added
stringlengths
32
32
created
int64
1,244B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.25
source
stringclasses
1 value
text
stringlengths
324
20.1k
num_lines
int64
16
598
avg_line_length
float64
15.1
58.3
max_line_length
int64
33
179
ast_depth
int64
8
39
length
int64
101
3.8k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.1k
265k
sast_codeql_findings_count
int64
1
45
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
45
rule_ids
listlengths
1
45
confidences
listlengths
1
45
severities
listlengths
1
45
messages
listlengths
1
45
line_starts
listlengths
1
45
line_ends
listlengths
1
45
column_starts
listlengths
1
45
column_ends
listlengths
1
45
2024-11-18T21:01:32.293074+00:00
1,394,921,030,000
7ce035079f8455277b65b43621f3679406ca8a05
2
{ "blob_id": "7ce035079f8455277b65b43621f3679406ca8a05", "branch_name": "refs/heads/master", "committer_date": 1394921030000, "content_id": "62bea5d8ea968617409ca0b4aca19f3e1f481c6b", "detected_licenses": [ "MIT" ], "directory_id": "6c865c0fc66cfba5468cf840cf703182bf19e4f1", "extension": "py", "fi...
2.375
stackv2
from flask import Flask, render_template, url_for, request from TaskCLI import get_cli, format_seconds, get_sub_tasks, run_unit_tests, \ start_cli from collections import namedtuple import thread import traceback import utils import os import argparse import time import logging import re import pick...
253
30.83
79
20
1,860
python
[{"finding_id": "codeql_py/flask-debug_45e848e1e505eeb6_7d37a5e9", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-022" ]
[ "py/flask-debug", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1)." ]
[ 238, 76 ]
[ null, null ]
[ 5, 37 ]
[ 51, 52 ]
2024-11-18T21:25:36.552807+00:00
1,649,149,618,000
dd8dd00039cc638ca6e481d2afa6258b0e058ed9
2
{ "blob_id": "dd8dd00039cc638ca6e481d2afa6258b0e058ed9", "branch_name": "refs/heads/master", "committer_date": 1649149618000, "content_id": "5eec7706c82be0f5154020cfcb4e2c0a0184aa35", "detected_licenses": [ "Apache-2.0" ], "directory_id": "b295b72d3f9471e1badf2d1568fa4748007403bd", "extension": "py"...
2.328125
stackv2
#!/usr/bin/env python from __future__ import print_function import requests import argparse import json import sys from requests.packages.urllib3.exceptions import InsecureRequestWarning from os.path import getmtime from time import time from tempfile import gettempdir try: from urllib.parse import urlparse excep...
161
32.96
117
23
1,182
python
[{"finding_id": "codeql_py/request-without-cert-validation_eec13f8b2eb7ac97_08daad5d", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 63 ]
[ null ]
[ 17 ]
[ 96 ]
2024-11-18T22:00:14.844000+00:00
1,482,164,433,000
e3b63e5cabb035bd6d2223b525f20d6d7975d699
3
{ "blob_id": "e3b63e5cabb035bd6d2223b525f20d6d7975d699", "branch_name": "refs/heads/master", "committer_date": 1482164433000, "content_id": "cde0d2c5c3aa0fd790b7078101dac776148e6662", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "226cf4cdc8469ca4243ea0900deb79e36cead77a", "extension": "p...
2.671875
stackv2
from __future__ import absolute_import, division, print_function, unicode_literals import collections import hashlib import logging import re import sys import threading from functools import partial from textwrap import dedent from .common.compat import on_win from .common.url import path_to_url log = logging.getLo...
446
27.36
117
16
3,344
python
[{"finding_id": "codeql_py/redos_a9b017a5ebbc2b5f_1dae87a9", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'A:/' and containing many repetiti...
2
true
[ "CWE-1333", "CWE-1333" ]
[ "py/redos", "py/redos" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with 'A:/' and containing many repetitions of '!/'.", "This part of the regular expression may cause exponential backtracking on strings starting with 'A:/!' and containing many repetitions of '//'." ]
[ 120, 120 ]
[ null, null ]
[ 52, 63 ]
[ 63, 70 ]
2024-11-18T22:00:16.233189+00:00
1,582,927,065,000
19577b7aef1914d1dd1897990e7ba8619efbec3d
3
{ "blob_id": "19577b7aef1914d1dd1897990e7ba8619efbec3d", "branch_name": "refs/heads/master", "committer_date": 1582927065000, "content_id": "179a6daec747fc95ddb47ee32fe68b378c8a35b4", "detected_licenses": [ "Apache-2.0" ], "directory_id": "83e7830e874e8532f221d92a50bfbf42a45d0e82", "extension": "py"...
3.125
stackv2
"""WakerUp Usage: wakerup.py [-hdv] CONFIGFILE Read in a list of hosts to wake up in the CONFIGFILE and a log file to watch for a specified regex. Arguments: CONFIGFILE configuration file Options: -h --help -v Print out information as it runs -d Debug information --v...
175
35.21
111
18
1,400
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_27fac734fed32b23_aa08933d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 103, 105 ]
[ null, null ]
[ 27, 26 ]
[ 95, 73 ]
2024-11-18T22:00:47.662289+00:00
1,612,810,864,000
2adf5f8fad59a70d25a818c52f29ee4d12ea7926
3
{ "blob_id": "2adf5f8fad59a70d25a818c52f29ee4d12ea7926", "branch_name": "refs/heads/main", "committer_date": 1612810864000, "content_id": "6d0681cd97489d9cc2d81f137f6bb88c3fc6a0a1", "detected_licenses": [ "MIT" ], "directory_id": "82210d6f66aa6a071140d8093e181e8c0305affe", "extension": "py", "file...
2.71875
stackv2
import argparse import os import sys from commands import allTimeSinceToday from commands import CodingGoals from commands import languageData from commands import projects from termcolor import colored def main(): print(colored('Welcome, Track your coding activities with CODINGCLI\n','magenta')) parser = ar...
49
41.92
128
14
496
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_4c5c554ad292dd4e_4dcbfc65", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 40 ]
[ null ]
[ 21 ]
[ 28 ]
2024-11-18T22:15:04.095957+00:00
1,572,821,368,000
ac160922980d69fee7fc85d6ce812bd404b531e9
3
{ "blob_id": "ac160922980d69fee7fc85d6ce812bd404b531e9", "branch_name": "refs/heads/master", "committer_date": 1572821368000, "content_id": "0cc7169a0b5d5c26d3742f8c69f1acdd0d0c86a7", "detected_licenses": [ "Apache-2.0" ], "directory_id": "2b168b7463fcc376334a31498400108f13d2c614", "extension": "py"...
2.65625
stackv2
#!/usr/bin/env python # this script does the following: # 1. Read in a configuration file. # 2. Create a kickstart file based on a template # 3. Create an image from that kickstart file to be used to boot a UCS. import os from socket import inet_aton, error as Serror from jinja2 import Environment, FileSystemLoade...
161
28.14
73
14
1,217
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_187c795d7efd57bd_f9b1233f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 155 ]
[ 156 ]
[ 10 ]
[ 39 ]
2024-11-18T20:52:16.832972+00:00
1,692,596,779,000
15821b1b041ccca72e82f0d7591f128ec93ffb97
3
{ "blob_id": "15821b1b041ccca72e82f0d7591f128ec93ffb97", "branch_name": "refs/heads/main", "committer_date": 1692596779000, "content_id": "9a4fb3c5b7dd1fc18ac49129b378208aa2471610", "detected_licenses": [ "MIT" ], "directory_id": "d3897da94dae9fdc8bf0e024845399b6b2f43c5e", "extension": "py", "file...
2.9375
stackv2
import markupsafe from flask import Flask, request app = Flask(__name__) @app.route('/') def hello_world(): return 'Hello World!' @app.route("/hello/<string:name>") def hello(name): return f"Hello, {markupsafe.escape(name)}!" @app.route("/path/<path:url_path>") def path(url_path): return f"Path is: {...
38
18.03
53
10
185
python
[{"finding_id": "codeql_py/reflective-xss_8292adb4fc69bc4c_f15da20e", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 19, 34 ]
[ null, null ]
[ 12, 12 ]
[ 34, 54 ]
2024-11-18T21:08:17.556965+00:00
1,614,446,141,000
bb519b675fc93dcfff8e268f655ef2108698edda
4
{ "blob_id": "bb519b675fc93dcfff8e268f655ef2108698edda", "branch_name": "refs/heads/master", "committer_date": 1614446141000, "content_id": "653c377f3df7cc1d4a6e37ed4658a74ee19cda4f", "detected_licenses": [ "MIT" ], "directory_id": "a761a0d4d2d9ddf2df2eb8bf316de1280a60fd4f", "extension": "py", "fi...
3.796875
stackv2
gibber = input("What's the gibberish?: ") direction = input("Left/Right?: ") retry = int(input("How much do you want to try?: ")) charlist = "abcdefghijklmnopqrstuvwxyz " dictionary = {} index = 0 for e in charlist: dictionary[e] = index index += 1 jump = 1 if direction == "Right": for cycle in range(retr...
28
26.11
67
15
188
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_299f60aad2e2f2a2_f39cdeb1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text." ]
[ 20, 28 ]
[ null, null ]
[ 15, 15 ]
[ 24, 24 ]
2024-11-18T21:08:26.839765+00:00
1,623,677,294,000
005710c992b5499e70860c66b8f591ec710e514b
3
{ "blob_id": "005710c992b5499e70860c66b8f591ec710e514b", "branch_name": "refs/heads/main", "committer_date": 1623677294000, "content_id": "2fea6e638651c5dd25d78ea1e73e968f72bba3e2", "detected_licenses": [ "Apache-2.0" ], "directory_id": "5f6a01d7052429a0333448145c25d03614c41b24", "extension": "py", ...
3.03125
stackv2
import os import pandas as pd import streamlit as st from datetime import date #pd.set_option('display.max_colwidth', None) pd.set_option('display.max_rows', None) today = date.today() st.markdown('if you want to search for either of multiple terms write as (cats OR dogs), if you want to search for exact phrase ...
42
36.67
157
14
421
python
[{"finding_id": "codeql_py/command-line-injection_d7d7c068dd63abeb_5c6751c4", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).\nThis command line depends on a [u...
2
true
[ "CWE-078", "CWE-078" ]
[ "py/command-line-injection", "py/command-line-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This command line depends on a [user-provided value](1).\nThis command line depends on a [user-provided value](2).\nThis command line depends on a [user-provided value](3).", "This command line depends on a [user-provided value](1).\nThis command line depends on a [user-provided value](2).\nThis command line dep...
[ 24, 35 ]
[ null, null ]
[ 19, 19 ]
[ 129, 157 ]
2024-11-18T21:08:32.819690+00:00
1,627,857,443,000
3b44fd1f7adf6adc2d25a28e3e67f8a7bb50734c
3
{ "blob_id": "3b44fd1f7adf6adc2d25a28e3e67f8a7bb50734c", "branch_name": "refs/heads/master", "committer_date": 1627857443000, "content_id": "553d0513590d10602df54e56f4ab83018f62cdf8", "detected_licenses": [ "MIT" ], "directory_id": "6ca3493ddf2357e4df8d768ba6bb4abe752e15f6", "extension": "py", "fi...
3.140625
stackv2
from .browser import Browser import logging logger = logging.getLogger(__name__) class LoginPage(Browser): def __init__(self, **kwargs): self.url = "http://the-internet.herokuapp.com/login" super().__init__(**kwargs) self.go_to_page() def go_to_page(self): """Go to the Login ...
79
36
90
14
567
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d0f426010bbfcd1c_2e53ff2f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 36 ]
[ null ]
[ 22 ]
[ 67 ]
2024-11-18T21:32:01.198460+00:00
1,689,797,054,000
12a5fb3666ef9c234210b7a6919fb66af57cdad4
2
{ "blob_id": "12a5fb3666ef9c234210b7a6919fb66af57cdad4", "branch_name": "refs/heads/master", "committer_date": 1689797054000, "content_id": "0b2b90a84fe70e8a21b76bc70252b5d565781edc", "detected_licenses": [ "MIT" ], "directory_id": "b0f656c8624f8332f78bb20310cca07160ce8054", "extension": "py", "fi...
2.34375
stackv2
# imggen.py - Generate images from HTML templates # Copyright (C) 2022-2023 ksqsf # Permission is hereby granted, free of charge, to any person # obtaining a copy of this software and associated documentation files # (the "Software"), to deal in the Software without restriction, # including without limitation the rig...
54
33.83
87
12
477
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_9aad7b5f6e7e093a_cfaa2450", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 30 ]
[ null ]
[ 20 ]
[ 38 ]
2024-11-18T21:32:02.981474+00:00
1,488,543,714,000
a7f3d3b9d6802dd67f54174b6bab5b00af908756
2
{ "blob_id": "a7f3d3b9d6802dd67f54174b6bab5b00af908756", "branch_name": "refs/heads/master", "committer_date": 1488543714000, "content_id": "3917d4b57b218bbd5f5092436a466302d0fe830a", "detected_licenses": [ "MIT" ], "directory_id": "fc02a076bff640b7dd2a9c1d45182aabb5f08b9c", "extension": "py", "fi...
2.34375
stackv2
# MIT License # # Copyright (c) 2016 Emenda Nordic # # Permission is hereby granted, free of charge, to any person obtaining a copy # of this software and associated documentation files (the "Software"), to deal # in the Software without restriction, including without limitation the rights # to use, copy, modify, merge...
159
39.39
102
17
1,442
python
[{"finding_id": "codeql_py/redos_5f6bb2ffaf620bc8_b8583c5b", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'http://' and containing many repe...
