added
stringlengths
32
32
created
int64
1,244B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.25
source
stringclasses
1 value
text
stringlengths
324
20.1k
num_lines
int64
16
598
avg_line_length
float64
15.1
58.3
max_line_length
int64
33
179
ast_depth
int64
8
39
length
int64
101
3.8k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.1k
265k
sast_codeql_findings_count
int64
1
45
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
45
rule_ids
listlengths
1
45
confidences
listlengths
1
45
severities
listlengths
1
45
messages
listlengths
1
45
line_starts
listlengths
1
45
line_ends
listlengths
1
45
column_starts
listlengths
1
45
column_ends
listlengths
1
45
2024-11-18T21:14:08.964789+00:00
1,567,760,578,000
0a573b841f611615015c23719ec053a60497af53
2
{ "blob_id": "0a573b841f611615015c23719ec053a60497af53", "branch_name": "refs/heads/master", "committer_date": 1567760578000, "content_id": "289773bd758cf354ca8cfa74d91417c92c4c36cb", "detected_licenses": [ "MIT" ], "directory_id": "d5302d7f629218a3ebf1a3b94b9f60d0b0650f7b", "extension": "py", "fi...
2.421875
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- """ 基本流程: 1、模拟请求登录的验证码地址,无验证码验证的可请求登录页面,获取到验证码流和cookie信息 2、将验证码流提交验证码识别平台进行验证 3、模拟请求登录地址,带上自动识别的验证码、请求验证码的cookie信息(这点很重要)、header信息和账号信息 4、登录成功后同样每次请求后台地址必须带上cookie,获取对应数据 """ from website.LoginInterFace import * import requests import logging import sys import re cla...
135
34.91
108
19
1,314
python
[{"finding_id": "codeql_py/request-without-cert-validation_8be8261bbe13b781_bb9c7823", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 70 ]
[ 75 ]
[ 15 ]
[ 23 ]
2024-11-18T21:14:14.816541+00:00
1,628,111,887,000
e325342c4ff452a6ce323b108d8568682b6ffeaa
2
{ "blob_id": "e325342c4ff452a6ce323b108d8568682b6ffeaa", "branch_name": "refs/heads/master", "committer_date": 1628111887000, "content_id": "f109cf9634c467e96ac6b3a7f8a2ec80f5348f12", "detected_licenses": [ "MIT" ], "directory_id": "29bc0c3e4e6260a78f16747195cb717c1ed48ec1", "extension": "py", "fi...
2.46875
stackv2
#!/usr/bin/env python """ Created on Apr 2, 2013 Revised on Apr 7, 2017 + include EASE2 support @author: DGL """ from .loadsir import loadsir from .ease2helper import ease2_map_info import numpy as np import sys import argparse def sirstring(a, cnt): """ sirstring(a,cnt) decodes and returns a string sta...
268
31.33
88
21
2,992
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4ebcbb299c3519d2_26c45176", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 152 ]
[ null ]
[ 34 ]
[ 46 ]
2024-11-18T21:14:17.198020+00:00
1,453,191,948,000
84bde9376ff7306ed0d639423955395662380f43
3
{ "blob_id": "84bde9376ff7306ed0d639423955395662380f43", "branch_name": "refs/heads/master", "committer_date": 1453191948000, "content_id": "a340409e598ccf11abfd6a7fc8f4ffcce1e1fc83", "detected_licenses": [ "Apache-2.0" ], "directory_id": "cbc0d870328533a1c5855401f4ab97e167b5a5d8", "extension": "py"...
2.609375
stackv2
# -*- coding=utf-8 -*- #!/bin/env python from jinja2 import Environment, FileSystemLoader from collections import OrderedDict class PolicyBase(object): def __init__(self,pid=None): env = Environment(loader=FileSystemLoader('.')) self.template = env.get_template('templates/policydocument.tpl') ...
70
30.77
91
15
471
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_e73aeb7a00c6a048_df2d2eaa", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 9 ]
[ null ]
[ 15 ]
[ 56 ]
2024-11-18T21:14:19.014925+00:00
1,386,254,397,000
48600a8d8077938caab4a7762b88afe56708e0bc
3
{ "blob_id": "48600a8d8077938caab4a7762b88afe56708e0bc", "branch_name": "refs/heads/master", "committer_date": 1386254397000, "content_id": "4b98b2a4bd823fc444ed9afbb4941ebf8b1a1bd7", "detected_licenses": [ "Unlicense" ], "directory_id": "c0c9b9bcc9d9e3f06afb6b81bf4f06823f0bf98a", "extension": "py",...
2.5625
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- """ Staples is a simple static site generator based on the idea of processors mapped to types of files. It includes a basic server for development, and has no external requirements itself, beyond the Python Standard Library. Specific processors, such as the included Django...
456
29.87
123
19
3,183
python
[{"finding_id": "codeql_py/http-response-splitting_8ae2be90b3247aed_95342197", "tool_name": "codeql", "rule_id": "py/http-response-splitting", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This HTTP header is constructed from a [user-provided value](1).", "remediation": "", "lo...
2
true
[ "CWE-113", "CWE-022" ]
[ "py/http-response-splitting", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This HTTP header is constructed from a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 386, 384 ]
[ null, null ]
[ 46, 22 ]
[ 51, 31 ]
2024-11-18T21:14:30.832710+00:00
1,376,590,789,000
4fe4f3a0ef17c2d2ee892df644d6cc52ed0fec35
2
{ "blob_id": "4fe4f3a0ef17c2d2ee892df644d6cc52ed0fec35", "branch_name": "refs/heads/master", "committer_date": 1376590789000, "content_id": "267e3165aaa04948286823e1d33a8a8659836230", "detected_licenses": [ "MIT" ], "directory_id": "823b51b38e83eee6bfea1ee18dc06717e0e60c5a", "extension": "py", "fi...
2.46875
stackv2
''' Created on Aug 4, 2013 @author: rajath ''' import os import getpass import re import lxml.html from xml.sax import saxutils import xml.etree.ElementTree as et import logging from pytrie import SortedStringTrie as trie # TODO: write a function to map facebook user-ids with their usernames # and display them while ...
202
29.38
122
18
1,432
python
[{"finding_id": "codeql_py/overly-large-range_3c193e718e8113a1_a81d5725", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 28 ]
[ null ]
[ 41 ]
[ 44 ]
2024-11-18T20:10:37.927305+00:00
1,577,271,887,000
461af33b151d4e9afaa8ab695b08edb4ad8e5b3f
3
{ "blob_id": "461af33b151d4e9afaa8ab695b08edb4ad8e5b3f", "branch_name": "refs/heads/master", "committer_date": 1577271887000, "content_id": "661a15c81412fa5e2685d19a76e56118834df51a", "detected_licenses": [ "MIT" ], "directory_id": "2f86b0fb9a026578ea9cc3a033ee5581fdfff9a8", "extension": "py", "fi...
2.6875
stackv2
""" Health check for Horizon. Healthy: Corresponding stellar-core is 'Synced' Unhealthy: Corresponding stellar-core is not 'Synced' """ import json import time import os import requests from flask import Flask from flask_cors import CORS APP = Flask(__name__) CORS(APP) START_TIMESTAMP = time.time() # Load configura...
78
31.51
85
15
623
python
[{"finding_id": "codeql_py/stack-trace-exposure_e703339f4f241f69_d0cff367", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 41 ]
[ null ]
[ 16 ]
[ 76 ]
2024-11-18T20:10:48.198614+00:00
1,558,084,818,000
8615d5a2f86847d4abb737457721d81deb49fab6
3
{ "blob_id": "8615d5a2f86847d4abb737457721d81deb49fab6", "branch_name": "refs/heads/master", "committer_date": 1558084818000, "content_id": "eec498b901944bbeff9b06e66fdcc1baac0876da", "detected_licenses": [ "Apache-2.0" ], "directory_id": "eb5f8e2c97a262d8a15214216942001e9e454738", "extension": "py"...
3.078125
stackv2
import dpkt from dpkt.compat import compat_ord import datetime import socket """Convert a MAC address to a readable/printable string Args: address (str): a MAC address in hex form (e.g. '\x01\x02\x03\x04\x05\x06') Returns: str: Printable/readable MAC address """ def mac_addr(address...
66
33.02
123
15
562
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_373f33a2d709b6dd_a175c7ca", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 45, 45 ]
[ null, null ]
[ 35, 54 ]
[ 52, 71 ]
2024-11-18T20:10:51.943682+00:00
1,610,876,177,000
78c03c5eca73094c20355c2f0246fe5e3e966693
3
{ "blob_id": "78c03c5eca73094c20355c2f0246fe5e3e966693", "branch_name": "refs/heads/master", "committer_date": 1610876177000, "content_id": "2e38e2c68ac25eaf4bb6d9ec3ea7d3add9c5b6aa", "detected_licenses": [ "MIT" ], "directory_id": "98c56063c82f976c4b3d5ee101510a2d93585e5f", "extension": "py", "fi...
3.03125
stackv2
import requests from flask import render_template, request from app import app @app.route('/pokemon', methods=['GET', 'POST']) def pokemon(): pokemon = [] if request.method == 'POST' and 'pokemon_color' in request.form: color = request.form.get('pokemon_color') pokemon = get_pokemon_of_color(c...
25
28.08
80
12
173
python
[{"finding_id": "codeql_py/partial-ssrf_4e7b11b16df4a1f7_fe0ee1f2", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 16 ]
[ null ]
[ 9 ]
[ 81 ]
2024-11-18T20:48:27.661001+00:00
1,572,544,430,000
dce9e7bfd6a6dd7b40e2adf014808b77d028862e
3
{ "blob_id": "dce9e7bfd6a6dd7b40e2adf014808b77d028862e", "branch_name": "refs/heads/master", "committer_date": 1572544430000, "content_id": "b70b39990feb3cd8d19faf8518f7610a8f39f2d4", "detected_licenses": [ "MIT" ], "directory_id": "0090e851ba8ec7a19e048e0535bc39910bab661e", "extension": "py", "fi...
2.859375
stackv2
# -*- coding: utf-8 -*- from branca.element import CssLink, Figure, JavascriptLink, MacroElement from folium.utilities import parse_options from jinja2 import Template class MousePosition(MacroElement): """Add a field that shows the coordinates of the mouse position. Uses the Leaflet plugin by Ardhi Lukia...
85
37.87
153
12
707
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_bee839351de26d27_211b75f4", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 44 ]
[ 55 ]
[ 17 ]
[ 9 ]
2024-11-18T20:48:30.540740+00:00
1,517,555,853,000
a35455019fa696852125363246d2150d70ef6b30
2
{ "blob_id": "a35455019fa696852125363246d2150d70ef6b30", "branch_name": "refs/heads/master", "committer_date": 1517555853000, "content_id": "9aef1dfe73bf108984044fbceb82dda0c795c48c", "detected_licenses": [ "MIT" ], "directory_id": "628d63ce8027b6cc95c7b4f085aea69a8a5bbd40", "extension": "py", "fi...
2.421875
stackv2
# -*- coding: utf-8 -*- import re import os import json import pandas import codecs import pickle import random # import crawler import hashlib import data_io as dio import pagehome as ph from utility import email_getter from utility import get_clean_text from utility import homepage_neg from utility import homepage_...
169
28.69
127
18
1,288
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_a194966d1a742378_b613a4ba", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text." ]
[ 66 ]
[ null ]
[ 21 ]
[ 48 ]
2024-11-18T20:48:32.791377+00:00
1,530,040,931,000
5164f4f1b652558825554514b7e3e036cc2eea4d
3
{ "blob_id": "5164f4f1b652558825554514b7e3e036cc2eea4d", "branch_name": "refs/heads/master", "committer_date": 1530040931000, "content_id": "6acb0cd33d39d4337a4a40383143e39d3f31abdd", "detected_licenses": [ "Apache-2.0" ], "directory_id": "fc9658815f23791bc3777399e8246790f438ee95", "extension": "py"...
2.78125
stackv2
#!/usr/bin/python # -*- coding: UTF-8 -*- import sys import getopt import time import Utils import ClassifierManager as cm PERFORM_KNN = False PERFORM_SVM = True PERFORM_MLP = False PERFORM_CROSS_KNN = False PERFORM_CROSS_SVM = False def usage(): print ('Usage: main.py -i <inputfile>') sys.exit(2) def m...
168
27.95
121
22
1,226
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b988a5b8c71abaf0_ec5f4b14", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 48 ]
[ null ]
[ 11 ]
[ 95 ]
2024-11-18T21:11:38.571122+00:00
1,625,124,971,000
3ac2479769176da62c68291bd0ac58b554ab1a2f
3
{ "blob_id": "3ac2479769176da62c68291bd0ac58b554ab1a2f", "branch_name": "refs/heads/master", "committer_date": 1625124971000, "content_id": "7c02d6de3aab3f74d4637263e8fab362b90a6225", "detected_licenses": [ "MIT" ], "directory_id": "2a80fd7190a9a74749d1fbe0ef1e1619e00c77a4", "extension": "py", "fi...
2.6875
stackv2
#!/usr/bin/env python3 """SciCat Module""" import json import sys from urllib import parse import requests class SciCat: """SciCat Client""" def __init__(self, base_url): self.base_url = base_url self.access_token = "" def login(self, username, password): """Login""" end...
71
31.96
74
17
522
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_58d038ff17e341bd_971261ee", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 22, 36 ]
[ null, null ]
[ 15, 15 ]
[ 22, 22 ]
2024-11-18T21:25:54.904882+00:00
1,677,701,364,000
33656e63d7e52c6ad2938988b4a0f1d41335e28a
2
{ "blob_id": "33656e63d7e52c6ad2938988b4a0f1d41335e28a", "branch_name": "refs/heads/master", "committer_date": 1677701364000, "content_id": "78aeeb2ea5e3b92af092a52fb4303ea7b989648c", "detected_licenses": [], "directory_id": "71bf09f4ca1a87800187e1ca746ca456f4cb2e46", "extension": "py", "filename": "che...
