added
stringlengths
32
32
created
int64
1,244B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.25
source
stringclasses
1 value
text
stringlengths
324
20.1k
num_lines
int64
16
598
avg_line_length
float64
15.1
58.3
max_line_length
int64
33
179
ast_depth
int64
8
39
length
int64
101
3.8k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.1k
265k
sast_codeql_findings_count
int64
1
45
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
45
rule_ids
listlengths
1
45
confidences
listlengths
1
45
severities
listlengths
1
45
messages
listlengths
1
45
line_starts
listlengths
1
45
line_ends
listlengths
1
45
column_starts
listlengths
1
45
column_ends
listlengths
1
45
2024-11-18T19:11:47.655008+00:00
1,430,940,302,000
c8d29a7bf9db05c1fb69b04bfd0b656271de0a7c
2
{ "blob_id": "c8d29a7bf9db05c1fb69b04bfd0b656271de0a7c", "branch_name": "refs/heads/master", "committer_date": 1430940302000, "content_id": "20aedc17e993438aea046441a7971974a8d76a8c", "detected_licenses": [ "MIT" ], "directory_id": "31704e459ffd230785d6f75008543ecfe585dbc7", "extension": "py", "fi...
2.46875
stackv2
import os import traceback import sys import json import urllib2 import datetime import logging from model.station import Station from time import sleep from sqlalchemy import create_engine from geoalchemy2.elements import WKTElement from sqlalchemy.orm import sessionmaker engine = create_engine('postgresql://' + os....
66
29.35
72
14
469
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_27f86f30e9f51972_5b4c5f83", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 53 ]
[ null ]
[ 23 ]
[ 37 ]
2024-11-18T19:23:49.078561+00:00
1,508,336,491,000
3bb250295082b3b8d06fee058376138e9efdc3d3
3
{ "blob_id": "3bb250295082b3b8d06fee058376138e9efdc3d3", "branch_name": "refs/heads/master", "committer_date": 1508336491000, "content_id": "01dda04bd85bdb546a6f57c28d8ad422041220d7", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "7844fbaee409cae12f620ccd2e445474a4b27eaa", "extension": "p...
2.796875
stackv2
import sqlite3 import hashlib def md5(string): m = hashlib.md5() m.update(string.encode("utf-8")) return m.hexdigest() def getLastID(c): c.execute("select id from user order by id DESC limit 1;") return c.fetchone()[0] def reg(c,username,password): c.execute("select * from user whe...
37
26.49
105
11
245
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_90d02e5112a382d9_c5ae23bd", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi...
[ 6 ]
[ null ]
[ 14 ]
[ 36 ]
2024-11-18T19:23:55.503625+00:00
1,671,566,848,000
1b43bffec45c70da6a98538ac887f65dc43f6778
3
{ "blob_id": "1b43bffec45c70da6a98538ac887f65dc43f6778", "branch_name": "refs/heads/master", "committer_date": 1671566848000, "content_id": "88b39c0766951dbb0f63e13138883915624355d4", "detected_licenses": [ "Unlicense" ], "directory_id": "34ddec647d6ad357c1527cf713eaeaee4eb575aa", "extension": "py",...
3.28125
stackv2
from sys import argv import hashlib if len(argv) >= 2: puzzle_input = argv[1] else: raise Exception("No puzzle input given.") password = "" index = 0 for i in range(8): searching = True while searching: test_str = "{}{}".format(puzzle_input, index) m = hashlib.md5() m.update(b...
25
21.72
55
14
150
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d59210474e2f1000_58d67148", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 25 ]
[ null ]
[ 7 ]
[ 15 ]
2024-11-18T19:23:58.313688+00:00
1,466,608,271,000
af1f6d3c1d0933f35fcb053b55c049a9a4fd8661
2
{ "blob_id": "af1f6d3c1d0933f35fcb053b55c049a9a4fd8661", "branch_name": "refs/heads/master", "committer_date": 1466608271000, "content_id": "bad728264a39c25692490bee29d65d7855cec9a1", "detected_licenses": [ "Apache-2.0", "BSD-3-Clause" ], "directory_id": "f4ad721b7158ff2605be6f7e4bde4af6e0e11364",...
2.421875
stackv2
#!/usr/bin/env python """ Makes an attempt to contextualize to a VM. In the beginning phase, only the user's public keys are loaded into the target VM. @date: July 2, 2014 @author: CarolinaFernandez, omoya """ import os import paramiko #import subprocess from Crypto import Random from paramiko_scp.scp import SCPClie...
73
41.49
157
15
782
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_e0ac43743c6b9e31_4c4e682b", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 27 ]
[ null ]
[ 9 ]
[ 69 ]
2024-11-18T18:39:52.920067+00:00
1,615,517,706,000
81ba83620abdbbb8ff1998824d9a228bfa24e473
3
{ "blob_id": "81ba83620abdbbb8ff1998824d9a228bfa24e473", "branch_name": "refs/heads/master", "committer_date": 1615517706000, "content_id": "ca0a5bb8141ae0e1731498eff2694a19ad08ca8a", "detected_licenses": [ "MIT" ], "directory_id": "f0a54fa8580357d129f6701a107fe02d063e0ea7", "extension": "py", "fi...
2.546875
stackv2
# -*- coding:utf-8 -*- import re import json import requests from pyquery import PyQuery as pq """ 目标APP:小红书 目标url:APP短视频分享链接 爬取思路: 1. 通过APP里的分享获取视频url:http://xhslink.com/xvxMJ 2. url重定向到真实跳转地址:简化后.,https://www.xiaohongshu.com/discovery/item/5f77dbcf000000000100491c... 3. As of 2020-11-04 小红书更新,不再提供无水印接口。且...
72
42.06
120
21
1,079
python
[{"finding_id": "codeql_py/overly-large-range_df2cf8956a16670f_0069dce6", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 41 ]
[ null ]
[ 66 ]
[ 69 ]
2024-11-18T18:40:02.360755+00:00
1,597,248,506,000
8a7e549177b3091cfc42af3a1ae72dda3ffc643f
2
{ "blob_id": "8a7e549177b3091cfc42af3a1ae72dda3ffc643f", "branch_name": "refs/heads/master", "committer_date": 1597248506000, "content_id": "d36ac2bb56456698da301e09e108139690cefce6", "detected_licenses": [ "MIT" ], "directory_id": "bce3c24466e03486d3fc50e28e79d4f2947eee6d", "extension": "py", "fi...
2.40625
stackv2
from django.shortcuts import render, redirect from dataParser.models import StudentInfo from dataParser.parser import * from accounts.forms import LoginForm, AgreeForm from accounts.my_auth import UserBackend from accounts.custom_auth import check_if_user from django.contrib.auth import login as django_login, logout ...
80
35.36
76
15
781
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7b7c5a84ee91c637_dfe1cd97", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 51 ]
[ null ]
[ 15 ]
[ 23 ]
2024-11-18T18:46:58.619258+00:00
1,448,832,288,000
0463eef558e5f8a301b10ff282d36a4f334ae71c
2
{ "blob_id": "0463eef558e5f8a301b10ff282d36a4f334ae71c", "branch_name": "refs/heads/master", "committer_date": 1448832288000, "content_id": "a840a8c702535e8087f5cf0747c387561c80003b", "detected_licenses": [ "MIT" ], "directory_id": "b86390dcf369e5517d82faa2d1142a38a4535af8", "extension": "py", "fi...
2.484375
stackv2
import re import sys import json import time import string import requests import unicodedata from bs4 import BeautifulSoup START_TIME = time.time() START = 2005 END = 2014 PAGES = 3 HEADERS = {'User-Agent': 'request', 'X-Requested-With': 'XMLHttpRequest'} PLAYERS = {} def rankings_url(year, page): host = 'h...
137
32.1
91
21
1,274
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_d41ab47f4465756f_768ae0fd", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'go.com/nba/player/_/id', so it migh...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/incomplete-hostname-regexp", "py/incomplete-hostname-regexp" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'go.com/nba/player/_/id', so it might match more hosts than expected.", "This regular expression has an unescaped '.' before 'yahoo.com/nba/players/', so it might match more hosts than expected." ]
[ 93, 123 ]
[ null, null ]
[ 19, 21 ]
[ 49, 53 ]
2024-11-18T18:47:01.474268+00:00
1,685,504,843,000
167696a7b555e570ade269b5c94cc09534b445c0
2
{ "blob_id": "167696a7b555e570ade269b5c94cc09534b445c0", "branch_name": "refs/heads/master", "committer_date": 1685504843000, "content_id": "af46ec2893f6d8d9c86063e54f2aca7691f1bc83", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "9656c1ee3d30b670b9495fcf9ae6eb39b91b2981", "extension": "p...
2.3125
stackv2
""" Tele TV 每次播放前自动登录账号 """ import hashlib import json import logging import random import re import time from pathlib import Path from streamlink.plugin import Plugin, PluginArgument, PluginArguments from streamlink.stream import HLSStream logger = logging.getLogger(__name__) class Tele(Plugin): arguments = P...
106
33.41
124
18
920
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ed9005164a841ca3_c3b49f88", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-327" ]
[ "py/clear-text-logging-sensitive-data", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 51, 83 ]
[ null, 84 ]
[ 22, 31 ]
[ 65, 25 ]
2024-11-18T18:47:05.714375+00:00
1,619,967,007,000
b1e6cfe8fda6fc2a32a422c1910c22e65e91fcd4
3
{ "blob_id": "b1e6cfe8fda6fc2a32a422c1910c22e65e91fcd4", "branch_name": "refs/heads/main", "committer_date": 1619967007000, "content_id": "726b4e06fb66f3d08f711c3628da3d9b07d54c03", "detected_licenses": [ "MIT" ], "directory_id": "ee38eb9c3a6f2ef538a9213105f70a332f04a396", "extension": "py", "file...
2.578125
stackv2
#!/bin/python3 import requests import cgi form = cgi.FieldStorage() c_key = form.getvalue('id') url = '{{ search_api_endpoint }}?id=' url = url+c_key res = requests.get(url) print("Content-Type: text/html") print() content = res.content content = content.decode('ascii').split(",") if 'valid' not in content[0]: ...
23
23.78
68
11
172
python
[{"finding_id": "codeql_py/partial-ssrf_6915a8e0a9db6aa7_6b24c0a9", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 10 ]
[ null ]
[ 7 ]
[ 24 ]
2024-11-18T20:58:14.636267+00:00
1,530,107,230,000
6b3a20089d74d4b728a669b629dad1192e320e74
2
{ "blob_id": "6b3a20089d74d4b728a669b629dad1192e320e74", "branch_name": "refs/heads/master", "committer_date": 1530107230000, "content_id": "e057b8145ad46eef849c2ca6a16d26241c416ab7", "detected_licenses": [ "MIT" ], "directory_id": "a720e4e4d89e464a1bd51d77166f7a42dfc0db57", "extension": "py", "fi...
2.453125
stackv2
'''import packages''' import os, logging, urllib, sys, datetime, json import boto3 import geojson from geojson import Feature, Point, FeatureCollection from bson import json_util from pymongo import MongoClient from pymongo.errors import ConnectionFailure '''in order to use Xray, add aws_xray_sdk to requirements.txt an...
156
37.19
149
19
1,306
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_eb48aab387495afc_8593a348", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 62 ]
[ null ]
[ 25 ]
[ 67 ]
2024-11-18T20:58:16.358066+00:00
1,480,555,031,000
44cece4ee5d72c3ef97d6968445a4fb00925486f
3
{ "blob_id": "44cece4ee5d72c3ef97d6968445a4fb00925486f", "branch_name": "refs/heads/master", "committer_date": 1480555031000, "content_id": "c59a26eb9f30eeaa3c47bda51b673df4df0f0648", "detected_licenses": [ "MIT" ], "directory_id": "c9167b82ae7947c4a4fa6383e9db040a27c839d1", "extension": "py", "fi...
2.90625
stackv2
#!/usr/bin/env python from jinja2 import Template template = Template(open("story-long.jinja2").read()) story_vars = { "c1": { "title": "Princess", "name": "Clara", "p": "she", "relation": "sister" }, "c2": { "title": "Prince", "name": "Arthur", "p": "he", "relation": "brother" }, "v1": { "tit...
86
17.69
110
12
646
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_d98ecb472c333d74_a4ea6433", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 5 ]
[ null ]
[ 12 ]
[ 54 ]
2024-11-18T19:10:00.204819+00:00
1,589,959,046,000
3b43d7b0f3c0b49901d89ae037adfe9c6eb79ac6
2
{ "blob_id": "3b43d7b0f3c0b49901d89ae037adfe9c6eb79ac6", "branch_name": "refs/heads/master", "committer_date": 1589959046000, "content_id": "413733a0cbca6fd7abab4e0b78bae68f4e13188c", "detected_licenses": [ "MIT" ], "directory_id": "a08e9baec17a94c23f72c4b5353fd63a990b1833", "extension": "py", "fi...
2.421875
stackv2
import os import json import logging import aiohttp import asyncio # import async_timeout # import aiofiles import sys from collections import namedtuple # https://github.com/RomelTorres/alpha_vantage/blob/develop/alpha_vantage/alphavantage.py __author__ = 'Sergio Chairez' logging.basicConfig( level=logging.IN...
89
32.12
93
15
805
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d44dcda33952ccdd_985a1bec", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 84 ]
[ null ]
[ 11 ]
[ 32 ]
2024-11-18T20:15:51.240224+00:00
1,611,212,935,000
e6f55682cf60a589e0cad2953d919458d6fe24a2
3
{ "blob_id": "e6f55682cf60a589e0cad2953d919458d6fe24a2", "branch_name": "refs/heads/main", "committer_date": 1611212935000, "content_id": "df1e8bb2a7f754cfffcc7b3e3140fbe4eb3a3860", "detected_licenses": [ "Apache-2.0" ], "directory_id": "a2a1762c5429958f1a1d2987f24deca7bed35cae", "extension": "py", ...
