added
stringlengths
32
32
created
int64
1,236B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.03
source
stringclasses
1 value
text
stringlengths
330
19.3k
num_lines
int64
16
648
avg_line_length
float64
15.5
59.3
max_line_length
int64
37
179
ast_depth
int64
8
38
length
int64
102
3.79k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.11k
276k
sast_codeql_findings_count
int64
1
33
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
33
rule_ids
listlengths
1
33
confidences
listlengths
1
33
severities
listlengths
1
33
messages
listlengths
1
33
line_starts
listlengths
1
33
line_ends
listlengths
1
33
column_starts
listlengths
1
33
column_ends
listlengths
1
33
2024-11-18T21:58:35.299064+00:00
1,693,200,041,000
0adff3c3a83a1fbfdcc0526a801b081b6f481d3e
2
{ "blob_id": "0adff3c3a83a1fbfdcc0526a801b081b6f481d3e", "branch_name": "refs/heads/master", "committer_date": 1693200041000, "content_id": "6bc71ab35a44ff6ad27d7f29a5cea4f1dbe89c03", "detected_licenses": [ "Apache-2.0" ], "directory_id": "1040b320168c49e3fd784d93ff30923527582d26", "extension": "py"...
2.375
stackv2
import os from jinja2 import Environment, PackageLoader from calm.dsl.builtins import read_file from calm.dsl.log import get_logging_handle from calm.dsl.config import get_context LOG = get_logging_handle(__name__) def render_runbook_template(runbook_name): schema_file = "runbook.py.jinja2" loader = Packa...
78
26.31
74
15
511
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_7c429f6336378945_399539b9", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 16 ]
[ null ]
[ 11 ]
[ 37 ]
2024-11-18T21:58:38.941056+00:00
1,342,158,104,000
f8cd77a2b7a3b5f0285220feea25d9c9eb80ac11
3
{ "blob_id": "f8cd77a2b7a3b5f0285220feea25d9c9eb80ac11", "branch_name": "refs/heads/master", "committer_date": 1342158104000, "content_id": "4c1d76ecf0cb7e8b4da979e9a80fa4ed664ba415", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "471a036309c05b59243033f2480e27e19268ec55", "extension": "p...
3.0625
stackv2
""" Many portions of code inside this file were copied from Django 1.4 and modified for our needs. Copyright (c) Django Software Foundation and individual contributors. All rights reserved. """ import re import hashlib import hmac from london.conf import settings EXP_ENCRYPTED = re.compile('^(sha1|md5|crypt)\$(\w{12})...
112
34.64
113
13
916
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_6a8d3dc315ec6b71_def5e14a", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
3
true
[ "CWE-327", "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi...
[ 72, 74, 91 ]
[ null, null, null ]
[ 28, 29, 24 ]
[ 47, 48, 41 ]
2024-11-18T21:58:40.848298+00:00
1,683,743,253,000
06f402e6be7ef9af4a846b652328eb42776060a4
3
{ "blob_id": "06f402e6be7ef9af4a846b652328eb42776060a4", "branch_name": "refs/heads/master", "committer_date": 1683743253000, "content_id": "df80e9d8aed425dee09797f348693be91aca83d0", "detected_licenses": [ "MIT" ], "directory_id": "db5cc66ffe6ce1eb4ddb056f17878ad158463732", "extension": "py", "fi...
2.90625
stackv2
"""Function that gets device enviromental stats""" from json.decoder import JSONDecodeError import requests import json import time import os import warnings warnings.filterwarnings('ignore', message='Unverified HTTPS request') headers = {"Content-Type": 'application/yang-data+json', 'Accept': 'application/yang-data+j...
39
36.74
161
16
372
python
[{"finding_id": "codeql_py/request-without-cert-validation_3afac4c409e33755_29b7010d", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 20 ]
[ null ]
[ 20 ]
[ 95 ]
2024-11-18T23:10:52.544686+00:00
1,358,639,590,000
22c43f981cdde78c0cb15446face680b93ae4758
3
{ "blob_id": "22c43f981cdde78c0cb15446face680b93ae4758", "branch_name": "refs/heads/master", "committer_date": 1358639850000, "content_id": "01a830c45bd91975ada2b454417ac8a1cdde0c74", "detected_licenses": [ "MIT" ], "directory_id": "a72994c9fe608283287944da8a53170d98235fa6", "extension": "py", "fi...
2.640625
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- from uuid import uuid4 import sqlalchemy as sa #TODO: salt that shit from hashlib import sha512 from sqlalchemy.orm import relationship from beard.models import Base, TimestampMixin class User(Base): __tablename__ = 'users' id = sa.Column(sa.CHAR(36), ...
69
28.36
66
14
465
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_09d44c23bd853cf4_6bdf1175", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 31 ]
[ null ]
[ 23 ]
[ 31 ]
2024-11-18T23:11:00.300765+00:00
1,499,399,816,000
1975546a7a195d71dca8c52de25fa8553749f502
3
{ "blob_id": "1975546a7a195d71dca8c52de25fa8553749f502", "branch_name": "refs/heads/master", "committer_date": 1499399816000, "content_id": "240158674af767866a4f3daf17bf78351e2ccaae", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "867d175c1d8e5c6e5cf730d0f852460a3720ce50", "extension": "p...
2.515625
stackv2
from flask import Flask, request, json, Response # Exceptions from sqlalchemy.exc import IntegrityError import binascii import pyotp import logging from otpd.model import db, Client, User, TOTP, HOTP app = Flask(__name__) app.config['SQLALCHEMY_DATABASE_URI'] = 'sqlite:///otpd.db' app.config['SQLALCHEMY_TRACK_MODIF...
397
25.23
84
18
2,468
python
[{"finding_id": "codeql_py/reflective-xss_f9600ec723a2b571_d37b6436", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
5
true
[ "CWE-079", "CWE-117", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/reflective-xss", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "HIGH", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 176, 212, 216, 234, 238 ]
[ null, null, null, null, null ]
[ 20, 26, 21, 26, 21 ]
[ 65, 62, 58, 62, 59 ]
2024-11-18T23:11:19.271776+00:00
1,604,461,306,000
6614aa9c4d644895606ff153fe0e2a48983c18f7
3
{ "blob_id": "6614aa9c4d644895606ff153fe0e2a48983c18f7", "branch_name": "refs/heads/master", "committer_date": 1604461306000, "content_id": "e763aad714f02ee01cdb50b6e3afe8271c9fb84d", "detected_licenses": [ "Apache-2.0" ], "directory_id": "6ffea319d68339a24a1d6ea96ae75fda66b08d4b", "extension": "py"...
2.59375
stackv2
# Name: image.py # Author: HuangHao # Time: 2020/9/18 11:05 from django.http import HttpResponse, JsonResponse import os, hashlib, time from zoo.settings import STATIC_URL, BASE_DIR from zooapi.models import User, Folder, Article, Image # api接口,url相同,按照请求方法不懂,分到到特定函数去处理。 def process_method(request): if request.m...
142
30.89
110
22
1,159
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_9bd3891876f8d41f_b412f759", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.",...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 65 ]
[ null ]
[ 38 ]
[ 91 ]
2024-11-18T22:48:22.788955+00:00
1,626,620,274,000
b2722fa09168742dbed9c773c01d11e3af583586
3
{ "blob_id": "b2722fa09168742dbed9c773c01d11e3af583586", "branch_name": "refs/heads/master", "committer_date": 1626620274000, "content_id": "f029d36f05d4aec95a27d336d627fdc48b98156a", "detected_licenses": [ "MIT" ], "directory_id": "f440b3605cc24c70c0bea61b5ba852448835f530", "extension": "py", "fi...
3.34375
stackv2
import re from discord.ext import commands __all__ = ( "Cell", "Column", "Row", ) class Column(commands.Converter[int]): """Returns the index of a column.""" @classmethod def from_char(cls, argument: str) -> int: return ord(argument.upper()) - ord("A") @classmethod async de...
48
27.06
84
15
307
python
[{"finding_id": "codeql_py/overly-large-range_5d5f3c472da69f51_32a64d9b", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 45 ]
[ null ]
[ 24 ]
[ 27 ]
2024-11-18T22:49:06.203271+00:00
1,629,862,276,000
40be4e703074bc3b951b2e0e56cdc75d7d445f34
3
{ "blob_id": "40be4e703074bc3b951b2e0e56cdc75d7d445f34", "branch_name": "refs/heads/master", "committer_date": 1629862276000, "content_id": "5872f6e2cdb04d5199e494e5c405fe922ab93dd4", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "aa3cee4c9a1c7397fd47a3da4e9dae9433e0841e", "extension": "p...
2.5625
stackv2
import asyncio import io import os import time import zipfile from datetime import datetime from pathlib import Path from tarfile import is_tarfile from tarfile import open as tar_open from telethon import types from telethon.utils import get_extension from ..Config import Config from . import codex, edit_delete, edi...
283
35.58
112
21
2,313
python
[{"finding_id": "codeql_py/tarslip_2400acf80ca98199_da843734", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/tarslip", "py/tarslip" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1).", "This file extraction depends on a [potentially untrusted source](1)." ]
[ 226, 270 ]
[ null, null ]
[ 13, 9 ]
[ 17, 13 ]
2024-11-18T22:49:08.657807+00:00
1,487,804,141,000
26accc4d475630e2bc1f2745ded23bfbdd3eb341
2
{ "blob_id": "26accc4d475630e2bc1f2745ded23bfbdd3eb341", "branch_name": "refs/heads/master", "committer_date": 1487804141000, "content_id": "ebe1e3b414322e8e4973e8ba246998b4e360843a", "detected_licenses": [ "MIT" ], "directory_id": "30c08ba36f6622a09a254e68d388687529ae0730", "extension": "py", "fi...
2.40625
stackv2
import os import yaml from sqlalchemy import create_engine import yaml import json import logging #logging.basicConfig(format = "%(asctime)s %(message)s", # filename ="setup_env.log", level = logging.DEBUG) def get_database(config_file_name='pipeline/default_profile.yaml'): try: logging.debu...
93
28.9
135
14
624
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_212f932a8f52bf94_fd3d2f23", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 73 ]
[ null ]
[ 19 ]
[ 22 ]
2024-11-18T23:26:04.851732+00:00
1,599,053,689,000
565a201dffaf39307fbf9856f49d1fb8c5c0788d
3
{ "blob_id": "565a201dffaf39307fbf9856f49d1fb8c5c0788d", "branch_name": "refs/heads/master", "committer_date": 1599053689000, "content_id": "657cdb20a264e4f255324a41157fd6d6dbb818ea", "detected_licenses": [ "Apache-2.0" ], "directory_id": "5fe72bb13baf3649058ebe11aa86ad4fc56c69ed", "extension": "py"...
2.875
stackv2
import sys import markdown import yaml import os from jinja2 import Environment, FileSystemLoader with open(sys.argv[2], 'r') as f: content = yaml.safe_load(f.read()) for k in content: if k.startswith('md_'): content[k] = markdown.markdown(content[k]) tpath = os.path.join(os.getcwd(), 'templates') en...
30
22.37
61
11
184
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_a59ad79a409dd5b0_c7e44d40", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 15 ]
[ null ]
[ 7 ]
[ 50 ]
2024-11-18T22:27:42.240458+00:00
1,531,145,899,000
0bc9fe0e8a5ec084187792c0e80b4b2274e8b319
3
{ "blob_id": "0bc9fe0e8a5ec084187792c0e80b4b2274e8b319", "branch_name": "refs/heads/master", "committer_date": 1531145899000, "content_id": "41883fc2356600916204c5dd817fb027f30d3ff8", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "15a7405acc2f2f15f2d6bbbf9baabfa317b26ba0", "extension": "p...
2.65625
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- from collections import OrderedDict import os import sys import jinja2 def generate_source(filename, template_dict): template = template_setup(filename) filepath, in_ext = os.path.splitext(filename) assert in_ext == '.in', 'Invalid template file: {}'.format(f...
58
33.17
78
13
489
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_8233a34cbf8d02b5_0c8e0877", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 37 ]
[ null ]
[ 20 ]
[ 62 ]
2024-11-18T22:14:57.121323+00:00
1,624,164,026,000
ce94f9a08ac3ee2d8329c485e2c175e929c46811
4
{ "blob_id": "ce94f9a08ac3ee2d8329c485e2c175e929c46811", "branch_name": "refs/heads/main", "committer_date": 1624164026000, "content_id": "e2456cb7ab97c82052a0a85f796ea8474b745795", "detected_licenses": [ "MIT" ], "directory_id": "a031e4e02106846394c3feea51408b87b696802f", "extension": "py", "file...
3.65625
stackv2
import random import string upper = string.ascii_uppercase lower = string.ascii_lowercase num = string.digits punc = string.punctuation print("UPPERCASE:\tU\nLOWERCASE:\tL\nDIGITS:\t\tD\nSYMBOLS:\tS") q = input("Enter your choice of combination: ") full_combination = "" if "U" in q.upper(): full_combination += ...
30
20.97
64
8
179
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0f795a19084c19af_ee8135a2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 30 ]
[ null ]
[ 7 ]
[ 38 ]
2024-11-18T22:55:28.673129+00:00
1,459,379,160,000
5701ec67185e0862e7e48dd4c233c96d3a5e8c4b
3
{ "blob_id": "5701ec67185e0862e7e48dd4c233c96d3a5e8c4b", "branch_name": "refs/heads/master", "committer_date": 1459379160000, "content_id": "a74da733d12cd79b7e7ceab761f4d4658c514bf0", "detected_licenses": [ "Apache-2.0" ], "directory_id": "ffe12cd6b694d3a9f64d957ff00278c0ccc3a5eb", "extension": "py"...
2.65625
stackv2
import sys import json import time import requests class Marathon(object): def __requests_get(self, uri): response = None if self.marathon_user: # print "User " + self.marathon_user + "Pass " + self.marathon_pass # print "URI " + self.marathon_host + uri respons...
