added
stringlengths
32
32
created
int64
1,244B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.25
source
stringclasses
1 value
text
stringlengths
324
20.1k
num_lines
int64
16
598
avg_line_length
float64
15.1
58.3
max_line_length
int64
33
179
ast_depth
int64
8
39
length
int64
101
3.8k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.1k
265k
sast_codeql_findings_count
int64
1
45
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
45
rule_ids
listlengths
1
45
confidences
listlengths
1
45
severities
listlengths
1
45
messages
listlengths
1
45
line_starts
listlengths
1
45
line_ends
listlengths
1
45
column_starts
listlengths
1
45
column_ends
listlengths
1
45
2024-11-18T20:31:25.795104+00:00
1,616,963,985,000
78388d3eb547f55cf1dffe7a13bd1321020f6967
3
{ "blob_id": "78388d3eb547f55cf1dffe7a13bd1321020f6967", "branch_name": "refs/heads/main", "committer_date": 1616963985000, "content_id": "1eab881fce150ec34aaf8b04d6edb99f03f5d14a", "detected_licenses": [ "MIT" ], "directory_id": "c2d3c690a4b21091eed6039b778baa286d428a5d", "extension": "py", "file...
2.796875
stackv2
""" This script generates an OAuth2 refresh token for the Google Fit API. Use this script to generate a 'secrets' JSON blob for the Fivetran connector. """ import argparse import json import requests from urllib.parse import urlparse, parse_qs SCOPES = 'https://www.googleapis.com/auth/fitness.activity.read' REDIR...
77
29.09
79
12
542
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c70b02ce60c52c7f_ff116872", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text." ]
[ 66 ]
[ null ]
[ 11 ]
[ 40 ]
2024-11-18T20:31:50.052328+00:00
1,506,438,863,000
1d7190072519eacd894b775d3c4a703b5cd386a2
3
{ "blob_id": "1d7190072519eacd894b775d3c4a703b5cd386a2", "branch_name": "refs/heads/master", "committer_date": 1506438863000, "content_id": "0a287122fa489412a101ff3a451c84a14ca5cd57", "detected_licenses": [ "MIT" ], "directory_id": "2d64d46d2b8afb8332622618b8e944ffc9ba62bd", "extension": "py", "fi...
2.515625
stackv2
import os import re from flask import Flask, render_template, redirect, url_for, abort, request from create_post import read_file, md_to_html, get_file_date from ConfigParser import SafeConfigParser from datetime import date, datetime app = Flask(__name__) parser = SafeConfigParser() parser.read('config.txt') posts =...
124
32.69
101
14
972
python
[{"finding_id": "codeql_py/path-injection_a64d2c71a45afaf4_97dcc9cd", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 113 ]
[ null ]
[ 44 ]
[ 48 ]
2024-11-18T20:31:50.368768+00:00
1,643,884,757,000
791756570424b0dceb0ee7cff4ed31a1c91fcc94
3
{ "blob_id": "791756570424b0dceb0ee7cff4ed31a1c91fcc94", "branch_name": "refs/heads/master", "committer_date": 1643884757000, "content_id": "50b2bd18f086b828da0cb8186db7e1c1172714d9", "detected_licenses": [ "MIT" ], "directory_id": "259460171c62f27eaa7bf2d03e25f1e9f0ed118b", "extension": "py", "fi...
2.71875
stackv2
import random import jinja2 jinja_env = jinja2.Environment() jinja_env.undefined = jinja2.StrictUndefined # Fix an issue where 'random' filter is being inlined, resulting in the # same value being generated every time. # cf https://github.com/pallets/jinja/pull/478 @jinja2.pass_context def do_random(context, seq)...
25
22.44
71
12
138
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_1478b2c0ba7f08c0_e6d039da", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 6 ]
[ null ]
[ 13 ]
[ 33 ]
2024-11-18T20:53:38.832029+00:00
1,596,493,863,000
18db63aeb018cdf35e882d142d6029cb77b7adbf
3
{ "blob_id": "18db63aeb018cdf35e882d142d6029cb77b7adbf", "branch_name": "refs/heads/master", "committer_date": 1596493863000, "content_id": "a1bff860c5345364212d0660d73ac421a98ad5ed", "detected_licenses": [ "CC0-1.0" ], "directory_id": "de6660c1649f7fb723b5c9ad63e2bb97d66b4edd", "extension": "py", ...
2.5625
stackv2
import urllib.request from bs4 import BeautifulSoup import csv from time import sleep import requests import ssl ssl._create_default_https_context = ssl._create_unverified_context manifest_arr = [] def scrape_for_page(base_url): flg = True page = 1 while flg: sleep(1) url = base_url +...
75
21.83
77
17
448
python
[{"finding_id": "codeql_py/request-without-cert-validation_9218d07399f79c6a_a266ff11", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 27 ]
[ null ]
[ 13 ]
[ 44 ]
2024-11-18T21:10:25.052788+00:00
1,593,189,160,000
37b5bc26d420ef012827e8d7db24acd23f8ab6c8
2
{ "blob_id": "37b5bc26d420ef012827e8d7db24acd23f8ab6c8", "branch_name": "refs/heads/master", "committer_date": 1593189160000, "content_id": "db1117f4654e4dd0f7bb81fa2987014d923792a2", "detected_licenses": [ "MIT" ], "directory_id": "03a19f1b29630ee2ee1a028eb281e2c8addf7759", "extension": "py", "fi...
2.46875
stackv2
from flask import Flask, render_template, send_file, send_from_directory, request import os import stat app = Flask(__name__) app.config['UPLOAD_FOLDER'] = 'C:/Users/MAHIEDHAR NANDYALA/Desktop/' app.config['MAX_CONTENT-PATH'] = 500 # Make the WSGI interface available at the top level so wfastcgi can get it. wsgi_app ...
57
32.18
89
16
444
python
[{"finding_id": "codeql_py/flask-debug_be1066790b4c2e8f_3f23de04", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
6
true
[ "CWE-215", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022" ]
[ "py/flask-debug", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-pro...
[ 57, 32, 33, 38, 44, 53 ]
[ null, null, null, null, null, null ]
[ 5, 22, 31, 23, 46, 16 ]
[ 49, 36, 45, 37, 54, 26 ]
2024-11-18T21:11:16.981622+00:00
1,378,538,826,000
64595eca07a54760db3b4b7684f853e020a225ba
2
{ "blob_id": "64595eca07a54760db3b4b7684f853e020a225ba", "branch_name": "refs/heads/master", "committer_date": 1378538826000, "content_id": "a5ded05e0345e600b1b03fdd89d5b02961ff121d", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "b8581b4aa5e06e85ccd274f7980c9f7d8be174fe", "extension": "p...
2.328125
stackv2
import httplib import logging import socket import requests import requests.exceptions import requests.packages.urllib3.exceptions from tasa.store import Queue from tasa.worker import BaseWorker CONNECTION_TIMEOUT = 10 logger = logging.getLogger(__name__) class PrecheckHTTP(BaseWorker): qinput = Queue('preche...
102
35.38
80
19
807
python
[{"finding_id": "codeql_py/request-without-cert-validation_cc358f5f34b5a33f_017f644e", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 26, 68 ]
[ 27, 69 ]
[ 17, 17 ]
[ 43, 43 ]
2024-11-18T21:47:40.639449+00:00
1,570,611,266,000
c801a122fc68ce228035e4cdebf80f3ca078e5b4
2
{ "blob_id": "c801a122fc68ce228035e4cdebf80f3ca078e5b4", "branch_name": "refs/heads/master", "committer_date": 1570611266000, "content_id": "c805c239f9963d1aa645dd78dde14e2531dc1495", "detected_licenses": [ "Apache-2.0" ], "directory_id": "a345cea74f69f61d5b29f7ac8b2fe031df9e9519", "extension": "py"...
2.375
stackv2
#! -*- coding: utf-8 -*- import json import logging import tornado.web from tornado.httpserver import HTTPServer from segment import Segment PORT = 3333 logging.basicConfig(level='INFO') segment = Segment(words_path='/data/gump/project-data/machinery_segment/word_tree.json') class MachinerySegmentHandler(tornado.we...
43
31.02
88
16
300
python
[{"finding_id": "codeql_py/log-injection_6ce77945d74f1997_87b94a21", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 21 ]
[ null ]
[ 30 ]
[ 66 ]
2024-11-18T21:47:42.627288+00:00
1,532,849,436,000
f5584134e5445dfabe5cb756c18fdea281454e47
3
{ "blob_id": "f5584134e5445dfabe5cb756c18fdea281454e47", "branch_name": "refs/heads/master", "committer_date": 1532849436000, "content_id": "5006d6ad58ee612d04045d071ab63cf5ffdc2900", "detected_licenses": [ "MIT" ], "directory_id": "8e345f38d01009811aa29aebdbde4cdaf8d56b5f", "extension": "py", "fi...
2.625
stackv2
from logging import basicConfig, getLogger, DEBUG, INFO import os, sys, json from SimpleHTTPServer import SimpleHTTPRequestHandler import SocketServer import gitlab basicConfig(level=DEBUG) getLogger('urllib3').setLevel(INFO) logger = getLogger(__name__) # --------------------------- # Gitlab service # --------------...
137
29.38
91
16
1,003
python
[{"finding_id": "codeql_py/log-injection_cf2c0a51f7be59c7_281b67f0", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
3
true
[ "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 54, 58, 58 ]
[ null, null, null ]
[ 40, 42, 49 ]
[ 52, 47, 54 ]
2024-11-18T21:47:43.663293+00:00
1,607,314,005,000
bc14cb99d2a86964ec0a75ee5f0cec891df2beba
2
{ "blob_id": "bc14cb99d2a86964ec0a75ee5f0cec891df2beba", "branch_name": "refs/heads/master", "committer_date": 1607314005000, "content_id": "67edef1b4281b8eecd1fb867ec7c4251a6833390", "detected_licenses": [ "Apache-2.0" ], "directory_id": "5bf1bc86ebc43462502df4092fb120060e040967", "extension": "py"...
2.421875
stackv2
#!/usr/bin/env python # # utility that creates a folder that contains the common folder and # all the files of the example # from sys import argv import re import sys import os import os.path path = os.getcwd() actual_folder = path folder_created = path + '_backup' route = argv[0].split('common') if(not os.path.i...
75
20.91
114
20
464
python
[{"finding_id": "codeql_py/overly-permissive-file_cd9d50cea1974f5c_bcdf5a88", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world writable." ]
[ 23 ]
[ null ]
[ 2 ]
[ 33 ]
2024-11-18T22:28:56.441099+00:00
1,595,209,071,000
28d5f32afbefbb5137a0c94851de809cfdb40cb4
3
{ "blob_id": "28d5f32afbefbb5137a0c94851de809cfdb40cb4", "branch_name": "refs/heads/master", "committer_date": 1595209071000, "content_id": "cf4e703d59f728c372edc257aee99590897aa084", "detected_licenses": [ "MIT" ], "directory_id": "d9e6190c487dea22e038658d6acc4af77ce3ff0a", "extension": "py", "fi...
2.578125
stackv2
import wk class NodeMetaClass(type): def __new__(cls, name, bases, attrs): debug=False if name == None: debug=True dict_attrs=['_attrs','environment'] for name in dict_attrs: if name in attrs.keys(): _attrs = attrs[name] tmp_d...
417
26.63
132
20
2,458
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_838f9f8586d2be3b_9fc87d48", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 160 ]
[ null ]
[ 15 ]
[ 28 ]
2024-11-18T22:29:35.770323+00:00
1,347,995,879,000
a2a3952272cfe24836c4193594125ddfa79f56a6
3
{ "blob_id": "a2a3952272cfe24836c4193594125ddfa79f56a6", "branch_name": "refs/heads/master", "committer_date": 1347995879000, "content_id": "ebde24af41c32559d664d4d8af03b19f0abb2912", "detected_licenses": [ "MIT" ], "directory_id": "30e70a7b27351672274fb273e7885d8bfb48df16", "extension": "py", "fi...
2.875
stackv2
from oauth import oauth from oauthtwitter import OAuthApi import pprint consumer_key = "" # TODO put your consumer_key consumer_secret = ""# TODO put your consumer_secret twitter = OAuthApi(consumer_key, consumer_secret) # Get the temporary credentials for our next few calls temp_credentials = twitter.getRequestToke...
21
34.67
71
8
160
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1f14ec5b1650bc54_4609ef4f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text." ]
[ 19, 20 ]
[ null, null ]
[ 7, 7 ]
[ 52, 66 ]
2024-11-18T22:29:37.758074+00:00
1,590,731,292,000
4f302e977ca9b8226e2af75fe1118dfd58cbb446
3
{ "blob_id": "4f302e977ca9b8226e2af75fe1118dfd58cbb446", "branch_name": "refs/heads/master", "committer_date": 1590731292000, "content_id": "f9f4a0b4d6afa6a657d0fe33389f9dd8104793d3", "detected_licenses": [ "MIT" ], "directory_id": "f0854088824dce4c897c66788cbd5edf5671925a", "extension": "py", "fi...
2.84375
stackv2
import re import nltk from typing import List # TODO: Fix pathing of this try: nltk.data.find('stopwords') nltk.data.find('wordnet') nltk.data.find('averaged_perceptron_tagger') except LookupError: nltk.download('stopwords') nltk.download('wordnet') nltk.download('averaged_perceptron_tagger') ...
230
31.77
95
21
1,851
python
[{"finding_id": "codeql_py/overly-large-range_1aceb75bdfe717da_f3166992", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "remediatio...
4
true
[ "CWE-020", "CWE-020", "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range ...
