added
stringlengths
32
32
created
int64
1,244B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.25
source
stringclasses
1 value
text
stringlengths
324
20.1k
num_lines
int64
16
598
avg_line_length
float64
15.1
58.3
max_line_length
int64
33
179
ast_depth
int64
8
39
length
int64
101
3.8k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.1k
265k
sast_codeql_findings_count
int64
1
45
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
45
rule_ids
listlengths
1
45
confidences
listlengths
1
45
severities
listlengths
1
45
messages
listlengths
1
45
line_starts
listlengths
1
45
line_ends
listlengths
1
45
column_starts
listlengths
1
45
column_ends
listlengths
1
45
2024-11-19T02:10:57.290529+00:00
1,459,015,799,000
f301baf20452bf40732eaacbe07bdad928839e35
3
{ "blob_id": "f301baf20452bf40732eaacbe07bdad928839e35", "branch_name": "refs/heads/master", "committer_date": 1459015799000, "content_id": "48a2a9c9108c07ddcc2896073365f81793a3e692", "detected_licenses": [ "Apache-2.0" ], "directory_id": "8ec52d325ad8770e901384a06ebf950cc76d10ac", "extension": "py"...
2.75
stackv2
import sys import requests import json def main(): if len(sys.argv) < 2: print('ARG 1: NBA Stats api key') return apikey = sys.argv[1] download_player_stats(apikey) #download_teams(apikey) return def download_teams(apikey): test = "https://probasketballapi.com/teams?api_key=...
45
24.82
113
13
308
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_578d8ad5ebc5f5ea_b35a584b", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
4
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.", "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.", "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sen...
[ 22, 31, 41, 38 ]
[ null, null, null, null ]
[ 16, 16, 20, 15 ]
[ 21, 23, 26, 24 ]
2024-11-19T02:11:15.200833+00:00
1,688,080,348,000
aeb4a6f7f6bbb1e2a2454c8dc0d1f552e607d800
2
{ "blob_id": "aeb4a6f7f6bbb1e2a2454c8dc0d1f552e607d800", "branch_name": "refs/heads/master", "committer_date": 1689767267000, "content_id": "18539b806540b3bc71bfc83733b22d1bc540fab9", "detected_licenses": [ "Apache-2.0", "MIT", "BSD-2-Clause" ], "directory_id": "d110546d747d7e3865ce5742d5fca09...
2.5
stackv2
""" Module for sending data to OpsGenie .. versionadded:: 2018.3.0 :configuration: This module can be used in Reactor System for posting data to OpsGenie as a remote-execution function. For example: .. code-block:: yaml opsgenie_event_poster: local.opsgenie.post_data: - tg...
113
28.81
86
16
810
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e8f368c44a0b4cf3_0a7feafc", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 92 ]
[ null ]
[ 50 ]
[ 57 ]
2024-11-19T02:11:32.496517+00:00
1,583,352,900,000
48963d5667bfcd00e81564a68c3b6dea819a5c0d
3
{ "blob_id": "48963d5667bfcd00e81564a68c3b6dea819a5c0d", "branch_name": "refs/heads/master", "committer_date": 1583352900000, "content_id": "f720dbb912a33f6df1fac7c953a783e5d94e86e3", "detected_licenses": [ "MIT" ], "directory_id": "9da4d8446f953a73617f98c78204965922d08cad", "extension": "py", "fi...
2.671875
stackv2
from pathlib import Path from datetime import datetime import shutil import subprocess import yaml import requests class SCMCredentialValidationError(Exception): pass class SCMCloneRepoError(Exception): pass class SCMCreateBranchError(Exception): pass class SCMWriteFileError(Exception): pass c...
349
37.19
162
21
2,719
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_632310531b51913d_006e7264", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 213 ]
[ null ]
[ 32 ]
[ 36 ]
2024-11-19T02:32:48.260866+00:00
1,490,502,381,000
08cad71ba4eeacfbd2a53d55df403d643fc02566
3
{ "blob_id": "08cad71ba4eeacfbd2a53d55df403d643fc02566", "branch_name": "refs/heads/master", "committer_date": 1490502381000, "content_id": "f0e8641d5bdd9ffbcf1e21842b34f11163f46758", "detected_licenses": [ "Apache-2.0" ], "directory_id": "eaec10631ac05fcc7c93b9ee67687a755b252254", "extension": "py"...
3.03125
stackv2
import contextlib import urllib from domain.ScrapeHelper import ScrapeHelper class ImageExtractor: def __init__(self, search_criteria): self.search_criteria = search_criteria self._url = self._get_search_url() pass def images_for_search_criteria(self): """ 1. yout...
56
36.95
91
18
444
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_fed0c767ebd80f17_33aa35e0", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [i.ytimg.com](1) may be at an arbitrary position in the...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [i.ytimg.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 53 ]
[ null ]
[ 16 ]
[ 43 ]
2024-11-19T02:33:01.978876+00:00
1,512,131,549,000
53ec17e6da6b95029c15446ec0dfad7978f36247
2
{ "blob_id": "53ec17e6da6b95029c15446ec0dfad7978f36247", "branch_name": "refs/heads/master", "committer_date": 1512131549000, "content_id": "fbefdc18180922da83a116095216ede473ff3b60", "detected_licenses": [ "Unlicense" ], "directory_id": "6d0fe7ddd3f34135987ec1b26d679fd891ba4e24", "extension": "py",...
2.359375
stackv2
from flask import Flask, render_template, request, redirect, Response, session from config import Config as cfg import requests import json app = Flask(__name__, template_folder="templates") app.debug = True app.secret_key = cfg.SECRET_KEY @app.route('/products', methods=['GET']) def products(): """ Get a stores...
76
29.45
99
16
527
python
[{"finding_id": "codeql_py/full-ssrf_6e188bc01e802a7f_fe62cf0c", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
2
true
[ "CWE-918", "CWE-601" ]
[ "py/full-ssrf", "py/url-redirection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 55, 44 ]
[ 60, null ]
[ 16, 21 ]
[ 10, 29 ]
2024-11-19T02:33:05.185290+00:00
1,628,873,701,000
63edc2f4d3ddfd017da9fa768072988570fb312b
2
{ "blob_id": "63edc2f4d3ddfd017da9fa768072988570fb312b", "branch_name": "refs/heads/main", "committer_date": 1628873701000, "content_id": "3ea6c890aff96abee2d3b84ba5a3b05c72905941", "detected_licenses": [ "MIT" ], "directory_id": "cc03c22a59dba54b5eeb080cbbc13c215604d1f4", "extension": "py", "file...
2.390625
stackv2
from wsgiref import simple_server from flask import Flask, request, render_template from flask import Response import os from flask_cors import CORS, cross_origin from prediction_Validation_Insertion import pred_validation from trainingModel import trainModel from training_Validation_Insertion import train_validation i...
98
28.86
89
15
637
python
[{"finding_id": "codeql_py/stack-trace-exposure_107d3ec93526fa36_c39755f8", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 59, 89 ]
[ null, null ]
[ 25, 25 ]
[ 48, 49 ]
2024-11-19T02:33:11.447955+00:00
1,459,501,343,000
8413fc575ffc74e5177bb2a666004a7c4097280d
3
{ "blob_id": "8413fc575ffc74e5177bb2a666004a7c4097280d", "branch_name": "refs/heads/master", "committer_date": 1459501343000, "content_id": "609384ad9a60d00d5ffc709c8b60571ea869242e", "detected_licenses": [ "Apache-2.0" ], "directory_id": "8c8d07132242eb548224df6e44de3065f2d27599", "extension": "py"...
2.546875
stackv2
# coding=utf-8 from os import environ import urllib from flask import Flask, request, jsonify import re from random import randint app = Flask(__name__) app.config['DEBUG'] = False NON_LETTERS = re.compile(ur'[^а-яё \-]+', flags=re.UNICODE) PREFIX = re.compile(u"^[бвгджзйклмнпрстфхцчшщ]+", flags=re.UNICODE) DELAY = {...
88
32.51
71
25
708
python
[{"finding_id": "codeql_py/stack-trace-exposure_4282a3a95f84e6d8_a75eb263", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-117" ]
[ "py/stack-trace-exposure", "py/log-injection" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "This log entry depends on a [user-provided value](1)." ]
[ 63, 35 ]
[ null, 36 ]
[ 48, 34 ]
[ 54, 49 ]
2024-11-19T02:33:26.925109+00:00
1,580,371,743,000
6f3f492ff2babd671a84323b241c5d98f238d44b
3
{ "blob_id": "6f3f492ff2babd671a84323b241c5d98f238d44b", "branch_name": "refs/heads/master", "committer_date": 1580371743000, "content_id": "d1f10b07f8d2997dd238c12851717e70560ff815", "detected_licenses": [ "MIT" ], "directory_id": "759f467d235c3732ecdfc4dd20606f93db2da317", "extension": "py", "fi...
2.625
stackv2
# python -m pip install redis-py-cluster import time, random, string from rediscluster import StrictRedisCluster from rediscluster.client import ClusterConnectionPool host = "XXX" password = "" shardMap = None numShards = 2 maxSlots = 16384 numKeys = 400 def randomword(length): return ''.join(random.choice(strin...
103
26.34
147
17
771
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_306be649de0403d9_32f79c11", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 56 ]
[ null ]
[ 7 ]
[ 147 ]
2024-11-19T02:46:18.668542+00:00
1,693,748,601,000
030862ca158697e6b34e4d1cb03d29247615ed7a
2
{ "blob_id": "030862ca158697e6b34e4d1cb03d29247615ed7a", "branch_name": "refs/heads/master", "committer_date": 1693748601000, "content_id": "746cba9baff690aabe3446e3e426abea1c93600d", "detected_licenses": [ "Zlib", "BSD-3-Clause" ], "directory_id": "f7848ee3bb2ffcbc1bde5a7f636dd7502b749381", "ex...
2.453125
stackv2
#!/usr/bin/env python """ Usage: python googlecode2github/wikiconfig.py PROJID SRCDIR DSTDIR where "PROJID" is the github project id, e.g. "trentm/python-markdown2", "SRCDIR" is a Google Code project wiki Subversion working copy dir and "DSTDIR" is the git clone dir of the git project's wiki. """ __version__ = "1...
146
31.72
99
18
1,481
python
[{"finding_id": "codeql_py/redos_9c80519e58cc3739_a76888f1", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '||' and containing many repetitio...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '||' and containing many repetitions of '||'." ]
[ 77 ]
[ null ]
[ 36 ]
[ 39 ]
2024-11-19T02:46:21.044410+00:00
1,422,050,798,000
a79a03c61ba1d8a38bca5c91a89cc687daedd279
2
{ "blob_id": "a79a03c61ba1d8a38bca5c91a89cc687daedd279", "branch_name": "refs/heads/master", "committer_date": 1422050798000, "content_id": "03418b538b8acf650926fa02977d5aaa263f66a9", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "911fe52398b2afe5d8db0c05b42152c15fb88f95", "extension": "p...
2.34375
stackv2
from flask import Flask, render_template, request import logging import call import queue import cdr import time from contextlib import contextmanager import argparse INCOMING_NAME = "incoming" INCOMING_NUM_THREAD = 30 OUTGOING_NAME = "outgoing" OUTGOING_NUM_THREAD = 300 CDR_NAME = "cdr" CDR_NUM_THREAD = 5 TIME_MULT...
167
31.85
120
16
1,281
python
[{"finding_id": "codeql_py/reflective-xss_5838dc645400077f_3852dea5", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 97 ]
[ null ]
[ 16 ]
[ 28 ]
2024-11-19T02:59:20.798025+00:00
1,593,594,071,000
675dbd47abc5537e40184c66c7ce4faf36958034
3
{ "blob_id": "675dbd47abc5537e40184c66c7ce4faf36958034", "branch_name": "refs/heads/master", "committer_date": 1593594071000, "content_id": "f303017258159f01ca9ed7a32ca451e847497d05", "detected_licenses": [ "MIT" ], "directory_id": "b0c9f3b9f6d201d5ce7169344c09790e5bdf308c", "extension": "py", "fi...
2.8125
stackv2
#!/usr/bin/env python """ CURLDownloadFileList.py A script to download files from an input list using pycurl. Author: Pete Bunting (pfb@aber.ac.uk) Date: 20/05/2014 """ import os import argparse import sys import pycurl import time import random def readFileList(fileList): fTxt = open(fileList, 'r') files...
153
39.78
145
19
1,369
python
[{"finding_id": "codeql_py/request-without-cert-validation_0e20ce717695ae60_6fd3d869", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1) by [this value](2)." ]
[ 68 ]
[ null ]
[ 13 ]
[ 50 ]
2024-11-19T03:12:10.647578+00:00
1,502,053,224,000
c6d9d54b32aa7008fe486b63dec1f1f5728025ec
3
{ "blob_id": "c6d9d54b32aa7008fe486b63dec1f1f5728025ec", "branch_name": "refs/heads/master", "committer_date": 1502053224000, "content_id": "5b581d9cd58cb34f4f6041139f2ea90c27e1d8ea", "detected_licenses": [ "Apache-2.0" ], "directory_id": "cf30613738518e8449537347ad0e5ba6d4dcd355", "extension": "py"...
2.5625
stackv2
#!/usr/bin/env python2 import paramiko import optparse import time import yaml import sys class Ucs_bmc: def __init__(self, client=None, shell=None): self.shell = shell self.client = client self.fixkeys = [] def connect(self, options): # Create instance of SSHClient object self.client = para...
