added
stringlengths
32
32
created
int64
1,236B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.03
source
stringclasses
1 value
text
stringlengths
330
19.3k
num_lines
int64
16
648
avg_line_length
float64
15.5
59.3
max_line_length
int64
37
179
ast_depth
int64
8
38
length
int64
102
3.79k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.11k
276k
sast_codeql_findings_count
int64
1
33
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
33
rule_ids
listlengths
1
33
confidences
listlengths
1
33
severities
listlengths
1
33
messages
listlengths
1
33
line_starts
listlengths
1
33
line_ends
listlengths
1
33
column_starts
listlengths
1
33
column_ends
listlengths
1
33
2024-11-18T22:11:33.776204+00:00
1,499,957,449,000
ed3ed592d4fca2140f0f9154773f123c609b8150
3
{ "blob_id": "ed3ed592d4fca2140f0f9154773f123c609b8150", "branch_name": "refs/heads/master", "committer_date": 1499957449000, "content_id": "c46f759fa1d21c6cec1bb451dca7f8b92000966d", "detected_licenses": [ "MIT" ], "directory_id": "fc59fffe635d9d3acd585161f68474458f32f03c", "extension": "py", "fi...
2.71875
stackv2
import helper import numpy as np import os import pickle import random import sklearn import tarfile import time import tensorflow as tf import tqdm import urllib cifar10_dataset_folder_path = 'cifar-10-batches-py' tar_gz_path = 'cifar-10-python.tar.gz' class DLProgress(tqdm.tqdm): last_block = 0 def hook(s...
362
31.67
80
18
2,728
python
[{"finding_id": "codeql_py/tarslip_6c6229f5a56f26c1_67278526", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 40 ]
[ null ]
[ 13 ]
[ 16 ]
2024-11-18T22:11:41.054046+00:00
1,611,819,302,000
b75733d149d2e393d56179b6793e17cea735641e
2
{ "blob_id": "b75733d149d2e393d56179b6793e17cea735641e", "branch_name": "refs/heads/master", "committer_date": 1611819302000, "content_id": "93331d60accbae01fa0d3539734a181a8d3c1f99", "detected_licenses": [ "Apache-2.0" ], "directory_id": "1698fe3ff15a6737c70501741b32b24fe68052f4", "extension": "py"...
2.34375
stackv2
import hashlib from django.db import models from material.models import MaterialSocial, MaterialMaster class NavigationLink(models.Model): """ 自定义导航 """ TARGET_TYPE = ( ("_blank", "blank - 浏览器总在一个新打开、未命名的窗口中载入目标文档。"), ("_self", "self - 这个目标的值对所有没有指定目标的 <a> 标签是默认目标,它使得目标文档载入并显示...
182
48.38
132
14
2,316
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_e4c1624ec5d1851f_d551711c", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 81 ]
[ null ]
[ 24 ]
[ 59 ]
2024-11-18T22:24:07.648737+00:00
1,612,731,083,000
b6a318c68da12bae54bfe0ba8ebe4e284b7b51d7
3
{ "blob_id": "b6a318c68da12bae54bfe0ba8ebe4e284b7b51d7", "branch_name": "refs/heads/master", "committer_date": 1612731083000, "content_id": "1d80f68b8c7dcc98a1ce840dd4ae393c107a60e2", "detected_licenses": [ "MIT" ], "directory_id": "79d89348395a2ab0980858789af935a2b25c9498", "extension": "py", "fi...
2.703125
stackv2
"""Routes that are used by runners.""" import logging from flask import current_app as app from flask import request, jsonify from broker.core.utils import is_status_valid logger = logging.getLogger(__name__) @app.route("/runners/available-job", methods=["GET"]) def get_available_job(): """Gets an available ...
46
30.28
80
17
323
python
[{"finding_id": "codeql_py/log-injection_0359cc1a59b1e901_bb777bce", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
2
true
[ "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 32, 32 ]
[ null, null ]
[ 9, 32 ]
[ 30, 49 ]
2024-11-18T22:24:17.704713+00:00
1,593,715,268,000
6911e4d2cbb7373ece1799948a4b8d49ccbe96d1
3
{ "blob_id": "6911e4d2cbb7373ece1799948a4b8d49ccbe96d1", "branch_name": "refs/heads/master", "committer_date": 1593715268000, "content_id": "5c5ecb590b045b8fe4849addffcd32375870bab4", "detected_licenses": [ "MIT" ], "directory_id": "9ea87c10180665db0db6fa36997704acc001692d", "extension": "py", "fi...
2.71875
stackv2
# tokenization testing script # extracted from Jason Loh's JT lib from pypbc import * import os, sys, time from Crypto.Cipher import AES import hashlib import numpy def hexxor(a, b): # xor two hex strings of the same length return "".join(["%x" % (int(x,16) ^ int(y,16)) for (x, y) in zip(a, b)]) if __name__ == "...
90
22.1
73
16
673
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_2d35330052bacbd4_b0774c21", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
3
true
[ "CWE-327", "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 45, 48, 75 ]
[ null, null, null ]
[ 10, 10, 10 ]
[ 30, 32, 31 ]
2024-11-18T22:36:24.205181+00:00
1,606,973,194,000
700a97be8c3509a4e1960bf198d3eb97d48fa130
2
{ "blob_id": "700a97be8c3509a4e1960bf198d3eb97d48fa130", "branch_name": "refs/heads/main", "committer_date": 1606973194000, "content_id": "61c2efdd65256b51ddb672c9f76730eb8c51f179", "detected_licenses": [ "MIT" ], "directory_id": "674d38b049415589f94c0e985f153da38894d506", "extension": "py", "file...
2.34375
stackv2
import os import secrets import math import urllib import re from PIL import Image from flask import render_template,url_for,flash,redirect,request,abort,jsonify from plagCheck.forms import RegistrationForm,LoginForm,AccountUpdateForm,RequestResetForm,ResetPasswordForm,SuggestionForm from plagCheck import app,db,bcrypt...
265
35.14
122
17
2,061
python
[{"finding_id": "codeql_py/partial-ssrf_66431274cc66882f_b618f723", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 195 ]
[ null ]
[ 20 ]
[ 28 ]
2024-11-18T22:36:24.386629+00:00
1,676,633,872,000
cf9d5340e6a3b8be54d30c6588e3fe6f320724e9
3
{ "blob_id": "cf9d5340e6a3b8be54d30c6588e3fe6f320724e9", "branch_name": "refs/heads/master", "committer_date": 1676633872000, "content_id": "899bc357ea1796ac11b35de9bb9034808cb96f61", "detected_licenses": [ "MIT" ], "directory_id": "f6e13c4202218a71b8c9ec93884d60e70c4ffb92", "extension": "py", "fi...
2.828125
stackv2
#!/usr/bin/env python3 import gnomekeyring as gkey import argparse parser = argparse.ArgumentParser(description='GNome Keyring Credentials Proxy') parser.add_argument('-u', dest='get_username', action='store_const', const=True, default=Fa...
84
31.37
84
13
580
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5ca89a603d5da3c7_124a2f91", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
4
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data ...
[ 74, 79, 84, 84 ]
[ null, null, null, null ]
[ 15, 15, 11, 27 ]
[ 41, 41, 25, 41 ]
2024-11-18T22:36:38.081309+00:00
1,675,070,211,000
2d51f24f75bb3b6b21fb1210c3409e1c3063acde
3
{ "blob_id": "2d51f24f75bb3b6b21fb1210c3409e1c3063acde", "branch_name": "refs/heads/master", "committer_date": 1675070211000, "content_id": "8645d7b32c1044ce087596ec1ac46444c4785168", "detected_licenses": [ "MIT" ], "directory_id": "f7778bf3b8173915c97193f51ff8a1ac2260a68a", "extension": "py", "fi...
3.25
stackv2
import argparse import json import re import requests from typing import List from urllib3.exceptions import InsecureRequestWarning quiet = False def print_message(message: str): """ Print message to STDOUT if the quiet option is set to False (this is the default). :param message: message to print :r...
108
34.17
113
20
803
python
[{"finding_id": "codeql_py/request-without-cert-validation_037e3bddcbe44ea8_68c72d30", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 47 ]
[ null ]
[ 22 ]
[ 71 ]
2024-11-18T22:36:51.207886+00:00
1,632,211,936,000
da79ad312fb37ea75831535463b3a0feb30fc70c
3
{ "blob_id": "da79ad312fb37ea75831535463b3a0feb30fc70c", "branch_name": "refs/heads/main", "committer_date": 1632211967000, "content_id": "082a2f7150fe97e34e39317d46ac67dd644df60c", "detected_licenses": [ "MIT" ], "directory_id": "fb8a9b08691505d630692fef9b1c73cd24402900", "extension": "py", "file...
2.625
stackv2
import os from pathlib import Path from shutil import move, rmtree from sys import platform from uuid import uuid1 FFMPEG_STATIC_LINUX = 'https://johnvansickle.com/ffmpeg/builds/ffmpeg-git-amd64-static.tar.xz' FFMPEG_STATIC_WIN = 'https://www.gyan.dev/ffmpeg/builds/ffmpeg-release-essentials.zip' FFMPEG_STATIC_MAC = 'h...
83
32.47
94
16
646
python
[{"finding_id": "codeql_py/tarslip_ae01ae003fe6495a_ffb90224", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 79 ]
[ null ]
[ 13 ]
[ 15 ]
2024-11-18T20:23:13.910424+00:00
1,518,383,896,000
1a8d33cac84ac7d32071366f46a82d8d724fa17f
2
{ "blob_id": "1a8d33cac84ac7d32071366f46a82d8d724fa17f", "branch_name": "refs/heads/master", "committer_date": 1518383896000, "content_id": "b277be79a46e4ac2fb58d570ff036f2c7d26e451", "detected_licenses": [ "Apache-2.0" ], "directory_id": "c1bde1897249494bc8e77da5f118570fd92869ec", "extension": "py"...
2.421875
stackv2
import os import subprocess from flask import Flask, render_template app = Flask(__name__) BASE_DIR = os.path.abspath(os.path.dirname(__file__)) @app.route('/') def hello_world(): commands = [ dict(url='/commands/play', name='Play MP3', icon='fa-file-audio-o'), dict(url='/commands/testvumeter',...
47
31.09
110
12
407
python
[{"finding_id": "codeql_py/reflective-xss_dfd397250abed887_cada5cfb", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 36 ]
[ null ]
[ 13 ]
[ 48 ]
2024-11-18T20:23:15.778211+00:00
1,630,100,893,000
d83e66edcf46d556fcc400bdcee93f1734f691b8
4
{ "blob_id": "d83e66edcf46d556fcc400bdcee93f1734f691b8", "branch_name": "refs/heads/master", "committer_date": 1630100893000, "content_id": "c0610f6556da392ca4a7ace0dd2df68f6148d3cf", "detected_licenses": [ "MIT" ], "directory_id": "09d7efc39bf0408e68edf92eef6192d953422b73", "extension": "py", "fi...
3.734375
stackv2
# ======================== # Information # ======================== # Direct Link: https://www.hackerrank.com/challenges/matching-x-y-repetitions/problem # Difficulty: Easy # Max Score: 20 # Language: Python # ======================== # Solution # ======================== import re regex_pattern = r'^...
38
26.63
85
15
339
python
[{"finding_id": "codeql_py/overly-large-range_014167c2c17281c3_0fea4612", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 16 ]
[ null ]
[ 31 ]
[ 34 ]
2024-11-18T20:23:19.192048+00:00
1,518,722,140,000
d92a949b602621e5934f4386d6d929966713c3fd
2
{ "blob_id": "d92a949b602621e5934f4386d6d929966713c3fd", "branch_name": "refs/heads/master", "committer_date": 1518722140000, "content_id": "8bf4bc1868a9e55ef51f4a9a55a48a146edbe8f6", "detected_licenses": [ "MIT" ], "directory_id": "4edbc758a08ef425f77a2f6c3aee4f545a494842", "extension": "py", "fi...
2.484375
stackv2
from flask import Flask, request, jsonify, redirect, url_for, send_file from werkzeug.utils import secure_filename from flask_sqlalchemy import SQLAlchemy from flask_marshmallow import Marshmallow from datetime import datetime from flask_cors import CORS import json import os app = Flask(__name__) app.config['SQLALCHE...
135
32.39
116
15
999
python
[{"finding_id": "codeql_py/flask-debug_fe13120afadf5d2e_734eee27", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-022", "CWE-022" ]
[ "py/flask-debug", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 135, 61, 65 ]
[ null, null, null ]
[ 5, 23, 22 ]
[ 24, 34, 30 ]
2024-11-18T21:22:14.871514+00:00
1,635,612,313,000
76f3dfec8f3e34388152e0895e50a5cbdfc71248
2
{ "blob_id": "76f3dfec8f3e34388152e0895e50a5cbdfc71248", "branch_name": "refs/heads/master", "committer_date": 1635612313000, "content_id": "f74fc4587cec4e965530f9929b0309e1e8faa0be", "detected_licenses": [ "MIT" ], "directory_id": "c4ec4fb81da7fe906a5a7640a7c7b7d22ad9a93e", "extension": "py", "fi...
2.328125
stackv2
#!/usr/bin/env python3 # # author: dec 2020 # cassio batista - https://cassota.gitlab.io # # sponsored by MidiaClip (Salvador - BA) import sys import os import shutil import glob import argparse import logging from collections import OrderedDict import torch import numpy as np from pyannote.pipeline.blocks.clusteri...