2.65625
stackv2
#!/usr/bin/env python import netfilterqueue import scapy.all as scapy def process_packet(packet): scapy_packet=scapy.IP(packet.get_payload()) if scapy_packet.haslayer(scapy.DNSRR): #print(scapy_packet.show()) u can see what packet contain qname=scapy_packet[scapy.DNSQR].qname if "www.b...
26
32.46
65
14
240
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_4581f3c6c174f184_1f4d4fb6", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [www.bing.com](1) may be at an arbitrary position in th...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [www.bing.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 11 ]
[ null ]
[ 12 ]
[ 35 ]
2024-11-18T20:55:05.429686+00:00
1,623,390,136,000
5705ad2415cea10ae093c50b4d1aac6fb6be09d7
2
{ "blob_id": "5705ad2415cea10ae093c50b4d1aac6fb6be09d7", "branch_name": "refs/heads/master", "committer_date": 1623390136000, "content_id": "cf98fe8917ebaf47c5ec68898b768c50822e85fc", "detected_licenses": [ "Apache-2.0" ], "directory_id": "77a8581bb042b1164a2aee2c581ebaeba1cd571e", "extension": "py"...
2.328125
stackv2
import hashlib from django.shortcuts import render, reverse, redirect from .models import UseInfo, HostInfo from remoteCMD.remote import Remote # Create your views here. def hash_password(password): """ md5加密 :param password: :return: """ md5 = hashlib.md5() md5.update(password.encode('utf-...
158
27.25
107
18
1,038
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_67520029d3a3ad52_33ade33b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
3
true
[ "CWE-312", "CWE-312", "CWE-327" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sen...
[ 48, 53, 14 ]
[ null, null, null ]
[ 15, 19, 16 ]
[ 23, 28, 40 ]
2024-11-18T19:38:01.239318+00:00
1,560,281,901,000
cb4db36dd43b58477f08bac1ab5766f9f7c0e9f4
2
{ "blob_id": "cb4db36dd43b58477f08bac1ab5766f9f7c0e9f4", "branch_name": "refs/heads/master", "committer_date": 1560281901000, "content_id": "8a2dc7b675506e872ffc226a933ec9137ddfe051", "detected_licenses": [ "MIT" ], "directory_id": "fed2f7b8c56f0f94d3f33c2259a01038b49399db", "extension": "py", "fi...
2.484375
stackv2
from flask import Flask from flask_sqlalchemy import SQLAlchemy from flask_script import Manager from flask_migrate import Migrate, MigrateCommand from datetime import datetime app = Flask(__name__) app.config['SQLALCHEMY_DATABASE_URI'] = 'sqlite:///app.db' # app.config['SQLALCHEMY_DATABASE_URI'] = 'postgresql://postg...
68
26.85
84
18
421
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_ad849e6f8e3669c8_d5e92bb7", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 46 ]
[ null ]
[ 29 ]
[ 61 ]
2024-11-18T19:38:17.531028+00:00
1,550,525,570,000
9fa26518b2fd4c3f305053e4e6d68ecb2918bb1f
3
{ "blob_id": "9fa26518b2fd4c3f305053e4e6d68ecb2918bb1f", "branch_name": "refs/heads/master", "committer_date": 1550525570000, "content_id": "6dbe2b2ffdc083622c839f468c6386350ad58ba7", "detected_licenses": [ "MIT" ], "directory_id": "052684268b0bafc21e4cf16d421bb8281fff495e", "extension": "py", "fi...
2.6875
stackv2
#! /usr/bin/env python3 from yaml import load from jinja2 import Environment, FileSystemLoader def main(): data = [ { 'name': 'Paramiko', 'version': '2.0' }, { 'name': 'Jinja2', 'version': '2.10.x' } ] loader = FileSystemLoade...
25
20.48
52
10
131
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_ebc6c9ed5d2f5524_720436bc", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 18 ]
[ null ]
[ 19 ]
[ 45 ]
2024-11-18T19:38:21.598284+00:00
1,652,039,016,000
699427e9c3af1e53873303862d517ed8eb8df9f9
2
{ "blob_id": "699427e9c3af1e53873303862d517ed8eb8df9f9", "branch_name": "refs/heads/master", "committer_date": 1652039016000, "content_id": "f95902ccdfa11c405b16ae72a51115f7a22ac3e3", "detected_licenses": [ "MIT" ], "directory_id": "48f74ea38b6d3d9b34410a49adba2cd638755615", "extension": "py", "fi...
2.359375
stackv2
import requests class Repustate: def __init__(self, api_key=None, server='api.repustate.com', cache=None): """ :param str api_key: :param disk.Cache.Cache cache: """ self._api_key = api_key or '$APIKEY' self._server = server self._cache = cache if self._cache: self.get_entities = self._cache.make...
71
25.75
85
21
516
python
[{"finding_id": "codeql_py/request-without-cert-validation_87764a31b0ff72b1_98efeb93", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
5
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 31, 38, 47, 53, 62 ]
[ 34, 41, 50, 56, 65 ]
[ 14, 14, 16, 16, 16 ]
[ 4, 4, 6, 6, 6 ]
2024-11-18T20:11:04.516350+00:00
1,496,052,688,000
ef5ea90ba3f944fa508eae679e741d7d4521fd33
3
{ "blob_id": "ef5ea90ba3f944fa508eae679e741d7d4521fd33", "branch_name": "refs/heads/master", "committer_date": 1496052688000, "content_id": "6356d11cf6d94b5b501a56b1516b5cfe764c8107", "detected_licenses": [ "MIT" ], "directory_id": "cf263b08ca465386b9e653dd6d5cff76faaed731", "extension": "py", "fi...
2.78125
stackv2
# coding: utf-8 import logging import csv from itertools import count import os import subprocess import shutil import shlex from MigrationInterface import IssueAttachmentMigrationInfo def remap(fieldnames, duplicated_field_name): price_count = count(1) return [duplicated_field_name + '{}'.format(next(price_...
199
31.86
150
20
1,387
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_db46a0a4059f92c7_b04a32ea", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 193 ]
[ null ]
[ 23 ]
[ 26 ]
2024-11-18T20:26:33.290581+00:00
1,540,766,292,000
467ae28b233a861bfa06b4dc3c16c318cadba748
3
{ "blob_id": "467ae28b233a861bfa06b4dc3c16c318cadba748", "branch_name": "refs/heads/master", "committer_date": 1540766292000, "content_id": "058b1cbfc1c1043b1ebfa34fa8698db878ed677b", "detected_licenses": [ "MIT" ], "directory_id": "b0c80cce31b1f84f15194af99d38e80227a7ab3a", "extension": "py", "fi...
3
stackv2
#!/usr/bin/env python3 """ processReceipts.py: Clean and file input receipts from ./Inbox into ./Database. Receipts must already be OCR'd and saved as <name>.pdf and <name>.txt, with the TXT just being the items and prices, one per line, prices last. It is recommended to use gImageReader for this. The database will ...
182
30.23
104
19
1,298
python
[{"finding_id": "codeql_py/overly-large-range_e6c9d1a5c5923bb0_afc1cce8", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[,\\-.\\/0-9:\\].", "remediation": "", "location": {"...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[,\\-.\\/0-9:\\]." ]
[ 71 ]
[ null ]
[ 43 ]
[ 46 ]
2024-11-18T20:26:38.921114+00:00
1,593,317,184,000
1e97b928b5a625a533fbbabdd5e156f641a5dba8
3
{ "blob_id": "1e97b928b5a625a533fbbabdd5e156f641a5dba8", "branch_name": "refs/heads/master", "committer_date": 1593317184000, "content_id": "3cdae945c77f3fcabc2e1b0d0ae1795cdac7f942", "detected_licenses": [ "MIT" ], "directory_id": "d1df868743ba8f60f6a6f7b0108ff19dc70a0833", "extension": "py", "fi...
2.546875
stackv2
from bs4 import BeautifulSoup import requests from urllib.parse import urlparse import json with open('config.json', 'r') as f: config = json.load(f) from flask import Flask, render_template, jsonify, request app = Flask(__name__) # Naver API Client_id, secret 불러오기 client_id0 = config['DEFAULT']['client_id0'] clie...
158
39.14
138
15
1,798
python
[{"finding_id": "codeql_py/flask-debug_68ad084dd703067e_fb32c953", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
4
true
[ "CWE-215", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/flask-debug", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "HIGH", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run w...
[ 158, 47, 91, 134 ]
[ null, null, null, null ]
[ 5, 20, 20, 20 ]
[ 46, 70, 70, 70 ]
2024-11-18T20:26:44.430479+00:00
1,625,560,017,000
bb88e6110e7fa6f92d71e39a55f6dca3998acd79
2
{ "blob_id": "bb88e6110e7fa6f92d71e39a55f6dca3998acd79", "branch_name": "refs/heads/master", "committer_date": 1625560017000, "content_id": "d46ea34be30f6f0e094d978f8d05392d2c05a108", "detected_licenses": [ "MIT" ], "directory_id": "69006c061d1d78b55b5a144b43f4e0d41e51763e", "extension": "py", "fi...
2.453125
stackv2
# -*- coding: utf-8 -*- # @ Time : 2020/1/13 15:50 # @ Author : Redtree # @ File : sys_user_manager # @ Desc : 系统用户管理 import random import string import hashlib from __init__ import db from config import USER_SALT_LENGTH, PAGE_LIMIT, DEFAULT_PAGE from sqlalchemy import func, or_ from database.sys_user import Sys_...
87
25.9
77
14
668
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_4c36f97c5efeee4b_d1338a21", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi...
[ 35 ]
[ null ]
[ 15 ]
[ 40 ]
2024-11-18T20:52:23.201494+00:00
1,682,691,076,000
1efa56fe4220da336480e959d5e42ba860fe5a69
3
{ "blob_id": "1efa56fe4220da336480e959d5e42ba860fe5a69", "branch_name": "refs/heads/main", "committer_date": 1682691076000, "content_id": "44da33e11ea089a5d0658736db4f9969ae391abe", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "6ca906fc2dc8c0f1a631b1eaa6fb430b8a6fbcb0", "extension": "py"...
2.875
stackv2
#!/usr/local/bin/python3 # vim: set expandtab: # vim: tabstop=2: # vim: ai: # vim: shiftwidth=2: import psycopg2, sys, os.path from pathlib import Path import configparser from typing import Iterator, Optional import io def read_in_config(test = False): ## Defaults to conf/.marcaroni.ini ## Then falls back ...
100
29.73
178
15
725
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_cc12c27141a69542_8f526b08", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 53 ]
[ null ]
[ 15 ]
[ 66 ]
2024-11-18T20:52:38.798918+00:00
1,518,288,499,000
7f05772202a0f442e68b9269dd96f6037313ca03
3
{ "blob_id": "7f05772202a0f442e68b9269dd96f6037313ca03", "branch_name": "refs/heads/master", "committer_date": 1518288499000, "content_id": "1ea10b8bf217dd394942cf20f641610f209e5353", "detected_licenses": [ "MIT" ], "directory_id": "e651ab50221bb5f7126ee4f2d08fd0cf86b19392", "extension": "py", "fi...
3.296875
stackv2
from random import randrange, SystemRandom wordlist = open(r"C:\python\english.txt") words = [] for line in wordlist: words.append(line) passLength = int(input("number of words?")) passphrase = "\n" for x in range(passLength): listLength = len(words) randInt = SystemRandom().randint(0, listLength) passphras...
19
22
53
12
112
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2160ef08768afc86_a432766e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 17 ]
[ null ]
[ 7 ]
[ 17 ]
2024-11-18T20:52:47.344446+00:00
1,552,035,541,000
fee8e3353c5115150258f9c62056dea4cce218cd
3
{ "blob_id": "fee8e3353c5115150258f9c62056dea4cce218cd", "branch_name": "refs/heads/master", "committer_date": 1552035541000, "content_id": "43366a7d8645da6b2b4fb1b15974088f8c6f5f17", "detected_licenses": [ "Apache-2.0" ], "directory_id": "d0703c831f5bbb14b533f6e29215e11fc4d84168", "extension": "py"...
3.140625
stackv2
import uuid def get_mac_address(): macId=uuid.UUID(int=uuid.getnode()).hex[-12:] return ':'.join([macId[e:e+2] for e in range(0,11,2)] ) import socket myName=socket.getfqdn(socket.gethostname()) myAddr=socket.gethostbyname(myName) print(myName)#用户名 print(myAddr)#本机id print(get_mac_address())#mac地址 import mat...
41
17.17
60
13
260
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a7fbcfacea26bf7d_6f782281", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 11 ]
[ null ]
[ 7 ]
[ 24 ]
2024-11-18T19:02:31.428297+00:00
1,626,987,142,000
d2febbc6d627d10c785446b4a481ae8b05132025
3
{ "blob_id": "d2febbc6d627d10c785446b4a481ae8b05132025", "branch_name": "refs/heads/main", "committer_date": 1626987142000, "content_id": "53ee37a97ebf7feccf1350a411da54135977b554", "detected_licenses": [ "MIT" ], "directory_id": "8f66d8a1ad244d10f28292c81963917d89d81b86", "extension": "py", "file...
3
stackv2
import sys import requests from github import Github, BadCredentialsException from github.GithubException import UnknownObjectException args = sys.argv[1:] source = None createCommand = "create" deleteCommand = "delete" updateCommand = "update" tokenCommand = "--token" namesCommand = "--names" valuesCommand = "--val...
