added
stringlengths
32
32
created
int64
1,244B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.25
source
stringclasses
1 value
text
stringlengths
324
20.1k
num_lines
int64
16
598
avg_line_length
float64
15.1
58.3
max_line_length
int64
33
179
ast_depth
int64
8
39
length
int64
101
3.8k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.1k
265k
sast_codeql_findings_count
int64
1
45
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
45
rule_ids
listlengths
1
45
confidences
listlengths
1
45
severities
listlengths
1
45
messages
listlengths
1
45
line_starts
listlengths
1
45
line_ends
listlengths
1
45
column_starts
listlengths
1
45
column_ends
listlengths
1
45
2024-11-19T00:59:49.525701+00:00
1,626,707,317,000
05e1ee9502dd2bc20373e4a5df05a906cc22815a
2
{ "blob_id": "05e1ee9502dd2bc20373e4a5df05a906cc22815a", "branch_name": "refs/heads/master", "committer_date": 1626707317000, "content_id": "bd2a6dbb39911c8c4b7998436fa8cd810d7cdd8c", "detected_licenses": [ "MIT" ], "directory_id": "929e431c2ba2960ef8681f37e81cce22b6295fee", "extension": "py", "fi...
2.3125
stackv2
# -*- coding: utf-8 -*- import errno import json import logging import logging.handlers import os import time from configparser import ConfigParser, ExtendedInterpolation import requests import websocket symbol1LastCallTime = 0.0 symbol2LastCallTime = 0.0 symbol3LastCallTime = 0.0 symbol4LastCallTime = 0.0 d...
262
30
101
18
2,127
python
[{"finding_id": "codeql_py/request-without-cert-validation_c036218eca65b98d_4b1ff43f", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 230 ]
[ 235 ]
[ 16 ]
[ 35 ]
2024-11-19T01:00:06.873085+00:00
1,584,556,322,000
209a0eff62ce0b9402a9bc9d304b34b9eb11f5a7
3
{ "blob_id": "209a0eff62ce0b9402a9bc9d304b34b9eb11f5a7", "branch_name": "refs/heads/master", "committer_date": 1584556322000, "content_id": "b41d5332ce74825409f34376b6419ce5fcf6114b", "detected_licenses": [ "MIT" ], "directory_id": "9fc2b498b4134d587944d64eab2298e644ae02e6", "extension": "py", "fi...
3.328125
stackv2
import mysql.connector from mysql.connector import Error from use_key import encrypt, decrypt def connect_database(): try: global connection global cursor connection = mysql.connector.connect(host='localhost', database='passwords', ...
116
33.1
131
17
892
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_de0992825cdc187e_9040ac04", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 47, 90 ]
[ null, null ]
[ 9, 11 ]
[ 74, 99 ]
2024-11-19T01:22:13.021794+00:00
1,581,056,015,000
f596c97e304713e61fad427185d451c21f7ce67c
3
{ "blob_id": "f596c97e304713e61fad427185d451c21f7ce67c", "branch_name": "refs/heads/master", "committer_date": 1581056015000, "content_id": "16e31d26fdb1b283b91da62afeb5e68ce243dc79", "detected_licenses": [ "MIT" ], "directory_id": "73841069a6b739a10e4b8ac134cfe982593c7b56", "extension": "py", "fi...
3.140625
stackv2
import urllib.request import json from .models import News, Sources # Get the API key api_key = None # Get the News base url base_url = None # Function that takes in the application instance def configure_request(app): global api_key, base_url api_key = app.config['NEWS_API_KEY'] base_url = app.config[...
103
25.8
103
14
593
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_10928ca15aba7d0e_302dee4e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 26 ]
[ null ]
[ 11 ]
[ 24 ]
2024-11-19T01:56:48.732760+00:00
1,408,084,697,000
c0a02c901c818f10398cbc2c205a62f099c71d78
3
{ "blob_id": "c0a02c901c818f10398cbc2c205a62f099c71d78", "branch_name": "refs/heads/master", "committer_date": 1408084697000, "content_id": "d494cb9d82697eeb58569efaff092e339601f782", "detected_licenses": [ "MIT" ], "directory_id": "df3975a6d594f2111b490de60b0a12da990d78e9", "extension": "py", "fi...
2.78125
stackv2
import util from totalimpactwebapp.util import cached_property from totalimpactwebapp import db class AliasRow(db.Model): __tablename__ = 'alias' tiid = db.Column(db.Text, db.ForeignKey('item.tiid'), primary_key=True) namespace = db.Column(db.Text, primary_key=True) nid = db.Column(db.Text, primary_...
110
28.66
80
18
706
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_a27ec652a54775f7_ad431b16", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [slideshare.net](1) may be at an arbitrary position in ...
4
true
[ "CWE-020", "CWE-020", "CWE-020", "CWE-020" ]
[ "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "The string [slideshare.net](1) may be at an arbitrary position in the sanitized URL.", "The string [github.com](1) may be at an arbitrary position in the sanitized URL.", "The string [youtube.com](1) may be at an arbitrary position in the sanitized URL.", "The string [vimeo.com](1) may be at an arbitrary pos...
[ 90, 93, 96, 99 ]
[ null, null, null, null ]
[ 16, 18, 18, 18 ]
[ 53, 51, 52, 50 ]
2024-11-19T02:10:24.762388+00:00
1,542,805,577,000
8a562e59aff388b168214629051bfcc3c64c59ff
3
{ "blob_id": "8a562e59aff388b168214629051bfcc3c64c59ff", "branch_name": "refs/heads/master", "committer_date": 1542805577000, "content_id": "207008a93efa2dcbdab89eff6415d7307f991648", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "3f19365f3e9ce48acb8b6638e4a1161fa025aebd", "extension": "p...
2.9375
stackv2
from flask import current_app from jinja2 import Environment, PackageLoader, meta class LayoutParameter: """ Class for layout parameters in jinja2 templates types can be: - bool - str """ def __init__(self, name): """ Init parameter :param name: name as string pa...
94
27.81
103
16
576
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_4beaabda6dead955_f53f2f92", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 70 ]
[ null ]
[ 15 ]
[ 104 ]
2024-11-19T02:10:36.886763+00:00
1,486,472,178,000
9cd7e35ebea1097d047528904f29b387085fde8d
3
{ "blob_id": "9cd7e35ebea1097d047528904f29b387085fde8d", "branch_name": "refs/heads/master", "committer_date": 1486472178000, "content_id": "416575988cf58cd3cabf2279dc6e6543fdc40b56", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "966d6267cf3c03d927bda0e093b00b28471ea5b1", "extension": "p...
2.609375
stackv2
# -*- coding: utf-8 -*- from __future__ import absolute_import from __future__ import division from __future__ import print_function from __future__ import unicode_literals import os import sys import shutil import hashlib import platform import numpy as np import pandas as pd from .base import PipelineFinder def...
182
34.74
110
19
1,622
python
[{"finding_id": "codeql_py/tarslip_ace1b91964096d66_429d9e62", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially untrusted source](1)." ]
[ 137 ]
[ null ]
[ 13 ]
[ 16 ]
2024-11-19T02:10:47.590132+00:00
1,517,367,223,000
8ff5e81f87a79c7220bb18bf41a928a1732bd0b4
2
{ "blob_id": "8ff5e81f87a79c7220bb18bf41a928a1732bd0b4", "branch_name": "refs/heads/master", "committer_date": 1517367223000, "content_id": "102e07840fab6ecce3b9f6eafee9b34d01926130", "detected_licenses": [ "Apache-2.0" ], "directory_id": "608d416ba9b9fa0a81cb34566970d447c031052f", "extension": "py"...
2.40625
stackv2
import os import sys import json import requests from config import BOT_ID,BOT_ACCESS_TOKEN,PAGE_ACCESS_TOKEN,VERIFY_TOKEN from flask import Flask, request app = Flask(__name__) class Button(dict): pass @app.route('/', methods=['GET']) def verify(): # when the endpoint is registered as a webhook, it must e...
202
27.73
132
20
1,212
python
[{"finding_id": "codeql_py/flask-debug_352c7428c2ee018e_e001fd4a", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 202, 22 ]
[ null, null ]
[ 5, 16 ]
[ 24, 50 ]
2024-11-19T02:45:21.088200+00:00
1,621,482,216,000
2727565475f1873df6b3c1c98cd90e9b98ac9980
3
{ "blob_id": "2727565475f1873df6b3c1c98cd90e9b98ac9980", "branch_name": "refs/heads/main", "committer_date": 1621482216000, "content_id": "4721052c791ac72879fb4d85f40b81084fc8324d", "detected_licenses": [ "MIT" ], "directory_id": "0ccf257bbe1d9a0e808e76a77b2f5aa3c0a16340", "extension": "py", "file...
2.578125
stackv2
import os import requests from fastapi import APIRouter, HTTPException from pydantic import BaseModel router = APIRouter() class Calc(BaseModel): op: str number1: int number2: int @router.post("/calc") def calc(body: Calc): if body.op == "add": r = requests.get(url=f"{os.getenv('base_url')}/...
36
41.08
121
18
397
python
[{"finding_id": "codeql_py/partial-ssrf_181a174ba3afdda3_eb85e709", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
6
true
[ "CWE-918", "CWE-918", "CWE-918", "CWE-918", "CWE-918", "CWE-918" ]
[ "py/partial-ssrf", "py/partial-ssrf", "py/partial-ssrf", "py/partial-ssrf", "py/partial-ssrf", "py/partial-ssrf" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1).", "Part of the...
[ 17, 20, 23, 26, 29, 32 ]
[ null, null, null, null, null, null ]
[ 13, 13, 13, 13, 13, 13 ]
[ 116, 121, 121, 119, 117, 122 ]
2024-11-19T02:45:31.216834+00:00
1,565,782,189,000
b2ced18d490b4c6f1fca549e012a7026132024c7
2
{ "blob_id": "b2ced18d490b4c6f1fca549e012a7026132024c7", "branch_name": "refs/heads/master", "committer_date": 1565782189000, "content_id": "6d020f6eef7e05730e1cd70a045344b96a0bc4e7", "detected_licenses": [ "MIT" ], "directory_id": "838c1f1401c76c0f1b5e3a33e6c87754cc0e2443", "extension": "py", "fi...
2.3125
stackv2
# -*- coding: utf-8 -*- import sys import os import json import requests import roybot import util as u # some local utility functions import logging from flask import Flask, request app = Flask(__name__) @app.route('/', methods=['GET']) def verify(): # when the endpoint is registered as a webhook, it must echo b...
137
35.52
170
25
1,084
python
[{"finding_id": "codeql_py/flask-debug_547c317aeeefb068_2a54b6e1", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
5
true
[ "CWE-215", "CWE-079", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/flask-debug", "py/reflective-xss", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "HIGH", "HIGH", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "T...
[ 137, 20, 32, 104, 106 ]
[ null, null, null, null, null ]
[ 5, 16, 18, 21, 21 ]
[ 24, 50, 22, 154, 170 ]
2024-11-19T02:45:32.296397+00:00
1,470,056,814,000
8ec064dd5ec0b76197e5a292e9ce2b2d20c2356e
2
{ "blob_id": "8ec064dd5ec0b76197e5a292e9ce2b2d20c2356e", "branch_name": "refs/heads/master", "committer_date": 1470056814000, "content_id": "449b12447c8e4e0aa50fa251e7bf75b48b60f410", "detected_licenses": [ "Apache-2.0" ], "directory_id": "b6c066fd60699183b926e5b5af824180d9869ebc", "extension": "py"...
2.375
stackv2
from flask import Flask, render_template, redirect, url_for, request, session, flash from flask_sqlalchemy import SQLAlchemy from sqlalchemy import Column, Date, Float, ForeignKey, Integer, String from sqlalchemy.ext.declarative import declarative_base from sqlalchemy.orm import relationship, sessionmaker from sqlalche...
151
25.23
107
15
936
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_67da31bb694bd81d_6a785712", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
4
true
[ "CWE-312", "CWE-215", "CWE-327", "CWE-327" ]
[ "py/clear-text-logging-sensitive-data", "py/flask-debug", "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the d...
[ 43, 151, 39, 56 ]
[ null, null, null, null ]
[ 22, 3, 21, 24 ]
[ 30, 39, 38, 41 ]
2024-11-19T02:45:33.987239+00:00
1,493,998,780,000
6bf0bdbf1837d42cc95e41e0bb762a70d7592f2c
2
{ "blob_id": "6bf0bdbf1837d42cc95e41e0bb762a70d7592f2c", "branch_name": "refs/heads/master", "committer_date": 1494093972000, "content_id": "85fabd255ebbbe0a3539d7212a00dc311b3eff39", "detected_licenses": [ "Apache-2.0" ], "directory_id": "b9f12a7a427117d6d9e82b71c48f61b1575533dd", "extension": "py"...
2.5
stackv2
from __future__ import unicode_literals from __future__ import print_function from __future__ import division from __future__ import absolute_import from builtins import object import os import shutil import tarfile import io import json from enum import Enum import boto3 import botocore from typing import Text from r...
196
37.54
116
19
1,672
python
[{"finding_id": "codeql_py/tarslip_d97e9d7752c5c857_7c6f5235", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/tarslip", "py/tarslip" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1).", "This file extraction depends on a [potentially untrusted source](1)." ]
[ 92, 136 ]
[ null, null ]
[ 13, 13 ]
[ 16, 16 ]
2024-11-19T02:45:47.149716+00:00
1,567,133,617,000
659599fce5528b586e2265df126a374235a0c0e7
2
{ "blob_id": "659599fce5528b586e2265df126a374235a0c0e7", "branch_name": "refs/heads/master", "committer_date": 1567133617000, "content_id": "aa5ce9b03767a3f273dae9498db21e65af7b9de2", "detected_licenses": [ "MIT" ], "directory_id": "e39be3b7f035ef032a7e3c2fdfdc00829fe7f89a", "extension": "py", "fi...