194
25.75
96
19
1,417
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_19791b890a948851_91099239", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 20 ]
[ null ]
[ 5 ]
[ 70 ]
2024-11-19T03:24:45.132106+00:00
1,543,459,816,000
d2afa54bfc717ed8bce8ff780fee1a83549491c0
3
{ "blob_id": "d2afa54bfc717ed8bce8ff780fee1a83549491c0", "branch_name": "refs/heads/master", "committer_date": 1543459816000, "content_id": "3b8909a5d91f2638b41740c4a75f9fe4a0d519b9", "detected_licenses": [ "Apache-2.0" ], "directory_id": "0bd63ea64e72bbbf7c913e1cffe291e89f923cf0", "extension": "py"...
2.953125
stackv2
from jinja2 import Environment, FileSystemLoader, StrictUndefined from jinja2.exceptions import UndefinedError from .logging import getLogger from .process import fail logger = getLogger(__name__) class JinjaRenderer(): def __init__(self, facts): self.facts = facts def render(self, template_file) ->...
30
37.53
105
15
241
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_94bc9d24ccb59c0b_8ffde9be", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 19 ]
[ 21 ]
[ 21 ]
[ 39 ]
2024-11-19T03:24:45.958690+00:00
1,592,074,100,000
448875c3711fb4b567e622f2a6ee0483acbb8c4b
2
{ "blob_id": "448875c3711fb4b567e622f2a6ee0483acbb8c4b", "branch_name": "refs/heads/master", "committer_date": 1592074100000, "content_id": "19a86f1575e1d23340f52770c72689bae1a31f06", "detected_licenses": [ "MIT" ], "directory_id": "e1e21e8ac7efbe21a0448a1c566693054aed0d00", "extension": "py", "fi...
2.4375
stackv2
#!/usr/bin/env python2.7 import requests import json import time import os import sys import codecs from requests_oauthlib import OAuth1 ''' # authentication pieces client_key = "14RdwJwcED1RkanxC5QdLLgeF" client_secret = "lY2NG8dk082YcG16TEWndihyn7Gmh7mCOmYsFaTlTUakkZ9cva" token = "2920967563-NE93uzMVjJax...
280
28.11
108
21
2,080
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_df05746ce8e5fabb_1001524e", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.\nThis expression stores [sensitive data (private)](3) as clear text.\nThis expression stores [sensitive data (private)](4) as clear text.\nThis expression stores [sensitive data ...
[ 223 ]
[ null ]
[ 19 ]
[ 26 ]
2024-11-19T03:24:50.434509+00:00
1,518,129,918,000
1c2712d9a76590aee9df1f03b66dec85d0d60a3e
3
{ "blob_id": "1c2712d9a76590aee9df1f03b66dec85d0d60a3e", "branch_name": "refs/heads/master", "committer_date": 1518129918000, "content_id": "be2da449a679619f3738ec9598263e10ac6a9a6b", "detected_licenses": [ "MIT" ], "directory_id": "dbe2402566c38a1e746289ec3eca59875c5a4831", "extension": "py", "fi...
3.109375
stackv2
import config, requests, json, time, os, platform def checkIfFilesExpiered(path,filename): filepath = path+'\\'+filename+'.json' if os.path.isfile(filepath): if platform.system() == 'Windows': creationDate = os.path.getctime(filepath) else: stat = os.stat(filepath) ...
58
31.84
91
15
438
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_199c34c4aa4a7ef1_a5fff255", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 39 ]
[ null ]
[ 15 ]
[ 53 ]
2024-11-19T03:35:28.024177+00:00
1,539,815,611,000
4172db7b1044b49dfad92f9eac1467f727865a58
2
{ "blob_id": "4172db7b1044b49dfad92f9eac1467f727865a58", "branch_name": "refs/heads/master", "committer_date": 1539815611000, "content_id": "6f2a42e4a49f8647feef5c027b84eb6a5aaa24ea", "detected_licenses": [ "MIT" ], "directory_id": "2c6f56d8f1ba453717de7a4dc09da3df272ffb63", "extension": "py", "fi...
2.421875
stackv2
""" simplemap.map.py ~~~~~~~~~~~~~~~~ This module contains all core functionality related to map generation """ from jinja2 import Environment, FileSystemLoader from simplemap.html_render import SilentUndefined import json import os import sys import traceback TEMPLATES_DIR = FileSystemLoader('simplemap/templates'...
110
26.25
131
16
734
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_0abb144ab74d392e_9cfc228a", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 23 ]
[ null ]
[ 15 ]
[ 93 ]
2024-11-19T01:26:48.392140+00:00
1,618,057,755,000
01fb3ff069777ea5e2b01bbd6ead779fe2e98c58
3
{ "blob_id": "01fb3ff069777ea5e2b01bbd6ead779fe2e98c58", "branch_name": "refs/heads/master", "committer_date": 1618057755000, "content_id": "737c8a4bb52767704a3ae2db1d7df5a71919439c", "detected_licenses": [ "MIT" ], "directory_id": "709c11a1bcf70b9a3c238827787897be1d06e817", "extension": "py", "fi...
2.65625
stackv2
#!/usr/bin/python3 from cv2 import VideoCapture, imwrite, waitKey, IMWRITE_JPEG_QUALITY from datetime import datetime from os import environ, chdir, system from os import path as p import logging as log from json import load import threading from time import sleep import lan_scan from safe_list import SafeList class c...
127
34.66
88
18
1,003
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b9edc85a11638889_c830e069", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](1) as clear text." ]
[ 35, 42 ]
[ null, null ]
[ 18, 18 ]
[ 48, 51 ]
2024-11-19T01:26:55.967381+00:00
1,546,731,599,000
a6faa3e7c05354a356cb74d38db5f7585577efae
3
{ "blob_id": "a6faa3e7c05354a356cb74d38db5f7585577efae", "branch_name": "refs/heads/master", "committer_date": 1546731599000, "content_id": "56f049762bc011e373c1fc568c27d6d2f6ff48c5", "detected_licenses": [ "MIT" ], "directory_id": "b2127e23713f64b7e33b42a8e1cb9dc7b11c6fdd", "extension": "py", "fi...
2.625
stackv2
#!/usr/bin/env python3 # Load all essential statistics from AWS SAM including almost-exact number of Lambdas as well as metadata. import urllib.request import json import itertools import math import csv import datetime def pullstatistics(stamp): neededpages = None f = open("autocontents-{}.csv".format(stamp), "w...
85
28.76
106
17
647
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_d9377ca4705e1636_770f21da", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [github.com](1) may be at an arbitrary position in the ...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [github.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 41 ]
[ null ]
[ 7 ]
[ 41 ]
2024-11-19T01:26:56.504256+00:00
1,563,894,144,000
1ed3e9c96f4dfe70eeaed82f08edad3b9f1c9185
2
{ "blob_id": "1ed3e9c96f4dfe70eeaed82f08edad3b9f1c9185", "branch_name": "refs/heads/master", "committer_date": 1563894144000, "content_id": "5381adc0aa7da0f8b22aa552d383751ccab2f558", "detected_licenses": [ "MIT" ], "directory_id": "da5378f6807e807e1f45546ebd8468e1deeaf3f6", "extension": "py", "fi...
2.453125
stackv2
import re import time import json import urllib3 from pprint import pprint from urllib import parse from multiprocessing.dummy import Pool import requests from faker import Faker from bs4 import BeautifulSoup from pymongo import MongoClient from config import BaseConfig from redis_helper import RedisHelper urllib3.d...
204
29.38
114
21
1,715
python
[{"finding_id": "codeql_py/request-without-cert-validation_80710af7f9b06442_0ac22edd", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 44 ]
[ null ]
[ 19 ]
[ 95 ]
2024-11-19T01:27:05.848873+00:00
1,559,855,168,000
80179fdaf143f8adf1ab86624ea2cf0da56f8b7e
4
{ "blob_id": "80179fdaf143f8adf1ab86624ea2cf0da56f8b7e", "branch_name": "refs/heads/master", "committer_date": 1559855168000, "content_id": "ef8f71253477f68972c389d57c59f5838bae28dd", "detected_licenses": [ "MIT" ], "directory_id": "561c2632a69f13c774918a466fb097ee613d432f", "extension": "py", "fi...
3.53125
stackv2
# coding=UTF-8 from Member import * class Group(object): """A Group is defined by his name and contains Members""" def __init__(self, name, members=[]): #public attributes self.name = name #private attributes self.__members = members def addMember(self, me...
153
27.58
130
17
1,038
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e317111c55dbfdca_a837df45", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 139, 149, 152 ]
[ null, null, null ]
[ 30, 30, 113 ]
[ 46, 46, 129 ]
2024-11-19T01:37:53.783782+00:00
1,627,625,016,000
8f31e3610cc3ae9a6736e2949912d516371be573
4
{ "blob_id": "8f31e3610cc3ae9a6736e2949912d516371be573", "branch_name": "refs/heads/main", "committer_date": 1627625016000, "content_id": "a7b149296311c776bc663bf1da27cdbbb97860ad", "detected_licenses": [ "MIT" ], "directory_id": "f740484c02d567f1cb548e3aebda15c2da2d9d7d", "extension": "py", "file...
3.734375
stackv2
print('this is an example of an overloding') class books: def __init__(self): self. pages=int(input('enter number of pages:')) def __add__(self,other): return self.pages+other.pages print('this is add magic method') b1=books() b2=books() print('total pages of both books are:',b1+b2) print(...
62
28.85
67
13
542
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_eb42880cb1b39d13_66c75195", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 61 ]
[ null ]
[ 55 ]
[ 58 ]
2024-11-19T01:38:04.041230+00:00
1,466,573,877,000
ec7e3b325e55d807fb2a612a939560362ff6e1ee
2
{ "blob_id": "ec7e3b325e55d807fb2a612a939560362ff6e1ee", "branch_name": "refs/heads/master", "committer_date": 1466573877000, "content_id": "09ffacb545d1b5f21b9ffcbdc8c9a560b32b9e32", "detected_licenses": [ "MIT" ], "directory_id": "6a2a178c75c1457722505ecf963835fe95ea44c1", "extension": "py", "fi...
2.5
stackv2
#!/usr/bin/env python3 import os import datetime import concurrent.futures import time import logging import jinja2 import chronos def get_year(): y = datetime.datetime.now().year return y + 2 if datetime.datetime.now().month < 7 else y + 3 STUDENT_PROM = get_year() ASSISTANT_PROM = STUDENT_PROM - 2 OUTP...
74
24.45
78
15
515
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_3a5808a2b75ee447_b086fbb1", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 37 ]
[ null ]
[ 11 ]
[ 74 ]
2024-11-19T01:38:07.203912+00:00
1,353,529,630,000
6967a2cda581a6adbaf711fc524d7ed92b0ef580
2
{ "blob_id": "6967a2cda581a6adbaf711fc524d7ed92b0ef580", "branch_name": "refs/heads/master", "committer_date": 1353529630000, "content_id": "0c58e09ffa67cbc6070e575d17f44c910741bb3c", "detected_licenses": [ "BSD-3-Clause", "BSD-2-Clause-Views", "BSD-2-Clause" ], "directory_id": "56c38ce119efb8...
2.40625
stackv2
import os import traceback import jinja2 as jinja from nose.plugins import Plugin #A few named tuple to package the result from collections import namedtuple, defaultdict TestReport = namedtuple("TestReport", ['name', 'mod_name', 'kind', 'text']) ImportReport = namedtuple("ImportReport", ['name', 'fp', 'tests']) ...
134
34.43
103
15
979
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_2cac6de73e10915f_518f7828", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 65 ]
[ null ]
[ 25 ]
[ 91 ]
2024-11-19T01:38:10.117329+00:00
1,597,210,742,000
95a76ecd0918ca5b8664dad350be4bc8e8a78168
2
{ "blob_id": "95a76ecd0918ca5b8664dad350be4bc8e8a78168", "branch_name": "refs/heads/master", "committer_date": 1597210742000, "content_id": "5aa1cad9db68a08151046fb5dbfebb86d4f51643", "detected_licenses": [ "MIT", "Python-2.0" ], "directory_id": "862cc5a64eba3041d497aee3737abd92d6fbac5f", "exten...
2.46875
stackv2
# from django.shortcuts import render from django.http import HttpResponse # from django.contrib.auth.decorators import login_required from dungeon.models.character import MudUser, Character from django.views import View from django.db import IntegrityError from django.db.models import F class CharacterView(View): ...
184
57.09
110
28
1,678
python
[{"finding_id": "codeql_py/reflective-xss_06065f127688cf6e_900683f3", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
4
true
[ "CWE-079", "CWE-079", "CWE-079", "CWE-079" ]
[ "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 28, 118, 172, 176 ]
[ null, null, null, null ]
[ 41, 41, 49, 45 ]
[ 75, 91, 56, 52 ]
2024-11-19T01:38:12.268579+00:00
1,683,486,871,000
8791c0bca9716c82cd06a8f0e639dcc1b0610f12
3
{ "blob_id": "8791c0bca9716c82cd06a8f0e639dcc1b0610f12", "branch_name": "refs/heads/master", "committer_date": 1690286346000, "content_id": "e8b002ae731eb3161bd0b975efc6ca6d65330b9a", "detected_licenses": [ "MIT" ], "directory_id": "126884e6916e9d78201527419681c0369bc61e9a", "extension": "py", "fi...
3.4375
stackv2
import sys import requests import json import datetime # each key can respond to a maximum of 60 calls per minute # and 1,000,000 calls per month # use your own api key which you can get from openweathermap api_key = "c4129d312f42336xxxxxe5b8c65e3647" # the first argument is the script name # the second argument is t...
135
27.1
88
12
987
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b9a3ad9276fb0f1d_1fa6ec8a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
10
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging...
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensi...
