added
stringlengths
32
32
created
int64
1,244B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.25
source
stringclasses
1 value
text
stringlengths
324
20.1k
num_lines
int64
16
598
avg_line_length
float64
15.1
58.3
max_line_length
int64
33
179
ast_depth
int64
8
39
length
int64
101
3.8k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.1k
265k
sast_codeql_findings_count
int64
1
45
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
45
rule_ids
listlengths
1
45
confidences
listlengths
1
45
severities
listlengths
1
45
messages
listlengths
1
45
line_starts
listlengths
1
45
line_ends
listlengths
1
45
column_starts
listlengths
1
45
column_ends
listlengths
1
45
2024-11-19T03:22:57.920471+00:00
1,520,554,751,000
7d9be018d07a8ef24c90b4ced737242258306e0c
2
{ "blob_id": "7d9be018d07a8ef24c90b4ced737242258306e0c", "branch_name": "refs/heads/master", "committer_date": 1520554751000, "content_id": "721666ef70f0e94f243759afc2128c74442caac9", "detected_licenses": [ "MIT" ], "directory_id": "5e33f6a394f338515b6d91a45a561d48dab143dc", "extension": "py", "fi...
2.390625
stackv2
# !/usr/bin/env python import tensorflow as tf import numpy as np from mnist import model from flask import Flask, render_template, request, jsonify app = Flask(__name__, template_folder='build', static_folder='build') x = tf.placeholder("float", [None, 784]) sess = tf.Session() with tf.variable_scope("convolutional...
73
22.97
76
19
461
python
[{"finding_id": "codeql_py/stack-trace-exposure_7a4455871e7a8645_4685f738", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 51, 69 ]
[ null, null ]
[ 24, 24 ]
[ 36, 36 ]
2024-11-19T01:34:56.521578+00:00
1,506,877,191,000
5ee426fd7a990476fc2ec01da23c870fd3011e95
3
{ "blob_id": "5ee426fd7a990476fc2ec01da23c870fd3011e95", "branch_name": "refs/heads/master", "committer_date": 1518546965000, "content_id": "7c955d886eb0a24b1481b29e7eb1a5d7a53de5d2", "detected_licenses": [ "Apache-2.0" ], "directory_id": "384a7ae46d99978150bd2573c177278d0f2c73f0", "extension": "py"...
2.78125
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- import os import sys import stat import argparse import fileinput import urllib.request import hashlib import tarfile import shutil import subprocess from distutils.dir_util import copy_tree parser = argparse.ArgumentParser() parser.add_argument("-u", "--packageUrl", defa...
105
32
165
14
865
python
[{"finding_id": "codeql_py/overly-permissive-file_a8cbce7a181d0311_7e9d1d34", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
2
true
[ "CWE-732", "CWE-022" ]
[ "py/overly-permissive-file", "py/tarslip" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable.", "This file extraction depends on a [potentially untrusted source](1)." ]
[ 58, 37 ]
[ null, null ]
[ 5, 5 ]
[ 37, 8 ]
2024-11-19T01:45:35.678401+00:00
1,618,980,639,000
ce63b2da566c4bc1957bee5645562b60a9a4b7c6
2
{ "blob_id": "ce63b2da566c4bc1957bee5645562b60a9a4b7c6", "branch_name": "refs/heads/main", "committer_date": 1618980639000, "content_id": "db2e5130f68ed2591740b4da0462cf4b030e42a3", "detected_licenses": [ "MIT" ], "directory_id": "234f8905fb7986cb3d9ec9ec488f2f024fc9508c", "extension": "py", "file...
2.484375
stackv2
# -*- coding: utf-8 -*- import os import random from flask import Blueprint, render_template, request, flash, redirect, url_for, current_app from app.utils import allowed_file blueprint = Blueprint('home', __name__) @blueprint.route('/', methods=['GET', 'POST']) def index(): if request.method == 'POST': ...
45
32.91
92
16
322
python
[{"finding_id": "codeql_py/path-injection_76a42cf1d9926274_4aed2d63", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 24 ]
[ null ]
[ 23 ]
[ 82 ]
2024-11-19T02:07:56.549954+00:00
1,629,289,017,000
eb49fce550c86329988c3c28647e12693d5a52bf
3
{ "blob_id": "eb49fce550c86329988c3c28647e12693d5a52bf", "branch_name": "refs/heads/main", "committer_date": 1629289017000, "content_id": "5638297db10db59f4921bae1d9af0b76d6b7b872", "detected_licenses": [ "MIT" ], "directory_id": "087060dfca821489c4d075043bef21cbe4daba7d", "extension": "py", "file...
3.25
stackv2
import numpy as np import re import pandas as pd from datetime import datetime def extract_cadicateword(doc, max_word_len): """ 提取文档中的候选词汇索引 Parameters: ---------- doc: 输入的剔除了特殊符号的语料 max_word_len: 最长的单词长度 Returns: ------- indexs: 候选词的索引 """ indexes = [] doc_length = l...
301
22.85
128
21
2,193
python
[{"finding_id": "codeql_py/overly-large-range_7c0c779814966aa4_30626081", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 217 ]
[ null ]
[ 39 ]
[ 42 ]
2024-11-19T02:17:30.040424+00:00
1,692,088,724,000
63bc05843ecc71372a9e6127db0539ce29f8861b
3
{ "blob_id": "63bc05843ecc71372a9e6127db0539ce29f8861b", "branch_name": "refs/heads/main", "committer_date": 1692088724000, "content_id": "2f171d21c31a6316941eaee3a87c1f015534c22b", "detected_licenses": [ "MIT" ], "directory_id": "c80d0926964a49d9b136f4d591cd220c54a5ef6b", "extension": "py", "file...
3.046875
stackv2
from branca.element import MacroElement from jinja2 import Template class FloatImage(MacroElement): """Adds a floating image in HTML canvas on top of the map. Parameters ---------- image: str Url to image location. Can also be an inline image using a data URI or a local file using `fi...
53
30.66
76
11
358
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_3cfa539768095b93_260dce25", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 23 ]
[ 45 ]
[ 17 ]
[ 6 ]
2024-11-19T02:17:33.684458+00:00
1,693,516,480,000
163c3552973d37af5ed00b6b34d7289c54a728ac
3
{ "blob_id": "163c3552973d37af5ed00b6b34d7289c54a728ac", "branch_name": "refs/heads/master", "committer_date": 1693516480000, "content_id": "cb0932dad1b2a2e78357eb89f70614713c3d6e95", "detected_licenses": [ "MIT" ], "directory_id": "8f84b0c88c64fcea59aca9bc21af6dc6179d2315", "extension": "py", "fi...
2.546875
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- import os import sys import json from http.server import BaseHTTPRequestHandler from http.server import HTTPServer current_path = os.path.realpath(os.path.dirname(__file__)) DB_FILE = os.path.join(current_path, "database.json") if os.path.exists(DB_FILE): print("Load...
64
27.06
72
15
457
python
[{"finding_id": "codeql_py/http-response-splitting_e5d4787fa0ffaa3f_ee292ee5", "tool_name": "codeql", "rule_id": "py/http-response-splitting", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This HTTP header is constructed from a [user-provided value](1).", "remediation": "", "lo...
1
true
[ "CWE-113" ]
[ "py/http-response-splitting" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This HTTP header is constructed from a [user-provided value](1)." ]
[ 49 ]
[ null ]
[ 38 ]
[ 71 ]
2024-11-19T02:17:47.056667+00:00
1,603,528,725,000
aee0aba26bcee5ce31ca4b5a043fb9f6c39cc17a
2
{ "blob_id": "aee0aba26bcee5ce31ca4b5a043fb9f6c39cc17a", "branch_name": "refs/heads/main", "committer_date": 1603528725000, "content_id": "323a7d9933ae2ceba3a9e4c66b1a6246606a52d7", "detected_licenses": [ "MIT" ], "directory_id": "180eb8503e4770570cf8a84875d21a135390c24e", "extension": "py", "file...
2.328125
stackv2
from app import app import gensim import re from gensim.models import LdaModel from gensim.test.utils import datapath from gensim import corpora, models from gensim.corpora import Dictionary from re import sub import os import string import codecs import nltk def remove_shorts (words): words = re.sub(r'\b\w{1,3...
107
29.11
90
13
830
python
[{"finding_id": "codeql_py/overly-large-range_4da0c24f02520d0e_58704b2d", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 22, 22 ]
[ null, null ]
[ 22, 66 ]
[ 25, 69 ]
2024-11-19T02:17:48.389646+00:00
1,593,345,365,000
6f3f6b433ab76117c3e69dbc482f43c4d6a01d54
3
{ "blob_id": "6f3f6b433ab76117c3e69dbc482f43c4d6a01d54", "branch_name": "refs/heads/master", "committer_date": 1593345365000, "content_id": "ad1d3b21aefca79840be1337c3f504ff0c3dfc3b", "detected_licenses": [ "MIT" ], "directory_id": "6750c7064881bddf643312b29e5e1a8f0b0b4978", "extension": "py", "fi...
2.625
stackv2
from flask import Flask ,render_template,flash,redirect,url_for,session,logging,request from flask_mysqldb import MySQL from functools import wraps from wtforms import Form,StringField,TextAreaField,PasswordField,validators from passlib.hash import sha256_crypt app=Flask(__name__) app.secret_key="erahalil28" app.con...
237
34.1
127
18
1,853
python
[{"finding_id": "codeql_py/flask-debug_56f5850c69adc6e0_fae84b04", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 235, 181 ]
[ null, null ]
[ 9, 12 ]
[ 28, 29 ]
2024-11-19T02:17:49.951890+00:00
1,598,254,615,000
10ec2b787c57a8c04dad696cb8ab2581b4ccfede
3
{ "blob_id": "10ec2b787c57a8c04dad696cb8ab2581b4ccfede", "branch_name": "refs/heads/master", "committer_date": 1598254615000, "content_id": "49c74fb17f9230c556317078aaf30b64ef70a95e", "detected_licenses": [ "MIT" ], "directory_id": "a3739997cead91f7b8e2910ac680897a9e781a04", "extension": "py", "fi...
3.234375
stackv2
import hashlib from random import choice from .config import salt_dictionary, numbers, letters, symbols from zxcvbn import zxcvbn from math import log def hash_it(password, hash_type='sha256', salting=False, static_salt='', salt_length=6, local_parameter=''): def hash_password(word, hashing_type): ...
125
27.98
103
15
788
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_74c02fd1e9e48369_1c861a2b", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e...
[ 19 ]
[ null ]
[ 32 ]
[ 45 ]
2024-11-19T02:18:06.329556+00:00
1,546,813,044,000
3a1ea798b5dff18b25bd6bbb5576dd40b422435e
2
{ "blob_id": "3a1ea798b5dff18b25bd6bbb5576dd40b422435e", "branch_name": "refs/heads/master", "committer_date": 1546813044000, "content_id": "efe9dd4420deceaf959f78ebae97771fc720982a", "detected_licenses": [ "MIT" ], "directory_id": "11b0b0cebfc70acfb6f00c8813d4de896b09d67c", "extension": "py", "fi...
2.421875
stackv2
from flask import render_template, flash, redirect, url_for, request from flask_login import current_user, login_user, logout_user, login_required from werkzeug.urls import url_parse from app import app from app.forms import * from app.models import * from app import db import random @app.route('/') @app.route('/inde...
167
35.92
113
17
1,272
python
[{"finding_id": "codeql_py/url-redirection_6f1ff54ea97d6a0d_a3c07642", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 32 ]
[ null ]
[ 25 ]
[ 34 ]
2024-11-19T02:18:13.461884+00:00
1,599,563,435,000
9eab65106cfd2a91ae3f1df40ce40e862a79e66a
4
{ "blob_id": "9eab65106cfd2a91ae3f1df40ce40e862a79e66a", "branch_name": "refs/heads/master", "committer_date": 1599563435000, "content_id": "3b2e002f0b80b23d6635f5491a82d4d7b3ea5a8a", "detected_licenses": [ "MIT" ], "directory_id": "300def8465a20362e9f96d99653f97aa1890032d", "extension": "py", "fi...
4.5
stackv2
import time from datetime import date def menu_for_main(my_dict): """ :param my_dict: :return: None """ month_list = ['January', 'February', 'March', 'April', 'May', 'June', 'July', 'Auguste', 'September', 'October', 'November', 'December'] while True: print(""" ...
59
36.71
118
22
559
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_93b12599cf207371_7d90a913", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 27 ]
[ null ]
[ 42 ]
[ 79 ]
2024-11-19T02:29:53.158758+00:00
1,675,072,728,000
8add55cfd636b89d60cfc0d8fea51dda43bde848
2
{ "blob_id": "8add55cfd636b89d60cfc0d8fea51dda43bde848", "branch_name": "refs/heads/master", "committer_date": 1675072728000, "content_id": "8c8dff3a2bc16f56f8a5ac51ca153c78d6b8cac8", "detected_licenses": [ "MIT" ], "directory_id": "60bfe693f0c9442faca6460d1aaa3b415d14e371", "extension": "py", "fi...
2.4375
stackv2
''' Caution -------- Using this script for any malicious purpose is prohibited and against the law. Please read SourceForge terms and conditions carefully. Use it on your own risk. ''' # Python For Offensive PenTest # Source Forge Docs # http://sourceforge.net/p/forge/documentation/File%20Management/ # https://sou...
62
30.58
153
8
449
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_7cad321416d332c5_31122119", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 38 ]
[ null ]
[ null ]
[ 65 ]
2024-11-19T02:30:10.132750+00:00
1,458,679,979,000
5ea2f7837a3d7f08b58ce1e0c29f9909e12c87ae
3
{ "blob_id": "5ea2f7837a3d7f08b58ce1e0c29f9909e12c87ae", "branch_name": "refs/heads/master", "committer_date": 1458679979000, "content_id": "4cc55430ac45263e3e58cee263c33851e53985d1", "detected_licenses": [ "MIT" ], "directory_id": "9ee50f80c7a73488e6785ede765dee5dd52d363f", "extension": "py", "fi...