[ 84, 84, 84, 84 ]
[ null, null, null, null ]
[ 26, 29, 32, 41 ]
[ 30, 33, 36, 45 ]
2024-11-18T22:40:26.220487+00:00
1,553,017,635,000
34b4c7a1c76d6ab3be86bd4b4305105356ecc929
2
{ "blob_id": "34b4c7a1c76d6ab3be86bd4b4305105356ecc929", "branch_name": "refs/heads/master", "committer_date": 1553017635000, "content_id": "15e2ca20e82b2e316bfb57eac19af569eb30472a", "detected_licenses": [ "Apache-2.0" ], "directory_id": "d41f2ecb7e44dc9693696be204e63eac731c308d", "extension": "py"...
2.46875
stackv2
from __future__ import print_function import base64 import json from shutil import which from time import sleep from blessings import Terminal from kubernetes import client, config from kubernetes.client.rest import ApiException from nephos.helpers.misc import execute, input_files, pretty_print TERM = Terminal() ...
320
31.33
104
17
2,350
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fc4cd28c8e4c432d_defd9844", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 253 ]
[ null ]
[ 15 ]
[ 74 ]
2024-11-18T22:40:33.782903+00:00
1,610,988,347,000
9de1106a5491a9266fb0fdc8bf29a5cc168e0bc3
3
{ "blob_id": "9de1106a5491a9266fb0fdc8bf29a5cc168e0bc3", "branch_name": "refs/heads/main", "committer_date": 1610988347000, "content_id": "376c6a1b10bb5ce4e3b9292beeafe96baaf61830", "detected_licenses": [ "MIT" ], "directory_id": "82011c23c8c874223bb22a41d94381a5dbd84875", "extension": "py", "file...
2.625
stackv2
import os import csv from flask import Flask, request server = Flask(__name__) @server.route("/analyze", methods = ['POST']) def analyze(): data = request.get_json(force=True) file_name = data['input_file_name'] with open("../" + file_name) as f: return f.read(), 200 @server.route("/status/<id>") ...
28
31.68
122
16
268
python
[{"finding_id": "codeql_py/path-injection_a2f181e260271d57_c30a81de", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 10, 17 ]
[ null, null ]
[ 15, 15 ]
[ 32, 70 ]
2024-11-18T22:41:01.561585+00:00
1,518,643,136,000
285d3c031064b5cf17e4552ae10818fe237be12e
3
{ "blob_id": "285d3c031064b5cf17e4552ae10818fe237be12e", "branch_name": "refs/heads/master", "committer_date": 1518643136000, "content_id": "ba3b1b75035c8c739c2733d45b223b8558f9a6d3", "detected_licenses": [ "Apache-2.0" ], "directory_id": "31809f2d661ff02bd3d4b273b2925c28d6760b88", "extension": "py"...
2.609375
stackv2
import os import random from io import BytesIO from flask import Flask, jsonify, helpers from PIL import Image, ImageDraw, ImageFont app = Flask(__name__) STATIC_IMAGE_PATH = "static/images" @app.route("/images/<string:category>/<string:width_height>", methods=['GET']) def maker_resize(category, width_height): ...
160
23.47
98
13
947
python
[{"finding_id": "codeql_py/flask-debug_5275b12a4d8d0a86_db0e500d", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
4
true
[ "CWE-215", "CWE-022", "CWE-022", "CWE-022" ]
[ "py/flask-debug", "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).\nThis path depends on a [user-provide...
[ 160, 70, 91, 142 ]
[ null, null, null, null ]
[ 5, 27, 27, 39 ]
[ 24, 51, 51, 80 ]
2024-11-18T22:41:15.859438+00:00
1,421,389,290,000
d4b41304dabedcb091aa37e80440b1515d77f98c
3
{ "blob_id": "d4b41304dabedcb091aa37e80440b1515d77f98c", "branch_name": "refs/heads/master", "committer_date": 1421389290000, "content_id": "44778e8b4fabbe63b8938bf8e8bca6342ace382a", "detected_licenses": [ "Unlicense" ], "directory_id": "41492de22a7b44f1f5c704bcd2c720812d8cad50", "extension": "py",...
3.015625
stackv2
__author__ = 'christianbuia' import random from Crypto.Cipher import AES def pkcs7_padding(message_bytes, block_size): pad_length = block_size - (len(message_bytes) % block_size) if pad_length != block_size: for i in range(0, pad_length): message_bytes += bytes([pad_length]) return...
104
35.46
120
17
824
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_565de85eda155eaa_736ce899", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 30, 37 ]
[ null, null ]
[ 12, 32 ]
[ 54, 55 ]
2024-11-18T20:55:06.668190+00:00
1,605,324,016,000
19169b0517696be7e8675d05574d9541ebc524e4
3
{ "blob_id": "19169b0517696be7e8675d05574d9541ebc524e4", "branch_name": "refs/heads/main", "committer_date": 1605324016000, "content_id": "652cc41e23e86ccd9bd214893dbb134283176d2d", "detected_licenses": [ "Apache-2.0" ], "directory_id": "78405d2c05b647970aee0a0534274c9768bb5017", "extension": "py", ...
2.546875
stackv2
import json from jinja2 import Environment, FileSystemLoader def flatten_tree(tree, props=None): if props is None: props = list(tree.keys()) props.remove("fields") # flatten properties in json tree if "fields" in tree.keys(): for field_name, field in tree["fields"].items(): ...
39
31.23
74
16
303
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_292fc0b1dc556499_92724add", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 31 ]
[ 34 ]
[ 13 ]
[ 2 ]
2024-11-18T21:07:32.954351+00:00
1,581,952,252,000
94182bf222e34ed7d98d24978088f943738d1823
3
{ "blob_id": "94182bf222e34ed7d98d24978088f943738d1823", "branch_name": "refs/heads/master", "committer_date": 1581952252000, "content_id": "38c2e3c936a28d238c60a208952079332ebaccd4", "detected_licenses": [ "MIT" ], "directory_id": "d6ebf49a1f6c3cf35bf4f869021f7717900cef25", "extension": "py", "fi...
3.171875
stackv2
import argparse import requests import re import sys import urlparse from pyquery import PyQuery as pq """ This function takes a relative url and extracts all verses from that page as a tsv. # See: http://stackoverflow.com/questions/5203105/printing-a-utf-8-encoded-string $ export PYTHONIOENCODING=UTF-8 $ python proc...
81
30.28
131
12
667
python
[{"finding_id": "codeql_py/overly-large-range_6de03ed1cb5845c0_0c680f98", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 44 ]
[ null ]
[ 30 ]
[ 33 ]
2024-11-18T21:33:04.212180+00:00
1,586,446,540,000
9d5a40814cb3dcada9a6a5bf45b71ebf81d9ce43
3
{ "blob_id": "9d5a40814cb3dcada9a6a5bf45b71ebf81d9ce43", "branch_name": "refs/heads/master", "committer_date": 1586446540000, "content_id": "9c71dbe50985f0c4effbbf3069abb8f9ad1412b8", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "feb27ba530ebb0d400654e2bb62467e6de65095b", "extension": "p...
2.828125
stackv2
#!/usr/bin/env python2 import ftplib, argparse, sys, threading def login(h, u, p): try: f = ftplib.FTP(h) f.login(u, p) print("[+] Login accepted: %s:%s:%s" % (h,u,p)) f.quit() return True except Exception, e: print("[-] Login failed: %s:%s:%s" % (h,u,p)) ...
45
34.07
123
16
425
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_400b94bf9342effc_1f1a13fb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 38 ]
[ null ]
[ 11 ]
[ 48 ]
2024-11-18T21:33:20.991152+00:00
1,625,336,184,000
652bb4774b1a26adf66b31922f59ed50f92066eb
2
{ "blob_id": "652bb4774b1a26adf66b31922f59ed50f92066eb", "branch_name": "refs/heads/main", "committer_date": 1625336184000, "content_id": "659083534bfb74267aac45c809e4f3eddc06ce1e", "detected_licenses": [ "MIT" ], "directory_id": "9e85e35b0467e667fc3522ba0d4f026ca3906a35", "extension": "py", "file...
2.359375
stackv2
"""This module contains views used by the filesharing app.""" import string from django.contrib import messages from django.contrib.auth import authenticate, login, logout from django.contrib.auth.decorators import login_required from django.contrib.auth.mixins import LoginRequiredMixin from django.contrib.auth.model...
453
33.73
96
18
3,155
python
[{"finding_id": "codeql_py/url-redirection_b8ce9e2da4112eac_4c619bea", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
5
true
[ "CWE-601", "CWE-601", "CWE-601", "CWE-601", "CWE-601" ]
[ "py/url-redirection", "py/url-redirection", "py/url-redirection", "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends o...
[ 314, 326, 339, 342, 368 ]
[ null, null, null, null, null ]
[ 41, 37, 41, 37, 13 ]
[ 53, 49, 53, 49, 87 ]
2024-11-18T21:55:38.501301+00:00
1,631,865,524,000
9fe5357ebee65f4502afab1f3eb3c8b6e2563766
3
{ "blob_id": "9fe5357ebee65f4502afab1f3eb3c8b6e2563766", "branch_name": "refs/heads/master", "committer_date": 1631865524000, "content_id": "217fd7b2a7f3147d02d1002557719e31a9636991", "detected_licenses": [ "MIT" ], "directory_id": "7371393b03d17a4a2decc5e905a6f83f79a70792", "extension": "py", "fi...
2.859375
stackv2
from transferfile.transfile_interface import TransferFileInterface from pathlib import Path import paramiko import os class Sftp(TransferFileInterface): def __init__( self, host, username=None, password=None, port=22, load_system_host_keys=False, rsa_file=Non...
78
29.95
120
16
528
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_3174bd944cb84c5a_f6cfbd53", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 24 ]
[ null ]
[ 9 ]
[ 75 ]
2024-11-18T21:55:39.507417+00:00
1,587,118,652,000
040eb71e09c70413c4254072db3fbaffe1727edd
3
{ "blob_id": "040eb71e09c70413c4254072db3fbaffe1727edd", "branch_name": "refs/heads/master", "committer_date": 1587118652000, "content_id": "6c7cd84db66dd39eba0f5653c41042171d2928eb", "detected_licenses": [ "MIT" ], "directory_id": "890cba8306b547ecec61a5641c0b7aec021bc81c", "extension": "py", "fi...
2.578125
stackv2
import RPi.GPIO as GPIO import json from flask import Flask from time import sleep import requests import threading GPIO.setwarnings(False) GPIO.setmode(GPIO.BCM) with open('light-ctrl.conf') as f: cfg = json.load(f,) switch_override = [] sensor_state = {} def fetch_sensor_state(sensors): if type(sensors) ...
243
29.98
113
23
1,815
python
[{"finding_id": "codeql_py/reflective-xss_63d37049f385fc99_3de064b3", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
3
true
[ "CWE-079", "CWE-079", "CWE-918" ]
[ "py/reflective-xss", "py/reflective-xss", "py/partial-ssrf" ]
[ "HIGH", "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 239, 240, 91 ]
[ null, null, null ]
[ 19, 12, 23 ]
[ 70, 53, 95 ]
2024-11-18T21:55:40.245708+00:00
1,485,421,828,000
5fc00ebbfc01633e8c7b224f84317622777063de
3
{ "blob_id": "5fc00ebbfc01633e8c7b224f84317622777063de", "branch_name": "refs/heads/master", "committer_date": 1485421971000, "content_id": "316eef24a1a02778a46bf688bebd2d81b90e8754", "detected_licenses": [ "MIT" ], "directory_id": "dbb5fd33ae579f0fcc59db166d77325d95ccb9fa", "extension": "py", "fi...
2.59375
stackv2
from django.conf import settings from time import time from jose import jwt import hmac import base64 import hashlib class AuthenticationMixin(object): """ Profile Authentication related logic. Author: Ahmed H. Ismail """ def generate_token(self, expiration): """ Generates an auth...
53
34.92
104
20
427
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_893adda48cd3e83a_0ad38c39", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function.", "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computational...
[ 24, 49 ]
[ null, null ]
[ 17, 13 ]
[ 51, 50 ]
2024-11-18T21:55:48.033176+00:00
1,545,390,127,000
f4b615f03da14d3816f398a2ae316633de0a3485
3
{ "blob_id": "f4b615f03da14d3816f398a2ae316633de0a3485", "branch_name": "refs/heads/master", "committer_date": 1545390127000, "content_id": "537d5565925ed1ef0732d5c57dcf3d50fcb70454", "detected_licenses": [ "MIT" ], "directory_id": "b2dafa0cdb9735b77810412f5cb95be113129c7d", "extension": "py", "fi...
2.75
stackv2
# -*- coding: utf-8 -*- import requests import six import argparse def __get_tokens(client_id, client_secret, domain): code_url = 'https://{}.bitrix24.ru/oauth/authorize/?response_type=code&client_id={}'.format(domain, client_id) print(code_url) input_func = input if six.PY2: input_func = raw...
49
34.47
114
13
412
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c7f31dc15bd17696_0ec35d43", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text." ]
[ 30 ]
[ null ]
[ 15 ]
[ 24 ]
2024-11-18T21:55:55.293768+00:00
1,512,332,126,000
2c027efcecd55cfc97d29ec79e0e50bde4b6ef63
3
{ "blob_id": "2c027efcecd55cfc97d29ec79e0e50bde4b6ef63", "branch_name": "refs/heads/master", "committer_date": 1512332126000, "content_id": "d53ac5216babc8203222826bb404cc87dab37552", "detected_licenses": [ "MIT" ], "directory_id": "b665a3eb3afec4df95d4032321fa932c7519add7", "extension": "py", "fi...
2.625
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- from datetime import datetime from rebel import Database, SqliteDriver import json, hashlib class User(object): def __init__(self, db): driver = SqliteDriver(db) self.db = Database(driver) def all(self): _user = self.db.query('sele...
73
31.27
125
14
544
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_d4d9159326a89612_c0338419", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
3
true
[ "CWE-327", "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.", "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally exp...