178
38.6
120
21
1,492
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9571360e7049718a_abfa520d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi...
4
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text.\nThis expression logs [sensitive data (secret)](4) as clear text.\nThis expression logs [sensitive data (secret)](5) a...
[ 141, 144, 173, 176 ]
[ null, null, null, null ]
[ 15, 15, 31, 31 ]
[ 63, 72, 90, 91 ]
2024-11-18T19:02:47.370176+00:00
1,513,388,400,000
d608eab8de7346d61e7bf2ad7bc3a2a527fc0d94
3
{ "blob_id": "d608eab8de7346d61e7bf2ad7bc3a2a527fc0d94", "branch_name": "refs/heads/master", "committer_date": 1513388400000, "content_id": "86d0c161d9640a56885929ef21f2443f3d326ae0", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "63a60c8697b541ea85466c16a518d790798be3d6", "extension": "p...
2.703125
stackv2
# -*- coding: utf-8 -*- """ continuity.services.commons ~~~~~~~~~~~~~~~~~~~~~~~~~~~ Continuity service commons. :copyright: 2015 by Jonathan Zempel. :license: BSD, see LICENSE for more details. """ from json import dumps from requests import codes, request from requests.exceptions import SSLError...
105
21.41
76
15
513
python
[{"finding_id": "codeql_py/request-without-cert-validation_e4f0f306dd3c67fe_8e771168", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 98 ]
[ null ]
[ 23 ]
[ 67 ]
2024-11-18T19:14:44.913641+00:00
1,644,071,346,000
28bd9d588d7d8b9e45e31a8a9a752805055285b9
2
{ "blob_id": "28bd9d588d7d8b9e45e31a8a9a752805055285b9", "branch_name": "refs/heads/master", "committer_date": 1644071346000, "content_id": "7a9b586eac41b2d94d56c1101754626f51ed93cc", "detected_licenses": [ "MIT" ], "directory_id": "89d5dbdc6ad03fd0bb54fc83f39bb8b94f514e48", "extension": "py", "fi...
2.453125
stackv2
import requests from urllib.parse import urlencode, urlparse, parse_qsl api_key = '' data_type = 'json' endpoint = f'https://maps.googleapis.com/maps/api/geocode/{data_type}' params = { 'key': api_key, 'address': '1600 Amphitheatre Parkway, Mountain View, CA', } url_params = urlencode(params) url = f'{endpoint}?{u...
159
32.14
163
16
1,483
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_aa31d7949f43b2ea_373f8391", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text.", "This expression logs [sensitive data (p...
[ 157, 157 ]
[ null, null ]
[ 7, 19 ]
[ 17, 29 ]
2024-11-18T19:14:47.575726+00:00
1,621,984,804,000
1a0213590e3a6cf20abf0bd6c2c9edd1484952d2
3
{ "blob_id": "1a0213590e3a6cf20abf0bd6c2c9edd1484952d2", "branch_name": "refs/heads/master", "committer_date": 1621984804000, "content_id": "c3193026e8298a46f58a45faaf3856de5e295b48", "detected_licenses": [ "MIT" ], "directory_id": "cbfa43b62d6cb4fc5bd1c373cb73caad5d9310ac", "extension": "py", "fi...
2.96875
stackv2
#!/usr/bin/python3 import smtplib, re from email.mime.multipart import MIMEMultipart from email.mime.text import MIMEText import pandas as pd #https://www.tutorialspoint.com/python3/python_sending_email.htm #https://www.javacodemonk.com/send-rich-text-multimedia-email-in-python-d21c900f sender = 'Incyt <incyt@url.ed...
81
27.52
142
19
583
python
[{"finding_id": "codeql_py/redos_161d838fefffdf41_d8319f46", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '_'.", "remediati...
2
true
[ "CWE-1333", "CWE-1333" ]
[ "py/redos", "py/redos" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '_'.", "This part of the regular expression may cause exponential backtracking on strings starting with 'a@' and containing many repetitions of '_'." ]
[ 15, 15 ]
[ null, null ]
[ 16, 33 ]
[ 30, 47 ]
2024-11-18T19:27:29.414609+00:00
1,530,984,986,000
1b07ff2bdc43f085f800a37420c16411214b700f
3
{ "blob_id": "1b07ff2bdc43f085f800a37420c16411214b700f", "branch_name": "refs/heads/master", "committer_date": 1530989606000, "content_id": "9bceb318d273da5a481cdcd4220091d49137d060", "detected_licenses": [ "MIT" ], "directory_id": "ae91dd7582cb71f5a175a235a6b2babc8fa50e89", "extension": "py", "fi...
2.828125
stackv2
import io import os import shutil import tarfile from .content_type import decode_value from .data_type import DataType from .errors import RainException from .fs import fresh_copy_dir from .ids import ID from .utils import format_size from .attributes import ObjectInfo class DataInstance: """ Instance of Da...
207
29.36
95
20
1,376
python
[{"finding_id": "codeql_py/tarslip_b1964fd9db0de2a3_d7389370", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 165 ]
[ null ]
[ 17 ]
[ 18 ]
2024-11-18T19:27:37.606573+00:00
1,553,787,999,000
3bb61bb6294aae1def0216dc7ea20f304792a57a
2
{ "blob_id": "3bb61bb6294aae1def0216dc7ea20f304792a57a", "branch_name": "refs/heads/master", "committer_date": 1553787999000, "content_id": "74862580e48184b6179b3db03996c3e429b120e0", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e87e21a558f6d850b176d3670269475b300fb5b0", "extension": "py"...
2.328125
stackv2
# -*- coding: utf-8 -*- # Copyright (c) 2017 SHIELD, UBIWHERE # ALL RIGHTS RESERVED. # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # U...
334
31.63
114
14
2,585
python
[{"finding_id": "codeql_py/request-without-cert-validation_09f9ab432345f1c2_19e21af9", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
5
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1) by [this value](2).", "This request may run without certificate validation because [it is disabled](1) by [this value](2).", "This request may run without certificate validation because [it is disabled](1) by [this value](2).", "...
[ 146, 170, 195, 220, 244 ]
[ null, null, null, null, null ]
[ 9, 9, 9, 9, 9 ]
[ 70, 58, 69, 71, 61 ]
2024-11-18T19:27:39.681147+00:00
1,618,019,828,000
67b59b4ba9317aadd0d72e9d9e8c397b3f325413
3
{ "blob_id": "67b59b4ba9317aadd0d72e9d9e8c397b3f325413", "branch_name": "refs/heads/main", "committer_date": 1618019828000, "content_id": "e39f4d69c390ea56211b11ccdaadbd166b410a30", "detected_licenses": [ "Unlicense" ], "directory_id": "021f66f575da7c3a6b65c4a3900519d2f510e4e5", "extension": "py", ...
2.796875
stackv2
#! ## Outputs three json files for any given USER_ID on ridewithgps.com ## user_info, trips, gears ## These three files are then used by the graphing code. import json, requests, sys import api_credentials as cd # Ride with GPS Info BASE_URL = 'https://ridewithgps.com' print(f'Contacting {BASE_URL}...') # First: Ge...
64
24.75
130
11
455
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8d9d97fca76e0dfd_9a13d3a7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 38 ]
[ null ]
[ 15 ]
[ 22 ]
2024-11-18T19:38:33.827450+00:00
1,548,336,561,000
9ef7d6a0eaac56788b20482f8fcb4cd41d7c65d9
2
{ "blob_id": "9ef7d6a0eaac56788b20482f8fcb4cd41d7c65d9", "branch_name": "refs/heads/master", "committer_date": 1548336561000, "content_id": "def7b5d736c27c62e3a2a372c1bf04a7dcb0dc09", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "81ce55f753183d879d91b9b4a852a62d5f9f7a6d", "extension": "p...
2.4375
stackv2
# -*- coding: utf-8 -*- from decimal import Decimal import copy import time import logging import os from distutils.util import strtobool from ripple_api import call_api, tx logger = logging.getLogger(__name__) def sell_all(buy_expected, sell_needed, account, secret, timeout=5, fee=10000, ...
271
31.56
79
16
2,093
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8bebc2d987bd8cfc_a3940d91", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text." ]
[ 270 ]
[ null ]
[ 17 ]
[ 46 ]
2024-11-18T19:38:36.374230+00:00
1,584,670,394,000
2c11b6e65e7dfb626190c1801c4f8785551bbd7e
2
{ "blob_id": "2c11b6e65e7dfb626190c1801c4f8785551bbd7e", "branch_name": "refs/heads/master", "committer_date": 1584670394000, "content_id": "68d0df6e46077db702346f66e209dd2bbcdbdd47", "detected_licenses": [ "MIT" ], "directory_id": "11a813672c7da8ab28f6a68974187de0361e7e65", "extension": "py", "fi...
2.40625
stackv2
import flask from flask_cors import CORS from flask import request, jsonify from detectron2.engine import DefaultPredictor from detectron2.config import get_cfg from detectron2.data import MetadataCatalog import cv2 import requests import numpy as np def score_image(predictor: DefaultPredictor, image_url: str): im...
57
33.95
128
13
515
python
[{"finding_id": "codeql_py/full-ssrf_a067f84b64a326d9_daada503", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
1
true
[ "CWE-918" ]
[ "py/full-ssrf" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1)." ]
[ 12 ]
[ null ]
[ 21 ]
[ 44 ]
2024-11-18T19:38:51.710474+00:00
1,489,552,020,000
b6d0102fa56e31f5c4cf51f8ad47ea5fd2b012b0
2
{ "blob_id": "b6d0102fa56e31f5c4cf51f8ad47ea5fd2b012b0", "branch_name": "refs/heads/master", "committer_date": 1489552020000, "content_id": "7dcc7b3599254bca53efc75172df13566112d1e3", "detected_licenses": [ "MIT" ], "directory_id": "fc600cad6d40528b4402d8bece848a90ddf6e7ab", "extension": "py", "fi...
2.34375
stackv2
#!/usr/bin/env python # -*- coding:utf-8 -*- import os import os.path import shutil import json from functools import wraps from flask import ( Flask, render_template, redirect, url_for, request, session, abort, send_from_directory ) from flask_triangle import Triangle from werkzeug.ut...
190
26.71
85
18
1,226
python
[{"finding_id": "codeql_py/reflective-xss_7e81226b7100b26c_fa1db48d", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
12
true
[ "CWE-079", "CWE-079", "CWE-079", "CWE-079", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022" ]
[ "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "This path depen...
[ 93, 131, 145, 183, 43, 45, 100, 117, 118, 134, 150, 152 ]
[ null, null, null, null, null, null, null, null, null, null, null, null ]
[ 24, 20, 24, 20, 40, 19, 27, 27, 21, 23, 31, 21 ]
[ 77, 73, 77, 73, 44, 40, 39, 41, 35, 79, 78, 29 ]
2024-11-18T19:38:55.911792+00:00
1,586,568,599,000
eb80cf617293ffaf267f91aef3fe42f3e7be5aca
3
{ "blob_id": "eb80cf617293ffaf267f91aef3fe42f3e7be5aca", "branch_name": "refs/heads/master", "committer_date": 1586568599000, "content_id": "b68036d874a699571b56bcdd4f649be373da3534", "detected_licenses": [ "MIT" ], "directory_id": "0db215b22be5e0eab20902ef3d520a1528db5962", "extension": "py", "fi...
3.328125
stackv2
from typing import Set from jinja2 import Environment, meta PARSER_HANDLER: Environment = Environment() def render_template(source: str, *args, **kwargs) -> str: """ Render a Jinaja templates string with variables :param source: A Jinja Template presented as a string :type source: str :return: ...
42
29.21
80
8
297
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_1c2c592a9f6c8d51_a9c202d5", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 5 ]
[ null ]
[ 31 ]
[ 44 ]
2024-11-18T20:18:16.683101+00:00
1,616,427,998,000
d8e3ea80e7ceaf9f7ee798834a9dacb82e2917cb
2
{ "blob_id": "d8e3ea80e7ceaf9f7ee798834a9dacb82e2917cb", "branch_name": "refs/heads/main", "committer_date": 1616427998000, "content_id": "469b1f8816ae2716963d536858ba57d463f007e4", "detected_licenses": [ "MIT" ], "directory_id": "a794a0ba3c390c21ea8d57bfd21ac8e800571d95", "extension": "py", "file...
2.40625
stackv2
import os import random from urllib.parse import urljoin import requests import urllib3 from dotenv import load_dotenv def get_response(url, params=None, headers=None): response = requests.get(url, params=params, headers=headers, verify=False) response.raise_for_status() return response def get_vk_resp...
140
30.91
78
13
1,017
python
[{"finding_id": "codeql_py/request-without-cert-validation_4e237c128c415a0d_431994ec", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
3
true
[ "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 11, 17, 25 ]
[ null, null, null ]
[ 16, 16, 16 ]
[ 79, 79, 76 ]
2024-11-18T20:31:22.961542+00:00
1,467,910,479,000
4db4c69e25275dc4ab2c4a13a26f804b511e3faf
3
{ "blob_id": "4db4c69e25275dc4ab2c4a13a26f804b511e3faf", "branch_name": "refs/heads/master", "committer_date": 1467910479000, "content_id": "7f3b0057e8d7f649d7ba21051f5a88f807f536a6", "detected_licenses": [ "Apache-2.0" ], "directory_id": "1c18d94dc11c3e0f36a865364f21c011932a3318", "extension": "py"...
2.546875
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- from sys import argv from bottle import Bottle, template, request, response, debug import bot import json import requests import settings debug(True) app = Bottle() # SLACK INTEGRATION @app.post('/slack') def slack_handler(): """ Handler for slack """ co...