2.375
stackv2
from flask import Flask, jsonify, request, render_template from flask import url_for, make_response, redirect from werkzeug import secure_filename app1 = Flask(__name__) app1.secret_key = r'\x1a\x15I\xdd\x7f\xe3x \xb4\t\xb5tK\xcd\x11\x861,\x910\xa1wu\xdb' @app1.route('/') def hello_world(): username = request.coo...
48
26.98
85
12
370
python
[{"finding_id": "codeql_py/flask-debug_b9d49ba409a91fca_aa16c206", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 48, 11 ]
[ null, null ]
[ 5, 26 ]
[ 25, 60 ]
2024-11-19T03:12:19.284002+00:00
1,511,566,915,000
632f1ad0d3d9dc94c4d9616a49cfa8699371d8a8
2
{ "blob_id": "632f1ad0d3d9dc94c4d9616a49cfa8699371d8a8", "branch_name": "refs/heads/master", "committer_date": 1511566915000, "content_id": "2a622c30d74e5c59b113fa07a327668aa0c3ad77", "detected_licenses": [ "MIT", "Apache-2.0" ], "directory_id": "846bf4209f0acada57cf8621bab5d5dd277f8819", "exten...
2.453125
stackv2
# vim: set filetype=python tabstop=4 shiftwidth=4 expandtab: import Cryptodome.Cipher.AES import Cryptodome.Hash.SHA256 import Cryptodome.Random import Cryptodome.Util.Counter import ctypes import getpass import json import multiprocessing import os import config _required_credentials = [ "email", "pw", ...
106
25.54
101
16
702
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_c04953a679523f8e_2ba03c4e", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.", "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computational...
[ 46, 84 ]
[ null, null ]
[ 23, 19 ]
[ 74, 70 ]
2024-11-19T03:12:21.448991+00:00
1,625,041,230,000
4190f756cd660281183108a863d14df6de5a12be
2
{ "blob_id": "4190f756cd660281183108a863d14df6de5a12be", "branch_name": "refs/heads/master", "committer_date": 1625041230000, "content_id": "90bd3c96ec82ec4e0099ab379919d448ad38effd", "detected_licenses": [ "MIT" ], "directory_id": "e32c04c850a395739d287dd3b88da44725d4912d", "extension": "py", "fi...
2.359375
stackv2
from django.shortcuts import render,redirect from django.shortcuts import HttpResponse from loginInfo.models import Customer from django.contrib.auth.hashers import make_password,check_password # Create your views here. def index(request): # print("You are "+request.session.get('email')) return render(req...
93
31.44
142
15
579
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4ff258dec0d4f380_dabba380", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 76 ]
[ null ]
[ 21 ]
[ 29 ]
2024-11-19T01:33:41.799940+00:00
1,621,084,794,000
6545d0eb92db591037421cf4c14cce965d2c9521
2
{ "blob_id": "6545d0eb92db591037421cf4c14cce965d2c9521", "branch_name": "refs/heads/main", "committer_date": 1621084794000, "content_id": "ea30a833ca348aa69e4569ceb20dc4813433b037", "detected_licenses": [ "Apache-2.0" ], "directory_id": "3e94940d40de68ebd2b0c20617b1060f4d6755fb", "extension": "py", ...
2.4375
stackv2
import os import json from flask import Flask from flask import request from slack_sdk.signature import SignatureVerifier import boto3 app = Flask(__name__) @app.route("/", methods=['GET', 'POST']) def hello(): if request.method == 'POST': # App CredentialsのSigning Secretから取得する signing_secret = o...
43
30.44
69
18
369
python
[{"finding_id": "codeql_py/flask-debug_59f282ebdc299616_d89aebee", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 43, 35 ]
[ null, null ]
[ 5, 20 ]
[ 53, 37 ]
2024-11-19T01:57:14.090674+00:00
1,462,379,161,000
1659b262ff49daef230a128b1bb881f9d2b74c79
3
{ "blob_id": "1659b262ff49daef230a128b1bb881f9d2b74c79", "branch_name": "refs/heads/master", "committer_date": 1462379161000, "content_id": "43c6c7f31a785eda2ce88865eab5e12a17850561", "detected_licenses": [ "Apache-2.0" ], "directory_id": "8be71f936c2e2177f7d1b31212ccb9faba00f5df", "extension": "py"...
2.71875
stackv2
import codecs import os from hashlib import sha512 import config # Generate random bytes for the salt thebytes = os.urandom(100) hexstr = str(codecs.encode(thebytes, 'hex')) salt = hexstr[3:14] # Hash the password with the salt tohash = config.password + salt tohash = tohash.encode("utf8") hashed = sha512(tohash).h...
26
21.35
66
9
160
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_3ec1d987ab8837e5_e325491a", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 16 ]
[ null ]
[ 17 ]
[ 23 ]
2024-11-19T01:57:25.420601+00:00
1,693,440,402,000
212fafc21fcbc6346f040e3349f7904ccf869458
2
{ "blob_id": "212fafc21fcbc6346f040e3349f7904ccf869458", "branch_name": "refs/heads/master", "committer_date": 1693442540000, "content_id": "10d29f6b57e10057f029adf16dd82d0e251feef0", "detected_licenses": [ "Apache-2.0" ], "directory_id": "aee26a4c731a84481a499679c3d4cef9ec954aed", "extension": "py"...
2.5
stackv2
# Licensed under the Apache License, Version 2.0 (the "License"); you may # not use this file except in compliance with the License. You may obtain # a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under t...
107
35.75
79
14
857
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_0db070666dbb5daa_38b1383e", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to WarningPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to WarningPolicy may be unsafe." ]
[ 64 ]
[ null ]
[ 13 ]
[ 77 ]
2024-11-19T02:11:06.979262+00:00
1,465,767,544,000
ada1cfe254d4aa1c26428b55a15f68c695ab64c0
3
{ "blob_id": "ada1cfe254d4aa1c26428b55a15f68c695ab64c0", "branch_name": "refs/heads/master", "committer_date": 1465767544000, "content_id": "4904908a0b05de03a48e3b0f74d9ad0cc6923172", "detected_licenses": [ "MIT" ], "directory_id": "8f798e3bc32eb6c736096a4c7759dff6a83be3d1", "extension": "py", "fi...
2.625
stackv2
import requests import sys import hashlib import time import locale import getpass def main(): locale.setlocale(locale.LC_ALL, '') username = 'admin' hashed = False timeDiff = 5 rateScale = 1024 rateScaleStr = 'KiB' totalScale = 1048576 totalScaleStr = 'MiB' if (len(sys.argv) >...
251
30.16
121
18
2,033
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_9212b219c7bbe787_91f46be0", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (id)](2) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (id)](3) is used in a hashing algorithm (MD5) that is insecure.", "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) ...
[ 97, 103 ]
[ null, null ]
[ 14, 18 ]
[ 22, 26 ]
2024-11-19T02:11:31.301914+00:00
1,667,164,334,000
9c0a93943d1ed37558197538d7cdd1aebdf547e6
3
{ "blob_id": "9c0a93943d1ed37558197538d7cdd1aebdf547e6", "branch_name": "refs/heads/master", "committer_date": 1667164334000, "content_id": "9d687ed1de058a04eab85eb08f3eef53a60ea800", "detected_licenses": [ "MIT" ], "directory_id": "332aec3743049681d00cc8bea42abe7759b13c49", "extension": "py", "fi...
3.1875
stackv2
""" Go Service Routes incoming alias by locating matching pattern and target in the database if the pattern is a capture group it uses standard regex substitution to construct the modified target from the incoming alias. """ import re import sre_constants import sre_parse from os import getenv import pymongo.errors f...
106
30.87
84
18
766
python
[{"finding_id": "codeql_py/nosql-injection_e7fd07dcc0f77635_c9fcf4a6", "tool_name": "codeql", "rule_id": "py/nosql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This NoSQL query contains an unsanitized [user-provided value](1).", "remediation": "", "location": {"fil...
3
true
[ "CWE-943", "CWE-601", "CWE-601" ]
[ "py/nosql-injection", "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This NoSQL query contains an unsanitized [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 98, 105, 106 ]
[ null, null, null ]
[ 47, 25, 21 ]
[ 52, 53, 27 ]
2024-11-19T02:11:45.805547+00:00
1,578,167,805,000
d1961baa946c8b727486e69bfb57b26db71b89f4
3
{ "blob_id": "d1961baa946c8b727486e69bfb57b26db71b89f4", "branch_name": "refs/heads/master", "committer_date": 1578167805000, "content_id": "11ff81084321cc600cfa4d1576cdcb26492ea3d2", "detected_licenses": [ "Apache-2.0" ], "directory_id": "0cab43a4b29f306df4426d517f30e7664269b9ac", "extension": "py"...
2.796875
stackv2
## -------------------------------------------- #importts for the web api from flask import Flask,jsonify,request from flask_restful import Api,Resource from pymongo import MongoClient import bcrypt import requests import subprocess import json from pprint import pprint #--------------------------------------------...
235
27.6
110
15
1,426
python
[{"finding_id": "codeql_py/flask-debug_03c7cebde446adba_7ef3f5fe", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-918" ]
[ "py/flask-debug", "py/full-ssrf" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "The full URL of this request depends on a [user-provided value](1)." ]
[ 235, 161 ]
[ null, null ]
[ 5, 13 ]
[ 24, 30 ]
2024-11-19T02:32:48.634525+00:00
1,620,077,882,000
9366e41008d78b20bf7a27333a0d8ae5519641ff
2
{ "blob_id": "9366e41008d78b20bf7a27333a0d8ae5519641ff", "branch_name": "refs/heads/master", "committer_date": 1620077882000, "content_id": "279231be936599008ad6511038c76a8eba28a0d3", "detected_licenses": [ "MIT" ], "directory_id": "8cd1fd261b9c65f45260db7d4d5c0e484fc73c1e", "extension": "py", "fi...
2.4375
stackv2
from flask import render_template,redirect,url_for,flash,request from . import auth from ..models import User from .forms import RegistrationForm, LoginForm from flask_login import login_user,logout_user,login_required from .. import db from ..email import mail_message @auth.route('/login', methods=['GET','POST']) def...
43
33.95
107
16
324
python
[{"finding_id": "codeql_py/url-redirection_04a1697246ea1ffd_87440232", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 16 ]
[ null ]
[ 29 ]
[ 78 ]
2024-11-19T02:32:57.115512+00:00
1,560,571,675,000
2e15e45eb5194223de88026a4ff48b739654ca01
3
{ "blob_id": "2e15e45eb5194223de88026a4ff48b739654ca01", "branch_name": "refs/heads/master", "committer_date": 1560571675000, "content_id": "b5512ac59a75c7c80281d949754947acf6931643", "detected_licenses": [ "MIT" ], "directory_id": "c0a753914f3a4d9cca4046a0d114beba93a63cbd", "extension": "py", "fi...
2.890625
stackv2
import socket import os import threading import hashlib from Crypto import Random import Crypto.Cipher.AES as AES from Crypto.PublicKey import RSA import signal def RemovePadding(s): return s.replace('`','') def Padding(s): return s + ((16 - len(s) % 16) * '`') def ReceiveMessage(): while True: ...
137
30.57
115
16
1,061
python
[{"finding_id": "codeql_py/weak-crypto-key_07eb518da2aca7da_238bb15b", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",...
1
true
[ "CWE-326" ]
[ "py/weak-crypto-key" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable." ]
[ 51 ]
[ null ]
[ 14 ]
[ 40 ]
2024-11-19T02:33:08.275505+00:00
1,602,047,875,000
bfa449a9ca786ee6c7c6ba0de7bc51bfc91d4b30
4
{ "blob_id": "bfa449a9ca786ee6c7c6ba0de7bc51bfc91d4b30", "branch_name": "refs/heads/master", "committer_date": 1602047875000, "content_id": "57a626646550f66e913d0d27a1a7856523d717db", "detected_licenses": [ "MIT" ], "directory_id": "0d464df42f5cc3c9a3b992ae9ff6160e5da5701d", "extension": "py", "fi...
3.734375
stackv2
# Caesar_Cipher class class CaesarCipher: def __init__(self,shift): encoder=["k"]*26 decoder=["k"]*26 for k in range(26): encoder[k] = chr((k + shift) % 26 + ord( "A" )) decoder[k] = chr((k - shift) % 26 + ord( "A" )) self.forward = "".join(...
39
26.23
59
16
271
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_27a9fcf2baf1af4e_bb02b199", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 39 ]
[ null ]
[ 25 ]
[ 31 ]
2024-11-19T02:33:36.846948+00:00
1,611,084,938,000
f76405e6977b160b785859f6fcaa9a67ab13fccb
3
{ "blob_id": "f76405e6977b160b785859f6fcaa9a67ab13fccb", "branch_name": "refs/heads/main", "committer_date": 1611084938000, "content_id": "c5cdcf33968d395e44bd76724022e2ab5817d960", "detected_licenses": [ "Apache-2.0" ], "directory_id": "7d3c201c77f9cff23501387f5b6a4bf1af33796a", "extension": "py", ...
2.71875
stackv2
# Copyright (C) 2018 Cancer Care Associates # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to ...
291
27.92
88
16
1,827
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_dcb8301029817ad8_be5fd85d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive dat...
[ 121, 207, 215 ]
[ null, 209, 217 ]
[ 13, 17, 13 ]
[ 88, 18, 14 ]
2024-11-19T02:33:41.518223+00:00
1,621,216,334,000
28f172b16f91d000d4df59da962454d7dcc2bdca
2
{ "blob_id": "28f172b16f91d000d4df59da962454d7dcc2bdca", "branch_name": "refs/heads/main", "committer_date": 1621216334000, "content_id": "a37b8049a9f7fa302ba786c0421812f1dbeeb59e", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "816e68283febdf114f990f97bd47a99c722091e4", "extension": "py"...