[ 28, 36, 60 ]
[ null, null, null ]
[ 32, 32, 32 ]
[ 40, 40, 40 ]
2024-11-18T22:55:03.123152+00:00
1,691,146,618,000
b89cb55ebd1d84aaea9932c6496670e049c26871
2
{ "blob_id": "b89cb55ebd1d84aaea9932c6496670e049c26871", "branch_name": "refs/heads/master", "committer_date": 1691146618000, "content_id": "2550da8f63579a37bde5a9e07c3a8c9232e57814", "detected_licenses": [ "Apache-2.0" ], "directory_id": "0aa67381bf9b6afbc7dd3dbf3bd9bf4b4951106c", "extension": "py"...
2.375
stackv2
#!/usr/bin/env python3 import argparse import json import os import re from datetime import datetime from jinja2 import Environment, FileSystemLoader from typing import NamedTuple, Optional, Tuple from urllib.error import URLError from urllib.request import urlopen, Request from urllib.parse import urljoin RELEASE_UR...
173
33.58
138
16
1,653
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_dd76df3ec38ad34a_8afa24ca", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 157 ]
[ null ]
[ 11 ]
[ 74 ]
2024-11-18T23:06:16.107692+00:00
1,614,246,187,000
bc2a1d46f5ed928ca94398917c6ad28d20d0d210
2
{ "blob_id": "bc2a1d46f5ed928ca94398917c6ad28d20d0d210", "branch_name": "refs/heads/master", "committer_date": 1614246265000, "content_id": "d33752573578fa557e6238a92e55ddb008be670f", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "e9dc99e5cc88c0ab93614ddd4b1ba43e6276a0d9", "extension": "p...
2.40625
stackv2
from contextlib import suppress from enum import Enum from os import path from typing import Dict, List import pandas as pd import snowflake.connector from jinja2 import Template from pydantic import Field, SecretStr, constr, create_model from snowflake.connector import DictCursor from toucan_connectors.toucan_connec...
171
37.19
155
18
1,352
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_09fe3a370e7ca6c6_3d1c72c7", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
3
true
[ "CWE-079", "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 117, 161, 162 ]
[ null, null, null ]
[ 28, 22, 23 ]
[ 54, 52, 42 ]
2024-11-18T23:06:16.294422+00:00
1,467,229,552,000
543937bdfb40646903e85f706e0abed9f441da15
3
{ "blob_id": "543937bdfb40646903e85f706e0abed9f441da15", "branch_name": "refs/heads/master", "committer_date": 1467229552000, "content_id": "4b46b088cd9aedb30b47f2113131d13737b2fa09", "detected_licenses": [ "MIT" ], "directory_id": "0b11e32fa95c4e70a400cc3ae82a3f90cc35c7f7", "extension": "py", "fi...
2.703125
stackv2
import os import requests import urllib import spotify import threading import logging from time import sleep IMPORTIO_API_INDIEPOP_URL = ( 'https://api.import.io/store/data/' 'c3914ba4-3da3-4fee-8120-fcb6bfb66d3f/_query?input/webpage/' 'url=http%3A%2F%2Fsomafm.com%2Findiepop%2Fsonghistory.html' '&_us...
142
29.16
77
20
997
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7baba5b26f34c666_da9ca1c0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 89, 92, 116 ]
[ null, null, null ]
[ 21, 24, 25 ]
[ 66, 74, 56 ]
2024-11-18T20:56:51.043030+00:00
1,571,778,998,000
28fefc8bcad874b7b0d54670f95e6d14abe47654
3
{ "blob_id": "28fefc8bcad874b7b0d54670f95e6d14abe47654", "branch_name": "refs/heads/master", "committer_date": 1571778998000, "content_id": "c6c713f35ec25a0a86edd2bef159d935e69cabe3", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "3ceb39175ad4541afd2386b704b71ea0e68154d8", "extension": "p...
2.703125
stackv2
from flask import Flask, render_template, request, make_response import werkzeug app = Flask(__name__) @app.route("/") def index(): return render_template('index.html') @app.route("/vulnerable") def vulnerable(): username = request.args.get('username') if username == None: resp = make_response('...
32
25
64
14
196
python
[{"finding_id": "codeql_py/reflective-xss_1e07f00ebdcb86d0_8e652973", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 25 ]
[ null ]
[ 30 ]
[ 52 ]
2024-11-18T20:56:53.722023+00:00
1,558,545,746,000
485c625d3fc3891d8dcc0f7d6635094a943d7b5d
3
{ "blob_id": "485c625d3fc3891d8dcc0f7d6635094a943d7b5d", "branch_name": "refs/heads/master", "committer_date": 1558545746000, "content_id": "ff8256e9914275378c406e448fb9b423177ca907", "detected_licenses": [ "Apache-2.0" ], "directory_id": "cd210e0701e44c58cb101776b42d4a9a2f2d4e8a", "extension": "py"...
2.515625
stackv2
from flask import Flask,render_template, request, session, redirect, url_for import hashlib import flask_login import socket app = Flask(__name__) login_manager = flask_login.LoginManager() login_manager.init_app(app) app.config['SECRET_KEY'] = '7d441f27d441f27567d441f2b6176a' users = {'admin': {'password': '69bc0cc4...
80
25.19
80
17
512
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_d4e8618fd30abc08_7d68bd6e", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.", "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally exp...
[ 39, 67 ]
[ null, null ]
[ 34, 34 ]
[ 67, 67 ]
2024-11-18T22:43:31.556720+00:00
1,558,399,096,000
5f74e98d89efba50a260f0bcfdeaf391b0ff7442
2
{ "blob_id": "5f74e98d89efba50a260f0bcfdeaf391b0ff7442", "branch_name": "refs/heads/master", "committer_date": 1558399096000, "content_id": "6ea0fc8fd9713ee50b76d92f6075dcb17890c5f2", "detected_licenses": [ "MIT" ], "directory_id": "e823af0cec977a59b4481b24e7edd7a2f3d792d7", "extension": "py", "fi...
2.46875
stackv2
import requests from flask_restful import Resource, reqparse import database class ClientController(Resource): def get(self, data): return def post(self, data): if len(database.chunkServers) == 0: return "Service unavailable", 503 headers = {"data": data} for chun...
22
26.14
118
17
135
python
[{"finding_id": "codeql_py/full-ssrf_a5bf11f90631f886_0b05b3f0", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
1
true
[ "CWE-918" ]
[ "py/full-ssrf" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1)." ]
[ 17 ]
[ null ]
[ 13 ]
[ 119 ]
2024-11-18T22:44:09.770600+00:00
1,546,528,694,000
280ac97cb827c5cd58926d52d060c6f545b1dddc
2
{ "blob_id": "280ac97cb827c5cd58926d52d060c6f545b1dddc", "branch_name": "refs/heads/master", "committer_date": 1546528694000, "content_id": "b4b644d88d18f03c6dcc675e4c47ad9b76a0a335", "detected_licenses": [ "Apache-2.0" ], "directory_id": "01e4e7e6e5e38c6b94cfc2b3057ead67602f387d", "extension": "py"...
2.421875
stackv2
from flask import Flask, request, abort, redirect, url_for, Response from flask_cors import CORS import requests app = Flask(__name__) CORS(app) def __fetch(url="https://ambitionbox.com", params={}, user_agent=None): headers_Get = { 'User-Agent': user_agent, 'Accept': 'text/html,application/xhtml+...
64
26.11
116
12
454
python
[{"finding_id": "codeql_py/full-ssrf_8b57f89f88e7c197_64da90a5", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
2
true
[ "CWE-918", "CWE-079" ]
[ "py/full-ssrf", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 19, 43 ]
[ null, null ]
[ 13, 20 ]
[ 66, 29 ]
2024-11-18T23:10:38.352708+00:00
1,616,478,137,000
f5cd50a9d0c9eeabeb8376039e4ecdc6fd300e79
4
{ "blob_id": "f5cd50a9d0c9eeabeb8376039e4ecdc6fd300e79", "branch_name": "refs/heads/main", "committer_date": 1616478137000, "content_id": "fe4706d456e9b4fa57d8f98e8bab744b28f1502d", "detected_licenses": [ "MIT" ], "directory_id": "9cf71eb560638ea1de3edf9d08dc05e16f4fc845", "extension": "py", "file...
3.671875
stackv2
#!/usr/bin/env python3 '''Miscelaneous helper functions and home of the Timer class''' import hashlib import time from typing import Union def hash_password(password) -> Union[str,None]: '''applies md5 hash to the password string and returns a str representation of the resulting hex if type(password) == str, o...
82
35.71
98
13
647
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_753085f9e70fd860_382d7a03", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi...
[ 10 ]
[ null ]
[ 24 ]
[ 41 ]
2024-11-18T23:10:51.525323+00:00
1,577,540,709,000
5090f1e36577d8ed4839c9b6436a77bd38e34a00
3
{ "blob_id": "5090f1e36577d8ed4839c9b6436a77bd38e34a00", "branch_name": "refs/heads/master", "committer_date": 1577540709000, "content_id": "86403cc9fbd8f89e53bcf79530c42cb974328a76", "detected_licenses": [ "Apache-2.0" ], "directory_id": "4cae499b3d084a970f92355919d6957be1c11972", "extension": "py"...
2.921875
stackv2
from flask import Flask, render_template, request from collections import Counter import string app = Flask(__name__) indexes = [] paragraphs = [] words = [] class DataProcessing: # lower casing, removing punctuation and splitting word def pre_process(self, document): # d = dict() document =...
79
23.33
85
16
411
python
[{"finding_id": "codeql_py/flask-debug_a979302ff9ad666f_951d3893", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 79, 59 ]
[ null, null ]
[ 5, 12 ]
[ 24, 20 ]
2024-11-18T22:29:50.642721+00:00
1,555,118,244,000
70184fcc89b775461ccf65cdb6c3d23bd07bbb3e
4
{ "blob_id": "70184fcc89b775461ccf65cdb6c3d23bd07bbb3e", "branch_name": "refs/heads/master", "committer_date": 1555118244000, "content_id": "bc95ddc8c57c89382184ef6ce23877d54d18f5c8", "detected_licenses": [ "MIT" ], "directory_id": "77741ac3384cf80ba9f5684f896e4b6500064582", "extension": "py", "fi...
3.78125
stackv2
def info_print(name, age, sex): print(f'名字是{name},年龄{age},性别{sex}') return 0 info_print('健康', 18, '男') info_print(age=18, name='健康', sex='男') info_print('健康', age=18, sex='男') def info_print1(name, age, sex='男'): # 参数带有默认值 print(f'名字是{name},年龄{age},性别{sex}') return 0 info_print1('健康', 1...
17
18.06
57
9
124
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_03a11ba3356e1f6f_d7256d55", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 2, 12 ]
[ null, null ]
[ 11, 11 ]
[ 39, 39 ]
2024-11-18T22:29:55.366219+00:00
1,614,112,873,000
7d498e395ee19a1cdfe68e4bc0ac6b421dfa49ca
3
{ "blob_id": "7d498e395ee19a1cdfe68e4bc0ac6b421dfa49ca", "branch_name": "refs/heads/master", "committer_date": 1614112873000, "content_id": "c19965c6e1a1c532eddbcb3eb68fcf74806dfb2e", "detected_licenses": [ "MIT" ], "directory_id": "9cb5ac5f0bb5c47acb5f6859e190b5ee14b59a38", "extension": "py", "fi...
2.59375
stackv2
import psycopg2 # Database Connection Info database = '' username = '' password = '' host = '' port = #### conn_string = "dbname='%s' user='%s' host='%s' password='%s' port='%s'" % (database, username, host, password, port) def lambda_handler(event, context): print(conn_string) # connect to database con...
57
32.23
123
13
471
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_40bb390868c68675_43dc48be", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 14 ]
[ null ]
[ 11 ]
[ 22 ]
2024-11-18T23:10:16.616772+00:00
1,621,068,058,000
6f7aa72c092cd81d6a802f57dbafcfaa8bcd7662
3
{ "blob_id": "6f7aa72c092cd81d6a802f57dbafcfaa8bcd7662", "branch_name": "refs/heads/main", "committer_date": 1621068058000, "content_id": "baeb2de11b8ed8b709ce015293f9d32726345b34", "detected_licenses": [ "MIT" ], "directory_id": "f38c880a56b50880d7574b48cc3cedcf3c1f2ae8", "extension": "py", "file...
2.828125
stackv2
import pymysql # https://flask.palletsprojects.com/en/1.1.x/ from flask import Flask, jsonify # init Flask app app = Flask(__name__) # routes as endpoints @app.route('/') def home(): return 'Hello World!' @app.route('/moviesjson') def movies_json(): with pymysql.connect( host='localhost', ...
119
28.61
80
18
709
python
[{"finding_id": "codeql_py/flask-debug_7f23bc130a6915a3_30e834de", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-079", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 119, 89, 115 ]
[ null, null, null ]
[ null, 24, 12 ]
[ 20, 58, 19 ]
2024-11-18T23:15:57.240196+00:00
1,594,292,524,000
98087fb1089ac75d4e2deef6eb240bfb89d24141
3
{ "blob_id": "98087fb1089ac75d4e2deef6eb240bfb89d24141", "branch_name": "refs/heads/master", "committer_date": 1594292524000, "content_id": "452030bb1a3df37f30f717ff362cadbf4929cdf9", "detected_licenses": [ "MIT" ], "directory_id": "ca989c3603366bb6bc7c568bddd61c3bbc528e1b", "extension": "py", "fi...
2.546875
stackv2
# Copyright: (c) 2020, Michal Muransky <michal.muransky@pan-net.eu> # MIT License (see COPYING or https://mit-license.org/) DOCUMENTATION = r''' --- module: tfvars_facts short_description: Translate the Terraform tfavrs file to Ansible Local Facts (JSON). version_added: "2.4" description: - This Ansible modul...