2
true
[ "CWE-1333", "CWE-1333" ]
[ "py/redos", "py/redos" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with 'http://' and containing many repetitions of '-'.", "This part of the regular expression may cause exponential backtracking on strings starting with 'http://' and containing many repetitions of '-'." ]
[ 32, 33 ]
[ null, null ]
[ 36, 36 ]
[ 43, 43 ]
2024-11-18T21:32:03.463120+00:00
1,548,441,068,000
ce6872c04ac2924b0969b5d33b26fa3337442106
2
{ "blob_id": "ce6872c04ac2924b0969b5d33b26fa3337442106", "branch_name": "refs/heads/master", "committer_date": 1548441068000, "content_id": "b07ba3ef787e0e27656080210c832d0f6658ea82", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e59e0d63c02ca2b9722f698d2cb66bc74f70c1fe", "extension": "py"...
2.375
stackv2
#!/usr/bin/env python3 import os import cgi import cgitb cgitb.enable() from templates import login_page, secret_page, after_login_incorrect from secret import username, password form = cgi.FieldStorage() f_username = form.getfirst("username") f_password = form.getfirst("password") request_type = os.environ.get("REQU...
45
24.07
68
10
274
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b98e07687f990708_e84de7cd", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 30, 38, 40 ]
[ null, null, null ]
[ 11, 11, 11 ]
[ 46, 56, 46 ]
2024-11-18T21:32:22.153807+00:00
1,552,933,045,000
f6a31676155f4af8408527d60fe5f1cb58ef4e0c
4
{ "blob_id": "f6a31676155f4af8408527d60fe5f1cb58ef4e0c", "branch_name": "refs/heads/master", "committer_date": 1552933045000, "content_id": "5105f347c641a72bf2cf06de3b714cdea8e8c557", "detected_licenses": [ "Apache-2.0" ], "directory_id": "06f34db297e1de57b926eb5bc5f3b7489f57563c", "extension": "py"...
4.375
stackv2
def main(): """ the main body of the program displays each of the choices available to the user. after making a choice the program will validate it and then if it is valid will go to the search employees function. """ print("") choice="" search_employees(cho...
170
27.18
125
19
983
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3a19aa3a315d2156_a7a5a570", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.\nThis expression logs [sensitive data (private)](4) as clear text.\nThis expression logs [sensitive data (private)]...
[ 142 ]
[ null ]
[ 11 ]
[ 17 ]
2024-11-18T21:32:22.670342+00:00
1,593,493,209,000
277c92b917da74a8c194c1899a251a257f028a7c
3
{ "blob_id": "277c92b917da74a8c194c1899a251a257f028a7c", "branch_name": "refs/heads/master", "committer_date": 1593493209000, "content_id": "12552941b0befb2254decbd1e10487d648ce4721", "detected_licenses": [ "MIT" ], "directory_id": "40d98e9565b1271d3ad4c85b548b0a689bf765a8", "extension": "py", "fi...
2.703125
stackv2
# IMPORT PACKAGES ----------------------------------------------------------------------- import requests import dotenv import json import datetime import csv import os from dotenv import load_dotenv import time import pandas as pd from app.portfolio_import import portfolio_import # DEFINE FUNCTIONS -----------------...
220
38.12
163
23
1,793
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_dafb75b065324dac_222cd7c1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 95 ]
[ null ]
[ 23 ]
[ 71 ]
2024-11-18T21:49:05.420496+00:00
1,378,438,222,000
71d575d1e30752f7128becd90ba971cf8e608a81
4
{ "blob_id": "71d575d1e30752f7128becd90ba971cf8e608a81", "branch_name": "refs/heads/master", "committer_date": 1378438222000, "content_id": "179ec99bb24a1b353003cb8c0256795acec53960", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "e1d5c6fa1cb910b1ff16ce690d682d074fcb8d6f", "extension": "p...
3.59375
stackv2
import string, random, sys def genPass(numChars, usePunc): chars = string.ascii_letters + string.digits if usePunc: chars = chars + string.punctuation password = '' for i in range(numChars): password = password + random.choice(chars) return password def isInteger(s): try: int(s) return True except Valu...
34
20.91
77
15
222
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e0c1441ac3e2070f_69a6f3a7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 32 ]
[ null ]
[ 8 ]
[ 34 ]
2024-11-18T21:49:05.961495+00:00
1,634,585,115,000
be58a9179508278597502af64b0d441d1f69bdd9
3
{ "blob_id": "be58a9179508278597502af64b0d441d1f69bdd9", "branch_name": "refs/heads/master", "committer_date": 1634753263000, "content_id": "e4d7e817d5530f1ccd89f1554f6803dd81402760", "detected_licenses": [ "Apache-2.0" ], "directory_id": "b7af38eefe4e0d6097c3af27deb7f8084a6b2181", "extension": "py"...
3.125
stackv2
# (C) Copyright 2019-2021 Hewlett Packard Enterprise Development LP. # Apache License 2.0 from pyaoscx.exceptions.generic_op_error import GenericOperationError from pyaoscx.exceptions.response_error import ResponseError def create_attrs(obj, data_dictionary): ''' Given a dictionary object creates class attri...
292
30.52
89
17
2,015
python
[{"finding_id": "codeql_py/request-without-cert-validation_05266b9a4c9d01f2_2543d96f", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 260 ]
[ 267 ]
[ 30 ]
[ 39 ]
2024-11-18T21:49:28.581118+00:00
1,563,295,809,000
992c23d784fbd046a660a30231ee558bf504bcdd
3
{ "blob_id": "992c23d784fbd046a660a30231ee558bf504bcdd", "branch_name": "refs/heads/master", "committer_date": 1563295809000, "content_id": "b365f0507f6efe2bb2d24ba44531d0634f3f4f31", "detected_licenses": [ "Apache-2.0" ], "directory_id": "96c9905c1db606083895328b1034c220f37e1770", "extension": "py"...
2.703125
stackv2
#!/usr/bin/env python3 import sys import base64 import ssl import socket import select import fcntl import os import argparse import re import subprocess VERSION="1.0.1" def piggyback(proxy_host, proxy_port, target_host, target_port, auth): """ the piggyback main loop. connects and authenticates with the pro...
203
33.56
136
25
1,537
python
[{"finding_id": "codeql_py/insecure-default-protocol_0b27b10f48d2c39e_b25794f3", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in...
1
true
[ "CWE-327" ]
[ "py/insecure-default-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used." ]
[ 29 ]
[ null ]
[ 14 ]
[ 34 ]
2024-11-18T22:26:06.656122+00:00
1,513,839,699,000
c3394ecc2e5e6addbfe77bd2e44eea20d2e3c52c
4
{ "blob_id": "c3394ecc2e5e6addbfe77bd2e44eea20d2e3c52c", "branch_name": "refs/heads/master", "committer_date": 1513839699000, "content_id": "eb9e3fe3543a235d6c9abe72b88b32a94d117b9e", "detected_licenses": [ "MIT" ], "directory_id": "52d4e11430d92a05d7d76ae7b1bcac91d12a713a", "extension": "py", "fi...
3.890625
stackv2
#encoding=utf-8 import hashlib # 作者:杨公旺 # 日期:2017-12-18 # 功能:用户登录 # 思路: # 1、接收用户输入的账号、密码等信息 # 2、判断账号是否存在,如果不存在即返回错误 # 3、对密码信息进行加密后比对,如果一致,则登录成功。因密码是不可逆加密,所以比对加密后的密文内容 # 判断用户名是否存在的函数 # 需要传入两个参数:文件名和账号名 # 将每行的第一个元素(用户名)取出来,放到一个list中,判断用户输入的账号是否在这个list中 def is_user_password(filename,user_name): with open(f...
94
21.51
78
17
709
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_dd2c507a5779f097_223ffcb3", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally e...
[ 52 ]
[ null ]
[ 27 ]
[ 47 ]
2024-11-18T22:42:06.004282+00:00
1,613,313,438,000
3d6691ebcd07f2138d644662e7db3b019c518330
3
{ "blob_id": "3d6691ebcd07f2138d644662e7db3b019c518330", "branch_name": "refs/heads/master", "committer_date": 1613313438000, "content_id": "5a8a125fb47db119c097ab167a0c7b75f49b78b0", "detected_licenses": [ "MIT" ], "directory_id": "1829f63f6dee7103c378d7d75b639aa76b3a05cc", "extension": "py", "fi...
3.078125
stackv2
""" A tcpdump like tool that takes command-line arguments: Destination IP Address, Destination Port Number, Protocol Name (optional) Where protocol name should handle following protocols: http, telnet, ftp, tcp, udp """ import os import re import socket import struct import sys import threading from collections impor...
395
28.45
98
18
2,905
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a462d724754ead35_a79c1fb5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
4
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (p...
[ 315, 316, 317, 321 ]
[ null, null, null, null ]
[ 11, 11, 11, 15 ]
[ 21, 20, 23, 37 ]
2024-11-18T22:42:11.646949+00:00
1,587,254,920,000
9f8d324623eabeba353c6ea53f9bbaa4e903a1d9
4
{ "blob_id": "9f8d324623eabeba353c6ea53f9bbaa4e903a1d9", "branch_name": "refs/heads/master", "committer_date": 1587254920000, "content_id": "9a62ca7d61a14a5d8ae42f7bd4f218d9f6b4f0ff", "detected_licenses": [ "MIT" ], "directory_id": "a2029797537515ba87a3e39ce3780d4dce766f36", "extension": "py", "fi...
3.875
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- # @Date : 2020-02-20 17:04:47 # @Author : ZubinGou (zebgou@gmail.com) # @Link : https://github.com/ZubinGou # @Version : $Id$ print('Practice make prefect') print('You\'d need to \'bout escapes with \\ that do:') print('\n newlines and \t tabs') poem = ''' \t the lo...
36
25.75
70
9
297
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_529734a0bbad5dc3_7907d5c7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 31 ]
[ null ]
[ 7 ]
[ 68 ]
2024-11-18T22:42:15.318035+00:00
1,628,862,221,000
734ccfb7d8ac33dd7e21c0bafad603045f4be53c
2
{ "blob_id": "734ccfb7d8ac33dd7e21c0bafad603045f4be53c", "branch_name": "refs/heads/master", "committer_date": 1628862221000, "content_id": "bedb710a842ddd9f005b710ebe7d7592d1db896c", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e1c417ad837397cf296310b25217d4287a5b7301", "extension": "py"...
2.390625
stackv2
#################################################################### # ### relationship_util.py ### #################################################################### # ### Author: SAS Institute Inc. ### #############################################...
383
51.38
120
26
3,510
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_69f8a16a7ec831a4_343407ac", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [networking.k8s.io](1) may be at an arbitrary position ...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [networking.k8s.io](1) may be at an arbitrary position in the sanitized URL." ]
[ 322 ]
[ null ]
[ 20 ]
[ 77 ]
2024-11-18T20:31:28.023886+00:00
1,587,371,256,000
8eb597d6b69e107f3712d9545e7c9572d0f39922
2
{ "blob_id": "8eb597d6b69e107f3712d9545e7c9572d0f39922", "branch_name": "refs/heads/master", "committer_date": 1587371256000, "content_id": "472baeb38af20449e97167871269c8aa7c455c78", "detected_licenses": [ "MIT" ], "directory_id": "e0ef30a8b0b6caa03fde8284b97ea57a15fb8904", "extension": "py", "fi...
2.453125
stackv2
from flask import Flask, render_template, jsonify, request from random import * from flask_cors import CORS from pathlib import Path import requests import boto3 import botocore import os if not os.path.exists(os.getcwd()+"/model/08_58_Feb_08_2020"): os.makedirs(os.getcwd()+"/model/08_58_Feb_08_2020") if not os.pa...
116
34.39
126
14
1,238
python
[{"finding_id": "codeql_py/reflective-xss_49a9e0144c76581c_ff0b778e", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
2
true
[ "CWE-079", "CWE-918" ]
[ "py/reflective-xss", "py/partial-ssrf" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 107, 107 ]
[ null, null ]
[ 16, 16 ]
[ 74, 69 ]
2024-11-18T20:31:37.371661+00:00
1,524,448,325,000
5d6924d8ec9cc0e4ccac1f1630f72dc3389b90a0
3
{ "blob_id": "5d6924d8ec9cc0e4ccac1f1630f72dc3389b90a0", "branch_name": "refs/heads/master", "committer_date": 1524448325000, "content_id": "dee96bab0ffdb97094eff1ed9a734dc59e13e8e5", "detected_licenses": [ "MIT" ], "directory_id": "921da8004df0ce0858a087e1352d79b2ef178a67", "extension": "py", "fi...
3.109375
stackv2
''' Created on Feb 15, 2016 @author: hanhanwu The code aims at collecting urls in an indicated academic topics, academic papers, related news, links will be put into a set of direct_resource * Get urls from the seed web page, and get urls from each url, how many layers to on depends o the defined depth * Return: d...
114
32.75
123
21
945
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_e049f82bd79ba69d_98ad5b0a", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [//dx.doi.org](1) may be at an arbitrary position in th...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [//dx.doi.org](1) may be at an arbitrary position in the sanitized URL." ]
[ 47 ]
[ null ]
[ 10 ]
[ 40 ]
2024-11-18T20:31:53.048551+00:00
1,629,292,122,000
f74f1ac96e69eaeebc56fdc749b3485ea3d2b7a9
2
{ "blob_id": "f74f1ac96e69eaeebc56fdc749b3485ea3d2b7a9", "branch_name": "refs/heads/master", "committer_date": 1629292122000, "content_id": "6387f20ef1ac81d2cd5b4288c4d6129d50889518", "detected_licenses": [ "MIT" ], "directory_id": "4366ae34f1d091f7ed55ddfaa4abeb276a40bbd1", "extension": "py", "fi...
2.46875
stackv2
import re from lxml.html import fromstring # 删除一个页面中无用的节点 def remove_useless_code(html): html = re.sub('<style.*?</style ?>', '', html, flags=re.S) html = re.sub('<script.*?</script ?>', '', html, flags=re.S) html = re.sub('<video.*?</video ?>', '', html, flags=re.S) html = re.sub('<iframe.*?</iframe ?...