2.3125
stackv2
import IP2Proxy import re import requests from plugins.webosint.who.whois import * #Developer by Bafomet def ip2Proxy(IP): if re.match(r"^\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}$",IP): db = IP2Proxy.IP2Proxy() db.open("./plugins/IP2PROXY-LITE-PX8.BIN") record = db.get_all(IP) db.close()...
44
39.59
87
16
443
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7ea11862ad7226e7_185d3beb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 39 ]
[ null ]
[ 23 ]
[ 48 ]
2024-11-19T02:46:11.038348+00:00
1,447,314,729,000
470872ee60f4ef2cf10f7e12684378cb70bd581a
3
{ "blob_id": "470872ee60f4ef2cf10f7e12684378cb70bd581a", "branch_name": "refs/heads/master", "committer_date": 1447314729000, "content_id": "cacb7d16f7ba5a7eeaf6c19d172098ad50ea23f5", "detected_licenses": [ "MIT" ], "directory_id": "2f11b0b1650816e60606f29c1a6fec6eac7dcbf5", "extension": "py", "fi...
2.859375
stackv2
# -*- coding: utf-8 -*- from flask import Flask, request, make_response, abort from random import randint app = Flask(__name__) @app.route('/cart/<item>') def cart(item): items = ['hat', 'book', 'computer'] if not item in items: abort(404) return make_response('<h1>You bought a {}!</h1>'.format(...
33
23.48
77
16
217
python
[{"finding_id": "codeql_py/flask-debug_be8c63b7c5c795a8_ee1338fd", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-079", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability due to a [use...
[ 33, 14, 20 ]
[ null, null, 22 ]
[ 5, 26, 9 ]
[ 24, 66, 65 ]
2024-11-19T02:46:11.137261+00:00
1,675,068,553,000
780cf860c62085c5016b3838415ddd6cc599e867
3
{ "blob_id": "780cf860c62085c5016b3838415ddd6cc599e867", "branch_name": "refs/heads/master", "committer_date": 1675068553000, "content_id": "701249223b16429a1037da1bc6ccb30f3021605a", "detected_licenses": [ "MIT" ], "directory_id": "b1ab5d777efa78b4be4152f92d2c818bb90562a0", "extension": "py", "fi...
3.15625
stackv2
#!/usr/bin/env python # reporting # Create reports with Jinja2 # # Author: Benjamin Bengfort <benjamin@bengfort.com> # Created: Fri Dec 13 10:20:22 2013 -0500 # # ID: reporting.py [] benjamin@bengfort.com $ """ Create reports with Jinja2 """ #########################################################################...
85
31.41
92
19
582
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_65613f5830cfa773_e16339bd", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 61 ]
[ null ]
[ 16 ]
[ 67 ]
2024-11-19T02:59:07.140200+00:00
1,522,242,349,000
d9d2eef1a2b14bd50cd2d5d25cd40884de0c2596
3
{ "blob_id": "d9d2eef1a2b14bd50cd2d5d25cd40884de0c2596", "branch_name": "refs/heads/master", "committer_date": 1522242349000, "content_id": "8b83a519b9e53a59af1ab1a205b78e10a11dbe63", "detected_licenses": [ "Apache-2.0" ], "directory_id": "ace719080fd43203d7f849d505f8c337baefedeb", "extension": "py"...
2.53125
stackv2
import yaml import jinja2 import re from .validate import BaseValidator class Config: _extra_vars_pattern = re.compile(r'(\S+)=(".*?"|\S+)') def __init__(self, args): self.args = args def _load_yaml(self, f): return yaml.load(f) def _parse_vars(self): return self._load_yaml...
42
27.1
87
16
269
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_bef20cac4f5cc8e1_a1ee5288", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 28 ]
[ null ]
[ 13 ]
[ 74 ]
2024-11-19T02:59:46.433601+00:00
1,574,044,484,000
d7e7bf2da8868a4bd6bc4e2ca9cff495c2d290b9
3
{ "blob_id": "d7e7bf2da8868a4bd6bc4e2ca9cff495c2d290b9", "branch_name": "refs/heads/master", "committer_date": 1574044484000, "content_id": "7e042f54f82a44bacea812e1e0fbf5774469b87c", "detected_licenses": [ "MIT" ], "directory_id": "6cf88ad75c3f1e4c081d6edb96564a6a7ef0a3bb", "extension": "py", "fi...
2.53125
stackv2
import cgi import sqlite3 connection = sqlite3.connect("test.db") cursor = connection.cursor() head = """ <head> <title>Test - My Account</title> <meta name="viewport" conent="width=device-width, initial-scale=1.0"> <link rel="stylesheet" type="text/css" href="style.css"> ...
51
26.82
81
11
371
python
[{"finding_id": "codeql_py/sql-injection_9e2cb3c7c6c66207_828ad43b", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown...
1
true
[ "CWE-089" ]
[ "py/sql-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This SQL query depends on a [user-provided value](1)." ]
[ 26 ]
[ null ]
[ 16 ]
[ 67 ]
2024-11-19T03:12:13.463269+00:00
1,612,213,142,000
1ffcd9bf6b852020ea7786823763bfd1b17b025e
2
{ "blob_id": "1ffcd9bf6b852020ea7786823763bfd1b17b025e", "branch_name": "refs/heads/master", "committer_date": 1612213142000, "content_id": "b652765d03b7a1db9c1d96ad2426c5ce5b4eebd0", "detected_licenses": [ "MIT" ], "directory_id": "2c80642754e96fd76b34eed736e4adab1b606772", "extension": "py", "fi...
2.34375
stackv2
#!/usr/bin/env python3 import click import os import json from easydict import EasyDict import yaml import jinja2 ENVS = ['production', 'staging'] root = os.path.dirname(os.path.abspath(__file__)) @click.group() def cli(): pass @cli.command(name='taskdefs') @click.argument('envs', nargs=-1) def build_task_d...
144
23.73
96
16
857
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_d340dd4938a09bc7_842e60d7", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 127 ]
[ 133 ]
[ 17 ]
[ 6 ]
2024-11-19T03:12:17.493248+00:00
1,669,243,301,000
8ecc2614f2dd2f38e335297856f608d88a302959
4
{ "blob_id": "8ecc2614f2dd2f38e335297856f608d88a302959", "branch_name": "refs/heads/master", "committer_date": 1669243301000, "content_id": "5e048dd2bd977211b105c7b8d43a6ceba1832864", "detected_licenses": [ "MIT" ], "directory_id": "45731e8e24ea9101f41ee3ade5298d7eb05b08bc", "extension": "py", "fi...
3.640625
stackv2
import sys from random import randint #generate strong char passwords #limits (valid values are 0 or 1) SpecialSet1_Upper=0 SpecialSet2_Lower=0 SpecialSet3_Number=0 SpecialSet4_SpecChar=0 #specialSetCounter must be >= 3 for password to be valid specialSetCounter=0; #for each char generated, increment its core set ...
65
29.55
106
15
468
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_70969718488c6b79_5d22a5b0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 61 ]
[ null ]
[ 15 ]
[ 23 ]
2024-11-19T03:24:54.960465+00:00
1,616,514,758,000
cb3636faa9af82cb7a42d83fdda07328862eaf41
4
{ "blob_id": "cb3636faa9af82cb7a42d83fdda07328862eaf41", "branch_name": "refs/heads/main", "committer_date": 1616514758000, "content_id": "431fcc5f30bf89c9891f712c433d0ad8df1282f0", "detected_licenses": [ "CC0-1.0" ], "directory_id": "d038bfd86198959b781785b5634da1942f9020a3", "extension": "py", "...
3.796875
stackv2
import time import pandas as pd import numpy as np CITY_DATA = { 'chicago': 'chicago.csv', 'new york city': 'new_york_city.csv', 'washington': 'washington.csv' } def get_filters(): """ Asks user to specify a city, month, and day to analyze. Returns: (str) city - name o...
247
41.3
179
18
2,574
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9e5dde59c4a760e5_e47ac3c6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 191, 191 ]
[ null, null ]
[ 24, 53 ]
[ 40, 69 ]
2024-11-19T03:35:20.179225+00:00
1,531,310,874,000
510555506c55c5a5cbabed88b90106ce17ec12f9
3
{ "blob_id": "510555506c55c5a5cbabed88b90106ce17ec12f9", "branch_name": "refs/heads/master", "committer_date": 1531310874000, "content_id": "c53e88f60dc890b63828b9641839f9da09be5401", "detected_licenses": [ "MIT" ], "directory_id": "987a030cfee7a502ca93d8293f2f348cfdf60249", "extension": "py", "fi...
2.5625
stackv2
from past.builtins import basestring import itertools import datetime import dateutil.parser import dateutil.tz import re from jira import JIRA, JIRAError def to_datetime(date): """Turn a date into a datetime at midnight. """ return datetime.datetime.combine(date, datetime.datetime.min.time()) def strip_...
300
34.6
148
25
2,238
python
[{"finding_id": "codeql_py/overly-large-range_9a903a392036ef92_45464fda", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[+,\\-.\\/0-9:\\].", "remediation": "", "location": {...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[+,\\-.\\/0-9:\\]." ]
[ 129 ]
[ null ]
[ 92 ]
[ 95 ]
2024-11-19T01:26:52.963025+00:00
1,564,456,729,000
3bfa0da53f9349db93d452c484235792f6b57a10
3
{ "blob_id": "3bfa0da53f9349db93d452c484235792f6b57a10", "branch_name": "refs/heads/master", "committer_date": 1564456729000, "content_id": "2af8bcf578a9c2ce5621147389ab6048f9887fad", "detected_licenses": [ "MIT" ], "directory_id": "4bc3843c421234d2025869dde14e804d0b5c3f61", "extension": "py", "fi...
3.21875
stackv2
import requests, math from colorama import Fore, init myApiKey = 'Add your openweathermap.org apy key here'; api_address = 'http://api.openweathermap.org/data/2.5/weather?APPID=' + myApiKey + '&q='; def Hi(): print(Fore.CYAN + ',,,'.center(40)) print('(o o)'.center(40)) print('----oOO--( )--OOo----'.cente...
40
35.58
113
16
419
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f6e18f048efa8c81_2fa1e1e5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 29, 30, 32 ]
[ null, null, null ]
[ 15, 15, 15 ]
[ 113, 72, 81 ]
2024-11-19T01:37:37.974884+00:00
1,510,055,591,000
119c762341590352a1ef4f66dabd9856bb14dcc6
2
{ "blob_id": "119c762341590352a1ef4f66dabd9856bb14dcc6", "branch_name": "refs/heads/master", "committer_date": 1510055591000, "content_id": "c13c865afa1b231efd417a4525240b54084028b5", "detected_licenses": [ "MIT" ], "directory_id": "96188cce2798117fd4ed0a68f0059fc273065739", "extension": "py", "fi...
2.40625
stackv2
# The MIT License (MIT) # Copyright (c) 2016 IBM Corporation # Permission is hereby granted, free of charge, to any person obtaining a copy # of this software and associated documentation files (the "Software"), to deal # in the Software without restriction, including without limitation the rights # to use, copy, mod...
143
37.1
79
16
1,218
python
[{"finding_id": "codeql_py/request-without-cert-validation_50cd86add18aeb9d_79c8fda9", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1) by [this value](2)." ]
[ 82 ]
[ 83 ]
[ 24 ]
[ 73 ]
2024-11-19T01:37:40.939268+00:00
1,357,337,058,000
c81b6eeff2df505f4f18ed8c399abb21517f6356
3
{ "blob_id": "c81b6eeff2df505f4f18ed8c399abb21517f6356", "branch_name": "refs/heads/master", "committer_date": 1357337058000, "content_id": "f9b9ac02b0e0d053ecaab934e10df46fd30466c4", "detected_licenses": [ "MIT" ], "directory_id": "5fd40a422e9e6f72dc6dd2169fa0d35fa637f5c4", "extension": "py", "fi...
2.734375
stackv2
# -*- coding: utf-8 -*- """ Dabo: A Framework for developing data-driven business applications Dabo is for developing multi-platform database business applications - you know, applications that need to connect to a database server (MySQL, Oracle, MS-SQL, whatever), get recordsets of data based on criteria set by the ...
373
31.97
84
14
3,029
python
[{"finding_id": "codeql_py/overly-permissive-file_74ec1abdeed0e0a2_a0c89d7e", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable." ]
[ 370 ]
[ null ]
[ 2 ]
[ 27 ]
2024-11-19T01:38:00.645764+00:00
1,464,162,546,000
73103582e548b643c2f3034dfe56d9b6aff8a831
2
{ "blob_id": "73103582e548b643c2f3034dfe56d9b6aff8a831", "branch_name": "refs/heads/master", "committer_date": 1464162546000, "content_id": "ba17b57510019607b8428742918ade8ba86f8b13", "detected_licenses": [ "MIT" ], "directory_id": "5f6a40b7c2591d180ae0739f8ea358d409c28db6", "extension": "py", "fi...
2.5
stackv2
""" Support keycaptcha (www.keycaptcha.com) in Django (C) 2014 by Vitaly Bogomolov mail@vitaly-bogomolov.ru Based at code: https://www.keycaptcha.ru/python-captcha-api/ Usage: >>> from django import forms >>> import keycaptcha >>> >>> class MyForm(forms.Form): >>> keycaptcha = keycaptcha.Field() >>> >>> ... >>> >...
