added
stringlengths
32
32
created
int64
1,244B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.25
source
stringclasses
1 value
text
stringlengths
324
20.1k
num_lines
int64
16
598
avg_line_length
float64
15.1
58.3
max_line_length
int64
33
179
ast_depth
int64
8
39
length
int64
101
3.8k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.1k
265k
sast_codeql_findings_count
int64
1
45
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
45
rule_ids
listlengths
1
45
confidences
listlengths
1
45
severities
listlengths
1
45
messages
listlengths
1
45
line_starts
listlengths
1
45
line_ends
listlengths
1
45
column_starts
listlengths
1
45
column_ends
listlengths
1
45
2024-11-19T02:37:24.610987+00:00
1,588,574,960,000
f8f4eac1ad62233b5bb77affbdc05a07b788774a
3
{ "blob_id": "f8f4eac1ad62233b5bb77affbdc05a07b788774a", "branch_name": "refs/heads/master", "committer_date": 1588574960000, "content_id": "5882e4b0df63cc127e414db2c6d7ee18569f9933", "detected_licenses": [ "MIT" ], "directory_id": "5bf1fb2bec01bcf4ac868a62bd97cdfd36fe2c26", "extension": "py", "fi...
2.71875
stackv2
# il codice per gestire gli input dev'essere qui from assistant.askassistant import ask, welcomeFrase from flask import Flask, request, Response import cv2 as cv import object_detection_api as oda from PIL import Image import numpy as np import webbrowser choice = 0; def switch(x): return { 'identity': 0...
95
22.48
107
14
574
python
[{"finding_id": "codeql_py/stack-trace-exposure_4a89fa3be332a0d0_18e93de0", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 57 ]
[ null ]
[ 16 ]
[ 17 ]
2024-11-19T02:37:37.039816+00:00
1,630,283,890,000
4587f5166735b325f7586c14cc804868031d6692
3
{ "blob_id": "4587f5166735b325f7586c14cc804868031d6692", "branch_name": "refs/heads/master", "committer_date": 1630283890000, "content_id": "59a285b1894e8ca3c1acf4771cb565d91bdafd50", "detected_licenses": [ "MIT" ], "directory_id": "9888a87c075ca338828bd557e0b56391a16619ab", "extension": "py", "fi...
2.90625
stackv2
#!/usr/bin/env python import requests from pprint import pprint def check_valid_youtube_link(videoID, api_key): url = f'https://www.googleapis.com/youtube/v3/videos?id=%s&key=%s&part=status'%(videoID, api_key) url_get = requests.get(url) response = url_get.json() if len(response['items']) == 0: return False e...
29
22.45
98
15
197
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_dedcbbb7c8494467_972dc44a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 28 ]
[ null ]
[ 8 ]
[ 48 ]
2024-11-19T02:37:39.840397+00:00
1,520,718,892,000
c62083528c27581aa179908f2472aee3d6a0d57d
3
{ "blob_id": "c62083528c27581aa179908f2472aee3d6a0d57d", "branch_name": "refs/heads/master", "committer_date": 1520718892000, "content_id": "ab46a1ddd2b200ddb076a677593337e8a8ad9641", "detected_licenses": [ "CC0-1.0" ], "directory_id": "7ec49fc2f878cac3304b377c9ff402c9f769847c", "extension": "py", ...
2.53125
stackv2
import os import shutil import hashlib import uuid import random import calendar import time from sqlalchemy import create_engine from sqlalchemy.orm import sessionmaker from database_setup import Car, Base, User engine = create_engine('sqlite:///usedcars.db') Base.metadata.bind = engine DBSession = sessionmaker(bind...
96
35.45
80
15
996
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_242562a42eef3672_d2bb60c8", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.",...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 80 ]
[ null ]
[ 35 ]
[ 67 ]
2024-11-19T02:49:10.060223+00:00
1,588,044,885,000
1c8e576561b3cf8b80e16990fb208672e8bc9a9d
3
{ "blob_id": "1c8e576561b3cf8b80e16990fb208672e8bc9a9d", "branch_name": "refs/heads/master", "committer_date": 1588044885000, "content_id": "da6c7e409ec34e7d3cf747c7a65133096c8d7755", "detected_licenses": [ "Apache-2.0" ], "directory_id": "bd3502e5f9fa209b62a769e444ff137b4d08db78", "extension": "py"...
2.75
stackv2
from flask import Blueprint, request, jsonify, abort import psycopg2 import os import uuid from random import randint employee_api = Blueprint('employee_api', __name__) DATABASE_URL = os.environ['DATABASE_URL'] def parse_employee_info(record_list): """ Parses the employee record information Example input: ...
250
28.32
126
16
1,809
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_41030d1904f3a573_ce2d1fd5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
6
true
[ "CWE-312", "CWE-089", "CWE-089", "CWE-089", "CWE-089", "CWE-089" ]
[ "py/clear-text-logging-sensitive-data", "py/sql-injection", "py/sql-injection", "py/sql-injection", "py/sql-injection", "py/sql-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This SQL query depends on a [user-provided value](1).", "This SQL query depends on a [user-provided value](1).", "This SQL query depends on a [user-provided value](1).", ...
[ 139, 93, 161, 172, 209, 246 ]
[ null, null, null, null, null, null ]
[ 11, 24, 28, 28, 24, 24 ]
[ 48, 29, 40, 40, 36, 36 ]
2024-11-19T02:49:25.527416+00:00
1,665,432,814,000
433b3c78bb87da1794a8a13501a7d68cef1308e6
3
{ "blob_id": "433b3c78bb87da1794a8a13501a7d68cef1308e6", "branch_name": "refs/heads/master", "committer_date": 1665432814000, "content_id": "1680f6a233eb950fbb6c10a9a5e463e7db44439e", "detected_licenses": [ "MIT" ], "directory_id": "9dbb2457f5608eafb4a7ae48c7e2662ac6d96925", "extension": "py", "fi...
2.75
stackv2
import csv import os import re import time from typing import List import pdb from bs4 import BeautifulSoup import pandas as pd import requests from selenium import webdriver from selenium.webdriver.support.wait import WebDriverWait from scrape_from_table import get_table_cells timeout = 8 def scrape_birth_death_ye...
96
40.58
178
18
942
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fcb8867d144606be_77b984e1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 46 ]
[ null ]
[ 19 ]
[ 29 ]
2024-11-19T02:49:26.828587+00:00
1,630,171,269,000
b237ea4f8ac0d5a1dc62fb7fb67157729b7e9231
2
{ "blob_id": "b237ea4f8ac0d5a1dc62fb7fb67157729b7e9231", "branch_name": "refs/heads/main", "committer_date": 1630171269000, "content_id": "df4f63631fa9ce209b220eb7ceab624ca743bebc", "detected_licenses": [ "Apache-2.0" ], "directory_id": "fdc87cfc5eb9f6703f2c51a6d0593f851e13a61b", "extension": "py", ...
2.40625
stackv2
import time import json from requests import post as POST from requests import get as GET with open('config.json') as json_file: config = json.load(json_file) API_KEY = config['key'] CHANNEL_ID = config['id'] CHANNEL_NAME = config['name'] WEBHOOK_URL = config['webhook'] VIDEO_ENDPOINT = f'https://www.googleapis.com/...
83
30.71
141
20
695
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_b93510ea33dbb192_b2f39838", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 28, 80 ]
[ null, null ]
[ 24, 15 ]
[ 36, 76 ]
2024-11-19T03:00:11.754448+00:00
1,455,147,936,000
1405a075658d6771490d142c05274b5042bbbeb3
2
{ "blob_id": "1405a075658d6771490d142c05274b5042bbbeb3", "branch_name": "refs/heads/master", "committer_date": 1455147936000, "content_id": "d94eb971703fe61f5cb6d7b08acdabacee2123d7", "detected_licenses": [ "MIT" ], "directory_id": "3537265c1b60f0c0eb06d165a0b5779438fc698c", "extension": "py", "fi...
2.40625
stackv2
from flask import Flask, jsonify, render_template, request from flask.helpers import make_response from flask import Flask import redis from redis import Redis import serial import time app = Flask(__name__) @app.route('/') def index(): return 'Hello World!' @app.route('/abc/') #different function nam...
72
19.33
66
12
397
python
[{"finding_id": "codeql_py/reflective-xss_3f938c04d314d916_83f6f565", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
4
true
[ "CWE-079", "CWE-079", "CWE-079", "CWE-079" ]
[ "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 41, 55, 62, 67 ]
[ null, null, null, null ]
[ 12, 12, 12, 12 ]
[ 56, 56, 32, 31 ]
2024-11-19T03:00:13.821874+00:00
1,683,824,174,000
466c345fc7925a9fc854fa3b590ce913a3af255b
2
{ "blob_id": "466c345fc7925a9fc854fa3b590ce913a3af255b", "branch_name": "refs/heads/master", "committer_date": 1683824174000, "content_id": "ff9f4d0a168b5db069a5acbcddbb5fe54ce63153", "detected_licenses": [ "Apache-2.0" ], "directory_id": "05973b7cf07eb03099e516f21f06a6e295086862", "extension": "py"...
2.453125
stackv2
import os import shutil from cgi import FieldStorage from pyramid.view import view_config from pyramid.response import FileResponse from pyramid_storage.exceptions import FileNotAllowed import logging LOGGER = logging.getLogger("PHOENIX") @view_config(route_name='download_storage') def download(request): file...
115
33.07
119
15
847
python
[{"finding_id": "codeql_py/reflective-xss_09fd243d6e8049c0_a301fc7b", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
9
true
[ "CWE-079", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022" ]
[ "py/reflective-xss", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [...
[ 47, 84, 95, 96, 97, 108, 109, 111, 114 ]
[ null, null, null, null, null, null, null, null, null ]
[ 12, 27, 27, 21, 15, 27, 21, 15, 23 ]
[ 18, 38, 48, 42, 19, 48, 42, 19, 27 ]
2024-11-19T03:12:00.769321+00:00
1,571,588,586,000
dd21825666265da5e60d7f76a4d30e565d14d690
2
{ "blob_id": "dd21825666265da5e60d7f76a4d30e565d14d690", "branch_name": "refs/heads/master", "committer_date": 1571588586000, "content_id": "808dbb71e5e3e00d98a17f2821ccf77056be0fac", "detected_licenses": [ "MIT" ], "directory_id": "da9314dae712f13d8f60e90ef408039ed10e51da", "extension": "py", "fi...
2.484375
stackv2
#!/usr/bin/env python3 """Server backend of WebScrapBook toolkit. """ import os import time import webbrowser from threading import Thread # dependency import bottle # this package from . import * from .app import init_app class WSBServer(bottle.ServerAdapter): """Tweaked from bottle.WSGIRefServer - Remove...
169
33
114
16
1,273
python
[{"finding_id": "codeql_py/insecure-protocol_1eea6a6ec5388ce3_1650b110", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol...
1
true
[ "CWE-327" ]
[ "py/insecure-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.SSLContext](1)." ]
[ 91 ]
[ null ]
[ 26 ]
[ 33 ]
2024-11-19T03:12:19.971347+00:00
1,487,000,102,000
5543a2c2877420e3bd7789b1589d80bab1df7dd4
3
{ "blob_id": "5543a2c2877420e3bd7789b1589d80bab1df7dd4", "branch_name": "refs/heads/master", "committer_date": 1487000102000, "content_id": "803bf550bfc8fbb9d1a0fe1eb797cabfe277219c", "detected_licenses": [ "Apache-2.0" ], "directory_id": "69f91a91f6be1558cb27fdb557005253841e1115", "extension": "py"...
2.84375
stackv2
import os.path import logging from Crypto.Hash import SHA256 from Crypto.PublicKey import RSA from Crypto.Signature import PKCS1_v1_5 from base64 import b64encode from config.config import clientname logger = logging.getLogger(__name__) logger.setLevel(logging.INFO) filehandler = logging.FileHandler('logs/stock_excha...
130
28.62
85
15
935
python
[{"finding_id": "codeql_py/weak-crypto-key_121ecd55c6682ba1_db438884", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",...
1
true
[ "CWE-326" ]
[ "py/weak-crypto-key" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable." ]
[ 56 ]
[ null ]
[ 24 ]
[ 51 ]
2024-11-19T03:12:45.931174+00:00
1,592,214,839,000
94dfc1cf553a664dd25ca5b0d9a78e10b046aae3
2
{ "blob_id": "94dfc1cf553a664dd25ca5b0d9a78e10b046aae3", "branch_name": "refs/heads/master", "committer_date": 1592214839000, "content_id": "08304d54f676237a16b4d77903c4bcdb387d5595", "detected_licenses": [ "MIT" ], "directory_id": "81eb4b95aca27fa5ffd2b0881112925a9ded9c67", "extension": "py", "fi...
2.328125
stackv2
#!/usr/bin/env python """ Runs an diskless ORCA calculation. Requires the following env to be set: ORCACMD: the full path to the orca binary ORCAPROJECT: a unique projectprefix, no space """ import time import subprocess import shutil import tarfile import io import os import glob import random import sys import stri...
184
23.87
116
18
1,290
python
[{"finding_id": "codeql_py/tarslip_17ecdd56bad4d394_7b17caaa", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/tarslip", "py/tarslip" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1).", "This file extraction depends on a [potentially untrusted source](1)." ]
[ 116, 179 ]
[ null, null ]
[ 3, 5 ]
[ 6, 8 ]
2024-11-19T03:25:22.597570+00:00
1,550,047,163,000
c14c1c69c4d20633775ba78f50ea4613e3ac3513
3
{ "blob_id": "c14c1c69c4d20633775ba78f50ea4613e3ac3513", "branch_name": "refs/heads/master", "committer_date": 1550047253000, "content_id": "6af76641815282bcde2e2e61029466d11c3a656d", "detected_licenses": [ "Apache-2.0" ], "directory_id": "70c3b1ef11b971a57832599376cc526192835812", "extension": "py"...
