added
stringlengths
32
32
created
int64
1,236B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.03
source
stringclasses
1 value
text
stringlengths
330
19.3k
num_lines
int64
16
648
avg_line_length
float64
15.5
59.3
max_line_length
int64
37
179
ast_depth
int64
8
38
length
int64
102
3.79k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.11k
276k
sast_codeql_findings_count
int64
1
33
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
33
rule_ids
listlengths
1
33
confidences
listlengths
1
33
severities
listlengths
1
33
messages
listlengths
1
33
line_starts
listlengths
1
33
line_ends
listlengths
1
33
column_starts
listlengths
1
33
column_ends
listlengths
1
33
2024-11-19T02:19:52.859230+00:00
1,572,953,675,000
cb5121a15eb3132e353060cece8a721b3f6c8263
3
{ "blob_id": "cb5121a15eb3132e353060cece8a721b3f6c8263", "branch_name": "refs/heads/master", "committer_date": 1572953675000, "content_id": "5896c7446b1d7a6f2bf15149ad0b4c0f3b18241c", "detected_licenses": [ "MIT" ], "directory_id": "f2925c7877b6830cf9c53402c84053e58603c738", "extension": "py", "fi...
3.140625
stackv2
import re, functools, math from _html import GrabHTML class HTMLCrawler(GrabHTML): def __init__(self): GrabHTML.__init__(self) self.counter = 1 avg_min_salary = [] avg_max_salary = [] for file in self.file_handlers: print(f'Working on file: {file.name}') ...
73
37.55
119
23
675
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_7767e8350f74d7d0_d04d1024", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 24, 21 ]
[ null, null ]
[ 24, 15 ]
[ 32, 23 ]
2024-11-19T02:19:56.711433+00:00
1,640,228,852,000
028775686dd8ee7519e8c369b484f826ddf8b4f1
2
{ "blob_id": "028775686dd8ee7519e8c369b484f826ddf8b4f1", "branch_name": "refs/heads/master", "committer_date": 1640228852000, "content_id": "452e494c3cb5fc82b30d502fde40539c05842f54", "detected_licenses": [ "MIT" ], "directory_id": "be9326eb2210178ac3524bd0ffeeec07e940e474", "extension": "py", "fi...
2.46875
stackv2
# This is the buchp2 command for Bucephalus. # It implements the 'new version of bucvac': it allows a user to 'vacuum' up # a TeX file into the database as a PDF, with templating. import json import argparse import jinja2 import tempfile import subprocess from pathlib import Path from shutil import copyfile import f...
147
38.36
175
21
1,419
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_38bb9aa474925f0c_f97686c0", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 91 ]
[ null ]
[ 11 ]
[ 76 ]
2024-11-19T00:59:31.059786+00:00
1,606,380,682,000
5c44d05545b824ef7d36d05b6bd3781f4658a1e0
4
{ "blob_id": "5c44d05545b824ef7d36d05b6bd3781f4658a1e0", "branch_name": "refs/heads/master", "committer_date": 1606380682000, "content_id": "239988288f8e47ca01e90bbe1e43a9d03787f0f2", "detected_licenses": [ "MIT" ], "directory_id": "6bc56a48296f67a7842d1c2207869277789bc041", "extension": "py", "fi...
3.625
stackv2
#!/usr/bin/env python3.9 from account import Account def create_account(account_name,username,password): ''' Function to create a new account ''' new_account = Account(account_name,username,password) return new_account def save_accounts(account): ''' Function to save account ''' ac...
115
29.82
146
17
591
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b7da9399ae0754a5_9634fbcb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 84 ]
[ null ]
[ 35 ]
[ 79 ]
2024-11-19T00:59:48.831065+00:00
1,657,645,326,000
cc2f7269f438cec2ab2ddbd2877cc7550c644954
3
{ "blob_id": "cc2f7269f438cec2ab2ddbd2877cc7550c644954", "branch_name": "refs/heads/master", "committer_date": 1657645326000, "content_id": "6931a1c42c6109c974a1d4341ba2751d2e6fbd20", "detected_licenses": [ "Unlicense" ], "directory_id": "d7b3193a4bd2fddb881117b59b9d6c4fa903f6fb", "extension": "py",...
2.609375
stackv2
from __future__ import absolute_import, division, print_function import string from ciscoconfparse import CiscoConfParse from getpass import getpass from netmiko import ConnectHandler from netmiko.ssh_exception import NetMikoTimeoutException from netmiko.ssh_exception import NetMikoAuthenticationException import sys #...
139
32.67
91
14
1,072
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_099d18fb9804bbe1_9c9f40b4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text." ]
[ 101 ]
[ null ]
[ 7 ]
[ 40 ]
2024-11-19T01:21:34.050234+00:00
1,633,944,285,000
271f1c271f5eeb61797c970d1b25010e6a3ae6b7
3
{ "blob_id": "271f1c271f5eeb61797c970d1b25010e6a3ae6b7", "branch_name": "refs/heads/main", "committer_date": 1633944285000, "content_id": "2018100b72a609cb61322cf5d7717119bccbc736", "detected_licenses": [ "MIT" ], "directory_id": "ba7b9a8734bd8a4607caa2981833e1af8860b2d2", "extension": "py", "file...
2.859375
stackv2
import re from passlib.hash import pbkdf2_sha512 # Test regex with https://regexr.com/ class Utils: @staticmethod def email_is_valid(email: str) -> bool: email_add_matcher = re.compile(r'^\w+([.-]?\w+)*@\w+([.-]?\w+)*(\.\w{2,3})+$') return re.match(email_add_matcher, email) is not None @...
19
29.47
86
12
167
python
[{"finding_id": "codeql_py/redos_3e06bf655dd045c0_30fefbf1", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'a' and containing many repetition...
2
true
[ "CWE-1333", "CWE-1333" ]
[ "py/redos", "py/redos" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with 'a' and containing many repetitions of 'a'.", "This part of the regular expression may cause exponential backtracking on strings starting with 'a@a' and containing many repetitions of 'a'." ]
[ 10, 10 ]
[ null, null ]
[ 52, 67 ]
[ 55, 70 ]
2024-11-19T01:56:39.997471+00:00
1,600,178,161,000
90cd96f42273063dba0f435399d9b86a8f253715
3
{ "blob_id": "90cd96f42273063dba0f435399d9b86a8f253715", "branch_name": "refs/heads/master", "committer_date": 1600178161000, "content_id": "86a068dd002b3c0f5641f0bae0aa718ee02d93bf", "detected_licenses": [ "Apache-2.0" ], "directory_id": "fff74e87ac64ca852fd4896e0ffa82db7bdd5246", "extension": "py"...
2.828125
stackv2
""" .. module:: DataLoaderCIFAR :synopsis: Loader the CIFAR tiny images datasets .. moduleauthor:: Marco Melis <marco.melis@unica.it> """ import tarfile from multiprocessing import Lock import pickle from abc import ABCMeta, abstractmethod import numpy as np from secml.data.loader import CDataLoader from secml....
405
29.64
105
18
2,972
python
[{"finding_id": "codeql_py/tarslip_f16f5e87deef1300_f8f8a1ad", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 266 ]
[ null ]
[ 9 ]
[ 42 ]
2024-11-19T01:56:50.298008+00:00
1,596,297,771,000
75fc549ff43aef176ab29140cd8b257c0742cdb5
3
{ "blob_id": "75fc549ff43aef176ab29140cd8b257c0742cdb5", "branch_name": "refs/heads/master", "committer_date": 1596297771000, "content_id": "9b5838a134fe1324f74bf69810c32af62f0de847", "detected_licenses": [ "MIT" ], "directory_id": "7a18ea3d929616fa4243d28e978e2722607e731e", "extension": "py", "fi...
2.5625
stackv2
from __future__ import print_function import datetime import pickle import time import os.path from googleapiclient.discovery import build from google_auth_oauthlib.flow import InstalledAppFlow from google.auth.transport.requests import Request import webbrowser import re # If modifying these scopes, delete the file t...
138
31.54
111
17
979
python
[{"finding_id": "codeql_py/overly-large-range_26d3fa789d2fc07d_d461971e", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 22 ]
[ null ]
[ 53 ]
[ 56 ]
2024-11-19T02:10:38.197575+00:00
1,629,280,618,000
5e3067247e729336edcc7d5fb2b88966014e3ad8
3
{ "blob_id": "5e3067247e729336edcc7d5fb2b88966014e3ad8", "branch_name": "refs/heads/main", "committer_date": 1629280618000, "content_id": "636b791f910802267c9985855d4f61d64bf9831a", "detected_licenses": [ "MIT" ], "directory_id": "f68c4d396c035deb884917bd87a522174be68c34", "extension": "py", "file...
2.8125
stackv2
import requests import string url = "https://acfb1f211ffff812808f562100f20028.web-security-academy.net/" cookie_name = "TrackingId" s = requests.Session() def good_guess(session, cookie, payload): domain = cookie.domain path = cookie.path session.cookies.set(cookie_name, payload, domain=domain, path=pat...
68
28.78
74
13
503
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f09debfd07431271_186ffdd0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (p...
[ 53, 67 ]
[ null, null ]
[ 23, 11 ]
[ 31, 19 ]
2024-11-19T02:45:21.295517+00:00
1,540,932,846,000
0904ea65a381e2314b5e97c7db52f66338b7f970
3
{ "blob_id": "0904ea65a381e2314b5e97c7db52f66338b7f970", "branch_name": "refs/heads/master", "committer_date": 1540932846000, "content_id": "0e8c2c49b1ce13252c9ab5cdb9660671160e5c8a", "detected_licenses": [ "MIT" ], "directory_id": "c3218b71562f63142c039f7cd75d50fef66b3808", "extension": "py", "fi...
2.90625
stackv2
from twython import Twython from textblob import TextBlob import json import pandas as pd # Load credentials from json file with open("../../twitter_credentials2.json", "r") as file: creds = json.load(file) # Instantiate an object and print key and secret print("CONSUMER_KEY" + creds['CONSUMER_KEY']) print("CONS...
55
26.87
72
10
389
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_cba1d46e4f2222a4_eee92c92", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 13 ]
[ null ]
[ 7 ]
[ 51 ]
2024-11-19T02:45:31.202999+00:00
1,544,312,397,000
81e2d21d425592bfb6d1e3ab2d14539ea017fdd4
2
{ "blob_id": "81e2d21d425592bfb6d1e3ab2d14539ea017fdd4", "branch_name": "refs/heads/master", "committer_date": 1544312397000, "content_id": "72370250901fcdbd27b99bb928b5295501d95472", "detected_licenses": [ "Apache-2.0" ], "directory_id": "8da8be89e01704ea8aa7bd276509ab888f59fd92", "extension": "py"...
2.375
stackv2
from flask import Blueprint from business.config import Config from business.models import Team from business.models import Schedule from business.models import EveryGamePredictedResult import json import logging schedules = Blueprint('schedules', __name__) configuration = Config() configuration.log_init() logger = l...
111
34.48
126
19
842
python
[{"finding_id": "codeql_py/reflective-xss_384134eb25c35f60_87dbed45", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
2
true
[ "CWE-079", "CWE-117" ]
[ "py/reflective-xss", "py/log-injection" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 100, 55 ]
[ null, null ]
[ 16, 18 ]
[ 31, 41 ]
2024-11-19T02:45:50.677328+00:00
1,527,178,172,000
f7c9f3f33f477831698bb1e42ba8d24b566d66b7
2
{ "blob_id": "f7c9f3f33f477831698bb1e42ba8d24b566d66b7", "branch_name": "refs/heads/master", "committer_date": 1527178172000, "content_id": "c439cdc72b0169e654b998297429f67a7cd83bb5", "detected_licenses": [ "MIT" ], "directory_id": "8ea17c0a57f3134b3f00d0be3dfc68cd24366d5b", "extension": "py", "fi...
2.453125
stackv2
#!/usr/bin/env python import csv import json from fabric.api import task from jinja2 import Template import requests import models FIELDNAMES = ['date', 'username', 'caption', 'instagram_url', 'image', 'image_url', 'embed_code', 'approved'] class Photo(object): def __init__(self, **kwargs): for field ...
96
27.07
125
18
646
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_ca0d3e9031bd38ce_bb64eb93", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 88 ]
[ null ]
[ 20 ]
[ 38 ]
2024-11-19T03:12:11.137355+00:00
1,634,658,799,000
1a35451c8fee4cf4f53c4a2a37cf25ddd4cee64b
3
{ "blob_id": "1a35451c8fee4cf4f53c4a2a37cf25ddd4cee64b", "branch_name": "refs/heads/master", "committer_date": 1634658799000, "content_id": "a0f5b6138da93161ef30f6f087975f37c4a645fc", "detected_licenses": [ "Unlicense" ], "directory_id": "f96e8a61154a53859317e60417994a4a46f7b859", "extension": "py",...
3.03125
stackv2
try: import socket, ssl, argparse, platform, os from urllib.parse import urlparse except ImportError as eImp: print(f"Ocurrió el error: {eImp}") def ValidarSOLimpiar(): sistema= platform.system() if sistema== "Windows": return "cls" else: return "clear" socket.setdefaulttimeout(5) def check...
45
22.73
75
13
280
python
[{"finding_id": "codeql_py/insecure-protocol_a781f6cdfac323d8_18b1a02b", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/...
1
true
[ "CWE-327" ]
[ "py/insecure-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.create_default_context](1)." ]
[ 24 ]
[ null ]
[ 10 ]
[ 13 ]
2024-11-19T03:12:12.475059+00:00
1,579,056,286,000
ef3bbfb3d1d18c7e04ec7de5086888f67f4ee796
3
{ "blob_id": "ef3bbfb3d1d18c7e04ec7de5086888f67f4ee796", "branch_name": "refs/heads/master", "committer_date": 1579056286000, "content_id": "fc803d7ba9db41c1e271f340f4d2e08c5c9f4465", "detected_licenses": [ "MIT" ], "directory_id": "cc0b08a957e08f4da0a53718e1ff846f9d15df07", "extension": "py", "fi...