149
40.27
119
17
1,560
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a3d3c0993d9b194c_08ff4e67", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 70, 140, 145 ]
[ 71, null, null ]
[ 27, 26, 37 ]
[ 54, 79, 75 ]
2024-11-18T21:22:22.454901+00:00
1,636,167,597,000
e30d0e9db5d44e6c3fde22c50da4f43ff31885ee
3
{ "blob_id": "e30d0e9db5d44e6c3fde22c50da4f43ff31885ee", "branch_name": "refs/heads/main", "committer_date": 1636167597000, "content_id": "cafa45d22425f321b30c0a9caf1ab5b953f1df4f", "detected_licenses": [ "MIT" ], "directory_id": "3f7c7a2f38166ab98e4c42e5d35ab360170f8550", "extension": "py", "file...
2.984375
stackv2
import hashlib from typing import Tuple import requests class PasswordPwnedSearch: def __init__(self, password_typed: str) -> None: self.password_hashed = self.__hash_password(password_typed) def __hash_password(self, password_typed: str) -> str: return hashlib.sha1(password_typed.encode("ut...
32
34.41
80
16
262
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_6dea41ebbd176184_eba6c905", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expen...
[ 12 ]
[ null ]
[ 29 ]
[ 59 ]
2024-11-18T21:22:25.446257+00:00
1,605,668,761,000
07ce0c2d70fa4889cf0d57e82516ea4f436423a6
2
{ "blob_id": "07ce0c2d70fa4889cf0d57e82516ea4f436423a6", "branch_name": "refs/heads/master", "committer_date": 1605668761000, "content_id": "ad2768da25ef4923a42331deb8b1cfeb976938d8", "detected_licenses": [ "MIT" ], "directory_id": "f1bbd010bedbd4069c000b8c1da769423352c998", "extension": "py", "fi...
2.34375
stackv2
import io import pandas as pd import datetime from flask import Flask from flask import redirect from flask import request from flask import Response from flask import send_file from flask import abort from flask_admin import Admin from flask_admin import BaseView from flask_admin import expose from flask_admin.contri...
310
30.45
81
17
2,158
python
[{"finding_id": "codeql_py/reflective-xss_ad7ec6e13f53f0f5_74d3eb82", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 240 ]
[ null ]
[ 21 ]
[ 66 ]
2024-11-18T21:22:38.384762+00:00
1,505,753,816,000
41a53efce0e36eba4cc437ebb7eb2d542a7aaad7
2
{ "blob_id": "41a53efce0e36eba4cc437ebb7eb2d542a7aaad7", "branch_name": "refs/heads/master", "committer_date": 1505753816000, "content_id": "3b902845cfed4e75656a703985451e9ae2cea94c", "detected_licenses": [ "Apache-2.0" ], "directory_id": "02f670287379abd80830e24b443620860d2ed4ab", "extension": "py"...
2.484375
stackv2
#!/usr/bin/env python import SocketServer import re import socket import ssl import threading PUBLIC_ENDPOINT = ('', 4747) INTERNAL_SSL_ENDPOINT = ('127.0.0.1', 65186) INTERNAL_FORWARD_ENDPOINT = ('127.0.0.1', 65187) RECV_BUFFER = 4096 KILL_THREADS_WHEN_MAIN_ENDS = True SSL_VERSION = ssl.PROTOCOL_SSLv3 CIPHER_ALGOR...
434
31.05
109
15
2,989
python
[{"finding_id": "codeql_py/insecure-protocol_32d7fe850b3c0418_f2c5dd58", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version SSLv3 specified by [call to ssl.SSLContext](1).", "remediation": "", "lo...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/insecure-protocol", "py/insecure-protocol" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Insecure SSL/TLS protocol version SSLv3 specified by [call to ssl.SSLContext](1).", "Insecure SSL/TLS protocol version SSLv3 specified by [call to ssl.SSLContext](1)." ]
[ 103, 205 ]
[ null, null ]
[ 22, 22 ]
[ 49, 49 ]
2024-11-18T21:22:39.748512+00:00
1,546,700,233,000
d1434a01f83170160f64a9bc740bdaf8476b553e
3
{ "blob_id": "d1434a01f83170160f64a9bc740bdaf8476b553e", "branch_name": "refs/heads/master", "committer_date": 1546700233000, "content_id": "27ae05785ce0a1d34cf54e567296d0892954fd4c", "detected_licenses": [ "Apache-2.0" ], "directory_id": "9674aa46d438ac7956d8a43759bf012bc91eb679", "extension": "py"...
2.546875
stackv2
# Python wrapper for 'aws configure' from pathlib import Path import os import config def createcredentialsfile(accesskey, secretkey): """Creates a credentials file""" filename = str(Path.home()) + "/.aws/credentials" if os.path.exists(filename): f = open(filename, "r") # Check to see if...
47
24.26
58
11
282
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_8bdfd4518ce2fb3f_c195a317", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (secret)](1) as clear text." ]
[ 25 ]
[ null ]
[ 13 ]
[ 51 ]
2024-11-18T21:22:48.018295+00:00
1,418,119,281,000
471b90ea3c53ba28e4c9cacc478f8409b5f64317
3
{ "blob_id": "471b90ea3c53ba28e4c9cacc478f8409b5f64317", "branch_name": "refs/heads/master", "committer_date": 1418119281000, "content_id": "d9400935acb9d1ba847951c3a00f7fa62a5358ef", "detected_licenses": [ "MIT" ], "directory_id": "ffee3fa9f03c8e2412699da154976e1c1878f7f0", "extension": "py", "fi...
2.75
stackv2
import os import sys import yaml import shutil import jinja2 import markdown import helpers # Template defaults defaults = { 'labels': None, } def read_yaml(filename): """ Read Yaml file given by ``filename`` and return dictionary data. """ with open(filename, 'rt') as f: return yaml.lo...
120
23.49
79
15
676
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_a837ac37c2e4905d_cd737c63", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 30 ]
[ null ]
[ 15 ]
[ 40 ]
2024-11-18T21:23:08.027712+00:00
1,657,255,346,000
f9eb1ff8cac37ee5650d79a10af64cb10639ad65
4
{ "blob_id": "f9eb1ff8cac37ee5650d79a10af64cb10639ad65", "branch_name": "refs/heads/master", "committer_date": 1657255346000, "content_id": "fc0b47dacdf6241962ec6b7637470567fe07dee3", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "c270d9ad39c5be7a4cfc2713204cd5cdc293fbc2", "extension": "p...
3.5
stackv2
# Human readable duration format import re def format_duration_unit(seconds): print(seconds) if seconds < 60: if seconds == 0: return "now" elif seconds == 1: return "1 second" else: return "{} seconds".format(seconds) elif seconds >= 60 and seconds < 3600: mins = seconds // 60 if mins == 1: ...
59
28
84
19
575
python
[{"finding_id": "codeql_py/overly-large-range_50bd7836070b833f_5f03baea", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 44 ]
[ null ]
[ 32 ]
[ 35 ]
2024-11-18T21:23:17.939359+00:00
1,633,618,818,000
42f05c20cc9a50d2149e6d7e262c84d447502d4d
2
{ "blob_id": "42f05c20cc9a50d2149e6d7e262c84d447502d4d", "branch_name": "refs/heads/main", "committer_date": 1633618818000, "content_id": "f4985c3fd788318641ec96ed70272c093092f8f3", "detected_licenses": [ "MIT" ], "directory_id": "7f43f1aa6cbc42141ad5099f5cfdf593c99685fd", "extension": "py", "file...
2.453125
stackv2
import importlib paramiko_found = importlib.find_loader("paramiko") scp_found = importlib.find_loader("scp") if paramiko_found != None and scp_found != None: import os import paramiko from scp import SCPClient from Components.status_bar import StatusBar class ScpConnect: def __init__(self): pass def __e...
69
26.3
73
17
485
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_9c02ebc5b4868b43_533ad43d", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 38 ]
[ null ]
[ 7 ]
[ 67 ]
2024-11-18T21:51:32.151796+00:00
1,490,910,242,000
5e774b857f09bde4c3c8b247b916d07fe4ad825b
2
{ "blob_id": "5e774b857f09bde4c3c8b247b916d07fe4ad825b", "branch_name": "refs/heads/master", "committer_date": 1490910242000, "content_id": "bb014f43f6b6f6eb56d0ea95888073e3c4e0cbb2", "detected_licenses": [ "MIT" ], "directory_id": "c9ff9e2fb8f090241c4e6ecae02733f600209303", "extension": "py", "fi...
2.3125
stackv2
from flask import Flask,session, request, flash, url_for, redirect, render_template, abort ,g from flask.ext.login import login_user , logout_user , current_user , login_required from flask.ext.sqlalchemy import SQLAlchemy db = SQLAlchemy() app = Flask(__name__) app.config['SECRET_KEY'] = 'secret_key' from flask....
93
27.08
93
13
578
python
[{"finding_id": "codeql_py/url-redirection_104b1979d8b9e3f2_f2b9eeb3", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 78 ]
[ null ]
[ 21 ]
[ 65 ]
2024-11-18T21:51:32.275082+00:00
1,615,842,249,000
fac9327c274e45aef9958a4a946b7b88b1dabfaf
3
{ "blob_id": "fac9327c274e45aef9958a4a946b7b88b1dabfaf", "branch_name": "refs/heads/main", "committer_date": 1615842249000, "content_id": "1a5dd090b9b390155727fa6455c00183f598afae", "detected_licenses": [ "MIT" ], "directory_id": "415016fa20b50ee2094d1957c70988831a5fc29c", "extension": "py", "file...
2.6875
stackv2
import os from flask import Flask, request, make_response, redirect, url_for, send_from_directory from werkzeug.utils import secure_filename from convert import convert_file from cleanup import cleanup with open('template.html', 'r') as inp: template = inp.read() app = Flask(__name__) app.config['upload_folde...
74
33.3
95
16
597
python
[{"finding_id": "codeql_py/reflective-xss_b711d4e1eb51aa04_74d9094b", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
3
true
[ "CWE-079", "CWE-079", "CWE-022" ]
[ "py/reflective-xss", "py/reflective-xss", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 42, 50, 58 ]
[ null, 52, null ]
[ 13, 12, 27 ]
[ 73, 64, 55 ]
2024-11-18T21:51:34.380204+00:00
1,529,056,139,000
63a882429299d1b71de1647dd01ac3d827fbd20c
2
{ "blob_id": "63a882429299d1b71de1647dd01ac3d827fbd20c", "branch_name": "refs/heads/master", "committer_date": 1529056139000, "content_id": "9c2b4597ad00e12d42dd864623e0a7462ef8c2f1", "detected_licenses": [ "MIT" ], "directory_id": "dd780f4fe3b0a4bf92a3661fecd5e10234fc3e91", "extension": "py", "fi...
2.46875
stackv2
#!/usr/bin/env python import logging from ansiblerunner import AnsibleRunner from flask import Flask, request, jsonify app = Flask(__name__) LOCALLOGS = True PRIVATE_KEY = '/etc/ssh/id_rsa_ansible' REMOTE_USER = 'root' MODULE_PATH = '/var/www/library' @app.route("/", methods=['GET']) def index(): host = reque...
46
29.59
105
19
338
python
[{"finding_id": "codeql_py/stack-trace-exposure_b53e21726aa62eed_9ae784e1", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 37 ]
[ null ]
[ 24 ]
[ 57 ]
2024-11-18T21:51:37.552365+00:00
1,371,134,213,000
7d1da65d20b68ef2cba9da4ce0723bb49779e024
3
{ "blob_id": "7d1da65d20b68ef2cba9da4ce0723bb49779e024", "branch_name": "refs/heads/master", "committer_date": 1371134213000, "content_id": "3424489a0129da0255abaccb4bb3654f47f06bb1", "detected_licenses": [ "MIT" ], "directory_id": "62ca557e4a899986955ba0d19c155f6d86158491", "extension": "py", "fi...
3.140625
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- import csv sortie = open("output.csv", "a") with open('donnees-nantes.csv', 'rb') as f: csvfile = csv.reader(f, delimiter=';') for row in csvfile: line = ','.join(row) latitudeDMS = line.split(',')[0].replace("N","") longitudeDMS = line.split(',')[1].replace("O"...
31
35.23
78
20
376
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_acf61b2a3d4c5c92_4f6835d6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 15 ]
[ null ]
[ 9 ]
[ 78 ]
2024-11-18T21:51:40.830069+00:00
1,576,373,862,000
29702c0d58d5068c90d21b9f3d83bde3b3eba6b8
4
{ "blob_id": "29702c0d58d5068c90d21b9f3d83bde3b3eba6b8", "branch_name": "refs/heads/master", "committer_date": 1576449357000, "content_id": "f09546930ca14262bca2983c568f117cf98c04a2", "detected_licenses": [ "MIT" ], "directory_id": "b2ee2014a5768509f0506c6f74ee966a34efdcfc", "extension": "py", "fi...
3.609375
stackv2
""" diceware main module """ import os import sys import argparse import re import random import password my_parser = argparse.ArgumentParser(prog='diceware', description=''' Create a passphrase based on the diceware standard. Use the "-i" flag to modify the password in real time. If you would rather...
80
37.71
171
13
774
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d1a9280bcfabb6bf_7be4ff94", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 55, 78 ]
[ null, null ]
[ 15, 11 ]
[ 72, 68 ]
2024-11-18T21:52:04.063265+00:00
1,567,784,686,000
4833a3764fd72b2fb29c87c10279a4e22deaa1e2
3
{ "blob_id": "4833a3764fd72b2fb29c87c10279a4e22deaa1e2", "branch_name": "refs/heads/master", "committer_date": 1567784686000, "content_id": "5b73464624fac3806c7fdf2ac2c77c12b63b2131", "detected_licenses": [ "MIT" ], "directory_id": "787f9ea84406d0780c34e72cf42d1dccc401f783", "extension": "py", "fi...