2.71875
stackv2
from dataclasses import dataclass, field from copy import copy from jinja2 import Environment, FileSystemLoader from mistletoe.html_renderer import HTMLRenderer from mistletoe.block_token import Document from pygments.lexers import LeanLexer from pygments import highlight from pygments.formatters import HtmlFormatte...
58
32.83
94
20
421
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_70147a345b310884_91b41aae", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 55 ]
[ null ]
[ 21 ]
[ 63 ]
2024-11-19T03:25:35.965240+00:00
1,690,144,450,000
7acf8db1c3beff69a374981c92b9c38689718456
2
{ "blob_id": "7acf8db1c3beff69a374981c92b9c38689718456", "branch_name": "refs/heads/master", "committer_date": 1690144450000, "content_id": "fcd40d0a4e699018eb750f0178275205fc68985e", "detected_licenses": [ "MIT" ], "directory_id": "04963e5a7a49e4d938a652e96953fadcd21a2ef7", "extension": "py", "fi...
2.34375
stackv2
import os import tarfile from pathlib import Path import itertools from torch.optim import Adam import numpy as np import torch from tmrl.config import config_constants as cfg from tmrl.util import dump, load import logging def load_run_instance_images_dataset(checkpoint_path): """ function used to load tra...
207
44.54
168
21
2,047
python
[{"finding_id": "codeql_py/tarslip_b1291da88e9925cc_2ff1c515", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 30 ]
[ null ]
[ 9 ]
[ 10 ]
2024-11-19T03:25:41.406070+00:00
1,614,705,622,000
ed1bf3d93bbf45f74b8813bbfadfa83c9ea0a8f5
3
{ "blob_id": "ed1bf3d93bbf45f74b8813bbfadfa83c9ea0a8f5", "branch_name": "refs/heads/main", "committer_date": 1614705622000, "content_id": "36b7e3952ec0ceeb0b94806c5ebaee400c7c0b0e", "detected_licenses": [ "MIT" ], "directory_id": "792b271c39d7fe15a5508412246419dd4eb5c527", "extension": "py", "file...
2.953125
stackv2
#!/usr/bin/python3 import string import sys from http.server import BaseHTTPRequestHandler, HTTPServer class ProxyHTTPRequestHandler(BaseHTTPRequestHandler): def do_GET(self, body=True): try: # Parse the URL and convert to HTTPS redirect self.send_response(301) dest = "...
27
33
81
14
215
python
[{"finding_id": "codeql_py/http-response-splitting_5281bec1031ddd2e_d9beb8b2", "tool_name": "codeql", "rule_id": "py/http-response-splitting", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This HTTP header is constructed from a [user-provided value](1).", "remediation": "", "lo...
1
true
[ "CWE-113" ]
[ "py/http-response-splitting" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This HTTP header is constructed from a [user-provided value](1)." ]
[ 16 ]
[ null ]
[ 42 ]
[ 46 ]
2024-11-19T03:35:44.648292+00:00
1,584,700,013,000
322053a34df9ba431d7469020d00f60d4771d143
3
{ "blob_id": "322053a34df9ba431d7469020d00f60d4771d143", "branch_name": "refs/heads/master", "committer_date": 1584700013000, "content_id": "2fa12c687f6487688f27844b924b9a98c0cef6bf", "detected_licenses": [ "MIT" ], "directory_id": "c044216392aef473e5e9afd846f0bfe8266ab668", "extension": "py", "fi...
2.65625
stackv2
# -*- coding: utf-8 -*- from flask import Flask, request, url_for, redirect, abort, make_response, jsonify, session, escape, g import json import os from urllib.parse import urlparse, urljoin from jinja2.utils import generate_lorem_ipsum app = Flask(__name__) # @app.route('/hello', methods=["GET","POST"]) # def hel...
271
24.62
110
14
1,968
python
[{"finding_id": "codeql_py/cookie-injection_d2eeef49c4d0ac3b_1e94e19f", "tool_name": "codeql", "rule_id": "py/cookie-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cookie is constructed from a [user-supplied input](1).", "remediation": "", "location": {"file_path": "...
4
true
[ "CWE-020", "CWE-215", "CWE-079", "CWE-601" ]
[ "py/cookie-injection", "py/flask-debug", "py/reflective-xss", "py/url-redirection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cookie is constructed from a [user-supplied input](1).", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value...
[ 117, 271, 27, 193 ]
[ null, null, null, null ]
[ 33, 5, 12, 29 ]
[ 37, 51, 41, 35 ]
2024-11-19T03:35:48.961489+00:00
1,514,471,822,000
e2712697ca532b7b024ecce2a1e255bd94d3af22
2
{ "blob_id": "e2712697ca532b7b024ecce2a1e255bd94d3af22", "branch_name": "refs/heads/master", "committer_date": 1514471822000, "content_id": "13ee920756951c105f1fbec945281d8da332007d", "detected_licenses": [ "MIT" ], "directory_id": "7daa3808e09e162e1852d4980378d82da12ea556", "extension": "py", "fi...
2.328125
stackv2
# -*- coding: utf-8 -*- import os, git from jinja2 import Environment,FileSystemLoader # Main loop if __name__ == '__main__': # Get history repo = git.Repo('.') commits = repo.log(path='me.yaml') # Load templates env = Environment(loader=FileSystemLoader(os.sep.join(( 'template...
41
25.59
76
21
235
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_c8c514ad8e369bf4_a9d6a8a8", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 16 ]
[ 18 ]
[ 11 ]
[ 17 ]
2024-11-19T01:28:45.132576+00:00
1,399,845,082,000
e1cb1eb397194430f17b5719b0a34e0eb25203cb
3
{ "blob_id": "e1cb1eb397194430f17b5719b0a34e0eb25203cb", "branch_name": "refs/heads/master", "committer_date": 1399845082000, "content_id": "aaf09139b211fa53d9a7288fc0c8dbb762e2f997", "detected_licenses": [ "MIT" ], "directory_id": "7d3bf107eb7c4a799a36ab833ac0dca424556b02", "extension": "py", "fi...
3.140625
stackv2
#!/usr/bin/env python import getpass import os import subprocess try: import pwd import spwd import crypt except ImportError: pass def unix_has_current_user_root_privileges(): """ Check if the current user has the root rights, just by verifying if the group uid is 0 """ return os.gete...
131
31.49
118
15
917
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_55c7b4606d58a7ed_2796b5c6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
4
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 35, 46, 111, 111 ]
[ null, null, null, null ]
[ 15, 19, 11, 21 ]
[ 51, 55, 19, 29 ]
2024-11-19T01:28:45.751569+00:00
1,586,263,845,000
605bcdffbb3bd54876ea684c6baf80be1cae80a2
2
{ "blob_id": "605bcdffbb3bd54876ea684c6baf80be1cae80a2", "branch_name": "refs/heads/master", "committer_date": 1586263845000, "content_id": "96da0798437d3b9fdb5049491bc0f2958d07f2c6", "detected_licenses": [ "MIT" ], "directory_id": "70d3877d9bc014e4eba00e2cdab4ddceaf4df1a1", "extension": "py", "fi...
2.375
stackv2
from flask import Blueprint, render_template, flash, redirect, session, url_for, request, g from flask.ext.login import login_user, logout_user, current_user, login_required from app import app, db, login_manager from forms import LoginForm, RegistrationForm from app.users.models import User mod = Blueprint('users', _...
40
30.98
91
14
272
python
[{"finding_id": "codeql_py/url-redirection_d0e31ae9fe2bb215_491332a4", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 21 ]
[ null ]
[ 25 ]
[ 69 ]
2024-11-19T01:28:59.069014+00:00
1,585,764,319,000
6cf6ef28f50820b22c38dd9317caf9a33abb0e94
3
{ "blob_id": "6cf6ef28f50820b22c38dd9317caf9a33abb0e94", "branch_name": "refs/heads/master", "committer_date": 1585764319000, "content_id": "6589b166e93e80a13b5c7119741c4979368d4ef8", "detected_licenses": [ "MIT" ], "directory_id": "9eaa2c64a777bd24a3cccd0230da5f81231ef612", "extension": "py", "fi...
2.8125
stackv2
from flask import Flask,request,render_template import datetime import os app = Flask(__name__) @app.route('/upload_file',methods=['GET','POST']) def upload_file(): # 根据用户的请求意图去执行不同的功能 if request.method == "GET": return render_template('01-upload.html') else: username = request.form['userna...
33
28.64
69
15
248
python
[{"finding_id": "codeql_py/flask-debug_96d1b07c7bc8c649_7c90e588", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-022" ]
[ "py/flask-debug", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1)." ]
[ 33, 28 ]
[ null, null ]
[ 5, 16 ]
[ 24, 27 ]
2024-11-19T01:30:06.409346+00:00
1,566,916,954,000
d4c510278fbaba4fc5da1921c35c48a43b92b4ac
5
{ "blob_id": "d4c510278fbaba4fc5da1921c35c48a43b92b4ac", "branch_name": "refs/heads/master", "committer_date": 1566916954000, "content_id": "73eac590c4250a4c12fdd203b97954c6e0fdc1e1", "detected_licenses": [ "Apache-2.0" ], "directory_id": "bcfb7d131343150ff79162005ca8454ea90cdd07", "extension": "py"...
4.53125
stackv2
#Problem 1 def numberPrint(): # function to print numbers -25-20 for x in range(-25,21,1): #for loop that defines that range of -25 to 20 w/increments of 1 print(x) #displays numbers numberPrint() #Problem 2 def checkPassword(): #function that prints the 2nd function password print(password()) def pas...
72
31.36
122
11
677
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_eabb27430efbfb06_1d65784f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 10 ]
[ null ]
[ 11 ]
[ 21 ]
2024-11-19T01:30:15.762609+00:00
1,439,843,259,000
3fa7455873e349f45ca9149128d1077f1fc19779
3
{ "blob_id": "3fa7455873e349f45ca9149128d1077f1fc19779", "branch_name": "refs/heads/master", "committer_date": 1439843259000, "content_id": "ab4835442ef69b878c19b64d54c9071df1ad0eee", "detected_licenses": [ "MIT" ], "directory_id": "55500c5868788ce079fd951cd97b31018f9c8733", "extension": "py", "fi...
2.75
stackv2
## -*- coding: utf-8 -*- import os import base64 from copy import deepcopy from bs4 import BeautifulSoup import requests requests.packages.urllib3.disable_warnings() import jinja2 import IPython.nbformat as nb from IPython.config import Config from IPython.nbconvert import HTMLExporter from template import TEMPL...
139
27.96
111
16
950
python
[{"finding_id": "codeql_py/request-without-cert-validation_e42f9bb0dffb36d0_e0f1bb9b", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 57 ]
[ null ]
[ 19 ]
[ 55 ]
2024-11-19T01:30:31.905515+00:00
1,616,432,060,000
8343354bb2acd2dec219fd1123038e84d7873c31
2
{ "blob_id": "8343354bb2acd2dec219fd1123038e84d7873c31", "branch_name": "refs/heads/master", "committer_date": 1616432060000, "content_id": "3870499d784c62e162c15cad7c27e76b3331563d", "detected_licenses": [ "MIT-0" ], "directory_id": "a211cbacc8cb65b3bffd73db56651237abfa3d50", "extension": "py", "...
2.3125
stackv2
from flask import Flask, render_template, jsonify, \ request, Response, redirect, url_for, session import random import boto3 import os # Flask configurations app = Flask(__name__) # Constants BUCKET_NAME = os.getenv("BUCKET_NAME","ai-services-for-demo") S3_CLIENT = boto3.client('s3') OUTPUT_PREFIX = "polly_outpu...
62
29.06
97
16
431
python
[{"finding_id": "codeql_py/flask-debug_a6285e83ba371ab7_15856ada", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-022" ]
[ "py/flask-debug", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1)." ]
[ 62, 54 ]
[ null, null ]
[ null, 22 ]
[ 36, 31 ]
2024-11-19T01:55:08.800946+00:00
1,616,954,687,000
96d1ea3236f11cd2a44b15b7077fb70a643e6b76
2
{ "blob_id": "96d1ea3236f11cd2a44b15b7077fb70a643e6b76", "branch_name": "refs/heads/main", "committer_date": 1616954687000, "content_id": "6d74b0724c4625d8f03c38040dc0cbc4e90aedcc", "detected_licenses": [ "MIT" ], "directory_id": "705a009572cde4f79dd16346806484e48314e98e", "extension": "py", "file...
2.390625
stackv2
from flask import Flask, request, jsonify from flask_cors import CORS import json import datetime import ipfshttpclient from PIL import Image import urllib.request as urllib import io import pytesseract import requests app = Flask(__name__) CORS(app) client = ipfshttpclient.connect('/ip4/127.0.0.1/tcp/5001/http') d...
66
30
95
20
520
python
[{"finding_id": "codeql_py/flask-debug_e6e7acbf6e8ae484_9c9d4300", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-918" ]
[ "py/flask-debug", "py/partial-ssrf" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 65, 40 ]
[ null, null ]
[ 5, 14 ]
[ 24, 65 ]
2024-11-19T01:55:18.782336+00:00
1,559,725,959,000
3c7109f75b4fae8b1d413d12ae7d1c8ebec3de4f
3
{ "blob_id": "3c7109f75b4fae8b1d413d12ae7d1c8ebec3de4f", "branch_name": "refs/heads/master", "committer_date": 1559725959000, "content_id": "0c1d58f6701445f0f811a20c8a8a19a3480c0e71", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e15e29acc1a7bd4bf43aeebc513cadebe512d035", "extension": "py"...