155
26.59
137
16
1,071
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_0b3694a1339c6f13_74c1cde7", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 140 ]
[ null ]
[ 16 ]
[ 46 ]
2024-11-18T22:30:26.847530+00:00
1,607,370,592,000
4209dc56d1d5882370f923f918676ae3a55e03a0
3
{ "blob_id": "4209dc56d1d5882370f923f918676ae3a55e03a0", "branch_name": "refs/heads/master", "committer_date": 1607370595000, "content_id": "226584fd4d9051528c5187f1b0b7e2fabd1e42b0", "detected_licenses": [ "MIT" ], "directory_id": "acd162bde09e0e321b7d9da330b190ad6e1d8b8f", "extension": "py", "fi...
2.96875
stackv2
""" TODO: Add documentation """ import sys from jinja2 import Template from util import read_config, _read_template, _read_csv def _create_table(): pass def create_leaderboard(config_path, output_path): """ Create a leaderboard for the given ``config`` file. :param config_path: `str` repres...
62
24.63
75
14
382
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_1ceae0e707a990ee_0aa30518", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 52, 57 ]
[ null, null ]
[ 16, 18 ]
[ 53, 51 ]
2024-11-18T22:30:30.092107+00:00
1,500,637,441,000
69420948de3f06987be94a30cbc4d1129d4e1116
2
{ "blob_id": "69420948de3f06987be94a30cbc4d1129d4e1116", "branch_name": "refs/heads/master", "committer_date": 1500637441000, "content_id": "b464cabf3b927b7dce998fa6952f3f8091b31a30", "detected_licenses": [ "MIT" ], "directory_id": "03ae294fbcec21933b288ff54aff428c191a7e16", "extension": "py", "fi...
2.453125
stackv2
from jinja2 import Environment, FileSystemLoader, BaseLoader import logging import os class AbstractProfileDataProvider: def get_profile_data(self, profile_name: str, **kwargs): raise NotImplementedError class JinjaProfileDataProvider(AbstractProfileDataProvider): def __init__(self, template_loade...
25
35.68
102
17
180
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_27bc1fc353d8d233_5385a08f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 17 ]
[ null ]
[ 27 ]
[ 80 ]
2024-11-18T23:36:51.175901+00:00
1,613,858,196,000
2b16cec31b784ea9b0970334abc88d984c32473e
3
{ "blob_id": "2b16cec31b784ea9b0970334abc88d984c32473e", "branch_name": "refs/heads/main", "committer_date": 1613858196000, "content_id": "3a5a99edcdfaf5bdf1e6ced30170f7b317b81f5e", "detected_licenses": [ "MIT" ], "directory_id": "7b9ce8efa4c25421ec173c0472b3edf7a6552608", "extension": "py", "file...
2.8125
stackv2
#!/usr/bin/python """ Import the needed Python3 packages """ from functools import wraps from secrets import config, db, host, pwd, user import mysql.connector from cryptography.fernet import Fernet from flask import Flask, request from flask_restful import Api, Resource, reqparse """ backend = Define the Flask va...
258
34.02
161
16
1,889
python
[{"finding_id": "codeql_py/flask-debug_9dc0f59e4c75f22e_04c9da37", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-089" ]
[ "py/flask-debug", "py/sql-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This SQL query depends on a [user-provided value](1)." ]
[ 258, 73 ]
[ null, null ]
[ null, 26 ]
[ 49, 29 ]
2024-11-18T23:37:07.370883+00:00
1,597,951,578,000
afc0ac2fa9f7599e7690eec27444edb53e681148
3
{ "blob_id": "afc0ac2fa9f7599e7690eec27444edb53e681148", "branch_name": "refs/heads/master", "committer_date": 1597951578000, "content_id": "ef7092aa0b62696903bac5bccda797d14d8ecb44", "detected_licenses": [ "Apache-2.0" ], "directory_id": "ad1a60c1c124948689451bb8daed9720a7a5d7ed", "extension": "py"...
2.625
stackv2
import settings from flask import Flask from flask import render_template import requests import logging logging.basicConfig(level=logging.INFO) BASE_URL = settings.QAW_API_URL app = Flask(__name__) @app.route("/") def hello(): return "Hello World!" @app.route("/teams/<tags>") def teams(tags='python'): ne...
61
25.33
89
17
409
python
[{"finding_id": "codeql_py/reflective-xss_ba0d3462810250d7_29621db2", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
5
true
[ "CWE-079", "CWE-918", "CWE-918", "CWE-117", "CWE-117" ]
[ "py/reflective-xss", "py/partial-ssrf", "py/partial-ssrf", "py/log-injection", "py/log-injection" ]
[ "HIGH", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [...
[ 44, 29, 48, 23, 39 ]
[ null, null, null, null, null ]
[ 12, 13, 12, 18, 18 ]
[ 62, 30, 29, 49, 57 ]
2024-11-18T21:14:06.543907+00:00
1,619,469,977,000
5c439fc5a46015805e73547c1cc244c6b39afa3d
3
{ "blob_id": "5c439fc5a46015805e73547c1cc244c6b39afa3d", "branch_name": "refs/heads/main", "committer_date": 1619469977000, "content_id": "a978f1752561d7d4074a38eb9d60de6d96196d5a", "detected_licenses": [ "MIT" ], "directory_id": "948ba4784eff35477eb3c378de6dc9d057461160", "extension": "py", "file...
2.609375
stackv2
import base64, cv2, json, flask, requests import numpy as np # from PIL import Image from flask import Flask, request from urllib.parse import unquote import tflite_runtime.interpreter as tflite autoTrainingApiUrl = "http://127.0.0.1:5001/storeDetails" metricApiUrl = "http://127.0.0.1:5002" emotionNames = ["Afraid", "...
169
39.36
115
17
1,641
python
[{"finding_id": "codeql_py/stack-trace-exposure_dac98ec09b82d3b7_340e6065", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
3
true
[ "CWE-209", "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 27, 148, 158 ]
[ null, null, null ]
[ 34, 34, 34 ]
[ 69, 74, 75 ]
2024-11-18T21:14:12.104944+00:00
1,515,820,601,000
bd7b48ae70f6cef4cd854539c2acf5683745075b
2
{ "blob_id": "bd7b48ae70f6cef4cd854539c2acf5683745075b", "branch_name": "refs/heads/master", "committer_date": 1515820601000, "content_id": "c0c26dac03408782a5fd196fc24de0597bdb6a7d", "detected_licenses": [ "MIT" ], "directory_id": "68f47bb52b2167f1c90d334318e127cd8ae78112", "extension": "py", "fi...
2.4375
stackv2
import requests import hashlib import random class Translate(object): def __init__(self): pass def translate(self, q): appid = '20171011000087545' secretKey = '3fKGqzXDd_TFHeiCPQQv' httpClient = None myurl = 'http://fanyi-api.baidu.com/api/trans/vip/translate' ...
27
27.3
106
13
237
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_d25214533b934143_77ac2747", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 22 ]
[ null ]
[ 19 ]
[ 23 ]
2024-11-18T21:57:24.941751+00:00
1,521,480,584,000
efb0f3a76dd7248d6e9dcfa40739c57ebb483c12
3
{ "blob_id": "efb0f3a76dd7248d6e9dcfa40739c57ebb483c12", "branch_name": "refs/heads/master", "committer_date": 1521480584000, "content_id": "1a090dd8b169aede28f5392a4ce7bf711261e964", "detected_licenses": [ "Apache-2.0" ], "directory_id": "5cf26db7dd5d1820a84e5b8ff0d2643a2ae7ef16", "extension": "py"...
2.546875
stackv2
from urllib import request from urllib.error import HTTPError from urllib.parse import urlencode import argparse from utils.queries import KNOWLEDGE_BASE_API, RESOURCE_QUERY PROPERTY_WHITELIST = ["http://xmlns.com/foaf/0.1/isPrimaryTopicOf"] class Counter: def __init__(self): self.value = 0 sel...
106
26.13
119
16
654
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_806b836c3ad58f27_ff0494d8", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [wikidata.dbpedia.org](1) may be at an arbitrary positi...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [wikidata.dbpedia.org](1) may be at an arbitrary position in the sanitized URL." ]
[ 38 ]
[ null ]
[ 48 ]
[ 83 ]
2024-11-18T21:57:31.181692+00:00
1,691,653,936,000
c11e1ee7fc9cdb2bf8ca18b5197addf0b10c23fe
3
{ "blob_id": "c11e1ee7fc9cdb2bf8ca18b5197addf0b10c23fe", "branch_name": "refs/heads/master", "committer_date": 1691653936000, "content_id": "84891a642e021c08e5adf3d6731b26f10ac08159", "detected_licenses": [ "MIT" ], "directory_id": "278aa5dae5e5e302f25d330250633130dfde253d", "extension": "py", "fi...
2.578125
stackv2
from bin.service import Environment from bin.service import RegEx from bin.service import Ranking import json import re import time import datetime class Map: """Service Desk Ticket Mapper""" def __init__(self): self.environment = Environment.Environment() self.regex = RegEx.RegEx() s...
233
41.96
111
25
1,984
python
[{"finding_id": "codeql_py/redos_eb13ed8af6a5a7d6_194b376d", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'a' and containing many repetition...
2
true
[ "CWE-1333", "CWE-1333" ]
[ "py/redos", "py/redos" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with 'a' and containing many repetitions of 'a'.", "This part of the regular expression may cause exponential backtracking on strings starting with 'a@a' and containing many repetitions of 'a'." ]
[ 198, 198 ]
[ null, null ]
[ 29, 45 ]
[ 32, 48 ]
2024-11-18T21:57:32.799950+00:00
1,589,400,592,000
d57c91886786e206634b8f045103750ac3f7d964
2
{ "blob_id": "d57c91886786e206634b8f045103750ac3f7d964", "branch_name": "refs/heads/master", "committer_date": 1589400592000, "content_id": "061afe98bad16a16e7e95a6b4b578437886bd564", "detected_licenses": [ "MIT" ], "directory_id": "ccb619d9a0033d4747be13879ef1073aadecedd9", "extension": "py", "fi...
2.375
stackv2
import os import sys import asyncio import repltalk from forms import SearchDatabase from flask import Flask, render_template, request def log_error(a, b, c, d): errTemplate = """ Error Occured - {0} Type: {1} Exception: {2} Traceback: {3} """ with open('logs/err_log.txt', 'w') as fh: res = errTemplate.format(a, ...
92
25.1
65
21
680
python
[{"finding_id": "codeql_py/stack-trace-exposure_6965da1e0f3259f6_4f1328b0", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-215" ]
[ "py/stack-trace-exposure", "py/flask-debug" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger." ]
[ 81, 92 ]
[ 88, null ]
[ 12, 5 ]
[ 52, 40 ]
2024-11-18T21:58:05.941723+00:00
1,487,064,121,000
84fdde41afc7f0ecf57a62087bffadb7a87217fb
4
{ "blob_id": "84fdde41afc7f0ecf57a62087bffadb7a87217fb", "branch_name": "refs/heads/master", "committer_date": 1487064199000, "content_id": "4ef515c16bf3731c9b907a24b48a9a0b6a25959a", "detected_licenses": [ "MIT" ], "directory_id": "d0f87ffb2b501469659df7962e779012acdeda62", "extension": "py", "fi...
3.609375
stackv2
from base64 import b64decode from Crypto.Cipher import AES from S2C09 import pkcs7_pad, pkcs7_unpad from S1C07 import aes_ecb_decrypt def aes_ecb_encrypt(data, key): """Encrypts the given data with AES-ECB, using the given key. The data is always PKCS 7 padded before being encrypted. """ cipher = AES....
71
35.17
95
14
651
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_a7721bf73b4d34cd_a10a2d57", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
1
true
[ "CWE-327" ]
[ "py/weak-cryptographic-algorithm" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 12 ]
[ null ]
[ 12 ]
[ 59 ]
2024-11-18T21:58:08.747784+00:00
1,488,551,368,000
9e215ee58c1f0849da381fb5ce1dfd1b16cae4fe
2
{ "blob_id": "9e215ee58c1f0849da381fb5ce1dfd1b16cae4fe", "branch_name": "refs/heads/master", "committer_date": 1488551368000, "content_id": "436be67d1683c562df555dd29c50cf4cd673c5a0", "detected_licenses": [ "MIT" ], "directory_id": "bcad9833af16bd8cfecc7e6a9c1843ce50c7689b", "extension": "py", "fi...
2.34375
stackv2
import os import sys import argparse import centinel import centinel.models import centinel.views import config import logging from logging.handlers import RotatingFileHandler if (2, 7, 9) > sys.version_info: print ("WARNING: Python is older than 2.7.9, " "using older SSL version. This is " ...
77
29.73
82
15
568
python
[{"finding_id": "codeql_py/insecure-protocol_5bd56c89e25e8efc_f34cfe18", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 specified by [call to SSL.Context](1).", "remediation": "", "locat...
1
true
[ "CWE-327" ]
[ "py/insecure-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Insecure SSL/TLS protocol version TLSv1 specified by [call to SSL.Context](1)." ]
[ 68 ]
[ null ]
[ 23 ]
[ 52 ]
2024-11-18T21:58:29.887523+00:00
1,687,448,383,000
eae51fa8fa0b50dd77545d0e21180804fb0d697c
2
{ "blob_id": "eae51fa8fa0b50dd77545d0e21180804fb0d697c", "branch_name": "refs/heads/master", "committer_date": 1687448383000, "content_id": "410215ade2f9729069492f8e00da4b5c3e4a8895", "detected_licenses": [ "MIT" ], "directory_id": "432d22b796ad62dd034472e97182e51663b2125f", "extension": "py", "fi...
2.453125
stackv2
#!/usr/bin/env python """check various endpoints on HP MSA devices (1040,2050,2052) """ import argparse import types import sys import xml.dom.minidom import requests import hashlib from requests.auth import HTTPDigestAuth from requests.packages.urllib3.exceptions import InsecureRequestWarning,InsecurePlatformWarning,S...