2.359375
stackv2
# (C) Datadog, Inc. 2010-2017 # All rights reserved # Licensed under Simplified BSD License (see LICENSE) # stdlib from collections import namedtuple import time # 3p import paramiko # project from checks import AgentCheck class CheckSSH(AgentCheck): OPTIONS = [ ('host', True, None, str), ('po...
120
35.53
102
18
880
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_9c4855e574f4a20c_8bc694cd", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 75 ]
[ null ]
[ 13 ]
[ 73 ]
2024-11-18T21:25:56.242657+00:00
1,615,410,275,000
d6dcdcde2150f8b10b838379fba2e8cc2213d685
3
{ "blob_id": "d6dcdcde2150f8b10b838379fba2e8cc2213d685", "branch_name": "refs/heads/main", "committer_date": 1615410275000, "content_id": "8fd77253bbbd85d5dfc072af55a6726f11b7826d", "detected_licenses": [ "Apache-2.0" ], "directory_id": "185e28b3c4f27e8ff3698441df63343546abe832", "extension": "py", ...
2.765625
stackv2
def matcher(url): return "amazon.com" in url def get_meta_data(page, url: str) -> dict: page.goto(url) price = -1 is_currently_unavailable = "Currently unavailable" in page.query_selector(".a-color-price").inner_text() if not is_currently_unavailable: price = page.evaluate( "...
31
32.16
119
13
232
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_e02d2cecb7be0a2e_9419696d", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [amazon.com](1) may be at an arbitrary position in the ...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [amazon.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 2 ]
[ null ]
[ 12 ]
[ 31 ]
2024-11-18T21:26:07.375012+00:00
1,594,146,464,000
0e6dd7f0d1c3d3a2e81101d584f20bc9e6fae64d
3
{ "blob_id": "0e6dd7f0d1c3d3a2e81101d584f20bc9e6fae64d", "branch_name": "refs/heads/master", "committer_date": 1594146464000, "content_id": "072324ddfeca4b53803324a67255f8e89c0770e5", "detected_licenses": [ "MIT" ], "directory_id": "d98eb7d2631a283f5e90667e634bd981c0c343b5", "extension": "py", "fi...
2.65625
stackv2
# some consntants (like host urls) go here. REAL_HOST = 'https://toloka.yandex.ru' SANDBOX_HOST = 'https://sandbox.toloka.yandex.ru' DEFAULT_ACCEPT_MSG = 'Thank you!' # naive but let's do it: # we obtain api from settings, there they are obtained from env from django.conf import settings from django.template.loader im...
129
36.56
124
14
1,069
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5aee6f12a64f2d27_4b8fb1ff", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 48 ]
[ null ]
[ 25 ]
[ 37 ]
2024-11-18T21:26:12.601663+00:00
1,411,981,927,000
4ea1c02fa75068b426d7d35c7be3bc37398eaea1
3
{ "blob_id": "4ea1c02fa75068b426d7d35c7be3bc37398eaea1", "branch_name": "refs/heads/master", "committer_date": 1411981927000, "content_id": "01e8c29b7d4bff1774a6dedcb41af09778fab981", "detected_licenses": [ "Apache-2.0" ], "directory_id": "915578da45451fa444183a6697ac328e50c9d4aa", "extension": "py"...
2.59375
stackv2
# -*- coding: utf-8 -*- from urllib2 import urlopen, Request def fetch_html(url): req = Request(url) req.add_header('user-agent', 'Mozilla/5.0 (X11; Linux x86_64; rv:29.0) Gecko/20100101 Firefox/29.0') resp = urlopen(req, None, 10) if resp.code != 200: raise "HTTP " + resp.code return resp...
60
30.23
109
15
512
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_4d7b51e6a0bf2b8d_6c7958e7", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 52 ]
[ null ]
[ 11 ]
[ 52 ]
2024-11-18T21:51:47.808322+00:00
1,602,199,486,000
7579c68f8d60518512dd13b23017f1d08567750a
2
{ "blob_id": "7579c68f8d60518512dd13b23017f1d08567750a", "branch_name": "refs/heads/master", "committer_date": 1602199486000, "content_id": "7ffc704a29e01d58ebd2b8a6c6d044a1ef713fc7", "detected_licenses": [ "MIT" ], "directory_id": "d5874c822a12025969babe02dfc9aeef7406c3f0", "extension": "py", "fi...
2.40625
stackv2
import json, datetime, time, jwt import hashlib, time, os, re, base64 import phonenumbers, smtplib from .sql import sql from .mail import Mailer mailer_user = os.getenv("MAILER_USER") mailer_pass = os.getenv("MAILER_PASS") mailer_host = os.getenv("MAILER_HOST") mailer_port = os.getenv("MAILER_PORT") class user: d...
195
40.41
138
19
2,180
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_791818ed2404f016_5791ad0c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
3
true
[ "CWE-312", "CWE-327", "CWE-327" ]
[ "py/clear-text-logging-sensitive-data", "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA512) th...
[ 124, 170, 179 ]
[ null, null, null ]
[ 22, 92, 33 ]
[ 30, 126, 55 ]
2024-11-18T21:52:22.474809+00:00
1,677,075,880,000
7ecd976375f4d59825b8a2bfcbbd29751d48af2c
3
{ "blob_id": "7ecd976375f4d59825b8a2bfcbbd29751d48af2c", "branch_name": "refs/heads/master", "committer_date": 1677075880000, "content_id": "688f7b24dcda9276199f038ff3dce9cb2c56dcae", "detected_licenses": [ "Apache-2.0" ], "directory_id": "22e9789d64ef180d3ff97c4e84a3e8c96db22973", "extension": "py"...
2.515625
stackv2
''' Function: 千千音乐下载: http://music.taihe.com/ Author: Charles 微信公众号: Charles的皮卡丘 ''' import time import hashlib import requests from .base import Base from ..utils import seconds2hms, filterBadCharacter '''千千音乐下载类''' class Qianqian(Base): def __init__(self, config, logger_handle, **kwargs): su...
102
40.6
138
27
1,080
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_8cf73eeaab11e018_17f06ed8", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure.", "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 91, 93 ]
[ null, null ]
[ 32, 32 ]
[ 60, 120 ]
2024-11-18T20:59:45.312651+00:00
1,617,370,807,000
8905169e535f1d127c3ea92ffa6e70ad9988fbfb
3
{ "blob_id": "8905169e535f1d127c3ea92ffa6e70ad9988fbfb", "branch_name": "refs/heads/main", "committer_date": 1617370807000, "content_id": "08b186011e0f24c3805ffde4be38fc20cb5ac484", "detected_licenses": [ "MIT" ], "directory_id": "6f9f6f0600a561b0e5f9846ec156650291e2d4f7", "extension": "py", "file...
2.703125
stackv2
import utils from sparky import Sparky data_root = "C:/src/Datasets/D1NAMO/" diabetes = "diabetes_subset/" healthy = "healthy_subset/" outpath = './output/patientList.json' base_url = 'http://192.168.0.101:7200/repositories/patient' # utils.createBasicSet(data_root, diabetes, healthy, outpath) consent_required_info...
70
25.69
94
16
471
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_acce21bb456e9904_b6dba3f4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 70 ]
[ null ]
[ 7 ]
[ 55 ]
2024-11-18T21:10:50.488091+00:00
1,516,388,819,000
366cb246717fd2a0543a5a9be030615cd9d3043a
2
{ "blob_id": "366cb246717fd2a0543a5a9be030615cd9d3043a", "branch_name": "refs/heads/master", "committer_date": 1516388819000, "content_id": "f967f10b52176b57ca7922dd5b2f84d5a4ac534d", "detected_licenses": [ "MIT" ], "directory_id": "3fbc59f12ff60ec995e7c7a2130056035e4d1069", "extension": "py", "fi...
2.359375
stackv2
from django.contrib.auth.models import User from django.contrib.auth import authenticate as django_authenticate import hashlib from inventory.models import DataHubLegacyUser, App from core.db.manager import DataHubManager from social.backends.utils import load_backends from operator import itemgetter from django.conf i...
235
31.23
77
14
1,617
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_345b5bbc37ba3960_510bcd4b", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expen...
[ 153 ]
[ null ]
[ 40 ]
[ 48 ]
2024-11-18T21:10:53.975177+00:00
1,448,616,927,000
a1232ef1d594fe479e6443908928cce2061de8b2
2
{ "blob_id": "a1232ef1d594fe479e6443908928cce2061de8b2", "branch_name": "refs/heads/master", "committer_date": 1448616927000, "content_id": "bb313ccaadb19f7447914b867fd9896cf16952c4", "detected_licenses": [ "MIT" ], "directory_id": "d20ca4202527ae3c06e1d72b5e3a2d7f4a3687e2", "extension": "py", "fi...
2.328125
stackv2
import cgi import datetime import BaseHTTPServer import SocketServer import webbrowser import json import re import bio PORT = 8421 STATE = 'state/state.json' class Session(object): processor = None # class variable def __init__(self): # get current state try: f = open(STATE, 'r') self.stat...
164
30.72
157
19
1,355
python
[{"finding_id": "codeql_py/path-injection_82faaaa914dde911_9a52069f", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 100 ]
[ null ]
[ 17 ]
[ 40 ]
2024-11-18T21:23:46.470646+00:00
1,547,301,786,000
a5011196c66ff51cc24f883004cd99984be07bac
2
{ "blob_id": "a5011196c66ff51cc24f883004cd99984be07bac", "branch_name": "refs/heads/master", "committer_date": 1547301786000, "content_id": "490e16a8c2e604cb83af372b18d24ef38fa4a368", "detected_licenses": [ "Apache-2.0" ], "directory_id": "d08f40a5247d84bc87f0d2fc88a52a0dc3dfb8e9", "extension": "py"...
2.484375
stackv2
from flask import Flask, url_for, send_from_directory, request, jsonify from flask_cors import CORS import logging, os from werkzeug import secure_filename import numpy as np from keras.models import load_model import sys import json import cv2 app = Flask(__name__) CORS(app) file_handler = logging.FileHandler('server...
59
32.2
76
14
470
python
[{"finding_id": "codeql_py/path-injection_b04f6b9478c7dc2f_d9608b83", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 53 ]
[ null ]
[ 19 ]
[ 76 ]
2024-11-18T21:23:48.896787+00:00
1,628,738,884,000
04196b1157aecc05f87925726953af626f61f2eb
3
{ "blob_id": "04196b1157aecc05f87925726953af626f61f2eb", "branch_name": "refs/heads/master", "committer_date": 1628738884000, "content_id": "ba6ff17e1d978a2deaf08346cb77fd5ba4a7cde5", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e39828e8e1fc2c2b8a7c0551ab013684bc73dcee", "extension": "py"...
2.984375
stackv2
''' Key wrapping and unwrapping as defined in RFC 3394. Also a padding mechanism that was used in openssl at one time. The purpose of this algorithm is to encrypt a key multiple times to add an extra layer of security. ''' import struct # TODO: dependency flexibility; make pip install aes_keywrap[cryptography], etc...
80
36.41
99
17
1,046
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_981bea22215d759d_a38badd5", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
4
true
[ "CWE-327", "CWE-327", "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 21, 44, 61, 70 ]
[ null, null, null, null ]
[ 17, 21, 17, 16 ]
[ 36, 64, 45, 77 ]
2024-11-18T21:23:51.133908+00:00
1,564,934,455,000
86ab1c3b87e977badc0981e828b650cfbfed2f6f
2
{ "blob_id": "86ab1c3b87e977badc0981e828b650cfbfed2f6f", "branch_name": "refs/heads/master", "committer_date": 1564934455000, "content_id": "f978803d3dfd2fc8c5519b36ec256436312d2fa8", "detected_licenses": [ "MIT" ], "directory_id": "7e203250edd2811777dfa0fc8ef05595bd4086fb", "extension": "py", "fi...
2.40625
stackv2
from flask import Flask, request, jsonify, abort from marshmallow import Schema, fields, validate from flasgger import swag_from, Swagger import db app = Flask(__name__) Swagger(app) class PropertySchema(Schema): name = fields.String(required=True, validate=validate.Length(3, 120)) address = fields.String(r...
112
30.96
76
13
885
python
[{"finding_id": "codeql_py/reflective-xss_8425337db154453e_3730cc66", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
4
true
[ "CWE-079", "CWE-079", "CWE-079", "CWE-079" ]
[ "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 39, 67, 84, 112 ]
[ null, null, null, null ]
[ 12, 12, 12, 12 ]
[ 32, 27, 39, 34 ]
2024-11-18T21:37:19.661113+00:00
1,391,903,005,000
81d40f3deae01996b2c321a064e566800cc94513
3
{ "blob_id": "81d40f3deae01996b2c321a064e566800cc94513", "branch_name": "refs/heads/master", "committer_date": 1391903005000, "content_id": "0c3a4dc57f973b8426d6045e3447308594a1c0f1", "detected_licenses": [ "MIT" ], "directory_id": "424b0701f10270a6f950d25a9527c07f3cdf381f", "extension": "py", "fi...
2.578125
stackv2
#!/usr/bin/env python # THIS CODE HAS NOT BEEN TESTED AND MAY NOT WORK. # EVEN IF IT DOES, YOU SHOULDN'T RUN IT. # IT IS INTENDED TO BE A GUIDE, NOT AN IMPLEMENTATION. from base64 import b64decode, b64encode from smtplib import SMTP from tornado.web import RequestHandler from moth import Moth class LoginHandler(Re...
48
31.4
80
16
389
python
[{"finding_id": "codeql_py/cookie-injection_a497791ef36f3ffc_c8bfe07d", "tool_name": "codeql", "rule_id": "py/cookie-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cookie is constructed from a [user-supplied input](1).", "remediation": "", "location": {"file_path": "...