89
21.15
61
12
469
python
[{"finding_id": "codeql_py/reflective-xss_2d17a7c9e95cc743_09deb668", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 32 ]
[ null ]
[ 12 ]
[ 21 ]
2024-11-18T20:31:43.393918+00:00
1,492,481,378,000
21a0406c89057d307fc574da2cf8b7a4af270338
2
{ "blob_id": "21a0406c89057d307fc574da2cf8b7a4af270338", "branch_name": "refs/heads/master", "committer_date": 1492481378000, "content_id": "37a70169dacba0171ebb2dcf976c23c78e6b7de7", "detected_licenses": [ "MIT" ], "directory_id": "3e299aa5831afdd5d540a45d56486ea7046f6c86", "extension": "py", "fi...
2.421875
stackv2
import tornado.ioloop import tornado.web import json from tornado.httpclient import AsyncHTTPClient class MainHandler(tornado.web.RequestHandler): def handle_response(self, response): if response.error: print('Error: %s' % response.error) else: stringOutput = response.body.decode('utf-8') ...
35
27.4
169
15
266
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2f7a187bfec43efe_9b6561fc", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 15 ]
[ null ]
[ 13 ]
[ 44 ]
2024-11-18T20:43:22.486028+00:00
1,278,448,143,000
ebd66f129e0d6bfc0e892cd58d7063802ab0a0e7
2
{ "blob_id": "ebd66f129e0d6bfc0e892cd58d7063802ab0a0e7", "branch_name": "refs/heads/master", "committer_date": 1278448143000, "content_id": "8d9212a09f4c77cb3c81eb93f36bf2e496cacfe9", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "396791c5f5d928e3f82a7a193e22bcb3a5f222dc", "extension": "p...
2.453125
stackv2
#! /usr/bin/env python print "Importing..." import os from jinja2 import Environment, FileSystemLoader from sympy import Symbol from common import lobatto, horner_scheme, ccode_pow2 n_functions = 50 precision = 25 factor_const = True x = Symbol("x") env = Environment(loader=FileSystemLoader('.')) functions = [] pr...
36
24.08
68
11
242
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_386b50430a3b8073_8cb485c1", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 15 ]
[ null ]
[ 7 ]
[ 48 ]
2024-11-18T20:43:30.608105+00:00
1,690,990,230,000
f4cd7e0d944c8a3a3fcc614f43efdcd4977713a8
3
{ "blob_id": "f4cd7e0d944c8a3a3fcc614f43efdcd4977713a8", "branch_name": "refs/heads/master", "committer_date": 1690990230000, "content_id": "4f9e1e08b91a98809b65bc308d5c31b8c99f98fe", "detected_licenses": [ "Apache-2.0" ], "directory_id": "a0b0b728a1b10f3f66b76cd9c42c212aebc15a8f", "extension": "py"...
2.796875
stackv2
import sys import os import traceback import logging import json import random import base64 import re from optparse import OptionParser from com.vordel.common.crypto import PasswordCipher from java.lang import String class Secrets: """Configuration store for secrets. The values of the properties are encrypte...
197
33.67
145
19
1,536
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_7667af6f4a8dbb55_1269b131", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (sec...
[ 147, 87, 139 ]
[ null, null, null ]
[ 32, 30, 26 ]
[ 40, 62, 64 ]
2024-11-18T20:43:33.732972+00:00
1,633,681,613,000
ec93610675af5bde909eee6abf2496fd675a5462
3
{ "blob_id": "ec93610675af5bde909eee6abf2496fd675a5462", "branch_name": "refs/heads/master", "committer_date": 1633681613000, "content_id": "0e17fd7f6343b97439ba12415a2dd4e918add001", "detected_licenses": [ "MIT" ], "directory_id": "7741417e8130efae41583ea6123ef0704222262a", "extension": "py", "fi...
2.53125
stackv2
from flask import Flask, request import json from Src.process import process_input from Heroku.database import Database from decouple import config import pickle database = Database() APP_MODEL_PATH_REG = config("APP_MODEL_PATH_REG") regressor = pickle.load(open(APP_MODEL_PATH_REG, "rb")) app = Flask(__name__) @app....
61
27.39
115
16
382
python
[{"finding_id": "codeql_py/stack-trace-exposure_01e5b8a14d46bf6b_376b0354", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 41 ]
[ null ]
[ 16 ]
[ 27 ]
2024-11-18T20:44:01.315918+00:00
1,601,266,244,000
72f672fc90709d52abbf40b3d890d94d68ae059f
3
{ "blob_id": "72f672fc90709d52abbf40b3d890d94d68ae059f", "branch_name": "refs/heads/master", "committer_date": 1601266244000, "content_id": "a0f8112e40e2ea195f24b22ca6743a7489cf764c", "detected_licenses": [ "MIT" ], "directory_id": "330bb6f30a0d4d8644d8d596691a9462dccad257", "extension": "py", "fi...
2.71875
stackv2
from spotipy import Spotify import spotipy.util import json import os def set_dir(): abspath = os.path.abspath(__file__) dname = os.path.dirname(abspath) os.chdir(dname) def view_credentials(): if not os.path.exists('credentials.txt'): print('No saved credentials found, input set_credentials t...
254
40.37
167
17
2,141
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5dad2054864f75da_a7990c43", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 19 ]
[ null ]
[ 19 ]
[ 75 ]
2024-11-18T20:44:08.877436+00:00
1,612,990,366,000
53653591c1caefcd21c83dd7aaf274ea1abb372d
3
{ "blob_id": "53653591c1caefcd21c83dd7aaf274ea1abb372d", "branch_name": "refs/heads/master", "committer_date": 1612990366000, "content_id": "9a2ced7b4867e4b1fe1dc81147d0f427ad2bce5f", "detected_licenses": [ "MIT" ], "directory_id": "d442f8a31b1f983730d96a423b23cbf3293c2738", "extension": "py", "fi...
3.40625
stackv2
import re class Movie: # Class Attribute # Initializer / Instance Attributes def __init__(self, title, year, director, cast, rating): self.title = title self.year = year self.director = director self.cast = cast self.rating = rating def check_year(self): ...
52
27.67
137
13
438
python
[{"finding_id": "codeql_py/overly-large-range_29860d680ba355ce_300d5e0c", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 24, 33 ]
[ null, null ]
[ 115, 119 ]
[ 118, 122 ]
2024-11-18T20:44:15.841060+00:00
1,505,395,810,000
e67e21b9e97626e4c9243f29a19297295705502a
2
{ "blob_id": "e67e21b9e97626e4c9243f29a19297295705502a", "branch_name": "refs/heads/master", "committer_date": 1505395810000, "content_id": "d4a30f225a98ec14f6b40ee95c13942359ded010", "detected_licenses": [ "Apache-2.0" ], "directory_id": "5d7d226ef08cc3c5c25847bcc3d62e04ab616200", "extension": "py"...
2.453125
stackv2
import time import re import sys import smtplib from email.mime.text import MIMEText import socket host_name = socket.gethostname() if len(sys.argv) < 3: sys.exit('run_id password') pwd = sys.argv[2] run_id = sys.argv[1] path = '/home/salomons/project/wsd/smac-output/scenario/live-rundata-' + str(run_id) + '....
55
24.6
98
17
423
python
[{"finding_id": "codeql_py/overly-large-range_ebcfbfa4725c726d_b54da624", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_`a-d\\].", "re...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_`a-d\\]." ]
[ 44 ]
[ null ]
[ 44 ]
[ 47 ]
2024-11-18T20:58:09.471589+00:00
1,691,474,224,000
7c9d0e31538d01f4fca7996d11f3ed40f557a1ce
3
{ "blob_id": "7c9d0e31538d01f4fca7996d11f3ed40f557a1ce", "branch_name": "refs/heads/master", "committer_date": 1691474224000, "content_id": "40d942d950e220328078db240ab4f3747a73e628", "detected_licenses": [ "BSD-2-Clause-Views" ], "directory_id": "4b3ec377fab16eb9f34bb4a7a6add274c00f7f13", "extensio...
2.625
stackv2
""" Utilities for managing secret data that is kept under source control. """ import glob import hashlib import json import logging import os import pyAesCrypt from autumn.settings import PROJECTS_PATH, DATA_PATH SALT = "ElvHoxZ83kAUgqy9x2KqM" BUFFER_SIZE = 64 * 1024 HASH_FILE = os.path.join(DATA_PATH, "secret-hashe...
109
29.22
96
14
813
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_bf845c6c34616b40_064ada80", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e...
[ 109 ]
[ null ]
[ 27 ]
[ 34 ]
2024-11-18T20:58:10.497019+00:00
1,584,729,763,000
b0fc95fd0a7a93bccfcc6e9425d04420f20f98b7
3
{ "blob_id": "b0fc95fd0a7a93bccfcc6e9425d04420f20f98b7", "branch_name": "refs/heads/master", "committer_date": 1584729763000, "content_id": "73d07e63791d3e7dfccc5492f9007a1b7d8df1e3", "detected_licenses": [ "Apache-2.0" ], "directory_id": "5f84dd8f3c3b5d8c56c2c0ee51ead60628f64abd", "extension": "py"...
2.546875
stackv2
import os import sys import requests from loguru import logger import re from typing import Tuple, List, Dict, Callable import sys from datetime import datetime from requests.packages import urllib3 import udatetime urllib3.disable_warnings() def fetch_with_requests(page: str) -> [bytes, int]: #print(f"fetch {p...
95
24.22
92
14
616
python
[{"finding_id": "codeql_py/request-without-cert-validation_cd5271c9d926db04_b6e7d35e", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 18 ]
[ null ]
[ 16 ]
[ 60 ]
2024-11-18T20:58:11.883307+00:00
1,527,395,529,000
0f031c1d42dd1e4cd8bb4175967b7aa423951c0d
2
{ "blob_id": "0f031c1d42dd1e4cd8bb4175967b7aa423951c0d", "branch_name": "refs/heads/master", "committer_date": 1527395529000, "content_id": "486756d0fe2712234eda4e77f4d96b17a249d32f", "detected_licenses": [ "MIT" ], "directory_id": "e36641f9198cb6e665f5e699471707a7635aa272", "extension": "py", "fi...
2.5
stackv2
from flask import * import sys import sqlite3 from functools import wraps app = Flask(__name__) DATABASE_FILE = "tables/database.db" conn = sqlite3.connect(DATABASE_FILE) university_columns = ["Name", "Region_ID", "City", "Student_Population", "Safety_Score", "Size"] employment_columns = ["Name", "Percent_Employed", ...
215
39.6
122
19
2,227
python
[{"finding_id": "codeql_py/sql-injection_38b8b507dab79aed_1af0a2f3", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).\nThis SQL query depends on a [user-provided value](2).\...
2
true
[ "CWE-089", "CWE-089" ]
[ "py/sql-injection", "py/sql-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This SQL query depends on a [user-provided value](1).\nThis SQL query depends on a [user-provided value](2).\nThis SQL query depends on a [user-provided value](3).\nThis SQL query depends on a [user-provided value](4).\nThis SQL query depends on a [user-provided value](5).", "This SQL query depends on a [user-pr...
[ 50, 55 ]
[ null, null ]
[ 29, 29 ]
[ 34, 34 ]
2024-11-18T20:58:19.918958+00:00
1,487,521,838,000
8c06427041a420f2626ca49e35f587d900476d63
3
{ "blob_id": "8c06427041a420f2626ca49e35f587d900476d63", "branch_name": "refs/heads/master", "committer_date": 1487521838000, "content_id": "72ee1c0844a142138051bdf1b8bbe30b80b6196b", "detected_licenses": [ "MIT" ], "directory_id": "087546cbb4dceecb3d1199ed07b95ee980b4af83", "extension": "py", "fi...
2.53125
stackv2
#!/usr/bin/python # -*- coding: utf-8 -*- import logging from requests.exceptions import ConnectionError, Timeout from scholarly_citation_finder.apps.core.models import PublicationUrl from scholarly_citation_finder.tools.crawler.HtmlParser import HtmlParser, HtmlParserUnkownHeaderType from scholarly_citation_finder.to...
128
40.99
145
24
1,072
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_6b17c60f8b8e14a3_6a232676", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [dx.doi.org](1) may be at an arbitrary position in the ...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [dx.doi.org](1) may be at an arbitrary position in the sanitized URL." ]
[ 99 ]
[ null ]
[ 20 ]
[ 43 ]
2024-11-18T20:58:19.977048+00:00
1,506,666,648,000
03ad74940fa6ea349c5c0d3b878a0d96aecdf94a
3
{ "blob_id": "03ad74940fa6ea349c5c0d3b878a0d96aecdf94a", "branch_name": "refs/heads/master", "committer_date": 1506666648000, "content_id": "d3b1f22174cf9ec007f18af4f1b2a8d9afb5fc88", "detected_licenses": [ "MIT" ], "directory_id": "b45e4ef38e0793a7ec176d3f9e4248e3fb71ae7c", "extension": "py", "fi...
3
stackv2
from tkinter import * from tkinter import messagebox import os #Allows users to save out_text to a desired file. appName is the title of the tk window. def saveData(out_text, appName): outPg=Toplevel() outPg.title(appName) outFrame=Frame(outPg) outFrame.pack(fill=X) output=Text(outFrame,wrap=WOR...
