added
stringlengths
32
32
created
int64
1,236B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.03
source
stringclasses
1 value
text
stringlengths
330
19.3k
num_lines
int64
16
648
avg_line_length
float64
15.5
59.3
max_line_length
int64
37
179
ast_depth
int64
8
38
length
int64
102
3.79k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.11k
276k
sast_codeql_findings_count
int64
1
33
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
33
rule_ids
listlengths
1
33
confidences
listlengths
1
33
severities
listlengths
1
33
messages
listlengths
1
33
line_starts
listlengths
1
33
line_ends
listlengths
1
33
column_starts
listlengths
1
33
column_ends
listlengths
1
33
2024-11-18T19:38:38.800329+00:00
1,624,203,457,000
7ca4dd6ece5b97b4e26b03a2cd88552d35ce5146
3
{ "blob_id": "7ca4dd6ece5b97b4e26b03a2cd88552d35ce5146", "branch_name": "refs/heads/master", "committer_date": 1624203457000, "content_id": "e6783bb861022a2def204e7d4c4619b9ca439f07", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "22f8cb2c5b35f01966aa725b2ec6e409812cac83", "extension": "p...
2.9375
stackv2
""" Usage: downloader.py --download=all --output_directory=output_path downloader.py --help | -help | -h This script is for downloading and extracting files Arguments: --download: download files or all. --output_directory: the path where the extracted files will be present Options: -h --help...
136
33.38
100
18
1,251
python
[{"finding_id": "codeql_py/tarslip_0983932414104a03_397aa39f", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially untrusted source](1)." ]
[ 53 ]
[ null ]
[ 9 ]
[ 12 ]
2024-11-18T20:10:41.826251+00:00
1,549,332,800,000
9c2bd30fc3f176c5e8600f4428fcad74b75f451f
3
{ "blob_id": "9c2bd30fc3f176c5e8600f4428fcad74b75f451f", "branch_name": "refs/heads/master", "committer_date": 1549332800000, "content_id": "0e18e65f70fe3ac17b6195443c9897870f022d51", "detected_licenses": [ "MIT" ], "directory_id": "10847da51a59859c0d12d82d29e146ca75c481c7", "extension": "py", "fi...
2.640625
stackv2
""" Search images from Twitter with query. Most of code for searching Twitter are from Jefferson Henrique's GetOldTweets-python. - https://github.com/Jefferson-Henrique/GetOldTweets-python """ from datetime import datetime import logging import re import requests from bs4 import BeautifulSoup, FeatureNotFound import ...
173
26.74
92
15
1,170
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_0c5e11b879ac6ddf_ba258d60", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'twitter.com/', so it might match mo...
1
true
[ "CWE-020" ]
[ "py/incomplete-hostname-regexp" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'twitter.com/', so it might match more hosts than expected." ]
[ 19 ]
[ null ]
[ 21 ]
[ 42 ]
2024-11-18T20:10:44.465211+00:00
1,556,785,074,000
a7bdcd921114a0afadeadf4b994327d1034c12a5
2
{ "blob_id": "a7bdcd921114a0afadeadf4b994327d1034c12a5", "branch_name": "refs/heads/master", "committer_date": 1556785074000, "content_id": "3b8bb11bbd5bc210e82f456c2a09d8a4232e018f", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "c46fc0df74c353dc4b66177df8b790407e551478", "extension": "p...
2.34375
stackv2
import os, traceback, json import hashlib import argparse from flask_cors import CORS, cross_origin from flask import Flask, request, render_template, jsonify, \ send_from_directory, make_response, send_file from synthesizer import Synthesizer from utils import str2bool, makedirs, add_postfix import base64 ROO...
86
31.36
85
14
724
python
[{"finding_id": "codeql_py/reflective-xss_0f7ba651f5c306e3_cb8db87f", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 68 ]
[ null ]
[ 12 ]
[ 41 ]
2024-11-18T20:10:52.350894+00:00
1,573,772,241,000
cf5847e3aee7a39a5e05a421ca00d8fe990d5e80
2
{ "blob_id": "cf5847e3aee7a39a5e05a421ca00d8fe990d5e80", "branch_name": "refs/heads/master", "committer_date": 1573772241000, "content_id": "8935fbc1fa41fa8c98ed78dbbb86002e69b16bc9", "detected_licenses": [ "MIT" ], "directory_id": "0fc524338a4114a04e5a033fdd35d6057f94ac41", "extension": "py", "fi...
2.421875
stackv2
import binascii import hashlib import os from app import db from .base import create_uuid_string, UUID_LENGTH server_secret = os.environ['BJ_SECRET'] class BjUser(db.Model): __tablename__ = 'bj_user' id = db.Column(db.String(UUID_LENGTH), primary_key=True, default=create_uuid_string) username = db.Column(db.St...
76
25.91
92
18
500
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_6e36e2808166ef3c_634421d4", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally e...
[ 70 ]
[ null ]
[ 13 ]
[ 28 ]
2024-11-18T20:10:56.118656+00:00
1,518,121,785,000
96929f0bf3feca9437f8d9a3e04ec994c9203c02
3
{ "blob_id": "96929f0bf3feca9437f8d9a3e04ec994c9203c02", "branch_name": "refs/heads/master", "committer_date": 1518121785000, "content_id": "595570be00aa6cddca174524ddda248be9f4a5ea", "detected_licenses": [ "MIT" ], "directory_id": "f8af4f56814853e01c1c9362e58c2c7d5a148027", "extension": "py", "fi...