1
true
[ "CWE-020" ]
[ "py/cookie-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cookie is constructed from a [user-supplied input](1)." ]
[ 28 ]
[ null ]
[ 42 ]
[ 47 ]
2024-11-18T21:37:41.004797+00:00
1,538,952,043,000
c5cb6c49746de6f736ba692c9802305dab4cf225
3
{ "blob_id": "c5cb6c49746de6f736ba692c9802305dab4cf225", "branch_name": "refs/heads/master", "committer_date": 1538952043000, "content_id": "593c57de72c49371f5ad5cca982e315e160ae8da", "detected_licenses": [ "MIT" ], "directory_id": "234f041fc54dec896d287af621b27688d306fae4", "extension": "py", "fi...
2.765625
stackv2
#!/usr/bin/python3 from bs4 import BeautifulSoup import requests import platform import sys import re import os MAC_URL = "http://standards-oui.ieee.org/oui.txt" # MAC_URL_WIRESHARK = "https://code.wireshark.org/review/gitweb?p=wireshark.git;a=blob_plain;f=manuf" if platform.system() == "Windows": MAC_ADDRESS_PAT...
79
28.29
101
16
653
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_58446ce45eb87c16_d0f07ee0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 76 ]
[ null ]
[ 15 ]
[ 34 ]
2024-11-18T21:59:12.386541+00:00
1,469,148,093,000
3bbd351e8f24d3457927e8e8f319cc09759bfeb6
2
{ "blob_id": "3bbd351e8f24d3457927e8e8f319cc09759bfeb6", "branch_name": "refs/heads/master", "committer_date": 1469148093000, "content_id": "5775172772e9f87f67be061f432e2f5845e9fa09", "detected_licenses": [ "Apache-2.0" ], "directory_id": "ca63f76403209294dad1204de4bbf28b8b1e7f74", "extension": "py"...
2.3125
stackv2
import re import os import subprocess import time from jinja2 import Template from boto import ec2 from .config import CONFIG SSH_ARGS = '-i configs/%s.pem -o StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null' % CONFIG["AWS_KEYNAME"] AWS_USER = CONFIG["AWS_USER"] def get_command_from_template(command_templa...
120
29.88
114
13
936
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_d568d51bd8b16e41_f700d94d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 17 ]
[ null ]
[ 31 ]
[ 57 ]
2024-11-18T21:59:14.492732+00:00
1,549,562,932,000
c6483147d08f1b8b31f936f88456501c61e6e7ac
2
{ "blob_id": "c6483147d08f1b8b31f936f88456501c61e6e7ac", "branch_name": "refs/heads/master", "committer_date": 1549562932000, "content_id": "c9da769d653575bda9df5073d6d4bfc5c74e0a83", "detected_licenses": [ "Apache-2.0" ], "directory_id": "150b9f5a070c2e80e018a98003f01d9cec600eb1", "extension": "py"...
2.4375
stackv2
import json import logging import threading from os.path import basename try: from BaseHTTPServer import BaseHTTPRequestHandler, HTTPServer except ImportError: from http.server import BaseHTTPRequestHandler, HTTPServer class GitlabHTTPHandler(BaseHTTPRequestHandler): def do_POST(self): self.send_...
86
32.07
97
21
634
python
[{"finding_id": "codeql_py/log-injection_985eb90699a6c4f0_b76f86d1", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 25 ]
[ null ]
[ 42 ]
[ 47 ]
2024-11-18T22:11:26.936051+00:00
1,594,393,585,000
1b1f507f5b78574fff97ca664042ce2ad5c7d170
3
{ "blob_id": "1b1f507f5b78574fff97ca664042ce2ad5c7d170", "branch_name": "refs/heads/master", "committer_date": 1594393585000, "content_id": "37a39c70b751dc22b1734d409c9237e48ff8ee2f", "detected_licenses": [ "MIT" ], "directory_id": "f768b75f1953bec78a5d67bc26ad6d59abe92cb9", "extension": "py", "fi...
3.28125
stackv2
# -------------- ##File path for the file file_path #Code starts here def read_file(path): file = open(file_path,"r") sentence = file.readline() return sentence file.close() sample_message= str(read_file(file_path)) print(sample_message) # -------------- #Code starts here file_path_1 file_...
137
16.99
70
11
668
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_3225f16842684603_9720daea", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.\nT...
5
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive data (secret)](2) as clear text.\nThis expression stores [sensitive data (secret)](3) as clear text.\nThis expression stores [sensitive data (secret)](4) as clear text.\nThis expression stores [sensitive data (sec...
[ 130, 37, 66, 90, 114 ]
[ null, null, null, null, null ]
[ 16, 7, 23, 24, 23 ]
[ 26, 19, 35, 36, 35 ]
2024-11-18T22:11:27.180715+00:00
1,417,328,636,000
371d35d8288c219b3fa3dbd545fba56e3ff2274d
2
{ "blob_id": "371d35d8288c219b3fa3dbd545fba56e3ff2274d", "branch_name": "refs/heads/master", "committer_date": 1417328636000, "content_id": "fca8d89142e2ac44351a0d1244a8fd7f7cf14bea", "detected_licenses": [ "MIT" ], "directory_id": "f0499f169a3b987b4017b9c7b974fefcf5faae36", "extension": "py", "fi...
2.390625
stackv2
import uuid import hashlib from django.db import models # Create your models here. class User(models.Model): email = models.EmailField(unique = True) password_hash = models.CharField(max_length = 128, null = True, blank = True, default = "") password_salt = models.CharField(max_length = 32, null = True, blank = T...
52
33.96
92
12
435
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_cb7fdb12de59121b_fdc2f0d3", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function.", "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computational...
[ 25, 34 ]
[ null, null ]
[ 27, 27 ]
[ 33, 33 ]
2024-11-18T22:11:36.607920+00:00
1,481,998,550,000
f1749cec31084f829c04f24b93cc6c144cf7cb5a
2
{ "blob_id": "f1749cec31084f829c04f24b93cc6c144cf7cb5a", "branch_name": "refs/heads/master", "committer_date": 1481998550000, "content_id": "87d50367e2fe6f1a9f385e87abc6f80972b5a2ed", "detected_licenses": [ "Apache-2.0" ], "directory_id": "a75acdb2bb8811f82214a879c6f99a11a03ed438", "extension": "py"...
2.4375
stackv2
#!/usr/bin/python import MySQLdb as db import commands import time #different cursor or connection concept import os # creates php file import re config=open('../db.conf','r') A=config.read() host=re.search(r'\s*\$host\s*=\s*\"(.*)\"\s*;',A).groups(0)[0] username=re.search(r'\s*\$username\s*=\s*\"(.*)\"\s*;',A).groups(...
86
33.38
131
10
928
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_3e05dc618b2ef2e5_efa47c41", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.", "This expression stores [sensitive data (password)](1) as clear text." ]
[ 16, 45 ]
[ null, null ]
[ 9, 9 ]
[ 128, 128 ]
2024-11-18T22:11:53.736555+00:00
1,528,303,595,000
bdb67dda6414f1009b1c2ae40254ecf36ce54c11
2
{ "blob_id": "bdb67dda6414f1009b1c2ae40254ecf36ce54c11", "branch_name": "refs/heads/master", "committer_date": 1528303595000, "content_id": "f63c3cdbb4e2f2ac86a3674a77fd51328ce04870", "detected_licenses": [ "Apache-2.0" ], "directory_id": "08f455b3c434262ea02d7deceedf2fea5c649eb0", "extension": "py"...
2.390625
stackv2
#!/usr/bin/env python import urllib import json import os from flask import Flask from flask import request from flask import make_response # Flask app should start in global layout app = Flask(__name__) @app.route('/webhook', methods=['POST']) def webhook(): req = request.get_json(silent=True, force=True) ...
72
24.25
107
16
509
python
[{"finding_id": "codeql_py/flask-debug_a69f818a6b045364_c097dbe2", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 72, 27 ]
[ null, null ]
[ 5, 23 ]
[ 51, 26 ]
2024-11-18T22:24:07.943546+00:00
1,571,318,270,000
587efcd8c24bb00485fa5e3917096ae7abe43233
3
{ "blob_id": "587efcd8c24bb00485fa5e3917096ae7abe43233", "branch_name": "refs/heads/master", "committer_date": 1571318270000, "content_id": "9b783a988a54813eefa7a513d136c7aec6511d61", "detected_licenses": [ "Unlicense" ], "directory_id": "309be3b754bbc9df38f8d0e666dab988e82a6eb7", "extension": "py",...
2.8125
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- import random import tweepy import sys import os consumer_key = os.environ['consumer_key'] consumer_secret = os.environ['consumer_secret'] access_token = os.environ['access_token'] access_token_secret = os.environ['access_token_secret'] print(consumer_key) print(consumer...
49
23.98
106
13
288
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_31ef7571f51391a1_0dd693b9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 15, 17 ]
[ null, null ]
[ 7, 7 ]
[ 22, 26 ]
2024-11-18T22:24:16.479848+00:00
1,632,355,434,000
a804c697fd9f21153df08099e450ac6e4edd4396
3
{ "blob_id": "a804c697fd9f21153df08099e450ac6e4edd4396", "branch_name": "refs/heads/master", "committer_date": 1632355434000, "content_id": "a6afcf3b45fb91f159c853a922b7f6f623c59eae", "detected_licenses": [ "Apache-2.0" ], "directory_id": "1a808f78b315ed6fda85279f589d5939ee9e464e", "extension": "py"...
2.9375
stackv2
import requests import json from requests.exceptions import Timeout from requests.exceptions import HTTPError from botocore.exceptions import ClientError from datetime import date import csv import os import boto3 import logging logger = logging.getLogger() logger.setLevel(logging.DEBUG) class Asteroids: """Clien...
155
39.64
158
19
1,335
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_6a79be3ceab9a74b_7d5148a5", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 103 ]
[ null ]
[ 25 ]
[ 54 ]
2024-11-18T22:35:57.755028+00:00
1,548,513,576,000
152686f819c988efa071845d5cde91a0bf28ee2c
3
{ "blob_id": "152686f819c988efa071845d5cde91a0bf28ee2c", "branch_name": "refs/heads/master", "committer_date": 1548513576000, "content_id": "e5931fb5c8745fb04cd455921d977ed8a2608c2d", "detected_licenses": [ "MIT" ], "directory_id": "dcdf2ea1527f6ffab6d5794099a1f688c589035a", "extension": "py", "fi...
2.75
stackv2
from __future__ import print_function from __future__ import division from future import standard_library import json import sys import os from flask import Flask, request from bs4 import BeautifulSoup import nltk from nltk.stem.snowball import SnowballStemmer from nltk.stem import WordNetLemmatizer from nltk.corpus i...
315
26.71
107
21
2,101
python
[{"finding_id": "codeql_py/unsafe-deserialization_f16610b2941d591a_b7b4d736", "tool_name": "codeql", "rule_id": "py/unsafe-deserialization", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Unsafe deserialization depends on a [user-provided value](1).", "remediation": "", "locatio...
1
true
[ "CWE-502" ]
[ "py/unsafe-deserialization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Unsafe deserialization depends on a [user-provided value](1)." ]
[ 234 ]
[ null ]
[ 34 ]
[ 46 ]
2024-11-18T22:36:51.490408+00:00
1,499,800,282,000
f0bf6c8ca0e7cb02e151d5eed762ed5af6b1dcbd
3
{ "blob_id": "f0bf6c8ca0e7cb02e151d5eed762ed5af6b1dcbd", "branch_name": "refs/heads/master", "committer_date": 1499800282000, "content_id": "5445dc7d0b23898c931b00cdb4e486fba2ff9b1b", "detected_licenses": [ "MIT" ], "directory_id": "db40683c3c876b1f370c3bb5c2c3256c01e6afdb", "extension": "py", "fi...
2.953125
stackv2
''' data formatting helper functions ''' import copy import logging from markdown import markdown import re from flask import render_template as flask_render_template from grimoire import app, graph, templates def grimoire_date(props, date_key='date'): ''' get a nicely formatted year for a grimoire :par...
298
29.52
89
18
2,255
python
[{"finding_id": "codeql_py/overly-large-range_c048960977ae93ec_de91be19", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 49, 51 ]
[ null, null ]
[ 19, 23 ]
[ 22, 26 ]
2024-11-18T20:23:19.920766+00:00
1,410,099,843,000
dddeebedaee10616cd18afe95402e0a6bc8086b1
4
{ "blob_id": "dddeebedaee10616cd18afe95402e0a6bc8086b1", "branch_name": "refs/heads/master", "committer_date": 1410099843000, "content_id": "7e3fa778b7d18373f65bc21d2f4219b7957f267e", "detected_licenses": [ "CC0-1.0" ], "directory_id": "2a620ed4fa653473ac5d73969dec733f6a17dc18", "extension": "py", ...
3.9375
stackv2
# -*- coding: UTF-8 -*- ####################################################################### # This programme creates a random password for you # # respecting the parametres you set at the start # # License : GNU CC 3.0 # # Author...
56
41.41
80
9
467
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c7f00655d2911db6_8a76d60d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text." ]
[ 56 ]
[ null ]
[ 7 ]
[ 15 ]
2024-11-18T20:23:21.191091+00:00
1,487,256,485,000
4f120d6adcb31c7778d5ffb308348dd05490a780
3
{ "blob_id": "4f120d6adcb31c7778d5ffb308348dd05490a780", "branch_name": "refs/heads/master", "committer_date": 1487256485000, "content_id": "7b07082c8bc78b8b0be5e29af19b5146d3c85671", "detected_licenses": [ "Apache-2.0" ], "directory_id": "1b936e32de2eaf2b346541c1450b33f0c26eb85b", "extension": "py"...
2.75
stackv2
##### # splunkkvstore.py - Class for manipulating kvstore collections in Splunk ##### import sys import requests import json import logging logging.getLogger(__name__) class splunkkvstore(object): # On instaniation, only collect the details. Do not do anything until login is called. def __init__(self,url,*args): ...
