cc66ffe6ce1eb4ddb056f17878ad158463732",
"extension": "py",
"fi... | 2.90625 | stackv2 | """Function that gets device enviromental stats"""
from json.decoder import JSONDecodeError
import requests
import json
import time
import os
import warnings
warnings.filterwarnings('ignore', message='Unverified HTTPS request')
headers = {"Content-Type": 'application/yang-data+json', 'Accept': 'application/yang-data+j... | 39 | 36.74 | 161 | 16 | 372 | python | [{"finding_id": "codeql_py/request-without-cert-validation_3afac4c409e33755_29b7010d", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
20
] | [
null
] | [
20
] | [
95
] | |
2024-11-18T23:10:52.544686+00:00 | 1,358,639,590,000 | 22c43f981cdde78c0cb15446face680b93ae4758 | 3 | {
"blob_id": "22c43f981cdde78c0cb15446face680b93ae4758",
"branch_name": "refs/heads/master",
"committer_date": 1358639850000,
"content_id": "01a830c45bd91975ada2b454417ac8a1cdde0c74",
"detected_licenses": [
"MIT"
],
"directory_id": "a72994c9fe608283287944da8a53170d98235fa6",
"extension": "py",
"fi... | 2.640625 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
from uuid import uuid4
import sqlalchemy as sa
#TODO: salt that shit
from hashlib import sha512
from sqlalchemy.orm import relationship
from beard.models import Base, TimestampMixin
class User(Base):
__tablename__ = 'users'
id = sa.Column(sa.CHAR(36),
... | 69 | 28.36 | 66 | 14 | 465 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_09d44c23bd853cf4_6bdf1175", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
31
] | [
null
] | [
23
] | [
31
] | |
2024-11-18T23:11:00.300765+00:00 | 1,499,399,816,000 | 1975546a7a195d71dca8c52de25fa8553749f502 | 3 | {
"blob_id": "1975546a7a195d71dca8c52de25fa8553749f502",
"branch_name": "refs/heads/master",
"committer_date": 1499399816000,
"content_id": "240158674af767866a4f3daf17bf78351e2ccaae",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "867d175c1d8e5c6e5cf730d0f852460a3720ce50",
"extension": "p... | 2.515625 | stackv2 | from flask import Flask, request, json, Response
# Exceptions
from sqlalchemy.exc import IntegrityError
import binascii
import pyotp
import logging
from otpd.model import db, Client, User, TOTP, HOTP
app = Flask(__name__)
app.config['SQLALCHEMY_DATABASE_URI'] = 'sqlite:///otpd.db'
app.config['SQLALCHEMY_TRACK_MODIF... | 397 | 25.23 | 84 | 18 | 2,468 | python | [{"finding_id": "codeql_py/reflective-xss_f9600ec723a2b571_d37b6436", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 5 | true | [
"CWE-079",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/reflective-xss",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"HIGH",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
176,
212,
216,
234,
238
] | [
null,
null,
null,
null,
null
] | [
20,
26,
21,
26,
21
] | [
65,
62,
58,
62,
59
] | |
2024-11-18T23:11:19.271776+00:00 | 1,604,461,306,000 | 6614aa9c4d644895606ff153fe0e2a48983c18f7 | 3 | {
"blob_id": "6614aa9c4d644895606ff153fe0e2a48983c18f7",
"branch_name": "refs/heads/master",
"committer_date": 1604461306000,
"content_id": "e763aad714f02ee01cdb50b6e3afe8271c9fb84d",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "6ffea319d68339a24a1d6ea96ae75fda66b08d4b",
"extension": "py"... | 2.59375 | stackv2 | # Name: image.py
# Author: HuangHao
# Time: 2020/9/18 11:05
from django.http import HttpResponse, JsonResponse
import os, hashlib, time
from zoo.settings import STATIC_URL, BASE_DIR
from zooapi.models import User, Folder, Article, Image
# api接口,url相同,按照请求方法不懂,分到到特定函数去处理。
def process_method(request):
if request.m... | 142 | 30.89 | 110 | 22 | 1,159 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_9bd3891876f8d41f_b412f759", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.",... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
65
] | [
null
] | [
38
] | [
91
] | |
2024-11-18T22:48:22.788955+00:00 | 1,626,620,274,000 | b2722fa09168742dbed9c773c01d11e3af583586 | 3 | {
"blob_id": "b2722fa09168742dbed9c773c01d11e3af583586",
"branch_name": "refs/heads/master",
"committer_date": 1626620274000,
"content_id": "f029d36f05d4aec95a27d336d627fdc48b98156a",
"detected_licenses": [
"MIT"
],
"directory_id": "f440b3605cc24c70c0bea61b5ba852448835f530",
"extension": "py",
"fi... | 3.34375 | stackv2 | import re
from discord.ext import commands
__all__ = (
"Cell",
"Column",
"Row",
)
class Column(commands.Converter[int]):
"""Returns the index of a column."""
@classmethod
def from_char(cls, argument: str) -> int:
return ord(argument.upper()) - ord("A")
@classmethod
async de... | 48 | 27.06 | 84 | 15 | 307 | python | [{"finding_id": "codeql_py/overly-large-range_5d5f3c472da69f51_32a64d9b", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
45
] | [
null
] | [
24
] | [
27
] | |
2024-11-18T22:49:06.203271+00:00 | 1,629,862,276,000 | 40be4e703074bc3b951b2e0e56cdc75d7d445f34 | 3 | {
"blob_id": "40be4e703074bc3b951b2e0e56cdc75d7d445f34",
"branch_name": "refs/heads/master",
"committer_date": 1629862276000,
"content_id": "5872f6e2cdb04d5199e494e5c405fe922ab93dd4",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "aa3cee4c9a1c7397fd47a3da4e9dae9433e0841e",
"extension": "p... | 2.5625 | stackv2 | import asyncio
import io
import os
import time
import zipfile
from datetime import datetime
from pathlib import Path
from tarfile import is_tarfile
from tarfile import open as tar_open
from telethon import types
from telethon.utils import get_extension
from ..Config import Config
from . import codex, edit_delete, edi... | 283 | 35.58 | 112 | 21 | 2,313 | python | [{"finding_id": "codeql_py/tarslip_2400acf80ca98199_da843734", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/tarslip",
"py/tarslip"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1).",
"This file extraction depends on a [potentially untrusted source](1)."
] | [
226,
270
] | [
null,
null
] | [
13,
9
] | [
17,
13
] | |
2024-11-18T22:49:08.657807+00:00 | 1,487,804,141,000 | 26accc4d475630e2bc1f2745ded23bfbdd3eb341 | 2 | {
"blob_id": "26accc4d475630e2bc1f2745ded23bfbdd3eb341",
"branch_name": "refs/heads/master",
"committer_date": 1487804141000,
"content_id": "ebe1e3b414322e8e4973e8ba246998b4e360843a",
"detected_licenses": [
"MIT"
],
"directory_id": "30c08ba36f6622a09a254e68d388687529ae0730",
"extension": "py",
"fi... | 2.40625 | stackv2 | import os
import yaml
from sqlalchemy import create_engine
import yaml
import json
import logging
#logging.basicConfig(format = "%(asctime)s %(message)s",
# filename ="setup_env.log", level = logging.DEBUG)
def get_database(config_file_name='pipeline/default_profile.yaml'):
try:
logging.debu... | 93 | 28.9 | 135 | 14 | 624 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_212f932a8f52bf94_fd3d2f23", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
73
] | [
null
] | [
19
] | [
22
] | |
2024-11-18T23:26:04.851732+00:00 | 1,599,053,689,000 | 565a201dffaf39307fbf9856f49d1fb8c5c0788d | 3 | {
"blob_id": "565a201dffaf39307fbf9856f49d1fb8c5c0788d",
"branch_name": "refs/heads/master",
"committer_date": 1599053689000,
"content_id": "657cdb20a264e4f255324a41157fd6d6dbb818ea",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "5fe72bb13baf3649058ebe11aa86ad4fc56c69ed",
"extension": "py"... | 2.875 | stackv2 | import sys
import markdown
import yaml
import os
from jinja2 import Environment, FileSystemLoader
with open(sys.argv[2], 'r') as f:
content = yaml.safe_load(f.read())
for k in content:
if k.startswith('md_'):
content[k] = markdown.markdown(content[k])
tpath = os.path.join(os.getcwd(), 'templates')
en... | 30 | 22.37 | 61 | 11 | 184 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_a59ad79a409dd5b0_c7e44d40", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
15
] | [
null
] | [
7
] | [
50
] | |
2024-11-18T22:27:42.240458+00:00 | 1,531,145,899,000 | 0bc9fe0e8a5ec084187792c0e80b4b2274e8b319 | 3 | {
"blob_id": "0bc9fe0e8a5ec084187792c0e80b4b2274e8b319",
"branch_name": "refs/heads/master",
"committer_date": 1531145899000,
"content_id": "41883fc2356600916204c5dd817fb027f30d3ff8",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "15a7405acc2f2f15f2d6bbbf9baabfa317b26ba0",
"extension": "p... | 2.65625 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
from collections import OrderedDict
import os
import sys
import jinja2
def generate_source(filename, template_dict):
template = template_setup(filename)
filepath, in_ext = os.path.splitext(filename)
assert in_ext == '.in', 'Invalid template file: {}'.format(f... | 58 | 33.17 | 78 | 13 | 489 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_8233a34cbf8d02b5_0c8e0877", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
37
] | [
null
] | [
20
] | [
62
] | |
2024-11-18T22:14:57.121323+00:00 | 1,624,164,026,000 | ce94f9a08ac3ee2d8329c485e2c175e929c46811 | 4 | {
"blob_id": "ce94f9a08ac3ee2d8329c485e2c175e929c46811",
"branch_name": "refs/heads/main",
"committer_date": 1624164026000,
"content_id": "e2456cb7ab97c82052a0a85f796ea8474b745795",
"detected_licenses": [
"MIT"
],
"directory_id": "a031e4e02106846394c3feea51408b87b696802f",
"extension": "py",
"file... | 3.65625 | stackv2 | import random
import string
upper = string.ascii_uppercase
lower = string.ascii_lowercase
num = string.digits
punc = string.punctuation
print("UPPERCASE:\tU\nLOWERCASE:\tL\nDIGITS:\t\tD\nSYMBOLS:\tS")
q = input("Enter your choice of combination: ")
full_combination = ""
if "U" in q.upper():
full_combination += ... | 30 | 20.97 | 64 | 8 | 179 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0f795a19084c19af_ee8135a2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
30
] | [
null
] | [
7
] | [
38
] | |
2024-11-18T22:55:28.673129+00:00 | 1,459,379,160,000 | 5701ec67185e0862e7e48dd4c233c96d3a5e8c4b | 3 | {
"blob_id": "5701ec67185e0862e7e48dd4c233c96d3a5e8c4b",
"branch_name": "refs/heads/master",
"committer_date": 1459379160000,
"content_id": "a74da733d12cd79b7e7ceab761f4d4658c514bf0",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "ffe12cd6b694d3a9f64d957ff00278c0ccc3a5eb",
"extension": "py"... | 2.65625 | stackv2 | import sys
import json
import time
import requests
class Marathon(object):
def __requests_get(self, uri):
response = None
if self.marathon_user:
# print "User " + self.marathon_user + "Pass " + self.marathon_pass
# print "URI " + self.marathon_host + uri
respons... | 139 | 37.04 | 79 | 17 | 1,043 | python | [{"finding_id": "codeql_py/request-without-cert-validation_26135a6a7d8149a1_68856b15", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 4 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
13,
18,
28,
34
] | [
16,
19,
32,
37
] | [
24,
24,
24,
24
] | [
63,
50,
63,
50
] | |
2024-11-18T22:55:31.459745+00:00 | 1,572,025,509,000 | 367744f9cf4b8f01b5c6db4c1fe25a3eed8e84b1 | 2 | {
"blob_id": "367744f9cf4b8f01b5c6db4c1fe25a3eed8e84b1",
"branch_name": "refs/heads/master",
"committer_date": 1572025509000,
"content_id": "8db1cfac6d113c1e07c9e8b5a196413c6c3f998c",
"detected_licenses": [
"MIT"
],
"directory_id": "ac9f185ebeba4800ee24f9ce1da9e4006b2260e5",
"extension": "py",
"fi... | 2.375 | stackv2 | #!/usr/bin/env python
###########################################
# Duino-Coin wallet version 0.6.4 alpha #
# https://github.com/revoxhere/duino-coin #
# copyright by revox 2019 #
###########################################
import time, socket, sys, os, configparser, tkinter, webbrowser
import threa... | 302 | 37.22 | 156 | 18 | 2,639 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e128b4a85ab0b8bf_d0694082", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
152
] | [
null
] | [
50
] | [
58
] | |
2024-11-18T22:55:36.744805+00:00 | 1,581,323,143,000 | f8f053d306d83d200d3aaaf72fbf9b7399dd9891 | 2 | {
"blob_id": "f8f053d306d83d200d3aaaf72fbf9b7399dd9891",
"branch_name": "refs/heads/master",
"committer_date": 1581323143000,
"content_id": "48403709cd32255781ee0b89b16673ecb940a03c",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "08e0779e88e601f15c806298198646d38be596a3",
"extension": "p... | 2.5 | stackv2 | """
Subset of repo2docker functionality focused on primarily Python projects.