28
28.71
64
13
216
python
[{"finding_id": "codeql_py/bad-tag-filter_b06e31f0977d21c8_5104b28b", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression does not match upper case <SCRIPT> tags.", "remediation": "", "location": {"file_path": ...
1
true
[ "CWE-116" ]
[ "py/bad-tag-filter" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression does not match upper case <SCRIPT> tags." ]
[ 7 ]
[ null ]
[ 20 ]
[ 41 ]
2024-11-18T20:53:37.804608+00:00
1,586,963,422,000
46644ed403e1d5f6328bf0e3d0050d57f0f03a11
2
{ "blob_id": "46644ed403e1d5f6328bf0e3d0050d57f0f03a11", "branch_name": "refs/heads/master", "committer_date": 1586963422000, "content_id": "f9b00c4c807d6dba40988d1228fff8ab2dd919e9", "detected_licenses": [ "MIT" ], "directory_id": "a73b6244f6951342e916f4fcefa3f3b52acd57de", "extension": "py", "fi...
2.3125
stackv2
import os, requests, socket from flask import Flask, session, render_template, url_for, redirect, g, request, redirect, jsonify from flask_session import Session from werkzeug.security import generate_password_hash, check_password_hash from flask_socketio import SocketIO, emit, join_room, leave_room from models import...
341
38.59
146
22
3,009
python
[{"finding_id": "codeql_py/url-redirection_e2c3a6242716084b_ce584d8f", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 338 ]
[ null ]
[ 25 ]
[ 28 ]
2024-11-18T21:10:22.056282+00:00
1,603,797,639,000
350cb4133c45160f4180fb28e1f452bfa4424566
2
{ "blob_id": "350cb4133c45160f4180fb28e1f452bfa4424566", "branch_name": "refs/heads/master", "committer_date": 1603797639000, "content_id": "96e19e26d6a7ed3ea812ed17d0b6654dfcf8c9ad", "detected_licenses": [ "MIT" ], "directory_id": "3812a65ac03b807e4c9c777d9afe4dd6d7278c55", "extension": "py", "fi...
2.4375
stackv2
#!/usr/bin/env python3 import argparse import paramiko import threading import prettytable import scp import cmd2 import os import sys from datetime import datetime from tunnels import ForwardTunnel, ReverseTunnel, Tunnel # TODO # - Download/Upload to relative path # - Fix prompts def print_info(msg): print ("[*]...
358
29.81
137
17
2,485
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_02ebecdda6ff2f7c_373db951", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 54 ]
[ null ]
[ 13 ]
[ 85 ]
2024-11-18T21:10:56.279061+00:00
1,621,924,656,000
36489de05e4b2d738b05d40ba210c1dd18ec4cab
2
{ "blob_id": "36489de05e4b2d738b05d40ba210c1dd18ec4cab", "branch_name": "refs/heads/main", "committer_date": 1621924656000, "content_id": "49efe75d501c668fe5af1c9bef745d7fc21e090e", "detected_licenses": [ "MIT" ], "directory_id": "3927e911ba668370492bc95a54af2030bf2fa0a8", "extension": "py", "file...
2.4375
stackv2
#!/home/kjgong/anaconda3/bin/python3 import time import os import sys import threading import paramiko import arrow # from multiprocessing.dummy import Pool import queue from prettytable import PrettyTable ts = os.get_terminal_size() if ts.lines < 31: exit("ERROR:Your terminal size is too small to print this t...
139
30.57
168
24
1,125
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_850987ea13c81801_a314bfbe", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 27 ]
[ null ]
[ 9 ]
[ 74 ]
2024-11-18T21:47:30.188372+00:00
1,514,100,146,000
c512eec2894a2c18c3c88ebd2b6fae849ce352e8
2
{ "blob_id": "c512eec2894a2c18c3c88ebd2b6fae849ce352e8", "branch_name": "refs/heads/master", "committer_date": 1514100146000, "content_id": "fcd05b979fdc9fa84ca667497a2b3d034453dc86", "detected_licenses": [ "MIT" ], "directory_id": "478c31a920a72cf253311c6271ba4cf7b187d35e", "extension": "py", "fi...
2.421875
stackv2
#!/usr/bin/env python import subprocess from flask import Flask from flask import request import requests import time import threading app = Flask(__name__) from scenarios import * kill_container_after = 5 #sec # e.g. /GET/cli/python/docker/1337 @app.route('/GET/<reqtype>/<platform>/<cont>/<int:inp>', methods=['GET'...
95
34.14
126
14
847
python
[{"finding_id": "codeql_py/command-line-injection_e399677512770ef4_3db0fbb2", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {...
4
true
[ "CWE-078", "CWE-215", "CWE-079", "CWE-918" ]
[ "py/command-line-injection", "py/flask-debug", "py/reflective-xss", "py/partial-ssrf" ]
[ "HIGH", "HIGH", "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This command line depends on a [user-provided value](1).", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Part of the URL of this request depends on a [user-provid...
[ 58, 95, 35, 47 ]
[ null, null, null, null ]
[ 36, 3, 10, 11 ]
[ 74, 57, 20, 28 ]
2024-11-18T21:47:41.669850+00:00
1,418,128,465,000
a4a7721064ffe2ab122918a2bff8d00007956b5d
2
{ "blob_id": "a4a7721064ffe2ab122918a2bff8d00007956b5d", "branch_name": "refs/heads/master", "committer_date": 1418128465000, "content_id": "19bad5bacbc57dfa686934fe5b863e32d9304991", "detected_licenses": [ "MIT" ], "directory_id": "32264e604d785b6c111628ee1203351f7dde21b9", "extension": "py", "fi...
2.5
stackv2
# -*- coding : utf-8 -*- # from __future__ import unicode_literals import os import re import urllib2, urllib def get_env_login_pass(): try: login = os.environ['EPOCHTA_LOGIN'] except KeyError: raise Exception('NOT SET EPOCHTA_LOGIN') try: password = os.environ['EPOCHTA_PASS'] ...
249
33.76
131
17
1,779
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_54265ffb6b81cdb5_5306b1b4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (p...
[ 227, 238 ]
[ null, null ]
[ 20, 19 ]
[ 56, 58 ]
2024-11-18T22:28:47.694332+00:00
1,342,543,638,000
b6a392bcfacf2ae20c81cf11657dd23845b1fe00
3
{ "blob_id": "b6a392bcfacf2ae20c81cf11657dd23845b1fe00", "branch_name": "refs/heads/master", "committer_date": 1342543638000, "content_id": "27f363b4af35e22f4a9ffbfa5dedbd79fe42bb6d", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "d5464985c22c0ea937929d18d1599f4d369ffbf0", "extension": "p...
2.6875
stackv2
from django import forms from django.db import models from django.conf import settings from django.utils.encoding import smart_str import os from base64 import b64decode, b64encode from Crypto.Cipher import ARC4 class EncryptedCharField(models.TextField): """A field that stores short text data in an encrypted forma...
50
29.86
87
17
404
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_2e95b6df9f3fca02_38b82df6", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The cryptographic algorithm ARC4](1) is broken or weak, and should not be used.", "...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[The cryptographic algorithm ARC4](1) is broken or weak, and should not be used.", "[The cryptographic algorithm ARC4](1) is broken or weak, and should not be used." ]
[ 26, 32 ]
[ null, null ]
[ 48, 15 ]
[ 73, 41 ]
2024-11-18T22:28:50.101766+00:00
1,508,016,981,000
60c563ba2b68fc7cdaf11857e4ce3d6c6ae31929
3
{ "blob_id": "60c563ba2b68fc7cdaf11857e4ce3d6c6ae31929", "branch_name": "refs/heads/master", "committer_date": 1508016981000, "content_id": "899bc3d9b08d2d4d3f4187ef1c13f0fe16afbd55", "detected_licenses": [ "MIT" ], "directory_id": "193166da5e5a663a5169c8cdadcea493bca9d815", "extension": "py", "fi...
3.0625
stackv2
#!/usr/bin/python import os import platform import urllib import zipfile class Requirement: osName = platform.system() platform = 'amd64' installDir = '/usr/local/bin/' def __init__(self, fileName): self.fileName = fileName print "\n Starting installing dependencies..." def openF...
68
26.34
57
21
406
python
[{"finding_id": "codeql_py/overly-permissive-file_2ab278826c14a660_eaf60394", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world writable." ]
[ 50 ]
[ null ]
[ 13 ]
[ 50 ]
2024-11-18T22:28:59.996172+00:00
1,483,979,061,000
2ad6468074565b83d267fadbe3d89f8bc09f66a5
3
{ "blob_id": "2ad6468074565b83d267fadbe3d89f8bc09f66a5", "branch_name": "refs/heads/master", "committer_date": 1483979061000, "content_id": "878e7e3e0697006d2cb521da0701ac1c4b74015f", "detected_licenses": [ "MIT" ], "directory_id": "01704451cef195cc5c4e76351942aed69e877042", "extension": "py", "fi...
2.796875
stackv2
# MIT License # Copyright (c) 2016 Clive Cadogan # Permission is hereby granted, free of charge, to any person obtaining a copy # of this software and associated documentation files (the "Software"), to deal # in the Software without restriction, including without limitation the rights # to use, copy, modify, merge, ...
235
31.45
83
15
1,668
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_d0c1e0ac83a7247d_af3643b9", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 46 ]
[ null ]
[ 27 ]
[ 43 ]
2024-11-18T22:29:01.219275+00:00
1,582,199,513,000
235152d190c077567fbb9da5afa061a15ea1adb0
2
{ "blob_id": "235152d190c077567fbb9da5afa061a15ea1adb0", "branch_name": "refs/heads/master", "committer_date": 1582199513000, "content_id": "76197765617ff2dd96bc1d2ff1af0b2a3b75ff7a", "detected_licenses": [ "Apache-2.0", "MIT" ], "directory_id": "c6f0e167a8ed00c96168dc2ab3eacf36c7b6d8c3", "exten...
2.34375
stackv2
import os import subprocess import sys import glob import base64 import json with sys.stdin as f: code = f.read() if code == '': exit(0) shellscript_filename = '/task.sh' # create script file with open(shellscript_filename, 'w') as f: f.write(code) # chmod +x current_permit = os.stat(shellscript_filena...
38
24.74
120
11
261
python
[{"finding_id": "codeql_py/overly-permissive-file_66587f4c0974cbe5_b21b7274", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world writable." ]
[ 22 ]
[ null ]
[ null ]
[ 36 ]
2024-11-18T22:29:21.552833+00:00
1,610,287,687,000
ae93f9dca249082b0a03123a05edd18d82c49ee1
3
{ "blob_id": "ae93f9dca249082b0a03123a05edd18d82c49ee1", "branch_name": "refs/heads/master", "committer_date": 1610287687000, "content_id": "97bbda4d650cdb6b4fb3f32a29f61a0c98eab92a", "detected_licenses": [ "MIT" ], "directory_id": "88baa949f65a25cb12c67c8750145bd0b833406f", "extension": "py", "fi...
2.796875
stackv2
from collections import OrderedDict from copy import deepcopy from pathlib import Path import xmltodict from PIL import Image from horch.datasets.voc import TEST_DATASET_YEAR_DICT, DATASET_YEAR_DICT, VOC_CATEGORIES, VOC_CATEGORY_TO_IDX from torch.utils.data import Dataset from torchvision.datasets.utils import downloa...
177
33.5
113
16
1,415
python
[{"finding_id": "codeql_py/tarslip_6a3418b607b227ab_0dbd8e91", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 140 ]
[ null ]
[ 13 ]
[ 16 ]
2024-11-18T22:29:26.114812+00:00
1,590,928,183,000
3e12ade81b36fbebafeabc5258880b1d1c2bd6aa
2
{ "blob_id": "3e12ade81b36fbebafeabc5258880b1d1c2bd6aa", "branch_name": "refs/heads/master", "committer_date": 1590928183000, "content_id": "f6cb5fe7b6a8aff57c5ba0e6d10d2e73e1851e2e", "detected_licenses": [ "Apache-2.0" ], "directory_id": "b40c4c8478c86a8b1ac792429a385523d9e27f77", "extension": "py"...
2.375
stackv2
#!/usr/bin/python # -*- coding: utf-8 -- #@File: WxService.py #@author: Gorit #@contact: gorit@qq.com #@time: 2020/3/4 0:13 import time import requests,json __APPID = "wx1c1862f2b751664f" __APPSECRET = "79c893f62a9a35f9ca427b7d8fbbe4da" __GET_ACCESS_TOKEN = f"https://api.weixin.qq.com/cgi-bin/token?grant_type=client_c...
91
23.6
129
13
690
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2cca346a2c6582e4_c92e4032", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 31, 85 ]
[ null, null ]
[ 15, 15 ]
[ 23, 25 ]
2024-11-18T22:29:32.199998+00:00
1,475,530,990,000
e919ffbb7cdeab9023dcc92873bc5f42c74447cb
2
{ "blob_id": "e919ffbb7cdeab9023dcc92873bc5f42c74447cb", "branch_name": "refs/heads/master", "committer_date": 1475530990000, "content_id": "a46ba03d3d7f9f2863dcaf434a05a4fa3459ed92", "detected_licenses": [ "MIT" ], "directory_id": "9b68913c89825e8c603bcae3cf3fa369c82a97a6", "extension": "py", "fi...
2.375
stackv2
""" EmbedVideos XBlock enables users to post from various providers with various parameters on a single XBlock. """ import pkg_resources from xblock.core import XBlock from xblock.fields import Scope, Integer, String from xblock.fragment import Fragment from jinja2 import Environment, PackageLoader env = Environment...