2.828125
stackv2
#!/usr/bin/env python ''' NagiosReportGenerator - Generate HTML status report Script that fetches the status page as json from nagios and generates a HTML-mail from it Copyright (c) 2014 digIT (Eda) 14/15 ''' import time import sys import datetime from optparse import OptionParser import requests NAGIOS_STATUS = {2...
163
32.27
79
17
1,296
python
[{"finding_id": "codeql_py/request-without-cert-validation_b32a377bc607b7fe_c754d8e5", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 61 ]
[ 64 ]
[ 20 ]
[ 46 ]
2024-11-19T02:41:45.487610+00:00
1,525,273,324,000
6260587db052374aa554ef5137fa5e1d6ba142d5
3
{ "blob_id": "6260587db052374aa554ef5137fa5e1d6ba142d5", "branch_name": "refs/heads/master", "committer_date": 1525273324000, "content_id": "eeae3e223a5463b5de03a0155541ff3f548fc5db", "detected_licenses": [ "Apache-2.0" ], "directory_id": "9c4cbbc6184f7c1699612d9e5bd6f3a2b164efc5", "extension": "py"...
2.515625
stackv2
# # # .SYNOPSIS # PowerIQ - Raritan Rack PDU API Data to Grafana using InfluxDB # # .DESCRIPTION # This script speaks to the PowerIQ API and transfers the pdu information # The information provided gives us the currently power reading, unutilized capacity, # along with the watt hour & delta. # # .NOTES # Name: ...
143
36.57
149
10
1,311
python
[{"finding_id": "codeql_py/request-without-cert-validation_72783cfcfd348d4b_3e3c256e", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 90, 91 ]
[ null, null ]
[ 9, 9 ]
[ 62, 62 ]
2024-11-19T02:41:49.562120+00:00
1,461,727,419,000
c2102ea6c81346a4fae5a33b9a5a8f18641ccdfb
3
{ "blob_id": "c2102ea6c81346a4fae5a33b9a5a8f18641ccdfb", "branch_name": "refs/heads/master", "committer_date": 1461727419000, "content_id": "dc8e1dcf825cef137e9f3a3a9cb4e374e142a37b", "detected_licenses": [ "MIT" ], "directory_id": "7c1d71617645f45335ab18ed7aac1b9688c7bf1e", "extension": "py", "fi...
2.515625
stackv2
#coding=utf8 import requests from urllib import unquote import json, sys, time import getpass DEBUG = True class Oauth(): config = { True:{ 'key': '', 'secret': '', 'url': 'sandbox.evernote.com' }, False:{ 'key'...
93
37.45
114
24
829
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_c7323b51d7f557a0_5bd5a4b9", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 80 ]
[ 84 ]
[ 21 ]
[ 19 ]
2024-11-19T02:42:00.327717+00:00
1,553,711,337,000
33f5bb74ce10f8699d991dc96f600f18aa56c315
2
{ "blob_id": "33f5bb74ce10f8699d991dc96f600f18aa56c315", "branch_name": "refs/heads/master", "committer_date": 1553711337000, "content_id": "dd9ded4644cfe107096304125ec24c370fad95e9", "detected_licenses": [ "MIT" ], "directory_id": "0ee52d4a9e906c6c2bed3648c7976e1cac723619", "extension": "py", "fi...
2.421875
stackv2
import base64 from datetime import datetime, timedelta from functools import wraps import pytz from flask import Flask, request, jsonify, Response from icalendar import Calendar, Event from njupt import Card, Zhengfang, RunningMan from njupt.exceptions import AuthenticationException, NjuptException from utils.store im...
276
29.51
84
18
2,009
python
[{"finding_id": "codeql_py/stack-trace-exposure_bd7dcf7935dcbdee_f42c7243", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-215" ]
[ "py/stack-trace-exposure", "py/flask-debug" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger." ]
[ 43, 276 ]
[ 47, null ]
[ 24, 5 ]
[ 10, 51 ]
2024-11-19T02:42:21.193655+00:00
1,636,123,558,000
e01e4641e7f07cb9d811591c3c3de66204631c5d
3
{ "blob_id": "e01e4641e7f07cb9d811591c3c3de66204631c5d", "branch_name": "refs/heads/master", "committer_date": 1636123558000, "content_id": "5ebf8e997d7264cb9e7242809abc4e5fc74ee477", "detected_licenses": [ "MIT" ], "directory_id": "e2c1400201930c650c3683ffe134705dbc1f8f96", "extension": "py", "fi...
2.515625
stackv2
from datetime import datetime from typing import Type from decouple import config from hashlib import sha1 from pydantic import BaseModel def clean_signature_value(value: str): """ According to the docs spaces are removed """ return str(value).replace(" ", "") def build_signature(**kwargs): re...
65
24.8
95
13
379
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_ff85bd62df5f99a2_103230dc", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecu...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecure." ]
[ 41 ]
[ null ]
[ 22 ]
[ 39 ]
2024-11-19T02:42:23.307373+00:00
1,515,190,314,000
de2f3caeec4fa02047134e17ee676f32adaf7383
2
{ "blob_id": "de2f3caeec4fa02047134e17ee676f32adaf7383", "branch_name": "refs/heads/master", "committer_date": 1515190314000, "content_id": "5e385c34d8822d7da39bf2a79f1ae122ea61273c", "detected_licenses": [ "MIT" ], "directory_id": "553c0520cc3f066ec0fa96b045fb304f10a0c91b", "extension": "py", "fi...
2.40625
stackv2
#!/usr/bin/env python3 import hashlib import imaplib import os.path import uuid import jinja2 import maya import yaml def read_config(filename='settings.yml'): """Read the configuration from the YAML config file.""" with open(filename, 'r') as fh: return yaml.load(fh.read()) def parse_headers(head...
108
32.13
86
13
852
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_c7b0d5d4a32252ab_d9c408d5", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 77 ]
[ null ]
[ 11 ]
[ 67 ]
2024-11-18T18:05:48.436459+00:00
1,635,105,119,000
52106f391a83977412d0aded3a7ba6b532421cb1
2
{ "blob_id": "52106f391a83977412d0aded3a7ba6b532421cb1", "branch_name": "refs/heads/main", "committer_date": 1635105119000, "content_id": "048cf71fd648c2617d739d2bbf25020f89822243", "detected_licenses": [ "MIT" ], "directory_id": "58c67f650dbab693855d6cfab3ad37686dea0fef", "extension": "py", "file...
2.453125
stackv2
# from yt_dlp_local.yt_dlp.YoutubeDL import YoutubeDL import yt_dlp import flask from flask import request, send_file, jsonify import os from flask_cors import cross_origin app = flask.Flask(__name__) app.config["DEBUG"] = True print('App started and working! Yay!') @app.route('/wakeup', methods=['GET']) @cross_origi...
41
25.66
86
13
281
python
[{"finding_id": "codeql_py/path-injection_915f4b590e466a51_a003abc1", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 29, 41 ]
[ null, null ]
[ 18, 26 ]
[ 39, 30 ]
2024-11-18T18:05:58.033788+00:00
1,595,380,838,000
2915475203a93d0edcbbc63020130f09bd79db88
5
{ "blob_id": "2915475203a93d0edcbbc63020130f09bd79db88", "branch_name": "refs/heads/master", "committer_date": 1595380838000, "content_id": "f0c5d258ee1cdab84b7479eef4c238aa89597652", "detected_licenses": [ "MIT" ], "directory_id": "8440c8dabb136769bbf70d7b34eedf8a879d80d1", "extension": "py", "fi...
4.53125
stackv2
import string def isWordGuessed(secretWord, lettersGuessed): ''' secretWord: string, the word the user is guessing lettersGuessed: list, what letters have been guessed so far returns: boolean, True if all the letters of secretWord are in lettersGuessed; False otherwise ''' result = True ...
133
30.6
84
21
887
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0819ac417653d1b8_886a9f24", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi...
5
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](...
[ 112, 119, 105, 133, 116 ]
[ 113, 120, 106, null, 117 ]
[ 27, 23, 19, 15, 27 ]
[ 61, 57, 53, 83, 61 ]
2024-11-18T18:16:05.048139+00:00
1,674,402,898,000
40c9ffa83c22c8bd6e172107ecbf1be30321c42b
3
{ "blob_id": "40c9ffa83c22c8bd6e172107ecbf1be30321c42b", "branch_name": "refs/heads/master", "committer_date": 1674402898000, "content_id": "018a6bcd981a365b77e74c15e2c87dd4ae3cee12", "detected_licenses": [ "Apache-2.0" ], "directory_id": "617033c057120a089afb22d22f996d7bcac7c863", "extension": "py"...
2.703125
stackv2
""" putJSONdata.py Copyright 2016 OSIsoft, LLC. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or a...
103
35.18
118
14
838
python
[{"finding_id": "codeql_py/request-without-cert-validation_b7fc88c6a472d9bd_0936b9cb", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 88 ]
[ null ]
[ 12 ]
[ 56 ]
2024-11-18T19:23:54.595869+00:00
1,668,716,547,000
c0409cad42f4ac66a620529d4dfccb3dd9ce4f26
2
{ "blob_id": "c0409cad42f4ac66a620529d4dfccb3dd9ce4f26", "branch_name": "refs/heads/master", "committer_date": 1668716547000, "content_id": "983328a230627ef8fd497eaccaa384b8198a5118", "detected_licenses": [ "MIT" ], "directory_id": "f7bad879bb892547b5c356e8fe4bb517f05fef26", "extension": "py", "fi...
2.453125
stackv2
from get_from_netbox import devices, vlans from jinja2 import Template with open("templates/vlan_configuration.j2") as f: vlan_template = Template(f.read()) with open("templates/interface_configuration.j2") as f: interface_template = Template(f.read()) for device in devices: print("Device {} of role {}"...
28
35.36
79
11
221
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_15bf623ab9edbd83_874de2de", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 6, 8 ]
[ null, null ]
[ 21, 26 ]
[ 39, 44 ]
2024-11-18T19:24:02.727711+00:00
1,633,076,336,000
2fb87115ba2056b8d3b7c0d074c2810e2040c8dc
2
{ "blob_id": "2fb87115ba2056b8d3b7c0d074c2810e2040c8dc", "branch_name": "refs/heads/master", "committer_date": 1633076336000, "content_id": "4a06a74360ac66da1d23948864c6c56c86a35f5f", "detected_licenses": [ "MIT" ], "directory_id": "e037a07e652b320275cf90f798e613aa2d7fb511", "extension": "py", "fi...
2.359375
stackv2
""" Makes it easy and painless to deploy the site and make all necessary changes so that it's immediately ready to serve in production. """ import glob import json import os import shlex import subprocess import sys from colorama import Fore, Style import data_util import js_compilation # Files and directories that...
205
29.41
118
18
1,531
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_742b0d56b036880c_32fefea6", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 162 ]
[ null ]
[ 17 ]
[ 25 ]
2024-11-18T19:58:32.080292+00:00
1,588,651,828,000
e3aff0752e53ba9cca7878d729ed6469d14ebd95
2
{ "blob_id": "e3aff0752e53ba9cca7878d729ed6469d14ebd95", "branch_name": "refs/heads/master", "committer_date": 1588651828000, "content_id": "ad2c08387b944fdc81830dfc3a4cb93c9a20c7cf", "detected_licenses": [ "Apache-2.0" ], "directory_id": "534f521454380703a0d42eefaa5609a5e4926aa8", "extension": "py"...
2.4375
stackv2
############################################################################ # database.py is to create database ,scheme ,table and query in Azure # # Section azuresqldb added in the file # ############################################################################ import argp...
375
35.41
165
16
3,278
python
[{"finding_id": "codeql_py/sql-injection_2edd1e9cd1140e4d_adebf0c8", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown...
2
true
[ "CWE-089", "CWE-089" ]
[ "py/sql-injection", "py/sql-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This SQL query depends on a [user-provided value](1).", "This SQL query depends on a [user-provided value](1)." ]
[ 291, 309 ]
[ null, null ]
[ 17, 18 ]
[ 22, 23 ]
2024-11-18T19:58:33.962017+00:00
1,609,342,402,000
bc29c0bac30b4ab7d79f4d9ee610334b0c9a93cb
3
{ "blob_id": "bc29c0bac30b4ab7d79f4d9ee610334b0c9a93cb", "branch_name": "refs/heads/master", "committer_date": 1609342402000, "content_id": "038f3e66deb5968c4cd8eee410b14770ffc6dfaf", "detected_licenses": [ "MIT" ], "directory_id": "18534d74c15482ff5d507c71e30e5b805ca74aa5", "extension": "py", "fi...
3.03125
stackv2
"""Client for Open Chat Bot. Example of usage: from openchatbotclient.client import client myclient = client('bot.domain.com', 8443, path='api') response = myclient.ask("my-userId", "hello") In this case next GET request will be invoked: https://bot.domain...
197
31.54
130
19
1,437
python
[{"finding_id": "codeql_py/request-without-cert-validation_6801dbfafefc1b65_9010783f", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 186, 188 ]
[ null, null ]
[ 17, 17 ]
[ 97, 131 ]
2024-11-18T19:58:39.827099+00:00
1,422,693,713,000
59773c8bac8f1a33962f2d0619782acbe847f31c
2
{ "blob_id": "59773c8bac8f1a33962f2d0619782acbe847f31c", "branch_name": "refs/heads/master", "committer_date": 1422693713000, "content_id": "3dcab5d9ebb6b9f96386b2b60489caedc2658637", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e5d7a382d74b6e55d75e6c0a2572ef392cee572d", "extension": "py"...