207
32.01
140
20
1,711
python
[{"finding_id": "codeql_py/request-without-cert-validation_f80732f944a1f8ce_93b141c8", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
3
true
[ "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 35, 41, 47 ]
[ null, null, null ]
[ 15, 15, 15 ]
[ 111, 125, 114 ]
2024-11-18T20:23:29.098000+00:00
1,623,325,391,000
a9fd2ec3fde8e10b0687b18eb1c18d5df1cee538
3
{ "blob_id": "a9fd2ec3fde8e10b0687b18eb1c18d5df1cee538", "branch_name": "refs/heads/master", "committer_date": 1623325391000, "content_id": "2c3566e68b342dcbbf8e54637829b8e78a5b77b1", "detected_licenses": [ "Apache-2.0" ], "directory_id": "179bbe34e21d044c3e4c1cd0455e3fae897a07be", "extension": "py"...
2.578125
stackv2
import json import logging import os from time import sleep import threading from http.server import HTTPServer, BaseHTTPRequestHandler http_server = None request_event = threading.Event() response_event = threading.Event() response_result = None response_status = "initial" request_num = 0 request_filename = None cl...
95
29.71
104
17
656
python
[{"finding_id": "codeql_py/bind-socket-all-network-interfaces_bdbbe86132345da6_7c7f8751", "tool_name": "codeql", "rule_id": "py/bind-socket-all-network-interfaces", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "'' binds a socket to all interfaces.", "remediation": "", "location": {"...
2
true
[ "CWE-200", "CWE-117" ]
[ "py/bind-socket-all-network-interfaces", "py/log-injection" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "'' binds a socket to all interfaces.", "This log entry depends on a [user-provided value](1)." ]
[ 50, 91 ]
[ null, null ]
[ 5, 19 ]
[ 20, 52 ]
2024-11-18T20:23:35.499453+00:00
1,531,844,929,000
4e0138cbb12cc1dfb491662535fd4dcd4ac95943
2
{ "blob_id": "4e0138cbb12cc1dfb491662535fd4dcd4ac95943", "branch_name": "refs/heads/master", "committer_date": 1531844929000, "content_id": "b83928db965c82b8a9818cd3e7cb869ccc83b2dc", "detected_licenses": [ "MIT" ], "directory_id": "30559336aaa8d10c1966cc5c90c6ebd712edf1bb", "extension": "py", "fi...
2.421875
stackv2
#!/usr/bin/env python # coding: utf8 import requests def getCCResponse(url): try: response = requests.get(url, headers={ 'user-agent': 'Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.157 Safari/537.36', 'accept-language': 'en-US,en;q=0.9', ...
30
32.33
134
14
300
python
[{"finding_id": "codeql_py/request-without-cert-validation_0f6f594c9f9f965b_b28f9ef9", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 9 ]
[ 16 ]
[ 20 ]
[ 59 ]
2024-11-18T20:23:39.898520+00:00
1,629,945,293,000
511167e1f6f686889db7ce72cd9abebe6960ebaf
3
{ "blob_id": "511167e1f6f686889db7ce72cd9abebe6960ebaf", "branch_name": "refs/heads/main", "committer_date": 1629945293000, "content_id": "8d12f1f0c5d3203a61bec8b2901eb4c679090cdc", "detected_licenses": [ "Apache-2.0" ], "directory_id": "b8016eb306bf10b1beb3af98b26729be1d6caca5", "extension": "py", ...
2.84375
stackv2
#!/usr/bin/env python3 """Generate the dockerfiles from a jinja template.""" from pathlib import Path from jinja2 import Environment, FileSystemLoader, Markup import os import yaml import logging log = logging.getLogger(__name__) class DisplayablePath(object): """Utility to print file folders as a tree.""" ...
212
32.94
79
17
1,460
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_9d1964d5a4c9a046_50186672", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 190 ]
[ null ]
[ 11 ]
[ 42 ]
2024-11-18T21:22:36.735783+00:00
1,566,577,628,000
30f310227029ffdb9d11bada2bb062801c56144b
2
{ "blob_id": "30f310227029ffdb9d11bada2bb062801c56144b", "branch_name": "refs/heads/master", "committer_date": 1566577628000, "content_id": "dd16c9b2165fbef15a767fc448f9eeb603c81a92", "detected_licenses": [ "MIT" ], "directory_id": "9fe04a6eeb852778a460f0365d7262f800d33d4c", "extension": "py", "fi...
2.484375
stackv2
import flask import pickle from flask import render_template from flask import request from tensorflow.keras.models import load_model import numpy as np from PIL import Image import requests from io import StringIO from io import BytesIO app = flask.Flask(__name__) classes = pickle.load(open('classes.pkl', 'rb')) mo...
51
21.51
86
12
309
python
[{"finding_id": "codeql_py/flask-debug_9e0a6ebaa3b4f2ca_ea9a06fb", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-918" ]
[ "py/flask-debug", "py/full-ssrf" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "The full URL of this request depends on a [user-provided value](1)." ]
[ 51, 28 ]
[ null, null ]
[ 5, 16 ]
[ 36, 33 ]
2024-11-18T21:23:07.891838+00:00
1,608,674,081,000
0cc8966c8cddc324f212ec9b55b045f69ae2ae59
3
{ "blob_id": "0cc8966c8cddc324f212ec9b55b045f69ae2ae59", "branch_name": "refs/heads/master", "committer_date": 1608674081000, "content_id": "8697f3ce81aa89b8cc97c6cb2892bd32eb31232a", "detected_licenses": [ "MIT" ], "directory_id": "3de20dded3c85f1fa8417fb845b1678eca9147d1", "extension": "py", "fi...
3.03125
stackv2
from ansible_vault import Vault from jinja2 import Template import yaml class JinjaTemplate(): def __init__(self, template_file, variable_files, vault=None): """ Intializes Template class with a template file, and a variable file. IE: from template import JinjaTemplat...
39
32.69
71
17
267
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_cf8741c9218cbc6b_e4cbe934", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 35 ]
[ null ]
[ 25 ]
[ 51 ]
2024-11-18T21:23:20.433335+00:00
1,496,171,300,000
13ceb15f8f247e38fd04004df97c0a38a6a7993e
2
{ "blob_id": "13ceb15f8f247e38fd04004df97c0a38a6a7993e", "branch_name": "refs/heads/master", "committer_date": 1496171300000, "content_id": "2e8abd2e045c9f80b3c58f00c8fdea0cd69b765b", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "b9bc6d06e003d0b2bcc13369e0b4d6779a2564ec", "extension": "p...
2.5
stackv2
#!/usr/bin/env python import simplejson import logging import os from jinja2 import Environment, FileSystemLoader from dateutil import parser from datetime import datetime custom_loader = FileSystemLoader(os.path.join(os.path.dirname(__file__), "../static/templates")) env = Environment(loader=custom_loader) logging...
56
31.61
144
14
395
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_0112f874b2101988_97795d3f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 12 ]
[ null ]
[ 7 ]
[ 40 ]
2024-11-18T21:51:12.136989+00:00
1,641,173,991,000
9dc4f1cd96026626b3e39511b93e05bbc0b3d063
2
{ "blob_id": "9dc4f1cd96026626b3e39511b93e05bbc0b3d063", "branch_name": "refs/heads/master", "committer_date": 1641173991000, "content_id": "bfb31c1bb722782294b2c264537e2b49308e515d", "detected_licenses": [ "MIT" ], "directory_id": "64253c1f50d76dad575112825aa54bbaaafd3e06", "extension": "py", "fi...
2.328125
stackv2
import base64 import os from datetime import datetime from hashlib import sha512 from peewee import (PostgresqlDatabase, BooleanField, CharField, DateTimeField, ForeignKeyField, Model, DoesNotExist) # TextField from tornado.ioloop import IOLoop from config import constants peewee_db = PostgresqlDatabase(constant...
169
30.86
110
16
1,234
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_541b2a8d6a98e0f5_d533c54d", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally e...
[ 92 ]
[ null ]
[ 23 ]
[ 53 ]
2024-11-18T21:51:15.382947+00:00
1,389,861,027,000
8aa8cb342a59fa79045b983f2010490ab4258fca
3
{ "blob_id": "8aa8cb342a59fa79045b983f2010490ab4258fca", "branch_name": "refs/heads/master", "committer_date": 1389861027000, "content_id": "d705eb2289affe5840302ca02b8f102d35241cef", "detected_licenses": [ "Apache-2.0" ], "directory_id": "5d7d118f3ac0650362d8905d9d91c41c9239ae0f", "extension": "py"...
3.140625
stackv2
from binascii import b2a_hex, a2b_hex from Crypto.Cipher import DES import sys #key = '12345678' while 1: key = raw_input('Please input the key(8 bytes): ') if key == '12345678': file = open('history', 'r') try: text = file.read() finally: file.close() ...
24
26.54
126
12
187
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_c27d9978cdf4a3d6_4dcf3886", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The cryptographic algorithm DES](1) is broken or weak, and should not be used.", "r...
1
true
[ "CWE-327" ]
[ "py/weak-cryptographic-algorithm" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[The cryptographic algorithm DES](1) is broken or weak, and should not be used." ]
[ 18 ]
[ null ]
[ 22 ]
[ 43 ]
2024-11-18T21:51:23.394162+00:00
1,448,766,090,000
90a6b7bb8d52d8cbd731819d8b24a57aa182e65a
3
{ "blob_id": "90a6b7bb8d52d8cbd731819d8b24a57aa182e65a", "branch_name": "refs/heads/master", "committer_date": 1448766090000, "content_id": "e21a3e68be6d47f35d8b674706f5ee6b7431e546", "detected_licenses": [ "MIT" ], "directory_id": "f3c79b1a94e4aa260c9edc90208886d627b50f63", "extension": "py", "fi...
2.515625
stackv2
from datetime import datetime import sys import os from bottle import Bottle, route, run, template, request, get, post, view import sae import sae.kvdb kv = sae.kvdb.Client() app = Bottle() @app.route('/') def hello(): return "Hello, world! - Bottle" def diary_lines(): content = [] for i in kv.getke...
100
19.37
80
11
536
python
[{"finding_id": "codeql_py/reflective-xss_63b2b6a44a835a41_67f8faf9", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
3
true
[ "CWE-079", "CWE-079", "CWE-079" ]
[ "py/reflective-xss", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 84, 90, 95 ]
[ null, null, null ]
[ 12, 12, 12 ]
[ 30, 35, 27 ]
2024-11-18T21:51:29.920380+00:00
1,517,911,027,000
2939c5be3e613576ec23b612634d7029635cd92a
2
{ "blob_id": "2939c5be3e613576ec23b612634d7029635cd92a", "branch_name": "refs/heads/master", "committer_date": 1517911027000, "content_id": "c3bcef921fd41cb07a36b226791db76c78683761", "detected_licenses": [ "Apache-2.0" ], "directory_id": "a76d5ad8c47c5835766cc5fbf095fe39837f8759", "extension": "py"...
2.4375
stackv2
from django.shortcuts import render from django.views.generic import View from .models import Upload from django.http import HttpResponsePermanentRedirect, HttpResponse import random import string import json import datetime # index class HomeView(View): # get请求直接获得首页 def get(self, request): return re...
94
29.11
115
18
739
python
[{"finding_id": "codeql_py/path-injection_7d6aca8a7d5adef0_6ef454c6", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 28 ]
[ null ]
[ 23 ]
[ 44 ]
2024-11-18T21:51:36.233001+00:00
1,590,692,702,000
2e689d5e61bea82c434570a34b1eb0911b3b7bbf
3
{ "blob_id": "2e689d5e61bea82c434570a34b1eb0911b3b7bbf", "branch_name": "refs/heads/master", "committer_date": 1590692702000, "content_id": "096e52be61b5377d47b0ee4b0eec5a958ca5a55f", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e2edfbcf7a16587dc308a4811934fa27e4d5399f", "extension": "py"...
2.59375
stackv2
from apscheduler.triggers.interval import IntervalTrigger import logging import psycopg2 from environs import Env import psycopg2.extras psycopg2.extras.register_uuid() env = Env() env.read_env() PG_HOST = env("PG_HOST") PG_USER = env("PG_USER") PG_PASSWORD = env("PG_PASSWORD") PG_DB = env("PG_DB") PG_PORT = env.int...
75
24.25
81
14
450
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_cd7ca862fb392d54_1f06bb50", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 20 ]
[ null ]
[ 11 ]
[ 29 ]
2024-11-18T21:52:02.997109+00:00
1,586,712,385,000
121ba8e8cbfbc2f969fc21e851ec292993d8942c
4
{ "blob_id": "121ba8e8cbfbc2f969fc21e851ec292993d8942c", "branch_name": "refs/heads/master", "committer_date": 1586712385000, "content_id": "4b3f38fb3246d48285276a2965265b506e727605", "detected_licenses": [ "MIT" ], "directory_id": "922b720bd91840c901f16e4c8649e773f5d21a77", "extension": "py", "fi...
4.34375
stackv2
import datetime x = datetime.datetime.now() print("Current date and Time is" , x) # dir(datatype) can give the functions applicable using that datatype # help(datatype.functionName can give you the documentation of that function # dir(__builtins__) to know the built in funtions of python student_grades=[9.8,8.3,10] ...
296
27.54
134
10
2,611
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f9b355edceda5ca6_e87ebf11", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 248 ]
[ null ]
[ 11 ]
[ 34 ]
2024-11-18T22:02:40.456714+00:00
1,548,730,633,000
e1f1a5a164f202ead6152ec3d619a34426c8a622
2
{ "blob_id": "e1f1a5a164f202ead6152ec3d619a34426c8a622", "branch_name": "refs/heads/master", "committer_date": 1548730633000, "content_id": "b55d57f75e19ab35405e8798bb87bd6cfc8e56f5", "detected_licenses": [ "MIT" ], "directory_id": "e1a5cf18513b69223216e5c212d0096771ffa7ac", "extension": "py", "fi...