72
29.38
121
15
612
python
[{"finding_id": "codeql_py/overly-permissive-file_06698647c217c690_6079a047", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable." ]
[ 54 ]
[ null ]
[ 13 ]
[ 33 ]
2024-11-18T20:58:40.504787+00:00
1,609,909,975,000
233dd2a097a7d2bb91eef018de5d9fb8b2d5fe4b
2
{ "blob_id": "233dd2a097a7d2bb91eef018de5d9fb8b2d5fe4b", "branch_name": "refs/heads/main", "committer_date": 1609909975000, "content_id": "98d15e1b46551503aba1107d23e3ea1d9b11f58d", "detected_licenses": [ "MIT" ], "directory_id": "fd501a16e1cfff8e86ee86ede4bcee2fe4721da8", "extension": "py", "file...
2.328125
stackv2
import requests import csv from fake_useragent import UserAgent from lxml import etree import os import re import time import datetime from hashlib import md5 import pickle from concurrent.futures import ThreadPoolExecutor ua = UserAgent() headers = {'User-Agent' : ua.random} #md5_set = set() def parse_homepage(...
200
32.03
141
21
1,565
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_29e39563c2337e41_c87b31ba", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.",...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 99 ]
[ null ]
[ 45 ]
[ 67 ]
2024-11-18T21:10:28.457177+00:00
1,436,683,729,000
a3924b5f2d1fbe718916eb3ba741fbdb55fc98bb
3
{ "blob_id": "a3924b5f2d1fbe718916eb3ba741fbdb55fc98bb", "branch_name": "refs/heads/master", "committer_date": 1436683729000, "content_id": "04dabf3566100f8f27dd251bebb9a73c1a881796", "detected_licenses": [ "MIT" ], "directory_id": "23622ed6ad255a54e287f9beb4ab0d363e429dec", "extension": "py", "fi...
2.84375
stackv2
# The simplest tool ever to grab images from a reddit subreddit. # # I've seen alternatives to this, and I've also seen tools get the job done more nicely # but this is created for simplicity and minimalism, I wanted to create the simplest image download I can. # # Baha - meddbeibia@gmail.com - @meddbeibia # JULY 12, 2...
38
37.95
153
15
380
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_b6123b184ab9f31a_b53acaad", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [http://imgur.com/](1) may be at an arbitrary position ...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [http://imgur.com/](1) may be at an arbitrary position in the sanitized URL." ]
[ 28 ]
[ null ]
[ 7 ]
[ 44 ]
2024-11-18T21:10:44.289729+00:00
1,469,837,456,000
48cdd260600475c60a0dcfe6d40834abb6f5f139
3
{ "blob_id": "48cdd260600475c60a0dcfe6d40834abb6f5f139", "branch_name": "refs/heads/master", "committer_date": 1469837456000, "content_id": "556e6371eac5cf77f1bbcafe67477cc1610b44b8", "detected_licenses": [ "MIT" ], "directory_id": "26c26bbcc14008781ac225c0787ed02a87d5604c", "extension": "py", "fi...
2.640625
stackv2
import os import shutil import tarfile import json import logging import time from contextlib import contextmanager from .filesystem import TempDir class KeyLocked(Exception): '''Raised when an action would read or modify a key that is locked''' pass class SourceNotFound(Exception): '''Raised when a s...
174
31.39
108
17
1,233
python
[{"finding_id": "codeql_py/tarslip_373c9fc6c5bc7521_057a8d04", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 67 ]
[ null ]
[ 13 ]
[ 16 ]
2024-11-18T21:10:48.414885+00:00
1,593,870,615,000
1693e0b40b559680be088ec9d16944f347b9c3ef
3
{ "blob_id": "1693e0b40b559680be088ec9d16944f347b9c3ef", "branch_name": "refs/heads/master", "committer_date": 1593870615000, "content_id": "321778e340d9a762817f893b30c473c059246851", "detected_licenses": [ "MIT" ], "directory_id": "2ed0837e0900e556477edcbf36154268ab0e7c27", "extension": "py", "fi...
2.734375
stackv2
import os import glob import cv2 import numpy as np import tqdm import urllib.request from shutil import copyfile import tarfile from chainer_bcnn.data import load_image, save_image def my_hook(t): # https://github.com/tqdm/tqdm/blob/master/examples/tqdm_wget.py """Wraps tqdm instance. Don't forget to close(...
87
26.44
80
14
686
python
[{"finding_id": "codeql_py/tarslip_2b6f885e163681a4_eef94d8b", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 84 ]
[ null ]
[ 9 ]
[ 12 ]
2024-11-18T21:10:58.685296+00:00
1,537,561,178,000
34120d51c02f07446abbf4347f195c8426e967e0
3
{ "blob_id": "34120d51c02f07446abbf4347f195c8426e967e0", "branch_name": "refs/heads/master", "committer_date": 1537561178000, "content_id": "1cacb93e40db29866c0c26c4e0a404cbece52505", "detected_licenses": [ "Apache-2.0" ], "directory_id": "66fda461fcdaa257af519f67c165964ee6c1e680", "extension": "py"...
2.625
stackv2
import csv import getopt import sys import os import pyodbc def usage(): print('''\ LoadCsvFiles 2.0: Handles performing updates instead of inserts where data is already present, identity inserts, \ and UTF-8-BOM encoded files Usage: LoadCsvFiles [OPTIONS] -h --help Display t...
331
33.68
119
22
2,588
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_dc15741dbe4b3dcc_2a9c7c95", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive dat...
[ 272, 278, 297 ]
[ null, null, null ]
[ 11, 15, 11 ]
[ 37, 19, 28 ]
2024-11-18T21:11:01.776476+00:00
1,528,441,026,000
089efba69e6a1754e8dd509544fd0f7a19cd62ea
2
{ "blob_id": "089efba69e6a1754e8dd509544fd0f7a19cd62ea", "branch_name": "refs/heads/master", "committer_date": 1528441026000, "content_id": "b668174ca6094bc6c27cf9a49fa903f837fb9ad5", "detected_licenses": [ "MIT" ], "directory_id": "1f4d43d93ebe19f05d8e70ac3159d790fa9eea38", "extension": "py", "fi...
2.328125
stackv2
import os import webapp2 import jinja2 from google.appengine.ext import ndb from google.appengine.api import users import logging import datetime from Employee import * template_env = jinja2.Environment(loader=jinja2.FileSystemLoader(os.getcwd())) class Chats(ndb.Expando): strOwnerReference = ndb.StringProper...
235
31.79
135
17
1,588
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_b5ea37b1ddbb4977_51b491d5", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 11 ]
[ null ]
[ 16 ]
[ 79 ]
2024-11-18T21:11:05.107579+00:00
1,583,076,660,000
3ea5fefbf7c503bdefce855f516db502ffa6d29d
2
{ "blob_id": "3ea5fefbf7c503bdefce855f516db502ffa6d29d", "branch_name": "refs/heads/master", "committer_date": 1583076660000, "content_id": "2d1c8dc7c5a53e329ae19bad3ff6bdc9c8b5f09a", "detected_licenses": [ "MIT" ], "directory_id": "e59310fbd72ea3c062e9da79be9a2628cf08a8c6", "extension": "py", "fi...
2.359375
stackv2
""" broker service * is used by an external webapp * user data is stored in the external webapp * external process will register call back to get user_data * broker stores all exchange relevant data: balances, orders, ... """ import datetime import time import logging import os import redis from pathlib import Path f...
266
34.6
145
18
2,213
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fe5c3c4bf22cd400_efedb50b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 105, 114, 114 ]
[ null, null, null ]
[ 24, 33, 46 ]
[ 25, 39, 54 ]
2024-11-18T21:11:13.413656+00:00
1,693,072,804,000
fb6a7be9f4a3972334ad5ed3c3a1773c7e88cb41
2
{ "blob_id": "fb6a7be9f4a3972334ad5ed3c3a1773c7e88cb41", "branch_name": "refs/heads/master", "committer_date": 1693072804000, "content_id": "d4895c23ebc7afb1368489b4c3705641b68b7d19", "detected_licenses": [ "Apache-2.0", "MIT" ], "directory_id": "3ae01569e10db9e4b3036a6e877ef24a3f056179", "exten...
2.5
stackv2
import sys import requests def read_log(file_path): with open(file_path, "r", encoding="utf-8") as f: url = f.readlines() return url def sync_missing_to_gitlab(l: list, u_name, u_pass, gitlab_tk): headers = {"Private-Token": gitlab_tk} create_url = "https://{}:{}@source.openeuler.sh/api/v4...
51
31.37
91
15
445
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3f09dbfbbaf564d4_860c5e07", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 37 ]
[ null ]
[ 15 ]
[ 25 ]
2024-11-18T21:11:19.321965+00:00
1,623,967,876,000
b8a2fed0bb2caa410151628a2311c092a397bc73
2
{ "blob_id": "b8a2fed0bb2caa410151628a2311c092a397bc73", "branch_name": "refs/heads/main", "committer_date": 1623967876000, "content_id": "a6b9df76ff4770940f9fabb0ecd3bedc019f96bd", "detected_licenses": [ "MIT" ], "directory_id": "916c81b31000ee1e22baf52ad0cf839ad0294849", "extension": "py", "file...
2.3125
stackv2
from flask import Flask, render_template, url_for, json import os app = Flask(__name__) # code by kOssi (https://stackoverflow.com/questions/21133976/flask-load-local-json) SITE_ROOT = os.path.realpath(os.path.dirname(__file__)) SITE_FOLDER = "static/data" @app.route('/') def index(): return render_template('lan...
18
29.33
84
11
134
python
[{"finding_id": "codeql_py/path-injection_9351d595acc0bcb2_72ed29ff", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 17 ]
[ null ]
[ 27 ]
[ 35 ]
2024-11-18T19:03:34.285923+00:00
1,598,461,133,000
3faec14886b7030d5c9ce9286be6c84576db3c58
2
{ "blob_id": "3faec14886b7030d5c9ce9286be6c84576db3c58", "branch_name": "refs/heads/master", "committer_date": 1598461133000, "content_id": "0161ed7747c1c0aa7234c5ce04a8e7c1b2b591d8", "detected_licenses": [ "MIT" ], "directory_id": "8985d044e0d6b69301767e67449b505684146cbf", "extension": "py", "fi...
2.46875
stackv2
# Check MongoDB Server access import pymongo client = pymongo.MongoClient('vrdata.viarezo.fr',username='2019hammoudf',password='eyJ0eXAiOiJKV1Qi',authSource='db1') if 'vrdata' in client.list_database_names(): print('VRdata is available.') vrdata = client["vrdata"] selected = vrdata['users'].find_one({'u...
16
26.38
118
11
124
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_623712277ce57bd0_1387d2da", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 12 ]
[ null ]
[ 11 ]
[ 31 ]
2024-11-18T19:03:42.029986+00:00
1,646,915,688,000
9daa2da430279910dbe74e22b37845958746a911
3
{ "blob_id": "9daa2da430279910dbe74e22b37845958746a911", "branch_name": "refs/heads/master", "committer_date": 1646915688000, "content_id": "ff73514f1ec6a1f391bfd9cc156a0d0c8159f8c2", "detected_licenses": [ "MIT" ], "directory_id": "19cbba86b15dd6f9617b2661218abaee99b9e59a", "extension": "py", "fi...
2.828125
stackv2
import logging import urllib.parse as urlparse from http.server import BaseHTTPRequestHandler from anybadge import Badge from anybadge.server import config logger = logging.getLogger(__name__) class AnyBadgeHTTPRequestHandler(BaseHTTPRequestHandler): """Request handler for anybadge HTTP server.""" def do_H...
74
32.11
103
18
514
python
[{"finding_id": "codeql_py/log-injection_685d36361da966de_d6df3fea", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](1)...
2
true
[ "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 44, 44 ]
[ null, null ]
[ 53, 46 ]
[ 58, 51 ]
2024-11-18T19:28:40.038230+00:00
1,651,851,303,000
9ac499f7d259086c05151201df7cce76b61ec611
2
{ "blob_id": "9ac499f7d259086c05151201df7cce76b61ec611", "branch_name": "refs/heads/master", "committer_date": 1651851303000, "content_id": "6d12260883993035cac130052cba0027d7599e89", "detected_licenses": [ "Apache-2.0" ], "directory_id": "6506409d76a3e0fdf039d11d61a02bd7b542999a", "extension": "py"...
2.46875
stackv2
from flask import Flask from flask import request import json from sagas.nlu.wordnet_procs import WordNetProcs, predicate_chain, get_chains from cachetools import cached, TTLCache import logging logger = logging.getLogger(__name__) # cache = TTLCache(maxsize=100, ttl=300) app = Flask(__name__) @app.route("/") def hom...
168
28.14
77
16
1,297
python
[{"finding_id": "codeql_py/log-injection_7f4c4f1af39c1063_4d9716f3", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
3
true
[ "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 73, 104, 146 ]
[ 74, 105, 147 ]
[ 13, 13, 13 ]
[ 44, 44, 44 ]
2024-11-18T19:28:41.642566+00:00
1,610,362,500,000
fbc40a988a7f8de8d00742f866122519bc466be8
3
{ "blob_id": "fbc40a988a7f8de8d00742f866122519bc466be8", "branch_name": "refs/heads/main", "committer_date": 1610362500000, "content_id": "7310ee9730070fa9ae82e172ba7f3a2343ba1292", "detected_licenses": [ "Apache-2.0" ], "directory_id": "68cd81ccd338735b8a61b0986617ae0a83a6edb2", "extension": "py", ...
2.984375
stackv2
# importing modules from tkinter import * import requests import json import tkinter.messagebox as thh root = Tk() root.geometry("855x644") root.minsize(855,644) root.maxsize(855,644) root.title("Weather-Feather---By Aryan Tiwari") root.config(bg="#0f4c81", cursor="target") root.iconbitmap("resource/sun.ico") def ...