2.671875
stackv2
# Copyright (c) 2019, Anders Lervik. # Distributed under the MIT License. See LICENSE for more info. """Create a website with the folium map and precipitation info.""" import datetime import os import jinja2 from normetapi import location_forecast from frostapi import get_precipitation_observations from read_xml import...
173
30.28
75
14
1,254
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_c020dd39a31aacb5_35437901", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 64 ]
[ 66 ]
[ 11 ]
[ 6 ]
2024-11-18T22:02:40.782391+00:00
1,560,497,142,000
8cfc94c3fb3148d32950a8ff8d449766435eeb1c
2
{ "blob_id": "8cfc94c3fb3148d32950a8ff8d449766435eeb1c", "branch_name": "refs/heads/master", "committer_date": 1560497142000, "content_id": "da0cdb3534eb7e19e1d0dd25e615d88a0f65dbb1", "detected_licenses": [ "MIT" ], "directory_id": "3eff0a8b4b6f2d3bf7e74df184dbd879e84abef3", "extension": "py", "fi...
2.453125
stackv2
#!/usr/bin/python3 import re from lxml import html import HTMLInfo class BBPrice(object): def __init__(self, url): self.url = url r = HTMLInfo.get_html(url) if r.encoding: self.html = r.content.decode(r.encoding) else: self.html = r.content.decode('utf-8'...
99
34.63
160
18
861
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_1e1debe9bae7eefc_95f4408e", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'beibei.com/detail', so it might mat...
1
true
[ "CWE-020" ]
[ "py/incomplete-hostname-regexp" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'beibei.com/detail', so it might match more hosts than expected." ]
[ 28 ]
[ null ]
[ 54 ]
[ 75 ]
2024-11-18T22:02:45.071604+00:00
1,622,563,958,000
342679ed5186ed1c346011b5b9aa3ee60dd96b0a
3
{ "blob_id": "342679ed5186ed1c346011b5b9aa3ee60dd96b0a", "branch_name": "refs/heads/main", "committer_date": 1622563958000, "content_id": "6d3c1cbb43b076618a274b2778fe0d062d33d684", "detected_licenses": [ "Apache-2.0" ], "directory_id": "c87adbd599cbc703b450763b507ce2749a5e287a", "extension": "py", ...
3.09375
stackv2
import requests #Utilizamos la funcion get para realizar llamadas a microservicios en modo GET url = 'http://api.open-notify.org/iss-now.json' response = requests.get(url) print('Código de estado: ', response.status_code) print('Estado:', response.reason) if(response.status_code == 200): print('Cabeceras:', res...
24
34.25
78
12
190
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8f14d193eaa08709_8f8be1a0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 16, 17 ]
[ null, null ]
[ 26, 27 ]
[ 58, 60 ]
2024-11-18T22:02:50.399333+00:00
1,543,089,066,000
f6c9a878ae87a478f0074864f5e9567d2de9c2bb
3
{ "blob_id": "f6c9a878ae87a478f0074864f5e9567d2de9c2bb", "branch_name": "refs/heads/master", "committer_date": 1543089066000, "content_id": "a88550fad1a5920956950bbd1f1814f3e4e24993", "detected_licenses": [ "Apache-2.0" ], "directory_id": "3a6577c166d80af66b76957e4037d36cfdd5bbff", "extension": "py"...
3.046875
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- """ @author: djokester Samriddhi Sinha, IIT Kharagpur """ from keras.models import Sequential from keras.layers import Dense, Dropout from keras.layers import Embedding from keras.layers import Conv1D, GlobalAveragePooling1D, MaxPooling1D import numpy as np import lingata...
237
31.07
160
20
2,621
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f91351829b243a22_9e0b49bc", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 235, 236 ]
[ null, null ]
[ 11, 11 ]
[ 28, 36 ]
2024-11-18T22:16:39.232565+00:00
1,653,773,830,000
697573fdfc95da8f266f80f1f0515cd595419e49
3
{ "blob_id": "697573fdfc95da8f266f80f1f0515cd595419e49", "branch_name": "refs/heads/master", "committer_date": 1653773830000, "content_id": "656fbd361943446b211963d3ec39c478de72f544", "detected_licenses": [ "Unlicense" ], "directory_id": "0b2686498cc93894141e96164a9c4955a6d33084", "extension": "py",...
2.96875
stackv2
#!/usr/bin/python # -*- coding: utf-8 -*- # author Serj Sintsov <ssivikt@gmail.com>, 2010, Public Domain. """This script adds key-value pair line to the file encrypted by GPG """ import os import sys import shutil import uuid import subprocess import getpass SOURCE_PWDS_FILE_PATH = sys.argv[0] SOURCE_PWDS_FILE_COPY_...
107
25.29
117
12
697
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_630f26dab4e9721b_5a62ec3b", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (password)](3) as clear text.\nThis expression stores [sensitive data (password)](4) as clear text." ]
[ 29 ]
[ null ]
[ 17 ]
[ 60 ]
2024-11-18T22:16:40.100345+00:00
1,591,715,166,000
d7dcbc9b4cb85adb6baa51e04ec922b16650de7a
2
{ "blob_id": "d7dcbc9b4cb85adb6baa51e04ec922b16650de7a", "branch_name": "refs/heads/master", "committer_date": 1591715166000, "content_id": "704bc1a63d9edc86e93ace1800e3ad4211f29cad", "detected_licenses": [ "MIT" ], "directory_id": "d3f5fa016ea56fda1ab9ccf768b7680c01030895", "extension": "py", "fi...
2.453125
stackv2
import datetime import zlib import hashlib import os from imgid.img2b64 import img2b64 from imgid.img_api import face import sqliteDB def db(respond, json, img_hash, bytes_img): for i in range(0, respond['result']['face_num']): faceContent = ( respond['result']['face_list'][i]['face_token'], ...
80
35.35
75
15
693
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ef58d10b0d177f61_388971a9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 31 ]
[ null ]
[ 15 ]
[ 26 ]
2024-11-18T22:27:48.458460+00:00
1,446,238,150,000
0b085074babbea6be6039d99c092720fe5f8266e
2
{ "blob_id": "0b085074babbea6be6039d99c092720fe5f8266e", "branch_name": "refs/heads/master", "committer_date": 1446238150000, "content_id": "2446583fa8c8d87640aeeee29d0229463cd15e83", "detected_licenses": [ "MIT" ], "directory_id": "4732e8a2ac024971f5cda5631c2faaca0abf24f1", "extension": "py", "fi...
2.484375
stackv2
from faker import Factory from random import random, randint from datetime import date, timedelta import psycopg2 import getpass from decimal import Decimal import bcrypt ff = Factory.create() def generate_users(cursor): min_users = 10 max_users = 100 num_users = randint(min_users, max_users) ofile = open('...
78
25.71
144
18
591
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_b3c87eb20ffc2992_80211ead", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 39 ]
[ null ]
[ 17 ]
[ 69 ]
2024-11-18T22:28:15.433968+00:00
1,373,327,886,000
7e74029238ca12ff6f94bea6ec429d1653a7f146
2
{ "blob_id": "7e74029238ca12ff6f94bea6ec429d1653a7f146", "branch_name": "refs/heads/master", "committer_date": 1373327886000, "content_id": "72246ccecbd667c71700f16c7fa4cd3cb364c2e2", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e885cee8e119c0a486ca50bf822bb1003772a7f5", "extension": "py"...
2.34375
stackv2
import functools import logging import string import random import urllib import time import re from flask import current_app, request, session import simplejson as json import requests import config import storage logger = logging.getLogger(__name__) def response(data=None, code=200, headers=None, raw=False): ...
173
32.92
79
16
1,318
python
[{"finding_id": "codeql_py/polynomial-redos_688e14997a9661d7_6915a206", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with ma...
5
true
[ "CWE-1333", "CWE-918", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/polynomial-redos", "py/partial-ssrf", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "HIGH", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with many repetitions of 'a'.", "Part of the URL of this request depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value]...
[ 108, 74, 107, 109, 118 ]
[ null, null, null, null, 120 ]
[ 35, 12, 18, 18, 26 ]
[ 39, 59, 49, 43, 69 ]
2024-11-18T22:44:03.815665+00:00
1,587,631,368,000
dc1d5ed995d0fe051aa07d9f846c5f5317dab15f
3
{ "blob_id": "dc1d5ed995d0fe051aa07d9f846c5f5317dab15f", "branch_name": "refs/heads/master", "committer_date": 1596607541000, "content_id": "b4a636981a2b6c50462614ff06b0e8a3801574e6", "detected_licenses": [ "MIT" ], "directory_id": "e8d7ea855acd8f7ce147ff33c0dce10a43cc6228", "extension": "py", "fi...
2.625
stackv2
import abc import os from hashlib import md5, sha1 import hkdf from Crypto.Cipher import AES, ARC4, ChaCha20, ChaCha20_Poly1305, Salsa20 class BaseCipher: def __init__(self, password: str): self.master_key = self._get_key(password.encode("ascii", "ignore")) def _get_key(self, password: bytes, salt: ...
214
23.41
86
21
1,527
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_8724242b44b92fd5_48076c02", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The cryptographic algorithm ARC4](1) is broken or weak, and should not be used.\n[T...
3
true
[ "CWE-327", "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[The cryptographic algorithm ARC4](1) is broken or weak, and should not be used.\n[The cryptographic algorithm ARC4](2) is broken or weak, and should not be used.\n[The cryptographic algorithm ARC4](3) is broken or weak, and should not be used.\n[The cryptographic algorithm ARC4](4) is broken or weak, and should n...
[ 146, 154, 17 ]
[ null, null, null ]
[ 20, 20, 21 ]
[ 45, 46, 70 ]
2024-11-18T22:44:06.457591+00:00
1,559,357,086,000
4638b16dd4fa5720330ae0ef89d68d9160a0dcff
3
{ "blob_id": "4638b16dd4fa5720330ae0ef89d68d9160a0dcff", "branch_name": "refs/heads/master", "committer_date": 1559357086000, "content_id": "db84f404524978626955480d9b77dfb1efb457c9", "detected_licenses": [ "Apache-2.0" ], "directory_id": "f5bb048e946f7ca8cc5d84eba2887696fae2b231", "extension": "py"...
2.875
stackv2
import re import jieba import pymysql from docx import Document from docx.shared import RGBColor def cutword(word, baike): word = re.sub(r"[0-9\s+\.\!\/_,$%^*()?;;:-【】+\"\']+|[——!,;:。?、~@#¥%……&*()]+", "", word) baike = re.sub(r"[0-9\s+\.\!\/_,$%^*()?;;:-【】+\"\']+|[——!,;:。?、~@#¥%……&*()]+", "", baike) seg_...
61
28.31
100
15
579
python
[{"finding_id": "codeql_py/overly-large-range_5851bd045d084350_76d57732", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[:;<=>?@A-Z\\\\[\\\\\\\\]^_`a-z{{|}}~\\u007f\\u0080\\...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[:;<=>?@A-Z\\\\[\\\\\\\\]^_`a-z{{|}}~\\u007f\\u0080\\u0081\\u008....", "Suspicious character range that is equivalent to \\[:;<=>?@A-Z\\\\[\\\\\\\\]^_`a-z{{|}}~\\u007f\\u0080\\u0081\\u008...." ]
[ 10, 11 ]
[ null, null ]
[ 45, 46 ]
[ 48, 49 ]
2024-11-18T22:44:07.376650+00:00
1,664,993,530,000
87731ecb2b2fce0a42675b1b614fb9d9aeb7747c
2
{ "blob_id": "87731ecb2b2fce0a42675b1b614fb9d9aeb7747c", "branch_name": "refs/heads/master", "committer_date": 1664993530000, "content_id": "57aa5cb15ceb31e80fd3e949c85a9345867618fa", "detected_licenses": [ "Apache-2.0" ], "directory_id": "d386e3eab34a68973b3b6578e48d3fc96f74afa0", "extension": "py"...
2.4375
stackv2
import getpass import os import re import urllib import sys try: import json except ImportError: import simplejson json = simplejson try: import urllib2 except ImportError: import urllib.request # This usage is generally correct for this script urllib2 = urllib.request have_argparse = Tru...
180
35.28
127
14
1,477
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_b8bffb4b90a89ba9_da50048a", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
5
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive dat...
[ 174, 93, 101, 79, 89 ]
[ null, null, null, null, null ]
[ 17, 19, 26, 23, 19 ]
[ 37, 53, 50, 32, 28 ]
2024-11-18T22:44:07.623368+00:00
1,569,185,769,000
95b582cee1273f4b63a178bbe1182160305c9015
2
{ "blob_id": "95b582cee1273f4b63a178bbe1182160305c9015", "branch_name": "refs/heads/master", "committer_date": 1569185769000, "content_id": "10d3557f4f5449640334b9219061f707b9e7bf7d", "detected_licenses": [ "MIT" ], "directory_id": "b9a7b4add18213e3754b569bdd1fc0fb2f2e9ad5", "extension": "py", "fi...
2.40625
stackv2
## HOMESCAN TOOLS: device state ## (c) Copyright Si Dunford, Aug 2019 ## Version 1.1.0 # Imports import os,sys,traceback,platform,subprocess import time import socket import paho.mqtt.client as pahomqtt import json from lib.settings import settings from lib.shared import * # Device list devices = {} # Columns to di...