2.5625
stackv2
import openpyxl import requests def find_url(url): headers = {'User-Agent': 'Dalvik/2.1.0 (Linux; U; Android 5.1; MI PAD 2 MIUI/V9.6.1.0.LACCNFD)', 'Host': 'www.yilaitong.net', 'Connection':'Keep-Alive', 'Accept-Encoding': 'gzip' } requests.packages.u...
40
25.32
100
12
295
python
[{"finding_id": "codeql_py/request-without-cert-validation_66e9b7d86a5cd4d1_d7deb6e1", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 11 ]
[ null ]
[ 11 ]
[ 63 ]
2024-11-19T02:06:52.912499+00:00
1,542,245,677,000
6f05178c253c5956ae614c6855d42e57b3426dca
3
{ "blob_id": "6f05178c253c5956ae614c6855d42e57b3426dca", "branch_name": "refs/heads/master", "committer_date": 1542245677000, "content_id": "59713251d5fca14193a896e9145bdf690c53c059", "detected_licenses": [ "Apache-2.0" ], "directory_id": "3c1639bccf3fc0abc9c82c00ab92ac3f25cf105e", "extension": "py"...
3.046875
stackv2
# coding:utf-8 from flask import Flask, current_app, redirect, url_for from werkzeug.routing import BaseConverter app = Flask(__name__) # 1.转换器:<int:goods_id> # <goods_id> 不加转换器类型,默认使用字符串规则。(除了/字符) @app.route('/goods/<int:goods_id>') def goods_detail(goods_id): return 'goods detail page %s' % goods_id @app.rout...
51
23.22
62
11
440
python
[{"finding_id": "codeql_py/flask-debug_00b45030a2c57c5d_c61d65ac", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
4
true
[ "CWE-215", "CWE-079", "CWE-079", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a ...
[ 48, 11, 15, 44 ]
[ null, null, null, null ]
[ 5, 12, 12, 12 ]
[ 28, 45, 44, 63 ]
2024-11-19T02:31:19.230385+00:00
1,617,134,528,000
e777a84a036e1fd22946d3c641a0dfc769f37936
3
{ "blob_id": "e777a84a036e1fd22946d3c641a0dfc769f37936", "branch_name": "refs/heads/master", "committer_date": 1617134528000, "content_id": "e03906ec53db750289f90feb9fd60ed1d183220d", "detected_licenses": [ "MIT" ], "directory_id": "0421d60515e89c14e33a4b3dc1c2aec31d07cc53", "extension": "py", "fi...
2.609375
stackv2
import os from PIL import Image as PILImage from flask import ( Blueprint, Response, abort, current_app, flash, g, send_from_directory, redirect, render_template, url_for ) from sqlalchemy.orm.exc import NoResultFound from werkzeug.utils import secure_filename from chgallery.au...
140
27.71
101
17
869
python
[{"finding_id": "codeql_py/path-injection_8f18c749f3135760_e8320f21", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2).\nThis pa...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2).\nThis path depends on a [user-provided value](3)." ]
[ 122 ]
[ null ]
[ 15 ]
[ 43 ]
2024-11-19T02:31:28.387271+00:00
1,533,904,419,000
e5549bb56a5d77fd2fd347d8e4da00756d8406c0
3
{ "blob_id": "e5549bb56a5d77fd2fd347d8e4da00756d8406c0", "branch_name": "refs/heads/master", "committer_date": 1533904419000, "content_id": "462d54e9c7ac9ffef44d29c0748e766bf2dabd47", "detected_licenses": [ "MIT" ], "directory_id": "596de34ff00fdd63bde26372e040f7bdeb7f4639", "extension": "py", "fi...
2.53125
stackv2
#!/usr/bin/env python # Imports from dotenv import load_dotenv, find_dotenv import requests import time import Adafruit_SSD1306 import RPi.GPIO as GPIO from gpiozero import Button,RGBLED,PingServer from PIL import Image,ImageFont,ImageDraw import os import random import json load_dotenv(find_dotenv()) FONT_PATH = os...
308
22.83
114
19
2,067
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_efc4e11cefb09a18_805fa523", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 187 ]
[ null ]
[ 11 ]
[ 16 ]
2024-11-19T02:31:39.617891+00:00
1,572,983,210,000
6cb5d5b1e95e367c32a53a53fda0d77ae5d3b9f0
2
{ "blob_id": "6cb5d5b1e95e367c32a53a53fda0d77ae5d3b9f0", "branch_name": "refs/heads/master", "committer_date": 1572983210000, "content_id": "8000945cbd76b8f77411dbace4fcd5d1e4d26d7e", "detected_licenses": [ "Apache-2.0" ], "directory_id": "ee4651f0c1a48cb84b766ff062d952a51c0cc0f2", "extension": "py"...
2.484375
stackv2
# Copyright 2015 Jared Rodriguez (jared.rodriguez@rackspace.com) # All Rights Reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENS...
122
35.17
95
14
975
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_847c7e195e349e55_781aa901", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (SHA1) that is insecure."...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (id)](1) is used in a hashing algorithm (SHA1) that is insecure." ]
[ 40 ]
[ null ]
[ 27 ]
[ 49 ]
2024-11-19T02:31:46.052302+00:00
1,570,871,633,000
92d9f3c3d77bf75b7ba7be29fc93658bd67bd97b
2
{ "blob_id": "92d9f3c3d77bf75b7ba7be29fc93658bd67bd97b", "branch_name": "refs/heads/master", "committer_date": 1570871633000, "content_id": "dbaf39cf44c24abe7beef1ee19b6db5f1e1d8a73", "detected_licenses": [ "Apache-2.0" ], "directory_id": "d7e9f94a04b2691e358f818c9d6d7c0d933ed987", "extension": "py"...
2.328125
stackv2
# -*- coding: utf-8 -*- import MySQLdb meteoapi_user='' meteoapi_password='' meteoapi_db='' def setup(user,password,db): global meteoapi_user,meteoapi_password, meteoapi_db meteoapi_user=user meteoapi_password=password meteoapi_db=db # per previsio - últims 24*dies def platja_id_to_descripcio(id): ...
110
28.75
164
10
841
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3550e0c0bd4cee3e_34b385c3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 97 ]
[ null ]
[ 11 ]
[ 19 ]
2024-11-19T02:32:15.762392+00:00
1,626,314,717,000
5b65dad8f6df6dc6f80cd2e6cbe3d08b3533cd81
4
{ "blob_id": "5b65dad8f6df6dc6f80cd2e6cbe3d08b3533cd81", "branch_name": "refs/heads/main", "committer_date": 1626314717000, "content_id": "273fc80b5de151fc2b0bb5aa838fb8d2812cdc34", "detected_licenses": [ "MIT" ], "directory_id": "99f345c8c77867abf99ed537ca7acc53ffd5d2be", "extension": "py", "file...
3.640625
stackv2
# -*- coding: utf-8 -*- """ # Backtracking Algorithm ## SCC5900 - Algorithm Design ### Lecture 5 #### v1 $ python backtracking.py < 1.in > 1_ans.out """ import sys from itertools import product def get_passwords_from_rule(words, rule): digits = [str(i) for i in range(10)] par = [] for char in rule: ...
82
16.2
60
12
356
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_40f8cde1955f3d5b_f4a178fe", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 82 ]
[ null ]
[ 15 ]
[ 16 ]
2024-11-19T02:32:18.835767+00:00
1,418,915,175,000
a6c5135ba8271a5034a8271222bc075b4873cd8f
3
{ "blob_id": "a6c5135ba8271a5034a8271222bc075b4873cd8f", "branch_name": "refs/heads/master", "committer_date": 1418915175000, "content_id": "c4f6eda3dc3727b76a67e7d4f0463c1890d79fd1", "detected_licenses": [ "MIT" ], "directory_id": "13ba19367fe7beb9cfb4364e9cc05db89f1e8dc5", "extension": "py", "fi...
2.609375
stackv2
#!/usr/bin/python # --------------------------------------------------------- # # AWS helper functions # # @author Peter Perger @ Ennosol Technology Co. Ltd. # @package aws-tools # # --------------------------------------------------------- import os import json import wlo import colorization # AWS files HOME = wlo.g...
102
38.21
144
19
983
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_09c61fb266c9f12b_e7787067", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (secret)](1) as clear text." ]
[ 29 ]
[ null ]
[ 17 ]
[ 122 ]
2024-11-19T02:32:20.441847+00:00
1,612,861,284,000
8962b26ba85e1ea5cd5cc62e122dd7cf75eca4d9
2
{ "blob_id": "8962b26ba85e1ea5cd5cc62e122dd7cf75eca4d9", "branch_name": "refs/heads/main", "committer_date": 1612861284000, "content_id": "6663d3d9b9f03b3bf53d7aa80800270386bed1a9", "detected_licenses": [ "MIT" ], "directory_id": "f6600a5128e71d7e1e91a452b7df2d2d8e6a022e", "extension": "py", "file...
2.46875
stackv2
from django.shortcuts import render from django.views import View import json, base64, pickle from django import http from django_redis import get_redis_connection from django.shortcuts import render from goods.models import SKU from tongyou.utils.response_code import RETCODE # Create your views here. class CartsView...
356
32.3
96
18
2,856
python
[{"finding_id": "codeql_py/unsafe-deserialization_ba1aa29cf2eac3ba_6488f07a", "tool_name": "codeql", "rule_id": "py/unsafe-deserialization", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Unsafe deserialization depends on a [user-provided value](1).", "remediation": "", "locatio...
6
true
[ "CWE-502", "CWE-502", "CWE-502", "CWE-502", "CWE-502", "CWE-502" ]
[ "py/unsafe-deserialization", "py/unsafe-deserialization", "py/unsafe-deserialization", "py/unsafe-deserialization", "py/unsafe-deserialization", "py/unsafe-deserialization" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Unsafe deserialization depends on a [user-provided value](1).", "Unsafe deserialization depends on a [user-provided value](1).", "Unsafe deserialization depends on a [user-provided value](1).", "Unsafe deserialization depends on a [user-provided value](1).", "Unsafe deserialization depends on a [user-provi...
[ 67, 114, 194, 240, 298, 341 ]
[ null, null, null, null, null, null ]
[ 42, 42, 42, 42, 38, 42 ]
[ 50, 50, 50, 50, 46, 50 ]
2024-11-19T02:32:22.667075+00:00
1,509,397,784,000
45c30f4f2b8ba53f12947c4326072ae7b40adebe
3
{ "blob_id": "45c30f4f2b8ba53f12947c4326072ae7b40adebe", "branch_name": "refs/heads/master", "committer_date": 1509397784000, "content_id": "b6a979fb97de3acfbcd6c6de57e3d1faa4a90759", "detected_licenses": [ "MIT" ], "directory_id": "f3a0954f59b8fd2b43780a154a4d864efa453a20", "extension": "py", "fi...
3
stackv2
from flask import Flask from flask import render_template from flask import request from flask import redirect import random import requests from bs4 import BeautifulSoup as bs app = Flask(__name__) videos = [] skipCurrentSong = False # Takes a playlist URL as input, and then populates the 'videos' # global variab...
91
21.99
67
13
497
python
[{"finding_id": "codeql_py/full-ssrf_672a48cf646e94b3_c97c683f", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
1
true
[ "CWE-918" ]
[ "py/full-ssrf" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1)." ]
[ 19 ]
[ null ]
[ 9 ]
[ 26 ]
2024-11-19T02:32:33.175618+00:00
1,628,280,543,000
57c9d0cec70c4a70eda26baa67c9cbeb984275f0
2
{ "blob_id": "57c9d0cec70c4a70eda26baa67c9cbeb984275f0", "branch_name": "refs/heads/master", "committer_date": 1628280543000, "content_id": "c0ab344c77fd05111ea0bdb53060c22c7b0cca59", "detected_licenses": [ "MIT" ], "directory_id": "1845f0d71f3ed4063bbb5417ca6ae1555a16dd0a", "extension": "py", "fi...
2.3125
stackv2
#!/usr/bin/env python3 # Extract Possible IoC of package # -*- coding: utf-8 -*- # %%%%%%%%%%% Libraries %%%%%%%%%%%# import re import os import gzip import json import codecs import shutil import tarfile from auxiliar_functions.globals import tmp from auxiliar_functions.globals import extensions # %%%%%%%%%%% Func...
117
43.06
79
28
933
python
[{"finding_id": "codeql_py/tarslip_e28309d968321ad0_150f3145", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 52 ]
[ null ]
[ 17 ]
[ 21 ]
2024-11-19T02:32:43.794344+00:00
1,567,682,974,000
d743bf00721967c3625f28aba016b1babf283df0
3
{ "blob_id": "d743bf00721967c3625f28aba016b1babf283df0", "branch_name": "refs/heads/master", "committer_date": 1567682974000, "content_id": "1e5108faa7650024619d1d74154c20e19fcf50d1", "detected_licenses": [ "Unlicense" ], "directory_id": "6ab15321a7dc816cc07008068fb6890097ce3676", "extension": "py",...
3
stackv2
# !/usr/bin/env python # -*- coding:utf-8 -*- # 作者:ChrisChan # 用途:模拟curl给目标端口发get信息,如果无法连接或者返回值不是正常值就重启程序。 # 需要提前安装pycurl,pyyaml和paramiko # 需要配置文件detect.conf,结构如下: # --- # Name: mrs-05 # IP: 10.0.1.14 # Port: 9030 # Code: 401 #返回状态码 # --- # Name: mrs-04 # IP: 10.0.1.13 # Port: 9030 #...