[ 68, 69, 70, 71, 81, 82, 83, 92, 93, 102 ]
[ null, null, null, null, null, null, null, null, null, null ]
[ 11, 11, 11, 11, 11, 11, 11, 11, 11, 11 ]
[ 55, 51, 56, 56, 49, 47, 50, 48, 48, 61 ]
2024-11-19T01:38:19.559002+00:00
1,506,375,412,000
de1d1409092e06f618a81123762c155f93165dc7
4
{ "blob_id": "de1d1409092e06f618a81123762c155f93165dc7", "branch_name": "refs/heads/master", "committer_date": 1506375412000, "content_id": "1b0fd97454581da02004b6214eb33ceba6353f64", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "e2b5c0a6e7921b566b1e91fb203ff0fd1eb6acbe", "extension": "p...
3.6875
stackv2
#User inputs information f = open("Usernames and passwords.txt","a") name = input("Please enter your name: ") age = input("Please enter your age: ") password = input("Please enter a password: ") username = "" for i in range(3): #Loops for the first 3 letters of the name username += (name[i]) username += age print(u...
31
26.65
61
10
204
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_cb9fea9516266313_b3738ae9", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 20 ]
[ null ]
[ 9 ]
[ 54 ]
2024-11-19T01:52:13.074814+00:00
1,615,242,138,000
60570d93c1d3ba29a7dadce86593f68bfe7a26ff
3
{ "blob_id": "60570d93c1d3ba29a7dadce86593f68bfe7a26ff", "branch_name": "refs/heads/main", "committer_date": 1615242138000, "content_id": "6c51832073086f2b92285bee1a46e78d5061a969", "detected_licenses": [ "MIT" ], "directory_id": "1234bd6c85fcbdda7de61ebc8fe1eb9f6cfc6eb7", "extension": "py", "file...
2.90625
stackv2
import json from typing import Union from urllib.request import Request import pycurl class Storage: def __init__(self): self.contents = b'' def store(self, buf: bytes): self.contents += buf def get_length(self): return len(self.contents) def __str__(self): return s...
136
34.55
119
17
1,227
python
[{"finding_id": "codeql_py/request-without-cert-validation_4c4accaf584ad31d_f1dc4a08", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1) by [this value](2)." ]
[ 101 ]
[ null ]
[ 9 ]
[ 53 ]
2024-11-19T02:04:25.029680+00:00
1,562,819,560,000
9d19fa8d8e4f76b21ed679eb4c983971d999f194
3
{ "blob_id": "9d19fa8d8e4f76b21ed679eb4c983971d999f194", "branch_name": "refs/heads/master", "committer_date": 1562819560000, "content_id": "ac1e8da21afede2cea75ee0bd7e058c2e72e9252", "detected_licenses": [ "MIT" ], "directory_id": "c4f26d98b5425f564f057023591ebffd86d36063", "extension": "py", "fi...
2.84375
stackv2
#!/usr/bin/env python3 """Check a keepassxc database against previously cracked haveibeenpwned passwords Usage: keepassxc_pwned <KDBX_DATABASE_FILE> [--plaintext] Options: KDBX_DATABASE_FILE The path to your keepassxc database file --plaintext Print breached passwords in plaintext; defau...
140
39.6
171
18
1,378
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2c0180a0f455f71f_b3bd8752", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 138 ]
[ null ]
[ 19 ]
[ 95 ]
2024-11-19T02:36:58.056617+00:00
1,502,334,701,000
a5efa26bbd3a83e537480f42d5de234155562622
3
{ "blob_id": "a5efa26bbd3a83e537480f42d5de234155562622", "branch_name": "refs/heads/master", "committer_date": 1502334701000, "content_id": "bc55270ca8cf67ad0d2a3a3a37b9ccba424d934f", "detected_licenses": [ "Apache-2.0" ], "directory_id": "cd646d958c0f1e8b7762da3e67ec173a6489f1d7", "extension": "py"...
3.03125
stackv2
from __future__ import absolute_import from __future__ import division from __future__ import print_function def maybe_download_and_extract(directory, url, extract=True): """Download file from url unless it already exists in specified directory. Extract the file if `extract` is True. The file at `url` is downl...
71
30.03
77
16
521
python
[{"finding_id": "codeql_py/tarslip_7ae61f31d2c416bd_7c16e2ed", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 60 ]
[ null ]
[ 9 ]
[ 10 ]
2024-11-19T02:37:17.449604+00:00
1,690,143,883,000
ae4b6e46a7e870fdaf99755f54217b5506bb3c02
2
{ "blob_id": "ae4b6e46a7e870fdaf99755f54217b5506bb3c02", "branch_name": "refs/heads/master", "committer_date": 1690143883000, "content_id": "8c59b9558c451035bb499e50831a59a318577447", "detected_licenses": [ "MIT" ], "directory_id": "53e2c50adf6698a562b42725f073e18f88d35232", "extension": "py", "fi...
2.375
stackv2
from jinja2 import Environment, FileSystemLoader from Crypto.PublicKey import RSA import os if __name__ == '__main__': origin = input("What is the origin FQDN? Domain only, no scheme (e.g. www.horahora.org)") # compose file env = Environment(loader=FileSystemLoader("./templates")) template = env.get_t...
34
33.82
93
13
305
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_dd06f35c2e55c25d_a96992cb", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 9 ]
[ null ]
[ 11 ]
[ 62 ]
2024-11-19T02:37:22.668676+00:00
1,454,120,163,000
855f2c12293123e4a033b5ea31fa64d4a4ecb8e3
3
{ "blob_id": "855f2c12293123e4a033b5ea31fa64d4a4ecb8e3", "branch_name": "refs/heads/master", "committer_date": 1454120163000, "content_id": "477a54d6d3b8cb347cfd929f8a0eb7a98afb4410", "detected_licenses": [ "Apache-2.0" ], "directory_id": "dcf5d2fc3e83f8b1a4bb6771c5730a990b53e400", "extension": "py"...
2.703125
stackv2
#!/usr/bin/python ###################################################################### # Cloud Routes Availability Manager: http-keyword module # ------------------------------------------------------------------ # This is a module for performing http keyword searches. # This will return true if no errors or false if...
94
31.73
99
15
673
python
[{"finding_id": "codeql_py/request-without-cert-validation_d9363856d23982aa_6063d369", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 52 ]
[ 53 ]
[ 18 ]
[ 100 ]
2024-11-19T02:49:10.847159+00:00
1,603,036,069,000
caa22f7b1e702431fb216fd96ec8bbb55182b9b8
3
{ "blob_id": "caa22f7b1e702431fb216fd96ec8bbb55182b9b8", "branch_name": "refs/heads/master", "committer_date": 1603036069000, "content_id": "cbc49e20bb6c0a9fd0b71757843727fc0abb5245", "detected_licenses": [ "MIT" ], "directory_id": "f392a63995d02bcdbbb988a11ec40f82ce024ba0", "extension": "py", "fi...
2.65625
stackv2
import os, sys import Image from jinja2 import Template with file('xlsxart.template') as f: source = f.read() XimgTemplate = Template(source) im = Image.open("sample.png") mx,my = im.size pix = im.load() def RGBToHTMLColor(rgb_tuple): """ convert an (R, G, B) tuple to #RRGGBB """ hexcolor = '#%02x%02x%02x'...
24
28.29
92
11
206
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_5825e575f3050df8_4cf1a00f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 6 ]
[ null ]
[ 16 ]
[ 32 ]
2024-11-19T02:49:13.937975+00:00
1,515,960,000,000
d51d31065b75827f67968e1caba625c4d9a03571
3
{ "blob_id": "d51d31065b75827f67968e1caba625c4d9a03571", "branch_name": "refs/heads/master", "committer_date": 1515960000000, "content_id": "b2accfe0164e197c3517e96c1e9c8dc8e2cd0e43", "detected_licenses": [ "MIT" ], "directory_id": "a484bd40a5c5c722ab6a0a7ca80e237bb78d14c9", "extension": "py", "fi...
2.515625
stackv2
import re import locale import os import termcolor import jinja2 from . import logger from . import consts PARAGRAPH_PATTERN = re.compile(r'\r\n|\n\r|\n|\r') SENTENCE_PATTERN = re.compile(r'\.(?:\W|$)') def output_coupons(coupons): # sets the locale setting for the datetime.strptime() function locale.setloc...
115
30.98
75
19
827
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_cf35e2ef04ac3377_14021f5e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 37 ]
[ null ]
[ 23 ]
[ 59 ]
2024-11-19T02:49:25.335941+00:00
1,580,126,626,000
7345b9dccb52d808b7cddd53186cca27f89e4169
3
{ "blob_id": "7345b9dccb52d808b7cddd53186cca27f89e4169", "branch_name": "refs/heads/master", "committer_date": 1580126626000, "content_id": "a8f6ccfc6f235ecc35bbda79a536a24a75a11abc", "detected_licenses": [ "MIT" ], "directory_id": "be5eb1738c1f91bfc5a94f5e1af325b6b411424f", "extension": "py", "fi...
3.484375
stackv2
#!/usr/bin/env python3 from password import Credential from password import UserData import random import string import time import pyperclip def create_credentials(user_name, email, password): ''' function that creates new credentials ''' new_credential = Credential(user_name,email, password) retu...
170
30.19
136
18
1,056
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bc379f93bf8a7848_038d007f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 109 ]
[ null ]
[ 19 ]
[ 128 ]
2024-11-19T03:00:03.605655+00:00
1,538,719,277,000
9c39605f01d4ba01baa0a0e1037eac4c61ee00f3
2
{ "blob_id": "9c39605f01d4ba01baa0a0e1037eac4c61ee00f3", "branch_name": "refs/heads/master", "committer_date": 1538719398000, "content_id": "bcf56318124f22bea81f05cbcfd679e5fa970bb4", "detected_licenses": [ "MIT" ], "directory_id": "9927ffebcaecc215bda6651bda415115cd672192", "extension": "py", "fi...
2.328125
stackv2
""" Auth blueprint's view. Defined the route of the auth blueprint and the related logic. """ import re from flask import ( render_template, url_for, redirect, flash, request, current_app, make_response ) from flask_login import current_user, login_required, login_user, logout_user from flask_principal import Ident...
277
28.62
97
19
1,663
python
[{"finding_id": "codeql_py/url-redirection_4c77dac51e17cf91_f5778f67", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 92 ]
[ null ]
[ 29 ]
[ 78 ]
2024-11-19T03:00:04.068269+00:00
1,677,659,022,000
3f44cce223430868683ef28405fb206d1b91cc47
3
{ "blob_id": "3f44cce223430868683ef28405fb206d1b91cc47", "branch_name": "refs/heads/master", "committer_date": 1677659022000, "content_id": "229df961aebf8639240d701ddc3b0653f9bc981b", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "2396e9fe1c1897a7d19845aedead202524a42cd6", "extension": "p...
2.671875
stackv2
#!/usr/bin/env python3 """ Copyright (c) 2019 - 2021, Chris Perkins Licence: BSD 3-Clause Reports on .1x authentication sessions on a Cisco switch, optionally output to CSV v1.2 - delay_factor tweak due to show authentication sessions being very slow v1.1 - fixed edge case for empty show output v1.0 - initial releas...
148
36.73
125
21
1,097
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_71755d810d200ffe_2bf3107d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 137 ]
[ 139 ]
[ 21 ]
[ 59 ]
2024-11-19T03:00:26.734170+00:00
1,578,561,078,000
df39d53222718a3d417e61f51366bcd8fad1bc78
3
{ "blob_id": "df39d53222718a3d417e61f51366bcd8fad1bc78", "branch_name": "refs/heads/master", "committer_date": 1578561078000, "content_id": "49aa545c6f479ca836d46e86dc4536f6a705bd8b", "detected_licenses": [ "Apache-2.0" ], "directory_id": "294cb20ee3af4b9fcf605c4b86965378c4e1b54f", "extension": "py"...
2.75
stackv2
import paramiko import os import time def connect_remote(): host = '123.123.123.123' port = 22 name = 'abc' key = paramiko.RSAKey.from_private_key_file('C:/Users/feng8/.ssh/id_rsa_feng') # 创建SSH对象 ssh_client = paramiko.SSHClient() # 允许连接不在know_hosts文件中的主机, 第一次登录的认证信息 ssh_client.set_mi...
91
32.08
104
21
786
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_05c271b6587a2a6c_b4cfd83f", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 15 ]
[ null ]
[ 5 ]
[ 69 ]
2024-11-19T03:12:05.030249+00:00
1,610,058,579,000
d69d038617b0ef9a53430781e4b27e64fe142ba5
3
{ "blob_id": "d69d038617b0ef9a53430781e4b27e64fe142ba5", "branch_name": "refs/heads/main", "committer_date": 1610058579000, "content_id": "243239920743416dfe24f12696e699d449b0e2f6", "detected_licenses": [ "MIT" ], "directory_id": "e27bf3b437e83c19bbfe62b99bd6461363795f4d", "extension": "py", "file...
3.25
stackv2
import string, random def genPass(num): upper_ = string.ascii_uppercase lower_ = upper_.lower() special_ = ['!','",','£','$','%','^','&','*','(',')','_','+','-'] char = [] pword = [] password = "" for i in upper_: char.append(i) for i in lower_: char.append(i) for i i...
25
23.96
69
12
180
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1022304f6e922669_1f1821fb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 22 ]
[ null ]
[ 11 ]
[ 19 ]
2024-11-19T03:12:07.791097+00:00
1,577,040,182,000
7878ca5fe786771923f8f8aee6dce546ce785975
3
{ "blob_id": "7878ca5fe786771923f8f8aee6dce546ce785975", "branch_name": "refs/heads/master", "committer_date": 1577040182000, "content_id": "9a945ddb655b212a93f95875232095e347f07706", "detected_licenses": [ "MIT" ], "directory_id": "2b9fc3f3bc799c461e69d6a7926dafed3c2bc393", "extension": "py", "fi...