82
27.45
116
13
690
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_397b44d6679ac36a_05f8c3c3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 24 ]
[ null ]
[ 12 ]
[ 13 ]
2024-11-18T19:28:50.380604+00:00
1,467,977,331,000
05da78e95b6142a71bbb456e70aa9688af2c8ef6
3
{ "blob_id": "05da78e95b6142a71bbb456e70aa9688af2c8ef6", "branch_name": "refs/heads/master", "committer_date": 1467977331000, "content_id": "f84c9b6c708c2b95db5523ea633be329dc754ceb", "detected_licenses": [ "MIT" ], "directory_id": "6296ee56125e53af7d1d7c9ae6df2e5d262db6bf", "extension": "py", "fi...
2.640625
stackv2
# -*- coding: utf-8 -*- import requests import re from bs4 import BeautifulSoup import csv import time import jinja2 from math import radians, sin, cos, asin, sqrt from geopy import geocoders g = geocoders.GoogleV3() re_num = re.compile(r"([\d]+)") re_url = re.compile(r"rent\-detail\-([\d]+)") re_links = re.compile(r...
162
27.69
163
18
1,289
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_f09560b796fcbca8_b8f2b6f0", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 132 ]
[ null ]
[ 20 ]
[ 60 ]
2024-11-18T19:39:52.174719+00:00
1,486,386,773,000
044e00acde9287c77aa4640efa516f89da0d1bd3
3
{ "blob_id": "044e00acde9287c77aa4640efa516f89da0d1bd3", "branch_name": "refs/heads/master", "committer_date": 1486386773000, "content_id": "2ae22c3a230cebfb36c578e1b4762ed8109dc1eb", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "f1fc180a400aeca933549d0893cc99c1ff28a1ac", "extension": "p...
3.015625
stackv2
""" ykval.utils ~~~~~~~~~~~ Helper utilities for Yubikey Validator (YK-VAL) """ import base64 from binascii import hexlify, unhexlify from cgi import parse_qs from Crypto.Cipher import AES from datetime import datetime import hashlib import hmac import logging from random import getrandbits import re import sys logg...
254
31.43
109
16
2,667
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_9ff19ed0f7b3de21_d4572150", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 84, 102 ]
[ null, null ]
[ 13, 14 ]
[ 38, 38 ]
2024-11-18T20:18:24.803050+00:00
1,610,108,679,000
612a8521af9f35a9699942299b8da7718f070dd1
4
{ "blob_id": "612a8521af9f35a9699942299b8da7718f070dd1", "branch_name": "refs/heads/main", "committer_date": 1610108679000, "content_id": "454a93016f0236c0a6158c3dde949861a8e25852", "detected_licenses": [ "MIT" ], "directory_id": "787a11e4db9f5f9cd6f0571edc609c68db550299", "extension": "py", "file...
3.71875
stackv2
# Author : Emin Kartci # Class : 3rd Year - EE393.A # Department : Electrical & Electronics Engineering # This module is to represent customers # get random library to execute a stochastic simulation # do not get all library I only need randint method from random import randint # define a class cla...
55
36.42
124
12
410
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_07b5d9a50fc0bda7_497209b2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 53 ]
[ null ]
[ 19 ]
[ 33 ]
2024-11-18T20:18:53.027525+00:00
1,576,508,603,000
2b60acdadc745a575f19fdca6733fae9f2671cb6
3
{ "blob_id": "2b60acdadc745a575f19fdca6733fae9f2671cb6", "branch_name": "refs/heads/master", "committer_date": 1581860643000, "content_id": "9d94dd7e443c1a4fc629426be90cd51e8248af82", "detected_licenses": [ "MIT" ], "directory_id": "ad020363d4280e4977b3124acbe1ece5f8f21ccb", "extension": "py", "fi...
3.09375
stackv2
#!/usr/bin/env python3 import sys DEBUG = True val = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz" frequency = "etaoinshrdlcumwfgypbvkjxqz" assert len(frequency) == len(val) // 2 def check_password(ciphertext, password, excludes): # Plaintext + Password = Ciphertext plaintext = "" for i, t i...
98
24.33
81
18
606
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5830b2e38b41f25c_8f0f0e48", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text." ]
[ 89 ]
[ null ]
[ 29 ]
[ 46 ]
2024-11-18T20:18:56.211127+00:00
1,521,908,650,000
e68be9e12e5b72018892c79e0b0e06862851a8f9
2
{ "blob_id": "e68be9e12e5b72018892c79e0b0e06862851a8f9", "branch_name": "refs/heads/master", "committer_date": 1521908650000, "content_id": "90c583505dd584b9866238a6420f5258b1da2c2b", "detected_licenses": [ "MIT" ], "directory_id": "2e937a5c021d895e3779d7934bdd4ff922298e45", "extension": "py", "fi...
2.34375
stackv2
import json import logging from datetime import datetime import bcrypt import jwt from flask import current_app, g, request from flask_restful import Resource, abort from marshmallow import ValidationError from marshmallow_jsonapi.exceptions import IncorrectTypeError import timeswitch.auth as auth from timeswitch.aut...
159
35.13
92
18
1,239
python
[{"finding_id": "codeql_py/log-injection_f5e12a6f90e3c89a_67cacd61", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
8
true
[ "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depen...
[ 48, 56, 84, 88, 117, 121, 143, 147 ]
[ null, null, 85, 89, 118, 122, 144, 148 ]
[ 25, 21, 25, 25, 25, 25, 25, 25 ]
[ 78, 68, 63, 60, 63, 60, 63, 60 ]
2024-11-18T20:29:33.729500+00:00
1,693,928,169,000
2fca53a29810c12baba3186d1c3f6320a73997f4
3
{ "blob_id": "2fca53a29810c12baba3186d1c3f6320a73997f4", "branch_name": "refs/heads/main", "committer_date": 1693928169000, "content_id": "39d1c03e9dfafad40ceba2c0b07904555942b04c", "detected_licenses": [ "MIT" ], "directory_id": "091a6200be74bf6577c86f623665bcc24e16b02b", "extension": "py", "file...
2.84375
stackv2
# SPDX-FileCopyrightText: 2021 Eva Herrada for Adafruit Industries # # SPDX-License-Identifier: MIT import time import math import board import neopixel import usb_hid from adafruit_hid.keyboard import Keyboard from adafruit_hid.keyboard_layout_us import KeyboardLayoutUS from adafruit_hid.keycode import Keycode # pyl...
121
33.32
87
16
1,236
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_44574abfeebebb2c_f01555a3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 79, 84 ]
[ null, null ]
[ 15, 15 ]
[ 19, 19 ]
2024-11-18T20:29:51.557772+00:00
1,512,688,163,000
cfa928572b37f268f8939899b57a6211d9151f09
3
{ "blob_id": "cfa928572b37f268f8939899b57a6211d9151f09", "branch_name": "refs/heads/master", "committer_date": 1512688163000, "content_id": "78cb6f82461e669c1a762be77ad3812defa176cc", "detected_licenses": [ "MIT" ], "directory_id": "2429599d601cc0c843f7a0242c0349f002c27b06", "extension": "py", "fi...
2.640625
stackv2
#!/usr/bin/env python """ SDM tar archive creation utility. example usage: create_archive.py 8311_17_1_dicoms -f dicoms newarchive """ from __future__ import print_function import os import glob import json import tarfile import calendar import datetime def datetime_encoder(o): if isinstance(o, datetime.da...
190
34.62
125
17
1,608
python
[{"finding_id": "codeql_py/tarslip_921d4757fec046e2_78837abc", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially untrusted source](1)." ]
[ 65 ]
[ null ]
[ 13 ]
[ 20 ]
2024-11-18T20:29:51.850655+00:00
1,424,844,491,000
f6ffff76ff6ccb73dff1e6f3509752b5d624490b
3
{ "blob_id": "f6ffff76ff6ccb73dff1e6f3509752b5d624490b", "branch_name": "refs/heads/master", "committer_date": 1424844491000, "content_id": "42e63aa4a798cd31b941008fcd39921017bbcc59", "detected_licenses": [ "MIT" ], "directory_id": "96f564ddc83e5ee5eca9d277f1769f5d999e0937", "extension": "py", "fi...
2.625
stackv2
from flask import Flask, request import traceback app = Flask(__name__) @app.route('/') def hello_world(): return 'Hello World!' try: from .app1 import app1 as _app1 app1_ok = True except: app1_err = traceback.format_exc() app1_ok = False @app.route("/api/app1", methods=["POST"]) def app1():...
35
17.54
47
14
176
python
[{"finding_id": "codeql_py/stack-trace-exposure_91020d81d6d18c5f_837ae0ca", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 24, 31 ]
[ null, null ]
[ 16, 16 ]
[ 29, 48 ]
2024-11-18T20:51:19.073602+00:00
1,596,459,100,000
1a6976a60f7a8ee8711715abf26882489e9c63e3
3
{ "blob_id": "1a6976a60f7a8ee8711715abf26882489e9c63e3", "branch_name": "refs/heads/master", "committer_date": 1596459100000, "content_id": "8b04aecbe653fb858dea50927a83987c28616cae", "detected_licenses": [ "MIT" ], "directory_id": "9f08b15018986d4b735d860f1fa4830fbc56c379", "extension": "py", "fi...
2.671875
stackv2
from alpha_vantage.timeseries import TimeSeries from alpha_vantage.techindicators import TechIndicators import matplotlib.pyplot as plt import os api_key_path = os.path.abspath('src/api_key.txt') api_key = open(api_key_path, "r").readline() print(api_key) ts = TimeSeries(key=api_key, output_format='pandas') data, met...
20
34.5
83
9
194
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d3b3128428051f12_461ae9e9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 8 ]
[ null ]
[ 7 ]
[ 14 ]
2024-11-18T20:51:20.128724+00:00
1,662,362,316,000
284a200e373b01916b523cf94944d44b49ad85a3
2
{ "blob_id": "284a200e373b01916b523cf94944d44b49ad85a3", "branch_name": "refs/heads/master", "committer_date": 1662362316000, "content_id": "532f31e312eddc5cb6a044d61111603a3f7f74ea", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e96889bdfc11b1fefe00b23ca3ef0944f6cce3e6", "extension": "py"...
2.4375
stackv2
""" Authentication Route for User. """ from flask import Blueprint, request, jsonify from flask.helpers import make_response from api.models.admin import Admin from api.models.extractor import Extractor from api.models.management import Management from api.models.token_blacklist import BlacklistedToken from api.extans...
369
28.08
88
17
2,290
python
[{"finding_id": "codeql_py/stack-trace-exposure_9535e3634cbe932e_aff8c6d7", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 48 ]
[ null ]
[ 38 ]
[ 46 ]
2024-11-18T20:51:28.803815+00:00
1,366,750,616,000
875b7ab353aaef6712e5d40cb580a5dec39bd78a
3
{ "blob_id": "875b7ab353aaef6712e5d40cb580a5dec39bd78a", "branch_name": "refs/heads/master", "committer_date": 1366750616000, "content_id": "e6fb8bcf23a76a601c5f46d0d2b95574a6e00c31", "detected_licenses": [ "MIT" ], "directory_id": "829100888306565cf88ff2c3642da71a9d865a8c", "extension": "py", "fi...
2.765625
stackv2
# -*- coding: utf-8 -*- import requestWrapper as req import re import time import random class Google(object): searchUrl = 'https://www.google.sk/search?q=site%3Atitulky.com+{0}' searchExpression = re.compile(r'www.titulky.com/(?:(?!\.).)+\.htm') def getFirstLevelLinks(self, videos): lastVid = len...
24
34.12
71
15
208
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_4996a953cee6761f_6d4fe3a6", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'titulky.com/', so it might match mo...
1
true
[ "CWE-020" ]
[ "py/incomplete-hostname-regexp" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'titulky.com/', so it might match more hosts than expected." ]
[ 9 ]
[ null ]
[ 37 ]
[ 70 ]
2024-11-18T19:07:01.689508+00:00
1,597,989,512,000
5afdf80be16686a844343aecfdb8d76c2fa825a2
3
{ "blob_id": "5afdf80be16686a844343aecfdb8d76c2fa825a2", "branch_name": "refs/heads/master", "committer_date": 1598246476000, "content_id": "3896e9cae38f1e58d393c1f6c9c320c9f1032f14", "detected_licenses": [ "MIT" ], "directory_id": "4b28ffb3f7326427f9e864ab3a5ce5b95f21c310", "extension": "py", "fi...
2.59375
stackv2
import logging from typing import Optional from flask import ( flash, redirect, request, send_from_directory, url_for, ) from flask_security import current_user from flask_admin import BaseView, expose from helpers.file_handling import ( allowed_file, store_temp_file, generate_temp_rec...
209
34.23
89
16
1,520
python
[{"finding_id": "codeql_py/url-redirection_04bcbe0085536658_d69ab79c", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
5
true
[ "CWE-601", "CWE-601", "CWE-601", "CWE-601", "CWE-601" ]
[ "py/url-redirection", "py/url-redirection", "py/url-redirection", "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends o...
[ 105, 109, 114, 129, 141 ]
[ null, null, null, null, null ]
[ 29, 29, 29, 29, 29 ]
[ 40, 40, 40, 40, 40 ]
2024-11-18T19:07:08.566855+00:00
1,474,506,091,000
841a6b71feddf4105f645825481eb02a79ca71ac
2
{ "blob_id": "841a6b71feddf4105f645825481eb02a79ca71ac", "branch_name": "refs/heads/master", "committer_date": 1474506091000, "content_id": "e840db5b5ab38330e80eef6154a1f93ccad5efb9", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "07b5d0954e2bfb69fc53e2d03b8b1d49fd4490a8", "extension": "p...
