added
stringlengths
32
32
created
int64
1,244B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.25
source
stringclasses
1 value
text
stringlengths
324
20.1k
num_lines
int64
16
598
avg_line_length
float64
15.1
58.3
max_line_length
int64
33
179
ast_depth
int64
8
39
length
int64
101
3.8k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.1k
265k
sast_codeql_findings_count
int64
1
45
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
45
rule_ids
listlengths
1
45
confidences
listlengths
1
45
severities
listlengths
1
45
messages
listlengths
1
45
line_starts
listlengths
1
45
line_ends
listlengths
1
45
column_starts
listlengths
1
45
column_ends
listlengths
1
45
2024-11-19T01:54:46.944693+00:00
1,691,682,979,000
3cf4d35d8fcd8899cdfcdee1d2eae8d9e0055ae6
3
{ "blob_id": "3cf4d35d8fcd8899cdfcdee1d2eae8d9e0055ae6", "branch_name": "refs/heads/maint", "committer_date": 1691682979000, "content_id": "d54b91643c8e2d5004ffda7fd2a6dc1aabb62c59", "detected_licenses": [ "BSD-3-Clause", "MIT" ], "directory_id": "76f23cc69dc10c44bc7cf00b78e37db04c7a9c45", "exte...
2.625
stackv2
## NDA AWS Token Generator ## Author: NIMH Data Archives ## http://ndar.nih.gov ## License: MIT ## https://opensource.org/licenses/MIT import binascii import hashlib import logging import xml.etree.ElementTree as etree import sys if sys.version_info[0] == 2: import urllib2 as urllib_request else...
121
30.55
89
12
838
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_631a910934060c31_a55e6d18", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expen...
[ 39 ]
[ null ]
[ 23 ]
[ 47 ]
2024-11-19T01:54:56.152867+00:00
1,691,566,580,000
da9f86b3f19f4b8db14bc92c69aff0bf65193052
3
{ "blob_id": "da9f86b3f19f4b8db14bc92c69aff0bf65193052", "branch_name": "refs/heads/master", "committer_date": 1691566580000, "content_id": "0b359a50b1ac0200430fe8605d30abb4d93450e9", "detected_licenses": [ "MIT" ], "directory_id": "691b82da7c38a6c109088d8426ffa26175f4ff31", "extension": "py", "fi...
2.75
stackv2
# -*- coding: utf-8 -*- """ 定义一些任务的执行操作,将具体的操作从tasks.py里面抽离出来 每个任务需要饮用的模块放到函数里面引用,方便单独调试函数 """ import requests def get_link_status(url): """ 请求地址,返回请求状态和内容 @param url: @return: """ try: resp = requests.get(url, timeout=5, verify=False) except Exception: return 500, ...
255
32.4
90
22
2,159
python
[{"finding_id": "codeql_py/request-without-cert-validation_1fcc7e933dc682b3_f0267f36", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 16 ]
[ null ]
[ 16 ]
[ 58 ]
2024-11-19T01:55:00.292200+00:00
1,626,602,180,000
4cc143dbe5c3ad84346deeb0ab47d8d7909a5671
3
{ "blob_id": "4cc143dbe5c3ad84346deeb0ab47d8d7909a5671", "branch_name": "refs/heads/master", "committer_date": 1626602180000, "content_id": "3c0775d90842c2982b4711dd629d2ecedba713a7", "detected_licenses": [ "Apache-2.0" ], "directory_id": "26f61d8631bce66d00d7a33029228d69083a7a9e", "extension": "py"...
2.625
stackv2
from socket import * import ssl import threading import time import re import httplib import struct import string import os import sys import socket as Socket import select class handler(threading.Thread): def __init__(self,socket, port) : threading.Thread.__init__(self) self.socket=socket ...
275
34.16
117
20
2,207
python
[{"finding_id": "codeql_py/insecure-default-protocol_054ff290e728fb8b_d1f262aa", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in...
1
true
[ "CWE-327" ]
[ "py/insecure-default-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used." ]
[ 42 ]
[ null ]
[ 20 ]
[ 41 ]
2024-11-19T01:55:03.064005+00:00
1,591,212,845,000
bce621904fde631fcdfb18678cc86d6d7cfbdb9e
3
{ "blob_id": "bce621904fde631fcdfb18678cc86d6d7cfbdb9e", "branch_name": "refs/heads/master", "committer_date": 1591212845000, "content_id": "1223fcb483eaa58c00113ba07ba720ce46c96339", "detected_licenses": [ "Unlicense" ], "directory_id": "b0f9d8fcfe5c7638b10a4c608c63c3f13cf848ee", "extension": "py",...
2.5625
stackv2
import re import operator from pprint import pprint from collections import OrderedDict from data.attrib_errors import error_dict from ordered_set import OrderedSet from tf_config import langsettings # XML RE PATTERNS commentFullRE = re.compile(r'^<!--.*?-->$') commentStartRE = re.compile(r'^<!--.*') commentStopRE ...
251
39.98
118
27
2,332
python
[{"finding_id": "codeql_py/bad-tag-filter_74fea561533991a0_f626c1e7", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression does not match comments containing newlines.", "remediation": "", "location": {"file_pat...
2
true
[ "CWE-116", "CWE-116" ]
[ "py/bad-tag-filter", "py/bad-tag-filter" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This regular expression does not match comments containing newlines.", "This regular expression does not match comments containing newlines." ]
[ 10, 12 ]
[ null, null ]
[ 32, 32 ]
[ 44, 38 ]
2024-11-19T01:55:05.676443+00:00
1,587,456,200,000
d7c864b9d839d081328447a4c1cebad91357bd00
3
{ "blob_id": "d7c864b9d839d081328447a4c1cebad91357bd00", "branch_name": "refs/heads/master", "committer_date": 1587456200000, "content_id": "6dcca9d1fb4f782f8b68dce023ee99f6059bb8aa", "detected_licenses": [ "MIT" ], "directory_id": "7b7d7be57b7ea8cb86ead21eed2e3e569967504e", "extension": "py", "fi...
3.390625
stackv2
import pyperclip import random class User: """ Class that generates instances of users. """ user_list = [] # Empty contact list def __init__(self, first_name, last_name, password): ''' __init__ method that will define properties for objects ''' self.first_name = fir...
121
28.23
110
15
688
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_04034a269b16f2b7_efd65f90", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 74 ]
[ null ]
[ 23 ]
[ 48 ]
2024-11-19T01:55:15.615974+00:00
1,579,352,807,000
c981201460e7d6370e3e2b31f272af2b7357966b
4
{ "blob_id": "c981201460e7d6370e3e2b31f272af2b7357966b", "branch_name": "refs/heads/master", "committer_date": 1579352807000, "content_id": "55b67c01a91a8b2062f2c040618162859b667ba5", "detected_licenses": [ "MIT" ], "directory_id": "58c29c0eb774ea1ba41177e4fe08a736152e0099", "extension": "py", "fi...
4.46875
stackv2
# to get current date and time # we need to use the datetime library from datetime import datetime,timedelta current_date=datetime.now() # the now function returns a datetime object print('Today is: '+str(current_date)) # timedelta is used to define a period of time one_day=timedelta(days=1) yesterday=current_date-on...
31
30.23
53
9
241
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f59ebcf14f60fac7_8bc96c51", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 27, 31 ]
[ null, null ]
[ 7, 7 ]
[ 38, 48 ]
2024-11-19T01:55:28.601143+00:00
1,605,757,181,000
3d9bd488bc7b0f5f7fb82d4b8ef7db6f6acab3d0
3
{ "blob_id": "3d9bd488bc7b0f5f7fb82d4b8ef7db6f6acab3d0", "branch_name": "refs/heads/master", "committer_date": 1605757181000, "content_id": "40e86470f3f9a931a47c0b618585a0fb42d2cb98", "detected_licenses": [ "MIT" ], "directory_id": "f0d4ba28ce781f8c8cd27e529447acac29c271db", "extension": "py", "fi...
2.546875
stackv2
#!/usr/bin/env python # coding: utf-8 # In[3]: import numpy as np import osmnx as ox, networkx as nx, geopandas as gpd, matplotlib.pyplot as plt import networkx as nx import pandas as pd from folium import plugins from folium.plugins import MarkerCluster import json import urllib.request from urllib.request import R...
103
26.04
119
16
967
python
[{"finding_id": "codeql_py/partial-ssrf_29fa70e4c2feb476_47de49dc", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depen...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depends on a [user-provided value](2)." ]
[ 44 ]
[ null ]
[ 33 ]
[ 66 ]
2024-11-19T02:06:42.640441+00:00
1,527,915,296,000
4d76d20ccabac3441134ec1b9ffe7845813917b8
3
{ "blob_id": "4d76d20ccabac3441134ec1b9ffe7845813917b8", "branch_name": "refs/heads/master", "committer_date": 1527915296000, "content_id": "a221daa40eb5f6258dfd856b1326aa5fd3d130ef", "detected_licenses": [ "Apache-2.0" ], "directory_id": "2085ed042e115bf64584ee7c6385bcbc700dc8a1", "extension": "py"...
2.90625
stackv2
from numpy import * from numpy.random import * import matplotlib.pyplot as plt import pandas as pd from .factor import * set_printoptions(linewidth=1e99) seed(0) class Book: def __init__(self, nb_contract=10): # making nb_contract = int(nb_contract) age_start = uniform(20, 60, nb_contract) gender = choice([...
79
21.8
77
16
520
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9c84eb61d7be7a4f_b59823e7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 53 ]
[ null ]
[ 19 ]
[ 30 ]
2024-11-19T02:06:56.057636+00:00
1,566,962,839,000
a5c43d9f34e259432b2b76c452c5777a8a3357c3
3
{ "blob_id": "a5c43d9f34e259432b2b76c452c5777a8a3357c3", "branch_name": "refs/heads/master", "committer_date": 1566962839000, "content_id": "f4fa3744edc716698de280fe6323425d2292345f", "detected_licenses": [ "MIT" ], "directory_id": "05f60b5fd34aa8d7306bc34cadebcc09ea6a4e36", "extension": "py", "fi...
2.703125
stackv2
import os import re from urllib.parse import urlparse from tqdm import tqdm import zipfile import tarfile import gzip import requests class Storage(): def __init__(self, root="", force=False): self.root = root if not root: self.root = os.path.join(os.path.dirname(__file__), "../data")...
96
32.89
79
18
692
python
[{"finding_id": "codeql_py/tarslip_f97782c6b0e1c0d2_9ef00e1c", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 83 ]
[ null ]
[ 17 ]
[ 18 ]
2024-11-19T02:07:06.829615+00:00
1,514,189,573,000
bce0394fd14abda8ba85c5b15d424fa5c3f7acc8
3
{ "blob_id": "bce0394fd14abda8ba85c5b15d424fa5c3f7acc8", "branch_name": "refs/heads/master", "committer_date": 1514189573000, "content_id": "c2edc69873a6095d0ffb29e265f5fe8cf5896d71", "detected_licenses": [ "MIT" ], "directory_id": "9ea53850ba6135ac6f5686c1a38a1029ebccb294", "extension": "py", "fi...
2.515625
stackv2
from __future__ import print_function from __future__ import division from PIL import Image import os.path import numpy as np import sys import multiprocessing from math import ceil import ctypes import torch.utils.data as data from torchvision.datasets.utils import download_url, check_integrity from multiprocessing im...
273
35.96
147
19
2,539
python
[{"finding_id": "codeql_py/tarslip_c1ac8a9f762487e5_905caa9b", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 250 ]
[ null ]
[ 9 ]
[ 12 ]
2024-11-19T02:07:06.939939+00:00
1,516,214,168,000
e44aaf390b2962adf6f0d95d4a69c9fde7f7c534
3
{ "blob_id": "e44aaf390b2962adf6f0d95d4a69c9fde7f7c534", "branch_name": "refs/heads/master", "committer_date": 1516214168000, "content_id": "c3a884a426aa3544cece7c7b58cb45a60fce5e2e", "detected_licenses": [ "MIT" ], "directory_id": "9580c82325a6ddf57d3f06fa4914c9d66afbd73b", "extension": "py", "fi...
3.375
stackv2
''' Python 2 Writes to three files: Login Person Clients since they're all connected Uses 2 instead of 3 because of faker library ''' import string import random from datetime import datetime from string import split from faker import Faker fake = Faker() def GetFirstName(): nameList = split(fake.name()) ...
203
20.76
71
14
1,135
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_902357cd416100f4_5180ed74", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (password)](3) as clear text.\nThis expression stores [sensitive data (password)](4) as clear text.\nThis expression stores [sensitive d...
[ 146, 164, 193 ]
[ null, null, null ]
[ 13, 13, 17 ]
[ 17, 19, 21 ]
2024-11-19T02:07:14.766647+00:00
1,547,083,732,000
67f613b48f253fd3042a1ae5b53fd8f727e0db7b
3
{ "blob_id": "67f613b48f253fd3042a1ae5b53fd8f727e0db7b", "branch_name": "refs/heads/master", "committer_date": 1547083732000, "content_id": "00256ebcfac8268cc43e1304be66dc0a595cdb34", "detected_licenses": [ "MIT" ], "directory_id": "63a9423ae09ed57bd155616b7b73d8d7c1784a8b", "extension": "py", "fi...
2.84375
stackv2
#pylint: disable=C0103,C0111,C0304 from flask import Flask, render_template, jsonify, request import sqlite3 from get_lyrics import song_lyrics_and_art from translate_words import get_translate_entry, translate from fudge_lyrics import fudge # from get_lyrics import song_id app = Flask(__name__) class Song: de...
96
24.89
89
15
600
python
[{"finding_id": "codeql_py/sql-injection_b8785e41ef39986a_4332165b", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown...