119
24.69
75
14
839
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_25570dc20385b54f_bb61a31b", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.",...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.", "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 65, 66 ]
[ null, null ]
[ 14, 14 ]
[ 60, 48 ]
2024-11-19T01:38:13.018533+00:00
1,621,951,787,000
762c1ca7bd9d4a537d7984e5da137be97b2685c8
2
{ "blob_id": "762c1ca7bd9d4a537d7984e5da137be97b2685c8", "branch_name": "refs/heads/main", "committer_date": 1621951787000, "content_id": "6f78dd80b94b207b5cd7d49577a50ea7e1bc8716", "detected_licenses": [ "MIT" ], "directory_id": "8255dcf7689c20283b5e75a452139e553b34ddf3", "extension": "py", "file...
2.484375
stackv2
import base64 import hashlib from datetime import datetime from flask_login import UserMixin from app import db, login @login.user_loader def load_user(user_id: int): return db.session.query(Users).get(user_id) class Users(UserMixin, db.Model): __tablename__ = 'core_accounts' id = db.Column(db.Intege...
61
31.08
97
19
458
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_7b829fc3d1bb9283_0017bf93", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 61 ]
[ null ]
[ 48 ]
[ 70 ]
2024-11-19T01:38:13.658205+00:00
1,375,709,412,000
e7d723fe867184c20f9362ce394760a1552971ef
3
{ "blob_id": "e7d723fe867184c20f9362ce394760a1552971ef", "branch_name": "refs/heads/master", "committer_date": 1375709412000, "content_id": "3be6a2ac306179091016638eccd20b6ea925404e", "detected_licenses": [ "Apache-2.0" ], "directory_id": "0313ab6db0d6bdcbe1334221a87c6b522cec1bce", "extension": "py"...
2.796875
stackv2
import json import requests from collections import defaultdict from flask import Blueprint from numpy import mean artists = Blueprint('artists', __name__) @artists.route('/<artist_id>/albums') def get_album_uris(artist_id): try: artist_url = 'http://ws.spotify.com/lookup/1/.json' + \ '?uri=s...
83
31.54
78
22
658
python
[{"finding_id": "codeql_py/reflective-xss_418f3d85dea4b5bf_8917981d", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
5
true
[ "CWE-079", "CWE-079", "CWE-918", "CWE-918", "CWE-918" ]
[ "py/reflective-xss", "py/reflective-xss", "py/partial-ssrf", "py/partial-ssrf", "py/partial-ssrf" ]
[ "HIGH", "HIGH", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1).", "Part of the U...
[ 28, 78, 16, 38, 51 ]
[ null, 81, null, null, null ]
[ 12, 12, 19, 21, 24 ]
[ 30, 7, 43, 45, 47 ]
2024-11-19T01:38:48.634677+00:00
1,631,906,744,000
440e6a17ea39a2f0612aaa517bce106ac4f354ae
3
{ "blob_id": "440e6a17ea39a2f0612aaa517bce106ac4f354ae", "branch_name": "refs/heads/master", "committer_date": 1631906744000, "content_id": "9cff6d080695328450d121fe5067c974cb682768", "detected_licenses": [ "MIT" ], "directory_id": "6133dd87757f3cd7e3958af1b38316b3c9cdc97c", "extension": "py", "fi...
2.9375
stackv2
from flask import Flask, request, render_template app = Flask(__name__) @app.route('/') @app.route('/home') def home(): # return 'Hello, World!' #return render_template('home.html') # return render_template('home.html') return render_template('form.html') @app.route('/submit', methods=['POST']) def ...
37
25.65
65
9
231
python
[{"finding_id": "codeql_py/flask-debug_5467a7daa8e7b3b4_283ff2ba", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 37, 19 ]
[ null, null ]
[ 5, 12 ]
[ 24, 33 ]
2024-11-19T01:39:02.928347+00:00
1,520,016,108,000
f9d60273776f6b8e7484a72faec3c0583d026014
3
{ "blob_id": "f9d60273776f6b8e7484a72faec3c0583d026014", "branch_name": "refs/heads/master", "committer_date": 1520016108000, "content_id": "59ed673b202d2b7300601c699ab4a3a499aaae5e", "detected_licenses": [ "Apache-2.0" ], "directory_id": "93e9e41ced2996c905397ffed76b909494abfbdb", "extension": "py"...
2.75
stackv2
import http.server import socketserver import http.client import socket class Proxy(): def __init__(self, host, port): self.httpd = socketserver.TCPServer((host, port), ProxyHandler) self.httpd.socket.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1) def start_server(self): try: ...
82
23.96
79
14
498
python
[{"finding_id": "codeql_py/full-ssrf_6f1f4dd2b234a716_1dd8c6ce", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).\nThe full URL of this request depends on a [user-...
1
true
[ "CWE-918" ]
[ "py/full-ssrf" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1).\nThe full URL of this request depends on a [user-provided value](1)." ]
[ 73 ]
[ null ]
[ 9 ]
[ 41 ]
2024-11-19T01:52:01.306807+00:00
1,595,247,578,000
9552664fa181d5da385974520da3ad945f3eda2c
4
{ "blob_id": "9552664fa181d5da385974520da3ad945f3eda2c", "branch_name": "refs/heads/master", "committer_date": 1595247578000, "content_id": "f25b283333533f404bcaf6c965551e6dd1eb2106", "detected_licenses": [ "MIT" ], "directory_id": "1ce49900e12ff4fac43a2ad9442ce06e896e37e3", "extension": "py", "fi...
3.65625
stackv2
from images import IMAGES import random,string def play_again(): play_again = input("Do you wnat to play again(y/n): ").lower() if play_again == "y": return hangman(words) else: return "Thanks for playing" def hangman(list_of_words): random_word = random.choice(list_of_words) secret_word = random_word avail...
76
26.11
118
22
505
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_52b4d264c10fb0db_70f79d6e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 58 ]
[ null ]
[ 13 ]
[ 48 ]
2024-11-19T01:52:25.319812+00:00
1,437,615,198,000
31ea0a1303e521b5cb7cdf5d1999540042fa121a
3
{ "blob_id": "31ea0a1303e521b5cb7cdf5d1999540042fa121a", "branch_name": "refs/heads/master", "committer_date": 1437615198000, "content_id": "3266f6cecaebbe64bbc4142b007fa2ff1e2bd0fb", "detected_licenses": [ "MIT" ], "directory_id": "4cd98985b36c7c5e0b1174c871228f9d77edc06f", "extension": "py", "fi...
3.453125
stackv2
from Crypto.Cipher import AES from cryptopals.util.pkcs_7 import pkcs7_pad, pkcs7_strip # This challenge requires the use of the PyCrypto module # https://github.com/dlitz/pycrypto def fixed_xor(str1, str2): """Return the result of str1 ^ str2.""" return ''.join([chr(ord(a) ^ ord(b)) for a, b in zip(str1, str...
72
26.99
77
15
493
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_ca799769364bd43b_439347c8", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 34, 57 ]
[ null, null ]
[ 24, 32 ]
[ 78, 60 ]
2024-11-19T01:52:25.655845+00:00
1,549,034,435,000
adeace0985f0c2690110ad6d5b3ce950ca6d8706
3
{ "blob_id": "adeace0985f0c2690110ad6d5b3ce950ca6d8706", "branch_name": "refs/heads/master", "committer_date": 1549034435000, "content_id": "3ba92063f7f97bad4ca7900019a750e49843e7d2", "detected_licenses": [ "MIT" ], "directory_id": "e62e7ba552486e66685b2a84f983eadc7aa0d37c", "extension": "py", "fi...
2.546875
stackv2
from jinja2 import Template from glob import glob from distutils.dir_util import copy_tree import janus import os import re def parse(): p = janus.ArgParser() p.new_str('n name') p.new_str('v version', fallback='0.0.1') p.new_str('a author', fallback='Surf') p.new_str('l licence', fallback='MIT')...
138
34.11
79
14
1,145
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_0c2be07edf83fb36_0ce079ce", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 90 ]
[ null ]
[ 20 ]
[ 38 ]
2024-11-19T02:04:24.282562+00:00
1,585,205,739,000
da62af6ef5c0955649eddcf77ef1e78f60ba1359
2
{ "blob_id": "da62af6ef5c0955649eddcf77ef1e78f60ba1359", "branch_name": "refs/heads/master", "committer_date": 1585205739000, "content_id": "90d07224f2e82f5eb83774962ca4956b3331f2dc", "detected_licenses": [ "MIT" ], "directory_id": "5cbc768a61227d75e3e52470abb505e84b192194", "extension": "py", "fi...
2.453125
stackv2
''' Simple Websocket Broker Copyright (c) 2014-2016 Michal Kvasnica, michal.kvasnica@gmail.com ''' import tornado.httpserver import tornado.websocket import tornado.ioloop import logging import argparse from datetime import datetime import urllib # parse command-line inputs parser = argparse.ArgumentParser(descripti...
251
33.82
123
14
1,997
python
[{"finding_id": "codeql_py/log-injection_238177f84e552030_f41e83d8", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
6
true
[ "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depen...
[ 62, 73, 73, 94, 129, 129 ]
[ null, null, null, null, null, null ]
[ 38, 57, 66, 58, 60, 69 ]
[ 45, 64, 82, 60, 67, 82 ]
2024-11-19T02:04:41.947105+00:00
1,675,068,283,000
a067c6ff6e24d7bfd9384c6427df065a1967638f
4
{ "blob_id": "a067c6ff6e24d7bfd9384c6427df065a1967638f", "branch_name": "refs/heads/master", "committer_date": 1675068283000, "content_id": "badf7bd2ed6ca638c687148ac4829d5cd1e9f67a", "detected_licenses": [ "MIT" ], "directory_id": "d81a88d73cc3524f944883e7242e164f787be387", "extension": "py", "fi...
4.03125
stackv2
class emp: count=0 def get_name_age_salary(self,name,age,salary): self.name=name self.age=age self.salary=salary self.increase_count_for_emp() #self.display_details() return None def increase_count_for_emp(self): emp.count=emp.count+1 return None def display_details(self): print(f'The name is: {s...
28
20.18
90
12
182
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b75f3803428c1a92_d7e52dad", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 14 ]
[ null ]
[ 9 ]
[ 90 ]
2024-11-19T02:04:44.886110+00:00
1,632,649,907,000
896596c2ae2f4d18122f9353d07fbb76bfb9cc9b
2
{ "blob_id": "896596c2ae2f4d18122f9353d07fbb76bfb9cc9b", "branch_name": "refs/heads/main", "committer_date": 1632649907000, "content_id": "56f656b7a9021b680272f29a6b6e7e5d39af9cec", "detected_licenses": [ "Apache-2.0" ], "directory_id": "d92b08a98b18219add26799977ab6a1ee6890e2c", "extension": "py", ...
2.328125
stackv2
from flask import Flask, redirect, url_for, request, render_template app = Flask(__name__) # http://localhost:5000/platform/0.1/vyshnav/69/ @app.route(rule="/<float:platform_version>/<user_name>/<int:user_id>/") def user_login(platform_version, user_name, user_id): return f"Welcome to platform({platform_version}...
50
36.58
126
15
432
python
[{"finding_id": "codeql_py/flask-debug_b32d0be52b8ce3d4_4ac45349", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-079", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability due to a [user-provided value](2).\nCross-site scripting vulnerability due to a [user-pr...
[ 50, 9, 15 ]
[ null, null, null ]
[ 5, 12, 12 ]
[ 53, 78, 61 ]
2024-11-19T02:04:45.179661+00:00
1,605,674,594,000
3101649165c36fd8f1d95d2e43f9539e979b35e7
3
{ "blob_id": "3101649165c36fd8f1d95d2e43f9539e979b35e7", "branch_name": "refs/heads/master", "committer_date": 1605674594000, "content_id": "f8430fce17967308fc7ece25a9c413ca7d64ee77", "detected_licenses": [ "MIT" ], "directory_id": "71f2d0d97146650975f066191b1851a13a3de43c", "extension": "py", "fi...
2.96875
stackv2
def dictionary5(): # using dict() method and updating , adding phone_no = dict({ 'sam': 1234567890, 'ram': 9876543212, }) print(phone_no) # adding key value pairs phone_no['rahim'] = 4455664423 print(phone_no) # updating rahim's number phone_no['rahim'] = 1234497976 ...
16
21.19
47
11
128
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bbc165ebab41d35d_01d0c471", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 7, 10, 13 ]
[ null, null, null ]
[ 11, 11, 11 ]
[ 19, 19, 19 ]
2024-11-19T02:04:59.253964+00:00
1,625,506,005,000
69626f5870677f8c23247d5c60f9f59d80c0572e
5
{ "blob_id": "69626f5870677f8c23247d5c60f9f59d80c0572e", "branch_name": "refs/heads/master", "committer_date": 1625506005000, "content_id": "1f1684b02203c7a12d15c48e60e2ae45d8203c92", "detected_licenses": [ "MIT" ], "directory_id": "85fccd0dca2a4ad5e542f140dc4f496e4628e78f", "extension": "py", "fi...
4.6875
stackv2
''' Exercise 33: Birthday Dictionaries This exercise is Part 1 of 4 of the birthday data exercise series. The other exercises are: Part 2, Part 3, and Part 4. For this exercise, we will keep track of when our friend’s birthdays are, and be able to find that information based on their name. Create a dictionary (in you...
94
23.48
68
13
596
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7575be8125dac3a6_2d6fbe66", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 40, 70 ]
[ null, null ]
[ 15, 15 ]
[ 18, 68 ]
2024-11-19T02:05:01.118263+00:00
1,528,294,115,000
c5e5545a30929ea61fedcaf8bb769980fdd71b4b
3
{ "blob_id": "c5e5545a30929ea61fedcaf8bb769980fdd71b4b", "branch_name": "refs/heads/master", "committer_date": 1528294115000, "content_id": "d9c6c2eb9c2c3554db9dc6abdb5b47147924b815", "detected_licenses": [ "MIT" ], "directory_id": "c40e28a96454178ff7904f6f0a3d68d5e79ff6ef", "extension": "py", "fi...