2.484375
stackv2
#!/usr/bin/env python3 import tornado.ioloop import tornado.web import tornado.websocket from tornado.options import define, options, parse_command_line import os import uuid import base64 import random import koh_api define("port", default=8888, help="run on the given port", type=int) __INDEX_FILE__ = "client/index...
204
33.42
116
15
1,640
python
[{"finding_id": "codeql_py/path-injection_c0b76d4385b7c09c_795adfd5", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 150, 166 ]
[ null, null ]
[ 19, 19 ]
[ 34, 34 ]
2024-11-18T19:07:34.807626+00:00
1,623,880,769,000
90266b5207acf78c58ab42b45f3561cddca69062
2
{ "blob_id": "90266b5207acf78c58ab42b45f3561cddca69062", "branch_name": "refs/heads/master", "committer_date": 1623880769000, "content_id": "d57405a47c7b5c78f6352ae9cb261e23ffc2ffac", "detected_licenses": [ "MIT" ], "directory_id": "50eebaa67bd8d3600e418fa26fab479f7e1ec0c1", "extension": "py", "fi...
2.453125
stackv2
#!/usr/bin/python3 import socket import ssl SERVER_IP = '0.0.0.0' SERVER_PORT = 5354 #Generate the certificate and the key: ## openssl req -newkey rsa:2048 -nodes -keyout /root/test/server-key.pem -x509 -days 365 -out /root/test/cert.pem context = ssl.SSLContext(ssl.PROTOCOL_TLS_SERVER) context.load_cert_chain('/root...
35
24.6
113
12
242
python
[{"finding_id": "codeql_py/insecure-protocol_b464cd046cd3b03b_e764fcd6", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol...
2
true
[ "CWE-327", "CWE-200" ]
[ "py/insecure-protocol", "py/bind-socket-all-network-interfaces" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.SSLContext](1).", "'0.0.0.0' binds a socket to all interfaces." ]
[ 19, 15 ]
[ null, null ]
[ 7, null ]
[ 14, 36 ]
2024-11-18T19:07:41.819688+00:00
1,619,353,376,000
781e7e6d8e1e2cbb9a7cbcdf569f4babf8828fb6
4
{ "blob_id": "781e7e6d8e1e2cbb9a7cbcdf569f4babf8828fb6", "branch_name": "refs/heads/main", "committer_date": 1619353376000, "content_id": "5fd76aca96bec5dc67b01233e8b019002837bdb2", "detected_licenses": [ "MIT" ], "directory_id": "594d4d7061fdee0476fd1b399c8aaf614cd68c25", "extension": "py", "file...
3.9375
stackv2
class Person: county = "India" def takeBreak(self): print("Take break") class Employee(Person): company = "Honda" def getSalary(self): print(f"salary is {self.salary}") def takeBreak(self): print("I am an Employee") class Programmer(Employee): company = "Fiverr" ...
33
15.85
41
12
131
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c1f2945df4a46014_1e889e1e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 11 ]
[ null ]
[ 15 ]
[ 41 ]
2024-11-18T19:18:18.926706+00:00
1,619,799,222,000
74ca62d278173f0bf0c57c72ea6824392ec9e03f
2
{ "blob_id": "74ca62d278173f0bf0c57c72ea6824392ec9e03f", "branch_name": "refs/heads/main", "committer_date": 1619799222000, "content_id": "78bf3dda616e6b80bd3099b6dd6f01b721af3ebc", "detected_licenses": [ "Apache-2.0" ], "directory_id": "5c0a9ad82b5dc92d220a61709832a8247b54dcd1", "extension": "py", ...
2.390625
stackv2
import logging import os import subprocess from typing import Union, List, Tuple, Dict, Any, Optional, Iterable import pmakeup as pm class LinuxOSSystem(pm.IOSSystem): def __init__(self, model: "pm.PMakeupModel"): self._model = model # def get_git_commit(self, p: pm.path) -> str: # result, ...
223
43.63
162
22
1,968
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_631e4240f9b8b36a_97de067d", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text." ]
[ 94 ]
[ null ]
[ 33 ]
[ 54 ]
2024-11-18T19:18:21.335986+00:00
1,637,594,921,000
fa0981a3f17aec6fb1937e0b80660b9e3a00c506
3
{ "blob_id": "fa0981a3f17aec6fb1937e0b80660b9e3a00c506", "branch_name": "refs/heads/master", "committer_date": 1637594921000, "content_id": "66feb08d01b5c88985655018ef4c70342cdcdc39", "detected_licenses": [ "MIT" ], "directory_id": "d1d64ea15d7472b5ad649a251c7edd1013c89d29", "extension": "py", "fi...
2.59375
stackv2
""" Creates MSI installers for PyXLL projects using Wix. Requires the Wix Toolset to be installed http://wixtoolset.org/ Copy and edit the example config file for your own project. Customizations can be made by copying and editing the templates. Usage: python make_installer -c config/example.yaml """ import subproce...
238
33.99
105
19
1,944
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_de9389b47e501c38_27f68e44", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 179 ]
[ null ]
[ 24 ]
[ 50 ]
2024-11-18T19:18:33.503927+00:00
1,555,952,365,000
5ac93da4c6df56045d5efbc8c2674e5248592275
3
{ "blob_id": "5ac93da4c6df56045d5efbc8c2674e5248592275", "branch_name": "refs/heads/master", "committer_date": 1555952365000, "content_id": "837686af4961018b5ceb848025d0dd65e4c56fdb", "detected_licenses": [ "MIT" ], "directory_id": "370928ca4c91a7fdd73f6a2289d69ec06e849196", "extension": "py", "fi...
3.046875
stackv2
import md5 import random import subprocess import sys import os hashchars = [ c for c in '0123456789abcdef' ] def randHash(): global hashchars return random.choice(hashchars) def writeHashishFile(filename, size): with open(filename, 'w') as f: for i in xrange(0,size): f.write(ran...
84
26.31
100
15
581
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_23560a9d67144b22_827fde19", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text." ]
[ 45 ]
[ null ]
[ 25 ]
[ 30 ]
2024-11-18T19:18:40.224445+00:00
1,651,932,502,000
ab36a663bc7c76cfb3e96ffcd80c77bac4b825f0
2
{ "blob_id": "ab36a663bc7c76cfb3e96ffcd80c77bac4b825f0", "branch_name": "refs/heads/master", "committer_date": 1651932509000, "content_id": "fe19d0527b49cd240658d5d7b5b845d47de39a8d", "detected_licenses": [ "Apache-2.0" ], "directory_id": "f9d11a3afd792a373ce2ac37574d6a6f97375d14", "extension": "py"...
2.328125
stackv2
#!/usr/bin/python # # Copyright 2018-2022 Polyaxon, Inc. # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable ...
313
26.96
88
16
2,063
python
[{"finding_id": "codeql_py/tarslip_0ab3dc3de836052b_6aff8de7", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 207 ]
[ null ]
[ 9 ]
[ 12 ]
2024-11-18T19:18:45.401420+00:00
1,587,311,020,000
6f5e91bf5d2e8f137ed1ca7d095319399812e00f
3
{ "blob_id": "6f5e91bf5d2e8f137ed1ca7d095319399812e00f", "branch_name": "refs/heads/master", "committer_date": 1587311020000, "content_id": "6b40fe328cc1df9e33c3e330327234f8ad06ef91", "detected_licenses": [ "MIT" ], "directory_id": "2035ff7879d66feb64b5926c4639adbf7ebcbcea", "extension": "py", "fi...
3.40625
stackv2
#!/usr/bin/env python3.6 import pyperclip from user import User, Credential def create_user(fullname, username, password): """ Function to create a new user account """ new_user = User(fullname, username, password) return new_user def save_users(user): """ Function to save a new user account """ ...
224
37.33
151
27
1,537
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c897d93dca68e511_7ab34b96", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text.\nThis expression logs [sensitive data (passw...
[ 117, 171, 180 ]
[ null, null, null ]
[ 17, 29, 37 ]
[ 108, 117, 140 ]
2024-11-18T19:18:49.213539+00:00
1,560,346,022,000
9892db17d806ea73d82344c1db0c2e7830697bd6
3
{ "blob_id": "9892db17d806ea73d82344c1db0c2e7830697bd6", "branch_name": "refs/heads/master", "committer_date": 1560346022000, "content_id": "a2a8d7c2afdeaec5e48df19921b76982c87d1997", "detected_licenses": [ "MIT" ], "directory_id": "c118851fc4925e71fd3183ce86fca9ec80f03c5e", "extension": "py", "fi...
2.515625
stackv2
import hashlib class SqLiteDbConfig: def __init__(self, config): keys = config.keys() self.type = 'SqLite' self.filename = config['filename'] if 'filename' in keys else 'fids_db.db' def __repr__(self): return ("SqLiteDbConfig(" f"filename={self.filename},)") ...
31
33.06
89
18
259
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_fd633be54d6c80bb_b632f2c6", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 31 ]
[ null ]
[ 44 ]
[ 73 ]
2024-11-18T19:18:53.854469+00:00
1,664,827,529,000
cca31eb34fb2e99df6da29ec88c9304b8b6dec65
3
{ "blob_id": "cca31eb34fb2e99df6da29ec88c9304b8b6dec65", "branch_name": "refs/heads/master", "committer_date": 1664827529000, "content_id": "b09d2e21e5365284041f0552e00a5812b3329b75", "detected_licenses": [ "MIT" ], "directory_id": "817ced83deb41c10e3faba69992314a08f487cdb", "extension": "py", "fi...
2.890625
stackv2
#!/usr/bin/env python3 """ Usage: obtain_secrets <path> """ import os from subprocess import check_output from docopt import docopt from os.path import join, isdir def get_secret(name): path = "secret/vimc/{}".format(name) return check_output(["vault", "read", "-field=value", path]).decode('utf-8') def sa...
44
23.41
80
11
291
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_85c09f19018d0030_875e96d0", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive data (secret)](2) as clear text." ]
[ 23 ]
[ null ]
[ 17 ]
[ 21 ]
2024-11-18T19:18:53.916448+00:00
1,608,557,697,000
3aa189bb8732b21ca4b1d2e6bdaabbdd7350f57f
3
{ "blob_id": "3aa189bb8732b21ca4b1d2e6bdaabbdd7350f57f", "branch_name": "refs/heads/master", "committer_date": 1608557697000, "content_id": "86a23c1eacfb3ac4ca4934e30cac464cbef4ae54", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "c033a814d418b10d1c8a3f739c410a1cf8f8d212", "extension": "p...
3.25
stackv2
#!/usr/bin/evn python # -*- coding: utf-8 -*- # python version 2.7.10 from Crypto.Cipher import AES from Crypto import Random import sys import os import struct def encrypt(): filename = raw_input("Please enter the filename to be encrypted with its path: ") outfilename = filename + ".enc" ivgen = Random.n...
105
30.33
110
19
888
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_798821f0e278fbd8_5049d960", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode CBC](1) is broken or weak, and should not be used.\n[The block mode ...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[The block mode CBC](1) is broken or weak, and should not be used.\n[The block mode CFB](2) is broken or weak, and should not be used.\n[The block mode CTR](3) is broken or weak, and should not be used.\n[The block mode ECB](4) is broken or weak, and should not be used.\n[The block mode OFB](5) is broken or weak, ...
[ 52, 89 ]
[ null, null ]
[ 37, 37 ]
[ 61, 61 ]
2024-11-18T19:19:02.685724+00:00
1,545,490,215,000
600b8c5664dfeca0fe442fed7b3eadd8da73ab1e
3
{ "blob_id": "600b8c5664dfeca0fe442fed7b3eadd8da73ab1e", "branch_name": "refs/heads/master", "committer_date": 1545490215000, "content_id": "88b8226ee5d8cf9f426a3f8dfebbe6165ac06940", "detected_licenses": [ "MIT" ], "directory_id": "e35a4a5167eb241f38eacebaefa63fe35e8e572c", "extension": "py", "fi...
2.890625
stackv2
################################################ # 1. Import Dependencies ################################################ # Python SQL toolkit and Object Relational Mapper import sqlalchemy from sqlalchemy.ext.automap import automap_base from sqlalchemy.orm import Session from sqlalchemy import create_engine #PyMySQL...
324
34.11
149
15
3,194
python
[{"finding_id": "codeql_py/sql-injection_801e954d5df70575_b6bea20f", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown...
4
true
[ "CWE-089", "CWE-089", "CWE-089", "CWE-089" ]
[ "py/sql-injection", "py/sql-injection", "py/sql-injection", "py/sql-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This SQL query depends on a [user-provided value](1).", "This SQL query depends on a [user-provided value](1).", "This SQL query depends on a [user-provided value](1).", "This SQL query depends on a [user-provided value](1)." ]
[ 178, 227, 255, 301 ]
[ null, null, null, null ]
[ 25, 26, 27, 26 ]
[ 34, 30, 36, 30 ]
2024-11-18T19:19:07.732351+00:00
1,637,477,487,000
6c41bde0e84c754b1acfdf3029e0b4c0981847a2
3
{ "blob_id": "6c41bde0e84c754b1acfdf3029e0b4c0981847a2", "branch_name": "refs/heads/main", "committer_date": 1637477487000, "content_id": "3acd6c4296c039bead91535756db47846aa30ca8", "detected_licenses": [ "MIT" ], "directory_id": "5292b03998384c0d2bb5858058892d7e45c5365b", "extension": "py", "file...
2.640625
stackv2
""" This is a public file """ from qunetsim.components import Host # version: 0.1.2.post0 import random import hashlib from Crypto.Cipher import AES from secret_player import SecretPlayer ZARDUS_ID = "zardus" HACKER_ID = "Hacker" ADAMD_ID = "adamd" class Player(object): def __init__(self): pass de...
