added
stringlengths
32
32
created
int64
1,244B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.25
source
stringclasses
1 value
text
stringlengths
324
20.1k
num_lines
int64
16
598
avg_line_length
float64
15.1
58.3
max_line_length
int64
33
179
ast_depth
int64
8
39
length
int64
101
3.8k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.1k
265k
sast_codeql_findings_count
int64
1
45
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
45
rule_ids
listlengths
1
45
confidences
listlengths
1
45
severities
listlengths
1
45
messages
listlengths
1
45
line_starts
listlengths
1
45
line_ends
listlengths
1
45
column_starts
listlengths
1
45
column_ends
listlengths
1
45
2024-11-19T02:55:00.988460+00:00
1,424,293,181,000
869ff45df1a44e891a5f89418a963a25cf36fc91
3
{ "blob_id": "869ff45df1a44e891a5f89418a963a25cf36fc91", "branch_name": "refs/heads/master", "committer_date": 1424293181000, "content_id": "9f92cda5ad0e9e7e79b991112761b01893a7b223", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "e012d2f1cf9f50d3ca633718f77dc5ba78425285", "extension": "p...
2.515625
stackv2
#!/usr/bin/env python2 # -*- coding: utf-8 -*- __author__ = "David Bidner, Rene Höbling and Alexander Wachter" __license__ = "BSD 2-Clause" __version__ = "1.0.0" __status__ = "Released" # Provides a more or less complex structure for the SMM Network server import rsa import os.path import time import stomp import jso...
132
31
80
21
959
python
[{"finding_id": "codeql_py/weak-crypto-key_5b58ca3503bd3c33_b2fc6f25", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [512](1) bits, which is below 2048 and considered breakable.", "remediation": "", ...
1
true
[ "CWE-326" ]
[ "py/weak-crypto-key" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Creation of an RSA key uses [512](1) bits, which is below 2048 and considered breakable." ]
[ 104 ]
[ null ]
[ 29 ]
[ 45 ]
2024-11-19T02:55:57.870662+00:00
1,641,335,451,000
7943292758606048935f4d0e270892520cec7f14
3
{ "blob_id": "7943292758606048935f4d0e270892520cec7f14", "branch_name": "refs/heads/master", "committer_date": 1641335451000, "content_id": "5b3159f49c6708e2953bdac1dafefd3005649053", "detected_licenses": [ "MIT" ], "directory_id": "0c0506d044aac172c35fa606146acb607d42fdde", "extension": "py", "fi...
2.578125
stackv2
from __future__ import print_function import os import sys import json import tempfile import subprocess import logging.config import yaml import vra_defaults from io_utilities import promptWithDefault logger = logging.getLogger("vra_rest") def initVarsForCurl(): """ Prompts and initializes bash variables to easi...
56
40.84
154
12
547
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c414631a580db5ba_965ced97", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 36 ]
[ null ]
[ 51 ]
[ 55 ]
2024-11-19T02:56:00.657295+00:00
1,603,011,597,000
3da2bc3e7a38f88b23c6b271d59cc49718097b3a
3
{ "blob_id": "3da2bc3e7a38f88b23c6b271d59cc49718097b3a", "branch_name": "refs/heads/main", "committer_date": 1603011597000, "content_id": "b7dfb8ed96edcefd913ed13af6d59e24c3da5007", "detected_licenses": [ "Apache-2.0" ], "directory_id": "775aa6e95ff6de18f40487777136c78f079f83ab", "extension": "py", ...
3.03125
stackv2
#CreateCred.py #Creates a credential file. from cryptography.fernet import Fernet import re import ctypes import os import time import sys class Credentials(): def __init__(self): self.__username = "" self.__key = "" self.__password = "" self.__key_file = 'key.key' #----------------------------...
89
23.84
109
17
584
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_70916c1d59d74e46_bbd0c754", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 55 ]
[ 56 ]
[ 18 ]
[ 44 ]
2024-11-19T03:43:50.695545+00:00
1,633,694,989,000
e6dab4bc007949085c46a2b276f560cb364b31b9
3
{ "blob_id": "e6dab4bc007949085c46a2b276f560cb364b31b9", "branch_name": "refs/heads/master", "committer_date": 1633694989000, "content_id": "d70a4cf6ed18da426d3ecdb67ac36a4a4cdba00f", "detected_licenses": [ "Apache-2.0" ], "directory_id": "992ce692262e091bd7aa2c6a66ea4e8a63f2f318", "extension": "py"...
2.578125
stackv2
from aiohttp import ( web, ClientRequest, ) from dataclasses import dataclass from pubsub import pub import logging logger = logging.getLogger("aries_webhook_server") @dataclass class AriesWebhookServer: """The Aries Webhook Listener class This class allows you to interact with Aries by exposing the...
116
31.78
76
19
786
python
[{"finding_id": "codeql_py/log-injection_299b2567427e9ae7_9666d383", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
4
true
[ "CWE-117", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 75, 99, 99, 104 ]
[ null, null, null, 105 ]
[ 25, 27, 65, 18 ]
[ 72, 63, 72, 66 ]
2024-11-19T03:44:26.665674+00:00
1,614,638,676,000
1ecc8bafad69eb1d146c96b08652ebe6fae179e5
3
{ "blob_id": "1ecc8bafad69eb1d146c96b08652ebe6fae179e5", "branch_name": "refs/heads/master", "committer_date": 1614638676000, "content_id": "833d97f007eb472e7fe6c7c3ceaa0eae449437e0", "detected_licenses": [ "MIT" ], "directory_id": "f9fe9d34cdd88dfb55950899d1288a005d6caae7", "extension": "py", "fi...
2.875
stackv2
#!/usr/bin/python """AD Lookup Tool. Runs net user /domain and grabs the listing of domain users. Then runs a query against each individual user to determine when the password was last changed. This can be helpful during: Pentests - Find those old service accounts that may have older passwords IR - Find accounts tha...
112
33.04
112
20
905
python
[{"finding_id": "codeql_py/overly-large-range_5efacb99b3f98634_2d3c39d8", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\w in the same character class.", "remediation": "", "loc...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with \\w in the same character class." ]
[ 43 ]
[ null ]
[ 67 ]
[ 70 ]
2024-11-19T01:44:04.761751+00:00
1,451,369,996,000
41e875be620c979c0ef4f22b120be3fa246a1e7e
3
{ "blob_id": "41e875be620c979c0ef4f22b120be3fa246a1e7e", "branch_name": "refs/heads/master", "committer_date": 1451369996000, "content_id": "c41d6dd08905c0ae31ab6299b3ec45bee6378971", "detected_licenses": [ "Apache-2.0" ], "directory_id": "f893f446a241de11958bd99b7a2bb971e38d4f70", "extension": "py"...
2.6875
stackv2
#-*- coding:utf-8 -*- #/usr/bin/env python import os,sys import pickle import hashlib def auth_user(user_name,user_passwd): hash_passwd = hashlib.md5() hash_passwd.update(user_passwd) user_passwd = hash_passwd.hexdigest() user_file=os.path.dirname(os.path.dirname(os.path.abspath(__file__)))+'/config/use...
21
33.1
91
14
170
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_f7684037cecc57d0_3d47db9e", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 8 ]
[ null ]
[ 24 ]
[ 35 ]
2024-11-19T02:08:19.798723+00:00
1,598,610,985,000
c0832713be51e31b1b2bbbf8890988fa475cd749
2
{ "blob_id": "c0832713be51e31b1b2bbbf8890988fa475cd749", "branch_name": "refs/heads/master", "committer_date": 1598610985000, "content_id": "85f795df4653aacaf87f4ab6a71e7ee85b805932", "detected_licenses": [ "MIT" ], "directory_id": "b777d3a4c5806159c15929e0b76103e2c1adf72a", "extension": "py", "fi...
2.34375
stackv2
from flask import render_template, flash, redirect, url_for, Blueprint, request from flaskblog import db, bcrypt from flask_login import login_user, current_user, logout_user, login_required from flaskblog.models import User, Post from flaskblog.users.utils import save_picture, send_reset_email from flaskblog.users.fo...
112
40.66
117
16
980
python
[{"finding_id": "codeql_py/url-redirection_7b70a14282bbf9a4_bcdb8276", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 43 ]
[ null ]
[ 29 ]
[ 38 ]
2024-11-19T02:08:42.691241+00:00
1,555,014,906,000
8d98ffb3961c73c2d319fcd5a2d053bad98d1de1
4
{ "blob_id": "8d98ffb3961c73c2d319fcd5a2d053bad98d1de1", "branch_name": "refs/heads/master", "committer_date": 1555014906000, "content_id": "877df1e84602834cbb313001f71242e01958a0e3", "detected_licenses": [ "MIT" ], "directory_id": "10e90e4d279f67bfbf968f134e6f6b07a7cd5d93", "extension": "py", "fi...
3.703125
stackv2
""" Problem for DoJo on March 14, 2019. Implement a URL shortener with the following methods: shorten(URL), which shortens the URL into a six-character alphanumeric string, such as zLg6wl. restore(short), which expands the shortened string into the original URL. If no such shortened string exists, return null. Hint...
166
29.62
77
14
1,253
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_69596592f6b2271f_b0129e32", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 63, 79 ]
[ 64, 80 ]
[ 15, 15 ]
[ 50, 51 ]
2024-11-19T02:21:24.981124+00:00
1,507,446,258,000
2e2df1b78e794099443ae08edd1a57c50256cf01
3
{ "blob_id": "2e2df1b78e794099443ae08edd1a57c50256cf01", "branch_name": "refs/heads/master", "committer_date": 1507446258000, "content_id": "376c4ce3b41c3a024cf7d5f027f4a6132e9cd514", "detected_licenses": [ "MIT" ], "directory_id": "935adb267e28cd9dceafd01e37f987db57024079", "extension": "py", "fi...
3
stackv2
import base64 import hashlib salt_bytes = b'YjBjNWM4YjJkODBlMzJmOWYzOWY4ZDgxY2VkODdiNWI5OTgxMDE4MjFhZjcwMWM2M2Q' b64_alphabet = 'abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ' + '0123456789' + '+/' # 64 chars # Below are 2 predefined sets of chars that will appear in the final password chars = 'abcdefghijklmno...
60
35.98
123
14
706
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_6eaee96ac8852523_d8969e0f", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally e...
[ 17 ]
[ null ]
[ 26 ]
[ 29 ]
2024-11-19T02:21:26.190343+00:00
1,536,701,754,000
a0821082d21de40053f6d7235ab33439e633ad29
3
{ "blob_id": "a0821082d21de40053f6d7235ab33439e633ad29", "branch_name": "refs/heads/master", "committer_date": 1536701754000, "content_id": "d07ef07a03d5024ba02c64a9c6b0007aa9975f8e", "detected_licenses": [ "MIT" ], "directory_id": "fd924e6528acb30e9689a9ff3ca954309aa7f10e", "extension": "py", "fi...
2.75
stackv2
# https://www.nkallfa.com/2017/11/05/tutorial-using-googles-cloud-vision-api-with-python/ #http://docs.pimoroni.com/buttonshim/_modules/buttonshim.html#on_release #pip install gTTS text to speech - use google to turn text to speech #sudo apt-get install mpg321 - to play the audio import io import os os.environ['GOOGL...
260
28.15
89
14
1,834
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0d2bcc8705f20d12_2a60283d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 110, 111 ]
[ null, null ]
[ 19, 19 ]
[ 57, 59 ]
2024-11-19T02:21:31.830652+00:00
1,444,929,942,000
415ac0104766e9caa4c2da4afcfc76f14a7cff49
3
{ "blob_id": "415ac0104766e9caa4c2da4afcfc76f14a7cff49", "branch_name": "refs/heads/master", "committer_date": 1444929942000, "content_id": "6c87a88c2396307cd760821c89fe9c0da5a65789", "detected_licenses": [ "MIT" ], "directory_id": "9d81e916446783e4b3e14ea287531f2a073d298a", "extension": "py", "fi...
2.875
stackv2
# Copyright (C) 2015 Niklas Rosenstein # # Permission is hereby granted, free of charge, to any person obtaining a copy # of this software and associated documentation files (the "Software"), to deal # in the Software without restriction, including without limitation the rights # to use, copy, modify, merge, publish, d...
69
33.61
79
12
541
python
[{"finding_id": "codeql_py/overly-large-range_a95aaffcebd8bf85_59fe5bbb", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo...
4
true
[ "CWE-020", "CWE-020", "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "Suspicious character range that is equivalent to \\[A-Z\\\\[...
[ 36, 36, 44, 44 ]
[ null, null, null, null ]
[ 22, 27, 27, 32 ]
[ 25, 30, 30, 35 ]
2024-11-19T02:21:36.036934+00:00
1,614,677,991,000
75f6143fc607f2613aaf74de0cab57aa56240d1d
2
{ "blob_id": "75f6143fc607f2613aaf74de0cab57aa56240d1d", "branch_name": "refs/heads/master", "committer_date": 1614677991000, "content_id": "972fa3c6d4d5edf3915e9a0aeda8694e55a2d889", "detected_licenses": [ "MIT" ], "directory_id": "7ac8f6e141f198978eb9ee60a8ee86bb60864cf8", "extension": "py", "fi...
2.328125
stackv2
# ----------------------------------------------------------------------------- # Licence: # Copyright (c) 2012-2018 Luzzi Valerio # # The above copyright notice and this permission notice shall be # included in all copies or substantial portions of the Software. # # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY ...
347
29.73
152
20
2,507
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_b1adcff71bbd7c4f_a0ef4540", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
3
true
[ "CWE-079", "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 174, 254, 299 ]
[ null, null, null ]
[ 15, 11, 11 ]
[ 60, 56, 56 ]
2024-11-19T02:21:36.492493+00:00
1,615,980,936,000
5e0755598ba6fa16013b324f0d5588d3395896df
2
{ "blob_id": "5e0755598ba6fa16013b324f0d5588d3395896df", "branch_name": "refs/heads/master", "committer_date": 1615980936000, "content_id": "f948f6002b0648909d25ba1bd63b3fba1d4d9b1b", "detected_licenses": [ "MIT" ], "directory_id": "655b7176ed004213293840f994b523b7fe605b5f", "extension": "py", "fi...