1
true
[ "CWE-089" ]
[ "py/sql-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This SQL query depends on a [user-provided value](1)." ]
[ 50 ]
[ 56 ]
[ 29 ]
[ 12 ]
2024-11-19T02:31:13.289581+00:00
1,601,755,077,000
787bcfc3e04b3a68f770a80fe0ca94e12b4613ef
2
{ "blob_id": "787bcfc3e04b3a68f770a80fe0ca94e12b4613ef", "branch_name": "refs/heads/master", "committer_date": 1601755077000, "content_id": "e606c927d8f7171daa0fa4755f21e5c1d649095b", "detected_licenses": [ "MIT" ], "directory_id": "68e6a31213d2d294f22d35c340fd82d2d2fa438b", "extension": "py", "fi...
2.40625
stackv2
# Flask などの必要なライブラリをインポートする from flask import Flask, render_template, request, redirect, url_for,make_response,jsonify import numpy as np import os from datetime import datetime import werkzeug import subprocess import glob import json import hashlib import random, string def randomname(n): randlst = [random.choic...
107
29.66
97
15
872
python
[{"finding_id": "codeql_py/command-line-injection_24bef67e886d7a5c_c40e3580", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {...
4
true
[ "CWE-078", "CWE-022", "CWE-022", "CWE-022" ]
[ "py/command-line-injection", "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This command line depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 63, 62, 83, 88 ]
[ null, null, null, null ]
[ 26, 22, 28, 26 ]
[ 29, 39, 45, 47 ]
2024-11-19T02:31:19.032861+00:00
1,356,216,375,000
4ae6b7d8359c6d4f1856d36a5979cd7ecafd72cf
2
{ "blob_id": "4ae6b7d8359c6d4f1856d36a5979cd7ecafd72cf", "branch_name": "refs/heads/master", "committer_date": 1356216375000, "content_id": "b457c625d2da694d050148be08248190f0f71eee", "detected_licenses": [ "Apache-2.0" ], "directory_id": "7a5dd0a540ef4e9d236ddb64c999fe7f0ab26ab4", "extension": "py"...
2.34375
stackv2
# Copyright 2012 Gregory Holt # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, ...
428
36.62
79
22
3,656
python
[{"finding_id": "codeql_py/insecure-default-protocol_c1b1e384becfb16a_26eba64a", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in...
3
true
[ "CWE-327", "CWE-200", "CWE-200" ]
[ "py/insecure-default-protocol", "py/bind-socket-all-network-interfaces", "py/bind-socket-all-network-interfaces" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used.", "'0.0.0.0' binds a socket to all interfaces.", "'0.0.0.0' binds a socket to all interfaces." ]
[ 229, 226, 290 ]
[ null, null, null ]
[ 24, 13, 13 ]
[ 77, 34, 34 ]
2024-11-19T02:31:36.238179+00:00
1,620,527,244,000
98791eed4ceb35518aa94af91463a3b0d324d729
2
{ "blob_id": "98791eed4ceb35518aa94af91463a3b0d324d729", "branch_name": "refs/heads/master", "committer_date": 1620527244000, "content_id": "8143a47dcff2661b58e7a99b5184b23231edb679", "detected_licenses": [ "MIT" ], "directory_id": "9508bfd5f4066a9d9277831f2c6c34cc57d803f1", "extension": "py", "fi...
2.46875
stackv2
from api.core.anime import * from api.core.proxy import AnimeProxy class K1080(AnimeSearcher): async def search(self, keyword: str): data, total_page = await self.get_one_page(keyword, 1) for item in self.parse_anime_metas(data): yield item if total_page > 1: tasks...
107
34.18
120
20
919
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_cccb7c0b04515715_ea7a6f5a", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [gtimg.com](1) may be at an arbitrary position in the s...
3
true
[ "CWE-020", "CWE-020", "CWE-020" ]
[ "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "The string [gtimg.com](1) may be at an arbitrary position in the sanitized URL.", "The string [ydstatic.com](1) may be at an arbitrary position in the sanitized URL.", "The string [byingtime.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 98, 100, 105 ]
[ null, null, null ]
[ 12, 12, 12 ]
[ 30, 33, 34 ]
2024-11-19T02:31:36.985778+00:00
1,452,700,976,000
4cdf4ce06e074e6a7489c704f82e6e36a7bb1e5a
2
{ "blob_id": "4cdf4ce06e074e6a7489c704f82e6e36a7bb1e5a", "branch_name": "refs/heads/master", "committer_date": 1452700976000, "content_id": "c286152c0f1c184e1cab291e6cd2f46145823055", "detected_licenses": [ "Apache-2.0" ], "directory_id": "c46b07e84d4859fa06da8fe36b597d0ca8106002", "extension": "py"...
2.453125
stackv2
# -*- coding: utf-8 -*- import csv import json import logging import os from flask import Flask, request, jsonify, redirect from jinja2 import Environment, PackageLoader from doc_processor import DocumentProcessor def setup_logging(): logging.basicConfig(level=logging.DEBUG, format='%(as...
97
27.07
87
16
631
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_afc78711a07ba654_e810477d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 70 ]
[ null ]
[ 11 ]
[ 51 ]
2024-11-19T02:31:48.394053+00:00
1,545,960,995,000
37a5a018db12f0dbf80163ff767301676367f36c
2
{ "blob_id": "37a5a018db12f0dbf80163ff767301676367f36c", "branch_name": "refs/heads/master", "committer_date": 1545960995000, "content_id": "06eff01829b7501bc09aaabfd6e3c07d4f610137", "detected_licenses": [ "Apache-2.0" ], "directory_id": "f7230609f47bc5e479fc1eb2c3a12f81310f565f", "extension": "py"...
2.3125
stackv2
# -*- coding: utf-8 -*- import sys import os import pickle import argparse import itertools import math import random import shutil import cv2 from tqdm import tqdm import pandas as pd import numpy as np import SimpleITK as sitk from skmultilearn.model_selection import iterative_train_test_split from skmultilearn.mode...
258
30.73
146
20
1,814
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_e54fd24a8a9bbc7d_62d02109", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.", "This expression stores [sensitive data (private)](1) as clear text." ]
[ 124, 150 ]
[ null, null ]
[ 24, 24 ]
[ 28, 28 ]
2024-11-19T02:31:58.140580+00:00
1,488,660,525,000
0e2a9b13e44d3607b8f7e79cbbec1321719320d1
3
{ "blob_id": "0e2a9b13e44d3607b8f7e79cbbec1321719320d1", "branch_name": "refs/heads/master", "committer_date": 1488660525000, "content_id": "5e187eb4306de9c3357040bff57ff19bcdb5adf9", "detected_licenses": [ "MIT" ], "directory_id": "40cb1e3d21f70fc41b7752c95e1e17bc237ded56", "extension": "py", "fi...
3.03125
stackv2
#!/usr/bin/env python import sys, os, glob from makdown2 import markdown from jinja2 import Environment, FileSystemLoader def main(): if len(sys.argv) != 3: print "Usage: %s <docs dir> <output dir>" % (sys.argv[0]) return 1 # Get a list of documents and parse their content. documents = []...
46
32.63
117
17
387
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_196b7e5a3d36c65f_261d7e83", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 37 ]
[ null ]
[ 11 ]
[ 88 ]
2024-11-19T02:32:15.338921+00:00
1,633,368,287,000
ff972c295af50b80922e8654c78b34e26edf7531
3
{ "blob_id": "ff972c295af50b80922e8654c78b34e26edf7531", "branch_name": "refs/heads/main", "committer_date": 1633368287000, "content_id": "defe73e8951002e0e068a27be48608dbabe0bdbd", "detected_licenses": [ "Apache-2.0" ], "directory_id": "fa72697feef44fdba1bf4e5c8064d25b65a6cb83", "extension": "py", ...
2.765625
stackv2
""" Ravel application abstractions """ import cmd import importlib import os import re import sys import time import tempfile import psycopg2 import sqlparse from sqlparse.tokens import Keyword import ravel.util from ravel.log import logger from ravel.cmdlog import cmdLogger def mk_watchcmd(db, args): """Constr...
334
33.65
142
19
2,594
python
[{"finding_id": "codeql_py/overly-permissive-file_9a6ba3848e100466_51ae583a", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world writable." ]
[ 48 ]
[ null ]
[ 5 ]
[ 31 ]
2024-11-19T02:32:17.817899+00:00
1,541,622,978,000
2c7dbeeadb8df7cd8d82b7b4b509211202f324c5
3
{ "blob_id": "2c7dbeeadb8df7cd8d82b7b4b509211202f324c5", "branch_name": "refs/heads/master", "committer_date": 1541622994000, "content_id": "d961002e0e47ccb4d67ec7cd643e0abfd7bfd479", "detected_licenses": [ "MIT" ], "directory_id": "88df81bd5a85138b26f5a61df78cc971571b17f2", "extension": "py", "fi...
2.59375
stackv2
#!/usr/bin/env python # # Bottle session manager. See README for full documentation. # # Written by: Sean Reifschneider <jafo@tummy.com> # # License: 3-clause BSD # Updated with JSON by Justin Winokur from __future__ import with_statement import bottle import time try: import cPickle as pickle except ImportE...
243
32.53
79
24
1,751
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_814426e85d953f87_5690752b", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (secret)](1) as clear text." ]
[ 221 ]
[ null ]
[ 30 ]
[ 36 ]
2024-11-19T02:32:40.254958+00:00
1,625,951,753,000
60d68aea94f1463b6559c03a3ca28a53d248241d
3
{ "blob_id": "60d68aea94f1463b6559c03a3ca28a53d248241d", "branch_name": "refs/heads/main", "committer_date": 1625951753000, "content_id": "adee05a5435467f9b7cbf1de1318208c03849393", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e3d6d6e8b30376a9254f7f70da8936d6e8430d89", "extension": "py", ...
2.75
stackv2
#!/usr/bin/env python3 import requests import urllib3 urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning) import json import re from ipwhois import IPWhois import ipaddress from tqdm import tqdm def get_minimum_set_ranges(ranges): ''' Purpose: For a given array of IP ranges, go through the...
152
31.04
126
26
1,110
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_d758cf193e1687af_152044f8", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'microsoft.com', so it might match m...
5
true
[ "CWE-020", "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/incomplete-hostname-regexp", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "HIGH", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'microsoft.com', so it might match more hosts than expected.", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run with...
[ 54, 53, 57, 76, 102 ]
[ null, null, null, null, null ]
[ 34, 9, 14, 9, 9 ]
[ 97, 106, 58, 81, 85 ]
2024-11-19T02:32:47.589504+00:00
1,602,199,814,000
06002acf4a7c37a567638bb26294529b6bd7e011
2
{ "blob_id": "06002acf4a7c37a567638bb26294529b6bd7e011", "branch_name": "refs/heads/master", "committer_date": 1602199814000, "content_id": "e015b3c32ef51bd92611acc978e5a37455da7a00", "detected_licenses": [ "MIT" ], "directory_id": "7ddfc4083c49291f3a4afddfe43537a896f7dd6d", "extension": "py", "fi...
2.3125
stackv2
from flask import Blueprint, render_template, redirect, url_for, request, abort, flash from flask_login import current_user, login_user, logout_user, login_required from urllib.parse import urlparse, urljoin from app.forms import LoginForm, RegisterForm, AddLicenseForm, EditLicenseForm, RemoveLicenseForm, SetupForm fro...
243
31.96
108
17
1,688
python
[{"finding_id": "codeql_py/url-redirection_f978e9f2566ab9d7_0deaffd9", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 210 ]
[ null ]
[ 29 ]
[ 68 ]
2024-11-19T02:32:48.298350+00:00
1,625,186,378,000
06bff5483f10baac3cf2e69afdcb70e2e68e18c1
3
{ "blob_id": "06bff5483f10baac3cf2e69afdcb70e2e68e18c1", "branch_name": "refs/heads/main", "committer_date": 1625186378000, "content_id": "17a0d04c79b33cc4d35d5a7c40271e8378c0d396", "detected_licenses": [ "MIT" ], "directory_id": "e7eded45940c450ea893fce1de04dcf2b46dc218", "extension": "py", "file...
2.515625
stackv2
# https://learn.adafruit.com/mqtt-in-circuitpython/circuitpython-wifi-usage # https://learn.adafruit.com/mqtt-in-circuitpython/connecting-to-a-mqtt-broker # required from adafruit_bundle: # - adafruit_requests # - adafruit_minimqtt # - adafruit_bus_device # - adafruit_register # - adafruit_si7021 import time import ssl...
85
29.25
78
12
636
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2782a3e5a2c5b089_4ad331ba", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 28, 30 ]
[ null, null ]
[ 7, 7 ]
[ 43, 43 ]
2024-11-19T02:32:58.898099+00:00
1,619,724,489,000
d484680ded022002de67f1a9861e25dd776c46e4
2
{ "blob_id": "d484680ded022002de67f1a9861e25dd776c46e4", "branch_name": "refs/heads/master", "committer_date": 1619724489000, "content_id": "bef6c7f359e4c53a6d90dda7bf62a2f8b163a2ed", "detected_licenses": [ "Apache-2.0" ], "directory_id": "61ac3b99bf55ff8b8ecf029eba8c40b23310644e", "extension": "py"...
2.5
stackv2
from flask import Flask, request, jsonify, render_template import logging import datetime as dt from typing import Dict, List from models import ( SELF_TEST_INPUT, Descriptors600Model, Word2vecModel, Descriptors3000Model, DescriptorsAllModel, DescriptorsWithTaxonomiesModel, JustTaxonomiesMo...