Supports the following files from repo2docker:
1. environment.yml
2. requirements.txt
3. runtime.txt
4. postBuild
5. start
We try to re-use code from repo2docker wherever possible
"""
from traitlets.config import LoggingConfigurable, Appli... | 126 | 32.82 | 113 | 17 | 1,017 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_92b90d36dcf829b9_62e6a5cb", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
107
] | [
null
] | [
13
] | [
43
] | |
2024-11-18T23:23:59.723346+00:00 | 1,576,322,022,000 | a4a755dc56fc8e35973f5535311791b8db7cffbe | 3 | {
"blob_id": "a4a755dc56fc8e35973f5535311791b8db7cffbe",
"branch_name": "refs/heads/master",
"committer_date": 1576322022000,
"content_id": "09de43ac2ec5bf26a3adbf37a0fc906e5c863b89",
"detected_licenses": [
"MIT"
],
"directory_id": "666a7bbd6bc2b5fcae250fea4fbe56e3bccc1f5f",
"extension": "py",
"fi... | 2.734375 | stackv2 | from flask import Flask, render_template, redirect, url_for, request, g
import sqlite3
import hashlib
app = Flask(__name__)
def check_password(hashed_password, user_password):
return hashed_password == hashlib.md5(user_password.encode()).hexdigest()
def validate(username, password):
con = sqlite3.connect('st... | 43 | 29.63 | 77 | 16 | 265 | python | [{"finding_id": "codeql_py/flask-debug_da203f9631cb400c_4b8f8c8d", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-327"
] | [
"py/flask-debug",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)]... | [
43,
8
] | [
null,
null
] | [
5,
43
] | [
24,
65
] | |
2024-11-18T22:43:32.082274+00:00 | 1,625,449,693,000 | c2edebc9bc5b5e586a801e22458b8b28419446b1 | 4 | {
"blob_id": "c2edebc9bc5b5e586a801e22458b8b28419446b1",
"branch_name": "refs/heads/main",
"committer_date": 1625449693000,
"content_id": "18b93f1b29b73c74489855aada0fcbe882b975d9",
"detected_licenses": [
"MIT"
],
"directory_id": "1f9673d769dac5deb55f684215b6dbf5087695ad",
"extension": "py",
"file... | 4.28125 | stackv2 | from random import randint
numero_secreto = randint(1, 10)
cont = 0
while True:
print('*' * 30)
chute = int(input('Faça seu chute: '))
print('*' * 30)
acertou = chute == numero_secreto
maior = chute > numero_secreto
menor = chute < numero_secreto
cont += 1
if acertou:
print(... | 26 | 23.12 | 84 | 14 | 182 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_76f9a983082ef601_53bdee3e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
26
] | [
null
] | [
7
] | [
84
] | |
2024-11-19T00:07:11.758788+00:00 | 1,457,382,475,000 | e447c00c6a938d7ffebca8122d26975b22078e11 | 3 | {
"blob_id": "e447c00c6a938d7ffebca8122d26975b22078e11",
"branch_name": "refs/heads/master",
"committer_date": 1457382475000,
"content_id": "3842be6f7fdde9535efb74cac6170f1b4b11808e",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "81889c95119faf3b34a8b10d46ce7fd1ac5d39c6",
"extension": "py"... | 2.625 | stackv2 |
#!/usr/bin/python
# -*- coding: utf-8 -*-
"""
Extraction of phone numbers
"""
import re
import itertools
import math
import extractor
class ExtractPhoneNumber(extractor.Extractor):
def human_name(self):
return "simplephone"
def name(self):
return "phone"
def version(self):
ret... | 88 | 26.76 | 88 | 16 | 683 | python | [{"finding_id": "codeql_py/bad-tag-filter_5b7fc653d4621b94_94f5d614", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression does not match upper case <SCRIPT> tags.", "remediation": "", "location": {"file_path": ... | 1 | true | [
"CWE-116"
] | [
"py/bad-tag-filter"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression does not match upper case <SCRIPT> tags."
] | [
30
] | [
null
] | [
30
] | [
53
] | |
2024-11-19T00:07:16.397489+00:00 | 1,517,384,145,000 | a7ad3f144e22ae2342203e275598be252f283a54 | 2 | {
"blob_id": "a7ad3f144e22ae2342203e275598be252f283a54",
"branch_name": "refs/heads/master",
"committer_date": 1517384145000,
"content_id": "b90994f6c46652c9acf0bcace6206135230ccf8d",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "42f56f2d560a9f556afe28a333f005c0b5255a33",
"extension": "py"... | 2.390625 | stackv2 | import os.path
import os
import time
import tarfile
import random
from zipfile import ZipFile
import redleader.util as util
import botocore
class ElasticBeanstalkManager(object):
def __init__(self, context):
self._context = context
def upload_package(self, bucket_name, path, name):
print("Uplo... | 51 | 39.08 | 120 | 18 | 422 | python | [{"finding_id": "codeql_py/overly-permissive-file_79156f2e0dcc9aa8_26ecc905", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to group readable.", "remediation": "", "location": ... | 2 | true | [
"CWE-732",
"CWE-732"
] | [
"py/overly-permissive-file",
"py/overly-permissive-file"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to group readable.",
"Overly permissive mask in chmod sets file to group readable."
] | [
39,
49
] | [
null,
null
] | [
17,
9
] | [
67,
35
] | |
2024-11-19T00:07:20.567305+00:00 | 1,693,308,663,000 | e71407bee3f21eda92aeb818e8ce5b214424f9a4 | 2 | {
"blob_id": "e71407bee3f21eda92aeb818e8ce5b214424f9a4",
"branch_name": "refs/heads/master",
"committer_date": 1693308663000,
"content_id": "b2f87f5c8fc47693c51284bad4c40222305ddaee",
"detected_licenses": [
"BSD-3-Clause",
"MIT",
"Apache-2.0"
],
"directory_id": "2ea243502ad70d0300e30a5373a24bd... | 2.4375 | stackv2 | import copy
import logging
import typing
import requests
import dacite
import datetime
import dateutil.parser
from dataclasses import dataclass
import cfg_mgmt
import cfg_mgmt.model as cmm
import ci.log
import ci.util
import model
import model.btp_service_binding
import model.container_registry
ci.log.configure_defa... | 220 | 32.3 | 97 | 21 | 1,567 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_033f7e4fa2056b72_971eaabd", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text."
] | [
71,
73
] | [
null,
null
] | [
26,
21
] | [
29,
61
] | |
2024-11-19T00:33:33.761829+00:00 | 1,508,015,449,000 | faa10b811a32401fde0f1e65a8b6146b899780f9 | 4 | {
"blob_id": "faa10b811a32401fde0f1e65a8b6146b899780f9",
"branch_name": "refs/heads/master",
"committer_date": 1508015449000,
"content_id": "1a9f0c39233bfcf50233835906cbe1321f09837d",
"detected_licenses": [
"MIT"
],
"directory_id": "7cef0dd32cd540d6d11a87ce6c999ef88b9f163d",
"extension": "py",
"fi... | 3.953125 | stackv2 | # Hangman Game
# Copyright (c) 2017 Brandon Marder. All Rights Reserved.
# NOTE: THIS CONTAINS SIGNIFICANT SECURITY VULNERABILTIES IF RUNNING IN PYTHON 2.x
# Import Modules
# import sys
import os
from string import punctuation
# Checks if letter is in secret word. Adds letter to correct letter list or
# counts it as ... | 182 | 32.93 | 102 | 15 | 1,381 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_329bdfbd0915c38b_bcd794e1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](... | [
63,
122,
170
] | [
null,
null,
null
] | [
11,
19,
19
] | [
45,
23,
53
] | |
2024-11-19T00:45:03.648874+00:00 | 1,604,392,697,000 | 1fa985a47eb2b981fc5c83dfa0e8064ed3a72817 | 3 | {
"blob_id": "1fa985a47eb2b981fc5c83dfa0e8064ed3a72817",
"branch_name": "refs/heads/master",
"committer_date": 1604392697000,
"content_id": "22afd3360c2cf58b31e5b77c1b665daba994f480",
"detected_licenses": [
"MIT"
],
"directory_id": "6a5478592743c63a17baa7dad0cff997c218da74",
"extension": "py",
"fi... | 2.765625 | stackv2 | import json
from jinja2 import Environment, FileSystemLoader
def exp_description_highlight(experiments):
""" Return highlighted JSON syntax in accordance tabs with experiment instances
Args:
experiments (List): The list of Experiment instances.
Returns:
HTML: Markup component with related... | 33 | 28.36 | 83 | 12 | 195 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_4876e6efbfd12c14_35207289", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
15
] | [
null
] | [
11
] | [
42
] | |
2024-11-19T00:45:03.999832+00:00 | 1,535,048,423,000 | baec75cb4975f8ec2df1927a80ca5cd14e132cd6 | 2 | {
"blob_id": "baec75cb4975f8ec2df1927a80ca5cd14e132cd6",
"branch_name": "refs/heads/master",
"committer_date": 1535048423000,
"content_id": "a18f765942434f3e79f08208bb82fda86a754be6",
"detected_licenses": [
"MIT"
],
"directory_id": "970dac45e4f82c1e527966a47cfc96bd8cb68dad",
"extension": "py",
"fi... | 2.5 | stackv2 | import argparse
import base64
import logging
import requests
from requests.auth import HTTPBasicAuth
from flask import Flask, request
app = Flask(__name__)
server = {
'server_url': '',
'api_token': '',
'devices': {},
}
@app.route('/webhook', methods=['POST'])
def webhook():
event = request.json
... | 120 | 27.39 | 94 | 13 | 821 | python | [{"finding_id": "codeql_py/log-injection_8fb0b85a16f6417a_7dd75627", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 3 | true | [
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
49,
51,
79
] | [
null,
null,
null
] | [
25,
25,
25
] | [
62,
63,
28
] | |
2024-11-18T23:28:30.899593+00:00 | 1,564,044,718,000 | a9c0bb495ea244ba15bf98af16efa9f0ab17556b | 3 | {
"blob_id": "a9c0bb495ea244ba15bf98af16efa9f0ab17556b",
"branch_name": "refs/heads/master",
"committer_date": 1564044718000,
"content_id": "d767d12df9fc06dec25399528bd80b6ef577c7f6",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "cc2e207ad25813cee719a4c1cd8b52733ab05ccb",
"extension": "py"... | 2.640625 | stackv2 | import json
import six
from jinja2 import Template
from leapp.utils.audit import get_messages
def _flatten_dict(dict_):
new_dict = {}
if type(dict_) is not dict:
return new_dict
for k, v in six.iteritems(dict_):
if type(v) == dict:
new_dict.update(_flatten_dict(v))
e... | 72 | 28.83 | 83 | 15 | 478 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_44d1d1c96114e043_5a0b6e71", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
69
] | [
null
] | [
20
] | [
69
] | |
2024-11-18T23:40:00.690414+00:00 | 1,580,310,761,000 | fafbb2cbdb39f31ab84886c9bada2279f098f8f7 | 3 | {
"blob_id": "fafbb2cbdb39f31ab84886c9bada2279f098f8f7",
"branch_name": "refs/heads/master",
"committer_date": 1580310761000,
"content_id": "e6f374547929778afef13e9050ec0071f1146f22",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "15a9937437fff9ef921547f067647a1c638ad2ed",
"extension": "p... | 3 | stackv2 | """
Base storage class.
"""
import os
import redis
import tarfile
from collections.abc import MutableMapping
from docserver.utils import logger
from shutil import rmtree
class Storage(MutableMapping):
"""Storage base class.
This class takes care of initializing a Redis database, and providing an interface ... | 183 | 37.18 | 119 | 19 | 1,356 | python | [{"finding_id": "codeql_py/tarslip_4a55d1cbb444e5a8_5467037a", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
168
] | [
null
] | [
13
] | [
16
] | |
2024-11-18T23:40:01.889437+00:00 | 1,437,696,053,000 | 582430e6cf890792bf3cb7758f47c7c89d3b0823 | 2 | {
"blob_id": "582430e6cf890792bf3cb7758f47c7c89d3b0823",
"branch_name": "refs/heads/master",
"committer_date": 1437696053000,
"content_id": "ef0885c5a4affa0ed3a6a0b80b40b066b97d527b",
"detected_licenses": [
"MIT"
],
"directory_id": "06097f44bd7dd1411233c23977346f79a2ea9f42",
"extension": "py",
"fi... | 2.34375 | stackv2 | """
Traditional Web UI.
"""
from functools import wraps
from flask import (
Blueprint, redirect, url_for, render_template, request, session, g
)
from werkzeug.exceptions import BadRequest, Unauthorized
from componentsdb.app import set_current_user_with_token
from componentsdb.auth import user_for_google_id_token... | 136 | 28.97 | 80 | 16 | 920 | python | [{"finding_id": "codeql_py/url-redirection_b1fcb9e6a8a2def7_d1624caf", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 4 | true | [
"CWE-601",
"CWE-601",
"CWE-601",
"CWE-601"
] | [
"py/url-redirection",
"py/url-redirection",
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
72,
78,
95,
104
] | [
null,
null,
null,
null
] | [
25,
25,
21,
21
] | [
34,
34,
30,
30
] | |
2024-11-19T00:05:01.547671+00:00 | 1,427,121,075,000 | 283d7f5ae1f041f0d25952e635ee3579ff122901 | 3 | {
"blob_id": "283d7f5ae1f041f0d25952e635ee3579ff122901",
"branch_name": "refs/heads/master",
"committer_date": 1427121075000,
"content_id": "e0f3b80285ad805459e19cdfbecfb8685cd84297",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "0e707796d25270337ca40bdfe45d2dc06c017b6b",
"extension": "py"... | 2.578125 | stackv2 | #coding:UTF-8
"""
url自动化映射函数
@author:yubang
"""
"""
ClearPycFile仅仅为了清除pyc文件
Action类封装基本的渲染模板和追加内容输出,不建议直接继承,生产环境建议自定义一个类继承该类,然后继承自定义类
BeforeMiddelAction类封装前置中间件,AfterMiddelAction类封装前置中间件
UrlHander为自动化加载action类,生产环境建议不要重复创建
"""
import os,re,inspect,urllib,traceback
class ClearPycFile():
def __init__(self,debug,... | 306 | 30.46 | 111 | 23 | 2,229 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_788c4840d48a5cd8_00258a36", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
122
] | [
125
] | [
22
] | [
10
] | |
2024-11-19T01:11:24.951183+00:00 | 1,497,763,104,000 | a8b1e73217758e7492cb897c87f4c84a6d781132 | 3 | {
"blob_id": "a8b1e73217758e7492cb897c87f4c84a6d781132",
"branch_name": "refs/heads/master",
"committer_date": 1497763104000,
"content_id": "d775947ce635f3ae2da6294d73b267bca4fcfeb5",
"detected_licenses": [
"MIT"
],
"directory_id": "1612d6de699528cc7a7e4eb6e449aa26b11391de",
"extension": "py",
"fi... | 2.765625 | stackv2 | from flask import Flask, abort, request
from utilities.settings import Settings
from BayesClassifierCore import BayesClassifierCore
import json
import time
import requests
app = Flask(__name__)
@app.route('/')
def hello_world():
"""
:return: index
"""
return 'Hello World!'