84
25.76
88
13
764
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_882b9e92276b0025_e3c9c099", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 57 ]
[ null ]
[ 5 ]
[ 62 ]
2024-11-19T02:32:44.690943+00:00
1,615,818,798,000
a04cded792302fe14efe6202ccd26bf6ee5ada5b
2
{ "blob_id": "a04cded792302fe14efe6202ccd26bf6ee5ada5b", "branch_name": "refs/heads/master", "committer_date": 1615818798000, "content_id": "10a300b43e16f4d8e4f8ef09d4e359348c9a8fb3", "detected_licenses": [ "MIT" ], "directory_id": "b70374e1b8ebc07f3568afc8fe88219fe8d5550e", "extension": "py", "fi...
2.46875
stackv2
from flask import Flask, render_template, url_for, request, send_file from flask import * import os from cryptography.fernet import Fernet import helper from helper.steganography import * app = Flask( __name__, instance_path='C:\\Users\\ysaik\\Desktop\\Steganographer\\steganographer\\decryption_input') app.confi...
101
28.78
122
14
677
python
[{"finding_id": "codeql_py/flask-debug_faa5f0a6f9c271d5_ed9556b7", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-022" ]
[ "py/flask-debug", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1)." ]
[ 101, 75 ]
[ null, null ]
[ 5, 16 ]
[ 24, 23 ]
2024-11-19T02:33:01.081775+00:00
1,526,132,335,000
d237bd739f7dd39e1667eb281a4c268252f5ff55
2
{ "blob_id": "d237bd739f7dd39e1667eb281a4c268252f5ff55", "branch_name": "refs/heads/master", "committer_date": 1526132335000, "content_id": "5845d4b5415d5cb421f9bae9cb231082b935bbed", "detected_licenses": [ "Apache-2.0" ], "directory_id": "3570c4b8dd1792d595c32de27547214b63f95169", "extension": "py"...
2.34375
stackv2
from flask import current_app, Blueprint, request from models import is_token_valid, User, Token, Diary, db_object_to_dict, db_object_to_json import datetime import hashlib import json import uuid from bson import ObjectId views = Blueprint('views', __name__) # Remember to update this list ENDPOINT_LIST = ['/', '/met...
407
30.95
118
20
2,909
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_8eb33ac5bbd688e8_75daa896", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally e...
[ 110, 144 ]
[ null, null ]
[ 42, 42 ]
[ 68, 68 ]
2024-11-19T02:33:11.051831+00:00
1,555,003,304,000
4323aa349488cb47ded13a2d74da1428043982e7
3
{ "blob_id": "4323aa349488cb47ded13a2d74da1428043982e7", "branch_name": "refs/heads/master", "committer_date": 1555003304000, "content_id": "07265935c543a100f14bc9d9f409d83057acb975", "detected_licenses": [ "MIT" ], "directory_id": "f613325922692799e9bcee9cc866df897b6cc0a3", "extension": "py", "fi...
2.96875
stackv2
import requests import re def bruteforce_password(url, username, password): characters = 'abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789' # Filters chars to narrow the search range filtered = '' print ('Filtering characters: ', end = '', flush = True) for c in characters: d...
40
32.95
92
15
356
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d611e79bb750b761_b050820b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 40 ]
[ null ]
[ 7 ]
[ 51 ]
2024-11-19T02:33:11.168169+00:00
1,478,319,380,000
60e03612fd86d386271ec03245f8f03dd956e931
3
{ "blob_id": "60e03612fd86d386271ec03245f8f03dd956e931", "branch_name": "refs/heads/master", "committer_date": 1591241428000, "content_id": "c112527033db47da1a8cdf0b2a5df0f3c4380316", "detected_licenses": [ "MIT" ], "directory_id": "0c1c82db17defc8b011a89c1554a0732571553ad", "extension": "py", "fi...
2.625
stackv2
import os, re, time, json, pathlib, zipfile # possible output types: # plain # json output_type = 'plain' path = pathlib.PurePath(os.getcwd()) if 'Add-Ons' in os.listdir(): addon_path = path / 'Add-Ons' else: addon_path = path regex = re.compile(b'\s*function serverCmd([\w\d]+)\s*\(([%\w\d,\s]+)*\)', re.I) ...
65
31.75
146
22
547
python
[{"finding_id": "codeql_py/redos_b948d83fdb8c495f_5aedf634", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'function servercmd0(' and contain...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with 'function servercmd0(' and containing many repetitions of '\\t'." ]
[ 15 ]
[ null ]
[ 58 ]
[ 69 ]
2024-11-19T02:43:33.210353+00:00
1,575,109,390,000
b057e044fda075a80170cc2da3432685c254dda1
3
{ "blob_id": "b057e044fda075a80170cc2da3432685c254dda1", "branch_name": "refs/heads/master", "committer_date": 1575109390000, "content_id": "6c2c446a3005ef984c22edec070936f285e8cc5b", "detected_licenses": [ "MIT" ], "directory_id": "5a9d8ee1cf359b4c96c01a27d492ec59204acbea", "extension": "py", "fi...
2.515625
stackv2
# import shutil import os # from datetime import datetime from pathlib import Path import urlgrabber from urllib.request import urlsplit import zipfile, tarfile import re from PySide2.QtCore import ( Signal, # Slot, # QObject, QThread, ) import gettext gb = gettext.translation('repository', local...
168
36.22
114
19
1,645
python
[{"finding_id": "codeql_py/tarslip_60d7f894fbed5247_65f3c60c", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 156 ]
[ null ]
[ 9 ]
[ 20 ]
2024-11-19T02:54:59.313568+00:00
1,587,371,620,000
be546e1b14b69046a6b932208ec6112bc436a24e
4
{ "blob_id": "be546e1b14b69046a6b932208ec6112bc436a24e", "branch_name": "refs/heads/master", "committer_date": 1587371620000, "content_id": "3533a51914ca03b9a137b86234e4e186a4233550", "detected_licenses": [ "MIT" ], "directory_id": "37466c394358c62f379da98a6776ee227b7a60eb", "extension": "py", "fi...
3.59375
stackv2
#!/usr/bin/env python3.6 from user import User from credentials import Credential import random def create_user_account(user_name,passcode): new_user = User(user_name,passcode) return new_user def save_user(user): user.saveUser() def check_user(user_name,passcode): user_found = User.user_exists(user...
174
32.16
129
26
975
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e2ecc41fffdabace_cdac18e1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 131 ]
[ null ]
[ 40 ]
[ 73 ]
2024-11-19T02:55:07.652037+00:00
1,624,373,497,000
3e4d899d51b3b862a133f0bd999df169ec79c3e5
3
{ "blob_id": "3e4d899d51b3b862a133f0bd999df169ec79c3e5", "branch_name": "refs/heads/main", "committer_date": 1624373497000, "content_id": "d3d211669b0201f7e9f99e20e13a70c80d993603", "detected_licenses": [ "Apache-2.0" ], "directory_id": "7cdc0513e4dfa35ab2ab9a97d8e8a5e92058ea1f", "extension": "py", ...
2.65625
stackv2
import bilib import time def show_comment(aid,page = 1,video = True): info = bilib.video_comment(aid = aid,page=page,video=video) for key,value in info.items(): total_page = value["total_page"] print("第" + str(page) + "页/共" + str(total_page) + "页") break for key,value in info.items()...
61
38.84
109
21
635
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5edb691bee8d6167_87ba32e3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 20, 46 ]
[ null, null ]
[ 15, 23 ]
[ 80, 109 ]
2024-11-19T02:55:07.990742+00:00
1,517,382,615,000
0ff6150fac4a582851da205120c3553087b793f1
3
{ "blob_id": "0ff6150fac4a582851da205120c3553087b793f1", "branch_name": "refs/heads/master", "committer_date": 1517382615000, "content_id": "252e949c3dfd8e3c3c818cba78f50f25741adc3f", "detected_licenses": [ "Apache-2.0" ], "directory_id": "fad2f8cce17fa8b04ec526fc0007148531f5d987", "extension": "py"...
2.765625
stackv2
#!/usr/bin/env python2 """ NOTE: This file is included for test purposes only. You should not need it to capture any flags. """ from Crypto.Cipher import AES from secrets import * if __name__=='__main__': cipher = AES.new(FIXED_KEY, AES.MODE_ECB) c1 = cipher.decrypt(SERIAL_FLAG).encode('hex') c2 = cipher...
17
31.18
88
12
150
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_d18d0f5a882d7413_beae3907", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
4
true
[ "CWE-327", "CWE-327", "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 13, 14, 17, 17 ]
[ null, null, null, null ]
[ 10, 10, 22, 56 ]
[ 37, 36, 54, 88 ]
2024-11-19T02:55:12.635866+00:00
1,557,513,093,000
697bc372c1df0bcb698a0b986af9c2c39f91c97a
4
{ "blob_id": "697bc372c1df0bcb698a0b986af9c2c39f91c97a", "branch_name": "refs/heads/master", "committer_date": 1557513093000, "content_id": "734e07bb3abd2550813f77511bac7ead25da5f72", "detected_licenses": [ "MIT" ], "directory_id": "cca3ada55a1643836f539214fbec95780932fa3d", "extension": "py", "fi...
3.8125
stackv2
""" Write a program to read file EmployeeData.csv and print the id of every employee suspected of arson BONUS: Try doing it with and without the csv module """ # Without CSV f = open("EmployeeData.csv") header = f.readline() employeeList = f.readlines() suspectID = [] for employee in employeeList: entry = employee...
33
19.79
99
12
174
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d7f0c638ec28e004_c6efc10a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 19 ]
[ null ]
[ 11 ]
[ 12 ]
2024-11-19T02:55:13.999064+00:00
1,583,209,243,000
d7171f8c1e42cadc5e90a10fa58dab2b967492cd
3
{ "blob_id": "d7171f8c1e42cadc5e90a10fa58dab2b967492cd", "branch_name": "refs/heads/master", "committer_date": 1583209243000, "content_id": "1ee7bf7a4f5955d578c8eacff502d4034b2da28f", "detected_licenses": [ "MIT" ], "directory_id": "70ba8427a8ee5e16d7a9f577409965ed75abf167", "extension": "py", "fi...
2.546875
stackv2
from re import sub class spliters: def reformat(self, sql): uncomment = sub(r'/\*([^*]|[\r\n]|(\*+([^*/]|[\r\n])))*\*+/',"" ,sql) noline = sub(r'\n', '', uncomment) nodoublespace = noline.replace(' ','') return nodoublespace def split_sql(self, sql): nonwline = ...
49
33.9
128
17
397
python
[{"finding_id": "codeql_py/redos_11f4cbd606515c94_51f098e8", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '/**' and containing many repetiti...
2
true
[ "CWE-1333", "CWE-1333" ]
[ "py/redos", "py/redos" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '/**' and containing many repetitions of '\\n*'.", "This part of the regular expression may cause exponential backtracking on strings starting with '/*' and containing many repetitions of '\\n'." ]
[ 5, 5 ]
[ null, null ]
[ 47, 30 ]
[ 61, 64 ]
2024-11-19T02:55:15.287528+00:00
1,626,506,405,000
db3e3d7979b5587d5c84e9ed1de5a9876aaa3f89
3
{ "blob_id": "db3e3d7979b5587d5c84e9ed1de5a9876aaa3f89", "branch_name": "refs/heads/main", "committer_date": 1626506405000, "content_id": "1daf9e6799de7881ed664a50817016f4cb52f443", "detected_licenses": [ "MIT" ], "directory_id": "4232998a406516c2bece50447db47dafb282babf", "extension": "py", "file...
2.90625
stackv2
# Prepare libraries from flask import Flask, render_template, request import functions as func import pickle import warnings # Stop not important warnings and define the main flask application warnings.filterwarnings("ignore") main_application = Flask(__name__) # Application home page @main_application.route("/") def...
59
49.51
163
19
615
python
[{"finding_id": "codeql_py/path-injection_5df1c6e88116867e_bf206ba1", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
4
true
[ "CWE-022", "CWE-022", "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 30, 33, 50, 53 ]
[ null, null, null, null ]
[ 49, 49, 49, 49 ]
[ 94, 94, 94, 94 ]
2024-11-19T02:55:16.237716+00:00
1,461,337,397,000
6b4af1e6d23b7ba13dd3b8d44d92741aa77a9eac
2
{ "blob_id": "6b4af1e6d23b7ba13dd3b8d44d92741aa77a9eac", "branch_name": "refs/heads/master", "committer_date": 1461337397000, "content_id": "0dd153cf4456f4c1d864d87e074111500a724895", "detected_licenses": [ "MIT" ], "directory_id": "9919857118c75b7fa8b341277ecf1b8b8780ced1", "extension": "py", "fi...
2.4375
stackv2
#!/usr/bin/env python # Copyright (c) 2015 Chris Olstrom <chris@olstrom.com> # # Permission is hereby granted, free of charge, to any person obtaining a copy # of this software and associated documentation files (the "Software"), to deal # in the Software without restriction, including without limitation the rights # ...
261
32.64
79
14
2,039
python
[{"finding_id": "codeql_py/overly-permissive-file_5ab9634f0de032aa_d990d3be", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.\nOverly permissive mask in chmod ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable.\nOverly permissive mask in chmod sets file to group writable." ]
[ 231 ]
[ null ]
[ 13 ]
[ 34 ]
2024-11-19T02:55:18.823889+00:00
1,579,859,783,000
ec36c691a020ff46d13ea9e1e8a643b1ce7c6c8d
3
{ "blob_id": "ec36c691a020ff46d13ea9e1e8a643b1ce7c6c8d", "branch_name": "refs/heads/master", "committer_date": 1579859783000, "content_id": "af0b4d9b6e61c4908570c2b442469e71b53e740c", "detected_licenses": [ "MIT" ], "directory_id": "6387d03197391f2da3a38ff22bade3eab2a0b1db", "extension": "py", "fi...
2.515625
stackv2
import requests from requests.auth import HTTPBasicAuth from requests.packages.urllib3.exceptions import InsecureRequestWarning import bot_capabilities import json def create_room(room_name, token): """ Creates a Spark room with the name "room_name" using the token provided. Returns a JSON-encoded respon...