109
32.35
104
14
943
python
[{"finding_id": "codeql_py/stack-trace-exposure_f16c76ca8fa4db5a_0e450975", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 71 ]
[ null ]
[ 20 ]
[ 27 ]
2024-11-19T02:33:02.131772+00:00
1,692,207,092,000
16f374e03cf86bd89b3dfb7d609fb35a26de7202
2
{ "blob_id": "16f374e03cf86bd89b3dfb7d609fb35a26de7202", "branch_name": "refs/heads/master", "committer_date": 1692207092000, "content_id": "b2167557ab9894f0c504cf77e48fb86f5a2ad204", "detected_licenses": [ "Apache-2.0" ], "directory_id": "30dd4bdf3c18f3b6aa9b0c858043d61b571e2e10", "extension": "py"...
2.40625
stackv2
#!/usr/bin/env python3 from os import environ, listdir, mkdir from os.path import isdir, exists, join from shutil import copytree, make_archive, rmtree from sys import argv, exit from jinja2 import Environment, FileSystemLoader SRCDIR = '../src' DISTDIR = '../_dist' ARTIFACT_PREFIX = 'kubestack-starter-' def repla...
92
31.72
78
14
668
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_cf8e933136eb1835_02e437ed", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 16 ]
[ null ]
[ 13 ]
[ 60 ]
2024-11-19T02:33:11.157007+00:00
1,623,069,389,000
af6d7c6416d30accc682e9e5d907dac2607d56e1
3
{ "blob_id": "af6d7c6416d30accc682e9e5d907dac2607d56e1", "branch_name": "refs/heads/master", "committer_date": 1623069389000, "content_id": "fe11aeefc07b8cb78cf6f374725e8270862f5a2a", "detected_licenses": [ "MIT" ], "directory_id": "d4af15bfec86981d5a8690423c05aa09910967af", "extension": "py", "fi...
3.015625
stackv2
import base64 import random import string from Crypto.Cipher import AES class MundisCryptographerException(Exception): def __init__(self, dErrArguments): Exception.__init__(self, "Error: {0} | {1}".format( dErrArguments[0], dErrArguments[1] )) self.dErrArguments = dErrArgum...
46
29.48
86
14
360
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_aa38546e502b3e92_d92ca657", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 40, 45 ]
[ null, null ]
[ 33, 16 ]
[ 53, 54 ]
2024-11-19T02:43:26.446219+00:00
1,674,133,668,000
86e0e42ad85e1f60ae61516b1ce5119b90560fd2
2
{ "blob_id": "86e0e42ad85e1f60ae61516b1ce5119b90560fd2", "branch_name": "refs/heads/master", "committer_date": 1674133668000, "content_id": "2a28527337d34a2ad47155a618eb5ec0016c7435", "detected_licenses": [ "MIT" ], "directory_id": "8b7aeb654fb3ee738eabc0e2ad69524b4d9f857c", "extension": "py", "fi...
2.3125
stackv2
import os import threading import time import requests from altfe.interface.root import interRoot from app.lib.core.dl.model.dler import Dler requests.packages.urllib3.disable_warnings() class DlDler(Dler): def __init__(self, url, folder="./downloads/", name=None, dlArgs=Dler.TEMP_dlArgs, dlCacheDir=None, dlRe...
215
32.57
120
22
1,778
python
[{"finding_id": "codeql_py/request-without-cert-validation_8ec11482ca3adab2_e5b7f13a", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 134 ]
[ null ]
[ 23 ]
[ 121 ]
2024-11-19T02:43:30.498148+00:00
1,564,492,103,000
63fa7589e98e982bc37d5330359f8ba7c9928a09
2
{ "blob_id": "63fa7589e98e982bc37d5330359f8ba7c9928a09", "branch_name": "refs/heads/master", "committer_date": 1564492103000, "content_id": "4e9bdad57d8442de71ab1e45bf3ce6655708da9d", "detected_licenses": [ "MIT" ], "directory_id": "726ff9baca48a7db3b36ab27fc25de1ed10d5bb9", "extension": "py", "fi...
2.453125
stackv2
# # linter.py # Linter for SublimeLinter3, a code checking framework for Sublime Text 3 # # Written by Bastiaan Veelo # Copyright (c) 2016-2018 Bastiaan Veelo # # License: MIT # """This module exports the Epcomp plugin class.""" from SublimeLinter.lint import Linter, util import re import logging logger = logging.g...
96
27.06
79
13
686
python
[{"finding_id": "codeql_py/overly-large-range_f62f7b85a1ae36a0_56299565", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 80 ]
[ null ]
[ 33 ]
[ 36 ]
2024-11-19T02:43:32.340533+00:00
1,622,481,233,000
06151d447faddd036c4e2e8ab6489453ec6e16fc
3
{ "blob_id": "06151d447faddd036c4e2e8ab6489453ec6e16fc", "branch_name": "refs/heads/master", "committer_date": 1622481233000, "content_id": "22bb855b31d5cd5d1ea843703c4a2053135bc2d8", "detected_licenses": [ "MIT" ], "directory_id": "0341f6d22d598bcf43856b75d96756135b3cdffb", "extension": "py", "fi...
3.328125
stackv2
""" Program to brute-force attack an computer through ssh. From: https://null-byte.wonderhowto.com/how-to/sploit-make-ssh-brute-forcer-python-0161689/ """ import paramiko import sys import os import socket import logging DEFAULT_SSH_PORT = 22 LINE = "\n------------------------------------\n" INPUT_HOST = "[*] Ente...
119
26.19
91
18
678
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_cdfb6c202cd252a9_c5617425", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
4
true
[ "CWE-295", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/paramiko-missing-host-key-validation", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive da...
[ 59, 70, 97, 102 ]
[ null, null, null, null ]
[ 5, 22, 27, 27 ]
[ 62, 65, 34, 34 ]
2024-11-19T02:43:39.112216+00:00
1,428,644,705,000
6917cbb1d1d407ac7c397d22f9fc30fb3ed7c6e6
3
{ "blob_id": "6917cbb1d1d407ac7c397d22f9fc30fb3ed7c6e6", "branch_name": "refs/heads/master", "committer_date": 1428644705000, "content_id": "8c1c227dde6271764118bf42e155c97bef7b6fde", "detected_licenses": [ "Apache-2.0" ], "directory_id": "81fca9e543fab1967c12c6a7147e7e5c1525e552", "extension": "py"...
2.96875
stackv2
#!/usr/bin/env python import sys import argparse import json import os from jinja2 import Template def main(argv=None): """Command-line tool to apply a source context and/or OS environment variables to Jinja 2 templates. -h """ if argv is None: argv = sys.argv parser = argparse.ArgumentPa...
37
37.35
150
16
299
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_5948b14cf5d36e5c_cd7bafa7", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 29 ]
[ null ]
[ 20 ]
[ 45 ]
2024-11-19T02:43:39.980835+00:00
1,568,670,754,000
b68ac3d1e8e3bfa216d689776eaf763d0b678844
3
{ "blob_id": "b68ac3d1e8e3bfa216d689776eaf763d0b678844", "branch_name": "refs/heads/master", "committer_date": 1568670754000, "content_id": "0f05441f97f8ee1cae582ca7c2e38edc5dc9deb2", "detected_licenses": [ "Apache-2.0" ], "directory_id": "362e8a29e503fa48f34548fa23da7060ab1e961d", "extension": "py"...
2.6875
stackv2
import re from lib.modules.IndicatorModule import * class Module(IndicatorModule): def __init__(self, name, event_json): super().__init__(name=name, event_json=event_json) def run(self): self.logger.debug('Running the {} indicator module'.format(self.name)) for i in self.event_json[...
23
43.26
131
21
226
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_ffd9ee5c0f97d930_a8f44616", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [dropbox.com](1) may be at an arbitrary position in the...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "The string [dropbox.com](1) may be at an arbitrary position in the sanitized URL.", "The string [dropbox.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 17, 17 ]
[ null, null ]
[ 20, 55 ]
[ 47, 73 ]
2024-11-19T02:43:41.269346+00:00
1,588,404,460,000
5f7c6e532675b341f3a29e43e5500f1890048ff7
2
{ "blob_id": "5f7c6e532675b341f3a29e43e5500f1890048ff7", "branch_name": "refs/heads/master", "committer_date": 1588404460000, "content_id": "0cd94dd7eda950c46288c05adc7bc23f2c9bfeaf", "detected_licenses": [ "MIT" ], "directory_id": "9cd7bfe4b9b772c34c7cda0344f1d0d9fa9566f7", "extension": "py", "fi...
2.484375
stackv2
""" This is a quick and dirty way to get a nice list of rankings for movies using the Open Movie Database API. You can provide either a list of movies, or point the script at a folder. It will do a half-way-decent job of trying to clean up the file names for submission. On a failed submit, the movie will have a score o...
272
35.48
151
23
2,072
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_af175217568f92c6_6d642f85", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 184 ]
[ null ]
[ 39 ]
[ 62 ]
2024-11-19T02:43:41.327359+00:00
1,591,479,692,000
d7d2217de6c2ef858f224e2f1231b0f0424f1baf
3
{ "blob_id": "d7d2217de6c2ef858f224e2f1231b0f0424f1baf", "branch_name": "refs/heads/master", "committer_date": 1591479692000, "content_id": "1b1d3bdec256063348b4229d128eba45dc5fdcfa", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "8540aa90255a544d084a6d54ea25d641fe06c145", "extension": "p...
2.984375
stackv2
from threading import Thread import os import collections import queue import paramiko from getpass import getpass import time print("Modules are imported successfully") class deviceCommand(): def __init__(self, command, waitingTimeToGetOutput = 5): self.command = command self.commandOutput = "u...
145
37.48
169
19
1,236
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_feee755165cc3750_d5fb76cb", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 35 ]
[ null ]
[ 17 ]
[ 86 ]
2024-11-19T02:43:41.596235+00:00
1,587,073,228,000
6c24973a28241766190a2574269b8750c314096e
3
{ "blob_id": "6c24973a28241766190a2574269b8750c314096e", "branch_name": "refs/heads/master", "committer_date": 1587073228000, "content_id": "27efba1a2739f93d773d3fe8065bed31c9aa7906", "detected_licenses": [ "MIT" ], "directory_id": "ca00924df51213990efe21449be98f73680ea9a9", "extension": "py", "fi...
2.84375
stackv2
from django.db import models from django.urls import reverse __author__ = 'brleinad' import re import json import os import requests import ipinfo from . import defaults """ # TODO: Give the output in JSON # TODO: Error handling: MP API not working, no routes near location, etc # TODO: add weather fo...
340
30.25
135
17
2,452
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_79dffe69c921107e_bef31440", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 252, 253, 254 ]
[ null, null, null ]
[ 15, 15, 15 ]
[ 52, 45, 46 ]
2024-11-19T02:55:03.768248+00:00
1,622,574,258,000
0a4b30b21d9f3f83789a4779ab2ab595e39a0b37
2
{ "blob_id": "0a4b30b21d9f3f83789a4779ab2ab595e39a0b37", "branch_name": "refs/heads/main", "committer_date": 1622574258000, "content_id": "e823f4da2864718470511eefcf87e477cb23db6e", "detected_licenses": [ "Apache-2.0" ], "directory_id": "07d8d2cb1b74ac7d539d8e08acf3a39ab5756719", "extension": "py", ...
2.34375
stackv2
#!/usr/bin/env python3 # Written by Jon S. Nelson, jnelson@carbonblack.com (C) 2020 # This script is a POC to show off the Live Query API, and has # essentially implemented query packs. # # This script cannot be run by itself, and you should just leverage # the container that sets up everything for you. ##########...
276
30.22
118
18
2,204
python
[{"finding_id": "codeql_py/path-injection_cf8838fc2f8031c8_fe5af8e9", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
5
true
[ "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 160, 163, 169, 171, 231 ]
[ null, null, null, null, null ]
[ 27, 25, 15, 19, 28 ]
[ 52, 50, 20, 27, 32 ]
2024-11-19T02:55:16.748279+00:00
1,578,436,380,000
b6d25287ab5f9f54cf99d5e44a7655fccd2b0c80
2
{ "blob_id": "b6d25287ab5f9f54cf99d5e44a7655fccd2b0c80", "branch_name": "refs/heads/master", "committer_date": 1578436380000, "content_id": "6ca3dae635a5f6486f26f89970f2974a453cd65e", "detected_licenses": [ "MIT" ], "directory_id": "a8a1865b9e5ffbe347a47e62ba0b7f6e1947ce5e", "extension": "py", "fi...
2.328125
stackv2
#!flask/bin/python from flask import Flask #from Flask_cors import Flask_cors app = Flask(__name__, static_url_path='', static_folder='.') #pp= Flask(__name__) #CORS(app) @app.route('/') def index(): return "Hello, World!, Johhny" @app.route('/empl/<int:id>') def getEmply(id): return "you want book with "+ s...
18
20
60
9
102
python
[{"finding_id": "codeql_py/flask-debug_a04eeb062b47c162_14fbfab3", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 18, 15 ]
[ null, null ]
[ 5, 12 ]
[ 24, 42 ]
2024-11-19T02:55:20.270138+00:00
1,358,900,631,000
36e112c96f18ac46a9978ef1ecbc4085c4657e22
3
{ "blob_id": "36e112c96f18ac46a9978ef1ecbc4085c4657e22", "branch_name": "refs/heads/master", "committer_date": 1358900631000, "content_id": "fe06886011a041c419fd1efa55d9317e6ce40929", "detected_licenses": [ "MIT" ], "directory_id": "72bef212057cefc3c84cc035d722d5f1bc2688e6", "extension": "py", "fi...
3.265625
stackv2
""" brining.py Provides inplace augmentation of python classes with automated Python to Json, and Json to Python object mapping via either class decorator or inherited mixin class. This also supports nested augmented or 'brined' objects Optional hinting is also provided via a Python class name ...