2.90625
stackv2
import csv import re import spacy import sys reload(sys) import pandas as pd sys.setdefaultencoding('utf8') from cStringIO import StringIO from pdfminer.pdfinterp import PDFResourceManager, PDFPageInterpreter from pdfminer.converter import TextConverter from pdfminer.layout import LAParams from pdfminer.pdfpage import ...
138
29.94
120
14
1,121
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7a0216b20bf87a9c_029478c0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 102 ]
[ null ]
[ 7 ]
[ 9 ]
2024-11-19T03:12:08.140801+00:00
1,679,777,917,000
e5faf535755acc715345b42f49461fbd5a92babd
4
{ "blob_id": "e5faf535755acc715345b42f49461fbd5a92babd", "branch_name": "refs/heads/master", "committer_date": 1679777917000, "content_id": "6f90dd781a8fcb8b2206adbb534df99fb56417ed", "detected_licenses": [ "MIT" ], "directory_id": "74e5f8a54be985c50ba160189f9bd8b202cd2c6e", "extension": "py", "fi...
3.8125
stackv2
#!/usr/bin/python3 # # zipweather.py - Get the current weather conditions for a given zip code # # Cobbled together by Jim McClanahan, W4JBM (Dec 2020) # # Based on example from here: # https://www.geeksforgeeks.org/python-find-current-weather-of-any-city-using-openweathermap-api/ # # Wind direction conversion to cardi...
109
31.39
97
13
975
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f235084cfd66aa52_f3202a00", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
4
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 99, 102, 103, 105 ]
[ null, null, 104, null ]
[ 11, 11, 11, 11 ]
[ 64, 55, 66, 66 ]
2024-11-19T03:12:18.379289+00:00
1,634,333,370,000
35231acc23da552336d6d52216f300a74fe0165c
2
{ "blob_id": "35231acc23da552336d6d52216f300a74fe0165c", "branch_name": "refs/heads/main", "committer_date": 1634333370000, "content_id": "48f6c3b1c7374554ce5ce3f24234a51161d7e7f0", "detected_licenses": [ "MIT" ], "directory_id": "5840b08359b19ccaa3cc77c5fe9e342dc7984d7b", "extension": "py", "file...
2.46875
stackv2
# Standard Library Imports import os import subprocess import logging import tempfile from logging.handlers import RotatingFileHandler from multiprocessing import Process, freeze_support import msvcrt import ctypes # Third Party Imports import uvicorn from fastapi import FastAPI import MetaTrader5 as mt5 # General C...
196
33.5
108
17
1,597
python
[{"finding_id": "codeql_py/log-injection_4c4f64d35afc5634_c563666d", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
3
true
[ "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 105, 107, 109 ]
[ null, null, null ]
[ 25, 25, 29 ]
[ 73, 72, 68 ]
2024-11-19T03:12:18.961700+00:00
1,628,661,665,000
edf36960e6d725247595117cbaca31583e76a4da
2
{ "blob_id": "edf36960e6d725247595117cbaca31583e76a4da", "branch_name": "refs/heads/master", "committer_date": 1628661665000, "content_id": "c9a7cde55d8aee2220909c34179f12ec7b191d26", "detected_licenses": [ "MIT" ], "directory_id": "917a690cad8fece9102ba3191284f1ab83a8aeaf", "extension": "py", "fi...
2.34375
stackv2
""" https://www.ncbi.nlm.nih.gov/books/NBK25497/ """ import os import sys import json import time import textwrap import datetime import click import prettytable from dateutil.parser import parse as date_parse from impact_factor import ImpactFactor from simple_googletrans import GoogleTrans from simple_loggers i...
282
35.66
123
22
2,450
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_8108a4231e26b419_c5b3c63b", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (password)](3) as clear text." ]
[ 241 ]
[ null ]
[ 27 ]
[ 39 ]
2024-11-19T03:12:27.407772+00:00
1,547,130,889,000
059c545c23ba899b4783157c7b207f83adb83cb2
2
{ "blob_id": "059c545c23ba899b4783157c7b207f83adb83cb2", "branch_name": "refs/heads/master", "committer_date": 1547130889000, "content_id": "f9756229b660ab583b8171292b7bbcd9a4564eaa", "detected_licenses": [ "MIT" ], "directory_id": "2337e4a1bade0d3ea809e10679cc2bd026b7067b", "extension": "py", "fi...
2.390625
stackv2
import logging from flask import request, current_app from flask_restplus import Resource, fields from rest_api_oscar.lib.oscar_saml import OscarSaml from rest_api_oscar.api.restplus import api import base64, json from flask import jsonify ns = api.namespace('auth', description='Operations related to OSCAR login') ...
70
31.51
89
20
535
python
[{"finding_id": "codeql_py/log-injection_d9e6f96d74ca59b2_0c46ebe0", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 34 ]
[ null ]
[ 23 ]
[ 83 ]
2024-11-19T03:12:52.228738+00:00
1,539,059,825,000
3f81456dcf80da2284f5d15c02fed0358ea52d0d
3
{ "blob_id": "3f81456dcf80da2284f5d15c02fed0358ea52d0d", "branch_name": "refs/heads/master", "committer_date": 1539059825000, "content_id": "8ad43b57cd78f8fd626f6bde2d3e9ed853d7fcb2", "detected_licenses": [ "Apache-2.0" ], "directory_id": "bcc162255958295a3f4f1f1816258ae49863e53a", "extension": "py"...
2.578125
stackv2
#coding=utf8 import requests import selenium.webdriver from bs4 import BeautifulSoup import random import time from requests.packages.urllib3.exceptions import InsecureRequestWarning requests.packages.urllib3.disable_warnings(InsecureRequestWarning) def nowplay(): headers = {'User-Agent': 'Mozilla/5.0 (Windows NT ...
222
36.01
119
21
1,966
python
[{"finding_id": "codeql_py/request-without-cert-validation_31b0f9eea2fa0a74_2b0a3a8e", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 14, 94 ]
[ null, null ]
[ 9, 9 ]
[ 55, 39 ]
2024-11-19T03:12:53.353484+00:00
1,529,414,392,000
c19e712103517ba45c8a3fb8e3b0135530e4d4e3
3
{ "blob_id": "c19e712103517ba45c8a3fb8e3b0135530e4d4e3", "branch_name": "refs/heads/master", "committer_date": 1529414392000, "content_id": "5fd1950241e28b06e2321167263725fd50565256", "detected_licenses": [ "Apache-2.0" ], "directory_id": "5855a51fa9b232a62decf4d1dbda13969a42d78e", "extension": "py"...
2.5625
stackv2
# -*- coding: utf-8 -*- from .blogDB import get_db from functools import reduce class blogInfo: def __init__(self): blogdb = get_db() cur = blogdb.cursor() cur.execute('SELECT id,content from info order by id') temp = cur.fetchall() self.title=temp[4][1] self.subtitle...
240
34.86
167
17
2,161
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_740846f0031d5bc3_36471a0c", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi...
[ 19 ]
[ null ]
[ 18 ]
[ 41 ]
2024-11-19T01:28:52.788656+00:00
1,568,898,970,000
26dc053dddc7bd881c3b17244c96b23f0e90c469
3
{ "blob_id": "26dc053dddc7bd881c3b17244c96b23f0e90c469", "branch_name": "refs/heads/master", "committer_date": 1568898970000, "content_id": "1ce60b4a86985fc46213110dc9cc749f0707ef2b", "detected_licenses": [ "MIT" ], "directory_id": "fb60100ea3b7e776e6b25250401c597fcf5f9573", "extension": "py", "fi...
3
stackv2
import requests from requests.auth import HTTPBasicAuth import json __log__ = True def doLog(func): def wrapped(*args, **kwargs): result = func(*args, **kwargs) if __log__: print 'called {} result:{}'.format(func.__name__, result) return result return wrapped class FakeU...
48
32.23
78
14
332
python
[{"finding_id": "codeql_py/request-without-cert-validation_35272e2eff4134f7_aca4624c", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 39 ]
[ 41 ]
[ 13 ]
[ 54 ]
2024-11-19T01:29:01.978925+00:00
1,594,488,577,000
54fe0f76b0d907dc798dacb14a2ede693ff04725
3
{ "blob_id": "54fe0f76b0d907dc798dacb14a2ede693ff04725", "branch_name": "refs/heads/master", "committer_date": 1594488577000, "content_id": "c5ca2e29242f9b65bca3c54a3555fbc2a16c180e", "detected_licenses": [ "MIT", "BSD-3-Clause" ], "directory_id": "2580d5f300369d4e3234e58c46a56ba641563afa", "ext...
2.765625
stackv2
#This file is the database driver import psycopg2 import sys import random import string import site_settings import base64 from Crypto.Cipher import AES conn = psycopg2.connect(database="TEST1", user="postgres", password="dachengzi", host="192.168.0.102", port="5432") #password in this line is invalid cur = conn.cu...
31
26.19
150
10
254
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_8846369fbb3e6d57_674be08a", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
1
true
[ "CWE-327" ]
[ "py/weak-cryptographic-algorithm" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 26 ]
[ null ]
[ 19 ]
[ 51 ]
2024-11-19T01:29:26.440127+00:00
1,535,056,128,000
536ce8511595675df7a66a12acc395cb0ab50b6c
2
{ "blob_id": "536ce8511595675df7a66a12acc395cb0ab50b6c", "branch_name": "refs/heads/master", "committer_date": 1535056128000, "content_id": "45442c1b49bb8c42d2762fe49758514cab5db48b", "detected_licenses": [ "MIT" ], "directory_id": "59e632f03385b15b20397bae057b8c290caf20b9", "extension": "py", "fi...
2.4375
stackv2
# -*- coding: utf-8 -*- import os import hashlib from google.appengine.ext import ndb from messaging.exceptions import EntityNotFound class Account(ndb.Model): site = ndb.StringProperty(required=True) name = ndb.StringProperty() modified_at = ndb.DateTimeProperty(auto_now=True) key_hash = ndb.String...
40
24.1
76
14
230
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_e13d116384f0a223_4ae63bee", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 21 ]
[ null ]
[ 38 ]
[ 45 ]
2024-11-19T01:29:56.958965+00:00
1,566,185,146,000
4d00845a5fb63029daa7b466c1d23b73359e8866
3
{ "blob_id": "4d00845a5fb63029daa7b466c1d23b73359e8866", "branch_name": "refs/heads/master", "committer_date": 1566185146000, "content_id": "97d186de4e68d9114671b8cd276f995b398eeb9a", "detected_licenses": [ "MIT" ], "directory_id": "588e301ce910e5137df7dd15497df37cb81a4a63", "extension": "py", "fi...
2.546875
stackv2
# coding=utf-8 import os import urllib.request from flask import Flask, flash, request, redirect, jsonify from flask import send_from_directory from werkzeug.utils import secure_filename import uuid from cv_code import blur_image from db_code import Database # set host address, allow all ip address HOST = '0.0.0.0' ...
131
30.19
119
17
957
python
[{"finding_id": "codeql_py/path-injection_6c681a807e765bf0_a70f41cd", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 52, 105 ]
[ null, null ]
[ 27, 23 ]
[ 62, 55 ]
2024-11-19T01:29:59.040925+00:00
1,628,856,065,000
2e733f8c387d8076ff94e73f5565770789861605
2
{ "blob_id": "2e733f8c387d8076ff94e73f5565770789861605", "branch_name": "refs/heads/master", "committer_date": 1628856065000, "content_id": "27bf68436fd6caa8775963d677d3a2fcad9172cd", "detected_licenses": [ "Apache-2.0" ], "directory_id": "7b7f7e6303291be89794394f50e7889c902b67c4", "extension": "py"...
2.484375
stackv2
import jinja2 as jinja from pathlib import Path from .config_doc import ObjectConfigurationDocument class ObjectConfigurationTemplate: @staticmethod def from_file(self, path): path = Path(path) with open(self.path, 'r') as f: content = f.read() return ObjectConfigurationTem...
20
34.35
105
14
138
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_8efa1dbae85c9460_77d129c2", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 18 ]
[ null ]
[ 21 ]
[ 63 ]
2024-11-19T01:30:16.907409+00:00
1,660,843,188,000
73035ad043edfd84c5e609593678a52ba9aaff26
2
{ "blob_id": "73035ad043edfd84c5e609593678a52ba9aaff26", "branch_name": "refs/heads/master", "committer_date": 1660843188000, "content_id": "302319c60843d8edc642d289ea40dff9ea879d57", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "2df1e7228cedf565d1e17ef1b59238718cb7eba5", "extension": "p...
2.375
stackv2
#! /usr/bin/env python3 import argparse from dataclasses import dataclass from shutil import copyfile, copytree from pathlib import Path import subprocess import sys import os from typing import Dict, Type import build def install_hal_daemon(out: Path) -> None: path = Path('daemon') out_bin = out / 'bin' ...
62
32.44
107
12
550
python
[{"finding_id": "codeql_py/overly-permissive-file_da700c76220bfeca_ccd7244a", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable." ]
[ 17 ]
[ null ]
[ 5 ]
[ 37 ]
2024-11-19T01:30:33.237509+00:00
1,406,458,334,000
11896620b0172b86f245ffe4a683f642b4847036
3
{ "blob_id": "11896620b0172b86f245ffe4a683f642b4847036", "branch_name": "refs/heads/master", "committer_date": 1406458334000, "content_id": "88882c8bf0fc45bd5b09d8160d24fb652dc78a9e", "detected_licenses": [ "MIT" ], "directory_id": "66db4d9468952603adeefdcbcbf1cd3b24acfc9d", "extension": "py", "fi...