@app.route('/chatter', met... | 47 | 29.04 | 107 | 18 | 343 | python | [{"finding_id": "codeql_py/reflective-xss_9a9ecc6d10d5a542_b8693fb5", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
38
] | [
null
] | [
16
] | [
36
] | |
2024-11-18T23:46:49.619607+00:00 | 1,532,025,431,000 | 3141a235ef7d79c990e937e37ec57c82fee7523b | 3 | {
"blob_id": "3141a235ef7d79c990e937e37ec57c82fee7523b",
"branch_name": "refs/heads/master",
"committer_date": 1532025431000,
"content_id": "5ba2925d0ba36581e94ba611ce17f22894429ba3",
"detected_licenses": [
"MIT"
],
"directory_id": "610e2032a5f813f66e3c9e4a3308e0137a486512",
"extension": "py",
"fi... | 3.375 | stackv2 | # solution to http://cryptopals.com/sets/2/challenges/12
# decrypts an unknown string appended to a chosen plaintext, encrypted in AES ECB mode
import base64
import Challenge09
from Crypto.Cipher import AES
from random import randint
# generates a random sequence of bytes. length is determined by length argument (in... | 168 | 43.27 | 132 | 18 | 1,860 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_6f01250d95ccb6b6_f7045c3c", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 1 | true | [
"CWE-327"
] | [
"py/weak-cryptographic-algorithm"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
24
] | [
null
] | [
9
] | [
35
] | |
2024-11-18T23:48:06.044667+00:00 | 1,623,774,112,000 | 79f15311b5e259982ffe06dd7b9e9b56798ed138 | 3 | {
"blob_id": "79f15311b5e259982ffe06dd7b9e9b56798ed138",
"branch_name": "refs/heads/master",
"committer_date": 1623774112000,
"content_id": "a7d9ebb814cb194123b8927fe6ca2c5598d22a21",
"detected_licenses": [
"Unlicense"
],
"directory_id": "d3f47bda52623a33f28b843c95c397a61b327208",
"extension": "py",... | 2.859375 | stackv2 | #! /usr/bin/env python3
import struct
import tarfile
import os.path as path
from os import urandom, remove
from Crypto.Cipher import AES
from hashlib import sha256
__version__ = '21.6.15'
DEFAULT_CHUNCK_SIZE = 256 * 1024
EXTENTION = '.pcrypt'
DEFAULT_ENCRYPTED_FILENAME = 'b1gs3cr3t' + EXTENTION
COLORS = {
'red... | 324 | 36.32 | 120 | 20 | 2,787 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_600dd049461bc4d9_a54f5083", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 2 | true | [
"CWE-327",
"CWE-022"
] | [
"py/weak-sensitive-data-hashing",
"py/tarslip"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e... | [
202,
184
] | [
null,
null
] | [
23,
32
] | [
40,
58
] | |
2024-11-19T00:29:32.805433+00:00 | 1,517,640,246,000 | 142b28dbcd5c4f33589aab30cc6a31de306f4bbc | 2 | {
"blob_id": "142b28dbcd5c4f33589aab30cc6a31de306f4bbc",
"branch_name": "refs/heads/master",
"committer_date": 1517640246000,
"content_id": "4f688d9b08deda256cb02e5affd5a635cc1fb272",
"detected_licenses": [
"MIT"
],
"directory_id": "a319229439f7d875c787f0c69cd183b449c61fd5",
"extension": "py",
"fi... | 2.484375 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
# @Time : 2017/11/23 21:54
# @Author : 周星星 Siman Chou
# @Site : https://github.com/simanchou
# @File : receiver.py
# @Description: 接收Alertmanager基于web_hook推送的告警内容,发送至微信公众号,实现微信告警。
# alertmanager中启用webhook设置如下:
# 或参考prometheus官网https://prometheus.io/doc... | 292 | 32.53 | 105 | 22 | 2,660 | python | [{"finding_id": "codeql_py/request-without-cert-validation_9773e64b567888d7_9b3600e0", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
107,
166
] | [
null,
null
] | [
9,
9
] | [
84,
106
] | |
2024-11-19T00:29:34.265697+00:00 | 1,604,914,738,000 | 62f3c42e5c96ce176bf6de30cb7c6ef93507c403 | 2 | {
"blob_id": "62f3c42e5c96ce176bf6de30cb7c6ef93507c403",
"branch_name": "refs/heads/main",
"committer_date": 1604914738000,
"content_id": "db0dd625b1a9d4b0f0da2e31cb0e8128b6a0226d",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "3babec6cbda304ddd7f8bb87b968c27de2b19d76",
"extension": "py",
... | 2.390625 | stackv2 | #!/usr/bin/env python3
import rospy
import paho.mqtt.client as mqtt
import struct
import socket
from sensor_msgs.msg import NavSatFix
import string
class GPS():
def __init__(self):
self.address = ('192.168.0.11', 4004)
self.sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
self.latitude = 0.0
self.lo... | 104 | 26.38 | 77 | 15 | 824 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f562aaf3fb9bf06e_dda6ffe8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
37,
38
] | [
null,
null
] | [
24,
25
] | [
44,
46
] | |
2024-11-18T23:23:30.984575+00:00 | 1,619,338,651,000 | 44bfc374365f1bc3aba6f529eda811d35dfc8022 | 3 | {
"blob_id": "44bfc374365f1bc3aba6f529eda811d35dfc8022",
"branch_name": "refs/heads/master",
"committer_date": 1619338651000,
"content_id": "6c4bdc49badcc32592a62bc12bfcc70d7bf7302b",
"detected_licenses": [
"MIT"
],
"directory_id": "9eaeaf3652343ac18d85f1f02cd3223d3b43e60b",
"extension": "py",
"fi... | 2.640625 | stackv2 | from flask import Flask, request, render_template, flash, redirect, url_for
from werkzeug.utils import secure_filename
from flask import Response
import os
import json
from face_util import compare_faces, face_rec, find_facial_features, find_face_locations
import re
import pdb
app = Flask(__name__)
UPLOAD_FOLDER = 'r... | 126 | 35.16 | 111 | 17 | 1,050 | python | [{"finding_id": "codeql_py/flask-debug_368339467d36afa5_a021542b", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 6 | true | [
"CWE-215",
"CWE-1333",
"CWE-601",
"CWE-601",
"CWE-601",
"CWE-601"
] | [
"py/flask-debug",
"py/polynomial-redos",
"py/url-redirection",
"py/url-redirection",
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings starting with '\\r\\n\\r\\n' and with many repetitions of '\\r\\n\\r\\na'.",
"Untrusted URL redi... | [
120,
68,
31,
38,
80,
85
] | [
null,
null,
null,
null,
null,
null
] | [
null,
85,
29,
29,
29,
29
] | [
49,
95,
40,
40,
40,
40
] | |
2024-11-19T00:44:23.846218+00:00 | 1,587,458,618,000 | 97850bce659d6cfbabcb5c8b44c93af5b5919478 | 3 | {
"blob_id": "97850bce659d6cfbabcb5c8b44c93af5b5919478",
"branch_name": "refs/heads/master",
"committer_date": 1587458618000,
"content_id": "dc3d2a4e6e98b6b45601dfb08d6c948f5aa6a5e5",
"detected_licenses": [
"MIT"
],
"directory_id": "b2f9ca3bb68cd8ee79ea63bda388477eb40f661e",
"extension": "py",
"fi... | 3.40625 | stackv2 | #!/usr/bin/env python3.6
from user import User
from credentials import Credential
# User
def create_user(firstName, lastName, userName, email, password):
""" Function create a new user
"""
new_user = User(firstName, lastName, userName, email, password)
return new_user
def save_user(user):
"""Fun... | 194 | 36.22 | 152 | 26 | 1,294 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e24cff6f961b7ed3_028926d0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
152
] | [
null
] | [
39
] | [
152
] | |
2024-11-18T23:05:25.585388+00:00 | 1,692,307,499,000 | 739f76a1550cefdcb6c6dfbbe98b6a00773fc102 | 2 | {
"blob_id": "739f76a1550cefdcb6c6dfbbe98b6a00773fc102",
"branch_name": "refs/heads/master",
"committer_date": 1692307499000,
"content_id": "c0f7e2c18117ffc0ec95a9821d472203f367bc00",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "2ae0b8d95d439ccfd55ea7933ad4a2994ad0f6c5",
"extension": "py"... | 2.46875 | stackv2 | # Copyright (C) 2018-2021 Intel Corporation
# SPDX-License-Identifier: Apache-2.0
"""
Gets info about users and groups via LDAP
"""
# pylint: disable=fixme,no-member
import sys
from enum import Enum
from pathlib import Path
from ldap3 import Server, Connection, ALL, SUBTREE
sys.path.append(str(Path(__file__).resol... | 247 | 37.27 | 100 | 22 | 2,106 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_48bf321f1cf8ab57_f0d599f3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
73
] | [
null
] | [
11
] | [
20
] | |
2024-11-18T23:05:25.700659+00:00 | 1,551,723,957,000 | ab7aaca1d2d4f5ca3b96ceaf973de732e491c3a3 | 3 | {
"blob_id": "ab7aaca1d2d4f5ca3b96ceaf973de732e491c3a3",
"branch_name": "refs/heads/master",
"committer_date": 1551723957000,
"content_id": "525a9f9580f8c9e256388a1320155702f079af81",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "60e7005913908143299a23cc10b738874451d024",
"extension": "py"... | 2.84375 | stackv2 | #!/usr/bin/env python3
import argparse
import random
import string
from app import create_app, db
from app.models import User
app = create_app()
app.app_context().push()
PASS_LENGTH = 16
def main():
parser_desc = "Server-side utility to facilitate creating admins and toggling existing users to admins."
parser_epil... | 39 | 32.38 | 141 | 16 | 304 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_60fc8ee964edbabe_173cbf71", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
35
] | [
null
] | [
9
] | [
97
] | |
2024-11-18T23:05:38.082046+00:00 | 1,494,795,800,000 | 112abf549cfe3aa86a3dadd0d6186f1dd5a5bc71 | 3 | {
"blob_id": "112abf549cfe3aa86a3dadd0d6186f1dd5a5bc71",
"branch_name": "refs/heads/master",
"committer_date": 1494795800000,
"content_id": "8d1c3d177b73a06aecee7ade60b50183b70e9353",
"detected_licenses": [
"MIT"
],
"directory_id": "b43472dac8c4119a909645346ff38104c284cc94",
"extension": "py",
"fi... | 2.734375 | stackv2 | """WebAUTH Class
"""
from http.client import CannotSendRequest
from http.client import HTTPSConnection
from http.client import HTTPConnection
import json
from socket import gaierror
import ssl
from time import sleep
from urllib.parse import urlparse
class WebAuth(object):
"""Represents WebAuth Process
"""
... | 101 | 29.45 | 72 | 15 | 620 | python | [{"finding_id": "codeql_py/insecure-protocol_58c9d1e97d8519db_7bb76744", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 specified by [call to ssl.SSLContext](1).", "remediation": "", "lo... | 1 | true | [
"CWE-327"
] | [
"py/insecure-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Insecure SSL/TLS protocol version TLSv1 specified by [call to ssl.SSLContext](1)."
] | [
82
] | [
null
] | [
23
] | [
66
] | |
2024-11-18T23:05:42.956361+00:00 | 1,571,077,399,000 | b3623a57ab63fabe961df80630faf87784abe322 | 3 | {
"blob_id": "b3623a57ab63fabe961df80630faf87784abe322",
"branch_name": "refs/heads/master",
"committer_date": 1571077399000,
"content_id": "91cf14e9881ff95274fe922c6dc00c0a14283a88",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "14f314d2bc2c880e3e65a504f3cd5278f9d8c8f2",
"extension": "p... | 2.578125 | stackv2 | __author__ = 'Gennady Kovalev <gik@bigur.ru>'
__copyright__ = '(c) 2016-2019 Business group for development management'
__licence__ = 'For license information see LICENSE'
from dataclasses import InitVar, dataclass, field
from hashlib import sha512
from typing import Optional, Union
from uuid import uuid4
@dataclass... | 60 | 27.97 | 73 | 17 | 434 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_ff58febadbacb193_912e2e8c", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally e... | [
44
] | [
null
] | [
23
] | [
56
] | |
2024-11-18T23:05:43.925489+00:00 | 1,554,787,802,000 | cd505104d651b3ff2ca7dc71446070ac802cb498 | 2 | {
"blob_id": "cd505104d651b3ff2ca7dc71446070ac802cb498",
"branch_name": "refs/heads/master",
"committer_date": 1554787802000,
"content_id": "44677f6918fb7887e17159c1d75d8023b396d8bf",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "cb557e374349f48b47b2b211da0787d5c87a96b6",
"extension": "py"... | 2.4375 | stackv2 | #!flask/bin/python
import logging
import os.path
import os
import pandas as pd
import pyarrow
import xxhash
from flask import Flask, jsonify, render_template, request, url_for, send_from_directory
from aws import exists_on_s3, query_x_range, upload
from squiggle import transform
from helpers import downsample
LOCAL ... | 102 | 31.72 | 130 | 21 | 799 | python | [{"finding_id": "codeql_py/flask-debug_0d1b6d4eb089bb57_04a5c324", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 5 | true | [
"CWE-215",
"CWE-022",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/flask-debug",
"py/path-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"HIGH",
"HIGH",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).\nThis log entry depends on ... | [
102,
67,
42,
83,
80
] | [
null,
null,
null,
null,
null
] | [
5,
33,
19,
23,
23
] | [
24,
71,
56,
64,
90
] | |
2024-11-18T23:11:07.022597+00:00 | 1,635,597,341,000 | 11590c6d4405f28fca9cc5cd4b52bf07032e60c5 | 2 | {
"blob_id": "11590c6d4405f28fca9cc5cd4b52bf07032e60c5",
"branch_name": "refs/heads/main",
"committer_date": 1635597341000,
"content_id": "cb8e898b85e42c459a551ae2b00e4797ce08b0e9",
"detected_licenses": [
"MIT"
],
"directory_id": "4468fea1d7c0cecff6b4339f4c75285e4cf58340",
"extension": "py",
"file... | 2.5 | stackv2 | import os
import base64, pickle
from flask import Flask, request
app = Flask(__name__)
@app.route("/")
def index():
return 'Hello, World!'