228
34.6
140
22
1,647
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_53b8aebc24dc07fd_0ae86804", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
3
true
[ "CWE-327", "CWE-295", "CWE-295" ]
[ "py/weak-sensitive-data-hashing", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "HIGH", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi...
[ 30, 37, 71 ]
[ null, 41, 76 ]
[ 20, 17, 13 ]
[ 66, 14, 10 ]
2024-11-18T21:58:29.940526+00:00
1,603,199,471,000
77cac6ed80756784145918dca0d227e66ffca3cc
2
{ "blob_id": "77cac6ed80756784145918dca0d227e66ffca3cc", "branch_name": "refs/heads/master", "committer_date": 1603199471000, "content_id": "11ea3f931caf8ec0ea55e5ae00343d924506b575", "detected_licenses": [ "MIT" ], "directory_id": "61ad58a5434415a9ef5c3e429f0314dee0b44d38", "extension": "py", "fi...
2.46875
stackv2
"""Flask API for geospatial utils.""" import logging from distutils.util import strtobool from os import getenv from caching import cache_file from flask import Flask, Response, jsonify, request from flask_caching import Cache from flask_cors import CORS from timer import timed from zonal_stats import calculate_s...
126
25.14
88
13
895
python
[{"finding_id": "codeql_py/flask-debug_799363830a07b34b_6cf807b2", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-117" ]
[ "py/flask-debug", "py/log-injection" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This log entry depends on a [user-provided value](1)." ]
[ 126, 53 ]
[ null, null ]
[ 5, 22 ]
[ 49, 48 ]
2024-11-18T23:10:59.638449+00:00
1,522,935,759,000
aa4d5e2fec6c98e40da71dfc349e5460f1ba0115
2
{ "blob_id": "aa4d5e2fec6c98e40da71dfc349e5460f1ba0115", "branch_name": "refs/heads/master", "committer_date": 1522935759000, "content_id": "358b96fc0656b1f5d2df0e63c0330a900a548404", "detected_licenses": [ "MIT" ], "directory_id": "993a216c56f7a01dd2aee213b326159e5c2f3b13", "extension": "py", "fi...
2.5
stackv2
from flask import Flask, request, make_response, jsonify from functools import wraps import os import json app = Flask(__name__) g_data_cache={} g_data_args_cache={} DATA_CACHE = 1 ARGS_CACHE = 2 def _get_data(path, cachetype=DATA_CACHE): global g_data_cache global g_data_args_cache cache = g_data_cache...
76
29.12
137
15
554
python
[{"finding_id": "codeql_py/flask-debug_05135f6120162090_7f4caa9e", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-022" ]
[ "py/flask-debug", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1)." ]
[ 76, 24 ]
[ null, null ]
[ 5, 23 ]
[ 51, 29 ]
2024-11-18T23:11:01.935969+00:00
1,612,750,612,000
66d2c42e3ce3ffb63eaecae41ead4143c03f0d45
3
{ "blob_id": "66d2c42e3ce3ffb63eaecae41ead4143c03f0d45", "branch_name": "refs/heads/master", "committer_date": 1612750612000, "content_id": "adf1b825da8c4dd9dec1342e25aeac2871049b42", "detected_licenses": [ "Apache-2.0" ], "directory_id": "5e8dc13985ddfef5101d4ed167e2e9844fba5ae2", "extension": "py"...
2.65625
stackv2
import os from flask import Flask, request, send_file, redirect, render_template import easyocr import PIL from PIL import Image, ImageOps import base64 import numpy as np import io from queue import Queue, Empty import time import threading UPLOAD_FOLDER = 'static/uploads' app = Flask(__name__, template_folder='tem...
165
27.12
92
18
1,126
python
[{"finding_id": "codeql_py/reflective-xss_3df2f942b087fb53_77480a19", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
4
true
[ "CWE-079", "CWE-079", "CWE-601", "CWE-601" ]
[ "py/reflective-xss", "py/reflective-xss", "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 131, 151, 82, 99 ]
[ null, null, null, null ]
[ 16, 12, 29, 29 ]
[ 88, 20, 40, 40 ]
2024-11-18T22:05:53.082588+00:00
1,603,938,510,000
7885589d024795af448357fc9f41af643d053aed
2
{ "blob_id": "7885589d024795af448357fc9f41af643d053aed", "branch_name": "refs/heads/master", "committer_date": 1603938510000, "content_id": "f98de551a107211d6a81c8a615063be8b56079b1", "detected_licenses": [ "MIT" ], "directory_id": "f809f02b8a7c2c4a3afe00da7f25020db05b3fe3", "extension": "py", "fi...
2.5
stackv2
#!/usr/bin/env python3 import os import json import random import requests import logging from flask import Flask, jsonify, request, Response from functools import wraps logging.basicConfig(level=logging.INFO, format='%(asctime)s %(levelname)s: %(message)s') logger = logging.getLogger(__name__) block_size = os.geten...
79
24.35
88
13
513
python
[{"finding_id": "codeql_py/partial-ssrf_9a5be1546cebe159_74b020bc", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 27 ]
[ null ]
[ 7 ]
[ 65 ]
2024-11-18T22:05:59.058298+00:00
1,382,086,108,000
88a3efd9f41c2613d561600164d2ab38f1914d84
2
{ "blob_id": "88a3efd9f41c2613d561600164d2ab38f1914d84", "branch_name": "refs/heads/master", "committer_date": 1382086108000, "content_id": "0d73583511e85602cf8b521e4167f6678e5d070e", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "ebcd1a743c9730d7b7cecc074719cdc11b3596f5", "extension": "p...
2.46875
stackv2
# encoding: utf-8 """ _util.py Created by liut on 2010-12-04. Copyright (c) 2010-2013 liut. All rights reserved. """ import os from _wand import NewMagickWand,MagickReadImage,MagickToMime,\ MagickGetImageFormat,MagickGetImageWidth,MagickGetImageHeight,MagickGetImageCompressionQuality __all__ = [ 'check_dirs', 'save...
261
25.4
94
14
1,957
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_50db05a6b6f88ccb_e00e00ec", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (id)](2) is used in a hashing algorithm (SHA1) that is insecure." ]
[ 200 ]
[ null ]
[ 14 ]
[ 52 ]
2024-11-18T22:36:00.346441+00:00
1,520,250,202,000
bd4582e51f18cd12339b125c73bea0f8e09e58b3
3
{ "blob_id": "bd4582e51f18cd12339b125c73bea0f8e09e58b3", "branch_name": "refs/heads/master", "committer_date": 1520250202000, "content_id": "5f9000ae390ca424205a63cbe97990f23bef7efb", "detected_licenses": [ "MIT" ], "directory_id": "e36021c72acb43a774bb687386d2d9b8bba73769", "extension": "py", "fi...
3.015625
stackv2
#!/usr/bin/env python3 """ file system operations # from jplib import fs """ import io import json import os import re import stat import sys from urllib.parse import urlparse from jplib.dateandtime import get_timestamp_from_year_to_second IMAGE_EXTENSIONS = ['jpg', 'jpeg', 'png', 'gif'] # can be extended BYTE...
273
25.99
117
15
1,919
python
[{"finding_id": "codeql_py/overly-large-range_0670080eb5c0d351_a13484bd", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 247 ]
[ null ]
[ 58 ]
[ 61 ]
2024-11-18T22:48:31.633737+00:00
1,449,919,061,000
29d664a54daf42cbe93eeb07bccc45dd9140b580
2
{ "blob_id": "29d664a54daf42cbe93eeb07bccc45dd9140b580", "branch_name": "refs/heads/master", "committer_date": 1449919061000, "content_id": "015783bd7c81005fe5f1883a6627442ed7ebe949", "detected_licenses": [ "MIT" ], "directory_id": "b70e74a12ff1c9e558f7c1a688773e590064df9e", "extension": "py", "fi...
2.34375
stackv2
#!/usr/bin/env python # encoding: utf-8 """ flask-ckeditor ~~~~~~~~~~~~~~ 在flask中集成ckeditor编辑器 """ # from flask import what I want from flask import request, url_for, make_response import os import random import datetime class CKEditor(object): """ class CKEditor ~~~~~~~~~~~~~~ ...
85
28.04
81
18
560
python
[{"finding_id": "codeql_py/reflective-xss_37071f18491b0665_f11c4c29", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
5
true
[ "CWE-079", "CWE-022", "CWE-022", "CWE-022", "CWE-022" ]
[ "py/reflective-xss", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user...
[ 83, 64, 72, 66, 69 ]
[ null, null, null, null, null ]
[ 34, 35, 30, 33, 32 ]
[ 37, 42, 38, 40, 39 ]
2024-11-18T22:48:59.040926+00:00
1,563,328,611,000
acc0a1056e4a45b79dec6562927c11543eb94511
3
{ "blob_id": "acc0a1056e4a45b79dec6562927c11543eb94511", "branch_name": "refs/heads/master", "committer_date": 1563328611000, "content_id": "edab137093cef2a48d88818ef3e924dec0040fd5", "detected_licenses": [ "MIT" ], "directory_id": "725638c276593e319c4dcbd85390425aa084d1f4", "extension": "py", "fi...
2.65625
stackv2
import logging from flask import Flask from flask import jsonify import requests app = Flask(__name__) logger = logging.getLogger(__name__) @app.route("/", methods=["GET"]) def hello(): app.logger.info("Home executed.") return "Hello World!" @app.route("/githubuser/<string:username>") def user(username):...
27
21.96
118
13
139
python
[{"finding_id": "codeql_py/partial-ssrf_4612c18a1978de57_6d155362", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 20 ]
[ null ]
[ 16 ]
[ 72 ]
2024-11-18T22:49:04.380136+00:00
1,596,493,863,000
21c11cf0a37734144eefbb3ecefb01d426808f2d
2
{ "blob_id": "21c11cf0a37734144eefbb3ecefb01d426808f2d", "branch_name": "refs/heads/master", "committer_date": 1596493863000, "content_id": "577e5e35e90349f8e68af8d8c2a6b599a6274c07", "detected_licenses": [ "CC0-1.0" ], "directory_id": "de6660c1649f7fb723b5c9ad63e2bb97d66b4edd", "extension": "py", ...
2.421875
stackv2
import requests from bs4 import BeautifulSoup import csv from time import sleep import sys sys.path.append('../../classes') import notify # import ssl # ssl._create_default_https_context = ssl._create_unverified_context manifest_arr = [] def scrape_for_page(url): flg = True print("page\t" + url) sleep(...
74
19.91
117
18
394
python
[{"finding_id": "codeql_py/request-without-cert-validation_48606ba33af82559_5a4792ca", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 21 ]
[ null ]
[ 9 ]
[ 39 ]
2024-11-18T22:49:07.603492+00:00
1,626,408,674,000
c35b392abf89451eea1bc2dc97a037c72de77904
3
{ "blob_id": "c35b392abf89451eea1bc2dc97a037c72de77904", "branch_name": "refs/heads/master", "committer_date": 1626408674000, "content_id": "ebe2b04b9afeec550865a20875a8b58692c9476f", "detected_licenses": [ "MIT" ], "directory_id": "c84fc063e169af3177b9be64ef1e890087732ae0", "extension": "py", "fi...
3.171875
stackv2
# date:2020.5.25 # author:pmy # aim:爬取google图片 #问题在于,不能保证所爬为所见 from selenium import webdriver import time import os import requests # 修改keyword便可以修改搜索关键词 建议也修改存储目录 keyword = 'cat' # url = 'https://www.google.com.hk/search?q=' + keyword + '&source=lnms&tbm=isch' url = 'https://www.google.com/search?q=' + keyword + '&s...
106
32.7
103
29
833
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_8100a1e83bf910b9_8b79dfa1", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [https://encrypted-tbn0.gstatic.com](1) may be at an ar...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [https://encrypted-tbn0.gstatic.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 69 ]
[ 70 ]
[ 71 ]
[ 82 ]
2024-11-18T23:25:56.196911+00:00
1,642,038,498,000
dafa3d12440011776d6515c1009f96105e41da03
2
{ "blob_id": "dafa3d12440011776d6515c1009f96105e41da03", "branch_name": "refs/heads/master", "committer_date": 1642038498000, "content_id": "aa4a3613e8d69ebc80f44a458c6ab06de32c3154", "detected_licenses": [ "MIT" ], "directory_id": "19fc08817156353e0ee8900222b29e7a232397d8", "extension": "py", "fi...
2.4375
stackv2
import wx import re, random, os, importlib import utility # This module was developed by squinting directly at both the MCP spec # at http://www.moo.mud.org/mcp2/mcp2.html and tkMOO-light's plugins/mcp21.tcl # file, to which this code bears more than a little resemblance and owes # more than a little debt. # my $s...
284
35.77
113
21
2,487
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1ab4e6b299e8e691_feb9fd58", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 63 ]
[ null ]
[ 19 ]
[ 66 ]
2024-11-18T23:26:03.884703+00:00
1,458,888,773,000
ff35c51c9d2bb0bf7d7a63cbac9baf127a552482
3
{ "blob_id": "ff35c51c9d2bb0bf7d7a63cbac9baf127a552482", "branch_name": "refs/heads/master", "committer_date": 1458888773000, "content_id": "58220c81a5bd54beea258445ee9d50548da5cc16", "detected_licenses": [ "MIT" ], "directory_id": "d246785713a23bff91ae0c21e0db95c6b9c11276", "extension": "py", "fi...
2.53125
stackv2
from jinja2 import Environment, FileSystemLoader import json import datetime import re def get(config): template_loader = FileSystemLoader(searchpath=config.TEMPLATE_DIR) env = Environment( loader=template_loader, extensions=['jinja2.ext.loopcontrols']) env.filters['tojson'] = tojson env.filters['isdisjoint']...