2.578125
stackv2
import re import locale from datetime import time as dt_time _DIRECT_PATTERN = re.compile(r'%[A-z]') _C_KEY = locale.nl_langinfo(locale.D_T_FMT) _XD_KEY = locale.nl_langinfo(locale.D_FMT) _XT_KEY = locale.nl_langinfo(locale.T_FMT) _AMPM_KEY = '({am}|{pm})'.format(am=dt_time().strftime('%p'), ...
48
27.79
75
15
419
python
[{"finding_id": "codeql_py/overly-large-range_13ffbb27d17d2fae_fb35e8aa", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 5 ]
[ null ]
[ 34 ]
[ 37 ]
2024-11-19T01:30:34.568263+00:00
1,631,854,394,000
836a0f6ee80080bcc62ba0f0eb9e7399db54a9e0
3
{ "blob_id": "836a0f6ee80080bcc62ba0f0eb9e7399db54a9e0", "branch_name": "refs/heads/master", "committer_date": 1631854394000, "content_id": "26fc25a0a88da4ceed410968935952bdc4528d47", "detected_licenses": [ "MIT" ], "directory_id": "b2ff37406e50976b8db1c75bde4297f5039f7391", "extension": "py", "fi...
2.78125
stackv2
from flask import Flask app = Flask(__name__) #this is home end point @app.route("/") def hello_world(): return "Hello, World! my name is tithi" # this is login end point @app.route("/login") def login(): return "this is login page" # this is contact end point @app.route("/contact") def contact(): return ...
25
20.2
43
10
137
python
[{"finding_id": "codeql_py/flask-debug_eb9a605af8ad600e_948b7c8c", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 24, 21 ]
[ null, null ]
[ 5, 12 ]
[ 34, 38 ]
2024-11-19T01:55:11.006593+00:00
1,587,917,444,000
a5500e80b92ef987d6498ddc1be77eade506dfe5
2
{ "blob_id": "a5500e80b92ef987d6498ddc1be77eade506dfe5", "branch_name": "refs/heads/master", "committer_date": 1587917444000, "content_id": "beb590f8eb1489cfcb5a113583d9238807857fb6", "detected_licenses": [ "MIT" ], "directory_id": "8ffd2a1977f5df0c520927b7e6e33b3cf787d88b", "extension": "py", "fi...
2.359375
stackv2
#!coding=utf-8 import requests import json import datetime import re from selenium import webdriver from selenium.webdriver.chrome.options import Options import time requests.packages.urllib3.disable_warnings() # 慢慢买历史价格爬取 class ManManMai: def __init__(self): # 无界面运行 chrome_opt = Options() # 创建参...
125
35.78
152
18
1,394
python
[{"finding_id": "codeql_py/overly-large-range_1a1d80548d245bc4_8ccc0e41", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
2
true
[ "CWE-020", "CWE-295" ]
[ "py/overly-large-range", "py/request-without-cert-validation" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "This request may run without certificate validation because [it is disabled](1)." ]
[ 32, 76 ]
[ null, null ]
[ 36, 15 ]
[ 39, 58 ]
2024-11-19T01:55:30.398389+00:00
1,570,588,100,000
c7983a5585099b87a65625a66d668835a57e78da
2
{ "blob_id": "c7983a5585099b87a65625a66d668835a57e78da", "branch_name": "refs/heads/master", "committer_date": 1570588100000, "content_id": "c9e07959a2e27a34a51dfec50b1246cede005de4", "detected_licenses": [ "MIT" ], "directory_id": "b632cd1ddd199921d5c0f835c60300666b22b0f8", "extension": "py", "fi...
2.484375
stackv2
import os import ntpath from builtins import OSError from jinja2 import Environment, FileSystemLoader def generate_html(body, report_dir, build_id): env = Environment(loader=FileSystemLoader('./')) template = env.get_template('tntfuzzer/utils/template.html') path = "{}/{}/".format(report_dir, build_id) ...
63
35.14
105
13
584
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_26634f1904677e2f_941931f9", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 9, 23 ]
[ null, null ]
[ 11, 11 ]
[ 53, 53 ]
2024-11-19T01:55:32.869007+00:00
1,621,514,772,000
59339a60a1cbcd8d32826341f73054e6723fca11
3
{ "blob_id": "59339a60a1cbcd8d32826341f73054e6723fca11", "branch_name": "refs/heads/main", "committer_date": 1621514772000, "content_id": "0c123637fc2509a5b1986c672b37b70c350e9eae", "detected_licenses": [ "MIT" ], "directory_id": "e5f88583b36a3430d7b27c327acbd43f200dd8fb", "extension": "py", "file...
3.296875
stackv2
from tkinter import * root = Tk() def getvalue(): username = uservalue.get() upassword = passvalue.get() print(username, upassword) root.geometry("600x500") user = Label(root, text="username") password = Label(root, text="password") user.grid() password.grid(row=1) # Variable classes in tkinter # Boo...
34
18.03
50
8
173
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_07d350add7c421b6_854624e3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 9 ]
[ null ]
[ 21 ]
[ 30 ]
2024-11-19T02:06:52.908474+00:00
1,523,533,207,000
212513322d3b5ede966a7c479b3450258e894454
2
{ "blob_id": "212513322d3b5ede966a7c479b3450258e894454", "branch_name": "refs/heads/master", "committer_date": 1523533207000, "content_id": "8c36eaea908818c32f9e9fd8b5da04e158ba2361", "detected_licenses": [ "MIT" ], "directory_id": "56f3441dbd0892fe5eb73302314044511913499a", "extension": "py", "fi...
2.390625
stackv2
import tornado.web import json from jinja2 import Environment, FileSystemLoader, TemplateNotFound from settings import settings class JinjaCustomFilter: @classmethod def debug(cls, text): print(str(text)) return class BaseHandler(tornado.web.RequestHandler): def write_error(self, statu...
33
25.61
77
16
173
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_ab2dc2e0c9819a6b_78c778ae", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 24 ]
[ null ]
[ 15 ]
[ 78 ]
2024-11-19T02:07:27.267168+00:00
1,592,775,809,000
66338ddbf85b18ffe3cf1ece22b8b535d90e6961
3
{ "blob_id": "66338ddbf85b18ffe3cf1ece22b8b535d90e6961", "branch_name": "refs/heads/master", "committer_date": 1592775809000, "content_id": "c87e039d251102597a5ef6d4dd01bbe34c32d34b", "detected_licenses": [ "MIT" ], "directory_id": "c094ae79fac760c70ec8658a0d8451b8909d2f59", "extension": "py", "fi...
2.5625
stackv2
from flask import Flask import pika import os import json app = Flask(__name__) host_name = os.getenv("RMQ_HOST") @app.route('/') def index(): if host_name: return f"Hello from {host_name} running in a Docker container!" return 'Couldn\'t grab host_name' @app.route('/test/<cmd>') def add(cmd): ...
38
22.97
83
12
223
python
[{"finding_id": "codeql_py/flask-debug_a1e9e08b2f78a8bc_62aec065", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 38, 34 ]
[ null, null ]
[ 5, 12 ]
[ 40, 37 ]
2024-11-19T02:07:40.644404+00:00
1,637,477,487,000
a023677cf4f1e4a937bd1deb36d0589a3d78d15a
3
{ "blob_id": "a023677cf4f1e4a937bd1deb36d0589a3d78d15a", "branch_name": "refs/heads/main", "committer_date": 1637477487000, "content_id": "9fd5f088c338ddbcdfa4c609c0c8efee17ec06e2", "detected_licenses": [ "MIT" ], "directory_id": "5292b03998384c0d2bb5858058892d7e45c5365b", "extension": "py", "file...
2.53125
stackv2
import os import hashlib import tempfile from exiftool import ExifTool from flask import Flask, request, jsonify app = Flask(__name__, template_folder="views", static_folder="public", static_url_path="/") app.config["MAX_CONTENT_LENGTH"] = 100 * 1024 secret = os.getenv("SECRET") or "BSidesTLV2021{This_Is_Not_The_Flag}...
93
26.96
103
22
574
python
[{"finding_id": "codeql_py/stack-trace-exposure_8f3483c1ff10bc55_f434f12b", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
3
true
[ "CWE-209", "CWE-215", "CWE-327" ]
[ "py/stack-trace-exposure", "py/flask-debug", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecure." ]
[ 87, 93, 54 ]
[ null, null, null ]
[ 24, 5, 24 ]
[ 42, 66, 39 ]
2024-11-19T02:31:19.459471+00:00
1,596,731,693,000
c3dcb83c90bfcd8e92f17930eca0598790addb04
3
{ "blob_id": "c3dcb83c90bfcd8e92f17930eca0598790addb04", "branch_name": "refs/heads/master", "committer_date": 1596731693000, "content_id": "74f263d6f9338068d0ee8a349720666f9057bba3", "detected_licenses": [ "MIT" ], "directory_id": "8e223049d07832edca42eeab0e3cbd5b7a440394", "extension": "py", "fi...
3.078125
stackv2
from secret import DATABASE class Password: normalChars = list( "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789@#_") specialChars = list("""~`!@#$%^&*()_-+={[}]|\:;"'<,>.?/""") row_format = "{:^25}" * (4) def __init__(self, password, username, site): self.password =...
120
32.04
95
17
867
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3ed4408cdb8a9007_b491f17d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 47 ]
[ 48 ]
[ 15 ]
[ 60 ]
2024-11-19T02:31:37.103481+00:00
1,576,452,899,000
1202a79aa337d574289e2d55deeaff48afbfeb8f
3
{ "blob_id": "1202a79aa337d574289e2d55deeaff48afbfeb8f", "branch_name": "refs/heads/master", "committer_date": 1576452899000, "content_id": "0f1a157918e6de220c2c0eaa8472980356133757", "detected_licenses": [ "MIT" ], "directory_id": "00f389cc2eeb6ce9b7f75b7fa9c40356a3f75178", "extension": "py", "fi...
3.359375
stackv2
"""Check the user is allowed to run the code.""" import sqlite3 import hashlib import os def check_db(args): """Check if the user is registered in the database. Connect to the sqlite3 database. If the user is registered verify whether its password is correct adding the salt and computing the ...
51
27.88
74
17
317
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_2cb5a03b8ff78d59_a0d1dddb", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 37 ]
[ null ]
[ 37 ]
[ 59 ]
2024-11-19T02:31:50.910826+00:00
1,480,636,844,000
be2cf563859d40a9e497dad5dc5ea119af9f28ad
2
{ "blob_id": "be2cf563859d40a9e497dad5dc5ea119af9f28ad", "branch_name": "refs/heads/master", "committer_date": 1480636844000, "content_id": "c788f5e4d02b591b564a43a3d6a976670b1f9d17", "detected_licenses": [ "Apache-2.0" ], "directory_id": "8e289723e71a368ae909dc342596d3f75acfceb2", "extension": "py"...
2.359375
stackv2
from __future__ import print_function # In python 2.7 import sys from facebook import get_user_from_cookie, GraphAPI from flask import g, render_template, redirect, request, session, url_for import facebook from app import app, db from models import User import sys import requests from threading import * import time # ...
225
30.26
104
18
1,668
python
[{"finding_id": "codeql_py/full-ssrf_b7e9f5fa461da433_02a46c07", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
1
true
[ "CWE-918" ]
[ "py/full-ssrf" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1)." ]
[ 81 ]
[ null ]
[ 15 ]
[ 59 ]
2024-11-19T02:33:00.536797+00:00
1,585,762,980,000
6ba8697706684cf88a92526268c31dba2d45eec8
3
{ "blob_id": "6ba8697706684cf88a92526268c31dba2d45eec8", "branch_name": "refs/heads/master", "committer_date": 1585762980000, "content_id": "26c47c8d6986868edb17010921f5ed568cb389b6", "detected_licenses": [ "MIT" ], "directory_id": "95656ea56e15979f6e9d29d3cca929a07e2db0eb", "extension": "py", "fi...
2.6875
stackv2
import re import requests def url_videofind(url, ext): url_fetch = requests.get(url) url_txt = url_fetch.text results = re.findall('http[s]?://(?:[a-zA-Z]|[0-9]|[$-_@.&+]|[!*\(\),]|(?:%[0-9a-fA-F][0-9a-fA-F]))+', url_txt) #List of videos found within page vide...
104
24.04
119
12
624
python
[{"finding_id": "codeql_py/overly-large-range_f7d3e02886d276c0_d33523d2", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 8 ]
[ null ]
[ 61 ]
[ 64 ]
2024-11-19T02:33:00.704348+00:00
1,432,743,118,000
230fe2db6c03f3c13600e42c56c8c2ac6e72f681
3
{ "blob_id": "230fe2db6c03f3c13600e42c56c8c2ac6e72f681", "branch_name": "refs/heads/master", "committer_date": 1432743118000, "content_id": "2af54c9eb59c3fc341e57f980fc27696f7b5a3a2", "detected_licenses": [ "MIT" ], "directory_id": "866e83b8f5c88b5441af58fe5dd4e1f594928c48", "extension": "py", "fi...
2.828125
stackv2
import os import requests import json from collections import namedtuple from requests.auth import HTTPDigestAuth class ConnectionHelper(object): url = None user = None password = None def __str__(self): return self.user + ":" + self.password + " " + self.url def __init__(self, user, pa...
58
31.93
83
17
344
python
[{"finding_id": "codeql_py/request-without-cert-validation_a4cf76ebd222f45b_12a40a54", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
3
true
[ "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 37, 43, 50 ]
[ 40, 47, 54 ]
[ 24, 24, 24 ]
[ 83, 59, 60 ]
2024-11-19T02:43:23.546597+00:00
1,557,301,554,000
c2b4b305b1191f876baa9e0676294df9ac0892df
3
{ "blob_id": "c2b4b305b1191f876baa9e0676294df9ac0892df", "branch_name": "refs/heads/master", "committer_date": 1557301554000, "content_id": "fec7d1b72f4aec1eef9f9b237d94ba74be99b448", "detected_licenses": [ "MIT" ], "directory_id": "c4d3fe12e3e507da540182c489cc8bd8443841f3", "extension": "py", "fi...