2.859375
stackv2
from jinja2 import Environment, FileSystemLoader #custom filters def int_comma(value): """ Converts an integer to a string containing commas every three digits """ val_str = str(value) split = val_str.split(".") val_int = split[0] try: val_point = "." + split[1] except IndexError: val_point = "" val_...
50
21.08
109
15
277
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_fd0a158d275803a3_39eeca81", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 47 ]
[ null ]
[ 11 ]
[ 110 ]
2024-11-19T02:28:14.242036+00:00
1,621,693,511,000
0be7492d19c18661ff19071171e23d3222105c82
4
{ "blob_id": "0be7492d19c18661ff19071171e23d3222105c82", "branch_name": "refs/heads/main", "committer_date": 1621693511000, "content_id": "86d40ca56fb420b36b71a6b17795db3dcf198c4c", "detected_licenses": [ "MIT" ], "directory_id": "db7a308bfecf1659c0a156bb44461aa426b82cca", "extension": "py", "file...
3.796875
stackv2
# A password generator - OOP approach # MolarFox 2021 import sys import random # Defines ascii character ranges as nested tuples CHAR_RANGES = ( (65, 90), # uppercase alphas (97, 122), # lowercase alphas (48, 57), # numbers (58, 64) # symbols only some, for simplicity ) class PassGen: """...
144
31.96
105
18
961
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e6f14c1dca10b15b_65d2b1d4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 143 ]
[ null ]
[ 12 ]
[ 13 ]
2024-11-19T02:28:18.249227+00:00
1,583,770,998,000
9bf813e1476fe25ba61c4f03cd8fca31a5d4247c
2
{ "blob_id": "9bf813e1476fe25ba61c4f03cd8fca31a5d4247c", "branch_name": "refs/heads/master", "committer_date": 1583770998000, "content_id": "0c4203d7e81cfa63a9bb01ab712763ed42cf02da", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "fc76ed2b735bb84a9e7dee68f12fa92df1a05fe2", "extension": "p...
2.390625
stackv2
import logging import threading from pkg_resources import get_distribution from prometheus_client import CollectorRegistry, generate_latest, MetricsHandler, CONTENT_TYPE_LATEST from prometheus_client.exposition import _ThreadingSimpleServer from prometheus_client.metrics_core import Metric from prometheus_client.util...
158
36.57
101
25
1,288
python
[{"finding_id": "codeql_py/log-injection_506ba7adb3aa3ddc_42457029", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 89 ]
[ null ]
[ 19 ]
[ 40 ]
2024-11-19T02:28:22.896770+00:00
1,432,592,196,000
251b06ed990823e4c39887bb746e669c473e4fba
3
{ "blob_id": "251b06ed990823e4c39887bb746e669c473e4fba", "branch_name": "refs/heads/master", "committer_date": 1432592196000, "content_id": "d015f6b74bf2152ed27a394096f5a9d1037a3034", "detected_licenses": [ "Apache-2.0" ], "directory_id": "217678bcedcf3096025849feb115d768e38c10dd", "extension": "py"...
2.578125
stackv2
#!/usr/bin/env python """ Static Macro File Generator (cmd line generator using jinja2) Ever want to just apply a model to a bunch of files? Now you can! ### Usage: ```sh # command line usage jinjer2 ``` ```python # python usage >>> import jinger2 >>> jinjer2.generate() ``` """ __version__='0.1.4' __auth...
168
30.76
76
17
1,306
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_c93dc4b7fabb5719_48d7f209", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 64 ]
[ 67 ]
[ 23 ]
[ 33 ]
2024-11-19T02:28:26.073281+00:00
1,416,499,108,000
030b97cce47d74e65f80d3431f9b1e4a07acad34
2
{ "blob_id": "030b97cce47d74e65f80d3431f9b1e4a07acad34", "branch_name": "refs/heads/master", "committer_date": 1416499108000, "content_id": "8cead97a08eb09f657c2d0109ac06290e03d8b75", "detected_licenses": [ "MIT" ], "directory_id": "8561af3e9ae4578a312fe8de25bd79dca77688c8", "extension": "py", "fi...
2.3125
stackv2
# -*- coding: UTF-8 -*- import hashlib import socket import logging import time import suds logger = logging.getLogger(__name__) logger.setLevel(logging.ERROR) hdl = logging.StreamHandler() hdl.setFormatter(logging.Formatter('%(asctime)s - %(name)s - %(levelname)s - %(message)s', '%Y-%m-%d %H:%M')) logger.addHandle...
90
33.19
123
18
681
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_416f35397e1b75dc_842ca147", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 45 ]
[ null ]
[ 43 ]
[ 51 ]
2024-11-19T02:28:43.845050+00:00
1,466,688,557,000
eb3bbe047b9615f68e68ec2ee6b51d2e9024a8b0
2
{ "blob_id": "eb3bbe047b9615f68e68ec2ee6b51d2e9024a8b0", "branch_name": "refs/heads/master", "committer_date": 1466688557000, "content_id": "4b796367cb19e35746bf7b8664fe62d9edf74ace", "detected_licenses": [ "Apache-2.0" ], "directory_id": "36ebbaeb91d9c7d83eb6b1e7e16667c947c27eee", "extension": "py"...
2.359375
stackv2
import paramiko forti_username = 'admin' forti_password = '' fortinet_host_ip = '185.98.148.48' port_id = 2 port_alias = 'portInB' def exec_command(command, fortinet_host_ip): ssh = paramiko.SSHClient() ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy()) ssh.connect(fortinet_host_ip, username=fort...
59
24.25
82
11
407
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_fa436ba3ae80e135_75414323", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 13 ]
[ null ]
[ 5 ]
[ 62 ]
2024-11-19T02:28:47.303558+00:00
1,620,066,086,000
7063661d16dd41b5a20164a5b44a5aec51acd6f3
2
{ "blob_id": "7063661d16dd41b5a20164a5b44a5aec51acd6f3", "branch_name": "refs/heads/master", "committer_date": 1620066086000, "content_id": "1d674bd926513cacf0a5d418a0e0074502102c1f", "detected_licenses": [ "MIT" ], "directory_id": "2d4127f5fa1bca8ba41b9da48d9180c64680b327", "extension": "py", "fi...
2.34375
stackv2
try: import secrets except ImportError: import openid_connect_op.utils.secrets_backport as secrets import jwcrypto.jwk as jwk from django.core.management import BaseCommand from openid_connect_op.models import OpenIDClient class Command(BaseCommand): def add_arguments(self, parser): parser.add_a...
67
40.97
105
16
507
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0d4e4e46ae1cb184_31454727", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 55 ]
[ 59 ]
[ 15 ]
[ 33 ]
2024-11-19T02:28:51.400728+00:00
1,385,040,957,000
9efc22c53e436f0f141213a108e160c8c0a5d5dc
2
{ "blob_id": "9efc22c53e436f0f141213a108e160c8c0a5d5dc", "branch_name": "refs/heads/master", "committer_date": 1385040957000, "content_id": "a25c9b5f9e6fbfbb40dbf00b7bd9962c8182de4f", "detected_licenses": [ "MIT" ], "directory_id": "6fbbdf40399d842d95e29264144f2cd5e042fb2e", "extension": "py", "fi...
2.484375
stackv2
"Smarkets TCP-based session management" # Copyright (C) 2011 Smarkets Limited <support@smarkets.com> # # This module is released under the MIT License: # http://www.opensource.org/licenses/mit-license.php import logging import Queue import socket import types import ssl from google.protobuf import text_format from sm...
392
37.55
85
21
3,163
python
[{"finding_id": "codeql_py/insecure-default-protocol_46d8cca647d91dda_3486fc14", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in...
1
true
[ "CWE-327" ]
[ "py/insecure-default-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used." ]
[ 242 ]
[ null ]
[ 24 ]
[ 73 ]
2024-11-19T02:28:52.279416+00:00
1,616,571,096,000
9ddc92d529d722c8aa4db31e3dcd2389e7062bdf
2
{ "blob_id": "9ddc92d529d722c8aa4db31e3dcd2389e7062bdf", "branch_name": "refs/heads/main", "committer_date": 1616571096000, "content_id": "63541fc3e308efbab5b372f14d933cf02581aced", "detected_licenses": [ "Apache-2.0" ], "directory_id": "aaa00363107f8aee176d75eb0754d952452172c1", "extension": "py", ...
2.40625
stackv2
import time import ffmpeg import subprocess import os import pathlib import sys # rtsp://admin:abcd1234@192.168.31.167:554/h264/ch2/sub/av_stream class Properties: rtspURL="rtsp://" username="" password="" ipAddress="" port="554" channel="/h264/ch1/sub/av_stream" filePath="" def __in...
66
26.12
116
17
535
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_77455429d8f5bf65_5f891751", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 45 ]
[ null ]
[ 11 ]
[ 18 ]
2024-11-19T02:36:44.625736+00:00
1,608,126,278,000
7882ef6030d4f5047fdc13cd8ccc64b863345506
4
{ "blob_id": "7882ef6030d4f5047fdc13cd8ccc64b863345506", "branch_name": "refs/heads/main", "committer_date": 1608126278000, "content_id": "798bcebbe64bb959f54d65242ed92bb66fedeb25", "detected_licenses": [ "MIT" ], "directory_id": "4383cf1ac6fc8bfecf1eab9a4bd38ac4c7c5747f", "extension": "py", "file...
3.59375
stackv2
#!/usr/bin/env python3 """ AOC day 2 """ import re tot = 0 m = re.compile(r'(?P<low>\d+)\-(?P<high>\d+)\s(?P<char>[a-z]):\s(?P<password>[a-z]+).*') raw = [] with open('input.txt') as fd: for line in fd: res = m.match(line[:-1]) if res: low = int(res.group('low')) high = int(...
25
31.12
88
16
218
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_69ed8651031ee490_a5280e48", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 18, 21 ]
[ null, null ]
[ 23, 23 ]
[ 74, 73 ]
2024-11-19T02:37:16.802218+00:00
1,613,825,636,000
c182babc7977b932674ae061a52a9d6e8f376f39
3
{ "blob_id": "c182babc7977b932674ae061a52a9d6e8f376f39", "branch_name": "refs/heads/main", "committer_date": 1613825636000, "content_id": "253f95fb1a745f5325c1bdc438c0b5098d9eb4f2", "detected_licenses": [ "MIT" ], "directory_id": "58c96e78d69407c346f8ce03f753df78d9652f7c", "extension": "py", "file...
2.734375
stackv2
import string import requests from bs4 import BeautifulSoup usersAmount = 4 passwdLengths = {k: 0 for k in range(1, usersAmount + 1)} passwds = {k: "" for k in range(1, usersAmount + 1)} def isTrue(responseBody): soup = BeautifulSoup(responseBody, "html.parser") return soup.select_one(".w3-row-padding.w3-gray...
36
31.81
131
16
342
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2c6f629e725de904_39557a5e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 36 ]
[ null ]
[ 7 ]
[ 14 ]
2024-11-19T02:37:23.823344+00:00
1,511,809,013,000
1308924a6e6570ea386dd92df87d61228bec02bc
2
{ "blob_id": "1308924a6e6570ea386dd92df87d61228bec02bc", "branch_name": "refs/heads/master", "committer_date": 1511809013000, "content_id": "d59bb005d3db135f757b0492b9c55de6852f5418", "detected_licenses": [ "MIT" ], "directory_id": "d22221edad712d95202db4825de365d80ce81538", "extension": "py", "fi...
2.375
stackv2
from flask import Blueprint, request, json, jsonify from flask_cors import CORS from docs import conf, sparql_templates as sparqlt from app.mod_auth.models import User from SPARQLWrapper import SPARQLWrapper, JSON import urllib2 import urllib import time import math from hashlib import sha1 from bs4 import BeautifulSou...
61
41.23
88
15
561
python
[{"finding_id": "codeql_py/partial-ssrf_86f33b9ac0bd566f_128ad7e8", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 32 ]
[ null ]
[ 11 ]
[ 71 ]
2024-11-19T02:37:43.272276+00:00
1,506,495,788,000
0f57d71d7a6bcdec6b451faad38a9015de824430
3
{ "blob_id": "0f57d71d7a6bcdec6b451faad38a9015de824430", "branch_name": "refs/heads/master", "committer_date": 1506495788000, "content_id": "2513913e8fbc4037495cc4d79793cd5f9f230a67", "detected_licenses": [ "MIT" ], "directory_id": "1fb9a1e0ebb25ed85129180bffccaa3ad077b828", "extension": "py", "fi...
2.515625
stackv2
# -*- coding: utf-8 -*- """ PyConES 2016 Almería """ import os import re import shlex import logging from subprocess import Popen, PIPE import settings from custom_exceptions import ParamError IDLOG = 'rspace' def avaliable_space(fs, host=None): """free space checker""" if host is None: size = os....
58
22.62
78
16
362
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_0de44dff649ee0dd_cd2dd42e", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 32 ]
[ null ]
[ 9 ]
[ 66 ]
2024-11-19T02:37:43.991623+00:00
1,504,170,380,000
d19cc26347419a6f4b0538d77d48d1095a861086
5
{ "blob_id": "d19cc26347419a6f4b0538d77d48d1095a861086", "branch_name": "refs/heads/master", "committer_date": 1504170380000, "content_id": "dfd5b75cbff49bf7d73de100e70cba6da71cf388", "detected_licenses": [ "MIT" ], "directory_id": "46c7e639e59f06e2ea85c242b58dcb5dd9151851", "extension": "py", "fi...
4.65625
stackv2
''' 面向对象技术简介 类(Class):用来描述具有相同的属性和方法的对象的集合。它定义了该集合中每个对象所共有的属性和方法。对象是类的实例。 类变量:类变量在整个实例化的对象中是公用的。类变量定义在类中且在函数体之外。类变量通常不作为实例变量使用。 数据成员:类变量或者实例变量用于处理类及其实例对象的相关的数据。 方法重写:如果从父类继承的方法不能满足子类的需求,可以对其进行改写,这个过程叫方法的覆盖(override),也称为方法的重写。 实例变量:定义在方法中的变量,只作用于当前实例的类。 继承:即一个派生类(derived class)继承基类(base class)的字段和方法。继承也允许把一个派生类的对象作为一个基类...