478
31.47
91
18
3,469
python
[{"finding_id": "codeql_py/overly-permissive-file_7c02637add4fc2dd_b955d9a0", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in open sets file to world readable.", "remediation": "", "location": {...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in open sets file to world readable." ]
[ 367 ]
[ null ]
[ 17 ]
[ 76 ]
2024-11-19T02:55:44.129712+00:00
1,685,389,282,000
601cb25ed097ee07a9016db902b77c3bb8aac773
3
{ "blob_id": "601cb25ed097ee07a9016db902b77c3bb8aac773", "branch_name": "refs/heads/master", "committer_date": 1685389282000, "content_id": "20fd3706ec008044c871be52b3759ff71b81d93d", "detected_licenses": [ "MIT" ], "directory_id": "58075d7b7182c12852ebf522ccbff3a8136213c8", "extension": "py", "fi...
2.796875
stackv2
#!/usr/bin/env python3 # import re import os class Object(): def __init__(self): self.properties = dict() pass def parse(self,ss): self.ss = ss def property(self,key,val=None): if(key in self.properties): if(val): self.properties[key] = cal ...
226
20.62
86
17
1,140
python
[{"finding_id": "codeql_py/redos_2e6d23124de1b5e3_32f97a9a", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '\"' and containing many repetitio...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '\"' and containing many repetitions of '\\\\!'." ]
[ 84 ]
[ null ]
[ 51 ]
[ 64 ]
2024-11-19T03:10:19.617639+00:00
1,688,035,442,000
4d08f418d5d9451346b236a57d9ef67253d9bbfb
3
{ "blob_id": "4d08f418d5d9451346b236a57d9ef67253d9bbfb", "branch_name": "refs/heads/master", "committer_date": 1688035442000, "content_id": "50ca4496dfb63b1cb23c72bb8af0ca1f0abbee36", "detected_licenses": [ "Apache-2.0" ], "directory_id": "cb5e707b5555b844603477b5eeecedc6aaf77a84", "extension": "py"...
2.609375
stackv2
# This is taken from aws-transfer-custom-idp-secrets-manger-apig.template.yml CloudFormation Template. # Modified to allow configuration of SSM base path import os import json import boto3 import base64 from botocore.exceptions import ClientError secret_base_path = os.getenv("SECRET_BASE_PATH", "SFTP/") def lambda_h...
101
38.07
147
16
857
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_97b6b4bc3c8114c8_a55a308f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 85 ]
[ null ]
[ 11 ]
[ 46 ]
2024-11-19T03:10:33.738228+00:00
1,606,561,859,000
339e1cb25211a75543d956392014d17db76e8978
3
{ "blob_id": "339e1cb25211a75543d956392014d17db76e8978", "branch_name": "refs/heads/master", "committer_date": 1606561859000, "content_id": "efbe1adb90218a626c11a753162612fed8defd8c", "detected_licenses": [ "Apache-2.0" ], "directory_id": "81741787c8355591a38f3105d79e14c06d121a46", "extension": "py"...
2.671875
stackv2
import paramiko ssh_clients = {} class SSHClient(): def __init__(self, ssh_credentials): self.ssh_credentials = ssh_credentials def create_client(self, ip_address, timeout=None): ssh_client = paramiko.SSHClient() ssh_client.set_missing_host_key_policy(paramiko.AutoAddPolicy()) ...
63
33.05
85
16
441
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_77b6ccfc501a91b8_b1a664d1", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 13 ]
[ null ]
[ 9 ]
[ 73 ]
2024-11-19T03:10:56.035504+00:00
1,611,747,481,000
192ad7687ed3e9b6f362b855623cf39d6861be73
2
{ "blob_id": "192ad7687ed3e9b6f362b855623cf39d6861be73", "branch_name": "refs/heads/main", "committer_date": 1611747481000, "content_id": "7aab5945f393fa5b467535a4ba8a8e321a95fa32", "detected_licenses": [ "MIT" ], "directory_id": "987c9aebc8d8354671e74cd4f5dabce037053752", "extension": "py", "file...
2.5
stackv2
# coding: utf-8 import os import sys import json from dotenv import load_dotenv import base64 import hashlib import hmac from flask import Flask, request, abort from linebot import ( LineBotApi ) from linebot.exceptions import ( InvalidSignatureError ) from linebot.models import ( TextSendMessage, ) app...
88
23.82
76
16
567
python
[{"finding_id": "codeql_py/flask-debug_103ff2b4f940ab52_597902f0", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-117" ]
[ "py/flask-debug", "py/log-injection" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This log entry depends on a [user-provided value](1)." ]
[ 88, 60 ]
[ null, null ]
[ 5, 21 ]
[ 53, 44 ]
2024-11-19T03:21:49.492539+00:00
1,587,103,879,000
14946e8ef9e2ff3ce6ccf24258cd7806b4bfcde6
2
{ "blob_id": "14946e8ef9e2ff3ce6ccf24258cd7806b4bfcde6", "branch_name": "refs/heads/master", "committer_date": 1587103879000, "content_id": "0b0fce0a5074f8ab40e3cca557c2824fba2d0b51", "detected_licenses": [ "MIT" ], "directory_id": "9303827c475fa510670e5238d465bc98eb98216b", "extension": "py", "fi...
2.375
stackv2
from selenium import webdriver from selenium.webdriver.chrome.options import Options from PIL import Image from jinja2 import Markup, Environment from markdown import markdown from base64 import b64encode from sys import platform import io import os import logging import requests import zipfile import fire from pkg_res...
242
29.11
97
19
1,601
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_7b606c5408dce705_3f980f5e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 133 ]
[ null ]
[ 11 ]
[ 24 ]
2024-11-19T03:21:52.722894+00:00
1,517,963,551,000
26046548807ac4d2f78ca6a79fbc256a95777226
2
{ "blob_id": "26046548807ac4d2f78ca6a79fbc256a95777226", "branch_name": "refs/heads/master", "committer_date": 1517963551000, "content_id": "ebaf4242dbec461a67f82c290cd94feb560de2d3", "detected_licenses": [ "MIT" ], "directory_id": "4eeafb73b40d1bd79c6e0e88566178f873263a2a", "extension": "py", "fi...
2.40625
stackv2
from contextlib import contextmanager import fire import subprocess from influxdb import InfluxDBClient, DataFrameClient import logging from gpumon.nvidia_dmon import nvidia_run_dmon_poll from gpumon.influxdb_interface import create_influxdb_writer logging.basicConfig(level=logging.INFO) logger = logging.getLogger(__...
127
32.67
112
14
867
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_499c5eedc510a3e4_96d51e1d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 57, 110 ]
[ null, null ]
[ 17, 21 ]
[ 29, 112 ]
2024-11-19T03:22:04.936275+00:00
1,618,317,418,000
6927fc328b1153f1792d16f8be93e2b294883a4e
3
{ "blob_id": "6927fc328b1153f1792d16f8be93e2b294883a4e", "branch_name": "refs/heads/master", "committer_date": 1618317418000, "content_id": "71c812b6312bdb2e520e59b6957d1a130e21e48a", "detected_licenses": [ "MIT" ], "directory_id": "feac862f76780add20bde84c17096796b735e899", "extension": "py", "fi...
3.25
stackv2
import pyperclip from user_details import User, Details def new_user(fname,lname,password): ''' create new user ''' n_user = User(fname,lname,password) return n_user def save_user(user): ''' save new user account ''' User.save_user_details(user) def verify_user(fname,password): ...
164
33.48
154
27
1,052
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7845dcaae59ced32_fc4f58c7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (p...
[ 76, 127, 135 ]
[ null, null, null ]
[ 19, 31, 39 ]
[ 89, 117, 154 ]
2024-11-19T03:22:06.838917+00:00
1,589,723,107,000
15ba340291230bf6f9befd992259ee108543982a
2
{ "blob_id": "15ba340291230bf6f9befd992259ee108543982a", "branch_name": "refs/heads/master", "committer_date": 1589723107000, "content_id": "c18a26002d63a98d150287d0935296f26ab46f4c", "detected_licenses": [ "MIT" ], "directory_id": "aa17c8067ee7e4b032d41ecb5181aad0db59a2b4", "extension": "py", "fi...
2.40625
stackv2
import BaseHTTPServer import logging import os import SocketServer import ssl from powergslb.server.http.handler import HTTPRequestHandler import powergslb.system __all__ = ['HTTPServerThread', 'ThreadingHTTPServer'] class HTTPServerThread(powergslb.system.AbstractThread): """ PowerGSLB server thread "...
46
32.52
113
14
338
python
[{"finding_id": "codeql_py/insecure-default-protocol_3a1b22ca204ddb38_1cee96ee", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in...
1
true
[ "CWE-327" ]
[ "py/insecure-default-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used." ]
[ 35 ]
[ 36 ]
[ 34 ]
[ 114 ]
2024-11-19T03:22:07.042263+00:00
1,619,104,956,000
42880350a9fc7cff5c9b3bce07baa47bfa0a202d
3
{ "blob_id": "42880350a9fc7cff5c9b3bce07baa47bfa0a202d", "branch_name": "refs/heads/master", "committer_date": 1619104956000, "content_id": "f7a7019cc3ef4786d37e6bf1c473ecc3afb90c76", "detected_licenses": [ "MIT" ], "directory_id": "e0e3691fa789d0089922fa82a32675242a0aa424", "extension": "py", "fi...
2.734375
stackv2
import paramiko as pmk username = raw_input("Username: ") password = raw_input("Password: ") hostnames = ["hostname1","hostname2","hostname3"] commands = ["hostname","nproc","ps aux","exit"] client = pmk.SSHClient() client.set_missing_host_key_policy(pmk.AutoAddPolicy()) for hostname in hostnames: try: ...
37
28.03
79
20
235
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_882f96b442f2c04f_60922c8e", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 13 ]
[ null ]
[ null ]
[ 56 ]
2024-11-19T03:22:21.587090+00:00
1,688,333,341,000
c3e196ad0c756ee449339ae9f34086ea557beaf4
3
{ "blob_id": "c3e196ad0c756ee449339ae9f34086ea557beaf4", "branch_name": "refs/heads/master", "committer_date": 1688333341000, "content_id": "e190eb4abe4c396319f3c1017a592e46b2403762", "detected_licenses": [ "MIT" ], "directory_id": "b706ea1c20606c9e32742f6a356afffa32368674", "extension": "py", "fi...
2.78125
stackv2
""" Create a json file for displaying family as a javascript zoomable sunburst. Direction can be ancestors or descendants. Colors can be plain, gender, or 6 levels. The "6 levels" is a research concept from Yvette Hoitink https://www.dutchgenealogy.nl/six-levels-ancestral-profiles/ The 6 level values should be stored ...
439
30.19
116
19
3,647
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a1315978d080a164_e8f9907b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 281, 376, 376 ]
[ null, null, null ]
[ 12, 15, 21 ]
[ 52, 19, 32 ]
2024-11-19T03:43:57.116748+00:00
1,642,295,364,000
32ad34df571945b96f0fd753509bc309021fe538
2
{ "blob_id": "32ad34df571945b96f0fd753509bc309021fe538", "branch_name": "refs/heads/master", "committer_date": 1642295364000, "content_id": "e826b2dad4ca7269e4392bb685996a5871df16e8", "detected_licenses": [ "MIT" ], "directory_id": "b86af7b533294f141d90053a611e4957db046961", "extension": "py", "fi...
2.375
stackv2
# ---------------------------------------------------------------------------- # - Open3D: www.open3d.org - # ---------------------------------------------------------------------------- # The MIT License (MIT) # # Copyright (c) 2018-2021 www.open3d.org # # Permission i...
262
32.21
85
19
2,304
python
[{"finding_id": "codeql_py/tarslip_9c4523258e3dbac8_01885ad6", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 190 ]
[ null ]
[ 13 ]
[ 16 ]
2024-11-19T03:44:29.413356+00:00
1,560,267,660,000
29d1aa6479886c6cfe8cecc05994076eb1909fe8
3
{ "blob_id": "29d1aa6479886c6cfe8cecc05994076eb1909fe8", "branch_name": "refs/heads/master", "committer_date": 1560267660000, "content_id": "919b7b625a34863cf890bc08343500f8d6273ee7", "detected_licenses": [ "Apache-2.0" ], "directory_id": "82a5a74e3ba67aecb0525aa01f3a2bec26c78522", "extension": "py"...
2.59375
stackv2
""" manage.py Tool that you use to Access the Database and the Backend """ from pobarajpomosh import create_app, db, socketio from pobarajpomosh.auth.models import Role, User from pobarajpomosh.posts.models import Post, Comment from pobarajpomosh.volunteers.models import MessageCounter, ChatSessionsCounter from pobara...
108
26.35
107
15
681
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4044ed8d60fad95e_9e57bcf1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 52, 66 ]
[ null, null ]
[ 11, 11 ]
[ 87, 93 ]
2024-11-19T01:44:04.274487+00:00
1,563,364,248,000
9c37ce7351c1444ce3374ec0059e75616befd917
2
{ "blob_id": "9c37ce7351c1444ce3374ec0059e75616befd917", "branch_name": "refs/heads/master", "committer_date": 1563364248000, "content_id": "92e289c470d8b29844c1188c02944c6c675e3564", "detected_licenses": [ "Apache-2.0" ], "directory_id": "d09d94cd96cd4c6dcc9642573ef8ff1d4d549545", "extension": "py"...
2.375
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- import copy import json import logging import time from datetime import datetime, timedelta, date import requests from helpers.entity_api_consumer import get_description_entities api_version = 2 api_key='###############################' def get_categories(): resp =...
172
34.91
140
19
1,454
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_351aab08a62de165_f9cd4660", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
7
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.", "This expression stores [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [s...