190
30.54
103
14
1,300
python
[{"finding_id": "codeql_py/request-without-cert-validation_aedcc140905cc4de_32df0de6", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
9
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation"...
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 21, 37, 55, 81, 99, 118, 139, 159, 172 ]
[ 22, 38, 56, 82, 100, 119, 140, 160, null ]
[ 12, 12, 12, 12, 12, 12, 12, 16, 20 ]
[ 67, 55, 55, 55, 67, 67, 67, 62, 77 ]
2024-11-19T02:55:21.501966+00:00
1,507,043,788,000
7d512b0ad1d740a72e072ba8689cfd8371175737
3
{ "blob_id": "7d512b0ad1d740a72e072ba8689cfd8371175737", "branch_name": "refs/heads/master", "committer_date": 1507043788000, "content_id": "0b92a829d2d50e18f84a7ba415a5eab5941bddaa", "detected_licenses": [ "MIT" ], "directory_id": "b7f3adbd357172f2fc4e475f4330f8207db0f3ea", "extension": "py", "fi...
2.859375
stackv2
# MIT License # # Copyright (c) 2017 PXL University College # # Permission is hereby granted, free of charge, to any person obtaining a copy # of this software and associated documentation files (the "Software"), to deal # in the Software without restriction, including without limitation the rights # to use, copy, modi...
117
37.63
115
19
1,007
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_e3b0909623303731_3371e705", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [i.imgur.com](1) may be at an arbitrary position in the...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [i.imgur.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 108 ]
[ null ]
[ 16 ]
[ 36 ]
2024-11-19T02:55:46.541090+00:00
1,529,950,762,000
e152a3c80dc52a39bc9706d804964a1bf1af6363
3
{ "blob_id": "e152a3c80dc52a39bc9706d804964a1bf1af6363", "branch_name": "refs/heads/master", "committer_date": 1529950762000, "content_id": "4f5bcbd90fcdbd819961c16c584da1f8bd3bd8ff", "detected_licenses": [ "Unlicense" ], "directory_id": "cd48561b7c2f31c30e9accfa2cff750cd9f27c5f", "extension": "py",...
2.890625
stackv2
""" Main script for getting geodata from the provided addresses. Can easily be changed for different tables in the database Use arguments to provide start, end and the provider Info: Although OpenMapQuest was added, the API doesn't seem to work. Google is the fastest provider for the geomapping, but the error rate i...
76
39.58
124
17
654
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_84767319248ae3e9_9e9300f0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 56 ]
[ null ]
[ 25 ]
[ 116 ]
2024-11-19T02:55:50.480102+00:00
1,463,391,107,000
09e2ea16be4eb851c093fd8b17565bf6c4baac1c
2
{ "blob_id": "09e2ea16be4eb851c093fd8b17565bf6c4baac1c", "branch_name": "refs/heads/master", "committer_date": 1463391107000, "content_id": "557cab96af2ce31e4aaeb49ff611a0ac2bfe37aa", "detected_licenses": [ "MIT" ], "directory_id": "8e34e750c1e03253b789634e97eab3814439726a", "extension": "py", "fi...
2.5
stackv2
#pip install requests urllib2 #pip install beautifulsoup #easy_install requests-toolbelt #python aspx.py run #the next script import the basis import requests import ssl import urllib2 from requests_toolbelt import SSLAdapter from bs4 import BeautifulSoup import re import time #let's start the script. for function ...
75
32.96
164
14
801
python
[{"finding_id": "codeql_py/request-without-cert-validation_c3dc72c9fa17cc68_8d92fe15", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 26 ]
[ null ]
[ 6 ]
[ 37 ]
2024-11-19T02:56:08.950450+00:00
1,599,115,170,000
43d9d5eef53246cca1e4a386721cf353b8a15017
2
{ "blob_id": "43d9d5eef53246cca1e4a386721cf353b8a15017", "branch_name": "refs/heads/master", "committer_date": 1599115170000, "content_id": "339c8e1a23d838424bdb72c6d784c4bea9ca52fb", "detected_licenses": [ "MIT" ], "directory_id": "d894b58fc02bd3c9bceaf07a8d53783536229adf", "extension": "py", "fi...
2.4375
stackv2
from __future__ import (absolute_import, division, print_function, unicode_literals) import sys import argparse from . import Draft, instructions from .wif import WIFReader, WIFWriter from .render import ImageRenderer, SVGRenderer def load_draft(infile): if infile.endswith('.wif'): ...
135
30.47
70
14
991
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_805210499ac2e4ec_449ef6a9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 73 ]
[ null ]
[ 25 ]
[ 40 ]
2024-11-19T03:10:29.772917+00:00
1,497,641,393,000
eeb77da353f0f99b3259c809e8ab313b0e710642
2
{ "blob_id": "eeb77da353f0f99b3259c809e8ab313b0e710642", "branch_name": "refs/heads/master", "committer_date": 1497641393000, "content_id": "9103126c1cea8344b50bef0e02e874985774c16a", "detected_licenses": [ "MIT" ], "directory_id": "6d035dba7910457f60ff60c7ecc91dfdc344ca04", "extension": "py", "fi...
2.3125
stackv2
"""Default file for views in the app.""" import requests from pyramid.view import view_config from pyramid.httpexceptions import HTTPFound from pyramid.httpexceptions import HTTPNotFound from pyramid.security import remember, forget from mood_bot.security import check_credentials, hash_password from mood_bot.models.mym...
123
42.81
113
19
1,060
python
[{"finding_id": "codeql_py/reflective-xss_3b57e6aa74829922_1fbef8e6", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 69 ]
[ 74 ]
[ 16 ]
[ 56 ]
2024-11-19T03:10:52.533870+00:00
1,497,904,807,000
67097fa7548f589ef318a26f0c6579a037f2d26d
3
{ "blob_id": "67097fa7548f589ef318a26f0c6579a037f2d26d", "branch_name": "refs/heads/master", "committer_date": 1497904807000, "content_id": "95d92c9f2945e1b9acca40bd96bfd8aeab692cf6", "detected_licenses": [ "MIT" ], "directory_id": "299d1c7071c0a5c27b2032e24a6bc4bd2560e3a6", "extension": "py", "fi...
2.625
stackv2
from django.contrib.auth import login, authenticate, logout from django.http import HttpResponse, HttpResponseRedirect, Http404 from django.shortcuts import render from .forms import UserForm, ProfileForm, ItemForm from django.template import RequestContext from .models import User, Profile, Category, Item from django....
220
32.58
93
19
1,458
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d19d1c9d3cda82e2_c312d26b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 55 ]
[ null ]
[ 19 ]
[ 77 ]
2024-11-19T03:21:47.245969+00:00
1,307,412,346,000
9cb8184e8c522ff60d871554b408623d76b20b83
2
{ "blob_id": "9cb8184e8c522ff60d871554b408623d76b20b83", "branch_name": "refs/heads/master", "committer_date": 1307412346000, "content_id": "b8a23158800aaf0b364ba69431ad602c04fbb049", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "4ed3302ebf905693ba58a85072755077b7117b3f", "extension": "p...
2.484375
stackv2
import os import imp import sys from datetime import datetime from dateutil import parser from jinja2 import Environment, FileSystemLoader import yaml import utils from hooks import Hooker post_meta_defaults = { # meta name : (type, default value) 'published' : (datetime, lambda p, s: datetime.now()...
136
31.9
125
23
975
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_2100baa4b7b16f51_da2017b9", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 118 ]
[ null ]
[ 20 ]
[ 72 ]
2024-11-19T03:22:05.696314+00:00
1,631,211,576,000
8ef433e8f9d4dbc802ed7d51401c7e5c7df7ee73
2
{ "blob_id": "8ef433e8f9d4dbc802ed7d51401c7e5c7df7ee73", "branch_name": "refs/heads/master", "committer_date": 1631211576000, "content_id": "f0f930b22b385b7dd8f1e70569e5e8de79aa27f2", "detected_licenses": [ "Apache-2.0" ], "directory_id": "7e1fe6cf389bf43531cf9746e017640b1067b78d", "extension": "py"...
2.34375
stackv2
import io import json from aiohttp import web from typing import Union from tensorcraft import errors from tensorcraft.backend import model from tensorcraft.backend.httpapi import routing _ConflictReason = Union[errors.DuplicateError, errors.LatestTagError] def make_error_response(exc_class, model_exc=errors.Mode...
133
31.61
79
16
908
python
[{"finding_id": "codeql_py/stack-trace-exposure_4009cc2484e92011_c77b7677", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.\n[S...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.\n[Stack trace information](2) flows to this location and may be exposed to an external user.\n[Stack trace information](3) flows to this location and may be exposed to an external user.\n[Stack trace information](4) flows t...
[ 21 ]
[ null ]
[ 27 ]
[ 36 ]
2024-11-19T03:22:06.306446+00:00
1,435,225,373,000
8eef59423861583592fb5dbfa57ab7bd4788524d
3
{ "blob_id": "8eef59423861583592fb5dbfa57ab7bd4788524d", "branch_name": "refs/heads/master", "committer_date": 1435225373000, "content_id": "c7b3d8a4140c5892fb553b6b08ee0d96778bed6c", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "d9bcdf802aa600559feacdddc81f137b6e1ee1b2", "extension": "p...
3.015625
stackv2
# -*- coding: utf-8 -*- """ flask_apputils.decorators ~~~~~~~~~~~~~~~~~~~~~~~~~ Useful decorators to enhance route handlers """ from functools import wraps from flask import request, redirect, Response, render_template, jsonify from .helpers import json_value __all__ = ( 'after_this_request', 'as...
153
25.45
94
20
875
python
[{"finding_id": "codeql_py/url-redirection_1ee11e6c84fb647f_1a87af40", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 122 ]
[ null ]
[ 33 ]
[ 75 ]
2024-11-19T03:22:21.043066+00:00
1,608,884,968,000
e9b6ea1134e8ec88c0cfff45c7bc2dc2b4d9cdc0
3
{ "blob_id": "e9b6ea1134e8ec88c0cfff45c7bc2dc2b4d9cdc0", "branch_name": "refs/heads/main", "committer_date": 1608885035000, "content_id": "b02c473431af88498163a1fe65cdd6fb09ed7e94", "detected_licenses": [ "MIT" ], "directory_id": "7970a866bc70ac1b5ad6a8e7d0b8698708c70cc5", "extension": "py", "file...
2.875
stackv2
import random import time from pathlib import Path from typing import Sequence from flask import Flask, render_template, request from jinja2 import StrictUndefined app = Flask(__name__, static_url_path='') app.jinja_env.undefined = StrictUndefined observations_dir = Path(__file__).resolve().parent / 'observations' ...
54
30.83
83
15
388
python
[{"finding_id": "codeql_py/path-injection_9671f107da2d5bf5_2a35d971", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 42, 45 ]
[ null, null ]
[ 12, 14 ]
[ 29, 31 ]
2024-11-19T03:43:50.278714+00:00
1,674,465,310,000
67832748cf620d24c578dc32e7e3f3d46b4eb6bd
2
{ "blob_id": "67832748cf620d24c578dc32e7e3f3d46b4eb6bd", "branch_name": "refs/heads/master", "committer_date": 1674465310000, "content_id": "aa19a8c64e513c3bc57df215a195ab2e37eb2eed", "detected_licenses": [ "Apache-2.0" ], "directory_id": "50e093b9f1499f273788007b5d3bf209efa70ea1", "extension": "py"...
2.4375
stackv2
import re import attr from clldutils.misc import slug, nfilter from pycldf.sources import Source from pybtex.database import parse_string # dependency of pycldf, so should be installed. from pylexibank import Dataset, Language BASE_URL = "https://abvd.eva.mpg.de" URL = BASE_URL + "/utils/save/?type=xml&section=%s&la...
241
32.92
98
24
1,918
python
[{"finding_id": "codeql_py/overly-large-range_d8501b4cbd5840a3_54c3fd5b", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 28 ]
[ null ]
[ 50 ]
[ 53 ]
2024-11-19T03:43:51.780259+00:00
1,541,009,262,000
55ff11f9f0ba31ea49a41bb172dc47e8cec90891
2
{ "blob_id": "55ff11f9f0ba31ea49a41bb172dc47e8cec90891", "branch_name": "refs/heads/master", "committer_date": 1541009262000, "content_id": "6ecebeb829042ab052672cf02dc7cafe077d531b", "detected_licenses": [ "MIT" ], "directory_id": "7f2489ddb99d7a669fe12b4faf216c11aad8ab28", "extension": "py", "fi...
2.5
stackv2
from cellphonedb.src.app.app_logger import app_logger class LocalQueryLauncher: def __getattribute__(self, name): method = object.__getattribute__(self, name) if hasattr(method, '__call__'): app_logger.info('Launching Query {}'.format(name)) return method def __init__(sel...
75
46.09
118
16
913
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9735fa4042c5d380_3544319f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
4
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 38, 39, 40, 41 ]
[ null, null, null, 42 ]
[ 15, 15, 15, 15 ]
[ 74, 111, 102, 70 ]
2024-11-19T03:44:01.747973+00:00
1,613,546,758,000
2d2d9d2d39ea41da3d192aeedd504a4e8e9eb159
2
{ "blob_id": "2d2d9d2d39ea41da3d192aeedd504a4e8e9eb159", "branch_name": "refs/heads/master", "committer_date": 1613546758000, "content_id": "f1d3016f0b61f64cee4e62c38d168ff844f4e18d", "detected_licenses": [ "MIT" ], "directory_id": "f1068ab6e606d7b2a041df64ee2d659fde6e7664", "extension": "py", "fi...