139
37.04
79
17
1,043
python
[{"finding_id": "codeql_py/request-without-cert-validation_26135a6a7d8149a1_68856b15", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
4
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 13, 18, 28, 34 ]
[ 16, 19, 32, 37 ]
[ 24, 24, 24, 24 ]
[ 63, 50, 63, 50 ]
2024-11-18T22:55:31.459745+00:00
1,572,025,509,000
367744f9cf4b8f01b5c6db4c1fe25a3eed8e84b1
2
{ "blob_id": "367744f9cf4b8f01b5c6db4c1fe25a3eed8e84b1", "branch_name": "refs/heads/master", "committer_date": 1572025509000, "content_id": "8db1cfac6d113c1e07c9e8b5a196413c6c3f998c", "detected_licenses": [ "MIT" ], "directory_id": "ac9f185ebeba4800ee24f9ce1da9e4006b2260e5", "extension": "py", "fi...
2.375
stackv2
#!/usr/bin/env python ########################################### # Duino-Coin wallet version 0.6.4 alpha # # https://github.com/revoxhere/duino-coin # # copyright by revox 2019 # ########################################### import time, socket, sys, os, configparser, tkinter, webbrowser import threa...
302
37.22
156
18
2,639
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e128b4a85ab0b8bf_d0694082", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 152 ]
[ null ]
[ 50 ]
[ 58 ]
2024-11-18T22:55:36.744805+00:00
1,581,323,143,000
f8f053d306d83d200d3aaaf72fbf9b7399dd9891
2
{ "blob_id": "f8f053d306d83d200d3aaaf72fbf9b7399dd9891", "branch_name": "refs/heads/master", "committer_date": 1581323143000, "content_id": "48403709cd32255781ee0b89b16673ecb940a03c", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "08e0779e88e601f15c806298198646d38be596a3", "extension": "p...
2.5
stackv2
""" Subset of repo2docker functionality focused on primarily Python projects. Supports the following files from repo2docker: 1. environment.yml 2. requirements.txt 3. runtime.txt 4. postBuild 5. start We try to re-use code from repo2docker wherever possible """ from traitlets.config import LoggingConfigurable, Appli...
126
32.82
113
17
1,017
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_92b90d36dcf829b9_62e6a5cb", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 107 ]
[ null ]
[ 13 ]
[ 43 ]
2024-11-18T23:23:59.723346+00:00
1,576,322,022,000
a4a755dc56fc8e35973f5535311791b8db7cffbe
3
{ "blob_id": "a4a755dc56fc8e35973f5535311791b8db7cffbe", "branch_name": "refs/heads/master", "committer_date": 1576322022000, "content_id": "09de43ac2ec5bf26a3adbf37a0fc906e5c863b89", "detected_licenses": [ "MIT" ], "directory_id": "666a7bbd6bc2b5fcae250fea4fbe56e3bccc1f5f", "extension": "py", "fi...
2.734375
stackv2
from flask import Flask, render_template, redirect, url_for, request, g import sqlite3 import hashlib app = Flask(__name__) def check_password(hashed_password, user_password): return hashed_password == hashlib.md5(user_password.encode()).hexdigest() def validate(username, password): con = sqlite3.connect('st...
43
29.63
77
16
265
python
[{"finding_id": "codeql_py/flask-debug_da203f9631cb400c_4b8f8c8d", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-327" ]
[ "py/flask-debug", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)]...
[ 43, 8 ]
[ null, null ]
[ 5, 43 ]
[ 24, 65 ]
2024-11-18T22:43:32.082274+00:00
1,625,449,693,000
c2edebc9bc5b5e586a801e22458b8b28419446b1
4
{ "blob_id": "c2edebc9bc5b5e586a801e22458b8b28419446b1", "branch_name": "refs/heads/main", "committer_date": 1625449693000, "content_id": "18b93f1b29b73c74489855aada0fcbe882b975d9", "detected_licenses": [ "MIT" ], "directory_id": "1f9673d769dac5deb55f684215b6dbf5087695ad", "extension": "py", "file...
4.28125
stackv2
from random import randint numero_secreto = randint(1, 10) cont = 0 while True: print('*' * 30) chute = int(input('Faça seu chute: ')) print('*' * 30) acertou = chute == numero_secreto maior = chute > numero_secreto menor = chute < numero_secreto cont += 1 if acertou: print(...
26
23.12
84
14
182
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_76f9a983082ef601_53bdee3e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 26 ]
[ null ]
[ 7 ]
[ 84 ]
2024-11-19T00:07:11.758788+00:00
1,457,382,475,000
e447c00c6a938d7ffebca8122d26975b22078e11
3
{ "blob_id": "e447c00c6a938d7ffebca8122d26975b22078e11", "branch_name": "refs/heads/master", "committer_date": 1457382475000, "content_id": "3842be6f7fdde9535efb74cac6170f1b4b11808e", "detected_licenses": [ "Apache-2.0" ], "directory_id": "81889c95119faf3b34a8b10d46ce7fd1ac5d39c6", "extension": "py"...
2.625
stackv2
#!/usr/bin/python # -*- coding: utf-8 -*- """ Extraction of phone numbers """ import re import itertools import math import extractor class ExtractPhoneNumber(extractor.Extractor): def human_name(self): return "simplephone" def name(self): return "phone" def version(self): ret...
88
26.76
88
16
683
python
[{"finding_id": "codeql_py/bad-tag-filter_5b7fc653d4621b94_94f5d614", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression does not match upper case <SCRIPT> tags.", "remediation": "", "location": {"file_path": ...
1
true
[ "CWE-116" ]
[ "py/bad-tag-filter" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression does not match upper case <SCRIPT> tags." ]
[ 30 ]
[ null ]
[ 30 ]
[ 53 ]
2024-11-19T00:07:16.397489+00:00
1,517,384,145,000
a7ad3f144e22ae2342203e275598be252f283a54
2
{ "blob_id": "a7ad3f144e22ae2342203e275598be252f283a54", "branch_name": "refs/heads/master", "committer_date": 1517384145000, "content_id": "b90994f6c46652c9acf0bcace6206135230ccf8d", "detected_licenses": [ "Apache-2.0" ], "directory_id": "42f56f2d560a9f556afe28a333f005c0b5255a33", "extension": "py"...
2.390625
stackv2
import os.path import os import time import tarfile import random from zipfile import ZipFile import redleader.util as util import botocore class ElasticBeanstalkManager(object): def __init__(self, context): self._context = context def upload_package(self, bucket_name, path, name): print("Uplo...
51
39.08
120
18
422
python
[{"finding_id": "codeql_py/overly-permissive-file_79156f2e0dcc9aa8_26ecc905", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to group readable.", "remediation": "", "location": ...
2
true
[ "CWE-732", "CWE-732" ]
[ "py/overly-permissive-file", "py/overly-permissive-file" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to group readable.", "Overly permissive mask in chmod sets file to group readable." ]
[ 39, 49 ]
[ null, null ]
[ 17, 9 ]
[ 67, 35 ]
2024-11-19T00:07:20.567305+00:00
1,693,308,663,000
e71407bee3f21eda92aeb818e8ce5b214424f9a4
2
{ "blob_id": "e71407bee3f21eda92aeb818e8ce5b214424f9a4", "branch_name": "refs/heads/master", "committer_date": 1693308663000, "content_id": "b2f87f5c8fc47693c51284bad4c40222305ddaee", "detected_licenses": [ "BSD-3-Clause", "MIT", "Apache-2.0" ], "directory_id": "2ea243502ad70d0300e30a5373a24bd...
2.4375
stackv2
import copy import logging import typing import requests import dacite import datetime import dateutil.parser from dataclasses import dataclass import cfg_mgmt import cfg_mgmt.model as cmm import ci.log import ci.util import model import model.btp_service_binding import model.container_registry ci.log.configure_defa...
220
32.3
97
21
1,567
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_033f7e4fa2056b72_971eaabd", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text." ]
[ 71, 73 ]
[ null, null ]
[ 26, 21 ]
[ 29, 61 ]
2024-11-19T00:33:33.761829+00:00
1,508,015,449,000
faa10b811a32401fde0f1e65a8b6146b899780f9
4
{ "blob_id": "faa10b811a32401fde0f1e65a8b6146b899780f9", "branch_name": "refs/heads/master", "committer_date": 1508015449000, "content_id": "1a9f0c39233bfcf50233835906cbe1321f09837d", "detected_licenses": [ "MIT" ], "directory_id": "7cef0dd32cd540d6d11a87ce6c999ef88b9f163d", "extension": "py", "fi...
3.953125
stackv2
# Hangman Game # Copyright (c) 2017 Brandon Marder. All Rights Reserved. # NOTE: THIS CONTAINS SIGNIFICANT SECURITY VULNERABILTIES IF RUNNING IN PYTHON 2.x # Import Modules # import sys import os from string import punctuation # Checks if letter is in secret word. Adds letter to correct letter list or # counts it as ...
182
32.93
102
15
1,381
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_329bdfbd0915c38b_bcd794e1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](...
[ 63, 122, 170 ]
[ null, null, null ]
[ 11, 19, 19 ]
[ 45, 23, 53 ]
2024-11-19T00:45:03.648874+00:00
1,604,392,697,000
1fa985a47eb2b981fc5c83dfa0e8064ed3a72817
3
{ "blob_id": "1fa985a47eb2b981fc5c83dfa0e8064ed3a72817", "branch_name": "refs/heads/master", "committer_date": 1604392697000, "content_id": "22afd3360c2cf58b31e5b77c1b665daba994f480", "detected_licenses": [ "MIT" ], "directory_id": "6a5478592743c63a17baa7dad0cff997c218da74", "extension": "py", "fi...
2.765625
stackv2
import json from jinja2 import Environment, FileSystemLoader def exp_description_highlight(experiments): """ Return highlighted JSON syntax in accordance tabs with experiment instances Args: experiments (List): The list of Experiment instances. Returns: HTML: Markup component with related...
33
28.36
83
12
195
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_4876e6efbfd12c14_35207289", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 15 ]
[ null ]
[ 11 ]
[ 42 ]
2024-11-19T00:45:03.999832+00:00
1,535,048,423,000
baec75cb4975f8ec2df1927a80ca5cd14e132cd6
2
{ "blob_id": "baec75cb4975f8ec2df1927a80ca5cd14e132cd6", "branch_name": "refs/heads/master", "committer_date": 1535048423000, "content_id": "a18f765942434f3e79f08208bb82fda86a754be6", "detected_licenses": [ "MIT" ], "directory_id": "970dac45e4f82c1e527966a47cfc96bd8cb68dad", "extension": "py", "fi...
2.5
stackv2
import argparse import base64 import logging import requests from requests.auth import HTTPBasicAuth from flask import Flask, request app = Flask(__name__) server = { 'server_url': '', 'api_token': '', 'devices': {}, } @app.route('/webhook', methods=['POST']) def webhook(): event = request.json ...
120
27.39
94
13
821
python
[{"finding_id": "codeql_py/log-injection_8fb0b85a16f6417a_7dd75627", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
3
true
[ "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 49, 51, 79 ]
[ null, null, null ]
[ 25, 25, 25 ]
[ 62, 63, 28 ]
2024-11-18T23:28:30.899593+00:00
1,564,044,718,000
a9c0bb495ea244ba15bf98af16efa9f0ab17556b
3
{ "blob_id": "a9c0bb495ea244ba15bf98af16efa9f0ab17556b", "branch_name": "refs/heads/master", "committer_date": 1564044718000, "content_id": "d767d12df9fc06dec25399528bd80b6ef577c7f6", "detected_licenses": [ "Apache-2.0" ], "directory_id": "cc2e207ad25813cee719a4c1cd8b52733ab05ccb", "extension": "py"...
2.640625
stackv2
import json import six from jinja2 import Template from leapp.utils.audit import get_messages def _flatten_dict(dict_): new_dict = {} if type(dict_) is not dict: return new_dict for k, v in six.iteritems(dict_): if type(v) == dict: new_dict.update(_flatten_dict(v)) e...
72
28.83
83
15
478
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_44d1d1c96114e043_5a0b6e71", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 69 ]
[ null ]
[ 20 ]
[ 69 ]
2024-11-18T23:40:00.690414+00:00
1,580,310,761,000
fafbb2cbdb39f31ab84886c9bada2279f098f8f7
3
{ "blob_id": "fafbb2cbdb39f31ab84886c9bada2279f098f8f7", "branch_name": "refs/heads/master", "committer_date": 1580310761000, "content_id": "e6f374547929778afef13e9050ec0071f1146f22", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "15a9937437fff9ef921547f067647a1c638ad2ed", "extension": "p...
3
stackv2
""" Base storage class. """ import os import redis import tarfile from collections.abc import MutableMapping from docserver.utils import logger from shutil import rmtree class Storage(MutableMapping): """Storage base class. This class takes care of initializing a Redis database, and providing an interface ...
183
37.18
119
19
1,356
python
[{"finding_id": "codeql_py/tarslip_4a55d1cbb444e5a8_5467037a", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 168 ]
[ null ]
[ 13 ]
[ 16 ]
2024-11-18T23:40:01.889437+00:00
1,437,696,053,000
582430e6cf890792bf3cb7758f47c7c89d3b0823
2
{ "blob_id": "582430e6cf890792bf3cb7758f47c7c89d3b0823", "branch_name": "refs/heads/master", "committer_date": 1437696053000, "content_id": "ef0885c5a4affa0ed3a6a0b80b40b066b97d527b", "detected_licenses": [ "MIT" ], "directory_id": "06097f44bd7dd1411233c23977346f79a2ea9f42", "extension": "py", "fi...
2.34375
stackv2
""" Traditional Web UI. """ from functools import wraps from flask import ( Blueprint, redirect, url_for, render_template, request, session, g ) from werkzeug.exceptions import BadRequest, Unauthorized from componentsdb.app import set_current_user_with_token from componentsdb.auth import user_for_google_id_token...