2.484375
stackv2
import os import threading import time from datetime import datetime from pathlib import Path from typing import Union, List, Optional, Dict, Tuple import paramiko from paramiko import SSHClient, SSHException from aws_config import Params from aws_utils import _get_instance_by_name from launch import SHUTDOWN_MESSAGE...
248
39.53
97
31
2,061
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_2de3075a75c486c4_49e2e468", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 161 ]
[ null ]
[ 9 ]
[ 69 ]
2024-11-19T03:10:23.368290+00:00
1,564,162,338,000
9dae93a4ef5be0fb21fbb2e0e35e8c78933c9d00
3
{ "blob_id": "9dae93a4ef5be0fb21fbb2e0e35e8c78933c9d00", "branch_name": "refs/heads/master", "committer_date": 1564162338000, "content_id": "a24f49a6c664340f77b8c22680e2bcc7caf92f7d", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "38344724fce505ecc1bab8b1b64fc109c492e187", "extension": "p...
2.546875
stackv2
import base64 import io import requests import pandas as pd import time import warnings from intake.source import base # because Splunk connections are against a self-signed cert, all connections # would raise a warning from . import __version__ warnings.filterwarnings('ignore', module='urllib3.connectionpool') cla...
258
32.04
111
20
1,932
python
[{"finding_id": "codeql_py/request-without-cert-validation_80200e22598fa512_867be7c1", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
5
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 104, 136, 149, 159, 183 ]
[ 105, 138, 151, null, null ]
[ 13, 13, 13, 13, 13 ]
[ 68, 45, 45, 75, 76 ]
2024-11-19T03:10:38.182217+00:00
1,509,080,766,000
c1e3e13772b169c2f5af470b16ee7387d9de554a
2
{ "blob_id": "c1e3e13772b169c2f5af470b16ee7387d9de554a", "branch_name": "refs/heads/master", "committer_date": 1509080766000, "content_id": "caf24cd6a7d49f0acf8ad7fd7107ec8eca9435d0", "detected_licenses": [ "MIT" ], "directory_id": "57b92e85011218d374c4ede9c732619e481a1834", "extension": "py", "fi...
2.5
stackv2
# Importing essentials from flask import Flask, request from pymessenger.bot import Bot import os from engine import jarvis # Definitions bot = Bot(os.environ['FB_ACCESS_TOKEN']) app = Flask(__name__) VERIFY_TOKEN = "a" update_id = None def craft_message(user_id, msg): for x in msg: if type(x) is list:...
50
24.44
70
23
266
python
[{"finding_id": "codeql_py/reflective-xss_85b7664d29aacbfd_0e12c45f", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 28 ]
[ null ]
[ 20 ]
[ 53 ]
2024-11-19T03:22:41.014525+00:00
1,412,702,411,000
3d495b724fce76edf666d2f8eb3e17401f18a64d
2
{ "blob_id": "3d495b724fce76edf666d2f8eb3e17401f18a64d", "branch_name": "refs/heads/master", "committer_date": 1412702411000, "content_id": "2dae592b61635f5708a3641c5ab49466e61094ea", "detected_licenses": [ "Apache-2.0" ], "directory_id": "0a09d09239d9fab7914afdf856a9fd990ad25ffa", "extension": "py"...
2.484375
stackv2
""" Copyright 2014 VoterChat Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distr...
160
22.64
79
18
900
python
[{"finding_id": "codeql_py/stack-trace-exposure_5dc50459429f96b0_3dcc9a6d", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
5
true
[ "CWE-209", "CWE-117", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/stack-trace-exposure", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "HIGH", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided va...
[ 49, 94, 105, 122, 139 ]
[ 51, null, null, null, null ]
[ 28, 21, 21, 25, 21 ]
[ 14, 69, 74, 79, 58 ]
2024-11-19T03:22:41.831949+00:00
1,612,044,547,000
fc0bfc03daf1db31457bb02f167148ff158110f9
3
{ "blob_id": "fc0bfc03daf1db31457bb02f167148ff158110f9", "branch_name": "refs/heads/main", "committer_date": 1612044547000, "content_id": "c2f85d694c19760012bf1201fdc6e0cddee3ded4", "detected_licenses": [ "MIT" ], "directory_id": "67f7dd3cf232cbca83f55d10716b3f0fdd8792f6", "extension": "py", "file...
2.625
stackv2
import os from datetime import datetime from flask import Flask, jsonify, request from flask_sqlalchemy import SQLAlchemy from flask_migrate import Migrate app = Flask(__name__) app.config["SQLALCHEMY_DATABASE_URI"] = os.environ["DATABASE_URL"] db = SQLAlchemy(app) migrate = Migrate(app, db) class UsersModel(db.Mode...
64
27.48
82
16
413
python
[{"finding_id": "codeql_py/reflective-xss_1d2cdf9755650c91_2714883b", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 47 ]
[ 49 ]
[ 20 ]
[ 19 ]
2024-11-19T03:22:47.619298+00:00
1,512,517,650,000
369aed2046b61bc3ea5526a96789dc2a6d9633a4
3
{ "blob_id": "369aed2046b61bc3ea5526a96789dc2a6d9633a4", "branch_name": "refs/heads/master", "committer_date": 1512517650000, "content_id": "3d093c12e7baaaf70b5e9bad9515ed3920f7e1c3", "detected_licenses": [ "Apache-2.0" ], "directory_id": "081f80a99254347b1f0f4c754df58feffe529925", "extension": "py"...
2.640625
stackv2
from flask import Flask, request, redirect, url_for, flash, send_from_directory, render_template from werkzeug.utils import secure_filename import os from datetime import datetime UPLOAD_FOLDER = os.path.join(os.path.curdir,'tempFiles') ALLOWED_EXTENSIONS = set(['png', 'jpg', 'jpeg', 'gif']) app = Flask(__name__) app....
63
31.48
96
14
491
python
[{"finding_id": "codeql_py/reflective-xss_f07c1abd936d51cb_740cf638", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
5
true
[ "CWE-079", "CWE-601", "CWE-601", "CWE-601", "CWE-022" ]
[ "py/reflective-xss", "py/url-redirection", "py/url-redirection", "py/url-redirection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).", "This path depends on a [user-p...
[ 49, 34, 37, 43, 48 ]
[ 51, null, null, null, null ]
[ 16, 25, 25, 25, 19 ]
[ 19, 36, 36, 36, 23 ]
2024-11-19T01:34:44.203555+00:00
1,601,220,265,000
c70526ef7520bb2c3145c10f31049b996d9d9fed
2
{ "blob_id": "c70526ef7520bb2c3145c10f31049b996d9d9fed", "branch_name": "refs/heads/master", "committer_date": 1601220265000, "content_id": "b57067e89124d6ccc0dcd2687818a299fe06c069", "detected_licenses": [ "Apache-2.0" ], "directory_id": "a732c0a1aec26a281107dfb63118074b85202013", "extension": "py"...
2.453125
stackv2
import string import random from abc import ABC from flask import Flask, request, jsonify, views from backend.response.dispatcher import RequestDispatcher from backend.utils import ConfigParser import os import base64 from orm import History import hashlib class WebHandler: dispatcher = None history_path = {...
94
38.97
121
19
819
python
[{"finding_id": "codeql_py/path-injection_a3d6ff03af209ca5_e9288498", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 42, 69 ]
[ null, null ]
[ 31, 23 ]
[ 44, 32 ]
2024-11-19T01:34:55.600866+00:00
1,693,249,660,000
4b85b5d531b5cffba4312c010a41ba01d9d7f38b
3
{ "blob_id": "4b85b5d531b5cffba4312c010a41ba01d9d7f38b", "branch_name": "refs/heads/master", "committer_date": 1693249660000, "content_id": "c68fa6a9c459c2ac279e82c816c881f51bb2c77b", "detected_licenses": [ "Apache-2.0" ], "directory_id": "83f266cf772fae61ce532107712672732058a170", "extension": "py"...
3.03125
stackv2
#!/usr/bin/env python3 # This is a simple script that grabs all the cluster nodes and associates them # with a given MCD pod and outputs their roles. There is probably an easier way # to do this that I am too naïve to be aware of :). Running this script yields # the following output: # # Current MCD Pods: # machine-co...
98
31.51
115
15
865
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_93a297a8c62da3c8_d506d78c", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [node-role.kubernetes.io](1) may be at an arbitrary pos...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [node-role.kubernetes.io](1) may be at an arbitrary position in the sanitized URL." ]
[ 85 ]
[ null ]
[ 20 ]
[ 54 ]
2024-11-19T01:35:08.517938+00:00
1,513,681,759,000
7c042d52d378a944ef7c6f9111e39845259f8c37
3
{ "blob_id": "7c042d52d378a944ef7c6f9111e39845259f8c37", "branch_name": "refs/heads/master", "committer_date": 1513681759000, "content_id": "65401021321f07e82f6dfc02171861e186a41f90", "detected_licenses": [ "MIT" ], "directory_id": "08d362a6ae6b88b701367695e04c6591c2eac599", "extension": "py", "fi...
2.96875
stackv2
import json import requests # Disable security request warning from requests.packages.urllib3.exceptions import InsecureRequestWarning requests.packages.urllib3.disable_warnings(InsecureRequestWarning) """ Order 2: Login system by https This is the code which use curl to login system ``` curl -k https://192.168.105....
39
27.44
105
13
285
python
[{"finding_id": "codeql_py/request-without-cert-validation_7c17cfaeeb015714_a74ecb8b", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 32 ]
[ null ]
[ 20 ]
[ 106 ]
2024-11-19T02:19:00.181729+00:00
1,614,686,284,000
05b5087912bff8607eac8b10f5a3aa11a3888b10
2
{ "blob_id": "05b5087912bff8607eac8b10f5a3aa11a3888b10", "branch_name": "refs/heads/master", "committer_date": 1614686284000, "content_id": "b4fc6f319269b4e949940775d1cec3426aa7350a", "detected_licenses": [ "MIT" ], "directory_id": "fcdc0cee9f4ba13092fb9c0f3dec3cb00877fde2", "extension": "py", "fi...
2.453125
stackv2
import shutil from flask import ( Blueprint, flash, g, redirect, render_template, request, url_for ) from werkzeug.exceptions import abort from flaskr.auth import login_required, allowed_file from flaskr.db import get_db from markdown import Markdown from config import POST_PATH from config import DEFAULT_POST_PAT...
159
28.63
117
19
1,097
python
[{"finding_id": "codeql_py/url-redirection_a033fc6225b3ba78_63905e6f", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 145 ]
[ null ]
[ 29 ]
[ 40 ]
2024-11-19T02:30:05.999538+00:00
1,604,793,720,000
fb27d7df012bdbfb83bac265ea6a5c800b982532
4
{ "blob_id": "fb27d7df012bdbfb83bac265ea6a5c800b982532", "branch_name": "refs/heads/main", "committer_date": 1604793720000, "content_id": "32e7f8c474d4c96ebf7d0608f08d49784e325349", "detected_licenses": [ "MIT" ], "directory_id": "96cb1997a3fa6cf24bed3a78878c0fe73e93d748", "extension": "py", "file...
4.15625
stackv2
import string from random import randrange # Default values for this function are a lenght of 7 chars for the password and an alphabeth of ASCII letters and numbers. def password_gen(id_lenght = 7, alphabet = string.ascii_letters + string.digits): id_list = [] # for the default alphabet this function will i...
51
31.75
124
13
408
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8bbdfe5ca52b61e8_1106b2af", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
4
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 35, 40, 45, 51 ]
[ null, null, null, null ]
[ 7, 7, 7, 7 ]
[ 57, 73, 78, 101 ]
2024-11-19T02:30:11.358527+00:00
1,518,551,099,000
fe2a82faa35fede006d4cea4e052cd1b0361c514
3
{ "blob_id": "fe2a82faa35fede006d4cea4e052cd1b0361c514", "branch_name": "refs/heads/master", "committer_date": 1518551099000, "content_id": "ed05cd00b24ca2219805fc1e65a86889956eee42", "detected_licenses": [ "MIT" ], "directory_id": "d29474c329840c12a86a8b86763ed3befcd6fe8b", "extension": "py", "fi...
3.21875
stackv2
from flask import Flask # import the Flask class app = Flask(__name__) # Instantiate the Flask class to use the flask application @app.route('/user/<username>') # Has default string converter which accepts strings without slashes. def show_user_profile(username): return 'User is %s' % username @app.route('/post/<i...
35
37.17
114
8
337
python
[{"finding_id": "codeql_py/reflective-xss_3f5135a43f46331d_b7bae055", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
5
true
[ "CWE-079", "CWE-079", "CWE-079", "CWE-079", "CWE-079" ]
[ "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scri...
[ 7, 11, 15, 19, 23 ]
[ null, null, null, null, null ]
[ 9, 9, 9, 9, 9 ]
[ 32, 34, 45, 35, 29 ]
2024-11-19T02:30:15.522540+00:00
1,572,143,636,000
cfe359d4cb3de89ada6d0c7534a73d0c6a14cf6c
2
{ "blob_id": "cfe359d4cb3de89ada6d0c7534a73d0c6a14cf6c", "branch_name": "refs/heads/master", "committer_date": 1572143636000, "content_id": "5303029e5e096601f0d1cd01994fd7d11d361f20", "detected_licenses": [ "MIT" ], "directory_id": "f247bd4562ec3d9b831da4e0a22d922ba542712f", "extension": "py", "fi...
2.390625
stackv2
from reminders.airtable_client import AirtableClient from reminders.reminders_sheet import RemindersSheet from reminders.task import Task from reminders.ses_mailer import send_email from jinja2 import Template import os import settings import json import logging logger = logging.getLogger() logger.setLevel(logging.INF...