2.328125
stackv2
import os import re import functools import xml.etree.ElementTree as etree from datetime import date, datetime, timedelta, timezone from typing import Any, Callable, Dict, List, Optional import yaml import pytz import toml import markdown.extensions import markdown.treeprocessors from markdown import Markdown from mdx...
354
31.74
86
17
2,914
python
[{"finding_id": "codeql_py/reflective-xss_05c215abba2dbaca_ed2bd276", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 282, 291 ]
[ null, null ]
[ 12, 12 ]
[ 77, 72 ]
2024-11-19T03:44:28.643768+00:00
1,606,182,459,000
041e48f664ee0c8f470bdbed3c0c0f096a0ce399
3
{ "blob_id": "041e48f664ee0c8f470bdbed3c0c0f096a0ce399", "branch_name": "refs/heads/main", "committer_date": 1606182459000, "content_id": "8043c1d256e3e3f149e4236e5ca90047886e7079", "detected_licenses": [ "MIT" ], "directory_id": "4a5326eb35a6431be58c374ff83b21a7eee37c5b", "extension": "py", "file...
2.671875
stackv2
from multiprocessing import Process from flask import Flask, Response, request #from flask_restful import Api, Resource, reqparse from pathlib import Path import __main__ import os import json from datetime import datetime class EndpointAction(object): def __init__(self, action): self.action = action ...
288
30.21
114
18
2,079
python
[{"finding_id": "codeql_py/command-line-injection_cb9cc45670e70c36_3f7bbf6f", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {...
5
true
[ "CWE-078", "CWE-022", "CWE-022", "CWE-022", "CWE-022" ]
[ "py/command-line-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This command line depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided val...
[ 257, 144, 188, 230, 282 ]
[ null, null, null, null, null ]
[ 19, 31, 19, 19, 19 ]
[ 40, 57, 28, 28, 28 ]
2024-11-19T03:44:29.132027+00:00
1,466,523,246,000
de3e5bd5e416f78ceaea2a601a1b82f8c8e7fcc6
3
{ "blob_id": "de3e5bd5e416f78ceaea2a601a1b82f8c8e7fcc6", "branch_name": "refs/heads/master", "committer_date": 1466523246000, "content_id": "de96149091877328bec583381723b640285026d9", "detected_licenses": [ "Apache-2.0" ], "directory_id": "ed133a033021aa4ce6701e118c12e80edda3fe2b", "extension": "py"...
2.515625
stackv2
#!/usr/bin/env python from argparse import ArgumentParser import requests import json import os.path, sys #change path to allow import from parent directory sys.path.append(os.path.join(os.path.dirname(os.path.realpath(__file__)), os.pardir)) from apic import get_auth_token, create_url, wait_on_task # get the policy ...
92
36.09
104
15
827
python
[{"finding_id": "codeql_py/request-without-cert-validation_88db034794d17723_e5caadf7", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 20, 54 ]
[ null, null ]
[ 20, 16 ]
[ 68, 90 ]
2024-11-19T03:44:35.172426+00:00
1,608,755,351,000
1f8e1d36e2bd5235611055642207abf54cf7aa74
3
{ "blob_id": "1f8e1d36e2bd5235611055642207abf54cf7aa74", "branch_name": "refs/heads/master", "committer_date": 1608755351000, "content_id": "98a27de73c3f13d8e3b1d593f9381082e46196c9", "detected_licenses": [ "MIT" ], "directory_id": "70ccb9bbb4666609c505406d40352ee8eea6f2bd", "extension": "py", "fi...
2.671875
stackv2
import atexit import json import os import platform import shutil import subprocess import tempfile import time import zipfile from pathlib import Path from threading import Timer import requests def _get_command(): system = platform.system() if system == "Darwin": command = "ngrok" elif system =...
108
30.07
94
13
909
python
[{"finding_id": "codeql_py/overly-permissive-file_b0169152a9588d01_021f927b", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world writable." ]
[ 34 ]
[ null ]
[ 5 ]
[ 32 ]
2024-11-19T01:44:06.738326+00:00
1,407,230,062,000
25c8580eca28614a520b3c7b95f54c7fa32f6801
2
{ "blob_id": "25c8580eca28614a520b3c7b95f54c7fa32f6801", "branch_name": "refs/heads/master", "committer_date": 1407230062000, "content_id": "884ae4bb536ce43f1f85f1d6e75ba483399b94af", "detected_licenses": [ "Apache-2.0" ], "directory_id": "30cf17bdb1f34e6b0612044670372504d670c59f", "extension": "py"...
2.5
stackv2
# -*- encoding: utf-8 -*- """ lunaport.dao.token ~~~~~~~~~~~~~~~~~~ Storage interaction logic for authentication token. """ from hashlib import sha1 import string import random import pprint pp = pprint.PrettyPrinter(indent=4).pprint from sqlalchemy import text, exc from exceptions import StorageError ...
131
28.11
85
17
942
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_4542aff2477d63cd_095ef17b", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.", "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally e...
[ 26, 46 ]
[ null, null ]
[ 21, 37 ]
[ 33, 49 ]
2024-11-19T02:08:40.253946+00:00
1,604,069,298,000
2a07314cf58ddbab81e22a72a60ff76bc92dbfb7
4
{ "blob_id": "2a07314cf58ddbab81e22a72a60ff76bc92dbfb7", "branch_name": "refs/heads/master", "committer_date": 1604069298000, "content_id": "f1f73c5dda39848a5c09e30d4806e0cc00b3dd42", "detected_licenses": [ "MIT" ], "directory_id": "8882b84f27d09f9e1bdfd9d7abce71b7c1d30b87", "extension": "py", "fi...
3.515625
stackv2
while True: print('Pirmais lietotajs -\n Ievadiet tekstu:') text = str(input()) if text.isnumeric() == False: # isnumeric() var lietot try except vietā text = text.lower() break else: print("Nav pareizi!") secret_text = text for letter in range(0,len(secret_text)): print(...
35
30.14
97
13
304
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0f08e462a7cd92a9_7beb7068", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.", "This expression logs [sensitive data (secre...
[ 12, 20, 35 ]
[ null, null, null ]
[ 11, 7, 7 ]
[ 30, 52, 35 ]
2024-11-19T02:21:21.847915+00:00
1,457,585,337,000
a340fc40f26da1ea8e962f63f975b4e93f294d31
2
{ "blob_id": "a340fc40f26da1ea8e962f63f975b4e93f294d31", "branch_name": "refs/heads/master", "committer_date": 1457585337000, "content_id": "61e42fd457406352057c5a54f8e15d2f87484e47", "detected_licenses": [ "MIT" ], "directory_id": "98a59da8e89224b64eab857392af6f6d7ffba5af", "extension": "py", "fi...
2.4375
stackv2
#!/usr/bin/env python from __future__ import print_function import paramiko import getpass import time remote_conn_pre = paramiko.SSHClient() remote_conn_pre.set_missing_host_key_policy(paramiko.AutoAddPolicy()) def get_version(remote_conn): remote_conn.send("terminal length 0\n") time.sleep(1) remote_con...
34
25.68
119
10
231
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_ed3687507f909b78_9190ec2f", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 8 ]
[ null ]
[ null ]
[ 70 ]
2024-11-19T02:58:16.229161+00:00
1,593,590,453,000
0a8ba4a2fa46ad9f78036a7d4a4bc09520fc57a8
3
{ "blob_id": "0a8ba4a2fa46ad9f78036a7d4a4bc09520fc57a8", "branch_name": "refs/heads/master", "committer_date": 1593590453000, "content_id": "306e287091f8029c44fe9031a6ad0effa1068a46", "detected_licenses": [ "MIT" ], "directory_id": "5d4eb8d1ea124f918ca69edb9034dbadfb600df6", "extension": "py", "fi...
2.59375
stackv2
from flask import Flask, render_template, request, send_file from transfer import runTransfer import os from PIL import Image import cv2 from io import BytesIO app = Flask(__name__,template_folder="./templates/") @app.route("/") def index(): return render_template('index.html') @app.route("/transfer", methods ...
48
26.21
60
13
295
python
[{"finding_id": "codeql_py/flask-debug_e0e36607abd43d19_a5715ee3", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-022", "CWE-022" ]
[ "py/flask-debug", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 48, 22, 23 ]
[ null, null, null ]
[ 5, 21, 21 ]
[ 51, 32, 32 ]
2024-11-19T03:10:09.310443+00:00
1,680,906,649,000
bcdb3201be74aa48de8014e97468e46c07daf6a7
2
{ "blob_id": "bcdb3201be74aa48de8014e97468e46c07daf6a7", "branch_name": "refs/heads/main", "committer_date": 1680906649000, "content_id": "d5898b26f9f3d1c672a8625a9d427722bb222b30", "detected_licenses": [ "MIT" ], "directory_id": "23a2c2ecc24186faec2896ad3cb0cbba2000b2de", "extension": "py", "file...
2.328125
stackv2
from pathlib import Path import asyncio import random import functools import aiohttp from denovonear.ensembl_cache import EnsemblCache def ensembl_cache(folder=None): ''' store/retrive repeated ensembl requests from a persistent sqlite cache ''' if folder is None: folder = Path.home() / '.cache...
72
35.51
80
24
559
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_14591d88be8ed9f9_9a1ab095", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [rest.ensembl.org](1) may be at an arbitrary position i...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [rest.ensembl.org](1) may be at an arbitrary position in the sanitized URL." ]
[ 24 ]
[ null ]
[ 16 ]
[ 41 ]
2024-11-19T03:10:09.363625+00:00
1,630,103,026,000
a794b97adf7a8622a97e4a888d6532dde8bf2400
2
{ "blob_id": "a794b97adf7a8622a97e4a888d6532dde8bf2400", "branch_name": "refs/heads/main", "committer_date": 1630103026000, "content_id": "a425f1568508bbba404b102e18408f6cc89a31bc", "detected_licenses": [ "Apache-2.0" ], "directory_id": "d723c12e9afdb19ccd4c2366bb21e0f3a612f8a7", "extension": "py", ...
2.390625
stackv2
#!/usr/bin/env python3 # Copyright 2017 Google Inc. # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or...
67
32.45
80
16
565
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_c50d540daa850629_d4882d4f", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.",...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 29 ]
[ null ]
[ 26 ]
[ 30 ]
2024-11-19T03:10:26.442200+00:00
1,399,399,778,000
509fe8810d924f1881798fe66a43eac11e7926c8
2
{ "blob_id": "509fe8810d924f1881798fe66a43eac11e7926c8", "branch_name": "refs/heads/master", "committer_date": 1399399778000, "content_id": "3ff477a71219f13485601fa4af7bdd21f8d54617", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "a414a181a9bb4511e4a0ae759687aebdabc38bc0", "extension": "p...
2.390625
stackv2
#!/usr/bin/python import cgi, cgitb import jinja2 import random import os import MySQLdb from dbparams import myHost, myUser, myPasswd, myDb from Crypto.Hash import SHA from Crypto.PublicKey import RSA from Crypto.Signature import PKCS1_v1_5 import base64 cgitb.enable() jinja_environment = jinja2.Environment(loader...
68
23.81
97
12
458
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_3829a805552caf3b_b6128c6e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 16 ]
[ null ]
[ 21 ]
[ 98 ]
2024-11-19T03:10:27.323660+00:00
1,675,891,548,000
d61d653044da1be2a419e8d95b516a2b4b2d337a
3
{ "blob_id": "d61d653044da1be2a419e8d95b516a2b4b2d337a", "branch_name": "refs/heads/master", "committer_date": 1675891548000, "content_id": "5331345ad897266395e26b60d20c2a6c434e5685", "detected_licenses": [ "MIT" ], "directory_id": "78071f4f3944838d72e72886962f93556fc45878", "extension": "py", "fi...
2.796875
stackv2
""" Módulo relacionado ao servidor que executará os comandos PowerShell """ import os import re import socket import tempfile import paramiko def escapar_echo_cmd(conteudo): conteudo_escapado = re.sub( r'(&|\\|<|>|\^|\|)', r'^\1', conteudo, flags=re.RegexFlag.MULTILINE) conteudo_escapado = re.sub(r'\n...
173
37.03
99
18
1,518
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_af38ec9b16774ddf_b62709ab", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 67 ]
[ null ]
[ 13 ]
[ 79 ]
2024-11-19T03:10:33.983151+00:00
1,589,552,632,000
a71d2f89bf00303758bd4f3d30f3147e92ab09d8
3
{ "blob_id": "a71d2f89bf00303758bd4f3d30f3147e92ab09d8", "branch_name": "refs/heads/master", "committer_date": 1589552632000, "content_id": "c77615f512566592c65b81507c7547100da1395d", "detected_licenses": [ "MIT" ], "directory_id": "70d94b85ea6a161a30169af4da518fbab578d887", "extension": "py", "fi...
3.3125
stackv2
#!/usr/bin/env python3.6 from user import User,Credential def create_account(first_name,last_name,user_name,password): """ function to create new account or to sign up """ new_account=User(first_name,last_name,user_name,password) return new_account def save_account(account): """ Function ...
285
41.66
179
27
1,987
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f57402d9ac3cb8cf_5f9aa5b7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
7
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (p...
[ 107, 155, 162, 173, 240, 247, 258 ]
[ null, null, null, null, null, null, null ]
[ 15, 35, 43, 39, 27, 35, 31 ]
[ 122, 120, 140, 72, 112, 132, 64 ]
2024-11-19T03:22:33.529847+00:00
1,617,049,694,000
8fd677996c0bfca49fec8f205462576eaae0e289
3
{ "blob_id": "8fd677996c0bfca49fec8f205462576eaae0e289", "branch_name": "refs/heads/master", "committer_date": 1617049694000, "content_id": "4b979a56882f70da2f12dd0ae2ec25818b48eeaf", "detected_licenses": [ "BSD-2-Clause-Views", "BSD-3-Clause" ], "directory_id": "f0d6efe035d4c2ed1ea6bb6d1d5a613b86...