[ 161, 166, 22, 38, 58, 92, 113 ]
[ null, null, null, null, null, null, null ]
[ 34, 38, 20, 22, 30, 22, 30 ]
[ 61, 65, 70, 25, 118, 25, 112 ]
2024-11-19T01:44:07.165063+00:00
1,618,826,746,000
1dde560e9e613fdafde410458ed663c5ac87cfe2
3
{ "blob_id": "1dde560e9e613fdafde410458ed663c5ac87cfe2", "branch_name": "refs/heads/main", "committer_date": 1618826746000, "content_id": "70c402e9c664593be38797d5700de97a93baeda3", "detected_licenses": [ "MIT" ], "directory_id": "cff574502201553b7c19ce5895d96f4dcf409f2b", "extension": "py", "file...
3.140625
stackv2
""" A module to perform IP to hostname resolution of network device, utilizing Cisco DNA Center platform Northbound API (Intent). """ import re import time from ipaddress import IPv4Address from ipaddress import AddressValueError import requests from requests.auth import HTTPBasicAuth class DNACHandler(): """ ...
131
31.01
85
20
848
python
[{"finding_id": "codeql_py/request-without-cert-validation_90d4e4a9d733e740_99e1d3a4", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 31, 55 ]
[ 32, null ]
[ 24, 28 ]
[ 50, 76 ]
2024-11-19T02:08:20.477759+00:00
1,621,457,805,000
bb0c4c3d9838530d2e505dbd38657a6090cba952
3
{ "blob_id": "bb0c4c3d9838530d2e505dbd38657a6090cba952", "branch_name": "refs/heads/master", "committer_date": 1621457805000, "content_id": "1f9cc46e4cf8674269b4e9830d730021a6775040", "detected_licenses": [ "Apache-2.0" ], "directory_id": "8fe886aad50a804d09c576f4b009d8b314ab8122", "extension": "py"...
2.578125
stackv2
import os import shutil import yaml from typing import Dict, TextIO, List from base64 import b64decode import json import k8s_request_data def clean_nones(value: Dict) -> Dict: """ Recursively remove all None values from dictionaries and lists, and returns the result as a new dictionary or list. """ ...
125
32.2
87
20
987
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_2d9dcd434b300c85_9b5277d0", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (secret)](1) as clear text." ]
[ 87 ]
[ null ]
[ 36 ]
[ 87 ]
2024-11-19T02:21:32.617105+00:00
1,508,870,692,000
1fee950bdc12f1493e520dd3bb8cc6fd3ea3db9f
3
{ "blob_id": "1fee950bdc12f1493e520dd3bb8cc6fd3ea3db9f", "branch_name": "refs/heads/master", "committer_date": 1508870692000, "content_id": "82d489d7160cb27c5fb25c2d821c5921fed479bc", "detected_licenses": [ "Apache-2.0" ], "directory_id": "cd6e804095ea16a65c11eadc17c94dc899ba974f", "extension": "py"...
2.515625
stackv2
# coding: utf-8 import warnings import os from flask import Flask, request from subprocess import call import chatbot import messenger app = Flask(__name__) FACEBOOK_TOKEN = "page token generated on messenger page of facebook app dashboard" bot = None @app.route('/', methods=['GET']) def verify(): if request.ar...
53
33.92
101
15
443
python
[{"finding_id": "codeql_py/flask-debug_33d32a5dfddabb85_e5409239", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 53, 18 ]
[ null, null ]
[ 5, 16 ]
[ 35, 53 ]
2024-11-19T02:21:38.066846+00:00
1,586,745,483,000
0521d4001186e8f1f6c1b7bc4b45eec3cc8576b2
2
{ "blob_id": "0521d4001186e8f1f6c1b7bc4b45eec3cc8576b2", "branch_name": "refs/heads/master", "committer_date": 1586745483000, "content_id": "f85f2cf9ba94e525fb46062cadf7e80add94a0e4", "detected_licenses": [ "MIT" ], "directory_id": "b0994d40e48bf5940d3c2a8d4a9a2c319a18786f", "extension": "py", "fi...
2.375
stackv2
import json import re import time import uuid import shortuuid from django.http import HttpResponse, JsonResponse from rest_framework.views import APIView import pymongo import pymysql class Data: def __init__(self, request): self.header = request.META self.request = request.data params = {}...
192
35.2
108
20
1,752
python
[{"finding_id": "codeql_py/stack-trace-exposure_b37fab73ce2e129a_77d6973f", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
3
true
[ "CWE-209", "CWE-209", "CWE-079" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability due to a [user-...
[ 179, 180, 176 ]
[ null, null, null ]
[ 33, 29, 33 ]
[ 36, 32, 61 ]
2024-11-19T02:58:16.223153+00:00
1,419,583,884,000
2e2732170862f146843587537bae8501b6287dec
4
{ "blob_id": "2e2732170862f146843587537bae8501b6287dec", "branch_name": "refs/heads/master", "committer_date": 1419583884000, "content_id": "5b9aca0f3ed16a8295671c596374af4af3d89953", "detected_licenses": [ "MIT" ], "directory_id": "1df8e2971d799814ecaa576cd9918c2617ad2f30", "extension": "py", "fi...
3.515625
stackv2
# -*- coding: utf-8 -*- import hashlib, uuid # 对密码进行加密 # password 是密码明文 # salt 是随即字符串 # algo 是不同的加密算法 def hash_password(password, salt=None, algo=0): # 设置 salt if salt is None: salt = uuid.uuid4().hex # 根据不同的 algo 调用不同的加密算法 if algo==0: hash_object = hashlib.md5(password + salt) elif algo==1: hash_object = ha...
35
24.94
47
12
284
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_69801030ff76e017_a506827d", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
5
true
[ "CWE-327", "CWE-327", "CWE-327", "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi...
[ 13, 15, 17, 19, 21 ]
[ null, null, null, null, null ]
[ 29, 30, 32, 32, 32 ]
[ 44, 45, 47, 47, 47 ]
2024-11-19T03:10:01.993330+00:00
1,523,028,792,000
57ac9406143b299120a5cca0b52e67aa92e12f70
3
{ "blob_id": "57ac9406143b299120a5cca0b52e67aa92e12f70", "branch_name": "refs/heads/master", "committer_date": 1523028792000, "content_id": "5081d21358655412a4c9cff819c378ed69f41d8d", "detected_licenses": [ "Apache-2.0" ], "directory_id": "3fb658810d383fc4e83c09ac005bb77f9d6af068", "extension": "py"...
2.5625
stackv2
""" Copyright (C) 2013-2018 Calliope contributors listed in AUTHORS. Licensed under the Apache 2.0 License (see LICENSE file). plotting.py ~~~~~~~~~~~ Functionality to plot model data. """ import os import re import plotly.offline as pltly import jinja2 from calliope.analysis.plotting.capacity import plot_capacit...
126
28.01
79
14
879
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_1595280aaae849a5_26df8a5e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 49 ]
[ null ]
[ 25 ]
[ 50 ]
2024-11-19T03:10:36.608054+00:00
1,509,961,243,000
1bb0e4cc5da8af6f20595d0abaa36f7717eaa757
2
{ "blob_id": "1bb0e4cc5da8af6f20595d0abaa36f7717eaa757", "branch_name": "refs/heads/master", "committer_date": 1509961243000, "content_id": "d8907660a609315642b29957197a80256e8f4901", "detected_licenses": [ "Apache-2.0" ], "directory_id": "8da0c6b88f6de10c5680a97ed6d7b4cb8d087ed9", "extension": "py"...
2.46875
stackv2
# -*- coding: utf-8 -*- import sys import json import pip._vendor.requests as requests from flask import Flask, request, session from dbhelper import DBHelper from url_constants import UrlConstants from url_constants import EnvConstants from log_status import StatusType from watson_analyser import WatsonAnalyzer from ...
133
37.88
119
22
1,094
python
[{"finding_id": "codeql_py/flask-debug_392bd41e474a1db7_c9ba01f0", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 133, 26 ]
[ null, null ]
[ 5, 16 ]
[ 24, 50 ]
2024-11-19T03:22:32.408968+00:00
1,671,296,432,000
db824c8e9ffeadb89e45d9a0fdceac11f6f54445
2
{ "blob_id": "db824c8e9ffeadb89e45d9a0fdceac11f6f54445", "branch_name": "refs/heads/master", "committer_date": 1671296432000, "content_id": "51995acd0c1382e5d061d47d74371f9029dfecbe", "detected_licenses": [ "Apache-2.0" ], "directory_id": "1cd6e354bd77538aad35f530de74cf4c97a62fa3", "extension": "py"...
2.328125
stackv2
import argparse import os import stat import shutil import gzip import json import re import io DEFAULT_EXCLUDE_EXTENSIONS = [".map"] class Main: def __init__(self, args): self.args = args self.total_src_size = 0 self.total_dst_size = 0 def log(self, *params): if self.args.ve...
204
35.46
99
25
1,629
python
[{"finding_id": "codeql_py/bad-tag-filter_8e52d67bfabb73ad_ea418c4b", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression does not match upper case <SCRIPT> tags.", "remediation": "", "location": {"file_path": ...
1
true
[ "CWE-116" ]
[ "py/bad-tag-filter" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression does not match upper case <SCRIPT> tags." ]
[ 33 ]
[ null ]
[ 32 ]
[ 61 ]
2024-11-19T03:22:33.188220+00:00
1,647,949,026,000
7b8031d3cbda4435e4a45c2db16982de1c1af00d
3
{ "blob_id": "7b8031d3cbda4435e4a45c2db16982de1c1af00d", "branch_name": "refs/heads/master", "committer_date": 1647949026000, "content_id": "8622b3e0c7f7f092169f23e85f9646da92c71f06", "detected_licenses": [ "Apache-2.0" ], "directory_id": "95506c75d782b6e3d3f957416ec8d0fdc87bba00", "extension": "py"...
2.65625
stackv2
""" Classes for Authenticating and Interrogating Platform9 Management Plane Tested with python 2.7 and 3.7.0 on OSX and Ubuntu 16.04 and 18.04 Maintainer: tom.christopoulos@platform9.com """ import re import requests import urllib3 from ..exceptions import UserAuthFailure from ..exceptions import DUCommFailure from .....
146
45.9
100
23
1,392
python
[{"finding_id": "codeql_py/request-without-cert-validation_29c836de06674875_908be973", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 116, 130 ]
[ 118, null ]
[ 37, 38 ]
[ 66, 96 ]
2024-11-19T03:22:35.502795+00:00
1,634,394,922,000
544737a782b18263a9aad2e0325c5cfbc62196bd
3
{ "blob_id": "544737a782b18263a9aad2e0325c5cfbc62196bd", "branch_name": "refs/heads/master", "committer_date": 1634394922000, "content_id": "b06331670d5d23c01dacb1234d2148e40e49ace5", "detected_licenses": [ "MIT" ], "directory_id": "2a0b58049fec0cca5a8ce2605e7970ea57a375cc", "extension": "py", "fi...
2.59375
stackv2
from flask import render_template, url_for , flash , redirect, request, abort from flaskblog.forms import RegistrationForm , LoginForm , PostForm from flaskblog import app,db,bcrypt from flaskblog.models import User, Post from flask_login import login_user, current_user,logout_user ,login_required @app.route("/") @ap...
124
33.44
110
16
953
python
[{"finding_id": "codeql_py/url-redirection_cd20d433af6d2e52_8ebc17a5", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 48 ]
[ null ]
[ 29 ]
[ 38 ]
2024-11-19T03:22:41.132575+00:00
1,514,953,869,000
bebed04316caa64bac2722f763c8db76eeb529e6
2
{ "blob_id": "bebed04316caa64bac2722f763c8db76eeb529e6", "branch_name": "refs/heads/master", "committer_date": 1514953869000, "content_id": "6c307f3cd44ab28f12d4ba546789aa207b41f416", "detected_licenses": [ "Apache-2.0" ], "directory_id": "ee3fd0dc8c7c09a304765fe13f65fd1da81f5af0", "extension": "py"...
2.421875
stackv2
# -*- coding: utf-8 -*- import os import subprocess DEVNULL = open(os.devnull, 'w') PEER_SETTING_DIR = '/etc/ppp/peers/' def find_active_pptp_connection(): fd = subprocess.Popen("ps -ax | grep '/usr/sbin/pppd call'", shell=True, stdout=subprocess.PIPE) tunnel_dict = {} for line in fd.stdout.readlines...
243
29.02
107
18
1,564
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_1420468d4fa16700_a83def1a", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 141 ]
[ null ]
[ 37 ]
[ 54 ]
2024-11-19T03:22:43.651737+00:00
1,562,316,729,000
c5828b00ebe1b465d28a4d9f5d40e357873de494
3
{ "blob_id": "c5828b00ebe1b465d28a4d9f5d40e357873de494", "branch_name": "refs/heads/master", "committer_date": 1562316729000, "content_id": "4a008f6bca8ca47c26ec717fb1b7ebc477554e59", "detected_licenses": [ "MIT" ], "directory_id": "5e7100cffde0c5b7119c97f14e92295e8b4a1d4b", "extension": "py", "fi...
2.53125
stackv2
import sys import re import urllib2, urlparse, gzip from StringIO import StringIO from HTMLParser import HTMLParser # The script generates a list of the PDB-IDs together with the Pfam- and InterPro-IDs # Executio: python pdbListFamGO.py pdblist_AB class SmartRedirectHandler(urllib2.HTTPRedirectHandler): def http...
106
26.58
86
19
826
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_c8ed46fe806597e9_5f83159b", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [pfam.xfam.org](1) may be at an arbitrary position in t...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "The string [pfam.xfam.org](1) may be at an arbitrary position in the sanitized URL.", "The string [www.ebi.ac.uk](1) may be at an arbitrary position in the sanitized URL." ]
[ 74, 86 ]
[ null, null ]
[ 5, 9 ]
[ 28, 32 ]
2024-11-19T03:22:55.229025+00:00
1,296,056,659,000
cbb4f160fed4db99342f4d0c0edce335b8c20ec7
3
{ "blob_id": "cbb4f160fed4db99342f4d0c0edce335b8c20ec7", "branch_name": "refs/heads/master", "committer_date": 1296056659000, "content_id": "9d250618bf1c87dc65a785b68fe905845dac76c8", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "b4e87d4d8ad99a0ca90c9837da1d6d7f218eb5d3", "extension": "p...