2.4375
stackv2
import rsa import gnupg import requests from Main.utils import get_user_dir from Security.EncryptionDecryptionService import EncryptionDecryption import os import random import sys class KeyServiceInterface: # get the AES public key of a account @staticmethod def getPublickey(account): raise NotI...
159
31.71
96
17
1,272
python
[{"finding_id": "codeql_py/weak-crypto-key_d3400b4132f61638_6566f36e", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [512](1) bits, which is below 2048 and considered breakable.", "remediation": "", ...
1
true
[ "CWE-326" ]
[ "py/weak-crypto-key" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Creation of an RSA key uses [512](1) bits, which is below 2048 and considered breakable." ]
[ 67 ]
[ null ]
[ 27 ]
[ 43 ]
2024-11-18T22:16:26.452925+00:00
1,597,613,643,000
496bef682c3a496a6ff642c0dd8395e7ec3fa4b2
3
{ "blob_id": "496bef682c3a496a6ff642c0dd8395e7ec3fa4b2", "branch_name": "refs/heads/master", "committer_date": 1597613643000, "content_id": "9b37e9524c5b31dee30cc5cc6c467b291bc73cb5", "detected_licenses": [ "MIT" ], "directory_id": "2363d5007e9d9e2ca10541c815eeb11cfbd96334", "extension": "py", "fi...
2.515625
stackv2
from flask import render_template, request, url_for, flash, redirect # import the Flask class from intellivo_package import app, db, bcrypt, socketio from intellivo_package.models import User, UserPref from intellivo_package.forms import RegistrationForm, LoginForm, ProfileForm from flask_login import login_user, curre...
93
39.62
132
18
792
python
[{"finding_id": "codeql_py/url-redirection_6346e3f345782691_9c401763", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 43 ]
[ null ]
[ 29 ]
[ 38 ]
2024-11-18T22:16:38.962911+00:00
1,635,588,200,000
9a0b8ba25cbc64355e3e1999ab6893e0debbe8b5
3
{ "blob_id": "9a0b8ba25cbc64355e3e1999ab6893e0debbe8b5", "branch_name": "refs/heads/master", "committer_date": 1635588200000, "content_id": "ad05127fb009f41378c7db57e38ab129ebc79047", "detected_licenses": [ "MIT" ], "directory_id": "5676e967d357068aada5b1d937e8d733fd2c38f4", "extension": "py", "fi...
3.171875
stackv2
import sys import traceback from hashlib import sha256, md5 from random import randint def get_trace(): print("Exception in code:") print("-" * 60) traceback.print_exc(file=sys.stdout) print("-" * 60) def gen_hash(_str: str) -> str: """ :param _str: :return: """ return sha256(_s...
79
21.09
88
16
435
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_0d788d898aad6eb9_24f07c7a", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 59 ]
[ null ]
[ 16 ]
[ 38 ]
2024-11-18T22:27:43.278634+00:00
1,632,378,784,000
ad0ed285d42f451d65960a5cbf06181d49725786
2
{ "blob_id": "ad0ed285d42f451d65960a5cbf06181d49725786", "branch_name": "refs/heads/master", "committer_date": 1632378784000, "content_id": "330ecfd5a81ff5d061ed3560d4a9c97b87284e5b", "detected_licenses": [ "MIT" ], "directory_id": "1a35d253d9b52e579a90f71c64cd3d11b7617ce5", "extension": "py", "fi...
2.359375
stackv2
"""Entry point for Iris.""" import base64 import json import logging import os import typing import flask import util.gcp_utils from plugin import Plugin from util import pubsub_utils, gcp_utils, utils from util.config_utils import iris_prefix, is_project_included logging.basicConfig( format=f"%(levelname)s [{ir...
193
31.46
104
18
1,415
python
[{"finding_id": "codeql_py/flask-debug_21f79c4e99cfd4fa_e8326c08", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
4
true
[ "CWE-215", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/flask-debug", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "HIGH", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 193, 101, 109, 141 ]
[ null, null, null, null ]
[ 5, 56, 26, 76 ]
[ 53, 66, 29, 86 ]
2024-11-18T22:27:48.193737+00:00
1,477,908,654,000
1789833ad640ec8b34113186aff8907688f1f9ce
3
{ "blob_id": "1789833ad640ec8b34113186aff8907688f1f9ce", "branch_name": "refs/heads/master", "committer_date": 1477908654000, "content_id": "07b441b9da493e7c8d7287a8692f0d1074d58f18", "detected_licenses": [ "MIT" ], "directory_id": "257b4cb470ad5955c6c91fa518bcc2c3cf2e406f", "extension": "py", "fi...
3.015625
stackv2
from math import sqrt import re import requests from celery import Celery app = Celery('tasks', backend='redis', broker='redis://192.168.25.21:6379/0') app.conf.CELERY_RESULT_BACKEND = "redis://192.168.25.21:6379/0" html_link_regex = re.compile('<a\s(?:.*?\s)*?href=[\'"](.*?)[\'"].*?>') @app.task def sqrt_task(value...
31
25.81
77
11
258
python
[{"finding_id": "codeql_py/redos_09b305234266bb2f_c04ad66a", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '<a ' and containing many repetiti...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '<a ' and containing many repetitions of ' '." ]
[ 9 ]
[ null ]
[ 38 ]
[ 41 ]
2024-11-18T22:27:48.585142+00:00
1,620,383,802,000
ca0c72314bc7774b7ac4565f98f1498f5ac3439f
3
{ "blob_id": "ca0c72314bc7774b7ac4565f98f1498f5ac3439f", "branch_name": "refs/heads/master", "committer_date": 1620383802000, "content_id": "aeafb8a99d54d6dd0b347e012f69b29385fa9fe7", "detected_licenses": [ "Apache-2.0" ], "directory_id": "a497c714ca490efb905eb45c2d6ea3587b366555", "extension": "py"...
2.703125
stackv2
import pandas as pd import re def read_tsv(tsv_file): tsv = pd.read_csv(tsv_file, sep='\t', comment='#', quoting=3).rename(columns={'GND-ID': 'ID'}) parts = extract_doc_links(tsv_file) urls = [part['url'] for part in parts] return tsv, urls def write_tsv(tsv, urls, tsv_out_file): if 'conf' ...
87
26.72
120
20
644
python
[{"finding_id": "codeql_py/overly-large-range_5ad72397cf6fdd87_ad9817a2", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 54 ]
[ null ]
[ 64 ]
[ 67 ]
2024-11-18T22:28:12.309809+00:00
1,562,259,945,000
f608378dbd478c160bb5d66ca2c6891c73201932
3
{ "blob_id": "f608378dbd478c160bb5d66ca2c6891c73201932", "branch_name": "refs/heads/master", "committer_date": 1562259945000, "content_id": "66106427aacc1c773159953d3ae6a4328e026c4c", "detected_licenses": [ "MIT" ], "directory_id": "2b0a07275ab6ec7435b95123765163a5b96f3ecd", "extension": "py", "fi...
2.671875
stackv2
""" A RESTful gateway for the NOAA National Data Buoy Center API. The gateway transforms tabular data from the NOAA API into JSON or XML encoded objects. """ import requests import arrow import flask import flask_restful from src.json2xml import Json2xml import json __author__ = "Robert Daniel Pickard" __copyright__...
260
40.55
118
23
2,416
python
[{"finding_id": "codeql_py/flask-debug_b179256a5832e322_35209f53", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-918" ]
[ "py/flask-debug", "py/partial-ssrf" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depends on a [user-provided value](2)." ]
[ 257, 189 ]
[ null, null ]
[ 5, 24 ]
[ 47, 54 ]
2024-11-18T22:44:03.771939+00:00
1,519,226,517,000
a77504f569615186778680bdb45175e7e39c8d30
2
{ "blob_id": "a77504f569615186778680bdb45175e7e39c8d30", "branch_name": "refs/heads/master", "committer_date": 1519226517000, "content_id": "d7b754a7c9b876d42f50bda0f3a160f516df76b1", "detected_licenses": [ "MIT" ], "directory_id": "d701b94a4fdae9df97b658281d2fc1532e3f705f", "extension": "py", "fi...
2.484375
stackv2
#!/usr/bin/env python import importlib import select from contextlib import contextmanager from functools import partial from multiprocessing import Process, Queue import click import psycopg2 import psycopg2.extensions from jinja2 import Template from psycopg2.extras import RealDictCursor TRIGGER_FUNCTION = """ ...
237
28.81
94
16
1,515
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_3f976480c3542d7e_5781924d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 51, 60 ]
[ 57, 70 ]
[ 24, 22 ]
[ 5, 5 ]
2024-11-18T22:44:05.906426+00:00
1,512,146,918,000
7a4962e2ebc2fc67274ed359097a1f8c528e3ee5
2
{ "blob_id": "7a4962e2ebc2fc67274ed359097a1f8c528e3ee5", "branch_name": "refs/heads/master", "committer_date": 1512146918000, "content_id": "5649b81cc75cbfcae27f2de437fb8e0e91d9317f", "detected_licenses": [ "Artistic-2.0" ], "directory_id": "f37a00d8d7e7a9f6692efbf689bf8449e8846ffb", "extension": "p...
2.5
stackv2
#!/usr/bin/env python import re import sys import urllib2 from jinja2 import Template from jinja2 import Environment from jinja2 import FileSystemLoader from lxml import etree from weasyprint import HTML from weasyprint import CSS #--------------------------------------------------------------------- # # Usage: ...
60
20.82
70
11
289
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_d8c8876b2a5797c3_859233f5", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 57 ]
[ null ]
[ 7 ]
[ 48 ]
2024-11-18T22:44:16.760869+00:00
1,564,347,937,000
f0ae6d543a0690cace706ffeb459e7b9505288ef
2
{ "blob_id": "f0ae6d543a0690cace706ffeb459e7b9505288ef", "branch_name": "refs/heads/master", "committer_date": 1564347937000, "content_id": "0718a71b0d02880cbb04e29443da7044c2bab0a8", "detected_licenses": [ "MIT" ], "directory_id": "09f545ee0f616af9e35cce2136d9a65041d50435", "extension": "py", "fi...
2.40625
stackv2
import os from server import app, db from functools import wraps from flask import request, jsonify import hashlib import binascii from .models import User @app.route('/device/register', methods=['POST']) def register_user(): secret = os.environ.get('AUTH_SECRET') auth_secret = request.form.get("auth_secret"...
66
30.61
78
17
525
python
[{"finding_id": "codeql_py/stack-trace-exposure_243f9a5aba9e7a80_464cfe2b", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 25 ]
[ null ]
[ 24 ]
[ 43 ]
2024-11-18T22:44:41.377720+00:00
1,517,284,779,000
dbca245c60fc610f0d655cf2e1f3336602127697
3
{ "blob_id": "dbca245c60fc610f0d655cf2e1f3336602127697", "branch_name": "refs/heads/master", "committer_date": 1517284779000, "content_id": "f6e2274f0af60dcabce0e4eda4726c84c7595655", "detected_licenses": [ "MIT" ], "directory_id": "3b262dcc50ee326360ba254bc9d5d66a8bf180c8", "extension": "py", "fi...
2.578125
stackv2
from __future__ import absolute_import from __future__ import print_function import six import rake import readTxt import operator import io import pandas as pd import nltk from nltk.stem import WordNetLemmatizer import re import os import os.path import spacy from spacy.lang.en import English lemmatizer = WordNetLemm...
105
21.26
82
21
734
python
[{"finding_id": "codeql_py/overly-large-range_9c7ced2553603df6_b9eaf3f6", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 31 ]
[ null ]
[ 23 ]
[ 26 ]
2024-11-18T22:44:48.138092+00:00
1,478,349,666,000
8f3bf6a34ee26bb56ad4cc1ded4add7e41acb23a
3
{ "blob_id": "8f3bf6a34ee26bb56ad4cc1ded4add7e41acb23a", "branch_name": "refs/heads/master", "committer_date": 1478349666000, "content_id": "669647f7620c2bcef355e4a255c54f5123a6c0a5", "detected_licenses": [ "MIT" ], "directory_id": "97cf29766280cc9651e93994d84ea5e387674287", "extension": "py", "fi...
2.546875
stackv2
# coding=utf-8 """ crumhorn configuration bundler. Raw configurations ("package specification") are read in, and bundled into a "Machine Spec", which can be handled by the other crumhorn tools (e.g. prepare and launch) Usage: compile <package> [--from=<base_configuration>] compile <package...
105
35.67
171
21
806
python
[{"finding_id": "codeql_py/tarslip_b02b861a460871a0_4256eede", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 77 ]
[ null ]
[ 21 ]
[ 25 ]
2024-11-18T22:44:52.094662+00:00
1,609,822,689,000
cc0ebd5391e5ad93785d4367171d2f9636aa6815
3
{ "blob_id": "cc0ebd5391e5ad93785d4367171d2f9636aa6815", "branch_name": "refs/heads/master", "committer_date": 1609822689000, "content_id": "7cd655b64a7fbc16774791b635989c4ec7a898dc", "detected_licenses": [ "MIT" ], "directory_id": "160db316cac4c856b9e8ade699a5e7e309e9f063", "extension": "py", "fi...
3.03125
stackv2
#!/usr/bin/env python #### DESCRIPTION #### # Python Script to calculate a CDB invesment, considering the initial investment date, the CDB rate, ... # an evaluation date and the CDI daily rate from a csv file. # Programming Language: Python 3.8 # Wep Framework: Flask 1.1.2 - Werkzeug 1.0.1 __author__ = "Thiago Neves"...