2.59375
stackv2
import paramiko __all__ = ["LiunxCmd"] class LiunxCmd(object): r''' 本模块命令,必须配置SSH免密登录方可使用。 ''' def __init__(self, host): self.hostName = host self.uname = 'root' self.ssh = paramiko.SSHClient() self.ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy()) ...
42
28.52
90
14
299
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_13a9d5ed907f383c_6ae1c9aa", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/paramiko-missing-host-key-validation", "py/paramiko-missing-host-key-validation" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe.", "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 14, 22 ]
[ null, null ]
[ 9, 9 ]
[ 71, 71 ]
2024-11-19T01:33:41.045916+00:00
1,634,276,147,000
76502a1f50a55a3100bec8faac9d08c6042cd60e
3
{ "blob_id": "76502a1f50a55a3100bec8faac9d08c6042cd60e", "branch_name": "refs/heads/main", "committer_date": 1634276147000, "content_id": "5d66e47295ac963f5602739f8fc410a3b89e3bc4", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "260644a4677ed85bb00749f05bc662bc099a1259", "extension": "py"...
2.78125
stackv2
import os from nudenet import NudeDetector from flask import Flask, request, jsonify app = Flask(__name__) detector = NudeDetector() app.config["UPLOAD_FOLDER"] = "./upload" # The main route for analyzing the images/videos @app.route("/analyze", methods=["POST"]) def AnalyzeImage(): # For tracking media validity ...
46
27.37
75
18
283
python
[{"finding_id": "codeql_py/path-injection_a2879f24aa204080_8bb3769b", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](1).", "remed...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](1)." ]
[ 24, 37 ]
[ null, null ]
[ 23, 23 ]
[ 27, 27 ]
2024-11-19T01:57:27.740015+00:00
1,677,747,292,000
515752d554fead9b3c405468e2b48da34e4568c7
2
{ "blob_id": "515752d554fead9b3c405468e2b48da34e4568c7", "branch_name": "refs/heads/main", "committer_date": 1677747292000, "content_id": "4bd4d91b506254b5c2f1e3f7ad62634133acd540", "detected_licenses": [ "MIT" ], "directory_id": "681fda5f88cc173454fd2a83a86086ae7ebb7288", "extension": "py", "file...
2.3125
stackv2
from abc import ABC, abstractmethod from httpx import HTTPError, RequestError from jinja2 import Template from feedforbot.constants import APP_NAME, DEFAULT_MESSAGE_TEMPLATE from feedforbot.core.article import ArticleModel from feedforbot.core.utils import make_post_request from feedforbot.exceptions import Transport...
83
29.35
79
22
511
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_a693ae54211baca5_7b49e527", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 38 ]
[ null ]
[ 24 ]
[ 42 ]
2024-11-19T02:10:59.983657+00:00
1,573,558,285,000
2193caf39a8d53f7637c1640d22fb02134f5e6c1
2
{ "blob_id": "2193caf39a8d53f7637c1640d22fb02134f5e6c1", "branch_name": "refs/heads/master", "committer_date": 1573558285000, "content_id": "f356d38d0c91cd893d92962acd34c09a213b3612", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "08a8240888896ef8f57b491d5d19012cac517cf7", "extension": "p...
2.375
stackv2
import logging import os import tarfile import zipfile import nltk import six import fastText import torch from torchtext import data, vocab from torchtext.utils import download_from_url import os import time import shutil from tqdm import tqdm import requests logger = logging.getLogger(__name__) class FastText(v...
261
35.18
93
24
2,072
python
[{"finding_id": "codeql_py/tarslip_ecdafe156e1b5d77_0c621093", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 131 ]
[ null ]
[ 21 ]
[ 24 ]
2024-11-19T02:11:33.259702+00:00
1,584,888,414,000
90d1bba0179e6c3679c026865ead03fc8ccf9e3a
2
{ "blob_id": "90d1bba0179e6c3679c026865ead03fc8ccf9e3a", "branch_name": "refs/heads/master", "committer_date": 1584888414000, "content_id": "b213ed8c41092f6d0307df77fac617da4f25b2c4", "detected_licenses": [ "Apache-2.0" ], "directory_id": "7670fc72439d6aecd69146d20ce438dda520514f", "extension": "py"...
2.359375
stackv2
#-*- coding: UTF-8 -*- import socket import json import time import os import re # str = ' 1 "command1 "' # strs = re.findall(r'(.+?) "(.+?)" "(.+?)"', str) # print strs gServerAddr = "127.0.0.1:6052" gConfigFile= "wincc.ini" gUserName = "cdc" gPassWord = "123456" gDone = False def readConfig(): global gUser...
272
24.17
122
16
1,919
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_1f49fd356cf10731_019b7fae", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (password)](3) as clear text.\nThis expression stores [sensitive data (password)](4) as clear text." ]
[ 46 ]
[ null ]
[ 17 ]
[ 20 ]
2024-11-19T02:11:47.726659+00:00
1,555,711,637,000
60900570d95918c24daa30a3dd31d54848593e16
2
{ "blob_id": "60900570d95918c24daa30a3dd31d54848593e16", "branch_name": "refs/heads/master", "committer_date": 1555711637000, "content_id": "5024dd28e4b4a8f886ab650fcfb9f15c4f9860b3", "detected_licenses": [ "Apache-2.0" ], "directory_id": "592e9afef8cd9830d16688320f434167ac632285", "extension": "py"...
2.359375
stackv2
#Importing pre-defined classes from flask import Flask,request,jsonify import jsonpickle from flask_cors import CORS,cross_origin #Importing models from Models.User import User #Importing Services from Services.jwt import Jwt from Services.service import Service from Services.zookeeper_handler import ZookeeperHandler...
59
27.36
87
17
421
python
[{"finding_id": "codeql_py/stack-trace-exposure_0fae23027537fe95_5dfde9eb", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 35, 49 ]
[ null, null ]
[ 18, 18 ]
[ 19, 19 ]
2024-11-19T02:33:24.529292+00:00
1,600,147,783,000
d9ed4dcca38b1d7c41882b0bbb449de6b4c91898
2
{ "blob_id": "d9ed4dcca38b1d7c41882b0bbb449de6b4c91898", "branch_name": "refs/heads/master", "committer_date": 1600147783000, "content_id": "1af2a431b71f26bbd0e8d901778ca36ed87975ff", "detected_licenses": [ "MIT" ], "directory_id": "92a933c214445c50514dc54e0d695afd0e91f72a", "extension": "py", "fi...
2.375
stackv2
# coding=utf-8 __author__ = 'wangliang' import flask import cookielib import urllib2 import json import re import time app = flask.Flask(__name__) @app.route('/15days/<code>') def fifteenDays(code): json = get15DaysWeatherJson(code) return json def get15DaysWeatherJson(citycode): req = urllib2.Request...
121
33.44
114
12
1,222
python
[{"finding_id": "codeql_py/partial-ssrf_741e56909687f554_29237a4d", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
2
true
[ "CWE-918", "CWE-918" ]
[ "py/partial-ssrf", "py/partial-ssrf" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 21, 87 ]
[ null, null ]
[ 11, 11 ]
[ 88, 95 ]
2024-11-19T02:46:16.098188+00:00
1,671,566,848,000
34c173f55982a3c6ff55a6eb1e73c54f372b742d
3
{ "blob_id": "34c173f55982a3c6ff55a6eb1e73c54f372b742d", "branch_name": "refs/heads/master", "committer_date": 1671566848000, "content_id": "bb24b01526daa9d2298f5545e9deaf78bb25ea1a", "detected_licenses": [ "Unlicense" ], "directory_id": "34ddec647d6ad357c1527cf713eaeaee4eb575aa", "extension": "py",...
3.3125
stackv2
from hashlib import md5 from bisect import bisect_left def get_doors(position, hash_str): doors = [False, False, False, False] door_open = ['b', 'c', 'd', 'e', 'f'] conditions = [[1, 0], [1, 3], [0, 0], [0, 3]] for i, c in zip(range(4), conditions): doors[i] = hash_str[i] in door_open and posit...
84
30.62
102
17
727
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_b18b939065771d87_2be12adf", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi...
[ 27 ]
[ null ]
[ 25 ]
[ 70 ]
2024-11-19T02:59:28.119312+00:00
1,585,339,049,000
fa977437dab30ec7121e83b0aaf5c7631d89477b
2
{ "blob_id": "fa977437dab30ec7121e83b0aaf5c7631d89477b", "branch_name": "refs/heads/master", "committer_date": 1585339049000, "content_id": "4fe7b8395c8e1bbd15e89981364e381c618170e7", "detected_licenses": [ "MIT" ], "directory_id": "67cd6adda52cc136cbcbd601b79b1bf5e24abbe0", "extension": "py", "fi...
2.359375
stackv2
import functools from flask import ( Blueprint, flash, g, redirect, render_template, request, session, url_for, make_response ) from flask_adventure_game.map import Map from flask_adventure_game.lexicon import scan bp = Blueprint('engine', __name__) @bp.route('/', methods=('GET', 'POST')) def game(): if (req...
48
31.75
122
20
325
python
[{"finding_id": "codeql_py/cookie-injection_1a3b5aa6ba2d05bc_1057c238", "tool_name": "codeql", "rule_id": "py/cookie-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cookie is constructed from a [user-supplied input](1).", "remediation": "", "location": {"file_path": "...
1
true
[ "CWE-020" ]
[ "py/cookie-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cookie is constructed from a [user-supplied input](1)." ]
[ 38 ]
[ null ]
[ 41 ]
[ 49 ]
2024-11-19T02:59:51.987341+00:00
1,628,729,747,000
12fe1a1cae71180ce82f3d621cc4f5cbf7a05768
3
{ "blob_id": "12fe1a1cae71180ce82f3d621cc4f5cbf7a05768", "branch_name": "refs/heads/main", "committer_date": 1628729747000, "content_id": "24bb97ccdbdef5954e3a099ac5d5974fb26efc63", "detected_licenses": [ "Apache-2.0" ], "directory_id": "8036db5e0c0e9c0311798fe06d5ed6d118daaa28", "extension": "py", ...
3.46875
stackv2
from random import randint corpo = [ ''' +-----+ | | | | | | | | ===========''', ''' +-----+ | | o | | | | | ...
168
23.21
94
17
1,095
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_449f9aa3d714990a_0510d833", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text.", "This expression logs [sensitive data (secret)](...
[ 96, 145, 154 ]
[ null, null, 157 ]
[ 15, 19, 19 ]
[ 20, 82, 66 ]
2024-11-19T02:59:54.004986+00:00
1,604,460,997,000
f71cfce1109766ff7e3da302dcaa7051497355a3
3
{ "blob_id": "f71cfce1109766ff7e3da302dcaa7051497355a3", "branch_name": "refs/heads/main", "committer_date": 1604460997000, "content_id": "360e4f9a023472bedc07c99804b6b8756d41e742", "detected_licenses": [ "MIT" ], "directory_id": "43ae50ba92cfce62cbfecdf0b910ad547573b2ff", "extension": "py", "file...
2.984375
stackv2
import re import string from nltk.corpus import stopwords from spellchecker import SpellChecker import wordninja spell = SpellChecker() def remove_emoji(text): """ Removes emojis from text. """ emoji_pattern = re.compile("[" u"\U0001F600-\U0001F64F" # emoticons ...
125
27.74
78
13
1,045
python
[{"finding_id": "codeql_py/overly-large-range_4d5943e230481c5b_54924249", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "remediatio...
4
true
[ "CWE-020", "CWE-020", "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range ...
[ 15, 15, 15, 15 ]
[ null, null, null, null ]
[ 30, 33, 36, 45 ]
[ 34, 37, 40, 49 ]
2024-11-19T03:24:52.268467+00:00
1,634,641,630,000
a29c32debd2e71b8e0ddd211629581fcb6771718
3
{ "blob_id": "a29c32debd2e71b8e0ddd211629581fcb6771718", "branch_name": "refs/heads/master", "committer_date": 1634641630000, "content_id": "f9a4d4743a64395ec509e82374f1d0cba368f53d", "detected_licenses": [ "MIT" ], "directory_id": "07f062ace96e01335ea33086545ac99535c82381", "extension": "py", "fi...
3
stackv2
""" Sets up a proxy server, which automatically adds required header to each request. It makes it possible to run videos in players where passing in http-header is not supported """ from http.server import HTTPServer, SimpleHTTPRequestHandler import requests def proxyServer(headers, serverAddress) -> HTTPServer: ...
65
31.71
82
16
409
python
[{"finding_id": "codeql_py/http-response-splitting_5f9c31f57d6c3390_aff33470", "tool_name": "codeql", "rule_id": "py/http-response-splitting", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This HTTP header is constructed from a [user-provided value](1).", "remediation": "", "lo...
3
true
[ "CWE-113", "CWE-113", "CWE-918" ]
[ "py/http-response-splitting", "py/http-response-splitting", "py/full-ssrf" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This HTTP header is constructed from a [user-provided value](1).", "This HTTP header is constructed from a [user-provided value](1).", "The full URL of this request depends on a [user-provided value](1)." ]
[ 54, 54, 40 ]
[ null, null, null ]
[ 34, 37, 20 ]
[ 35, 56, 59 ]
2024-11-19T01:26:55.753295+00:00
1,572,365,872,000
e7d5ee0a9bec4ff88fcd5b76544107ab7110605b
2
{ "blob_id": "e7d5ee0a9bec4ff88fcd5b76544107ab7110605b", "branch_name": "refs/heads/master", "committer_date": 1572365872000, "content_id": "e653ff1af5e6c6ef6cdae79e09ef3ed55c28ace2", "detected_licenses": [ "MIT" ], "directory_id": "91dedc18e7ac01a38f569d20a015ca78349d91f7", "extension": "py", "fi...