2.5
stackv2
#!/usr/bin/env python """ PyFlex flexconfig.py is the configuration parser for PyFlex """ #TODO: Consider use of the leading underscore for private methods # Need to have a configuration validator. Unrealistic to be completely # exhaustive, but the simple stuff like ensuring no VLAN overlap, # similarly named ...
33
32.91
72
13
237
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_69ccad3e3c0efb8e_113d533b", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 20 ]
[ null ]
[ 7 ]
[ 59 ]
2024-11-18T18:39:29.477658+00:00
1,524,742,870,000
373372a81054a8abb0ef352b8c8743eb3ec72b21
3
{ "blob_id": "373372a81054a8abb0ef352b8c8743eb3ec72b21", "branch_name": "refs/heads/master", "committer_date": 1524742870000, "content_id": "cd1a8eb2457232043116c09ff53a6ea8572f80d8", "detected_licenses": [ "MIT" ], "directory_id": "c4ab1297b63e50d9ff544505bed7fe345288aed5", "extension": "py", "fi...
2.6875
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- import yaml import os import argparse import itertools class color: PURPLE = '\033[95m' CYAN = '\033[96m' DARKCYAN = '\033[36m' BLUE = '\033[94m' GREEN = '\033[92m' YELLOW = '\033[93m' RED = '\033[91m' BOLD = '\033[1m' UNDERLINE = '\033[4m' ...
179
28.17
132
16
1,382
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a02ff4c59741e16c_b3caac43", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text." ]
[ 172 ]
[ null ]
[ 15 ]
[ 26 ]
2024-11-18T18:39:29.641615+00:00
1,535,467,211,000
4dc3dd45388fcc5f5986beab6e3b69d6ecf42830
3
{ "blob_id": "4dc3dd45388fcc5f5986beab6e3b69d6ecf42830", "branch_name": "refs/heads/master", "committer_date": 1535467211000, "content_id": "e40742809a9c7d4134852d9f524f89185e64c803", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "4b35d6820aa1ca27ec95e190acda57a62bc3e62e", "extension": "p...
2.625
stackv2
import base64 from Crypto.Cipher import AES import FirebaseFunctions import fbchat from fbchat.models import Message systemKey = b"here-goes-the-key-you-want-to-use-for-encryption" def UserPasswordDecrypt(udd): cipher = AES.new(udd["Key"], AES.MODE_EAX, base64.b64decode(udd["Nonce"])) depass = cipher.decrypt_...
93
28.51
99
12
683
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_da3e7ad3ba2d396e_747e5b6f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 51 ]
[ null ]
[ 11 ]
[ 32 ]
2024-11-18T18:39:30.789578+00:00
1,559,925,518,000
bdf0ac30ecb31111701db46634ef9c4affd00e32
3
{ "blob_id": "bdf0ac30ecb31111701db46634ef9c4affd00e32", "branch_name": "refs/heads/master", "committer_date": 1559925518000, "content_id": "610e9c7471f5c7a566b3bb0afce54e26f9ab4e99", "detected_licenses": [ "MIT" ], "directory_id": "f9a763568c77824f231c6440c2ecfcd6abc89380", "extension": "py", "fi...
2.6875
stackv2
import http.server import socketserver PORT = 8000 class Serv(http.server.SimpleHTTPRequestHandler): def do_GET(self): if self.path == '/': self.path = '../index.html' try: file_to_open = open(self.path[1:]).read() self.send_response(200) except: ...
20
26.8
57
16
134
python
[{"finding_id": "codeql_py/path-injection_7652f5f17818e5fc_056f06a2", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 11 ]
[ null ]
[ 33 ]
[ 46 ]
2024-11-18T18:39:33.534788+00:00
1,501,253,936,000
6d2e397b8a015011cabf42cbfd4d50fcdc20301e
3
{ "blob_id": "6d2e397b8a015011cabf42cbfd4d50fcdc20301e", "branch_name": "refs/heads/master", "committer_date": 1501253936000, "content_id": "fb6d039122ab901238e65c67304ad58fed56f21e", "detected_licenses": [ "MIT" ], "directory_id": "d8c03a9848c254896f868dc1c8ecaa63594ee374", "extension": "py", "fi...
2.890625
stackv2
import urllib2 import BeautifulSoup from collections import deque from sets import Set from app import db, models import re from urlparse import urlparse from InvertedIndex import InvertedIndex # A Crawler class that explores a set of web pages, and adds # them to some storage (currently not implemented). This class #...
107
34.9
113
17
821
python
[{"finding_id": "codeql_py/bad-tag-filter_a53841d5916aab8d_380000e2", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression does not match comments containing newlines.", "remediation": "", "location": {"file_pat...
1
true
[ "CWE-116" ]
[ "py/bad-tag-filter" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression does not match comments containing newlines." ]
[ 71 ]
[ null ]
[ 28 ]
[ 37 ]
2024-11-18T18:39:37.859493+00:00
1,544,982,851,000
7e07925e3bc1fc7783df28dd823d911877c44a24
2
{ "blob_id": "7e07925e3bc1fc7783df28dd823d911877c44a24", "branch_name": "refs/heads/master", "committer_date": 1545122518000, "content_id": "5131ee5ff0e9efe95f68edbd1ac9063957fdd9fe", "detected_licenses": [ "Apache-2.0" ], "directory_id": "a182168f58252ed93926da5dd1c7a4b1266eea42", "extension": "py"...
2.359375
stackv2
#!/usr/bin/env python3 import cgi, cgitb import re import sys, os from subprocess import check_output, Popen, PIPE, STDOUT, CalledProcessError from os.path import expanduser cgitb.enable() home_dir = expanduser("~") os.environ['HOME'] = home_dir def check_form(formvars, form): for varname in formvars: if ...
101
36.14
118
25
899
python
[{"finding_id": "codeql_py/command-line-injection_bb8ec4cfdfffbc2c_fbc8ecdd", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {...
2
true
[ "CWE-078", "CWE-078" ]
[ "py/command-line-injection", "py/command-line-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This command line depends on a [user-provided value](1).", "This command line depends on a [user-provided value](1)." ]
[ 31, 72 ]
[ null, null ]
[ 33, 31 ]
[ 46, 42 ]
2024-11-18T18:40:04.202239+00:00
1,509,681,154,000
bb2c69709d2d23137bae63444f3a86346ecae572
3
{ "blob_id": "bb2c69709d2d23137bae63444f3a86346ecae572", "branch_name": "refs/heads/master", "committer_date": 1509681154000, "content_id": "5b522b946d17bf1f1eebb0c346cb4fa0e639f55f", "detected_licenses": [ "MIT" ], "directory_id": "b5c9b93e6116c7c89e15d604286a6b4e4b35c674", "extension": "py", "fi...
2.921875
stackv2
import argparse import hashlib import os from bs4 import BeautifulSoup as bs import requests from time import ctime, time address = "http://hotspot.abu.edu.ng/login" def main(): try: parser = argparse.ArgumentParser() parser.add_argument("-u", "--usernames", help="specify a file containing list o...
132
38.08
116
22
1,197
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_5667a5feb07c2c5f_4608dc5c", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
6
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-327" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (password)](3) as clear text.\nThis expression stores [sensitive data (password)](4) as clear text.\nThis expression stores [sensitive d...
[ 57, 66, 35, 58, 61, 112 ]
[ null, null, null, null, null, null ]
[ 33, 21, 19, 31, 31, 28 ]
[ 54, 27, 116, 72, 104, 46 ]
2024-11-18T18:40:05.881498+00:00
1,507,559,646,000
7f8a0a9a215acb08d2051b3ac45606c91d736601
3
{ "blob_id": "7f8a0a9a215acb08d2051b3ac45606c91d736601", "branch_name": "refs/heads/master", "committer_date": 1507559646000, "content_id": "53bb391454e7fec8016d285f5e714e5920319805", "detected_licenses": [ "MIT" ], "directory_id": "3f6c8d60e6c18ef28b6384eb421793738c53babe", "extension": "py", "fi...
2.78125
stackv2
import requests import os from urllib3.exceptions import HTTPError class Notifier(object): def __init__(self): #Make sure we have the appropriate keys self._auth_token = os.getenv('GREASE_HIPCHAT_TOKEN', '') self._hipchat_room = os.getenv('GREASE_HIPCHAT_ROOM', '') self._base_url ...
43
29.14
99
13
291
python
[{"finding_id": "codeql_py/request-without-cert-validation_76729ca3c6e85982_aca565ec", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 32 ]
[ 36 ]
[ 30 ]
[ 14 ]
2024-11-18T18:47:04.484483+00:00
1,485,007,360,000
b2cfd31066c207858f71d9259867d4baceee4181
2
{ "blob_id": "b2cfd31066c207858f71d9259867d4baceee4181", "branch_name": "refs/heads/master", "committer_date": 1485007360000, "content_id": "2481e88b50a2d65492656e59649129fdbd2f0ec5", "detected_licenses": [ "MIT" ], "directory_id": "d21482784381f58a76f7c9561f591314840b19de", "extension": "py", "fi...
2.359375
stackv2
import hashlib from flask import Flask,request app = Flask(__name__) @app.route('/') def wx_verify(): signature = request.args.get('signature', '') timestamp = request.args.get('timestamp', '') nonce = request.args.get('nonce', '') echostr = request.args.get('echostr', '') #PUT YOUR TOKEN HERE token = '' L = [t...
21
22.24
46
11
132
python
[{"finding_id": "codeql_py/reflective-xss_c47b09f4ad9184eb_bba83c41", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 18 ]
[ null ]
[ 10 ]
[ 17 ]
2024-11-18T18:47:04.704544+00:00
1,479,403,950,000
4cc835226d59b7f771494ebe7d3288fab788bf54
2
{ "blob_id": "4cc835226d59b7f771494ebe7d3288fab788bf54", "branch_name": "refs/heads/master", "committer_date": 1479403950000, "content_id": "d93c38479e191075b01c04d3b310670b3fbfb8f7", "detected_licenses": [ "Apache-2.0" ], "directory_id": "8a25ada37271acd5ea96d4a4e4e57f81bec221ac", "extension": "py"...
2.421875
stackv2
import logging import syslog from passlib.hash import sha512_crypt import ajenti import ajenti.usersync from ajenti.api import * def restrict(permission): """ Marks a decorated function as requiring ``permission``. If the invoking user doesn't have one, :class:`SecurityError` is raised. """ def d...
171
27.16
89
21
1,005
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_77f340198c4526cb_421b031d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 81 ]
[ null ]
[ 26 ]
[ 29 ]
2024-11-18T19:49:13.359226+00:00
1,678,369,848,000
da4e55d651b51dfc98ac701458304355d141c097
3
{ "blob_id": "da4e55d651b51dfc98ac701458304355d141c097", "branch_name": "refs/heads/main", "committer_date": 1678369848000, "content_id": "e8859c91bd7da9ef2ef105bdf3a7092e5d3b3118", "detected_licenses": [ "MIT" ], "directory_id": "6ba36dc571dff7c112ed6f0038f836376876f6c1", "extension": "py", "file...
2.546875
stackv2
"""Login/logout.""" from datetime import datetime, timedelta import logging import os import re from typing import cast, Dict, Tuple import urllib.parse import hashlib import base64 from pymongo.database import Database from ldap3 import Server, Connection, ALL from ldap3.core import exceptions import bottle from da...
95
38.58
115
16
869
python
[{"finding_id": "codeql_py/ldap-injection_d071e908c0917ced_69b5c3a2", "tool_name": "codeql", "rule_id": "py/ldap-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "LDAP query parameter (filter) depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
3
true
[ "CWE-090", "CWE-327", "CWE-117" ]
[ "py/ldap-injection", "py/weak-sensitive-data-hashing", "py/log-injection" ]
[ "HIGH", "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "LDAP query parameter (filter) depends on a [user-provided value](1).", "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that...
[ 73, 49, 80 ]
[ null, null, null ]
[ 39, 24, 56 ]
[ 76, 48, 64 ]
2024-11-18T19:49:15.751199+00:00
1,599,055,756,000
b790ba54095af40fb62b99196407ad6fbb6b4b54
3
{ "blob_id": "b790ba54095af40fb62b99196407ad6fbb6b4b54", "branch_name": "refs/heads/master", "committer_date": 1599055756000, "content_id": "30d40e30e06cb76e747134b1bacf92e6371906b7", "detected_licenses": [ "MIT" ], "directory_id": "382d5b7c18a98e48a53358da0db2d21f11b38eb8", "extension": "py", "fi...
2.890625
stackv2
from finviz.helper_functions.error_handling import ConnectionTimeout from finviz.config import connection_settings from user_agent import generate_user_agent from lxml import html import asyncio import aiohttp import requests import urllib3 urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning) def http...
81
37
119
19
597
python
[{"finding_id": "codeql_py/request-without-cert-validation_9333676e50a7f53e_bfb51824", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 23 ]
[ null ]
[ 23 ]
[ 117 ]
2024-11-18T20:15:43.533971+00:00
1,400,229,600,000
1937bd504db363d15528c2d95f5cc013ea861d48
2
{ "blob_id": "1937bd504db363d15528c2d95f5cc013ea861d48", "branch_name": "refs/heads/master", "committer_date": 1400229600000, "content_id": "052a794c692789d1c037ae124275c5a0de11e719", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "2539b3eae49b03f6dd9ae1b0efd16a9157f7a024", "extension": "p...
2.4375
stackv2
# -*- coding: utf-8 -*- """ decorators.sslview ~~~~~~~~~~~~~~~~~~ SSL for particular views http://flask.pocoo.org/snippets/93/ """ import os import sys sys.path.insert(0, os.path.dirname(os.path.abspath(os.path.dirname(__file__)))) from functools import wraps from flask import request, current_app, r...