# RCE
@app.route("/cmd", methods=["GET"])
def rce():
if request.args.get('c'):
return os.popen(request.args.get('c')).read(), 200
return ':P', 400
# Unsa... | 27 | 17.63 | 58 | 16 | 139 | python | [{"finding_id": "codeql_py/command-line-injection_7d28ef5f14aa58ba_5c3416e7", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {... | 2 | true | [
"CWE-078",
"CWE-502"
] | [
"py/command-line-injection",
"py/unsafe-deserialization"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This command line depends on a [user-provided value](1).",
"Unsafe deserialization depends on a [user-provided value](1)."
] | [
17,
26
] | [
null,
null
] | [
25,
18
] | [
46,
22
] | |
2024-11-19T00:11:33.858315+00:00 | 1,629,879,032,000 | 085b57200cbf37bdf11db72681646fda18248083 | 3 | {
"blob_id": "085b57200cbf37bdf11db72681646fda18248083",
"branch_name": "refs/heads/main",
"committer_date": 1629879032000,
"content_id": "5c97dae0eac19ed5525d6c7b22aa449ae75eb66a",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "fcd07b5e8df40c002f7cf450d6ad844f5035c0da",
"extension": "py",
... | 2.65625 | stackv2 | import json
import requests
from time import time
from tqdm import tqdm
import pickle
import pandas as pd
def getUserNames():
url = 'https://raw.githubusercontent.com/KiranGershenfeld/VisualizingTwitchCommunities/CloudCompute/DataCollection/ChannelList.txt'
data = requests.get(url).text.split('\n')[:-1]
... | 166 | 26.98 | 135 | 17 | 1,052 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a811f91fe1c24b2f_42f93243", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text."
] | [
32
] | [
null
] | [
11
] | [
15
] | |
2024-11-19T00:11:37.047523+00:00 | 1,629,835,727,000 | 9cff2dbbeeab43c0f060f0875a34e59ab0ad357a | 3 | {
"blob_id": "9cff2dbbeeab43c0f060f0875a34e59ab0ad357a",
"branch_name": "refs/heads/master",
"committer_date": 1629835727000,
"content_id": "44025814436e285a33322153377dbb648c02b4a7",
"detected_licenses": [
"MIT"
],
"directory_id": "a542565014eb3a148ed87a537e48afea0d545f47",
"extension": "py",
"fi... | 2.953125 | stackv2 | """
--------------------------------------------------------------------------------
Title: Creation of binary labs analysis table for IBD cohort for flare project
Author: Ryan Gan
Date Created: 2020-01-30
Purpose: The propose of this script is to join the visits, flares, categorical
labs, demographics, and immunosupp... | 177 | 31.41 | 80 | 21 | 1,353 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_0b30b4f60e472038_3153e267", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
79
] | [
null
] | [
17
] | [
35
] | |
2024-11-19T00:11:41.264567+00:00 | 1,611,325,015,000 | 3ad788d4be20948893190bc14c31a7a774170cc2 | 2 | {
"blob_id": "3ad788d4be20948893190bc14c31a7a774170cc2",
"branch_name": "refs/heads/main",
"committer_date": 1611325015000,
"content_id": "0f2a3ae690ee895c7785ee54c3823e0d3bb9999b",
"detected_licenses": [
"MIT"
],
"directory_id": "47826ac8d3b194e75a62b0a2e2521ddb7deb702e",
"extension": "py",
"file... | 2.375 | stackv2 | from datetime import datetime
import json
import requests
from ec2_metadata import ec2_metadata
import boto3
import urllib3
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)
JUPYTER_PORT = '8443'
IDLE_TIME = 2400
def get_uptime():
with open('/proc/uptime', 'r') as f:
uptime_seconds = float(f.r... | 57 | 20.33 | 89 | 17 | 317 | python | [{"finding_id": "codeql_py/request-without-cert-validation_cc8240c30545d1f5_ea038c1e", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
22
] | [
null
] | [
14
] | [
90
] | |
2024-11-19T00:36:59.138712+00:00 | 1,618,594,703,000 | a9c083f78af2f03baa974d8aa22e1042427a9af3 | 3 | {
"blob_id": "a9c083f78af2f03baa974d8aa22e1042427a9af3",
"branch_name": "refs/heads/main",
"committer_date": 1618594703000,
"content_id": "38e727da3805ed3d8813e5215cae48a6f123d867",
"detected_licenses": [
"MIT"
],
"directory_id": "3a877f1c2cdb4d499724bdc31de4e4b4b6ffe4c0",
"extension": "py",
"file... | 2.75 | stackv2 | import markdown
import subprocess
import os
from modules import mylogger as ml
import jinja2
from pathlib import Path
class ReportMaker():
def __init__(self,base_path="results/",file="report.html"):
self.base_path = base_path
self.file = file
self.filename = os.path.join(self.base_path,self... | 39 | 27.08 | 70 | 13 | 240 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_3ff9db2018e61e0f_42407a3f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
26
] | [
null
] | [
20
] | [
49
] | |
2024-11-19T01:02:11.114260+00:00 | 1,525,201,523,000 | eab0c829e3a78d999082b0fdc8dba005ad263631 | 3 | {
"blob_id": "eab0c829e3a78d999082b0fdc8dba005ad263631",
"branch_name": "refs/heads/master",
"committer_date": 1525201523000,
"content_id": "6995ac2a57ed7e86204cdd4b99c91f08f26315b2",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "0c6c4c2efb279293e1610ab3f44ef2489ed4c2a7",
"extension": "p... | 2.671875 | stackv2 | import string
import datetime
import pandas as pd
import numpy as np
import os
import re
def path_generator(year, month, place, amedas_root):
AtoZ = string.ascii_uppercase[0:27]
AtoZ = str(AtoZ)
zeroto_z = str(0) + str(123456789) + AtoZ
fmt = "{year}_{1or2}/AM10{year_2:02d}{month_2:02d}/A{year_1}{mont... | 99 | 37.61 | 134 | 19 | 1,141 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8c169efe23b026a4_a94cac65", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
91
] | [
null
] | [
23
] | [
28
] | |
2024-11-19T01:02:28.314075+00:00 | 1,548,149,141,000 | 486eba32ef486258d61a16c24d2cc7cf0cdb0fbf | 4 | {
"blob_id": "486eba32ef486258d61a16c24d2cc7cf0cdb0fbf",
"branch_name": "refs/heads/master",
"committer_date": 1548149141000,
"content_id": "4fea16ae93f4da93ded5c97c4d017c437dc34cb1",
"detected_licenses": [
"MIT"
],
"directory_id": "be021a43829d0748fd17fd06a6555d94e0dc82c5",
"extension": "py",
"fi... | 3.578125 | stackv2 | class BankAccount:
__password = "12345"
_balance = 5000
name = "Egor"
number = 123
def printBalance(self, password, balance):
if (password == self.__password):
self._balance = balance
print("Новый баланс счёта:", self._balance)
else:
print("Неверн... | 36 | 23.11 | 55 | 13 | 245 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3bacff00fd93df79_d7a108b2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
24
] | [
null
] | [
36
] | [
51
] | |
2024-11-19T01:02:29.379941+00:00 | 1,438,562,709,000 | a05f05b1ff6f186a891bf9d7fb2743b38358ff3b | 2 | {
"blob_id": "a05f05b1ff6f186a891bf9d7fb2743b38358ff3b",
"branch_name": "refs/heads/master",
"committer_date": 1438562709000,
"content_id": "0258275cdfdb77841df04769c132b4dafee106e8",
"detected_licenses": [
"MIT"
],
"directory_id": "0017dce9d98f8836912ebed5bd8301faa8ee282d",
"extension": "py",
"fi... | 2.421875 | stackv2 | import argparse
import select
import socket
import ssl
import connection
import signer
PROTOCOL = 'h2-14'
# The method that kicks everything off
def start_up(args):
# Spin up the signer
ca = signer.CertificateAuthority()
context = ssl.SSLContext(ssl.PROTOCOL_SSLv23)
context.load_cert_chain(ca[b'local... | 52 | 25.79 | 67 | 12 | 333 | python | [{"finding_id": "codeql_py/insecure-protocol_debf82fed0aa46fe_aa127e51", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol... | 1 | true | [
"CWE-327"
] | [
"py/insecure-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.SSLContext](1)."
] | [
27
] | [
null
] | [
12
] | [
19
] | |
2024-11-18T23:48:37.838836+00:00 | 1,627,122,811,000 | 66c98dcaefd14e5ed1818cb1e7696277921aedd0 | 3 | {
"blob_id": "66c98dcaefd14e5ed1818cb1e7696277921aedd0",
"branch_name": "refs/heads/main",
"committer_date": 1627122811000,
"content_id": "5ddb47f16077e974925a3cc3e79cace2e1ce70f0",
"detected_licenses": [
"MIT"
],
"directory_id": "971d0177cf0dbe0596d340dac9967654fd2dfb1b",
"extension": "py",
"file... | 2.96875 | stackv2 | import base64
from configparser import ConfigParser
import bcrypt
import Cred
import os
from cryptography.fernet import Fernet
from cryptography.hazmat.primitives import hashes
from cryptography.hazmat.primitives.kdf.pbkdf2 import PBKDF2HMAC
# Global Variables
filepath = f'{os.getcwd()}/CredManager'
masterSection = '... | 135 | 31.1 | 105 | 16 | 989 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c01ff536614950c2_d5e6d9b0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
131
] | [
null
] | [
15
] | [
42
] | |
2024-11-18T23:48:42.653980+00:00 | 1,541,587,891,000 | 56a97b199a10ef13cba0296b278e65ef78670cd8 | 3 | {
"blob_id": "56a97b199a10ef13cba0296b278e65ef78670cd8",
"branch_name": "refs/heads/master",
"committer_date": 1541587891000,
"content_id": "e8e0c956e30f5a9d74eed8a41af9325149d613d2",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "29e9de2874c56bb4f3ed4045b6d7f13e36089cf1",
"extension": "py"... | 2.5625 | stackv2 | import hashlib
from flask import request, jsonify, session
from flask_restful import Resource, marshal_with, fields
from App.models import User, db
def md5(pas):
md5 = hashlib.md5()
md5.update(pas.encode('utf-8'))
return md5.hexdigest()
user_field = {
'id':fields.Integer,
'name':fields.String,... | 227 | 22.14 | 62 | 15 | 1,294 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_210b704e87851a6f_8b8d6dce", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi... | [
12
] | [
null
] | [
16
] | [
35
] | |
2024-11-18T23:48:43.816802+00:00 | 1,685,819,887,000 | df943c49bc5ec58fcb13ef8449c04a53935936b5 | 2 | {
"blob_id": "df943c49bc5ec58fcb13ef8449c04a53935936b5",
"branch_name": "refs/heads/master",
"committer_date": 1685819887000,
"content_id": "b8a0fcd743b62b1ea18ff8c6556fefb02f1c6153",
"detected_licenses": [
"MIT"
],
"directory_id": "17d1dd534dc2703d4847e50410c1fc86dd9d8040",
"extension": "py",
"fi... | 2.5 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
import re
import sys
from rachetwrench.c.keywords import keywords_list
whitespace = re.compile(r"[\r\n \t\v\f]",
re.DOTALL | re.MULTILINE)
identifier = re.compile(r"[_a-zA-Z][_a-zA-Z0-9]*")
decimal_constant = re.compile(r'[1-9][0-9]*')
hexadecima... | 397 | 23.34 | 99 | 18 | 2,354 | python | [{"finding_id": "codeql_py/redos_a3cc5b8fb4a8de92_fa022001", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with ''' and containing many repetition... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with ''' and containing many repetitions of '\\\\&'."