2.4375
stackv2
import argparse from os import path, chmod import time from subprocess import call, CalledProcessError import sys EXECUTABLE = "ddclient" def parseArguments(sysArgs): parser = argparse.ArgumentParser(description='Run ddclient') parser.add_argument("-u", "--use", metavar="use value", ...
76
38.47
99
13
616
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_828f61e5fdc64a5a_d0ba99f1", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 54 ]
[ null ]
[ 20 ]
[ 52 ]
2024-11-19T01:26:57.051957+00:00
1,540,307,083,000
a8521a4a16c744a000faaac2bb597d19e71b6cfd
4
{ "blob_id": "a8521a4a16c744a000faaac2bb597d19e71b6cfd", "branch_name": "refs/heads/master", "committer_date": 1540307083000, "content_id": "be4c28b73c5550adde249f2011cd67fd1a872dec", "detected_licenses": [ "MIT" ], "directory_id": "646d537d8a640814a73e361e511f3639079e1708", "extension": "py", "fi...
3.890625
stackv2
import generator def main(): """ We want to run the generator multiple times, but without prompting for the length of the PW every time. """ # Get variables length = generator.get_length() runs = get_run_num() usable_chars = generator.parse_chars() print("Your passwords are:\n") # Run a lo...
34
28.18
115
16
219
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_877546bebca032eb_71152af3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 14 ]
[ null ]
[ 15 ]
[ 23 ]
2024-11-19T01:37:33.674240+00:00
1,506,922,890,000
0781276b80593c18b9478decedfdfc86a93753a3
3
{ "blob_id": "0781276b80593c18b9478decedfdfc86a93753a3", "branch_name": "refs/heads/master", "committer_date": 1506922890000, "content_id": "14e80b0167f74faacb69c3a3908de1c63bcf1e44", "detected_licenses": [ "MIT" ], "directory_id": "09c88d10d3a1f525d1c757454c297e7194bd75b8", "extension": "py", "fi...
2.640625
stackv2
import mimetypes, os, urllib from repository import Repository from flask import Flask, request, g, send_file, abort, \ render_template, Response # default configuration DATABASE = os.getenv('HTMLZ_REPO', '/storage/Served EBooks') # create app object app = Flask(__name__) def get_repo(): # This attaches a ...
84
27.43
87
14
569
python
[{"finding_id": "codeql_py/stack-trace-exposure_9403f0ebd953c0c4_18d68efa", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
3
true
[ "CWE-209", "CWE-215", "CWE-022" ]
[ "py/stack-trace-exposure", "py/flask-debug", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2)...
[ 78, 84, 76 ]
[ null, null, null ]
[ 25, 5, 26 ]
[ 26, 55, 30 ]
2024-11-19T01:37:51.696227+00:00
1,691,320,219,000
3a3186b9355355e547cf5ef6392a946a28b8f4c8
3
{ "blob_id": "3a3186b9355355e547cf5ef6392a946a28b8f4c8", "branch_name": "refs/heads/master", "committer_date": 1691402980000, "content_id": "44bd333062fa7cf9112a341f8f2a6be81eef4adc", "detected_licenses": [ "MIT" ], "directory_id": "7d2da8dbafb54fc41e455e47a610a164a2d6738d", "extension": "py", "fi...
2.6875
stackv2
"""The main fritzhome handling class.""" # -*- coding: utf-8 -*- from __future__ import print_function import hashlib import logging import time from xml.etree import ElementTree from requests import Session from .errors import InvalidError, LoginError from .fritzhomedevice import FritzhomeDevice from .fritzhomedev...
398
33.89
88
17
3,199
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_f8b99af41313d0c6_f790c73f", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi...
[ 73 ]
[ null ]
[ 30 ]
[ 37 ]
2024-11-19T01:37:52.714419+00:00
1,588,181,102,000
9812e2bea1b2b1562783eb168a49997d833fc6e9
2
{ "blob_id": "9812e2bea1b2b1562783eb168a49997d833fc6e9", "branch_name": "refs/heads/master", "committer_date": 1588181102000, "content_id": "7d1500e0115751f325a7e7edb9215a82c0323be2", "detected_licenses": [ "MIT" ], "directory_id": "bafe5b4dc96a15026cebed08dee2dba789876ced", "extension": "py", "fi...
2.390625
stackv2
import re from schema import Schema, And from boom.schema.template_config import template_config_schema project_name_pattern = re.compile("^[a-zA-Z][a-zA-Z0-9 ]{2,}$") project_name_path_pattern = re.compile("^[a-zA-Z0-9_]{3,}$") author_name_pattern = re.compile("^[a-zA-Z ]{4,}$") author_url_pattern = re.compile("^ht...
24
59.29
118
14
335
python
[{"finding_id": "codeql_py/overly-large-range_2a7d887ec6fe459a_e287c6ce", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
2
true
[ "CWE-020", "CWE-1333" ]
[ "py/overly-large-range", "py/redos" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", "This part of the regular expression may cause exponential backtracking on strings starting with 'http://' and containing many repetitions of '('." ]
[ 10, 10 ]
[ null, null ]
[ 65, 46 ]
[ 68, 111 ]
2024-11-19T01:37:53.672271+00:00
1,549,834,650,000
4aa93edf33f4836513d8b39997e458b649135348
3
{ "blob_id": "4aa93edf33f4836513d8b39997e458b649135348", "branch_name": "refs/heads/master", "committer_date": 1549834650000, "content_id": "cb207c769e938514546e8d844a2e382cbe40bcca", "detected_licenses": [ "MIT" ], "directory_id": "d6d34e3895393b89f8b268f7a890a8d8be4e4d8d", "extension": "py", "fi...
2.765625
stackv2
""" VirusTotal Automated Investigation for LogRhythm Dan Crossley | daniel.crossley@logrhythm.com Feb 2019 Version 2.0 This example should be considered a proof of concept only, and does not necessarily represent best practices recommended by LogRhythm. Usage: VT-Investigation-SRP.py [-h HASH ] <AlarmID> Plugin Fl...
312
36.41
172
16
3,014
python
[{"finding_id": "codeql_py/request-without-cert-validation_f119fd70638ea961_eef1ef0d", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
5
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 152, 175, 187, 201, 220 ]
[ null, null, null, null, null ]
[ 16, 5, 5, 5, 5 ]
[ 90, 79, 79, 79, 78 ]
2024-11-19T01:38:51.240883+00:00
1,627,785,765,000
e56e0ca80fc06d482187f1afa4bf5bf4450c0f76
2
{ "blob_id": "e56e0ca80fc06d482187f1afa4bf5bf4450c0f76", "branch_name": "refs/heads/main", "committer_date": 1627785765000, "content_id": "434bc1404fdd82e4de138e740af7dd3c017b4dbb", "detected_licenses": [ "Apache-2.0" ], "directory_id": "1c956b9f0dc0f08c122372969118651c715b9e3e", "extension": "py", ...
2.453125
stackv2
import logging import json from flask import jsonify, abort, Response from server import app, cln_client from cloudant.error import CloudantException, ResultException from cloudant.query import Query @app.route("/indicators/<string:symbol>") def indicators(symbol): if symbol is None or symbol == '': abo...
42
31.67
93
21
315
python
[{"finding_id": "codeql_py/stack-trace-exposure_43f0b10f99bcfcbe_40d8ff9a", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 20, 33 ]
[ null, null ]
[ 24, 24 ]
[ 76, 70 ]
2024-11-19T01:52:13.576237+00:00
1,449,276,678,000
196f2da03376db6a99239942a3da26d28f9c2ea7
3
{ "blob_id": "196f2da03376db6a99239942a3da26d28f9c2ea7", "branch_name": "refs/heads/master", "committer_date": 1449276678000, "content_id": "9d8954aef21621bb30de9a0dcbd83a48b628b2cd", "detected_licenses": [ "MIT" ], "directory_id": "476db59a7947ae40f0f60755c000c901400d5d84", "extension": "py", "fi...
2.84375
stackv2
#! /usr/bin/env python # -*- coding: utf-8 -*- # vim:fenc=utf-8 # # Copyright © 2015 Christopher C. Strelioff <chris.strelioff@gmail.com> # # Distributed under terms of the MIT license. """ consumer_key.py ================= A Python 3 example of using the discogs-client with a consumer key and secret. """ import disc...
100
31.44
78
16
829
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_18b9b94bb3d0a58b_fc426d94", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 39 ]
[ 43 ]
[ 7 ]
[ 42 ]
2024-11-19T01:52:14.689475+00:00
1,570,874,876,000
728487bc052ac8cd3b8418f4cbf8d83af98f7348
2
{ "blob_id": "728487bc052ac8cd3b8418f4cbf8d83af98f7348", "branch_name": "refs/heads/master", "committer_date": 1570874876000, "content_id": "0a21ddea347f538a45fc253c2f370fc0c49ed4c0", "detected_licenses": [ "Apache-2.0" ], "directory_id": "cd1919dfabe43fbfefd473aaaafdedf37e14bfd1", "extension": "py"...
2.5
stackv2
import abc import six @six.add_metaclass(abc.ABCMeta) class BaseEngine(object): device = None @abc.abstractmethod def get_properties(self): """Return the device information """ def run_command(cmd, node_ip, username, password): # Replace this code by the SSH module import param...
24
24.83
68
10
133
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_befa1bb11df6bcd8_3f780fae", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 20 ]
[ null ]
[ 5 ]
[ 69 ]
2024-11-19T01:52:26.777760+00:00
1,608,196,159,000
61d037e8ec2db1a977f0f570a52a999dad8075a1
2
{ "blob_id": "61d037e8ec2db1a977f0f570a52a999dad8075a1", "branch_name": "refs/heads/main", "committer_date": 1608196159000, "content_id": "eac2fa4fcd6234c5ebecd22014c909c5fe1fe969", "detected_licenses": [ "Apache-2.0" ], "directory_id": "36a7ca671625d67d609351c564c5a8b9f3b97e96", "extension": "py", ...
2.34375
stackv2
# encoding: utf-8 """ @author: fonttian @contact: fonttian@gmail.com @license: by-nc-sa @file: app.py @time: 2020/11/9 上午8:47 """ import sqlite3 from flask import Flask, request, render_template, jsonify from werkzeug.utils import secure_filename from ODLibrary.diff import real_time_diff_detect from Tools.ExceptionHan...
303
35.78
118
16
2,535
python
[{"finding_id": "codeql_py/unsafe-deserialization_cee444f9a951adc0_7d4727d4", "tool_name": "codeql", "rule_id": "py/unsafe-deserialization", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Unsafe deserialization depends on a [user-provided value](1).", "remediation": "", "locatio...
3
true
[ "CWE-502", "CWE-022", "CWE-022" ]
[ "py/unsafe-deserialization", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Unsafe deserialization depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 266, 143, 145 ]
[ null, null, null ]
[ 27, 27, 23 ]
[ 36, 42, 38 ]
2024-11-19T02:04:40.609402+00:00
1,514,451,608,000
a8c928b7ecbb6cc6308ea93d91028a6c81c708f6
3
{ "blob_id": "a8c928b7ecbb6cc6308ea93d91028a6c81c708f6", "branch_name": "refs/heads/master", "committer_date": 1514451608000, "content_id": "e34651c17413ac64c30b4bfd4d71f7850a359819", "detected_licenses": [ "Apache-2.0" ], "directory_id": "8380f4ff0fa27e7f0a4deb24ae0b06297ccff4e0", "extension": "py"...
2.8125
stackv2
from telegram.ext import Updater, CommandHandler, MessageHandler, Filters import logging import ConfigParser import os class Main: def __init__(self): # Enable logging logging.basicConfig(format='%(asctime)s - %(name)s - %(levelname)s - %(message)s', level=logging.INFO...
112
33.61
112
13
834
python
[{"finding_id": "codeql_py/overly-large-range_9ab85dac6bfbc7f4_0a4d3c79", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 86 ]
[ null ]
[ 59 ]
[ 62 ]
2024-11-19T02:04:43.584631+00:00
1,504,691,342,000
c447745a3c786134a0322e5411ce5649133b0afe
2
{ "blob_id": "c447745a3c786134a0322e5411ce5649133b0afe", "branch_name": "refs/heads/master", "committer_date": 1504691342000, "content_id": "dc7d09327d668aacbd58a9fdf2f1851308065958", "detected_licenses": [ "MIT" ], "directory_id": "dc9528a772bebef92f31afd0327cbad286d4d507", "extension": "py", "fi...
2.421875
stackv2
from . import api from flask import request, jsonify from ..models import File from mongoengine import Q from bson import objectid import json def retrieve_tree(file_node_current_id=None, depth=0): file_tree = [] if file_node_current_id: file_nodes = File.objects(Q(path__size=depth) & Q(path=objectid....
123
36
164
20
992
python
[{"finding_id": "codeql_py/stack-trace-exposure_40f8a44159e07609_1296a2c5", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 113 ]
[ null ]
[ 28 ]
[ 47 ]
2024-11-19T02:04:46.051757+00:00
1,614,359,396,000
d35bd99c448b46952c0325792adb980c0f0b6d46
3
{ "blob_id": "d35bd99c448b46952c0325792adb980c0f0b6d46", "branch_name": "refs/heads/main", "committer_date": 1614359396000, "content_id": "f17b9bff8574fe09be6afca2f5b2be2ebcd3d87b", "detected_licenses": [ "Unlicense" ], "directory_id": "4ff4aa5481a1f8976a8fd691b3a1137f0f77e68f", "extension": "py", ...