226
20.81
139
12
2,005
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_72af1295847a5535_064f906f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text." ]
[ 169 ]
[ null ]
[ 16 ]
[ 34 ]
2024-11-19T02:37:52.359134+00:00
1,606,015,778,000
da661fc6760e6f9dd423daf9ad0727a3f4e4fbf2
3
{ "blob_id": "da661fc6760e6f9dd423daf9ad0727a3f4e4fbf2", "branch_name": "refs/heads/master", "committer_date": 1606015778000, "content_id": "68ed4b39d2aba42f1810f382cb4cd93dc590b455", "detected_licenses": [ "MIT" ], "directory_id": "cfe7d4e5ed7e96b7bad1ae41907c9531bad22584", "extension": "py", "fi...
2.640625
stackv2
""" GitHub Repo> https://github.com/ezeeyahoo/ChromiumSyncEnabler Summary: Secured way to enable sync for official/non-official and stable/non-stable version of Chromium on Mac while keeping APIs safe, wihtout globally exposing keys. How to run:- ------------ Check repo for clear instructions. """ from __future__ im...
206
25.12
79
15
1,303
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_111b58d87f816fff_e042f2f7", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 167 ]
[ null ]
[ 32 ]
[ 36 ]
2024-11-19T02:49:12.062568+00:00
1,435,018,846,000
6cd68a7ff108e331ab6c2444fa2eaf468bd95a24
2
{ "blob_id": "6cd68a7ff108e331ab6c2444fa2eaf468bd95a24", "branch_name": "refs/heads/master", "committer_date": 1435018846000, "content_id": "9dfa186d7940da94ab2259471b857ec4967ed9f6", "detected_licenses": [ "BSD-2-Clause", "Apache-2.0" ], "directory_id": "bcf2e87da43ed0c82bd601d8fd42894ee6d62baa",...
2.4375
stackv2
# ============================================================================= # Copyright (c) 2015, Cisco Systems, Inc # All rights reserved. # # Redistribution and use in source and binary forms, with or without # modification, are permitted provided that the following conditions are met: # # Redistributions of sour...
232
30.74
121
15
1,711
python
[{"finding_id": "codeql_py/tarslip_5835af7e2afab994_fd20368d", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 112 ]
[ null ]
[ 5 ]
[ 8 ]
2024-11-19T02:49:13.033473+00:00
1,578,058,942,000
d84eaf17b45349d5a1ea238b53895c855f72efef
3
{ "blob_id": "d84eaf17b45349d5a1ea238b53895c855f72efef", "branch_name": "refs/heads/master", "committer_date": 1578058942000, "content_id": "a81b80ed267c657b3e52c50b90529a539620987b", "detected_licenses": [ "MIT" ], "directory_id": "95a8941dde0ea09beaeed2440918218a3fd44f02", "extension": "py", "fi...
2.8125
stackv2
from app import app, sms, db from flask import render_template, request, flash, redirect, url_for from app.models import Outgoing @app.route("/", methods=["GET", "POST"]) def main(): senderID = '23233222' if request.method == "POST": sms_message = request.form['smsMessage'] phone_number = requ...
59
33.14
159
16
436
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_379acac1c7ea9efb_ae9c52d0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 17 ]
[ null ]
[ 15 ]
[ 18 ]
2024-11-19T02:49:24.024451+00:00
1,581,361,890,000
2c2b3806bf0de231f253f5c9b15d0fdc9e792e50
2
{ "blob_id": "2c2b3806bf0de231f253f5c9b15d0fdc9e792e50", "branch_name": "refs/heads/master", "committer_date": 1581361890000, "content_id": "fa4086fac3493cc9fb76511582b9d2bd65f693b9", "detected_licenses": [ "MIT" ], "directory_id": "97edd38198aff0d6aee0fb2471dce814f8709118", "extension": "py", "fi...
2.4375
stackv2
"""Blueprint for FHIR endpoints.""" from collections import defaultdict from functools import wraps import logging from flask import Blueprint, jsonify, request from clarkproc.engine import ingest import clarkproc.state as s from clarkproc.fhir.models import CodeValue bp_fhir = Blueprint('fhir', __name__) TEST_DATA...
491
25.75
97
19
2,708
python
[{"finding_id": "codeql_py/reflective-xss_04e6465edbb7c786_becf097b", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
6
true
[ "CWE-079", "CWE-079", "CWE-079", "CWE-079", "CWE-079", "CWE-079" ]
[ "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scriptin...
[ 224, 299, 327, 337, 396, 405 ]
[ 226, 301, 330, 339, 398, 407 ]
[ 13, 13, 13, 13, 13, 13 ]
[ 43, 43, 43, 43, 43, 43 ]
2024-11-19T03:00:25.780164+00:00
1,576,843,463,000
283a74ab60c2844395d47ad77d42606808d9a346
2
{ "blob_id": "283a74ab60c2844395d47ad77d42606808d9a346", "branch_name": "refs/heads/master", "committer_date": 1576843463000, "content_id": "2b50aad66b5db86bf7ac0330b8e4aacb3bdcada0", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "8e8c5719c80636c390f5bb26b3e5a33ea97ca4e5", "extension": "p...
2.453125
stackv2
#!/usr/bin/env python3 # (c) Copyright IBM Corporation 2016 # LICENSE: BSD-3, https://opensource.org/licenses/BSD-3-Clause # Use the dashDB analytics REST API to check that the dashDB Spark support # is configured and accessible import warnings import sys, os import json, requests from requests.auth import HTTPBasicA...
60
43.27
106
14
641
python
[{"finding_id": "codeql_py/request-without-cert-validation_d7fa02a47afcba24_00411b31", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 17 ]
[ 18 ]
[ 12 ]
[ 52 ]
2024-11-19T03:11:48.875389+00:00
1,599,366,696,000
9553e4e2a2472fb9bfdd04b763f8105569422899
3
{ "blob_id": "9553e4e2a2472fb9bfdd04b763f8105569422899", "branch_name": "refs/heads/master", "committer_date": 1599366696000, "content_id": "e3d05b4f4fad55986e0aceb805dc7df066504e44", "detected_licenses": [ "MIT" ], "directory_id": "83f9d223f6a1fb9bd494395d4ac33a22cae2c8af", "extension": "py", "fi...
2.546875
stackv2
import abc import requests import execjs import os class BasicMangaDownload: __metaclass__ = abc.ABCMeta def __init__(self): self.headers = { 'Accept': '*/*', 'Accept-Language': 'en-US,en;q=0.8', 'Cache-Control': 'max-age=0', 'User-Agent': '...
120
25.69
130
17
789
python
[{"finding_id": "codeql_py/request-without-cert-validation_9ab62d06a51db9db_3f015e81", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 111 ]
[ 115 ]
[ 17 ]
[ 44 ]
2024-11-19T03:12:01.653002+00:00
1,599,567,636,000
a2b4b03e23d157142caaa6a572f4505f567f9971
4
{ "blob_id": "a2b4b03e23d157142caaa6a572f4505f567f9971", "branch_name": "refs/heads/master", "committer_date": 1599567636000, "content_id": "92bd4604c4f3f87aa0dae7c0ac19b853497358c4", "detected_licenses": [ "Apache-2.0" ], "directory_id": "7012ab96d5bfeaa36560fa6b48f246b3f2897beb", "extension": "py"...
3.953125
stackv2
class Panda: def __init__(self,name,gender,age): self.name=name self.gender=gender self.age=age def sleep(self,hours=None): self.hours=hours if self.hours==None: return f"{self.name}'s duration is unknown thus should have only bamboo leaves" elif self....
32
37.12
98
13
326
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3aec3f76745a4545_7aed8ea7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (p...
[ 22, 24, 26 ]
[ null, null, null ]
[ 7, 7, 7 ]
[ 97, 97, 97 ]
2024-11-19T03:12:08.600328+00:00
1,504,214,383,000
e591b4916bb55110e3963bc7941d05f142d79252
2
{ "blob_id": "e591b4916bb55110e3963bc7941d05f142d79252", "branch_name": "refs/heads/master", "committer_date": 1504214383000, "content_id": "e07a2ba83e103fa8b2be3e50c6a399462ee76257", "detected_licenses": [ "MIT" ], "directory_id": "a3a7468755d98160d6ff43090623499a14125134", "extension": "py", "fi...
2.453125
stackv2
# -*- coding: utf-8 -*- import codecs import jinja2 import os import yaml def get_default_config_dir(): return os.path.join(get_home_dir(), ".dotfiles", "configs") def get_default_template_dir(): return os.path.join(get_home_dir(), ".dotfiles", "templates") def get_home_dir(): return os.path.expanduse...
73
22.29
65
12
370
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_86f131ebde278755_824033fa", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 52 ]
[ 60 ]
[ 11 ]
[ 26 ]
2024-11-19T03:12:21.912140+00:00
1,402,986,334,000
a04d6ec1ba3a17d56dace8eec3b3be107432074a
3
{ "blob_id": "a04d6ec1ba3a17d56dace8eec3b3be107432074a", "branch_name": "refs/heads/master", "committer_date": 1402986334000, "content_id": "e3aab7da4f1e5566c07f2b295dc29682a012ada7", "detected_licenses": [ "MIT" ], "directory_id": "b99b6c80938a70cf70a5457c1751438c7292f41d", "extension": "py", "fi...
2.75
stackv2
#!/usr/bin/env python from pwn import b64, read, unhex import json, sys class Encryption: def __init__(self, password): from Crypto.Hash import HMAC, SHA256 from Crypto.Protocol.KDF import PBKDF2 raw_key = PBKDF2(password, 'DANGERZONE', count=1000000) # ONLY HMAC-SHA1 key_parts = H...
93
31.89
84
15
770
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3d8b83a57de780e8_7cb79156", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 93 ]
[ null ]
[ 11 ]
[ 36 ]
2024-11-19T03:12:38.051132+00:00
1,622,610,979,000
99678e8715ed20850a9bb102c37c3eb4e37c0c2b
3
{ "blob_id": "99678e8715ed20850a9bb102c37c3eb4e37c0c2b", "branch_name": "refs/heads/main", "committer_date": 1622610979000, "content_id": "424e70c89dd47326760889c1f24e53dd67f8330c", "detected_licenses": [ "MIT" ], "directory_id": "276e1cf6c59a6dc93434f4bfafecdd181b2b51f6", "extension": "py", "file...
2.90625
stackv2
from flask import Flask, request, render_template import requests from bs4 import BeautifulSoup app = Flask(__name__) substring="https://en.wikipedia" @app.route('/') def input(): return render_template("form.html") def start(url): wordlist=[] source_code = requests.get(url).text soup = Beau...
59
27.12
90
14
397
python
[{"finding_id": "codeql_py/full-ssrf_9c0b6ef769411b39_5b8baf7f", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
1
true
[ "CWE-918" ]
[ "py/full-ssrf" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1)." ]
[ 14 ]
[ null ]
[ 19 ]
[ 36 ]
2024-11-19T03:12:47.973912+00:00
1,674,849,766,000
4864ddec017569cb86a5a95cb3b0f2f9bedff742
2
{ "blob_id": "4864ddec017569cb86a5a95cb3b0f2f9bedff742", "branch_name": "refs/heads/master", "committer_date": 1674849766000, "content_id": "f21f12e32e46240ecc491eecb578e9fd4469519b", "detected_licenses": [ "Apache-2.0" ], "directory_id": "c1175743befb0ecef55b863d04f46924b9380efa", "extension": "py"...
2.359375
stackv2
#------------------------------------------------------------------------------- # Name: AGOL Admin # Purpose: Admin AGOL # # Author: Kelly # # Created: 09/11/2014 # Copyright: (c) Kelly 2014 # Licence: <your licence> #---------------------------------------------------------------------------...
270
40.71
167
25
2,518
python
[{"finding_id": "codeql_py/request-without-cert-validation_b33c1271f524f5e9_478debed", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
16
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation"...
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 83, 89, 104, 118, 154, 163, 189, 203, 218, 180, 237, 243, 255, 257, 262, 266 ]
[ null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null ]
[ 16, 20, 24, 24, 20, 20, 28, 44, 24, 36, 20, 28, 20, 20, 20, 20 ]
[ 59, 51, 61, 61, 67, 57, 74, 97, 74, 88, 57, 75, 66, 66, 67, 67 ]
2024-11-19T03:12:53.494412+00:00
1,469,695,670,000
20880c604f02fb13fbd7c352b609ad8512b685a9
2
{ "blob_id": "20880c604f02fb13fbd7c352b609ad8512b685a9", "branch_name": "refs/heads/master", "committer_date": 1469695670000, "content_id": "3972a1fe0f18fac9136aaf12cab2803cb3be016d", "detected_licenses": [ "MIT" ], "directory_id": "49c77f0c74275be51888f2430e5edd5f3a1c5b45", "extension": "py", "fi...
2.484375
stackv2
#!/usr/bin/env python #-*- coding:utf8 -*- # @Author: lisnb # @Date: 2016-04-29T17:06:11+08:00 # @Email: lisnb.h@hotmail.com # @Last modified by: lisnb # @Last modified time: 2016-07-28T06:44:47+08:00 import time import MySQLdb import sys import logging import pymongo import urllib from MySQLdb.cursors import D...
