added
stringlengths
32
32
created
int64
1,244B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.25
source
stringclasses
1 value
text
stringlengths
324
20.1k
num_lines
int64
16
598
avg_line_length
float64
15.1
58.3
max_line_length
int64
33
179
ast_depth
int64
8
39
length
int64
101
3.8k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.1k
265k
sast_codeql_findings_count
int64
1
45
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
45
rule_ids
listlengths
1
45
confidences
listlengths
1
45
severities
listlengths
1
45
messages
listlengths
1
45
line_starts
listlengths
1
45
line_ends
listlengths
1
45
column_starts
listlengths
1
45
column_ends
listlengths
1
45
2024-11-18T21:14:05.282366+00:00
1,480,279,077,000
b16a29dd058d5f3c5c7883edeb4a6e15a38cd8be
2
{ "blob_id": "b16a29dd058d5f3c5c7883edeb4a6e15a38cd8be", "branch_name": "refs/heads/master", "committer_date": 1480279077000, "content_id": "539c605c758a442b5595b33036cb293164cab21b", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "c8e383a7d1e3e36de6cb40234cce2e172d451485", "extension": "p...
2.3125
stackv2
from flask import Flask, jsonify, render_template, request import nest import os import json import anyjson app = Flask(__name__) def prep(data): data_zipped = zip(*data) return map(lambda x: {'x':x[0], 'y':x[1]}, data_zipped) @app.template_filter('neurons') def neurons_filter(nodes): return filter(lambd...
108
32.68
144
18
908
python
[{"finding_id": "codeql_py/path-injection_a0518993bd678a70_81b6c36d", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 60 ]
[ null ]
[ 19 ]
[ 46 ]
2024-11-18T21:58:02.609213+00:00
1,428,657,598,000
ee783a15a048af021a21c955971c3e031781abe8
2
{ "blob_id": "ee783a15a048af021a21c955971c3e031781abe8", "branch_name": "refs/heads/master", "committer_date": 1428657598000, "content_id": "4fa2be419a4ef23c7f8bffacf32d72923e9bfca5", "detected_licenses": [ "Apache-2.0" ], "directory_id": "aaf5107fe1fc21b9eacb6e47edd6ed2ff1609b9b", "extension": "py"...
2.46875
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- import pyaudio from jinja2.loaders import FileSystemLoader from jinja2 import Environment import wave import multiprocessing import sys import os.path from datetime import datetime import urlparse import Queue import BaseHTTPServer from threading import Thread from alex....
265
34.65
111
23
1,873
python
[{"finding_id": "codeql_py/path-injection_d6aa285e53cae3a2_9b78b610", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2).", "remed...
2
true
[ "CWE-022", "CWE-079" ]
[ "py/path-injection", "py/jinja2/autoescape-false" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2).", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 250, 255 ]
[ null, 256 ]
[ 59, 15 ]
[ 63, 44 ]
2024-11-18T21:58:19.317268+00:00
1,586,696,969,000
c4be9ba27decc35c3e95fcccc4bb3d473de721b2
3
{ "blob_id": "c4be9ba27decc35c3e95fcccc4bb3d473de721b2", "branch_name": "refs/heads/master", "committer_date": 1586696969000, "content_id": "1dcc22ab2dd8c9ce2683cae157ba6b7d9d9dd354", "detected_licenses": [ "Apache-2.0" ], "directory_id": "8cced97a617f980cca7b5e1342ac15e2ffbf8d33", "extension": "py"...
2.5625
stackv2
import json import requests class Pishahang(): """ Pishahang Related Interfaces """ def __init__(self, host, port=4002, requests_port=32001, policy_port=8899): self._host = host self._port = port self.policy_port = policy_port self._requests_port = requests_port ...
452
36.46
127
16
3,724
python
[{"finding_id": "codeql_py/request-without-cert-validation_44fe3862d7c1481c_2b550ec4", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
11
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation"...
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 43, 90, 121, 167, 198, 234, 281, 342, 382, 413, 444 ]
[ null, null, null, null, null, null, null, 343, 383, null, null ]
[ 17, 17, 17, 17, 17, 17, 17, 17, 17, 17, 17 ]
[ 97, 103, 97, 103, 111, 97, 103, 60, 60, 87, 87 ]
2024-11-18T21:58:30.047147+00:00
1,568,393,168,000
d9d46c05795a3d0ddb7fb56cbcc6eece1cf39ff6
2
{ "blob_id": "d9d46c05795a3d0ddb7fb56cbcc6eece1cf39ff6", "branch_name": "refs/heads/master", "committer_date": 1568393168000, "content_id": "919fac990cdc59748f2a1eca89df09d8f120dd5a", "detected_licenses": [ "MIT" ], "directory_id": "9c3c83007c5bf0f36635b0045b2aad7f8a11ac11", "extension": "py", "fi...
2.484375
stackv2
import os from flask import Flask, render_template, request, make_response, session, url_for, redirect, flash, abort from werkzeug.utils import secure_filename app = Flask(__name__) app.secret_key = 'wohohoho' #upload ALLOWED_EXTENSION = set(['txt', 'pdf', 'png', 'jpg', 'jpeg', 'gif']) app.config['UPLOAD_FOLDER'] ='...
33
29.97
106
16
224
python
[{"finding_id": "codeql_py/url-redirection_b2b2ffd1ae01887c_f873540c", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
2
true
[ "CWE-601", "CWE-601" ]
[ "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 23, 26 ]
[ null, null ]
[ 29, 29 ]
[ 40, 40 ]
2024-11-18T23:10:54.530735+00:00
1,689,382,387,000
1d9c106838ba75f1d2d69b3426c2016767ac525e
3
{ "blob_id": "1d9c106838ba75f1d2d69b3426c2016767ac525e", "branch_name": "refs/heads/master", "committer_date": 1689574133000, "content_id": "f40b2762c119a1f0462d144f1ffb83fab2fb9977", "detected_licenses": [ "Apache-2.0" ], "directory_id": "fcc3ff96160f23866b5ebd8dc08058968ec77b79", "extension": "py"...
2.578125
stackv2
#!/usr/bin/env python3 import argparse import logging import os import random import string from getpass import getpass from uuid import UUID from cryptography.hazmat.backends import default_backend from cryptography.hazmat.primitives import hashes from cryptography.hazmat.primitives.ciphers.aead import AESGCM from c...
199
28.48
112
15
1,286
python
[{"finding_id": "codeql_py/overly-permissive-file_87ed76b99bc0b73e_f247c0a1", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in open sets file to world readable.", "remediation": "", "location": {...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in open sets file to world readable." ]
[ 81 ]
[ null ]
[ 20 ]
[ 84 ]
2024-11-18T22:36:01.814069+00:00
1,693,565,690,000
ed274999857a9a5e4f17306606b75b5242f15a43
3
{ "blob_id": "ed274999857a9a5e4f17306606b75b5242f15a43", "branch_name": "refs/heads/main", "committer_date": 1693565690000, "content_id": "b5f044cfcf4522c3c4e83143900be38c0b6762c8", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "749af8e81d5ccd2d8714a34434a9c77772df551b", "extension": "py"...
2.640625
stackv2
""" Generate a release note template. The key parameters are RELEASE, VERSION, MILESTONE BRANCH, and LAST_COMMIT_SHA. LAST_COMMIT_SHA is the sha of the commit used to produce the previous version. This is used to determine the time stamp where commits in the current release begin. Requires PyGitHub, dateparser and j...
188
31.79
79
18
1,454
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_58ff362848e1f88e_fc12123e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 184 ]
[ null ]
[ 9 ]
[ 28 ]
2024-11-18T22:49:02.244337+00:00
1,574,718,049,000
60c6b170f2c5d3c2bab87e0e326ded29ac198f6c
2
{ "blob_id": "60c6b170f2c5d3c2bab87e0e326ded29ac198f6c", "branch_name": "refs/heads/master", "committer_date": 1574718049000, "content_id": "e5a0921aea711c2ad62549dcf03a3d7cf96be7fc", "detected_licenses": [ "MIT", "Apache-2.0" ], "directory_id": "82aab270f50e2c80ac58fc0a073ccdb9706a06d3", "exten...
2.34375
stackv2
from collections import defaultdict import json import logging from jose import ( jwk, jwt, ) import tornado.ioloop from tornado.web import ( Application, HTTPError, RequestHandler, ) logger = logging.getLogger() logger.setLevel("DEBUG") with open("./data/iam-prod-keys.json") as kf: KEYS = ...
115
27.02
78
18
747
python
[{"finding_id": "codeql_py/log-injection_0cd5cde94e621406_52cbdc2a", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 82 ]
[ null ]
[ 22 ]
[ 78 ]
2024-11-18T22:49:05.271783+00:00
1,624,262,469,000
0d8b1e8bf91afaa483cbbf2ee11e219f6828d251
3
{ "blob_id": "0d8b1e8bf91afaa483cbbf2ee11e219f6828d251", "branch_name": "refs/heads/main", "committer_date": 1624262469000, "content_id": "cb91886a2ed470007a296880097afec0ee7f873a", "detected_licenses": [ "MIT" ], "directory_id": "55bce9ee72b4d62dacfddc23265aeaccab181ef1", "extension": "py", "file...
2.515625
stackv2
from typing import Union, Any, Optional from datetime import datetime, timedelta from jose import jwt from app.core.config import settings import hashlib ALGORITHM = "HS256" def get_password_hash(password: str) -> str: return hashlib.sha256(password.encode("utf-8")).hexdigest() def verify_password(password: ...
31
27.23
81
14
198
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_fd03c521826740ec_3249fadb", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e...
[ 13 ]
[ null ]
[ 27 ]
[ 51 ]
2024-11-18T23:26:06.092008+00:00
1,544,927,333,000
c0b5aa02d930b8f92741de41bc63378593145625
3
{ "blob_id": "c0b5aa02d930b8f92741de41bc63378593145625", "branch_name": "refs/heads/master", "committer_date": 1544927333000, "content_id": "d11195ace10f4f56a0b426c4936d6b54b192f637", "detected_licenses": [ "ISC" ], "directory_id": "4bff1ef564e0d0c101d5a3091f3d2fbc4a61c01d", "extension": "py", "fi...
2.53125
stackv2
""" Python code generator """ from jinja2 import Environment, PackageLoader # type: ignore from .CodeGeneratorBase import CodeGeneratorBase from ..GeneratorHelpers import make_delimiter_comment_func, make_jinja2_filter, map_format_filter from ..SemanticGraph import Array, BuiltinType, BuiltinTypeCategory, Enum, Inte...
92
35.86
145
21
802
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_d02058b22c3ebe6a_258b2a85", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 27 ]
[ null ]
[ 15 ]
[ 70 ]
2024-11-18T22:14:46.773550+00:00
1,635,165,339,000
13d8ccf1a1561cbdb515ae787601ad2ec7698708
3
{ "blob_id": "13d8ccf1a1561cbdb515ae787601ad2ec7698708", "branch_name": "refs/heads/main", "committer_date": 1635165339000, "content_id": "ca079f0d907d3be4a6c5a25bbcb8ea7ab91e7768", "detected_licenses": [ "MIT" ], "directory_id": "f1aad75219cdfae4aa7fc2cfbb47ce258245b40e", "extension": "py", "file...
2.90625
stackv2
import pandas as pd import qrcode import shutil import os import random from pathlib import Path import hashlib as hl class recipient: _username = "" _password_hash = 0 database = pd.DataFrame() loginConfirm = False userId = "" def __init__(self, username:str, password:str, new_user=False): ...
109
30.76
135
16
815
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_03532b6653759988_02fdd082", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 19 ]
[ null ]
[ 38 ]
[ 55 ]
2024-11-18T22:15:00.864180+00:00
1,575,064,916,000
c875976a2f1dea4fcec2b823ac65156277e6d8f1
3
{ "blob_id": "c875976a2f1dea4fcec2b823ac65156277e6d8f1", "branch_name": "refs/heads/master", "committer_date": 1575064916000, "content_id": "bdb2a32416a2282ff4f06079f41f41e1d8e174ae", "detected_licenses": [ "MIT" ], "directory_id": "c74146189c9b05700d27c5dc8610c3c2fa5eaa1d", "extension": "py", "fi...
2.515625
stackv2
import json import logging import os import sys import boto3 import urllib3 urllib3.disable_warnings() logger = logging.getLogger() logger.setLevel(logging.INFO) http_pool = urllib3.PoolManager() secretsmanager_client = boto3.client('secretsmanager') def changeSyntheticStatus(new_status): logger.info(f"Start...
92
35.14
168
15
701
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bf5bd0b0cb0089fa_3f817288", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 34 ]
[ null ]
[ 17 ]
[ 87 ]
2024-11-18T22:55:28.091534+00:00
1,579,281,654,000
a603651ad77da40910a9c9cf20775490501c4e9a
2
{ "blob_id": "a603651ad77da40910a9c9cf20775490501c4e9a", "branch_name": "refs/heads/master", "committer_date": 1579281654000, "content_id": "fbe4685b08540381080014c6b5694d0c1e3825b9", "detected_licenses": [ "MIT" ], "directory_id": "30da5b2ae0372a75b2534c2a078b314311e16666", "extension": "py", "fi...
2.40625
stackv2
from helpers import save_data, get_date_30_days_now, compress_image from variables import GITLAB_SERVER, PRIVATE_TOKEN import requests import gitlab import json import time import os def fetch_users(gl): ''' Download all the users on the https://gitlab.gnome.org. ''' start = time.time() print...
196
27.94
132
18
1,292
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_d2e457b6991775ab_db8b463f", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [https://secure.gravatar.com/](1) may be at an arbitrar...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [https://secure.gravatar.com/](1) may be at an arbitrary position in the sanitized URL." ]
[ 155 ]
[ null ]
[ 16 ]
[ 68 ]
2024-11-18T22:55:37.992446+00:00
1,463,764,021,000
1947013920984864682e58a1b81c43939a7fb11c
2
{ "blob_id": "1947013920984864682e58a1b81c43939a7fb11c", "branch_name": "refs/heads/master", "committer_date": 1463764863000, "content_id": "439e335e024c618f72f9743889acf5d637ebaede", "detected_licenses": [ "MIT" ], "directory_id": "117e825f8ce73b4c5a2d25318c3289c6812d255a", "extension": "py", "fi...