2.625
stackv2
__author__ = "BEMOSS Team" from Crypto.Cipher import AES from Crypto import Random import base64 from django_web_server import settings_tornado MASTER_KEY = settings_tornado.SECRET_KEY def encrypt_value(clear_text): enc_secret = AES.new(MASTER_KEY[:32], AES.MODE_ECB) tag_string = (str(clear_text) + ...
26
29.15
69
16
200
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_2731714ed8b794e0_41162148", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 16, 22 ]
[ null, null ]
[ 36, 21 ]
[ 66, 70 ]
2024-11-19T03:22:33.944990+00:00
1,511,288,180,000
b4514bc0be9efee0e9686dc8060297ad27857725
3
{ "blob_id": "b4514bc0be9efee0e9686dc8060297ad27857725", "branch_name": "refs/heads/master", "committer_date": 1511288180000, "content_id": "228389a8fb2c3ba98ca01719c3348b88b548f885", "detected_licenses": [ "Apache-2.0" ], "directory_id": "7aa69748b162bc75a3624886ac614326c1b46955", "extension": "py"...
2.6875
stackv2
""" A module for checking SSH connection and run a command """ import paramiko from enginecheck import EngineCheck class SSHCheck(EngineCheck): def __init__(self, params): self.user = params['user'] self.password = params['password'] ip_addr = ','.join(params['ip_addr']) EngineChec...
26
32.54
86
15
188
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_a63111f9ff8f8401_0e26a72e", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 17 ]
[ null ]
[ 9 ]
[ 66 ]
2024-11-19T03:22:39.930035+00:00
1,564,092,157,000
1b401e19ffea6247e0005acf0d2360d670d427cb
3
{ "blob_id": "1b401e19ffea6247e0005acf0d2360d670d427cb", "branch_name": "refs/heads/master", "committer_date": 1564092157000, "content_id": "9a96d2130e25aa418569a9ea59fa0bf865b16930", "detected_licenses": [ "MIT" ], "directory_id": "fdf839fee3f97218d65ebc8e1d9a7bc23ca4bf81", "extension": "py", "fi...
2.8125
stackv2
import pandas as pd import geopandas as gpd import numpy as np from shapely.geometry import Point import matplotlib.pyplot as plt import networkx as nx from sklearn.cluster import KMeans import dtmzUtils as utils import copy import operator import os from haversine import haversine def buildGraphFromCSV(nodes_file, ed...
238
40.57
152
21
2,388
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_aa608a80b29037f4_f42b729e", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text." ]
[ 62 ]
[ null ]
[ 17 ]
[ 126 ]
2024-11-19T03:22:54.851579+00:00
1,567,456,450,000
92b3a3cb461ecdbb4e166997cd2128be682bcec8
3
{ "blob_id": "92b3a3cb461ecdbb4e166997cd2128be682bcec8", "branch_name": "refs/heads/master", "committer_date": 1567456450000, "content_id": "d3818bb9e6f3ebfd0575ded9014b602d3b916dcb", "detected_licenses": [ "MIT" ], "directory_id": "28172c0a9160a717a23a9fc5388a640a575b616e", "extension": "py", "fi...
2.921875
stackv2
#!/usr/bin/env python3.6 import pyperclip class User: def __init__(self, fname, lname): self.firstname = fname self.lastname = lname self.username = uname self.password = psword def printname(self): print(self.firstname, self.lastname, self.username, self.password) cla...
41
21.34
98
11
199
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_13bdd6ff8039ffd4_c5a949c9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 12, 20 ]
[ null, null ]
[ 61, 85 ]
[ 74, 98 ]
2024-11-19T03:44:12.112908+00:00
1,658,946,532,000
a5652927f80a2c3ef8fb589b4baf4917f43998da
3
{ "blob_id": "a5652927f80a2c3ef8fb589b4baf4917f43998da", "branch_name": "refs/heads/master", "committer_date": 1658946532000, "content_id": "cb0d869959df3a3cc18791508348f6207567f47e", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "4fb833c5eb89a8f7feaf5fd26ea3c988fde90a87", "extension": "p...
2.546875
stackv2
#!/usr/bin/env python # encoding: utf-8 """ Licensed under a 3-clause BSD license. Revision History: Initial Version: 2016-02-17 17:46:57 Last Modified On: 2016-02-17 17:46:57 by Brian """ from __future__ import print_function from __future__ import division from flask_classful import FlaskView from flask im...
128
30.38
98
20
902
python
[{"finding_id": "codeql_py/stack-trace-exposure_56efaacf71014f10_9ceb2674", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 103 ]
[ null ]
[ 28 ]
[ 56 ]
2024-11-19T01:35:03.084513+00:00
1,581,916,597,000
b5f39ff8fce4ef115514fcfaa65597291774fce9
2
{ "blob_id": "b5f39ff8fce4ef115514fcfaa65597291774fce9", "branch_name": "refs/heads/master", "committer_date": 1581916597000, "content_id": "177bbd692634553b5d5fcd2d998ffdb53baf2fa2", "detected_licenses": [ "MIT" ], "directory_id": "e43b2c3f71dd05ae9ea8a2a69ea678f87f789e57", "extension": "py", "fi...
2.4375
stackv2
"""Habrproxy Main Module.""" from logging import getLogger from aiohttp import web, ClientSession, ClientConnectionError from habrproxy.parser import build_response_content LOGGER_NAME = "habrproxy" OMIT_RES_HEADERS = ["Content-Encoding", "Transfer-Encoding"] OMIT_REQ_HEADERS = ["Accept-Encoding"] def filter_header...
78
37.94
88
17
582
python
[{"finding_id": "codeql_py/log-injection_148d4b70f4e10bf4_01b5f4f8", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
3
true
[ "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 47, 48, 57 ]
[ null, null, null ]
[ 25, 25, 30 ]
[ 42, 39, 33 ]
2024-11-19T01:35:07.476749+00:00
1,631,721,031,000
24cc2190a295d27f1a0c937db2a67a42e8623f08
3
{ "blob_id": "24cc2190a295d27f1a0c937db2a67a42e8623f08", "branch_name": "refs/heads/main", "committer_date": 1631721031000, "content_id": "9dfcfd832b1ddd1304d5d45dcd664311fbfb4cc6", "detected_licenses": [ "MIT" ], "directory_id": "85c13475b4fe953083c65651f95626c1222a7658", "extension": "py", "file...
2.671875
stackv2
import requests from webhook.base.resources.tools import enterprise_or_self, name_of_account from webhook.manager.models import Account from django import forms class ContaNovaForm(forms.ModelForm): """ Este formulario va a tratar la entrada de tareas, solamente capturando su nombre. """ class Meta: ...
62
38.16
128
19
510
python
[{"finding_id": "codeql_py/full-ssrf_5a1b1af5bbbde49f_4b5a88ac", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
1
true
[ "CWE-918" ]
[ "py/full-ssrf" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1)." ]
[ 33 ]
[ null ]
[ 24 ]
[ 41 ]
2024-11-19T02:07:52.346122+00:00
1,574,618,589,000
5dbc05f54c3d1b55d72b9fdc9f12a62995abff5e
3
{ "blob_id": "5dbc05f54c3d1b55d72b9fdc9f12a62995abff5e", "branch_name": "refs/heads/master", "committer_date": 1574618589000, "content_id": "fffcddd69ef07180cd433926b93f192c3e83af0d", "detected_licenses": [ "MIT" ], "directory_id": "37a6576069ca4b3e16f3421bb1e9b286f360b354", "extension": "py", "fi...
2.96875
stackv2
import argparse import logging import csv import time import coloredlogs import googlemaps logger = logging.getLogger(__name__) def main(csv_input_file, input_column, api_key, csv_output_file): logger.info('Starting Google Maps client with API Key %s', api_key) gmaps = googlemaps.Client(key=api_key) w...
64
39.11
127
21
522
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6083c9fcc054628f_1410d3d9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 14 ]
[ null ]
[ 64 ]
[ 71 ]
2024-11-19T02:17:19.944729+00:00
1,541,850,962,000
cfbf9eb6bc113ee3089a173c157a48ce5cdda703
3
{ "blob_id": "cfbf9eb6bc113ee3089a173c157a48ce5cdda703", "branch_name": "refs/heads/master", "committer_date": 1541850972000, "content_id": "a0b4d2c170bdf3ecbfd655c60620281885d53c17", "detected_licenses": [ "MIT" ], "directory_id": "0b7c79f5dff986f4393c1c2fadd900503c907705", "extension": "py", "fi...
2.796875
stackv2
import os import tarfile import shutil import zipfile import eos.cache import eos.log try: import lzma LZMA_AVAILABLE = True except ImportError: LZMA_AVAILABLE = False def _get_cache_extract_dir(namelist, stem): cache_dir = eos.cache.get_cache_dir() # get common base directory in file paths, if...
129
31.63
115
16
926
python
[{"finding_id": "codeql_py/tarslip_abcbc93f43f628c7_36e04aaf", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially untrusted source](1)." ]
[ 102 ]
[ null ]
[ 9 ]
[ 14 ]
2024-11-19T02:17:25.593019+00:00
1,583,344,064,000
719575ae354a7435271d0893d4bdb59a8b6e9c5b
3
{ "blob_id": "719575ae354a7435271d0893d4bdb59a8b6e9c5b", "branch_name": "refs/heads/master", "committer_date": 1583344064000, "content_id": "f954aeca0459662f560f63c5702d9aaba720436c", "detected_licenses": [ "MIT" ], "directory_id": "d6ff91855a9a63af694962f46398b3ef55bac88c", "extension": "py", "fi...
2.578125
stackv2
#!/usr/bin/env python3 from argparse import ArgumentParser from datetime import date from logging import getLogger from lxml import etree from pathlib import Path from pprint import pprint import re import requests from time import sleep from urllib.parse import urljoin from sqlalchemy import create_engine, Table, Col...
174
31.99
123
15
1,426
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ab585ce71a5f5b70_11e03ae9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 141 ]
[ null ]
[ 44 ]
[ 54 ]
2024-11-19T02:17:29.986621+00:00
1,618,994,701,000
a51b4e5d4f34ce4e219fd4bcd8283bf1ad993512
3
{ "blob_id": "a51b4e5d4f34ce4e219fd4bcd8283bf1ad993512", "branch_name": "refs/heads/main", "committer_date": 1618994701000, "content_id": "274db3215054b2eaecec7daa120f605eb274ee69", "detected_licenses": [ "MIT" ], "directory_id": "34c9b2e2c09b6f60eaca6f9067eff723516a3999", "extension": "py", "file...
2.609375
stackv2
from typing import Dict, List, Any from flask import Blueprint, request, g from . import auth from .webutil import ViewReturn from .data.database import Administrator, Character bp = Blueprint("acl", __name__) @bp.route("/api/acl/add", methods=["POST"]) @auth.login_required @auth.require_permission("access-manage") ...
67
25.78
87
15
446
python
[{"finding_id": "codeql_py/reflective-xss_6e8096903bfc9671_55607f47", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 19 ]
[ null ]
[ 16 ]
[ 46 ]
2024-11-19T02:17:30.040272+00:00
1,511,461,852,000
e597dc78f0493173d7917de9ce8e5e1b51a3538b
2
{ "blob_id": "e597dc78f0493173d7917de9ce8e5e1b51a3538b", "branch_name": "refs/heads/master", "committer_date": 1511461852000, "content_id": "8908b3e3442146f7df5abb518cab7999515461ce", "detected_licenses": [ "MIT" ], "directory_id": "d7b694476fa1341ec9ab08e9ae57f235cdf915ef", "extension": "py", "fi...
2.421875
stackv2
"""Main module of amlight/mef_eline Kytos Network Application. NApp to provision circuits from user request """ import json import hashlib import requests from kytos.core import KytosNApp, log, rest from kytos.core.helpers import listen_to from flask import request, abort from napps.amlight.mef_eline import settings ...
281
37.72
92
25
2,345
python
[{"finding_id": "codeql_py/partial-ssrf_4ffa4c154e2558c2_2b6f7bee", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 88 ]
[ null ]
[ 17 ]
[ 34 ]
2024-11-19T02:17:48.852877+00:00
1,551,338,921,000
63225d85ee528c443d336633fb337b2dc0c48f7d
2
{ "blob_id": "63225d85ee528c443d336633fb337b2dc0c48f7d", "branch_name": "refs/heads/master", "committer_date": 1551338921000, "content_id": "061969b3dfd8831138e444abfb0115f98d281df7", "detected_licenses": [ "MIT" ], "directory_id": "23b6ea544ce3306507d333212e8b5c30bbe4a75f", "extension": "py", "fi...
2.3125
stackv2
from __future__ import absolute_import from __future__ import unicode_literals import argparse import collections import contextlib import distutils.spawn import functools import gzip import io import os.path import pipes import platform import shutil import tarfile import tempfile import distro import six RVM = 'h...
283
27.56
78
17
1,967
python
[{"finding_id": "codeql_py/tarslip_4f0f9039a829d73e_750c0a37", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 179 ]
[ null ]
[ 9 ]
[ 17 ]
2024-11-19T02:17:49.951760+00:00
1,500,483,465,000
c65518b450df0bb3d3569e6e5ae0c667eaaf578f
3
{ "blob_id": "c65518b450df0bb3d3569e6e5ae0c667eaaf578f", "branch_name": "refs/heads/master", "committer_date": 1500483465000, "content_id": "fb96acd0bc1a1c83a2adf01782b38a46a607a29d", "detected_licenses": [ "Apache-2.0" ], "directory_id": "6ffa4c119ff96d93f262a87e78aa6805fbcc31eb", "extension": "py"...