42
19.29
79
18
199
python
[{"finding_id": "codeql_py/url-redirection_4fb17d9d4ac12981_416427d9", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 27 ]
[ null ]
[ 33 ]
[ 75 ]
2024-11-18T20:15:49.875616+00:00
1,607,610,465,000
591047fb2f63879c40934c1f17741b73b1f15f6a
3
{ "blob_id": "591047fb2f63879c40934c1f17741b73b1f15f6a", "branch_name": "refs/heads/main", "committer_date": 1607610465000, "content_id": "ac5d14b58c09aa2aee5dd4be8b2da40a5543ced5", "detected_licenses": [ "MIT" ], "directory_id": "4afaa6a51749724eb4dbf988ea8d6ec837869248", "extension": "py", "file...
3.046875
stackv2
import streamlit as st import pandas as pd import numpy as np import nltk import numpy as np from sklearn.metrics.pairwise import cosine_similarity from sentence_transformers import SentenceTransformer, util import copy import random import requests from bs4 import BeautifulSoup import random import time from newspaper...
333
39.12
168
24
3,116
python
[{"finding_id": "codeql_py/full-ssrf_f335d4e8a54a2c89_108ee6fe", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).\nThe full URL of this request depends on a [user-...
1
true
[ "CWE-918" ]
[ "py/full-ssrf" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1).\nThe full URL of this request depends on a [user-provided value](2)." ]
[ 38 ]
[ null ]
[ 20 ]
[ 37 ]
2024-11-18T20:15:53.567677+00:00
1,690,982,654,000
9c429caea5548a9c47159c323d6fa9eeb61848b7
3
{ "blob_id": "9c429caea5548a9c47159c323d6fa9eeb61848b7", "branch_name": "refs/heads/master", "committer_date": 1690982654000, "content_id": "b5933f9037b9b9d97ca31ff3f783e5d78569bcc5", "detected_licenses": [ "MIT" ], "directory_id": "73f1b44b6ece5d3faa918f69e293e281603f40f5", "extension": "py", "fi...
2.671875
stackv2
''' Hacky KeePass file decrypt script Based on https://gist.github.com/Evidlo/8bc69fb58dcd0c9e6ce748b6f2cb59f7 Modified to work with cryptography - some stuff from pycryptodome as cryptography does not have salsa20 ''' import struct import hashlib import zlib import codecs from xml.etree import ElementTree import base6...
196
39.13
149
18
1,782
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_b44bb980a782c6c1_98e34dae", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
3
true
[ "CWE-327", "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.", "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) th...
[ 148, 136, 139 ]
[ null, null, null ]
[ 31, 45, 40 ]
[ 64, 69, 58 ]
2024-11-18T20:15:57.918487+00:00
1,628,277,090,000
40e5afb8e3b0e342bbbc81dcabcbb1f54ecda1eb
3
{ "blob_id": "40e5afb8e3b0e342bbbc81dcabcbb1f54ecda1eb", "branch_name": "refs/heads/master", "committer_date": 1628277090000, "content_id": "be5ff3c44a6e77a6f26bc0c316eef8df2ec214b6", "detected_licenses": [ "MIT" ], "directory_id": "0b53961f719f1b9a9268a243ff71dcc9ef96e78a", "extension": "py", "fi...
3.1875
stackv2
""" You can run this by just doing python3 simpleWebServer.py It will then listen for any POST requests on port 8000, and work it's magic from there. """ from http.server import BaseHTTPRequestHandler, HTTPServer import json import requests import os """ The HTTP request handler """ class RequestHandler(BaseHTTPRequ...
54
29.3
98
15
395
python
[{"finding_id": "codeql_py/full-ssrf_0a5c53fb5adc4ce4_0e4aad98", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
1
true
[ "CWE-918" ]
[ "py/full-ssrf" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1)." ]
[ 43 ]
[ null ]
[ 11 ]
[ 99 ]
2024-11-18T20:16:04.687042+00:00
1,521,474,384,000
347685434db701eec6eb68853adfc34abe3c79f0
3
{ "blob_id": "347685434db701eec6eb68853adfc34abe3c79f0", "branch_name": "refs/heads/master", "committer_date": 1521474384000, "content_id": "2d54c4931343ab44f075c4995b2d6c43ae15c544", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e2968f00d50783eea952d8e7ffbcab45d2b358c2", "extension": "py"...
3.046875
stackv2
import abc import pandas as pd from pycaishen.pycaishenstorage import PycaishenStorage from pycaishen.user_programs.user_programs_settings import Configurer import os import ntpath import time as t # to use the date to name our file import zipfile import requests class IO_Files(object): current_directory = os...
342
32.19
145
26
2,454
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_6c2a28a54c8c0f39_99cf306f", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 164, 153 ]
[ null, null ]
[ 24, 16 ]
[ 33, 56 ]
2024-11-18T19:23:08.724713+00:00
1,630,944,333,000
8ecd059a9ad19b964f24b6cbe6d4a1e0d7804918
2
{ "blob_id": "8ecd059a9ad19b964f24b6cbe6d4a1e0d7804918", "branch_name": "refs/heads/master", "committer_date": 1630944333000, "content_id": "3c7b3938b401300dc52b5ac06a80e89037586627", "detected_licenses": [ "MIT" ], "directory_id": "2bac949499515c749011d4d2f93a08e4535eeeac", "extension": "py", "fi...
2.453125
stackv2
import json import time import jwt from django.shortcuts import render from django.http import JsonResponse from user.models import UserProfile import hashlib from django.conf import settings # 异常码10200-10299 # Create your views here. def tokens(request): if request.method != 'POST': result = {'code': 10...
44
29.32
78
12
347
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_24eb87b768a1556e_6aec21cf", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 29 ]
[ null ]
[ 16 ]
[ 33 ]
2024-11-18T19:38:25.789572+00:00
1,583,329,077,000
b6a19ffdcd17c4c9bf2f370936c291909191618d
3
{ "blob_id": "b6a19ffdcd17c4c9bf2f370936c291909191618d", "branch_name": "refs/heads/master", "committer_date": 1583329077000, "content_id": "8b39d0f792f59b8af79f9e50119ed28f4867bf94", "detected_licenses": [ "MIT" ], "directory_id": "be5cfcc8604088c7b1059f42b6209bd2032f0df1", "extension": "py", "fi...
2.546875
stackv2
from flask import Blueprint, request, jsonify from .models import Doctor, DoctorSchema, Reception, ReceptionSchema, db module = Blueprint('api', __name__, url_prefix='/api') doctor_schema = DoctorSchema() reception_schema = ReceptionSchema() @module.route('/doctors/', methods=['GET']) def getDoctors(): doctors = ...
73
33.26
112
16
614
python
[{"finding_id": "codeql_py/reflective-xss_348442313e65425a_1ad7ef1f", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 48 ]
[ null ]
[ 16 ]
[ 69 ]
2024-11-18T20:10:57.460026+00:00
1,397,564,836,000
ade86790ce7d5c7e7eebd13aaed051da44b6acb8
2
{ "blob_id": "ade86790ce7d5c7e7eebd13aaed051da44b6acb8", "branch_name": "refs/heads/master", "committer_date": 1397564836000, "content_id": "e97f3d5e7ec0b5ab120d2e6def10a9a50ecf042d", "detected_licenses": [ "MIT" ], "directory_id": "b19ee220f1da60f36f6745b8aa1451499dcc0378", "extension": "py", "fi...
2.390625
stackv2
#! /usr/bin/python import socket, hashlib, getpass, threading, os from sys import stdout, stderr HASH_LENGTH = 32 SEGMENT_SIZE = 2**18 def hsh(x): return hashlib.sha256(x).digest() def parse_plan(plan): return ["".join(i) for i in zip(*[iter(plan)]*HASH_LENGTH)] class FileDownload: def __init__(self, path, leng...
282
32.87
143
19
2,559
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_570587d724ad34a8_a16129b2", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e...
[ 10 ]
[ null ]
[ 24 ]
[ 25 ]
2024-11-18T20:10:58.857008+00:00
1,575,304,957,000
fe851e8badd441176ab25aecc4257dc9083d6f81
3
{ "blob_id": "fe851e8badd441176ab25aecc4257dc9083d6f81", "branch_name": "refs/heads/master", "committer_date": 1575304957000, "content_id": "e642df9c74b485b9bb5bf40d9de4b91572231e9f", "detected_licenses": [ "Apache-2.0" ], "directory_id": "51027520a5e4b9154e7fb5de80c4c3a49176300f", "extension": "py"...
2.75
stackv2
import logging import sys import requests from flask_jwt_extended import jwt_required, get_jwt_claims from flask_restful import Resource, reqparse sys.path.append("../..") from settings import GetConfig logging.basicConfig(level='INFO') logger = logging.getLogger(__name__) class TestKeyValidity(Resource): """ ...
166
38.08
79
20
1,254
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4a6683dd89139944_326f0c4f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 76 ]
[ 77 ]
[ 33 ]
[ 72 ]
2024-11-18T20:26:18.397682+00:00
1,518,419,042,000
3a4e544020a71d3b2e473150adee34de6adcfa3d
3
{ "blob_id": "3a4e544020a71d3b2e473150adee34de6adcfa3d", "branch_name": "refs/heads/master", "committer_date": 1518419042000, "content_id": "e81311335ba3e30e39049d93900da8c792477c77", "detected_licenses": [ "Apache-2.0" ], "directory_id": "dcb20a7e94315bff9ead6ee15d1a372fd359037b", "extension": "py"...
3.34375
stackv2
# -*- coding: utf-8 -*- import json import datetime import codecs from collections import OrderedDict # JSON (Javascript object Notation) # 여러 시스템 간 데이터 교환을 위해 고안한 데이터형 # XML : 데이터를 정의하는 태그 때뭉네 파일 용량이 커짐 # CSV : XML 보다 용량은 작지만, 데이터의 의미 파악이 힘듦 # 자바스크립트의 객체 표기법을 차용해서 만듦 # 객체는 키, 값의 형식으로 작성 # XML과 CSV의 장점을 따서 만든것이라 폭발적인...
203
21.13
61
11
1,705
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d42c30fc47e95355_1870c0cb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
11
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging...
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive...
[ 91, 95, 98, 99, 140, 142, 145, 148, 149, 154, 155 ]
[ null, null, null, null, null, null, null, null, null, null, null ]
[ 7, 7, 7, 7, 7, 7, 7, 11, 11, 7, 7 ]
[ 14, 14, 22, 22, 15, 15, 23, 14, 32, 35, 40 ]
2024-11-18T20:26:18.641078+00:00
1,448,374,630,000
6729a7dadb4c9670e4634349885ac88ad36b4db1
3
{ "blob_id": "6729a7dadb4c9670e4634349885ac88ad36b4db1", "branch_name": "refs/heads/master", "committer_date": 1448374630000, "content_id": "584c5aef8de510df30fc0776d8fb40a338bd7e32", "detected_licenses": [ "MIT" ], "directory_id": "4234194f3985598c22941c7c07aec876d3b5a215", "extension": "py", "fi...
2.625
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- import time import json import hmac import hashlib import binascii import base64 import requests class TencentYunPornDetect(object): def __init__(self, appid, secret_id, secret_key, bucket): """ APP_ID和BUCKET,在http://console.qcloud.com/image/bucket查...
125
30.54
109
12
1,120
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_5a940f8a71b92326_d0781bb3", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecu...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecure.\n[Sensitive data (secret)](2) is used in a hashing algorithm (SHA1) that is insecure.\n[Sensitive data (secret)](3) is used in a hashing algorithm (SHA1) that is insecure." ]
[ 40 ]
[ null ]
[ 41 ]
[ 51 ]
2024-11-18T20:26:26.538684+00:00
1,547,835,881,000
fe7e313c86021a335df63d1ba8c092c8c824831b
3
{ "blob_id": "fe7e313c86021a335df63d1ba8c092c8c824831b", "branch_name": "refs/heads/master", "committer_date": 1547835881000, "content_id": "8678528c12055662f6588d2f5f690dc57121bb1e", "detected_licenses": [ "MIT" ], "directory_id": "6c05b0bc90df809097213c08baf265822722a452", "extension": "py", "fi...
2.671875
stackv2
from flask import Flask, render_template, request, redirect, session, flash, url_for app = Flask(__name__) app.secret_key = 'alura' class Jogo: def __init__(self, nome, categoria, console): self.nome = nome self.categoria = categoria self.console = console class Usuario: def __init__...
81
27.43
84
16
605
python
[{"finding_id": "codeql_py/flask-debug_6ab09bf5e9dd594d_f149d4c5", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-601" ]
[ "py/flask-debug", "py/url-redirection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 81, 69 ]
[ null, null ]
[ null, 29 ]
[ 20, 43 ]
2024-11-18T20:27:01.107714+00:00
1,621,126,389,000
bb9254874c671b987a2522b461447de68b397f64
3
{ "blob_id": "bb9254874c671b987a2522b461447de68b397f64", "branch_name": "refs/heads/main", "committer_date": 1621126389000, "content_id": "1c085f7b7d6558c55efc5cf56952df0cf0f13481", "detected_licenses": [ "MIT" ], "directory_id": "18ca12da81b8ad981aa30f1c0e2cb7f515394586", "extension": "py", "file...
2.5625
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- import re import urllib.request from pathlib import Path from jinja2 import Environment, FileSystemLoader LINUX_VERSION = 'v5.12' BASE_URL = f'https://raw.githubusercontent.com/torvalds/linux/{LINUX_VERSION}' BASEPATH = Path(__file__).parent.absolute() TEMPLATES_DIR = BA...
207
33.17
101
19
1,898
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_369f977b563408c6_95ed4ed2", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 176 ]
[ 178 ]
[ 11 ]
[ 42 ]
2024-11-18T20:52:02.743178+00:00
1,590,828,531,000
44597f423afa4481291c36065937b296b27dc444
2
{ "blob_id": "44597f423afa4481291c36065937b296b27dc444", "branch_name": "refs/heads/master", "committer_date": 1590828531000, "content_id": "238f2883530ef1c0b16a46af4a32f80b6a51142b", "detected_licenses": [ "Apache-2.0" ], "directory_id": "12c8ce4e18f3090e7519dab43c9231bcd15bc956", "extension": "py"...