41
24.61
67
11
248
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_fe6d6dab6e4a2866_87f08d5d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 8 ]
[ 10 ]
[ 8 ]
[ 42 ]
2024-11-18T22:48:25.875005+00:00
1,546,440,779,000
667ac8baf415295bc8753c6fc36249b50238ff8c
4
{ "blob_id": "667ac8baf415295bc8753c6fc36249b50238ff8c", "branch_name": "refs/heads/master", "committer_date": 1546440779000, "content_id": "4e27d12ca0167eeef14eeab8dc9bfe483d5dc2db", "detected_licenses": [ "MIT" ], "directory_id": "60447371d8295e6b82984a5fce4bbd64787ec624", "extension": "py", "fi...
3.640625
stackv2
class Employee: def __init__(self,first,last,pay): self.first = first self.last = last self.email = first+last+'@123.com' self.pay = pay def fullname(self): return('{} {}'.format(self.first,self.last)) emp_1 = Employee('hello','world',1900) emp_2 = Employee(...
22
17.95
52
11
118
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a75399d1347b3c68_21a6fef6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 18, 19 ]
[ null, null ]
[ 7, 7 ]
[ 12, 12 ]
2024-11-18T22:48:31.117172+00:00
1,634,732,996,000
c22bc4ae295ace126a2b15aafd4fbf7414f9f19d
2
{ "blob_id": "c22bc4ae295ace126a2b15aafd4fbf7414f9f19d", "branch_name": "refs/heads/main", "committer_date": 1634732996000, "content_id": "d3e67c2b5e42194f966fa81edff130fe0ce40372", "detected_licenses": [ "Apache-2.0" ], "directory_id": "a15147ebb4175506570d068bde7dc7b32c6037cc", "extension": "py", ...
2.3125
stackv2
import sys from os import getgid, getuid from pathlib import Path from pwd import getpwuid from click import INT from typer import confirm, prompt from kolombo.console import debug, enable_debug, finished, info, started, step from kolombo.util import run _virtual_configs = { "addresses": "bob@example.com bob@exa...
89
35.01
83
14
803
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_968f5aa440d7d0dd_c6ae3089", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text." ]
[ 73 ]
[ null ]
[ 27 ]
[ 40 ]
2024-11-18T22:27:52.248246+00:00
1,557,732,043,000
623b5548b19536d7811f82f31fa5c2d327cf320a
3
{ "blob_id": "623b5548b19536d7811f82f31fa5c2d327cf320a", "branch_name": "refs/heads/master", "committer_date": 1557732043000, "content_id": "22f42f1fa14a572037c5f50399a77632e427224d", "detected_licenses": [ "MIT" ], "directory_id": "af19ee648bd568eaff881ec2d46d73a9fc6e1b4c", "extension": "py", "fi...
3
stackv2
# Open3D: www.open3d.org # The MIT License (MIT) # See license file or visit www.open3d.org for details # examples/Python/Basic/mesh_sampling.py import numpy as np import os import urllib.request import gzip import tarfile import shutil import time from open3d import * def create_mesh_plane(): mesh = TriangleMes...
106
37.05
85
15
1,034
python
[{"finding_id": "codeql_py/tarslip_b21fd9fbc193825d_06b78333", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 44 ]
[ null ]
[ 13 ]
[ 16 ]
2024-11-18T22:14:52.895829+00:00
1,568,274,392,000
a4ec2af29b8161aeed85fc34049450d04952a3af
2
{ "blob_id": "a4ec2af29b8161aeed85fc34049450d04952a3af", "branch_name": "refs/heads/master", "committer_date": 1568274392000, "content_id": "94773a0d14a5db730db52272693b7c76462ad57a", "detected_licenses": [ "MIT" ], "directory_id": "8245b4195a0c6be2ea8a6621e62d49026414b8fd", "extension": "py", "fi...
2.34375
stackv2
""" Decrypt a pdf given the pkcs12 cert + password note that this works only for pdfs in a specific format. I tested this with encryptedWithCertificateAes128.pdf from the itext distribution Usage: python3 decryptpdf.py encryptedWithCertificateAes128.pdf test.p12 kspass Copyright (c) 2016 Willem Hengeveld <itsme...
110
33.35
104
16
1,219
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_9eab437bddf460ee_557c67e6", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The cryptographic algorithm ARC2](1) is broken or weak, and should not be used.", "...
1
true
[ "CWE-327" ]
[ "py/weak-cryptographic-algorithm" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[The cryptographic algorithm ARC2](1) is broken or weak, and should not be used." ]
[ 94 ]
[ null ]
[ 17 ]
[ 40 ]
2024-11-18T22:55:27.797482+00:00
1,626,684,314,000
5ef307ca33a7f0aaebce4af9afa22495a851842b
3
{ "blob_id": "5ef307ca33a7f0aaebce4af9afa22495a851842b", "branch_name": "refs/heads/master", "committer_date": 1626684314000, "content_id": "8ea9f890523ee2e918d4db187dbd9efe7d1ddcd5", "detected_licenses": [ "Apache-2.0" ], "directory_id": "6846952897c2d33e8b015117a3828fae5730d80b", "extension": "py"...
2.640625
stackv2
# -*- coding: utf-8 -*- """ Created on Thu May 6 12:18:04 2021 @author: Koma """ import os from Crypto.PublicKey import RSA from Crypto import Random from Crypto.Cipher import PKCS1_OAEP class initialKeys(): def __init__(self, name, path): self.name = name self.path = path # -------...
60
33.27
70
17
447
python
[{"finding_id": "codeql_py/weak-crypto-key_908c72e80a837bb2_01085a6f", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",...
1
true
[ "CWE-326" ]
[ "py/weak-crypto-key" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable." ]
[ 24 ]
[ null ]
[ 15 ]
[ 61 ]
2024-11-18T22:55:30.718013+00:00
1,617,191,113,000
5dc479cd4327d14f9b0909ab64a9e0adc2572017
3
{ "blob_id": "5dc479cd4327d14f9b0909ab64a9e0adc2572017", "branch_name": "refs/heads/master", "committer_date": 1617191113000, "content_id": "75ed60d39b4de8aba93cb68584bea20c68a64f89", "detected_licenses": [ "MIT" ], "directory_id": "3a01bf5a4c204c78094dc6ef44b927a97b2e4320", "extension": "py", "fi...
2.703125
stackv2
#------------------------------------------------------------------------------# # Author : Nicklas Sindlev Andersen # #------------------------------------------------------------------------------# # #--------------------------------------------------------------------------...
133
43.58
86
19
1,029
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_db14c0b2c5a111a6_953f0823", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 55 ]
[ 60 ]
[ 31 ]
[ 14 ]
2024-11-18T22:55:33.514532+00:00
1,609,238,528,000
60e2cafe45f6c86cec188a3b7b2b4f7696b0ca61
3
{ "blob_id": "60e2cafe45f6c86cec188a3b7b2b4f7696b0ca61", "branch_name": "refs/heads/master", "committer_date": 1609238528000, "content_id": "8499bc31b71581af2af06aef0ec7c1656f55609d", "detected_licenses": [ "MIT" ], "directory_id": "bd492d9ef0a1b21627114b2ab6987b3a02662ba4", "extension": "py", "fi...
2.578125
stackv2
# -*- coding: utf-8 -*- """Charge logging script This script will download the get_vehicle_status every 5 minutes and log them locally. Based on the Charge Off-Peak script. This script is independent from visualization script in order to run it on different computers """ import jlrpy import threading import datetim...
84
30.75
111
15
668
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_5350dfaa75c1014e_8515ffa7", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text." ]
[ 67 ]
[ null ]
[ 24 ]
[ 73 ]
2024-11-18T22:55:39.894527+00:00
1,553,272,167,000
f712624f08e022edd5664cf166ab006dcfd48dfa
3
{ "blob_id": "f712624f08e022edd5664cf166ab006dcfd48dfa", "branch_name": "refs/heads/master", "committer_date": 1553272167000, "content_id": "2a607100341a4c00e48664f4768585024ec952b7", "detected_licenses": [ "Apache-2.0" ], "directory_id": "68361cd3f7fd49295dca1da3345324f10ff15e1e", "extension": "py"...
2.671875
stackv2
""" This script transforms JSON from the pa11ycrawler into a beautiful HTML report. """ import re import argparse import json import logging import collections import hashlib from path import Path from jinja2 import Environment, PackageLoader from pa11ycrawler.util import pa11y_counts log = logging.getLogger(__name__)...
162
32.85
97
20
1,267
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_93ca01670b870b7a_a2d63c16", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 96 ]
[ null ]
[ 11 ]
[ 73 ]
2024-11-18T23:24:00.033872+00:00
1,595,812,990,000
9bb509f5dc8d7b08af787721246355ebecee57de
3
{ "blob_id": "9bb509f5dc8d7b08af787721246355ebecee57de", "branch_name": "refs/heads/master", "committer_date": 1595812990000, "content_id": "49e05ebc42400e72aad1b492be8d3a6bf2141ba3", "detected_licenses": [ "MIT" ], "directory_id": "976628c3df55a8611159dc5a93965dff4809bb7f", "extension": "py", "fi...
3.3125
stackv2
import binascii from Crypto.Cipher import AES from ..config import AES_KEY def encrypt_with_key(key, plain_text): mod = len(plain_text) % 16 if mod > 0: # 补齐16的倍数 zero = '\0' * (16 - mod) plain_text += zero aes = AES.new(key.encode(), AES.MODE_ECB) cipher_text = binascii.hexl...
48
22.79
83
14
294
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_9884d249b97441e7_00b586f1", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 15, 21 ]
[ null, null ]
[ 36, 18 ]
[ 68, 62 ]
2024-11-18T23:55:47.718818+00:00
1,480,343,863,000
adb1b3decbd900314339eeb5c0644f5e57820028
2
{ "blob_id": "adb1b3decbd900314339eeb5c0644f5e57820028", "branch_name": "refs/heads/master", "committer_date": 1480343863000, "content_id": "e71456e21f4738351ebc9db8b0cdccf2f71d6efe", "detected_licenses": [ "MIT" ], "directory_id": "7926fa95138db21c3a56a1ecd5921e092ef05e89", "extension": "py", "fi...
2.5
stackv2
import requests import json api_key = 'NmQ5N2I1YWQtZWU4Zi00ZTJkLTgwZjAtYjM0OGZkOTc1ZDJk' username = raw_input('Please set the username: ') playlist_name = raw_input('Please enter playlist name: ') found = False r = requests.get('http://api.napster.com/v2.0/members/'+username+'?apikey='+api_key) GUID = r.json()['member...
37
29.51
98
11
312
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f049225951aebbb0_8f57ba37", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 14 ]
[ null ]
[ 7 ]
[ 95 ]
2024-11-19T00:07:06.674165+00:00
1,462,310,070,000
16e7a9603ad224088e5967658be5647b2604f1a3
2
{ "blob_id": "16e7a9603ad224088e5967658be5647b2604f1a3", "branch_name": "refs/heads/master", "committer_date": 1462310070000, "content_id": "01f3cdd3050eea02ff0f0187ecbd150bf930aba9", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "d2627ebbcbf46e6cdef158ff5e1bcbc3b5c7a90d", "extension": "p...
2.3125
stackv2
from gluon import * import re, hashlib, base64 import rsa import cPickle as pickle from uuid import uuid4 try: import ast have_ast=True except: have_ast=False regex_field = re.compile('{{(\w+)(\:\w+)?\!?}}') regex_email = re.compile('[^\s<>"\',;]+\@[^\s<>"\',;]+',re.IGNORECASE) def uuid(): return str...
104
37.14
117
19
973
python
[{"finding_id": "codeql_py/weak-crypto-key_672458d8b5d69b97_17ae7b73", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",...
1
true
[ "CWE-326" ]
[ "py/weak-crypto-key" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable." ]
[ 20 ]
[ null ]
[ 24 ]
[ 41 ]
2024-11-19T00:34:19.167983+00:00
1,623,691,598,000
d7efc7ac1885f4dd696650ed608c92c9dc651cc4
4
{ "blob_id": "d7efc7ac1885f4dd696650ed608c92c9dc651cc4", "branch_name": "refs/heads/main", "committer_date": 1623691598000, "content_id": "c19be4137c1afaa498085426455c047c88c38d0c", "detected_licenses": [ "MIT" ], "directory_id": "c26b3a7d446fbfd71ce11e04129358c17dd6239a", "extension": "py", "file...
3.78125
stackv2
''' Description: Exercises 15 & 16 (Tkinter GUI) Version: 1.0.2.20210124 Author: Arvin Zhao Date: 2021-01-19 17:18:58 Last Editors: Arvin Zhao LastEditTime: 2021-01-24 18:03:29 ''' from tkinter import Button, Tk, Label, Entry, StringVar, OptionMenu, Listbox from tkinter.constants import END class Home: ''' The hom...
91
23.96
80
15
736
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_c0c4cd49cb49ffd2_b3373071", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text." ]
[ 75 ]
[ null ]
[ 15 ]
[ 22 ]
2024-11-19T00:34:41.165716+00:00
1,637,477,487,000
856d9f9c0285fe94d4f6487d7e0e212780be9e7f
3
{ "blob_id": "856d9f9c0285fe94d4f6487d7e0e212780be9e7f", "branch_name": "refs/heads/main", "committer_date": 1637477487000, "content_id": "3fd130ea8ec30e27f512831ab07f4a5bda51681c", "detected_licenses": [ "MIT" ], "directory_id": "5292b03998384c0d2bb5858058892d7e45c5365b", "extension": "py", "file...
2.59375
stackv2
from flask import Flask, request, redirect, g import sqlite3 import os import uuid app = Flask(__name__) SCHEMA = """CREATE TABLE files ( id text primary key, path text ); """ def db(): g_db = getattr(g, '_database', None) if g_db is None: g_db = g._database = sqlite3.connect("database.db") retu...