2.53125
stackv2
import paramiko import sys, argparse from argparse import RawTextHelpFormatter if __name__ == "__main__": # Exit code for nagios 0 -OK, 1 - Warning, 2 - Critical exit_code = 0 output_info = "" # OceanStor failed Health and Running status failed_health_status = ["Offline", "Pre-fail", "Fault", "--"...
273
38.03
153
17
2,456
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_d444c689df2df9cd_f677df06", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 260 ]
[ null ]
[ 5 ]
[ 62 ]
2024-11-19T02:43:27.612888+00:00
1,692,717,414,000
b23b820e9c53e1772653a88add0daa6eb03a62a1
3
{ "blob_id": "b23b820e9c53e1772653a88add0daa6eb03a62a1", "branch_name": "refs/heads/master", "committer_date": 1692717414000, "content_id": "ee899f66dce83ad77b892d84428b2be3384cf9f2", "detected_licenses": [ "Unlicense" ], "directory_id": "e99dee22ce2608aec732f1793ca889d9c53d081f", "extension": "py",...
2.875
stackv2
#!/usr/bin/env python2 # -*- coding: utf-8 -*- import hashlib import sqlite3 import sys from OpenSSL import SSL from flask import Flask,request app = Flask(__name__) def setup_ssl(): try: context = SSL.Context(SSL.SSLv23_METHOD) context.use_privatekey_file("ssl/fakeserver.key") context.u...
73
23.59
85
12
426
python
[{"finding_id": "codeql_py/reflective-xss_e50474029d4601f5_adfb81f3", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
3
true
[ "CWE-079", "CWE-327", "CWE-089" ]
[ "py/reflective-xss", "py/weak-sensitive-data-hashing", "py/sql-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256)...
[ 65, 42, 28 ]
[ null, null, null ]
[ 20, 34, 21 ]
[ 81, 42, 26 ]
2024-11-19T02:43:32.866462+00:00
1,585,994,123,000
b45193e8c6764f5d972fa023376cb9db144174cb
3
{ "blob_id": "b45193e8c6764f5d972fa023376cb9db144174cb", "branch_name": "refs/heads/master", "committer_date": 1585994123000, "content_id": "dfb80ce2501d1578b2d9198a8dc825471afeae41", "detected_licenses": [ "MIT" ], "directory_id": "ecd6439997fbfd0c4d30a2a6777f000440d57b60", "extension": "py", "fi...
2.828125
stackv2
import os import logging import json import requests import dotenv import math import typing import functools def get_my_logger(): """モジュール用のロガーを作成します。 メインの処理とは別に関係ない。 Returns: Logger -- モジュール用のロガー。 """ # ルートロガーを作成します。ロガーはモジュールごとに分けるもの。 logger = logging.getLogger(__name__) # ルートロガ...
225
25.31
119
17
1,884
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f98830e8321ca0b9_4559142d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 195 ]
[ null ]
[ 21 ]
[ 45 ]
2024-11-19T02:54:52.790573+00:00
1,560,263,771,000
354566c0fa2c01b2a15d68ad20df759fe1c81429
3
{ "blob_id": "354566c0fa2c01b2a15d68ad20df759fe1c81429", "branch_name": "refs/heads/master", "committer_date": 1560263771000, "content_id": "62bb0c968a0c16c25d3c80c0ce5452e76609765f", "detected_licenses": [ "MIT" ], "directory_id": "ababc7badab824835aad1fbac6e179787a0b45c4", "extension": "py", "fi...
2.796875
stackv2
import json import datetime import configparser FITBIT_BASE_URL = "https://api.fitbit.com/" inifile = configparser.ConfigParser() inifile.read('./config.ini', 'UTF-8') client_id = inifile.get('fitbit', 'client_id') client_secret = inifile.get('fitbit', 'client_secret') access_token = inifile.get('fitbit', 'access_tok...
62
28.42
106
18
492
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_27362b9ddf84c9a9_83e9f0fb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 61 ]
[ null ]
[ 11 ]
[ 26 ]
2024-11-19T02:55:13.789397+00:00
1,575,351,337,000
274baba14df9343422d372034d174018944cde5a
3
{ "blob_id": "274baba14df9343422d372034d174018944cde5a", "branch_name": "refs/heads/master", "committer_date": 1575351337000, "content_id": "9da085218465565f85f9bcbbea207b0a4d504387", "detected_licenses": [ "MIT" ], "directory_id": "e089eae5220e0b6514fee7630ff938ad261cd11d", "extension": "py", "fi...
2.546875
stackv2
from flask import Flask, jsonify, request from flask_cors import CORS import mysql.connector db = mysql.connector.connect( host='localhost', user='root', passwd='', database='berita' ) app = Flask('berita-service') CORS(app) @app.route('/getBerita', methods=['GET']) def index(): cursor = db.cur...
43
27.3
125
11
316
python
[{"finding_id": "codeql_py/flask-debug_974f549353557f92_d0d6ad74", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-089", "CWE-089" ]
[ "py/flask-debug", "py/sql-injection", "py/sql-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This SQL query depends on a [user-provided value](1).", "This SQL query depends on a [user-provided value](1)." ]
[ 43, 28, 39 ]
[ null, null, null ]
[ null, 20, 20 ]
[ 31, 72, 25 ]
2024-11-19T02:55:17.538896+00:00
1,364,974,019,000
7f12164c454ac79697079cc313c04fbc574ab0b5
3
{ "blob_id": "7f12164c454ac79697079cc313c04fbc574ab0b5", "branch_name": "refs/heads/master", "committer_date": 1364974019000, "content_id": "24ab421a1c9ee9d10670a1335fb95ec472b37e0a", "detected_licenses": [ "MIT" ], "directory_id": "2098db9336a6510e8060767b19ad277f3e1542b2", "extension": "py", "fi...
2.53125
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- import json import yaml import time import re import os import argparse from collections import OrderedDict from flask import Flask, Response, request, render_template from simmetrica import Simmetrica parser = argparse.ArgumentParser(description='Start Simmetrica web ...
95
32.93
140
19
762
python
[{"finding_id": "codeql_py/redos_48f6121f261cf2d5_768de9bf", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '9'.", "remediati...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '9'." ]
[ 89 ]
[ null ]
[ 33 ]
[ 36 ]
2024-11-19T02:55:35.347190+00:00
1,665,073,299,000
961649faa09eac0f532c1881050dfc6180c98f97
2
{ "blob_id": "961649faa09eac0f532c1881050dfc6180c98f97", "branch_name": "refs/heads/master", "committer_date": 1665073299000, "content_id": "23ac525295e307eb4f3bc98df8d714c1ad30e9ec", "detected_licenses": [ "MIT" ], "directory_id": "0c3eb786a7e4755acd1348b21f468e2f2c6a5240", "extension": "py", "fi...
2.453125
stackv2
"""Client API for Camect.""" import asyncio import base64 import json import logging import ssl import sys from threading import Thread import time from typing import Callable, Dict, List import urllib3 import requests import websockets EMBEDDED_BUNDLE_JS = "js/embedded_bundle.min.js" _LOGGER = logging.getLogger(__...
279
36.83
100
21
2,454
python
[{"finding_id": "codeql_py/request-without-cert-validation_b226364eaa4d2b4c_d67e5d44", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
8
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation"...
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 113, 121, 133, 141, 156, 185, 205, 226 ]
[ 114, 123, 135, 142, 158, 187, 207, 228 ]
[ 16, 16, 16, 16, 16, 16, 16, 16 ]
[ 95, 35, 27, 95, 27, 27, 29, 27 ]
2024-11-19T02:55:38.294669+00:00
1,631,832,430,000
7d32f8902d3bce38e4ddcf98c7b903566955b113
4
{ "blob_id": "7d32f8902d3bce38e4ddcf98c7b903566955b113", "branch_name": "refs/heads/main", "committer_date": 1631832430000, "content_id": "52376b43f206059ce2ba7bad4b3c2cf3717a47c3", "detected_licenses": [ "MIT" ], "directory_id": "70197614594b92a40161013d7ff4121d9491760d", "extension": "py", "file...
3.765625
stackv2
import getpass import random def check_number(hc): while not(hc in ("1","2","3","4","5","6")) or not(len(hc)==1): print("...please try again... ") hc = getpass.getpass("Enter a number from 1 to 6:") return hc def main(): try_again = True while try_again == True: print("-------...
158
38.89
128
27
1,434
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_acb57a9020794340_4646fcd9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text.\nThis expression logs [sensitive data (passw...
[ 100, 112 ]
[ null, null ]
[ 19, 19 ]
[ 31, 31 ]
2024-11-19T03:10:28.532433+00:00
1,606,513,998,000
194543c7fb886f59661da90aafbb6ff1c54810f2
3
{ "blob_id": "194543c7fb886f59661da90aafbb6ff1c54810f2", "branch_name": "refs/heads/main", "committer_date": 1606513998000, "content_id": "f935c825e871dcc6561ee93cf1cdc31197b99280", "detected_licenses": [ "Apache-2.0" ], "directory_id": "414a4bd0ba97d994c8829a5d18315b2c542be200", "extension": "py", ...
2.5625
stackv2
#!/usr/bin/env python # coding: utf-8 import os import sys import json import nltk import random import logging import tensorflow as tf from glob import glob from tensorflow.keras.utils import Progbar sys.path.append("bert") import sentencepiece as spm import argparse import re regex_tokenizer = nltk.RegexpTokenizer...
128
25.89
115
16
1,034
python
[{"finding_id": "codeql_py/overly-large-range_e29982413bb75804_c442a9e1", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "remediatio...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class." ]
[ 25, 30 ]
[ null, null ]
[ 13, 29 ]
[ 17, 32 ]
2024-11-19T03:10:48.947972+00:00
1,483,385,309,000
dfa085ce8469ff7a1c5518d38fafd4beb76c0fc1
3
{ "blob_id": "dfa085ce8469ff7a1c5518d38fafd4beb76c0fc1", "branch_name": "refs/heads/master", "committer_date": 1483385309000, "content_id": "3f26e3160ce2ceafcf3343521d11189751958310", "detected_licenses": [ "MIT" ], "directory_id": "5dc07863210c6e3c33216e7cc2531892a27c5ba0", "extension": "py", "fi...
2.9375
stackv2
""" A `Sewer` is a pipeline for mutating things. _.---._ _.-(_o___o_) )_.'_ _'. _.-( (_`---'_) )-._ .'_.-'-._`"^"`_.-'-._'. /` | __`"`__ | `\ | | .'` ^:^ `'. | | )'-.// | \\.-'( / // ...
252
31.07
93
19
1,858
python
[{"finding_id": "codeql_py/redos_850e1d91eed2f366_5779b8fc", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '{{a' and containing many repetiti...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '{{a' and containing many repetitions of 'a'." ]
[ 165 ]
[ null ]
[ 51 ]
[ 54 ]
2024-11-19T03:10:55.363574+00:00
1,605,533,294,000
fda344748e92f11f3e6be65b35fcd8170657da62
2
{ "blob_id": "fda344748e92f11f3e6be65b35fcd8170657da62", "branch_name": "refs/heads/main", "committer_date": 1605533294000, "content_id": "59655f6d6a25c2787f3dd9fd46aef176b61619f5", "detected_licenses": [ "Apache-2.0" ], "directory_id": "8e2605b89c06376fa195a1aae6c2d1999ef0f5b5", "extension": "py", ...
2.34375
stackv2
""" Software License Agreement (Apache 2.0) Copyright (c) 2020, The MITRE Corporation. All rights reserved. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at https://www.apache.org/licenses/LICENSE-...
171
35.19
101
12
1,452
python
[{"finding_id": "codeql_py/bad-tag-filter_86f39acbe5574eb2_6202c362", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression does not match comments containing newlines.", "remediation": "", "location": {"file_pat...
1
true
[ "CWE-116" ]
[ "py/bad-tag-filter" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression does not match comments containing newlines." ]
[ 31 ]
[ null ]
[ 28 ]
[ 45 ]
2024-11-19T03:21:44.327672+00:00
1,565,516,183,000
d64e9d13b88f09e605c076eda043c6e56e6f2e16
2
{ "blob_id": "d64e9d13b88f09e605c076eda043c6e56e6f2e16", "branch_name": "refs/heads/master", "committer_date": 1565516183000, "content_id": "c3a147227d849a600ae1160174375ccb04423c06", "detected_licenses": [ "Apache-2.0" ], "directory_id": "131b02d8d78d02af328305d70d22cb6a4bafbd97", "extension": "py"...
2.421875
stackv2
from django.shortcuts import render # Create your views here. from rest_framework.views import APIView from carts.serializers import CartSerializer,CartSKUSerializer from django_redis import get_redis_connection from rest_framework.response import Response import base64 import pickle from goods.models import SKU f...
210
29.52
83
17
1,443
python
[{"finding_id": "codeql_py/unsafe-deserialization_b92f304d90ac0d0c_e6e6f487", "tool_name": "codeql", "rule_id": "py/unsafe-deserialization", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Unsafe deserialization depends on a [user-provided value](1).\nUnsafe deserialization depen...
4
true
[ "CWE-502", "CWE-502", "CWE-502", "CWE-502" ]
[ "py/unsafe-deserialization", "py/unsafe-deserialization", "py/unsafe-deserialization", "py/unsafe-deserialization" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Unsafe deserialization depends on a [user-provided value](1).\nUnsafe deserialization depends on a [user-provided value](1).", "Unsafe deserialization depends on a [user-provided value](1).\nUnsafe deserialization depends on a [user-provided value](1).", "Unsafe deserialization depends on a [user-provided valu...