148
39.48
133
24
1,456
python
[{"finding_id": "codeql_py/log-injection_e4f8cc410b8c2535_7bc29ae7", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
3
true
[ "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 51, 81, 129 ]
[ null, 83, null ]
[ 21, 25, 21 ]
[ 115, 86, 99 ]
2024-11-18T20:24:12.112677+00:00
1,427,989,315,000
77510d44cbed3e4f695bf2928c074d29d7d3d443
3
{ "blob_id": "77510d44cbed3e4f695bf2928c074d29d7d3d443", "branch_name": "refs/heads/master", "committer_date": 1427989315000, "content_id": "5f4729d7f9c87a7429b4996c6a8b56703160da32", "detected_licenses": [ "MIT" ], "directory_id": "7b6466793d09dd16a1340377d953951ed2b9aca1", "extension": "py", "fi...
2.53125
stackv2
# Copyright (c) 2014 Red Hat, Inc. and/or its affiliates. # Copyright (c) 2015 Anthony Towns # Written by Anthony Towns <aj@erisian.com.au> # See LICENSE file. from __future__ import print_function import requests try: from urlparse import urlparse, parse_qs except ImportError: from urllib.parse import urlpar...
186
35.76
79
14
1,494
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_634848686d3be093_a4d8e76f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text.\nThis expression logs [sensitive data (pas...
[ 171, 175 ]
[ null, 176 ]
[ 15, 15 ]
[ 65, 67 ]
2024-11-18T20:36:59.074698+00:00
1,680,537,173,000
e3ea038a90e6b4c590c1e3e697ed8834029cf13b
3
{ "blob_id": "e3ea038a90e6b4c590c1e3e697ed8834029cf13b", "branch_name": "refs/heads/master", "committer_date": 1680537173000, "content_id": "b375cacb0d10a9bb1eebfd2aaa6a46222ab98ad7", "detected_licenses": [ "MIT" ], "directory_id": "2676552613e2cc0031889985416e7860ace765c5", "extension": "py", "fi...
2.546875
stackv2
#!/usr/bin/env python ''' Compliance Checker Web ~~~~~~~~~~~~~~~~~~~~~~ ''' from cchecker_web import cchecker_web from cchecker_web.processing import compliance_check from flask import request, jsonify from flask import current_app as app from hashlib import sha1 from datetime import datetime import base64 import os ...
113
32.06
131
17
832
python
[{"finding_id": "codeql_py/stack-trace-exposure_51dea8a0d89fbc54_20901704", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
4
true
[ "CWE-209", "CWE-022", "CWE-022", "CWE-022" ]
[ "py/stack-trace-exposure", "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 76, 68, 69, 70 ]
[ null, null, null, null ]
[ 59, 31, 25, 26 ]
[ 85, 56, 50, 34 ]
2024-11-18T20:59:42.447557+00:00
1,558,272,125,000
b3d84088648d90e46e308f32029d2f4b63a5da2c
2
{ "blob_id": "b3d84088648d90e46e308f32029d2f4b63a5da2c", "branch_name": "refs/heads/master", "committer_date": 1558272125000, "content_id": "62289cbe2561a34f9a9bf96117dcabdc11f023e6", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "64dde30fb5b4e8b754ce66bbb913f7b09e6bb404", "extension": "p...
2.328125
stackv2
import datetime import json from haystack.generic_views import SearchView from django.http import HttpResponse from haystack.query import SearchQuerySet from op_scraper.models import Person, Law, Debate from offenesparlament.constants import ES_DEFAULT_LIMIT # import the logging library import logging # Get an inst...
257
33.31
80
23
1,854
python
[{"finding_id": "codeql_py/log-injection_259fec3fc657ca91_85d84bde", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
2
true
[ "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 78, 89 ]
[ 79, 90 ]
[ 21, 21 ]
[ 47, 46 ]
2024-11-18T21:00:01.887486+00:00
1,596,258,418,000
f0a91da23dd6dbbc06935f30956a97fcdf3ab400
2
{ "blob_id": "f0a91da23dd6dbbc06935f30956a97fcdf3ab400", "branch_name": "refs/heads/master", "committer_date": 1596258418000, "content_id": "4bc47741a04eadf5ab379045b6769c645b76917b", "detected_licenses": [ "MIT" ], "directory_id": "b042a014d668bd2d9e07bcfc756022137e5b0f97", "extension": "py", "fi...
2.453125
stackv2
import pymongo import os from dotenv import load_dotenv from pymongo import MongoClient from pdb import set_trace as breakpoint load_dotenv() DB_USER = os.getenv("MONGO_USER", default="OOPS") DB_PASSWORD = os.getenv("MONGO_PASSWORD", default="OOPS") CLUSTER_NAME = os.getenv("MONGO_CLUSTER_NAME", default="OOPS") con...
48
21.65
117
8
247
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8ff14fbd4d938a8f_56533570", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 16 ]
[ null ]
[ 15 ]
[ 29 ]
2024-11-18T21:00:37.962804+00:00
1,428,328,565,000
0dbe54e25ee6a29748adb6b311f2301da6df21f0
3
{ "blob_id": "0dbe54e25ee6a29748adb6b311f2301da6df21f0", "branch_name": "refs/heads/master", "committer_date": 1428328565000, "content_id": "a839a587404ea89ffd0c77610cffb8903322858d", "detected_licenses": [ "Apache-2.0" ], "directory_id": "3d5b5c66a2a253ebac4adc5ea32ce4581876a90a", "extension": "py"...
2.59375
stackv2
''' Created on July 11th, 2013 @author: Layne @edited: Ryan Wallner ''' import logging import paramiko, base64 import time logger = logging.getLogger(__name__) class ssh_client: client = None host = None username = None password = None def __init__(self, host, port, username, password): ...
70
27.47
83
18
448
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_a431a85f761a2167_65073d62", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
2
true
[ "CWE-295", "CWE-312" ]
[ "py/paramiko-missing-host-key-validation", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 28, 30 ]
[ null, null ]
[ 9, 75 ]
[ 74, 83 ]
2024-11-18T21:00:59.744410+00:00
1,620,825,391,000
84bca459ce7bbfb11d628175bbe7ac19b3567ac2
2
{ "blob_id": "84bca459ce7bbfb11d628175bbe7ac19b3567ac2", "branch_name": "refs/heads/main", "committer_date": 1620825391000, "content_id": "d53e2dc6bf4c98edeb02dc7b5fe4eb07c42ae5a5", "detected_licenses": [ "MIT" ], "directory_id": "a477a06e78e1a3ae03e43946f45f50e0cbc131a3", "extension": "py", "file...
2.40625
stackv2
import os import time import json import socket import requests import threading import pandas as pd from configparser import ConfigParser start_global = 0.0 api_invoke_add = [] api_invoke_delete = [] rule_apply = [] total_time = [] global_time = [] type_test = [] def change_format_float_list(old_list): new_lis...
232
30.25
132
15
1,641
python
[{"finding_id": "codeql_py/request-without-cert-validation_931809ff6d2290fb_61d3284c", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 76, 112 ]
[ null, null ]
[ 13, 13 ]
[ 69, 71 ]
2024-11-18T21:01:14.001692+00:00
1,604,511,005,000
7bd29fba3b293cb01832924aa397949be58c18dd
3
{ "blob_id": "7bd29fba3b293cb01832924aa397949be58c18dd", "branch_name": "refs/heads/master", "committer_date": 1604511005000, "content_id": "4a3c55f89454c83e81bbf1a0bcee24d7846b5229", "detected_licenses": [ "MIT" ], "directory_id": "230cf2718488f8a65da09ba9fcc53a980dc8bf4d", "extension": "py", "fi...
3.25
stackv2
#!/usr/bin/env python from password_trucker import User from password_trucker import Credentials def create_user(username,password): ''' function to creat new user ''' new_user = User(username,password) return new_user def save_user(user): ''' function to save contact ''' user.save_user() def user...
183
26.95
165
19
1,055
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_499a96c76083e556_be07d68f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 123 ]
[ null ]
[ 15 ]
[ 82 ]
2024-11-18T21:01:30.417591+00:00
1,557,977,720,000
87cd751bdc85b7d2b26b4a5d75e13664506b6f7a
3
{ "blob_id": "87cd751bdc85b7d2b26b4a5d75e13664506b6f7a", "branch_name": "refs/heads/master", "committer_date": 1557977720000, "content_id": "f4fe58a0efe83d0fb76467db1ebdc9168dfd5fd7", "detected_licenses": [ "Apache-2.0" ], "directory_id": "d4d421ef14e5155a9c8252fb28c432d736d62f74", "extension": "py"...
2.640625
stackv2
import os from django.views.generic import View from tools.decorator import allow_origin from django.utils.decorators import method_decorator from tools.pygal_process import create_wordcloud, create_pie, create_bar, jieba_top10_bar # 导入分页模块 from django.core.paginator import Paginator, PageNotAnInteger, InvalidPage, Emp...
210
38.14
141
21
2,035
python
[{"finding_id": "codeql_py/path-injection_9b4a59ba004e7120_e9fc04d9", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
4
true
[ "CWE-022", "CWE-022", "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 87, 94, 101, 108 ]
[ null, null, null, null ]
[ 35, 35, 35, 35 ]
[ 72, 69, 70, 81 ]
2024-11-18T21:25:32.453168+00:00
1,567,518,891,000
561dfd5f0d8207470ff7280d289085ee1feddd54
4
{ "blob_id": "561dfd5f0d8207470ff7280d289085ee1feddd54", "branch_name": "refs/heads/master", "committer_date": 1567518891000, "content_id": "ce31d5ca705049645ff5da6d3d45b0da65653b9b", "detected_licenses": [ "Apache-2.0" ], "directory_id": "d162efc9eae434bfa8271e6aba3b0d21d7fb55ff", "extension": "py"...
3.765625
stackv2
''' AES有三种密钥长度16(*AES-128*), 24 (*AES-192*), 和 32 (*AES-256*) 在对字符进行加密时,密码和明文长度必须为16,24,或32 因此要对密码和明文进行预处理,确保密码长度为16,24或32,明文长度为16,24或32的整数倍 这里以16(*AES-128*),ECB模式为例 密钥长度16,明文长度为16的整数倍,若不足则补齐 ''' from Crypto.Cipher import AES from binascii import unhexlify,hexlify # 按字节数补齐,输入字符串,返回字节类型 def align(string, isKey=False):...
45
37.67
123
13
792
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_5919d799ab4bdbfb_7c8648b9", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 31, 42 ]
[ null, null ]
[ 16, 16 ]
[ 37, 37 ]
2024-11-18T21:51:18.220185+00:00
1,601,489,671,000
608fac76d006c609e6512e789a286df4ab067947
2
{ "blob_id": "608fac76d006c609e6512e789a286df4ab067947", "branch_name": "refs/heads/master", "committer_date": 1601489671000, "content_id": "fc336d4d6fea4700d2be77544dd4c9b244985d92", "detected_licenses": [ "Apache-2.0" ], "directory_id": "3c20918197b26c9dda30cc762ff3d5c482b4a179", "extension": "py"...
2.5
stackv2
# CPSC 449 Project 2 Mircoblog Microservices # by Josef Jankowski and William Timani # Josef Jankowski: josefj1519@csu.fullerton.edu # William Timani: williamtimani@csu.fullerton.edu # users.py contains the users microservice and flask init. import click import flask_api import pugsql from flask import request from ...
119
42.37
112
15
1,297
python
[{"finding_id": "codeql_py/stack-trace-exposure_98860654755c0dae_a2ad50d0", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
4
true
[ "CWE-209", "CWE-209", "CWE-079", "CWE-079" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [u...
[ 55, 96, 97, 109 ]
[ null, null, null, null ]
[ 16, 16, 12, 12 ]
[ 60, 60, 102, 102 ]
2024-11-18T22:00:17.797752+00:00
1,469,452,260,000
b79c1e095d5e1c47770a34276dabe972e8e168ee
3
{ "blob_id": "b79c1e095d5e1c47770a34276dabe972e8e168ee", "branch_name": "refs/heads/master", "committer_date": 1469452260000, "content_id": "41d6190e70fb6b6de5474a272a13a1333a7207f5", "detected_licenses": [ "MIT" ], "directory_id": "6435acba07d44a7c6f8bf8f3ada1f8c84b66daa7", "extension": "py", "fi...
2.734375
stackv2
from flask import Flask from flask import request from flask import jsonify from collections import defaultdict import json import random import operator import logging app = Flask(__name__) # set up logger logger = logging.getLogger('reco_server') logger.setLevel(logging.DEBUG) hdlr = logging.FileHandler('logs/reco...
174
29.9
82
19
1,191
python
[{"finding_id": "codeql_py/flask-debug_a0e33dc65fb8e60d_358c7d89", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
7
true
[ "CWE-215", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/flask-debug", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "HIGH", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry de...
[ 174, 53, 58, 66, 72, 79, 82 ]
[ null, null, null, null, null, null, null ]
[ 5, 21, 17, 21, 17, 21, 17 ]
[ 40, 52, 55, 52, 48, 52, 60 ]
2024-11-18T22:00:26.749544+00:00
1,430,896,146,000
cf9bab2e81966ab3299dcfd7801382596836ab73
3
{ "blob_id": "cf9bab2e81966ab3299dcfd7801382596836ab73", "branch_name": "refs/heads/master", "committer_date": 1430896146000, "content_id": "5191ff3587c53ac6b9b3f085f4212e049a4fc92b", "detected_licenses": [ "MIT" ], "directory_id": "1fb402f9624307c0f7ba0f2757dce204a1be13aa", "extension": "py", "fi...
2.671875
stackv2
from flask import Flask from bs4 import BeautifulSoup import requests import os app = Flask(__name__) @app.route("/") def hello(): return "Hello World!" @app.route('/<username>') def catch_all(username): r = requests.get("http://www.github.com/" + username) data = r.text soup = BeautifulSoup(data) ...