] | [
31
] | [
null
] | [
48
] | [
62
] | |
2024-11-18T23:50:20.311972+00:00 | 1,474,317,437,000 | a668fb9e0e22150367efe694a095d2654101bae5 | 3 | {
"blob_id": "a668fb9e0e22150367efe694a095d2654101bae5",
"branch_name": "refs/heads/master",
"committer_date": 1474317437000,
"content_id": "a712dcd628235e64e2bf3a378f7ccac5bdf06079",
"detected_licenses": [
"MIT"
],
"directory_id": "5caa8cbe873c2ea43c206cdce33f4e7dd5801a00",
"extension": "py",
"fi... | 2.90625 | stackv2 | __author__ = 'Xplore'
# Cyberaom brute force Script
import urllib
import time
import datetime
import urllib2
import sys
import xml.dom.minidom as XML
trst = {}
userid=[]
start=int(raw_input("Enter the starting Roll:"))
end=int(raw_input("Enter the last Roll:"))
for s in range(start,end+1):
userid.append(s)
filen... | 92 | 24.02 | 94 | 18 | 567 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_d20a7d25c532754b_06f13d5b", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
76
] | [
null
] | [
30
] | [
52
] | |
2024-11-19T01:51:52.326124+00:00 | 1,669,749,418,000 | c40b6da317d4297a1a4be50228a0c4cf4632daba | 4 | {
"blob_id": "c40b6da317d4297a1a4be50228a0c4cf4632daba",
"branch_name": "refs/heads/master",
"committer_date": 1669749418000,
"content_id": "4e0576aec823bf00a9214faad52a103b8864d45d",
"detected_licenses": [],
"directory_id": "2296bb6d628d08f59516de14487b8f87fec09bfb",
"extension": "py",
"filename": "00_... | 3.828125 | stackv2 | def make_call(phone_num:str):
"""
function to call a phone number
Inputs:
phone_num (str): a phone number to call
Outputs:
No output (prints to the screen instead)
"""
print("Making phone call to {}...number dialed.".format(phone_num))
print("Survey issued.\nCall Complete.... | 23 | 20.61 | 71 | 10 | 158 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_32ab4bcf9309daea_f4fcd7e6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
12
] | [
null
] | [
11
] | [
71
] | |
2024-11-19T01:52:01.625222+00:00 | 1,671,135,048,000 | 6d042e62bd4a5fdcc496d905a2312c0a531a5d4f | 3 | {
"blob_id": "6d042e62bd4a5fdcc496d905a2312c0a531a5d4f",
"branch_name": "refs/heads/master",
"committer_date": 1671135048000,
"content_id": "c3e0906ea698d1a52b6afafd554bf13dafdc5244",
"detected_licenses": [
"MIT"
],
"directory_id": "8d6657c4982fcb6a1d055134c091f2857bfbec03",
"extension": "py",
"fi... | 2.71875 | stackv2 | from flask import Flask, redirect, url_for, request
app = Flask(__name__)
user_list = [ 'roozbeh' , 'alborz']
@app.route('/success/<name>')
def success(name):
return 'welcome %s' % name
@app.route('/failure/<cause>')
def failure(cause):
return "you are not logged in because " + cause
@app.route('/login',meth... | 29 | 27.79 | 75 | 14 | 215 | python | [{"finding_id": "codeql_py/flask-debug_53e9ad19d41aa2fc_f4b77fc4", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-079",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
29,
8,
12
] | [
null,
null,
null
] | [
5,
11,
12
] | [
31,
30,
52
] | |
2024-11-19T01:52:03.833822+00:00 | 1,588,959,417,000 | f81d89fd60bd118700f95bca64be3af1fd7cc39e | 4 | {
"blob_id": "f81d89fd60bd118700f95bca64be3af1fd7cc39e",
"branch_name": "refs/heads/master",
"committer_date": 1588959417000,
"content_id": "789a696e0392ca54164aa588930e5c741c44f133",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "f985519c9b45945961860792ae7df2923054ecc6",
"extension": "py"... | 3.796875 | stackv2 | import json
# TODO: allow the functions to pass the parsed information to the database
# helper function that takes in a list of dicts representing each individual employee, and returns a list of the employees name and their emails
def parse_data(data: []):
# dictionary that maps each employee ID: int to a tuple ... | 24 | 37.79 | 144 | 13 | 205 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e1ae3b5db861b5ee_f634232e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
24
] | [
null
] | [
11
] | [
81
] | |
2024-11-19T00:55:26.556597+00:00 | 1,558,323,539,000 | df0c455b0e426639f6db879e459ba3dec413efd2 | 2 | {
"blob_id": "df0c455b0e426639f6db879e459ba3dec413efd2",
"branch_name": "refs/heads/master",
"committer_date": 1558323539000,
"content_id": "a2f7fb98854fafc6b783bbffb4ae2de9e9d8d503",
"detected_licenses": [
"MIT"
],
"directory_id": "0f09b13331583d884b0408fdaacbc787f41bf1c4",
"extension": "py",
"fi... | 2.453125 | stackv2 | # -*- coding: utf-8 -*-
# !/usr/bin/env python
"""
-------------------------------------------------
File Name: GetConfig.py
Description : fetch config from config.ini
Author : JHao
date: 2016/12/3
-------------------------------------------------
Change Activity:
2... | 105 | 25.28 | 81 | 15 | 653 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_62f5c2180e6b8017_2b1dd2f6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
105
] | [
null
] | [
11
] | [
25
] | |
2024-11-18T23:43:09.331950+00:00 | 1,635,029,672,000 | b74470995731180f36b1cf868fec0b1d56fcde95 | 2 | {
"blob_id": "b74470995731180f36b1cf868fec0b1d56fcde95",
"branch_name": "refs/heads/main",
"committer_date": 1635029672000,
"content_id": "40d5eb91771ca831f53b7e9a0ae61c2f915b2f4a",
"detected_licenses": [
"MIT"
],
"directory_id": "4bf2f5b6b6b2f685fdeb9bcabcd7befd7d4b2db1",
"extension": "py",
"file... | 2.40625 | stackv2 | import base64
import hashlib
from jinja2 import Environment, FileSystemLoader
import json
import os
class DockerLabelHandler:
def __init__(self, label):
self.__label_base = label
def create(self, key):
if isinstance(key, str):
return "{}.{}".format(self.__label_base, key)
... | 146 | 31.86 | 93 | 25 | 957 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_ba0db52e9e5a6e42_4a307e63", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
54
] | [
null
] | [
15
] | [
46
] | |
2024-11-18T23:43:34.814990+00:00 | 1,585,454,411,000 | 1ce62b897c2b0922473a92dea0a00c46bbae555d | 2 | {
"blob_id": "1ce62b897c2b0922473a92dea0a00c46bbae555d",
"branch_name": "refs/heads/master",
"committer_date": 1585454411000,
"content_id": "fafe2f44fa09d0be3e0f2b218c56aeb8780ed9fe",
"detected_licenses": [
"MIT"
],
"directory_id": "2979e91e95d912683607f9c82a367b593a603b68",
"extension": "py",
"fi... | 2.328125 | stackv2 | import pickle
from sqlalchemy import MetaData, Table
from sqlalchemy.dialects.mysql import insert
from selenium import webdriver
from weibo.Connect_mysql import Connect
import re
import time
import random
import pymysql
import datetime
def getinfo(conn, driver, uid, table):
time.sleep(2)
driver.get('https://w... | 205 | 33.74 | 127 | 16 | 2,084 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4f6383ed60143878_caffee58", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
79,
80
] | [
null,
null
] | [
55,
27
] | [
67,
49
] | |
2024-11-19T01:18:00.625759+00:00 | 1,481,609,707,000 | 0fb8db405a3e57b0accaa8622834447dff45967a | 3 | {
"blob_id": "0fb8db405a3e57b0accaa8622834447dff45967a",
"branch_name": "refs/heads/master",
"committer_date": 1481609707000,
"content_id": "2c8eafd4eff8ac6bcb1ffd4c3b513f98add2704d",
"detected_licenses": [
"MIT"
],
"directory_id": "e158deca51eb67f601f806867d703e4fb68dbdd3",
"extension": "py",
"fi... | 2.78125 | stackv2 | from tornado.web import RequestHandler, Application, url
class MainHandler(RequestHandler):
def get(self):
self.write('<a href="%s">link to story 1</a>' %
self.reverse_url("story", "1"))
class StoryHandler(RequestHandler):
def initialize(self, db):
self.db = db
def get(... | 18 | 27.5 | 69 | 13 | 129 | python | [{"finding_id": "codeql_py/reflective-xss_a073a5c5d4976a20_fc1f3f6f", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
13
] | [
null
] | [
20
] | [
49
] | |
2024-11-19T01:18:01.208962+00:00 | 1,540,483,367,000 | eac7c381f674fdef1058c6271f3f331aa02b09fb | 2 | {
"blob_id": "eac7c381f674fdef1058c6271f3f331aa02b09fb",
"branch_name": "refs/heads/master",
"committer_date": 1540483367000,
"content_id": "5c2507f46847f43bc9fd82f161c7dd962a279036",
"detected_licenses": [
"MIT"
],
"directory_id": "2f353c2e384cf40a159f0bacc7fe09dca2d07494",
"extension": "py",
"fi... | 2.5 | stackv2 | import os
import sys
import pickle
import tarfile
import h5py
import urllib.request
import numpy as np
DATA_URL = 'http://www.cs.toronto.edu/~kriz/cifar-10-python.tar.gz'
def maybe_download_and_extract(dest_directory):
if not os.path.exists(dest_directory):
os.makedirs(dest_directory)
filename = DAT... | 80 | 38.14 | 79 | 18 | 980 | python | [{"finding_id": "codeql_py/tarslip_589234e2fb93d0cc_98323e1f", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
28
] | [
null
] | [
9
] | [
39
] | |
2024-11-19T00:15:31.545470+00:00 | 1,505,465,579,000 | feec1e8c137c85156d11f60354f98888697bca2e | 2 | {
"blob_id": "feec1e8c137c85156d11f60354f98888697bca2e",
"branch_name": "refs/heads/master",
"committer_date": 1505465579000,
"content_id": "35b800eff95a5cf94ca0f7e6cced835e2368da81",
"detected_licenses": [
"MIT"
],
"directory_id": "c001af97a6e93398a6cf451839407e4869d59097",
"extension": "py",
"fi... | 2.4375 | stackv2 | # MIT License
#
# Copyright (c) 2017 Felix Simkovic
#
# Permission is hereby granted, free of charge, to any person obtaining a copy
# of this software and associated documentation files (the "Software"), to deal
# in the Software without restriction, including without limitation the rights
# to use, copy, modify, merg... | 168 | 31.94 | 102 | 17 | 1,307 | python | [{"finding_id": "codeql_py/overly-permissive-file_d33703a7e84257a1_d433f9c1", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ... | 2 | true | [
"CWE-732",
"CWE-732"
] | [
"py/overly-permissive-file",
"py/overly-permissive-file"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world writable.",
"Overly permissive mask in chmod sets file to world writable."
] | [
80,
118
] | [
null,
null
] | [
5,
5
] | [
28,
28
] | |
2024-11-19T00:15:31.649078+00:00 | 1,560,344,304,000 | f1dcc6702cf7ef87186eb9d35a2c6649e0e19e7b | 3 | {
"blob_id": "f1dcc6702cf7ef87186eb9d35a2c6649e0e19e7b",
"branch_name": "refs/heads/master",
"committer_date": 1560344304000,
"content_id": "a60a560c347294d2907bfd6e5de815285ad477a6",
"detected_licenses": [
"MIT"
],
"directory_id": "2983cf3018bbb45725662898040a3db4046334c8",
"extension": "py",
"fi... | 2.890625 | stackv2 | from flask import Flask, render_template, request, jsonify
import requests
app = Flask(__name__)
@app.route('/', methods=['GET', 'POST'])
def index():
errors = []
results = {}
if request.method == "POST":
# get url that the user has entered
try:
age = int(request.form['age'])
... | 50 | 28.3 | 83 | 15 | 322 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bc4cbc313bb0434b_ce6c8ca0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 2 | true | [
"CWE-312",
"CWE-215"
] | [
"py/clear-text-logging-sensitive-data",
"py/flask-debug"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger."
] | [
17,
50
] | [
null,
null
] | [
19,
5
] | [
25,
51
] | |
2024-11-19T00:15:31.694421+00:00 | 1,576,151,923,000 | e9900a1d659ba59236250af394bdb14a55118ebd | 2 | {
"blob_id": "e9900a1d659ba59236250af394bdb14a55118ebd",
"branch_name": "refs/heads/master",
"committer_date": 1576151923000,
"content_id": "451e0cd201e0caf7ba8947900e43eece248b0b48",
"detected_licenses": [
"MIT"
],
"directory_id": "bc246f813e12a50799300b4be4519b77a94790bb",
"extension": "py",
"fi... | 2.390625 | stackv2 | # -*- coding: utf-8 -*-
"""Console script for slimstaty."""
import sys
import click
import os
from jinja2 import Environment, PackageLoader, Template
from .slimstaty import StateMachine, render
from . import util
@click.command()
@click.option('--statemachine', help='State Machine Definition (yaml).',
... | 93 | 35.46 | 95 | 15 | 745 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_11a099ec17aaae2f_d64ef197", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
28
] | [
31
] | [
11
] | [
40
] | |
2024-11-19T00:25:38.034340+00:00 | 1,673,955,492,000 | 317ff94d05527b326eca0fd1a74af74cdaa8185d | 2 | {
"blob_id": "317ff94d05527b326eca0fd1a74af74cdaa8185d",
"branch_name": "refs/heads/master",
"committer_date": 1673955492000,
"content_id": "de707cfa81b987727d0f89e53d56e28243e7d93f",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "36f14818a08dbf4d62c8b67dd640857f599b8a96",
"extension": "p... | 2.359375 | stackv2 | ## Example Code for Auth/token
import requests
import sys
# disable warnings from SSL/TLS certificates
requests.packages.urllib3.disable_warnings()
sdwan_url = 'https://10.10.20.90/j_security_check'
sdwan_credentials = {'j_username':'admin', 'j_password':'C1sco12345'}
session = requests.session()
response = session... | 38 | 23.37 | 76 | 11 | 251 | python | [{"finding_id": "codeql_py/request-without-cert-validation_e64c8e1aea1e2171_46ef49f5", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
13
] | [
null
] | [
12
] | [
77
] | |
2024-11-19T00:25:38.556028+00:00 | 1,420,012,021,000 | a92f96a4a0204c337c2e24f7c6c9d9fe49eb8ce7 | 3 | {
"blob_id": "a92f96a4a0204c337c2e24f7c6c9d9fe49eb8ce7",
"branch_name": "refs/heads/master",
"committer_date": 1420012021000,
"content_id": "5e82e47519cd47811d5bbbd5b78b21cbce9ec15c",
"detected_licenses": [
"MIT"
],
"directory_id": "2c7fab0e34f1e63620d6212ee448809cdfcdc354",
"extension": "py",
"fi... | 2.65625 | stackv2 | # This is a client to readtags data from ID3 tags and POST the data to the mushme database
# @Author rootavish, copyright the DBMS team, 2014
import os
import sys
#To create a json to throw at the server
import json
#To encode the image into the json
import base64
#For the network capabilities
import urllib2
import ... | 105 | 28.93 | 124 | 21 | 717 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_a2b3bd720634f4b3_3b278864", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
88
] | [
null
] | [
41
] | [
99
] | |
2024-11-19T01:02:36.983661+00:00 | 1,616,391,536,000 | f4a7e7df9ddfef6f59fd6770450e209784e44573 | 2 | {
"blob_id": "f4a7e7df9ddfef6f59fd6770450e209784e44573",
"branch_name": "refs/heads/master",
"committer_date": 1616391536000,
"content_id": "1362a8cc897cb6611c3984e670253a3439aa69d0",
"detected_licenses": [
"MIT"
],
"directory_id": "5323fe1598842754cdef00735516f84aad1f6669",
"extension": "py",
"fi... | 2.359375 | stackv2 | #!/usr/bin/env python
# -*- conding: utf-8 -*-
from os import path
from IPython.display import HTML, display
from jinja2 import Environment, PackageLoader
class Sparkline(object):
def __init__(self):
self.env = Environment(loader=PackageLoader('ipython_sparkline', 'template', encoding='utf8'))
def s... | 17 | 28.24 | 102 | 16 | 115 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_3ac0cdd7a045074b_e277ecc1", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
11
] | [
null
] | [
20
] | [
103
] | |
2024-11-19T01:02:45.000608+00:00 | 1,420,798,180,000 | b38a17c6da9af540eff08b235154cb84426b312f | 3 | {
"blob_id": "b38a17c6da9af540eff08b235154cb84426b312f",
"branch_name": "refs/heads/master",
"committer_date": 1420798180000,
"content_id": "455f4640837ff7dda4a3b7a9f637732a53997181",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "299aaafe6289e0fd89948c700a72cb4a547dfb6b",
"extension": "p... | 2.921875 | stackv2 | import re
import six
from .compat \
import \
izip_longest
from .errors \
import \
InvalidVersion
from .version \
import \
Version
_EPOCH_RE = re.compile("\d")
_UPSTREAM_VERSION_RE = re.compile("\d[a-zA-Z0-9.+-:~]*")
_DEBIAN_REVISION_RE = re.compile("[a-zA-Z0-9+.~]+")
_DIGITS_NO... | 177 | 28.06 | 98 | 16 | 1,170 | python | [{"finding_id": "codeql_py/overly-large-range_ccda013b7d663bff_59dfa857", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with 0-9 in the same character class, and is equivalent to \\[+... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with 0-9 in the same character class, and is equivalent to \\[+,\\-.\\/0-9:\\]."