128
33.43
135
17
1,088
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ecc273c338f94307_aeff1b8c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 84 ]
[ null ]
[ 16 ]
[ 73 ]
2024-11-18T22:44:10.363640+00:00
1,446,031,410,000
e9116fad1d64bc1a873723a4014636db59fba441
2
{ "blob_id": "e9116fad1d64bc1a873723a4014636db59fba441", "branch_name": "refs/heads/master", "committer_date": 1446031410000, "content_id": "bc96a177cecdd59cf932e6766e5e8747c6204b6a", "detected_licenses": [ "MIT" ], "directory_id": "2989a71ec18a53043e57bb5bd94e31011fb2a368", "extension": "py", "fi...
2.34375
stackv2
from django.shortcuts import render, get_object_or_404 from django.contrib.auth import authenticate, login, logout from django.http import HttpResponseRedirect from django.contrib.auth.decorators import login_required from django.utils import timezone from .models import Post from markdown import markdown import re # C...
74
33.39
90
15
568
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_99cce1c6ce10a892_9eb221fd", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 64 ]
[ null ]
[ 25 ]
[ 33 ]
2024-11-18T20:24:15.288382+00:00
1,610,114,466,000
06acc270e2b49c77a3b2db39e645e5861ad020c9
2
{ "blob_id": "06acc270e2b49c77a3b2db39e645e5861ad020c9", "branch_name": "refs/heads/main", "committer_date": 1610114466000, "content_id": "1ad0710f8745b97053aa74463d35ef980b2c821b", "detected_licenses": [ "MIT" ], "directory_id": "a7bdb38ef0b9b5982ea1e55cda1a3629efeb4875", "extension": "py", "file...
2.421875
stackv2
import datetime import hashlib from django.conf import settings from django.db.models import Q from django.shortcuts import render, redirect from account import forms from account.models import User, ConfirmString ip = '118.25.108.254:80' def _makesure_password(pd1, pd2): """ 确认两个密码一样且符合规格 Parameter: ...
269
28.64
97
18
1,913
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_cfb12bdd0c772c34_c789fc90", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e...
[ 47 ]
[ null ]
[ 14 ]
[ 24 ]
2024-11-18T21:00:09.641345+00:00
1,688,139,733,000
fb421e4836c5d359e734df79133b4ee11be24683
2
{ "blob_id": "fb421e4836c5d359e734df79133b4ee11be24683", "branch_name": "refs/heads/master", "committer_date": 1690205730000, "content_id": "d8aeacc11943fae3887dd3368433080355d7f26a", "detected_licenses": [ "Apache-2.0" ], "directory_id": "54df06e1c0cdda4445838d203334d0615bd2cd40", "extension": "py"...
2.46875
stackv2
## ## Copyright (c) 2019 Intel Corporation ## ## Licensed under the Apache License, Version 2.0 (the "License"); ## you may not use this file except in compliance with the License. ## You may obtain a copy of the License at ## ## http://www.apache.org/licenses/LICENSE-2.0 ## ## Unless required by applicable law or ...
164
29.19
103
17
1,135
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_981f7c22da3339a0_da069e5e", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 71 ]
[ null ]
[ 9 ]
[ 72 ]
2024-11-18T21:00:28.995813+00:00
1,693,880,197,000
6a60e3515e8886a878fd5e342b63ba80192f49ff
2
{ "blob_id": "6a60e3515e8886a878fd5e342b63ba80192f49ff", "branch_name": "refs/heads/master", "committer_date": 1693880197000, "content_id": "061a6d5aaca0ea836974fa1a9ce0dcf02ff8a91f", "detected_licenses": [ "MIT" ], "directory_id": "7b8f1903ca25b20f2d62c8a49222e9ae9c3cb35b", "extension": "py", "fi...
2.5
stackv2
# A script to create stripped down rst files containing only exercises and AV for each module import os import re print("WARNING: This file seems unused and obsolete.") print("WARNING: If this is not so, then remove this warning from:", __file__) input("Press enter to continue...") rst_dir = os.path.realpath(os.path...
108
39.09
107
27
1,012
python
[{"finding_id": "codeql_py/redos_1146e4b1b0a4dd8b_ccde8748", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '.. avembed:: ' and containing man...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '.. avembed:: ' and containing many repetitions of '!/'." ]
[ 12 ]
[ null ]
[ 50 ]
[ 56 ]
2024-11-18T21:00:29.742318+00:00
1,676,139,610,000
df98fdaf119b355e440e5d222316a5da0897d818
3
{ "blob_id": "df98fdaf119b355e440e5d222316a5da0897d818", "branch_name": "refs/heads/master", "committer_date": 1676139610000, "content_id": "7c6f7a079b2b6e43b60f5ebd19932f9c7a47a889", "detected_licenses": [ "MIT" ], "directory_id": "255e19ddc1bcde0d3d4fe70e01cec9bb724979c9", "extension": "py", "fi...
2.6875
stackv2
from lxml import html import csv import os import requests from exceptions import ValueError from time import sleep from random import randint def parse(url): headers = { 'User-Agent': 'Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.90 Safari/537.36' } ...
95
38.21
161
22
907
python
[{"finding_id": "codeql_py/request-without-cert-validation_94ec77ff8cabd42a_73bfe11a", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 20 ]
[ null ]
[ 24 ]
[ 72 ]
2024-11-18T21:00:59.110100+00:00
1,509,281,904,000
ec5fb2c06085752982a4523deaff6ee3a53d07b7
2
{ "blob_id": "ec5fb2c06085752982a4523deaff6ee3a53d07b7", "branch_name": "refs/heads/master", "committer_date": 1509281904000, "content_id": "bb7f04fc82a26be8f17b804957c3fb1be0d177aa", "detected_licenses": [ "Apache-2.0" ], "directory_id": "dc2d97fbe7b6ffb5170b32faa49748f44c827362", "extension": "py"...
2.46875
stackv2
from flask import Flask, render_template, url_for, redirect, request from crudClass import Team import sqlite3, os app = Flask(__name__) @app.route('/test') def hello_world(): return "working Success" @app.route("/editTeam/<string:teamName>/", methods=["GET", "POST"]) def editTeam(teamName): conn = sqlite3...
298
38.18
152
17
2,539
python
[{"finding_id": "codeql_py/code-injection_287e6df0671a5cec_9e267e98", "tool_name": "codeql", "rule_id": "py/code-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This code execution depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "...
3
true
[ "CWE-094", "CWE-094", "CWE-215" ]
[ "py/code-injection", "py/code-injection", "py/flask-debug" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This code execution depends on a [user-provided value](1).", "This code execution depends on a [user-provided value](1).", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger." ]
[ 45, 69, 298 ]
[ null, null, null ]
[ 37, 37, 5 ]
[ 68, 68, 53 ]
2024-11-18T21:01:14.524202+00:00
1,682,991,058,000
8d37e116fcca0fc27807326add6b7e690eea61e1
3
{ "blob_id": "8d37e116fcca0fc27807326add6b7e690eea61e1", "branch_name": "refs/heads/master", "committer_date": 1682991058000, "content_id": "cfd84ad81737aff5700cb2c6fcce9d1728be21ec", "detected_licenses": [ "MIT" ], "directory_id": "64d6ee3b481be3a5c0c29ed5944e9fa6e6f5312f", "extension": "py", "fi...
2.734375
stackv2
import logging from config.spring import create_config_client from flask import Flask, render_template, flash, request from wtforms import Form, TextField, TextAreaField, validators, StringField, SubmitField import grpc import tensorflow as tf from tensorflow_serving.apis import predict_pb2 from tensorflow_serving....
71
34.83
88
16
530
python
[{"finding_id": "codeql_py/log-injection_112295453001391f_1097f423", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 29 ]
[ null ]
[ 27 ]
[ 31 ]
2024-11-18T21:01:20.445437+00:00
1,462,913,604,000
64ca40b2cbca935ab8fe61b7988216e9aa9dda94
3
{ "blob_id": "64ca40b2cbca935ab8fe61b7988216e9aa9dda94", "branch_name": "refs/heads/master", "committer_date": 1462913604000, "content_id": "241c8d21bb818d709817899146b7390af14d1693", "detected_licenses": [ "MIT" ], "directory_id": "9656deb94bdb7e098ad2425282b32edfcbad552f", "extension": "py", "fi...
2.546875
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- from __future__ import unicode_literals import codecs import json import os import re import sys from bs4 import BeautifulSoup from jinja2 import Environment, FileSystemLoader import requests from weasyprint import HTML def fetch_url(url): url = url.group(0) try:...
102
30.31
77
14
779
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_3f2f6dfe0594e557_ec6a71cd", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 67 ]
[ null ]
[ 7 ]
[ 56 ]
2024-11-18T21:01:23.068430+00:00
1,606,463,632,000
fb1c2b6ec28033e76637955a445a68e82bd1010d
3
{ "blob_id": "fb1c2b6ec28033e76637955a445a68e82bd1010d", "branch_name": "refs/heads/main", "committer_date": 1606463632000, "content_id": "99ed2bbc310506555f3ded45989cb7e4887c057c", "detected_licenses": [ "MIT" ], "directory_id": "b0e28d703c7096dd41ff6a709dce44f22d88ae8e", "extension": "py", "file...
2.875
stackv2
"""Helper class/methods to GET RESTCONF Config""" import requests import warnings import json def validate_json(response): """Validates JSON from response""" try: format_res = json.dumps(response.json(), sort_keys=True, indent=4) return format_res except json.JSONDecodeError: retu...
137
35.04
104
21
1,062
python
[{"finding_id": "codeql_py/request-without-cert-validation_4026be8282d6a76b_f34ca3a7", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
4
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 30, 74, 100, 122 ]
[ null, null, null, null ]
[ 20, 20, 20, 20 ]
[ 95, 95, 95, 95 ]
2024-11-18T21:25:36.600193+00:00
1,504,403,945,000
fe0e76de69247fe8d15271695f43e03f245e23e9
3
{ "blob_id": "fe0e76de69247fe8d15271695f43e03f245e23e9", "branch_name": "refs/heads/master", "committer_date": 1504403945000, "content_id": "f2e21d09e898c280a4cdfa4a8e43f5216fe70f87", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "c967eaffe4747f15a8dfc91bef0082db56dd64fe", "extension": "p...
2.609375
stackv2
import os from jinja2 import Environment, FileSystemLoader TMPL_DIR = os.path.join(os.path.abspath(os.path.dirname(__file__)), './templates') env = Environment(loader=FileSystemLoader(searchpath=TMPL_DIR)) tmpl = env.get_template('gallery.html') class Gallery: def __init__ (self, path, ext = '.png...
32
26.03
67
15
207
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_a2fc260d005a0ae7_b509319a", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 6 ]
[ null ]
[ 7 ]
[ 64 ]
2024-11-18T21:25:39.655248+00:00
1,622,793,358,000
acddf510d2237a63b4cb573018f72ebeaf73d172
3
{ "blob_id": "acddf510d2237a63b4cb573018f72ebeaf73d172", "branch_name": "refs/heads/main", "committer_date": 1622793358000, "content_id": "9f22a55683d569d6ff856c1d371e49c063f663ed", "detected_licenses": [ "Apache-2.0" ], "directory_id": "3062888f048b02f2551ade779a915bd62dd0700e", "extension": "py", ...
2.546875
stackv2
""" Copyright 2021 Google LLC Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at https://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software d...
119
31.58
102
15
903
python
[{"finding_id": "codeql_py/request-without-cert-validation_cf9b4313445814bb_6ec57ea0", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 46 ]
[ 47 ]
[ 12 ]
[ 89 ]
2024-11-18T21:51:13.942995+00:00
1,501,140,634,000
b87bcc193210ca063465d6c03af31591cf9c371d
3
{ "blob_id": "b87bcc193210ca063465d6c03af31591cf9c371d", "branch_name": "refs/heads/master", "committer_date": 1501140634000, "content_id": "4ac241e3ae42e3d4b30b70e77be2ad855c8ecfd5", "detected_licenses": [ "MIT" ], "directory_id": "7134bed859eef1018ed53110dbc7ad42f70c98c9", "extension": "py", "fi...
2.609375
stackv2
from flask import Flask, request, abort, send_from_directory from flask_cors import CORS import time import json import random import threading import http.client from collections import defaultdict app = Flask(__name__) CORS(app) # Storage # Log contains tuples of (simulated event time, name, success) log = [] #...
234
20.34
86
15
1,354
python
[{"finding_id": "codeql_py/reflective-xss_a9d959f28645f042_d4ea2893", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
4
true
[ "CWE-079", "CWE-079", "CWE-079", "CWE-079" ]
[ "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 41, 45, 141, 149 ]
[ null, null, null, null ]
[ 9, 9, 9, 9 ]
[ 23, 24, 29, 26 ]
2024-11-18T22:00:18.002670+00:00
1,633,216,552,000
4958d507a9ff2ce31a68a472826f9620ba560b17
3
{ "blob_id": "4958d507a9ff2ce31a68a472826f9620ba560b17", "branch_name": "refs/heads/main", "committer_date": 1633216552000, "content_id": "1ca05b1de081fe56bdb4bcb8f72f89de838b0929", "detected_licenses": [ "Apache-2.0" ], "directory_id": "555ed89762eca7d9d303cdc62cf82409b4a2acb3", "extension": "py", ...
3.015625
stackv2
"""PyPI-related functionality""" import ast import subprocess import urllib from urllib.parse import urlparse import requests import requirements def python_requirements_dot_text_analysis(filepath): """Execute overall analysis of Python's requirements.txt Combines python-related functionality to perform e...
191
27.76
83
16
1,232
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_f2a95d9c3d06935e_fd7aebd4", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [github.com](1) may be at an arbitrary position in the ...