136
28.97
80
16
920
python
[{"finding_id": "codeql_py/url-redirection_b1fcb9e6a8a2def7_d1624caf", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
4
true
[ "CWE-601", "CWE-601", "CWE-601", "CWE-601" ]
[ "py/url-redirection", "py/url-redirection", "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 72, 78, 95, 104 ]
[ null, null, null, null ]
[ 25, 25, 21, 21 ]
[ 34, 34, 30, 30 ]
2024-11-19T00:05:01.547671+00:00
1,427,121,075,000
283d7f5ae1f041f0d25952e635ee3579ff122901
3
{ "blob_id": "283d7f5ae1f041f0d25952e635ee3579ff122901", "branch_name": "refs/heads/master", "committer_date": 1427121075000, "content_id": "e0f3b80285ad805459e19cdfbecfb8685cd84297", "detected_licenses": [ "Apache-2.0" ], "directory_id": "0e707796d25270337ca40bdfe45d2dc06c017b6b", "extension": "py"...
2.578125
stackv2
#coding:UTF-8 """ url自动化映射函数 @author:yubang """ """ ClearPycFile仅仅为了清除pyc文件 Action类封装基本的渲染模板和追加内容输出,不建议直接继承,生产环境建议自定义一个类继承该类,然后继承自定义类 BeforeMiddelAction类封装前置中间件,AfterMiddelAction类封装前置中间件 UrlHander为自动化加载action类,生产环境建议不要重复创建 """ import os,re,inspect,urllib,traceback class ClearPycFile(): def __init__(self,debug,...
306
30.46
111
23
2,229
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_788c4840d48a5cd8_00258a36", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 122 ]
[ 125 ]
[ 22 ]
[ 10 ]
2024-11-19T01:11:24.951183+00:00
1,497,763,104,000
a8b1e73217758e7492cb897c87f4c84a6d781132
3
{ "blob_id": "a8b1e73217758e7492cb897c87f4c84a6d781132", "branch_name": "refs/heads/master", "committer_date": 1497763104000, "content_id": "d775947ce635f3ae2da6294d73b267bca4fcfeb5", "detected_licenses": [ "MIT" ], "directory_id": "1612d6de699528cc7a7e4eb6e449aa26b11391de", "extension": "py", "fi...
2.765625
stackv2
from flask import Flask, abort, request from utilities.settings import Settings from BayesClassifierCore import BayesClassifierCore import json import time import requests app = Flask(__name__) @app.route('/') def hello_world(): """ :return: index """ return 'Hello World!' @app.route('/chatter', met...
47
29.04
107
18
343
python
[{"finding_id": "codeql_py/reflective-xss_9a9ecc6d10d5a542_b8693fb5", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 38 ]
[ null ]
[ 16 ]
[ 36 ]
2024-11-18T23:46:49.619607+00:00
1,532,025,431,000
3141a235ef7d79c990e937e37ec57c82fee7523b
3
{ "blob_id": "3141a235ef7d79c990e937e37ec57c82fee7523b", "branch_name": "refs/heads/master", "committer_date": 1532025431000, "content_id": "5ba2925d0ba36581e94ba611ce17f22894429ba3", "detected_licenses": [ "MIT" ], "directory_id": "610e2032a5f813f66e3c9e4a3308e0137a486512", "extension": "py", "fi...
3.375
stackv2
# solution to http://cryptopals.com/sets/2/challenges/12 # decrypts an unknown string appended to a chosen plaintext, encrypted in AES ECB mode import base64 import Challenge09 from Crypto.Cipher import AES from random import randint # generates a random sequence of bytes. length is determined by length argument (in...
168
43.27
132
18
1,860
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_6f01250d95ccb6b6_f7045c3c", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
1
true
[ "CWE-327" ]
[ "py/weak-cryptographic-algorithm" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 24 ]
[ null ]
[ 9 ]
[ 35 ]
2024-11-18T23:48:06.044667+00:00
1,623,774,112,000
79f15311b5e259982ffe06dd7b9e9b56798ed138
3
{ "blob_id": "79f15311b5e259982ffe06dd7b9e9b56798ed138", "branch_name": "refs/heads/master", "committer_date": 1623774112000, "content_id": "a7d9ebb814cb194123b8927fe6ca2c5598d22a21", "detected_licenses": [ "Unlicense" ], "directory_id": "d3f47bda52623a33f28b843c95c397a61b327208", "extension": "py",...
2.859375
stackv2
#! /usr/bin/env python3 import struct import tarfile import os.path as path from os import urandom, remove from Crypto.Cipher import AES from hashlib import sha256 __version__ = '21.6.15' DEFAULT_CHUNCK_SIZE = 256 * 1024 EXTENTION = '.pcrypt' DEFAULT_ENCRYPTED_FILENAME = 'b1gs3cr3t' + EXTENTION COLORS = { 'red...
324
36.32
120
20
2,787
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_600dd049461bc4d9_a54f5083", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
2
true
[ "CWE-327", "CWE-022" ]
[ "py/weak-sensitive-data-hashing", "py/tarslip" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e...
[ 202, 184 ]
[ null, null ]
[ 23, 32 ]
[ 40, 58 ]
2024-11-19T00:29:32.805433+00:00
1,517,640,246,000
142b28dbcd5c4f33589aab30cc6a31de306f4bbc
2
{ "blob_id": "142b28dbcd5c4f33589aab30cc6a31de306f4bbc", "branch_name": "refs/heads/master", "committer_date": 1517640246000, "content_id": "4f688d9b08deda256cb02e5affd5a635cc1fb272", "detected_licenses": [ "MIT" ], "directory_id": "a319229439f7d875c787f0c69cd183b449c61fd5", "extension": "py", "fi...
2.484375
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- # @Time : 2017/11/23 21:54 # @Author : 周星星 Siman Chou # @Site : https://github.com/simanchou # @File : receiver.py # @Description: 接收Alertmanager基于web_hook推送的告警内容,发送至微信公众号,实现微信告警。 # alertmanager中启用webhook设置如下: # 或参考prometheus官网https://prometheus.io/doc...
292
32.53
105
22
2,660
python
[{"finding_id": "codeql_py/request-without-cert-validation_9773e64b567888d7_9b3600e0", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 107, 166 ]
[ null, null ]
[ 9, 9 ]
[ 84, 106 ]
2024-11-19T00:29:34.265697+00:00
1,604,914,738,000
62f3c42e5c96ce176bf6de30cb7c6ef93507c403
2
{ "blob_id": "62f3c42e5c96ce176bf6de30cb7c6ef93507c403", "branch_name": "refs/heads/main", "committer_date": 1604914738000, "content_id": "db0dd625b1a9d4b0f0da2e31cb0e8128b6a0226d", "detected_licenses": [ "Apache-2.0" ], "directory_id": "3babec6cbda304ddd7f8bb87b968c27de2b19d76", "extension": "py", ...
2.390625
stackv2
#!/usr/bin/env python3 import rospy import paho.mqtt.client as mqtt import struct import socket from sensor_msgs.msg import NavSatFix import string class GPS(): def __init__(self): self.address = ('192.168.0.11', 4004) self.sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM) self.latitude = 0.0 self.lo...
104
26.38
77
15
824
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f562aaf3fb9bf06e_dda6ffe8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 37, 38 ]
[ null, null ]
[ 24, 25 ]
[ 44, 46 ]
2024-11-18T23:23:30.984575+00:00
1,619,338,651,000
44bfc374365f1bc3aba6f529eda811d35dfc8022
3
{ "blob_id": "44bfc374365f1bc3aba6f529eda811d35dfc8022", "branch_name": "refs/heads/master", "committer_date": 1619338651000, "content_id": "6c4bdc49badcc32592a62bc12bfcc70d7bf7302b", "detected_licenses": [ "MIT" ], "directory_id": "9eaeaf3652343ac18d85f1f02cd3223d3b43e60b", "extension": "py", "fi...
2.640625
stackv2
from flask import Flask, request, render_template, flash, redirect, url_for from werkzeug.utils import secure_filename from flask import Response import os import json from face_util import compare_faces, face_rec, find_facial_features, find_face_locations import re import pdb app = Flask(__name__) UPLOAD_FOLDER = 'r...
126
35.16
111
17
1,050
python
[{"finding_id": "codeql_py/flask-debug_368339467d36afa5_a021542b", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
6
true
[ "CWE-215", "CWE-1333", "CWE-601", "CWE-601", "CWE-601", "CWE-601" ]
[ "py/flask-debug", "py/polynomial-redos", "py/url-redirection", "py/url-redirection", "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings starting with '\\r\\n\\r\\n' and with many repetitions of '\\r\\n\\r\\na'.", "Untrusted URL redi...
[ 120, 68, 31, 38, 80, 85 ]
[ null, null, null, null, null, null ]
[ null, 85, 29, 29, 29, 29 ]
[ 49, 95, 40, 40, 40, 40 ]
2024-11-19T00:44:23.846218+00:00
1,587,458,618,000
97850bce659d6cfbabcb5c8b44c93af5b5919478
3
{ "blob_id": "97850bce659d6cfbabcb5c8b44c93af5b5919478", "branch_name": "refs/heads/master", "committer_date": 1587458618000, "content_id": "dc3d2a4e6e98b6b45601dfb08d6c948f5aa6a5e5", "detected_licenses": [ "MIT" ], "directory_id": "b2f9ca3bb68cd8ee79ea63bda388477eb40f661e", "extension": "py", "fi...
3.40625
stackv2
#!/usr/bin/env python3.6 from user import User from credentials import Credential # User def create_user(firstName, lastName, userName, email, password): """ Function create a new user """ new_user = User(firstName, lastName, userName, email, password) return new_user def save_user(user): """Fun...
194
36.22
152
26
1,294
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e24cff6f961b7ed3_028926d0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 152 ]
[ null ]
[ 39 ]
[ 152 ]
2024-11-18T23:05:25.585388+00:00
1,692,307,499,000
739f76a1550cefdcb6c6dfbbe98b6a00773fc102
2
{ "blob_id": "739f76a1550cefdcb6c6dfbbe98b6a00773fc102", "branch_name": "refs/heads/master", "committer_date": 1692307499000, "content_id": "c0f7e2c18117ffc0ec95a9821d472203f367bc00", "detected_licenses": [ "Apache-2.0" ], "directory_id": "2ae0b8d95d439ccfd55ea7933ad4a2994ad0f6c5", "extension": "py"...
2.46875
stackv2
# Copyright (C) 2018-2021 Intel Corporation # SPDX-License-Identifier: Apache-2.0 """ Gets info about users and groups via LDAP """ # pylint: disable=fixme,no-member import sys from enum import Enum from pathlib import Path from ldap3 import Server, Connection, ALL, SUBTREE sys.path.append(str(Path(__file__).resol...
247
37.27
100
22
2,106
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_48bf321f1cf8ab57_f0d599f3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 73 ]
[ null ]
[ 11 ]
[ 20 ]
2024-11-18T23:05:25.700659+00:00
1,551,723,957,000
ab7aaca1d2d4f5ca3b96ceaf973de732e491c3a3
3
{ "blob_id": "ab7aaca1d2d4f5ca3b96ceaf973de732e491c3a3", "branch_name": "refs/heads/master", "committer_date": 1551723957000, "content_id": "525a9f9580f8c9e256388a1320155702f079af81", "detected_licenses": [ "Apache-2.0" ], "directory_id": "60e7005913908143299a23cc10b738874451d024", "extension": "py"...
2.84375
stackv2
#!/usr/bin/env python3 import argparse import random import string from app import create_app, db from app.models import User app = create_app() app.app_context().push() PASS_LENGTH = 16 def main(): parser_desc = "Server-side utility to facilitate creating admins and toggling existing users to admins." parser_epil...
39
32.38
141
16
304
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_60fc8ee964edbabe_173cbf71", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 35 ]
[ null ]
[ 9 ]
[ 97 ]
2024-11-18T23:05:38.082046+00:00
1,494,795,800,000
112abf549cfe3aa86a3dadd0d6186f1dd5a5bc71
3
{ "blob_id": "112abf549cfe3aa86a3dadd0d6186f1dd5a5bc71", "branch_name": "refs/heads/master", "committer_date": 1494795800000, "content_id": "8d1c3d177b73a06aecee7ade60b50183b70e9353", "detected_licenses": [ "MIT" ], "directory_id": "b43472dac8c4119a909645346ff38104c284cc94", "extension": "py", "fi...
2.734375
stackv2
"""WebAUTH Class """ from http.client import CannotSendRequest from http.client import HTTPSConnection from http.client import HTTPConnection import json from socket import gaierror import ssl from time import sleep from urllib.parse import urlparse class WebAuth(object): """Represents WebAuth Process """ ...
101
29.45
72
15
620
python
[{"finding_id": "codeql_py/insecure-protocol_58c9d1e97d8519db_7bb76744", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 specified by [call to ssl.SSLContext](1).", "remediation": "", "lo...
1
true
[ "CWE-327" ]
[ "py/insecure-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Insecure SSL/TLS protocol version TLSv1 specified by [call to ssl.SSLContext](1)." ]
[ 82 ]
[ null ]
[ 23 ]
[ 66 ]
2024-11-18T23:05:42.956361+00:00
1,571,077,399,000
b3623a57ab63fabe961df80630faf87784abe322
3
{ "blob_id": "b3623a57ab63fabe961df80630faf87784abe322", "branch_name": "refs/heads/master", "committer_date": 1571077399000, "content_id": "91cf14e9881ff95274fe922c6dc00c0a14283a88", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "14f314d2bc2c880e3e65a504f3cd5278f9d8c8f2", "extension": "p...