221
30.34
111
19
1,647
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a723c4f1fdd84fbe_b15e6ad4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 56 ]
[ null ]
[ 35 ]
[ 111 ]
2024-11-19T03:25:31.258594+00:00
1,566,398,058,000
86d0c1b45daf6ebc84f1ae2b44ceddde803700e2
4
{ "blob_id": "86d0c1b45daf6ebc84f1ae2b44ceddde803700e2", "branch_name": "refs/heads/master", "committer_date": 1566398058000, "content_id": "70f8c2ae81dafa26a52c362279d4fbffd128427a", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e801d460b9b818656d2fd817a8e1634d40df2a6a", "extension": "py"...
3.84375
stackv2
# encoding:utf-8 import pprint """ 字典和结构体的学习代码,ticTacToe是五子棋游戏,不过,写着好麻烦 算了,还是不写了 """ def ticTacToe(): theBoard={'top-L':'','top-M':'','top-R':'', 'mid-L':'','mid-M':'','mid-R':'', 'low-L':'','low-M':'','low-R':''} def CommonTest(): myCat={"Name":"Tom","Size":"Fat","Color":"Orange"...
47
26.04
89
17
342
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e7d3e784088356c2_b4f40831", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 37 ]
[ null ]
[ 19 ]
[ 48 ]
2024-11-19T03:25:37.338385+00:00
1,586,715,487,000
beec7c52ab336142d68fe8534eb8a91838fd1d4d
3
{ "blob_id": "beec7c52ab336142d68fe8534eb8a91838fd1d4d", "branch_name": "refs/heads/master", "committer_date": 1586715487000, "content_id": "0223d3fa0131329d5556046b7ff7888c5751429f", "detected_licenses": [ "MIT" ], "directory_id": "d31b3d9c0464426d2812cfeca0dd3a5b02229d4a", "extension": "py", "fi...
3.28125
stackv2
#Importing necessary modules from Crypto.Cipher import PKCS1_OAEP from Crypto.PublicKey import RSA from binascii import hexlify #The message to be encrypted message = b'Public and Private keys encryption' #Generating private key (RsaKey object) of key length of 1024 bits private_key = RSA.generate(1024) #Generating the...
20
40.2
66
9
226
python
[{"finding_id": "codeql_py/weak-crypto-key_ca5a929d0985488f_dc529de4", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",...
1
true
[ "CWE-326" ]
[ "py/weak-crypto-key" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable." ]
[ 8 ]
[ null ]
[ 15 ]
[ 33 ]
2024-11-19T03:25:38.002824+00:00
1,361,389,258,000
8a086027468e22fde8d3c127e72549d14310235d
2
{ "blob_id": "8a086027468e22fde8d3c127e72549d14310235d", "branch_name": "refs/heads/master", "committer_date": 1361389258000, "content_id": "786dc14c9e83162ae61efe45ebab29003865753e", "detected_licenses": [ "Apache-2.0" ], "directory_id": "312aa0f62b07646e324db90ab73d76a3e34a0c64", "extension": "py"...
2.40625
stackv2
from django.conf.urls.defaults import patterns from django.contrib import messages from django.http import Http404, HttpResponse, HttpResponseRedirect from django.views.generic import View from django.views.generic.detail import SingleObjectMixin class DjangoObjectActions(object): """ mixin to add object-tool...
87
34.97
98
17
667
python
[{"finding_id": "codeql_py/url-redirection_59c0ff1fafd245f0_7189475c", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 79 ]
[ null ]
[ 37 ]
[ 41 ]
2024-11-19T01:30:08.878546+00:00
1,556,739,044,000
413f7b1dbc2966796bb0609157f41b353d0f2fe0
2
{ "blob_id": "413f7b1dbc2966796bb0609157f41b353d0f2fe0", "branch_name": "refs/heads/master", "committer_date": 1556739044000, "content_id": "38f450c38647f4bfafc87b7d9769cc3d78588152", "detected_licenses": [ "MIT" ], "directory_id": "4d5aabdce2f09d1ee072769fd32e775b3314d26d", "extension": "py", "fi...
2.4375
stackv2
from os.path import expanduser home = expanduser("~") alerThor_home = home + "/alerThor/" def main(): print("Setting up config file...") with open(alerThor_home + "config.ini", "w") as file: sg_api_key = input("Enter your SG API key: ") sender = input("Enter your default sender email (custom): ...
18
34.44
68
12
161
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_96686efe4b947dbe_5dadcd7d", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 12 ]
[ null ]
[ 25 ]
[ 55 ]
2024-11-19T01:30:12.206716+00:00
1,475,532,061,000
d6d864a0840ce1a1e0772adff3d0a461f345ed52
2
{ "blob_id": "d6d864a0840ce1a1e0772adff3d0a461f345ed52", "branch_name": "refs/heads/master", "committer_date": 1475532061000, "content_id": "8ae5000c92f9622eacd98ce748de93b95f58fc59", "detected_licenses": [ "MIT" ], "directory_id": "7c1199d5028b26a346019f51cbe7c746d222e381", "extension": "py", "fi...
2.4375
stackv2
import json import shutil from time import sleep, time import requests import sys from PIL import Image, ImageDraw from azure.storage.blob import BlockBlobService from azure.storage.queue import QueueService from secrets import ACCOUNT_KEY, ACCOUNT_NAME, COG_ACCOUNT_KEY class ImageQueue(object): queue_name = ...
163
35.63
175
16
1,335
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9764d14c6fce7a89_4c1a25df", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 121 ]
[ null ]
[ 40 ]
[ 74 ]
2024-11-19T01:30:14.496732+00:00
1,575,513,457,000
d9b9f85af3f3c471f3833bbf83ac1db8e0c0979f
4
{ "blob_id": "d9b9f85af3f3c471f3833bbf83ac1db8e0c0979f", "branch_name": "refs/heads/master", "committer_date": 1575513457000, "content_id": "b1cb83dbeee122d4f27ddcc0da7838e675200a7f", "detected_licenses": [ "Unlicense" ], "directory_id": "3b820296a35a591c64519b08a74f6a93eea0928a", "extension": "py",...
3.609375
stackv2
def get_gender(gender = 'Unknown'): if gender is 'm': gender="male" elif gender is 'f': gender='female' print("Gender is ", gender) get_gender('m') get_gender('f') get_gender() def sentence(name = 'Aousnik', gender = 'male', category = 'general'): print(name, gender, category) sentenc...
18
21.78
70
10
106
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_76e6176fb3d9f7a5_2d57bc16", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.\nThis expression logs [sensitive data (private)](4) as clear text.", "This expression logs [sensitive data (priva...
[ 6, 13 ]
[ null, null ]
[ 25, 17 ]
[ 31, 23 ]
2024-11-19T01:30:23.102248+00:00
1,692,913,685,000
da6d79fd3db99d744afe76c747077ea2d54dbb0e
2
{ "blob_id": "da6d79fd3db99d744afe76c747077ea2d54dbb0e", "branch_name": "refs/heads/master", "committer_date": 1692917918000, "content_id": "99875eae7d6b001933f0eacb1b6bff7fc2691de3", "detected_licenses": [ "MIT", "Apache-2.0" ], "directory_id": "c36671ad69265c0c0ead3f59f41f73d5fe1162bb", "exten...
2.4375
stackv2
#!/usr/bin/env python """A simple example of connecting to Earth Engine using App Engine.""" # Works in the local development environment and when deployed. # If successful, shows a single web page with the SRTM DEM # displayed in a Google Map. See accompanying README file for # instructions on how to set up authent...
38
32.42
75
13
300
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_88bc26619388c12a_4c57953f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 17 ]
[ 18 ]
[ 21 ]
[ 63 ]
2024-11-19T01:30:37.647928+00:00
1,553,787,617,000
1d54af745216c036e438fe50f7bdb511d92c5b10
3
{ "blob_id": "1d54af745216c036e438fe50f7bdb511d92c5b10", "branch_name": "refs/heads/master", "committer_date": 1553787617000, "content_id": "7ae49e3a7374c8adc033b923340ff79c958bee2c", "detected_licenses": [ "MIT" ], "directory_id": "05db79f80c33f7107d805c2820d8cadc5e10220d", "extension": "py", "fi...
2.875
stackv2
# How to handle bibliography? BBL, BIB, in-line? import sys import os import re import glob import itertools import argparse import json from jinja2 import Template from termcolor import colored from functools import reduce from TexSoup import TexSoup from collections import OrderedDict, Counter, defaultdict from nltk....
185
31.54
117
18
1,462
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_f1c11b9250331c0b_71a9dd40", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 173 ]
[ null ]
[ 16 ]
[ 34 ]
2024-11-19T01:54:46.851493+00:00
1,581,522,743,000
1d8eba990d3c138596074ed67c8d2b6503ca5f18
2
{ "blob_id": "1d8eba990d3c138596074ed67c8d2b6503ca5f18", "branch_name": "refs/heads/master", "committer_date": 1581522743000, "content_id": "f3a895f89ebffe2b6ce1032caf634b4eaeb1c34f", "detected_licenses": [ "MIT" ], "directory_id": "5390aaeb9d4f8926cf07d811e69c3641e5729e7c", "extension": "py", "fi...
2.421875
stackv2
import re import orodja zacetek, konec = 1959, 2020 vzorec_leto = re.compile( r'<tr.*?><td><a href="(?P<link1>.*?)amp;(?P<link2>year=\d\d\d\d)">(?P<država>.*?)</a></td>', flags=re.DOTALL ) vzorec_leaders = re.compile( r'Leader: <b>(?P<leader>.*?)</b><br />(.|\n)*?' r'(Deputy leader: <b>(?P<deputy_lea...
245
33.28
108
18
3,019
python
[{"finding_id": "codeql_py/redos_40fba87bb2dde34b_bd1f418e", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'Leader: <b></b><br />' and contai...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with 'Leader: <b></b><br />' and containing many repetitions of '\\n'." ]
[ 12 ]
[ null ]
[ 43 ]
[ 52 ]
2024-11-19T01:54:56.255227+00:00
1,553,362,965,000
0f363e5c92e18e3981238b9ccf80e4e714028bbb
3
{ "blob_id": "0f363e5c92e18e3981238b9ccf80e4e714028bbb", "branch_name": "refs/heads/master", "committer_date": 1553362965000, "content_id": "7ea6c5db3b16a4e012e8355b32c06492f2a53aec", "detected_licenses": [ "MIT" ], "directory_id": "ebb93bc1fcbbc948472df4c89f44827a3f680353", "extension": "py", "fi...
2.625
stackv2
from flask import Flask,request, jsonify import requests app = Flask(__name__) """@app.route('/',methods=['GET','POST']) def index(): d = request.json #print(d) return 'Bot replies' + d["text"] """ @app.route('/webhook',methods=['POST','GET']) def webhook(): d=request.json intent =d['queryResult...
40
25.25
63
17
240
python
[{"finding_id": "codeql_py/flask-debug_d5eb9fe44d43aa0d_de819af5", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-918" ]
[ "py/flask-debug", "py/partial-ssrf" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 40, 22 ]
[ null, null ]
[ 5, 13 ]
[ 24, 30 ]
2024-11-19T01:55:17.572260+00:00
1,476,475,625,000
a4214cf0f980333e32f6fe771f9d9471a7fc975e
2
{ "blob_id": "a4214cf0f980333e32f6fe771f9d9471a7fc975e", "branch_name": "refs/heads/master", "committer_date": 1476475625000, "content_id": "448b5fdfd2636a1def5bb2a2e8726d1aff97e3f0", "detected_licenses": [ "Apache-2.0" ], "directory_id": "7502781d4fd36c5d3c339dbccd806b951a4fd6a9", "extension": "py"...
2.3125
stackv2
import os import tarfile import tempfile from nexentaedge.settings import Settings from utils import download if os.path.exists(Settings.NEDEPLOY_FOLDER_PATH): print('NEDEPLOY is already present') else: print('Downloading NEDEPLOY') path = os.path.join(tempfile.gettempdir(), Settings.NEDEPLOY_FILE_NAME) ...
18
32.22
75
11
141
python
[{"finding_id": "codeql_py/tarslip_e705abe91b15a38e_f7d34954", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 16 ]
[ null ]
[ 5 ]
[ 8 ]
2024-11-19T01:55:26.362947+00:00
1,477,574,064,000
0a248698abb06c05e0a42363ee92f1a345904ef6
3
{ "blob_id": "0a248698abb06c05e0a42363ee92f1a345904ef6", "branch_name": "refs/heads/master", "committer_date": 1477574064000, "content_id": "1e857e692353c4ee0ee5bf71e0a2609c3478f815", "detected_licenses": [ "MIT" ], "directory_id": "f1997ddc6321d68c8b220427e554896f57c26a07", "extension": "py", "fi...
2.59375
stackv2
import requests class Nanny(object): def __init__(self, host, token): self._host = host self._token = token def list_instances(self, srv): return [ (instance['hostname'].encode('ascii'), int(instance['port'])) for instance in self._request('%s/current_state/...
29
25.14
82
14
164
python
[{"finding_id": "codeql_py/request-without-cert-validation_7bfdee70527209bb_b46bbde4", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 20 ]
[ 26 ]
[ 13 ]
[ 10 ]
2024-11-19T01:55:32.395915+00:00
1,606,052,673,000
3c8d780f1fb5455aa97650074576ee2f9ff884a2
3
{ "blob_id": "3c8d780f1fb5455aa97650074576ee2f9ff884a2", "branch_name": "refs/heads/master", "committer_date": 1606052673000, "content_id": "26d03e341fd4c5a3a7daf8fcfd05cf7295c6cd41", "detected_licenses": [ "MIT" ], "directory_id": "903d9758567e0fd3c1cd9042a1becc2932590a1c", "extension": "py", "fi...
2.875
stackv2
# Instrucoes: # # 1. Configurar aplicacao Flask: # export FLASK_APP=models_realtime_batch.py # export FLASK_ENV=development # # 2. Mostrar rotas do app: # python -m flask routes # # 3. Rodar app Flask: # python -m flask run # # default host=localhost=127.0.0.1; port=5000 # # ou escolhe outros valor...