] | [
17
] | [
null
] | [
49
] | [
52
] | |
2024-11-19T01:30:53.000250+00:00 | 1,635,663,729,000 | 87721c4dace3eb6e776614ee35fa4a73fcb75c0a | 3 | {
"blob_id": "87721c4dace3eb6e776614ee35fa4a73fcb75c0a",
"branch_name": "refs/heads/master",
"committer_date": 1635663729000,
"content_id": "a8fdecf347a6fd65908fe2797c258518f0e6588f",
"detected_licenses": [
"MIT"
],
"directory_id": "b15b088a185d23abd2754d5466c03c271cc64bf1",
"extension": "py",
"fi... | 2.515625 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
import re
import sys
import hashlib
import collections
import multiprocessing
'''
This script tries to fvck these various esoteric hard-to-process
user database dump or leak files.
Format: username <TAB> email <TAB> password <TAB> md5
'''
md5hash = lambda s: hashlib.md5... | 119 | 28 | 80 | 20 | 859 | python | [{"finding_id": "codeql_py/overly-large-range_18234e19d923702d_3e94675b", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[\\n\\u000b\\u000c\\r\\u000e\\u000f\\u0010\\u0011\\u0... | 3 | true | [
"CWE-020",
"CWE-312",
"CWE-327"
] | [
"py/overly-large-range",
"py/clear-text-logging-sensitive-data",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[\\n\\u000b\\u000c\\r\\u000e\\u000f\\u0010\\u0011\\u0012\\u0....",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as cle... | [
21,
119,
17
] | [
null,
null,
null
] | [
27,
19,
33
] | [
30,
25,
50
] | |
2024-11-19T01:55:00.147433+00:00 | 1,507,728,636,000 | b264a70d2b8d1dde62220a8dfafdb59fca58db50 | 3 | {
"blob_id": "b264a70d2b8d1dde62220a8dfafdb59fca58db50",
"branch_name": "refs/heads/master",
"committer_date": 1507728636000,
"content_id": "ef8bdf93038684796d96bf0bfa78b3089a532535",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "325054f6adacc39441d58ee2c203b07c44df7353",
"extension": "py"... | 2.53125 | stackv2 | #! /usr/local/bin/python3.5
import cgi, cgitb, re, sys
cgitb.enable()
print ('Content-type: text/html \n')
print ('<html>')
print ('<head>')
print ('<title>Web Client Serer Example - Query Responder </title>')
print ('</head>')
print ('<body>')
print ("<H1>Web Technologies ICT2 Preferences Query Results </H1>")
regf... | 82 | 26.11 | 164 | 14 | 531 | python | [{"finding_id": "codeql_py/regex-injection_22242e0872aaf44a_2500e700", "tool_name": "codeql", "rule_id": "py/regex-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This regular expression depends on a [user-provided value](1) and is executed by [re.search](2).", "remed... | 1 | true | [
"CWE-730"
] | [
"py/regex-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression depends on a [user-provided value](1) and is executed by [re.search](2)."
] | [
38
] | [
null
] | [
26
] | [
36
] | |
2024-11-18T23:54:12.868862+00:00 | 1,613,080,028,000 | d45e3ebbe82dcdcc69296355e0fb6032d8397612 | 3 | {
"blob_id": "d45e3ebbe82dcdcc69296355e0fb6032d8397612",
"branch_name": "refs/heads/main",
"committer_date": 1613080028000,
"content_id": "f14094bb443ae6a97cd974d78343dc6107832388",
"detected_licenses": [
"MIT"
],
"directory_id": "fd5d7b45cd1b1ab603c39ff1449776721eaa9b0f",
"extension": "py",
"file... | 2.921875 | stackv2 | """
The main module for client's application. Includes parser for command line
arguments and the main loop. The main loop works the following way:
Launches the app. If there's no nickname provided, prompts the login dialog.
Otherwise generates the public key (in case it's the first launch), opens a client's
socket and ... | 151 | 27.85 | 84 | 15 | 991 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c7e4738b0ed37ce1_cca2d386", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
96
] | [
99
] | [
9
] | [
34
] | |
2024-11-19T02:00:49.313703+00:00 | 1,608,052,939,000 | 4d6ff1f7b1009c2e76873d4ee6fd840ba9cf95f5 | 3 | {
"blob_id": "4d6ff1f7b1009c2e76873d4ee6fd840ba9cf95f5",
"branch_name": "refs/heads/main",
"committer_date": 1608052939000,
"content_id": "9ef0057610cda733db807522c2ebbe1e74d32e57",
"detected_licenses": [
"MIT"
],
"directory_id": "fa27041fe8f82971af6114d1eed2be03b5d3be51",
"extension": "py",
"file... | 3.203125 | stackv2 | from pathlib import Path
import re
from dataclasses import dataclass
MATCHER = re.compile(r"^(\d+)\-(\d+) (\S+): (\S+?)$")
@dataclass()
class PasswordEntry:
min_count: int
max_count: int
target_char: str
password_candidate: str
def line_to_password_entry(line: str) -> PasswordEntry:
match = MAT... | 47 | 25.11 | 82 | 13 | 305 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f9617cced93819c0_8c39d094", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
37,
47
] | [
null,
null
] | [
18,
18
] | [
33,
33
] | |
2024-11-19T00:04:33.034227+00:00 | 1,498,097,282,000 | b430bbaea26526196cb35cdbf4463a619dfc0917 | 2 | {
"blob_id": "b430bbaea26526196cb35cdbf4463a619dfc0917",
"branch_name": "refs/heads/master",
"committer_date": 1498097282000,
"content_id": "f4802fd9559ad7a042dacde132abd1eae7e051bf",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "643aec9b87ade6dcb866af139ff2dcb4b6fdc177",
"extension": "p... | 2.328125 | stackv2 | import requests
from requests.exceptions import ConnectionError
from concurrent.futures import ThreadPoolExecutor
from multiprocessing import cpu_count
from bs4 import BeautifulSoup as beautifulsoup
import re
from core import Action
import itertools
from datetime import datetime, timedelta
import urllib3
urllib3.disa... | 269 | 35.97 | 79 | 18 | 2,109 | python | [{"finding_id": "codeql_py/request-without-cert-validation_f6278c0a83acb616_ea589e76", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1) by [this value](2)."
] | [
203
] | [
207
] | [
30
] | [
66
] | |
2024-11-19T00:40:10.066993+00:00 | 1,686,972,697,000 | 0b756f22ad6b818795ff895c53a2ee0511732c5f | 2 | {
"blob_id": "0b756f22ad6b818795ff895c53a2ee0511732c5f",
"branch_name": "refs/heads/master",
"committer_date": 1686972697000,
"content_id": "9b1a99974731144f28f4b0f3f1c90fddc9fd9711",
"detected_licenses": [
"MIT"
],
"directory_id": "351d82f9b76b2e2b7f2543449599db3defb0a7ec",
"extension": "py",
"fi... | 2.359375 | stackv2 | # Copyright (c) 2018 Patrick Pedersen <ctx.xda@gmail.com>
# Permission is hereby granted, free of charge, to any person obtaining a copy
# of this software and associated documentation files (the "Software"), to deal
# in the Software without restriction, including without limitation the rights
# to use, copy, modify,... | 91 | 42.37 | 140 | 22 | 820 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_4b141cf5be4e4639_ccb8ba6b", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text."
] | [
90
] | [
null
] | [
17
] | [
80
] | |
2024-11-19T00:40:24.005703+00:00 | 1,490,766,423,000 | aad62c99e9d54ed3b0e5509ccb8b59467f99c0b2 | 3 | {
"blob_id": "aad62c99e9d54ed3b0e5509ccb8b59467f99c0b2",
"branch_name": "refs/heads/master",
"committer_date": 1490766423000,
"content_id": "72065009a59f87a910e70aaa43c9d63031bcf975",
"detected_licenses": [
"MIT"
],
"directory_id": "bb98c581abca83cc4bf44f9c17b25e9d07dacee4",
"extension": "py",
"fi... | 3.09375 | stackv2 | # -*- coding: utf-8 -*-
import sys
import requests
import re
from bs4 import BeautifulSoup
## WordCounter: A class used to help sort the words and display them.
class WordCounter:
def __init__(self, word, count):
self.word = word
self.count = count
# Sort it in decreasing order. That is: th... | 190 | 37.1 | 117 | 20 | 1,626 | python | [{"finding_id": "codeql_py/overly-large-range_d8e9c935a2997737_18402d02", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].",
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
89,
175
] | [
null,
null
] | [
44,
40
] | [
47,
43
] | |
2024-11-19T00:40:29.829881+00:00 | 1,581,113,985,000 | 25860a33ce0eca747298487556d2d3088fd67eb7 | 2 | {
"blob_id": "25860a33ce0eca747298487556d2d3088fd67eb7",
"branch_name": "refs/heads/master",
"committer_date": 1581113985000,
"content_id": "8ab4800ccf8f46f8a5ebae8c270f67ec2808b7fe",
"detected_licenses": [
"Unlicense"
],
"directory_id": "783ac16072efcbae4aae9aee0aa8b468e33a59b4",
"extension": "py",... | 2.34375 | stackv2 | import sqlite3
import random
import string
import subprocess
import os
def dbconnect(dbfile_func):
try:
connection = sqlite3.connect(dbfile_func)
print(sqlite3.version)
connection.close()
except sqlite3.Error as t:
print(t)
exit(1)
def write_database(dbfile_func, inse... | 212 | 23.38 | 149 | 12 | 1,360 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_824c31ec4c6a7308_85b371f1", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.",
"This expression stores [sensitive data (password)](1) as clear text."
] | [
53,
194
] | [
null,
null
] | [
16,
12
] | [
30,
20
] | |
2024-11-19T01:06:17.578805+00:00 | 1,523,523,939,000 | b4412222e2a68aa9db15c0dcd9ccdeb97b6954d0 | 3 | {
"blob_id": "b4412222e2a68aa9db15c0dcd9ccdeb97b6954d0",
"branch_name": "refs/heads/master",
"committer_date": 1523523939000,
"content_id": "3d276a5dd76560981910b79d403938e556fc78bf",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "a91e6e1cddba26d90696ceead23416c091ae8fba",
"extension": "py"... | 2.734375 | stackv2 | # -*- coding: utf-8 -*-
from __future__ import absolute_import
from __future__ import division
from __future__ import print_function
from __future__ import unicode_literals
import logging
import re
import sqlparse
from sqlparse.sql import Identifier, IdentifierList
from sqlparse.tokens import Keyword, Name
RESULT_OP... | 297 | 36.45 | 97 | 19 | 2,437 | python | [{"finding_id": "codeql_py/redos_c6172fea364c376a_eba7c0fb", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '(' and containing many repetition... | 2 | true | [
"CWE-1333",
"CWE-1333"
] | [
"py/redos",
"py/redos"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '(' and containing many repetitions of '''.",
"This part of the regular expression may cause exponential backtracking on strings starting with '((' and containing many repetitions of '''."
] | [
195,
195
] | [
null,
null
] | [
45,
57
] | [
51,
63
] | |
2024-11-19T01:17:09.977782+00:00 | 1,593,437,463,000 | 6af5f99e466b686992d9f6b4ca634522a8b3ec29 | 2 | {
"blob_id": "6af5f99e466b686992d9f6b4ca634522a8b3ec29",
"branch_name": "refs/heads/master",
"committer_date": 1593437463000,
"content_id": "81b326bdb93c275078790ee6a2aab0fc9922ce6c",
"detected_licenses": [
"MIT"
],
"directory_id": "cfc9cd2bc6f732902632e8a9c506ba6cd7d1f779",
"extension": "py",
"fi... | 2.34375 | stackv2 | #!/usr/bin/env python
# -*- coding:utf-8 -*-
#
# Copyright (c) 2013-present SMHI, Swedish Meteorological and Hydrological Institute
# License: MIT License (see LICENSE.txt or http://opensource.org/licenses/mit).
from django.db import models
### from django.contrib.gis.db import models # For GeoDjango.
import hashlib
... | 108 | 44.61 | 113 | 23 | 1,145 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_1b08b5b7f90bf1b9_f1ecd2ac", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (private)](1) is used in a hashing algorithm (MD5) that is insecu... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (private)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (private)](2) is used in a hashing algorithm (MD5) that is insecure."