2.578125
stackv2
__author__ = 'Gennady Kovalev <gik@bigur.ru>' __copyright__ = '(c) 2016-2019 Business group for development management' __licence__ = 'For license information see LICENSE' from dataclasses import InitVar, dataclass, field from hashlib import sha512 from typing import Optional, Union from uuid import uuid4 @dataclass...
60
27.97
73
17
434
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_ff58febadbacb193_912e2e8c", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally e...
[ 44 ]
[ null ]
[ 23 ]
[ 56 ]
2024-11-18T23:05:43.925489+00:00
1,554,787,802,000
cd505104d651b3ff2ca7dc71446070ac802cb498
2
{ "blob_id": "cd505104d651b3ff2ca7dc71446070ac802cb498", "branch_name": "refs/heads/master", "committer_date": 1554787802000, "content_id": "44677f6918fb7887e17159c1d75d8023b396d8bf", "detected_licenses": [ "Apache-2.0" ], "directory_id": "cb557e374349f48b47b2b211da0787d5c87a96b6", "extension": "py"...
2.4375
stackv2
#!flask/bin/python import logging import os.path import os import pandas as pd import pyarrow import xxhash from flask import Flask, jsonify, render_template, request, url_for, send_from_directory from aws import exists_on_s3, query_x_range, upload from squiggle import transform from helpers import downsample LOCAL ...
102
31.72
130
21
799
python
[{"finding_id": "codeql_py/flask-debug_0d1b6d4eb089bb57_04a5c324", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
5
true
[ "CWE-215", "CWE-022", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/flask-debug", "py/path-injection", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "HIGH", "HIGH", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).\nThis log entry depends on ...
[ 102, 67, 42, 83, 80 ]
[ null, null, null, null, null ]
[ 5, 33, 19, 23, 23 ]
[ 24, 71, 56, 64, 90 ]
2024-11-18T23:11:07.022597+00:00
1,635,597,341,000
11590c6d4405f28fca9cc5cd4b52bf07032e60c5
2
{ "blob_id": "11590c6d4405f28fca9cc5cd4b52bf07032e60c5", "branch_name": "refs/heads/main", "committer_date": 1635597341000, "content_id": "cb8e898b85e42c459a551ae2b00e4797ce08b0e9", "detected_licenses": [ "MIT" ], "directory_id": "4468fea1d7c0cecff6b4339f4c75285e4cf58340", "extension": "py", "file...
2.5
stackv2
import os import base64, pickle from flask import Flask, request app = Flask(__name__) @app.route("/") def index(): return 'Hello, World!' # RCE @app.route("/cmd", methods=["GET"]) def rce(): if request.args.get('c'): return os.popen(request.args.get('c')).read(), 200 return ':P', 400 # Unsa...
27
17.63
58
16
139
python
[{"finding_id": "codeql_py/command-line-injection_7d28ef5f14aa58ba_5c3416e7", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {...
2
true
[ "CWE-078", "CWE-502" ]
[ "py/command-line-injection", "py/unsafe-deserialization" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This command line depends on a [user-provided value](1).", "Unsafe deserialization depends on a [user-provided value](1)." ]
[ 17, 26 ]
[ null, null ]
[ 25, 18 ]
[ 46, 22 ]
2024-11-19T00:11:33.858315+00:00
1,629,879,032,000
085b57200cbf37bdf11db72681646fda18248083
3
{ "blob_id": "085b57200cbf37bdf11db72681646fda18248083", "branch_name": "refs/heads/main", "committer_date": 1629879032000, "content_id": "5c97dae0eac19ed5525d6c7b22aa449ae75eb66a", "detected_licenses": [ "Apache-2.0" ], "directory_id": "fcd07b5e8df40c002f7cf450d6ad844f5035c0da", "extension": "py", ...
2.65625
stackv2
import json import requests from time import time from tqdm import tqdm import pickle import pandas as pd def getUserNames(): url = 'https://raw.githubusercontent.com/KiranGershenfeld/VisualizingTwitchCommunities/CloudCompute/DataCollection/ChannelList.txt' data = requests.get(url).text.split('\n')[:-1] ...
166
26.98
135
17
1,052
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a811f91fe1c24b2f_42f93243", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text." ]
[ 32 ]
[ null ]
[ 11 ]
[ 15 ]
2024-11-19T00:11:37.047523+00:00
1,629,835,727,000
9cff2dbbeeab43c0f060f0875a34e59ab0ad357a
3
{ "blob_id": "9cff2dbbeeab43c0f060f0875a34e59ab0ad357a", "branch_name": "refs/heads/master", "committer_date": 1629835727000, "content_id": "44025814436e285a33322153377dbb648c02b4a7", "detected_licenses": [ "MIT" ], "directory_id": "a542565014eb3a148ed87a537e48afea0d545f47", "extension": "py", "fi...
2.953125
stackv2
""" -------------------------------------------------------------------------------- Title: Creation of binary labs analysis table for IBD cohort for flare project Author: Ryan Gan Date Created: 2020-01-30 Purpose: The propose of this script is to join the visits, flares, categorical labs, demographics, and immunosupp...
177
31.41
80
21
1,353
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_0b30b4f60e472038_3153e267", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 79 ]
[ null ]
[ 17 ]
[ 35 ]
2024-11-19T00:11:41.264567+00:00
1,611,325,015,000
3ad788d4be20948893190bc14c31a7a774170cc2
2
{ "blob_id": "3ad788d4be20948893190bc14c31a7a774170cc2", "branch_name": "refs/heads/main", "committer_date": 1611325015000, "content_id": "0f2a3ae690ee895c7785ee54c3823e0d3bb9999b", "detected_licenses": [ "MIT" ], "directory_id": "47826ac8d3b194e75a62b0a2e2521ddb7deb702e", "extension": "py", "file...
2.375
stackv2
from datetime import datetime import json import requests from ec2_metadata import ec2_metadata import boto3 import urllib3 urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning) JUPYTER_PORT = '8443' IDLE_TIME = 2400 def get_uptime(): with open('/proc/uptime', 'r') as f: uptime_seconds = float(f.r...
57
20.33
89
17
317
python
[{"finding_id": "codeql_py/request-without-cert-validation_cc8240c30545d1f5_ea038c1e", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 22 ]
[ null ]
[ 14 ]
[ 90 ]
2024-11-19T00:36:59.138712+00:00
1,618,594,703,000
a9c083f78af2f03baa974d8aa22e1042427a9af3
3
{ "blob_id": "a9c083f78af2f03baa974d8aa22e1042427a9af3", "branch_name": "refs/heads/main", "committer_date": 1618594703000, "content_id": "38e727da3805ed3d8813e5215cae48a6f123d867", "detected_licenses": [ "MIT" ], "directory_id": "3a877f1c2cdb4d499724bdc31de4e4b4b6ffe4c0", "extension": "py", "file...
2.75
stackv2
import markdown import subprocess import os from modules import mylogger as ml import jinja2 from pathlib import Path class ReportMaker(): def __init__(self,base_path="results/",file="report.html"): self.base_path = base_path self.file = file self.filename = os.path.join(self.base_path,self...
39
27.08
70
13
240
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_3ff9db2018e61e0f_42407a3f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 26 ]
[ null ]
[ 20 ]
[ 49 ]
2024-11-19T01:02:11.114260+00:00
1,525,201,523,000
eab0c829e3a78d999082b0fdc8dba005ad263631
3
{ "blob_id": "eab0c829e3a78d999082b0fdc8dba005ad263631", "branch_name": "refs/heads/master", "committer_date": 1525201523000, "content_id": "6995ac2a57ed7e86204cdd4b99c91f08f26315b2", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "0c6c4c2efb279293e1610ab3f44ef2489ed4c2a7", "extension": "p...
2.671875
stackv2
import string import datetime import pandas as pd import numpy as np import os import re def path_generator(year, month, place, amedas_root): AtoZ = string.ascii_uppercase[0:27] AtoZ = str(AtoZ) zeroto_z = str(0) + str(123456789) + AtoZ fmt = "{year}_{1or2}/AM10{year_2:02d}{month_2:02d}/A{year_1}{mont...
99
37.61
134
19
1,141
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8c169efe23b026a4_a94cac65", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 91 ]
[ null ]
[ 23 ]
[ 28 ]
2024-11-19T01:02:28.314075+00:00
1,548,149,141,000
486eba32ef486258d61a16c24d2cc7cf0cdb0fbf
4
{ "blob_id": "486eba32ef486258d61a16c24d2cc7cf0cdb0fbf", "branch_name": "refs/heads/master", "committer_date": 1548149141000, "content_id": "4fea16ae93f4da93ded5c97c4d017c437dc34cb1", "detected_licenses": [ "MIT" ], "directory_id": "be021a43829d0748fd17fd06a6555d94e0dc82c5", "extension": "py", "fi...
3.578125
stackv2
class BankAccount: __password = "12345" _balance = 5000 name = "Egor" number = 123 def printBalance(self, password, balance): if (password == self.__password): self._balance = balance print("Новый баланс счёта:", self._balance) else: print("Неверн...
36
23.11
55
13
245
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3bacff00fd93df79_d7a108b2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 24 ]
[ null ]
[ 36 ]
[ 51 ]
2024-11-19T01:02:29.379941+00:00
1,438,562,709,000
a05f05b1ff6f186a891bf9d7fb2743b38358ff3b
2
{ "blob_id": "a05f05b1ff6f186a891bf9d7fb2743b38358ff3b", "branch_name": "refs/heads/master", "committer_date": 1438562709000, "content_id": "0258275cdfdb77841df04769c132b4dafee106e8", "detected_licenses": [ "MIT" ], "directory_id": "0017dce9d98f8836912ebed5bd8301faa8ee282d", "extension": "py", "fi...
2.421875
stackv2
import argparse import select import socket import ssl import connection import signer PROTOCOL = 'h2-14' # The method that kicks everything off def start_up(args): # Spin up the signer ca = signer.CertificateAuthority() context = ssl.SSLContext(ssl.PROTOCOL_SSLv23) context.load_cert_chain(ca[b'local...
52
25.79
67
12
333
python
[{"finding_id": "codeql_py/insecure-protocol_debf82fed0aa46fe_aa127e51", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol...
1
true
[ "CWE-327" ]
[ "py/insecure-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.SSLContext](1)." ]
[ 27 ]
[ null ]
[ 12 ]
[ 19 ]
2024-11-18T23:48:37.838836+00:00
1,627,122,811,000
66c98dcaefd14e5ed1818cb1e7696277921aedd0
3
{ "blob_id": "66c98dcaefd14e5ed1818cb1e7696277921aedd0", "branch_name": "refs/heads/main", "committer_date": 1627122811000, "content_id": "5ddb47f16077e974925a3cc3e79cace2e1ce70f0", "detected_licenses": [ "MIT" ], "directory_id": "971d0177cf0dbe0596d340dac9967654fd2dfb1b", "extension": "py", "file...
2.96875
stackv2
import base64 from configparser import ConfigParser import bcrypt import Cred import os from cryptography.fernet import Fernet from cryptography.hazmat.primitives import hashes from cryptography.hazmat.primitives.kdf.pbkdf2 import PBKDF2HMAC # Global Variables filepath = f'{os.getcwd()}/CredManager' masterSection = '...
135
31.1
105
16
989
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c01ff536614950c2_d5e6d9b0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 131 ]
[ null ]
[ 15 ]
[ 42 ]
2024-11-18T23:48:42.653980+00:00
1,541,587,891,000
56a97b199a10ef13cba0296b278e65ef78670cd8
3
{ "blob_id": "56a97b199a10ef13cba0296b278e65ef78670cd8", "branch_name": "refs/heads/master", "committer_date": 1541587891000, "content_id": "e8e0c956e30f5a9d74eed8a41af9325149d613d2", "detected_licenses": [ "Apache-2.0" ], "directory_id": "29e9de2874c56bb4f3ed4045b6d7f13e36089cf1", "extension": "py"...
2.5625
stackv2
import hashlib from flask import request, jsonify, session from flask_restful import Resource, marshal_with, fields from App.models import User, db def md5(pas): md5 = hashlib.md5() md5.update(pas.encode('utf-8')) return md5.hexdigest() user_field = { 'id':fields.Integer, 'name':fields.String,...
227
22.14
62
15
1,294
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_210b704e87851a6f_8b8d6dce", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi...
[ 12 ]
[ null ]
[ 16 ]
[ 35 ]
2024-11-18T23:48:43.816802+00:00
1,685,819,887,000
df943c49bc5ec58fcb13ef8449c04a53935936b5
2
{ "blob_id": "df943c49bc5ec58fcb13ef8449c04a53935936b5", "branch_name": "refs/heads/master", "committer_date": 1685819887000, "content_id": "b8a0fcd743b62b1ea18ff8c6556fefb02f1c6153", "detected_licenses": [ "MIT" ], "directory_id": "17d1dd534dc2703d4847e50410c1fc86dd9d8040", "extension": "py", "fi...
2.5
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- import re import sys from rachetwrench.c.keywords import keywords_list whitespace = re.compile(r"[\r\n \t\v\f]", re.DOTALL | re.MULTILINE) identifier = re.compile(r"[_a-zA-Z][_a-zA-Z0-9]*") decimal_constant = re.compile(r'[1-9][0-9]*') hexadecima...
397
23.34
99
18
2,354
python
[{"finding_id": "codeql_py/redos_a3cc5b8fb4a8de92_fa022001", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with ''' and containing many repetition...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with ''' and containing many repetitions of '\\\\&'." ]
[ 31 ]
[ null ]
[ 48 ]
[ 62 ]
2024-11-18T23:50:20.311972+00:00
1,474,317,437,000
a668fb9e0e22150367efe694a095d2654101bae5
3
{ "blob_id": "a668fb9e0e22150367efe694a095d2654101bae5", "branch_name": "refs/heads/master", "committer_date": 1474317437000, "content_id": "a712dcd628235e64e2bf3a378f7ccac5bdf06079", "detected_licenses": [ "MIT" ], "directory_id": "5caa8cbe873c2ea43c206cdce33f4e7dd5801a00", "extension": "py", "fi...