[ 69, 121, 161, 196 ]
[ null, null, null, null ]
[ 44, 37, 44, 44 ]
[ 54, 65, 66, 72 ]
2024-11-19T03:22:12.220913+00:00
1,630,413,999,000
b7e840312c28a7df741c160a422531844d77e8d2
2
{ "blob_id": "b7e840312c28a7df741c160a422531844d77e8d2", "branch_name": "refs/heads/main", "committer_date": 1630413999000, "content_id": "b793b46c1a4776e22f4104e183cd822b1f882f8c", "detected_licenses": [ "MIT" ], "directory_id": "1b8c19bca90f1674642f7b35b882868404c06952", "extension": "py", "file...
2.421875
stackv2
import os import sys from dotenv import load_dotenv import random import re import requests from flask import Flask, json, redirect, render_template, request, url_for, jsonify, abort from flask_limiter import Limiter from flask_limiter.util import get_remote_address from six import class_types app = Flask(__name__) ...
139
24.58
90
19
852
python
[{"finding_id": "codeql_py/regex-injection_c5d8f94f9ef17ffe_dba0d432", "tool_name": "codeql", "rule_id": "py/regex-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This regular expression depends on a [user-provided value](1) and is executed by [re.finditer](2).", "rem...
1
true
[ "CWE-730" ]
[ "py/regex-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression depends on a [user-provided value](1) and is executed by [re.finditer](2)." ]
[ 93 ]
[ null ]
[ 34 ]
[ 43 ]
2024-11-19T03:44:03.038281+00:00
1,524,444,610,000
f17713b7d8d0b4d7afc94346bd7582cbab1547c8
2
{ "blob_id": "f17713b7d8d0b4d7afc94346bd7582cbab1547c8", "branch_name": "refs/heads/master", "committer_date": 1524444610000, "content_id": "495bac30900e862e28fe64a9b8eb00a348eb634f", "detected_licenses": [ "Apache-2.0" ], "directory_id": "0c9a9b22ba406bd7b31364b9f491ffbb1fda469f", "extension": "py"...
2.453125
stackv2
"""Listener module.""" from sys import platform as _platform from os import environ from pync import Notifier from flask import Flask, request from random import randint import json import requests clearpass_auth_token = "Bearer xxxx" clearpass_fqdn = "192.0.2.1" app = Flask(__name__) # check for ngrok subdomain ng...
126
33.22
148
14
1,049
python
[{"finding_id": "codeql_py/flask-debug_904e0e02f6cf3f2f_51e6fca4", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-295", "CWE-295" ]
[ "py/flask-debug", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "HIGH", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 126, 114, 121 ]
[ null, null, null ]
[ 5, 16, 16 ]
[ 51, 88, 73 ]
2024-11-19T03:44:11.292963+00:00
1,652,447,824,000
9406472060ae4608e454c5cfb7e057513d3caee9
3
{ "blob_id": "9406472060ae4608e454c5cfb7e057513d3caee9", "branch_name": "refs/heads/master", "committer_date": 1652447824000, "content_id": "6c93592987a1fb5b70a89d9c4da98fad4d410200", "detected_licenses": [ "MIT" ], "directory_id": "6b201605227f11880c1d32c9cad300f6e29ff4ae", "extension": "py", "fi...
3.015625
stackv2
from base64 import b64encode from base64 import b64decode import random # Define random seed randSeed = "SEED" random.seed(randSeed) # Define secret message botToken = "123456789:RaNdOmChArAcTeRs" chatId = "12345678" rawSecret = botToken + "$=$" + chatId # Define alphabet alnumlist=[] alphabet=r"ABCDEFGHIJKLMNOPQR...
196
32.19
104
18
1,607
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1e2a54e83e4ed9ae_49539952", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text." ]
[ 173 ]
[ null ]
[ 11 ]
[ 23 ]
2024-11-19T02:08:46.369948+00:00
1,580,142,905,000
28fec2fee403a742e1bd2f91cd49ef1568a25429
2
{ "blob_id": "28fec2fee403a742e1bd2f91cd49ef1568a25429", "branch_name": "refs/heads/master", "committer_date": 1580142905000, "content_id": "19bb84c1d78ceadd5c49bb8988eb87d2800c321d", "detected_licenses": [ "MIT" ], "directory_id": "397381608548f96ec4d3a82ce198a627a82cd835", "extension": "py", "fi...
2.375
stackv2
import random import traceback import discord from discord.ext import commands from requests import HTTPError from poediscordbot.cogs.pob import util from poediscordbot.cogs.pob.output import pob_output from poediscordbot.cogs.pob.poe_data import poe_consts from poediscordbot.cogs.pob.util import pastebin from poedis...
102
40.19
118
21
906
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_6398ac797b80254b_1050dd03", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [pastebin.com/](1) may be at an arbitrary position in t...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [pastebin.com/](1) may be at an arbitrary position in the sanitized URL." ]
[ 45 ]
[ null ]
[ 21 ]
[ 55 ]
2024-11-19T02:08:46.424578+00:00
1,455,761,102,000
3d29007f86b60ce959be6539b2db81127da35675
2
{ "blob_id": "3d29007f86b60ce959be6539b2db81127da35675", "branch_name": "refs/heads/master", "committer_date": 1455761102000, "content_id": "8270a43cab00e5d2de30535d301f74c97e9652e6", "detected_licenses": [ "MIT" ], "directory_id": "971abc1a32d8bcc5076ce02660a280178812cc07", "extension": "py", "fi...
2.390625
stackv2
#!/usr/bin/env python #coding=utf-8 from flask import redirect, render_template, url_for, flash, request from flask.ext.login import current_user, login_user from . import auth from .form import LoginForm from ..model.users import User @auth.route('/login', methods=['GET', 'POST']) def login(): form = LoginF...
23
31
78
16
160
python
[{"finding_id": "codeql_py/url-redirection_1e562dfba58ee3d8_6664ec58", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 21 ]
[ null ]
[ 29 ]
[ 78 ]
2024-11-19T02:08:51.882448+00:00
1,630,637,147,000
0f5a983c8b30123136fd089df59857a1f05dfc2c
3
{ "blob_id": "0f5a983c8b30123136fd089df59857a1f05dfc2c", "branch_name": "refs/heads/main", "committer_date": 1630637147000, "content_id": "14b3e70257408ed3ce29462e2856382916c60868", "detected_licenses": [ "MIT" ], "directory_id": "46b08f5fa691f66d33d23f2ade3b8a9ed27524d0", "extension": "py", "file...
3.15625
stackv2
"""Authentication blueprint routes and view functions. Routes/view functions: - login(): Login page for webapp. Authenticates username and password. - logout(): Logout page for webapp. Closes connection to MySQL server. """ # %% Imports # Standard system imports # Related third party imports from flas...
71
37.65
79
17
580
python
[{"finding_id": "codeql_py/url-redirection_8c3fa4b9d5b1da55_6efc7d81", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 47 ]
[ null ]
[ 29 ]
[ 38 ]
2024-11-19T02:21:22.334760+00:00
1,650,476,552,000
2d627bf76e61d02126d1db68278b7105162ab469
2
{ "blob_id": "2d627bf76e61d02126d1db68278b7105162ab469", "branch_name": "refs/heads/master", "committer_date": 1650476552000, "content_id": "d89cdb0d3deab9fe2d2ab10cfed436f244d1b329", "detected_licenses": [ "Apache-2.0" ], "directory_id": "f3b4fdddca320ce4628daf522249d719cef715fb", "extension": "py"...
2.359375
stackv2
import os from flask import render_template from flask import request, redirect, url_for, flash from soundeffectsapp import app # from sqlalchemy import create_engine # from sqlalchemy_utils import database_exists, create_database # import pandas as pd # import psycopg2 from werkzeug import secure_filename import s...
120
32.69
161
17
907
python
[{"finding_id": "codeql_py/url-redirection_3cf1afb0ffcb2c88_4d78262a", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
2
true
[ "CWE-601", "CWE-601" ]
[ "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 59, 63 ]
[ null, null ]
[ 27, 23 ]
[ 38, 34 ]
2024-11-19T02:46:44.293530+00:00
1,485,103,059,000
359a8a18f4f366f01ba8f1c75bb18e2f99213253
2
{ "blob_id": "359a8a18f4f366f01ba8f1c75bb18e2f99213253", "branch_name": "refs/heads/master", "committer_date": 1485103059000, "content_id": "fee325d0cbb9b0de80e699d14681bb29838672cc", "detected_licenses": [ "MIT" ], "directory_id": "f4c51f527564a4300a3dc593ac11ffb5b3cc131d", "extension": "py", "fi...
2.46875
stackv2
import os import time from boto.ec2.connection import EC2Connection import settings class EC2Factory(object): def __init__(self): self.conn = EC2Connection(settings.AWS_ACCESS_KEY_ID, settings.AWS_SECRET_ACCESS_KEY) def create_key_pair(self): key_pair = self.conn.create_key_pair(settings.EC2...
71
33
93
14
502
python
[{"finding_id": "codeql_py/overly-permissive-file_0667e2b47a4b2900_6be827f3", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to group writable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to group writable." ]
[ 22 ]
[ null ]
[ 9 ]
[ 33 ]
2024-11-19T02:57:56.564547+00:00
1,638,544,848,000
0cb26137ffa43498d6697540a39b852aeea5a43d
3
{ "blob_id": "0cb26137ffa43498d6697540a39b852aeea5a43d", "branch_name": "refs/heads/master", "committer_date": 1638544848000, "content_id": "c3d8d5469b918422ae2f7c99e3c6c27df2df92a1", "detected_licenses": [ "MIT" ], "directory_id": "73124b85b01f3f4903dd70662498622cfb77943e", "extension": "py", "fi...
2.578125
stackv2
class ConsoleFormatter: def __init__(self, args): self.data_format = args.data_format def __call__(self, message): print(''' ---------- MESSAGE ---------- Iridium Latitude {} Iridium Longitude {} Device Type {} Transmit Time {} MOMSN {} IMEI {} Serial ...
31
23.94
93
15
163
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_eb5d0e72407603af_62e6cc5c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 6 ]
[ 28 ]
[ 15 ]
[ 6 ]
2024-11-19T02:58:13.057182+00:00
1,561,322,198,000
7aef9af9801a3a41773eca2177dfdb277fd02683
2
{ "blob_id": "7aef9af9801a3a41773eca2177dfdb277fd02683", "branch_name": "refs/heads/master", "committer_date": 1561322198000, "content_id": "8b0a71c30ad8f11086f3077570176f50f4ae7ff8", "detected_licenses": [ "MIT" ], "directory_id": "c72d112d7d4de228df3d3b5f31a55d5bfaf6ce05", "extension": "py", "fi...
2.359375
stackv2
import json import logging from flask import Flask, request import stop_to_stop from lib.logs import init_logging from lib.model import download_model, predict app = Flask(__name__) @app.route('/predictFromMovement', methods=['POST']) def get_prediction_from_movement(): journey = request.get_json() route_i...
40
25.95
84
12
244
python
[{"finding_id": "codeql_py/log-injection_b430ee6237802309_50fc4c23", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
3
true
[ "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 17, 29, 30 ]
[ null, null, null ]
[ 18, 18, 18 ]
[ 80, 84, 44 ]
2024-11-19T03:10:08.890412+00:00
1,578,104,250,000
bd9da0e36dc40bc152b3ab41d6f5bee7fa3d6d21
2
{ "blob_id": "bd9da0e36dc40bc152b3ab41d6f5bee7fa3d6d21", "branch_name": "refs/heads/master", "committer_date": 1578104250000, "content_id": "1536054351882d4d0b3840a1caf1c7a1d19ae528", "detected_licenses": [ "Python-2.0", "MIT" ], "directory_id": "05fe2ac32c054867fc72c8d92b3be30530671964", "exten...
2.46875
stackv2
#!/opt/cloudera/parcels/Anaconda/bin/python # -*- coding: utf-8 -*- ''' FILE ‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾ jinja_file.py DECLARATION ‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾ JINJA(subpath1[, subpath2, ..., dir=dir]) DESCRIPTIO...
219
27.33
118
19
2,069
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_e2260f78b6b5073e_fa6c7369", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 114 ]
[ null ]
[ 20 ]
[ 74 ]
2024-11-19T03:10:22.016840+00:00
1,565,226,379,000
bef4328bb249fb40c08156d49b9f3c5ac44eae65
3
{ "blob_id": "bef4328bb249fb40c08156d49b9f3c5ac44eae65", "branch_name": "refs/heads/master", "committer_date": 1565226379000, "content_id": "c59b6ddf2b7751c7ed1b388ed6b893444c80b8b4", "detected_licenses": [ "Apache-2.0" ], "directory_id": "33aad9725fec1926107e798d5312552a8e66348f", "extension": "py"...
3.390625
stackv2
#!/usr/bin/env python # -*- coding:utf8 -*- # by LZN '''各个类的模块''' from conf import settings import pickle class School: '''校区与地点''' def __init__(self,area,site): self.area=area self.site=site self.area_courses=[] # 创建一个空列表存放课程 self.area_teacher=[] # 创建一个空列表存放老师 def se...
125
22.48
87
15
817
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_963cb36d04ad0168_cf97ed3c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (priva...