269
27.54
85
14
1,910
python
[{"finding_id": "codeql_py/reflective-xss_1ad7618b150bc156_499b15aa", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
9
true
[ "CWE-079", "CWE-079", "CWE-079", "CWE-079", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "This log entry ...
[ 144, 176, 212, 258, 66, 139, 171, 207, 253 ]
[ null, null, null, null, null, 142, 174, 210, 256 ]
[ 12, 12, 12, 12, 21, 21, 21, 21, 21 ]
[ 18, 18, 18, 18, 33, 6, 6, 6, 6 ]
2024-11-19T01:55:33.743168+00:00
1,501,122,299,000
47095a5e518af66cdec5017d84b5951cf60b19f1
3
{ "blob_id": "47095a5e518af66cdec5017d84b5951cf60b19f1", "branch_name": "refs/heads/master", "committer_date": 1501122299000, "content_id": "e4d97462634e9eeacc173ccbd79976f70983428c", "detected_licenses": [ "MIT" ], "directory_id": "11394ecc46e82dec107603638e73517c2a7c7731", "extension": "py", "fi...
2.734375
stackv2
__author__ = 'duduscript' from sys import argv from selenium import webdriver from selenium.webdriver.common.keys import Keys import os import time from PIL import Image def fullpage_screenshot(driver, file): print("Starting chrome full page screenshot workaround ...") total_width = driver.execute_script("re...
149
34.26
127
17
1,216
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_364d54cce29c3ad8_044cdb6e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 110, 145 ]
[ null, null ]
[ 29, 20 ]
[ 42, 28 ]
2024-11-19T02:07:16.465102+00:00
1,691,694,579,000
73e53d446418f0a70753f633f6de0a1233dedf23
2
{ "blob_id": "73e53d446418f0a70753f633f6de0a1233dedf23", "branch_name": "refs/heads/master", "committer_date": 1691694579000, "content_id": "1bedfe1e6ac36677767898351ee9bbdef6946def", "detected_licenses": [], "directory_id": "5728e44ebc5b0b8656f456598de44e72ce0261af", "extension": "py", "filename": "run...
2.4375
stackv2
#!/usr/bin/env python3 import argparse import getpass import logging from pathlib import Path import os import sys from pydantic_settings import BaseSettings from pykeepass import PyKeePass from pykeepass.exceptions import CredentialsError from scrapy.crawler import CrawlerRunner from scrapy.utils.project import get_...
126
27.65
113
15
782
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_970bfd38bc69fa5e_ff6f075c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 107 ]
[ null ]
[ 21 ]
[ 101 ]
2024-11-19T02:07:24.546502+00:00
1,583,861,706,000
c63242eeb39fc2ba101c24b5b940f40b258fc0aa
3
{ "blob_id": "c63242eeb39fc2ba101c24b5b940f40b258fc0aa", "branch_name": "refs/heads/master", "committer_date": 1583861706000, "content_id": "844abdba012d53aace27e23ad4a827f8eb05a809", "detected_licenses": [ "Apache-2.0" ], "directory_id": "af8e3492096e0cb783c85adf08bdf288953d362a", "extension": "py"...
2.625
stackv2
from os import getenv from statistics import mean import json from typing import List, Dict from pydantic import BaseModel from starlette.middleware.cors import CORSMiddleware from fastapi import FastAPI, Form, status, HTTPException import os class Season(BaseModel): start_month: int start_day: int end_mon...
113
26.17
119
16
762
python
[{"finding_id": "codeql_py/path-injection_c1c4545524b4af15_acc5fb64", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 93 ]
[ null ]
[ 27 ]
[ 80 ]
2024-11-19T02:31:48.226438+00:00
1,571,663,321,000
cbf63a292f3423c1c55af0fa7ff69a012a4df1cb
3
{ "blob_id": "cbf63a292f3423c1c55af0fa7ff69a012a4df1cb", "branch_name": "refs/heads/master", "committer_date": 1571663321000, "content_id": "beefb75b37ed538f0a3ec65c05140dc0fa5fb5f3", "detected_licenses": [ "Apache-2.0" ], "directory_id": "ff0e8114b10f784e92c2bee5f250b51b09804d13", "extension": "py"...
2.53125
stackv2
import os import subprocess import tempfile import logging import urllib from flask import Flask, request, redirect, url_for, abort, send_file from werkzeug import secure_filename UPLOAD_FOLDER = '/uploads' ALLOWED_EXTENSIONS = set(['pdf']) app = Flask(__name__) app.config.from_pyfile('config.py') logging.getLogger(...
90
32.57
157
16
748
python
[{"finding_id": "codeql_py/command-line-injection_0941d6c7e9afba0e_1b1ef47d", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {...
3
true
[ "CWE-078", "CWE-117", "CWE-117" ]
[ "py/command-line-injection", "py/log-injection", "py/log-injection" ]
[ "HIGH", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This command line depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 36, 35, 54 ]
[ null, null, null ]
[ 26, 19, 19 ]
[ 29, 38, 37 ]
2024-11-19T02:31:52.608450+00:00
1,633,074,307,000
584fc54d90c0a3265d4841b7b10ede0dd52e4d7e
3
{ "blob_id": "584fc54d90c0a3265d4841b7b10ede0dd52e4d7e", "branch_name": "refs/heads/main", "committer_date": 1633074307000, "content_id": "b0c3341785d31bfa9fb211240bba493764bf728a", "detected_licenses": [ "Apache-2.0" ], "directory_id": "27527c5155df46eabdfc7ae909ce7ad7efab8ece", "extension": "py", ...
2.984375
stackv2
""" @author: lxy @email: linxy59@mail2.sysu.edu.cn @date: 2021/9/27 @description: null """ import re def filter_tags(x): """ # Python通过正则表达式去除(过滤)HTML标签 :param x: :return: """ # 先过滤CDATA re_cdata = re.compile('//<!\ CDATA\[[ >]∗ //\ CDATA\[[ >]∗ //\ \] > ', re.I) # 匹配CDATA ...
95
24.13
118
23
805
python
[{"finding_id": "codeql_py/bad-tag-filter_d6f6896ff48bf52d_3fa2a8c3", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression does not match script end tags like </script\\t\\n bar>.", "remediation": "", "location"...
1
true
[ "CWE-116" ]
[ "py/bad-tag-filter" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression does not match script end tags like </script\\t\\n bar>." ]
[ 21 ]
[ null ]
[ 29 ]
[ 68 ]
2024-11-19T02:31:54.057829+00:00
1,636,129,142,000
1280ed338b62c620ba48ae107498ae1cf4f1b7f4
2
{ "blob_id": "1280ed338b62c620ba48ae107498ae1cf4f1b7f4", "branch_name": "refs/heads/master", "committer_date": 1636129142000, "content_id": "617d195f297c478a00322a799b84396b21af98ea", "detected_licenses": [ "MIT" ], "directory_id": "0a68792d65d788f0c9de978974e57ae5123803b7", "extension": "py", "fi...
2.359375
stackv2
import logging from django.shortcuts import get_object_or_404 from rest_framework import status from rest_framework.exceptions import ValidationError from rest_framework.response import Response from rest_framework.views import APIView from ....utils import convert_to_utc_time from .....models import WorkflowCollect...
320
37.19
143
20
2,284
python
[{"finding_id": "codeql_py/log-injection_1cb2af67e5f161cf_98850a74", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
2
true
[ "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 150, 311 ]
[ null, null ]
[ 17, 17 ]
[ 29, 29 ]
2024-11-19T02:32:10.489020+00:00
1,620,681,684,000
d8ff68372bd7e7ec72d7ba35e78daa51c3010922
2
{ "blob_id": "d8ff68372bd7e7ec72d7ba35e78daa51c3010922", "branch_name": "refs/heads/main", "committer_date": 1620681684000, "content_id": "d1f1b15cdad88c9ff24cd11b5622880e227256c7", "detected_licenses": [ "MIT" ], "directory_id": "a736c785444e7271b0b35bcab8c0b08ed0d10cf2", "extension": "py", "file...
2.390625
stackv2
import mysql.connector from flask import Flask, render_template, request import json from datetime import datetime from scipy.misc import imread, imresize, imsave import numpy as np import re import sys import base64 import os #Path to saved model app = Flask(__name__) @app.route("/") def index(): return render...
175
23.53
144
15
976
python
[{"finding_id": "codeql_py/sql-injection_991631f75d766c86_fee5ad2b", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown...
4
true
[ "CWE-089", "CWE-089", "CWE-089", "CWE-089" ]
[ "py/sql-injection", "py/sql-injection", "py/sql-injection", "py/sql-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This SQL query depends on a [user-provided value](1).", "This SQL query depends on a [user-provided value](1).", "This SQL query depends on a [user-provided value](1).", "This SQL query depends on a [user-provided value](1)." ]
[ 75, 78, 137, 140 ]
[ null, null, null, null ]
[ 24, 24, 24, 24 ]
[ 27, 27, 27, 27 ]
2024-11-19T02:32:35.045915+00:00
1,629,003,740,000
8ad37e316294c160960c89c8b11df51abc81e2d8
2
{ "blob_id": "8ad37e316294c160960c89c8b11df51abc81e2d8", "branch_name": "refs/heads/master", "committer_date": 1629003740000, "content_id": "e15081017d74b9c130074df43f054ce073c13a6d", "detected_licenses": [ "MIT" ], "directory_id": "d6e857310d6d900fde8e06873de839e0fee1fae7", "extension": "py", "fi...
2.40625
stackv2
from URLHandler.models import shorturl from django.http import JsonResponse from home_shorty.models import short_url from home_shorty.views import randomGenerator import json import string from random import choice from .models import APIKey from django.template.loader import render_to_string from django.utils.html imp...
133
42.8
148
26
1,087
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9690b11dc1a085b2_38aa74c9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 29 ]
[ null ]
[ 11 ]
[ 18 ]
2024-11-19T02:32:43.330548+00:00
1,394,616,962,000
ff2b99a55a66b1ed8db25ee4b49e787429941ace
3
{ "blob_id": "ff2b99a55a66b1ed8db25ee4b49e787429941ace", "branch_name": "refs/heads/master", "committer_date": 1394616962000, "content_id": "9116e55cd644bf152413ddb8cef5f74956f58fcc", "detected_licenses": [ "MIT" ], "directory_id": "5f00e8a4c2d676b80459eb9b6316f6f3220211c2", "extension": "py", "fi...
2.609375
stackv2
#!/usr/bin/env python3 import os import errno import sys def passwd_change(keys_file='keys.txt', passwd_orig='passwd', passwd_new='passwd_new', passwd_log='passwd.log', missing_log='missing.log'): try: with open(keys_file, 'r') as k: keys = k.readlines() ...
150
29.45
79
19
1,055
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_451c2e29b3470b03_9c89395d", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
4
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.", "This expression stores [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensi...
[ 28, 32, 37, 38 ]
[ null, null, null, null ]
[ 30, 38, 15, 15 ]
[ 34, 42, 74, 72 ]
2024-11-19T02:32:56.350945+00:00
1,492,633,167,000
04209a2c75a80dfb941ab75470ff2912343a457b
3
{ "blob_id": "04209a2c75a80dfb941ab75470ff2912343a457b", "branch_name": "refs/heads/master", "committer_date": 1492633167000, "content_id": "27d787f57373758a120841307a4f290b843a7bb0", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "0c62fccea6b7a4af4e6ed26609605eb643cebef0", "extension": "p...
3.046875
stackv2
"""Common methods we reuse.""" import collections import os import shutil import stat import tempfile as tmp from contextlib import contextmanager from subprocess import check_output def sort_tag(tag): """Sort the list by tag.""" list_length = len(tag) # Length 8 is list -l, 7 is df, 5 is list if lis...
194
24.8
79
19
1,210
python
[{"finding_id": "codeql_py/overly-permissive-file_cc3fa6e0cb72aff3_071493a5", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable." ]
[ 170 ]
[ null ]
[ 9 ]
[ 34 ]
2024-11-19T02:32:56.537243+00:00
1,484,508,500,000
67a69b9489bb303a218a53d2ee691449ec8d832f
3
{ "blob_id": "67a69b9489bb303a218a53d2ee691449ec8d832f", "branch_name": "refs/heads/master", "committer_date": 1484508500000, "content_id": "81f499cc5ce18509fd516b5c453d135fb84036ac", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "515ca6f8ef6058c33da4dee658d6c85bca5ecac7", "extension": "p...
2.625
stackv2
import string from httplib2 import Http from random import choice from apiclient.errors import HttpError from apiclient.discovery import build from oauth2client.service_account import ServiceAccountCredentials PASSWORD_CHARS = string.ascii_letters + string.digits def generate_password(length=10): return ''.join...
101
26.64
152
17
660
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fa683918035929a5_21959372", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 62 ]
[ null ]
[ 11 ]
[ 68 ]
2024-11-19T02:33:11.991444+00:00
1,616,256,192,000
838720a981f279fd96a38b57af17f50b75290694
3
{ "blob_id": "838720a981f279fd96a38b57af17f50b75290694", "branch_name": "refs/heads/master", "committer_date": 1616256192000, "content_id": "ef765b3cbdfaa9caf5f6d43cc98f20e01418af62", "detected_licenses": [ "MIT" ], "directory_id": "b8fcc414c2a888a15c44b4bc64fca1b61f6e3677", "extension": "py", "fi...
2.578125
stackv2
# Copyright (c) 2013-2016 Molly White # # Permission is hereby granted, free of charge, to any person obtaining a copy of this software # and associated documentation files (the "Software"), to deal in the Software without # restriction, including without limitation the rights to use, copy, modify, merge, publish, # di...
204
42.56
99
19
1,802
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_648107d23859e98f_b245a773", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 173 ]
[ 177 ]
[ 13 ]
[ 64 ]