2.90625
stackv2
__author__ = 'Xplore' # Cyberaom brute force Script import urllib import time import datetime import urllib2 import sys import xml.dom.minidom as XML trst = {} userid=[] start=int(raw_input("Enter the starting Roll:")) end=int(raw_input("Enter the last Roll:")) for s in range(start,end+1): userid.append(s) filen...
92
24.02
94
18
567
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_d20a7d25c532754b_06f13d5b", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 76 ]
[ null ]
[ 30 ]
[ 52 ]
2024-11-19T01:51:52.326124+00:00
1,669,749,418,000
c40b6da317d4297a1a4be50228a0c4cf4632daba
4
{ "blob_id": "c40b6da317d4297a1a4be50228a0c4cf4632daba", "branch_name": "refs/heads/master", "committer_date": 1669749418000, "content_id": "4e0576aec823bf00a9214faad52a103b8864d45d", "detected_licenses": [], "directory_id": "2296bb6d628d08f59516de14487b8f87fec09bfb", "extension": "py", "filename": "00_...
3.828125
stackv2
def make_call(phone_num:str): """ function to call a phone number Inputs: phone_num (str): a phone number to call Outputs: No output (prints to the screen instead) """ print("Making phone call to {}...number dialed.".format(phone_num)) print("Survey issued.\nCall Complete....
23
20.61
71
10
158
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_32ab4bcf9309daea_f4fcd7e6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 12 ]
[ null ]
[ 11 ]
[ 71 ]
2024-11-19T01:52:01.625222+00:00
1,671,135,048,000
6d042e62bd4a5fdcc496d905a2312c0a531a5d4f
3
{ "blob_id": "6d042e62bd4a5fdcc496d905a2312c0a531a5d4f", "branch_name": "refs/heads/master", "committer_date": 1671135048000, "content_id": "c3e0906ea698d1a52b6afafd554bf13dafdc5244", "detected_licenses": [ "MIT" ], "directory_id": "8d6657c4982fcb6a1d055134c091f2857bfbec03", "extension": "py", "fi...
2.71875
stackv2
from flask import Flask, redirect, url_for, request app = Flask(__name__) user_list = [ 'roozbeh' , 'alborz'] @app.route('/success/<name>') def success(name): return 'welcome %s' % name @app.route('/failure/<cause>') def failure(cause): return "you are not logged in because " + cause @app.route('/login',meth...
29
27.79
75
14
215
python
[{"finding_id": "codeql_py/flask-debug_53e9ad19d41aa2fc_f4b77fc4", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-079", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 29, 8, 12 ]
[ null, null, null ]
[ 5, 11, 12 ]
[ 31, 30, 52 ]
2024-11-19T01:52:03.833822+00:00
1,588,959,417,000
f81d89fd60bd118700f95bca64be3af1fd7cc39e
4
{ "blob_id": "f81d89fd60bd118700f95bca64be3af1fd7cc39e", "branch_name": "refs/heads/master", "committer_date": 1588959417000, "content_id": "789a696e0392ca54164aa588930e5c741c44f133", "detected_licenses": [ "Apache-2.0" ], "directory_id": "f985519c9b45945961860792ae7df2923054ecc6", "extension": "py"...
3.796875
stackv2
import json # TODO: allow the functions to pass the parsed information to the database # helper function that takes in a list of dicts representing each individual employee, and returns a list of the employees name and their emails def parse_data(data: []): # dictionary that maps each employee ID: int to a tuple ...
24
37.79
144
13
205
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e1ae3b5db861b5ee_f634232e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 24 ]
[ null ]
[ 11 ]
[ 81 ]
2024-11-19T00:55:26.556597+00:00
1,558,323,539,000
df0c455b0e426639f6db879e459ba3dec413efd2
2
{ "blob_id": "df0c455b0e426639f6db879e459ba3dec413efd2", "branch_name": "refs/heads/master", "committer_date": 1558323539000, "content_id": "a2f7fb98854fafc6b783bbffb4ae2de9e9d8d503", "detected_licenses": [ "MIT" ], "directory_id": "0f09b13331583d884b0408fdaacbc787f41bf1c4", "extension": "py", "fi...
2.453125
stackv2
# -*- coding: utf-8 -*- # !/usr/bin/env python """ ------------------------------------------------- File Name: GetConfig.py Description : fetch config from config.ini Author : JHao date: 2016/12/3 ------------------------------------------------- Change Activity: 2...
105
25.28
81
15
653
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_62f5c2180e6b8017_2b1dd2f6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 105 ]
[ null ]
[ 11 ]
[ 25 ]
2024-11-18T23:43:09.331950+00:00
1,635,029,672,000
b74470995731180f36b1cf868fec0b1d56fcde95
2
{ "blob_id": "b74470995731180f36b1cf868fec0b1d56fcde95", "branch_name": "refs/heads/main", "committer_date": 1635029672000, "content_id": "40d5eb91771ca831f53b7e9a0ae61c2f915b2f4a", "detected_licenses": [ "MIT" ], "directory_id": "4bf2f5b6b6b2f685fdeb9bcabcd7befd7d4b2db1", "extension": "py", "file...
2.40625
stackv2
import base64 import hashlib from jinja2 import Environment, FileSystemLoader import json import os class DockerLabelHandler: def __init__(self, label): self.__label_base = label def create(self, key): if isinstance(key, str): return "{}.{}".format(self.__label_base, key) ...
146
31.86
93
25
957
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_ba0db52e9e5a6e42_4a307e63", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 54 ]
[ null ]
[ 15 ]
[ 46 ]
2024-11-18T23:43:34.814990+00:00
1,585,454,411,000
1ce62b897c2b0922473a92dea0a00c46bbae555d
2
{ "blob_id": "1ce62b897c2b0922473a92dea0a00c46bbae555d", "branch_name": "refs/heads/master", "committer_date": 1585454411000, "content_id": "fafe2f44fa09d0be3e0f2b218c56aeb8780ed9fe", "detected_licenses": [ "MIT" ], "directory_id": "2979e91e95d912683607f9c82a367b593a603b68", "extension": "py", "fi...
2.328125
stackv2
import pickle from sqlalchemy import MetaData, Table from sqlalchemy.dialects.mysql import insert from selenium import webdriver from weibo.Connect_mysql import Connect import re import time import random import pymysql import datetime def getinfo(conn, driver, uid, table): time.sleep(2) driver.get('https://w...
205
33.74
127
16
2,084
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4f6383ed60143878_caffee58", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 79, 80 ]
[ null, null ]
[ 55, 27 ]
[ 67, 49 ]
2024-11-19T01:18:00.625759+00:00
1,481,609,707,000
0fb8db405a3e57b0accaa8622834447dff45967a
3
{ "blob_id": "0fb8db405a3e57b0accaa8622834447dff45967a", "branch_name": "refs/heads/master", "committer_date": 1481609707000, "content_id": "2c8eafd4eff8ac6bcb1ffd4c3b513f98add2704d", "detected_licenses": [ "MIT" ], "directory_id": "e158deca51eb67f601f806867d703e4fb68dbdd3", "extension": "py", "fi...
2.78125
stackv2
from tornado.web import RequestHandler, Application, url class MainHandler(RequestHandler): def get(self): self.write('<a href="%s">link to story 1</a>' % self.reverse_url("story", "1")) class StoryHandler(RequestHandler): def initialize(self, db): self.db = db def get(...
18
27.5
69
13
129
python
[{"finding_id": "codeql_py/reflective-xss_a073a5c5d4976a20_fc1f3f6f", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 13 ]
[ null ]
[ 20 ]
[ 49 ]
2024-11-19T01:18:01.208962+00:00
1,540,483,367,000
eac7c381f674fdef1058c6271f3f331aa02b09fb
2
{ "blob_id": "eac7c381f674fdef1058c6271f3f331aa02b09fb", "branch_name": "refs/heads/master", "committer_date": 1540483367000, "content_id": "5c2507f46847f43bc9fd82f161c7dd962a279036", "detected_licenses": [ "MIT" ], "directory_id": "2f353c2e384cf40a159f0bacc7fe09dca2d07494", "extension": "py", "fi...
2.5
stackv2
import os import sys import pickle import tarfile import h5py import urllib.request import numpy as np DATA_URL = 'http://www.cs.toronto.edu/~kriz/cifar-10-python.tar.gz' def maybe_download_and_extract(dest_directory): if not os.path.exists(dest_directory): os.makedirs(dest_directory) filename = DAT...
80
38.14
79
18
980
python
[{"finding_id": "codeql_py/tarslip_589234e2fb93d0cc_98323e1f", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 28 ]
[ null ]
[ 9 ]
[ 39 ]
2024-11-19T00:15:31.545470+00:00
1,505,465,579,000
feec1e8c137c85156d11f60354f98888697bca2e
2
{ "blob_id": "feec1e8c137c85156d11f60354f98888697bca2e", "branch_name": "refs/heads/master", "committer_date": 1505465579000, "content_id": "35b800eff95a5cf94ca0f7e6cced835e2368da81", "detected_licenses": [ "MIT" ], "directory_id": "c001af97a6e93398a6cf451839407e4869d59097", "extension": "py", "fi...
2.4375
stackv2
# MIT License # # Copyright (c) 2017 Felix Simkovic # # Permission is hereby granted, free of charge, to any person obtaining a copy # of this software and associated documentation files (the "Software"), to deal # in the Software without restriction, including without limitation the rights # to use, copy, modify, merg...
168
31.94
102
17
1,307
python
[{"finding_id": "codeql_py/overly-permissive-file_d33703a7e84257a1_d433f9c1", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ...
2
true
[ "CWE-732", "CWE-732" ]
[ "py/overly-permissive-file", "py/overly-permissive-file" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world writable.", "Overly permissive mask in chmod sets file to world writable." ]
[ 80, 118 ]
[ null, null ]
[ 5, 5 ]
[ 28, 28 ]
2024-11-19T00:15:31.649078+00:00
1,560,344,304,000
f1dcc6702cf7ef87186eb9d35a2c6649e0e19e7b
3
{ "blob_id": "f1dcc6702cf7ef87186eb9d35a2c6649e0e19e7b", "branch_name": "refs/heads/master", "committer_date": 1560344304000, "content_id": "a60a560c347294d2907bfd6e5de815285ad477a6", "detected_licenses": [ "MIT" ], "directory_id": "2983cf3018bbb45725662898040a3db4046334c8", "extension": "py", "fi...
2.890625
stackv2
from flask import Flask, render_template, request, jsonify import requests app = Flask(__name__) @app.route('/', methods=['GET', 'POST']) def index(): errors = [] results = {} if request.method == "POST": # get url that the user has entered try: age = int(request.form['age']) ...
50
28.3
83
15
322
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bc4cbc313bb0434b_ce6c8ca0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
2
true
[ "CWE-312", "CWE-215" ]
[ "py/clear-text-logging-sensitive-data", "py/flask-debug" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger." ]
[ 17, 50 ]
[ null, null ]
[ 19, 5 ]
[ 25, 51 ]
2024-11-19T00:15:31.694421+00:00
1,576,151,923,000
e9900a1d659ba59236250af394bdb14a55118ebd
2
{ "blob_id": "e9900a1d659ba59236250af394bdb14a55118ebd", "branch_name": "refs/heads/master", "committer_date": 1576151923000, "content_id": "451e0cd201e0caf7ba8947900e43eece248b0b48", "detected_licenses": [ "MIT" ], "directory_id": "bc246f813e12a50799300b4be4519b77a94790bb", "extension": "py", "fi...
2.390625
stackv2
# -*- coding: utf-8 -*- """Console script for slimstaty.""" import sys import click import os from jinja2 import Environment, PackageLoader, Template from .slimstaty import StateMachine, render from . import util @click.command() @click.option('--statemachine', help='State Machine Definition (yaml).', ...
93
35.46
95
15
745
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_11a099ec17aaae2f_d64ef197", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 28 ]
[ 31 ]
[ 11 ]
[ 40 ]
2024-11-19T00:25:38.034340+00:00
1,673,955,492,000
317ff94d05527b326eca0fd1a74af74cdaa8185d
2
{ "blob_id": "317ff94d05527b326eca0fd1a74af74cdaa8185d", "branch_name": "refs/heads/master", "committer_date": 1673955492000, "content_id": "de707cfa81b987727d0f89e53d56e28243e7d93f", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "36f14818a08dbf4d62c8b67dd640857f599b8a96", "extension": "p...
2.359375
stackv2
## Example Code for Auth/token import requests import sys # disable warnings from SSL/TLS certificates requests.packages.urllib3.disable_warnings() sdwan_url = 'https://10.10.20.90/j_security_check' sdwan_credentials = {'j_username':'admin', 'j_password':'C1sco12345'} session = requests.session() response = session...
38
23.37
76
11
251
python
[{"finding_id": "codeql_py/request-without-cert-validation_e64c8e1aea1e2171_46ef49f5", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 13 ]
[ null ]
[ 12 ]
[ 77 ]
2024-11-19T00:25:38.556028+00:00
1,420,012,021,000
a92f96a4a0204c337c2e24f7c6c9d9fe49eb8ce7
3
{ "blob_id": "a92f96a4a0204c337c2e24f7c6c9d9fe49eb8ce7", "branch_name": "refs/heads/master", "committer_date": 1420012021000, "content_id": "5e82e47519cd47811d5bbbd5b78b21cbce9ec15c", "detected_licenses": [ "MIT" ], "directory_id": "2c7fab0e34f1e63620d6212ee448809cdfcdc354", "extension": "py", "fi...
2.65625
stackv2
# This is a client to readtags data from ID3 tags and POST the data to the mushme database # @Author rootavish, copyright the DBMS team, 2014 import os import sys #To create a json to throw at the server import json #To encode the image into the json import base64 #For the network capabilities import urllib2 import ...