67
28.69
105
15
457
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_e4485901bbadcbd2_46ddcebb", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 35, 49 ]
[ null, null ]
[ 24, 24 ]
[ 42, 42 ]
2024-11-19T02:30:29.651951+00:00
1,685,035,030,000
18a616ea1f6069777d404463858f657b970a3faa
3
{ "blob_id": "18a616ea1f6069777d404463858f657b970a3faa", "branch_name": "refs/heads/main", "committer_date": 1685035030000, "content_id": "7378f59e4d6bf666fe90ddf06fabfac6b740dc82", "detected_licenses": [ "MIT" ], "directory_id": "57adfd30d44dcec446e55306265b68ee08b51655", "extension": "py", "file...
2.828125
stackv2
#!/usr/bin/env python3 import dropbox from dropbox import DropboxOAuth2FlowNoRedirect ''' It goes through an example of requesting a starting scope, and requesting more throughout the process ''' APP_KEY = "" APP_SECRET = "" auth_flow = DropboxOAuth2FlowNoRedirect(APP_KEY, con...
85
38.21
93
10
689
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d7da646aa8fbfb2b_29428b65", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 68 ]
[ null ]
[ 11 ]
[ 23 ]
2024-11-19T02:41:44.674893+00:00
1,470,587,181,000
c91f2a47b4050d468dc3201ae5021cdda96e6621
3
{ "blob_id": "c91f2a47b4050d468dc3201ae5021cdda96e6621", "branch_name": "refs/heads/master", "committer_date": 1470587181000, "content_id": "51ef182639c5bc18e0ac9b9d765d1c86059fcbc8", "detected_licenses": [ "MIT" ], "directory_id": "9f2673381c4b3f8063b6767ff066ab3851b3f618", "extension": "py", "fi...
2.546875
stackv2
from subprocess import Popen import time from flask import Flask, jsonify, render_template from flask import request from base64 import b16encode import os import shutil # Import the fixer from werkzeug.contrib.fixers import ProxyFix app = Flask(__name__) # Use the fixer app.wsgi_app = ProxyFix(app.wsgi_app) # F...
150
35.07
113
20
1,324
python
[{"finding_id": "codeql_py/overly-permissive-file_8eaf553413e712b6_59db5c1b", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ...
2
true
[ "CWE-732", "CWE-732" ]
[ "py/overly-permissive-file", "py/overly-permissive-file" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world writable.", "Overly permissive mask in chmod sets file to world writable." ]
[ 123, 128 ]
[ null, null ]
[ 5, 5 ]
[ 35, 57 ]
2024-11-19T02:41:52.352673+00:00
1,567,049,280,000
2badf4550a00e1b266260c94a6ba946a4ff232ee
3
{ "blob_id": "2badf4550a00e1b266260c94a6ba946a4ff232ee", "branch_name": "refs/heads/master", "committer_date": 1567049280000, "content_id": "006183fd0ec8dd39d294d03adc566bbedabce4d0", "detected_licenses": [ "MIT" ], "directory_id": "02b835f009df472b982121e60a207cb07fe1290e", "extension": "py", "fi...
2.578125
stackv2
#!/usr/bin/python3 # -*- coding: utf-8 -*- """ This script populates the flicket database with randomly generated text. Run calling python populate_database_with_junk.py. """ import datetime from random import randint from mimesis import Person, Text from application import db from application.flicket.models.flicke...
181
28.14
92
16
1,201
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_22aad3e7ef21f64d_7225dc94", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 110 ]
[ null ]
[ 19 ]
[ 82 ]
2024-11-19T02:42:21.193787+00:00
1,691,505,383,000
41968126e3ce3daa1cfde2fc201d63ac28509882
2
{ "blob_id": "41968126e3ce3daa1cfde2fc201d63ac28509882", "branch_name": "refs/heads/master", "committer_date": 1691505383000, "content_id": "a78429caa24c0e8ef84616bb8574490dd32b8939", "detected_licenses": [], "directory_id": "abbf6a11c0590f6e5b7327e6f6df5a6c71af891d", "extension": "py", "filename": "log...
2.421875
stackv2
# pylint: disable=missing-class-docstring,missing-function-docstring """Authenticate a user.""" from __future__ import unicode_literals import getpass import logging import platform import socket import sys from six.moves import input from six.moves.urllib.parse import urlparse from binstar_client import errors fr...
142
34.73
116
19
1,022
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_f30ed3136a52bde7_baa6a871", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [api.anaconda.org](1) may be at an arbitrary position i...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [api.anaconda.org](1) may be at an arbitrary position in the sanitized URL." ]
[ 111 ]
[ null ]
[ 16 ]
[ 64 ]
2024-11-18T18:05:48.129850+00:00
1,582,784,455,000
0058182584be0256663898a22447cb051dcd4ba0
4
{ "blob_id": "0058182584be0256663898a22447cb051dcd4ba0", "branch_name": "refs/heads/master", "committer_date": 1582784455000, "content_id": "d24d21b0a3bfec73b64cb57b7b4efc1ca97fa549", "detected_licenses": [ "MIT" ], "directory_id": "6966d64ce65e71c28ca4b2193491ed841f54b029", "extension": "py", "fi...
3.5625
stackv2
from os import system def clear_console(): system('clear') print("Bienvenido al Ahorcado!!!") print("Comencemos!") print("Presiona cualquier tecla para continuar...") input() palabra_secreta = 'GERARDO' letras_correctas = [] oportunidades = 10 restantes = [] for letra in palabra_secreta: if letra not in resta...
50
22.98
61
14
330
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7ec7a0274320de93_41a533c4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 22 ]
[ null ]
[ 19 ]
[ 24 ]
2024-11-18T18:05:50.388020+00:00
1,550,471,205,000
2c0c9fb789e5b5478699d30c8cbd51e5d0aa0730
4
{ "blob_id": "2c0c9fb789e5b5478699d30c8cbd51e5d0aa0730", "branch_name": "refs/heads/master", "committer_date": 1550471205000, "content_id": "3710e87223156d62f34fbe08abba97c906105bcc", "detected_licenses": [ "MIT" ], "directory_id": "592e60cf86d688dc574fdaafa93474f3daf7bb3a", "extension": "py", "fi...
3.515625
stackv2
#!/usr/local/bin/python3 # -*- coding: utf-8 -*- import random import argparse from .stuff import word_set __version__ = "1.2.0" SPECIALS = {"!", "@", "#", "$", "%", "^", "&", "*", "("} NUMS = set(range(1, 1000)) DEFAULT_DELIMITER = "-" DEFAULT_NUM_WORDS = 3 def create_parser(): """ Create argparse object for th...
92
23.59
66
13
539
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9250d35b18a83fd9_ca9a17a6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 92 ]
[ null ]
[ 11 ]
[ 43 ]
2024-11-18T18:05:58.482083+00:00
1,572,341,728,000
842431153045104d1f2cc39b462f5b6d1f3eb532
3
{ "blob_id": "842431153045104d1f2cc39b462f5b6d1f3eb532", "branch_name": "refs/heads/master", "committer_date": 1572341728000, "content_id": "14b9f76fe8d962899b683d852095d397bb4bc5ba", "detected_licenses": [ "MIT" ], "directory_id": "628f65b2a81ee788179e6b7de34dadd0819b61be", "extension": "py", "fi...
2.640625
stackv2
#This is the library for the web scraper PHist 1.1 import requests, codecs, json, datetime import robotexclusionrulesparser from urllib.parse import urljoin, urlparse from bs4 import BeautifulSoup from collections import OrderedDict import scraper_globals as sg #Getting the seed links and cleaning them up a bit de...
331
31.44
111
20
2,731
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_48124be42caddffc_5b48ad14", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [livejournal.com](1) may be at an arbitrary position in...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [livejournal.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 180 ]
[ null ]
[ 10 ]
[ 34 ]
2024-11-18T18:05:59.888732+00:00
1,605,028,641,000
423f60fdb4e4628fe7cfe96fc1d7efb2c4194796
4
{ "blob_id": "423f60fdb4e4628fe7cfe96fc1d7efb2c4194796", "branch_name": "refs/heads/main", "committer_date": 1605028641000, "content_id": "ceca013ce175a7578959b03767ae50ef6fcde610", "detected_licenses": [ "MIT" ], "directory_id": "49e33742e54dec1c0cce2f698550ada71b85237f", "extension": "py", "file...
3.859375
stackv2
class CreditCard(): def __init__(self, numcode, cvv, expiredate): self.numcode = numcode self.expiredate = expiredate self.cvv = cvv def __str__(self): return "Number Code: {} | CVV: {} | Expire Date: {}".format(self.numcode, self.cvv, self.expiredate) def code_ch...
59
27.12
112
17
400
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e802a8221d1afa74_84d462f2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 52 ]
[ null ]
[ 11 ]
[ 16 ]
2024-11-18T18:06:04.427874+00:00
1,678,871,215,000
bae61eaa2c1cc330ab82d74b39e1dcb8b792be09
3
{ "blob_id": "bae61eaa2c1cc330ab82d74b39e1dcb8b792be09", "branch_name": "refs/heads/master", "committer_date": 1678871215000, "content_id": "f869231d18037b11f4b4ddda6c5fec8b26be49ad", "detected_licenses": [ "MIT" ], "directory_id": "90edd7f110d41042b5c0eb2a190835c2dbea5f4c", "extension": "py", "fi...
2.578125
stackv2
#!/usr/bin/python import functools import jinja2 import json import argparse import os import requests import tempfile import yaml class NameItem: def __init__( self, name ): self.name = name self.index = -1 if name.endswith( ']' ): pos = name.rfind('[' ) if pos != ...
175
34.06
107
20
1,382
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_2b18bd9a69b921b8_35727a65", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 136 ]
[ null ]
[ 19 ]
[ 62 ]
2024-11-18T19:31:07.936075+00:00
1,576,510,815,000
3dc0cd86a033ef8b9426137f73bb09e75c349123
3
{ "blob_id": "3dc0cd86a033ef8b9426137f73bb09e75c349123", "branch_name": "refs/heads/master", "committer_date": 1576510815000, "content_id": "7132f90ae07437069fd935d1e9b7bca89c6a5eef", "detected_licenses": [ "MIT" ], "directory_id": "516450c4f4d8262037cbf898bfc02034c8a36f8f", "extension": "py", "fi...
2.515625
stackv2
# -*- coding:utf-8 -*- from lxml import etree import urllib import os import requests def getHtml(url): html = requests.get(url).content selector = etree.HTML(html) return selector def getContent(htm, xpathStr): selector = htm content = selector.xpath(xpathStr) return content def getPath(titl...
91
26.4
90
13
741
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_80522f7b5c99a06c_dda73eaf", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [http://mov.bn.netease.com/](1) may be at an arbitrary ...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "The string [http://mov.bn.netease.com/](1) may be at an arbitrary position in the sanitized URL.", "The string [//open.163.com/](1) may be at an arbitrary position in the sanitized URL." ]
[ 76, 89 ]
[ null, null ]
[ 12, 8 ]
[ 47, 33 ]
2024-11-18T18:59:39.045343+00:00
1,675,884,890,000
ea6e84ef564f30e5cdf6afcc0a91879c5efb2f1c
3
{ "blob_id": "ea6e84ef564f30e5cdf6afcc0a91879c5efb2f1c", "branch_name": "refs/heads/master", "committer_date": 1675884890000, "content_id": "f099de75e0bf747fcf0d7f4f836ee3cdba924dca", "detected_licenses": [ "Apache-2.0" ], "directory_id": "30b06187f8c6f30de84b8a93f24bce5562afa947", "extension": "py"...
3.046875
stackv2
import json import requests def config_snmp_hosts(baseurl, snmphosts, cookie_header): """ This function configure SNMP hosts :param baseurl: The resource URL for the device, in String format. :param cookie_header: The login cookie for the session. :param snmphosts: snmp hosts parsed from yaml fil...
129
42.43
116
14
1,274
python
[{"finding_id": "codeql_py/request-without-cert-validation_a9b08cc72270e71c_0605228a", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
6
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 16, 35, 53, 76, 104, 125 ]
[ null, null, null, null, null, null ]
[ 16, 16, 16, 16, 16, 16 ]
[ 93, 91, 64, 88, 87, 90 ]
2024-11-18T18:59:39.829923+00:00
1,408,922,569,000
a57f25646918b8f8e4662f58f4e756e055c02d05
3
{ "blob_id": "a57f25646918b8f8e4662f58f4e756e055c02d05", "branch_name": "refs/heads/master", "committer_date": 1408922569000, "content_id": "0005dad77a2d586a77683ecd71d680f8a64cada5", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "23454ba9036679aa44a48eb3514aad285b5e0567", "extension": "p...
2.640625
stackv2
from flask import Flask, render_template, redirect, url_for, request, flash from sqlalchemy import Column, Integer, String, ForeignKey, Text, DateTime from flask.ext.sqlalchemy import SQLAlchemy from flask.ext import wtf from flask.ext.login import LoginManager, login_required, UserMixin, login_user, logout_user from d...
174
27.38
96
16
1,130
python
[{"finding_id": "codeql_py/url-redirection_d06d96d6cdac02dc_4e0d650e", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 57 ]
[ null ]
[ 29 ]
[ 75 ]
2024-11-18T18:59:40.495688+00:00
1,566,519,991,000
d76d9e0a03949e847e69f6703769cbf56b37c6e6
2
{ "blob_id": "d76d9e0a03949e847e69f6703769cbf56b37c6e6", "branch_name": "refs/heads/master", "committer_date": 1566519991000, "content_id": "a23aff835593c3e0293c0e8612c0427bf33e5b71", "detected_licenses": [ "MIT" ], "directory_id": "a45c70447c4feec31402a39b4dcf79d6a6116e19", "extension": "py", "fi...