] | [
71
] | [
null
] | [
34
] | [
56
] | |
2024-11-19T01:17:10.283173+00:00 | 1,619,757,968,000 | 9d3007b35c5c541ac5eb667bc8b4a7b2f65d1758 | 3 | {
"blob_id": "9d3007b35c5c541ac5eb667bc8b4a7b2f65d1758",
"branch_name": "refs/heads/master",
"committer_date": 1619757968000,
"content_id": "fac0479d4ae879a063c67e9258e29ea1ec6082ab",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "fe7c897aa034d73281224e38dc5fdbe7a360d8e0",
"extension": "p... | 2.765625 | stackv2 | from aiohttp import web
import sqlite3
from datetime import datetime
html="""
<!DOCTYPE html>
<html>
<body>
<h1>My First Heading</h1>
<p>Hello %s</p>
%s
</body>
</html>
"""
def usercounter(name):
conn = sqlite3.connect('usercounter.db')
c = conn.cursor()
username=name
now=datetime.now()
time=now.... | 51 | 19.06 | 75 | 10 | 282 | python | [{"finding_id": "codeql_py/reflective-xss_3bbb6cd45aa8b402_2f8b35e2", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 2 | true | [
"CWE-079",
"CWE-089"
] | [
"py/reflective-xss",
"py/sql-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"This SQL query depends on a [user-provided value](1)."
] | [
44,
24
] | [
null,
null
] | [
30,
15
] | [
47,
75
] | |
2024-11-19T01:17:34.212392+00:00 | 1,571,651,474,000 | 0759b595833dbd0842ed1fe764899d5db59f1e9a | 2 | {
"blob_id": "0759b595833dbd0842ed1fe764899d5db59f1e9a",
"branch_name": "refs/heads/master",
"committer_date": 1571651474000,
"content_id": "94629b2c2ab8daa91ca8b98e8b95b0f8f0eb90a4",
"detected_licenses": [
"MIT"
],
"directory_id": "dbba49f071f43c2b0cfd2440907470da3d897fce",
"extension": "py",
"fi... | 2.46875 | stackv2 | from .forms import LoginForm, RegisterForm
from .models import User, db
from app.utils.decorators import breadcrumb, is_logged_in
from app.utils.flash_msgs import FAILED_LOGIN, REGISTERED_MSG
from flask import\
Blueprint, flash, redirect, render_template, request, session, url_for
from flask_babel import _
from fla... | 91 | 29.44 | 74 | 16 | 576 | python | [{"finding_id": "codeql_py/url-redirection_9327b428f5d61c00_ca4c90b4", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
48
] | [
null
] | [
33
] | [
57
] | |
2024-11-19T01:15:15.273972+00:00 | 1,627,513,328,000 | 52445af2fb5e834cee2df471d8cdd09e41fc7b8d | 2 | {
"blob_id": "52445af2fb5e834cee2df471d8cdd09e41fc7b8d",
"branch_name": "refs/heads/main",
"committer_date": 1627513328000,
"content_id": "c19d49f54f193b03094d00c276efc2cfc40cb33c",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "6e5cc83885771e3a44b5f7edfa93cf88c1a69884",
"extension": "py",
... | 2.453125 | stackv2 | import threading
import requests
import time
def kupon_request():
global toplam_req
x = requests.get("http://127.0.0.1:8000/kupon_kullan", verify=False)
print(x.text)
toplam_req += 1
toplam_req = 0
num = 500
for i in range(num):
threading.Thread(target=kupon_request).start()
time.sleep(2)
print(s... | 18 | 17.72 | 72 | 10 | 106 | python | [{"finding_id": "codeql_py/request-without-cert-validation_44b466c056b3c82f_709e3595", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
7
] | [
null
] | [
9
] | [
73
] | |
2024-11-19T01:15:24.203663+00:00 | 1,587,939,291,000 | d91461f35c2ee00f79f83d066314d4d3452882cc | 3 | {
"blob_id": "d91461f35c2ee00f79f83d066314d4d3452882cc",
"branch_name": "refs/heads/master",
"committer_date": 1587939291000,
"content_id": "db6a95730a28e52c4a21faa170c580647c0ddbf0",
"detected_licenses": [
"MIT"
],
"directory_id": "03b9b782e482230e87256f1d72e61257853c6748",
"extension": "py",
"fi... | 3.125 | stackv2 | from recovid import *
def doi_url(id: str = ''):
r"""Convert the doi to a url
Returns:
id {str} -- [doi id string]
"""
return f'http://{id}' if id.startswith('doi.org') else f'http://doi.org/{id}'
def get_data(
url: str = '',
timeout: int = 10,
):
r"""getting paper data from url
Keyword ... | 33 | 22 | 79 | 12 | 211 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_b01ba8f8420bec33_f9608540", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [doi.org](1) may be at an arbitrary position in the san... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [doi.org](1) may be at an arbitrary position in the sanitized URL."
] | [
10
] | [
null
] | [
28
] | [
52
] | |
2024-11-19T00:09:08.601785+00:00 | 1,545,661,366,000 | d3e5db050ad4e23e25ce4acf5bcc455e8a536ed4 | 4 | {
"blob_id": "d3e5db050ad4e23e25ce4acf5bcc455e8a536ed4",
"branch_name": "refs/heads/master",
"committer_date": 1545661366000,
"content_id": "122ee0cffc57b3628ed303a5d91d8a27346eb48d",
"detected_licenses": [
"MIT"
],
"directory_id": "8ddba1c973088da1e86ffe429d00af69872193bf",
"extension": "py",
"fi... | 3.8125 | stackv2 | #!/usr/bin/env python3
# -*- coding:utf-8 -*-
'OOP(Object-Oriented Programming)'
__author__ = 'dogsky'
##class
class Student(object) :
def __init__(self) :
self.name = 'xiao ming'
self.age = 21
def printStudentInfo(self) :
print('name = ',self.name,'\n age = ',self.age)
#set和get的属性不是必须的,但是是优秀的体现
def ... | 74 | 24.45 | 84 | 11 | 587 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a6896e21a2cf6dd0_f542f36d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 4 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive dat... | [
43,
51,
55,
57
] | [
null,
null,
null,
null
] | [
62,
24,
26,
39
] | [
72,
57,
58,
84
] | |
2024-11-19T00:43:41.891047+00:00 | 1,547,191,541,000 | 0b0a516f903ad2596dcff7eff0917952e9d4771a | 4 | {
"blob_id": "0b0a516f903ad2596dcff7eff0917952e9d4771a",
"branch_name": "refs/heads/master",
"committer_date": 1547191541000,
"content_id": "6efddeab3288a12e8f1097184a47a14ea8329670",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "4a1a64880cee58b916225a46ac339b1cf6d39dc5",
"extension": "py"... | 3.5625 | stackv2 | # 学生管理系统
import sqlite3
connect = sqlite3.connect("testsqlite.db")
cursor = connect.cursor()
# 添加
def n1():
input_name = str(input("请输入您的姓名:"))
input_sex = str(input("请输入您的性别:"))
connect.execute("insert into students(name,sex) values(?,?)", (input_name, input_sex))
print("添加成功")
# 查询
# 返回字典版信息
... | 99 | 17.96 | 105 | 13 | 561 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7071c3911c7f45d1_a1473f86", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
43
] | [
null
] | [
15
] | [
73
] | |
2024-11-19T01:32:01.270314+00:00 | 1,546,270,266,000 | b04bb7af51b885da122539c2b36a183b14553433 | 3 | {
"blob_id": "b04bb7af51b885da122539c2b36a183b14553433",
"branch_name": "refs/heads/master",
"committer_date": 1546270266000,
"content_id": "b36d5009c253edc354cd401b38723130367c7d80",
"detected_licenses": [
"MIT"
],
"directory_id": "4895797bd4aee8516bad37c5bf351a925af4227a",
"extension": "py",
"fi... | 2.546875 | stackv2 | import os
import configparser
import sys
import flask
import hmac
import hashlib
from .github import GitHub
app = flask.Flask(__name__)
def parseConfigsFromEnv():
"""
Load config from ENV variable
"""
token=None
secret=None
labels={}
if 'FILABEL_CONFIG' not in os.environ:
ra... | 139 | 23.96 | 92 | 22 | 793 | python | [{"finding_id": "codeql_py/reflective-xss_8dc43f622e77d9eb_70838a23", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
126,
131
] | [
null,
null
] | [
16,
16
] | [
31,
39
] | |
2024-11-19T01:32:05.987658+00:00 | 1,473,154,393,000 | 4867db47eb6535cb0c16102740923199a605b289 | 2 | {
"blob_id": "4867db47eb6535cb0c16102740923199a605b289",
"branch_name": "refs/heads/master",
"committer_date": 1476014913000,
"content_id": "0ff282fa4969cffd5792c23897e953b1f4c24594",
"detected_licenses": [
"MIT"
],
"directory_id": "283eb1c6c7ddbb19a0f99715ac8f4c29930de3da",
"extension": "py",
"fi... | 2.5 | stackv2 | import argparse
import os
try:
from shlex import quote as cmd_quote
except ImportError:
from pipes import quote as cmd_quote
from awscli.customizations.commands import BasicCommand
def awscli_initialize(event_hooks):
event_hooks.register('building-command-table.main', inject_commands)
def inject_comman... | 94 | 31.77 | 80 | 15 | 649 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7a80bd8456420058_ff8ed42a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
27
] | [
null
] | [
11
] | [
29
] | |
2024-11-19T01:32:21.278457+00:00 | 1,554,201,085,000 | dc45029aef91edd5154fc2afffa18931b11b2509 | 3 | {
"blob_id": "dc45029aef91edd5154fc2afffa18931b11b2509",
"branch_name": "refs/heads/master",
"committer_date": 1554201085000,
"content_id": "1551449cdd9021a5f7e319f788ced24c3be565e3",
"detected_licenses": [
"MIT"
],
"directory_id": "f498049c16f1cb1bba72a3a6f7bf9fd7c5b1fda8",
"extension": "py",
"fi... | 2.703125 | stackv2 | from jinja2 import Template
import pdfkit
def create_pdf(table, out):
width = int(100 / len(table[0]))
headers = table[0]
rows = table[1:]
html = Template("""
<table border="0" align="center" width="90%">
<thead><tr>{% for header in headers %}<th width="{{ width }}%">{{ header }}</th>{% e... | 21 | 28.71 | 113 | 12 | 175 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_8bd8381fa08ada88_2c581611", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
10
] | [
19
] | [
12
] | [
9
] | |
2024-11-19T01:32:25.236447+00:00 | 1,553,781,074,000 | 47cf843811a26a078d2318de050091fdbfe79e89 | 3 | {
"blob_id": "47cf843811a26a078d2318de050091fdbfe79e89",
"branch_name": "refs/heads/master",
"committer_date": 1553781074000,
"content_id": "670a715fc6656173971568887fa8eb8fb05185b4",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "2f7eca5adcb73d72bf1bf7d2dac2a7ff3fe47201",
"extension": "py"... | 2.640625 | stackv2 | #!/usr/bin/python
import re
import socket
import urlparse
import ssl
import urllib
import time
# See HTTPPipelineTest() for a simple usage
# Example:
# RequestObject('POST', 'https://soroush.secproject.com/?q1=q2','var=val',{'cookie':'x=2;r=5','connection':'close','Content-Type': 'application/x-www-form-urlencoded'}, ... | 197 | 36.8 | 174 | 20 | 1,820 | python | [{"finding_id": "codeql_py/insecure-protocol_3f7d49d01b5c09fb_ed5752a9", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 specified by [call to ssl.wrap_socket](1).", "remediation": "", "l... | 1 | true | [
"CWE-327"
] | [
"py/insecure-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Insecure SSL/TLS protocol version TLSv1 specified by [call to ssl.wrap_socket](1)."
] | [
99
] | [
null
] | [
13
] | [
63
] | |
2024-11-19T01:43:48.122927+00:00 | 1,457,878,269,000 | e0673efc4bfbdb935c82360b3094f48a5dad6107 | 3 | {
"blob_id": "e0673efc4bfbdb935c82360b3094f48a5dad6107",
"branch_name": "refs/heads/master",
"committer_date": 1457878269000,
"content_id": "f2460fd17a1c9f474a70417ab4c297e68b364b98",
"detected_licenses": [
"MIT"
],
"directory_id": "f9ae046138ea3cdb2300087b1f9f2bb14a4795a1",
"extension": "py",
"fi... | 2.984375 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
# 用于创建数据库,请按照下面的要求填写相关的信息,再运行`python create_db.py`,
# 并将生成的数据库拷贝到 blog 目录下
import os
import sys
import os.path
import base64
import getopt
import sqlite3
from miniakio.libs import crypto
# 编辑下面的信息
USERNAME = "SErHo" # 用户名
EMAIL = "serholiu@gmail.com" # 邮箱... | 87 | 21.8 | 79 | 12 | 584 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f8b710f10b9212d5_65e9cfe0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
83
] | [
null
] | [
15
] | [
27
] | |
2024-11-19T01:44:05.394806+00:00 | 1,544,665,511,000 | 9e27f73efb4c99175a2970e0cd934095240899f6 | 3 | {
"blob_id": "9e27f73efb4c99175a2970e0cd934095240899f6",
"branch_name": "refs/heads/master",
"committer_date": 1544665511000,
"content_id": "b8183f6e4de9b44d092829ff6683f197b8e2ccac",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "a3ab19907e8931f312397db14bbc7d166259020a",
"extension": "py"... | 2.71875 | stackv2 | import time
from firebase import firebase
firebase = firebase.FirebaseApplication('https://ship-detection.firebaseio.com/', None)
def location():
while True:
with open('location.csv', 'r') as reader:
for line in reader:
latitude = line.strip().split(',')[0]
lon... | 23 | 25.3 | 87 | 17 | 109 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0fe98776d81d69ea_83ea8b7e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
17,
18
] | [
null,
null
] | [
23,
23
] | [
31,
32
] | |
2024-11-19T02:19:56.984604+00:00 | 1,599,661,715,000 | 4c25ab293cb68bd88c6f1151e3d34d3f30403573 | 3 | {
"blob_id": "4c25ab293cb68bd88c6f1151e3d34d3f30403573",
"branch_name": "refs/heads/master",
"committer_date": 1599661715000,
"content_id": "04a1e0d51a40004408610bc4ce81f59ee0e70b96",
"detected_licenses": [
"MIT"
],
"directory_id": "4fdd13480b1a1f55123abc63076e849a2ce37720",
"extension": "py",
"fi... | 3.28125 | stackv2 | import network
import urequests
import ujson
import config
# API de prueba para conseguir datos en formato JSON
url = 'http://dummy.restapiexample.com/api/v1/employee/2'
# Configurar el WIFI como cliente y activar
wlan = network.WLAN(network.STA_IF)
wlan.active(True)
if not wlan.isconnected():
print('\n\nConecta... | 36 | 26.78 | 57 | 9 | 254 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_47a31aa76338a7dc_4d864167", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
32,
33,
34
] | [
null,
null,
null
] | [
22,
20,
23
] | [
28,
24,
30
] | |
2024-11-19T00:59:44.720326+00:00 | 1,682,212,773,000 | 155fc99b54065c45b8a3fe041e88e8bf561e5dcd | 3 | {
"blob_id": "155fc99b54065c45b8a3fe041e88e8bf561e5dcd",
"branch_name": "refs/heads/master",
"committer_date": 1682212773000,
"content_id": "ca785d0e90c6aa7d070472e6aa61048b62521cb5",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "68df2bcc80e68a337ffd73a9742b30e803451f2e",