3
true
[ "CWE-020", "CWE-020", "CWE-020" ]
[ "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "The string [github.com](1) may be at an arbitrary position in the sanitized URL.", "The string [github.com](1) may be at an arbitrary position in the sanitized URL.", "The string [github.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 158, 164, 171 ]
[ null, null, null ]
[ 8, 16, 16 ]
[ 58, 35, 37 ]
2024-11-18T22:00:46.202959+00:00
1,665,552,044,000
c8bc78b7f8f820450bad1495fcda0f88be630d27
2
{ "blob_id": "c8bc78b7f8f820450bad1495fcda0f88be630d27", "branch_name": "refs/heads/main", "committer_date": 1665552044000, "content_id": "34f0924ab1158b5c065c805eb46208333bd050c2", "detected_licenses": [ "Apache-2.0" ], "directory_id": "75862eb85172f09b1c48e25c82846e2981427613", "extension": "py", ...
2.40625
stackv2
# flake8: noqa # pylint: skip-file import argparse import os import sys from datetime import datetime from os.path import expanduser import requests import urllib3 import yaml from colorama import Back, Fore, Style from jinja2 import Template urllib3.disable_warnings() def create_http_session(general_config): s...
344
32.03
120
17
2,608
python
[{"finding_id": "codeql_py/request-without-cert-validation_7f6d0b07e5b624e4_d3dbbdcb", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
3
true
[ "CWE-295", "CWE-295", "CWE-079" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 63, 78, 102 ]
[ null, null, null ]
[ 9, 9, 20 ]
[ 61, 73, 41 ]
2024-11-18T22:01:02.355060+00:00
1,470,856,242,000
c81635f06a4c8cc5aa22c3e5303af8fd955f3789
3
{ "blob_id": "c81635f06a4c8cc5aa22c3e5303af8fd955f3789", "branch_name": "refs/heads/master", "committer_date": 1470856242000, "content_id": "85316e607d1733d261cc4d2a9ee076976489e68d", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "ceca9e9726946c3216cd29009874df2ef12b081b", "extension": "p...
2.78125
stackv2
#!/usr/bin/python ''' BetterParse Author: Sebastian 'Sebass' Ausitn Email: pensec31337@gmail.com ''' import re import os import sys, traceback def main(): try: if (sys.argv[1] == None): filePath = raw_input("Enter the path to Bettercap output log: ") else: filePath = sys.argv[1] if not (os.path.is...
52
25.6
90
21
404
python
[{"finding_id": "codeql_py/overly-large-range_375907d78634bd36_099aee10", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with 0-9 in the same character class, and overlaps with A-Z in ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with 0-9 in the same character class, and overlaps with A-Z in the same character class, and is equivalent to \\[.\\/0-9:;<=>?@A-Z\\\\[\\]." ]
[ 23 ]
[ null ]
[ 32 ]
[ 35 ]
2024-11-18T22:15:00.968060+00:00
1,627,194,391,000
8bb3edf5338c17ffcc04bc3877721a3c2131905a
2
{ "blob_id": "8bb3edf5338c17ffcc04bc3877721a3c2131905a", "branch_name": "refs/heads/master", "committer_date": 1627194391000, "content_id": "a0ee1832eb4dd85fbab26f9b14f44ace4c51bb60", "detected_licenses": [ "MIT" ], "directory_id": "03c38cbca59c3dc7e319b45bacdb6ab3d07adff1", "extension": "py", "fi...
2.34375
stackv2
""":mod:`SDB` -- Represents a Neopets user account .. module:: SDB :synopsis: Represents a Neopets user account .. moduleauthor:: Joshua Gilman <joshuagilman@gmail.com> """ from neolib.exceptions import logoutException from neolib.exceptions import neopetsOfflineException from neolib.exceptions import noCookiesFor...
352
34.43
138
21
2,712
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_288f70b1d698ebb0_025f982c", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (id)](2) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (id)](2) is used in a hashing algorithm (MD5) that is in...
[ 237, 341 ]
[ null, null ]
[ 33, 33 ]
[ 55, 55 ]
2024-11-18T22:15:01.985891+00:00
1,677,754,157,000
ead5ad5ef0f81666f4e7d29ea6579588c8c7a18f
3
{ "blob_id": "ead5ad5ef0f81666f4e7d29ea6579588c8c7a18f", "branch_name": "refs/heads/master", "committer_date": 1677754157000, "content_id": "540e5eb33aeb54d7ada7a84d1a674951110186d4", "detected_licenses": [ "Apache-2.0" ], "directory_id": "ea218644f825b97ec378160cd5006eaa17341987", "extension": "py"...
2.71875
stackv2
# coding=utf-8 import requests from bs4 import BeautifulSoup import xlwt import random import traceback import sys reload(sys) sys.setdefaultencoding('utf8') def request_douban(url): try: ua_list = [ "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv2.0.1) Gecko/20100101 Firefox/4.0.1", ...
90
33.34
155
17
977
python
[{"finding_id": "codeql_py/request-without-cert-validation_502be1b85fec99ac_6b4dc5fa", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 27 ]
[ null ]
[ 20 ]
[ 72 ]
2024-11-18T22:15:06.224351+00:00
1,632,492,475,000
74181191fbeb7a0048e664a976de65d28205339c
2
{ "blob_id": "74181191fbeb7a0048e664a976de65d28205339c", "branch_name": "refs/heads/master", "committer_date": 1632492475000, "content_id": "91e7d3b2c3739804c2fc0f4a4a03f20000340809", "detected_licenses": [ "MIT" ], "directory_id": "92d98da8055f1a598b8349286d095be54b11ee0f", "extension": "py", "fi...
2.375
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- """CLI for generating the JSON file expected by the pathway visualiser.""" __author__ = 'Thomas Duigou' __license__ = 'MIT' import os import sys import json import logging import tarfile import argparse import tempfile from pathlib import Path from rpviz.utils import...
128
37.12
116
21
1,048
python
[{"finding_id": "codeql_py/tarslip_4ea78f45d8f48683_ae567f71", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 72 ]
[ null ]
[ 21 ]
[ 24 ]
2024-11-18T22:25:58.539122+00:00
1,561,116,654,000
6f30ba9d42ba4a85926f680913fd891915628b98
4
{ "blob_id": "6f30ba9d42ba4a85926f680913fd891915628b98", "branch_name": "refs/heads/master", "committer_date": 1561116654000, "content_id": "6a138774dc1c58200dbca3789fa2fe21c7ebd1ce", "detected_licenses": [ "Unlicense" ], "directory_id": "726ac14281b6c31a5e517b69fbc7eec639e937ea", "extension": "py",...
3.953125
stackv2
# 创建一个人事系统类 class hrSystem: # 创建存储员工名字的变量 name name = '' # 创建存储员工工资的变量 salary salary = 0 # 创建存储员工绩效的变量 kpi kpi = 0 # 定义录入员工信息的类方法 @classmethod def record(cls, name, salary, kpi): cls.name = name cls.salary = salary cls.kpi = kpi @classmethod def check_na...
63
20.51
67
16
443
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a5e47386e36d1fd4_cacc7320", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text." ]
[ 32 ]
[ null ]
[ 19 ]
[ 44 ]
2024-11-18T22:26:03.993498+00:00
1,544,520,291,000
6b8f84a141e7122a3fa200a5fedbd545755d6663
2
{ "blob_id": "6b8f84a141e7122a3fa200a5fedbd545755d6663", "branch_name": "refs/heads/master", "committer_date": 1544520291000, "content_id": "23d227a3c9141bd416228686d72d9c6f22ed1060", "detected_licenses": [ "MIT" ], "directory_id": "2d4243149d7a8c2385c24ee331a076c34eefcd38", "extension": "py", "fi...
2.390625
stackv2
from datetime import datetime from flask import Flask import os from pardal import get_logger from peewee import DateTimeField, CharField from playhouse.flask_utils import FlaskDB app = Flask(__name__) app.config.from_object(__name__) app.config['SECRET_KEY'] = 'super secret key' app.config['DATABASE'] = f'sqlite:///...
48
25.69
65
13
303
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7cb13673b9a11506_65d1bd8c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text." ]
[ 34 ]
[ 37 ]
[ 15 ]
[ 32 ]
2024-11-18T20:40:03.568321+00:00
1,596,695,357,000
648dcc41faedf048df423ee1a7017e93691eb436
2
{ "blob_id": "648dcc41faedf048df423ee1a7017e93691eb436", "branch_name": "refs/heads/master", "committer_date": 1596695357000, "content_id": "28faa6a6b6762e7dfc47e040f390185f1a55a71f", "detected_licenses": [ "MIT" ], "directory_id": "236e165a501de94113c085b2d651df6e481f5500", "extension": "py", "fi...
2.34375
stackv2
from flask import Flask, render_template, request, redirect, url_for, flash import os from werkzeug.utils import secure_filename import getpreds upload_folder = 'static' allowed_extensions = ['jpeg' ,'jpg', 'png'] app = Flask(__name__) app.config['upload_folder'] = upload_folder app.config["ALLOWED_IMAGE_EXTENSIONS"]...
51
30.14
140
17
393
python
[{"finding_id": "codeql_py/flask-debug_fa60b1b7a118c59e_d5aa42f7", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-601", "CWE-601" ]
[ "py/flask-debug", "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 51, 32, 36 ]
[ null, null, null ]
[ 2, 20, 20 ]
[ 21, 31, 31 ]
2024-11-18T21:08:10.175257+00:00
1,612,431,998,000
710594ed722bbd22558afef200944fa12577f4df
3
{ "blob_id": "710594ed722bbd22558afef200944fa12577f4df", "branch_name": "refs/heads/main", "committer_date": 1612431998000, "content_id": "0abdb834eeeb75d0ae25de5887cf287d5164a9a5", "detected_licenses": [ "MIT" ], "directory_id": "98e8f725fcdd6c30918149c90c9288cd363676fb", "extension": "py", "file...
2.90625
stackv2
import hashlib from api_token.models import Token def create_token(request): """トークンを作成 """ username = request.user.username email = request.user.email hs = hashlib.md5((username + email).encode()).hexdigest() return Token.objects.create(token=hs, user=request.user) def has_token(request):...
39
20.59
61
14
225
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_53a541b1ef6a6671_1698518b", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.",...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 11 ]
[ null ]
[ 22 ]
[ 49 ]
2024-11-18T21:08:11.157390+00:00
1,621,638,175,000
9333d318ba64be43e008c273c88a644b299edfe7
2
{ "blob_id": "9333d318ba64be43e008c273c88a644b299edfe7", "branch_name": "refs/heads/master", "committer_date": 1621638175000, "content_id": "534a5c507efe98ec9a3faf8e934fca65eae1c3a0", "detected_licenses": [ "MIT" ], "directory_id": "93cda74e95b4d3c37f616d8d4ce0daedea2bc6ad", "extension": "py", "fi...
2.390625
stackv2
# standard python imports import time # fix(clean): remove import random import string import base64 import hashlib import datetime # external imports import bcrypt from flask import current_app from sqlalchemy import not_ from sqlalchemy.orm.exc import NoResultFound # internal imports from main.app import db from...
208
35.08
149
18
1,723
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_afa86f5433e52679_c7fe117b", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally e...
[ 98 ]
[ null ]
[ 53 ]
[ 86 ]
2024-11-18T21:08:18.889886+00:00
1,591,158,463,000
6ba546c7c2406b07ee9e2ea115e58a9784c357f6
3
{ "blob_id": "6ba546c7c2406b07ee9e2ea115e58a9784c357f6", "branch_name": "refs/heads/master", "committer_date": 1591158463000, "content_id": "7f3a92147d869b351922a38d168a7826426fbb2d", "detected_licenses": [ "Apache-2.0" ], "directory_id": "0d0926a5bdb7890bfdcd8bd7a41353379556baa5", "extension": "py"...
2.53125
stackv2
#!/usr/bin/env python3 """ Flask app that walks through a given directory to index ROM ZIPs and renders web pages using templates. """ import json import os from datetime import datetime import arrow import requests from flask import ( Flask, jsonify, render_template, ) from utils import get_date_from_zi...
216
26.87
88
18
1,447
python
[{"finding_id": "codeql_py/full-ssrf_3aca20ab4588f649_d9556f1e", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
4
true
[ "CWE-918", "CWE-079", "CWE-079", "CWE-079" ]
[ "py/full-ssrf", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 206, 152, 208, 212 ]
[ null, null, null, null ]
[ 16, 16, 16, 12 ]
[ 50, 76, 58, 43 ]
2024-11-18T21:08:22.010759+00:00
1,466,043,856,000
37ad8ad29f738ac095936497eebaec9811753dcb
3
{ "blob_id": "37ad8ad29f738ac095936497eebaec9811753dcb", "branch_name": "refs/heads/master", "committer_date": 1466043856000, "content_id": "d727eb427dd1187b351d58b66a72894213259d02", "detected_licenses": [ "MIT" ], "directory_id": "b99853cdb0527bd0a8672fb214f4addfa7ee72cd", "extension": "py", "fi...
2.59375
stackv2
""" ssh client for stash. ssh looks for a valid key generated buy ssh-keygen in .ssh. You can open an interactive shell by not passing a command. If a command is passed, the single command is ran with output then ssh exits. Once a valid ssh session has been created the special command pythonista [get|put|edit] file1 [...