2.4375
stackv2
# -*- coding: utf-8 -*- from typing import Any, Dict, List from chaosaws import aws_client from chaosaws.types import AWSResponse from chaoslib.types import Configuration, Secrets from chaoslib.exceptions import FailedActivity from logzero import logger import boto3 import paramiko import pickle import json import os ...
129
29.43
117
17
895
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_21c816df3972f8d6_04c0e0d6", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 51 ]
[ null ]
[ 5 ]
[ 62 ]
2024-11-18T20:52:31.105358+00:00
1,509,523,996,000
ad7e3f8d98db1ca4f0037c73e1e18c1a2cb0da4c
2
{ "blob_id": "ad7e3f8d98db1ca4f0037c73e1e18c1a2cb0da4c", "branch_name": "refs/heads/master", "committer_date": 1509523996000, "content_id": "bde6bdfc6d0ca019428f1c8bc28cc477180ca662", "detected_licenses": [ "MIT" ], "directory_id": "595c940b2dc679fe81920ff03708bb2169bb3393", "extension": "py", "fi...
2.328125
stackv2
# encoding=utf-8 """Made by delphi for himself's blog""" import os from flask import Flask from flask import render_template from kits import initialize from config.conf import conf app = Flask(__name__) ROOT_PATH = os.path.dirname(os.path.realpath(__file__)) @app.route("/") def index(): return render_templat...
52
24.33
82
12
323
python
[{"finding_id": "codeql_py/path-injection_55f3b6eb171dd627_65010cf2", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 35 ]
[ null ]
[ 27 ]
[ 36 ]
2024-11-18T20:52:52.895201+00:00
1,604,521,662,000
51ac04a22ff05c86fc9c2f095dc0fca828dd6fdc
3
{ "blob_id": "51ac04a22ff05c86fc9c2f095dc0fca828dd6fdc", "branch_name": "refs/heads/master", "committer_date": 1604521662000, "content_id": "d59c2bacfc286d2e00fd5538b042615daec9d46a", "detected_licenses": [ "MIT" ], "directory_id": "b0ef6e31d55fa626b3a796fca53a7975272be415", "extension": "py", "fi...
2.578125
stackv2
import argparse # -*- coding: utf-8 -*- # requires: pip install paho-mqtt import paho.mqtt.client as mqtt class MqttIpClient: def __init__(self, mac_addresses, interface): self.mac_addresses = mac_addresses self.interface = interface def subscribe(self): client = mqtt.Client() ...
50
28.14
62
15
329
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7ce4181380c1882e_70e003ca", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 30 ]
[ null ]
[ 19 ]
[ 43 ]
2024-11-18T19:02:56.875149+00:00
1,488,337,173,000
f1dbaea6a739a33d1c7d0aed736e989e63cd6e12
3
{ "blob_id": "f1dbaea6a739a33d1c7d0aed736e989e63cd6e12", "branch_name": "refs/heads/master", "committer_date": 1488337173000, "content_id": "9b9d16574c684d4d6bbdb52c690e9f1ae3d4b208", "detected_licenses": [ "MIT" ], "directory_id": "e9a653018223579ba78f95ca982226018132b877", "extension": "py", "fi...
2.96875
stackv2
from flask import Flask, jsonify, request import jsonpatch app = Flask(__name__) @app.route('/json/diff', methods=['POST']) def json_diff(): """Looks at the differences between two json objects A,B and computes a diff (rfc 6902) that can be applied to document A to transform it into B. """ try: ...
62
29.21
119
19
439
python
[{"finding_id": "codeql_py/stack-trace-exposure_a0443ed4f6d7e11f_48b44540", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 29, 57 ]
[ null, null ]
[ 24, 24 ]
[ 27, 27 ]
2024-11-18T19:02:58.437257+00:00
1,337,527,485,000
9f90a5e6119c83fcf8ea700701fdd7a54e0d9095
2
{ "blob_id": "9f90a5e6119c83fcf8ea700701fdd7a54e0d9095", "branch_name": "refs/heads/master", "committer_date": 1337527485000, "content_id": "abcfc06dba6361be8de5ba0f815317dec1076d60", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "ac1a25a133811147549e757b4e856e6ac97a6233", "extension": "p...
2.5
stackv2
# coding: utf-8 from django.utils.translation import ugettext as _ from django.utils.safestring import mark_safe from time import gmtime, strftime, localtime, mktime, time from django.core.files import File from django.core.files.storage import default_storage import os, re, decimal from urlparse import urlparse # fi...
358
27.98
173
16
2,547
python
[{"finding_id": "codeql_py/overly-permissive-file_d8f94f8dc376a7df_46027daf", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable." ]
[ 307 ]
[ null ]
[ 13 ]
[ 40 ]
2024-11-18T19:03:05.825233+00:00
1,480,628,102,000
1a288f4f6c451abad160175ccbe2704172e936bf
3
{ "blob_id": "1a288f4f6c451abad160175ccbe2704172e936bf", "branch_name": "refs/heads/master", "committer_date": 1480628102000, "content_id": "1daeeda28967bcda7862661138d587a87f1de0b4", "detected_licenses": [ "Apache-2.0" ], "directory_id": "69c01c507655201818bf05c6e2ebb52850ce759b", "extension": "py"...
2.625
stackv2
import os import shutil from jinja2 import BaseLoader, TemplateNotFound class MetadataTemplateLoader(BaseLoader): def __init__(self, input_dir): self.input_dir = input_dir def get_source(self, environment, template): path = os.path.join(self.input_dir, template) if not os.path.exists(pa...
150
39.61
137
16
1,411
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_7c4ec86a9f04093e_5318c80a", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
3
true
[ "CWE-079", "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 24, 27, 50 ]
[ null, null, null ]
[ 37, 33, 20 ]
[ 71, 67, 136 ]
2024-11-18T19:27:36.818576+00:00
1,627,312,519,000
7a25ebd6fa88fdf6b1b568d3eb210820d38f34b3
3
{ "blob_id": "7a25ebd6fa88fdf6b1b568d3eb210820d38f34b3", "branch_name": "refs/heads/master", "committer_date": 1627393171000, "content_id": "3bae58c1108d8b607e9a2b4cb99dccd66ca6d616", "detected_licenses": [ "MIT" ], "directory_id": "18455e177814a0d10f3b7f6e44d8df44da0b470a", "extension": "py", "fi...
2.578125
stackv2
import copy import logging import re from homeassistant.const import SUN_EVENT_SUNRISE, SUN_EVENT_SUNSET from .const import CONDITION_TYPE_AND, CONDITION_TYPE_OR ENTRY_PATTERN_SUNRISE = "SR" ENTRY_PATTERN_SUNSET = "SS" ENTRY_PATTERN_DAILY = "0" ENTRY_PATTERN_WORKDAY = "15" ENTRY_PATTERN_WEEKEND = "67" _LOGGER = log...
193
33.66
94
24
1,443
python
[{"finding_id": "codeql_py/redos_5baa537b23658500_676e7ae8", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'DT0A' and containing many repetit...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with 'DT0A' and containing many repetitions of '0'." ]
[ 18 ]
[ null ]
[ 58 ]
[ 65 ]
2024-11-18T19:38:36.319116+00:00
1,592,583,554,000
dfe0ddfefe8731a186dc969d0e96321ee7a73722
4
{ "blob_id": "dfe0ddfefe8731a186dc969d0e96321ee7a73722", "branch_name": "refs/heads/master", "committer_date": 1592583554000, "content_id": "e0d3fd7e8e4f77f5886f045051d38964e858029e", "detected_licenses": [ "MIT" ], "directory_id": "3e5438ff2957def8d7f3933e4ca163d1616cdbfc", "extension": "py", "fi...
4.375
stackv2
""" The second part of the website project is to write a script that validates the password entered by the user. The company also puts some rules in order to verify valid passwords: It can contain lowercase a-z and uppercase letters A-Z It can contain numbers It can contain the symbols: *, #, $, %, !, &, . It must be ...
25
36.4
108
13
237
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2831f1c927b283d9_3791bdc4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 23, 25 ]
[ null, null ]
[ 14, 14 ]
[ 92, 83 ]
2024-11-18T19:38:55.122569+00:00
1,490,254,704,000
044bda6378bbc0768aa33766b3b0b6ef60d2aa1c
3
{ "blob_id": "044bda6378bbc0768aa33766b3b0b6ef60d2aa1c", "branch_name": "refs/heads/master", "committer_date": 1490254704000, "content_id": "3d1a1af1142a7949fe511256dadb92a23c77f395", "detected_licenses": [ "Unlicense" ], "directory_id": "7f106512693f3feef490c18f07257d15cbb1aeeb", "extension": "py",...
2.703125
stackv2
from os.path import join from tqdm import tqdm import json from nltk.stem.snowball import SnowballStemmer import numpy as np from sklearn import svm from sklearn.feature_extraction import text from sklearn.feature_extraction.text import CountVectorizer from sklearn.feature_extraction.text import TfidfTransformer from...
205
24.65
116
17
1,317
python
[{"finding_id": "codeql_py/overly-large-range_c35072976aa7a787_93c292df", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[.\\/0-9:\\].", "remediation": "", "location": {"file...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[.\\/0-9:\\]." ]
[ 92 ]
[ null ]
[ 25 ]
[ 28 ]
2024-11-18T20:06:01.229143+00:00
1,563,795,322,000
f07320ca2e488ecefdbb7ea7c8b6894115055cf0
3
{ "blob_id": "f07320ca2e488ecefdbb7ea7c8b6894115055cf0", "branch_name": "refs/heads/master", "committer_date": 1563795322000, "content_id": "d3c9eb98c926c475bfe1d18253c9ac287032436a", "detected_licenses": [ "Apache-2.0" ], "directory_id": "3f005487c3e956cd9bfbca2defe22525c4f5e5ad", "extension": "py"...
3.421875
stackv2
import salary import old_salary import matplotlib.pyplot as plt last_diff=-1 last_salary=0 x=[] y=[] y2=[] y3=[] i=0 for i in range(5000, 50000): diff=salary.get_salary(i) - old_salary.get_salary(i) x.append(i) y.append(diff) y2.append(salary.get_salary(i)) y3.append(old_salary.get_salary(i)) ...
30
18.8
68
12
189
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fc325aaecc522297_64cc211d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 20, 24 ]
[ null, null ]
[ 15, 7 ]
[ 68, 60 ]
2024-11-18T20:06:05.896748+00:00
1,594,279,223,000
0dbecd3b6bec2e29b271c3140c87c0f6b10d5545
2
{ "blob_id": "0dbecd3b6bec2e29b271c3140c87c0f6b10d5545", "branch_name": "refs/heads/master", "committer_date": 1594279223000, "content_id": "f9b535e7dbd93b77ceccfc6ae1a14d7cf142ff1a", "detected_licenses": [ "Apache-2.0" ], "directory_id": "ce005d2e7c72cf74491e099c047873bf56c2f0cd", "extension": "py"...
2.46875
stackv2
# Copyright (C) 2018 Cancer Care Associates # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to ...
84
30.95
87
15
573
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_e6383e4e3b35aaa6_461aef3f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 73 ]
[ null ]
[ 16 ]
[ 41 ]
2024-11-18T20:06:14.574377+00:00
1,411,059,797,000
528cb40b79092dfbba52f3642da1845332ec1e39
2
{ "blob_id": "528cb40b79092dfbba52f3642da1845332ec1e39", "branch_name": "refs/heads/master", "committer_date": 1411059797000, "content_id": "8dc2334146a043e01b27b44f56d371fafc700cf9", "detected_licenses": [ "MIT" ], "directory_id": "e6f1d216ae720602e9dbe258902842651a53d6ad", "extension": "py", "fi...
2.453125
stackv2
#!/usr/bin/env python import datetime, getopt, getpass, os, re, sys, tarfile try: import paramiko except ImportError: print >>sys.stderr, "Please install the paramiko python module - 'pip install paramiko'" sys.exit(1) hostname = '' output_filenames = [] commands = ('show logging', 'show console', 'enable;show ...
104
24.69
152
18
748
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_3ce35865ea91199e_405c2245", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 59 ]
[ null ]
[ 2 ]
[ 61 ]
2024-11-18T20:06:27.514787+00:00
1,586,715,487,000
a0b21f4102ee301f18dde6365f850e24cf73a8b6
3
{ "blob_id": "a0b21f4102ee301f18dde6365f850e24cf73a8b6", "branch_name": "refs/heads/master", "committer_date": 1586715487000, "content_id": "e36a1d60572fd0aaaa2d4ce581c4dee9beb1310d", "detected_licenses": [ "MIT" ], "directory_id": "d31b3d9c0464426d2812cfeca0dd3a5b02229d4a", "extension": "py", "fi...
2.546875
stackv2
from flask import Flask, request from flask import jsonify import random from Crypto.Hash import SHA512 from Crypto.Cipher import PKCS1_OAEP from Crypto.PublicKey import RSA import base64 from datetime import datetime, timedelta import jwt app = Flask(__name__) # JWT_SECRET = 'secret' JWT_ALGORITHM = 'RS256' JWT_EXP_DE...
75
27.83
98
18
626
python
[{"finding_id": "codeql_py/path-injection_2c3974f211c6e605_481f9c8e", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 35 ]
[ null ]
[ 33 ]
[ 59 ]
2024-11-18T20:06:31.711565+00:00
1,530,198,092,000
392d637a8220fa7c3d667ca42b733f44adaf9ac4
2
{ "blob_id": "392d637a8220fa7c3d667ca42b733f44adaf9ac4", "branch_name": "refs/heads/master", "committer_date": 1530198092000, "content_id": "67c30670a3c680d4d9c0593201e949b3a881c6f4", "detected_licenses": [ "MIT" ], "directory_id": "057f518b87cc48546c32e5f8bfc18807bd630720", "extension": "py", "fi...