2.734375
stackv2
"""Handle Songlink Stuff""" import os from typing import Optional import requests from urlextract import URLExtract EXTRACTOR = URLExtract() def extract_link(text: str) -> Optional[str]: """Extract the URL for the music service""" for url in EXTRACTOR.find_urls(text): if \ 'open.spotify...
34
22.85
53
13
192
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_c1afc7859a13c542_beb8d4a8", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [open.spotify.com](1) may be at an arbitrary position i...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "The string [open.spotify.com](1) may be at an arbitrary position in the sanitized URL.", "The string [music.apple.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 16, 17 ]
[ null, null ]
[ 13, 13 ]
[ 38, 37 ]
2024-11-19T02:04:49.912798+00:00
1,554,101,979,000
481751d1bd323ba1f2b77baf143877226d0eddff
2
{ "blob_id": "481751d1bd323ba1f2b77baf143877226d0eddff", "branch_name": "refs/heads/master", "committer_date": 1554101979000, "content_id": "f72667c78de8b3729ab0154a15e014dd9916de6b", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "450e009ae02c9722caf44779e404bfaae4d345b2", "extension": "p...
2.359375
stackv2
# Copyright (c) Jupyter Development Team. # Distributed under the terms of the Modified BSD License. """Tornado handlers for invoking notebook cells as web APIs.""" import os import json import tornado.web from tornado.log import access_log from .request_utils import (parse_body, parse_args, format_request, header...
266
40.03
101
21
2,107
python
[{"finding_id": "codeql_py/stack-trace-exposure_1abae5864c1b84d0_0dc59b87", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 219 ]
[ null ]
[ 24 ]
[ 32 ]
2024-11-19T02:04:52.994348+00:00
1,644,921,813,000
eb9249085104f932a73c2b885913f791a6ac6333
2
{ "blob_id": "eb9249085104f932a73c2b885913f791a6ac6333", "branch_name": "refs/heads/master", "committer_date": 1644921813000, "content_id": "a6de58522c97294f2755a552f2868456b0a847df", "detected_licenses": [ "MIT" ], "directory_id": "224af08fedb382aefa96117f2aa02713076ddcbd", "extension": "py", "fi...
2.34375
stackv2
from flask import Flask, render_template, request, session from flask import jsonify from flask_cors import CORS, cross_origin from flask_restful import Resource,Api import sys sys.path.insert(0, '/home/ls41/Desktop/Factoid-based-Question-Answer-Chatbot' ) from spellcheck import spellcheck as SC from DocumentRetrievalM...
444
33.67
133
23
3,568
python
[{"finding_id": "codeql_py/path-injection_6995c7df24283814_c2ac28e7", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 399 ]
[ null ]
[ 28 ]
[ 39 ]
2024-11-19T02:04:59.420955+00:00
1,541,777,318,000
ee899922327c35551ae0f7963b9987efa6d27f49
3
{ "blob_id": "ee899922327c35551ae0f7963b9987efa6d27f49", "branch_name": "refs/heads/master", "committer_date": 1541777318000, "content_id": "db3ce80924ab3e6db9d20d5df8dc76355071e9ce", "detected_licenses": [ "MIT" ], "directory_id": "1f5e896a948d4bf2f9e39ab2e2d528a1ddc313c2", "extension": "py", "fi...
2.6875
stackv2
# -*- coding: utf-8 -*- import ast import calendar import config import datetime import os import telebot import logging from flask import Flask, request from Postgres import Postgres from telebot import types # locale.setlocale(locale.LC_ALL, 'ru_RU.UTF-8') # seems like heroku does not support it week_days = ['Поне...
387
32.56
134
25
3,130
python
[{"finding_id": "codeql_py/reflective-xss_ba0c0c5a2438654d_5b39aec3", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 377 ]
[ null ]
[ 12 ]
[ 23 ]
2024-11-19T02:28:25.796059+00:00
1,567,016,869,000
a4300e9fd7ada32286bf1b7b2eb8c31d552efa31
3
{ "blob_id": "a4300e9fd7ada32286bf1b7b2eb8c31d552efa31", "branch_name": "refs/heads/master", "committer_date": 1567016869000, "content_id": "7f3bdbfbbe8bcde0e0f3820f590e563c2bd33e79", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "36a08912ecbc0425b793f6297a687324560d0685", "extension": "p...
2.578125
stackv2
# -*- coding: utf-8 -*- """ Functions for generating QC images and an HTML report for outputs from the ANTs longitudinal cortical thickness pipeline """ import argparse import os import pathlib import re import jinja2 import nibabel as nib from niworkflows.viz.utils import (compose_view, plot_segs, ...
322
29.53
79
16
2,374
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_6716c333717a5e34_4e6ea714", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 310 ]
[ 312 ]
[ 11 ]
[ 49 ]
2024-11-19T02:28:30.936250+00:00
1,586,743,084,000
e4321e67212b93b620397c6d962a695762c74454
2
{ "blob_id": "e4321e67212b93b620397c6d962a695762c74454", "branch_name": "refs/heads/master", "committer_date": 1586743084000, "content_id": "e32832c0460aae61fecaf46368784b46ab91179b", "detected_licenses": [ "MIT" ], "directory_id": "906f7d4116b449762a0557f5435de968af91e857", "extension": "py", "fi...
2.34375
stackv2
from jinja2 import Template from generate_receipt import generate_receipt, verify_receipt from simple_qr import encoding, decoding import time import json import argparse saved_QR = {} def create_html_receipt(receipt, name, filepath): path = encoding(receipt, name) with open('receipt_template.html', "r") as...
33
23.82
64
13
196
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_25fec6a424335c76_30028f1b", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 15 ]
[ null ]
[ 9 ]
[ 27 ]
2024-11-19T02:28:50.130204+00:00
1,662,362,316,000
7d05e8dbf2894588d4f8f4f2de6ace6074fc4b73
2
{ "blob_id": "7d05e8dbf2894588d4f8f4f2de6ace6074fc4b73", "branch_name": "refs/heads/master", "committer_date": 1662362316000, "content_id": "90272d6525a7e31845e971d84f3de1a8a17038e5", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e96889bdfc11b1fefe00b23ca3ef0944f6cce3e6", "extension": "py"...
2.34375
stackv2
""" Routes related to users(admin, extractor and management). """ from flask import Blueprint, jsonify, request from flask.globals import current_app from flask.helpers import make_response from api.models.admin import Admin from api.models.extractor import Extractor from api.models.management import Management from a...
531
29.44
168
17
3,405
python
[{"finding_id": "codeql_py/stack-trace-exposure_014a338ac3258a87_afea890b", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
4
true
[ "CWE-209", "CWE-209", "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information...
[ 199, 221, 271, 296 ]
[ null, null, null, null ]
[ 38, 38, 42, 42 ]
[ 46, 46, 50, 50 ]
2024-11-19T02:28:52.530954+00:00
1,633,628,367,000
5457b3ef0f7ffc800bd54ce68b19a678bdfd8b9c
3
{ "blob_id": "5457b3ef0f7ffc800bd54ce68b19a678bdfd8b9c", "branch_name": "refs/heads/master", "committer_date": 1633628367000, "content_id": "e65932c2944da1fd4ce8c58467340bbcd2bb881b", "detected_licenses": [ "MIT" ], "directory_id": "bf27149c253827ea87cdcedda0e9c1cf56b9e905", "extension": "py", "fi...
2.890625
stackv2
# write your code here import argparse import sys import socket import itertools #parser = argparse.ArgumentParser(description="hacking website passwords") #parser.add_argument("addrress") #parser.add_argument("port") #parser.add_argument("password") args = sys.argv ipaddress = args[1] port = int(args[2]) def make...
67
29.25
126
16
473
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6973ab63c7507827_48ee6950", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 65 ]
[ null ]
[ 7 ]
[ 15 ]
2024-11-19T02:36:43.985978+00:00
1,569,553,221,000
9f0c37aa9ec5d2c9a8215fee585dbf7d133f9bb7
2
{ "blob_id": "9f0c37aa9ec5d2c9a8215fee585dbf7d133f9bb7", "branch_name": "refs/heads/master", "committer_date": 1569553221000, "content_id": "19edf75728a62ed0eb85a897e501618971c08f17", "detected_licenses": [ "MIT" ], "directory_id": "c43e39443b09c2ca792335d3f407fd08dfe3f83e", "extension": "py", "fi...
2.4375
stackv2
# -*- coding:utf-8 -*- import urllib import os import hashlib import random import requests import json import sys import re from flask import Flask, request, render_template def dealInput(content): #rep = r'[^\u4e00-\u9fa5]' #newStr = re.sub(rep, '', content) if content == '': return '这是一只鸟' ...
71
23.24
146
20
480
python
[{"finding_id": "codeql_py/flask-debug_379b0f151b4dd99c_c2b0ea43", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-327" ]
[ "py/flask-debug", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 71, 52 ]
[ null, null ]
[ 5, 15 ]
[ 24, 35 ]
2024-11-19T02:36:45.655530+00:00
1,674,509,735,000
9a153d3c41380fc5857fef595a9a2ddb671e6c74
2
{ "blob_id": "9a153d3c41380fc5857fef595a9a2ddb671e6c74", "branch_name": "refs/heads/master", "committer_date": 1674509735000, "content_id": "10a03e8e423d93f9bfdae42dd7f7a116ffff0b41", "detected_licenses": [ "MIT" ], "directory_id": "e29386e84639c9747b7a6b7f1ad44b3b1b8de38b", "extension": "py", "fi...
2.390625
stackv2
#!/usr/bin/env python3 # --------------------------------------------------------- # Definition off all flask app endpoints/routes # --------------------------------------------------------- import logging import os import subprocess import time from flask import jsonify, render_template, request from app import ap...
179
30.54
123
25
1,056
python
[{"finding_id": "codeql_py/stack-trace-exposure_5aee821703a7d1bc_58aa63e4", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 164 ]
[ null ]
[ 20 ]
[ 60 ]
2024-11-19T02:36:53.369187+00:00
1,636,194,556,000
6aa8f90d9fb335b47c49719fb515a98dd341d246
3
{ "blob_id": "6aa8f90d9fb335b47c49719fb515a98dd341d246", "branch_name": "refs/heads/main", "committer_date": 1636194556000, "content_id": "dc8b07888dfa325312094cf62ae485f1ffb17121", "detected_licenses": [ "Unlicense" ], "directory_id": "45b4ea214c86f02eb168bf9828357eff0dd283d2", "extension": "py", ...
3.375
stackv2
from Crypto.Cipher import DES from Crypto.Cipher import DES3 from Crypto.Random import get_random_bytes from Crypto.Util.Padding import pad from Crypto.Util.Padding import unpad import base64 def base64Encoding(input): dataBase64 = base64.b64encode(input) dataBase64P = dataBase64.decode("UTF-8") return dataBase6...
115
41.24
91
13
1,438
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_0e6da678457636e0_b3398340", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The cryptographic algorithm DES](1) is broken or weak, and should not be used.", "r...
4
true
[ "CWE-327", "CWE-327", "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[The cryptographic algorithm DES](1) is broken or weak, and should not be used.", "[The cryptographic algorithm DES](1) is broken or weak, and should not be used.", "[The cryptographic algorithm DES3](1) is broken or weak, and should not be used.", "[The cryptographic algorithm DES3](1) is broken or weak, an...
[ 29, 39, 48, 58 ]
[ null, null, null, null ]
[ 16, 19, 16, 19 ]
[ 64, 45, 64, 45 ]
2024-11-19T02:37:08.514432+00:00
1,659,518,023,000
9b0b4506a7a85a968520394a952af4023c817fbb
2
{ "blob_id": "9b0b4506a7a85a968520394a952af4023c817fbb", "branch_name": "refs/heads/master", "committer_date": 1659518023000, "content_id": "7e6f49e684408f09ccd6d71c54ba18fb9d8d791c", "detected_licenses": [ "MIT" ], "directory_id": "91bd14aca9d962fd21cf32def42678178c7b4f94", "extension": "py", "fi...
2.390625
stackv2
# example_webserver.py # ######################## from flask import Flask, request import praw app = Flask(__name__) CLIENT_ID = 'YOUR_CLIENT_ID' CLIENT_SECRET = 'YOUR CLIENT SECRET' REDIRECT_URI = 'http://127.0.0.1:65010/authorize_callback' @app.route('/') def homepage(): link_no_refresh = r.get_authorize_url...
43
36.79
74
11
410
python
[{"finding_id": "codeql_py/flask-debug_76ede0f6ab2a3e87_b6d85b9f", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 43, 36 ]
[ null, null ]
[ 5, 12 ]
[ 36, 75 ]
2024-11-19T02:37:11.393448+00:00
1,582,775,915,000
619d2dc6a5b74e005bc8f61c95414bc631653563
3
{ "blob_id": "619d2dc6a5b74e005bc8f61c95414bc631653563", "branch_name": "refs/heads/master", "committer_date": 1582775915000, "content_id": "9364441528636906947484b0349595f8688ad1a9", "detected_licenses": [ "Apache-2.0" ], "directory_id": "1a27c2d9b60eb34e0f63c13f8d47d8fdf3db0a7b", "extension": "py"...
2.53125
stackv2
from flask import Flask, make_response, request app = Flask(__name__) @app.route('/read') def read(): username = request.cookies.get('username', 'NOT_FOUND') resp = app.make_response(username) resp.mimetype = "text/plain" return resp @app.route('/write') def write(): text = 'foobar' resp =...