2.53125
stackv2
from os import urandom from base64 import b64encode, b64decode from django.conf import settings from django.utils.dateformat import format, time_format from django.utils.encoding import smart_str from django.forms.util import flatatt from PIL import Image def encrypt(plaintext): from Crypto.Cipher import ARC4 ...
91
28.29
111
16
720
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_b12cf2401d73ac11_10fccf8e", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The cryptographic algorithm ARC4](1) is broken or weak, and should not be used.", "...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[The cryptographic algorithm ARC4](1) is broken or weak, and should not be used.", "[The cryptographic algorithm ARC4](1) is broken or weak, and should not be used." ]
[ 21, 29 ]
[ null, null ]
[ 50, 21 ]
[ 73, 45 ]
2024-11-19T03:23:01.787404+00:00
1,550,658,412,000
66282734f8251bca43e4c5104a386ed9255d61c4
3
{ "blob_id": "66282734f8251bca43e4c5104a386ed9255d61c4", "branch_name": "refs/heads/master", "committer_date": 1550658412000, "content_id": "3f3c797fd2ec987bb547c7cc9be6a398cfe37979", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "678d9f7788141e3413293aa3a081d99273f74802", "extension": "p...
3.328125
stackv2
#!/usr/bin/python # -*- coding: utf-8 -*- # author: Mohammad Modallal <m.modallal@redcrow.co> from xlrd import open_workbook import xlwt import re import sys, getopt, codecs, os import csv from itertools import izip class DataInput(object): ''' Class DataInput Description: This class represe...
75
39.41
142
16
607
python
[{"finding_id": "codeql_py/overly-large-range_b25a6a7d6b340551_d1c2be24", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\w in the same character class.", "remediation": "", "loc...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that overlaps with \\w in the same character class.", "Suspicious character range that overlaps with \\w in the same character class." ]
[ 73, 73 ]
[ null, null ]
[ 30, 33 ]
[ 33, 36 ]
2024-11-19T03:44:13.531260+00:00
1,611,601,676,000
ae04dc042fbae486a2f324ce309aca29743a2f75
2
{ "blob_id": "ae04dc042fbae486a2f324ce309aca29743a2f75", "branch_name": "refs/heads/master", "committer_date": 1611601676000, "content_id": "2849aff83483c7e6bb62f14f6a85e89a0964eacf", "detected_licenses": [ "MIT" ], "directory_id": "201dac99f7b67a3a334f0f833bd3c2d8350c5800", "extension": "py", "fi...
2.328125
stackv2
#!/usr/bin/env python """Define hooks to be run after project generation.""" import json import os # noqa import secrets import sys # noqa from pathlib import Path from cookiecutter.main import cookiecutter try: import gitlab # noqa except ModuleNotFoundError: # pragma: no cover pass class MainProcess:...
123
35.77
86
25
945
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_cdaf3dc3bba1bfd4_ce2b7817", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive data (secret)](2) as clear text." ]
[ 81 ]
[ null ]
[ 66 ]
[ 78 ]
2024-11-19T03:44:42.040016+00:00
1,590,547,547,000
29d73799ec4b6c7225868ced3b4b55fc72a6e7a8
3
{ "blob_id": "29d73799ec4b6c7225868ced3b4b55fc72a6e7a8", "branch_name": "refs/heads/master", "committer_date": 1590547547000, "content_id": "3be83094ae20c6d6547061256f0f747f490a66a0", "detected_licenses": [ "MIT" ], "directory_id": "f5fb0d5af5211e81bd54a529851ddf68441c5044", "extension": "py", "fi...
2.609375
stackv2
# !/usr/bin/python # -*- coding: UTF-8 -*- import json import requests def parse_tkl(sign_server, password): headers = { "content-type": "application/json;charset=utf-8" } payload = { "password": password } print("解析淘口令参数:" + json.dumps(payload)) res = requests.post(sign_serve...
33
26.06
79
12
252
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d6db60f2882e48f7_5f8220ba", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 15 ]
[ null ]
[ 11 ]
[ 43 ]
2024-11-19T01:34:43.700439+00:00
1,489,417,273,000
96ffd8d9186171e297871b78ef05b722b9175cb3
3
{ "blob_id": "96ffd8d9186171e297871b78ef05b722b9175cb3", "branch_name": "refs/heads/master", "committer_date": 1489417273000, "content_id": "ca51399a3855987411f3403de845a40d49df43ee", "detected_licenses": [ "Apache-2.0" ], "directory_id": "3d728aa3a7c009356a529c7a93378307cef327ae", "extension": "py"...
2.546875
stackv2
import http.server import socketserver import json import http.client class testHTTPRequestHandler(http.server.BaseHTTPRequestHandler): # GET OPENFDA_API_URL= "api.fda.gov" OPENFDA_API_EVENT= "/drug/event.json" OPENFDA_API_LYRICA= "search=patient.drug.medicinalproduct:" "LYRICA""&limit=10" def ...
160
33.07
154
16
1,288
python
[{"finding_id": "codeql_py/partial-ssrf_fe52a8b30685643f_116a5854", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 51 ]
[ null ]
[ 9 ]
[ 112 ]
2024-11-19T01:34:46.822079+00:00
1,456,540,050,000
878980bd0ecad0585c6d03424efc60bfe418b9ee
3
{ "blob_id": "878980bd0ecad0585c6d03424efc60bfe418b9ee", "branch_name": "refs/heads/master", "committer_date": 1456540050000, "content_id": "cd0c108cf240182ca4bfa7895c1eb5d7b3c5baad", "detected_licenses": [ "MIT" ], "directory_id": "9a2fbd12c156f0c59b6ba0c725aa6fc17747f997", "extension": "py", "fi...
2.578125
stackv2
from flask import Flask from flask import request from flask import render_template import subprocess import time import re import csv import datetime # Create a temporary AP to harvest MAC Address def createHotspot(wifiName): # Set the interface to monitor mode subprocess.call('ifconfig wlan0 down', shell=Tru...
168
31.23
86
15
1,516
python
[{"finding_id": "codeql_py/command-line-injection_0750f77ebab50806_5154c4b0", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {...
2
true
[ "CWE-078", "CWE-312" ]
[ "py/command-line-injection", "py/clear-text-storage-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This command line depends on a [user-provided value](1).", "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text." ]
[ 21, 47 ]
[ null, null ]
[ 22, 18 ]
[ 36, 26 ]
2024-11-19T01:35:02.377331+00:00
1,632,184,119,000
d4e868dffd51fb4b102cff8dfab27a84b822754d
3
{ "blob_id": "d4e868dffd51fb4b102cff8dfab27a84b822754d", "branch_name": "refs/heads/main", "committer_date": 1632184119000, "content_id": "1025794a043bc827e0ff0a3f7762274af14fe37c", "detected_licenses": [ "MIT" ], "directory_id": "a83034e4dc46ddc25bfa19b3470534f77afa509c", "extension": "py", "file...
2.859375
stackv2
import requests import pprint pre_key = "?api_key=" api_key = #CHECK REPO FOR STEPS TO GET YOUR OWN API_KEY api_base_url = "https://na1.api.riotgames.com" summonerName = input("Enter the summoner name of the in-game player: ") summoner_endpoint_path = f"/lol/summoner/v4/summoners/by-name/{summonerName}" summoner_end...
51
29.16
110
16
470
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d11e78af38f2b15e_ce78a948", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 38 ]
[ null ]
[ 7 ]
[ 16 ]
2024-11-19T01:55:45.696090+00:00
1,635,200,572,000
a77408ba57313679354905c5d982616118956057
3
{ "blob_id": "a77408ba57313679354905c5d982616118956057", "branch_name": "refs/heads/main", "committer_date": 1635200572000, "content_id": "e18b149354f5e2b3864317e44d6d91a6a66f2de0", "detected_licenses": [ "MIT" ], "directory_id": "7fc239a423a5ba7011f0f0f374878705f2b28da1", "extension": "py", "file...
3
stackv2
"""Downloads all laws from the Albanian website.""" from datetime import date import json from os import path from pathlib import Path import re from bs4 import BeautifulSoup import requests # Cherian wuz here START_URL = 'https://euralius.eu/index.php/en/library/albanian-legislation/category/360-laws' BASE_URL = 'h...
96
32.71
99
15
750
python
[{"finding_id": "codeql_py/overly-large-range_1239842c06d0ff23_9ec82464", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 27 ]
[ null ]
[ 92 ]
[ 95 ]
2024-11-19T02:17:17.121898+00:00
1,553,093,976,000
5f61748c9cbc52372d9820b386361305661303c1
2
{ "blob_id": "5f61748c9cbc52372d9820b386361305661303c1", "branch_name": "refs/heads/master", "committer_date": 1553093976000, "content_id": "5d748496632ded2d8a226510098bc2376c06daeb", "detected_licenses": [ "Apache-2.0", "BSD-3-Clause", "BSD-2-Clause", "Python-2.0" ], "directory_id": "84f9...
2.390625
stackv2
#!/usr/bin/env python # coding:utf-8 # N.B. : Some of these docstrings are written in reSTructured format so that # Sphinx can use them directly with fancy formatting. """ This module defines a REST API for the multimedia storage system as defined by the CANARIE API specification. See : https://collaboration.canarie....
177
36.1
79
17
1,385
python
[{"finding_id": "codeql_py/log-injection_299acdfd9c47640f_deeef6b0", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 125 ]
[ 126 ]
[ 21 ]
[ 35 ]
2024-11-19T02:17:38.898234+00:00
1,488,140,659,000
a172f96b0af897cef970cc22da7c19969bc2852a
3
{ "blob_id": "a172f96b0af897cef970cc22da7c19969bc2852a", "branch_name": "refs/heads/master", "committer_date": 1488140659000, "content_id": "f25f6c30f0e1df3c531bb7e6f4ac347761cc5ed6", "detected_licenses": [ "Apache-2.0" ], "directory_id": "89029bd0c3e069603c199e596bc0f045c6190bef", "extension": "py"...
3.015625
stackv2
import MySentenceStemmer from nltk.corpus import stopwords import MyConvertUnicode import re # # Remove stop words # Stem using (MySentenceStemmer) # Convert unicode # convert all words into lower case # do not take words mix with symbols etc. class MyTextPreProcess: def __init__(self): self.convert = MyConve...
38
24.45
79
15
294
python
[{"finding_id": "codeql_py/redos_cc0347237e9dd2c8_63779957", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'a' and containing many repetition...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with 'a' and containing many repetitions of '0'." ]
[ 28 ]
[ null ]
[ 26 ]
[ 35 ]
2024-11-19T02:29:53.992315+00:00
1,643,135,593,000
ff2f940559a30d6bcd4fe802547700df6ae7c096
4
{ "blob_id": "ff2f940559a30d6bcd4fe802547700df6ae7c096", "branch_name": "refs/heads/master", "committer_date": 1643135593000, "content_id": "0106c923c69eaceea91933e0f8013ffe25dd4883", "detected_licenses": [ "MIT" ], "directory_id": "f0db8faa9412731ff59afc48942981e39607b7d2", "extension": "py", "fi...
4.1875
stackv2
#!/usr/bin/env python3 """ Program to demonstrate Basics of Input/Output """ # Importing Modules import datetime # Calculating the date todays_date = datetime.datetime.now() today = todays_date.strftime('%c') first = "First's" last = 'Last"s' # print(f'Contains both Single and Double Quotes: {first} {last}') ...
36
25.39
66
9
214
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8a4dc3d3f7fbadee_f283f389", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 33, 34 ]
[ null, null ]
[ 7, 7 ]
[ 29, 28 ]
2024-11-19T02:29:55.805616+00:00
1,607,364,880,000
40f45aed355c8a95f9b4bc8a68debab49be12aa3
2
{ "blob_id": "40f45aed355c8a95f9b4bc8a68debab49be12aa3", "branch_name": "refs/heads/master", "committer_date": 1607364883000, "content_id": "f27583a71c460fff5477a0535a29dc6820383710", "detected_licenses": [ "MIT" ], "directory_id": "07d84be7ee8a75136faa118fa2ade3455d765889", "extension": "py", "fi...
2.453125
stackv2
#!/usr/bin/env python """\ Tabhouse A site to find quality guitar tabs. """ from datetime import datetime from logging import error, info from logging.config import dictConfig from urllib import urlencode from flask import (Flask, g, request, render_template, redirect, url_for, jsonify) from raven.contrib.flask i...
85
27.87
155
15
619
python
[{"finding_id": "codeql_py/log-injection_f4d857daf99f7c0a_e0be9fb2", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
5
true
[ "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 62, 65, 73, 73, 79 ]
[ null, null, null, null, null ]
[ 20, 43, 59, 72, 100 ]
[ 21, 44, 70, 88, 116 ]
2024-11-19T02:30:01.700938+00:00
1,505,931,456,000
b41b853abf4c934a796059d2b12b02da60d73904
2
{ "blob_id": "b41b853abf4c934a796059d2b12b02da60d73904", "branch_name": "refs/heads/master", "committer_date": 1505931456000, "content_id": "86c5a5cff2bbeff3c33823568eca0c24e5fba01d", "detected_licenses": [ "MIT" ], "directory_id": "ec198dc6ad14be07d4e628414ebfdc9d8ad9a1fa", "extension": "py", "fi...