2.40625
stackv2
#!/usr/bin/python # Init script for Sky Pi import logging import os import time import threading import sys import subprocess import picamera import Adafruit_BMP.BMP085 as BMP085 from gps import * fileId = "" speakLock = threading.Lock() speakProcess = None gpsd = None # NOTE(nox): Speaking def speakWorker(msg): ...
176
29.22
156
18
1,381
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_0ec2fd1243a249bb_7c491ea7", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.\nThis expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text." ]
[ 131 ]
[ 135 ]
[ 23 ]
[ 34 ]
2024-11-18T23:18:22.056247+00:00
1,622,498,568,000
c0c4908ce46a9422e1c8c0465450c34e142b9a99
2
{ "blob_id": "c0c4908ce46a9422e1c8c0465450c34e142b9a99", "branch_name": "refs/heads/master", "committer_date": 1622498568000, "content_id": "4d38bb784d521d54b182401d607a0be4c8814a21", "detected_licenses": [ "MIT" ], "directory_id": "040c03640a7c2c0442da99e33f70813ce7264fcc", "extension": "py", "fi...
2.46875
stackv2
"""Module with main classes related to Authentication.""" import datetime import getpass import hashlib import logging import time from functools import wraps from http import HTTPStatus import jwt from flask import jsonify, request from kytos.core.config import KytosConfig from kytos.core.events import KytosEvent _...
364
31.83
78
19
2,324
python
[{"finding_id": "codeql_py/stack-trace-exposure_1ee8b6d9df24a94d_aca78c37", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
4
true
[ "CWE-209", "CWE-327", "CWE-327", "CWE-327" ]
[ "py/stack-trace-exposure", "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function.", "[Sensitive data (password)](1) is used in a ...
[ 40, 114, 157, 269 ]
[ null, null, null, null ]
[ 28, 40, 55, 40 ]
[ 42, 57, 63, 48 ]
2024-11-18T23:18:23.534481+00:00
1,383,228,849,000
b114574768ca963dcf1bd8699c56593fb7cf35a0
3
{ "blob_id": "b114574768ca963dcf1bd8699c56593fb7cf35a0", "branch_name": "refs/heads/master", "committer_date": 1383228849000, "content_id": "bdf8c28b129a0bf328a954baf365baf3296230b3", "detected_licenses": [ "MIT" ], "directory_id": "f440795011dfdaeb83d37cda9c6d609f5f53bf34", "extension": "py", "fi...
2.671875
stackv2
# -*- coding: utf-8 -*- from __future__ import print_function from sys import argv import re import urllib2 __author__ = 'frank' try: url = argv[1] except Exception: exit('url needed') page = urllib2.urlopen(url).read() + '<link href=xxxx>' def convert(_page): return _page def get_page_charset(_page)...
83
29.2
92
17
726
python
[{"finding_id": "codeql_py/redos_1d1ea7490ce07757_1c6c572f", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '<' and containing many repetition...
2
true
[ "CWE-1333", "CWE-116" ]
[ "py/redos", "py/bad-tag-filter" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '<' and containing many repetitions of '\\n'.", "This regular expression does not match script end tags like </script\\t\\n bar>." ]
[ 48, 40 ]
[ null, null ]
[ 26, 25 ]
[ 36, 62 ]
2024-11-19T00:07:12.705630+00:00
1,612,320,812,000
8982160c1e876f0d278e43481f94e9ed8c6ad291
3
{ "blob_id": "8982160c1e876f0d278e43481f94e9ed8c6ad291", "branch_name": "refs/heads/master", "committer_date": 1612320812000, "content_id": "8b4dc09acd8346308710b2e789cbfe5175a51597", "detected_licenses": [ "MIT" ], "directory_id": "4614c0b6af0a31d62a19afd2d62267d2ff5a4915", "extension": "py", "fi...
2.65625
stackv2
import os import requests import json # NASA API auth from roti_rot import rot13 from flask import Flask from flask import render_template # File upload example from flask import flash, request, redirect, url_for, send_from_directory from werkzeug.utils import secure_filename app = Flask(__name__) # region - authe...
122
28.21
94
16
759
python
[{"finding_id": "codeql_py/url-redirection_7986260415b7770a_264ba766", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
2
true
[ "CWE-601", "CWE-601" ]
[ "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 76, 82 ]
[ null, null ]
[ 29, 29 ]
[ 40, 40 ]
2024-11-19T00:05:01.337994+00:00
1,633,175,377,000
c658446cd43da2cd56536985905821fa69ac6f88
3
{ "blob_id": "c658446cd43da2cd56536985905821fa69ac6f88", "branch_name": "refs/heads/main", "committer_date": 1633175377000, "content_id": "fd6145ae42a686688d9518bdec2ae7142523c3bc", "detected_licenses": [ "MIT" ], "directory_id": "06584f5c1d0092830e67150ccb0d67b4a5851e24", "extension": "py", "file...
3.09375
stackv2
#'//////////////////////////////////////////////////////////////////////////// #' FILE: ghReleaseDownloader.py #' AUTHOR: David Ruvolo #' CREATED: 2021-09-10 #' MODIFIED: 2021-10-02 #' PURPOSE: Find and download release from a Github repo #' STATUS: working #' PACKAGES: os, requests, datatable, datetime, tarfile #' COM...
145
32.94
86
20
1,112
python
[{"finding_id": "codeql_py/tarslip_d81849d3da01a3d4_0e1b6541", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 141 ]
[ null ]
[ 13 ]
[ 17 ]
2024-11-18T23:48:08.522513+00:00
1,587,414,925,000
43a70c9140bd6b94d864758fff8845c540c331bb
3
{ "blob_id": "43a70c9140bd6b94d864758fff8845c540c331bb", "branch_name": "refs/heads/master", "committer_date": 1587414925000, "content_id": "93417078fa15d236a5d86e105548b89c77c29f71", "detected_licenses": [ "Unlicense" ], "directory_id": "5b176e39e0f431f9f9a489724f16d24fa0324ef3", "extension": "py",...
2.546875
stackv2
import requests import signal import http.cookies from http.server import HTTPServer, BaseHTTPRequestHandler from util_functions import success gl_crawler_base = None class HTTPProxy(BaseHTTPRequestHandler): def __init__(self, request, client_address, server): BaseHTTPRequestHandler.__init__(self, reque...
136
26.68
78
15
764
python
[{"finding_id": "codeql_py/http-response-splitting_115d4ac854fe8096_0f2cb134", "tool_name": "codeql", "rule_id": "py/http-response-splitting", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This HTTP header is constructed from a [user-provided value](1).\nThis HTTP header is con...
6
true
[ "CWE-113", "CWE-113", "CWE-295", "CWE-295", "CWE-918", "CWE-918" ]
[ "py/http-response-splitting", "py/http-response-splitting", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/partial-ssrf", "py/partial-ssrf" ]
[ "HIGH", "HIGH", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This HTTP header is constructed from a [user-provided value](1).\nThis HTTP header is constructed from a [user-provided value](2).", "This HTTP header is constructed from a [user-provided value](1).\nThis HTTP header is constructed from a [user-provided value](2).", "This request may run without certificate va...
[ 69, 69, 25, 43, 25, 43 ]
[ null, null, 29, 49, 29, 49 ]
[ 30, 35, 16, 16, 16, 16 ]
[ 33, 52, 41, 25, 41, 25 ]
2024-11-19T00:44:08.869564+00:00
1,629,509,139,000
23388a0b483ea98528bfcfaf219aa6251ef66448
3
{ "blob_id": "23388a0b483ea98528bfcfaf219aa6251ef66448", "branch_name": "refs/heads/main", "committer_date": 1629509139000, "content_id": "897607d301814f7ef432fbcaf586e27f31349286", "detected_licenses": [ "MIT" ], "directory_id": "8691a95b5c76160f2018b64533e0f01be3f63a5b", "extension": "py", "file...
2.546875
stackv2
import os import requests from flask import Blueprint, render_template, request, url_for, redirect from flask_login import login_required, current_user main = Blueprint("main", __name__) # Constants for TMDB API API_KEY = "2cdd90f4142bcd5916204135c23506df" BASE_URL = "https://api.themoviedb.org/3" class MovieRequ...
187
29.97
108
17
1,350
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_17ea28179444a166_9b69c336", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
8
true
[ "CWE-312", "CWE-312", "CWE-918", "CWE-918", "CWE-918", "CWE-918", "CWE-918", "CWE-918" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/partial-ssrf", "py/partial-ssrf", "py/partial-ssrf", "py/partial-ssrf", "py/partial-ssrf", "py/partial-ssrf" ]
[ "HIGH", "HIGH", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "Part of the URL of this request depends on a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1).", "Part of the URL of ...
[ 138, 150, 86, 89, 167, 168, 171, 172 ]
[ null, null, null, null, null, null, null, null ]
[ 23, 23, 24, 24, 20, 21, 20, 21 ]
[ 43, 43, 70, 67, 64, 67, 61, 64 ]
2024-11-19T00:44:19.443944+00:00
1,576,626,927,000
9b64c92224fafef8e9d685e464b6bea7166acb99
3
{ "blob_id": "9b64c92224fafef8e9d685e464b6bea7166acb99", "branch_name": "refs/heads/master", "committer_date": 1576626927000, "content_id": "58a6b4ea58cc7769f69e16a2edbeb6ce10bfbe7f", "detected_licenses": [ "MIT" ], "directory_id": "43a663d89c115452fdbfcb7e1c71252b573fac67", "extension": "py", "fi...
2.640625
stackv2
""" KnotBook Installer Script Version 3 for Python 3.7+ v3.0: - Using 2 repositories for separate part of the app - Auto-install and auto-update functions - Windows only for now - Removed checks for virtualenv - Program jars are now in libs/ folder v3.1: - Organize code into functions v3.2: - Change ve...
225
33.17
107
18
1,850
python
[{"finding_id": "codeql_py/tarslip_f78bff7ed1766fe9_2da60875", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 161 ]
[ null ]
[ 34 ]
[ 51 ]
2024-11-18T23:05:27.049692+00:00
1,672,757,582,000
14433a3db1b8d426dbccae2db5f96ef78f0a87a7
4
{ "blob_id": "14433a3db1b8d426dbccae2db5f96ef78f0a87a7", "branch_name": "refs/heads/master", "committer_date": 1672757582000, "content_id": "a15443ad855c07ee5bf6645803d6f57fbf1bfe8e", "detected_licenses": [ "MIT" ], "directory_id": "c05a809b1cd6b5a2883bf4cbbdd3dc2cac32e095", "extension": "py", "fi...
3.53125
stackv2
# -*- encoding: utf-8 -*- """Retrieves secrets from AWS via credstash, and returns a dictionary. Typical usage: from credstash_envvar_helper import get_credstash_config config_dict = get_credstash_config(name.of.secret) DB_USER = config_dict.get('DB_USER', 'some.default.value') DB_PASS = config_dict.get('...
94
31.82
78
14
692
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_cf860d49d989768e_d64672f4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 94 ]
[ null ]
[ 11 ]
[ 44 ]
2024-11-18T23:05:45.903377+00:00
1,496,855,641,000
51fcd752a64eaafd638f0baf4190626aecc51997
2
{ "blob_id": "51fcd752a64eaafd638f0baf4190626aecc51997", "branch_name": "refs/heads/master", "committer_date": 1496855641000, "content_id": "5cdcc5d62ad756890b0ace2cce8b3f82094ade3d", "detected_licenses": [ "CC0-1.0" ], "directory_id": "7eb39cb250022bbea16e14e257590ccf12ef57f6", "extension": "py", ...
2.453125
stackv2
from apps import App import requests class Main(App): def __init__(self, name=None, device=None): self.user_id = "No user id provided" self.user_access_token = "No user access provided" App.__init__(self, name, device) def add_facebook_user(self, args={}): if all(key in ["use...
23
36
80
17
201
python
[{"finding_id": "codeql_py/request-without-cert-validation_8d1ef4ee6ffc70f0_a7bef041", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 23 ]
[ null ]
[ 21 ]
[ 53 ]
2024-11-18T23:11:08.974907+00:00
1,336,337,542,000
488271e3e6310d508092e258693be3bf44e7b200
2
{ "blob_id": "488271e3e6310d508092e258693be3bf44e7b200", "branch_name": "refs/heads/master", "committer_date": 1336337542000, "content_id": "4b5a8a79811d567504c21f685744352da2493316", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "39c1b69115ac9e85b2462f640ef11d52797ab461", "extension": "p...
2.4375
stackv2
import os from django import forms from django.utils.translation import ugettext as _ from file_manager import utils class DirectoryFileForm(forms.Form): link = forms.ChoiceField(help_text=_('Link Destination')) def __init__(self, file, *args, **kwargs): self.file = file self.document_roo...
175
29.16
104
17
1,086
python
[{"finding_id": "codeql_py/path-injection_1e2bf82f514beddf_5c1e815a", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
6
true
[ "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](...
[ 50, 55, 99, 104, 124, 145 ]
[ null, null, null, null, null, null ]
[ 26, 26, 26, 26, 26, 22 ]
[ 30, 32, 30, 32, 30, 26 ]
2024-11-18T23:11:09.090034+00:00
1,618,116,826,000
9488a82dc8bae46f81c6e68fabf23fa5c02ba351
2
{ "blob_id": "9488a82dc8bae46f81c6e68fabf23fa5c02ba351", "branch_name": "refs/heads/master", "committer_date": 1618116826000, "content_id": "91848d34741946daa7ad70519b7ff5dcf9b845bb", "detected_licenses": [ "MIT" ], "directory_id": "e054582f760d5938c6de77b89ce26ad5fb1d1235", "extension": "py", "fi...