105
28.93
124
21
717
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_a2b3bd720634f4b3_3b278864", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 88 ]
[ null ]
[ 41 ]
[ 99 ]
2024-11-19T01:02:36.983661+00:00
1,616,391,536,000
f4a7e7df9ddfef6f59fd6770450e209784e44573
2
{ "blob_id": "f4a7e7df9ddfef6f59fd6770450e209784e44573", "branch_name": "refs/heads/master", "committer_date": 1616391536000, "content_id": "1362a8cc897cb6611c3984e670253a3439aa69d0", "detected_licenses": [ "MIT" ], "directory_id": "5323fe1598842754cdef00735516f84aad1f6669", "extension": "py", "fi...
2.359375
stackv2
#!/usr/bin/env python # -*- conding: utf-8 -*- from os import path from IPython.display import HTML, display from jinja2 import Environment, PackageLoader class Sparkline(object): def __init__(self): self.env = Environment(loader=PackageLoader('ipython_sparkline', 'template', encoding='utf8')) def s...
17
28.24
102
16
115
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_3ac0cdd7a045074b_e277ecc1", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 11 ]
[ null ]
[ 20 ]
[ 103 ]
2024-11-19T01:02:45.000608+00:00
1,420,798,180,000
b38a17c6da9af540eff08b235154cb84426b312f
3
{ "blob_id": "b38a17c6da9af540eff08b235154cb84426b312f", "branch_name": "refs/heads/master", "committer_date": 1420798180000, "content_id": "455f4640837ff7dda4a3b7a9f637732a53997181", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "299aaafe6289e0fd89948c700a72cb4a547dfb6b", "extension": "p...
2.921875
stackv2
import re import six from .compat \ import \ izip_longest from .errors \ import \ InvalidVersion from .version \ import \ Version _EPOCH_RE = re.compile("\d") _UPSTREAM_VERSION_RE = re.compile("\d[a-zA-Z0-9.+-:~]*") _DEBIAN_REVISION_RE = re.compile("[a-zA-Z0-9+.~]+") _DIGITS_NO...
177
28.06
98
16
1,170
python
[{"finding_id": "codeql_py/overly-large-range_ccda013b7d663bff_59dfa857", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with 0-9 in the same character class, and is equivalent to \\[+...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with 0-9 in the same character class, and is equivalent to \\[+,\\-.\\/0-9:\\]." ]
[ 17 ]
[ null ]
[ 49 ]
[ 52 ]
2024-11-19T01:30:53.000250+00:00
1,635,663,729,000
87721c4dace3eb6e776614ee35fa4a73fcb75c0a
3
{ "blob_id": "87721c4dace3eb6e776614ee35fa4a73fcb75c0a", "branch_name": "refs/heads/master", "committer_date": 1635663729000, "content_id": "a8fdecf347a6fd65908fe2797c258518f0e6588f", "detected_licenses": [ "MIT" ], "directory_id": "b15b088a185d23abd2754d5466c03c271cc64bf1", "extension": "py", "fi...
2.515625
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- import re import sys import hashlib import collections import multiprocessing ''' This script tries to fvck these various esoteric hard-to-process user database dump or leak files. Format: username <TAB> email <TAB> password <TAB> md5 ''' md5hash = lambda s: hashlib.md5...
119
28
80
20
859
python
[{"finding_id": "codeql_py/overly-large-range_18234e19d923702d_3e94675b", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[\\n\\u000b\\u000c\\r\\u000e\\u000f\\u0010\\u0011\\u0...
3
true
[ "CWE-020", "CWE-312", "CWE-327" ]
[ "py/overly-large-range", "py/clear-text-logging-sensitive-data", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[\\n\\u000b\\u000c\\r\\u000e\\u000f\\u0010\\u0011\\u0012\\u0....", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as cle...
[ 21, 119, 17 ]
[ null, null, null ]
[ 27, 19, 33 ]
[ 30, 25, 50 ]
2024-11-19T01:55:00.147433+00:00
1,507,728,636,000
b264a70d2b8d1dde62220a8dfafdb59fca58db50
3
{ "blob_id": "b264a70d2b8d1dde62220a8dfafdb59fca58db50", "branch_name": "refs/heads/master", "committer_date": 1507728636000, "content_id": "ef8bdf93038684796d96bf0bfa78b3089a532535", "detected_licenses": [ "Apache-2.0" ], "directory_id": "325054f6adacc39441d58ee2c203b07c44df7353", "extension": "py"...
2.53125
stackv2
#! /usr/local/bin/python3.5 import cgi, cgitb, re, sys cgitb.enable() print ('Content-type: text/html \n') print ('<html>') print ('<head>') print ('<title>Web Client Serer Example - Query Responder </title>') print ('</head>') print ('<body>') print ("<H1>Web Technologies ICT2 Preferences Query Results </H1>") regf...
82
26.11
164
14
531
python
[{"finding_id": "codeql_py/regex-injection_22242e0872aaf44a_2500e700", "tool_name": "codeql", "rule_id": "py/regex-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This regular expression depends on a [user-provided value](1) and is executed by [re.search](2).", "remed...
1
true
[ "CWE-730" ]
[ "py/regex-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression depends on a [user-provided value](1) and is executed by [re.search](2)." ]
[ 38 ]
[ null ]
[ 26 ]
[ 36 ]
2024-11-18T23:54:12.868862+00:00
1,613,080,028,000
d45e3ebbe82dcdcc69296355e0fb6032d8397612
3
{ "blob_id": "d45e3ebbe82dcdcc69296355e0fb6032d8397612", "branch_name": "refs/heads/main", "committer_date": 1613080028000, "content_id": "f14094bb443ae6a97cd974d78343dc6107832388", "detected_licenses": [ "MIT" ], "directory_id": "fd5d7b45cd1b1ab603c39ff1449776721eaa9b0f", "extension": "py", "file...
2.921875
stackv2
""" The main module for client's application. Includes parser for command line arguments and the main loop. The main loop works the following way: Launches the app. If there's no nickname provided, prompts the login dialog. Otherwise generates the public key (in case it's the first launch), opens a client's socket and ...
151
27.85
84
15
991
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c7e4738b0ed37ce1_cca2d386", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 96 ]
[ 99 ]
[ 9 ]
[ 34 ]
2024-11-19T02:00:49.313703+00:00
1,608,052,939,000
4d6ff1f7b1009c2e76873d4ee6fd840ba9cf95f5
3
{ "blob_id": "4d6ff1f7b1009c2e76873d4ee6fd840ba9cf95f5", "branch_name": "refs/heads/main", "committer_date": 1608052939000, "content_id": "9ef0057610cda733db807522c2ebbe1e74d32e57", "detected_licenses": [ "MIT" ], "directory_id": "fa27041fe8f82971af6114d1eed2be03b5d3be51", "extension": "py", "file...
3.203125
stackv2
from pathlib import Path import re from dataclasses import dataclass MATCHER = re.compile(r"^(\d+)\-(\d+) (\S+): (\S+?)$") @dataclass() class PasswordEntry: min_count: int max_count: int target_char: str password_candidate: str def line_to_password_entry(line: str) -> PasswordEntry: match = MAT...
47
25.11
82
13
305
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f9617cced93819c0_8c39d094", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 37, 47 ]
[ null, null ]
[ 18, 18 ]
[ 33, 33 ]
2024-11-19T00:04:33.034227+00:00
1,498,097,282,000
b430bbaea26526196cb35cdbf4463a619dfc0917
2
{ "blob_id": "b430bbaea26526196cb35cdbf4463a619dfc0917", "branch_name": "refs/heads/master", "committer_date": 1498097282000, "content_id": "f4802fd9559ad7a042dacde132abd1eae7e051bf", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "643aec9b87ade6dcb866af139ff2dcb4b6fdc177", "extension": "p...
2.328125
stackv2
import requests from requests.exceptions import ConnectionError from concurrent.futures import ThreadPoolExecutor from multiprocessing import cpu_count from bs4 import BeautifulSoup as beautifulsoup import re from core import Action import itertools from datetime import datetime, timedelta import urllib3 urllib3.disa...
269
35.97
79
18
2,109
python
[{"finding_id": "codeql_py/request-without-cert-validation_f6278c0a83acb616_ea589e76", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1) by [this value](2)." ]
[ 203 ]
[ 207 ]
[ 30 ]
[ 66 ]
2024-11-19T00:40:10.066993+00:00
1,686,972,697,000
0b756f22ad6b818795ff895c53a2ee0511732c5f
2
{ "blob_id": "0b756f22ad6b818795ff895c53a2ee0511732c5f", "branch_name": "refs/heads/master", "committer_date": 1686972697000, "content_id": "9b1a99974731144f28f4b0f3f1c90fddc9fd9711", "detected_licenses": [ "MIT" ], "directory_id": "351d82f9b76b2e2b7f2543449599db3defb0a7ec", "extension": "py", "fi...
2.359375
stackv2
# Copyright (c) 2018 Patrick Pedersen <ctx.xda@gmail.com> # Permission is hereby granted, free of charge, to any person obtaining a copy # of this software and associated documentation files (the "Software"), to deal # in the Software without restriction, including without limitation the rights # to use, copy, modify,...
91
42.37
140
22
820
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_4b141cf5be4e4639_ccb8ba6b", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text." ]
[ 90 ]
[ null ]
[ 17 ]
[ 80 ]
2024-11-19T00:40:24.005703+00:00
1,490,766,423,000
aad62c99e9d54ed3b0e5509ccb8b59467f99c0b2
3
{ "blob_id": "aad62c99e9d54ed3b0e5509ccb8b59467f99c0b2", "branch_name": "refs/heads/master", "committer_date": 1490766423000, "content_id": "72065009a59f87a910e70aaa43c9d63031bcf975", "detected_licenses": [ "MIT" ], "directory_id": "bb98c581abca83cc4bf44f9c17b25e9d07dacee4", "extension": "py", "fi...
3.09375
stackv2
# -*- coding: utf-8 -*- import sys import requests import re from bs4 import BeautifulSoup ## WordCounter: A class used to help sort the words and display them. class WordCounter: def __init__(self, word, count): self.word = word self.count = count # Sort it in decreasing order. That is: th...
190
37.1
117
20
1,626
python
[{"finding_id": "codeql_py/overly-large-range_d8e9c935a2997737_18402d02", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 89, 175 ]
[ null, null ]
[ 44, 40 ]
[ 47, 43 ]
2024-11-19T00:40:29.829881+00:00
1,581,113,985,000
25860a33ce0eca747298487556d2d3088fd67eb7
2
{ "blob_id": "25860a33ce0eca747298487556d2d3088fd67eb7", "branch_name": "refs/heads/master", "committer_date": 1581113985000, "content_id": "8ab4800ccf8f46f8a5ebae8c270f67ec2808b7fe", "detected_licenses": [ "Unlicense" ], "directory_id": "783ac16072efcbae4aae9aee0aa8b468e33a59b4", "extension": "py",...
2.34375
stackv2
import sqlite3 import random import string import subprocess import os def dbconnect(dbfile_func): try: connection = sqlite3.connect(dbfile_func) print(sqlite3.version) connection.close() except sqlite3.Error as t: print(t) exit(1) def write_database(dbfile_func, inse...
212
23.38
149
12
1,360
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_824c31ec4c6a7308_85b371f1", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.", "This expression stores [sensitive data (password)](1) as clear text." ]
[ 53, 194 ]
[ null, null ]
[ 16, 12 ]
[ 30, 20 ]
2024-11-19T01:06:17.578805+00:00
1,523,523,939,000
b4412222e2a68aa9db15c0dcd9ccdeb97b6954d0
3
{ "blob_id": "b4412222e2a68aa9db15c0dcd9ccdeb97b6954d0", "branch_name": "refs/heads/master", "committer_date": 1523523939000, "content_id": "3d276a5dd76560981910b79d403938e556fc78bf", "detected_licenses": [ "Apache-2.0" ], "directory_id": "a91e6e1cddba26d90696ceead23416c091ae8fba", "extension": "py"...
2.734375
stackv2
# -*- coding: utf-8 -*- from __future__ import absolute_import from __future__ import division from __future__ import print_function from __future__ import unicode_literals import logging import re import sqlparse from sqlparse.sql import Identifier, IdentifierList from sqlparse.tokens import Keyword, Name RESULT_OP...
297
36.45
97
19
2,437
python
[{"finding_id": "codeql_py/redos_c6172fea364c376a_eba7c0fb", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '(' and containing many repetition...
2
true
[ "CWE-1333", "CWE-1333" ]
[ "py/redos", "py/redos" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '(' and containing many repetitions of '''.", "This part of the regular expression may cause exponential backtracking on strings starting with '((' and containing many repetitions of '''." ]
[ 195, 195 ]
[ null, null ]
[ 45, 57 ]
[ 51, 63 ]
2024-11-19T01:17:09.977782+00:00
1,593,437,463,000
6af5f99e466b686992d9f6b4ca634522a8b3ec29
2
{ "blob_id": "6af5f99e466b686992d9f6b4ca634522a8b3ec29", "branch_name": "refs/heads/master", "committer_date": 1593437463000, "content_id": "81b326bdb93c275078790ee6a2aab0fc9922ce6c", "detected_licenses": [ "MIT" ], "directory_id": "cfc9cd2bc6f732902632e8a9c506ba6cd7d1f779", "extension": "py", "fi...
2.34375
stackv2
#!/usr/bin/env python # -*- coding:utf-8 -*- # # Copyright (c) 2013-present SMHI, Swedish Meteorological and Hydrological Institute # License: MIT License (see LICENSE.txt or http://opensource.org/licenses/mit). from django.db import models ### from django.contrib.gis.db import models # For GeoDjango. import hashlib ...