273
34.99
135
22
2,175
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_3431933ba1b375ee_3adfbdee", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 87 ]
[ null ]
[ 9 ]
[ 71 ]
2024-11-18T21:08:24.766535+00:00
1,553,848,136,000
bc3deed5ab03138ff589f830f1a9b75f14b4bb3a
3
{ "blob_id": "bc3deed5ab03138ff589f830f1a9b75f14b4bb3a", "branch_name": "refs/heads/master", "committer_date": 1553848136000, "content_id": "b445627625919f8fc91fda684fc8d986cbe46531", "detected_licenses": [ "MIT" ], "directory_id": "1200d01d4bd1c7f03485ff3f1559535c616e4918", "extension": "py", "fi...
2.625
stackv2
# -*- coding: utf-8 -*- """NIM REST API Python Client""" from __future__ import absolute_import import hashlib import os import time from netease_im import util __author__ = "Manson Li" __email__ = "manson.li3307@gmail.com" class BaseComponent(util.ApiClient): """A base component""" def __init__(self, b...
85
30.41
86
19
663
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_0ce9f9ad80c66274_0843dcd3", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecu...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecure." ]
[ 77 ]
[ null ]
[ 28 ]
[ 82 ]
2024-11-18T21:08:29.005657+00:00
1,617,033,622,000
430d178f7b1fb7c0080c2bc165788c4666e87384
3
{ "blob_id": "430d178f7b1fb7c0080c2bc165788c4666e87384", "branch_name": "refs/heads/main", "committer_date": 1617033622000, "content_id": "709a7fe431d7e41a3ff1ac83a73461b1f736cdff", "detected_licenses": [ "MIT" ], "directory_id": "6d5ac9d831244080ce950d7104d3f7e5bc0e3068", "extension": "py", "file...
3.421875
stackv2
import time class CtAquarium: def __init__(self, emp_name, count_no, entries_val): self.store_name = "CT AQUARIUM" self.assoc_name = emp_name self.phone_no = "8608758562" self.curr_time = time.strftime("REG %m-%d-%Y %H:%M") self.counter_no = count_no self.entries_v...
77
26.6
102
15
527
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1f5ebd8833b7b6d8_3fb3bbf2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 18 ]
[ null ]
[ 23 ]
[ 36 ]
2024-11-18T21:31:32.390563+00:00
1,420,002,372,000
bf006587e4b3e43d4fa4af155dee29177decb454
2
{ "blob_id": "bf006587e4b3e43d4fa4af155dee29177decb454", "branch_name": "refs/heads/master", "committer_date": 1420002372000, "content_id": "f7730e425061e7381b120b521f36f4b281ea877b", "detected_licenses": [ "Apache-2.0", "BSD-2-Clause" ], "directory_id": "cf4b0eaca92048c6fff0de933b69b6322f17a073",...
2.390625
stackv2
# Licensed under the Apache License, Version 2.0 (the "License"); you may # not use this file except in compliance with the License. You may obtain # a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the Li...
277
38.86
102
18
2,409
python
[{"finding_id": "codeql_py/request-without-cert-validation_d272d3414d4262da_6755c35c", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
3
true
[ "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 180, 189, 192 ]
[ null, null, null ]
[ 12, 17, 17 ]
[ 89, 101, 103 ]
2024-11-18T21:31:53.803118+00:00
1,554,765,330,000
ff0c6ded4a61bd9b476cec1ca62f243112ea38b6
2
{ "blob_id": "ff0c6ded4a61bd9b476cec1ca62f243112ea38b6", "branch_name": "refs/heads/master", "committer_date": 1554765330000, "content_id": "482a15e324aaeb9588323f3329698e0673b47f19", "detected_licenses": [ "Apache-2.0" ], "directory_id": "436a64d2199b9a246ce2c4a693767aa5ddba0013", "extension": "py"...
2.375
stackv2
""" This file is packed in the container and acts as a helper function to make outbound ReST calls """ import json import requests from requests.auth import HTTPBasicAuth from requests.packages.urllib3.exceptions import InsecureRequestWarning __author__ = "Swanand Rao" __copyright__ = "" __credits__ = ["Swa...
48
31.98
95
16
394
python
[{"finding_id": "codeql_py/request-without-cert-validation_767f7e77c9f1bab8_f7954af3", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 38 ]
[ 39 ]
[ 13 ]
[ 55 ]
2024-11-18T21:32:10.740344+00:00
1,312,286,524,000
3f41cb1acbbb1a397ae1288bca1cbcd27c0d3f33
2
{ "blob_id": "3f41cb1acbbb1a397ae1288bca1cbcd27c0d3f33", "branch_name": "refs/heads/master", "committer_date": 1312286524000, "content_id": "95c287ef082d428fe43e0a6acfbcfd21d8d37774", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "68f1f7396152abe954036218697387b3989a8f7b", "extension": "p...
2.375
stackv2
# -*- coding: utf-8 -*- import os import subprocess import virtualenv from templateserver import __version__ as version DEFAULT_TEMPLATE_DIR = 'templates' DEFAULT_MEDIA_DIR = 'media' DEFAULT_STATIC_DIR = 'static' DEFAULT_ENV_DIR = '.env' DEFAULT_RUNSERVER_PATH = 'runserver.py' RUNSERVER_TEMPLATE = os.path.abspath(os...
81
34.93
102
19
672
python
[{"finding_id": "codeql_py/overly-permissive-file_c5bc6093e699bda9_80b55d2a", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable." ]
[ 43 ]
[ null ]
[ 5 ]
[ 34 ]
2024-11-18T21:32:23.792904+00:00
1,508,105,214,000
f8616bf6105046a7d663cf6526acf3cb4ee34ce7
2
{ "blob_id": "f8616bf6105046a7d663cf6526acf3cb4ee34ce7", "branch_name": "refs/heads/master", "committer_date": 1508105214000, "content_id": "2f18188a00aaae5693898f01e1e39b7fe14c50aa", "detected_licenses": [ "MIT" ], "directory_id": "70bd38b6559c3c8060fa0efadf0bf9f7298dd7f1", "extension": "py", "fi...
2.484375
stackv2
#------------------------------ # SSH session, to be tested #------------------------------ class SSH(object): def __init__(self, device_name, username,password, buffer=65535,delay="0.5", port="22"): self.device_name = device_name self.username = username self.password = password sel...
141
32.99
92
17
975
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_a9c6691ea79404b4_8dd25dae", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 20 ]
[ null ]
[ 13 ]
[ 83 ]
2024-11-18T21:32:25.658799+00:00
1,549,822,526,000
a60f7489596ce979ad96f7cff8b4edf1ea4174e2
3
{ "blob_id": "a60f7489596ce979ad96f7cff8b4edf1ea4174e2", "branch_name": "refs/heads/master", "committer_date": 1549822557000, "content_id": "583fd9ae8fe94fb96739f510ea10b88f585dd489", "detected_licenses": [ "MIT" ], "directory_id": "a801dd999c5b29fa587ec8c20beb914a9e91df6d", "extension": "py", "fi...
2.5625
stackv2
from flask import Flask, request, jsonify import logging import sys from deepcubes.models import Sentiment if len(sys.argv) < 2: print("Format: <path_to_model>") sys.exit() logger = logging.getLogger("SentimentService") logger.setLevel(logging.INFO) # create the logging file handler handler = logging.FileHa...
60
26.85
74
15
374
python
[{"finding_id": "codeql_py/log-injection_93e46307a92e5109_0e1f4a6e", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 45 ]
[ 47 ]
[ 21 ]
[ 10 ]
2024-11-18T21:32:58.161408+00:00
1,561,854,857,000
8e8c332285b4bd4bbe2f26cc96a7bcf9d0ca7db4
3
{ "blob_id": "8e8c332285b4bd4bbe2f26cc96a7bcf9d0ca7db4", "branch_name": "refs/heads/master", "committer_date": 1561854857000, "content_id": "ef3ab574c839c73c46b8f430bf6599461efa3626", "detected_licenses": [ "MIT" ], "directory_id": "5cb6082fcb3aeb01f8abd1f66c5a2c01cb9ff733", "extension": "py", "fi...
2.703125
stackv2
#!/usr/bin/env python3 """ __main__.py main entry file for Ghostpass console interactions. This file comprises of the main method that enables the user to initialize a session and perform all operations needed to interact with that session. Several helper methods are also provided, specifically for working tog...
340
37.77
140
19
2,855
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_2ae96caf8468956d_f01cab52", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 199 ]
[ null ]
[ 27 ]
[ 42 ]
2024-11-18T21:49:04.385191+00:00
1,574,655,805,000
abc1bc00828ee581d4de7872b0cb8ce8085b8323
5
{ "blob_id": "abc1bc00828ee581d4de7872b0cb8ce8085b8323", "branch_name": "refs/heads/master", "committer_date": 1574655805000, "content_id": "beab6f956e7974860ceb594644bbd67101034ad4", "detected_licenses": [ "MIT" ], "directory_id": "9888b161ced0b5a1d33502dc9d26a4d861cf7b16", "extension": "py", "fi...
4.78125
stackv2
# Create a class called as employee, employee count, call constructor, pass name and salary # Inside the constructor, pass name and salary and increment the employee count # Use an instance method that displayed the total number of employees present class Employee: employee_count = 0 def __init__(self, name, ...
21
31
91
9
161
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d18d012bee08e928_416d8f73", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (priva...
[ 20, 21 ]
[ null, null ]
[ 7, 7 ]
[ 30, 40 ]
2024-11-18T22:26:08.658399+00:00
1,609,773,809,000
ae0f8ab6b94a18059574923bd49ef4c5560ae04c
2
{ "blob_id": "ae0f8ab6b94a18059574923bd49ef4c5560ae04c", "branch_name": "refs/heads/main", "committer_date": 1609773809000, "content_id": "a7c00a4e0b85c71344ab0569a39748f4ed25176e", "detected_licenses": [ "Apache-2.0" ], "directory_id": "751f293eeb51ab6f7b98ac7dc6acdd4aef3c79bc", "extension": "py", ...
2.4375
stackv2
""" This module provides the functionality of uploading files from s3 to an FTP server. """ import base64 import json import logging import os import boto3 import paramiko from botocore.exceptions import ClientError from exceptions import BinarySecretError, InvalidAuthTypeError SECRET_KEY = os.getenv("SECRET_KEY") V...
229
31.34
88
16
1,626
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_bf3c02d2c3dd41df_adf9207a", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 78 ]
[ null ]
[ 9 ]
[ 78 ]
2024-11-18T22:42:09.718348+00:00
1,552,182,185,000
e70508398f63e5ef419f37d198c5e3a2ac8ac7ce
3
{ "blob_id": "e70508398f63e5ef419f37d198c5e3a2ac8ac7ce", "branch_name": "refs/heads/master", "committer_date": 1552182185000, "content_id": "e0d8feba1a79e0b0490ae8d8e0ac2503651b15ad", "detected_licenses": [ "MIT" ], "directory_id": "d46eb5cdd2e6245f75083883b1de7cdc0ff99969", "extension": "py", "fi...
2.546875
stackv2
import requests import json import logging _LOGGER = logging.getLogger(__name__) class ClearPass: """Login when class is initiated.""" def __init__(self, data): self.access_token = None self._logged_in = self.get_access_token(data) self.server = data['server'] if self._logged_...
150
37.21
110
15
1,196
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_eaa3c82857911228_a03a7971", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (secret)](4) as clear text.\nThis expression logs [sensitive data (passwor...
[ 112, 140, 127 ]
[ null, null, null ]
[ 27, 27, 27 ]
[ 56, 56, 56 ]
2024-11-18T22:42:11.813077+00:00
1,611,616,058,000
f25f716b4942ecb9830bc63eb11daf6eee0b2d1f
3
{ "blob_id": "f25f716b4942ecb9830bc63eb11daf6eee0b2d1f", "branch_name": "refs/heads/master", "committer_date": 1611616058000, "content_id": "7ab98bcef15fad2b966bf152cff11ba68a12d05f", "detected_licenses": [ "MIT" ], "directory_id": "5983d20bf99d809bde3a813d5418d4bbffcc0280", "extension": "py", "fi...
2.515625
stackv2
from discord.ext import commands import discord import locale import praw from random import randint, choice from datetime import datetime from cogs.utils import Defaults locale.setlocale(locale.LC_ALL, '') class Reddit(commands.Cog): def __init__(self, bot): self.bot = bot @commands.bot_has_perm...
185
40.99
110
21
1,573
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_c08dbc2caffb96bc_ce96807e", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [i.imgur.com](1) may be at an arbitrary position in the...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [i.imgur.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 128 ]
[ null ]
[ 47 ]
[ 72 ]
2024-11-18T20:31:25.273645+00:00
1,653,076,223,000
2224c3a344796ef7d276cb52b49c30f905481812
3
{ "blob_id": "2224c3a344796ef7d276cb52b49c30f905481812", "branch_name": "refs/heads/master", "committer_date": 1653076223000, "content_id": "690df7a6532f6f30016e5bcf00a2504fe5fd1590", "detected_licenses": [ "MIT" ], "directory_id": "7d70a8304d75747c64366777601b2a70f57a41c9", "extension": "py", "fi...
2.671875
stackv2
from pathlib import Path import jinja2 from ..expressions.exprgraph_utils import ExprBase def visualize_graph_container(g,asdict=False): nodes,edges = [],[] for idx,node in g.iter_nodes(): classname = node.__class__.__name__ size = 20 font = {'size':20,'face':'arial'} nodes.append(dict(id=idx,label=idx,size=...
82
29.7
90
16
693
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_0435c2c3e560648c_852ac722", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 67 ]
[ null ]
[ 8 ]
[ 61 ]
2024-11-18T20:31:26.673188+00:00
1,551,565,134,000
c2d32cf204b6ca5c641be3f169c5a931c713fb6d
3
{ "blob_id": "c2d32cf204b6ca5c641be3f169c5a931c713fb6d", "branch_name": "refs/heads/master", "committer_date": 1551565134000, "content_id": "c4a2832d58f1a15488b5ff35eeb981bbf2345463", "detected_licenses": [ "Apache-2.0" ], "directory_id": "0784469de7e6c9d9e28fa70bf2e319195b6b4d91", "extension": "py"...