2.421875
stackv2
import gc import pycom import socket import ssl import sys import time import _thread import uos try: from network import LTE except: print("No LTE Modem") def start_lte(): if uos.uname().sysname == 'FiPy': try: lte_comms = LteComms() print("LTE communication being setup") ...
286
30.49
137
17
2,226
python
[{"finding_id": "codeql_py/insecure-default-protocol_218ebb4e8d733c16_8ae5c2c1", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in...
1
true
[ "CWE-327" ]
[ "py/insecure-default-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used." ]
[ 190 ]
[ null ]
[ 13 ]
[ 31 ]
2024-11-19T00:11:39.711393+00:00
1,578,368,437,000
74007e93522595eebc2c87059bd11de250f44414
3
{ "blob_id": "74007e93522595eebc2c87059bd11de250f44414", "branch_name": "refs/heads/master", "committer_date": 1578368437000, "content_id": "5a7745aff82f5146d2eca2575fb45e8cee75a947", "detected_licenses": [ "MIT" ], "directory_id": "f06b56b66c8575b42761d2a261e4ae9484452594", "extension": "py", "fi...
2.984375
stackv2
import logging import json from flask import request, jsonify; from codeitsuisse import app; import math found = [] logger = logging.getLogger(__name__) @app.route('/gun-control', methods=['POST']) def evaluate(): data = request.get_json(); logging.info("data sent for evaluation {}".format(data)) input...
106
22.41
67
14
742
python
[{"finding_id": "codeql_py/log-injection_68f6f14da06f8458_ce3c673f", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 16 ]
[ null ]
[ 18 ]
[ 60 ]
2024-11-19T00:24:49.965674+00:00
1,627,082,805,000
7a30f6af94e81a9d01cd365a24cfcfcb982a46e2
3
{ "blob_id": "7a30f6af94e81a9d01cd365a24cfcfcb982a46e2", "branch_name": "refs/heads/main", "committer_date": 1627082805000, "content_id": "2b9fc85e7831e60154c0bbd6a21a1761bb1293d5", "detected_licenses": [ "MIT" ], "directory_id": "e4b31fc6962c37c2624b6f7b5900eb16647274fd", "extension": "py", "file...
2.5625
stackv2
import requests import pymysql CIUDAD = "Maldonado" API_KEY = "92ecbd09b28050e849ee353088902383" BASE_URL = "https://api.openweathermap.org/data/2.5/weather?" URL = BASE_URL + "q=" + CIUDAD + "&appid=" + API_KEY response = requests.get(URL) if response.status_code == 200: data = response.json() global...
24
25.42
61
9
184
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d6f8ebef9a40817d_e235dbd4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 24 ]
[ null ]
[ 7 ]
[ 14 ]
2024-11-19T00:37:02.142989+00:00
1,607,546,660,000
a670aab8251c530e70964db1e06be5105fc20607
3
{ "blob_id": "a670aab8251c530e70964db1e06be5105fc20607", "branch_name": "refs/heads/master", "committer_date": 1607546915000, "content_id": "b09bb671fe65d3f9096f4a8fdee391b1ed79f179", "detected_licenses": [ "MIT" ], "directory_id": "bf9a4dc9200e5afe6a1abbf0f70d441dd13c97f7", "extension": "py", "fi...
2.65625
stackv2
#!/usr/bin/env python import os import imp import requests from http.server import HTTPServer, BaseHTTPRequestHandler host_target = os.environ["AIS_TARGET_URL"] mod = imp.load_source("function", "/code/%s.py" % os.getenv("MOD_NAME")) transform = getattr(mod, os.getenv("FUNC_HANDLER")) class S(BaseHTTPRequestHandle...
49
26.29
75
12
317
python
[{"finding_id": "codeql_py/partial-ssrf_b72ba6cae4cc3754_bc5c658a", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 34 ]
[ null ]
[ 23 ]
[ 60 ]
2024-11-19T01:02:10.176663+00:00
1,539,528,440,000
a50cbf4046b3effe3ba4b385fd47ab9dd79236c2
3
{ "blob_id": "a50cbf4046b3effe3ba4b385fd47ab9dd79236c2", "branch_name": "refs/heads/master", "committer_date": 1539528440000, "content_id": "38b681c2a6ee1dba6163b8421a0b36cf8d970ddb", "detected_licenses": [ "MIT" ], "directory_id": "4b7d286e39fc7b9dc4a7dca4a2dd59f8d27d62b6", "extension": "py", "fi...
2.859375
stackv2
# -*- coding: utf-8 -*- """ Created on Thu Sep 20 11:29:13 2018 @author: Hidde """ # Face Recognition with Flask, wohoo! # Thanks for the example @ Aegitgey https://github.com/ageitgey/ from flask import Flask, jsonify, request, redirect, render_template, url_for from face_compare import face_recog ALLOWED_EXTENSI...
50
29.16
115
13
389
python
[{"finding_id": "codeql_py/url-redirection_35562f7eda7e71ae_92223fb6", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
2
true
[ "CWE-601", "CWE-601" ]
[ "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 32, 37 ]
[ null, null ]
[ 29, 29 ]
[ 40, 40 ]
2024-11-19T01:02:16.677083+00:00
1,578,520,212,000
23543c50dca496e80809d4d02088c236d003ad94
3
{ "blob_id": "23543c50dca496e80809d4d02088c236d003ad94", "branch_name": "refs/heads/master", "committer_date": 1578520212000, "content_id": "e90b21264a09a5c245045cabc63835dc3bad5611", "detected_licenses": [ "MIT" ], "directory_id": "8bc97a164f70a5f33087f6f6db11641b501a4245", "extension": "py", "fi...
2.96875
stackv2
""" A thin wrapper around the built-in http.server module. """ import http.server import logging import ssl from typing import Tuple def run_server(address: Tuple[str, str], cert_path: str) -> None: """Start an HTTP server over SSL/TLS using the given PEM certificate.""" logging.info('Running server at http...
18
28.89
86
10
124
python
[{"finding_id": "codeql_py/insecure-default-protocol_edba65ea3198e5a2_23f16fb4", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in...
1
true
[ "CWE-327" ]
[ "py/insecure-default-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used." ]
[ 17 ]
[ null ]
[ 20 ]
[ 87 ]
2024-11-19T01:02:24.000325+00:00
1,438,550,038,000
0e4e4cf34b6edad8cf6662e49068c2b60752f2e0
3
{ "blob_id": "0e4e4cf34b6edad8cf6662e49068c2b60752f2e0", "branch_name": "refs/heads/master", "committer_date": 1438550038000, "content_id": "53cce56f5773206092dc5f888ec655ec87404124", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "c0b01d576c49e6793fc3259f5cc0b2c087b7664d", "extension": "p...
2.65625
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- from flask import Flask, render_template, request, url_for from datetime import datetime import hashlib, markdown, operator, pagination, os, sys app = Flask(__name__) app.config.from_object('config.ProductionConfig') app.template_folder = app.config['TEMPLATE_PATH'] # -...
170
32.15
90
15
1,321
python
[{"finding_id": "codeql_py/path-injection_f71011235068b417_e0db7f2e", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 67 ]
[ null ]
[ 15 ]
[ 52 ]
2024-11-18T23:48:44.528982+00:00
1,645,166,668,000
cb0a3096dc483156c42ea0bbc44962690c9542e3
2
{ "blob_id": "cb0a3096dc483156c42ea0bbc44962690c9542e3", "branch_name": "refs/heads/main", "committer_date": 1645166668000, "content_id": "9909b8db14e3c66c30720a7d539ed5a80980872a", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "93596aca572b1477a7498c7d35d90b1cf361bcf5", "extension": "py"...
2.390625
stackv2
#!/usr/bin/env python3 import os import sys import traceback import argparse import ssl import socket import hashlib import types from urllib.parse import urlsplit import datetime import pytz import platform if platform.system() == 'Darwin': import certifi # This has been a tested on Ubuntu 18.04 LTS # on MacOS...
261
37.15
141
19
2,169
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_edf2635bccd47ffc_34e93f37", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (certificate)](1) is used in a hashing algorithm (MD5) that is in...
4
true
[ "CWE-327", "CWE-327", "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing", "py/insecure-protocol", "py/insecure-default-protocol" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (certificate)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (certificate)](2) is used in a hashing algorithm (MD5) that is insecure.", "[Sensitive data (certificate)](1) is used in a hashing algorithm (SHA1) that is insecure.\n[Sensitive data (certificate)](2) is use...
[ 71, 72, 91, 67 ]
[ null, null, null, null ]
[ 41, 43, 20, 24 ]
[ 53, 55, 31, 49 ]
2024-11-19T01:51:58.139009+00:00
1,664,660,026,000
76b975567a8897b9464845ed4682532c64673361
3
{ "blob_id": "76b975567a8897b9464845ed4682532c64673361", "branch_name": "refs/heads/master", "committer_date": 1664660026000, "content_id": "eb6d0499365805bc8ce5da7a50a9122d2fc16ed7", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "67e76c827181fb3be7290ae13d58ef261e543924", "extension": "p...
2.515625
stackv2
#/u/GoldenSights from PIL import Image import io import urllib.request import praw import time import traceback ''' USER CONFIGURATION ''' APP_ID = "" APP_SECRET = "" APP_URI = "" APP_REFRESH = "" # https://www.reddit.com/comments/3cm1p8/how_to_make_your_bot_use_oauth2/ USERAGENT = "" #This is a short description of...
294
34.37
107
18
2,526
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_2823612d4df5fb22_cbfc1f7e", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [imgur.com](1) may be at an arbitrary position in the s...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [imgur.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 270 ]
[ null ]
[ 24 ]
[ 43 ]
2024-11-19T01:52:14.207987+00:00
1,693,928,169,000
8f1768d8575487d83c19db1c707703237583b9e4
3
{ "blob_id": "8f1768d8575487d83c19db1c707703237583b9e4", "branch_name": "refs/heads/main", "committer_date": 1693928169000, "content_id": "56ca08f29132f85b340d947ac8b380fd1d1dcb9b", "detected_licenses": [ "MIT" ], "directory_id": "091a6200be74bf6577c86f623665bcc24e16b02b", "extension": "py", "file...
2.5625
stackv2
# SPDX-FileCopyrightText: 2022 Liz Clark for Adafruit Industries # SPDX-License-Identifier: MIT import time import ssl import board import touchio import pwmio from analogio import AnalogIn import adafruit_requests import socketpool import wifi from adafruit_io.adafruit_io import IO_HTTP, AdafruitIO_RequestError from ...
133
26.56
80
12
995
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_875e3b9b9131d65d_fa6becbc", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 30, 32 ]
[ null, null ]
[ 7, 7 ]
[ 43, 43 ]
2024-11-19T00:55:26.825876+00:00
1,690,184,465,000
7cd8e4a4c90443ae80114b2035d42d7950f24c5b
3
{ "blob_id": "7cd8e4a4c90443ae80114b2035d42d7950f24c5b", "branch_name": "refs/heads/master", "committer_date": 1690184465000, "content_id": "cc15c65db5e71b78d2ebc827086097c54389c31a", "detected_licenses": [ "MIT" ], "directory_id": "370e5ebcd200d912ffde73793e001d419d98f6e5", "extension": "py", "fi...
3.265625
stackv2
import hashlib from typing import List def md5(password: str): return hashlib.md5(password.encode("utf8")).hexdigest() def sha256(password: str): return hashlib.sha256(password.encode("utf8")).hexdigest() def generate_failsafe_password(passwords: List[str]): result = "" passwords = sorted(passwords)...
28
24.68
69
13
168
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7997683103949770_cf38b4e9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
3
true
[ "CWE-312", "CWE-327", "CWE-327" ]
[ "py/clear-text-logging-sensitive-data", "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is ...
[ 28, 5, 8 ]
[ null, null, null ]
[ 11, 24, 27 ]
[ 53, 47, 50 ]
2024-11-19T01:40:00.688695+00:00
1,598,606,422,000
7395e98b80c2033801342e0c6cf0f2cc2254d6c2
2
{ "blob_id": "7395e98b80c2033801342e0c6cf0f2cc2254d6c2", "branch_name": "refs/heads/master", "committer_date": 1598606422000, "content_id": "e5929b18279de5e9d43ecaf1f04f434e9438d984", "detected_licenses": [ "BSD-3-Clause", "MIT", "Apache-2.0" ], "directory_id": "a6f61e90bd62b88de8d30d9451b4b68...
2.484375
stackv2
from datetime import datetime from jinja2 import Environment, BaseLoader from plugins import base """ reconf_plugin の詳細画面 仕様追加項目 # 表 - 行の追加 * step_name ` _prepare` 追加 ... galaxy の prepare job * step_name ` _total_reconf` 追加 ... galaxy の各stepのreconf job を合計したもの - カラム追加 * reconfigure cost .. 各stepの実働時間と 動的...
367
31.2
90
16
3,345
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_5d82c7d48a726f0c_96360088", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 51 ]
[ null ]
[ 14 ]
[ 46 ]
2024-11-18T23:43:33.473885+00:00
1,523,254,106,000
ce06946e1c1a9880b900f504e003c088799526e4
3
{ "blob_id": "ce06946e1c1a9880b900f504e003c088799526e4", "branch_name": "refs/heads/master", "committer_date": 1523254106000, "content_id": "caace0b9526c4a86469c33d51fbea66ae072ef6c", "detected_licenses": [ "MIT" ], "directory_id": "86bd596545d61eb5d1bcbc5f5c5e081cbc62d637", "extension": "py", "fi...
2.65625
stackv2
import argparse import os import logging import requests import tarfile import numpy as np from io import BytesIO from concurrent.futures import ThreadPoolExecutor, wait from PIL import Image from sklearn.utils import shuffle from settings import FILES_DIR, VGG_19_CHECKPOINT_URL, VGG_19_CHECKPOINT_FILENAME, IMAGE_DA...