2.390625
stackv2
""" @package api Case Vaults Query API Controllers These API will be called by the central hub """ import sys import asyncio import aiohttp import async_timeout import retrying import json import ssl from api import log from flask import Blueprint, jsonify, request, g from api.database import CaseVaultCollection from...
115
24.27
136
20
662
python
[{"finding_id": "codeql_py/partial-ssrf_c7341bf8fc02aae6_96d62ba3", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 114 ]
[ null ]
[ 20 ]
[ 121 ]
2024-11-19T02:30:07.873361+00:00
1,641,935,650,000
813aab676df71c8a7a725dc2e0d2937d69072814
2
{ "blob_id": "813aab676df71c8a7a725dc2e0d2937d69072814", "branch_name": "refs/heads/master", "committer_date": 1641935650000, "content_id": "9f8b4a97cc6a92ab321f2bf74135e32710491f70", "detected_licenses": [ "MIT" ], "directory_id": "44cd8296bf02274fcce4604a0bce7e79c8b5ba00", "extension": "py", "fi...
2.390625
stackv2
from flask import request, url_for, jsonify from flask_api import FlaskAPI, status, exceptions from models import sessions from datetime import datetime from models import notes from bson import ObjectId app = FlaskAPI(__name__) @app.route('/active_sessions', methods=['GET']) def active_sessions(): redis = sessi...
64
21.2
62
13
335
python
[{"finding_id": "codeql_py/flask-debug_7ac251632e9e6a00_9bd6d3b0", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-079", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 64, 34, 47 ]
[ null, null, null ]
[ 5, 16, 16 ]
[ 51, 45, 20 ]
2024-11-19T02:30:10.370602+00:00
1,590,926,149,000
5a7cab64d18b5aaff3567cfc8c17897729dd3f59
3
{ "blob_id": "5a7cab64d18b5aaff3567cfc8c17897729dd3f59", "branch_name": "refs/heads/master", "committer_date": 1590926149000, "content_id": "845fbf30dc32e7eb49261b4cc7def4ae9e71f9cb", "detected_licenses": [ "MIT" ], "directory_id": "028f73e0ff424a8527291474fff68f73ed9e0174", "extension": "py", "fi...
2.546875
stackv2
import pymongo import os import sqlite3 from dotenv import load_dotenv load_dotenv() conn = sqlite3.connect(os.path.join(os.path.dirname( __file__), 'rpg_db.sqlite3')) curs = conn.cursor() mongo_username = os.getenv('mongo_username') mongo_password = os.getenv('mongo_password') mongo_host = os.getenv('mongo_host...
135
30.36
112
11
1,105
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2c45c705af52c77a_12b76bef", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 17 ]
[ null ]
[ 5 ]
[ 101 ]
2024-11-19T02:41:45.246933+00:00
1,693,416,671,000
dedbc8b80f6302583cd331e841a0aef3c9525742
3
{ "blob_id": "dedbc8b80f6302583cd331e841a0aef3c9525742", "branch_name": "refs/heads/master", "committer_date": 1693416671000, "content_id": "24f86e640455c533df5822208223aca802abab95", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "2337351b228818e41be3002bd38f68f77c2aa074", "extension": "p...
2.625
stackv2
# ---------------------------------------------------------------------- # Crypto-related snippets # ---------------------------------------------------------------------- # Copyright (C) 2007-2020 The NOC Project # See LICENSE for details # ---------------------------------------------------------------------- # Pyth...
90
32.11
118
16
871
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_f99a796b2d81f4a8_48b9caff", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 60 ]
[ null ]
[ 22 ]
[ 42 ]
2024-11-19T02:41:51.761767+00:00
1,687,708,541,000
b12b9980d8ec2b640072cf3489802adfeb13e909
2
{ "blob_id": "b12b9980d8ec2b640072cf3489802adfeb13e909", "branch_name": "refs/heads/main", "committer_date": 1687708541000, "content_id": "72461575a9fbc7f9627fddb4bc38e9b0366ac3e7", "detected_licenses": [ "Apache-2.0" ], "directory_id": "9a3a5b08d61e4b2148c4a28d8ae0f9f2ae36fb1a", "extension": "py", ...
2.328125
stackv2
# Copyright (c) Istituto Nazionale di Fisica Nucleare (INFN). 2019-2020 # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required ...
153
36.51
140
16
1,266
python
[{"finding_id": "codeql_py/request-without-cert-validation_d20dca1b97e9b169_db41ce97", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 31 ]
[ null ]
[ 20 ]
[ 69 ]
2024-11-19T02:41:52.344831+00:00
1,589,236,487,000
dd0249711c7faee4e854e81a894373f0bf16fe52
3
{ "blob_id": "dd0249711c7faee4e854e81a894373f0bf16fe52", "branch_name": "refs/heads/master", "committer_date": 1589236487000, "content_id": "3c0b5260fa59db278f7251e0a68f168ad6028c12", "detected_licenses": [ "Apache-2.0" ], "directory_id": "fd593378f42d2e73fa3b00921901f0f0b784fb6a", "extension": "py"...
2.546875
stackv2
import ftplib #ftp cracker by wigans victor #twitter account: @victorwigansH #email:wigansvictor@gmail.com #opensource code print("---------------------------------------------") print("--- VICTOR WIGANS BRUTE FORCE FTP CRACKER ---") print("---------------------------------------------") print("\n") print("Follo ...
59
21.75
64
13
391
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ffe516d83f4cd0aa_c24d3344", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 35, 49 ]
[ null, null ]
[ 7, 19 ]
[ 13, 32 ]
2024-11-18T18:16:12.501135+00:00
1,607,011,154,000
8dc83c4501527a3635fddbd2f9da9f4b3cd44660
3
{ "blob_id": "8dc83c4501527a3635fddbd2f9da9f4b3cd44660", "branch_name": "refs/heads/master", "committer_date": 1607011154000, "content_id": "6893ee6b0c64ce2f79a17f3168a24c997e1c8d0c", "detected_licenses": [ "Apache-2.0" ], "directory_id": "98ec89cb5b180493ecb39d2d96229038d00a9745", "extension": "py"...
2.53125
stackv2
# coding=utf-8 import requests import re import os import json import time class Getlinks(object): def __init__(self, url): self.url = url self.headers = { 'User-Agent': "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.87 Safari/537.36"...
185
30.82
142
20
1,617
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_e7a0ff879ee1d406_13970b0e", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'ygdy8.com/html/gndy/', so it might ...
1
true
[ "CWE-020" ]
[ "py/incomplete-hostname-regexp" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'ygdy8.com/html/gndy/', so it might match more hosts than expected." ]
[ 59 ]
[ null ]
[ 42 ]
[ 85 ]
2024-11-18T18:59:39.652834+00:00
1,505,417,848,000
900289243d57be9a731c6792f20eb9fbc94c3e0f
2
{ "blob_id": "900289243d57be9a731c6792f20eb9fbc94c3e0f", "branch_name": "refs/heads/master", "committer_date": 1505417848000, "content_id": "d0d6f0f4b87c8bf9ec9df3e52407952f2e02ad93", "detected_licenses": [ "Apache-2.0" ], "directory_id": "d80b76f8e0b6d978f278b432199785871e803e64", "extension": "py"...
2.484375
stackv2
#!/usr/bin/env python import urllib import json import os from flask import Flask from flask import request from flask import make_response # Flask app should start in global layout app = Flask(__name__) @app.route('/webhook', methods=['POST']) def webhook(): req = request.get_json(silent=True, force=True) ...
80
33.61
173
20
663
python
[{"finding_id": "codeql_py/flask-debug_f3a43771af556c85_0184a327", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 80, 26 ]
[ null, null ]
[ 5, 23 ]
[ 51, 26 ]
2024-11-18T18:59:41.336574+00:00
1,414,088,826,000
7f1c41557aaaca73752f4f4bec5a6562d42f1bd2
2
{ "blob_id": "7f1c41557aaaca73752f4f4bec5a6562d42f1bd2", "branch_name": "refs/heads/master", "committer_date": 1414088826000, "content_id": "b3c9106a7ddab7f420abbb190ae99cf123600aad", "detected_licenses": [ "MIT" ], "directory_id": "4595499ebe2a857735ed47dd1418bd9fac7843ce", "extension": "py", "fi...
2.375
stackv2
#!/usr/bin/env python3 from flask import Flask, jsonify, render_template, request, current_app import schemepy import schemepy.reader as rd import schemepy.evaluator as ev import imp import time import sys sys.setrecursionlimit(100000) DEBUG = True SECRET_KEY = '$(secret_key)' app = Flask(__name__) app.config.from_ob...
61
23.02
71
12
335
python
[{"finding_id": "codeql_py/stack-trace-exposure_e4de1b7a4e176b85_b86390e2", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
3
true
[ "CWE-209", "CWE-209", "CWE-215" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure", "py/flask-debug" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger." ]
[ 38, 50, 61 ]
[ null, null, null ]
[ 27, 27, 5 ]
[ 30, 30, 24 ]
2024-11-18T19:11:49.184996+00:00
1,565,375,507,000
e66d1ef676a9d487a59a5df6b2893473ef8fe688
3
{ "blob_id": "e66d1ef676a9d487a59a5df6b2893473ef8fe688", "branch_name": "refs/heads/master", "committer_date": 1565375507000, "content_id": "0b9d1e65cba4d20a5419b2e48bf83e3753a13c7d", "detected_licenses": [ "MIT" ], "directory_id": "dd63ac24f975649208233685218246a425c073ce", "extension": "py", "fi...
3.375
stackv2
#!/usr/bin/env python """ pw_chckr.py - Checks the password strength using a REST API call to www.passable.io Copyright (c) 2017 World Wide Technology, Inc. All rights reserved. author: "joel.king@wwt.com (@joelwking)" written: 23 May 2016 description: This program checks the vulnera...
125
31.82
120
19
977
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_13bf5cbacd2699b7_a9c13b15", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
2
true
[ "CWE-327", "CWE-295" ]
[ "py/weak-sensitive-data-hashing", "py/request-without-cert-validation" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.", "This request may run without certificate validation because [it is disabled](1)." ]
[ 75, 95 ]
[ null, null ]
[ 16, 13 ]
[ 26, 61 ]
2024-11-18T19:23:57.237808+00:00
1,594,738,172,000
ab1d07c9c96d87f8674b417ac0b7e529aeef92bd
3
{ "blob_id": "ab1d07c9c96d87f8674b417ac0b7e529aeef92bd", "branch_name": "refs/heads/master", "committer_date": 1594738172000, "content_id": "6601fca00c94547ec08b3f3efa8dca2ea027deda", "detected_licenses": [ "Apache-2.0" ], "directory_id": "12bae15732e1b78e33628d5edae38bbf464c354d", "extension": "py"...
2.515625
stackv2
from selenium import webdriver import requests,os,time,re try: os.mkdir("çalınanlartxt") except OSError: print("") queryparameter = input("Anahtar Kelime : ") print("Tarama İşlemi Başlatılıyor") chrome_options = webdriver.ChromeOptions() chrome_options.add_argument("--headless") chrome = webdriver.Chrome(option...
49
47.08
169
18
760
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_cdafb7d0269cd86d_0ffd1e37", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [https://throwbin.io](1) may be at an arbitrary positio...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [https://throwbin.io](1) may be at an arbitrary position in the sanitized URL." ]
[ 25 ]
[ null ]
[ 8 ]
[ 51 ]
2024-11-18T19:58:20.506031+00:00
1,564,334,988,000
f29a6aa42d79f615b4acb5f66ae0effb04046315
3
{ "blob_id": "f29a6aa42d79f615b4acb5f66ae0effb04046315", "branch_name": "refs/heads/master", "committer_date": 1564334988000, "content_id": "575d94dbf0937e3bf2ee5e83a26a37b09aa88569", "detected_licenses": [ "MIT" ], "directory_id": "5ef476b1342ec84036d867308a5b3a07fc8a7b63", "extension": "py", "fi...
3.3125
stackv2
import urllib.request import json def characters_get(): """ Gets character list from the rickandmorty API """ url = 'https://rickandmortyapi.com/api/character/' resp = urllib.request.urlopen(url) data = json.loads(resp.read().decode()) #print(data) return data def characters_save(data, file_...
49
25.65
83
15
340
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_f2008426b3d517a3_7baecb5f", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text." ]
[ 18 ]
[ 26 ]
[ 24 ]
[ 14 ]
2024-11-18T19:58:34.460083+00:00
1,599,559,903,000
70d37eb0dbdc99ebbb121afbe31e5bb7d7113cc1
2
{ "blob_id": "70d37eb0dbdc99ebbb121afbe31e5bb7d7113cc1", "branch_name": "refs/heads/master", "committer_date": 1599559903000, "content_id": "c44e1f29f9566c13b3f8816e2b7ebaad2d4aaddd", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e26be7519d530377db3b31da291cee026b314137", "extension": "py"...
2.390625
stackv2
import logging from flask import Blueprint, current_app, send_from_directory bp = Blueprint("serving", __name__) log = logging.getLogger(__name__) # Caching: We want the browser to always check if the index.html file it has # is the latest one. Also we want this check to use the ETag header and not # the Last-Modif...
27
32.37
76
10
219
python
[{"finding_id": "codeql_py/log-injection_825ab3c856cd6b54_13dfad6c", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 23 ]
[ null ]
[ 58 ]
[ 62 ]
2024-11-18T19:58:37.543849+00:00
1,607,018,482,000
ea3f7baf759ed8563f65b8f82bcd362287d95517
3
{ "blob_id": "ea3f7baf759ed8563f65b8f82bcd362287d95517", "branch_name": "refs/heads/main", "committer_date": 1607018482000, "content_id": "1251366e0d998b01683aee1c219aa5afed03e9c6", "detected_licenses": [ "MIT" ], "directory_id": "3e352bd226ddd11ef6dc3d0bf3507c83975bea98", "extension": "py", "file...