2.5
stackv2
import os import re import shutil import zipfile reg = "[a-zA-z0-9]{1,}\d{1,2}\.(?:in|out)" reg = re.compile(reg) ma = "\d{1,2}" mareg = re.compile(ma) tireg = "[a-zA-z]{1,}\d{1}" tireg = re.compile(tireg) curpath = os.getcwd() curpathfile = os.listdir(os.getcwd()) #print(os.path.join(curpath, 'input')) mp = {} titl...
115
28.77
126
23
1,057
python
[{"finding_id": "codeql_py/overly-large-range_659c5e3177146da8_32fed3d4", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 7, 11 ]
[ null, null ]
[ 12, 14 ]
[ 15, 17 ]
2024-11-18T19:11:52.024681+00:00
1,361,948,729,000
336d68d5275e11f19e2c74f4072061f223332b2b
3
{ "blob_id": "336d68d5275e11f19e2c74f4072061f223332b2b", "branch_name": "refs/heads/master", "committer_date": 1361948729000, "content_id": "97b146193504fe1747dfe63303398c8aecfb433f", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "564a8418523753f091ade4b7e125f44840de0dac", "extension": "p...
2.890625
stackv2
#!/usr/bin/python import string, os class TemplateFile(): def __init__(self, path, fname, outpath, outfname ): self.fname = fname self.outfname = outfname self.path = path self.outpath = outpath # prepare the output file from keywords in 'kw_list' def prepare_file(self, k...
40
25.77
73
19
258
python
[{"finding_id": "codeql_py/overly-permissive-file_4b6e72e96979029b_c7d28f0b", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable." ]
[ 28 ]
[ null ]
[ 13 ]
[ 42 ]
2024-11-18T19:58:20.677075+00:00
1,625,815,141,000
0ef6ed11031e3dd41879fb16111c68d5fe23f4c7
3
{ "blob_id": "0ef6ed11031e3dd41879fb16111c68d5fe23f4c7", "branch_name": "refs/heads/main", "committer_date": 1625815141000, "content_id": "1cfa9912c6d5d0a0715f9dd1fb2068f1788f7860", "detected_licenses": [ "MIT" ], "directory_id": "b06ade75c08f2114699002e34ce693faaa8f78ba", "extension": "py", "file...
2.75
stackv2
#! /usr/bin/env python """ A Flask app for Google SSO """ import json import requests from flask import Flask, redirect, request from oauthlib import oauth2 import conf CLIENT_ID = conf.CLIENT_ID CLIENT_SECRET = conf.CLIENT_SECRET DATA = { 'response_type':"code", 'redirect_uri':"https://localhost:50...
89
26.81
73
12
574
python
[{"finding_id": "codeql_py/flask-debug_d08e097a5306cbb1_aa0f39dc", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 89, 86 ]
[ null, null ]
[ 5, 12 ]
[ 56, 29 ]
2024-11-18T19:58:35.074008+00:00
1,634,386,484,000
29287109cd8777d62540bb417c290bf111f126c6
3
{ "blob_id": "29287109cd8777d62540bb417c290bf111f126c6", "branch_name": "refs/heads/main", "committer_date": 1634386484000, "content_id": "8573b9a4fac6662128a4dbad446eaa58684f6402", "detected_licenses": [ "Apache-2.0" ], "directory_id": "453e32528bf94b3be730b7c30368e5623e46bc31", "extension": "py", ...
2.515625
stackv2
"""Usage $ python inference.py --data_dir data \ --model_dir model \ --output_dir output \ [args..] """ import argparse import logging import os import tarfile import torch from dataset import KlueReDataLoader from transformers import AutoModelForSequen...
158
27.53
92
21
1,032
python
[{"finding_id": "codeql_py/tarslip_76fd03f058bd5e88_7e68a961", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 34 ]
[ null ]
[ 5 ]
[ 8 ]
2024-11-18T19:58:37.490317+00:00
1,634,911,534,000
c8f7ca60ce53fce0385977f2421e9dd3b21565e0
3
{ "blob_id": "c8f7ca60ce53fce0385977f2421e9dd3b21565e0", "branch_name": "refs/heads/master", "committer_date": 1634911534000, "content_id": "1d0dd60d4272ba4fffb9ef260c81b257a818ae2f", "detected_licenses": [ "Apache-2.0" ], "directory_id": "810eecb9e19d18a7cd3dbfcdf9d534a72253d59d", "extension": "py"...
2.53125
stackv2
# -*- coding: utf-8 -*- import copy import json import os from jinja2 import Template from texttable import Texttable from elastalert.util import EAException, lookup_es_key from elastalert.yaml import read_yaml from collections import Counter class DateTimeEncoder(json.JSONEncoder): def default(self, obj): ...
327
43.75
124
21
2,995
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_a520f68308c01e96_0c3bbd86", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 216 ]
[ null ]
[ 30 ]
[ 79 ]
2024-11-18T19:58:37.716240+00:00
1,547,086,060,000
a620f973fec2c608bb609e8c07a46c3004df1815
3
{ "blob_id": "a620f973fec2c608bb609e8c07a46c3004df1815", "branch_name": "refs/heads/master", "committer_date": 1547086060000, "content_id": "f46da3dde1027e2b0d5dd86dd7b34f8d926a317a", "detected_licenses": [ "Apache-2.0" ], "directory_id": "ccd1946cf254671326a16139e5ebb405d1570f3e", "extension": "py"...
2.546875
stackv2
from ..config import mkdir_p import os import urllib.request, urllib.error, urllib.parse import errno import tarfile def temp_directory(): path = os.path.expanduser('~/.scanner/resources') mkdir_p(path) return path def download_temp_file(url, local_path=None, untar=False): if local_path is None: ...
36
26.69
68
15
238
python
[{"finding_id": "codeql_py/tarslip_22fd06a19d0c890c_f07a96ab", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 26 ]
[ null ]
[ 17 ]
[ 22 ]
2024-11-18T18:39:31.020032+00:00
1,446,321,714,000
98bc0494c14efd97de32a8b29cfe1664761e43f3
3
{ "blob_id": "98bc0494c14efd97de32a8b29cfe1664761e43f3", "branch_name": "refs/heads/master", "committer_date": 1446321714000, "content_id": "3e731ec4407e53b0afc98a651b7d69fc13da68f4", "detected_licenses": [ "Artistic-2.0" ], "directory_id": "68add5002662e0990bec030de343c915b35e6991", "extension": "p...
2.96875
stackv2
""" Flask web app connects to Mongo database. Keep a simple list of dated memoranda. Representation conventions for dates: - In the session object, date or datetimes are represented as ISO format strings in UTC. Unless otherwise specified, this is the format passed around internally. Note that ordering o...
227
23.99
89
15
1,409
python
[{"finding_id": "codeql_py/log-injection_f99fa5b25a545cb4_10139cdf", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
2
true
[ "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 94, 106 ]
[ null, null ]
[ 19, 19 ]
[ 67, 36 ]
2024-11-18T18:39:37.233369+00:00
1,625,104,339,000
c7beb885f794999371b71f0821be43268f824097
2
{ "blob_id": "c7beb885f794999371b71f0821be43268f824097", "branch_name": "refs/heads/master", "committer_date": 1625104339000, "content_id": "4adb68b96fc7f1ad5d442e5a1cdf0337cd0fcc7e", "detected_licenses": [ "MIT" ], "directory_id": "6d7afcf7d9d590c2d3f55ca0298673f03f7d8cc8", "extension": "py", "fi...
2.359375
stackv2
from random_user_agent.params import SoftwareName, HardwareType from random_user_agent.user_agent import UserAgent from fp.fp import FreeProxy import requests as rq import urllib3 from datetime import datetime import time import json import logging import dotenv logging.basicConfig(filename='Shopifylog.log', filem...
239
30.15
123
21
1,551
python
[{"finding_id": "codeql_py/request-without-cert-validation_2cd3c979dee25190_8636bf67", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 46 ]
[ null ]
[ 16 ]
[ 112 ]
2024-11-18T18:39:43.419049+00:00
1,509,322,271,000
d5aaa045f341768bb156117230351fe7bf0e6a59
3
{ "blob_id": "d5aaa045f341768bb156117230351fe7bf0e6a59", "branch_name": "refs/heads/master", "committer_date": 1509322271000, "content_id": "58dfbdf20c5da4625f6d1c57342dbdf545ed8c3c", "detected_licenses": [ "MIT" ], "directory_id": "0df877527f76b1a7ecf6391365eb30e5d26499ae", "extension": "py", "fi...
2.734375
stackv2
from flask import Flask app = Flask(__name__) import os @app.route("/gpio<number>/export") def gpioExport(number): cmd = 'echo {} > /sys/class/gpio/export'.format(number) os.system(cmd) return "gpio{} exported".format(number) @app.route("/gpio<number>/unexport") def gpioUnexport(number): cmd = 'echo {} > /sys/cl...
46
28.67
77
11
337
python
[{"finding_id": "codeql_py/command-line-injection_c9d0cc978b3d0395_617d6c42", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {...
12
true
[ "CWE-078", "CWE-078", "CWE-078", "CWE-078", "CWE-078", "CWE-078", "CWE-079", "CWE-079", "CWE-079", "CWE-079", "CWE-079", "CWE-079" ]
[ "py/command-line-injection", "py/command-line-injection", "py/command-line-injection", "py/command-line-injection", "py/command-line-injection", "py/command-line-injection", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/reflective-...
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This command line depends on a [user-provided value](1).", "This command line depends on a [user-provided value](1).", "This command line depends on a [user-provided value](1).", "This command line depends on a [user-provided value](1).\nThis command line depends on a [user-provided value](2).", "This comm...
[ 9, 15, 22, 28, 35, 41, 10, 16, 23, 29, 36, 42 ]
[ null, null, null, null, null, null, null, null, null, null, null, null ]
[ 12, 12, 23, 12, 19, 12, 9, 9, 9, 9, 9, 9 ]
[ 15, 15, 26, 15, 22, 15, 41, 43, 59, 60, 51, 52 ]
2024-11-18T18:39:59.360024+00:00
1,575,624,771,000
8ec571fbe2b777a143fdbb803fbcab7e174fb68c
2
{ "blob_id": "8ec571fbe2b777a143fdbb803fbcab7e174fb68c", "branch_name": "refs/heads/master", "committer_date": 1575625981000, "content_id": "cf92379586745b51a1064f8dd2e677ac21f8c414", "detected_licenses": [ "MIT" ], "directory_id": "b3dfb9bbfc6c1d93eee075794a9465a6ae278d73", "extension": "py", "fi...
2.484375
stackv2
from os.path import join, expanduser, isfile from os import makedirs, chmod import json from qsm import lib class QsmInvalidConfigOptionError(Exception): """ Raised when an invalid config option is used. """ pass def init(config_dir=join(expanduser("~"), ".qsm")): config_file = join(config_dir, ...
42
30.24
99
15
331
python
[{"finding_id": "codeql_py/overly-permissive-file_680a772826f0698d_0f47a61f", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to group readable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to group readable." ]
[ 31 ]
[ null ]
[ 13 ]
[ 38 ]
2024-11-18T18:47:01.649824+00:00
1,602,081,530,000
82142f4ea6aaf69bfdf72ec80d120ceff2836fe5
2
{ "blob_id": "82142f4ea6aaf69bfdf72ec80d120ceff2836fe5", "branch_name": "refs/heads/main", "committer_date": 1602081530000, "content_id": "7232e84945a31fe7a4d7717e1b4cd888490b51e9", "detected_licenses": [ "MIT" ], "directory_id": "4252f8147c8044ba3dd70b1986512e96f83568f3", "extension": "py", "file...
2.453125
stackv2
#!/usr/bin/env python3 # Note: pip install requests import json, requests from requests_ntlm import HttpNtlmAuth from datetime import datetime, timedelta from dateutil import tz # == Settings == # This is just a sample! Arguments below in the endpoint call has to be modified accordingly! # Authe...
98
35.09
158
17
848
python
[{"finding_id": "codeql_py/request-without-cert-validation_a855680867631c9c_0502fdaf", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 35 ]
[ null ]
[ 24 ]
[ 123 ]
2024-11-18T20:58:16.518721+00:00
1,616,133,316,000
2cdaf8ca52aff0a666e44cafd6c113ae1338314b
3
{ "blob_id": "2cdaf8ca52aff0a666e44cafd6c113ae1338314b", "branch_name": "refs/heads/master", "committer_date": 1616133316000, "content_id": "9970d1cb68c171c7a3c59fa7692f61ebfcfd75bb", "detected_licenses": [ "MIT" ], "directory_id": "fd2965d30b61567052738888079f174937d31fd8", "extension": "py", "fi...
2.515625
stackv2
from hashlib import sha256 import os from authentication import AuthenticationService from models import Product, User from definition import app, engine app.define(models=[User, Product], engine=engine) @app.route(methods=['GET'], path='/') def home(request, *args, **kwargs): return { 'status': 200, ...
221
23.81
92
20
1,326
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_ca7350bbb937fb75_f73db10a", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.", "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computational...
[ 38, 71 ]
[ null, null ]
[ 29, 43 ]
[ 65, 79 ]
2024-11-18T20:58:19.484500+00:00
1,619,117,351,000
583cf186a42361e2b870812c2975f2f8ce7b2a16
4
{ "blob_id": "583cf186a42361e2b870812c2975f2f8ce7b2a16", "branch_name": "refs/heads/main", "committer_date": 1619117351000, "content_id": "b6e04448849df93580ce9a1c04b5209131beb766", "detected_licenses": [ "MIT" ], "directory_id": "a884039e1a8b0ab516b80c2186e0e3bad28d5147", "extension": "py", "file...
3.609375
stackv2
# Program: Algoritmo325_Enq63.py # Author: Ramon R. Valeriano # Description: # Developed: 14/04/2020 - 19:42 # Updated: sum_worked = 0 worked_hours = 0 while True: minium_salary = float(input("Enter with the value of the minimum salary: ")) if minium_salary < 0: break while worked_hours > -1: ...