3.46875
stackv2
#our first python script #AhmedSwailm #https://www.youtube.com/ahmedswailm #http://facebook.com/ahmedswailm2 filepath = "combofile.txt" #the combo file path (text file we need test it) combo = open(filepath,"r") #open our file + read it so we can do our work on it line = list(filepath) #we make our coombo a...
23
52.52
113
12
326
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_f0725737cb56bbd5_48b261f1", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 17, 19 ]
[ null, null ]
[ 25, 15 ]
[ 39, 23 ]
2024-11-18T20:31:27.439851+00:00
1,561,757,953,000
59d0c7b756b91f73916712b66e222907f2872c8e
2
{ "blob_id": "59d0c7b756b91f73916712b66e222907f2872c8e", "branch_name": "refs/heads/master", "committer_date": 1561757953000, "content_id": "1460ad85f1af6053f2933b390a956eae6f4e1fc9", "detected_licenses": [ "Apache-2.0" ], "directory_id": "eadf337fec158b19ee5014d93f31a0dcf2748d84", "extension": "py"...
2.453125
stackv2
# Copyright (c) 2019 Altinity LTD # # This product is licensed to you under the # Apache License, Version 2.0 (the "License"). # You may not use this product except in compliance with the License. # # This product may include a number of subcomponents with # separate copyright notices and license terms. Your use of the...
374
37.22
79
17
3,071
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d3482910b38b0432_04d67463", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text.\nThis expression logs [sensitive data (passw...
[ 374 ]
[ null ]
[ 17 ]
[ 24 ]
2024-11-18T20:53:44.003626+00:00
1,492,009,245,000
8aceae21cc0a6ba3623cdd5b6b01fda664a34f1b
2
{ "blob_id": "8aceae21cc0a6ba3623cdd5b6b01fda664a34f1b", "branch_name": "refs/heads/master", "committer_date": 1492009245000, "content_id": "4233fb3790089ed1713938251c2485ca2a2381c2", "detected_licenses": [ "Apache-2.0" ], "directory_id": "d927f0a9f60d35829d4626800018876738ffaaee", "extension": "py"...
2.328125
stackv2
#!/usr/bin/env python import urllib import json import os from flask import Flask from flask import request from flask import make_response # Flask app should start in global layout app = Flask(__name__) @app.route('/webhook', methods=['POST']) def webhook(): req = request.get_json(silent=True, force=True) ...
117
28.5
99
15
937
python
[{"finding_id": "codeql_py/flask-debug_19d0e7c3b7632241_95525e6a", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 117, 26 ]
[ null, null ]
[ 5, 23 ]
[ 51, 26 ]
2024-11-18T21:10:02.704934+00:00
1,607,123,839,000
5fe1891cf38044a4007158eb13a9c82b3360079b
4
{ "blob_id": "5fe1891cf38044a4007158eb13a9c82b3360079b", "branch_name": "refs/heads/main", "committer_date": 1607123839000, "content_id": "362d90c609555e3f23fc8dc1ebf2c214c78cc3ed", "detected_licenses": [ "MIT" ], "directory_id": "caa0eba26f09644440d24ec04b599b20818889bf", "extension": "py", "file...
3.953125
stackv2
import random import string SPECIALS = '!$%^&*@#' # Well, could use string.punctuation, but only needs these really... ############################################ def generate_random_password(length = 8, useUpper = False, useNumbers = False, useSpecial = False): ''' Generates a random password from a ...
115
32.23
99
14
846
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b25fc12babc4de1a_535acedc", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text.\nThis expression logs [sensitive data (passw...
[ 105 ]
[ null ]
[ 11 ]
[ 20 ]
2024-11-18T21:11:16.042194+00:00
1,465,465,410,000
e65c72e6c463a6eb2d4c70e58a5bcb45fbb3272a
3
{ "blob_id": "e65c72e6c463a6eb2d4c70e58a5bcb45fbb3272a", "branch_name": "refs/heads/master", "committer_date": 1465465410000, "content_id": "1279809be469810b50364573ba3c4ea0f3caa1c1", "detected_licenses": [ "MIT" ], "directory_id": "d202e5cd86661bc0d71fee27695b314f14e5842a", "extension": "py", "fi...
2.734375
stackv2
# -*- coding: utf-8 -*- import os from copy import copy from collections import OrderedDict import yaml from jinja2 import Environment, FileSystemLoader j2 = Environment( loader=FileSystemLoader(os.path.join(os.path.dirname(__file__), "templates")), trim_blocks=True, lstrip_blocks=True ) from errors impor...
260
33.58
141
27
1,901
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_2a9f2547aedcc1ad_19fd995d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 8 ]
[ 12 ]
[ 6 ]
[ 2 ]
2024-11-18T21:46:33.364090+00:00
1,562,260,066,000
37b6a2921f2f26851d53964d62dfe2c79b318884
2
{ "blob_id": "37b6a2921f2f26851d53964d62dfe2c79b318884", "branch_name": "refs/heads/master", "committer_date": 1562260066000, "content_id": "f20bfd3f663338182c27bf7ae6210962769982d2", "detected_licenses": [ "MIT" ], "directory_id": "b723b33f56fc7454e4ffd89162f32a29bad3fb42", "extension": "py", "fi...
2.359375
stackv2
#!/usr/bin/env python from __future__ import print_function import flask, flask_login from flask import Flask, render_template, url_for, request, json from forms import signupform, donationform, LoginForm, SmsForm import stripe import uuid, json, unirest, re, time, datetime, jsonify import auth # I pass my access toke...
443
37.89
122
28
3,410
python
[{"finding_id": "codeql_py/stack-trace-exposure_976887a8ddf237a5_47889a20", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
3
true
[ "CWE-209", "CWE-209", "CWE-215" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure", "py/flask-debug" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger." ]
[ 183, 209, 443 ]
[ null, null, null ]
[ 16, 16, 5 ]
[ 17, 17, 40 ]
2024-11-18T21:46:34.651719+00:00
1,585,727,703,000
a2ec4f6f0c5ca489bdb2823b6f2ff14e59de6f70
3
{ "blob_id": "a2ec4f6f0c5ca489bdb2823b6f2ff14e59de6f70", "branch_name": "refs/heads/master", "committer_date": 1585742410000, "content_id": "f7e9752c4ec8d70687e007e352f7642d41284533", "detected_licenses": [ "MIT" ], "directory_id": "ac57d2e1be6e94d787b4525886d5a16013c018d2", "extension": "py", "fi...
2.59375
stackv2
""" EPUB generation from Markdown source files plus YAML metadata """ import os from datetime import datetime as dt import shutil from hashlib import md5 import logging import re import yaml import jinja2 as j2 import markdown from . import params from . import utils def gen_uuid(message): uuid = md5(message.en...
378
36.14
79
20
3,645
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_b5ed63d3e7b19164_8d6e2c10", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 346 ]
[ 347 ]
[ 15 ]
[ 32 ]
2024-11-18T21:47:34.493996+00:00
1,617,944,062,000
51fe349c9fe3f869551e178d4f370deea48312c5
2
{ "blob_id": "51fe349c9fe3f869551e178d4f370deea48312c5", "branch_name": "refs/heads/main", "committer_date": 1617944062000, "content_id": "4f50fe9030a68c82fbcc9b1cc6da3927f8eebe58", "detected_licenses": [ "Apache-2.0" ], "directory_id": "54163055e44be496cc040dfd4ae7203cf791ae3a", "extension": "py", ...
2.359375
stackv2
from flask import render_template, jsonify, Flask, redirect, url_for, request import random import os import numpy as np from keras.applications.mobilenet import MobileNet from keras.preprocessing import image from keras.applications.mobilenet import preprocess_input, decode_predictions from keras.models import model_...
67
31.09
120
14
571
python
[{"finding_id": "codeql_py/flask-debug_9c8e4d20d361e825_ce6e9c42", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-022" ]
[ "py/flask-debug", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1)." ]
[ 67, 49 ]
[ null, null ]
[ 5, 20 ]
[ 24, 24 ]
2024-11-18T22:29:31.372857+00:00
1,548,368,188,000
1181d3af66a8de3ca5e3d3c6eda298b913e49aa4
4
{ "blob_id": "1181d3af66a8de3ca5e3d3c6eda298b913e49aa4", "branch_name": "refs/heads/master", "committer_date": 1548368188000, "content_id": "7e9a64ae5203e82b43c038621567506946a30f58", "detected_licenses": [ "MIT" ], "directory_id": "dcbd81bd0fde5245fd92f1a17a4305f6dffc0109", "extension": "py", "fi...
4.28125
stackv2
""" Hangman. Authors: Trey Kline and Zane Blair. """ # DONE: 1. PUT YOUR NAME IN THE ABOVE LINE. # DONE: 2. Implement Hangman using your Iterative Enhancement Plan. ####### Do NOT attempt this assignment before class! ####### import random def main(): num = int(input('Enter the minimum length of the secret wor...
91
27.47
90
13
619
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ad9928de49615940_22f0aef6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 82 ]
[ null ]
[ 28 ]
[ 32 ]
2024-11-18T22:29:41.075159+00:00
1,635,445,821,000
d190dd0b0f5b5ed4137c6de1e5168bdd6bb38567
3
{ "blob_id": "d190dd0b0f5b5ed4137c6de1e5168bdd6bb38567", "branch_name": "refs/heads/main", "committer_date": 1635445821000, "content_id": "974c21b25299f372f2b7ace97c1138eb3ec1d7ed", "detected_licenses": [ "MIT" ], "directory_id": "965a47f22314fbdc1c52e6f66d8f6dabcbbdbe51", "extension": "py", "file...
2.640625
stackv2
import re from json import loads from random import choice, random from secrets import (entry_nodeIp, gmaps_api_key, password, user_agents_list, username) from ssl import CERT_NONE, create_default_context from sys import exit from time import sleep from urllib import error, parse, request import c...
307
43.23
179
22
3,311
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_37f23613c01f8b39_1efe31ab", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 42, 42 ]
[ null, null ]
[ 20, 46 ]
[ 28, 55 ]
2024-11-18T22:40:30.994846+00:00
1,570,621,196,000
50380cdef15686b8b12d293e4aa7afa9fa4c710f
3
{ "blob_id": "50380cdef15686b8b12d293e4aa7afa9fa4c710f", "branch_name": "refs/heads/master", "committer_date": 1570621196000, "content_id": "e9439fb249739c09924b22e80b689b0d91facafa", "detected_licenses": [ "MIT" ], "directory_id": "8e73e4b35724d54cee7761c4167ff4be9b4a9dee", "extension": "py", "fi...
2.8125
stackv2
import sys import time from random import randint import twitter positive_list = [':‑)', ':-]', ':-3', ':->', '8-)', ':-}', ':o)', ':c)', ':^)', '=]', '=)', ':)', ':]', ':3', ':>', '8)', ':}', ':D', '8D', 'xD', 'XD', '=D', '=3', 'B^D', ':P', ':O', ':‑O', 'D:<'] negative_list = [':‑(', ':(', ':‑c', ':‑...
102
36
115
22
971
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_23f42d682ef831cf_a22d2a39", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.\nThis expression logs [sensitive data (private)](4) as clear text." ]
[ 63 ]
[ null ]
[ 29 ]
[ 41 ]
2024-11-18T22:41:21.631690+00:00
1,616,858,546,000
8007f7b4be0015bf1ef4fcf1549e04a8c0901861
3
{ "blob_id": "8007f7b4be0015bf1ef4fcf1549e04a8c0901861", "branch_name": "refs/heads/main", "committer_date": 1616858546000, "content_id": "1ede3d4fe55d71a10db686f1613dd804c303fa63", "detected_licenses": [ "MIT" ], "directory_id": "5b8143dbea123d3abe9a38884f33282e90a869b5", "extension": "py", "file...
3.1875
stackv2
import requests import hashlib # import sys import os ## sending requests to api for data exchange def request_data_api(querystring): url = 'https://api.pwnedpasswords.com/range/' + querystring ## first five characters of SHA1 encryption for k-anonymity used by api res = requests.get(url) # if status_Code == 400 $...
60
29.53
133
18
463
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0b107ca72ef7df24_797dc0e9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
3
true
[ "CWE-312", "CWE-312", "CWE-327" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Se...
[ 53, 55, 25 ]
[ null, null, null ]
[ 12, 12, 30 ]
[ 91, 55, 54 ]
2024-11-18T22:54:12.547467+00:00
1,611,292,425,000
4b5cf3b9054d7f2014c245cffd70e5b347dc783c
3
{ "blob_id": "4b5cf3b9054d7f2014c245cffd70e5b347dc783c", "branch_name": "refs/heads/master", "committer_date": 1611292425000, "content_id": "fbfa7ed81f72187d34989c3db1844eff651fb613", "detected_licenses": [ "MIT" ], "directory_id": "9fa1d2df5c01716a71c5780c64950598fc5154fd", "extension": "py", "fi...
2.53125
stackv2
import requests ## This is the vRA ServiceNow Create Workflow Action ## It creates a CMDB record, a Change Record, and Closes the Change Record once done ## Tested on vRA 8.0 / vRA Cloud and SNOW's London release ## Assumptions: ## - A vRA deployment is the trackable unit, and is recorded in the CMDB, regardless of h...