87
28.84
104
17
602
python
[{"finding_id": "codeql_py/tarslip_167fc28eeb97218b_2f945a74", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 33 ]
[ null ]
[ 13 ]
[ 16 ]
2024-11-18T23:43:36.557175+00:00
1,619,740,767,000
552656933b7f34daa86f59a8c94c17642a3cc3f2
3
{ "blob_id": "552656933b7f34daa86f59a8c94c17642a3cc3f2", "branch_name": "refs/heads/master", "committer_date": 1619740767000, "content_id": "3087a0367cec862bc1dd592065954c511b0aa7d5", "detected_licenses": [ "MIT" ], "directory_id": "ec7f8bdf2edc4873f41130c71a11a0590f8fff56", "extension": "py", "fi...
2.765625
stackv2
from ddpg import DDPG as Agent import gym # Register gym environment. By specifying kwargs, # you are able to choose which patient to simulate. # patient_name must be 'adolescent#001' to 'adolescent#010', # or 'adult#001' to 'adult#010', or 'child#001' to 'child#010' from gym.envs.registration import register register...
43
33.49
99
13
429
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a29da1ef6289aa15_fa0b76a0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 33, 41 ]
[ null, null ]
[ 29, 15 ]
[ 39, 25 ]
2024-11-19T00:33:03.956755+00:00
1,380,488,026,000
f1e4523fe85598ac6b1bfe025862b5e5c67957e6
3
{ "blob_id": "f1e4523fe85598ac6b1bfe025862b5e5c67957e6", "branch_name": "refs/heads/master", "committer_date": 1380488026000, "content_id": "d01a7b8b87a0a51a30477c0ba9bbf8f092865315", "detected_licenses": [ "MIT" ], "directory_id": "df9f9fd0ddf40130dd11f5aa9bf40af19c5d0098", "extension": "py", "fi...
3
stackv2
from hashlib import md5 from os.path import splitext from uuid import uuid4 get_md5 = lambda text: md5(text).hexdigest() get_file_extension = lambda path: splitext(path)[1][1:] def generate_filename( base_folder, filename, with_path=True, get_name=False, easy=None): """ ...
51
28.63
74
14
349
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_4f201eb855174493_2d5bc6b0", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (id)](2) is used in a hashing algorithm (MD5) that is insecure." ]
[ 5 ]
[ null ]
[ 28 ]
[ 32 ]
2024-11-19T01:18:05.547300+00:00
1,569,509,712,000
97d6abae5dff6fede538b785979a677cab15a1f8
3
{ "blob_id": "97d6abae5dff6fede538b785979a677cab15a1f8", "branch_name": "refs/heads/master", "committer_date": 1569509712000, "content_id": "c77662939a0f4814fc7e650ef8b54fcff902836a", "detected_licenses": [ "Apache-2.0" ], "directory_id": "74ae9d0bee235c6cba3310a20da1601eb22a9bbd", "extension": "py"...
2.59375
stackv2
#! /usr/bin/python """This module has everything that this repo has to offer""" import sys import os import subprocess from time import sleep import click import paramiko DESTINATION_USER = os.environ.get("USER") if DESTINATION_USER is None: sys.exit("There's no destination user set. Set the environment variable ...
217
33.03
108
15
1,657
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_ea5307482396e492_d9ce6f9d", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 135 ]
[ null ]
[ 5 ]
[ 65 ]
2024-11-19T01:54:18.451850+00:00
1,461,096,077,000
e1a3793b856d00e13626df8da904c3cbca84e969
3
{ "blob_id": "e1a3793b856d00e13626df8da904c3cbca84e969", "branch_name": "refs/heads/master", "committer_date": 1461096144000, "content_id": "777ef65fac8b758e1823fd2bc9a71e7f725d8019", "detected_licenses": [ "MIT" ], "directory_id": "b39efa926c1c1b5c5d8c8503aee6085972344ab0", "extension": "py", "fi...
2.765625
stackv2
"""Template rendering for dummies.""" from jinja2 import Environment from jinja2 import FileSystemLoader class Renderer: """A simple template renderer.""" def __init__(self, template_directory): """Make a new template renderer.""" self.env = Environment(loader=FileSystemLoader(template_direct...
31
28.29
75
13
184
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_26af09918f4715c0_2e19a341", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 11 ]
[ null ]
[ 20 ]
[ 76 ]
2024-11-19T00:25:35.372448+00:00
1,527,395,575,000
a3e63fdbce2ecdb38ffd3fed7e2448a522154ccf
2
{ "blob_id": "a3e63fdbce2ecdb38ffd3fed7e2448a522154ccf", "branch_name": "refs/heads/master", "committer_date": 1528597792000, "content_id": "35a3b4e74846f33768ad84ded626fca336ca2dbb", "detected_licenses": [ "MIT" ], "directory_id": "e5dc073203ae46b02e5b2e751c6f0b58dccb4cc1", "extension": "py", "fi...
2.5
stackv2
#!/usr/bin/env python import sys import os import json import glob import argparse from jinja2 import Environment, FileSystemLoader def listify(input): if not input: return [] for el in input: if isinstance(input, (tuple, list)): return input else: return [in...
49
21.51
75
16
241
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_87f91362f7302b2a_06e655f4", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 25 ]
[ 27 ]
[ 13 ]
[ 6 ]
2024-11-19T00:25:38.052975+00:00
1,630,021,883,000
56f08e7f1fb3da852f7cff9f7c633b0492454883
2
{ "blob_id": "56f08e7f1fb3da852f7cff9f7c633b0492454883", "branch_name": "refs/heads/master", "committer_date": 1630021883000, "content_id": "dedca761387ea0af1115f08f9e99f1d44a306f82", "detected_licenses": [ "Apache-2.0" ], "directory_id": "f59d08729735b9fd246ba6895b4acde387e56095", "extension": "py"...
2.3125
stackv2
#!/usr/bin/env python3 # Import ATC classes try: from scripts.datautils import DATAutils from scripts.dataneeded import DataNeeded from scripts.loggingpolicy import LoggingPolicy from scripts.enrichment import Enrichment except: from data.atc_data.scripts.datautils import DATAutils from data.at...
102
31.42
98
16
753
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_6f2e8df7e43e1e05_a761b534", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 61 ]
[ null ]
[ 15 ]
[ 72 ]
2024-11-19T01:02:47.066228+00:00
1,436,304,996,000
24c849f26a3a4c4d0288eeaf3652ce99cfc8847a
2
{ "blob_id": "24c849f26a3a4c4d0288eeaf3652ce99cfc8847a", "branch_name": "refs/heads/master", "committer_date": 1436304996000, "content_id": "7b29b16e7e77621442eb2a05015ed63cdcf8be0b", "detected_licenses": [ "MIT" ], "directory_id": "f34455f19b5224fcd4c1a16c4bbc0097396eeb13", "extension": "py", "fi...
2.4375
stackv2
#!/usr/bin/env python from collections import OrderedDict import json import os from jinja2 import Environment, PackageLoader from clan.utils import GLOBAL_ARGUMENTS, format_comma, format_duration, format_percent, load_field_definitions class DiffCommand(object): def __init__(self): self.args = None ...
211
32.59
119
24
1,410
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_4808939222f27bb8_8493b42a", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 146, 186 ]
[ 150, null ]
[ 15, 15 ]
[ 10, 69 ]
2024-11-19T00:50:19.063767+00:00
1,634,049,995,000
79a0b5927083fa49978d8d369b2d202f271cbcce
3
{ "blob_id": "79a0b5927083fa49978d8d369b2d202f271cbcce", "branch_name": "refs/heads/master", "committer_date": 1634049995000, "content_id": "430c504cafba5ff34815a29ad9b0d722fb320651", "detected_licenses": [ "MIT" ], "directory_id": "ea0204cf8b83fb4081b5b6ba3432e63a04fae348", "extension": "py", "fi...
2.90625
stackv2
import re from nltk.tokenize import word_tokenize from nltk.corpus import stopwords from bs4 import BeautifulSoup REMOVE_STOP = False QUESTION_WORDS = ["what", "when", "where", "why", "how", "who"] STOPWORDS = set(stopwords.words("english")) for w in QUESTION_WORDS: STOPWORDS.remove(w) # replace URL with a spec...
66
26.32
105
12
493
python
[{"finding_id": "codeql_py/overly-large-range_1c0452507d7eb2e5_45526f42", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 15 ]
[ null ]
[ 57 ]
[ 60 ]
2024-11-19T01:30:50.270292+00:00
1,394,919,310,000
962fa8e3479b56d14da056672125c4a385e1977c
3
{ "blob_id": "962fa8e3479b56d14da056672125c4a385e1977c", "branch_name": "refs/heads/master", "committer_date": 1394919310000, "content_id": "b8165055f687557e75ce8f226f12621691198b48", "detected_licenses": [ "MIT" ], "directory_id": "8df7f9c760df7a7b78f10e8fde5aadf75d284107", "extension": "py", "fi...
3.21875
stackv2
# Low Power WiFi Datalogger # Arduino Yun-based Datalogger # Created by Tony DiCola (tony@tonydicola.com) # Quick and dirty script to connect to an Arduino Yun-based datalogger # and retrieve data every minute. The YunDataLogger class is useful outside # this script in other tools, such as an IPython notebook that ...
77
36.17
96
16
638
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_fe32fbe76a6fb7a7_15dd7279", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 24 ]
[ null ]
[ 9 ]
[ 74 ]
2024-11-19T00:04:33.103025+00:00
1,547,772,960,000
db0bf9b3846fb90c46a1f01006c3115875326647
3
{ "blob_id": "db0bf9b3846fb90c46a1f01006c3115875326647", "branch_name": "refs/heads/main", "committer_date": 1547772960000, "content_id": "93213e41b7c717c84b62e7c23cd528fd7d65b974", "detected_licenses": [ "CC0-1.0" ], "directory_id": "0c54562aee4c3e47c1d71b5338406e19233ba885", "extension": "py", "...
2.59375
stackv2
from bottle import error, request, route, run, template import json from random import choice, randint import requests import socket HOSTNAME = socket.gethostname() #hostname = '0.0.0.0' HOSTPORT = 8080 ENDPOINT = 'http://wordtools-api:8081' # api layer host/port set in compose file # global variables representing ...
149
26.38
93
16
1,082
python
[{"finding_id": "codeql_py/partial-ssrf_47ca4ed6c198386e_ed35d3aa", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
4
true
[ "CWE-918", "CWE-918", "CWE-918", "CWE-918" ]
[ "py/partial-ssrf", "py/partial-ssrf", "py/partial-ssrf", "py/partial-ssrf" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 49, 61, 101, 115 ]
[ null, null, null, null ]
[ 19, 19, 19, 19 ]
[ 47, 47, 47, 47 ]
2024-11-19T00:27:14.876130+00:00
1,645,546,104,000
74e2a21b93352e516838dd0d054247f3d4b04553
3
{ "blob_id": "74e2a21b93352e516838dd0d054247f3d4b04553", "branch_name": "refs/heads/main", "committer_date": 1645546104000, "content_id": "a6ff9c69a6a138c4a8ed84b9c29df783c93d16e6", "detected_licenses": [ "MIT" ], "directory_id": "74b6a6c3b53968dbad988fca701fb55e40810e21", "extension": "py", "file...
2.84375
stackv2
import os from getpass import getpass # in windows use cls to clear, all others use clear # from stackoverflow answer https://stackoverflow.com/a/2084628 (accessed 27.02.2020) def clear(): os.system("cls" if os.name == "nt" else "clear") # Get info about database and/or etl # etl = 1 # only db = 2 def get_info...
112
31.34
116
25
937
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_934df7af215efd6e_3c7511cd", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text." ]
[ 28 ]
[ null ]
[ 13 ]
[ 32 ]
2024-11-19T00:27:20.606959+00:00
1,247,030,234,000
637647e2e6c3ea99068446409579b45c85c637a8
3
{ "blob_id": "637647e2e6c3ea99068446409579b45c85c637a8", "branch_name": "refs/heads/master", "committer_date": 1247030234000, "content_id": "5cf63a3d893258549c58235040413aa370aa8dfd", "detected_licenses": [ "MIT" ], "directory_id": "2809f1074d146e997b522578d44d2b94efe2ca7e", "extension": "py", "fi...
2.828125
stackv2
#!/usr/bin/env python """ A remote debugging protocol and server for Python. This code is meant to be easily integrated into existing code simply by running start_remote_debugger(). Currently only supports one connection at a time, to avoid creating too many threads. Author: Christopher Swenson (chris@caswenson.com...
263
27.02
112
17
1,855
python
[{"finding_id": "codeql_py/insecure-default-protocol_c10898d34453569b_e27fb15e", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in...
3
true
[ "CWE-327", "CWE-327", "CWE-200" ]
[ "py/insecure-default-protocol", "py/insecure-default-protocol", "py/bind-socket-all-network-interfaces" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used.", "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used.", "'' binds a socket to all interfaces." ]
[ 144, 215, 211 ]
[ null, null, null ]
[ 11, 9, 3 ]
[ 29, 81, 21 ]
2024-11-19T00:40:29.968043+00:00
1,503,992,841,000
dc53e723ddc2512f3c4a129616e748cdd9650097
3
{ "blob_id": "dc53e723ddc2512f3c4a129616e748cdd9650097", "branch_name": "refs/heads/master", "committer_date": 1504020384000, "content_id": "da1857097317da60b41e8685aa55028807b8c907", "detected_licenses": [ "Unlicense" ], "directory_id": "46c5d1d0f0f23b8229ad2e615f7ab553b3353338", "extension": "py",...
2.71875
stackv2
#!/usr/bin/python import jinja2 templateLoader = jinja2.FileSystemLoader( searchpath="template" ) templateEnv = jinja2.Environment( loader=templateLoader ) templateVars = { "license_info": "This site is released under the GNU General Public License", "title": "Toulibre rulez", "news": [] } templateI...