197
40.52
109
16
1,777
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_7c831e425630bb9c_cd040ae3", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 13 ]
[ null ]
[ 7 ]
[ 70 ]
2024-11-18T22:40:32.810673+00:00
1,611,840,207,000
2e81efeb3303f43b9c16d621ec1d410c2c9ce30d
3
{ "blob_id": "2e81efeb3303f43b9c16d621ec1d410c2c9ce30d", "branch_name": "refs/heads/master", "committer_date": 1611840207000, "content_id": "e9f2820d61eff0aaea62ef0e2fa62005c0f26591", "detected_licenses": [ "MIT" ], "directory_id": "79f81fbb0b902a7cf3f2f2b91643c1b77351d2c9", "extension": "py", "fi...
2.671875
stackv2
import os import json from typing import List import logging import flask import yake import numpy as np import spacy from tqdm import tqdm from pymongo import MongoClient from flask_jwt_extended import JWTManager, jwt_required, create_access_token from flask import request, jsonify from flask_bcrypt import Bcrypt fro...
484
27.98
125
20
3,429
python
[{"finding_id": "codeql_py/flask-debug_4cac55dd370e55a3_2b8cda4b", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
4
true
[ "CWE-215", "CWE-022", "CWE-022", "CWE-022" ]
[ "py/flask-debug", "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 483, 73, 352, 364 ]
[ null, null, null, null ]
[ 5, 30, 19, 17 ]
[ 49, 34, 70, 44 ]
2024-11-18T22:40:36.904368+00:00
1,637,262,381,000
3464271cf33aea6a889e83834cafc480bf7d6548
2
{ "blob_id": "3464271cf33aea6a889e83834cafc480bf7d6548", "branch_name": "refs/heads/main", "committer_date": 1637262381000, "content_id": "0813d7c2294e3c9b7c0f3b2b5bc8b00db902b516", "detected_licenses": [ "MIT" ], "directory_id": "4d29a2355c0580c7fca19c446111a037743fe42a", "extension": "py", "file...
2.375
stackv2
# (m4ud) PostgreSQL Windows UDF DLL over SMB RCE import requests, sys requests.packages.urllib3.disable_warnings() def log(msg): print msg def make_request(url, sql): log("[*] Executing query: %s" % sql[0:80]) r = requests.get( url % sql, verify=False) return r def create_udf_func(url): lo...
38
28.37
167
12
329
python
[{"finding_id": "codeql_py/request-without-cert-validation_384c2ede15a6eb06_d5ddef3b", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 12 ]
[ null ]
[ 9 ]
[ 47 ]
2024-11-18T22:41:05.415649+00:00
1,620,848,868,000
c4d38382d8a59b338e088e641ae2367b62cdedff
3
{ "blob_id": "c4d38382d8a59b338e088e641ae2367b62cdedff", "branch_name": "refs/heads/master", "committer_date": 1620848868000, "content_id": "838e0fcf65cb6e0c8af9af853f2dd9101e5519b9", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "a39ad7f40cb8102246b6a56769936281edce1818", "extension": "p...
2.90625
stackv2
""" LSTM (Long Short Term Memory) Autoencoder Explored as a substitute for the convolutional autoencoder """ import tensorflow from tensorflow import keras from tensorflow.keras.models import Sequential from tensorflow.keras.layers import Dense, LSTM, Dropout, RepeatVector, TimeDistributed import numpy as np import os...
202
35.43
127
15
1,851
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0ac32e7151e58331_e99ff0ac", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (priva...
[ 66, 147, 150 ]
[ null, null, null ]
[ 11, 19, 19 ]
[ 58, 76, 105 ]
2024-11-18T22:54:06.315720+00:00
1,651,095,228,000
023c1ecfb079a6a2eead9333dffa6ddde8dd615e
3
{ "blob_id": "023c1ecfb079a6a2eead9333dffa6ddde8dd615e", "branch_name": "refs/heads/master", "committer_date": 1651095228000, "content_id": "28142d056da0b22257c26f9ea4c4a9662bd3dad4", "detected_licenses": [ "MIT" ], "directory_id": "4e603fed251ff664043c8a9cc4eb9c6345015fb7", "extension": "py", "fi...
2.59375
stackv2
#!/usr/bin/env python3 #pip install elasticsearch==7.13.0 elasticsearch-dsl import requests, json, argparse, elasticsearch, re, os, sys from bs4 import BeautifulSoup from elasticsearch import Elasticsearch output = 'completed.txt' parser = argparse.ArgumentParser() parser.add_argument('--file', required=True) parser....
150
29.18
176
26
1,087
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_e285b4a919fd04a3_bb01f968", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [insearchofannwalker.com](1) may be at an arbitrary pos...
3
true
[ "CWE-020", "CWE-020", "CWE-020" ]
[ "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "The string [insearchofannwalker.com](1) may be at an arbitrary position in the sanitized URL.", "The string [drive.google.com](1) may be at an arbitrary position in the sanitized URL.", "The string [annelisternorway.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 121, 123, 125 ]
[ null, null, null ]
[ 26, 26, 26 ]
[ 68, 61, 65 ]
2024-11-18T22:54:23.046400+00:00
1,597,543,712,000
b21490a937a39f36cc1a5f7b826ad66f0e4b4810
3
{ "blob_id": "b21490a937a39f36cc1a5f7b826ad66f0e4b4810", "branch_name": "refs/heads/master", "committer_date": 1597543712000, "content_id": "ed765b4ce4aa56d61eef209b030265d4eded83b5", "detected_licenses": [ "Apache-2.0" ], "directory_id": "2a32c299f36f3ad2a93a07e15b77206c617db9e7", "extension": "py"...
2.921875
stackv2
import os from jinja2 import Environment, FileSystemLoader import pypandoc import click import pathlib import re BEFORE="""{% extends 'layouts/main.html' %} {% block content %} """ AFTER=""" {% endblock %} """ def block(name, string): return f"{{% block {name} %}}{string}{{% endblock {name} %}}" def substituti...
91
21.69
76
16
497
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_36602ab338ed7b0d_099baabd", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 57 ]
[ 58 ]
[ 18 ]
[ 47 ]
2024-11-18T22:54:31.850716+00:00
1,609,009,657,000
01cccf806a13f595e836029b28ec4c166c88db06
4
{ "blob_id": "01cccf806a13f595e836029b28ec4c166c88db06", "branch_name": "refs/heads/master", "committer_date": 1609009657000, "content_id": "a23ee2147be24d5fcfda50bdebaf53f97a13b1d2", "detected_licenses": [ "Apache-2.0" ], "directory_id": "041130f42191f283c4eb783a2e489ebcc801b025", "extension": "py"...
3.734375
stackv2
import hmac from random import SystemRandom # Define global variables _sys_rng = SystemRandom() SALT_CHARS = "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789" DEFAULT_PBKDF2_ITERATIONS = 150000 def gen_salt(length): """Generate a random string of SALT_CHARS with specified ``length``.""" if len...
59
32.83
79
10
471
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4cd0f7d15cafe308_0390ca35", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-327" ]
[ "py/clear-text-logging-sensitive-data", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) th...
[ 58, 20 ]
[ null, null ]
[ 11, 27 ]
[ 37, 35 ]
2024-11-18T20:55:11.314404+00:00
1,464,145,619,000
a9259cc83b6933069e54ce86a5a2bcfa66234a44
2
{ "blob_id": "a9259cc83b6933069e54ce86a5a2bcfa66234a44", "branch_name": "refs/heads/master", "committer_date": 1464145619000, "content_id": "2006fdb888a4491b8707257437bf1c4b47cdef31", "detected_licenses": [ "MIT" ], "directory_id": "743fe27396246f5889dbe2758318febf4c7529e3", "extension": "py", "fi...
2.46875
stackv2
import os import re import base64 import zipfile import tempfile import requests from lxml import html from flask import Flask from flask import abort from flask import request from flask import jsonify from flask import send_file ROOT_URL = '/banner-tool' API_URL = ROOT_URL + '/api' DOWNLOAD_URL = ROOT_URL + '/down...
118
27.05
76
15
807
python
[{"finding_id": "codeql_py/flask-debug_a6f6e105d6a838e0_7c55a32d", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
4
true
[ "CWE-215", "CWE-022", "CWE-022", "CWE-022" ]
[ "py/flask-debug", "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 117, 61, 76, 113 ]
[ null, null, null, null ]
[ 5, 15, 25, 22 ]
[ 40, 23, 35, 26 ]
2024-11-18T21:33:16.945515+00:00
1,611,194,562,000
db8e5a876a21754746dbbe9da7e3b7900b88c15d
3
{ "blob_id": "db8e5a876a21754746dbbe9da7e3b7900b88c15d", "branch_name": "refs/heads/main", "committer_date": 1611194562000, "content_id": "9f7779123a9dc916e3fd2358fb3f664e4122b4ad", "detected_licenses": [ "MIT" ], "directory_id": "c3fc25eaf78864e689e8643a8b32a0d4a82e76b6", "extension": "py", "file...
2.65625
stackv2
# -*- coding: utf-8 -*- """User models.""" import datetime as dt import hashlib from flask_login import UserMixin from tatoco.database import Column, PkModel, db, reference_col, relationship from tatoco.extensions import bcrypt class Role(PkModel): """A role for a user.""" __tablename__ = "roles" name =...
77
30.38
87
19
544
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_0e41287c62abe160_978ba91d", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 59 ]
[ null ]
[ 41 ]
[ 74 ]
2024-11-18T21:33:22.980571+00:00
1,690,122,505,000
94a19bca5417c4a684e1c06a0d70d6264ff78e26
3
{ "blob_id": "94a19bca5417c4a684e1c06a0d70d6264ff78e26", "branch_name": "refs/heads/main", "committer_date": 1690122505000, "content_id": "c31bc7d21e326731dd5512f2f6364a4dc2e4e547", "detected_licenses": [ "MIT" ], "directory_id": "45cf8a6a92e9a3ae93f45428caa586cb1aa2f82a", "extension": "py", "file...
2.625
stackv2
import collections.abc import importlib from pathlib import Path from typing import Any, Dict, Mapping, NamedTuple, Optional, Type, Union, cast import jinja2 import yaml from .cookiecutter import CookieCutterContext, CookieCutterContextDict, ScaraplateConf from .gitremotes import GitRemote from .strategies import Str...
120
34.27
88
15
990
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_b501a49d8f697623_553f8b45", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 13 ]
[ null ]
[ 7 ]
[ 59 ]
2024-11-18T21:55:38.665902+00:00
1,630,238,467,000
8565c8a4a54f88328fc63674d34af101045e86b1
2
{ "blob_id": "8565c8a4a54f88328fc63674d34af101045e86b1", "branch_name": "refs/heads/main", "committer_date": 1630238467000, "content_id": "26ef74d370239ae412dccbca55823e788c273e3f", "detected_licenses": [ "MIT" ], "directory_id": "441a30c6e29b57bedabf9b53d8917538ed30adbe", "extension": "py", "file...
2.390625
stackv2
from typing import Dict import uuid import time from aiohttp import web from JSONEncoder import JSONEncoder class TaskController(web.View): def __init__(self, request: web.Request) -> None: super(TaskController, self).__init__(request) self.db = self.request.db self.tasks = self.db["TAS...
133
31.6
102
19
898
python
[{"finding_id": "codeql_py/stack-trace-exposure_be46f17d126f7482_65c5aa10", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
4
true
[ "CWE-209", "CWE-209", "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information...
[ 26, 37, 47, 71 ]
[ null, null, null, null ]
[ 38, 42, 42, 38 ]
[ 52, 56, 56, 52 ]
2024-11-18T21:55:47.821214+00:00
1,640,467,010,000
3c0e956476f55095b8c685e9835c00b464022516
3
{ "blob_id": "3c0e956476f55095b8c685e9835c00b464022516", "branch_name": "refs/heads/master", "committer_date": 1640467010000, "content_id": "fde236146da204ab3bbe4635d3b172d5c1f65ea2", "detected_licenses": [ "Apache-2.0" ], "directory_id": "9f7022f31780011e001b58acf15980fdba5f6184", "extension": "py"...
3.1875
stackv2
""" =============================================================================== Create a release of "python-ebay". Upload files and metadata to PyPi. =============================================================================== This script can be used to automate the release of new versions of the "python-ebay" ...
149
34.22
79
16
1,146
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_0532ecf0dc0fdb4e_64ec37fb", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 101 ]
[ null ]
[ 27 ]
[ 38 ]
2024-11-18T22:55:05.180915+00:00
1,586,060,939,000
33cdb897617ba0bcdcb92ffbc8558a2b335da2de
3
{ "blob_id": "33cdb897617ba0bcdcb92ffbc8558a2b335da2de", "branch_name": "refs/heads/master", "committer_date": 1586060939000, "content_id": "d7577ec9c9256f07b1c276a048b8053d3f49d39a", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "4aa7263e19d032b0e402bdfff8884cf514f5bd52", "extension": "p...
2.671875
stackv2
# A simple Flask app for Reconciling names and subject headings from the Library of Congress (LoC) using OpenRefine from flask import Flask, request, jsonify, json from reconciliation import SearchLoC, Recon app = Flask(__name__) default_query = { "id": "LoC", "name": "LCNAF & LCSH", "index": "/authorit...
112
28.87
115
19
776
python
[{"finding_id": "codeql_py/flask-debug_9033b6590b6d8e00_47290090", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 111, 78 ]
[ null, null ]
[ 5, 38 ]
[ 24, 76 ]
2024-11-18T22:55:05.446573+00:00
1,496,250,530,000
bb05f71e43ed8a5291b70f408586b5b90923e559
3
{ "blob_id": "bb05f71e43ed8a5291b70f408586b5b90923e559", "branch_name": "refs/heads/master", "committer_date": 1496250530000, "content_id": "4817215943645ee09248342e169623293c2af1ca", "detected_licenses": [ "Apache-2.0" ], "directory_id": "223ac34a63904efc6599436c91d0a1f75a8d8be5", "extension": "py"...
2.78125
stackv2
"""Runs simple login page. Requires root.""" from flask import Flask, render_template, request # Run a very simple Flask server. app = Flask(__name__) logfile = "logs/currentlog.log" # Include urls to use on the login template. assets = dict() assets["bootstrap"] = "https://maxcdn.bootstrapcdn.com/bootstrap/" + \ ...