43
26.05
81
13
362
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_be3b6ea0cb92c0a4_9bd174b7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 42 ]
[ null ]
[ 11 ]
[ 17 ]
2024-11-18T19:49:12.275875+00:00
1,544,263,385,000
a3a3784a8bdb530fc83fd8b654baf43d99a02c35
2
{ "blob_id": "a3a3784a8bdb530fc83fd8b654baf43d99a02c35", "branch_name": "refs/heads/master", "committer_date": 1544263385000, "content_id": "5835f20c17c045f05f92be89668ba852086497e7", "detected_licenses": [ "Apache-2.0" ], "directory_id": "3c8c40f9f9d2d5e41c6042c8c2f10ae9612cdaec", "extension": "py"...
2.453125
stackv2
#لانشاء نماذج مخصوصة from django.forms import ModelForm #جلب الكلاس المراد التعديل عليه from .models import SignUp #كلاس التعديل #وإظهار حقل واحد أو اثنين class SignUpForm(ModelForm): class Meta: model = SignUp fields = ['Email','fullName','BirthDate'] #25 Python Web Django Forms and Va...
20
26.2
71
14
133
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_251867d1ce641bd4_8cc24fa2", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [gmail.com](1) may be at an arbitrary position in the s...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [gmail.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 18 ]
[ null ]
[ 18 ]
[ 38 ]
2024-11-18T19:49:15.987440+00:00
1,576,069,325,000
37faf5e43422ac49452fc893d70e71914417e890
2
{ "blob_id": "37faf5e43422ac49452fc893d70e71914417e890", "branch_name": "refs/heads/master", "committer_date": 1634673426000, "content_id": "887e10600becfd1a07ffebdc5a19a959246ef8e0", "detected_licenses": [ "Apache-2.0" ], "directory_id": "b2d3e60bc4d5d2e10477bb667c1d24ea12f79985", "extension": "py"...
2.484375
stackv2
from glob import glob from os import getcwd import falcon from jinja2 import Template app = falcon.App() dir = getcwd() def get_files(): files = [] for i in ('*.png', '*.jpg', '*.jpeg'): files.extend(glob(f"images/{i}")) return sorted(files) class HTML(object): def on_get(self, req, resp):...
39
24.33
55
15
251
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_5f5edc5434203278_7f8c3168", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 21, 30 ]
[ null, null ]
[ 17, 17 ]
[ 35, 35 ]
2024-11-18T19:38:19.385628+00:00
1,669,983,054,000
9d16b46fbfb322db7de2b5fcaeda4a77874d2991
2
{ "blob_id": "9d16b46fbfb322db7de2b5fcaeda4a77874d2991", "branch_name": "refs/heads/master", "committer_date": 1669983054000, "content_id": "60225e8bd340154019254f6cc558f6949ae506d4", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "56731673c481f872b61f86e9c8c07bb9b0548c94", "extension": "p...
2.4375
stackv2
import json import pytest import tornado.httpclient import tornado.httpserver import tornado.ioloop import tornado.testing import tornado.web from apiman.tornado import Apiman apiman = Apiman() class MainHandler(tornado.web.RequestHandler): """ get: summary: hello api parameters: - name: ...
249
26.28
112
20
1,347
python
[{"finding_id": "codeql_py/reflective-xss_e94d3498260694c3_3cca521b", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 33, 112 ]
[ null, null ]
[ 20, 20 ]
[ 36, 36 ]
2024-11-18T20:10:46.307270+00:00
1,631,697,733,000
4b1b6f994288e2b2824e2422961d4fe3f400eb72
2
{ "blob_id": "4b1b6f994288e2b2824e2422961d4fe3f400eb72", "branch_name": "refs/heads/master", "committer_date": 1631697733000, "content_id": "ba70ae875ca7c48d53a41d2bfb79031aa645953d", "detected_licenses": [ "Apache-2.0" ], "directory_id": "1579a44bb3a25b382805bb222b521b50ca7ea0a5", "extension": "py"...
2.46875
stackv2
import requests from .base import LmDriver, NotFoundException class LmResourcePkgDriver(LmDriver): """ Client for CP4NA orchestration Resource Pkg APIs """ def __init__(self, lm_base, lm_security_ctrl=None): super().__init__(lm_base, lm_security_ctrl) def __packages_api(self): ret...
39
37.49
93
14
314
python
[{"finding_id": "codeql_py/request-without-cert-validation_4d2eae221359ecf1_1302f09d", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 23, 32 ]
[ null, null ]
[ 24, 20 ]
[ 86, 71 ]
2024-11-18T20:10:56.090410+00:00
1,498,674,726,000
bc7d5b0437b6246526a306f666270bb7435baaf1
3
{ "blob_id": "bc7d5b0437b6246526a306f666270bb7435baaf1", "branch_name": "refs/heads/master", "committer_date": 1498674726000, "content_id": "41a90958e16959f477305a6035dedd0d04be53c4", "detected_licenses": [ "MIT" ], "directory_id": "ecb8de40b3dacdc7064a8b8384ab1b3d3ac152d2", "extension": "py", "fi...
2.578125
stackv2
from lxml import html import requests import os import sys # Will download toonova.net toons # Supply toonova.net page link with tonn episodes listed # # Version: 0.2 2017-06-27 22:22 # Author: hinkocevar@gmail.com # GIT: https://github.com/hinxx/toonrip def progress(x): mb = float(x)/1e6 sys.stdout.write("\rgot %...
168
20.64
79
17
1,104
python
[{"finding_id": "codeql_py/overly-permissive-file_e652e71d772036cf_9f9763db", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in open sets file to world writable.", "remediation": "", "location": {...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in open sets file to world writable." ]
[ 95 ]
[ null ]
[ 20 ]
[ 73 ]
2024-11-18T20:10:56.537800+00:00
1,653,616,105,000
0073fbf745ab90ac5750ab6633e901c3633740de
3
{ "blob_id": "0073fbf745ab90ac5750ab6633e901c3633740de", "branch_name": "refs/heads/main", "committer_date": 1653616105000, "content_id": "77b78d1c0accf4832980185d6bdc72a712f9766e", "detected_licenses": [ "MIT" ], "directory_id": "17ee5bc2774e8b9295a1a6dda09540ca3b499f04", "extension": "py", "file...
2.53125
stackv2
# Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the MIT License. import pandas as pd import os import tarfile try: from pyspark.sql.types import StructType, StructField, IntegerType, StringType except ImportError: pass # so the environment without spark doesn't break from reco_...
176
32.81
109
15
1,454
python
[{"finding_id": "codeql_py/tarslip_cf0ce39287a8810a_1c0d976a", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 154 ]
[ null ]
[ 9 ]
[ 12 ]
2024-11-18T20:11:09.841062+00:00
1,420,041,087,000
ba60c841eb28ffc2815debabd6f491d01712586d
2
{ "blob_id": "ba60c841eb28ffc2815debabd6f491d01712586d", "branch_name": "refs/heads/master", "committer_date": 1420041087000, "content_id": "8f1074707c6eb57cf3a358db7603b370c5369d41", "detected_licenses": [ "MIT" ], "directory_id": "af1aea1e59ae3e8c6304567e8fca7aa2e9733497", "extension": "py", "fi...
2.4375
stackv2
''' ssh client for stash. ssh looks for a valid key generated buy ssh-keygen in .ssh. You can open an intereactive shell by not passing a command. If a command is passed, the single command is ran with output then ssh exits. Once a valid ssh session has been created the special command pythonista [get|put|edit] file1 ...
264
34.88
135
22
2,029
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_a7134198353a5e08_db945ad7", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 75 ]
[ null ]
[ 9 ]
[ 62 ]
2024-11-18T20:26:22.460179+00:00
1,562,034,482,000
ebed2ad6f712b3ce41fd61b97ef68cb39d5bb985
3
{ "blob_id": "ebed2ad6f712b3ce41fd61b97ef68cb39d5bb985", "branch_name": "refs/heads/master", "committer_date": 1562034482000, "content_id": "cc93200bd1f3a4e1e6b886029172a3bc706fe836", "detected_licenses": [ "MIT" ], "directory_id": "4ebac92281070505f7da0fe8cd8ff32522eedc4a", "extension": "py", "fi...
3.0625
stackv2
import urllib from urllib import request, error import ssl # contornar erros de certificado import re from socket import error as SocketError import errno import os from tqdm import tqdm # barra de progresso import sys class HtmlReader: @staticmethod def getPageHtml(url='https://', main=False): ''' ...
196
43.2
106
20
1,981
python
[{"finding_id": "codeql_py/redos_65b2d393772bf404_5e59b44e", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '.' and containing many repetition...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '.' and containing many repetitions of '!.'." ]
[ 119 ]
[ null ]
[ 56 ]
[ 59 ]
2024-11-18T20:26:28.634241+00:00
1,624,619,571,000
764aab069b983193f87faf92bcb50449b50774c9
2
{ "blob_id": "764aab069b983193f87faf92bcb50449b50774c9", "branch_name": "refs/heads/master", "committer_date": 1624619571000, "content_id": "337862bd56f6c251595455e0f129aa71d0872e90", "detected_licenses": [ "Apache-2.0" ], "directory_id": "9ae494f90c47073156e7f235cd45c64d579a188b", "extension": "py"...
2.3125
stackv2
import requests from flask import Flask, jsonify,request,make_response from flasgger import Swagger from flasgger.utils import swag_from import json from flask_restful import Api,Resource from simplexml import dumps app = Flask(__name__) api = Api(app) app.config['SWAGGER'] = { 'title': 'Verloop API Documentation', ...
87
31.75
86
18
733
python
[{"finding_id": "codeql_py/flask-debug_2b49e3787ffddd34_de910f27", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 87, 23 ]
[ null, null ]
[ 2, 23 ]
[ 49, 39 ]
2024-11-18T20:51:56.774448+00:00
1,593,795,546,000
59a602fd51b95becb9f2a4b2f1b030eb49830cb6
3
{ "blob_id": "59a602fd51b95becb9f2a4b2f1b030eb49830cb6", "branch_name": "refs/heads/master", "committer_date": 1593795546000, "content_id": "74d14bdc0233f9a3d8291cda1ebb9b4726963466", "detected_licenses": [ "Apache-2.0" ], "directory_id": "f81f9c7b8382d1b682df23e08c5f22b5eb8d5f74", "extension": "py"...
3
stackv2
import requests from flask import Flask, render_template, request, redirect, url_for, flash from flask_sqlalchemy import SQLAlchemy app = Flask(__name__) app.config['SQLALCHEMY_DATABASE_URI'] = 'sqlite:///weather.db' app.config['SQLALCHEMY_TRACK_MODIFICATIONS'] = False app.config['SECRET_KEY'] = 'thisisasecret' db = ...
103
24.49
75
18
618
python
[{"finding_id": "codeql_py/flask-debug_4c3d881c4c3c861c_ab591885", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-918" ]
[ "py/flask-debug", "py/partial-ssrf" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 103, 25 ]
[ null, null ]
[ 5, 9 ]
[ 24, 30 ]
2024-11-18T20:52:06.324226+00:00
1,582,579,915,000
7f60e1839a9ede6a59528886a647b5938da70d97
3
{ "blob_id": "7f60e1839a9ede6a59528886a647b5938da70d97", "branch_name": "refs/heads/master", "committer_date": 1582579915000, "content_id": "aafedc327cb61b0e2b83733e1da3e29380e79a99", "detected_licenses": [ "MIT" ], "directory_id": "abd30d389b1ff2be523300fb41cb919229ef305d", "extension": "py", "fi...
2.9375
stackv2
from modules import cex128 import hashlib import getpass import platform import os import time ext = ".cex" path = os.path.realpath('') if platform.system() == 'Windows': # Verify operational system os.system('cls') else: os.system('clear') print('[*] Setting up files...') time.sleep(1) try: if not os...
70
22.13
96
12
430
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_d8ca2bc3ceb27a5f_79f281e3", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 39 ]
[ null ]
[ 25 ]
[ 42 ]
2024-11-18T20:52:09.434002+00:00
1,587,511,767,000
f564ab2f381dba2b18aebdb4f6305f4046f48d62
3
{ "blob_id": "f564ab2f381dba2b18aebdb4f6305f4046f48d62", "branch_name": "refs/heads/master", "committer_date": 1587511767000, "content_id": "588dabf78c195fb2f927d27f6f22e9c403a6d539", "detected_licenses": [ "MIT" ], "directory_id": "765b5974239e981df348a833da68aa0797697214", "extension": "py", "fi...
2.546875
stackv2
from django.shortcuts import render from rest_framework.views import APIView from django_redis import get_redis_connection import pickle, base64 from rest_framework.response import Response from rest_framework import status from .serializers import CartSerializer, CartSKUSerializer, CartDeleteSerializer, CartSelectedS...
278
32.53
104
20
2,304
python
[{"finding_id": "codeql_py/unsafe-deserialization_7e1a6254c5606b02_a1898fcd", "tool_name": "codeql", "rule_id": "py/unsafe-deserialization", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Unsafe deserialization depends on a [user-provided value](1).", "remediation": "", "locatio...
5
true
[ "CWE-502", "CWE-502", "CWE-502", "CWE-502", "CWE-502" ]
[ "py/unsafe-deserialization", "py/unsafe-deserialization", "py/unsafe-deserialization", "py/unsafe-deserialization", "py/unsafe-deserialization" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Unsafe deserialization depends on a [user-provided value](1).", "Unsafe deserialization depends on a [user-provided value](1).", "Unsafe deserialization depends on a [user-provided value](1).", "Unsafe deserialization depends on a [user-provided value](1).\nUnsafe deserialization depends on a [user-provided ...