2.3125
stackv2
import os from flask import Flask, render_template, request, jsonify, send_from_directory from flask_cors import CORS from model import build_whole_model import torch import torch.utils.model_zoo as model_zoo import urllib.request from torchvision import transforms import PIL.Image import string import random def id...
106
31.64
94
18
815
python
[{"finding_id": "codeql_py/path-injection_d7446c7d23a26a94_fe68c865", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
5
true
[ "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 52, 52, 59, 79, 79 ]
[ null, null, null, null, null ]
[ 19, 62, 19, 19, 59 ]
[ 60, 94, 57, 57, 91 ]
2024-11-18T20:18:17.784450+00:00
1,556,971,397,000
a934352cb73ff552aa70d9d0a41722a0066ccad3
2
{ "blob_id": "a934352cb73ff552aa70d9d0a41722a0066ccad3", "branch_name": "refs/heads/master", "committer_date": 1556971397000, "content_id": "a679c8053e0a80c04774fd09ffd5eb8b78b12953", "detected_licenses": [ "MIT" ], "directory_id": "727a4e19617cb922852ed55319a67fccac47e94c", "extension": "py", "fi...
2.3125
stackv2
#/usr/bin/env python from werkzeug.wsgi import DispatcherMiddleware from werkzeug.serving import run_simple from flask import Flask, request, g import core import practice1 import practice2 import blog import vpspractice import vps import hashlib from bs4 import BeautifulSoup from common import robotgate, set_captcha...
93
26.16
102
17
592
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_8a661d295e5ef257_fd60550b", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (SHA1) that is insecure.\...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (id)](1) is used in a hashing algorithm (SHA1) that is insecure.\n[Sensitive data (id)](2) is used in a hashing algorithm (SHA1) that is insecure." ]
[ 39 ]
[ null ]
[ 26 ]
[ 49 ]
2024-11-18T20:18:20.969596+00:00
1,537,930,892,000
98ab84f52862337be1f389ee91b2f3e1ffacf395
2
{ "blob_id": "98ab84f52862337be1f389ee91b2f3e1ffacf395", "branch_name": "refs/heads/master", "committer_date": 1537930892000, "content_id": "ec84c79f96259c3fb3ac2656736ecb3eb9ff9f72", "detected_licenses": [ "MIT" ], "directory_id": "b5167e2e01b7cae1f615301e4cb7d298372b195e", "extension": "py", "fi...
2.484375
stackv2
#!/usr/bin/env python3 import io import shutil import os key = input("Be sure to run this as root/sudo. Press enter to continue.") webhook = input("Paste your slack webhook url: ").encode() filename = "slacknotif" system = input("Are you using a Debian or RHEL based system? ").lower() with io.FileIO("%s" % filename, ...
45
31.47
126
13
421
python
[{"finding_id": "codeql_py/overly-permissive-file_a9258357b0299cd1_7010297f", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable." ]
[ 28 ]
[ null ]
[ null ]
[ 42 ]
2024-11-18T20:18:36.933352+00:00
1,611,585,981,000
2daf0878723c8e2a9a9a52ead58086bbdf4c59eb
3
{ "blob_id": "2daf0878723c8e2a9a9a52ead58086bbdf4c59eb", "branch_name": "refs/heads/main", "committer_date": 1611585981000, "content_id": "8810671b6b67aa1a7fd0a38ae3ad873d4ffca0bc", "detected_licenses": [ "Apache-2.0" ], "directory_id": "9af0eea2cd70dfea8b919b8ab7a75a4788c102d8", "extension": "py", ...
2.65625
stackv2
import re, itertools, hashlib, sys sys.stdout = open('dic.txt', 'w') def display(result): print(result) # on parse le fichier shadow with open('shadow', 'r') as f: lines = f.readlines() passwdTable = {} for line in lines: try: user, user_hash = re.findall('^([^:]+):\$1\$([^:]+):.+', line)[0] except...
28
29.64
71
17
227
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4477aa7b8979cc83_7cd2a696", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-327" ]
[ "py/clear-text-logging-sensitive-data", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 5, 24 ]
[ null, null ]
[ 11, 32 ]
[ 17, 52 ]
2024-11-18T20:18:42.158226+00:00
1,606,501,468,000
179dbb126aa0edad195481ee909ccb825fd2e331
3
{ "blob_id": "179dbb126aa0edad195481ee909ccb825fd2e331", "branch_name": "refs/heads/master", "committer_date": 1606501468000, "content_id": "723cd763f0f0d80a95455c781e809d8b669583e2", "detected_licenses": [ "MIT" ], "directory_id": "bbaa6c695c4ca435aa82aed451d24b91204932e0", "extension": "py", "fi...
3.109375
stackv2
import ssl import socket from typing import List, Optional, Tuple def find_headers_in_response(response: bytes, headers: Optional[List[str]] = None) -> List[str]: """ Convert response byte strings to strings and search for requested headers. :param response: response byte st...
72
37.85
82
12
640
python
[{"finding_id": "codeql_py/insecure-protocol_f171e50df6b8b40d_3865d269", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/...
1
true
[ "CWE-327" ]
[ "py/insecure-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.create_default_context](1)." ]
[ 67 ]
[ null ]
[ 10 ]
[ 17 ]
2024-11-18T20:31:22.277067+00:00
1,572,548,763,000
06cf109a57e1948242fd158f83f05aab0041db14
3
{ "blob_id": "06cf109a57e1948242fd158f83f05aab0041db14", "branch_name": "refs/heads/master", "committer_date": 1572548763000, "content_id": "25666a7aa310cf2b5f25ea037d88644603f89f3a", "detected_licenses": [ "MIT" ], "directory_id": "c465815ecbe9f565476210bb76f2495ece89596a", "extension": "py", "fi...
2.671875
stackv2
#!/usr/bin/env python3 from argparse import ArgumentParser from collections import OrderedDict import json import os import shutil import subprocess import sys from tempfile import NamedTemporaryFile from jinja2 import Environment, FileSystemLoader, BaseLoader import yaml __version__ = '1.1.1' sys.tracebacklimit = ...
416
31.26
97
20
2,648
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_ec9a3a31194efada_4a93a2c3", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 182, 249 ]
[ 186, 253 ]
[ 21, 21 ]
[ 10, 10 ]
2024-11-18T20:43:30.975882+00:00
1,616,561,244,000
c7a79b11ce1dec024ddd94b603f01a461b6033be
3
{ "blob_id": "c7a79b11ce1dec024ddd94b603f01a461b6033be", "branch_name": "refs/heads/master", "committer_date": 1616561244000, "content_id": "67dc7503925f44a4bd334c54a437bccc7cb382bc", "detected_licenses": [ "MIT" ], "directory_id": "b6aab329acbe8f400d1b0b1ea57553d50848b125", "extension": "py", "fi...
2.671875
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- import sys, os, shutil, re, argparse, json from codecs import open from itertools import izip from collections import defaultdict import urllib import xml.etree.ElementTree as ET def clean(x): x = re.sub(r'\s+', ' ', x).strip() x = re.sub(r'\.$', '', x) retur...
127
30.45
97
16
1,000
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_f5d84f1d379abd75_352195f8", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [http://arxiv.org](1) may be at an arbitrary position i...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "The string [http://arxiv.org](1) may be at an arbitrary position in the sanitized URL.", "The string [https://arxiv.org](1) may be at an arbitrary position in the sanitized URL." ]
[ 101, 102 ]
[ null, null ]
[ 9, 13 ]
[ 43, 48 ]
2024-11-18T20:43:35.429726+00:00
1,557,862,036,000
feaa6e27c890edbe6efd9bda073c4ef5079f7bb9
3
{ "blob_id": "feaa6e27c890edbe6efd9bda073c4ef5079f7bb9", "branch_name": "refs/heads/master", "committer_date": 1557862036000, "content_id": "c17cc2fa06ec82f05af5d9f8af701d77b995b02a", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "b2f0d16155a94b4a29dad4c2c1ee0faaf62fda49", "extension": "p...
2.59375
stackv2
import json import shutil import tempfile import six from urllib.error import URLError from django.core.files import File from django.http import HttpResponseBadRequest, HttpResponse from django.contrib.auth.decorators import login_required, permission_required from django.utils.decorators import method_decorator fro...
121
32.21
119
18
843
python
[{"finding_id": "codeql_py/full-ssrf_59b6d424737933b6_28b125c6", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).\nThe full URL of this request depends on a [user-...
1
true
[ "CWE-918" ]
[ "py/full-ssrf" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1).\nThe full URL of this request depends on a [user-provided value](2)." ]
[ 91 ]
[ null ]
[ 17 ]
[ 54 ]
2024-11-18T20:43:59.718532+00:00
1,624,418,416,000
6a1e1b574479f43326b4a79fd8a32ee30f8606c1
3
{ "blob_id": "6a1e1b574479f43326b4a79fd8a32ee30f8606c1", "branch_name": "refs/heads/main", "committer_date": 1624418416000, "content_id": "1e1cf9d79b0260329701510dbdf03584b0b8dc0c", "detected_licenses": [ "Apache-2.0" ], "directory_id": "13fa726bb71c99c90255a6d5d1838eef1542eb73", "extension": "py", ...
2.609375
stackv2
#!/usr/bin/env python3 import argparse import base64 import html import http.server import mimetypes import os import posixpath import re import shutil import ssl import sys import urllib.error import urllib.parse import urllib.request from http.server import HTTPServer from io import BytesIO class UploadHTTPRequest...
408
37.86
119
19
3,765
python
[{"finding_id": "codeql_py/http-response-splitting_d8d5892a49f3ef4b_c0a0736c", "tool_name": "codeql", "rule_id": "py/http-response-splitting", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This HTTP header is constructed from a [user-provided value](1).\nThis HTTP header is con...
10
true
[ "CWE-113", "CWE-1333", "CWE-327", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022" ]
[ "py/http-response-splitting", "py/polynomial-redos", "py/insecure-default-protocol", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This HTTP header is constructed from a [user-provided value](1).\nThis HTTP header is constructed from a [user-provided value](2).\nThis HTTP header is constructed from a [user-provided value](3).\nThis HTTP header is constructed from a [user-provided value](4).", "This [regular expression](1) that depends on a ...
[ 128, 83, 381, 93, 124, 133, 143, 162, 181, 184 ]
[ null, null, null, null, null, null, null, null, null, null ]
[ 46, 83, 24, 28, 26, 35, 22, 36, 30, 31 ]
[ 61, 96, 99, 30, 30, 40, 26, 40, 38, 39 ]
2024-11-18T20:44:20.083619+00:00
1,356,706,963,000
2bc9dc962fcad376dfb0667f66b8a5cc4c7b4c4c
2
{ "blob_id": "2bc9dc962fcad376dfb0667f66b8a5cc4c7b4c4c", "branch_name": "refs/heads/master", "committer_date": 1356706963000, "content_id": "53e90fefd0e4ae9c09c6f31e45881be2ac99cef2", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "d46c095a9bfe57cd36aebe75cc7b3edba5f2b582", "extension": "p...
2.328125
stackv2
""" sentry_twilio.models ~~~~~~~~~~~~~~~~~~~~ :copyright: (c) 2012 by Matt Robenolt. :license: BSD, see LICENSE for more details. """ import re import urllib from django import forms from django.utils.translation import ugettext_lazy as _ from sentry.plugins.bases.notify import NotificationPlugin from twilio.rest imp...
204
38.19
124
17
1,970
python
[{"finding_id": "codeql_py/polynomial-redos_4e4731e3d2f8b0e4_9aa2204f", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with ma...
2
true
[ "CWE-1333", "CWE-1333" ]
[ "py/polynomial-redos", "py/polynomial-redos" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with many repetitions of ' '.", "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with many repetitions of ' '." ]
[ 47, 91 ]
[ null, null ]
[ 50, 50 ]
[ 54, 54 ]
2024-11-18T20:57:36.225901+00:00
1,680,267,922,000
47363966817d90d0ee98ceb6751de87326e366ee
3
{ "blob_id": "47363966817d90d0ee98ceb6751de87326e366ee", "branch_name": "refs/heads/master", "committer_date": 1680267922000, "content_id": "a4d51ab80b802e2ef2917283d081b8c793508d9e", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "58f400e04001605d3ab8214167c4e95b3d73b0e3", "extension": "p...
2.828125
stackv2
import pandas as pd from sklearn.tree import DecisionTreeClassifier # Import Decision Tree Classifier from sklearn.model_selection import train_test_split # Import train_test_split function from sklearn import metrics # Import scikit-learn metrics module for accuracy calculation from sklearn import tree from scipy.i...
206
32.66
146
22
1,782
python
[{"finding_id": "codeql_py/redos_45a4d13328557e07_c98bd4ec", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '0\\\\n\\[' and containing many re...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '0\\\\n\\[' and containing many repetitions of '0'." ]
[ 110 ]
[ null ]
[ 37 ]
[ 43 ]
2024-11-18T20:57:41.432781+00:00
1,560,847,669,000
ceb8bd1e8999acfd718e5a6b8387ccb984c5172b
3
{ "blob_id": "ceb8bd1e8999acfd718e5a6b8387ccb984c5172b", "branch_name": "refs/heads/master", "committer_date": 1560847669000, "content_id": "9ca457a1504dfa5ba20932e2f0f4c64069b07fc6", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "fb40f67f8d655f1e7fd350bbf6b2d80e9dab4c4a", "extension": "p...
2.53125
stackv2
#!/usr/bin/python import os from os import system import argparse import glob def ParseCommandLine(): parser = argparse.ArgumentParser(description="Changing RPL parameters dynamically") # folders to scan and write parser.add_argument('-r', '--folder2scan', help='Folder to Scan for initial logs',required=Tru...
347
34.8
168
22
3,232
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_f6c3fc53e2200dcc_474e2cf1", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.\nThis expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.\nThis expression stores [sensitive data ...