22
18.68
59
10
102
python
[{"finding_id": "codeql_py/insecure-cookie_85ccb8e8b56ff156_4af2a296", "tool_name": "codeql", "rule_id": "py/insecure-cookie", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Cookie is added to response without the 'secure' flag being set.", "remediation": "", "location": {"file_path"...
3
true
[ "CWE-614", "CWE-1004", "CWE-079" ]
[ "py/insecure-cookie", "py/client-exposed-cookie", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cookie is added to response without the 'secure' flag being set.", "Sensitive server cookie is set without HttpOnly flag.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 21, 21, 10 ]
[ null, null, null ]
[ 5, 5, 30 ]
[ 38, 38, 38 ]
2024-11-19T02:37:17.592582+00:00
1,568,292,417,000
9acc3fd6a712637cd84d0e927328e6c36cdde18e
3
{ "blob_id": "9acc3fd6a712637cd84d0e927328e6c36cdde18e", "branch_name": "refs/heads/master", "committer_date": 1568292417000, "content_id": "561760b546ae01f95296f5d0f243762c03771f6a", "detected_licenses": [ "MIT" ], "directory_id": "564cf0465e12cc41a7b0b17490207aff44c320d8", "extension": "py", "fi...
2.671875
stackv2
import pathlib from typing import Optional, Dict, Any, List import sciwing.constants as constants from questionary.prompts.common import Choice import jinja2 import questionary import wasabi import autopep8 from sciwing.commands.validators import is_file_exist PATHS = constants.PATHS TEMPLATES_DIR = PATHS["TEMPLATES_D...
376
34.51
104
19
2,717
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_5ff69eab81726b64_6a0c47e3", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 47 ]
[ null ]
[ 26 ]
[ 58 ]
2024-11-19T02:49:09.682476+00:00
1,619,601,157,000
cfdb3bb9764e92bb3f064a59f32ce363588c14b4
2
{ "blob_id": "cfdb3bb9764e92bb3f064a59f32ce363588c14b4", "branch_name": "refs/heads/main", "committer_date": 1619601157000, "content_id": "d1c568ad830468be19140558e59d3feca166f78e", "detected_licenses": [ "MIT" ], "directory_id": "64bc8a72846338f2c9527257dab8972ce019eb80", "extension": "py", "file...
2.46875
stackv2
""" Routes and views for the flask application. """ import uuid from datetime import datetime import msal from flask import flash, jsonify, redirect, render_template, request, session, url_for from flask_login import current_user, login_required, login_user, logout_user from werkzeug.urls import url_parse from confi...
175
32.21
99
16
1,258
python
[{"finding_id": "codeql_py/url-redirection_6471ec0443fcf66d_bcfc6990", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 61 ]
[ null ]
[ 25 ]
[ 34 ]
2024-11-19T02:49:14.567434+00:00
1,542,396,343,000
7539944e30166765cb83fdd6889424198fefe7a4
3
{ "blob_id": "7539944e30166765cb83fdd6889424198fefe7a4", "branch_name": "refs/heads/master", "committer_date": 1542396343000, "content_id": "f8fc71f236af582004b3626970aeee75ac6ce495", "detected_licenses": [ "Apache-2.0" ], "directory_id": "29b306797f4ee7848b8986d26d632e7e49526320", "extension": "py"...
2.65625
stackv2
#Eric Jacobson #erjacobs@redhat.com #29 June 2018 # #Watch endpoints as a service (WEaaS) # import itertools import resources.rabbitListener as listener import sys import threading import logging from yaml import load from flask import Flask, Response, request from resources.client import Client from keystoneauth1 im...
140
26.64
82
18
823
python
[{"finding_id": "codeql_py/log-injection_a43c4ec62bab8c6c_d3ce488d", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 50 ]
[ null ]
[ 22 ]
[ 62 ]
2024-11-19T02:49:26.316386+00:00
1,599,360,696,000
8cad12a28e1fddcf3feb9cb4c5826880d5c0d836
2
{ "blob_id": "8cad12a28e1fddcf3feb9cb4c5826880d5c0d836", "branch_name": "refs/heads/master", "committer_date": 1599360696000, "content_id": "6462defb9c172faf4d54f2f21517aa336543870d", "detected_licenses": [ "MIT" ], "directory_id": "f8563562fd3a563438b96c676ddcc0bc15fbcc3f", "extension": "py", "fi...
2.390625
stackv2
from django.shortcuts import render from django.views.generic import View from utils import restful,files from apps.analysis.models import NetWorkManager import networkx as nx import matplotlib.pyplot as plt from datetime import datetime import os from django.conf import settings class NetworkGenerate(View): def...
218
40.36
136
18
2,165
python
[{"finding_id": "codeql_py/path-injection_de244aa4f9fb616c_1221ca4d", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 199, 201 ]
[ null, null ]
[ 33, 25 ]
[ 41, 33 ]
2024-11-19T02:49:27.589281+00:00
1,551,126,411,000
156f156fd1d3c728752b433626ef9a6381fc8ea8
3
{ "blob_id": "156f156fd1d3c728752b433626ef9a6381fc8ea8", "branch_name": "refs/heads/master", "committer_date": 1551126411000, "content_id": "124b44c43266a91c102e0d71bb75001bbc97e807", "detected_licenses": [ "MIT" ], "directory_id": "9d9b066ed87d0d380cb541d198a6779eccdbfe77", "extension": "py", "fi...
2.828125
stackv2
#!/usr/local/bin/python # Author: Scott Chubb scott.chubb@netapp.com # Written for Python 3.4 and above # No warranty is offered, use at your own risk. While these scripts have been tested in lab situations, all use cases cannot be accounted for. # Date: 13-Feb-2018 # This scripts shows how to gather volume informatio...
66
43.59
143
24
780
python
[{"finding_id": "codeql_py/request-without-cert-validation_c43581c7b99dacc3_32c01102", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 59 ]
[ null ]
[ 16 ]
[ 90 ]
2024-11-19T03:00:31.602439+00:00
1,597,021,180,000
42150342808e964db0d5d4cc864138f60a464eb8
3
{ "blob_id": "42150342808e964db0d5d4cc864138f60a464eb8", "branch_name": "refs/heads/master", "committer_date": 1597021180000, "content_id": "7a35e5f99ac98f0ca4c479a32c40787d1b7d4eb9", "detected_licenses": [ "MIT" ], "directory_id": "d53f2ff7e9a0487457beac2e3946b0c533e31600", "extension": "py", "fi...
2.578125
stackv2
# Version : 2.5 import re import timelib import Threadinglib import json import os from collections import deque import requests import threading import sys from queue import Queue def handle_url(url: str): return "https://m.weibo.cn/status"+url[url.rindex("/"):] def download_beta(path="", iter=""): while i...
131
28.53
94
20
1,040
python
[{"finding_id": "codeql_py/overly-large-range_9b5c6dea17bc9ffb_56f8e8d8", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 61 ]
[ null ]
[ 59 ]
[ 62 ]
2024-11-19T03:00:35.250095+00:00
1,601,566,429,000
edd0742dd672f49c6f7b055656860f48fbbcd478
3
{ "blob_id": "edd0742dd672f49c6f7b055656860f48fbbcd478", "branch_name": "refs/heads/master", "committer_date": 1601566429000, "content_id": "44e2489b419b6eec3e0e1574cebbaee2418b0892", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "ff36e7a5769ab8001f29c3c91fc0cf965146499b", "extension": "p...
2.890625
stackv2
import os import string import hashlib from django.conf import settings def generate_random_string(length, stringset="".join( [string.ascii_letters+string.digits] )): """ Returns a string with `length` characters chosen from ...
22
27.14
69
13
137
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_b82fa8eada16f9b4_6f92e2a0", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecu...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecure." ]
[ 19 ]
[ 22 ]
[ 25 ]
[ 7 ]
2024-11-19T03:11:40.435767+00:00
1,540,146,900,000
a4198885927944e3adc6568d007361b39882d041
2
{ "blob_id": "a4198885927944e3adc6568d007361b39882d041", "branch_name": "refs/heads/master", "committer_date": 1540146900000, "content_id": "4ca61ca4a34ed50e1651d3db0c58189235254e14", "detected_licenses": [ "MIT" ], "directory_id": "b1441a5fd0cb78cc0478fd29e813b08ecfe4bed5", "extension": "py", "fi...
2.453125
stackv2
# Code by # Kelly Lehman # @r3curs3 # 10/19/2018 import pyotp from datetime import datetime, date, timedelta import calendar import json import requests from html.parser import HTMLParser def get_time(tmp): time = tmp.split() month = dict((v,k) for k,v in enumerate(calendar.month_abbr))[time[4].strip(' ,')[0:...
41
30.8
95
16
375
python
[{"finding_id": "codeql_py/request-without-cert-validation_9f632ec4c0bbf778_01134091", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
3
true
[ "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 36, 39, 40 ]
[ null, null, null ]
[ 13, 5, 5 ]
[ 44, 64, 96 ]
2024-11-19T03:12:09.394371+00:00
1,461,615,745,000
bc3dda363580cb7b58642c70dbbcd162e0f8e975
3
{ "blob_id": "bc3dda363580cb7b58642c70dbbcd162e0f8e975", "branch_name": "refs/heads/master", "committer_date": 1461615745000, "content_id": "b4de4c05752b438112e8db22f2b4f1d2330d7f1b", "detected_licenses": [ "Apache-2.0" ], "directory_id": "c03c4cf64f6d829c3dd22c56fecd3a0089c363dd", "extension": "py"...
2.546875
stackv2
""" next_backend Logs Resource author: Christopher Fernandez, Lalit Jain Logs resource for all logs associated with a specified experiment. """ ''' example use: get a tripletMDS query: curl -X GET http://localhost:8001/api/experiment/[exp_uid]/[exp_key]/logs ''' from flask import Flask, request, send_file from flask...
118
29.86
100
18
778
python
[{"finding_id": "codeql_py/code-injection_8064b84e6fc618ad_094f8419", "tool_name": "codeql", "rule_id": "py/code-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This code execution depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "...
1
true
[ "CWE-094" ]
[ "py/code-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This code execution depends on a [user-provided value](1)." ]
[ 92 ]
[ null ]
[ 33 ]
[ 56 ]
2024-11-19T03:12:11.931302+00:00
1,687,549,239,000
b13a9f39d0ac3166c651e38d97eeacc747cafc39
3
{ "blob_id": "b13a9f39d0ac3166c651e38d97eeacc747cafc39", "branch_name": "refs/heads/main", "committer_date": 1687549239000, "content_id": "ff8a55ad880b429a5b977e16c080e3207c1dcc31", "detected_licenses": [ "MIT" ], "directory_id": "0cdabf8a5eed0cfd7c0316a8ebfccf6c38faf16d", "extension": "py", "file...
2.671875
stackv2
"""Test orchestration and report generation module.""" import pathlib import datetime import logging import unittest from typing import Dict, Tuple import jinja2 import markdown from .decorators import FIGURES logger = logging.getLogger(__name__) def discover_and_run( tests_dir: str = ".", pattern: str = "test...
93
38.63
97
14
828
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_496ec1b0f4f02b83_837e36c2", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 55 ]
[ null ]
[ 11 ]
[ 76 ]
2024-11-19T03:12:30.762874+00:00
1,599,025,647,000
5b5c3a1db71fb844cb12a3451cf6e4d09187920e
3
{ "blob_id": "5b5c3a1db71fb844cb12a3451cf6e4d09187920e", "branch_name": "refs/heads/master", "committer_date": 1599025647000, "content_id": "bf87496355909c3edfec2c34a1c9823f7ac6e196", "detected_licenses": [ "MIT" ], "directory_id": "0b839a2ed7af7753c6e14db6c0bafd0256b4885c", "extension": "py", "fi...
2.578125
stackv2
import asyncio import configparser from datetime import datetime import json import signal import sys import time from urllib.parse import urlparse RETRIES = 10 async def send_auth(reader, writer, user, password): auth = {"params": [user, password], "id": 2, "method": "mining.authorize"} print(f'send: {auth}...
82
27.6
78
18
497
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d01a0823452b0a3a_adb2178c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text." ]
[ 15 ]
[ null ]
[ 11 ]
[ 26 ]
2024-11-19T03:12:42.117479+00:00
1,551,794,655,000
b1f349b5106f4ebd32ce21179beefd3a5493ef20
3
{ "blob_id": "b1f349b5106f4ebd32ce21179beefd3a5493ef20", "branch_name": "refs/heads/master", "committer_date": 1551794655000, "content_id": "ef87916feb1e15d8caaf16e4a2c8c092d9eaccf4", "detected_licenses": [ "MIT" ], "directory_id": "25c349dcf75117ce26108e35322c266448dc7203", "extension": "py", "fi...
3.234375
stackv2
# -*- coding: utf-8 -*- """ @author: Jatin Goel File for performing operations on a resource. This file consists of a class: **UnixResource**, which can connect to the remote UNIX Machine, using SSH via Paramiko. The instance of this class can be used to perform various operations on a machine, like, #. Check...
447
30.52
112
19
2,751
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_ddc5faa059b5753f_3ac0926b", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 126 ]
[ null ]
[ 9 ]
[ 75 ]
2024-11-19T03:25:17.919611+00:00
1,633,206,486,000
f8bd899e802640ac0b7dc304e92af468edfecea5
2
{ "blob_id": "f8bd899e802640ac0b7dc304e92af468edfecea5", "branch_name": "refs/heads/main", "committer_date": 1633206486000, "content_id": "3658119775d1c51791ffd18b1a3cb40b51b8de1a", "detected_licenses": [ "MIT" ], "directory_id": "59e3ae7b03badac86d8e476f080621ac454c2224", "extension": "py", "file...