[ 54, 106, 160, 205, 261 ]
[ null, null, null, null, null ]
[ 42, 42, 42, 42, 42 ]
[ 58, 77, 77, 77, 77 ]
2024-11-18T20:52:17.672620+00:00
1,330,912,780,000
30cacfd8e9f1e94cded24e4f26807590b618e7e3
3
{ "blob_id": "30cacfd8e9f1e94cded24e4f26807590b618e7e3", "branch_name": "refs/heads/master", "committer_date": 1330912780000, "content_id": "ad5d3a8fc32c9d19a45bcd8268b87745c18d202f", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "a081ae8f09e012adb04c17822e90615edcadd54f", "extension": "p...
3.28125
stackv2
''' Created on 2011-10-11 @author: jacekf Responsible for converting return values into cleanly serializable dict/tuples/lists for JSON/XML/YAML output ''' import collections from jinja2 import Template from UserDict import DictMixin xmlListTemplate = Template("""<list>{% for item in items %}<item>{% for prop,val in...
62
35.39
173
14
511
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_f519611a69bdabb3_e73bffc9", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 13, 14 ]
[ null, null ]
[ 19, 15 ]
[ 174, 122 ]
2024-11-18T20:52:28.896935+00:00
1,528,901,175,000
6775d7a775701f9304d56fec4e35d8b201a9b3b3
2
{ "blob_id": "6775d7a775701f9304d56fec4e35d8b201a9b3b3", "branch_name": "refs/heads/master", "committer_date": 1528901175000, "content_id": "8ad8d638c5a787a5dfc221cf75ab90212c0585a4", "detected_licenses": [ "Apache-2.0" ], "directory_id": "633ad490de1f314fa900bc9f53f615917086f3fd", "extension": "py"...
2.3125
stackv2
from http.server import BaseHTTPRequestHandler, HTTPServer from redis_queue import RedisQueue import jinja2 import os import json BASE_PATH = os.path.dirname(os.path.abspath(__file__)) __all__ = ["RenderTemplates"] class Singleton(object): _instance = None def __new__(cls, *args, **kwargs): if not...
81
29.33
114
19
526
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_67c5723dadccf505_d3bc6689", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 72 ]
[ 74 ]
[ 16 ]
[ 10 ]
2024-11-18T20:52:35.152849+00:00
1,490,197,142,000
84d1da7618913e565f96c33aabab2154f8d6d139
2
{ "blob_id": "84d1da7618913e565f96c33aabab2154f8d6d139", "branch_name": "refs/heads/master", "committer_date": 1490197142000, "content_id": "5292945c2e60eda33dd981bb27675366ebdfc541", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "f8bb2504a1648190c41ec7a442cc6a69d2b44e76", "extension": "p...
2.359375
stackv2
""" app --- Web Interface main module. @author: Dario Garigliotti @author: Shuo Zhang @author: Heng Ding """ from requests import ConnectionError, Timeout, get as requests_get from json import loads as j_loads from urllib.parse import quote # , quote_plus, unquote_plus from operator import itemgetter from flask imp...
327
33.4
121
17
2,691
python
[{"finding_id": "codeql_py/full-ssrf_6cdb23cd04ddee96_cc0d8558", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
1
true
[ "CWE-918" ]
[ "py/full-ssrf" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1)." ]
[ 144 ]
[ null ]
[ 13 ]
[ 55 ]
2024-11-18T19:14:32.193020+00:00
1,683,110,441,000
a5d77d84b5827e00d014abf6d04759ca3c995098
3
{ "blob_id": "a5d77d84b5827e00d014abf6d04759ca3c995098", "branch_name": "refs/heads/main", "committer_date": 1683110441000, "content_id": "86f32490dc89d44a440d3b88386253db92406fa6", "detected_licenses": [ "MIT" ], "directory_id": "ab5970f0d863534655e75ea0e87f3077986cbc6f", "extension": "py", "file...
2.5625
stackv2
import logging from django.http import JsonResponse from django.http import HttpResponseServerError from django.shortcuts import render from django.conf import settings from django.db.models import Avg from djaq.query import DjaqQuery as DQ from djaq.conditions import B from .models import Book from .forms import Bo...
79
26.35
128
21
484
python
[{"finding_id": "codeql_py/stack-trace-exposure_0e73da71fcf88313_f24d67e5", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 79 ]
[ null ]
[ 40 ]
[ 41 ]
2024-11-18T19:14:54.688602+00:00
1,553,027,291,000
0f034e859f5a12526f6526bf76e4c2965d8990f6
2
{ "blob_id": "0f034e859f5a12526f6526bf76e4c2965d8990f6", "branch_name": "refs/heads/master", "committer_date": 1553027291000, "content_id": "aca3969077a5cbfae861ef392de07be9ebd984ba", "detected_licenses": [ "MIT" ], "directory_id": "f196e655cf5f4dae774b3cc7f7f7d89a6af41678", "extension": "py", "fi...
2.453125
stackv2
from vote import Vote from helper import bin2hex, hex2bin, hash_block, hash_str, dump2file import Crypto import Crypto.Random from Crypto.PublicKey import RSA from Crypto.Signature import PKCS1_v1_5 from Crypto.Hash import SHA MINING_REWARD = 1 MAX_NONCE = 2 ** 32 MINING_DIFF = 4 # nonce start with n zeros def gen_i...
69
34.14
127
14
629
python
[{"finding_id": "codeql_py/weak-crypto-key_a7856d0c6bbd3179_00a466fc", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",...
1
true
[ "CWE-326" ]
[ "py/weak-crypto-key" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable." ]
[ 16 ]
[ null ]
[ 19 ]
[ 49 ]
2024-11-18T19:27:36.164941+00:00
1,448,303,532,000
60878bb83864c9974729345c5eb8829e241abb51
3
{ "blob_id": "60878bb83864c9974729345c5eb8829e241abb51", "branch_name": "refs/heads/master", "committer_date": 1448303532000, "content_id": "f7c07080a583f2c4fff109a0ccee50d56a38340a", "detected_licenses": [ "MIT" ], "directory_id": "62fc96d481cdd699fe721b093e5e036dd7873200", "extension": "py", "fi...
2.765625
stackv2
import urllib import re from bs4 import BeautifulSoup from bedetheque_lib import * fname_series = "bdt_series.txt" fname_parsed_series = "bdt_parsed_series.txt" re_strg_bd = "http://www.bedetheque.com/BD[^#]+" series = list() fhand = open(fname_series) print "Opening", fname_series i = 0 for line in fhand: line =...
66
24.05
76
12
481
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_754e906a81954c67_ea035f2f", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This string, which is used as a regular expression [here](1), has an unescaped '.' befor...
1
true
[ "CWE-020" ]
[ "py/incomplete-hostname-regexp" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This string, which is used as a regular expression [here](1), has an unescaped '.' before 'bedetheque.com/BD', so it might match more hosts than expected." ]
[ 8 ]
[ null ]
[ 15 ]
[ 48 ]
2024-11-18T19:27:40.776015+00:00
1,693,470,996,000
489255977e7b15db790e320d89b9992f19ddc864
3
{ "blob_id": "489255977e7b15db790e320d89b9992f19ddc864", "branch_name": "refs/heads/master", "committer_date": 1693470996000, "content_id": "89f87ac486b97d4cd87a69055d6f9eb885eb9308", "detected_licenses": [ "MIT" ], "directory_id": "13ea0050fab32bfac78acabe4a258868e953d45d", "extension": "py", "fi...
2.953125
stackv2
import requests from bs4 import BeautifulSoup import csv # get book list from csv book_list = [] with open('index.csv', newline='') as csv_file: spamreader = csv.reader(csv_file) for row in spamreader: book_list.append(row) book_list_len = len(book_list) print(book_list_len) i=0 while i < book_list_len: prin...
64
24.56
78
12
454
python
[{"finding_id": "codeql_py/request-without-cert-validation_ae60fba8c6eb8fcf_92e36f21", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 29 ]
[ null ]
[ 10 ]
[ 58 ]
2024-11-18T19:27:41.936353+00:00
1,541,915,363,000
f1b5d8280ea4dbb468f407c34c2c3f19aed65bc1
3
{ "blob_id": "f1b5d8280ea4dbb468f407c34c2c3f19aed65bc1", "branch_name": "refs/heads/master", "committer_date": 1541915363000, "content_id": "dc513dcc0d80ba1291e79cda0af72b30c831b598", "detected_licenses": [ "MIT" ], "directory_id": "0b8eef22e87294f15528cff7c1ffa4ba40266ae2", "extension": "py", "fi...
2.578125
stackv2
#! /usr/bin/env python # -*- coding: utf-8 -*- import os import re import sys import xlwt """ 使用方式: 1: 在项目根目录下运行,Excel文件输出在根目录下 python read_django 2: 指定项目的根目录路径,,Excel文件输出在根目录下 python read_django "D:\fixdq\model_read" 3: 指定项目的根目录路径,,指定Excel文件输出路径 python read_django "D:\fixdq\model_read" "C:\Users\...
87
27.51
90
20
723
python
[{"finding_id": "codeql_py/overly-large-range_3520261e3d4c239a_67231bcc", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
3
true
[ "CWE-020", "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "Suspicious character range that overlaps wi...
[ 65, 74, 74 ]
[ null, null, null ]
[ 49, 43, 63 ]
[ 52, 46, 66 ]
2024-11-18T19:38:45.590383+00:00
1,637,477,487,000
166c83c8da9a7e45becf7c9ae3364937a54618e0
3
{ "blob_id": "166c83c8da9a7e45becf7c9ae3364937a54618e0", "branch_name": "refs/heads/main", "committer_date": 1637477487000, "content_id": "3eebac3724e7b18946dc8187981a89682d7f004b", "detected_licenses": [ "MIT" ], "directory_id": "5292b03998384c0d2bb5858058892d7e45c5365b", "extension": "py", "file...
2.53125
stackv2
from flask import Flask, redirect, url_for, request from flask_cors import CORS, cross_origin from pathlib import Path from subprocess import PIPE, Popen import string import random def get_random_string(length): letters = string.ascii_lowercase result_str = ''.join(random.choice(letters) for i in range(length...
80
28.25
71
17
526
python
[{"finding_id": "codeql_py/command-line-injection_dffdeb78d88ac15e_aa3d00fb", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {...
3
true
[ "CWE-078", "CWE-078", "CWE-022" ]
[ "py/command-line-injection", "py/command-line-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This command line depends on a [user-provided value](1).", "This command line depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 60, 71, 13 ]
[ null, null, null ]
[ 27, 27, 8 ]
[ 30, 30, 22 ]
2024-11-18T20:31:09.234917+00:00
1,552,386,922,000
9b458b1a0612c775b32192adf5346e190da9a5e7
3
{ "blob_id": "9b458b1a0612c775b32192adf5346e190da9a5e7", "branch_name": "refs/heads/master", "committer_date": 1552386922000, "content_id": "83f40882b15591d203d3b626dc1b82197dd72768", "detected_licenses": [ "MIT" ], "directory_id": "b2bf738c73bcb6b64badb6727de4361f40fee290", "extension": "py", "fi...
2.625
stackv2
# -*- coding: utf-8 -*- """ :author: Grey Li (李辉) :url: http://greyli.com :copyright: © 2018 Grey Li :license: MIT, see LICENSE for more details. """ import click from flask import Flask, request, redirect, make_response, url_for import os app = Flask(__name__) # the minimal Flask application @app.ro...
60
19.83
66
14
331
python
[{"finding_id": "codeql_py/cookie-injection_606541a12857c780_97808cb4", "tool_name": "codeql", "rule_id": "py/cookie-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cookie is constructed from a [user-supplied input](1).", "remediation": "", "location": {"file_path": "...
2
true
[ "CWE-020", "CWE-079" ]
[ "py/cookie-injection", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cookie is constructed from a [user-supplied input](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 54, 34 ]
[ null, null ]
[ 27, 12 ]
[ 31, 40 ]
2024-11-18T20:31:42.698155+00:00
1,583,137,310,000
e3a02239fef400f4a14dbbeab04664c7bca7bb95
3
{ "blob_id": "e3a02239fef400f4a14dbbeab04664c7bca7bb95", "branch_name": "refs/heads/master", "committer_date": 1583137310000, "content_id": "0238956ad84a28e0131f6ecb6d053416d4457991", "detected_licenses": [ "MIT" ], "directory_id": "db6c286f042ba71d63dd8903619a161242f927db", "extension": "py", "fi...
2.578125
stackv2
import openpyxl as xl import pymorphy2 morph = pymorphy2.MorphAnalyzer() wto = xl.load_workbook("to.xlsx") wfrom = xl.load_workbook("from.xlsx") wsto = wto['Лист1'] wsfrom = wfrom['Лист1'] for row in wsfrom.iter_rows(min_row=2): for cell_from in row: if cell_from.column_letter == 'D': # фамилия ...
81
55.46
82
18
1,264
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_b34b61be70aba2c3_cbf2b527", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [phystech.edu](1) may be at an arbitrary position in th...
3
true
[ "CWE-020", "CWE-020", "CWE-020" ]
[ "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "The string [phystech.edu](1) may be at an arbitrary position in the sanitized URL.", "The string [phystech.edu](1) may be at an arbitrary position in the sanitized URL.", "The string [phystech.edu](1) may be at an arbitrary position in the sanitized URL." ]
[ 48, 55, 62 ]
[ null, null, null ]
[ 18, 18, 18 ]
[ 71, 71, 71 ]
2024-11-18T20:43:48.006872+00:00
1,464,180,888,000
fc8bbddec0e130a6603fc9e3d9550577c19ea7d5
3
{ "blob_id": "fc8bbddec0e130a6603fc9e3d9550577c19ea7d5", "branch_name": "refs/heads/master", "committer_date": 1464180888000, "content_id": "e0fbf01b291a1d240d57def3f8d49bcd8cd3c43a", "detected_licenses": [ "MIT" ], "directory_id": "dd10ae650db9fda3249d614ffa6eb0e24584c6ae", "extension": "py", "fi...
2.8125
stackv2
""" API Wrapper for Cachet https://cachethq.io Makes an authenticated connection, passes on API requests and makes the returned stuff be nice and pythony. """ from logging import getLogger from urllib.request import Request, urlopen from urllib.parse import urlencode from urllib.error import HTTPError, URLError...