74
21.42
88
14
432
python
[{"finding_id": "codeql_py/path-injection_b469805acc7a7665_0deb9ebd", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 59 ]
[ null ]
[ 15 ]
[ 41 ]
2024-11-18T23:28:25.898269+00:00
1,593,422,349,000
0ea0660fc43c6e8e789e67d6e26fe1679f0ee0a8
3
{ "blob_id": "0ea0660fc43c6e8e789e67d6e26fe1679f0ee0a8", "branch_name": "refs/heads/master", "committer_date": 1593422349000, "content_id": "fe74e25543c80b0bc0ac23ee4fda302b2355b3ba", "detected_licenses": [ "MIT" ], "directory_id": "a728aa2d9826fdb3645ac61064b107115cf5c4a3", "extension": "py", "fi...
2.640625
stackv2
import os import datetime import json import pandas as pd day_span = 2 num_stations = 5 measurements_dir = os.path.join(os.path.dirname(__file__), 'Measurements') def get_neighbour(file_name, shift): fileList = os.listdir(measurements_dir) try: index = fileList.index(file_name) if index + shif...
97
47.54
171
23
1,165
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_dde0a895fd3be5ce_2ab13544", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 32 ]
[ null ]
[ 45 ]
[ 47 ]
2024-11-18T23:28:31.209076+00:00
1,691,771,582,000
7a2be1bb90eea3f4cbc1d2957fef758e03fae75b
3
{ "blob_id": "7a2be1bb90eea3f4cbc1d2957fef758e03fae75b", "branch_name": "refs/heads/master", "committer_date": 1691834263000, "content_id": "29fe737319dc1cb6643d77dc279dd9185a6fe175", "detected_licenses": [ "Apache-2.0", "MIT" ], "directory_id": "3b44d7e0f8e5bc7ee9a6b922dc888db2b540871f", "exten...
2.6875
stackv2
# coding:utf-8 # Simple utility to convert json schema using jinja2 template from __future__ import print_function import argparse import glob import os import json import yaml import jinja2 THIS_DIR = os.path.dirname(os.path.abspath(__file__)) def process_properties(properties): if not properties: retu...
139
27.04
78
19
758
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_788e516abfae1c4c_b394219e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 101 ]
[ 103 ]
[ 14 ]
[ 26 ]
2024-11-18T23:28:38.970343+00:00
1,449,221,421,000
49ffb9d8f0848968561d3548b3bcc24ec17ff435
3
{ "blob_id": "49ffb9d8f0848968561d3548b3bcc24ec17ff435", "branch_name": "refs/heads/master", "committer_date": 1449221421000, "content_id": "e58f711949284cbe1e7e0ba09a632abbc08cde83", "detected_licenses": [ "ISC" ], "directory_id": "7f1a92608dd899726e40aafadf2fe385e212ccc6", "extension": "py", "fi...
3.234375
stackv2
#!/usr/bin/env python import hashlib from inputs import day4 as secret_key m = hashlib.md5() found_5 = False found_6 = False for i in range(100000000): val = hashlib.md5(secret_key+str(i)).hexdigest() if not found_5 and val.startswith('00000'): found_5 = True print("{} starts with 5 zeros and...
19
28.95
87
13
167
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_135b26276ebc244a_0e30a298", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 11 ]
[ null ]
[ 23 ]
[ 40 ]
2024-11-19T01:11:28.575192+00:00
1,613,657,802,000
8af714a64df08a98d19f215b436c393ed3f8931e
2
{ "blob_id": "8af714a64df08a98d19f215b436c393ed3f8931e", "branch_name": "refs/heads/main", "committer_date": 1613657802000, "content_id": "517e7d8b3438235af873fc2429c833f47b33ce3e", "detected_licenses": [ "MIT" ], "directory_id": "77b35ee961733db0e1c76b02f36425910fb69308", "extension": "py", "file...
2.359375
stackv2
#!/usr/bin/python3 # -*- coding: utf-8 -*- # coding=utf-8 import os import json from datetime import date from common import md5hd,loadconfig import cgi, cgitb def listdir(root,path): config=loadconfig(root) result=[] listdir=os.listdir('.') for i in listdir: if not(i in config['forcehide'...
44
21.2
84
22
248
python
[{"finding_id": "codeql_py/path-injection_8fc2d9add77cd925_54e19a56", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 42 ]
[ null ]
[ 14 ]
[ 23 ]
2024-11-19T01:11:33.695543+00:00
1,505,479,684,000
eafe9753df995b72db95d8f66fdebc0a7e2b2aea
3
{ "blob_id": "eafe9753df995b72db95d8f66fdebc0a7e2b2aea", "branch_name": "refs/heads/master", "committer_date": 1505479684000, "content_id": "b231e84b32c8725aca5e99ad0a46b830e9b876d1", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "74ff391cd93191dd1d2e0b8e957ab37850887ffc", "extension": "p...
3.015625
stackv2
#!/usr/bin/env python # Author: Euaggelos Mouroutsos # Secure Communication Project # Implementation of a cryptographic utility # Copyright (c) 2015, Euaggelos Mouroutsos # All rights reserved. # Redistribution and use in source and binary forms, with or without modification, # are permitted provided that the follow...
76
37.46
105
13
685
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_e9a8fad41b0c9c0d_12cb5e64", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 64, 73 ]
[ null, null ]
[ 19, 18 ]
[ 43, 49 ]
2024-11-18T23:11:00.818932+00:00
1,657,504,556,000
8f8e93006b88073ff762af8ec830a42051b78631
3
{ "blob_id": "8f8e93006b88073ff762af8ec830a42051b78631", "branch_name": "refs/heads/master", "committer_date": 1657504556000, "content_id": "047e1fd9e58d600f282f25133081e1d148689e24", "detected_licenses": [ "Apache-2.0" ], "directory_id": "7fb2b9fff72919345c910b93089eb50d1a3ec64c", "extension": "py"...
3.046875
stackv2
#!/bin/env python3 try: import bcrypt, base64 except ImportError: raise ImportError("Missing 'bcrypt' or 'base64' libraries ") # Password Format: 5char-5char-5char-5char MYPASSWORD = b"a1b2c-3d4e5-f6g7h-8i9ab" # Generate ascii encoded encrypted password with random salt encrypted_password = bcrypt.hashpw(MYP...
16
27.25
64
9
135
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9a5a810b3b9865b3_9b952a50", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 16 ]
[ null ]
[ 39 ]
[ 51 ]
2024-11-18T23:11:14.920882+00:00
1,629,214,842,000
1c3369fa82d9cc4300b506c43719eba5630ecc5d
3
{ "blob_id": "1c3369fa82d9cc4300b506c43719eba5630ecc5d", "branch_name": "refs/heads/master", "committer_date": 1629214842000, "content_id": "2e88a28d431e681aa8ba7300b4e1f436e6a4127c", "detected_licenses": [ "MIT" ], "directory_id": "3bdd67ba31d0cff2934cbb57e3ec4a35a8554444", "extension": "py", "fi...
2.53125
stackv2
import requests import json import re from api import cfg CLIENT_ID = 'mao line bot' CLIENT_VER = '1.0' API_URL = 'https://safebrowsing.googleapis.com/v4/threatMatches:find?key=%s' % (cfg['google_api_key']) PLATFORM_TYPES = ['ANY_PLATFORM'] THREAT_ENTRY_TYPES = ['URL'] THREAT_TYPES = [ 'MALWARE', 'SOC...
72
24.03
112
14
512
python
[{"finding_id": "codeql_py/overly-large-range_b2041e6a3dbccd0f_5577352e", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 33 ]
[ null ]
[ 54 ]
[ 57 ]
2024-11-19T01:21:43.365976+00:00
1,673,345,931,000
b58d7b966f3198e76dfe96580fed39664bb9ec13
2
{ "blob_id": "b58d7b966f3198e76dfe96580fed39664bb9ec13", "branch_name": "refs/heads/master", "committer_date": 1673359073000, "content_id": "3f60c45dea38aa0dee2125315288d1ad1209096c", "detected_licenses": [ "MIT" ], "directory_id": "ebf5002ce06c285cb0ca03ac7e5545253e8662ff", "extension": "py", "fi...
2.34375
stackv2
import os import asyncio import requests from datetime import datetime import tornado.web from tornado_sqlalchemy import SQLAlchemy from tornado_sqlalchemy import SessionMixin from pybrake.middleware.tornado import init_app from sqlalchemy import Column, Integer, String city_list = ["pune", "austin", "santabarbara",...
92
27.92
80
14
598
python
[{"finding_id": "codeql_py/reflective-xss_60eec7e76481ed65_0c0d7296", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
2
true
[ "CWE-079", "CWE-918" ]
[ "py/reflective-xss", "py/partial-ssrf" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 65, 62 ]
[ null, 64 ]
[ 24, 14 ]
[ 32, 10 ]
2024-11-19T01:21:51.433245+00:00
1,594,022,993,000
8249e3f3e99fbcf58985afc51a4d5997ed635de1
3
{ "blob_id": "8249e3f3e99fbcf58985afc51a4d5997ed635de1", "branch_name": "refs/heads/master", "committer_date": 1594022993000, "content_id": "571079596d1c9ff4db738f9d12cdb31e1759cfd8", "detected_licenses": [ "MIT" ], "directory_id": "ed35e9edeb3b4e01f7478a1046b31bb5e957e213", "extension": "py", "fi...
2.71875
stackv2
#!/usr/bin/env python3 import re import sys import requests from time import sleep from shodan import Shodan from datetime import datetime from threading import Thread, activeCount # Shodan API Key (change according to your Shodan API key) api_key = '' # Shodan search query search_query = 'http.title:"BIG-IP&reg;- Red...
93
28.97
160
19
768
python
[{"finding_id": "codeql_py/request-without-cert-validation_de64aea46ca0fa27_5335b8dd", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 49, 51 ]
[ null, null ]
[ 13, 17 ]
[ 161, 104 ]
2024-11-19T00:24:53.300999+00:00
1,634,217,370,000
454c7a82a9d3c5398ed1058eceeaaf540ef487b9
3
{ "blob_id": "454c7a82a9d3c5398ed1058eceeaaf540ef487b9", "branch_name": "refs/heads/master", "committer_date": 1634217370000, "content_id": "21df88f781ed43d4f832b176e21c9cc17a69bdc4", "detected_licenses": [ "MIT" ], "directory_id": "e8f3ec89630aa5a5b5a4eeedacfac3e55f105264", "extension": "py", "fi...
2.515625
stackv2
## The script can be run with Python 3.5 or higher version. ## The script requires 'requests' library to make the API calls. The library can be installed using the command: pip install requests. import argparse import requests import time import login.login_api as login_api def get_usage(): return ("\nThe comman...
149
40.83
143
22
1,275
python
[{"finding_id": "codeql_py/request-without-cert-validation_7826240710cc46c1_e4897119", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
3
true
[ "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 41, 58, 87 ]
[ null, null, null ]
[ 32, 40, 29 ]
[ 125, 129, 100 ]
2024-11-19T00:36:48.567401+00:00
1,542,523,581,000
c160b7af00f99ab0d402bf990f70a465915f3e2d
3
{ "blob_id": "c160b7af00f99ab0d402bf990f70a465915f3e2d", "branch_name": "refs/heads/master", "committer_date": 1542965228000, "content_id": "72b8e493b6d6d4d11d18265549d770498784e32c", "detected_licenses": [ "Apache-2.0" ], "directory_id": "377eec02ac9c908f4aad06768f019ae2f685eb55", "extension": "py"...
2.609375
stackv2
import argparse import configparser import traceback import sys import tempfile from typing import Dict, Any from os import path, remove from zulipterminal.core import Controller def parse_args() -> argparse.Namespace: description = ''' Starts Zulip-Terminal. ''' formatter_class = argparse.Ra...
156
29.78
78
17
1,168
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_31247c63d6d74464_557e1437", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (password)](3) as clear text." ]
[ 77 ]
[ 80 ]
[ 17 ]
[ 38 ]
2024-11-19T00:51:23.056571+00:00
1,541,427,421,000
21a4be2ce76a10dc8b75fe97588bd8ae9d1c689e
3
{ "blob_id": "21a4be2ce76a10dc8b75fe97588bd8ae9d1c689e", "branch_name": "refs/heads/master", "committer_date": 1541427421000, "content_id": "62e43e35d2b28d1159aa1e7b99b21ab8096d1f00", "detected_licenses": [ "MIT" ], "directory_id": "4bb0f9785c7802703b515d269798a8d8c69e67ae", "extension": "py", "fi...
2.640625
stackv2
from flask import Flask, request import data.init_users app = Flask(__name__) @app.route('/response', methods=['POST']) def receive_SMS(): # Receives SMS from users who wants to register to use the service sms = request.get_json() phonenum, message = sms['phone'], sms['content'] init_users(phonenum, message) p...
19
22.89
72
11
108
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_79b8de67575e7c62_65952c05", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-215" ]
[ "py/clear-text-logging-sensitive-data", "py/flask-debug" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger." ]
[ 14, 18 ]
[ null, null ]
[ 8, 2 ]
[ 72, 21 ]
2024-11-19T01:02:28.763794+00:00
1,319,839,311,000
bdf602d658d9d7905b9127b68879886d2a882645
2
{ "blob_id": "bdf602d658d9d7905b9127b68879886d2a882645", "branch_name": "refs/heads/master", "committer_date": 1319839311000, "content_id": "eedfe7a4326a5a00941e42518f702ff31d16f0d5", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "60fa6288d7745ea0f51f23bb6d9ef561c2c55b73", "extension": "p...
2.453125
stackv2
import cgi _builtin_renderers = {} error_formatters = [] # # JSON rendering engine # class JsonRenderer(object): def __init__(self, path, extra_vars): pass def render(self, template_path, namespace): from jsonify import encode return encode(namespace) _builtin_renderers['json'] ...