23
22.52
58
13
144
python
[{"finding_id": "codeql_py/reflective-xss_b2a8fa62c23569d7_d6be25ea", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
2
true
[ "CWE-079", "CWE-918" ]
[ "py/reflective-xss", "py/partial-ssrf" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 19, 15 ]
[ null, null ]
[ 12, 10 ]
[ 50, 59 ]
2024-11-18T22:00:45.293539+00:00
1,620,207,929,000
9d4b760b384613382ccc6c02140fd4b17d592b8c
3
{ "blob_id": "9d4b760b384613382ccc6c02140fd4b17d592b8c", "branch_name": "refs/heads/main", "committer_date": 1620207929000, "content_id": "7cbeafc7aa93f42eeeed2e3bafc87c945d88a1f4", "detected_licenses": [ "Apache-2.0" ], "directory_id": "9810a97b4a02d1760b1541690b6ad9c4be1264e0", "extension": "py", ...
2.8125
stackv2
import tkinter as tk from tkinter import ttk import tkinter.font as tkFont import hashlib from . import interactive from . import const class RegistPage(tk.Frame): ''' 注册页 ''' def __init__(self,parent,root): super().__init__(parent) self.root = root titleFont = tkFont.Font(famil...
62
42.97
89
14
808
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_1679a29cfe5fb4c3_e9816a01", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e...
[ 51 ]
[ null ]
[ 18 ]
[ 26 ]
2024-11-18T22:00:46.158810+00:00
1,542,404,260,000
9b377c0eea23e316505321d0d4d2c53d529088ea
3
{ "blob_id": "9b377c0eea23e316505321d0d4d2c53d529088ea", "branch_name": "refs/heads/master", "committer_date": 1542404260000, "content_id": "546fd98f0588cb47670a3e7f8a7644263bae9bc9", "detected_licenses": [ "MIT" ], "directory_id": "88f8f85ed82691a2e62122bd926128d8b32469a0", "extension": "py", "fi...
2.625
stackv2
from flask import Flask, jsonify, request from db_patient import Patient import heart_server_helpers import datetime from email.utils import parseaddr app = Flask(__name__) @app.route("/api/new_patient", methods=["POST"]) def new_patient(): """ add a new patient to the patient database via post :return: ...
187
30.57
77
14
1,374
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9524c2e1040b673e_5546a52a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 129 ]
[ null ]
[ 11 ]
[ 25 ]
2024-11-18T22:01:02.639612+00:00
1,590,076,270,000
d41f76eec04931df6030d10c401d6c2c54a11bb3
3
{ "blob_id": "d41f76eec04931df6030d10c401d6c2c54a11bb3", "branch_name": "refs/heads/master", "committer_date": 1590076270000, "content_id": "5cb19da94719fa9b2dabe987e9963ec45864641b", "detected_licenses": [ "MIT" ], "directory_id": "04a82c022b5291a2a43f4e0ddad457f7a2cd8621", "extension": "py", "fi...
2.96875
stackv2
""" Nozomi View Template Module author: hugh@blinkybeach.com """ from typing import Optional from jinja2 import Environment, FileSystemLoader from nozomi.rendering.context import Context LOADER = FileSystemLoader('templates') STAGE_1_ENVIRONMENT = Environment( # Static context loader=LOADER, block_start_strin...
51
32.69
80
14
387
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_4f8157158b0ac738_d06c4575", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 11, 18 ]
[ 17, 24 ]
[ 23, 23 ]
[ 2, 2 ]
2024-11-18T22:15:03.107425+00:00
1,631,320,899,000
3abf28eec7f4dbdd6163dc9de83aef02eb87b883
3
{ "blob_id": "3abf28eec7f4dbdd6163dc9de83aef02eb87b883", "branch_name": "refs/heads/master", "committer_date": 1631320899000, "content_id": "0ad4d413fa45ba0ef9ae38b8aee7a20cf23f9a21", "detected_licenses": [ "MIT" ], "directory_id": "5878c8a3b016aeeee6e3aa7e8492d4acc17e4b6d", "extension": "py", "fi...
2.6875
stackv2
import sys import requests import random from html.parser import HTMLParser import html from urllib.parse import unquote from datetime import datetime class MyHTMLParser(HTMLParser): def __init__(self, title): HTMLParser.__init__(self) self.house_codes = list() self.sale_status = list() ...
97
36.62
151
19
971
python
[{"finding_id": "codeql_py/request-without-cert-validation_7b8d04d774f073f4_3ae0d344", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 66, 77 ]
[ null, null ]
[ 21, 21 ]
[ 100, 85 ]
2024-11-18T22:26:17.598564+00:00
1,596,250,139,000
ca6e301236a88c31ddb17a30cdaa31e0180df62b
3
{ "blob_id": "ca6e301236a88c31ddb17a30cdaa31e0180df62b", "branch_name": "refs/heads/master", "committer_date": 1596250139000, "content_id": "b24e50102d32d47659f194c05ad51d177e24d439", "detected_licenses": [ "MIT" ], "directory_id": "6109e62b890d685f171e20ddcebab054c9cf9907", "extension": "py", "fi...
2.9375
stackv2
from flask import Flask from flask import request import requests import json app = Flask(__name__) @app.route('/') def index(): return 'Hello, world!' @app.route('/tester') def tester(): url = 'http://127.0.0.1:5000/test' myobj = {'string_to_cut': 'iamyourlyftdriver'} x = requests.post(url, data = ...
33
20.94
50
13
207
python
[{"finding_id": "codeql_py/reflective-xss_11f036979487a3c0_82c09e1a", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 30 ]
[ null ]
[ 12 ]
[ 29 ]
2024-11-18T22:26:23.591861+00:00
1,424,510,995,000
1c96026f5fb29ffbee4a6de63427df3581d6b3ac
3
{ "blob_id": "1c96026f5fb29ffbee4a6de63427df3581d6b3ac", "branch_name": "refs/heads/master", "committer_date": 1424510995000, "content_id": "3f7d4185511288293c66cbac2d3b708dfb97e7cf", "detected_licenses": [ "MIT" ], "directory_id": "dad89c3a042bebf552a1b8317990f7af623f757b", "extension": "py", "fi...
2.78125
stackv2
"""Script to generate upcoming training pages. This should be executed from _includes/ directory. """ import os import yaml from jinja2 import Template SOURCE = "upcoming.yml" TEMPLATE_ROOT = "src/templates" def parse_upcoming(): d = yaml.load(open(SOURCE).read()) upcoming = d.pop('upcoming') or {} for...
56
23.04
79
13
327
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_e7db76ba5045c78d_341d212a", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 32 ]
[ null ]
[ 9 ]
[ 36 ]
2024-11-18T22:26:24.115135+00:00
1,623,800,216,000
7a9690d7585dedb33445a20c7fd7a9f22f740484
3
{ "blob_id": "7a9690d7585dedb33445a20c7fd7a9f22f740484", "branch_name": "refs/heads/main", "committer_date": 1623800216000, "content_id": "f427132b01897a5c8f88f0290a37d6879257dc9f", "detected_licenses": [ "MIT" ], "directory_id": "c13b3193b352e57bacee4cc09781a5d8ed436b50", "extension": "py", "file...
2.765625
stackv2
# Marketo Monitor by CyberBitz # https://github.com/CyberBitz/MarketoMonitor import requests from os import system, name import os from bs4 import BeautifulSoup import urllib3 urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning) def clear(): if name == 'nt': _ = system('cls') else: ...
95
26.35
97
15
735
python
[{"finding_id": "codeql_py/request-without-cert-validation_53a04e1f29749807_a4a9982e", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 49 ]
[ null ]
[ 20 ]
[ 51 ]
2024-11-18T22:26:25.897484+00:00
1,582,310,294,000
97b62d1d75f39f09389b08ffc7c862dac709e680
3
{ "blob_id": "97b62d1d75f39f09389b08ffc7c862dac709e680", "branch_name": "refs/heads/master", "committer_date": 1582310294000, "content_id": "bf2d0555de003a1e8eeb525175d257475373338c", "detected_licenses": [ "MIT" ], "directory_id": "2f536a48cba850f3b26d216cc6427d86decce1c2", "extension": "py", "fi...
2.78125
stackv2
# pydb/__init__.py from flask import Flask, jsonify, request from flask_cors import CORS from pydb.db import load_db, write_db def handle_get(dbtup, key, path): db = dbtup[0] ret = {} # print(path) if path != [] and path != [""]: ret[key] = [] # For every item in the list for ...
210
23.52
73
21
1,344
python
[{"finding_id": "codeql_py/stack-trace-exposure_88e11d7aaa0f068e_b5c9a1b9", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 188, 203 ]
[ null, null ]
[ 20, 20 ]
[ 59, 55 ]
2024-11-18T20:40:08.282971+00:00
1,593,706,608,000
5161994cb664b2ef3de0039ece30a638a39d4354
2
{ "blob_id": "5161994cb664b2ef3de0039ece30a638a39d4354", "branch_name": "refs/heads/master", "committer_date": 1593706608000, "content_id": "a634cde9d5fee03653c7a1f2a2cfdf8638fbf030", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e303b8f3c8b3c0c8db5b0a785a4a204c90104a95", "extension": "py"...
2.484375
stackv2
# # Copyright (C) 2020 Arm Mbed. All rights reserved. # SPDX-License-Identifier: Apache-2.0 # """Module in charge of mbed_config.h file generation.""" import pathlib import jinja2 from typing import Iterable, Any from mbed_build._internal.config.config import Config from mbed_build._internal.config.assemble_build_con...
65
36.45
116
13
540
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_c9d99ee61cc44f6c_72dbf4f4", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 54 ]
[ null ]
[ 11 ]
[ 98 ]
2024-11-18T20:52:19.793517+00:00
1,583,591,792,000
9591bf1f751156994bc99f385f45e8c64caf5316
2
{ "blob_id": "9591bf1f751156994bc99f385f45e8c64caf5316", "branch_name": "refs/heads/master", "committer_date": 1583591792000, "content_id": "d73db0b6e2c3941c7c6c3e55bd157a0e16e2faec", "detected_licenses": [ "Apache-2.0" ], "directory_id": "10b78b99eb4d9a5ce9f4e59d10629c5ed660e11c", "extension": "py"...
2.453125
stackv2
# -*- encoding:utf-8 -*- # @Time : 2019/10/7 22:12 # @Author : gfjiang # @Site : # @File : deploy_model.py # @Software: PyCharm import flask import io import cv2.cv2 as cv from PIL import Image import numpy as np import cvtools import os import os.path as osp from threading import Thread from werkzeug.utils...
190
32.61
80
20
1,539
python
[{"finding_id": "codeql_py/path-injection_53ba9022f7434216_d012b033", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 170 ]
[ null ]
[ 31 ]
[ 66 ]
2024-11-18T20:52:21.548746+00:00
1,543,226,501,000
564d0493292e6a9fdfdcd4f2383145f31f9bc721
2
{ "blob_id": "564d0493292e6a9fdfdcd4f2383145f31f9bc721", "branch_name": "refs/heads/master", "committer_date": 1543226501000, "content_id": "fda09c1599eca7afdbca9cfe8eef4f8b28a40356", "detected_licenses": [ "CC0-1.0" ], "directory_id": "cf443423120842938068c03bf394f58d065e9695", "extension": "py", ...
2.34375
stackv2
# Import JanusVR from URL/filesystem import os import urllib.request as urlreq import gzip import bpy from mathutils import Vector, Matrix from math import radians import re import bs4 import traceback def s2v(s): try: return [float(c) for c in s.split(" ")] except: return [0,0,0] def s2p(s): v = s2v(s) retur...
371
32.57
163
27
3,709
python
[{"finding_id": "codeql_py/bad-tag-filter_1cbcfcd08bead7c9_8c9d5740", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression only parses --> and not --!> as a HTML comment end tag.", "remediation": "", "location":...
1
true
[ "CWE-116" ]
[ "py/bad-tag-filter" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression only parses --> and not --!> as a HTML comment end tag." ]
[ 225 ]
[ null ]
[ 18 ]
[ 23 ]
2024-11-18T20:52:25.709853+00:00
1,653,310,950,000
7977b31215245a5bdbc4bc92ba3ab7952d7ca955
2
{ "blob_id": "7977b31215245a5bdbc4bc92ba3ab7952d7ca955", "branch_name": "refs/heads/master", "committer_date": 1653310950000, "content_id": "d9df7f79ddb175e122cd9abe4792df726ced6861", "detected_licenses": [ "Apache-2.0" ], "directory_id": "118d26ad95a5cad30f092595aacdf95d1be29f9a", "extension": "py"...
2.375
stackv2
#!/usr/bin/python3 # Copyright (c) 2020 Zorglub42 {contact(at)zorglub42.fr}. # # All rights reserved. This program and the accompanying materials # are made available under the terms of the Apache License, Version 2.0 # which accompanies this distribution, and is available at # http://www.apache.org/licenses/LICENSE-2....
124
30.73
88
22
870
python
[{"finding_id": "codeql_py/request-without-cert-validation_ee693d5fb0831c47_16dd3b4c", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 32 ]
[ 40 ]
[ 16 ]
[ 22 ]
2024-11-18T21:08:10.251210+00:00
1,591,009,269,000
6b78fab49ae333d24ee37456f90e0d611b98bc31
3
{ "blob_id": "6b78fab49ae333d24ee37456f90e0d611b98bc31", "branch_name": "refs/heads/master", "committer_date": 1591009269000, "content_id": "c66399d885da0d7741848afd7c8b03e651404c48", "detected_licenses": [ "Apache-2.0" ], "directory_id": "f59c05d676079f6cbcf7dd13df8186db01a91a7b", "extension": "py"...
2.765625
stackv2
import time from Utilization.format import Format import requests from threading import Thread, Lock lock = Lock() class MyThread(Thread): def __init__(self, threadID, ip, port): Thread.__init__(self) self.threadID = threadID self.ip = ip self.port = port def run(self): ...