408
38.57
95
16
3,458
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d2c703c482a38384_073ea3f1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 31 ]
[ null ]
[ 52 ]
[ 66 ]
2024-11-18T20:44:02.394111+00:00
1,535,384,920,000
bd324086e548fb14c8763304dca3ac6feb9383a7
2
{ "blob_id": "bd324086e548fb14c8763304dca3ac6feb9383a7", "branch_name": "refs/heads/master", "committer_date": 1535384920000, "content_id": "53d58619104d85349c4bd4f486bcdaf45b829219", "detected_licenses": [ "MIT" ], "directory_id": "42dc9805a8612a96599c0c3ba5a9f939ede89cbf", "extension": "py", "fi...
2.5
stackv2
#!/usr/bin/env python3 import base64, requests, readline, code, re, warnings warnings.filterwarnings('ignore') url = 'http://doublesigma.cf:10204/cgsh_data_center/account.php' # Login and get session id r = requests.post(url, data={'username': 'erda', 'password': '2017bad'}, verify=False) if r.text.find('Hello'): ...
64
24.64
86
11
470
python
[{"finding_id": "codeql_py/request-without-cert-validation_46b51706c740cc8a_88f074d4", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 31, 10 ]
[ null, null ]
[ 12, 5 ]
[ 60, 87 ]
2024-11-18T20:44:06.850314+00:00
1,616,858,686,000
009685676e6bde982c348c48370af17495fcad4f
3
{ "blob_id": "009685676e6bde982c348c48370af17495fcad4f", "branch_name": "refs/heads/master", "committer_date": 1616858686000, "content_id": "8fa0aa8007b67720fa0d7ae550d5c2f927e860d3", "detected_licenses": [ "MIT" ], "directory_id": "9ab5381a0e857aa225d5ad4cf187917dba6d2715", "extension": "py", "fi...
3.046875
stackv2
import sys import subprocess import network_list def main(SSID=None, Wordlist=None): #Some typechecking etc try: SSID = str(SSID) except: print("Need to supply a network SSID and a password list") return 0 try: dictionary = open(Wordlist, 'r') except: print(...
43
32.02
91
15
326
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c46b087788cc857b_5cc3acb3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 30 ]
[ null ]
[ 19 ]
[ 82 ]
2024-11-18T20:44:08.122777+00:00
1,572,194,676,000
44bb5118a0a68b306d0521f969789737c307b421
3
{ "blob_id": "44bb5118a0a68b306d0521f969789737c307b421", "branch_name": "refs/heads/master", "committer_date": 1572194676000, "content_id": "5eb03bfc2e7414d48b0b028488e0b7433266d0cd", "detected_licenses": [ "Apache-2.0" ], "directory_id": "76c26f8c969f3b125b6245a7a7b6036faf890185", "extension": "py"...
2.65625
stackv2
from flask import Flask, render_template, request from flask_wtf import FlaskForm from wtforms import TextAreaField from wtforms.validators import DataRequired from transliterate import transliterate_kn_iast class TransliterationForm(FlaskForm): name = "test" text = TextAreaField("text") app = Flask(__name...
33
27.18
80
12
203
python
[{"finding_id": "codeql_py/log-injection_39a0323749030c05_3aa0cf13", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 22 ]
[ null ]
[ 21 ]
[ 55 ]
2024-11-18T20:44:13.848481+00:00
1,633,542,783,000
c5a9ce3ae9fe53257b4e9e7eb8f34d93fce6cfed
3
{ "blob_id": "c5a9ce3ae9fe53257b4e9e7eb8f34d93fce6cfed", "branch_name": "refs/heads/master", "committer_date": 1633542783000, "content_id": "e44ddb7a03f15f93cc01cbcec3e3cb75d7303af3", "detected_licenses": [ "MIT" ], "directory_id": "cc2f65c75e9827b6557babdad64410624dc9a9a2", "extension": "py", "fi...
2.75
stackv2
import requests import click from AutoApiTestRunner.config import config import json @click.group() def cli(): """Command Line tool to access Drone.io API . One time setup command: . - auto init ...
117
35.18
126
18
755
python
[{"finding_id": "codeql_py/request-without-cert-validation_642b79644f267877_fe88ecaf", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 53 ]
[ 55 ]
[ 16 ]
[ 59 ]
2024-11-18T20:57:57.331458+00:00
1,578,158,819,000
53940f853b84af48febc2add9b77dd4038184739
3
{ "blob_id": "53940f853b84af48febc2add9b77dd4038184739", "branch_name": "refs/heads/master", "committer_date": 1578158819000, "content_id": "3dfb1b124df411646fbd17426a99b9401ba6f729", "detected_licenses": [ "MIT" ], "directory_id": "eee0fbee3ab2a9aebc2d4e6e7f323d76d15335e2", "extension": "py", "fi...
2.640625
stackv2
#!/usr/bin/env python # pylint: disable=missing-docstring """Bot for Webex Teams - Define decorator for bot - Show/Create/Delete webhook for Webex Teams Links: - user account: https://developer.webex.com/ - webhook api: https://developer.webex.com/docs/api/v1/webhooks """ import json import logging import os imp...
316
26.45
105
17
2,465
python
[{"finding_id": "codeql_py/request-without-cert-validation_7a5d294fe5456200_b0fe8a2d", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 140, 249 ]
[ null, null ]
[ 18, 19 ]
[ 76, 92 ]
2024-11-18T20:58:12.671826+00:00
1,567,185,160,000
b800ed1f1d7ae9bc32b936893af88a4c8e35bd9a
3
{ "blob_id": "b800ed1f1d7ae9bc32b936893af88a4c8e35bd9a", "branch_name": "refs/heads/master", "committer_date": 1567185285000, "content_id": "d63be9c69fc85c0b6ccbeed6a27a24e157d0a78a", "detected_licenses": [ "MIT" ], "directory_id": "6392363e7459764348e11259e3675db86d96860e", "extension": "py", "fi...
2.9375
stackv2
# -*- coding: utf-8 """Various I/O-related utilities""" __all__ = ('FileDescriptor', 'sendfile_all', 'isatty') import os import sys import errno class FileDescriptor: """A context manager for operating system file descriptors""" __slots__ = ('_fd',) def __init__(self, path, flags=os.O_RDONLY, mode=0o777): se...
91
18.7
76
13
475
python
[{"finding_id": "codeql_py/overly-permissive-file_215744bf59549f9f_6b9f8af6", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in open sets file to world writable.", "remediation": "", "location": {...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in open sets file to world writable." ]
[ 17 ]
[ null ]
[ 14 ]
[ 40 ]
2024-11-18T20:58:39.283440+00:00
1,569,817,100,000
3a9794de4f79eda2caf867624c7a5e9b6de85a74
3
{ "blob_id": "3a9794de4f79eda2caf867624c7a5e9b6de85a74", "branch_name": "refs/heads/master", "committer_date": 1569817100000, "content_id": "dc20f430d9c3ef699266e2061da3638532f7e4a7", "detected_licenses": [ "Unlicense" ], "directory_id": "c51b66298f2ae625856a1d92fe099365bd13187b", "extension": "py",...
2.71875
stackv2
import requests import logging from datetime import datetime from pydantic import BaseModel from fastapi import APIRouter from starlette.status import HTTP_200_OK from settings import Settings from typing import List _log = logging.getLogger(__name__) router = APIRouter() tags = ["messages"] settings = Settings() ...
57
21.33
88
12
311
python
[{"finding_id": "codeql_py/partial-ssrf_38a59895b70a8132_160f907d", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
3
true
[ "CWE-918", "CWE-117", "CWE-117" ]
[ "py/partial-ssrf", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 55, 41, 52 ]
[ null, null, null ]
[ 5, 15, 15 ]
[ 89, 45, 64 ]
2024-11-18T21:10:19.317316+00:00
1,540,406,425,000
eb4da9da41d2bd7b99aa2cf4b0de3219706c5a7e
3
{ "blob_id": "eb4da9da41d2bd7b99aa2cf4b0de3219706c5a7e", "branch_name": "refs/heads/master", "committer_date": 1540406425000, "content_id": "052df5c8d5e1fbdaefeefb656feb7f245f4d0fed", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "1a42caff489a91b74c82ca1d57e002f851b9fa06", "extension": "p...
3.15625
stackv2
import urllib from nltk.parse.stanford import StanfordDependencyParser from nltk.tokenize import sent_tokenize from gender_novels.corpus import Corpus from gender_novels.novel import Novel import os.path import time def get_parser(path_to_jar, path_to_models_jar): """ The jar files are too big to commit direct...
108
37.74
99
13
1,079
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_53106ac8e8e4071a_204a4929", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 102 ]
[ null ]
[ 11 ]
[ 37 ]
2024-11-18T21:10:22.615210+00:00
1,634,765,262,000
d0809098ec984b00b9d3ff97971b7287728859e7
3
{ "blob_id": "d0809098ec984b00b9d3ff97971b7287728859e7", "branch_name": "refs/heads/main", "committer_date": 1634765262000, "content_id": "c7dd765e80b875159b21cd6228d34e771cfdf35b", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "9eec87e5cc05fe4b072e5151f29fbd89bd7f47fa", "extension": "py"...
2.578125
stackv2
#!/usr/bin/env python """ Copyright 2016 Cisco Systems All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: * Redistributions of source code must retain the above copyright notice, this list of co...
50
41.5
85
10
465
python
[{"finding_id": "codeql_py/request-without-cert-validation_8690f954bf426dec_3afb1cab", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 43 ]
[ 44 ]
[ 16 ]
[ 55 ]
2024-11-18T21:10:22.905515+00:00
1,662,323,182,000
8947f05c5ac3e421b547c86598624a77a9d520af
3
{ "blob_id": "8947f05c5ac3e421b547c86598624a77a9d520af", "branch_name": "refs/heads/master", "committer_date": 1662323182000, "content_id": "3b0f99328c585e688b8e478414fcc9aa9c715220", "detected_licenses": [ "MIT" ], "directory_id": "ca5147efc3070a9c7e1e4acc312fb9866ade4bd4", "extension": "py", "fi...
2.625
stackv2
''' Created on Nov 6, 2018 @author: kumarsis ''' # -*- coding: cp1252 -*- # The execution starts from calling validate_Input(inputFilePath) in which ith path of input directory is given # this function checks if a file called common.bin is present or not.if it is present it checks if credentials are present # in encr...
323
51.24
156
32
2,914
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_1be4f3445eec1bfa_5305f76a", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.", "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text." ]
[ 240, 241 ]
[ null, null ]
[ 48, 48 ]
[ 56, 66 ]
2024-11-18T21:11:00.164488+00:00
1,463,758,914,000
29e4ad51c8d0180950c7ebbf802803abb4cc6cd6
3
{ "blob_id": "29e4ad51c8d0180950c7ebbf802803abb4cc6cd6", "branch_name": "refs/heads/master", "committer_date": 1463759422000, "content_id": "08da9a2201bf7dc794ae54b8cec9d01071c953f7", "detected_licenses": [ "MIT" ], "directory_id": "2fc5ad936cdb2a5818920d389fb80bcaed6bf30b", "extension": "py", "fi...
3.015625
stackv2
""" Virtual mail administration models. """ from __future__ import absolute_import, unicode_literals import base64 import hashlib import random import string from django.core.validators import validate_email from django.db import models from django.utils.encoding import python_2_unicode_compatible from django.utils....
165
38.3
87
17
1,405
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_9dc85cbe3295e39f_a0d0e6e5", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expen...
[ 73 ]
[ null ]
[ 18 ]
[ 46 ]
2024-11-18T21:11:01.895210+00:00
1,571,247,258,000
ea3768168f20053dd60fa6d69781f0770c999985
3
{ "blob_id": "ea3768168f20053dd60fa6d69781f0770c999985", "branch_name": "refs/heads/master", "committer_date": 1571247258000, "content_id": "6ce5298247d8df8bb178dd136df086aa438cf3e0", "detected_licenses": [ "MIT" ], "directory_id": "0330131ba8fefe4f84b54100f1ed233e1b0750bf", "extension": "py", "fi...
2.65625
stackv2
# # Copyright (C) 2019 by # Divyansh Gupta, Harry Karwasra, Nandana Varshney, Nikhil Ramakrishnan # # This project is licensed under the MIT License import getpass import sys import ftp import sql import utils conn = None def main(): '''Main Function''' # Print our logo print(utils.get_logo()) pr...
210
27.3
75
16
1,441
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_406081c91d6943bf_0aef252a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 185 ]
[ null ]
[ 26 ]
[ 29 ]
2024-11-18T21:11:03.343260+00:00
1,607,567,426,000
3b63263024794f0da3d220ac915011779a2df611
3
{ "blob_id": "3b63263024794f0da3d220ac915011779a2df611", "branch_name": "refs/heads/main", "committer_date": 1607567426000, "content_id": "d89061ae0b572d0866408002bf3933e2987e5875", "detected_licenses": [ "MIT" ], "directory_id": "5bc865d508c48345be3afb6b11984fd0831bb3ee", "extension": "py", "file...
2.9375
stackv2
__author__ = 'Brooke Porter' __class__ = 'CSC 664 Multimedia Systems (Undergraduate)' __school__ = 'San Francisco State University' __professor__ = 'Dr. Rahul Singh' __file__ = 'sentiment.py' """ This file is used to parse the tweets retrieved from app.py into drug-related tweets with positive sentiment. It uses a Nai...
317
41.1
119
17
2,904
python
[{"finding_id": "codeql_py/overly-large-range_d71f264984460a74_6c28698f", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 101 ]
[ null ]
[ 62 ]
[ 65 ]
2024-11-18T21:11:04.206114+00:00
1,588,728,599,000
eba1ed20deae98c0a9ef1384e462e0b70343878c
3
{ "blob_id": "eba1ed20deae98c0a9ef1384e462e0b70343878c", "branch_name": "refs/heads/master", "committer_date": 1588728599000, "content_id": "cbfff5cdba6f9e1a6ac7f652abfdfd423a281534", "detected_licenses": [ "MIT" ], "directory_id": "c2192e39c6438e3357c1d06cf1e0422ce56d1ff8", "extension": "py", "fi...