[ 323 ]
[ null ]
[ 24 ]
[ 40 ]
2024-11-18T20:58:03.193995+00:00
1,666,929,698,000
6e8ad6c9294addf88627d6d8241962b62509bd0b
2
{ "blob_id": "6e8ad6c9294addf88627d6d8241962b62509bd0b", "branch_name": "refs/heads/master", "committer_date": 1666929698000, "content_id": "3f8fe9065cf053deb3aa194d71a7a14aad21349f", "detected_licenses": [ "MIT" ], "directory_id": "bd9a09a3f1a8b2b5166c540ada93cc5b30591605", "extension": "py", "fi...
2.359375
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- ''' name: metinfo5.0 getpassword.php两处时间盲注漏洞 referer: http://www.wooyun.org/bugs/wooyun-2010-021062 author: Lucifer description: member/getpassword.php与admin/admin/getpassword.php文件中,经过base64解码后的值用explode打散后进入到 SQL语句引起注入。 ''' import sys import time import requests cl...
42
30.4
148
16
412
python
[{"finding_id": "codeql_py/request-without-cert-validation_f293ef9f87058977_963bc8d6", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 32 ]
[ null ]
[ 23 ]
[ 87 ]
2024-11-18T20:58:10.133212+00:00
1,335,744,352,000
b5e2b677c51443c2c88fd80e326d1b52595e0e95
2
{ "blob_id": "b5e2b677c51443c2c88fd80e326d1b52595e0e95", "branch_name": "refs/heads/master", "committer_date": 1335744352000, "content_id": "15765b3491057876d9f2a1e58d85d72b90848918", "detected_licenses": [ "BSD-2-Clause", "BSD-2-Clause-Views" ], "directory_id": "b7b452fbeb652d55e7d20ade30411ed29c...
2.421875
stackv2
#!/usr/bin/env python from __future__ import division from flask import Flask, render_template, url_for, session, request, g, \ redirect, flash from flaskext.oauth import OAuth from calendar import timegm import os, datetime #setup code app = Flask(__name__) app.secret_key = 'pagerduty' oauth = OAuth() facebook...
122
23.5
74
17
801
python
[{"finding_id": "codeql_py/flask-debug_163c4bcc9884427d_75c121de", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-601", "CWE-601" ]
[ "py/flask-debug", "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 122, 74, 79 ]
[ null, null, null ]
[ 2, 19, 18 ]
[ 48, 27, 26 ]
2024-11-18T20:58:15.469707+00:00
1,522,668,668,000
7bc552639fd4db27ca670e68efab7239568e3661
2
{ "blob_id": "7bc552639fd4db27ca670e68efab7239568e3661", "branch_name": "refs/heads/master", "committer_date": 1522668668000, "content_id": "56589bb741b6c755e6cdfec4940124f943e35f0e", "detected_licenses": [ "Apache-2.0" ], "directory_id": "88658a47b9238825dce23cb1b95bf0f16730ea23", "extension": "py"...
2.484375
stackv2
import os import json from glob import glob import ftplib import numpy as np import random import urllib.request import tarfile import re import pandas as pd SNIPS_URL = 'http://share.ipavlov.mipt.ru:8080/repository/datasets/ner/SNIPS2017.tar.gz' def tokenize(s): return re.findall(r"[\w']+|[‑–—“”€№…’\"#$%&\'()+...
92
31.86
88
20
726
python
[{"finding_id": "codeql_py/tarslip_c6c6db5cb4dab900_912e1c2f", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 26 ]
[ null ]
[ 5 ]
[ 6 ]
2024-11-18T20:58:19.746814+00:00
1,533,559,763,000
163ffc0e9c00192b4bbe89c395c3132ce67cc9d5
3
{ "blob_id": "163ffc0e9c00192b4bbe89c395c3132ce67cc9d5", "branch_name": "refs/heads/master", "committer_date": 1533559763000, "content_id": "614aa6139d23b14147154efec35f2d16e087f79f", "detected_licenses": [ "MIT" ], "directory_id": "e797aa4291d7cc8a7df3e4c9e376a2d0bcdbb81d", "extension": "py", "fi...
2.703125
stackv2
from flask import Flask, render_template, make_response, request import mysql.connector import re import json app = Flask(__name__) def edit_db(query, pattern): settings = read_db_settings() host_ = settings[0]["db"][0]["host"] data_base = settings[0]["db"][0]["database"] user_ = settings[0]["db"][0...
71
24.69
108
16
461
python
[{"finding_id": "codeql_py/flask-debug_9854b581f5139ce1_b8de4468", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-089" ]
[ "py/flask-debug", "py/sql-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This SQL query depends on a [user-provided value](1)." ]
[ 71, 18 ]
[ null, null ]
[ 5, 20 ]
[ 40, 25 ]
2024-11-18T20:58:37.544936+00:00
1,693,602,075,000
335c7a986fd0d5fefd9b6927f1607380cd23ebe9
2
{ "blob_id": "335c7a986fd0d5fefd9b6927f1607380cd23ebe9", "branch_name": "refs/heads/master", "committer_date": 1693602075000, "content_id": "36124ea9d2b872acf231efdd5c238c4b13fd8008", "detected_licenses": [ "MIT" ], "directory_id": "eb09b371fa8564a2b2532118684f93af8e98d5fb", "extension": "py", "fi...
2.4375
stackv2
import re from elasticsearch_dsl import Q, Search from core.exceptions import APIQueryParamsError from core.utils import normalize_openalex_id def is_openalex_id(openalex_id): if not openalex_id: return False openalex_id = openalex_id.lower() if re.findall(r"http[s]://openalex.org/([waicfvps]\d{...
274
24.44
116
18
1,921
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_39d49414ee5dce6b_e7759956", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'issn.org/resource/issn/', so it mig...
1
true
[ "CWE-020" ]
[ "py/incomplete-hostname-regexp" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'issn.org/resource/issn/', so it might match more hosts than expected." ]
[ 200 ]
[ null ]
[ 11 ]
[ 49 ]
2024-11-18T21:10:14.262659+00:00
1,411,354,483,000
03ec634c5fe336d4e22e33acbf8344b41dd2dce0
2
{ "blob_id": "03ec634c5fe336d4e22e33acbf8344b41dd2dce0", "branch_name": "refs/heads/master", "committer_date": 1411354483000, "content_id": "65304dc7fbb58271fbbaf514eff58b8b5f87263e", "detected_licenses": [ "MIT" ], "directory_id": "b170f508b5f69e64c3c3dfc9963e73d1d80e9edf", "extension": "py", "fi...
2.484375
stackv2
# Copyright (c) 2013-2014 Molly White # # Permission is hereby granted, free of charge, to any person obtaining a copy of this software # and associated documentation files (the "Software"), to deal in the Software without # restriction, including without limitation the rights to use, copy, modify, merge, publish, # di...
313
41.96
99
18
2,724
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fe6de841135502d7_d2068d7a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text.\nThis expression logs [sensitive data (passw...
[ 237 ]
[ 240 ]
[ 13 ]
[ 73 ]
2024-11-18T21:10:56.554189+00:00
1,687,274,166,000
d3acf1e656bc2cdbe82083f3bb9a4502b9ffb70b
3
{ "blob_id": "d3acf1e656bc2cdbe82083f3bb9a4502b9ffb70b", "branch_name": "refs/heads/master", "committer_date": 1687274166000, "content_id": "93a123f4c1cb2a328231595146dd076840be24a8", "detected_licenses": [ "MIT" ], "directory_id": "18541e64203d962d5fb71b491b5ab7f7cb541b34", "extension": "py", "fi...
2.6875
stackv2
import hashlib import base64 from cryptography.hazmat.backends.openssl import backend from cryptography.hazmat.primitives import hashes from cryptography.hazmat.primitives.hmac import HMAC def saslprep(string): # TODO return string def ha1(username, realm, password): return hashlib.md5( ":".joi...
30
29.23
79
16
216
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_58d944d5f5a9100c_d1749652", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.", "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) t...
[ 16, 30 ]
[ null, null ]
[ 9, 24 ]
[ 65, 70 ]
2024-11-18T21:11:02.449138+00:00
1,619,430,716,000
0b2e4e0835a7c04ec541e9e090429ff53646f007
2
{ "blob_id": "0b2e4e0835a7c04ec541e9e090429ff53646f007", "branch_name": "refs/heads/main", "committer_date": 1619430716000, "content_id": "14ac422a5fa22fafcdc0dbe95a82afffb5d7a4b0", "detected_licenses": [ "MIT" ], "directory_id": "1eeef30071d167a2b5b318da814074d71fa05b80", "extension": "py", "file...
2.46875
stackv2
import requests, base64, configparser def read_credentials_file(): config = configparser.ConfigParser() config.read('credentials.ini') result = { 'base_url': config['DEFAULT']['base_url'], 'username': config['DEFAULT']['username'], 'password': config['DEFAULT']['password'], } ...
145
36.53
150
17
1,320
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_b17517284e8777e6_9b55e8f3", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 141 ]
[ null ]
[ 26 ]
[ 32 ]
2024-11-18T21:11:03.713031+00:00
1,659,153,197,000
1c4d88cb18a42cf30719868eaa4775ba829cae76
3
{ "blob_id": "1c4d88cb18a42cf30719868eaa4775ba829cae76", "branch_name": "refs/heads/master", "committer_date": 1659153197000, "content_id": "8da2039bbf49512c5847897fcb57dc52692e1f96", "detected_licenses": [ "MIT" ], "directory_id": "636787168e151db48093e939a34ddd211c94c263", "extension": "py", "fi...
2.625
stackv2
# sample code form https://shian420.pixnet.net/blog/post/350291572-%5Bpython%5D-logging-%E5%B9%AB%E4%BD%A0%E7%B4%80%E9%8C%84%E4%BB%BB%E4%BD%95%E8%A8%8A%E6%81%AF from logs.logger import create_logger import requests requests.packages.urllib3.disable_warnings() # 關閉警告訊息 def main(logger): url = "https://tw.yahoo....
24
38.08
160
11
326
python
[{"finding_id": "codeql_py/request-without-cert-validation_6fa4ba9664003034_11a27ceb", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 10 ]
[ null ]
[ 15 ]
[ 63 ]
2024-11-18T21:11:11.262243+00:00
1,440,941,663,000
296348f53c5e900e366641052d14374d7c06394d
3
{ "blob_id": "296348f53c5e900e366641052d14374d7c06394d", "branch_name": "refs/heads/master", "committer_date": 1440941663000, "content_id": "1191de87254cf79d24fdfbce03b57a1e3b116b65", "detected_licenses": [ "MIT" ], "directory_id": "152e4cc19aed7b58975f7411a24849cec15cec6f", "extension": "py", "fi...
2.765625
stackv2
"""Utilities""" from jinja2 import Template def process(domain, record, context=None): context = context or {} context["domain"] = domain for k, v in record.items(): if isinstance(v, (str, unicode,)): t = Template(v) record[k] = t.render(**context) def preprocess(confi...
20
23.2
52
13
106
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_9a5ce46fb5baecf0_99ecd41a", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 13 ]
[ null ]
[ 17 ]
[ 28 ]
2024-11-18T21:11:16.385344+00:00
1,495,535,994,000
65492b8fb17df229d63d2855357e0b57765fa03b
3
{ "blob_id": "65492b8fb17df229d63d2855357e0b57765fa03b", "branch_name": "refs/heads/master", "committer_date": 1495535994000, "content_id": "a10baa5ac620b1ac7343976c282d03f56a096958", "detected_licenses": [ "MIT" ], "directory_id": "98b27956f747f20011ad49eaf8f828de3a7f9fc9", "extension": "py", "fi...
2.875
stackv2
import requests import os import jinja2 HEWEATHER_KEY = os.getenv("HEWEATHER_KEY") WEATHER_FORECAST_API = 'https://free-api.heweather.com/v5/forecast?city={city}&key=' + HEWEATHER_KEY WEATHER_API = 'https://free-api.heweather.com/v5/weather?city={city}&key=' + HEWEATHER_KEY def fetch_weather_forecast(city): resp...
63
33.21
100
11
680
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_d5bc2e69a13a819f_139c25fe", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 25, 43 ]
[ 33, 51 ]
[ 20, 16 ]
[ 2, 2 ]
2024-11-18T21:11:17.202905+00:00
1,613,907,031,000
501973c41036b55ed4d930893f554bfa89fc835d
3
{ "blob_id": "501973c41036b55ed4d930893f554bfa89fc835d", "branch_name": "refs/heads/main", "committer_date": 1613907031000, "content_id": "6f6eebfa83853cb3c245510ea2da46cf41ec2e4c", "detected_licenses": [ "MIT" ], "directory_id": "f13dfcfc2536901b78539bacd8cb6b10b126e5e6", "extension": "py", "file...
3.03125
stackv2
#!/usr/bin/env python from jinja2 import Template import os def main(): template_dir = os.path.join(os.getcwd(), 'templates') if not os.path.isdir(template_dir): print(f'{template_dir} is not a directory!') exit(1) for filename in os.listdir(template_dir): if filename.endswith('....
44
28.8
64
13
279
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_091298cc5890a2f1_94a04fb9", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 27 ]
[ null ]
[ 20 ]
[ 50 ]
2024-11-18T19:03:28.241765+00:00
1,495,377,697,000
128158d0c361b92b189a25a9b0ecb307fd4236b1
2
{ "blob_id": "128158d0c361b92b189a25a9b0ecb307fd4236b1", "branch_name": "refs/heads/master", "committer_date": 1495377697000, "content_id": "745d770304a96eda03e4e887e427a63ac7b8adf0", "detected_licenses": [ "MIT" ], "directory_id": "053be82313daf267d069b930f84583bb25f51fc5", "extension": "py", "fi...