2.421875
stackv2
from base64 import b64encode, b64decode from pwn import * from string import printable from Crypto.Cipher import AES key = '!_SECRETSOURCE_!' p = remote('pwn-2021.duc.tf', 31914) # for n in range(len(key) + 1, 17): # p.sendlineafter(b"Enter plaintext:\n", b"A"*n) # chunk4 = b64decode(p.recvline(keepends=Fal...
29
30.1
93
10
295
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_6d91d3ef39824788_5937ef11", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
1
true
[ "CWE-327" ]
[ "py/weak-cryptographic-algorithm" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 29 ]
[ null ]
[ 7 ]
[ 31 ]
2024-11-19T03:25:38.940123+00:00
1,565,838,556,000
1d5f8c153c19f8751a67aebfde8e58a478ef5690
2
{ "blob_id": "1d5f8c153c19f8751a67aebfde8e58a478ef5690", "branch_name": "refs/heads/master", "committer_date": 1565838556000, "content_id": "e4c6a55ba93b636cca6c26a18660d1c34ff3d124", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "8d5feca858f443606da87fefd600a32e956f2dc9", "extension": "p...
2.46875
stackv2
#!/usr/bin/env python import os import glob import platform import sys # tab completion def complete(text, state): a = (glob.glob(text + '*') + [None])[state].replace("__init__.py", "").replace(".py", "").replace("LICENSE", "").replace( "README.md", "").replace("config", "").replace("ptf", "").replace("re...
193
33.91
160
32
1,902
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a9eb23589b331edd_44b03fb4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
4
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 82, 84, 88, 90 ]
[ null, null, null, null ]
[ 15, 15, 15, 15 ]
[ 156, 137, 160, 139 ]
2024-11-19T03:35:43.608877+00:00
1,620,894,554,000
2920a0d0bfa1e4bcaff6ed3178fafd3364762799
3
{ "blob_id": "2920a0d0bfa1e4bcaff6ed3178fafd3364762799", "branch_name": "refs/heads/main", "committer_date": 1620895207000, "content_id": "61576865a99d2e10349e73858f3fadd69b32e5d5", "detected_licenses": [ "Apache-2.0" ], "directory_id": "a7f8417ec32e03a8af39ad772e4bf51ab13f92c8", "extension": "py", ...
2.515625
stackv2
""" @version: 1.0 @author: Dfly @site: @software: PyCharm @time: 2021/5/11 10:58 connect to mysql """ #!/usr/bin/python # -*- coding: UTF-8 -*- #import readConf import readConf from readConf import * import pymysql.cursors #import readConf print(readConf.host1,readConf.port,readConf.username,readConf.password,readConf...
52
17.5
138
12
284
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a07cc42593d973e5_b5b2b27a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 17 ]
[ null ]
[ 54 ]
[ 71 ]
2024-11-19T01:28:49.830109+00:00
1,571,598,307,000
47f2c7f86fee62ca40c639e08b7ad4ec0525af11
3
{ "blob_id": "47f2c7f86fee62ca40c639e08b7ad4ec0525af11", "branch_name": "refs/heads/master", "committer_date": 1571598307000, "content_id": "3151d0554805672cd19f60eeda88ef856becc17b", "detected_licenses": [ "MIT" ], "directory_id": "33d975a44d8a38611b9d77a63efaa41a97e38454", "extension": "py", "fi...
3
stackv2
import requests import urllib import json from os import remove from PIL import Image from bs4 import BeautifulSoup def is_connected(): try: host = socket.gethostbyname('www.google.co.in') socket.create_connection((host, 80)) return True except: pass return False def take_i...
154
23.53
61
17
921
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_0aaa70fb32ce361e_c0147b4c", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [imdb.com](1) may be at an arbitrary position in the sa...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [imdb.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 31 ]
[ null ]
[ 12 ]
[ 47 ]
2024-11-19T01:28:54.198368+00:00
1,615,561,868,000
111a99243ff7db150f58fba07f862c7b50f604a2
3
{ "blob_id": "111a99243ff7db150f58fba07f862c7b50f604a2", "branch_name": "refs/heads/master", "committer_date": 1615561868000, "content_id": "0bd74ffa85bd751e35d057da813c69f170965b4e", "detected_licenses": [ "MIT" ], "directory_id": "87ebd5bd04fbc7981adbc768dc9a72023a747264", "extension": "py", "fi...
2.65625
stackv2
from encryption import password_encrypt from nfilepicker import select_folder from getpass import getpass from argparse import ArgumentParser from hashlib import sha1 import sqlite3 import time import sys import os.path import pyperclip import base64 def cleanup(): cur.close() conn.close() def start_service...
85
29.91
111
20
640
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_5efd15a991b651a8_a95ee77b", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 37 ]
[ null ]
[ 9 ]
[ 41 ]
2024-11-19T01:28:55.083845+00:00
1,560,762,188,000
c2c99e70e32ee9e3f659a6273defc8cf50e0795a
2
{ "blob_id": "c2c99e70e32ee9e3f659a6273defc8cf50e0795a", "branch_name": "refs/heads/master", "committer_date": 1560762188000, "content_id": "7cf3df85ee52bd36d960c87576cd13073596c871", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "b3c042be1481d0e3f26cfcad1c40d1f3bfa8b22d", "extension": "p...
2.421875
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- from os import getcwd, path import os from os import listdir from os.path import isfile, join import time import json from flask import Flask, request from flask_restful import Resource, Api from threading import Timer import urllib import subprocess #print('install...
106
24.92
133
18
669
python
[{"finding_id": "codeql_py/path-injection_3024a42ea0def05c_064628a3", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 53 ]
[ null ]
[ 25 ]
[ 106 ]
2024-11-19T01:29:17.700379+00:00
1,617,291,223,000
d09c048c18f973ad6a199f51963ef42da6dbc907
2
{ "blob_id": "d09c048c18f973ad6a199f51963ef42da6dbc907", "branch_name": "refs/heads/master", "committer_date": 1617291223000, "content_id": "9f6379774ce2b2584db6f50481bd1e63abf96be5", "detected_licenses": [ "MIT" ], "directory_id": "2af5c3949877086dbd64ffb45e058805b5ee822a", "extension": "py", "fi...
2.5
stackv2
#!/usr/bin/env python3 from pathlib import Path import click from jinja2 import Environment, FileSystemLoader @click.command() @click.argument('template', type=click.Path(dir_okay=False, resolve_path=True)) @click.option('--output', type=click.Path(dir_okay=False, resolve_path=True)) def form(template, output): ...
31
28
79
14
200
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_93d408242f6d92a2_1dc39d92", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 25 ]
[ null ]
[ 11 ]
[ 63 ]
2024-11-19T01:29:33.469420+00:00
1,506,047,115,000
a02b25a8987603d70cc4ecab4ef63d1b323a3243
3
{ "blob_id": "a02b25a8987603d70cc4ecab4ef63d1b323a3243", "branch_name": "refs/heads/master", "committer_date": 1506047115000, "content_id": "ed1b7983219f91c89501ec88565604953d3d51d7", "detected_licenses": [ "MIT" ], "directory_id": "2b744f6637be1f47e7323ad6168c0bfb385c8a5f", "extension": "py", "fi...
2.734375
stackv2
#!/usr/bin/env python # coding=utf-8 """ This call sends an email to one recipient, using a validated sender address Do not forget to update the sender address used in the sample """ from mailjet_rest import Client import configparser from util import ConfigSectionMap ## print the success or failure of your calls. de...
72
29.65
105
11
568
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_deede7d7549c0f09_0e63363a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text." ]
[ 52, 53 ]
[ null, null ]
[ 11, 11 ]
[ 17, 20 ]
2024-11-19T01:29:58.312584+00:00
1,634,383,876,000
ef74d2096516b17ba5ca4426f46a1712befc67d2
3
{ "blob_id": "ef74d2096516b17ba5ca4426f46a1712befc67d2", "branch_name": "refs/heads/main", "committer_date": 1634383876000, "content_id": "329049b7180095200aefa04e4d4e4865b6c4aabd", "detected_licenses": [ "CC0-1.0" ], "directory_id": "c9566d9845648b283dfdc123eaaf87444bc15f05", "extension": "py", "...
2.765625
stackv2
''' Documentation, License etc. list of contractions:- https://en.wikipedia.org/wiki/Wikipedia:List_of_English_contractions @package process_twitter_data ''' # $SPARK_HOME/bin/spark-submit --master spark://LAPTOP-7DUT93OF.localdomain:7077 --executor-memory 6700mb ./process_twitter_data_udf_split.py # All python functio...
236
42.83
157
16
2,420
python
[{"finding_id": "codeql_py/overly-large-range_26b588a92f3a9daa_95d2a4e7", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 64, 64 ]
[ null, null ]
[ 22, 66 ]
[ 25, 69 ]
2024-11-19T01:30:26.091055+00:00
1,542,184,897,000
77165a102b2665a7ec990e10a11b8d2633f8caa0
2
{ "blob_id": "77165a102b2665a7ec990e10a11b8d2633f8caa0", "branch_name": "refs/heads/master", "committer_date": 1542184897000, "content_id": "f2ba2638c531825b20e13c608c3bf946ddecb9d2", "detected_licenses": [ "MIT" ], "directory_id": "4adae2f4e7ab1d67d5275d077585115be773723c", "extension": "py", "fi...
2.359375
stackv2
from pathlib import Path from jinja2 import Environment, FileSystemLoader import yaml # Configuration base_path = Path('.') / 'templates' base_values = yaml.load((base_path / 'aws-values.yaml').read_text()) all_kinds = dict( (p.stem[5:], yaml.load(p.read_text())) for p in base_path.glob('kind-*.yaml') ...
46
23.02
72
13
259
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_869beae118289acb_5e1b21a4", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 17 ]
[ null ]
[ 10 ]
[ 51 ]
2024-11-19T01:30:37.397154+00:00
1,483,537,158,000
a51382ce3a9a1e81464b186498dfd6707c70dddb
3
{ "blob_id": "a51382ce3a9a1e81464b186498dfd6707c70dddb", "branch_name": "refs/heads/master", "committer_date": 1483537158000, "content_id": "367ac7939a1a8ecefe1d4a8d7f4a744eb7e2714b", "detected_licenses": [ "MIT" ], "directory_id": "5130addcf84d1b258ff1dc729f19acc4638140fc", "extension": "py", "fi...
2.640625
stackv2
#!/usr/bin/env python """ File: structing.py Author: Wen Li Email: spacelis@gmail.com Github: http://github.com/spacelis Description: This module provides tools for generating table structures for csv files. """ import re from os.path import basename from textwrap import dedent import click import messytables as m...
298
25.38
94
18
1,789
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_ec4849294bcfb5ae_6c83f846", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
3
true
[ "CWE-079", "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 36, 99, 128 ]
[ 61, null, 136 ]
[ 16, 16, 16 ]
[ 7, 64, 7 ]
2024-11-19T01:54:46.521898+00:00
1,599,751,171,000
17210b42fa19b98ee18aa494e1856a45c6f271b2
3
{ "blob_id": "17210b42fa19b98ee18aa494e1856a45c6f271b2", "branch_name": "refs/heads/master", "committer_date": 1599751171000, "content_id": "10b7dc7f7396349494edd1a2e98d439ef1da5e40", "detected_licenses": [ "Apache-2.0" ], "directory_id": "ccf8e9a4cfc6435f664059192ddccd744b2945e4", "extension": "py"...
2.9375
stackv2
from django.shortcuts import render from django.http import HttpResponse from django.shortcuts import redirect from django.core.urlresolvers import reverse from common.models import Users # Create your views here. def index(request): '''管理后台首页''' return render(request,"myadmin/index.html") def login(request):...
105
30.13
73
16
1,013
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_1d5b0321af6bb682_71b9e2a9", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 33 ]
[ null ]
[ 22 ]
[ 69 ]
2024-11-19T01:54:48.860851+00:00
1,583,175,231,000
2a93adb60d19e7c25017db42e61e4648db0e5f58
2
{ "blob_id": "2a93adb60d19e7c25017db42e61e4648db0e5f58", "branch_name": "refs/heads/master", "committer_date": 1583175231000, "content_id": "4b901158595314cd77e5ecbbe1d710caf746ae0a", "detected_licenses": [ "MIT" ], "directory_id": "80c2aded2db5e53b4240636ee74b00e2fef10ef6", "extension": "py", "fi...
2.421875
stackv2
import os import sys import datetime import git from jinja2 import Template def git_root(): root, = os.popen('git rev-parse --show-toplevel') return root.strip() def get_last_changed(fname): repo = git.Repo(git_root()) blame = repo.blame('HEAD', os.path.abspath(fname)) line_dt = {line: commit.a...
50
26.48
114
15
325
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_8dd27e9fab1bb247_7ff16483", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 44 ]
[ null ]
[ 20 ]
[ 75 ]
2024-11-19T01:54:57.220075+00:00
1,572,609,571,000
7eedd823c42fa2af0d9462d152aa7ff96ebe032e
3
{ "blob_id": "7eedd823c42fa2af0d9462d152aa7ff96ebe032e", "branch_name": "refs/heads/master", "committer_date": 1572609571000, "content_id": "c9493abf3647e64ee017963764b624f935443126", "detected_licenses": [ "MIT" ], "directory_id": "380f652ad3bc69a2e751871a3e562c7a13d1487e", "extension": "py", "fi...
2.640625
stackv2
#!/bin/python3 from flask import Flask, abort, jsonify, request from flask_cors import CORS import MeCab import os app = Flask(__name__) cors = CORS(app, resources={r"/mecab/*": {"origins": "*"}}) messages = ['Success', 'Faild'] @app.route('/mecab/v1/parse-ipadic', methods=['POST']) def parse_ipadic(): sdict ...