30
31.43
81
9
250
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_0c5b8fece3934770_5c43473a", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 6 ]
[ null ]
[ 15 ]
[ 58 ]
2024-11-19T01:15:16.708047+00:00
1,596,263,126,000
0dc0205ec437ef7d4f96bf12936d1ee797d8dbe0
4
{ "blob_id": "0dc0205ec437ef7d4f96bf12936d1ee797d8dbe0", "branch_name": "refs/heads/master", "committer_date": 1596263126000, "content_id": "cbfad30438f5954d9e29b88ab06f55e58029184f", "detected_licenses": [ "MIT" ], "directory_id": "3369567ceb0bba84ce5b45a600e2643ebd6b3f92", "extension": "py", "fi...
4.03125
stackv2
import random #We have to import this module for generating random numbers print("-----------------------------------REDWOOD CITY-------------------------------------") print("") num = int(input("Press 1 to continue : ")) #a condition to begin the game if num == 1: age = 0; name = input("Enter your ...
179
31.75
100
17
1,297
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_816b63f02a62747c_7d7913c7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (priva...
[ 51, 108 ]
[ null, null ]
[ 29, 25 ]
[ 32, 28 ]
2024-11-19T01:15:22.305334+00:00
1,498,424,345,000
1ceda4c283db32b196ac9fcc86dcc315e5972df2
2
{ "blob_id": "1ceda4c283db32b196ac9fcc86dcc315e5972df2", "branch_name": "refs/heads/master", "committer_date": 1498424345000, "content_id": "34978d2a01e870677e964f1008c0d14654617813", "detected_licenses": [ "MIT" ], "directory_id": "2100443dd6cbd55587f7ea8d875fc4bbe70b5423", "extension": "py", "fi...
2.328125
stackv2
import imghdr import json import logging import mimetypes import os from pathlib import Path import flask from flask import g from flask import send_from_directory, abort, send_file, Blueprint import beets from beets.library import PathQuery my_dir = Path(os.path.abspath(__file__)).parent STATIC_FOLDER = os.path.absp...
109
30.83
107
16
833
python
[{"finding_id": "codeql_py/path-injection_9cb8e527e5d53d65_bc31abe7", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
5
true
[ "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 63, 67, 95, 99, 102 ]
[ null, null, null, null, null ]
[ 9, 58, 31, 13, 62 ]
[ 13, 62, 41, 23, 72 ]
2024-11-19T00:43:51.246056+00:00
1,456,646,481,000
b09f6b058f381895568ca48856a96ee04a1339bd
3
{ "blob_id": "b09f6b058f381895568ca48856a96ee04a1339bd", "branch_name": "refs/heads/master", "committer_date": 1456646481000, "content_id": "e467bf842a408fb5c8fef0bbf4e9814e247ee921", "detected_licenses": [ "MIT" ], "directory_id": "82838b661189a296362612d1c2aea09cd05c0bbe", "extension": "py", "fi...
2.515625
stackv2
from django.http import HttpResponse from django.views.generic.base import RedirectView from django.core.urlresolvers import reverse from faker import Faker class GoView(RedirectView): def get_redirect_url(self, *args, **kwargs): to_url = self.request.GET.get("to", self.request.META.get("HTTP_HOST"))...
51
27.75
109
15
341
python
[{"finding_id": "codeql_py/url-redirection_8258d3bca4aace18_1e129a19", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).\nUntrusted URL redirection depends on a ...
2
true
[ "CWE-601", "CWE-601" ]
[ "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).\nUntrusted URL redirection depends on a [user-provided value](2).", "Untrusted URL redirection depends on a [user-provided value](1).\nUntrusted URL redirection depends on a [user-provided value](2)." ]
[ 24, 51 ]
[ null, null ]
[ 16, 16 ]
[ 22, 28 ]
2024-11-19T01:31:58.524504+00:00
1,634,640,024,000
9912ffa844a81eadfde9b6e2e5248c45a8368040
3
{ "blob_id": "9912ffa844a81eadfde9b6e2e5248c45a8368040", "branch_name": "refs/heads/master", "committer_date": 1634640024000, "content_id": "07d8fe06aa75da922052594ce62f87b238fbebdf", "detected_licenses": [ "MIT" ], "directory_id": "449cb8a2ac9d4149baff3a5271ca040c0a483791", "extension": "py", "fi...
2.546875
stackv2
import sys import requests import json import re # TODO: add more options like place of API-key, show relevant/time ordered comments, show only to-level comments, max number of comments etc... # TODO: add a simple mode: no need for a regex. Like grep default. But also make it possible to use a regex with an cli-option...
55
33.24
174
18
456
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fc5bbf00ad745f2e_a56fde46", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 42, 48 ]
[ null, null ]
[ 19, 27 ]
[ 26, 58 ]
2024-11-19T01:32:22.029452+00:00
1,527,705,910,000
4b843d396d9667b1ddc89013b8833aaaa8ddedc6
3
{ "blob_id": "4b843d396d9667b1ddc89013b8833aaaa8ddedc6", "branch_name": "refs/heads/master", "committer_date": 1527705910000, "content_id": "f1c144b21841c9db2475dcef331b4aa292c49d07", "detected_licenses": [ "MIT" ], "directory_id": "3ddf4f75214c93f108148baa32a0a455df2e284f", "extension": "py", "fi...
3.03125
stackv2
#!/usr/bin/env python """ .. module:: doUtils.sshConn :platform: Unix :synopsis: class SshConn -- an ssh connection. .. moduleauthor:: John Kimball <jjkimball@acm.org> class SshConn -- an ssh connection. Wrap it up in an object to provide a bit higher level of abstraction than paramiko. (And a tiny subset the...
118
28.08
103
11
770
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_6b755c48bb9258cb_08b0e3bc", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to WarningPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to WarningPolicy may be unsafe." ]
[ 66 ]
[ null ]
[ 9 ]
[ 75 ]
2024-11-19T01:32:22.081091+00:00
1,486,731,445,000
2a2676dddecd6710e2dddeec5abcd1bef2130854
3
{ "blob_id": "2a2676dddecd6710e2dddeec5abcd1bef2130854", "branch_name": "refs/heads/master", "committer_date": 1486731445000, "content_id": "3c1891aafdd0c6aeea4e95a4bd01cd88298f8431", "detected_licenses": [ "MIT" ], "directory_id": "85bf1c44e96ab7a66f154f3a320efa00fcd10ba1", "extension": "py", "fi...
2.78125
stackv2
import hmac import hashlib import random import string from google.appengine.ext import ndb # for hmac on cookies - should be somewhere else SECRET_KEY = "Fdh3nhUsLhy" def make_secure_val(val): """ use hmac with secret key to create a secure cookie """ return "{}|{}".format(val, hmac.new(SECRET_KEY, val).he...
254
31.58
79
20
1,739
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_0fc2b7d810825ad3_18edf73e", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e...
[ 36 ]
[ null ]
[ 24 ]
[ 40 ]
2024-11-19T01:32:30.585297+00:00
1,623,227,758,000
a69314abdbd71244d14f7bc64042429c73004712
3
{ "blob_id": "a69314abdbd71244d14f7bc64042429c73004712", "branch_name": "refs/heads/main", "committer_date": 1623227758000, "content_id": "6e11a68e010c5d6d220435ce36637119e8d33352", "detected_licenses": [ "MIT-0" ], "directory_id": "df240bdb7d41d6ee9ea70d0bdd7ba59a54e96971", "extension": "py", "fi...
2.671875
stackv2
import os from flask import Flask, request import pickle import numpy as np import requests from io import BytesIO from PIL import Image from settings import APP_ROOT app = Flask(__name__) @app.route("/") def hello(): return "Hi" @app.route("/predict",methods=['POST','GET']) def predict(): try: # lab...
56
30.84
104
20
426
python
[{"finding_id": "codeql_py/stack-trace-exposure_420a86bce8333d4c_ca4915b1", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-918" ]
[ "py/stack-trace-exposure", "py/full-ssrf" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "The full URL of this request depends on a [user-provided value](1)." ]
[ 53, 33 ]
[ null, null ]
[ 16, 24 ]
[ 22, 46 ]
2024-11-19T01:32:40.872698+00:00
1,596,970,729,000
066ff58b084c5b06750358678541fdfba6e2e23a
2
{ "blob_id": "066ff58b084c5b06750358678541fdfba6e2e23a", "branch_name": "refs/heads/master", "committer_date": 1596973736000, "content_id": "fc031a82c5c72489a0c97049088eafdd91fe129e", "detected_licenses": [ "MIT" ], "directory_id": "1591d2db6b49076eb8b630f292e9a8217ae0f008", "extension": "py", "fi...
2.359375
stackv2
from __future__ import absolute_import import re import bs4 from six import StringIO from six import PY3 from fulltext.util import BaseBackend class Backend(BaseBackend): def is_visible(self, elem): if isinstance(elem, (bs4.element.ProcessingInstruction, bs4.element.Docty...
37
22.27
67
14
184
python
[{"finding_id": "codeql_py/bad-tag-filter_05c4f844600164b1_9ef9340d", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression does not match comments containing newlines.", "remediation": "", "location": {"file_pat...
1
true
[ "CWE-116" ]
[ "py/bad-tag-filter" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression does not match comments containing newlines." ]
[ 22 ]
[ null ]
[ 22 ]
[ 31 ]
2024-11-19T01:43:48.379047+00:00
1,554,967,637,000
aa5e66d3afd1a754d985c7220e387386839ec07d
3
{ "blob_id": "aa5e66d3afd1a754d985c7220e387386839ec07d", "branch_name": "refs/heads/master", "committer_date": 1554967637000, "content_id": "769661c4b4772b89744a598591a9b6879641c9c0", "detected_licenses": [ "MIT" ], "directory_id": "504ef5e8ca5bc73bb01f1b3604cbd7c72a02a441", "extension": "py", "fi...
2.921875
stackv2
# coding: ISO-8859-1 """ Ce programme permet de faire tourner un serveur de discussion instantanée. """ import multiprocessing import socket import queue import sys import os import traceback #------------------------------------------------------------------------------ # GESTION DES CLIENTS #-------...
344
34.66
120
20
2,858
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_5a0e296bf10476c6_d2c64bbe", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
2
true
[ "CWE-312", "CWE-200" ]
[ "py/clear-text-storage-sensitive-data", "py/bind-socket-all-network-interfaces" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (password)](3) as clear text.", "'' binds a socket to all interfaces." ]
[ 191, 322 ]
[ null, null ]
[ 14, 9 ]
[ 18, 39 ]
2024-11-19T01:44:10.696074+00:00
1,636,094,997,000
2687c2e4a341525ba1ad67c943fb88b72856c1d7
3
{ "blob_id": "2687c2e4a341525ba1ad67c943fb88b72856c1d7", "branch_name": "refs/heads/main", "committer_date": 1636094997000, "content_id": "cf5bc63f555ba02d4285db3bf83c8ba5978553f7", "detected_licenses": [ "MIT" ], "directory_id": "5d456b5ac4c2f3491cdc6219b6b09e7afcd1a065", "extension": "py", "file...
3.359375
stackv2
#!/usr/bin/env python # -*- encoding: utf-8 -*- ''' @File : input_check.py @Author : Billy Zhou @Time : 2021/08/22 @Desc : None ''' import getpass def input_pwd(tip_words='Please input your password:'): """Add tip_words to getpass.getpass()""" return getpass.getpass(tip_words) def input_...
95
36.64
88
17
874
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_25c77816057df2b3_0ee2026e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 90 ]
[ null ]
[ 18 ]
[ 51 ]
2024-11-19T02:20:32.757382+00:00
1,693,558,388,000
eabde4cd0bc1fe537d30f18c5716312c8a8032c4
3
{ "blob_id": "eabde4cd0bc1fe537d30f18c5716312c8a8032c4", "branch_name": "refs/heads/master", "committer_date": 1693558388000, "content_id": "081334c6d589e893bde0dcaeb1a48071b5afca65", "detected_licenses": [ "MIT" ], "directory_id": "fe1255be53e17f09c8215666eae397f3ad1961b0", "extension": "py", "fi...
3.25
stackv2
import requests import faster_than_requests import pycurl import time print("Normal Requests") timeStart = time.perf_counter() for _ in range(10): res = requests.get('https://twitter.com/') print(".") timeEnd = time.perf_counter() - timeStart averageTime = timeEnd / 10 timeEnd = round(timeEnd, 4) print(f"Made...
41
26.15
72
9
323
python
[{"finding_id": "codeql_py/request-without-cert-validation_2c510af6168efd84_fc8455dd", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1) by [this value](2)." ]
[ 23 ]
[ null ]
[ 5 ]
[ 39 ]
2024-11-19T00:59:38.448746+00:00
1,612,969,713,000
c23f69dabb4b5832155adb23eeac47e19f9a8582
3
{ "blob_id": "c23f69dabb4b5832155adb23eeac47e19f9a8582", "branch_name": "refs/heads/main", "committer_date": 1612969713000, "content_id": "90776569b94ef821ac713cc5c9ce105f88ffcd5f", "detected_licenses": [ "Apache-2.0" ], "directory_id": "6eb56f2e3f14f2373be07fe95b1c6fedf1e2d49f", "extension": "py", ...
2.640625
stackv2
from django.conf import settings from django.http import HttpResponse, JsonResponse from django.shortcuts import render import json # Create your views here. from django.views import View from .models import UserProfile from tools.login_dec import login_check import hashlib import jwt import time class UserView(View)...
124
32.64
138
20
1,155
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_1ffd170209bbe2ef_6f0e86aa", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 77 ]
[ null ]
[ 20 ]
[ 39 ]
2024-11-19T01:00:05.650924+00:00
1,676,139,610,000
f560cea6be5c10fbe93ba3dd4fa47ff9f41b3f62
2
{ "blob_id": "f560cea6be5c10fbe93ba3dd4fa47ff9f41b3f62", "branch_name": "refs/heads/master", "committer_date": 1676139610000, "content_id": "4bd454e286313e9503b42789a007a5794440956a", "detected_licenses": [ "MIT" ], "directory_id": "255e19ddc1bcde0d3d4fe70e01cec9bb724979c9", "extension": "py", "fi...