189
29.53
150
16
1,240
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_fc7d458b147bebd3_ce2ddb0d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 110 ]
[ null ]
[ 24 ]
[ 66 ]
2024-11-18T23:48:42.081937+00:00
1,623,166,327,000
f06a22c422dbf4152cc06fadcdacb09ef2ff5f05
3
{ "blob_id": "f06a22c422dbf4152cc06fadcdacb09ef2ff5f05", "branch_name": "refs/heads/main", "committer_date": 1623166327000, "content_id": "ef429fda1150c6112a88b6c3592aca88a1ad4f50", "detected_licenses": [ "Apache-2.0" ], "directory_id": "c82b789c5055ef0b5bd137dc62be01ea3fdbed9e", "extension": "py", ...
2.71875
stackv2
import requests from geopy.geocoders import Nominatim import json import os import sys def reverse_geocode(coordinates): api_key = os.environ.get('POSITIONSTACK_API') lat, lng = [x.strip() for x in coordinates.split(',')[:2]] query = f'http://api.positionstack.com/v1/reverse?access_key={api_key}&query={lat...
33
26.42
112
14
233
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_45ff97acace66466_6d273092", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 17 ]
[ null ]
[ 11 ]
[ 14 ]
2024-11-19T01:51:50.098163+00:00
1,412,591,981,000
8e7a63c7138bc500e84c450a8b1ae8bb874a7020
2
{ "blob_id": "8e7a63c7138bc500e84c450a8b1ae8bb874a7020", "branch_name": "refs/heads/master", "committer_date": 1412591981000, "content_id": "2dbe87c742647ba5ac8963b43c029b3f3a8e0db6", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "75396ddf9cd7ecfcb9466a67010e9cf94707ae63", "extension": "p...
2.34375
stackv2
#!/usr/bin/env python # -*- encoding: utf-8 -*- import pkg_resources werkzeug = pkg_resources.get_distribution("werkzeug") import re import json import base64 import struct from os.path import isfile from hashlib import sha1 from werkzeug.wrappers import Request as _Request, Response from werkzeug.exceptions import...
119
28.55
85
18
821
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_eac6f410b7089799_e4fc790c", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (SHA1) that is insecure."...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (id)](1) is used in a hashing algorithm (SHA1) that is insecure." ]
[ 53 ]
[ null ]
[ 38 ]
[ 41 ]
2024-11-19T01:51:52.774501+00:00
1,603,495,225,000
6c53949fe2bc5183359999761be620a376e738c0
3
{ "blob_id": "6c53949fe2bc5183359999761be620a376e738c0", "branch_name": "refs/heads/main", "committer_date": 1603495225000, "content_id": "e759aba6b62e1c20fe370293a40605b058e00ece", "detected_licenses": [ "Apache-2.0" ], "directory_id": "1804b5702536c4b28c2b96ffa6b0e429b754865e", "extension": "py", ...
2.734375
stackv2
""" Simple Flask web site """ import flask # The basic framework for http requests, storing cookies, etc import logging # For monitoring and debugging from werkzeug.utils import secure_filename import os import tempfile from skeleton import runner, runner2 ### import our project file import pandas UPLOAD_FOLDER = ...
156
27.51
75
13
1,058
python
[{"finding_id": "codeql_py/log-injection_6380697eb4022c07_a14c0f17", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 65 ]
[ null ]
[ 26 ]
[ 64 ]
2024-11-19T01:51:56.716553+00:00
1,609,267,873,000
89c4d7d0ac107ff279186521048c19e75bfea667
2
{ "blob_id": "89c4d7d0ac107ff279186521048c19e75bfea667", "branch_name": "refs/heads/master", "committer_date": 1609267873000, "content_id": "542af0b494f5376d0ab21c128f921d3f248adf3b", "detected_licenses": [ "MIT" ], "directory_id": "d0c00685d91b73273acd8d0eaa1f4190afca2bc2", "extension": "py", "fi...
2.34375
stackv2
#!/usr/bin/python3 # vougen # This is for to create Mikrotik Hotspot User & the voucher for it. # It can write the created user(s) directly on the Mikrotik Routers # Developed by Pezhman Shafigh # January 2019 from tkinter import * from tkinter import ttk from tkinter import messagebox import subprocess from reportl...
338
38.58
122
19
3,797
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_398243a6a57e7c52_553395b9", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](1) as clear text." ]
[ 253 ]
[ null ]
[ 39 ]
[ 51 ]
2024-11-19T01:52:01.473986+00:00
1,505,858,569,000
4a2370e1201ebd438b36785b335a26f5cb36f22c
2
{ "blob_id": "4a2370e1201ebd438b36785b335a26f5cb36f22c", "branch_name": "refs/heads/master", "committer_date": 1505858569000, "content_id": "f1072423b57374f5fd00b6a6895fe4589fcb11f4", "detected_licenses": [ "MIT" ], "directory_id": "25e10810e6763931e2b57d93d8df84736ee1b855", "extension": "py", "fi...
2.4375
stackv2
''' Created on Aug 31, 2017 @author: paul ''' from jinja2 import Environment, FileSystemLoader import yaml import sys import csv ENV = Environment(loader=FileSystemLoader('.')) with open("CTP.yaml") as _: config = yaml.load(_) trainAssetToNetwork = csv.DictReader(open("CTPassetToNetwork.csv")) trainVars = {} ...
34
19.74
67
10
188
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_c02f612037993a7f_1224f738", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 12 ]
[ null ]
[ 7 ]
[ 48 ]
2024-11-19T01:40:01.174180+00:00
1,576,626,927,000
bc34ac2ae0eb04e6d45dd646972d95a08210e81a
2
{ "blob_id": "bc34ac2ae0eb04e6d45dd646972d95a08210e81a", "branch_name": "refs/heads/master", "committer_date": 1576626927000, "content_id": "f37f3081b4527e46240e7866d21b88a1c5b1147a", "detected_licenses": [ "MIT" ], "directory_id": "43a663d89c115452fdbfcb7e1c71252b573fac67", "extension": "py", "fi...
2.359375
stackv2
from urllib.request import urlopen, urlretrieve from urllib.parse import urlparse from typing import Iterable from subprocess import Popen, PIPE from threading import Thread from traceback import print_exc import json import sys import platform import tarfile import zipfile import os import os.path import venv import t...
348
35.64
94
20
2,575
python
[{"finding_id": "codeql_py/tarslip_7e4e23b4bcbe7a61_5bb643ef", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 298 ]
[ null ]
[ 36 ]
[ 55 ]
2024-11-19T01:40:02.041482+00:00
1,659,864,747,000
f1524d306e07e95b0a7d58d55b98d156134bcd41
4
{ "blob_id": "f1524d306e07e95b0a7d58d55b98d156134bcd41", "branch_name": "refs/heads/master", "committer_date": 1659864747000, "content_id": "8b6bf15146c1a4544fd797794736a1ea41d393ff", "detected_licenses": [ "MIT" ], "directory_id": "d1ed14daed2b2ebc0f7f7e5810f0715a57ac30c4", "extension": "py", "fi...
4.28125
stackv2
""" Regular Expressions “Knowing [regular expressions] can mean the difference between solving a problem in 3 steps and solving it in 3,000 steps. When you’re a nerd, you forget that the problems you solve with a couple keystrokes can take other people days of tedious, error-prone work to slog through.” """ def i...
302
33.01
127
11
2,844
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c7227b4a2f4bbe9c_6b8c389d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 286 ]
[ null ]
[ 7 ]
[ 19 ]
2024-11-19T00:32:59.001134+00:00
1,476,299,887,000
b47ade29440be7db812b0031ab2b9eb43a22bb79
2
{ "blob_id": "b47ade29440be7db812b0031ab2b9eb43a22bb79", "branch_name": "refs/heads/master", "committer_date": 1476299887000, "content_id": "6f20e6c094f9973abcd7054318daef2cbbec61c9", "detected_licenses": [ "MIT" ], "directory_id": "9e4e37fd214ea5e840ec3a2c82003ce4af7a11f5", "extension": "py", "fi...
2.390625
stackv2
#!/usr/bin/env python ################################################################################ # # A poorly written Slack integration that enables adding # IP addresses to a Palo Alto dynamic blacklist located on a remote server. # # Curently built to run from /opt/blockip/ # # https://github.com/ecapuano/sl...
265
36.65
142
21
2,648
python
[{"finding_id": "codeql_py/full-ssrf_0ffc300302900317_9b8093e8", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
45
true
[ "CWE-918", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE...
[ "py/full-ssrf", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-inje...
[ "HIGH", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIU...
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MED...
[ "The full URL of this request depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This l...
[ 253, 59, 67, 67, 77, 77, 84, 99, 99, 99, 113, 113, 121, 133, 143, 143, 143, 143, 159, 159, 159, 159, 161, 173, 184, 187, 190, 195, 200, 204, 207, 212, 212, 212, 212, 212, 216, 218, 233, 238, 246, 246, 255, 256, 260 ]
[ null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null...
[ 7, 61, 74, 85, 61, 72, 56, 69, 74, 77, 59, 69, 51, 53, 70, 81, 94, 114, 72, 83, 96, 116, 79, 47, 50, 44, 40, 44, 66, 63, 62, 62, 65, 77, 90, 100, 62, 49, 63, 62, 67, 75, 46, 48, 46 ]
[ 65, 73, 83, 89, 70, 76, 60, 73, 76, 82, 68, 73, 53, 55, 72, 93, 103, 119, 74, 95, 105, 121, 81, 49, 52, 46, 42, 47, 69, 66, 65, 64, 76, 89, 99, 105, 64, 64, 65, 64, 74, 87, 53, 57, 53 ]
2024-11-19T00:32:59.902299+00:00
1,613,810,838,000
8c559b11c24939aab882a22c3afb49d756ac7c3b
2
{ "blob_id": "8c559b11c24939aab882a22c3afb49d756ac7c3b", "branch_name": "refs/heads/master", "committer_date": 1613810838000, "content_id": "5323d80d89da0e6714919670140882fd439ddf25", "detected_licenses": [ "MIT" ], "directory_id": "fa339d9eea1f93b012da221cafb6c6ac542d53be", "extension": "py", "fi...
2.34375
stackv2
# coding: utf-8 import json from flask import request from apps import app import logging logging.getLogger("request_handler") # 设置请求钩子 @app.before_request def before_request(): if request.method.lower() == "get": if request.args: parameter = request.args.to_dict(flat=True) loggin...
37
26.05
74
18
225
python
[{"finding_id": "codeql_py/log-injection_6b5152d43c2f045b_62199358", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 20 ]
[ null ]
[ 26 ]
[ 61 ]
2024-11-19T00:33:07.644205+00:00
1,481,123,732,000
b365dcac2b3b6f54c133d81a726bd2e951bf3982
3
{ "blob_id": "b365dcac2b3b6f54c133d81a726bd2e951bf3982", "branch_name": "refs/heads/master", "committer_date": 1481123732000, "content_id": "7dd81ece5cc39938fc6750fc3b97e6f7968c085e", "detected_licenses": [ "Apache-2.0" ], "directory_id": "50789291ac0cc4a9298f35db7f9cea37b69dbd1f", "extension": "py"...
2.84375
stackv2
#!/usr/bin/python # -*- coding: utf-8 -*- import sys, random, json, urllib2, codecs generateChars = u"abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789" sqlBoilerplate = """SET NAMES 'utf8mb4'; use students; INSERT INTO students(forename, surname, email, gender, group_id, exam_results, birth_year, is_fore...
75
32.28
167
16
739
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_97a65a351ec140cb_7496b47e", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text." ]
[ 71 ]
[ null ]
[ 12 ]
[ 29 ]
2024-11-19T01:18:09.103392+00:00
1,520,584,727,000
ca04f03399adfdb28c036d1b37a7a4f5f87a6777
2
{ "blob_id": "ca04f03399adfdb28c036d1b37a7a4f5f87a6777", "branch_name": "refs/heads/master", "committer_date": 1520584727000, "content_id": "3cd15190d91f1d46bea5cd51700d799455c711ad", "detected_licenses": [ "ZPL-2.1" ], "directory_id": "eb732d45c3b61d843acb9486400241f531f81a98", "extension": "py", ...
2.421875
stackv2
### -*- coding: utf-8 -*- ############################################# # Developed by Maksym Polshcha (maxp@sterch.net) # All right reserved, 2012-2014 ####################################################################### """Client classes for the Zope 3 based """ __author__ = """Polscha Maxim (maxp@sterch.net) ...
137
40.74
139
15
1,409
python
[{"finding_id": "codeql_py/insecure-protocol_f7de07c28ed24f7e_f037c1bf", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version SSLv3 specified by [call to ssl.wrap_socket](1).", "remediation": "", "l...
1
true
[ "CWE-327" ]
[ "py/insecure-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Insecure SSL/TLS protocol version SSLv3 specified by [call to ssl.wrap_socket](1)." ]
[ 131 ]
[ null ]
[ 25 ]
[ 109 ]
2024-11-19T00:25:34.622768+00:00
1,568,540,884,000
b4c981205ebd71573e218ae432aab5f91f31c250
2
{ "blob_id": "b4c981205ebd71573e218ae432aab5f91f31c250", "branch_name": "refs/heads/master", "committer_date": 1568540884000, "content_id": "8db049829b12ab6dc322d7f36df7521433900443", "detected_licenses": [ "MIT" ], "directory_id": "b8545bf4b35de29f4b91ecedaa0cf22f44d3c8ab", "extension": "py", "fi...
2.46875
stackv2
 import os import sys from collections import OrderedDict import binarybrain as bb import urllib.request import tarfile import gzip import shutil if 'ipykernel' in sys.modules: from tqdm import tqdm_notebook as tqdm else: from tqdm import tqdm def wget(url, filename): with urllib.request.urlopen(url) as r...
191
36.1
149
19
1,566
python
[{"finding_id": "codeql_py/tarslip_217dc5da4cce3410_1b56baae", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 24 ]
[ null ]
[ 9 ]
[ 14 ]