136
30.73
85
18
1,089
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_635db715b498511e_6721f13d", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 31 ]
[ null ]
[ 28 ]
[ 45 ]
2024-11-18T19:29:35.665709+00:00
1,690,588,669,000
a98669bfd542885a0312aed1b984a5f156b296a1
3
{ "blob_id": "a98669bfd542885a0312aed1b984a5f156b296a1", "branch_name": "refs/heads/master", "committer_date": 1690588669000, "content_id": "056e0e5da9e884041d31404ebc1f30123ef449c0", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "cd1f0498eb1e183c3f69dd68f4e8b08cdee75fd4", "extension": "p...
2.6875
stackv2
import fastjsonschema import json from jsonschema import validate import jsonschema import requests def check_data_object(d): """Validate the metadata urls. Args: d ([type]): [description] Returns: [type]: [description] """ rv = requests.head( d["url"], allow_redi...
113
31.07
114
17
798
python
[{"finding_id": "codeql_py/request-without-cert-validation_4cc5c842ed0b2467_255d9908", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 17 ]
[ 23 ]
[ 10 ]
[ 6 ]
2024-11-18T19:29:42.914931+00:00
1,615,106,432,000
db92ab50b15cd074830f5a7547d53e1fad7c3f54
2
{ "blob_id": "db92ab50b15cd074830f5a7547d53e1fad7c3f54", "branch_name": "refs/heads/main", "committer_date": 1615106432000, "content_id": "8e3ba4c75fcb1768838a9d3895a106ccaba0fba1", "detected_licenses": [ "MIT" ], "directory_id": "b2a689d29cb0a93f08f7e9c8f02675b05bf01d46", "extension": "py", "file...
2.3125
stackv2
import pandas as pd import numpy as np import os from fastapi import APIRouter from datetime import datetime from typing import List from pydantic import BaseModel from app.config import STOCK_DAILY_PATH, BASIC_PATH from app.utils.exc import (FileNotFoundException, NotInConsiderationExcepti...
42
26.29
62
15
296
python
[{"finding_id": "codeql_py/path-injection_7174736c81a5bccc_24228410", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 35 ]
[ null ]
[ 27 ]
[ 29 ]
2024-11-18T19:29:49.925888+00:00
1,601,413,290,000
7fd45319c5e1e8ab5447066d69305960d63685eb
3
{ "blob_id": "7fd45319c5e1e8ab5447066d69305960d63685eb", "branch_name": "refs/heads/master", "committer_date": 1601413290000, "content_id": "21f9e55d5925610da99a4e3b42b4a26fca771518", "detected_licenses": [ "MIT" ], "directory_id": "848f341a2d80a96b40c68ed686c1a394cf176269", "extension": "py", "fi...
3.40625
stackv2
""" Shallow Idris Parse to determine declarations from commands or expressions """ import enum import re class CodeType(enum.IntEnum): Declaration = 0 Expression = 1 REPL_Cmd = 2 Undeclare = 3 decl_regex = re.compile(r"^(\n|\s)*([a-zA-Z][a-zA-Z0-9_']*)\s((:)|(.*=))") comment_line = re.compile(r"^(\s)*--") ...
90
23.1
102
19
608
python
[{"finding_id": "codeql_py/redos_c1c3e8ffe0d5a58f_10bec0cd", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '\\n'.", "remedia...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '\\n'." ]
[ 14 ]
[ null ]
[ 28 ]
[ 36 ]
2024-11-18T19:29:50.831562+00:00
1,540,913,907,000
475f6892f810cf2a976476c646595086ca7bbc13
3
{ "blob_id": "475f6892f810cf2a976476c646595086ca7bbc13", "branch_name": "refs/heads/master", "committer_date": 1540913907000, "content_id": "e70fe313d396a87d8e51b96b8dd4426fb22f4c5f", "detected_licenses": [ "MIT" ], "directory_id": "da9c4ff99e377daae73d2ee5caf6f8348b980fd4", "extension": "py", "fi...
2.84375
stackv2
import requests def call_musixmatch_api(service, params): base_url = "https://api.musixmatch.com/ws/1.1/" api_key = "&apikey=41da9710650383c323dc1f32dabd847d" format_url = "?format=json&callback=callback" api_call = base_url + service + format_url + params + api_key print("API Call: ", api_call)...
52
24.35
65
11
360
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9a7d1e5b875880ee_6cb65b2c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 11, 48 ]
[ null, null ]
[ 25, 26 ]
[ 33, 32 ]
2024-11-18T19:29:52.445358+00:00
1,511,370,748,000
f137cf99fc0cad21993c73a181e5f9eb993754e2
2
{ "blob_id": "f137cf99fc0cad21993c73a181e5f9eb993754e2", "branch_name": "refs/heads/master", "committer_date": 1511370748000, "content_id": "8e29bb589620fee8904ea9a4d6a93102d074aa0e", "detected_licenses": [ "Apache-2.0" ], "directory_id": "6a102ca30064ec45c8774e1a36cbb18c77da3808", "extension": "py"...
2.390625
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- import requests, json from requests.packages.urllib3.exceptions import InsecureRequestWarning requests.packages.urllib3.disable_warnings(InsecureRequestWarning) def show_bindings(auth): url = "https://" + auth.aos8ip + ":4343/v1/configuration/showcommand?json=1&UIDA...
54
38.98
140
18
510
python
[{"finding_id": "codeql_py/request-without-cert-validation_811dba4015fd7224_5dc959f0", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 15 ]
[ null ]
[ 13 ]
[ 63 ]
2024-11-18T19:44:12.915173+00:00
1,692,996,691,000
07cfca3260ed0d1abd26b9fc0335bd5455caef8f
2
{ "blob_id": "07cfca3260ed0d1abd26b9fc0335bd5455caef8f", "branch_name": "refs/heads/master", "committer_date": 1692996691000, "content_id": "4b619ec02c13dcfb169f8c14b405e8ceb91bb16f", "detected_licenses": [ "Apache-2.0" ], "directory_id": "71bf3bcb78555eb46282602a77f0db3a4132eed5", "extension": "py"...
2.46875
stackv2
#!/usr/bin/env python3 import argparse import os import subprocess from subprocess import CompletedProcess import sys import time import json from typing import Callable from datetime import datetime, timedelta import logging from getpass import getpass from ruamel.yaml import YAML class CustomResource: def __i...
344
39.09
147
16
2,866
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_53baff65ba1b7594_db43d6fd", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 274, 323 ]
[ null, null ]
[ 20, 23 ]
[ 27, 39 ]
2024-11-18T19:44:37.420025+00:00
1,649,959,319,000
cc86d0961925cf96d508f9185a35e39394b5399f
3
{ "blob_id": "cc86d0961925cf96d508f9185a35e39394b5399f", "branch_name": "refs/heads/master", "committer_date": 1649959319000, "content_id": "bd168cd03c366fb9c6abee33d04ddd3e5738dea7", "detected_licenses": [ "MIT" ], "directory_id": "f2670d90fa5d217b29dcc94b57c7491c1403f8ba", "extension": "py", "fi...
2.625
stackv2
from .base_model import BaseModel from .metadata_item import MetadataItem from peewee import * import dateutil.parser import datetime import re import hashlib class LogItem(BaseModel): """These are the log items in the sqlite database based on peewee ORM""" event_time = DateTimeField(null=False, index=True) ...
88
50.43
143
21
1,032
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_9fd049c1ffd22f8a_5cf7523e", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.",...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.", "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 51, 66 ]
[ null, null ]
[ 52, 48 ]
[ 80, 109 ]
2024-11-18T19:58:04.946980+00:00
1,668,673,764,000
24188fac19be5158d8c5f6aa29ea8473e7313d6e
3
{ "blob_id": "24188fac19be5158d8c5f6aa29ea8473e7313d6e", "branch_name": "refs/heads/main", "committer_date": 1668673764000, "content_id": "86af3cabf08a7e65b20e51600aee1ecf9b30fa7e", "detected_licenses": [ "MIT" ], "directory_id": "ec53370a1d40d0a378f295f8342802d59e2ace67", "extension": "py", "file...
2.71875
stackv2
from datetime import datetime, timedelta import hashlib import os import requests import tarfile from termcolor import colored import config def blue(msg, bold = False, attrs = []): if bold: attrs.append("bold") return colored(msg, "blue", attrs = attrs) def red(msg, bold = False, attrs = []): ...
88
22.31
102
17
510
python
[{"finding_id": "codeql_py/tarslip_d65e809a20513cef_6d5de4f0", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 53 ]
[ null ]
[ 9 ]
[ 16 ]
2024-11-18T19:58:20.636825+00:00
1,599,072,605,000
d1adae6b5e0e4b7615caaf9a1ce4b58ece22ae63
2
{ "blob_id": "d1adae6b5e0e4b7615caaf9a1ce4b58ece22ae63", "branch_name": "refs/heads/master", "committer_date": 1599072605000, "content_id": "71b729f1d2109d88fb4c4fe32568a5d79c07710d", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "7792076aef6f85eea0332c80663ec537d388c028", "extension": "p...
2.4375
stackv2
import inspect import os import jinja2 import requests import wsgiadapter from parse import parse from webob import Request from whitenoise import WhiteNoise from kahless.middleware import Middleware from kahless.response import Response class Api: def __init__(self, templates_dir="templates", static_dir="stati...
111
33.38
79
19
714
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_e16f58efc429f959_c0bba235", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 18 ]
[ 20 ]
[ 30 ]
[ 10 ]
2024-11-18T20:10:14.041082+00:00
1,607,893,546,000
def2f7f74aa3aaaece36b3a3e67191b11f485fbd
3
{ "blob_id": "def2f7f74aa3aaaece36b3a3e67191b11f485fbd", "branch_name": "refs/heads/main", "committer_date": 1607893546000, "content_id": "32ecd5e3ec7d31baf388be9316b773fded71a10b", "detected_licenses": [ "MIT" ], "directory_id": "58de327b204c036b5859aeb5eaf6460272ab948e", "extension": "py", "file...
3.234375
stackv2
""" saig0_lib.py Client lib for users (game players). A class that implements the requests library to play the game. The important part is deciding which number to play next, so the user will have to define that function, but there is a basic random selection function included near the botto...
209
29.53
110
16
1,456
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_29a6d080463489c3_1c70656a", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive data (secret)](2) as clear text." ]
[ 65 ]
[ null ]
[ 22 ]
[ 71 ]
2024-11-18T20:23:11.313513+00:00
1,545,399,309,000
18c3908cc6015f96fcc16bc0b8a4a4afea9901ef
2
{ "blob_id": "18c3908cc6015f96fcc16bc0b8a4a4afea9901ef", "branch_name": "refs/heads/master", "committer_date": 1545399309000, "content_id": "2115956364c67e4893acaf59fd70792be0c0fb35", "detected_licenses": [ "MIT" ], "directory_id": "fd987ebcbc5e2b7ab8a1a1ffa84d274b9dc2af4e", "extension": "py", "fi...
2.375
stackv2
import datetime as dt import json import os from pathlib import Path import shutil from flask import Flask, request, render_template, url_for import numpy as np from chessid import detection from chessid import annotator from chessid import classifier STATIC_URL_PATH = Path('/tmp/chess-id') STATIC_URL_PATH.joinpath(...
111
32.87
119
15
874
python
[{"finding_id": "codeql_py/path-injection_b9133e210ce8199e_b83e0a79", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 95, 100 ]
[ null, null ]
[ 5, 21 ]
[ 68, 32 ]
2024-11-18T20:23:18.513187+00:00
1,530,539,703,000
78de303691087be1f18407033358759e93e9aebc
3
{ "blob_id": "78de303691087be1f18407033358759e93e9aebc", "branch_name": "refs/heads/master", "committer_date": 1530539703000, "content_id": "ccbec11fee85757ea3b7d57e983ed157587f3477", "detected_licenses": [ "MIT" ], "directory_id": "3fbf13f6f4c48cfbe91b1a5566484b7b220935e7", "extension": "py", "fi...
3.296875
stackv2
from dataclass import Account from dataclass import Passwords def createaccount(firstname,lastname,email): new_account = Account(firstname,lastname,email) return new_account def saveaccount(account): account.saveaccount() def createcredential(credentialname,password,email): new_account2 = Passwo...
132
36.62
132
16
781
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_dfc84236754f472f_c2927c2b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (passw...
[ 105, 93 ]
[ null, null ]
[ 43, 35 ]
[ 125, 88 ]
2024-11-18T20:23:29.256499+00:00
1,608,115,350,000
c19aa4960c9a6b4701815a475957dbb5ce29bb52
3
{ "blob_id": "c19aa4960c9a6b4701815a475957dbb5ce29bb52", "branch_name": "refs/heads/master", "committer_date": 1608115350000, "content_id": "54fc22fc637e2ced7739435c88e0fa645f39b5a7", "detected_licenses": [ "Apache-2.0" ], "directory_id": "69d1767d7b2f7be7bc46f46fb72f81e1f293642c", "extension": "py"...
2.625
stackv2
# coding:utf-8 # 【谷雨课堂】干货实战 No.036 网站开发之-上传图片并生成图片缩略图 # 作者:谷雨 from flask import Flask,url_for,redirect,render_template,request,Response import time import os import io import mimetypes import xhtml2pdf.pisa as pisa from werkzeug.datastructures import Headers from urllib.parse import quote import xlrd,xlwt from PIL im...
103
22.58
96
15
728
python
[{"finding_id": "codeql_py/reflective-xss_40aec2d4aa8eed1d_ba909b73", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
2
true
[ "CWE-079", "CWE-022" ]
[ "py/reflective-xss", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 91, 60 ]
[ null, null ]
[ 12, 12 ]
[ 13, 47 ]