76
23.34
100
20
465
python
[{"finding_id": "codeql_py/request-without-cert-validation_df8f946084071d16_025c4ed4", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 34 ]
[ null ]
[ 13 ]
[ 69 ]
2024-11-18T21:08:12.481327+00:00
1,615,931,372,000
78b79b510915ba2bcabd5236b98f178c0faf0bb1
3
{ "blob_id": "78b79b510915ba2bcabd5236b98f178c0faf0bb1", "branch_name": "refs/heads/main", "committer_date": 1615931372000, "content_id": "68e8261fce9d79d734541d701e33cbe5b083474e", "detected_licenses": [ "MIT" ], "directory_id": "e0b6c406957cd0bc262bd4997026936ed42ab3a4", "extension": "py", "file...
3.0625
stackv2
# olympics-api.py # Claire Williams and Antonia Ritter # Feb 2 2021 import flask import json import psycopg2 from collections import defaultdict app = flask.Flask(__name__) def query_database(query): ''' Given an SQL query, returns a list of results ''' from config import password from config ...
131
28.47
115
12
872
python
[{"finding_id": "codeql_py/flask-debug_a405f6bf5bae352b_cd3c1390", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-089" ]
[ "py/flask-debug", "py/sql-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This SQL query depends on a [user-provided value](1)." ]
[ 131, 29 ]
[ null, null ]
[ 5, 24 ]
[ 52, 29 ]
2024-11-18T21:08:18.191984+00:00
1,534,362,627,000
c8a18744f1fa49f840eafc504c44cc32ce7cc089
3
{ "blob_id": "c8a18744f1fa49f840eafc504c44cc32ce7cc089", "branch_name": "refs/heads/master", "committer_date": 1534362627000, "content_id": "2eb20386e9b12814d8a1d978d4fcfab07a9c4b6f", "detected_licenses": [ "MIT" ], "directory_id": "26e16d2a514501a7e7474efbc73b7c5dec0c95ba", "extension": "py", "fi...
2.609375
stackv2
from django.core.management.base import BaseCommand from query_flight.models import Airport import requests from bs4 import BeautifulSoup from io import StringIO import pandas as pd def get_verify(proxies): if proxies is None: return None else: return False class Command(BaseCommand): ''...
101
39.38
112
19
867
python
[{"finding_id": "codeql_py/request-without-cert-validation_6d93fff0bba164e4_bdbe2218", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1) by [this value](2).", "This request may run without certificate validation because [it is disabled](1) by [this value](2)." ]
[ 29, 51 ]
[ null, null ]
[ 23, 20 ]
[ 72, 69 ]
2024-11-18T21:08:19.594183+00:00
1,660,497,860,000
0d5e83ab6e08256f330de690bad4d930e1e16a4a
3
{ "blob_id": "0d5e83ab6e08256f330de690bad4d930e1e16a4a", "branch_name": "refs/heads/master", "committer_date": 1660497860000, "content_id": "e923405d8f320802aee984afbc2f1aee496a1713", "detected_licenses": [ "MIT" ], "directory_id": "4888ce75982ccb2064baa15b7dbd112f7c12d53c", "extension": "py", "fi...
2.828125
stackv2
import mysql.connector import boto3 import json from botocore.exceptions import ClientError def get_secret(): secret_name = "MySecretName" region_name = "us-east-1" session = boto3.session.Session() client = session.client( service_name='secretsmanager', region_name=region_name, ) ...
51
34.08
108
15
362
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8b86e9551e404dac_a6a9a232", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 22 ]
[ null ]
[ 19 ]
[ 75 ]
2024-11-18T21:31:24.817970+00:00
1,499,176,175,000
bb0f92606fb10da8cf63c6357811b45c3fc4a608
3
{ "blob_id": "bb0f92606fb10da8cf63c6357811b45c3fc4a608", "branch_name": "refs/heads/master", "committer_date": 1499176175000, "content_id": "209f82a73f80ea32eeec689295e8a9035efed47b", "detected_licenses": [ "MIT" ], "directory_id": "170b73df6ccd2eb65b60c0e01c521b9ff251ef1c", "extension": "py", "fi...
2.578125
stackv2
import rnftools.rnfformat import re reg_lrn = re.compile(r"^([!-?A-^`-~]*)__([0-9a-f]+)__([!-?A-^`-~]+)__([!-?A-^`-~]*)$") reg_prefix_part = re.compile(r"^[!-?A-^`-~]*$") reg_id_part = re.compile(r"^[0-9a-f]+$") reg_segmental_part = re.compile(r"^(?:(\([0-9FRN,]*\))(?:,(?!$)|$))+$") reg_suffix_part = re.compile(r"^(?:...
122
30.16
110
20
1,100
python
[{"finding_id": "codeql_py/overly-large-range_031de43df9fd83b8_ea47db75", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^\\].", "remediation": "", "locatio...
4
true
[ "CWE-020", "CWE-020", "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^\\].", "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^\\].", "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^\\].", "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^\\]."...
[ 4, 4, 4, 5 ]
[ null, null, null, null ]
[ 30, 59, 75, 37 ]
[ 33, 62, 78, 40 ]
2024-11-18T21:31:34.989164+00:00
1,604,128,666,000
80db503622782d7521905223a67cf4225be8930e
3
{ "blob_id": "80db503622782d7521905223a67cf4225be8930e", "branch_name": "refs/heads/master", "committer_date": 1604128666000, "content_id": "003058a2b09454847708c68470a2557c42857ef1", "detected_licenses": [ "MIT" ], "directory_id": "fedd110ada88d15f702e5fb9ec0e5367eac35148", "extension": "py", "fi...
2.953125
stackv2
#!/usr/bin/env python3 import os from Crypto.Cipher import AES KEY = os.urandom(16) FLAG = open('./flag', 'rb').read() def pad(m): padlen = -len(m) % 16 return m + bytes([0] * padlen) def main(): aes = AES.new(KEY, AES.MODE_ECB) while True: message = bytes.fromhex(input('message = ').str...
23
18.61
60
15
129
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_f412a3ffcda5d8d6_213225b5", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
1
true
[ "CWE-327" ]
[ "py/weak-cryptographic-algorithm" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 17 ]
[ null ]
[ 18 ]
[ 50 ]
2024-11-18T21:32:28.864676+00:00
1,594,890,189,000
f8e9ae21da7315a7c397e9d1bdc188797869e76e
2
{ "blob_id": "f8e9ae21da7315a7c397e9d1bdc188797869e76e", "branch_name": "refs/heads/master", "committer_date": 1594890189000, "content_id": "3e960267eb29dba5a29a48230abdccbafaa706fe", "detected_licenses": [ "Unlicense" ], "directory_id": "3718e95565860e75a59686e27c9191ef71b0e65c", "extension": "py",...
2.421875
stackv2
import requests from bs4 import BeautifulSoup import json # from urllib.request import urlretrieve import shutil import re import os.path from pathlib import Path TOONILY = ('toonily', 'https://toonily.com/webtoon/{0}/chapter-{1}/') WEBTOON = ('webtoon', 'https://www.webtoon.xyz/read/{0}/chapter-{1}/') TEMP_PAGES_HTM...
197
32.85
122
31
1,775
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_bed0e5789fb2b387_bdeaedfc", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text." ]
[ 91 ]
[ null ]
[ 18 ]
[ 25 ]
2024-11-18T21:32:59.563989+00:00
1,630,770,563,000
47c3106ea276fb143006aaedaddde0c32654218d
2
{ "blob_id": "47c3106ea276fb143006aaedaddde0c32654218d", "branch_name": "refs/heads/master", "committer_date": 1630770563000, "content_id": "26e706720eff3c4a3abdca25b6f0715276766a6b", "detected_licenses": [ "MIT" ], "directory_id": "5d5afc33d3448d0e680fe25741e829e2c7fc7af3", "extension": "py", "fi...
2.375
stackv2
from flask import (Blueprint, request, redirect, render_template, url_for, flash, session, render_template_string) from flask.views import MethodView from flaskblog import db from flaskblog import auth from flaskblog import db_util from flaskblog.decorator import anonymous_required, login_required import hashlib user...
117
28.94
123
14
722
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_2f61d3e257f82bb2_77260e38", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
2
true
[ "CWE-327", "CWE-601" ]
[ "py/weak-sensitive-data-hashing", "py/url-redirection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 54, 36 ]
[ null, null ]
[ 39, 25 ]
[ 56, 33 ]
2024-11-18T21:33:12.674820+00:00
1,350,226,616,000
ce188124065c7cbc3207e3751767e909cd3fc71c
3
{ "blob_id": "ce188124065c7cbc3207e3751767e909cd3fc71c", "branch_name": "refs/heads/master", "committer_date": 1350226616000, "content_id": "3cf85ffa75845ee1279e84f73a346d96446c0901", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "51ea667423fe8e046a4f23afbd2a8fc710f19de5", "extension": "p...
2.5625
stackv2
import stat import os import re from os import path from shutil import copy2 from jinja2 import Environment jinja2_env = Environment( block_start_string="{{%", block_end_string="%}}", variable_start_string="{{{", variable_end_string="}}}", trim_blocks=True, ) jinja2_renderer = jinja2_env.from_str...
70
36.09
108
14
559
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_4224d39d9be88dc4_d4468808", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 9 ]
[ 15 ]
[ 14 ]
[ 2 ]
2024-11-18T21:49:03.277626+00:00
1,603,092,128,000
c00cc5c538a68f7f0b43f5500f4d130ef6ec7568
3
{ "blob_id": "c00cc5c538a68f7f0b43f5500f4d130ef6ec7568", "branch_name": "refs/heads/master", "committer_date": 1603092128000, "content_id": "72a523b84de03f9353094dde9f1a6ff7ccc8cb0d", "detected_licenses": [ "CC0-1.0" ], "directory_id": "3c920e16e1687530861bc14fe0bc297a4493045c", "extension": "py", ...
2.8125
stackv2
#!/usr/bin/env python """ SoG client * runs a simple client that connect to a SoG server * connection is persistent ToDo: * improve connection timeout * offiscate/encode password input?? * """ import getpass import time import socket import traceback from common.attributes import AttributeHelper fr...
177
31.41
84
17
1,132
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_22381142cd94d553_f4a9d8e7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 66 ]
[ null ]
[ 23 ]
[ 52 ]
2024-11-18T22:26:06.708234+00:00
1,592,877,153,000
1a12182e691c3d6e4168d3034308406f802318f8
3
{ "blob_id": "1a12182e691c3d6e4168d3034308406f802318f8", "branch_name": "refs/heads/master", "committer_date": 1592877153000, "content_id": "4820441433956a194d94c5edbefd47af68cc5543", "detected_licenses": [ "MIT" ], "directory_id": "fe8a15f759df698d0d562fc6c6c949e4e591b350", "extension": "py", "fi...
2.53125
stackv2
import struct from Crypto.Cipher import ARC4, DES, DES3, AES, Blowfish, XOR from Crypto.PublicKey import RSA from pbkdf2 import PBKDF2 # RSA def decrypt_rsa(key, data): rsa_key = RSA.importKey(key) return rsa_key.decrypt(data) # XOR def decrypt_xor(key, data): cipher = XOR.new(key) return cipher.de...
155
22.12
75
19
1,117
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_199aea48d08c845b_d2e7cf96", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The cryptographic algorithm ARC4](1) is broken or weak, and should not be used.", "...
4
true
[ "CWE-327", "CWE-327", "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[The cryptographic algorithm ARC4](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used.\n[The cryptographic algorithm DES](2) is broken or weak, and should not be used.\n[The block mode ECB](3) is broken or weak, and should not be used.\n[The cryptog...
[ 23, 33, 42, 48 ]
[ null, null, null, null ]
[ 12, 12, 12, 12 ]
[ 32, 32, 32, 32 ]
2024-11-18T20:31:42.119313+00:00
1,480,189,918,000
cf3f84ddee14f8eb4939dc4f34e655d5d2e02b10
2
{ "blob_id": "cf3f84ddee14f8eb4939dc4f34e655d5d2e02b10", "branch_name": "refs/heads/master", "committer_date": 1480189918000, "content_id": "2d66b63b08c09f3691c444733efc31593bbb779a", "detected_licenses": [ "Apache-2.0" ], "directory_id": "4812063ad3ba87f676ec71b5943dce520377b613", "extension": "py"...
2.390625
stackv2
from flask import Flask, abort, request import os.path import dbconf cnx = dbconf.dbconnect app = Flask(__name__) # # Based on http://flask.pocoo.org/docs/0.11/quickstart/#routing # @app.route('/package-inventory/<hostname>/<pkgname>', methods=["GET"]) def get_inventory_package(hostname): fn = "cache/%s" % hostna...
27
20.37
70
12
154
python
[{"finding_id": "codeql_py/path-injection_4af8aa4c348c3235_0415ea89", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 14, 15 ]
[ null, null ]
[ 23, 19 ]
[ 25, 21 ]
2024-11-18T20:53:30.480614+00:00
1,678,040,170,000
4bf663eb3cb7a06d0c2543492275ae857a58e7c4
2
{ "blob_id": "4bf663eb3cb7a06d0c2543492275ae857a58e7c4", "branch_name": "refs/heads/master", "committer_date": 1678040170000, "content_id": "7da30cdbe36dacc1891e9446f42351bbc24d8ca9", "detected_licenses": [ "MIT" ], "directory_id": "4022d3dd583ea0324f0d38d90421d2dccbd3d47f", "extension": "py", "fi...
2.375
stackv2
from flask import ( Blueprint, current_app, Response, redirect, url_for, request, render_template, flash, ) from sqlalchemy.sql.expression import func from conekt import blast_thread from conekt.models.sequences import Sequence from conekt.forms.blast import BlastForm import os import ...
133
28.05
95
20
847
python
[{"finding_id": "codeql_py/path-injection_c53c646f0a1af7c4_b92c76a7", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
4
true
[ "CWE-022", "CWE-022", "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 108, 108, 112, 120 ]
[ null, null, null, null ]
[ 23, 51, 19, 31 ]
[ 35, 63, 31, 38 ]