108
44.61
113
23
1,145
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_1b08b5b7f90bf1b9_f1ecd2ac", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (private)](1) is used in a hashing algorithm (MD5) that is insecu...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (private)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (private)](2) is used in a hashing algorithm (MD5) that is insecure." ]
[ 71 ]
[ null ]
[ 34 ]
[ 56 ]
2024-11-19T01:17:10.283173+00:00
1,619,757,968,000
9d3007b35c5c541ac5eb667bc8b4a7b2f65d1758
3
{ "blob_id": "9d3007b35c5c541ac5eb667bc8b4a7b2f65d1758", "branch_name": "refs/heads/master", "committer_date": 1619757968000, "content_id": "fac0479d4ae879a063c67e9258e29ea1ec6082ab", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "fe7c897aa034d73281224e38dc5fdbe7a360d8e0", "extension": "p...
2.765625
stackv2
from aiohttp import web import sqlite3 from datetime import datetime html=""" <!DOCTYPE html> <html> <body> <h1>My First Heading</h1> <p>Hello %s</p> %s </body> </html> """ def usercounter(name): conn = sqlite3.connect('usercounter.db') c = conn.cursor() username=name now=datetime.now() time=now....
51
19.06
75
10
282
python
[{"finding_id": "codeql_py/reflective-xss_3bbb6cd45aa8b402_2f8b35e2", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
2
true
[ "CWE-079", "CWE-089" ]
[ "py/reflective-xss", "py/sql-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "This SQL query depends on a [user-provided value](1)." ]
[ 44, 24 ]
[ null, null ]
[ 30, 15 ]
[ 47, 75 ]
2024-11-19T01:17:34.212392+00:00
1,571,651,474,000
0759b595833dbd0842ed1fe764899d5db59f1e9a
2
{ "blob_id": "0759b595833dbd0842ed1fe764899d5db59f1e9a", "branch_name": "refs/heads/master", "committer_date": 1571651474000, "content_id": "94629b2c2ab8daa91ca8b98e8b95b0f8f0eb90a4", "detected_licenses": [ "MIT" ], "directory_id": "dbba49f071f43c2b0cfd2440907470da3d897fce", "extension": "py", "fi...
2.46875
stackv2
from .forms import LoginForm, RegisterForm from .models import User, db from app.utils.decorators import breadcrumb, is_logged_in from app.utils.flash_msgs import FAILED_LOGIN, REGISTERED_MSG from flask import\ Blueprint, flash, redirect, render_template, request, session, url_for from flask_babel import _ from fla...
91
29.44
74
16
576
python
[{"finding_id": "codeql_py/url-redirection_9327b428f5d61c00_ca4c90b4", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 48 ]
[ null ]
[ 33 ]
[ 57 ]
2024-11-19T01:15:15.273972+00:00
1,627,513,328,000
52445af2fb5e834cee2df471d8cdd09e41fc7b8d
2
{ "blob_id": "52445af2fb5e834cee2df471d8cdd09e41fc7b8d", "branch_name": "refs/heads/main", "committer_date": 1627513328000, "content_id": "c19d49f54f193b03094d00c276efc2cfc40cb33c", "detected_licenses": [ "Apache-2.0" ], "directory_id": "6e5cc83885771e3a44b5f7edfa93cf88c1a69884", "extension": "py", ...
2.453125
stackv2
import threading import requests import time def kupon_request(): global toplam_req x = requests.get("http://127.0.0.1:8000/kupon_kullan", verify=False) print(x.text) toplam_req += 1 toplam_req = 0 num = 500 for i in range(num): threading.Thread(target=kupon_request).start() time.sleep(2) print(s...
18
17.72
72
10
106
python
[{"finding_id": "codeql_py/request-without-cert-validation_44b466c056b3c82f_709e3595", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 7 ]
[ null ]
[ 9 ]
[ 73 ]
2024-11-19T01:15:24.203663+00:00
1,587,939,291,000
d91461f35c2ee00f79f83d066314d4d3452882cc
3
{ "blob_id": "d91461f35c2ee00f79f83d066314d4d3452882cc", "branch_name": "refs/heads/master", "committer_date": 1587939291000, "content_id": "db6a95730a28e52c4a21faa170c580647c0ddbf0", "detected_licenses": [ "MIT" ], "directory_id": "03b9b782e482230e87256f1d72e61257853c6748", "extension": "py", "fi...
3.125
stackv2
from recovid import * def doi_url(id: str = ''): r"""Convert the doi to a url Returns: id {str} -- [doi id string] """ return f'http://{id}' if id.startswith('doi.org') else f'http://doi.org/{id}' def get_data( url: str = '', timeout: int = 10, ): r"""getting paper data from url Keyword ...
33
22
79
12
211
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_b01ba8f8420bec33_f9608540", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [doi.org](1) may be at an arbitrary position in the san...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [doi.org](1) may be at an arbitrary position in the sanitized URL." ]
[ 10 ]
[ null ]
[ 28 ]
[ 52 ]
2024-11-19T00:09:08.601785+00:00
1,545,661,366,000
d3e5db050ad4e23e25ce4acf5bcc455e8a536ed4
4
{ "blob_id": "d3e5db050ad4e23e25ce4acf5bcc455e8a536ed4", "branch_name": "refs/heads/master", "committer_date": 1545661366000, "content_id": "122ee0cffc57b3628ed303a5d91d8a27346eb48d", "detected_licenses": [ "MIT" ], "directory_id": "8ddba1c973088da1e86ffe429d00af69872193bf", "extension": "py", "fi...
3.8125
stackv2
#!/usr/bin/env python3 # -*- coding:utf-8 -*- 'OOP(Object-Oriented Programming)' __author__ = 'dogsky' ##class class Student(object) : def __init__(self) : self.name = 'xiao ming' self.age = 21 def printStudentInfo(self) : print('name = ',self.name,'\n age = ',self.age) #set和get的属性不是必须的,但是是优秀的体现 def ...
74
24.45
84
11
587
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a6896e21a2cf6dd0_f542f36d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
4
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive dat...
[ 43, 51, 55, 57 ]
[ null, null, null, null ]
[ 62, 24, 26, 39 ]
[ 72, 57, 58, 84 ]
2024-11-19T00:43:41.891047+00:00
1,547,191,541,000
0b0a516f903ad2596dcff7eff0917952e9d4771a
4
{ "blob_id": "0b0a516f903ad2596dcff7eff0917952e9d4771a", "branch_name": "refs/heads/master", "committer_date": 1547191541000, "content_id": "6efddeab3288a12e8f1097184a47a14ea8329670", "detected_licenses": [ "Apache-2.0" ], "directory_id": "4a1a64880cee58b916225a46ac339b1cf6d39dc5", "extension": "py"...
3.5625
stackv2
# 学生管理系统 import sqlite3 connect = sqlite3.connect("testsqlite.db") cursor = connect.cursor() # 添加 def n1(): input_name = str(input("请输入您的姓名:")) input_sex = str(input("请输入您的性别:")) connect.execute("insert into students(name,sex) values(?,?)", (input_name, input_sex)) print("添加成功") # 查询 # 返回字典版信息 ...
99
17.96
105
13
561
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7071c3911c7f45d1_a1473f86", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 43 ]
[ null ]
[ 15 ]
[ 73 ]
2024-11-19T01:32:01.270314+00:00
1,546,270,266,000
b04bb7af51b885da122539c2b36a183b14553433
3
{ "blob_id": "b04bb7af51b885da122539c2b36a183b14553433", "branch_name": "refs/heads/master", "committer_date": 1546270266000, "content_id": "b36d5009c253edc354cd401b38723130367c7d80", "detected_licenses": [ "MIT" ], "directory_id": "4895797bd4aee8516bad37c5bf351a925af4227a", "extension": "py", "fi...
2.546875
stackv2
import os import configparser import sys import flask import hmac import hashlib from .github import GitHub app = flask.Flask(__name__) def parseConfigsFromEnv(): """ Load config from ENV variable """ token=None secret=None labels={} if 'FILABEL_CONFIG' not in os.environ: ra...
139
23.96
92
22
793
python
[{"finding_id": "codeql_py/reflective-xss_8dc43f622e77d9eb_70838a23", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 126, 131 ]
[ null, null ]
[ 16, 16 ]
[ 31, 39 ]
2024-11-19T01:32:05.987658+00:00
1,473,154,393,000
4867db47eb6535cb0c16102740923199a605b289
2
{ "blob_id": "4867db47eb6535cb0c16102740923199a605b289", "branch_name": "refs/heads/master", "committer_date": 1476014913000, "content_id": "0ff282fa4969cffd5792c23897e953b1f4c24594", "detected_licenses": [ "MIT" ], "directory_id": "283eb1c6c7ddbb19a0f99715ac8f4c29930de3da", "extension": "py", "fi...
2.5
stackv2
import argparse import os try: from shlex import quote as cmd_quote except ImportError: from pipes import quote as cmd_quote from awscli.customizations.commands import BasicCommand def awscli_initialize(event_hooks): event_hooks.register('building-command-table.main', inject_commands) def inject_comman...
94
31.77
80
15
649
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7a80bd8456420058_ff8ed42a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 27 ]
[ null ]
[ 11 ]
[ 29 ]
2024-11-19T01:32:21.278457+00:00
1,554,201,085,000
dc45029aef91edd5154fc2afffa18931b11b2509
3
{ "blob_id": "dc45029aef91edd5154fc2afffa18931b11b2509", "branch_name": "refs/heads/master", "committer_date": 1554201085000, "content_id": "1551449cdd9021a5f7e319f788ced24c3be565e3", "detected_licenses": [ "MIT" ], "directory_id": "f498049c16f1cb1bba72a3a6f7bf9fd7c5b1fda8", "extension": "py", "fi...
2.703125
stackv2
from jinja2 import Template import pdfkit def create_pdf(table, out): width = int(100 / len(table[0])) headers = table[0] rows = table[1:] html = Template(""" <table border="0" align="center" width="90%"> <thead><tr>{% for header in headers %}<th width="{{ width }}%">{{ header }}</th>{% e...
21
28.71
113
12
175
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_8bd8381fa08ada88_2c581611", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 10 ]
[ 19 ]
[ 12 ]
[ 9 ]
2024-11-19T01:32:25.236447+00:00
1,553,781,074,000
47cf843811a26a078d2318de050091fdbfe79e89
3
{ "blob_id": "47cf843811a26a078d2318de050091fdbfe79e89", "branch_name": "refs/heads/master", "committer_date": 1553781074000, "content_id": "670a715fc6656173971568887fa8eb8fb05185b4", "detected_licenses": [ "Apache-2.0" ], "directory_id": "2f7eca5adcb73d72bf1bf7d2dac2a7ff3fe47201", "extension": "py"...
2.640625
stackv2
#!/usr/bin/python import re import socket import urlparse import ssl import urllib import time # See HTTPPipelineTest() for a simple usage # Example: # RequestObject('POST', 'https://soroush.secproject.com/?q1=q2','var=val',{'cookie':'x=2;r=5','connection':'close','Content-Type': 'application/x-www-form-urlencoded'}, ...
197
36.8
174
20
1,820
python
[{"finding_id": "codeql_py/insecure-protocol_3f7d49d01b5c09fb_ed5752a9", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 specified by [call to ssl.wrap_socket](1).", "remediation": "", "l...
1
true
[ "CWE-327" ]
[ "py/insecure-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Insecure SSL/TLS protocol version TLSv1 specified by [call to ssl.wrap_socket](1)." ]
[ 99 ]
[ null ]
[ 13 ]
[ 63 ]
2024-11-19T01:43:48.122927+00:00
1,457,878,269,000
e0673efc4bfbdb935c82360b3094f48a5dad6107
3
{ "blob_id": "e0673efc4bfbdb935c82360b3094f48a5dad6107", "branch_name": "refs/heads/master", "committer_date": 1457878269000, "content_id": "f2460fd17a1c9f474a70417ab4c297e68b364b98", "detected_licenses": [ "MIT" ], "directory_id": "f9ae046138ea3cdb2300087b1f9f2bb14a4795a1", "extension": "py", "fi...
2.984375
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- # 用于创建数据库,请按照下面的要求填写相关的信息,再运行`python create_db.py`, # 并将生成的数据库拷贝到 blog 目录下 import os import sys import os.path import base64 import getopt import sqlite3 from miniakio.libs import crypto # 编辑下面的信息 USERNAME = "SErHo" # 用户名 EMAIL = "serholiu@gmail.com" # 邮箱...
87
21.8
79
12
584
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f8b710f10b9212d5_65e9cfe0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 83 ]
[ null ]
[ 15 ]
[ 27 ]
2024-11-19T01:44:05.394806+00:00
1,544,665,511,000
9e27f73efb4c99175a2970e0cd934095240899f6
3
{ "blob_id": "9e27f73efb4c99175a2970e0cd934095240899f6", "branch_name": "refs/heads/master", "committer_date": 1544665511000, "content_id": "b8183f6e4de9b44d092829ff6683f197b8e2ccac", "detected_licenses": [ "Apache-2.0" ], "directory_id": "a3ab19907e8931f312397db14bbc7d166259020a", "extension": "py"...
2.71875
stackv2
import time from firebase import firebase firebase = firebase.FirebaseApplication('https://ship-detection.firebaseio.com/', None) def location(): while True: with open('location.csv', 'r') as reader: for line in reader: latitude = line.strip().split(',')[0] lon...
23
25.3
87
17
109
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0fe98776d81d69ea_83ea8b7e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 17, 18 ]
[ null, null ]
[ 23, 23 ]
[ 31, 32 ]
2024-11-19T02:19:56.984604+00:00
1,599,661,715,000
4c25ab293cb68bd88c6f1151e3d34d3f30403573
3
{ "blob_id": "4c25ab293cb68bd88c6f1151e3d34d3f30403573", "branch_name": "refs/heads/master", "committer_date": 1599661715000, "content_id": "04a1e0d51a40004408610bc4ce81f59ee0e70b96", "detected_licenses": [ "MIT" ], "directory_id": "4fdd13480b1a1f55123abc63076e849a2ce37720", "extension": "py", "fi...