2.375
stackv2
# Note that this script attempts to delete directories (Folders) called 'temp' and 'dateutil' # within Pythonista as part of installation. It will also overwrite files in directories # named 'github' and 'githubista'. If you are using Pythonista 1.3 or above please check # that you have not created any Folders with th...
143
39.48
105
14
1,380
python
[{"finding_id": "codeql_py/tarslip_b1065ef6f9e0bbbb_3081dcbd", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 39 ]
[ null ]
[ 3 ]
[ 10 ]
2024-11-19T01:11:45.829864+00:00
1,616,208,186,000
26c25af53714e397f07e5cb36c47da6228f8db92
3
{ "blob_id": "26c25af53714e397f07e5cb36c47da6228f8db92", "branch_name": "refs/heads/main", "committer_date": 1616208186000, "content_id": "5dd4ef5f0be0738f5eafbcacf190a609a89fee9e", "detected_licenses": [ "Unlicense" ], "directory_id": "607383c35bb85da0d3150030fe811ebbd47558ce", "extension": "py", ...
2.671875
stackv2
import json import requester import urllib.parse import time import dataHandler import csv from html.parser import HTMLParser BASE_URL = 'https://govsalaries.com' STATE = 'KS' EMPLOYER = 'olathe' #https://govsalaries.com/search?employer=%s&year=%s&employee=%s&state=%s class htmlParserSearch(HTMLParser): allPage...
147
37.13
148
20
1,410
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_cf4e0ffff08d76ed_cafd4eff", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 53, 58 ]
[ 54, null ]
[ 31, 27 ]
[ 70, 93 ]
2024-11-19T01:11:53.166683+00:00
1,573,674,631,000
b30475de898ce0811e444db8105b664dfa1f8af3
3
{ "blob_id": "b30475de898ce0811e444db8105b664dfa1f8af3", "branch_name": "refs/heads/master", "committer_date": 1573674631000, "content_id": "031bccbc02d77f91eb5ca2179478592b2e4eb0fa", "detected_licenses": [ "MIT" ], "directory_id": "dbb5f45fa1c0b80991c74b9ec213b169daa1f903", "extension": "py", "fi...
2.703125
stackv2
"""This is the docstring""" import datetime from flask import jsonify, request, g from ..utils.auth import requires_auth from ..utils.tools import fileUpload, enrich_posts from ..utils.db_handler import insert_post_to_db, find_related_posts, like_post from .. import app @app.route('/post', methods=['GET']) @requires_...
75
31.52
87
17
554
python
[{"finding_id": "codeql_py/stack-trace-exposure_0db11d3b7fd1dfaf_bc602084", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 61 ]
[ null ]
[ 30 ]
[ 82 ]
2024-11-19T01:21:25.731046+00:00
1,470,733,901,000
d3db86c70d69971f5aaf140ae421e48ce1462141
3
{ "blob_id": "d3db86c70d69971f5aaf140ae421e48ce1462141", "branch_name": "refs/heads/master", "committer_date": 1470733901000, "content_id": "9edb24b4ff15510ec3932cfce8aff3c6759c6c7d", "detected_licenses": [ "Apache-2.0" ], "directory_id": "907c55c4807ae75dbd3d34f333f9f839988115da", "extension": "py"...
2.515625
stackv2
#!/usr/bin/env python # -*- coding: UTF-8 -*- # # Copyright 2016 sadikovi # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless requir...
434
34.67
100
16
3,365
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_6195a7deab16c196_4998e0e2", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 150 ]
[ null ]
[ 7 ]
[ 78 ]
2024-11-19T02:10:46.016773+00:00
1,547,839,873,000
51379e5e89b218ee6686886a0cb101ef0174ac05
3
{ "blob_id": "51379e5e89b218ee6686886a0cb101ef0174ac05", "branch_name": "refs/heads/master", "committer_date": 1547839873000, "content_id": "c7dbd2376f576c4a51b251292558db08afd3d273", "detected_licenses": [ "MIT" ], "directory_id": "8c438afe56141a6ad35c576364fc911f1168a221", "extension": "py", "fi...
2.625
stackv2
import requests, json import os, time from functools import wraps from flask import Flask, request, abort, jsonify import MySQLdb from flask_cors import CORS # API_KEY = b'HahaTeehee' # # def require_apikey(api_function): # @wraps(api_function) # def decorated_function(*args, **kwargs): # if request.he...
120
30.48
96
19
886
python
[{"finding_id": "codeql_py/stack-trace-exposure_c26be80ffa65fdd3_d3003c69", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
3
true
[ "CWE-209", "CWE-089", "CWE-089" ]
[ "py/stack-trace-exposure", "py/sql-injection", "py/sql-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "This SQL query depends on a [user-provided value](1).", "This SQL query depends on a [user-provided value](1)." ]
[ 113, 43, 62 ]
[ null, null, null ]
[ 24, 21, 25 ]
[ 32, 26, 30 ]
2024-11-19T02:10:47.121050+00:00
1,519,102,425,000
31da94b2d9667c845d70954cf9e8bcb42ae45a6e
3
{ "blob_id": "31da94b2d9667c845d70954cf9e8bcb42ae45a6e", "branch_name": "refs/heads/master", "committer_date": 1519102425000, "content_id": "5a5bc91c5a57a6501ea9ff04d5a277f20460d81a", "detected_licenses": [ "Apache-2.0" ], "directory_id": "b71f22b5e549c1a96a016edff91dfcb9981416b9", "extension": "py"...
2.609375
stackv2
import json import os from pprint import pprint import datetime from lolhrgraph import riot from lolhrgraph.fitbit import FitbitClient def read_auth_info(): with open( os.path.join( os.path.dirname(os.path.abspath(__file__)), "..", "api_keys.txt" ...
87
31.86
118
17
655
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6dd329d14843ead2_64e64b34", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 83 ]
[ null ]
[ 11 ]
[ 63 ]
2024-11-19T02:45:25.157033+00:00
1,602,309,535,000
8049d00a53629d2f1ee5f971a36347914ac76424
3
{ "blob_id": "8049d00a53629d2f1ee5f971a36347914ac76424", "branch_name": "refs/heads/main", "committer_date": 1602309535000, "content_id": "9fa0cb89a9b756c36053a4f0056b4f351ed38b20", "detected_licenses": [ "Apache-2.0" ], "directory_id": "cd400ab19901bf8ea44891147504ecac4751cc99", "extension": "py", ...
3.421875
stackv2
#!/usr/bin/python import ftplib def bruteLogin(hostname,passwdFile): try: pF = open(passwdFile,"r") except: print ("[-] File Does not Exist") for line in pF.readlines(): userName = line.split(':')[0] passWord = line.split(':')[1].strip("\n") print ("Trying: "+userName +"/"+passWord) try: ftp = ftp...
30
22.87
80
15
190
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7a5e24343385f0b5_4d1b752b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 15, 19 ]
[ null, null ]
[ 10, 11 ]
[ 43, 80 ]
2024-11-19T02:45:48.634804+00:00
1,549,790,591,000
d62262129c5416f05cdf79683fb5763cfea541af
5
{ "blob_id": "d62262129c5416f05cdf79683fb5763cfea541af", "branch_name": "refs/heads/master", "committer_date": 1549790591000, "content_id": "a8a34ce25818b8c3e090bfd4d354f46691e07802", "detected_licenses": [ "MIT" ], "directory_id": "1a86d2331697edfce24f41da3d68f59606a1c04a", "extension": "py", "fi...
4.84375
stackv2
# 3. Extended Person Info def get_info(): name = input() age = int(input()) town = input() salary = float(input()) return name, age, town, salary def age_range(age): teen_cap = int(18) adult_cap = int(70) if age < teen_cap: age_label = "teen" elif age >= adult_cap: ...
40
22.45
129
10
262
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_05a2b4338e97e9bc_185bd335", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.\nThis expression logs [sensitive data (private)](4) as clear text.\nThis expression logs [sensitive data (private)]...
[ 38 ]
[ null ]
[ 11 ]
[ 129 ]
2024-11-19T02:57:19.127234+00:00
1,557,425,600,000
12cba66710b60515451a6a0a870bcd65e8831f85
3
{ "blob_id": "12cba66710b60515451a6a0a870bcd65e8831f85", "branch_name": "refs/heads/master", "committer_date": 1557425635000, "content_id": "c43fa7a97cce75af703960c283e8812918d60b35", "detected_licenses": [ "MIT" ], "directory_id": "740775b5ddbeec286a8068b2b52b391c496be0ae", "extension": "py", "fi...
3.078125
stackv2
import math from htmlmin.minify import html_minify from jinja2 import Template from unipath import Path from whiskyton import app class Chart(object): def __init__( self, reference=None, comparison=None, sides=12, width=330, height=260, margin=60, ...
257
35.03
79
19
2,089
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_772af25ace63573d_d9df84ee", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 102 ]
[ null ]
[ 28 ]
[ 57 ]
2024-11-19T02:57:19.203084+00:00
1,622,579,127,000
31b1d6eacf822257972b26b59eb3b398cdfb73f1
2
{ "blob_id": "31b1d6eacf822257972b26b59eb3b398cdfb73f1", "branch_name": "refs/heads/master", "committer_date": 1622579127000, "content_id": "a513a0ad46e5234e14c956be9bf3790d39c1cdab", "detected_licenses": [ "MIT" ], "directory_id": "077de683e22b356fe2eb95b4add06138239181cd", "extension": "py", "fi...
2.421875
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- import json import os import traceback from flask import Flask, Blueprint, render_template, request from orquesta.specs import native as specs from orquesta.composers import native from networkx.drawing.nx_agraph import to_agraph from yaml.scanner import ScannerError ap...
74
27.32
90
15
516
python
[{"finding_id": "codeql_py/stack-trace-exposure_760d5137bb7beb8e_350ed0dc", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-215" ]
[ "py/stack-trace-exposure", "py/flask-debug" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger." ]
[ 32, 74 ]
[ null, null ]
[ 12, 5 ]
[ 30, 75 ]
2024-11-19T02:57:27.194635+00:00
1,567,555,904,000
346eb8469dd689d4524543f01180227416028374
3
{ "blob_id": "346eb8469dd689d4524543f01180227416028374", "branch_name": "refs/heads/master", "committer_date": 1567555904000, "content_id": "a5baca131f5043e72d69803a2739c59935fec5b1", "detected_licenses": [ "MIT" ], "directory_id": "1ce5ed679a79b80cfa4aa361206075c186b41eed", "extension": "py", "fi...
3.078125
stackv2
import socket #importa modulo socket from OpenSSL import SSL TCP_IP = '127.0.0.1' # endereço IP do servidor TCP_PORTA = 24000 # porta disponibilizada pelo servidor TAMANHO_BUFFER = 1024 # Criação de socket TCP do cliente sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM) # Configurando SSL context = SSL....
36
25.72
62
10
264
python
[{"finding_id": "codeql_py/insecure-protocol_0bffef3e76b20772_c06aae31", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version SSLv2 allowed by [call to SSL.Context](1).\nInsecure SSL/TLS protocol ve...
1
true
[ "CWE-327" ]
[ "py/insecure-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Insecure SSL/TLS protocol version SSLv2 allowed by [call to SSL.Context](1).\nInsecure SSL/TLS protocol version SSLv3 allowed by [call to SSL.Context](1).\nInsecure SSL/TLS protocol version TLSv1 allowed by [call to SSL.Context](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to SSL.Context](1)." ]
[ 17 ]
[ null ]
[ 26 ]
[ 33 ]
2024-11-19T03:12:10.625043+00:00
1,457,072,435,000
98cc5a2c5a36530f460420e44d0423e7be0447a7
2
{ "blob_id": "98cc5a2c5a36530f460420e44d0423e7be0447a7", "branch_name": "refs/heads/master", "committer_date": 1457072435000, "content_id": "245b950f81cbcee25af54cb643859c634384e5c6", "detected_licenses": [ "MIT" ], "directory_id": "62118404fc3b42f069cc7e0a42e4462ad726d836", "extension": "py", "fi...
2.375
stackv2
# -*- coding: utf-8 -*- from flask import Flask, request, redirect, url_for, session, flash, abort from flask.templating import render_template from threading import BoundedSemaphore from hashlib import md5 from importlib import import_module from lib.stuff import * centipede = Flask(__name__) centipede.config.from...
216
34.05
122
22
1,685
python
[{"finding_id": "codeql_py/flask-debug_c99fa684424dc760_32dde34b", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
5
true
[ "CWE-215", "CWE-327", "CWE-601", "CWE-601", "CWE-601" ]
[ "py/flask-debug", "py/weak-sensitive-data-hashing", "py/url-redirection", "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.", "Untrusted URL redirecti...
[ 216, 58, 120, 145, 155 ]
[ null, null, null, null, null ]
[ 5, 48, 29, 29, 21 ]
[ 65, 88, 45, 45, 37 ]
2024-11-19T03:12:12.958561+00:00
1,389,840,907,000
f2bb56d117e51bfe37fbaacfaff08056842c096d
3
{ "blob_id": "f2bb56d117e51bfe37fbaacfaff08056842c096d", "branch_name": "refs/heads/master", "committer_date": 1389840907000, "content_id": "c0acd4bd7f014fb78ae0e41d550033befe2ada29", "detected_licenses": [ "Unlicense" ], "directory_id": "7ed68882fc4c17b9419d6dac3c6efa0a888571fe", "extension": "py",...
2.515625
stackv2
#!/usr/bin/env python import argparse import os import sys import paramiko import socket import subprocess import yaml import logging import logging.handlers def parse_options(): parser = argparse.ArgumentParser(description=""" Server backup script - Flip Hess 2014 - <flip@fliphess.com> """) pa...