78
29.67
124
18
780
python
[{"finding_id": "codeql_py/flask-debug_2e479963cdaf720b_022adcad", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-022" ]
[ "py/flask-debug", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1)." ]
[ 78, 57 ]
[ null, null ]
[ 5, 49 ]
[ 51, 59 ]
2024-11-19T01:55:02.664079+00:00
1,565,330,498,000
ae71baf31f7c58ee5c597e8e5f7422ce4c3d0e4a
2
{ "blob_id": "ae71baf31f7c58ee5c597e8e5f7422ce4c3d0e4a", "branch_name": "refs/heads/master", "committer_date": 1565330498000, "content_id": "166df3adb7d4ad968a32e749d744ba29d5b91299", "detected_licenses": [ "Apache-2.0" ], "directory_id": "3c95972abacdb1556a0df80eecebba2694492865", "extension": "py"...
2.359375
stackv2
import os from app import app from flask import request from flask import jsonify from app.main.conf import conf_data from app.utils.myencrypt import create_key, verify_key from app.main.file_upload_down import DownRemoteFile, UpDownFile from flask import send_file, send_from_directory from app import work_log @app.r...
77
31.4
94
15
625
python
[{"finding_id": "codeql_py/stack-trace-exposure_f2f285ce4fa52871_85abd221", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
3
true
[ "CWE-209", "CWE-022", "CWE-022" ]
[ "py/stack-trace-exposure", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 75, 65, 69 ]
[ null, null, null ]
[ 24, 19, 19 ]
[ 55, 28, 28 ]
2024-11-19T02:06:45.110807+00:00
1,555,893,852,000
ccf91ec29fce9d8bcf26eaf56f6445a4a54c28d3
3
{ "blob_id": "ccf91ec29fce9d8bcf26eaf56f6445a4a54c28d3", "branch_name": "refs/heads/master", "committer_date": 1555893852000, "content_id": "f91534f3293e093125e1f1ad67e939328fdb30e2", "detected_licenses": [ "MIT" ], "directory_id": "c1dd9d57da11ac57f0a2096204c3c781be34ef9d", "extension": "py", "fi...
2.65625
stackv2
import msoffcrypto import sys, getopt import os import urllib.request def download_PasswordList(): #Grabbed from https://github.com/danielmiessler/SecLists url = 'https://raw.githubusercontent.com/danielmiessler/SecLists/master/Passwords/Common-Credentials/10-million-password-list-top-10000.txt' try: ...
119
33.92
144
17
982
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7311d1cee365d9dc_66a5ed23", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive dat...
[ 28, 82, 106 ]
[ null, null, null ]
[ 16, 24, 24 ]
[ 53, 56, 56 ]
2024-11-19T02:06:56.644646+00:00
1,582,666,393,000
09763287d393d904a43d6ec7e157ff2d7d22123a
3
{ "blob_id": "09763287d393d904a43d6ec7e157ff2d7d22123a", "branch_name": "refs/heads/master", "committer_date": 1582666393000, "content_id": "2be94735fe6648dc7b5af9b7b2372c7ca6afb9c7", "detected_licenses": [ "MIT" ], "directory_id": "6e2ce3cad84b51bc437934bec545d92ddb01d2ae", "extension": "py", "fi...
2.84375
stackv2
import tornado.websocket as ws import uuid import logging import threading from tornado.httpclient import HTTPClient import time import asyncio logging.basicConfig(level=logging.INFO) class WebSocket(ws.WebSocketHandler): clients = {} def __init__(self, application, request, *args, **kwargs): su...
68
27.66
115
18
410
python
[{"finding_id": "codeql_py/log-injection_6375a947db102e64_ee5532cc", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 31 ]
[ null ]
[ 22 ]
[ 65 ]
2024-11-19T02:07:01.855787+00:00
1,626,009,531,000
8edb3c7fb8bd4ae79dd9fb609f1a191f6ee674b5
2
{ "blob_id": "8edb3c7fb8bd4ae79dd9fb609f1a191f6ee674b5", "branch_name": "refs/heads/master", "committer_date": 1626009531000, "content_id": "758a1eb568bf56e8e0ec385e1c51f552009a6a10", "detected_licenses": [ "MIT" ], "directory_id": "f9e7ade342c192d5a37c44ae5905e44a72168f41", "extension": "py", "fi...
2.453125
stackv2
from flask import render_template, flash, redirect, url_for,session, request, redirect from app import app, db from app.forms import LoginForm, RegistrationForm, AddBook, SearchForm, BookIssue, SendForm, ForgotForm, VerificationForm from app.models import Books, User from functools import wraps from datetime import tim...
259
43.34
139
21
2,482
python
[{"finding_id": "codeql_py/url-redirection_b4867efd63d22866_41737850", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 227 ]
[ null ]
[ 19 ]
[ 23 ]
2024-11-19T02:31:23.477310+00:00
1,619,345,992,000
9a934f5ae0998d83113373fa6535304893d870e8
3
{ "blob_id": "9a934f5ae0998d83113373fa6535304893d870e8", "branch_name": "refs/heads/master", "committer_date": 1619345992000, "content_id": "f1e725e3deae621d7ec31cc228e4fc3cd41f5288", "detected_licenses": [ "MIT" ], "directory_id": "d1a86981b8e3fe1ba37a4db9c2439b6656de37d7", "extension": "py", "fi...
2.546875
stackv2
import os import sys import re import glob import shutil import datetime from jinja2 import Environment, FileSystemLoader from . import message from . import info def input_info(default_str: str, input_guide, validation): try: while True: input_str: str = input(input_guide(default_str)) or de...
132
25.77
100
15
836
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_5cb5d475968e9513_64582179", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 70 ]
[ null ]
[ 11 ]
[ 42 ]
2024-11-19T02:32:02.553779+00:00
1,674,488,305,000
1079a0cfc965972e5faa867cb22b136395d91c65
3
{ "blob_id": "1079a0cfc965972e5faa867cb22b136395d91c65", "branch_name": "refs/heads/master", "committer_date": 1674488305000, "content_id": "9b1ed06d53fbfa8970d1fcf73c0876985c4dc153", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "23902e7a79e6466c778db2ca6a2909a762825520", "extension": "p...
3.15625
stackv2
from random import sample from urllib.parse import urljoin import click import requests from .settings import API_KEY, SOURCES, TOP_HEAD SOURCE_URL = urljoin(SOURCES, '?apiKey={}'.format(API_KEY)) # TODO: Try a deliberate failure to see how the remote API responds # so that your code knows how to catch those except...
65
27.6
76
16
415
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2206a0d0c19e9826_aac6b69a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 59 ]
[ 63 ]
[ 19 ]
[ 14 ]
2024-11-19T02:32:03.929570+00:00
1,568,565,650,000
45b79cc8852390f16bf90a2038c82a4f6e423f9d
3
{ "blob_id": "45b79cc8852390f16bf90a2038c82a4f6e423f9d", "branch_name": "refs/heads/master", "committer_date": 1568565650000, "content_id": "bd2738c5004cc6eee040b2425eb8d412b8040c70", "detected_licenses": [ "MIT" ], "directory_id": "d106c15bd0d0292d71f94f576fc40cb1c9544432", "extension": "py", "fi...
3.421875
stackv2
""" holds the folder and entities which represent the kv_store in vault """ from typing import List, Dict from jinja2 import Template TEMPLATE: Template = Template(u"""#### {{header}} {% for key, value in dict.items() %} {{" - %s" | format(key)}} {{" - %s" | format(value)}}{% endfor %}\n\n\n""") class Object: ...
116
28.78
94
17
813
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_830a1b8ee1b8e0a0_cf8658e1", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 9 ]
[ 12 ]
[ 22 ]
[ 53 ]
2024-11-19T02:32:47.037718+00:00
1,538,304,498,000
7e742b3e138abb2c3b1b449070188f0899374868
2
{ "blob_id": "7e742b3e138abb2c3b1b449070188f0899374868", "branch_name": "refs/heads/master", "committer_date": 1538304498000, "content_id": "89f8bedf8550306c78c178b4f8c2ad68485778b3", "detected_licenses": [ "MIT" ], "directory_id": "0a799bcc0433a333cc40e05206a8532d464ab0aa", "extension": "py", "fi...
2.453125
stackv2
""" Purchases API views """ import jwt from rest_framework import viewsets, generics, status from rest_framework.response import Response from ..models import ArtisanProduction, PurchaseOrderDelivery from .serializers import (ArtisanProductionSerializer, PurchaseOrderDeliverySerializer, Valida...
53
37.85
78
18
383
python
[{"finding_id": "codeql_py/stack-trace-exposure_e71aeb7d15e63b9a_8f701f8e", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 51 ]
[ null ]
[ 33 ]
[ 54 ]
2024-11-19T02:33:01.827232+00:00
1,571,736,932,000
a53d48e5097a987d6abcf4200c6dfebb16852045
3
{ "blob_id": "a53d48e5097a987d6abcf4200c6dfebb16852045", "branch_name": "refs/heads/master", "committer_date": 1571736932000, "content_id": "826c4768059c671621d78fab01d25cd94d356ed4", "detected_licenses": [ "MIT" ], "directory_id": "df460463d921eb5c0d6d130f919e4c9285af139f", "extension": "py", "fi...
2.515625
stackv2
from html.parser import HTMLParser from pathlib import Path from typing import Union, TypeVar import jinja2 from onemsdk.config import get_static_dir from onemsdk.exceptions import MalformedHTMLException, ONEmSDKException from onemsdk.parser.node import Node from onemsdk.parser.tag import get_tag_cls, Tag __all__ = ...
133
25.26
74
16
810
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_e1a1680fc80986d4_8aebb3c4", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 118, 127 ]
[ 120, 129 ]
[ 22, 12 ]
[ 10, 6 ]
2024-11-19T02:33:04.144527+00:00
1,634,407,184,000
be65792ba1aaebefbfc17b0209fb9a382b3ecd64
3
{ "blob_id": "be65792ba1aaebefbfc17b0209fb9a382b3ecd64", "branch_name": "refs/heads/master", "committer_date": 1634407184000, "content_id": "c408f0be2b7f8b13797950ea7d252af4599e8918", "detected_licenses": [ "MIT" ], "directory_id": "ed32d678431a90c03f78f57ebfd1474a7d2e749a", "extension": "py", "fi...
3.359375
stackv2
import re class Case: _CHECK_CAMEL_REGEX = re.compile(r"^([a-zA-Z]).([0-9a-zA-Z])*$") _CHECK_SNAKE_REGEX = re.compile(r"((^|_+)[a-z0-9]*)*$") _CHECK_KEBAB_REGEX = re.compile(r"((^|-+)[a-z0-9]*)*$") _CHECK_WORDS_REGEX = re.compile(r"[0-9a-zA-Z\u0020]", re.UNICODE) _SUB_CAMEL_REGEX = re.compile(r"((...
83
20.47
78
14
489
python
[{"finding_id": "codeql_py/redos_1c2fc01badfe9367_a41ebf02", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '_'.", "remediati...
2
true
[ "CWE-1333", "CWE-1333" ]
[ "py/redos", "py/redos" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '_'.", "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '-'." ]
[ 6, 7 ]
[ null, null ]
[ 43, 43 ]
[ 45, 45 ]
2024-11-19T02:33:07.252831+00:00
1,515,394,567,000
c49edb11ddb03f1d514c914aae1539946d154890
3
{ "blob_id": "c49edb11ddb03f1d514c914aae1539946d154890", "branch_name": "refs/heads/master", "committer_date": 1515394567000, "content_id": "efc5274093b55a3165accf490a8b7bb565c54514", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "465c407dc2196cf37009639b3e5ad2ee046c1e45", "extension": "p...
2.609375
stackv2
# -*- coding: utf-8 -*- import hashlib import time from app import load_app_config def get_user_info_hash(user_name, password): md5_secrethash = hashlib.md5() md5_secrethash.update(password + user_name) secrect_hash = md5_secrethash.hexdigest() md5_userhash = hashlib.md5() md5_userhash.update(loa...
33
21.21
66
15
194
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_a45cbf3c73bbf946_91c56096", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (id)](2) is used in a hashing algorithm (MD5) that is insecure.", "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) t...
[ 9, 13 ]
[ null, null ]
[ 27, 25 ]
[ 47, 66 ]
2024-11-19T02:54:55.446684+00:00
1,566,209,249,000
8fe11e68ec63bfe452943cac8b325b7fc7b6e206
3
{ "blob_id": "8fe11e68ec63bfe452943cac8b325b7fc7b6e206", "branch_name": "refs/heads/master", "committer_date": 1566209249000, "content_id": "c87331d911815202b1864ea3f3dfc80c801ecc45", "detected_licenses": [ "MIT" ], "directory_id": "ff8ec937d9e5bef6d527f91ec4c8a2248063e9f8", "extension": "py", "fi...
2.515625
stackv2
import time import os import requests from itsdangerous import JSONWebSignatureSerializer as Serializer from flask import current_app, json, request from .bp import admin_bp, allowed_file, secure_filename, CH_REGEX from flask_server.models import Admin from flask_server.utils import success, fail from flask_server.ext...
404
22.21
106
14
2,270
python
[{"finding_id": "codeql_py/path-injection_03d8c49a8c552474_574fab79", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 395 ]
[ null ]
[ 19 ]
[ 27 ]
2024-11-19T02:55:13.415668+00:00
1,579,511,804,000
d47e16eac61fdc3e02e8dc4b811f902b86c4d13a
2
{ "blob_id": "d47e16eac61fdc3e02e8dc4b811f902b86c4d13a", "branch_name": "refs/heads/master", "committer_date": 1579511804000, "content_id": "e80915bd0f0590ccf152df320fb2fc0a19162537", "detected_licenses": [ "MIT" ], "directory_id": "498e99bae2b0a107a4f1c8563a74470e8516f465", "extension": "py", "fi...