35
30.51
76
15
273
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_53a1d60706c5cfda_7d63e52a", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 27 ]
[ null ]
[ 21 ]
[ 33 ]
2024-11-18T22:55:09.236096+00:00
1,612,190,589,000
c30aea7117ae631815b0f54119343f4191c1957a
2
{ "blob_id": "c30aea7117ae631815b0f54119343f4191c1957a", "branch_name": "refs/heads/master", "committer_date": 1612190589000, "content_id": "8cd547ed24dfc46665b2b6848260fc45380cd132", "detected_licenses": [ "MIT" ], "directory_id": "d09dfb0b72bff7a2979b6ee6ff5484226ee1c695", "extension": "py", "fi...
2.34375
stackv2
'''NeteaseCloudMusicApiPy NeteaseCloudMusicApi 的 Python 绑定 https://github.com/NKID00/NeteaseCloudMusicApiPy MIT License Copyright (c) 2020 NKID00 Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software ...
242
34.21
78
21
2,268
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_df75c7f38334dd73_4b2d6495", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi...
[ 120, 138 ]
[ null, null ]
[ 22, 22 ]
[ 45, 45 ]
2024-11-18T23:06:03.661798+00:00
1,686,823,611,000
734210a473044ea283af512b9e0fad5122c74ff2
3
{ "blob_id": "734210a473044ea283af512b9e0fad5122c74ff2", "branch_name": "refs/heads/master", "committer_date": 1686823611000, "content_id": "38f5ff8372f3ed7d5fba1bcceee94b575d254c55", "detected_licenses": [ "MIT" ], "directory_id": "9553c62ee80e1c2dc5842eb1e8f47b761d0590d1", "extension": "py", "fi...
2.765625
stackv2
from azure.cognitiveservices.vision.computervision import ComputerVisionClient from azure.cognitiveservices.vision.computervision.models import VisualFeatureTypes from msrest.authentication import CognitiveServicesCredentials import os import sys import json from dotenv import load_dotenv # Standard boilerplate for th...
61
26.38
83
12
407
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_445a2a27436cb769_03ee87a3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 55 ]
[ null ]
[ 9 ]
[ 39 ]
2024-11-18T23:06:13.850207+00:00
1,626,140,889,000
f9b84cb62e42de1f53db294ae4e6042820188bd5
4
{ "blob_id": "f9b84cb62e42de1f53db294ae4e6042820188bd5", "branch_name": "refs/heads/main", "committer_date": 1626140889000, "content_id": "8a339b9c877772701baa39105127d3060f8f2f35", "detected_licenses": [ "Apache-2.0" ], "directory_id": "55c2830faf938c0d6d2f9012a5b14a0a577c641d", "extension": "py", ...
4.09375
stackv2
class Employee: # 'Common base class for all employees' empCount = 0 # This is the static variable def __init__(self, name, salary): self.name = name # instance variable self.salary = salary self.id = Employee.empCount Employee.empCount += 1 def displayCount(self): ...
40
25.38
95
15
291
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9e065607697aec23_fa302b79", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 15, 35 ]
[ null, null ]
[ 75, 11 ]
[ 86, 15 ]
2024-11-18T23:06:24.052093+00:00
1,631,614,090,000
0a6d2b41af54939d6128160a2aa50232775b5ce2
2
{ "blob_id": "0a6d2b41af54939d6128160a2aa50232775b5ce2", "branch_name": "refs/heads/main", "committer_date": 1631614090000, "content_id": "453bf2afbffcd29afd42eaba3dc35a6da3b87aa0", "detected_licenses": [ "MIT" ], "directory_id": "71cb7f7cccae1da72bb7c0ee98db52dc4516f0b2", "extension": "py", "file...
2.484375
stackv2
# ©sjd333 # https://discuss.streamlit.io/t/metrics-kpi-component/6991 # https://github.com/samdobson/streamlit-metrics import streamlit as st import streamlit.components.v1 as components from jinja2 import Template def _build_metric(label, value, value_2='', color_label='black', color_value='black', color_value_2='bl...
71
31.34
167
13
600
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_1734b226fc17113e_7fd9cdde", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 49 ]
[ null ]
[ 12 ]
[ 31 ]
2024-11-18T23:06:24.106520+00:00
1,569,279,314,000
dd73c3b9a1f517a63d387420f981a1c1e640ef03
3
{ "blob_id": "dd73c3b9a1f517a63d387420f981a1c1e640ef03", "branch_name": "refs/heads/master", "committer_date": 1569279314000, "content_id": "0d02dda0458e816f88d6fd46623114d842049b02", "detected_licenses": [ "MIT" ], "directory_id": "b72238e9efe2c9971880ab3aea84202ce5e10ae8", "extension": "py", "fi...
2.703125
stackv2
#!/usr/bin/python # -*- coding: utf-8 -*- from operator import itemgetter, attrgetter, methodcaller import csv import os import re genders = dict(men=0, woman=0) womens = ["WOMAN", 'GIRL', "PIZZA GIRLS FEAR",'COOL GIRLS ANGER','MOMS DISGUST','COOL GIRLS FEAR' ,'TEACHERS FEAR','RILEY','MEG','MOMS FEAR' ...
43
33.42
136
16
431
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_7226e6f61404dac4_645c18ab", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text." ]
[ 40 ]
[ null ]
[ 22 ]
[ 50 ]
2024-11-18T20:56:52.756910+00:00
1,595,601,507,000
3262ccc601bdad48ca31f709a40c2ae46a2507e1
3
{ "blob_id": "3262ccc601bdad48ca31f709a40c2ae46a2507e1", "branch_name": "refs/heads/master", "committer_date": 1595601507000, "content_id": "fccc49717ace70d80059a600aa3f52a20abb033e", "detected_licenses": [ "MIT" ], "directory_id": "a94111c7511e28bcd2ff5ecd10b6871bfbc7a1e7", "extension": "py", "fi...
2.53125
stackv2
#!/usr/bin/env python3 import requests import re import json import arrow import logging from bs4 import BeautifulSoup import datetime as dt from .lib import zonekey SEARCH_DATA = re.compile(r'var gunlukUretimEgrisiData = (?P<data>.*);') TIMEZONE = 'Europe/Istanbul' URL = 'https://ytbsbilgi.teias.gov.tr/ytbsbilgi/frm...
180
31.63
105
22
1,513
python
[{"finding_id": "codeql_py/request-without-cert-validation_9572d8d562aaf7cc_952d6b82", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 136 ]
[ null ]
[ 16 ]
[ 40 ]
2024-11-18T20:56:59.752663+00:00
1,626,825,546,000
e0932ee90421fd6d8c63c18c64cfc61e0f5fddb9
3
{ "blob_id": "e0932ee90421fd6d8c63c18c64cfc61e0f5fddb9", "branch_name": "refs/heads/master", "committer_date": 1626825546000, "content_id": "f757bbb502ffc7db2356876cfe47bc8a8d90c0dc", "detected_licenses": [ "MIT" ], "directory_id": "15e0192220c37e8d85190af9da00e0070131cfdc", "extension": "py", "fi...
3.109375
stackv2
""" Let's start by building a form to submit new images. """ from urllib import request from django.core.files.base import ContentFile from django.utils.text import slugify from django import forms from .models import Image class ImageCreateForm(forms.ModelForm): """ This form is a ModelFOrm form built from ...
61
39.72
82
14
515
python
[{"finding_id": "codeql_py/full-ssrf_8000105f3b40526d_28513e0a", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
1
true
[ "CWE-918" ]
[ "py/full-ssrf" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1)." ]
[ 56 ]
[ null ]
[ 20 ]
[ 46 ]
2024-11-18T22:43:31.194652+00:00
1,608,326,728,000
0112543eaac9c9f158bd4f8bb762b876089538c5
3
{ "blob_id": "0112543eaac9c9f158bd4f8bb762b876089538c5", "branch_name": "refs/heads/main", "committer_date": 1608326728000, "content_id": "56ab595d09a9ffc71933e26b7f3e22c929ce5c1a", "detected_licenses": [ "Apache-2.0" ], "directory_id": "2222250aca7234614038276a851eb929a0f3c5bf", "extension": "py", ...
2.53125
stackv2
#!/usr/bin/python3 import itertools from flask import Blueprint, make_response from modules.database import get_db_conn from server_error import server_error route_lessons = Blueprint('route_lessons', __name__) # -------------------------- # Return lessons list # -------------------------- @route_lessons.route('/l...
93
45.95
118
19
948
python
[{"finding_id": "codeql_py/reflective-xss_94cee6839d4fb71a_4b30c0c7", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 56, 92 ]
[ null, null ]
[ 26, 30 ]
[ 58, 104 ]
2024-11-18T22:44:03.025619+00:00
1,615,005,781,000
7de9e23fb558efcfb59c09e5cf3cfebe042559af
3
{ "blob_id": "7de9e23fb558efcfb59c09e5cf3cfebe042559af", "branch_name": "refs/heads/master", "committer_date": 1615005781000, "content_id": "0a7cd2bd04140d618e42795167001568fa81e52a", "detected_licenses": [ "MIT" ], "directory_id": "dba8dd37434af4591f4efe1cf8aaffa41a51efef", "extension": "py", "fi...
2.5625
stackv2
import jieba,requests,re from pprint import pprint from flask import Flask from flask import request from urllib.parse import quote from flask_cors import CORS app=Flask(__name__) CORS(app) @app.route('/',methods=['GET']) def init(): return 'init' @app.route('/testpost',methods=['POST']) def testpost(): return '...
124
20.91
112
20
886
python
[{"finding_id": "codeql_py/flask-debug_7f45dc4b1a9ce24c_de070f4e", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-918" ]
[ "py/flask-debug", "py/partial-ssrf" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 124, 115 ]
[ null, 118 ]
[ 2, 4 ]
[ 57, 5 ]
2024-11-18T22:29:52.558895+00:00
1,565,352,330,000
c32b16a8dac8cbbdafd34adc90cadad359364b19
3
{ "blob_id": "c32b16a8dac8cbbdafd34adc90cadad359364b19", "branch_name": "refs/heads/master", "committer_date": 1565352330000, "content_id": "d567080052eb6f734727ced8f96388331a50096b", "detected_licenses": [ "MIT" ], "directory_id": "5c779c17e09a2e411fadedb0b7d1f7664a57de5e", "extension": "py", "fi...
2.609375
stackv2
# Import all the required libraries from flask import Flask, request, jsonify, render_template import os import dialogflow import requests import json import pusher # initialize Pusher pusher_client = pusher.Pusher( app_id=os.getenv('PUSHER_APP_ID'), key=os.getenv('PUSHER_KEY'), secret=os.geten...
77
29.69
113
13
511
python
[{"finding_id": "codeql_py/flask-debug_4ac367dd5df6204e_e67704c0", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-918" ]
[ "py/flask-debug", "py/partial-ssrf" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 77, 32 ]
[ null, 33 ]
[ 5, 20 ]
[ 24, 75 ]
2024-11-18T22:30:04.060563+00:00
1,614,129,961,000
c191ae69bbfee497a377dc7133a57d365284bf6e
3
{ "blob_id": "c191ae69bbfee497a377dc7133a57d365284bf6e", "branch_name": "refs/heads/main", "committer_date": 1614129961000, "content_id": "75a52ac2094974781cfe3158e1309b51997a856d", "detected_licenses": [ "MIT" ], "directory_id": "1d89bc8c36e515570975bc187d18497d83f17174", "extension": "py", "file...
2.515625
stackv2
import json import requests key = "eQ3hlNegA9SGXgOfeSY2ixTZAkYPivdZ" host = "http://localhost:8000" interview = "docassemble.imlswirelessinterview:data/questions/wireless.yml" # first, retrieve a new session resp = requests.get(f"{host}/api/session/new", {"key": key, "i": interview}) values = resp...
48
31.4
94
11
390
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6e372b793fe9cad4_ba94a8e1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 20 ]
[ null ]
[ 7 ]
[ 29 ]
2024-11-18T23:10:11.565618+00:00
1,531,155,867,000
84c32dc9d0f862aec71eb6246b193678e4eba22d
3
{ "blob_id": "84c32dc9d0f862aec71eb6246b193678e4eba22d", "branch_name": "refs/heads/master", "committer_date": 1531155867000, "content_id": "36bba05df3bef27ca407d3171b67819ac65df7f6", "detected_licenses": [ "MIT" ], "directory_id": "6b7120192a0f5e141c92db8655b67fa8657b5d17", "extension": "py", "fi...
2.734375
stackv2
# -*- coding: utf-8 -*- # pay attention to run python 3! from urllib.request import urlopen from time import time from collections import deque import re import os import sys import io import ssl import traceback import argparse # ~~~~~~~~~~~~~~~~~~ encoding stuff ~~~~~~~~~~~~~~~ # DOESN'T NEEDED: run in console: ...
224
36.18
140
16
2,062
python
[{"finding_id": "codeql_py/insecure-protocol_6f643cf6812c8b51_aa083099", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 specified by [call to ssl.SSLContext](1).", "remediation": "", "lo...
1
true
[ "CWE-327" ]
[ "py/insecure-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Insecure SSL/TLS protocol version TLSv1 specified by [call to ssl.SSLContext](1)." ]
[ 101 ]
[ null ]
[ 16 ]
[ 50 ]
2024-11-18T23:10:12.046133+00:00
1,639,106,227,000
c643d6eb1849e5046a8367d98fa901637e685dab
3
{ "blob_id": "c643d6eb1849e5046a8367d98fa901637e685dab", "branch_name": "refs/heads/master", "committer_date": 1639106227000, "content_id": "d873891a1ae2a44dbec5c360c108cd26cd69ea5d", "detected_licenses": [ "Unlicense" ], "directory_id": "6a1615de1bc68e619e34802e21c3d25b4fc9e836", "extension": "py",...