139
30.02
108
14
1,067
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_3bdb8d6643fdecd4_3aac3fae", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 85 ]
[ null ]
[ 5 ]
[ 65 ]
2024-11-19T03:12:21.404676+00:00
1,531,920,661,000
feebb414dd8d0e050fcff0ed2c104f5052badd2e
3
{ "blob_id": "feebb414dd8d0e050fcff0ed2c104f5052badd2e", "branch_name": "refs/heads/master", "committer_date": 1531920661000, "content_id": "d0fa339260f668775a5293fe878eb8515d17c20b", "detected_licenses": [ "Apache-2.0" ], "directory_id": "da4ff770ce9ab179b9961f2bd0fb0e18e8f62aca", "extension": "py"...
2.640625
stackv2
#/user/bin/env/python #-*- coding:utf-8 -*- ''' author:baizhou ''' import random import uuid import hashlib def get_random_color(): R = random.randrange(255) G = random.randrange(255) B = random.randrange(255) return (R,G,B) def get_random_str(): uuid_val = uuid.uuid4() uuid_str = str(uuid).e...
24
16.21
40
10
120
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_002f966b60a73f9a_8d241d0e", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (id)](2) is used in a hashing algorithm (MD5) that is insecure." ]
[ 21 ]
[ null ]
[ 16 ]
[ 24 ]
2024-11-19T03:12:22.317981+00:00
1,461,973,208,000
96fd38a827263e1e1d795e141fc74f9a8d251eb2
3
{ "blob_id": "96fd38a827263e1e1d795e141fc74f9a8d251eb2", "branch_name": "refs/heads/master", "committer_date": 1461973208000, "content_id": "77f0a7084e17c876f7de746c9d9e31bd3353f4e2", "detected_licenses": [ "Apache-2.0" ], "directory_id": "55e4eca63c759dc299f789a16b146c966ae97503", "extension": "py"...
2.578125
stackv2
import hashlib import json import falcon import mongoengine as mongo from fields import PasswordField class User(mongo.Document): username = mongo.StringField(required=True) first_name = mongo.StringField(required=False) last_name = mongo.StringField() email = mongo.EmailField(required=True) passw...
44
31.43
69
16
292
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_8894b61c16c64428_e6d85196", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi...
[ 18 ]
[ null ]
[ 33 ]
[ 57 ]
2024-11-19T01:33:43.599312+00:00
1,587,091,801,000
62d4bc9e21eb248b0e87317cee91de06b110ccf3
2
{ "blob_id": "62d4bc9e21eb248b0e87317cee91de06b110ccf3", "branch_name": "refs/heads/master", "committer_date": 1587091801000, "content_id": "00bafce2913721cfc65ceaedbce739e840b1dc85", "detected_licenses": [ "Apache-2.0" ], "directory_id": "684a67c3936bfaf9971084216f59532a7bc4c493", "extension": "py"...
2.375
stackv2
# app.py from flask import Flask, request, jsonify, flash, abort from flask_cors import * from datetime import datetime as dt, timedelta import base64 import os.path from database_objects.dbcontext import DatabaseContext from utils.auth_handler import AuthHandler from utils.iex_handler import IEXHandler from models.un...
155
31.89
109
15
1,205
python
[{"finding_id": "codeql_py/reflective-xss_30e1347e2e4bdb63_84ddf7a8", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
3
true
[ "CWE-079", "CWE-079", "CWE-022" ]
[ "py/reflective-xss", "py/reflective-xss", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 59, 74, 114 ]
[ null, null, null ]
[ 12, 12, 27 ]
[ 63, 68, 37 ]
2024-11-19T01:57:28.347910+00:00
1,544,976,950,000
18abafaae3cc852961b8e6c3b1ba7c974e3467a3
3
{ "blob_id": "18abafaae3cc852961b8e6c3b1ba7c974e3467a3", "branch_name": "refs/heads/master", "committer_date": 1544976950000, "content_id": "6b51acd2b6ff0f66da18605cc224444578e327ff", "detected_licenses": [ "MIT", "BSD-3-Clause", "Apache-2.0", "BSD-2-Clause" ], "directory_id": "03e4331a8d5...
2.984375
stackv2
# -*- coding: utf-8 -*- from __future__ import absolute_import from __future__ import division from __future__ import print_function from __future__ import unicode_literals import psutil from builtins import input from past.builtins import basestring from datetime import datetime from functools import reduce import ...
342
25.8
90
16
2,541
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_266040b517917896_afda1031", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 274 ]
[ null ]
[ 22 ]
[ 47 ]
2024-11-19T02:11:44.133124+00:00
1,604,293,412,000
1a6d7b509db49744d9124cd04eb4154428245945
3
{ "blob_id": "1a6d7b509db49744d9124cd04eb4154428245945", "branch_name": "refs/heads/master", "committer_date": 1604293412000, "content_id": "c646d61842ecba0986ba19a06915dc558b8f5774", "detected_licenses": [ "MIT" ], "directory_id": "944ac5ed66cd97418a8b91c52d7e6dae68f50f50", "extension": "py", "fi...
3.046875
stackv2
import hashlib import os import base64 import re import multiprocessing import time from multiprocessing import Pool from Crypto.Cipher import AES from Crypto.Util.Padding import pad, unpad MULTIPLE_OF_BYTE = 16 def generate_key(password): # 将密码转为md5值作为密钥 md5 = hashlib.md5() md5.update(password.encode('...
166
36.01
117
18
1,615
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_b855953f0f3934d0_f58069b8", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.\n[The block mode ...
4
true
[ "CWE-327", "CWE-327", "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.\n[The block mode ECB](2) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used.", "[Sensitive data (password)](1) ...
[ 66, 83, 97, 18 ]
[ null, null, null, null ]
[ 24, 38, 44, 16 ]
[ 46, 78, 61, 40 ]
2024-11-19T02:32:43.336376+00:00
1,585,151,456,000
605bc072d2ca23066375e23f347672dfa1089941
3
{ "blob_id": "605bc072d2ca23066375e23f347672dfa1089941", "branch_name": "refs/heads/master", "committer_date": 1585151456000, "content_id": "4d953e2e4da7d7586ef08471b6a3d3a7aaac98ed", "detected_licenses": [ "MIT" ], "directory_id": "9e0de4513a1ef42d4187ddb0096522c6e9929a5f", "extension": "py", "fi...
2.53125
stackv2
# from .app import create_app # NOTE that when you deploy you have to get rid of the relative # references so from app instead of from .app import os import json # Third Party Modules import requests from flask import Flask, render_template, request, jsonify from flask_cors import CORS, cross_origin # from decouple i...
106
34.92
84
18
804
python
[{"finding_id": "codeql_py/flask-debug_adb229f64b8ccc3e_cf0b04d9", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-918", "CWE-918" ]
[ "py/flask-debug", "py/partial-ssrf", "py/partial-ssrf" ]
[ "HIGH", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Part of the URL of this request depends on a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 106, 60, 71 ]
[ null, 63, 74 ]
[ 5, 24, 24 ]
[ 32, 50, 30 ]
2024-11-19T02:32:47.435176+00:00
1,691,502,290,000
7ad2f9f868fbdfa7a4dc9f2902db88c8a39d29e4
3
{ "blob_id": "7ad2f9f868fbdfa7a4dc9f2902db88c8a39d29e4", "branch_name": "refs/heads/master", "committer_date": 1691502290000, "content_id": "2df1459d096892194c4562f1dc9e88ccf232ff2f", "detected_licenses": [ "MIT" ], "directory_id": "a6e96b3f391931d7ac0c95d3bd1fc1956818f55e", "extension": "py", "fi...
2.546875
stackv2
import os import sys from six.moves import urllib import tarfile def maybe_download_and_extract(data_url, model_dir): """ Download and extract model tar file """ dest_directory = model_dir if not os.path.exists(dest_directory): os.makedirs(dest_directory) filename = data_url.split('/')...
26
34.35
81
18
209
python
[{"finding_id": "codeql_py/tarslip_0973442dfd40eb00_1411c3ba", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 26 ]
[ null ]
[ 5 ]
[ 35 ]
2024-11-19T02:32:50.544316+00:00
1,613,078,874,000
4a8df7e46de501e558f031872dcdbf903078053e
2
{ "blob_id": "4a8df7e46de501e558f031872dcdbf903078053e", "branch_name": "refs/heads/main", "committer_date": 1613078874000, "content_id": "2fdd4ed54334245c5a7deaa75e540a02c6e52050", "detected_licenses": [ "Apache-2.0" ], "directory_id": "745e0199f4b22e20dd45cc0de08d356baf00ea4c", "extension": "py", ...
2.4375
stackv2
import requests import sys import json import urllib3 urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning) fhir_server = sys.argv[1] token = sys.argv[2] headers = {"Authorization": "Bearer " + token} def get_response_json_object(url): r = requests.get(url, headers=headers, verify=False) return ...
37
26.35
86
13
249
python
[{"finding_id": "codeql_py/request-without-cert-validation_285a08b771124d7a_51009a30", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 14 ]
[ null ]
[ 6 ]
[ 54 ]
2024-11-19T02:33:29.266511+00:00
1,485,977,243,000
fea6a87f2ba1fcdd3a0ef75ab170b38e247d0163
3
{ "blob_id": "fea6a87f2ba1fcdd3a0ef75ab170b38e247d0163", "branch_name": "refs/heads/master", "committer_date": 1485977243000, "content_id": "c83fbf3bc60e17855683f2cb96d5e1563c37fc60", "detected_licenses": [ "Apache-2.0" ], "directory_id": "4188999c3a13c19759db613a952c4c2c7a449f9b", "extension": "py"...
2.609375
stackv2
#============================================================================== # Title: app.py # Description: This is the logic of the Mrs Miggins vote app using # Python and specifically flask. # # Author: Rob Edwards (@clijockey) # Date: 01/0...
78
24.86
80
14
497
python
[{"finding_id": "codeql_py/cookie-injection_5f5d3a55fe4c0778_a3ff1ee7", "tool_name": "codeql", "rule_id": "py/cookie-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cookie is constructed from a [user-supplied input](1).", "remediation": "", "location": {"file_path": "...
1
true
[ "CWE-020" ]
[ "py/cookie-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cookie is constructed from a [user-supplied input](1)." ]
[ 68 ]
[ null ]
[ 33 ]
[ 41 ]
2024-11-19T02:33:31.774619+00:00
1,469,049,325,000
55e25edcb8b6046ba802a7de5528868f5ffd16c6
3
{ "blob_id": "55e25edcb8b6046ba802a7de5528868f5ffd16c6", "branch_name": "refs/heads/master", "committer_date": 1469049325000, "content_id": "1d59178b26cf40c544b2703de6cf26fb6d19a157", "detected_licenses": [ "MIT" ], "directory_id": "637b57ca9624c67d3fcfe86e1f044e006ad99127", "extension": "py", "fi...
2.65625
stackv2
#!/usr/bin/env python import json import jinja2 import logging import urllib import webapp2 from google.appengine.api import urlfetch class MainHandler(webapp2.RequestHandler): def get(self): self.response.write("Please use the search page.") class SearchHandler(webapp2.RequestHandler): def get(s...
83
28.05
75
15
549
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_7f0d8e66cfdd3cdf_6309a17b", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 77 ]
[ null ]
[ 13 ]
[ 76 ]
2024-11-19T02:33:37.101807+00:00
1,503,604,214,000
45bba362e889f4b97dede674950b40497557aa26
3
{ "blob_id": "45bba362e889f4b97dede674950b40497557aa26", "branch_name": "refs/heads/master", "committer_date": 1503604214000, "content_id": "056feaac08316f03c8fba97312e4ff1e3e8e9c8a", "detected_licenses": [ "MIT" ], "directory_id": "9e531146a2fd79ab1edb3326ed3b71709ea2ecf2", "extension": "py", "fi...
2.9375
stackv2
""" The flask application package. """ from configparser import ConfigParser from flask import Flask,render_template,Config,session,request,abort import base64 from functools import wraps from flask import g,request,redirect,url_for import itsdangerous class LibConfig(Config): """ LibServer inherits this Con...
169
32.49
156
21
1,175
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a9949334fbc39780_3dcf0c4c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 130 ]
[ null ]
[ 15 ]
[ 67 ]
2024-11-19T02:33:41.343340+00:00
1,452,842,979,000
c875516873c0e1035967c152afbd135b6d02cd52
2
{ "blob_id": "c875516873c0e1035967c152afbd135b6d02cd52", "branch_name": "refs/heads/master", "committer_date": 1452842979000, "content_id": "a3abf8ed1adbcdb3abb26d25fe4704b16bf62395", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "3bd9771c1ed72d12a03df2e63b0a14412c43d3a9", "extension": "p...
2.328125
stackv2
from django.shortcuts import render from django.http import JsonResponse from .models import User import logging from django.views.decorators.csrf import csrf_exempt logger = logging.getLogger(__name__) # Create your views here. @csrf_exempt def do_auth(request): ''' You can test this view with the supplied...
74
32.43
109
21
449
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_82954c4bfe4f605e_7e045d00", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 26 ]
[ 30 ]
[ 21 ]
[ 22 ]
2024-11-19T02:46:15.998399+00:00
1,398,192,007,000
17f3b64ba2db53a50d252ff576959a59215d1ed5
3
{ "blob_id": "17f3b64ba2db53a50d252ff576959a59215d1ed5", "branch_name": "refs/heads/master", "committer_date": 1398192007000, "content_id": "494058be3d15c45925f21b024a6c3546f59d297f", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "3404978caf496d4c64a09a4b86a0ffec248e1f3a", "extension": "p...
2.765625
stackv2
"""Rest interface for accessing a remote library. Copyright (c) 2013 Clarinova. This file is licensed under the terms of the Revised BSD License, included in this distribution as LICENSE.txt """ from ambry.client.siesta import API import ambry.client.exceptions import requests import json class NotFound(Exception)...