2.5
stackv2
import json import functools from random import choice import base64 import requests import jwt import paramiko from urllib.parse import urlencode from tornado import httpclient from tornado.httpclient import HTTPRequest from apps.users.models import User from common.parse_settings import settings def generate_code()...
154
27.07
82
20
1,039
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_fa94a7e911605e47_3bc4fba4", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 40 ]
[ null ]
[ 5 ]
[ 69 ]
2024-11-19T02:55:17.239389+00:00
1,620,673,169,000
3266f6d33a10fa1542bcc58d736b9f0e6a923b84
3
{ "blob_id": "3266f6d33a10fa1542bcc58d736b9f0e6a923b84", "branch_name": "refs/heads/master", "committer_date": 1620673169000, "content_id": "94d308652d0de9bc6fc31e266ebc2b7c12c3c110", "detected_licenses": [ "MIT" ], "directory_id": "0c62d380bda6e398f7fade2bb6d6c78fe4404488", "extension": "py", "fi...
2.53125
stackv2
import time import os from flask import Flask, render_template, request from werkzeug.utils import secure_filename from affluence_counter import AffluenceCounter app = Flask(__name__) @app.route('/') def index(): return render_template('index.html', error=False) @app.route('/process_video',methods=["POST"]) def ...
35
26.03
66
14
214
python
[{"finding_id": "codeql_py/flask-debug_7ff93772244720c6_43651abf", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-022" ]
[ "py/flask-debug", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1)." ]
[ 35, 26 ]
[ null, null ]
[ 5, 19 ]
[ 40, 29 ]
2024-11-19T02:55:28.163345+00:00
1,628,490,362,000
89fad629f82f021efb4f1d13110309731c9b55d4
2
{ "blob_id": "89fad629f82f021efb4f1d13110309731c9b55d4", "branch_name": "refs/heads/main", "committer_date": 1628490362000, "content_id": "6f4d347a23d23276481ca4234580386fc4d63261", "detected_licenses": [ "MIT" ], "directory_id": "18f74dfe4e1e071b4853091d6a545f87fef4151a", "extension": "py", "file...
2.375
stackv2
#!/usr/bin/env python3 # **IMportant!** This is a development script to quickly get lists and then # a matrix of packages. It is far from perfect, and I suspect buggy because # the spack.yaml files come in so many different flavors. If you have an idea # for how to clean this up, please submit a PR! It will be greatly...
165
29.78
87
20
1,193
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_4873a9d5aa92d9ea_036ac652", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'gitlab.com', so it might match more...
1
true
[ "CWE-020" ]
[ "py/incomplete-hostname-regexp" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'gitlab.com', so it might match more hosts than expected." ]
[ 129 ]
[ null ]
[ 36 ]
[ 55 ]
2024-11-19T02:55:39.326376+00:00
1,407,520,538,000
b10abbaa673ba058c140bf84cab465e0a5d99439
2
{ "blob_id": "b10abbaa673ba058c140bf84cab465e0a5d99439", "branch_name": "refs/heads/master", "committer_date": 1407520538000, "content_id": "75ff9d7c4f9e8b2fbe41d494e3ca1d9e6b669b24", "detected_licenses": [ "Apache-2.0" ], "directory_id": "55c3b0ac37a49924a9bc08e79c1d27647dd51c7e", "extension": "py"...
2.46875
stackv2
# python base lib modules import os import pprint import StringIO from zipfile import ZipFile from sword2.exceptions import HTTPResponseError # downloaded modules import sword2 import requests # local modules from file import DataverseFile from utils import format_term, get_element, get_elements, DataverseException, ...
278
34.38
108
19
2,022
python
[{"finding_id": "codeql_py/request-without-cert-validation_4f5e56fe625fc973_ee882820", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 180, 224 ]
[ null, 231 ]
[ 15, 9 ]
[ 55, 10 ]
2024-11-19T02:55:55.853085+00:00
1,688,213,400,000
d5eb62f116bf557a6f187435642fd43139cf64e7
3
{ "blob_id": "d5eb62f116bf557a6f187435642fd43139cf64e7", "branch_name": "refs/heads/master", "committer_date": 1688213400000, "content_id": "c326cdd97afd9cab41673f7715f0eea34ed92f97", "detected_licenses": [ "MIT" ], "directory_id": "779f4429929303e41bde33026cdfce0c2b5ce3ea", "extension": "py", "fi...
2.8125
stackv2
import os os.environ['TF_CPP_MIN_LOG_LEVEL'] = '3' # 0 for max verbosity from tensorflow.keras.utils import to_categorical from tensorflow.keras.models import load_model import numpy import preprocess as prep WORD_LEN = prep.WORD_LENGTH UNIQUE_CHARS = prep.UNIQUE_CHARS DATA_FILE = './/data//dataset_3percent_num.csv'...
42
29.57
82
12
315
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8da800a122dc2f68_550f0060", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 42 ]
[ null ]
[ 15 ]
[ 42 ]
2024-11-19T02:56:02.793778+00:00
1,558,601,324,000
4eb377b32e117d9ae2e1f3e678cd4aadb4efc2fd
3
{ "blob_id": "4eb377b32e117d9ae2e1f3e678cd4aadb4efc2fd", "branch_name": "refs/heads/master", "committer_date": 1558601324000, "content_id": "ebeb89843d6f905d0fd6fb021b6c44e61b0ed0e1", "detected_licenses": [ "MIT" ], "directory_id": "a54b568e871beb4fe5369415b69cfe70ea4dcc17", "extension": "py", "fi...
2.515625
stackv2
import json import os import tarfile from pathlib import Path import numpy as np import requests from albumentations import Compose from albumentations.augmentations import transforms from chainer.dataset import DatasetMixin from PIL import Image from tqdm import tqdm class Food101Dataset(DatasetMixin): def __i...
114
34.88
82
23
1,089
python
[{"finding_id": "codeql_py/tarslip_a727a7cc580e1e97_00fbc490", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially untrusted source](1)." ]
[ 41 ]
[ null ]
[ 21 ]
[ 23 ]
2024-11-19T03:10:37.242849+00:00
1,600,157,264,000
5f86d3a7ebc116b0935d0307051ab5b23c623e2c
4
{ "blob_id": "5f86d3a7ebc116b0935d0307051ab5b23c623e2c", "branch_name": "refs/heads/master", "committer_date": 1600157264000, "content_id": "327b2d5a9533a6628cfba4863b62ab81659589c6", "detected_licenses": [ "MIT" ], "directory_id": "2bfaa213e87b97ff8052d06716136046d1da6b99", "extension": "py", "fi...
3.5
stackv2
import requests import json import math from collections import Counter API_KEY = 'd99cd0ca' OMDB_URL = 'http://www.omdbapi.com/?apikey=' + API_KEY def get_data(url): data = json.loads(requests.get(url).text) if data['Response'] == 'True': return data else: return None def search_ids_by...
81
26.77
133
17
708
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5a284fc7d943a45a_df847e58", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 74 ]
[ null ]
[ 15 ]
[ 16 ]
2024-11-19T03:10:55.700229+00:00
1,598,187,492,000
5f15d5d26c6cd738baccca2ddb820465e6ffbb31
3
{ "blob_id": "5f15d5d26c6cd738baccca2ddb820465e6ffbb31", "branch_name": "refs/heads/master", "committer_date": 1598187492000, "content_id": "0fc83cfaf2b1acc08a57f43509dee9f1771455ac", "detected_licenses": [ "MIT" ], "directory_id": "64795738ebe9d1bfa457f508ae44d96c3418d0a0", "extension": "py", "fi...
2.671875
stackv2
import os import requests import tempfile import base64 from flask import Flask from flask import request from flask import jsonify from flask import render_template # --- Objects app = Flask(__name__) # --- API routes @app.route("/predict-house", methods=["POST"]) def predict_house(): body = { 'rm': request.for...
46
26.33
97
16
313
python
[{"finding_id": "codeql_py/flask-debug_34cbd1a47b133f0d_23ba5f07", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
4
true
[ "CWE-215", "CWE-022", "CWE-022", "CWE-022" ]
[ "py/flask-debug", "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 46, 28, 30, 33 ]
[ null, null, null, null ]
[ 5, 15, 41, 15 ]
[ 35, 24, 50, 24 ]
2024-11-19T03:21:49.480393+00:00
1,421,930,520,000
e52a6ae8b31c09d29c3c126c8b90bab217825196
2
{ "blob_id": "e52a6ae8b31c09d29c3c126c8b90bab217825196", "branch_name": "refs/heads/master", "committer_date": 1421930520000, "content_id": "a766a4423b431efbb95065d025a29cf0d9c71e03", "detected_licenses": [ "Apache-2.0" ], "directory_id": "fc8a86e30c286910eef086821397b34093954fed", "extension": "py"...
2.453125
stackv2
#!/user/bin/env python #coding:utf-8 import paramiko import os from multiprocessing import Process,Pool from backend.models import * class multissh: def __init__(self): self.a=hosts() # self.__process = None self.__ssh = paramiko.SSHClient() self.__ssh.set_missing_host...
40
25.98
80
13
283
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_9186613609fd1bc2_9b8f6aac", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 15 ]
[ null ]
[ 9 ]
[ 73 ]
2024-11-19T03:21:51.040662+00:00
1,564,437,811,000
e7582f3cee35c43dd72dda7d13e8b00867d36338
3
{ "blob_id": "e7582f3cee35c43dd72dda7d13e8b00867d36338", "branch_name": "refs/heads/master", "committer_date": 1564437811000, "content_id": "3bf4e20d913a243fef49a064ada3f7c6375d4bbc", "detected_licenses": [ "MIT" ], "directory_id": "1d66a800459289740b654dcb06cfe8359d7438ed", "extension": "py", "fi...
2.59375
stackv2
#!/usr/bin/python #Program: destroy_panw_nsx_svc.py #Description: Destroys Palo Alto Networks NSX Service # This python2.7 script makes API calls to NSX manager to remove orphaned # Panorama objects that didn't get removed during service removal. # Use only if you removed the NSX configuration from Panorama,...
273
32.29
145
16
2,102
python
[{"finding_id": "codeql_py/request-without-cert-validation_c288a7355b5270dc_b993291c", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
7
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 30, 77, 123, 168, 185, 190, 195 ]
[ null, null, null, null, null, null, null ]
[ 23, 20, 24, 18, 18, 18, 18 ]
[ 135, 129, 140, 145, 146, 141, 144 ]
2024-11-19T03:22:08.613290+00:00
1,515,082,476,000
8b7ab4dbc0461c2ccf40bf9a62fcd3601c6c34cc
2
{ "blob_id": "8b7ab4dbc0461c2ccf40bf9a62fcd3601c6c34cc", "branch_name": "refs/heads/master", "committer_date": 1515082476000, "content_id": "b7e50c7f85f123baf3cd3155b0b7f4f3602f3109", "detected_licenses": [ "MIT" ], "directory_id": "032e3e118b27b7aa6c60abe849f61cb92d892cb1", "extension": "py", "fi...
2.484375
stackv2
from flask import Flask, request, abort import os, random, requests, re, time from bs4 import BeautifulSoup from linebot import ( LineBotApi, WebhookHandler ) from linebot.exceptions import ( InvalidSignatureError ) from linebot.models import* app = Flask(__name__) line_bot_api = LineBotApi('Your Channel Acc...
228
34.93
158
24
2,095
python
[{"finding_id": "codeql_py/request-without-cert-validation_fbbf6497fa3a87b7_7a27dc01", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
5
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-117" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 41, 51, 90, 128, 25 ]
[ null, null, null, null, null ]
[ 11, 20, 11, 11, 21 ]
[ 76, 47, 72, 75, 44 ]
2024-11-19T03:22:23.721022+00:00
1,567,784,686,000
281455c5a148d28f3da4fce725f845f391811592
3
{ "blob_id": "281455c5a148d28f3da4fce725f845f391811592", "branch_name": "refs/heads/master", "committer_date": 1567784686000, "content_id": "8d7697152f4d5cea81f5ba1e8769534a9e7fc39e", "detected_licenses": [ "MIT" ], "directory_id": "787f9ea84406d0780c34e72cf42d1dccc401f783", "extension": "py", "fi...
2.75
stackv2
# Copyright (c) 2019, Anders Lervik. # Distributed under the MIT License. See LICENSE for more info. """Add a Easy-Button to a folium map.""" from branca.element import CssLink, Figure, MacroElement, JavascriptLink from jinja2 import Template JSURL = ( 'https://cdn.jsdelivr.net/npm/' 'leaflet-easybutton@2/src...
53
27.32
78
11
356
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_2ae949bb794ab1aa_db43371c", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 23 ]
[ 29 ]
[ 17 ]
[ 13 ]
2024-11-19T03:43:56.819578+00:00
1,460,331,502,000
82c9982df57fe7bd992a897d210e66444435b3c0
3
{ "blob_id": "82c9982df57fe7bd992a897d210e66444435b3c0", "branch_name": "refs/heads/master", "committer_date": 1460331502000, "content_id": "49fdb6b38446099cf0c9dd0e6d22b17fab9615c9", "detected_licenses": [ "MIT" ], "directory_id": "08fd74f06d87046730bd75c8517d1cda773ddb4f", "extension": "py", "fi...
2.953125
stackv2
################################### ## # ##ranbat2.py # ##Makes random battles for user # ## # ################################### ######### #Imports# ######### import time import random import form import inv items = inv.items ...
500
22.31
87
12
3,068
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_cfdd5551b2a1a4e0_1e73b8de", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 73, 194, 402 ]
[ null, null, null ]
[ 25, 31, 25 ]
[ 34, 40, 34 ]