2.75
stackv2
import json import os from google.auth.transport import requests from google.oauth2 import id_token from requests_oauthlib import OAuth1Session class SocialValidation: """Social validation""" @staticmethod def google_auth_validation(access_token): """ Provides support for verifying `Open...
54
30.22
100
16
330
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_c9449342a394087b_3539a8d6", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [accounts.google.com](1) may be at an arbitrary positio...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [accounts.google.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 50 ]
[ null ]
[ 16 ]
[ 54 ]
2024-11-18T19:34:26.684737+00:00
1,497,620,021,000
4a7c779f193c1529181bb2ed7b2a7f511538eaa3
2
{ "blob_id": "4a7c779f193c1529181bb2ed7b2a7f511538eaa3", "branch_name": "refs/heads/master", "committer_date": 1497620021000, "content_id": "2ea924fa8e4d92723acd9c59c03e8c720fe8aae7", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "be4b394066275072f995a6fa90fd0e9adb68371d", "extension": "p...
2.359375
stackv2
import hashlib from django.db import models from django.utils.translation import ugettext_lazy as _ from orchestra.core import validators from . import settings class Database(models.Model): """ Represents a basic database for a web application """ MYSQL = 'mysql' POSTGRESQL = 'postgresql' nam...
82
32.46
92
17
571
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_383ab887741db54f_c53a6dff", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 78 ]
[ null ]
[ 35 ]
[ 59 ]
2024-11-18T18:39:32.757565+00:00
1,540,588,181,000
12be3df4e946ac8f5ceeabf061c1f1152ff7ed55
3
{ "blob_id": "12be3df4e946ac8f5ceeabf061c1f1152ff7ed55", "branch_name": "refs/heads/master", "committer_date": 1540588181000, "content_id": "1bea7ae98c010ebbc2b29f4230971e19281b17e1", "detected_licenses": [ "MIT" ], "directory_id": "f7e02915cff671abb3cd1967e8b3d1744b31ce35", "extension": "py", "fi...
2.875
stackv2
# begin the table f = open('theanswer.txt','w') print("<table>", file=f) # column headers # print("<th>", file=f) # print("<td>Last Name</td>", file=f) # print("<td>First Name</td>", file=f) # print("<td>Year</td>", file=f) # print("<td>Graduation Year</td>", file=f) # print("<td>Position</td>", file=f) # print("<td>...
55
26.96
45
9
510
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_82bb468b83f89135_c00095a8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 46 ]
[ null ]
[ 11 ]
[ 35 ]
2024-11-18T18:39:42.342910+00:00
1,688,039,474,000
e7f6bd1f4f212e34c4559b0c9f67d707c4bb6009
3
{ "blob_id": "e7f6bd1f4f212e34c4559b0c9f67d707c4bb6009", "branch_name": "refs/heads/master", "committer_date": 1688039474000, "content_id": "257924163232ef01d52ab8985fa62dfc494fb19b", "detected_licenses": [ "Apache-2.0" ], "directory_id": "fedc097c85f12de797d4becd31de47f80013a488", "extension": "py"...
2.890625
stackv2
''' Created on Jun 27, 2016 @author: dj ''' from os import path from urllib import request as urlrequest import requests # The default API key for demo purpose. api_key = "demo" input_file_path = "../../../../Temp" api_key_file = "AlphaVantage_ApiKey.txt" input_file = path.join(input_file_path, api_key_file) if p...
61
22.13
104
12
376
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e8083c5a965178ca_f8027f5d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
7
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive dat...
[ 24, 34, 49, 52, 54, 55, 57 ]
[ null, null, null, null, null, null, null ]
[ 28, 20, 20, 21, 29, 26, 26 ]
[ 35, 23, 23, 25, 41, 37, 35 ]
2024-11-18T18:39:48.259654+00:00
1,605,803,304,000
78b47abca3b7d2754e8af5abd6228f4150f1fcef
2
{ "blob_id": "78b47abca3b7d2754e8af5abd6228f4150f1fcef", "branch_name": "refs/heads/master", "committer_date": 1605803304000, "content_id": "df8165d4d2f9c8d18570b960b7b6086ddded45b2", "detected_licenses": [ "Apache-2.0" ], "directory_id": "cb92ae7d588ede5ee3c914699bcb9d56b245257f", "extension": "py"...
2.484375
stackv2
import tkinter as tk from tkinter import filedialog from fpdf import FPDF from os.path import isfile import json import datetime from random import randrange import re test_path = "E:\\Files\\Programming\\FbMessengerToPDF\\data\\messages\\inbox\\AliseGilot_A6kYU9nD4A" # colors = {'name':[fillColor[],drawColor[],textC...
96
32.43
126
17
980
python
[{"finding_id": "codeql_py/overly-large-range_0eb4a935adb81d81_be091384", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "remediatio...
4
true
[ "CWE-020", "CWE-020", "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range ...
[ 49, 49, 49, 49 ]
[ null, null, null, null ]
[ 30, 33, 36, 45 ]
[ 34, 37, 40, 49 ]
2024-11-18T18:39:57.334094+00:00
1,412,730,780,000
ac2306a90027398a6f312e0dfc49f1628baddf9f
3
{ "blob_id": "ac2306a90027398a6f312e0dfc49f1628baddf9f", "branch_name": "refs/heads/master", "committer_date": 1412730780000, "content_id": "12d0eeba4c467be2233a70f1a54d54895e26556a", "detected_licenses": [ "Unlicense" ], "directory_id": "a7e2cbfbd10fcc1a952a94ce52819687918b7f0e", "extension": "py",...
2.640625
stackv2
import os, datetime import re from flask import Flask, request, render_template, redirect, abort, flash, json from unidecode import unidecode # mongoengine database module from flask.ext.mongoengine import MongoEngine app = Flask(__name__) # create our flask app app.config['CSRF_ENABLED'] = True app.config['SECRE...
324
20.4
94
16
1,891
python
[{"finding_id": "codeql_py/url-redirection_78ab7500958e4794_f39cfb3a", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
4
true
[ "CWE-601", "CWE-601", "CWE-601", "CWE-601" ]
[ "py/url-redirection", "py/url-redirection", "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 133, 141, 168, 176 ]
[ null, null, null, null ]
[ 19, 19, 19, 19 ]
[ 35, 35, 35, 35 ]
2024-11-18T18:47:03.389600+00:00
1,516,944,526,000
78f3fa3ceadcd4d4dd789380f2b26d6507983ce9
4
{ "blob_id": "78f3fa3ceadcd4d4dd789380f2b26d6507983ce9", "branch_name": "refs/heads/master", "committer_date": 1516944526000, "content_id": "76657929000dc08822192882fd7fec57f81b9e7d", "detected_licenses": [ "MIT" ], "directory_id": "1031eadac1f662149388e4d889f3d86dbce295aa", "extension": "py", "fi...
4.4375
stackv2
# Hangman script with modularization # Import the random library import random def get_secret_word(): # function that chooses a random secret word from a list words = ["light", "electric", "shock", "wire", "round", "circuit", "voltage", "white", "pieces", "yellow", "science", "engineering", "war...
122
28.65
122
11
855
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bb2c1b5e86e1ed73_6fa8c6d2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi...
4
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (secret)](...
[ 40, 78, 108, 109 ]
[ null, null, null, null ]
[ 39, 28, 37, 44 ]
[ 50, 48, 47, 51 ]
2024-11-18T18:47:04.046716+00:00
1,598,111,330,000
614776a20828434f360678dcfd445930a95e2ad0
3
{ "blob_id": "614776a20828434f360678dcfd445930a95e2ad0", "branch_name": "refs/heads/master", "committer_date": 1598111330000, "content_id": "07b55a20b6669b33dc6b0096e9a4d796ad15ee8a", "detected_licenses": [ "MIT" ], "directory_id": "0558c1d8186aaeabcc8deb0361fc2a939ec9a12a", "extension": "py", "fi...
2.734375
stackv2
#!/usr/bin/python3 #Imports the 'random' Builtin Module import random import pyperclip from random import choice from pyperclip import copy import tqdm from tqdm import * import time import colored from colored import fg,bg,attr characters = list("abcdefghijk!@#$%^&*()lmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ~`_+d|\<...
67
28.3
98
15
579
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e24ef0245ea96370_1dcf6c30", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 50 ]
[ null ]
[ 15 ]
[ 33 ]
2024-11-18T19:10:01.006728+00:00
1,558,327,967,000
f7d23cbdf3a5425b81f7ad4aec16f672732deef1
3
{ "blob_id": "f7d23cbdf3a5425b81f7ad4aec16f672732deef1", "branch_name": "refs/heads/master", "committer_date": 1558327967000, "content_id": "7ab5254d258343fd58485add0c6a4bc5d72a8775", "detected_licenses": [ "MIT" ], "directory_id": "afd99f08f48b3487862ba90e89a34b982cf64a2f", "extension": "py", "fi...
2.828125
stackv2
# -*- coding: utf-8 -*- ''' Created on 2019年01月07日 @author: Zhukun Luo Jiangxi university of finance and economics ''' import os import sys import numpy as np PATH = "/home/agnostic/Workspaces/MyEclipse CI/Spark-machine-learning/chapter04/data" from pyspark import SparkContext from pyspark import SparkConf from pyspa...
88
33.93
85
13
863
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4179807b7a6a8e63_a890373a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 40 ]
[ null ]
[ 7 ]
[ 18 ]
2024-11-18T19:10:01.197637+00:00
1,693,417,914,000
94c9e8258b80005a6a8a82b64cfb8f619422df22
3
{ "blob_id": "94c9e8258b80005a6a8a82b64cfb8f619422df22", "branch_name": "refs/heads/master", "committer_date": 1693417914000, "content_id": "ecc1b21d6ff3d1243eecfc74580090f1b6a93feb", "detected_licenses": [ "CC0-1.0", "MIT" ], "directory_id": "71acb7214efd91c0d327f6d8958e1798eadb4401", "extensio...
2.65625
stackv2
import re import scrapy from locations.hours import OpeningHours from locations.items import Feature class FiveBelowSpider(scrapy.Spider): name = "five_below" item_attributes = {"brand": "Five Below", "brand_wikidata": "Q5455836"} allowed_domains = ["locations.fivebelow.com"] start_urls = ("https://...
83
42.82
107
17
791
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_4e47f468af001b68_d14f7233", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'fivebelow.com/', so it might match ...
1
true
[ "CWE-020" ]
[ "py/incomplete-hostname-regexp" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'fivebelow.com/', so it might match more hosts than expected." ]
[ 18 ]
[ null ]
[ 30 ]
[ 65 ]
2024-11-18T19:49:10.051829+00:00
1,682,070,135,000
a26768d353ae4108dacb90cea8948d574ba6d885
3
{ "blob_id": "a26768d353ae4108dacb90cea8948d574ba6d885", "branch_name": "refs/heads/master", "committer_date": 1682070135000, "content_id": "4ea2ee85bc71a9284d5e6be019dee1d2d9c6569a", "detected_licenses": [ "MIT" ], "directory_id": "3995c0c9517ff5c8e8b8d449add8c059b66c29d9", "extension": "py", "fi...
2.625
stackv2
"""This module deals with handling the representation of metadata formats for OAI""" import re from lxml import etree NS_OAIPMH = 'http://www.openarchives.org/OAI/2.0/' NS_XSI = 'http://www.w3.org/2001/XMLSchema-instance' NS_OAIDC = 'http://www.openarchives.org/OAI/2.0/oai_dc/' NS_DC = "http://purl.org/dc/elements/1....
85
34.51
127
16
844
python
[{"finding_id": "codeql_py/overly-large-range_3aba68d18d77ba1b_eae3e087", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "remediatio...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class." ]
[ 49 ]
[ null ]
[ 53 ]
[ 56 ]
2024-11-18T20:15:47.943654+00:00
1,595,948,986,000
321633b2c4c76cfb03304bdbdc8d890d1c6bd7fc
3
{ "blob_id": "321633b2c4c76cfb03304bdbdc8d890d1c6bd7fc", "branch_name": "refs/heads/master", "committer_date": 1595948986000, "content_id": "ada087ed5d716cc5be86da3a31e188c69ac57de7", "detected_licenses": [ "Apache-2.0" ], "directory_id": "b0b8ad28d81d7fd9ba5fbd6ecbc7c8ee2f6391b0", "extension": "py"...
2.75
stackv2
import uuid from flask import Blueprint, render_template, request, flash, redirect, url_for,current_app from app.forms import RegisterForm, LoginForm,UploadForm,RePassWord,ChangeEmail,RecoverPassword,RestePassword from app.models import Users from app.extensions import db,photos from app.email import send_mail from fl...
206
32.55
119
17
1,773
python
[{"finding_id": "codeql_py/url-redirection_863b948e4f628166_07a37b9b", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 59 ]
[ null ]
[ 29 ]
[ 78 ]
2024-11-18T20:15:51.125454+00:00
1,480,549,145,000
d527bd3548c2a110d3daa66fca550ec3dfe881fb
3
{ "blob_id": "d527bd3548c2a110d3daa66fca550ec3dfe881fb", "branch_name": "refs/heads/master", "committer_date": 1480549145000, "content_id": "f1b0bf5e9b816585829cb46b3dca09b7963e3e63", "detected_licenses": [ "MIT" ], "directory_id": "af3103cde939e5922c0233e889bd6233c7790c57", "extension": "py", "fi...
2.890625
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- # title :miscron.py # description : Runs commands to a server # author :Chris Sprance / Entrada Interactive # usage : This script is CLI for server administaration to run it from a command line do: # misrcon.py -i [ip] --port [admin port] -p...
129
40.05
114
16
1,281
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_6bec786eece29627_4e0ec245", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi...
[ 90 ]
[ null ]
[ 27 ]
[ 62 ]