2.59375
stackv2
from typing import Callable, Tuple import logging from aiohttp import web from http_basic_auth import parse_header, BasicAuthException log = logging.getLogger(__name__) class BaseStrategy: def __init__(self, request: web.Request, storage: dict, handler: Callable, header: str): self.request = request ...
42
28.02
92
13
247
python
[{"finding_id": "codeql_py/log-injection_dcb465a903fab92b_b753682b", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 17 ]
[ null ]
[ 40 ]
[ 80 ]
2024-11-18T23:21:54.839308+00:00
1,489,943,983,000
5260c3f9da97d438314e4c52063a441c7bdc33a5
3
{ "blob_id": "5260c3f9da97d438314e4c52063a441c7bdc33a5", "branch_name": "refs/heads/master", "committer_date": 1489943983000, "content_id": "149a29e4344f49004f1affc88c9d6a7abb44f96f", "detected_licenses": [ "ISC" ], "directory_id": "7bc26f5adfabf5a49f31520c7ab50f6fbbd14c94", "extension": "py", "fi...
2.578125
stackv2
from jinja2 import Template, Environment, FileSystemLoader import pypandoc, os class Filter(object): def __init__(self, page, theme=None): """ Make an output filter for a page object. Parameter --------- page : badger page The page which is being output....
43
28.37
125
14
287
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_68ab48f614045c71_f8bdd432", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 17 ]
[ null ]
[ 20 ]
[ 63 ]
2024-11-18T21:33:35.469488+00:00
1,539,521,046,000
efb57501f5fa974b8eded3bf39e0c6dadb4ab29c
3
{ "blob_id": "efb57501f5fa974b8eded3bf39e0c6dadb4ab29c", "branch_name": "refs/heads/master", "committer_date": 1539521046000, "content_id": "a86c5388efaf3d8483238e30e1443db0aabaeeb5", "detected_licenses": [ "Unlicense" ], "directory_id": "cb60f8ed61702f23475847b6246d17661f02f8db", "extension": "py",...
2.984375
stackv2
#!/usr/bin/env python import sys flag = 'cysec16-In05' from bitstring import BitArray import time import signal import pdb def write(data, endl='\n'): sys.stdout.write(data + endl) sys.stdout.flush() def readline(): return sys.stdin.readline().strip() def convert_to_bitstream(data): return BitArr...
99
26.15
178
12
726
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3be0a142189ae731_59047d71", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 12 ]
[ null ]
[ 22 ]
[ 33 ]
2024-11-18T21:33:38.921379+00:00
1,345,773,641,000
228933651fa311b8b1c8f65de9f1f722ef6a0a21
3
{ "blob_id": "228933651fa311b8b1c8f65de9f1f722ef6a0a21", "branch_name": "refs/heads/master", "committer_date": 1345773641000, "content_id": "656f7b9dceb187c7f5338de350ca5cafed7a0e19", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "64a27a9d6f0035dfd52914e94a0ce86514b4612b", "extension": "p...
2.734375
stackv2
#!/usr/bin/env python3 import threading import select import logging import sys import socket, ssl class client(threading.Thread): def __init__(self): threading.Thread.__init__(self) self.name="Client" self.setDaemon(True) def run(self): inSecSock = socket.socket(socket.AF...
49
32.49
68
14
386
python
[{"finding_id": "codeql_py/insecure-default-protocol_86ef95a638c22f92_d36a7b04", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/insecure-default-protocol", "py/insecure-default-protocol" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used.", "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used." ]
[ 18, 41 ]
[ null, 43 ]
[ 16, 12 ]
[ 60, 41 ]
2024-11-18T23:15:56.549084+00:00
1,625,124,168,000
e1aa6f4d7371ee1c583c50a81c2bb58dab539716
3
{ "blob_id": "e1aa6f4d7371ee1c583c50a81c2bb58dab539716", "branch_name": "refs/heads/main", "committer_date": 1625124168000, "content_id": "d49947b0f26078f6f53424cba686b426d5af442f", "detected_licenses": [ "MIT" ], "directory_id": "7651584948deb92eed45f8d372251dc8aa439122", "extension": "py", "file...
3.140625
stackv2
import string with open('DAY 1\password\password@1651-13.txt','r') as f: password = f.read() #'7%SgY1^mj~qz' list_pass = list(password) alpha_lower = string.ascii_lowercase alpha_upper = string.ascii_uppercase numeric= string.digits punch = string.punctuation #Creating Blank list & embeding all charaters ge...
42
18.55
64
13
217
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5b2f70fcc2df28f8_ed7c7e63", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 42 ]
[ null ]
[ 7 ]
[ 32 ]
2024-11-18T22:30:20.235790+00:00
1,457,725,772,000
70aeda1e6fba943c7ce2b0ccf8ae5978eb15d454
2
{ "blob_id": "70aeda1e6fba943c7ce2b0ccf8ae5978eb15d454", "branch_name": "refs/heads/master", "committer_date": 1457725772000, "content_id": "4ea2efcbd7d40972522a8c09e6f2f790c47c1905", "detected_licenses": [ "MIT" ], "directory_id": "4c514345b4759ed4d17f48565ae66dbd7313a0e8", "extension": "py", "fi...
2.421875
stackv2
import datetime import json import logging import tba_config from google.appengine.ext import deferred from google.appengine.api import urlfetch from models.sitevar import Sitevar class FirebasePusher(object): FIREHOSE_FEED = 'notifications' # all the notifications EVENT_FEED = 'events/{}/notifications' ...
82
41.35
142
18
759
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4283661a9ca357c5_38f8981a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 30, 37, 44 ]
[ null, null, null ]
[ 29, 29, 29 ]
[ 130, 142, 142 ]
2024-11-18T22:44:33.233570+00:00
1,517,555,853,000
8560ee4e3294c6fe52dc871778a584cfb25d723e
2
{ "blob_id": "8560ee4e3294c6fe52dc871778a584cfb25d723e", "branch_name": "refs/heads/master", "committer_date": 1517555853000, "content_id": "11ad63b93ce628ef9666b8fddb0fb7797994d39c", "detected_licenses": [ "MIT" ], "directory_id": "628d63ce8027b6cc95c7b4f085aea69a8a5bbd40", "extension": "py", "fi...
2.359375
stackv2
import re import os import json import codecs import random import pickle import utility import numpy as np import pandas as pd import xgboost as xgb import data_io as dio from sklearn.svm import SVC from pypinyin import lazy_pinyin from utility import stop_words from utility import homepage_neg from utility import ho...
331
34.94
142
20
3,135
python
[{"finding_id": "codeql_py/overly-large-range_4295bda300fc898b_5e270a84", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", "remediation...
4
true
[ "CWE-020", "CWE-020", "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", "Suspicious character range that is equivalent to \\[.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", "Suspicious character range that is equivalent to \\[.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", "Suspicious character range tha...
[ 118, 118, 119, 119 ]
[ null, null, null, null ]
[ 37, 78, 39, 82 ]
[ 40, 81, 42, 85 ]
2024-11-18T22:44:38.391243+00:00
1,614,102,420,000
acffdfca6bbf07e689b0ce46c707ad43f11ecae8
3
{ "blob_id": "acffdfca6bbf07e689b0ce46c707ad43f11ecae8", "branch_name": "refs/heads/master", "committer_date": 1614102420000, "content_id": "b696cf9a46f11572d41bd62d8fbeafed6126f8f0", "detected_licenses": [ "MIT" ], "directory_id": "b3e6a859581932e4dffc49a2740b61377d6930d9", "extension": "py", "fi...
2.828125
stackv2
import discord from discord.ext import commands from wordcloud import WordCloud import random import os import asyncio from concurrent.futures import ThreadPoolExecutor import re async def cloud_making(func, text, font, hues, res): executor = ThreadPoolExecutor(10) loop = asyncio.get_event_loop() await loo...
151
27.33
158
19
1,122
python
[{"finding_id": "codeql_py/overly-large-range_8d390ef2431f6e17_0056219e", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[*+,\\-.\\/0-9:;<=\\].", "remediation": "", "location...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[*+,\\-.\\/0-9:;<=\\]." ]
[ 35 ]
[ null ]
[ 50 ]
[ 53 ]
2024-11-18T22:44:49.094640+00:00
1,558,953,132,000
eab4725d90c512c4ba61da8bb434fad401ad4b29
4
{ "blob_id": "eab4725d90c512c4ba61da8bb434fad401ad4b29", "branch_name": "refs/heads/master", "committer_date": 1558953132000, "content_id": "9722d299eb30ecb5456e2d5b5d8beea08565fb6b", "detected_licenses": [ "MIT" ], "directory_id": "c2d27841b828321b3307d95ca79964edbaa1a8b6", "extension": "py", "fi...
3.890625
stackv2
''' class MyClass: variable = "blah" def function(self): #without self cannot define a function.. it is similar to this in C++ #a=10 print("This is a message inside the class.") #return a myobjectx = MyClass() #creating object/instance print(myobjectx.variable) print(myobject...
168
26.01
114
11
1,167
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fe3c12ddbd90c26d_0f8a1c5f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 163 ]
[ null ]
[ 7 ]
[ 8 ]
2024-11-18T23:36:54.660041+00:00
1,353,424,522,000
194ef72ed3a3611248a2b0194b4f6a4e8558b8c3
2
{ "blob_id": "194ef72ed3a3611248a2b0194b4f6a4e8558b8c3", "branch_name": "refs/heads/master", "committer_date": 1353424522000, "content_id": "7d929d9e3c67b20c4c864022be39db8f31107398", "detected_licenses": [ "MIT" ], "directory_id": "2602451758ac4af60eab63577aed55286276263d", "extension": "py", "fi...
2.421875
stackv2
# coding: utf-8 __version__ = "0.2.1.1" # SublimeServer Settings settings = None # HTTP server thread thread = None # Open directories dic = None # Fail attempts attempts = 0 # Sublime complete loaded? loaded = False import sublime, sublime_plugin import webbrowser import os import posixpath import BaseHTTPServer fro...
424
32.58
135
21
3,096
python
[{"finding_id": "codeql_py/http-response-splitting_f1ceff7afe8ae27e_82027971", "tool_name": "codeql", "rule_id": "py/http-response-splitting", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This HTTP header is constructed from a [user-provided value](1).\nThis HTTP header is con...
1
true
[ "CWE-113" ]
[ "py/http-response-splitting" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This HTTP header is constructed from a [user-provided value](1).\nThis HTTP header is constructed from a [user-provided value](2).\nThis HTTP header is constructed from a [user-provided value](3)." ]
[ 136 ]
[ null ]
[ 46 ]
[ 61 ]
2024-11-18T23:36:59.412744+00:00
1,586,379,987,000
32192e7ef1375b5012ea4d19625ca3867a79abb7
3
{ "blob_id": "32192e7ef1375b5012ea4d19625ca3867a79abb7", "branch_name": "refs/heads/master", "committer_date": 1586379987000, "content_id": "958281f99e75a2c555f6179f9b715a50bae932cc", "detected_licenses": [ "Apache-2.0" ], "directory_id": "9c0bcbb93c78cefec0ebf5cc83358765468608b8", "extension": "py"...
2.640625
stackv2
# -*- coding: UTF-8 -*- import os import sys import time import argparse from getpass import getpass import requests from vlab_inf_common.vmware import vCenter, vim def printerr(message): """Like print(), but to stderr :Returns: None :param message: **Required** What to print to standard error :typ...
192
38.96
154
18
1,660
python
[{"finding_id": "codeql_py/request-without-cert-validation_ee9b9a2df1734231_68a39b44", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 181 ]
[ null ]
[ 20 ]
[ 73 ]
2024-11-18T21:14:05.379077+00:00
1,526,005,494,000
fdd66715d68fe76e91b13542f5f0f9a3900817ec
2
{ "blob_id": "fdd66715d68fe76e91b13542f5f0f9a3900817ec", "branch_name": "refs/heads/master", "committer_date": 1526005494000, "content_id": "5529da499e7567968e81dc2a47e558acacaee112", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "75110fa76091483c9efcb1a77eeba01496043f0a", "extension": "p...
2.46875
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- from flask import Flask, jsonify from parse import get_591_info import re app = Flask(__name__) app.config["JSON_SORT_KEYS"] = False app.config["JSON_AS_ASCII"] = True pattern = re.compile(r'^https://rent.591.com.tw/rent-detail-\d+.html$') @app.route('/591/<path:url>') d...
38
19.55
71
14
202
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_9003fc46891304ff_8027322b", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before '591.com', so it might match more ho...
1
true
[ "CWE-020" ]
[ "py/incomplete-hostname-regexp" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression has an unescaped '.' before '591.com', so it might match more hosts than expected." ]
[ 11 ]
[ null ]
[ 24 ]
[ 70 ]
2024-11-18T21:57:33.834172+00:00
1,592,139,119,000
9d0873af726a25531d0f016ad15a556467956611
3
{ "blob_id": "9d0873af726a25531d0f016ad15a556467956611", "branch_name": "refs/heads/master", "committer_date": 1592139119000, "content_id": "11ba9fdc8f98e6f1907b173c37764e3ba288983b", "detected_licenses": [ "MIT" ], "directory_id": "310841013efe61f54347d834d6cecb10f297ec8a", "extension": "py", "fi...
2.71875
stackv2
#!/usr/bin/env python Group = { "GROUP_NAME": "Spaghetti", "GROUP_MEMBER_1": "20182022, Yerkebulan Pansat", "GROUP_MEMBER_2": "20172001, Nurseiit Abdimomyn" } import re import json import matplotlib.pyplot as plt def read_file(file_name): tweets = [] with open(file_name, 'r') as f: for li...