3.25
stackv2
#This code convert apostrophe problem to "of" #for example # Who was John F. Kennedy's vice president? -->Who was vice president of John F. Kennedy? # Does Abraham Lincoln's death place have a website? --> Does death place of Abraham Lincoln have a website? # What was Brazil's lowest rank in the FIFA World Ranking? #...
85
37.59
126
17
829
python
[{"finding_id": "codeql_py/reflective-xss_da01d24b2b7c4c1f_a5aaa497", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 82 ]
[ null ]
[ 9 ]
[ 43 ]
2024-11-19T02:18:02.324835+00:00
1,523,014,491,000
f130d7d378d29008681a78e226a07e47fb16ee13
3
{ "blob_id": "f130d7d378d29008681a78e226a07e47fb16ee13", "branch_name": "refs/heads/master", "committer_date": 1523014491000, "content_id": "98d8734a7c925bb5472a621d978bdf8e9b9b70c1", "detected_licenses": [ "Unlicense" ], "directory_id": "32514a9b19ea595abd909c7760f2b1931abb85df", "extension": "py",...
2.6875
stackv2
from flask import Flask, request, Response import pymongo from pymongo import MongoClient client = MongoClient('localhost', 27017) db = client.mini_amazon app = Flask('mini-amazon') @app.route('/health', methods=['GET']) def health(): return 'healthy\n' @app.route('/', methods=['GET']) def index(): return...
50
24.46
60
14
306
python
[{"finding_id": "codeql_py/flask-debug_308cb44941bacf4a_ecf31140", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 50, 23 ]
[ null, null ]
[ 5, 12 ]
[ 51, 47 ]
2024-11-19T02:18:03.634479+00:00
1,534,209,221,000
231cf511e1cfcf7f2d75e736daad41238cbb85ec
3
{ "blob_id": "231cf511e1cfcf7f2d75e736daad41238cbb85ec", "branch_name": "refs/heads/master", "committer_date": 1534209221000, "content_id": "b808606b83d70866138a031de5633ff8ae44e204", "detected_licenses": [ "MIT" ], "directory_id": "f6df1c10ff3baed21529ede5fa6cb200a0f7b68e", "extension": "py", "fi...
2.765625
stackv2
#!/usr/bin/python3 import jinja2 import mistune import re import sys import glob import os import time TEMPLATES = """ <!DOCTYPE html> <html> <head> <title>{{title}}</title> <link rel="stylesheet" type="text/css" href="../static/css/bootstrap.min.css"> <script type="text/javascript" src="../static/js/jquery.min.js...
177
20.72
79
17
1,098
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_b6af5a2d02f8bf33_f76ae16f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 120 ]
[ null ]
[ 22 ]
[ 48 ]
2024-11-19T02:18:10.518272+00:00
1,622,350,392,000
954fe0bc38e9ae5a879195f5e4544a32e6b47c15
3
{ "blob_id": "954fe0bc38e9ae5a879195f5e4544a32e6b47c15", "branch_name": "refs/heads/main", "committer_date": 1622350392000, "content_id": "2623b6473bec79f32c5e65acb94d399c7c72865e", "detected_licenses": [ "MIT" ], "directory_id": "823b7c7dae1556008f02c29f6d7b90f8af67bfd9", "extension": "py", "file...
2.609375
stackv2
from email.mime.multipart import MIMEMultipart from email.mime.text import MIMEText import smtplib import os import threading from datetime import datetime, timedelta MY_ADDRESS = os.environ['MY_ADDRESS'] PASSWORD = os.environ["PASSWORD"] HOST = os.environ["HOST"] def sendEmail(email, title, contents): s = smtpli...
38
34.76
139
20
350
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_745541e0ef059e9c_46b680d8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 37 ]
[ null ]
[ 40 ]
[ 46 ]
2024-11-19T02:18:26.281710+00:00
1,601,722,813,000
78350081da144341d7697c457627b1df7fcd06e3
3
{ "blob_id": "78350081da144341d7697c457627b1df7fcd06e3", "branch_name": "refs/heads/master", "committer_date": 1601722813000, "content_id": "695d2cbac6c93871bf005d8242d2de42c6be7372", "detected_licenses": [ "MIT" ], "directory_id": "c64463ddcd55dbbd6de1208bec88939358de6b08", "extension": "py", "fi...
3.390625
stackv2
import requests import json # API key here api_key = "xxx" # base_url variable to store url base_url = "http://api.openweathermap.org/data/2.5/weather?" + "APPID=" + api_key def get_current_weather(city_name): # Give city name # complete_url variable to store # complete url address complete_url = ...
63
22.9
81
16
388
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_284333f0282fc3bf_b2c94c75", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 55 ]
[ null ]
[ 15 ]
[ 55 ]
2024-11-19T02:30:05.187825+00:00
1,484,326,727,000
f9b4a99016ba17d66623192eaad47b2eeecc5007
2
{ "blob_id": "f9b4a99016ba17d66623192eaad47b2eeecc5007", "branch_name": "refs/heads/master", "committer_date": 1484326727000, "content_id": "ce15807ab51008d659d07565964d8b94b36e695f", "detected_licenses": [ "Apache-2.0" ], "directory_id": "f3a33a747b8fcfacaeb89afa3629c4bffea4c597", "extension": "py"...
2.328125
stackv2
import time import paramiko from StringIO import StringIO import pdb import database from datetime import datetime import os from keystoneauth1.identity import v3 from keystoneauth1 import session from novaclient import client as n_client from cinderclient import client as c_client import subprocess def convert_strin...
272
24.41
109
19
1,569
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_a9174ba88305f8e2_073e8bf2", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 128 ]
[ null ]
[ 9 ]
[ 74 ]
2024-11-19T02:30:28.622786+00:00
1,512,499,502,000
3ce43ba7ba3fac9da7038fae5a54a8458d366dda
3
{ "blob_id": "3ce43ba7ba3fac9da7038fae5a54a8458d366dda", "branch_name": "refs/heads/master", "committer_date": 1512499502000, "content_id": "54c4cf5ae234d9255687349cebf283949a531dcb", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "2b33418f6f375792a0c95cb07706b4de55a35178", "extension": "p...
2.96875
stackv2
from hashlib import sha1 from apps.seguridad.models import Usuario def encrypt_password(password): """ Encripta una password para el Usuario usuario. @param Usuario usuario. @param string password. @return string password encriptada. """ return sha1(password).hexdigest() def authenticat...
32
29.47
86
11
200
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_996b293e8c2fe272_f408b0a6", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expen...
[ 13 ]
[ null ]
[ 17 ]
[ 25 ]
2024-11-19T02:30:35.166259+00:00
1,611,506,696,000
864b1b3ff179c589b0ce39571513f86437fab390
4
{ "blob_id": "864b1b3ff179c589b0ce39571513f86437fab390", "branch_name": "refs/heads/master", "committer_date": 1611506696000, "content_id": "5a5e6658b75039637dfef1faacb9a6894e362de3", "detected_licenses": [ "MIT" ], "directory_id": "91b7dbf19e1dd14849033474d65c59d9678800c0", "extension": "py", "fi...
3.875
stackv2
class Person: def __init__(self, first, last): self.firstName = first self.lastName = last def get_fullname(self): return self.firstName + ' ' + self.lastName class Employee(Person): def __init__(self, first, last, employeenumber): Person.__init__(self, first, last) ...
31
24.87
68
11
175
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7fc6cc237f009c63_14803a99", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 30, 31 ]
[ null, null ]
[ 7, 7 ]
[ 35, 35 ]
2024-11-19T02:30:39.282051+00:00
1,590,903,825,000
d8a366ca82c1aa1ac49caf8ecb6faf252e841ef6
2
{ "blob_id": "d8a366ca82c1aa1ac49caf8ecb6faf252e841ef6", "branch_name": "refs/heads/master", "committer_date": 1590903825000, "content_id": "3920c1af5dcca927639fd04493f4efcd427ad1a9", "detected_licenses": [ "MIT" ], "directory_id": "7ba92f32f83b741b55667c9ce72481665b9b3ba6", "extension": "py", "fi...
2.5
stackv2
#!/usr/bin/python3 """ Python CVS """ import json import requests if __name__ == '__main__': url_todos = "https://jsonplaceholder.typicode.com/users" name_users = requests.get(url_todos, verify=False).json() list_tasks = {} for user in name_users: api_todos = requests.get(url_todos + '/{}/todo...
19
38.47
70
17
161
python
[{"finding_id": "codeql_py/request-without-cert-validation_61bcfa8e0feb504f_133057c1", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 9 ]
[ null ]
[ 18 ]
[ 55 ]
2024-11-19T02:41:52.181659+00:00
1,583,930,645,000
f61b0851a35d4662eb6b80b3f9ccb5af585d8096
2
{ "blob_id": "f61b0851a35d4662eb6b80b3f9ccb5af585d8096", "branch_name": "refs/heads/master", "committer_date": 1583930645000, "content_id": "cd5c518c31d83ae4a95d500c910425e55a634158", "detected_licenses": [ "MIT" ], "directory_id": "4daec03c9f5ab7d6a2fc9ff2c8fef1687743ffcf", "extension": "py", "fi...
2.375
stackv2
import binascii import config # import transaction import Crypto import Crypto.Random from Crypto.Hash import SHA from Crypto.PublicKey import RSA from Crypto.Signature import PKCS1_v1_5 import hashlib import json from time import time from urllib.parse import urlparse from uuid import uuid4 class Wallet: def __i...
49
24.37
83
16
325
python
[{"finding_id": "codeql_py/weak-crypto-key_57a93e08b004737a_e63f87ee", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",...
1
true
[ "CWE-326" ]
[ "py/weak-crypto-key" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable." ]
[ 21 ]
[ null ]
[ 23 ]
[ 67 ]
2024-11-19T02:42:28.868701+00:00
1,566,727,932,000
a9a0ec37b8d394de8711f082851b730a636c01ab
2
{ "blob_id": "a9a0ec37b8d394de8711f082851b730a636c01ab", "branch_name": "refs/heads/master", "committer_date": 1566727932000, "content_id": "6bfe06b17049b4f48b93ee16be6bc5dfc40d8b0f", "detected_licenses": [ "MIT" ], "directory_id": "f8e5df76724db8b1b33c74de77eb7d2b317e2a50", "extension": "py", "fi...
2.34375
stackv2
# -*- coding: utf-8 -*- import requests from urllib import parse import xlwt, random, os from lxml import html etree = html.etree class DouBanSpider(object): def __init__(self): self.login_url = 'https://accounts.douban.com/j/mobile/login/basic' self.comment_url = 'https://movie.douban.com/subje...
87
42.89
144
19
1,067
python
[{"finding_id": "codeql_py/request-without-cert-validation_d98d56a6a0a88564_9fb2db03", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 41 ]
[ null ]
[ 20 ]
[ 119 ]
2024-11-19T02:42:28.931553+00:00
1,547,190,815,000
c3f1c8db2ce40ce99e2309275ffc413320fb36f6
2
{ "blob_id": "c3f1c8db2ce40ce99e2309275ffc413320fb36f6", "branch_name": "refs/heads/master", "committer_date": 1547190815000, "content_id": "7178bb5e8d80ae6f5bc692320ce84e7b7827fc1c", "detected_licenses": [ "MIT" ], "directory_id": "68e76737d46261332cb3af1cc4b34886aad72eda", "extension": "py", "fi...
2.4375
stackv2
from django.contrib import auth from django.contrib.auth.forms import AuthenticationForm from django.http import HttpResponseRedirect from django.shortcuts import render def login_view(request): if request.method == 'POST': username = request.POST.get('username', '') password = request.POST.get('p...
39
33.1
71
12
253
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_47630c0b1c25d9e1_3d23e29f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 11 ]
[ null ]
[ 25 ]
[ 33 ]
2024-11-18T18:16:11.505546+00:00
1,576,950,085,000
f27b4286bcd47bb6ae3871e0e711cf27bc1d41e7
4
{ "blob_id": "f27b4286bcd47bb6ae3871e0e711cf27bc1d41e7", "branch_name": "refs/heads/master", "committer_date": 1576950085000, "content_id": "299c3aacee582931de3a6e4dedc0469978a03ef3", "detected_licenses": [ "MIT" ], "directory_id": "3331fe3bf3e1d8e62dcbb38874bbafd26cc0931b", "extension": "py", "fi...
4
stackv2
''' --- Day 4: Secure Container --- You arrive at the Venus fuel depot only to discover it's protected by a password. The Elves had written the password on a sticky note, but someone threw it out. However, they do remember a few key facts about the password: It is a six-digit number. The value is within the range giv...
70
30.6
160
13
566
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f363eb25d34af7c7_7c4352a2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text." ]
[ 66 ]
[ null ]
[ 11 ]
[ 91 ]
2024-11-18T20:08:57.754921+00:00
1,542,919,570,000
e8b346c187735f34195aa04a3ad168381f2cacc1
3
{ "blob_id": "e8b346c187735f34195aa04a3ad168381f2cacc1", "branch_name": "refs/heads/master", "committer_date": 1542919570000, "content_id": "5111a140391e00f3249e5ba9b41b1674753939bd", "detected_licenses": [ "MIT" ], "directory_id": "0f276f1a8308d6b2eb16b4104a1a0ee969a99fa7", "extension": "py", "fi...
2.625
stackv2
import tornado.ioloop import tornado.web import smartcar import webbrowser client_id = 'client_id' client_secret = 'client_secret' redirect_uri = 'http://localhost:5000/callback' client = smartcar.AuthClient(client_id, client_secret, redirect_uri, test_mode = True) class MainHandler(tornado.web.RequestHandler): ...
154
33.24
116
15
1,265
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_dc16fd9831324343_e2b676de", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 136, 137 ]
[ null, null ]
[ 35, 34 ]
[ 52, 50 ]