[ 73, 98 ]
[ 80, 106 ]
[ 15, 15 ]
[ 75, 87 ]
2024-11-19T03:22:36.801898+00:00
1,610,832,042,000
c94172a1814a5169c49c8436bfd748ef3dd23a16
3
{ "blob_id": "c94172a1814a5169c49c8436bfd748ef3dd23a16", "branch_name": "refs/heads/main", "committer_date": 1610832042000, "content_id": "7737d6f4cf6013f3b6d2b45c5435dac31c4c22b9", "detected_licenses": [ "MIT" ], "directory_id": "1783e397d8586d7e63d913a2f53c71ddd1a1b4a0", "extension": "py", "file...
3.46875
stackv2
from re import compile from typing import List def get_input(path: str): input = [] with open(path, "r") as f: for line in f.readlines(): input.append(line.strip()) return input def get_parameters(line: str, regex: str) -> dict: pattern = compile(regex) parameters = pattern.f...
50
32.9
101
14
433
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f6db582a1b1359c3_6a8d3d00", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 48, 50 ]
[ null, null ]
[ 11, 11 ]
[ 67, 73 ]
2024-11-19T03:22:37.159740+00:00
1,486,926,929,000
5a790161d4916b20539c7ea24fedb29761b403b6
3
{ "blob_id": "5a790161d4916b20539c7ea24fedb29761b403b6", "branch_name": "refs/heads/master", "committer_date": 1486926929000, "content_id": "13047a1483feae438ed0627a5d6ee0c3871ff4d5", "detected_licenses": [ "Apache-2.0" ], "directory_id": "2a11879816a2cbe8c5f27f668cf114a9f4428a11", "extension": "py"...
2.5625
stackv2
import tornado.ioloop, tornado.web, tornado.websocket, tornado.template import logging, uuid, subprocess, pykka from datetime import datetime from tornado.escape import json_encode, json_decode logger = logging.getLogger(__name__) # container for all current pusher connections connections = {} frontend = {} ## ...
321
35.01
124
19
2,235
python
[{"finding_id": "codeql_py/log-injection_66c9da9afac70837_dd4b7a7c", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
2
true
[ "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 112, 142 ]
[ null, null ]
[ 22, 22 ]
[ 105, 57 ]
2024-11-19T03:22:42.692736+00:00
1,485,137,773,000
31955b43218ca21547a9b7a8871be4b5b52c6999
3
{ "blob_id": "31955b43218ca21547a9b7a8871be4b5b52c6999", "branch_name": "refs/heads/master", "committer_date": 1485137773000, "content_id": "b0a41e1cc7accbec7127e9d1b266544739944dae", "detected_licenses": [ "Apache-2.0" ], "directory_id": "a155dcf70be677feca19bc2af8949f0f54e56e40", "extension": "py"...
3.078125
stackv2
import datetime import time import re import json class TaxiLocation: def __init__(self, line): line = str.strip(line, '\n') splits = re.split(',', line) self.id = splits[0] timestamp = splits[1] self.timeAsDate = timestamp self.timestamp = int(time.mktime(datetime....
24
31.38
123
17
192
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_89750adbb76e74a5_2e4675f6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 20 ]
[ null ]
[ 15 ]
[ 120 ]
2024-11-19T03:22:55.710712+00:00
1,693,185,721,000
6c02fff1811251f4926392b507388517357d2604
2
{ "blob_id": "6c02fff1811251f4926392b507388517357d2604", "branch_name": "refs/heads/master", "committer_date": 1693185721000, "content_id": "902ea5506c2516ec0e3ff06cb64d5be22c6369f9", "detected_licenses": [ "MIT" ], "directory_id": "a4536c3dbca3b232d4657eafad981fdb8d58820e", "extension": "py", "fi...
2.375
stackv2
# Copyright 2019 - 2023 by Sergio Valqui. All rights reserved. # Source Class # https:// # https://ipam.illinois.edu/wapidoc/objects/network.html # https://ipam.illinois.edu/wapidoc/objects/range.html # to add a MAC to a given filter use POST # macfilteraddress?filter=filter-name&mac= import requests from requests.au...
90
39.08
96
16
841
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f6df2c416cadef7a_bc0b08ef", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
5
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-295", "CWE-295" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "HIGH", "HIGH", "HIGH", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (p...
[ 76, 81, 81, 36, 74 ]
[ null, null, null, 37, 75 ]
[ 28, 23, 41, 21, 21 ]
[ 43, 26, 63, 84, 85 ]
2024-11-19T01:34:43.752415+00:00
1,562,625,304,000
262d3533a241785477a2917b2d3245cfb73a84a5
2
{ "blob_id": "262d3533a241785477a2917b2d3245cfb73a84a5", "branch_name": "refs/heads/master", "committer_date": 1562625304000, "content_id": "080be97e578d16d87dc4955319f118c7e490e276", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "ba4d56f4a816d036915ec19a9e75029ee691f3e7", "extension": "p...
2.40625
stackv2
from __future__ import absolute_import import six import ipaddress import socket from functools32 import lru_cache from ssl import wrap_socket from six.moves.urllib.parse import urlparse from django.conf import settings from urllib3.util.connection import allowed_gai_family, _set_socket_options from sentry.exception...
138
31.69
96
15
1,014
python
[{"finding_id": "codeql_py/insecure-default-protocol_3b8310f75e3fd217_0457e218", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in...
1
true
[ "CWE-327" ]
[ "py/insecure-default-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used." ]
[ 137 ]
[ null ]
[ 16 ]
[ 33 ]
2024-11-19T02:07:58.967929+00:00
1,632,352,045,000
1d55e11e12de539f48d405c44ecfe4ff4a21d18c
3
{ "blob_id": "1d55e11e12de539f48d405c44ecfe4ff4a21d18c", "branch_name": "refs/heads/master", "committer_date": 1632352045000, "content_id": "0bd4701196b5a2c08fec476b47728a7725355366", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "b095f6e10524c69c733733f39b99e643055cb476", "extension": "p...
2.59375
stackv2
from flask import Flask, request import emoji app = Flask(__name__) @app.route('/', methods = ['GET', 'POST']) def text(): if request.method == 'GET' or request.method == 'POST': data = request.get_json(force=True) animal = data.get('animal', -1) if animal == -1: return "Bad r...
28
26.14
61
17
202
python
[{"finding_id": "codeql_py/reflective-xss_e06a35ab37953ecf_f4b3efe2", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 22 ]
[ null ]
[ 16 ]
[ 19 ]
2024-11-19T02:17:21.254561+00:00
1,651,820,351,000
2f946029a01204a595de072319e224789ce52af4
2
{ "blob_id": "2f946029a01204a595de072319e224789ce52af4", "branch_name": "refs/heads/master", "committer_date": 1651820351000, "content_id": "ac2546ddf9e72883d8d4361730f31b7b88f48b83", "detected_licenses": [ "MIT" ], "directory_id": "f45d7fb74cd87b1a764bc9b95cc0c06587fe088f", "extension": "py", "fi...
2.390625
stackv2
import urllib.request from fastapi import FastAPI from fastapi.responses import HTMLResponse, PlainTextResponse import json app = FastAPI() @app.get('/', response_class=HTMLResponse) def root(): try: return open("get_tweet.html","r").read() except: return HTMLResponse(content="internal error",...
21
29.1
93
14
147
python
[{"finding_id": "codeql_py/partial-ssrf_2ffebd5131439817_0fb64ee6", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 19 ]
[ null ]
[ 10 ]
[ 81 ]
2024-11-19T02:17:31.521225+00:00
1,619,114,014,000
d8f923107e52c850b76081943e488397faeb23e1
3
{ "blob_id": "d8f923107e52c850b76081943e488397faeb23e1", "branch_name": "refs/heads/master", "committer_date": 1619114014000, "content_id": "43a3bec9b5cc6fbb9339089a8afb2096261f6a50", "detected_licenses": [ "MIT" ], "directory_id": "7edc26a54f4b71085db5758ee15e87dfc822c372", "extension": "py", "fi...
2.921875
stackv2
from __future__ import print_function from future import standard_library standard_library.install_aliases() from os.path import exists, join import requests from .state import StateBase class HTTPError(Exception): def __init__(self, code, reason): self.code = code self.reason = reason def __...
91
31.77
86
20
594
python
[{"finding_id": "codeql_py/request-without-cert-validation_2ab5f30d9249c5ff_ca41d3db", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 42, 49 ]
[ null, null ]
[ 21, 25 ]
[ 52, 56 ]
2024-11-19T02:17:38.609201+00:00
1,570,042,406,000
8d6ef0ebdcf695bf7ad80575c7143ab977cfcbf7
3
{ "blob_id": "8d6ef0ebdcf695bf7ad80575c7143ab977cfcbf7", "branch_name": "refs/heads/master", "committer_date": 1570042406000, "content_id": "1e63c099877d9a5eb388c615c12dfffe10d173f2", "detected_licenses": [ "Apache-2.0" ], "directory_id": "5190f6586f4d1c15703a09f661f0a9aad6b1aa8b", "extension": "py"...
2.703125
stackv2
import abc import json import re import os import zipfile import wget class UnitexPBDictionary(abc.ABC): ''' Dictionary class to handle Unitex-PB dictionaries from NILC. ''' @abc.abstractmethod def __init__(self, mapping=None): self.root_path = 'dictionary/unitex' self.root_ur...
122
33.42
93
22
938
python
[{"finding_id": "codeql_py/overly-large-range_b9d483093b92a335_7c80eee1", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 111 ]
[ null ]
[ 145 ]
[ 148 ]
2024-11-19T02:18:08.398633+00:00
1,547,645,965,000
364dccdcba75ed0d51ba6020c2f3e5f86f8b16da
3
{ "blob_id": "364dccdcba75ed0d51ba6020c2f3e5f86f8b16da", "branch_name": "refs/heads/master", "committer_date": 1547645965000, "content_id": "3ad42b0835d9bd1d6c14d9575133636def565c0b", "detected_licenses": [ "MIT" ], "directory_id": "8b76dfe7bed58228ca94323f7573d641cac099ec", "extension": "py", "fi...
2.578125
stackv2
# Author: Lucas Roelser <roesler.lucas@gmail.com> # Modified from serverlesscode.com/post/ssl-expiration-alerts-with-lambda/ import datetime import fileinput import logging import os import socket import ssl import time logger = logging.getLogger('SSLVerify') def ssl_expiry_datetime(hostname: str, port: int) -> date...
28
28.04
74
11
191
python
[{"finding_id": "codeql_py/insecure-protocol_fa27dd2332935f22_756830f7", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/...
1
true
[ "CWE-327" ]
[ "py/insecure-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.create_default_context](1)." ]
[ 18 ]
[ null ]
[ 12 ]
[ 19 ]
2024-11-19T02:18:09.922427+00:00
1,546,640,122,000
89c38ba993edfee80fddb904c415c7309ddafdbe
3
{ "blob_id": "89c38ba993edfee80fddb904c415c7309ddafdbe", "branch_name": "refs/heads/master", "committer_date": 1546640122000, "content_id": "6d043e9267bb7d93ffacc517e8ea25eb23c2f03e", "detected_licenses": [ "MIT" ], "directory_id": "52e1cca9c046cc76b40d5d391f3a037f64eb91bf", "extension": "py", "fi...
2.703125
stackv2
from scapy.all import * import argparse def get_mac_addr(ip_addr): resp, _ = sr(ARP(hwdst="ff:ff:ff:ff:ff:ff", pdst=ip_addr), verbose=0) for s, r in resp: return r[ARP].hwsrc return None def send_arp_packet(gateway_ip, gateway_mac, victim_ip, victim_mac): print("[.] Packet Sending...") try...
36
30.58
112
14
303
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fb75998ce9acddbc_13d37ad6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 32, 33 ]
[ null, null ]
[ 7, 7 ]
[ 40, 38 ]
2024-11-19T02:18:14.336853+00:00
1,397,514,667,000
496436b12a00ccdb04fc5d3b2a61938786be5928
2
{ "blob_id": "496436b12a00ccdb04fc5d3b2a61938786be5928", "branch_name": "refs/heads/master", "committer_date": 1397514667000, "content_id": "90fff9acff608507378461c65e83d742c769b5ac", "detected_licenses": [ "MIT" ], "directory_id": "9a18afdf833686b063260c240a48e5194407b00e", "extension": "py", "fi...
2.34375
stackv2
from flask import Flask from flask import request from flask import session from flask import redirect from flask import render_template from jinja2 import Template from datetime import datetime from flask.ext.sqlalchemy import SQLAlchemy from flask.ext.script import Manager from flask.ext.migrate import Migrate, Migra...
321
32.29
79
16
2,340
python
[{"finding_id": "codeql_py/template-injection_7296f19a62091ab0_c8a08399", "tool_name": "codeql", "rule_id": "py/template-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This template construction depends on a [user-provided value](1).", "remediation": "", "location": ...
13
true
[ "CWE-074", "CWE-074", "CWE-079", "CWE-079", "CWE-079", "CWE-079", "CWE-079", "CWE-079", "CWE-079", "CWE-079", "CWE-079", "CWE-079", "CWE-079" ]
[ "py/template-injection", "py/template-injection", "py/jinja2/autoescape-false", "py/jinja2/autoescape-false", "py/jinja2/autoescape-false", "py/jinja2/autoescape-false", "py/jinja2/autoescape-false", "py/jinja2/autoescape-false", "py/jinja2/autoescape-false", "py/jinja2/autoescape-false", "py/ji...
[ "HIGH", "HIGH", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This template construction depends on a [user-provided value](1).", "This template construction depends on a [user-provided value](1).", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Usi...
[ 239, 242, 158, 162, 179, 182, 208, 212, 239, 242, 277, 305, 308 ]
[ null, null, null, null, null, 185, null, null, null, null, 278, null, 311 ]
[ 29, 29, 20, 20, 24, 24, 20, 20, 20, 20, 16, 24, 24 ]
[ 54, 57, 55, 58, 59, 37, 55, 58, 55, 58, 66, 59, 37 ]