174
24.67
96
17
1,138
python
[{"finding_id": "codeql_py/overly-large-range_50ee758263301176_bf28b5bf", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 145 ]
[ null ]
[ 47 ]
[ 50 ]
2024-11-18T21:57:49.519247+00:00
1,607,934,116,000
ccd7ddd4bbe964d3c886212fa544b7027f208725
3
{ "blob_id": "ccd7ddd4bbe964d3c886212fa544b7027f208725", "branch_name": "refs/heads/master", "committer_date": 1607934116000, "content_id": "9e58ca179a6ebdd36a35064548c7b22e3cbcfb3a", "detected_licenses": [ "MIT" ], "directory_id": "ea5c1de05ad3668c4cf36beae800fc33b3b4598b", "extension": "py", "fi...
2.625
stackv2
""" docat ~~~~~ Host your docs. Simple. Versioned. Fancy. :copyright: (c) 2019 by docat, https://github.com/randombenj/docat :license: MIT, see LICENSE for more details. """ import os from http import HTTPStatus from pathlib import Path from flask import Flask, request, send_from_directory from werkzeug.utils impor...
72
30.33
84
14
526
python
[{"finding_id": "codeql_py/reflective-xss_e96d278437864822_91d60eac", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability d...
4
true
[ "CWE-079", "CWE-079", "CWE-022", "CWE-022" ]
[ "py/reflective-xss", "py/reflective-xss", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability due to a [user-provided value](2).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value]...
[ 57, 62, 39, 42 ]
[ 58, 63, null, null ]
[ 13, 13, 5, 24 ]
[ 32, 33, 14, 40 ]
2024-11-18T21:58:07.443696+00:00
1,458,682,059,000
198b3201f7a48c0ba6233986e1522fcc60cae062
3
{ "blob_id": "198b3201f7a48c0ba6233986e1522fcc60cae062", "branch_name": "refs/heads/master", "committer_date": 1458682059000, "content_id": "6daa33bf7c91f9094e6d3e0f932c2285e41dbccc", "detected_licenses": [ "Apache-2.0" ], "directory_id": "95e33ab2714ccf0227741d4f6b5d89c61c174a12", "extension": "py"...
3.03125
stackv2
# RJ Hunter # AD 440 # Cloud Practicum # # file contains method to call twitter api and verify credentials of the # app user. # import requests from requests_oauthlib import OAuth1 # method calls twitter api and verifys a user's credentials. The method # will return a HTTP status code (200 for success, 401 for ...
47
37.36
85
9
508
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_679cedbcb3fa1c4f_bd4c5323", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 43 ]
[ null ]
[ 11 ]
[ 57 ]
2024-11-18T21:58:32.879654+00:00
1,521,615,921,000
7f8beffd80823510e56f4468c4256fa164a4aac9
3
{ "blob_id": "7f8beffd80823510e56f4468c4256fa164a4aac9", "branch_name": "refs/heads/master", "committer_date": 1521615921000, "content_id": "9b069bebadf2c59d211adcc6ff5dc75c338943f6", "detected_licenses": [ "MIT" ], "directory_id": "b7e01e214b87221fb77b0aa564a594604624895f", "extension": "py", "fi...
2.859375
stackv2
import getpass import os from time import sleep from selenium import webdriver import six def get_details(): file = 'password.txt' # retrive password if saved previously if os.path.isfile(file): with open(file, 'r') as f: usr = f.readline() pwd = f.readline() ...
61
25.3
81
16
384
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_79885b6f974145ac_ccc305ea", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 35 ]
[ null ]
[ 25 ]
[ 28 ]
2024-11-18T22:05:55.334328+00:00
1,445,644,787,000
aadc8b038be0f2dc80eaf3e194c0d5c31540bfd4
2
{ "blob_id": "aadc8b038be0f2dc80eaf3e194c0d5c31540bfd4", "branch_name": "refs/heads/master", "committer_date": 1445644787000, "content_id": "0f9b76e15493776bcde46ea6c94a3bcb0791e3e0", "detected_licenses": [ "Apache-2.0" ], "directory_id": "a21399c8a9496198ac44b0e9e4f265102178e90d", "extension": "py"...
2.453125
stackv2
#!/usr/bin/env python2.7 from hashlib import md5 from Crypto.Cipher import AES from Crypto import Random import base64 from boto3 import client from boto3.session import Session from optparse import OptionParser from ConfigParser import ConfigParser from os import walk, path, mkdir, rmdir, remove import tarfile from ...
168
37.26
117
17
1,604
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_c4b4d2df3f5582de_953af107", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
2
true
[ "CWE-327", "CWE-022" ]
[ "py/weak-sensitive-data-hashing", "py/tarslip" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi...
[ 63, 151 ]
[ null, null ]
[ 19, 9 ]
[ 40, 12 ]
2024-11-18T22:48:23.538792+00:00
1,466,446,478,000
0ac62a39093c518b2349fefabf064e92886ad987
3
{ "blob_id": "0ac62a39093c518b2349fefabf064e92886ad987", "branch_name": "refs/heads/master", "committer_date": 1466446478000, "content_id": "ef7b3a9fb8a9fc9a1b2560850017532f8336f2bc", "detected_licenses": [ "MIT" ], "directory_id": "62d7c6c70500cbd4463b55ec2ad9b58526925b3b", "extension": "py", "fi...
2.609375
stackv2
import json import os import re import requests from models import Torrent from operator import itemgetter from provider import BaseProvider class Eztv(BaseProvider): def __init__(self, base_url): super(Eztv, self).__init__(base_url) self.shows = [] self.shows_cache_path = os.path.join( ...
152
35.84
79
18
1,273
python
[{"finding_id": "codeql_py/redos_001481e799a89537_891ed1f5", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of 'A'.", "remediati...
3
true
[ "CWE-1333", "CWE-1333", "CWE-1333" ]
[ "py/redos", "py/redos", "py/redos" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of 'A'.", "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of 'A'.", "This part of the regular expression may cause exponential backtrackin...
[ 132, 133, 134 ]
[ null, null, null ]
[ 33, 37, 37 ]
[ 42, 46, 46 ]
2024-11-18T23:25:55.788866+00:00
1,560,047,606,000
8cbd1c385ca710cf2a48c9a858235d52e874ecdb
2
{ "blob_id": "8cbd1c385ca710cf2a48c9a858235d52e874ecdb", "branch_name": "refs/heads/master", "committer_date": 1560047606000, "content_id": "0972b7ec1440099978bc29eee56f1186fc1af6c5", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "a722afbe62f9eeaab8c4c587d64603732dd26f3d", "extension": "p...
2.46875
stackv2
# -*- coding: utf8 -*- from flask import Flask from jinja2 import Environment, PackageLoader from scrawler import settings from peewee import * import sys try: reload(sys) sys.setdefaultencoding('utf8') except Exception: pass app = Flask(__name__) database = MySQLDatabase( settings.DBNAME, host=...
135
28.01
93
13
953
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_2650cedcb75908b0_b316e666", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 35 ]
[ null ]
[ 17 ]
[ 73 ]
2024-11-18T22:27:25.149805+00:00
1,508,771,342,000
af1f3d2b662a6555362af222636912187bd1698c
2
{ "blob_id": "af1f3d2b662a6555362af222636912187bd1698c", "branch_name": "refs/heads/master", "committer_date": 1508771342000, "content_id": "bec9acdb99ab367c4982c6331ffcb84b7d8edaef", "detected_licenses": [ "Apache-2.0" ], "directory_id": "786a53e09c6cb40cd359e6c7871e1f1485f5b2eb", "extension": "py"...
2.328125
stackv2
import logging import os import json import time import requests from iemit_plugin import IEmitter from plugins.emitters.base_http_emitter import BaseHttpEmitter from utils.crawler_exceptions import EmitterUnsupportedFormat logger = logging.getLogger('crawlutils') class SasEmitter(BaseHttpEmitter, IEmitter): ...
155
35.42
77
18
1,138
python
[{"finding_id": "codeql_py/request-without-cert-validation_53f1868c8cf4cc0f_bed7367f", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1) by [this value](2)." ]
[ 132 ]
[ 134 ]
[ 28 ]
[ 70 ]
2024-11-18T22:27:27.948332+00:00
1,593,542,060,000
6b9fcae2b3eb21edf29a1aceb57793285080506d
3
{ "blob_id": "6b9fcae2b3eb21edf29a1aceb57793285080506d", "branch_name": "refs/heads/master", "committer_date": 1593542060000, "content_id": "c2cff77777c54add0f1bdd37b04a645bd54164eb", "detected_licenses": [ "MIT" ], "directory_id": "824dd9054d775f7de48840334da14d93f2cada5e", "extension": "py", "fi...
2.75
stackv2
import datetime from flask import Flask, jsonify from flask_cors import CORS import numpy as np # np is general convention # configuration # instantiate the app # app:app is a default name that would be autodiscovered by flask run app = Flask(__name__) app.config.from_object(__name__) # enable CORS CORS(app, resour...
32
24.5
73
13
205
python
[{"finding_id": "codeql_py/reflective-xss_c00ca49b8e09b267_7dcbed26", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 28 ]
[ 32 ]
[ 12 ]
[ 6 ]
2024-11-18T22:27:41.359499+00:00
1,691,037,619,000
ddb102fea6a4f1a3ff8074db3e7362217ee35142
3
{ "blob_id": "ddb102fea6a4f1a3ff8074db3e7362217ee35142", "branch_name": "refs/heads/master", "committer_date": 1691037619000, "content_id": "d3f5f7407ff7fb4aa0395f0f25c74f50ebbc40c1", "detected_licenses": [ "Apache-2.0" ], "directory_id": "7dfc958846a98c9dc90829ace237adb0f4e79057", "extension": "py"...
3.0625
stackv2
from itertools import chain from jinja2 import Environment from jinja2.nodes import Getattr, Getitem, Assign from ploomber.placeholders.placeholder import Placeholder class JinjaExtractor: """Class for parsing jinja templates Parameters ---------- code : str or Placeholder SQL code """ ...
68
29.1
80
17
410
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_e8ef82a858a54fbd_045c3692", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 28 ]
[ null ]
[ 19 ]
[ 32 ]
2024-11-18T22:27:44.225283+00:00
1,571,213,961,000
c7300dc5043f9b7319751159a22423f42f036a72
3
{ "blob_id": "c7300dc5043f9b7319751159a22423f42f036a72", "branch_name": "refs/heads/master", "committer_date": 1571213961000, "content_id": "87bb1d2d8e54e719ea9b293f86da43156a5b2432", "detected_licenses": [ "MIT" ], "directory_id": "da218cecbf3bc0aefffcdbad95725faabf35b3f0", "extension": "py", "fi...
2.625
stackv2
import http.server import socketserver import mt940 import logging import json PORT = 8000 class Handler(http.server.BaseHTTPRequestHandler): def _response_400(self, msg): self.send_response(400) self.send_header('Content-type', 'text/html') self.send_header("Content-length", len(msg)) ...
64
29.27
95
13
455
python
[{"finding_id": "codeql_py/log-injection_e434a38a7ff2a245_5797f0c2", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
5
true
[ "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 20, 20, 41, 41, 41 ]
[ null, null, null, null, null ]
[ 62, 78, 22, 38, 57 ]
[ 76, 95, 36, 55, 82 ]
2024-11-18T22:14:58.607151+00:00
1,563,861,294,000
b32a3453db4924eca98c2a619e97cfebd1bbe10e
3
{ "blob_id": "b32a3453db4924eca98c2a619e97cfebd1bbe10e", "branch_name": "refs/heads/master", "committer_date": 1563861294000, "content_id": "f24b7914e51cf3223d9f030f769fca56d8262d8c", "detected_licenses": [ "MIT" ], "directory_id": "9e81000484f826f377b431d8c668830b48712789", "extension": "py", "fi...
2.78125
stackv2
from __future__ import annotations from abc import ABC, abstractmethod from pathlib import Path from typing import List, Optional from jinja2 import Template TEMPLATE_DIR: Path = Path(__file__).parents[0] / 'template' class DataModelField: def __init__(self, name: str, type_hint: Optional[str] = None, default:...
67
30.1
97
16
467
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_697000366e2a0520_926db266", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 30 ]
[ null ]
[ 26 ]
[ 88 ]
2024-11-18T22:15:01.620186+00:00
1,423,208,042,000
732d13313543a15a102b13d60723401987959e08
3
{ "blob_id": "732d13313543a15a102b13d60723401987959e08", "branch_name": "refs/heads/master", "committer_date": 1423208042000, "content_id": "15ac848af9fd8105c8ec66239ade8ff1c3d392c2", "detected_licenses": [ "MIT" ], "directory_id": "03f35d822d6c90ea11f3d51c22196606100bb170", "extension": "py", "fi...
2.578125
stackv2
import os import sys from flask import Flask, request, render_template import cups import tempfile app = Flask(__name__) @app.route('/') def index(): return "hello" @app.route('/upload', methods=['GET', 'POST']) def upload(): if request.method == 'GET': return render_template('upload.html') else:...
31
25.55
81
15
200
python
[{"finding_id": "codeql_py/reflective-xss_a45e0f9ecdb1e599_fe6d6c68", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 23 ]
[ null ]
[ 16 ]
[ 78 ]
2024-11-18T22:55:34.498184+00:00
1,620,232,045,000
96826841f052f1d3d02918f7abfcb235e6717ebb
3
{ "blob_id": "96826841f052f1d3d02918f7abfcb235e6717ebb", "branch_name": "refs/heads/main", "committer_date": 1620232045000, "content_id": "797c14b92aff186230d9007cdb23f8c5a571b65f", "detected_licenses": [ "MIT" ], "directory_id": "9f55630978347a709fa206142a70ab2fcd3990e5", "extension": "py", "file...
3
stackv2
# marriage bereau registration form : from tkinter import * def details(): print(f"Full Name : {name.get()}") print(f"Address : {address.get()}") print(f"City : {City.get()}") print(f"Gender : {Gender.get()}") print(f"Date of birth : {dob.get()}") print(f"Education : {education.get()}") pr...