118
37.64
108
13
1,149
python
[{"finding_id": "codeql_py/request-without-cert-validation_09126532161b5510_474887e8", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
5
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 45, 65, 85, 93, 115 ]
[ null, null, null, null, null ]
[ 16, 14, 19, 14, 18 ]
[ 77, 90, 91, 70, 102 ]
2024-11-18T22:54:19.807482+00:00
1,631,168,456,000
76379029ad7bffc0927d68c60421d82e45c74c79
3
{ "blob_id": "76379029ad7bffc0927d68c60421d82e45c74c79", "branch_name": "refs/heads/master", "committer_date": 1631168456000, "content_id": "6fb09c1f21eafd1030365a69399a0e54cc849163", "detected_licenses": [ "Apache-2.0" ], "directory_id": "12b02baab253ecb824f26eff0bbc82026535e335", "extension": "py"...
2.671875
stackv2
import json from datetime import datetime, date from flask import Blueprint, request from flask import current_app as app from db.wikishield_connection import DBConnection as WS from db.wikishield_db import WikishieldDB from lang.langs import Lang, LangsManager from db.connection_info import read_sql_user_name from c...
224
30.44
127
16
1,450
python
[{"finding_id": "codeql_py/stack-trace-exposure_9a7cfe39e8ece68c_882f4fe1", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
4
true
[ "CWE-209", "CWE-209", "CWE-209", "CWE-079" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "Cross-site scripting vul...
[ 156, 185, 211, 224 ]
[ null, null, null, null ]
[ 16, 16, 16, 12 ]
[ 63, 63, 63, 59 ]
2024-11-18T22:54:28.480386+00:00
1,619,259,867,000
7e95c543aa3c1e2458fd7f66a6af51c0f79c240c
3
{ "blob_id": "7e95c543aa3c1e2458fd7f66a6af51c0f79c240c", "branch_name": "refs/heads/main", "committer_date": 1619259867000, "content_id": "08d92edc80a67c1f68c411b4252c46472c7a157a", "detected_licenses": [ "MIT" ], "directory_id": "48b0e9416688197e45100195e3307614167ab7ce", "extension": "py", "file...
2.796875
stackv2
import requests from bs4 import BeautifulSoup from re import search from flask import Flask ,jsonify app = Flask(__name__) app.url_map.strict_slashes = False def filecrSearch(title): for i in range(1,40): url = f'https://filecr.com/?page={i}&s={title}' header = {'User-Agent':'Mozilla/5.0 (X11; L...
64
26.36
139
16
442
python
[{"finding_id": "codeql_py/partial-ssrf_f553eaddbd2ae366_5ac87c6c", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 16 ]
[ null ]
[ 13 ]
[ 46 ]
2024-11-18T20:54:54.393398+00:00
1,631,585,924,000
091306f8036f6a9c99985cfd0de78665073581e4
3
{ "blob_id": "091306f8036f6a9c99985cfd0de78665073581e4", "branch_name": "refs/heads/master", "committer_date": 1631585924000, "content_id": "0e7d7b1ad9abc9201d549530c588f5c0d7442cef", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e9b9626ffce09bf011803a33b4780d8dcc6657e8", "extension": "py"...
3.0625
stackv2
import os from getpass import getpass from netmiko import ConnectHandler from netmiko import NetmikoTimeoutException, NetmikoAuthenticationException import logging logging.basicConfig( filename="netmiko_class7.log", level=logging.INFO, format="%(asctime)s %(levelname)s %(name)s %(message)s", ) logger = lo...
101
26.7
94
14
704
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8b05817ed3946a46_e54431aa", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 29, 41 ]
[ null, null ]
[ 21, 18 ]
[ 24, 21 ]
2024-11-18T20:55:03.667317+00:00
1,627,943,127,000
f560ae1fd0447167cddef5e2ed9330bef7998233
3
{ "blob_id": "f560ae1fd0447167cddef5e2ed9330bef7998233", "branch_name": "refs/heads/main", "committer_date": 1627943127000, "content_id": "b03180a21c2889b92098ddb064c881bf9df9f5f9", "detected_licenses": [ "Apache-2.0" ], "directory_id": "0643fcb7e32b98b86d4f8e6e6467a07a3ff9206c", "extension": "py", ...
2.5625
stackv2
""" Handles configuration of data relay block to run dapr. Writes dapr component configurations by applying required values read from environment variables or secret store contents to dapr configuration template files. See plugins/README.md for important background. If DAPR_DEBUG environment variable is defined, enabl...
171
31.82
133
17
1,199
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e26add39bac265c8_bfa07780", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 117, 133, 153 ]
[ null, null, null ]
[ 11, 15, 15 ]
[ 58, 57, 75 ]
2024-11-18T20:55:10.316391+00:00
1,456,824,593,000
ee889b831c4070b91a666a887096412ba1bc3a43
3
{ "blob_id": "ee889b831c4070b91a666a887096412ba1bc3a43", "branch_name": "refs/heads/master", "committer_date": 1456824593000, "content_id": "d9f58552aba5108461065c8149217c11cf497b2a", "detected_licenses": [ "CC0-1.0" ], "directory_id": "e9197785ce72412e51ad2bd8c6e0926546ef7d1f", "extension": "py", ...
2.65625
stackv2
# -*- coding: utf-8 -*- from BeautifulSoup import BeautifulSoup from collections import defaultdict import re import hashlib import json import nltk import sys from datetime import datetime import urllib import urllib2 from threading import Thread import extract import operator import feedparser import sched, time fr...
202
31.66
88
20
1,467
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_b0669c50488294a3_e6ee785c", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [rss.sciencedirect.com](1) may be at an arbitrary posit...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [rss.sciencedirect.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 71 ]
[ null ]
[ 12 ]
[ 42 ]
2024-11-18T21:33:13.369016+00:00
1,636,555,788,000
6e8545d00ee58ddac07b28f36e7ae696d9bf2e7e
3
{ "blob_id": "6e8545d00ee58ddac07b28f36e7ae696d9bf2e7e", "branch_name": "refs/heads/main", "committer_date": 1636555788000, "content_id": "977c87c76480bf5e69de1b6c490e13abcbbef60d", "detected_licenses": [ "MIT" ], "directory_id": "3085d632ef23641bed55a2422f38cd0033e35410", "extension": "py", "file...
2.5625
stackv2
import tempfile import threading from functools import partial from logging import getLogger from pathlib import Path from subprocess import Popen, PIPE, DEVNULL, STDOUT from sys import platform as _platform import requests import re from kivymd.toast import toast from kivymd.uix.boxlayout import MDBoxLayout from kivy...
120
39.32
143
17
1,052
python
[{"finding_id": "codeql_py/request-without-cert-validation_bb86b75866eba9a6_2f34c600", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 72 ]
[ 73 ]
[ 13 ]
[ 34 ]
2024-11-18T21:33:20.787795+00:00
1,620,905,511,000
36fa5c8a00ecf608c0a4e4e64603a19467f47a1d
3
{ "blob_id": "36fa5c8a00ecf608c0a4e4e64603a19467f47a1d", "branch_name": "refs/heads/master", "committer_date": 1620905511000, "content_id": "7c0506d491e245893e3a380479e2cb24447182b8", "detected_licenses": [ "Apache-2.0" ], "directory_id": "7cebfa2066e679e19993a5507e59d1979df3d4a8", "extension": "py"...
2.953125
stackv2
# -*- coding: utf-8 -*- """ Created on Thu May 31 23:16:36 2018 @author: SilverDoe """ from tkinter import * from tkinter.ttk import * from tkinter import scrolledtext from tkinter import messagebox class MyGui: def __init__(self): window = Tk() window.title("Welcome to LikeGeeks app") ...
120
29.71
102
14
939
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_98b46fd13d746247_5e0ee421", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 111, 114 ]
[ null, null ]
[ 15, 15 ]
[ 21, 23 ]
2024-11-18T21:33:33.435281+00:00
1,609,575,901,000
769fd3d401e8128aa3e868d108fabff6a68983e6
2
{ "blob_id": "769fd3d401e8128aa3e868d108fabff6a68983e6", "branch_name": "refs/heads/master", "committer_date": 1609575901000, "content_id": "1e4d29cc30b8cefe9aecfdde3fee4e6a9e214551", "detected_licenses": [ "MIT" ], "directory_id": "ddb090f75e911a6350aec56e2d287cfa1a8d66f6", "extension": "py", "fi...
2.359375
stackv2
import os import ntpath import hashlib import datetime from flask import Blueprint, jsonify, request, current_app, send_file from playhouse.flask_utils import PaginatedQuery from src.auth import login_required, get_user_from_request from src.model.models import Content from src import errors bp = Blueprint("content",...
97
26.4
87
17
644
python
[{"finding_id": "codeql_py/path-injection_86429c205e91f2a8_52d11c79", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 63 ]
[ null ]
[ 24 ]
[ 32 ]
2024-11-18T21:55:38.197014+00:00
1,614,991,467,000
f813d0cacccdb4e437c0b94716eeae1a9c97f042
3
{ "blob_id": "f813d0cacccdb4e437c0b94716eeae1a9c97f042", "branch_name": "refs/heads/master", "committer_date": 1614991467000, "content_id": "7f33e43f5075ffffa4b82a8e113927ceea222284", "detected_licenses": [ "Unlicense" ], "directory_id": "233e8549c7061938575145f45ff9cb5c390b34dd", "extension": "py",...
3.0625
stackv2
import argparse import configparser import datetime import json import time import putiopy def auto_delete( oauth_token: str, max_age: "num", dryrun: bool, excluded_dirs: list = [] ): """Deletes files older than `max_age` days from the putio account associated with the `oauth_token`. The folders (NOT thei...
166
28.5
85
18
1,102
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d5a9a77c04b99caa_c84e62ba", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 159 ]
[ null ]
[ 15 ]
[ 57 ]
2024-11-18T21:55:55.451328+00:00
1,587,041,047,000
1d164df412d285fa7aa8bf098c8098de3f53845d
2
{ "blob_id": "1d164df412d285fa7aa8bf098c8098de3f53845d", "branch_name": "refs/heads/master", "committer_date": 1587041047000, "content_id": "6c2aacd223184f20a9f82d227b36bc8fd5b5f772", "detected_licenses": [ "MIT" ], "directory_id": "301d199dcc8c09b844cc164745705994bc2340ae", "extension": "py", "fi...
2.375
stackv2
from cryptography.hazmat.primitives import hashes, hmac from cryptography.hazmat.primitives.kdf.hkdf import HKDF from cryptography.hazmat.backends.openssl import backend from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes from datetime import datetime from fs import open_fs import sqlite3 imp...
240
29.87
79
19
1,524
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_0434c80d10b3879f_91f11bac", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally e...
[ 94 ]
[ null ]
[ 27 ]
[ 32 ]
2024-11-18T21:56:07.341653+00:00
1,565,334,337,000
f7afd1aba954f8fe4a59117f759fff7ef13246c1
2
{ "blob_id": "f7afd1aba954f8fe4a59117f759fff7ef13246c1", "branch_name": "refs/heads/master", "committer_date": 1565334337000, "content_id": "dce9a967fed7810f8ac8e98053a39758acead263", "detected_licenses": [ "MIT" ], "directory_id": "3dd1b0d55356763d23a6f8a30267053a9a510121", "extension": "py", "fi...
2.375
stackv2
# coding=utf-8 from django.shortcuts import render, redirect from django.http.response import JsonResponse from models import * from df_cart.models import * from django.db import transaction from df_user import user_decorator from datetime import datetime from decimal import Decimal from df_user.models import * # Creat...
97
27.57
134
17
683
python
[{"finding_id": "codeql_py/stack-trace-exposure_ab2f0750b71e3139_25d2ca66", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 97 ]
[ null ]
[ 25 ]
[ 29 ]
2024-11-18T22:39:32.709537+00:00
1,552,645,802,000
4d72ca54749b199a5d32d819621a0f0117d1b94c
4
{ "blob_id": "4d72ca54749b199a5d32d819621a0f0117d1b94c", "branch_name": "refs/heads/master", "committer_date": 1552645802000, "content_id": "777dd8bf196474b662d087b28f11dea01ef85e30", "detected_licenses": [ "MIT" ], "directory_id": "ccdc9fa73ce77c1edec406732e78143bc3b76ef2", "extension": "py", "fi...
3.640625
stackv2
def check_type(text): try: if float(text) == int(float(text)): return {'Age': int(float(text))} elif float(text) != int(float(text)): return {'Salary': float(text)} except ValueError: return {'Position': text} employees_data = [] while True: in_line = input...
31
23.39
82
15
183
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bab6c18c376e874b_94893765", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 31 ]
[ null ]
[ 7 ]
[ 13 ]
2024-11-18T22:54:59.365462+00:00
1,529,041,747,000
a8c3eddc975a2c079b2755c058f19d25c29714e0
2
{ "blob_id": "a8c3eddc975a2c079b2755c058f19d25c29714e0", "branch_name": "refs/heads/master", "committer_date": 1529041747000, "content_id": "11b0bf312c7fb45990809d34cc2b9b87b39337a0", "detected_licenses": [ "Apache-2.0", "BSD-2-Clause" ], "directory_id": "2d7c6579038772a8451d6cfe3e289f9e0a9c6e39",...
2.328125
stackv2
#from rest_framework.renderers import UNICODE_JSON from rest_framework import serializers from django.http import HttpResponse from django.views.decorators.csrf import csrf_exempt import json #from serializers import TestSerializer @csrf_exempt def regist(request): if request.method == 'POST': resist_dat...
35
23.8
70
14
183
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_daff68a468c2a8c5_c253d8d9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 20 ]
[ null ]
[ 15 ]
[ 33 ]