2.328125
stackv2
# coding: utf-8 import re def media_1280_extender(pipeline_index, finder_image_urls, extender_image_urls=[], *args, **kwargs): """ Example: http://25.media.tumblr.com/3f5f10d7216f1dd5eacb5eb3e302286a/tumblr_mtpcwdzKBT1qh9n5lo1_250.pn...
58
31.43
99
15
584
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_faea05173e756364_65f03c4c", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [media.tumblr.com/](1) may be at an arbitrary position ...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "The string [media.tumblr.com/](1) may be at an arbitrary position in the sanitized URL.", "The string [media.tumblr.com/](1) may be at an arbitrary position in the sanitized URL." ]
[ 23, 50 ]
[ null, null ]
[ 12, 12 ]
[ 52, 52 ]
2024-11-18T19:03:29.584035+00:00
1,553,245,889,000
342e751678c06543400ffa3fe3d155171014dfd9
3
{ "blob_id": "342e751678c06543400ffa3fe3d155171014dfd9", "branch_name": "refs/heads/master", "committer_date": 1553245889000, "content_id": "467f45b0dcff3b24075630a6379b5a235fbde762", "detected_licenses": [ "MIT" ], "directory_id": "cd34f6cc5e2168718d50513f4e1d356e063c9ff0", "extension": "py", "fi...
2.640625
stackv2
import os import re from botocore.vendored import requests from core.providers.base import MusicProvider YOUTUBE_API_KEY = os.environ.get('YOUTUBE_API_KEY') class YouTube(MusicProvider): NAME = 'YouTube' _ID_REGEX = re.compile(r'\?.*v=([\w]+)') _MUSIC_URL = 'https://youtube.com/watch?v={}' def get...
83
31.02
118
20
613
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_fc18db0d9563f8ee_75fa614e", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [youtube.com](1) may be at an arbitrary position in the...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [youtube.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 80 ]
[ null ]
[ 12 ]
[ 32 ]
2024-11-18T19:03:30.990751+00:00
1,689,760,555,000
32646cb7a70f027434726f86d7c36a59e4814eb1
3
{ "blob_id": "32646cb7a70f027434726f86d7c36a59e4814eb1", "branch_name": "refs/heads/main", "committer_date": 1689760555000, "content_id": "2472729fa8f88e50a040b2902a17ecca7c3f22b3", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "4ec55079d3632b2699c6a28e0481798561432bc5", "extension": "py"...
2.5625
stackv2
#!/usr/bin/env python3 """ Resources ========= The following constitutes the base-logic of CIJOE: * cijoe.core.command (Cijoe) * cijoe.core.transport (Transport, Local, SSH) * cijoe.core.misc (As the name suggests; various helper-functions) * cijoe.cli (Command-Line Tool and utilization of...
522
27.93
88
18
3,228
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_fc84caebe96074c1_ea87eddf", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 107 ]
[ null ]
[ 17 ]
[ 69 ]
2024-11-18T19:28:36.984471+00:00
1,576,737,763,000
f5115572374e61eec3caf2c1978b953fdfc92d53
3
{ "blob_id": "f5115572374e61eec3caf2c1978b953fdfc92d53", "branch_name": "refs/heads/master", "committer_date": 1576737763000, "content_id": "f810ba8dd6e93b91c72531b2b2a8b6a36191d986", "detected_licenses": [ "Apache-2.0" ], "directory_id": "8ff6b10cf27c3572a49627eb75e3b798cbf0866a", "extension": "py"...
2.78125
stackv2
import os, sys from random import shuffle import argparse import json from time import time def get_args(): parser = argparse.ArgumentParser(description='Arguments', formatter_class = argparse.ArgumentDefaultsHelpFormatter) parser.add_argument('-f', '--file', required=False, ...
134
38.42
119
19
1,216
python
[{"finding_id": "codeql_py/overly-permissive-file_92ee6f0345a5d16e_6d92c6d2", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in open sets file to world writable.", "remediation": "", "location": {...
2
true
[ "CWE-732", "CWE-732" ]
[ "py/overly-permissive-file", "py/overly-permissive-file" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Overly permissive mask in open sets file to world writable.", "Overly permissive mask in open sets file to world writable." ]
[ 56, 77 ]
[ null, null ]
[ 13, 13 ]
[ 64, 51 ]
2024-11-18T19:28:56.905261+00:00
1,548,057,285,000
0b2a360f6a96c2df5d767c96d34d4c6507f96661
3
{ "blob_id": "0b2a360f6a96c2df5d767c96d34d4c6507f96661", "branch_name": "refs/heads/master", "committer_date": 1548057285000, "content_id": "d8fe49bd04618433c1b22edd536accfe2d9ce45b", "detected_licenses": [ "MIT" ], "directory_id": "2719d4cb1d1f9c754bf689066c7cc8c9e80284bc", "extension": "py", "fi...
2.6875
stackv2
from statistics import mean from jinja2 import Environment, FileSystemLoader from .singleton import SITES I18NS = { 'zh-cn': { 'navbar.winter_season': '一月番剧', 'navbar.spring_season': '四月番剧', 'navbar.summer_season': '七月番剧', 'navbar.fall_season': '十月番剧', 'row.average': '平均',...
156
31.83
77
20
1,130
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_89be4d79bf3e7d93_9fdf0b69", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 43 ]
[ null ]
[ 20 ]
[ 67 ]
2024-11-18T19:39:55.282577+00:00
1,574,157,126,000
02305c1dadec19b26d5d823a8adb32941aac4f37
3
{ "blob_id": "02305c1dadec19b26d5d823a8adb32941aac4f37", "branch_name": "refs/heads/master", "committer_date": 1574157126000, "content_id": "e2a5b303427c36f4c0c798cd33e5c0264a9fa2cf", "detected_licenses": [ "MIT" ], "directory_id": "32325ff1595da47948b416ecfac6a4c13b2d6664", "extension": "py", "fi...
2.640625
stackv2
# django-salesforce """ A set of tools to deal with Salesforce actions that cannot or can hardly be implemented using the generic relational database abstraction. The Salesforce REST API is missing a few endpoints that are available in the SOAP API. We are using `beatbox` as a workaround for those specific actions (s...
59
32.83
94
13
448
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_54cdbf0232796051_4706f7f7", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [test.salesforce.com](1) may be at an arbitrary positio...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [test.salesforce.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 47 ]
[ null ]
[ 8 ]
[ 54 ]
2024-11-18T20:18:10.697257+00:00
1,618,246,180,000
7da42754e0c9bfb1109b9a3b4855610b8c159914
2
{ "blob_id": "7da42754e0c9bfb1109b9a3b4855610b8c159914", "branch_name": "refs/heads/main", "committer_date": 1618246180000, "content_id": "463017c7a63d266d6a1639c9a4a7d90d92e2e59c", "detected_licenses": [ "MIT" ], "directory_id": "ac4ae285eca536300fedce235f1cf374eeb6e3ad", "extension": "py", "file...
2.484375
stackv2
import io import traceback import subprocess import contextlib from flask import Flask, request app = Flask(__name__) @app.route("/api/v1/execute/batch", methods=["POST"]) def execute_batch(): json_data = request.json if json_data is None: return { "error": "We expect json with a `code` ...
73
21.26
62
13
381
python
[{"finding_id": "codeql_py/command-line-injection_4a77b8191e20bb8e_d4fd9167", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {...
4
true
[ "CWE-078", "CWE-209", "CWE-209", "CWE-094" ]
[ "py/command-line-injection", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/code-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This command line depends on a [user-provided value](1).", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "This code execution depends on a [user-provided value](1)."...
[ 27, 29, 59, 56 ]
[ null, 31, 63, null ]
[ 39, 16, 16, 24 ]
[ 43, 10, 10, 28 ]
2024-11-18T20:18:42.857119+00:00
1,619,894,431,000
eff830408743db54e4c7352496d4106e447ac32f
2
{ "blob_id": "eff830408743db54e4c7352496d4106e447ac32f", "branch_name": "refs/heads/master", "committer_date": 1619894431000, "content_id": "0dd028359e36e5f98d536f0b5a038d8e5f15820b", "detected_licenses": [ "MIT" ], "directory_id": "80fa4db91369dd83f68aeff802e8cc0e73bd00e8", "extension": "py", "fi...
2.46875
stackv2
from fastapi import FastAPI, Form, Request import sqlite3 from fastapi.templating import Jinja2Templates import os app = FastAPI() templates = Jinja2Templates(directory="templates") # delete db if exists try: os.remove("db.sqlite3") except FileNotFoundError: pass with open("flag.txt") as f: flag = f.rea...
51
27.78
124
13
384
python
[{"finding_id": "codeql_py/sql-injection_369f42339e58f714_385f4aba", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).\nThis SQL query depends on a [user-provided value](2)."...
1
true
[ "CWE-089" ]
[ "py/sql-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This SQL query depends on a [user-provided value](1).\nThis SQL query depends on a [user-provided value](2)." ]
[ 41 ]
[ null ]
[ 25 ]
[ 34 ]
2024-11-18T20:18:57.564234+00:00
1,417,096,503,000
6dea75dafcd9b740c7a407856dd6fc1ab7b88929
3
{ "blob_id": "6dea75dafcd9b740c7a407856dd6fc1ab7b88929", "branch_name": "refs/heads/master", "committer_date": 1417096503000, "content_id": "853db6ed9b2edaba0c8f8cd598b70e313e7ba7d3", "detected_licenses": [ "Apache-2.0" ], "directory_id": "346d6e2308e5bdc03aa46915810ee454b76cadd4", "extension": "py"...
2.5625
stackv2
import hashlib import requests import collections import json class SmsManager(): def __init__(self, pub_key, secret_key, version="3.0"): self.pub_key = pub_key self.secret_key = secret_key self.version = version def __get_hashsum(self, **kwargs): m = hashlib.md5() m.u...
67
45.06
115
22
668
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_1ac5942772527321_06c8542e", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 16 ]
[ null ]
[ 13 ]
[ 116 ]
2024-11-18T20:29:56.013123+00:00
1,520,398,364,000
6010f0168b2bcc592e8919b6639020d77f20cc80
3
{ "blob_id": "6010f0168b2bcc592e8919b6639020d77f20cc80", "branch_name": "refs/heads/master", "committer_date": 1520398364000, "content_id": "5a85dcd34d0135b81a61e116172ca18aa7ca3e48", "detected_licenses": [ "MIT" ], "directory_id": "f41956e588c875f197922041e0bc4946e510e39f", "extension": "py", "fi...
3.09375
stackv2
# -*- coding: utf-8 -*- """Updater is the package responsible for get new values from an external API and refresh the local file with updated financial indexes and currency pricing.""" from requests import get from os import environ from pandas import DataFrame from time import time, sleep import schedule def get...
69
27.07
73
10
469
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ee3bdc7375370a54_8cf892ca", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 30 ]
[ null ]
[ 11 ]
[ 12 ]
2024-11-18T19:07:26.344831+00:00
1,629,061,172,000
de405a74f73cbb6591413047dfff53c1abd4a625
3
{ "blob_id": "de405a74f73cbb6591413047dfff53c1abd4a625", "branch_name": "refs/heads/master", "committer_date": 1629061172000, "content_id": "c0585cace11787e0a368f42ade7245bed02feca8", "detected_licenses": [ "MIT" ], "directory_id": "ecfaacc8843a084a3f6edf7e5c482b7a78a5d85c", "extension": "py", "fi...
3.421875
stackv2
"""Query Wikidata for Belgian monarchs""" from datetime import datetime as dt from os import system, name from SPARQLWrapper import SPARQLWrapper, JSON def clear_terminal(): # for windows if name == 'nt': _ = system('cls') # for mac and linux else: _ = system('clear') def picker(cho...
139
28.53
85
15
1,036
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_03b6c72c0af0bcec_71c346b7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 90, 120 ]
[ 91, 124 ]
[ 13, 9 ]
[ 50, 15 ]
2024-11-18T19:18:41.917303+00:00
1,692,307,499,000
65edb2d85cfacc76f5258bf46789933fc369ee16
3
{ "blob_id": "65edb2d85cfacc76f5258bf46789933fc369ee16", "branch_name": "refs/heads/master", "committer_date": 1692307499000, "content_id": "8ddd34c4ec44c7211a4407a7b3daffc4ccc70494", "detected_licenses": [ "Apache-2.0" ], "directory_id": "2ae0b8d95d439ccfd55ea7933ad4a2994ad0f6c5", "extension": "py"...
3.3125
stackv2
from jinja2 import Template from os import path, remove from shutil import rmtree def create_content(template: str, notebooks_data: dict, file_name: str): """Filling rst template with data :param template: jinja template that will be filled with notebook data :type template: str :param notebooks_data...
88
29.44
90
17
653
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_8549a568d9354c30_aaeb715d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 19 ]
[ null ]
[ 16 ]
[ 34 ]
2024-11-18T19:18:53.730577+00:00
1,629,570,200,000
ea6525aef81e82e9672fd60072c277f7b2cf8ba2
3
{ "blob_id": "ea6525aef81e82e9672fd60072c277f7b2cf8ba2", "branch_name": "refs/heads/main", "committer_date": 1629570200000, "content_id": "1bbc046066c0cbc384caf9e6d59d4fbcee29e11e", "detected_licenses": [ "MIT" ], "directory_id": "402203e5951a4bbf4b6f272cf86b064bef2dff91", "extension": "py", "file...
2.671875
stackv2
from flask import Flask, render_template, request import json import urllib.request app = Flask(__name__) @app.route('/', methods = ["POST", "GET"]) def weather(): if request.method == 'POST': city = request.form['city'] else: city = 'mathura' api_key = "ab210ddf92d4f60081d9f986f6d...
36
26.69
122
16
265
python
[{"finding_id": "codeql_py/flask-debug_d2ee2f1a23771345_ec388105", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-918" ]
[ "py/flask-debug", "py/partial-ssrf" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 36, 20 ]
[ null, null ]
[ 5, 14 ]
[ 24, 116 ]