70
30.87
85
11
616
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a7d09fac56e45cea_6721bf59", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 9, 13 ]
[ null, null ]
[ 11, 11 ]
[ 37, 45 ]
2024-11-19T00:07:30.603864+00:00
1,526,574,342,000
76a3f99d00fb2767dbb88089e5d3c98a16a8f7e4
2
{ "blob_id": "76a3f99d00fb2767dbb88089e5d3c98a16a8f7e4", "branch_name": "refs/heads/master", "committer_date": 1526574342000, "content_id": "7465e3776bfa7d1c7601ee3194eec806c55594d4", "detected_licenses": [ "MIT" ], "directory_id": "b2236e285259adfa56740f469d5449d8cf32c8f3", "extension": "py", "fi...
2.421875
stackv2
#!python3 import os import shutil # change the python working directory to the project watch folder watch_folder = 'path/to/project/watch/folder' output_dir01 = 'path/to/project/output/folder' output02 = 'path/to/project/secondary/output/folder' path_list = [] def project_zip(): os.chdir(watch_folder) # ch...
66
33.97
108
29
564
python
[{"finding_id": "codeql_py/overly-permissive-file_11b48d52bd0c57ca_5657aeb0", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world writable." ]
[ 60 ]
[ null ]
[ 17 ]
[ 44 ]
2024-11-19T00:33:34.031028+00:00
1,561,411,272,000
254222967d8c5e56ada11978445deb98c169926a
3
{ "blob_id": "254222967d8c5e56ada11978445deb98c169926a", "branch_name": "refs/heads/master", "committer_date": 1561411272000, "content_id": "4b55b2b4e1dee15e868bb8a0393fba49ceb9d371", "detected_licenses": [ "MIT" ], "directory_id": "6b6ebb8ae399a7fb9b4b74f603d0e49a7303770d", "extension": "py", "fi...
2.90625
stackv2
#!/usr/bin/env python3 import subprocess import pyowm import configparser import os.path import requests import json from commands.tts import text_to_speech config = configparser.ConfigParser() config.read(os.path.dirname(__file__) + '/../../config.ini') owm = pyowm.OWM(config.get('api_keys', 'openweathermap')) ipstac...
38
33.55
119
14
323
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b4c7e58c10e76ec7_28d90f97", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 29 ]
[ null ]
[ 11 ]
[ 27 ]
2024-11-18T23:28:42.213548+00:00
1,598,477,967,000
59eddcf8c54d4a9385a33c320e3f5d5b8e5baa5b
3
{ "blob_id": "59eddcf8c54d4a9385a33c320e3f5d5b8e5baa5b", "branch_name": "refs/heads/master", "committer_date": 1598477967000, "content_id": "24816533b791ebc89bd627b46a8d52ad0b34b3de", "detected_licenses": [ "MIT" ], "directory_id": "41d27a8941c720ebb80fae2d974fe7224db6978b", "extension": "py", "fi...
3.0625
stackv2
import hashlib from database.db_base import * class DBAuth(DBBase): def __init__(self, database, parent): super().__init__(database) self.parent = parent self.t_users = '/users' self.t_user_types = '/user_types' self.t_last_id = '/last_id' def add_new_user(self, user...
167
32.96
105
17
1,227
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_779bd7007cd7d346_79771fe8", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e...
[ 167 ]
[ null ]
[ 31 ]
[ 60 ]
2024-11-19T01:11:26.351357+00:00
1,649,793,936,000
436ce014edbb010fd19c87033ce4b5f3ada4bfc3
3
{ "blob_id": "436ce014edbb010fd19c87033ce4b5f3ada4bfc3", "branch_name": "refs/heads/master", "committer_date": 1649793936000, "content_id": "e436522b514e425de6c5833f9204b7a9dd09648b", "detected_licenses": [ "MIT" ], "directory_id": "746302ed4d569d41968dc8769119c7f51eea5eb9", "extension": "py", "fi...
2.53125
stackv2
#! /usr/bin/env python import getpass import os import readline import pathlib import random import shutil import string import xmltodict import subprocess import string import sys import glob def randomString(stringLength=10): """Generate a random string of fixed length """ letters = string.ascii_letters + s...
212
34.89
138
14
2,023
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_52b2134d41b095fb_d178f445", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.", "This expression stores [sensitive data (secret)](1) as clear text." ]
[ 164, 172 ]
[ null, null ]
[ 11, 11 ]
[ 30, 46 ]
2024-11-18T23:48:17.671258+00:00
1,473,910,965,000
e2be30897c54f101fe2676ccd96e21bb838a0e02
2
{ "blob_id": "e2be30897c54f101fe2676ccd96e21bb838a0e02", "branch_name": "refs/heads/master", "committer_date": 1473910965000, "content_id": "455358a6ff6a9ad095f37cece2960177632e33c4", "detected_licenses": [ "MIT" ], "directory_id": "3931d2cc1ebc364ca696a4fadb0ce3b4f9bcee42", "extension": "py", "fi...
2.34375
stackv2
# encoding: utf-8 #!/usr/bin/python import MySQLdb, re, sys, urllib2, Queue, urllib, ssl from urllib2 import Request, urlopen, URLError, HTTPError # from requests import Request, Session db = MySQLdb.connect("beta.moe","yudachi","poi","crawler" ) cursor = db.cursor() cursor.execute("SELECT VERSION()") data = cursor....
149
25.48
96
17
1,254
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_14851893a611221d_285624fc", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [pixiv.net](1) may be at an arbitrary position in the s...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [pixiv.net](1) may be at an arbitrary position in the sanitized URL." ]
[ 85 ]
[ null ]
[ 26 ]
[ 42 ]
2024-11-19T00:29:32.357046+00:00
1,609,296,690,000
cdc721eff73a0749a98c207ed071ce8fb0276c66
2
{ "blob_id": "cdc721eff73a0749a98c207ed071ce8fb0276c66", "branch_name": "refs/heads/main", "committer_date": 1609296690000, "content_id": "0dd05aca8007f11ddd713a074fa7edabd9d4d69e", "detected_licenses": [ "Apache-2.0" ], "directory_id": "03ff435a19cb5f0cfbf2f41c121c6d8f81401948", "extension": "py", ...
2.453125
stackv2
#! /usr/bin/env python #encoding=utf-8 from flask import Flask,render_template,redirect from flask import request import urllib import sys import os from jinja2 import Template app = Flask(__name__) def safe_msg(msg): blacklist = ['~','set','or','args','_','[','request','lipsum','=','chr','json','g','.',"'",'{{',...
43
23.51
146
14
279
python
[{"finding_id": "codeql_py/template-injection_e9944bb8a6d3773d_859b5968", "tool_name": "codeql", "rule_id": "py/template-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This template construction depends on a [user-provided value](1).", "remediation": "", "location": ...
3
true
[ "CWE-074", "CWE-079", "CWE-079" ]
[ "py/template-injection", "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "HIGH", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This template construction depends on a [user-provided value](1).", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 35, 35, 37 ]
[ null, null, null ]
[ 22, 13, 13 ]
[ 75, 76, 48 ]
2024-11-18T23:05:33.983865+00:00
1,622,772,096,000
92c0103416b6f591f8461ec24e7fa05d9fd67dc9
3
{ "blob_id": "92c0103416b6f591f8461ec24e7fa05d9fd67dc9", "branch_name": "refs/heads/main", "committer_date": 1622772096000, "content_id": "423a2d0fe9532da333eb42c329f68b0af0121777", "detected_licenses": [ "MIT" ], "directory_id": "536eb9a35d0131939cbea79a8945388b3cd6c9ea", "extension": "py", "file...
2.84375
stackv2
import re import urllib import pandas as pd import analysis as sa from collections import Counter from interface import search, connect def as_df(query): # Initialize empty dataframe df = pd.DataFrame({ 'tweet': [], 'clean_tweet': [], 'predicted-sentiment': [], 'polarity':[], ...
73
29.64
115
15
509
python
[{"finding_id": "codeql_py/overly-large-range_f6de26205014a703_bc72b806", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 63 ]
[ null ]
[ 58 ]
[ 61 ]
2024-11-18T23:10:59.675177+00:00
1,567,060,209,000
0ba73774b82151aaa0fb1bb1b845d8d7e83ff893
3
{ "blob_id": "0ba73774b82151aaa0fb1bb1b845d8d7e83ff893", "branch_name": "refs/heads/master", "committer_date": 1567060209000, "content_id": "e5ffcbaacc1b4ea1c0b3566a34a5535bc5c80228", "detected_licenses": [ "Apache-2.0" ], "directory_id": "193c70b5c85526250683b8e1762692fec4232f47", "extension": "py"...
3.03125
stackv2
#!/usr/bin/env python # encoding: utf-8 """ @version: v1.0 @author: xukui @license: Apache Licence @contact: fakerkayn@gmail.com @software: PyCharm @file: meta_picture.py.py @time: 2019-08-29 16:23 @description:高德坐标拾取网站:https://lbs.amap.com/console/show/picker 需要更改本文件最底下的图片路径还有31行左右的self.api_key,然后就可以使用了 当然还需要pip3 ins...
170
24.06
94
16
1,196
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_72c10eec79efb606_224d7d8a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 48 ]
[ null ]
[ 15 ]
[ 37 ]
2024-11-18T23:11:00.759009+00:00
1,437,755,048,000
72b17289e2bca0df559b18cd5bd107b0afb55407
2
{ "blob_id": "72b17289e2bca0df559b18cd5bd107b0afb55407", "branch_name": "refs/heads/master", "committer_date": 1437755048000, "content_id": "1b99336c2c09ca467a7506020128211e7757e644", "detected_licenses": [ "MIT" ], "directory_id": "5d6084741ada07b784091ad94a908e1be59e902f", "extension": "py", "fi...
2.484375
stackv2
from flask import Flask, make_response, render_template, request import logging import json import requests import config import random import string from google.appengine.ext import ndb app = Flask(__name__) CONTENT_TYPE = {'Content-Type': 'application/json;charset=UTF-8'} LIFX_ENDPOINT = 'https://api.lifx.com/v1be...
148
27.51
135
18
949
python
[{"finding_id": "codeql_py/reflective-xss_f3df772941b3e668_60fd1b37", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
6
true
[ "CWE-079", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-079" ]
[ "py/reflective-xss", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/jinja2/autoescape-false" ]
[ "HIGH", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "Usin...
[ 143, 73, 83, 87, 142, 51 ]
[ null, null, null, null, null, null ]
[ 12, 18, 18, 18, 18, 16 ]
[ 39, 69, 39, 41, 77, 60 ]
2024-11-18T23:11:08.174775+00:00
1,633,514,819,000
9254eea2e6d9c6cacb8c86b830f8013bde46c4ff
3
{ "blob_id": "9254eea2e6d9c6cacb8c86b830f8013bde46c4ff", "branch_name": "refs/heads/main", "committer_date": 1633514819000, "content_id": "040514304ccf5c07821fd092f043b123a214cea6", "detected_licenses": [ "MIT" ], "directory_id": "74087101304295b4de73e7b330c0e0a318eeafef", "extension": "py", "file...
3.3125
stackv2
import random from emulators.Device import Device from emulators.Medium import Medium from emulators.MessageStub import MessageStub class GossipMessage(MessageStub): def __init__(self, sender: int, destination: int, secrets): super().__init__(sender, destination) # we use a set to keep the "secr...
88
33.67
119
18
686
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f71b4cff9e7ce22c_d6645cc1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
4
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 50, 73, 75, 88 ]
[ null, null, null, null ]
[ 15, 19, 19, 15 ]
[ 70, 60, 59, 70 ]
2024-11-18T23:11:14.655124+00:00
1,563,233,406,000
dddc0b81ee41046aa352aba186dfc391ef7ddd2a
3
{ "blob_id": "dddc0b81ee41046aa352aba186dfc391ef7ddd2a", "branch_name": "refs/heads/master", "committer_date": 1563233406000, "content_id": "2751a41ba0a44f5f7904c26924a80a9778abd437", "detected_licenses": [ "MIT" ], "directory_id": "cdc4da1b1fa3f241fc7152da5d2278d408945dbc", "extension": "py", "fi...
2.859375
stackv2
# local import only_otters.scrapetools.autobrowser as autobrowser import only_otters.scrapetools.util as util # std from functools import partial import re from typing import Any, Generator, Dict, Optional # other from lxml import html as lhtml import requests import yaml class Keywords: """A simple structure t...
447
31.4
99
18
3,117
python
[{"finding_id": "codeql_py/redos_8a4e367526f42b78_3e4220ee", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '${{' and containing many repetiti...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '${{' and containing many repetitions of '0'." ]
[ 183 ]
[ null ]
[ 57 ]
[ 63 ]
2024-11-19T00:24:52.486265+00:00
1,693,490,279,000
345458f76d5ec9bbfdf280da1df7ddcb44783ecc
3
{ "blob_id": "345458f76d5ec9bbfdf280da1df7ddcb44783ecc", "branch_name": "refs/heads/master", "committer_date": 1693490279000, "content_id": "8f9389c205e37d10d0a440ac247b745536c518ef", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e78a66b3201cc5f6b9fd9a896067c616d97fd669", "extension": "py"...
3.0625
stackv2
import logging import os import shutil import stat import uuid from contextlib import contextmanager from io import BytesIO from typing import IO, Any, Callable, Iterator, Optional, Union logger = logging.getLogger(__name__) def robust_rmtree(path: Union[str, bytes]) -> None: """ Robustly tries to delete pat...
234
32.79
122
17
1,777
python
[{"finding_id": "codeql_py/overly-permissive-file_bfa6a669bff5df5e_33fa1061", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ...
2
true
[ "CWE-732", "CWE-732" ]
[ "py/overly-permissive-file", "py/overly-permissive-file" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world writable.", "Overly permissive mask in chmod sets file to world writable." ]
[ 155, 161 ]
[ null, null ]
[ 17, 5 ]
[ 52, 46 ]