592
28.39
111
19
3,770
python
[{"finding_id": "codeql_py/request-without-cert-validation_97106c07c3c2418f_9af02f8e", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
3
true
[ "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 230, 378, 475 ]
[ null, null, null ]
[ 13, 17, 13 ]
[ 57, 66, 62 ]
2024-11-19T02:59:14.536322+00:00
1,543,773,337,000
105dc0076802dd045e6f23d7ae3774fa33772c60
3
{ "blob_id": "105dc0076802dd045e6f23d7ae3774fa33772c60", "branch_name": "refs/heads/master", "committer_date": 1543773337000, "content_id": "7d995456649398d7e768e0e451d3a34804a87c16", "detected_licenses": [ "MIT" ], "directory_id": "0e41b75da7928a9eda65753b81d8f584a80b3cf2", "extension": "py", "fi...
2.84375
stackv2
# coding:utf-8 def sleep(t: int): import time import xprint as xp xp.wr(xp.Fore.LIGHTBLUE_EX + ' - [' + '-' * t + '] sleep 0/%s s' % t + '\r') xp.fi() for i in range(1, t + 1): time.sleep(1) xp.wr(xp.Fore.LIGHTBLUE_EX + ' - [' + '>' * i + '-' * (t - i) + ']...
265
21.69
95
19
1,518
python
[{"finding_id": "codeql_py/overly-large-range_18431b0a95c76412_c0ffbb25", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 251 ]
[ null ]
[ 47 ]
[ 50 ]
2024-11-19T02:59:16.930159+00:00
1,693,381,172,000
13151accd70c73952d657a48af2cc5bfda855290
2
{ "blob_id": "13151accd70c73952d657a48af2cc5bfda855290", "branch_name": "refs/heads/main", "committer_date": 1693381172000, "content_id": "3b3466d3e40ab65002a9009b684219c23f2e0eea", "detected_licenses": [ "Apache-2.0" ], "directory_id": "9f8bfd5e566a6e69beb9d3f695ee048a63237f79", "extension": "py", ...
2.453125
stackv2
from typing import Any, Dict, Optional from jinja2 import Environment, FileSystemLoader, StrictUndefined def render_from_file( path: str, template: str, jinja_filters: Optional[Dict[str, Any]] = None, **kwargs: Any ) -> str: jinja_filters = jinja_filters or {} env = Environment( loade...
28
28.46
82
12
197
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_980b1c5e3be0cb18_4afc65e2", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 13, 25 ]
[ 15, null ]
[ 11, 11 ]
[ 6, 67 ]
2024-11-19T02:59:18.559179+00:00
1,683,048,260,000
9c5b2125595afd03a0c34e22ff4b70b85405e929
2
{ "blob_id": "9c5b2125595afd03a0c34e22ff4b70b85405e929", "branch_name": "refs/heads/main", "committer_date": 1683048260000, "content_id": "676a8c888cf93f1bb9354b2d358fcca4dbe94a92", "detected_licenses": [ "MIT" ], "directory_id": "235f9c47a55833b744537ac101a2558324c3de8a", "extension": "py", "file...
2.453125
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- # # A library for access to noaa weather api # # Copyright (C) 2011 Lorenzo Carbonell # lorenzo.carbonell.cerezo@gmail.com # # This program is free software: you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the ...
137
51.46
149
17
1,587
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_910a40fdf9ee5b40_c41628b5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 32 ]
[ null ]
[ 11 ]
[ 26 ]
2024-11-19T02:59:19.417029+00:00
1,566,429,141,000
ae3d04d7ae5d3fdc7fd72302d56817d7d1218c30
3
{ "blob_id": "ae3d04d7ae5d3fdc7fd72302d56817d7d1218c30", "branch_name": "refs/heads/master", "committer_date": 1566429141000, "content_id": "d379d456bb9e98a72b69d69ef32275410774e1d8", "detected_licenses": [ "MIT" ], "directory_id": "3b5011649143412d462a7832e0f581ca962b16c6", "extension": "py", "fi...
2.796875
stackv2
#!/bin/env python3 from flask import Flask, jsonify import requests app = Flask(__name__) char_request = lambda cid: requests.get("https://www.dndbeyond.com/character/{}/json".format(cid)) @app.route('/') def index(): return 'Hello, World' @app.route('/sheets/<int:character>/') def sheet(character): req = ...
26
24.31
106
10
168
python
[{"finding_id": "codeql_py/partial-ssrf_e3cbfb89d19a9eea_da06568b", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 8 ]
[ null ]
[ 28 ]
[ 99 ]
2024-11-19T02:59:21.054066+00:00
1,486,661,443,000
bd6751eb48df9e9b88fd99938d1e79d4573b3e05
2
{ "blob_id": "bd6751eb48df9e9b88fd99938d1e79d4573b3e05", "branch_name": "refs/heads/master", "committer_date": 1486661443000, "content_id": "2314cb8862320fc018cf000be3da54ef36c160e3", "detected_licenses": [ "MIT" ], "directory_id": "aa1f5f78593d56f1d394441a2d6ecffdd3b526c5", "extension": "py", "fi...
2.34375
stackv2
import os import json from bottle import static_file, request, Bottle from dataflow import config, scribe def readhtml(file): with open(os.path.join(config.template_dir, file), 'r') as fl: html = fl.read() return html def savejson(file, data): with open(os.path.join(config.static_dir, 'scripts', ...
62
32.18
81
13
456
python
[{"finding_id": "codeql_py/path-injection_e11efe3d75d96bd0_eb9a488b", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 13 ]
[ null ]
[ 15 ]
[ 63 ]
2024-11-19T02:59:29.304891+00:00
1,567,523,827,000
a59a6e7a8eae3e1cdfb8f036b9968f8c87e84bf0
2
{ "blob_id": "a59a6e7a8eae3e1cdfb8f036b9968f8c87e84bf0", "branch_name": "refs/heads/master", "committer_date": 1567523827000, "content_id": "420ce7b5c89bceed51ad86eab5c1efef2a7681c6", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "1c2faab6d311d4ed896a0f1bf52d10e8f9bcf7db", "extension": "p...
2.34375
stackv2
# Copyright (c) Andreas Hilboll from jupyterhub.auth import Authenticator from tornado import gen from paramiko import SSHClient, AuthenticationException, AutoAddPolicy from traitlets import Int, Unicode class SSHAuthenticator(Authenticator): server_address = Unicode( config=True, help='Address o...
29
30.52
71
17
175
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_315c8b9414655b7d_dca0822a", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 22 ]
[ null ]
[ 13 ]
[ 61 ]
2024-11-19T02:59:47.376603+00:00
1,573,505,451,000
9501396a0d875d5e565a22492e20e6005678e1f1
2
{ "blob_id": "9501396a0d875d5e565a22492e20e6005678e1f1", "branch_name": "refs/heads/master", "committer_date": 1573505451000, "content_id": "020814589569ae0cf102a5efa47532eadd812c0c", "detected_licenses": [ "MIT" ], "directory_id": "aa531263ed0743019e212ac1b6d24cd7cbacdde6", "extension": "py", "fi...
2.40625
stackv2
from __future__ import print_function import sys import names import random from faker import Faker fake = Faker() print("use amtprojectone;") print("INSERT INTO Viewer(Firstname, Lastname, Username, Genre, Birthdate, OwnerID) VALUES ") nbIteration = int(sys.argv[1]) for i in xrange(nbIteration): profile = fake.si...
47
36.98
125
22
456
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ea15a76049cb9620_1668f4d2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 17 ]
[ null ]
[ 11 ]
[ 118 ]
2024-11-19T02:59:50.274199+00:00
1,583,106,948,000
8302c3c1ec3122c85f9f8fa4f86064d4b40f7f62
3
{ "blob_id": "8302c3c1ec3122c85f9f8fa4f86064d4b40f7f62", "branch_name": "refs/heads/master", "committer_date": 1583106948000, "content_id": "8aae0703af2d5591c8c027be3357326004b8daa0", "detected_licenses": [ "MIT" ], "directory_id": "2afba3cdf1a036fecf26c2bf74d0c54d13f8caa3", "extension": "py", "fi...
2.828125
stackv2
import configparser import twython class TweetVacAuthException(Exception): """An error with authorization occurred.""" class TweetVacHttpException(Exception): """An error with with a http request occurred.""" class TweetVac(object): """A vacuum for sucking down tweets using Twitter's API""" def _...
232
37.61
111
18
1,776
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c5e9ca69f1531f57_9f158699", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text." ]
[ 225 ]
[ null ]
[ 15 ]
[ 69 ]
2024-11-19T03:12:07.876958+00:00
1,631,854,394,000
4e07f40175e6d920652aeafafdf9f56bf45c8606
3
{ "blob_id": "4e07f40175e6d920652aeafafdf9f56bf45c8606", "branch_name": "refs/heads/master", "committer_date": 1631854394000, "content_id": "e4dd844172b5e78c6dd897aa11336c88969263a2", "detected_licenses": [ "MIT" ], "directory_id": "b2ff37406e50976b8db1c75bde4297f5039f7391", "extension": "py", "fi...
2.6875
stackv2
from flask import Flask,render_template app = Flask(__name__) @app.route('/new') def index(): return render_template('index.html') @app.route('/contact/<string:value>') def method_name(value): return f"this is the string {value}" @app.route('/int/<int:int>') def about(int): return f"this is integer {int...
25
18.36
43
9
121
python
[{"finding_id": "codeql_py/flask-debug_f0a68a4f1648efbb_8652246f", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
4
true
[ "CWE-215", "CWE-079", "CWE-079", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a ...
[ 25, 11, 15, 19 ]
[ null, null, null, null ]
[ 5, 12, 12, 12 ]
[ 34, 41, 36, 44 ]
2024-11-19T03:12:15.393747+00:00
1,602,371,727,000
5796b8be159ce155a9894086d63cc06616b70e81
3
{ "blob_id": "5796b8be159ce155a9894086d63cc06616b70e81", "branch_name": "refs/heads/master", "committer_date": 1602371727000, "content_id": "6d4c18f8bb6453fef02faa2bd7731b00b971e0bd", "detected_licenses": [ "Apache-2.0" ], "directory_id": "67a7ebf702ce3fd3b7d198313e3c5d444ca7ac0c", "extension": "py"...
2.78125
stackv2
import hashlib, string, random def encrypt( password, salt=None ): if not salt: salt = "".join( random.sample(string.ascii_uppercase \ + string.ascii_lowercase \ + string.digits, 8) ) return salt+"|"+hashlib.sha256( (salt+password).encode("utf-8") ).hexdigest() def encrypt_phpass( password, salt...
55
31.47
78
17
573
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_aec2a28139e89748_bd9b9e0d", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
3
true
[ "CWE-327", "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e...
[ 8, 21, 23 ]
[ null, null, null ]
[ 34, 20, 21 ]
[ 65, 51, 50 ]
2024-11-19T03:24:44.217167+00:00
1,633,125,881,000
8d847af02e187d68495ad7ba7f35c6512c443169
3
{ "blob_id": "8d847af02e187d68495ad7ba7f35c6512c443169", "branch_name": "refs/heads/main", "committer_date": 1633125881000, "content_id": "2ffe1a717e5619de71e3c4bf97a86518e5ef3621", "detected_licenses": [ "MIT" ], "directory_id": "bdcffa912b9fdf274d6aeaca13f5772140991ea9", "extension": "py", "file...
2.6875
stackv2
# Copyright Pincer 2021-Present # Full MIT License can be found in `LICENSE` at the project root. from __future__ import annotations from dataclasses import dataclass, field from datetime import datetime from re import match from typing import Any, Callable, Dict, Iterable, Union, Optional, TYPE_CHECKING from ..exce...
598
23.19
80
18
3,358
python
[{"finding_id": "codeql_py/overly-large-range_434f0dedebb59d85_c357d420", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 45 ]
[ null ]
[ 34 ]
[ 38 ]
2024-11-19T03:24:51.660186+00:00
1,620,642,354,000
9df8bc19886395cb598a0976b084d77787a8deae
3
{ "blob_id": "9df8bc19886395cb598a0976b084d77787a8deae", "branch_name": "refs/heads/master", "committer_date": 1620642354000, "content_id": "d15292d151a35fd2db74ba8df248c8594d9f6d7e", "detected_licenses": [ "MIT" ], "directory_id": "cb473bc294f98e4130cdf7b9097e769b7d324331", "extension": "py", "fi...
2.78125
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- from getpass import getpass from rich.console import Console from rich.table import Table from rich.text import Text import os import re import math import argparse def parseArgs(): parser = argparse.ArgumentParser() parser.add_argument('-p', '--password', nargs=...
224
34.9
121
20
2,267
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b86a8befee5cd979_9722da63", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 179 ]
[ null ]
[ 19 ]
[ 55 ]
2024-11-19T03:35:17.964631+00:00
1,501,918,883,000
0cc809ea94fb79ccedd876c308332a2f77f97f99
3
{ "blob_id": "0cc809ea94fb79ccedd876c308332a2f77f97f99", "branch_name": "refs/heads/master", "committer_date": 1501918883000, "content_id": "cd2a016037a5f5d5b181bfdd8d7687e774c94cd4", "detected_licenses": [ "MIT" ], "directory_id": "5054f565b1386fbca34203ac45d22a42e42614a7", "extension": "py", "fi...
2.6875
stackv2
### Author - Raghav Maheshwari ### from AudioIO import speak from os import chdir #from pytube import YouTube from pprint import pprint from settings import MP4_DIR import requests from os import chdir, system from bs4 import BeautifulSoup from google import lucky from settings import MP4_DIR from selenium import webd...
154
31.36
107
18
1,251
python
[{"finding_id": "codeql_py/request-without-cert-validation_c6bb8fe31af31bfa_3f145e26", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 91 ]
[ null ]
[ 11 ]
[ 99 ]