3.28125
stackv2
import network import urequests import ujson import config # API de prueba para conseguir datos en formato JSON url = 'http://dummy.restapiexample.com/api/v1/employee/2' # Configurar el WIFI como cliente y activar wlan = network.WLAN(network.STA_IF) wlan.active(True) if not wlan.isconnected(): print('\n\nConecta...
36
26.78
57
9
254
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_47a31aa76338a7dc_4d864167", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 32, 33, 34 ]
[ null, null, null ]
[ 22, 20, 23 ]
[ 28, 24, 30 ]
2024-11-19T00:59:44.720326+00:00
1,682,212,773,000
155fc99b54065c45b8a3fe041e88e8bf561e5dcd
3
{ "blob_id": "155fc99b54065c45b8a3fe041e88e8bf561e5dcd", "branch_name": "refs/heads/master", "committer_date": 1682212773000, "content_id": "ca785d0e90c6aa7d070472e6aa61048b62521cb5", "detected_licenses": [ "Apache-2.0" ], "directory_id": "68df2bcc80e68a337ffd73a9742b30e803451f2e", "extension": "py"...
2.609375
stackv2
#coding: utf-8 # ### CREATED BY KARMAZ # # ### TO DO: # ### FUNCTIONS: # 1. Gather SIDs. # 2. Measure SID generation delay. # # #### WORKFLOW # 1. "Copy as python Request" in Burp Suitre. # 2. Paste in login_req # - If there is multiple steps to generate SID use get_cookie. # - Else do not use this function and del...
82
23.16
90
13
579
python
[{"finding_id": "codeql_py/request-without-cert-validation_f7f02950641dbbd0_c6924527", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 38, 47 ]
[ null, null ]
[ 9, 9 ]
[ 86, 91 ]
2024-11-19T00:59:46.609061+00:00
1,433,668,441,000
133db2a4d31beacd5d188222a75af61f4b8abb72
3
{ "blob_id": "133db2a4d31beacd5d188222a75af61f4b8abb72", "branch_name": "refs/heads/master", "committer_date": 1433668441000, "content_id": "b46f86eca1e141227823e5c4f0bc89a28e54ee5e", "detected_licenses": [ "Apache-2.0" ], "directory_id": "a497a866026b1bae2abf315f9cb7e858dff1a91f", "extension": "py"...
2.5625
stackv2
#!/usr/bin/env python # # Data Generator service # __VERSION__ = '0.0.1' DEFAULT_ROWS_PER_REQUEST=10 MAX_ROWS_PER_REQUEST=10000 import yaml import json from flask import Flask from flask import request from faker import Factory class DataRequest(object): def __init__(self): self._data = list() ...
111
21.52
80
16
558
python
[{"finding_id": "codeql_py/unsafe-deserialization_2d04ed3100af64d6_45446422", "tool_name": "codeql", "rule_id": "py/unsafe-deserialization", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Unsafe deserialization depends on a [user-provided value](1).", "remediation": "", "locatio...
2
true
[ "CWE-502", "CWE-094" ]
[ "py/unsafe-deserialization", "py/code-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Unsafe deserialization depends on a [user-provided value](1).", "This code execution depends on a [user-provided value](1)." ]
[ 41, 58 ]
[ null, null ]
[ 41, 43 ]
[ 49, 56 ]
2024-11-19T01:11:51.073782+00:00
1,585,444,042,000
500bfaf6d42d227b825ed7209645b1831435d3e4
4
{ "blob_id": "500bfaf6d42d227b825ed7209645b1831435d3e4", "branch_name": "refs/heads/master", "committer_date": 1585444042000, "content_id": "33a527acb4ab53e1363b41f42cefbf79776cd2ac", "detected_licenses": [ "MIT" ], "directory_id": "9c051e51357aaef212855ce84fe842c796ba41d8", "extension": "py", "fi...
3.765625
stackv2
"""Password Generator TERRIBLE IDEA! DO NOT USE THIS UNDER ANY CIRCUMSTANCES """ # probably insufficient for this purpose, but that shouldn't matter since DON'T USE IT import random ALPHA = (''.join(map(chr, range(ord('a'), ord('z') + 1))) + ''.join(map(chr, range(ord('A'), ord('Z') + 1)))) DIGITS = ''.join(...
49
40
95
16
520
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f735a81defdc394c_c9d0e5f2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 46 ]
[ null ]
[ 15 ]
[ 45 ]
2024-11-19T01:12:01.909272+00:00
1,666,097,565,000
b2fb522d334b75c6bf4d4891b0af78a9341a389e
3
{ "blob_id": "b2fb522d334b75c6bf4d4891b0af78a9341a389e", "branch_name": "refs/heads/master", "committer_date": 1666097565000, "content_id": "a0d164b2a15676955c6d3c459aa95a481123553f", "detected_licenses": [ "MIT" ], "directory_id": "b76204c0010f7ad724f890af32454d1e88e414d1", "extension": "py", "fi...
2.953125
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- # @File : ATM.py # @Author: zhangjiang # @Date : 2018/11/15 # @Desc : import os #编辑用户 file_name = 'account.txt' #保存用户信息 账号 余额 密码 loginInfo = [] shopCar = {} shopFlag = True product_list = [['Iphone7',5800], ['Coffee',30], ['疙瘩汤',10], ...
412
35.57
126
28
3,670
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_10b2ddc02e757717_d827ba64", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
8
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging...
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data ...
[ 149, 197, 231, 267, 289, 313, 328, 345 ]
[ null, null, null, null, null, null, null, null ]
[ 15, 43, 11, 35, 11, 31, 15, 31 ]
[ 84, 106, 89, 90, 88, 126, 74, 77 ]
2024-11-19T01:21:40.093897+00:00
1,633,878,749,000
ab16f845471f319406e72b028c55f47e78ee7b08
3
{ "blob_id": "ab16f845471f319406e72b028c55f47e78ee7b08", "branch_name": "refs/heads/master", "committer_date": 1633878749000, "content_id": "cc8683eb93477e026730eb1443f9be0193703668", "detected_licenses": [ "Apache-2.0" ], "directory_id": "352fe26eaa0c71291e38e22478ab5b8a21073351", "extension": "py"...
2.515625
stackv2
# -*- coding: utf-8 -*- import gzip import nltk from os import listdir, makedirs from os.path import join, exists import re from bs4 import BeautifulSoup import subprocess from config import gov2_collection_path, gov2_output_path, gov2_docno_list # This script is based on: # https://gist.github.com/dervn/859717/15b69e...
161
30.12
90
25
1,298
python
[{"finding_id": "codeql_py/bad-tag-filter_0540f1c07907c8b2_73b3b02f", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression does not match script end tags like </script\\t\\n bar>.", "remediation": "", "location"...
1
true
[ "CWE-116" ]
[ "py/bad-tag-filter" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression does not match script end tags like </script\\t\\n bar>." ]
[ 24 ]
[ null ]
[ 29 ]
[ 68 ]
2024-11-19T02:10:31.258369+00:00
1,619,794,131,000
4f04c1da350a0820b2f856903615e50f901f38c6
3
{ "blob_id": "4f04c1da350a0820b2f856903615e50f901f38c6", "branch_name": "refs/heads/master", "committer_date": 1619794157000, "content_id": "ac532f3c3b6dbdec4d651aa1038e1e58451d5038", "detected_licenses": [ "MIT" ], "directory_id": "d4edea1100b9138a1b4f7efde24c14f7da1ca528", "extension": "py", "fi...
2.515625
stackv2
from datetime import date, datetime from dateutil.rrule import DAILY, rrule from django.contrib import messages from django.contrib.auth.mixins import LoginRequiredMixin from django.http.response import Http404, HttpResponseRedirect from django.utils import timezone from django.views.generic.base import RedirectView, ...
161
26.32
67
19
1,006
python
[{"finding_id": "codeql_py/url-redirection_77cc213e15bc7d37_f6ea2f74", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 136 ]
[ null ]
[ 37 ]
[ 58 ]
2024-11-19T02:10:36.581970+00:00
1,551,431,943,000
a3a1ddc121ef737d030fe3ab383db77a0a3bd748
2
{ "blob_id": "a3a1ddc121ef737d030fe3ab383db77a0a3bd748", "branch_name": "refs/heads/master", "committer_date": 1551431943000, "content_id": "a4bff66e443c5971ac93629343676c68d24b2f28", "detected_licenses": [ "MIT" ], "directory_id": "136cef3bc0a75497e707128a392a6291361c6c6d", "extension": "py", "fi...
2.328125
stackv2
# -*- encoding: utf-8 -*- """Rainbow settings methods """ from configparser import ConfigParser from pprint import pprint from requests import packages, put, exceptions from paramiko import SSHClient, AutoAddPolicy, AuthenticationException from os.path import join, exists from tempfile import gettempdir from pyoxeconf...
222
32.73
103
14
1,832
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_6f9c3171cd571b5a_5fded07c", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
6
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/paramiko-missing-host-key-validation", "py/paramiko-missing-host-key-validation", "py/paramiko-missing-host-key-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "HIGH", "HIGH", "HIGH", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe.", "Setting missing host key policy to AutoAddPolicy may be unsafe.", "Setting missing host key policy to AutoAddPolicy may be unsafe.", "This request may run without certificate validation because [it is disabled](1).", "This request may run w...
[ 151, 174, 195, 78, 105, 130 ]
[ null, null, null, 82, null, 134 ]
[ 5, 5, 5, 20, 20, 20 ]
[ 56, 56, 56, 25, 95, 25 ]
2024-11-19T02:10:45.003989+00:00
1,555,394,214,000
feb036a9d39fdd6ebb7e242bfeb7b44555cfad3f
2
{ "blob_id": "feb036a9d39fdd6ebb7e242bfeb7b44555cfad3f", "branch_name": "refs/heads/master", "committer_date": 1555394214000, "content_id": "984ccd3680dce01a667139a07b9172b4893aa6a4", "detected_licenses": [ "MIT" ], "directory_id": "2533771fb0e289c5dec00f5432dfbddccafe6ddb", "extension": "py", "fi...
2.359375
stackv2
import numpy as np import re import json from sklearn.cluster import KMeans from sklearn.metrics import silhouette_score from datetime import datetime from gensim.models import KeyedVectors from numpy import linalg from sklearn.feature_extraction.text import TfidfVectorizer class DynamicClustering(object): def __...
254
50.93
163
24
2,793
python
[{"finding_id": "codeql_py/overly-large-range_7e2d1ad98aec433b_bffc710f", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 59, 66 ]
[ null, null ]
[ 36, 37 ]
[ 39, 40 ]
2024-11-19T02:11:04.500426+00:00
1,684,842,078,000
22d64e7f316bffbea36144b385e7cb7168f08f66
2
{ "blob_id": "22d64e7f316bffbea36144b385e7cb7168f08f66", "branch_name": "refs/heads/master", "committer_date": 1684842078000, "content_id": "cf6a5ac2d629fac7cf0c3c4396ce5c460018de67", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "5bff58f59bbecd6b9d38cdf9ba704dbd11fe99f6", "extension": "p...
2.359375
stackv2
import os import json import time from flask import Flask, abort import sensor_reader import logging log = logging.getLogger('werkzeug') log.setLevel(logging.ERROR) app = Flask(__name__) BASE_DIR = '/sys/bus/w1/devices/' @app.route("/") def hello(): return "Hello World!" @app.route("/sensors") def list_sensor...
49
22.73
89
13
302
python
[{"finding_id": "codeql_py/reflective-xss_5c614290f698d94a_c0a5efa8", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 40 ]
[ null ]
[ 12 ]
[ 30 ]
2024-11-19T02:11:04.608068+00:00
1,669,236,191,000
9c6be5fb18e8fdcd11b89f4d7f56475bf8252337
2
{ "blob_id": "9c6be5fb18e8fdcd11b89f4d7f56475bf8252337", "branch_name": "refs/heads/master", "committer_date": 1669236191000, "content_id": "da9ab6b4f35c988f7d088403eac65fc9cacbcabd", "detected_licenses": [ "Unlicense" ], "directory_id": "d039cde592b1b1e7d34476c10b2a9c711b0db321", "extension": "py",...
2.40625
stackv2
from Crypto.Cipher import AES from Crypto.Util import Padding from typing import Dict import base64 import binascii import hashlib import zipfile # Based on obok.py by Physisticated. class KoboDrmRemover: def __init__( self, deviceId: str, userId: str ): self.DeviceIdUserIdKey = KoboDrmRemover.__MakeDeviceIdUserId...
38
39.16
95
18
420
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_336ef9c305afdb94_fef54e61", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 24, 27 ]
[ null, null ]
[ 25, 23 ]
[ 53, 53 ]
2024-11-19T02:45:23.414321+00:00
1,522,737,616,000
b4912bdc1542f2b8745582356da8df545ac1fed0
2
{ "blob_id": "b4912bdc1542f2b8745582356da8df545ac1fed0", "branch_name": "refs/heads/master", "committer_date": 1522737616000, "content_id": "cce5b1adc3e5a612ac3738e37c4b723607656d29", "detected_licenses": [ "Apache-2.0" ], "directory_id": "7a730d1e30874298c26b4dc9c33932b7fdf89457", "extension": "py"...
2.390625
stackv2
from flask import flash, redirect, render_template, url_for, request from flask_login import login_user, logout_user, login_required, current_user from . import auth from .forms import SignInForm, SignUpForm, ChangePasswordForm from ..models import User @auth.route('/', methods=['GET', 'POST']) def index(): form ...
55
33.05
88
16
380
python
[{"finding_id": "codeql_py/url-redirection_86e9043f7fe77869_07fac675", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 15 ]
[ null ]
[ 29 ]
[ 88 ]