"extension": "py"... | 2.609375 | stackv2 | #coding: utf-8
#
### CREATED BY KARMAZ
#
#
### TO DO:
#
### FUNCTIONS:
# 1. Gather SIDs.
# 2. Measure SID generation delay.
#
#
#### WORKFLOW
# 1. "Copy as python Request" in Burp Suitre.
# 2. Paste in login_req
# - If there is multiple steps to generate SID use get_cookie.
# - Else do not use this function and del... | 82 | 23.16 | 90 | 13 | 579 | python | [{"finding_id": "codeql_py/request-without-cert-validation_f7f02950641dbbd0_c6924527", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
38,
47
] | [
null,
null
] | [
9,
9
] | [
86,
91
] | |
2024-11-19T00:59:46.609061+00:00 | 1,433,668,441,000 | 133db2a4d31beacd5d188222a75af61f4b8abb72 | 3 | {
"blob_id": "133db2a4d31beacd5d188222a75af61f4b8abb72",
"branch_name": "refs/heads/master",
"committer_date": 1433668441000,
"content_id": "b46f86eca1e141227823e5c4f0bc89a28e54ee5e",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "a497a866026b1bae2abf315f9cb7e858dff1a91f",
"extension": "py"... | 2.5625 | stackv2 | #!/usr/bin/env python
#
# Data Generator service
#
__VERSION__ = '0.0.1'
DEFAULT_ROWS_PER_REQUEST=10
MAX_ROWS_PER_REQUEST=10000
import yaml
import json
from flask import Flask
from flask import request
from faker import Factory
class DataRequest(object):
def __init__(self):
self._data = list()
... | 111 | 21.52 | 80 | 16 | 558 | python | [{"finding_id": "codeql_py/unsafe-deserialization_2d04ed3100af64d6_45446422", "tool_name": "codeql", "rule_id": "py/unsafe-deserialization", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Unsafe deserialization depends on a [user-provided value](1).", "remediation": "", "locatio... | 2 | true | [
"CWE-502",
"CWE-094"
] | [
"py/unsafe-deserialization",
"py/code-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Unsafe deserialization depends on a [user-provided value](1).",
"This code execution depends on a [user-provided value](1)."
] | [
41,
58
] | [
null,
null
] | [
41,
43
] | [
49,
56
] | |
2024-11-19T01:11:51.073782+00:00 | 1,585,444,042,000 | 500bfaf6d42d227b825ed7209645b1831435d3e4 | 4 | {
"blob_id": "500bfaf6d42d227b825ed7209645b1831435d3e4",
"branch_name": "refs/heads/master",
"committer_date": 1585444042000,
"content_id": "33a527acb4ab53e1363b41f42cefbf79776cd2ac",
"detected_licenses": [
"MIT"
],
"directory_id": "9c051e51357aaef212855ce84fe842c796ba41d8",
"extension": "py",
"fi... | 3.765625 | stackv2 | """Password Generator
TERRIBLE IDEA! DO NOT USE THIS UNDER ANY CIRCUMSTANCES
"""
# probably insufficient for this purpose, but that shouldn't matter since DON'T USE IT
import random
ALPHA = (''.join(map(chr, range(ord('a'), ord('z') + 1))) +
''.join(map(chr, range(ord('A'), ord('Z') + 1))))
DIGITS = ''.join(... | 49 | 40 | 95 | 16 | 520 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f735a81defdc394c_c9d0e5f2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
46
] | [
null
] | [
15
] | [
45
] | |
2024-11-19T01:12:01.909272+00:00 | 1,666,097,565,000 | b2fb522d334b75c6bf4d4891b0af78a9341a389e | 3 | {
"blob_id": "b2fb522d334b75c6bf4d4891b0af78a9341a389e",
"branch_name": "refs/heads/master",
"committer_date": 1666097565000,
"content_id": "a0d164b2a15676955c6d3c459aa95a481123553f",
"detected_licenses": [
"MIT"
],
"directory_id": "b76204c0010f7ad724f890af32454d1e88e414d1",
"extension": "py",
"fi... | 2.953125 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
# @File : ATM.py
# @Author: zhangjiang
# @Date : 2018/11/15
# @Desc :
import os
#编辑用户
file_name = 'account.txt'
#保存用户信息 账号 余额 密码
loginInfo = []
shopCar = {}
shopFlag = True
product_list = [['Iphone7',5800],
['Coffee',30],
['疙瘩汤',10],
... | 412 | 35.57 | 126 | 28 | 3,670 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_10b2ddc02e757717_d827ba64", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 8 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging... | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data ... | [
149,
197,
231,
267,
289,
313,
328,
345
] | [
null,
null,
null,
null,
null,
null,
null,
null
] | [
15,
43,
11,
35,
11,
31,
15,
31
] | [
84,
106,
89,
90,
88,
126,
74,
77
] | |
2024-11-19T01:21:40.093897+00:00 | 1,633,878,749,000 | ab16f845471f319406e72b028c55f47e78ee7b08 | 3 | {
"blob_id": "ab16f845471f319406e72b028c55f47e78ee7b08",
"branch_name": "refs/heads/master",
"committer_date": 1633878749000,
"content_id": "cc8683eb93477e026730eb1443f9be0193703668",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "352fe26eaa0c71291e38e22478ab5b8a21073351",
"extension": "py"... | 2.515625 | stackv2 | # -*- coding: utf-8 -*-
import gzip
import nltk
from os import listdir, makedirs
from os.path import join, exists
import re
from bs4 import BeautifulSoup
import subprocess
from config import gov2_collection_path, gov2_output_path, gov2_docno_list
# This script is based on:
# https://gist.github.com/dervn/859717/15b69e... | 161 | 30.12 | 90 | 25 | 1,298 | python | [{"finding_id": "codeql_py/bad-tag-filter_0540f1c07907c8b2_73b3b02f", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression does not match script end tags like </script\\t\\n bar>.", "remediation": "", "location"... | 1 | true | [
"CWE-116"
] | [
"py/bad-tag-filter"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression does not match script end tags like </script\\t\\n bar>."
] | [
24
] | [
null
] | [
29
] | [
68
] | |
2024-11-19T02:10:31.258369+00:00 | 1,619,794,131,000 | 4f04c1da350a0820b2f856903615e50f901f38c6 | 3 | {
"blob_id": "4f04c1da350a0820b2f856903615e50f901f38c6",
"branch_name": "refs/heads/master",
"committer_date": 1619794157000,
"content_id": "ac532f3c3b6dbdec4d651aa1038e1e58451d5038",
"detected_licenses": [
"MIT"
],
"directory_id": "d4edea1100b9138a1b4f7efde24c14f7da1ca528",
"extension": "py",
"fi... | 2.515625 | stackv2 | from datetime import date, datetime
from dateutil.rrule import DAILY, rrule
from django.contrib import messages
from django.contrib.auth.mixins import LoginRequiredMixin
from django.http.response import Http404, HttpResponseRedirect
from django.utils import timezone
from django.views.generic.base import RedirectView, ... | 161 | 26.32 | 67 | 19 | 1,006 | python | [{"finding_id": "codeql_py/url-redirection_77cc213e15bc7d37_f6ea2f74", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
136
] | [
null
] | [
37
] | [
58
] | |
2024-11-19T02:10:36.581970+00:00 | 1,551,431,943,000 | a3a1ddc121ef737d030fe3ab383db77a0a3bd748 | 2 | {
"blob_id": "a3a1ddc121ef737d030fe3ab383db77a0a3bd748",
"branch_name": "refs/heads/master",
"committer_date": 1551431943000,
"content_id": "a4bff66e443c5971ac93629343676c68d24b2f28",
"detected_licenses": [
"MIT"
],
"directory_id": "136cef3bc0a75497e707128a392a6291361c6c6d",
"extension": "py",
"fi... | 2.328125 | stackv2 | # -*- encoding: utf-8 -*-
"""Rainbow settings methods
"""
from configparser import ConfigParser
from pprint import pprint
from requests import packages, put, exceptions
from paramiko import SSHClient, AutoAddPolicy, AuthenticationException
from os.path import join, exists
from tempfile import gettempdir
from pyoxeconf... | 222 | 32.73 | 103 | 14 | 1,832 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_6f9c3171cd571b5a_5fded07c", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 6 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation",
"py/paramiko-missing-host-key-validation",
"py/paramiko-missing-host-key-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"HIGH",
"HIGH",
"HIGH",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe.",
"Setting missing host key policy to AutoAddPolicy may be unsafe.",
"Setting missing host key policy to AutoAddPolicy may be unsafe.",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run w... | [
151,
174,
195,
78,
105,
130
] | [
null,
null,
null,
82,
null,
134
] | [
5,
5,
5,
20,
20,
20
] | [
56,
56,
56,
25,
95,
25
] | |
2024-11-19T02:10:45.003989+00:00 | 1,555,394,214,000 | feb036a9d39fdd6ebb7e242bfeb7b44555cfad3f | 2 | {
"blob_id": "feb036a9d39fdd6ebb7e242bfeb7b44555cfad3f",
"branch_name": "refs/heads/master",
"committer_date": 1555394214000,
"content_id": "984ccd3680dce01a667139a07b9172b4893aa6a4",
"detected_licenses": [
"MIT"
],
"directory_id": "2533771fb0e289c5dec00f5432dfbddccafe6ddb",
"extension": "py",
"fi... | 2.359375 | stackv2 | import numpy as np
import re
import json
from sklearn.cluster import KMeans
from sklearn.metrics import silhouette_score
from datetime import datetime
from gensim.models import KeyedVectors
from numpy import linalg
from sklearn.feature_extraction.text import TfidfVectorizer
class DynamicClustering(object):
def __... | 254 | 50.93 | 163 | 24 | 2,793 | python | [{"finding_id": "codeql_py/overly-large-range_7e2d1ad98aec433b_bffc710f", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].",
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
59,
66
] | [
null,
null
] | [
36,
37
] | [
39,
40
] | |
2024-11-19T02:11:04.500426+00:00 | 1,684,842,078,000 | 22d64e7f316bffbea36144b385e7cb7168f08f66 | 2 | {
"blob_id": "22d64e7f316bffbea36144b385e7cb7168f08f66",
"branch_name": "refs/heads/master",
"committer_date": 1684842078000,
"content_id": "cf6a5ac2d629fac7cf0c3c4396ce5c460018de67",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "5bff58f59bbecd6b9d38cdf9ba704dbd11fe99f6",
"extension": "p... | 2.359375 | stackv2 | import os
import json
import time
from flask import Flask, abort
import sensor_reader
import logging
log = logging.getLogger('werkzeug')
log.setLevel(logging.ERROR)
app = Flask(__name__)
BASE_DIR = '/sys/bus/w1/devices/'
@app.route("/")
def hello():
return "Hello World!"
@app.route("/sensors")
def list_sensor... | 49 | 22.73 | 89 | 13 | 302 | python | [{"finding_id": "codeql_py/reflective-xss_5c614290f698d94a_c0a5efa8", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
40
] | [
null
] | [
12
] | [
30
] | |
2024-11-19T02:11:04.608068+00:00 | 1,669,236,191,000 | 9c6be5fb18e8fdcd11b89f4d7f56475bf8252337 | 2 | {
"blob_id": "9c6be5fb18e8fdcd11b89f4d7f56475bf8252337",
"branch_name": "refs/heads/master",
"committer_date": 1669236191000,
"content_id": "da9ab6b4f35c988f7d088403eac65fc9cacbcabd",
"detected_licenses": [
"Unlicense"
],
"directory_id": "d039cde592b1b1e7d34476c10b2a9c711b0db321",
"extension": "py",... | 2.40625 | stackv2 | from Crypto.Cipher import AES
from Crypto.Util import Padding
from typing import Dict
import base64
import binascii
import hashlib
import zipfile
# Based on obok.py by Physisticated.
class KoboDrmRemover:
def __init__( self, deviceId: str, userId: str ):
self.DeviceIdUserIdKey = KoboDrmRemover.__MakeDeviceIdUserId... | 38 | 39.16 | 95 | 18 | 420 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_336ef9c305afdb94_fef54e61", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
24,
27
] | [
null,
null
] | [
25,
23
] | [
53,
53
] | |
2024-11-19T02:45:23.414321+00:00 | 1,522,737,616,000 | b4912bdc1542f2b8745582356da8df545ac1fed0 | 2 | {
"blob_id": "b4912bdc1542f2b8745582356da8df545ac1fed0",
"branch_name": "refs/heads/master",
"committer_date": 1522737616000,
"content_id": "cce5b1adc3e5a612ac3738e37c4b723607656d29",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "7a730d1e30874298c26b4dc9c33932b7fdf89457",
"extension": "py"... | 2.390625 | stackv2 | from flask import flash, redirect, render_template, url_for, request
from flask_login import login_user, logout_user, login_required, current_user
from . import auth
from .forms import SignInForm, SignUpForm, ChangePasswordForm
from ..models import User
@auth.route('/', methods=['GET', 'POST'])
def index():
form ... | 55 | 33.05 | 88 | 16 | 380 | python | [{"finding_id": "codeql_py/url-redirection_86e9043f7fe77869_07fac675", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
15
] | [
null
] | [
29
] | [
88
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.