3
stackv2
""" Sample script to log the battery, temperature, humidity and dew point from all available Smart Gadgets to separate CSV files. The MAC address of a Smart Gadget is used as the name of the file. Sometimes the number of Smart Gadgets discovered during a Bluetooth scan is less than the number expected. This example sc...
92
35.54
98
20
748
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7b7791412214ad96_4edb9a1f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 62 ]
[ null ]
[ 19 ]
[ 94 ]
2024-11-18T21:11:13.974736+00:00
1,590,202,409,000
efaae0c92a291447d79f597bcc7f47dcc8cfed8a
2
{ "blob_id": "efaae0c92a291447d79f597bcc7f47dcc8cfed8a", "branch_name": "refs/heads/master", "committer_date": 1590202409000, "content_id": "c8dcc73f96ed22974e98f773e2debe8120c0d8e6", "detected_licenses": [ "MIT" ], "directory_id": "6ac4ea887a6cfd27054e899871a44eedf2120831", "extension": "py", "fi...
2.34375
stackv2
import boto3 import botocore import os import sys def get_ecr_clients(settings): clients = [] for region in settings['regions']: clients.append(boto3.client('ecr', aws_access_key_id=settings['access_key_id'], aws_secret_access_key=settings['secret_access_key'], region_name=region )) ...
119
23.04
72
17
695
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_52d4a919edbc1594_4c071961", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 104, 108 ]
[ null, null ]
[ 25, 17 ]
[ 41, 23 ]
2024-11-18T19:03:29.381163+00:00
1,556,369,006,000
9a49a8e5e06fd58a2dc93a3641f7cb8b3f18082b
3
{ "blob_id": "9a49a8e5e06fd58a2dc93a3641f7cb8b3f18082b", "branch_name": "refs/heads/master", "committer_date": 1556369006000, "content_id": "44174167a4a2a6bdcfb52bbae559f176826fe3c5", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "861a26c8e4ecb17a4d8e12d1f0514a1b1ccab64e", "extension": "p...
2.59375
stackv2
import pytz import re import requests from datetime import datetime, timedelta from io import BytesIO from PIL import Image import logging import logging.config import os try: import configparser except: from six.moves import configparser # Project Zakolm # https://github.com/zakolm/screen # Fetch Himawari-8 ...
91
28.44
117
16
747
python
[{"finding_id": "codeql_py/overly-large-range_d5f4a83512ef2e36_04fe939a", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo...
3
true
[ "CWE-020", "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 82, 82, 82 ]
[ null, null, null ]
[ 47, 54, 61 ]
[ 50, 57, 64 ]
2024-11-18T19:03:41.378123+00:00
1,685,893,278,000
70665afd53eef48cc94f919f1398e4cce4d5a5c7
3
{ "blob_id": "70665afd53eef48cc94f919f1398e4cce4d5a5c7", "branch_name": "refs/heads/master", "committer_date": 1685893278000, "content_id": "e82702b98f1569fee8a2b17f3aaba1cf1c8355fe", "detected_licenses": [ "MIT" ], "directory_id": "f5b99d59741af88067a78383cf2df94c06fe3710", "extension": "py", "fi...
2.8125
stackv2
#!/usr/bin/python # -*- coding: utf-8 -*- import urllib import urllib2 import hashlib import email.message import email.encoders import time from collections import namedtuple Metadata = namedtuple("Metadata", ['url', 'name', 'part_data']) Part = namedtuple("Part", ['sid', 'input_file', 'source', 'name']) def check...
251
29.96
134
15
1,822
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_9eacfd6802c2e636_1b9bd913", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expen...
[ 151 ]
[ null ]
[ 17 ]
[ 45 ]
2024-11-18T19:28:48.406617+00:00
1,622,106,169,000
352af84da730557b53014bf2225357f2f57b70a3
3
{ "blob_id": "352af84da730557b53014bf2225357f2f57b70a3", "branch_name": "refs/heads/master", "committer_date": 1622106169000, "content_id": "8e949f28145f67c098bc0bf689897226e2344572", "detected_licenses": [ "MIT" ], "directory_id": "97570819e3b1f65a09793ca7ea1c8957915f527e", "extension": "py", "fi...
2.734375
stackv2
import os import hashlib """ 此文件是云盘的配置文件。 """ class CloudStorageSetting(object): """ 配置类的定义,修改以配置。 """ # 云盘存储目录的位置 STORAGE_PATH = "E:\\cloud_storage" # 工作临时目录 TEMP_PATH = "E:\\cloud_storage_temp" def __init__(self, username=None): if username: md5 = hashlib.md5(us...
28
23.43
68
17
181
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_1e72fa7d05f5cf14_eb1cde00", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (id)](2) is used in a hashing algorithm (MD5) that is insecure." ]
[ 20 ]
[ null ]
[ 31 ]
[ 55 ]
2024-11-18T19:28:49.876466+00:00
1,500,983,398,000
ef888fcc6dc16f0c5b7aac366397d3bc7ae6c434
2
{ "blob_id": "ef888fcc6dc16f0c5b7aac366397d3bc7ae6c434", "branch_name": "refs/heads/master", "committer_date": 1500983398000, "content_id": "0cb6ce449a2f3d62c070bf71ea50dc8f6a897498", "detected_licenses": [ "MIT" ], "directory_id": "dbe6178efb609a5ad11d3a51424fcc586600d20a", "extension": "py", "fi...
2.328125
stackv2
#!/usr/bin/env python from __future__ import absolute_import from __future__ import division from __future__ import print_function try: import cStringIO as StringIO except: from io import StringIO import hashlib import json import math import os import re import shlex import subprocess import sys import tarfi...
344
31.72
79
18
2,730
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_cde563a35313021f_49bde494", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'google.com/uc', so it might match m...
2
true
[ "CWE-020", "CWE-022" ]
[ "py/incomplete-hostname-regexp", "py/tarslip" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'google.com/uc', so it might match more hosts than expected.", "This file extraction depends on a [potentially untrusted source](1)." ]
[ 93, 142 ]
[ null, null ]
[ 23, 13 ]
[ 60, 17 ]
2024-11-18T19:28:53.974397+00:00
1,683,500,152,000
628196c26ce1a543cc50909e5f3804cf0f5adacc
3
{ "blob_id": "628196c26ce1a543cc50909e5f3804cf0f5adacc", "branch_name": "refs/heads/master", "committer_date": 1683501722000, "content_id": "4d0be40f0d954e770e32ab48494fe0cbdd899b08", "detected_licenses": [ "MIT" ], "directory_id": "6f24d152d77efa603c31059b7dea841d5d2bd51a", "extension": "py", "fi...
2.640625
stackv2
import os from datetime import datetime import gzip from functools import lru_cache import boto3 from prettytable import PrettyTable # imported from Lambda layer # PrettyTable DASH_TABLE = PrettyTable(['Type', 'Count']) COUNTRY_TABLE = PrettyTable(['Country', 'Number of Messages']) PHONE_NUMBER_TABLE = PrettyTable(['...
168
30.22
94
17
1,304
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_dac69acf163fd70f_cbed0bde", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 163 ]
[ null ]
[ 15 ]
[ 33 ]
2024-11-18T19:39:33.391427+00:00
1,492,018,315,000
6dc92dd755feb17ff276186851deb8c7b19f7562
3
{ "blob_id": "6dc92dd755feb17ff276186851deb8c7b19f7562", "branch_name": "refs/heads/master", "committer_date": 1492018315000, "content_id": "6093987fe7a604895877ae7b2a19ebad520a310d", "detected_licenses": [ "MIT" ], "directory_id": "1f635511ae70d7c2560e151b8990750740d1bf4f", "extension": "py", "fi...
2.71875
stackv2
''' Created on Sep 13, 2016 @author: Rafael Carvalho (rafacarv@cisco.com) ''' from flask import Flask, request import json import traceback import os app = Flask(__name__) @app.route('/') def hello(): """Run your server and go browse to the root of your server and see if it is working. It shows the message Hell...
49
27.78
145
16
314
python
[{"finding_id": "codeql_py/reflective-xss_0ee917a3cf678973_da91e28c", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 45 ]
[ null ]
[ 13 ]
[ 19 ]
2024-11-18T19:39:53.990223+00:00
1,471,472,598,000
8109f211e686efca6aa501075c6c76d280fc283e
3
{ "blob_id": "8109f211e686efca6aa501075c6c76d280fc283e", "branch_name": "refs/heads/master", "committer_date": 1471472598000, "content_id": "72881bbcc670bbaede8d42280fea146e0bccefea", "detected_licenses": [ "MIT" ], "directory_id": "d691e259566a815cd35eeb705912f382386b328a", "extension": "py", "fi...
2.84375
stackv2
from flask import request, jsonify, Blueprint from .. import piglatin main = Blueprint('main', __name__) @main.route('/', methods=['GET', 'POST']) def index(): response = """ Please use the endpoint /translate to access this api. Usage: "{}translate?text=Translate+this+text+into+Piglatin." ...
29
23.21
68
14
164
python
[{"finding_id": "codeql_py/reflective-xss_33da68ea1538109a_edec5175", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 16 ]
[ null ]
[ 12 ]
[ 20 ]
2024-11-18T20:18:01.638342+00:00
1,590,917,255,000
ee7a024354514ec99b5d7b42110a109a71379522
2
{ "blob_id": "ee7a024354514ec99b5d7b42110a109a71379522", "branch_name": "refs/heads/master", "committer_date": 1590917255000, "content_id": "b887c5d71f8b0cf6e069b0ce6a0e77fcf0677181", "detected_licenses": [ "MIT" ], "directory_id": "8ebd0447776ba79bf1d631f8f1bd944e48b24b6f", "extension": "py", "fi...
2.5
stackv2
import phonenumbers import arrow from flask import Blueprint, render_template, url_for, flash, redirect, request, abort from flask_login import login_required from flaskdocs.models import Staff, Documents from flaskdocs.staff.forms import AddDocsForm, AddStaffForm, EditStaffForm from flaskdocs import db staff = Bluepr...
161
40.21
154
20
1,468
python
[{"finding_id": "codeql_py/url-redirection_e9281ed7502f6e83_7cfdf99a", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
5
true
[ "CWE-601", "CWE-601", "CWE-601", "CWE-601", "CWE-601" ]
[ "py/url-redirection", "py/url-redirection", "py/url-redirection", "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends o...
[ 79, 96, 102, 106, 109 ]
[ null, null, null, null, null ]
[ 21, 33, 37, 37, 33 ]
[ 37, 49, 53, 53, 49 ]
2024-11-18T20:18:07.691504+00:00
1,573,499,507,000
456267ce5e5576802bde728c7ba0b3edf168b4ce
3
{ "blob_id": "456267ce5e5576802bde728c7ba0b3edf168b4ce", "branch_name": "refs/heads/master", "committer_date": 1573499507000, "content_id": "ff0b43116af54d5809f2dee4170ef13b2b29be76", "detected_licenses": [ "MIT" ], "directory_id": "252d986d3c9da92877b06108d0c0319becba7e88", "extension": "py", "fi...
2.953125
stackv2
import datetime import requests from typing import Optional base_url = 'https://big-old-fashioned-bridge.anvil.app/_/api/' def main(): auth_data = get_auth_data() api_key = authenticate(auth_data) if not api_key: print("Invalid login") return print(api_key) data = get_user_data()...
76
21.39
68
11
418
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fe3e0d516283733e_3d0231b1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 15 ]
[ null ]
[ 11 ]
[ 18 ]
2024-11-18T20:18:18.305854+00:00
1,615,366,657,000
8159784277f094b183d0354b44b9f43b480dd5f4
3
{ "blob_id": "8159784277f094b183d0354b44b9f43b480dd5f4", "branch_name": "refs/heads/master", "committer_date": 1615366657000, "content_id": "3eb7091dd70977d75e168e1ca519d18f31228d8f", "detected_licenses": [ "MIT" ], "directory_id": "d7c50e14db9ec0ee5668b694969df473443df93e", "extension": "py", "fi...
3.140625
stackv2
import getpass from credentials import Credentials from user import User import pyperclip import string import random def create_user(f_name,l_name,u_name,psswd): ''' A funtcion to create a new user. ''' new_user = User(f_name, l_name,u_name, psswd) return new_user def save_user(User): ''' ...
197
35.51
92
21
1,443
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8d24d33cc5bf8207_7a8a10dc", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
5
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensi...
[ 133, 144, 150, 158, 185 ]
[ null, null, null, null, null ]
[ 23, 23, 23, 31, 27 ]
[ 51, 63, 51, 70, 60 ]
2024-11-18T20:18:30.880769+00:00
1,469,525,578,000
98faafee8841b93b85612aab00abede961fee3f7
2
{ "blob_id": "98faafee8841b93b85612aab00abede961fee3f7", "branch_name": "refs/heads/master", "committer_date": 1469525578000, "content_id": "327db8d460be7ab4423caaa6d341319c49e1152c", "detected_licenses": [ "MIT" ], "directory_id": "92c27adc563b3c8f96f73a22c4fae9e86fdcd4f3", "extension": "py", "fi...
2.421875
stackv2
from template_snippets import * from os.path import join import sys import argparse from jinja2 import Environment, FileSystemLoader def get_parameters(): parser = argparse.ArgumentParser() parser.add_argument("-i", "--id", dest="cnn_id", help="Name of the CNN") parser.add_argument("-a", "--arch", dest="...
216
36.76
93
16
1,797
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_8052620371484a75_684884d2", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 21, 32 ]
[ 22, null ]
[ 14, 14 ]
[ 43, 43 ]