2.515625
stackv2
from operator import itemgetter from app import app, cap from werkzeug.urls import url_parse from flask import render_template, redirect, url_for, request, flash from app import db from flask_login import current_user, login_user, logout_user, login_required from app.forms import LoginForm, RegisterForm, AddCoinForm, U...
133
32.06
88
17
1,103
python
[{"finding_id": "codeql_py/url-redirection_1a51ea0392401da6_d228fe6f", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 35 ]
[ null ]
[ 19 ]
[ 28 ]
2024-11-18T20:26:34.784346+00:00
1,609,770,294,000
9a400e0a75735a0c00c689c74b4d216264aac38e
3
{ "blob_id": "9a400e0a75735a0c00c689c74b4d216264aac38e", "branch_name": "refs/heads/master", "committer_date": 1609770294000, "content_id": "062a21425f1930dd21f60807d80d406744cc365f", "detected_licenses": [ "MIT" ], "directory_id": "0ebf81f9f359e0bc8398e6458926bec373bfbdb1", "extension": "py", "fi...
2.984375
stackv2
import json from typing import Dict import fnl import re from . import entity_types as et from . import entities as e from . import type_parser BUILTINS: Dict[str, e.Entity] = {} # we need to parse the docstrings of built-in functions # to equip them with a documentation Entity def _parse_docstring(docstring: str) ...
361
29.18
99
17
2,921
python
[{"finding_id": "codeql_py/redos_0d999557561db450_40c16853", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '%%' and containing many repetitio...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with '%%' and containing many repetitions of '$'." ]
[ 19 ]
[ null ]
[ 35 ]
[ 40 ]
2024-11-18T20:26:40.306729+00:00
1,510,938,559,000
58c59c62ba2d7e85d50e0e64236795bdbdd3d481
3
{ "blob_id": "58c59c62ba2d7e85d50e0e64236795bdbdd3d481", "branch_name": "refs/heads/master", "committer_date": 1510938559000, "content_id": "8b43d975806be8669d75e57bb4344edc3507f23e", "detected_licenses": [ "MIT" ], "directory_id": "f1f5c239ed2d20ad3bf2afe500f493a1edceeb32", "extension": "py", "fi...
2.6875
stackv2
import sys import requests import time import json import os import const import argparse from clint.textui import prompt from lib import err, info def getVideoId(url): if "hotstar.com/" in url: video_id = url.split("/")[-1] if len(video_id) == 10 and int(video_id): return video_id ...
123
31.58
86
15
1,021
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_65c2fc3d917ffc73_82db6e48", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [hotstar.com/](1) may be at an arbitrary position in th...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [hotstar.com/](1) may be at an arbitrary position in the sanitized URL." ]
[ 12 ]
[ null ]
[ 8 ]
[ 29 ]
2024-11-18T20:26:47.369213+00:00
1,573,753,542,000
7b7ebfe3693fda11cbf918019495b8d441c5dd9d
3
{ "blob_id": "7b7ebfe3693fda11cbf918019495b8d441c5dd9d", "branch_name": "refs/heads/master", "committer_date": 1573753542000, "content_id": "34ebf1e07c480ac604e28943a09357a9163ae7c1", "detected_licenses": [ "MIT" ], "directory_id": "013fcbcfbedc90598f3e9ac76fefa27b0086fd5a", "extension": "py", "fi...
2.6875
stackv2
""" Wattbox control module for turning on and off outlets on a SnapAV wattbox power strip. Author: Greg J. Badros $ cd .../path/to/home-assistant/ $ pip3 install --upgrade .../path/to/pywattbox Then the component/wattbox.py and its require line will work. TODO: Parse voltage_value (1200 = 120V; it's in tenths of vo...
245
33.36
96
18
2,026
python
[{"finding_id": "codeql_py/request-without-cert-validation_2fd7c66d9dc52c69_61e7496c", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
3
true
[ "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 110, 161, 228 ]
[ 111, 163, 230 ]
[ 24, 28, 28 ]
[ 50, 54, 54 ]
2024-11-18T20:26:55.335555+00:00
1,625,719,912,000
fd38a90a831d650e429ff9db7f773ff60503ce84
3
{ "blob_id": "fd38a90a831d650e429ff9db7f773ff60503ce84", "branch_name": "refs/heads/main", "committer_date": 1625719912000, "content_id": "334fa6d75a37cbe90f15c5d6bacaf06521d849f2", "detected_licenses": [ "MIT" ], "directory_id": "af2cace308035c0eab693c447d4543c6402864b0", "extension": "py", "file...
2.5625
stackv2
import math import elasticsearch from flask import Flask, flash, request, redirect, render_template from werkzeug.utils import secure_filename from uploader import pdf_loader UPLOAD_FOLDER = './pdf' ALLOWED_EXTENSIONS = {'pdf'} app = Flask(__name__) app.config['UPLOAD_FOLDER'] = UPLOAD_FOLDER app.secret_key = 'u of d...
124
30.12
92
18
769
python
[{"finding_id": "codeql_py/url-redirection_c094c0702f16c664_77f15508", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
2
true
[ "CWE-601", "CWE-601" ]
[ "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 100, 106 ]
[ null, null ]
[ 29, 29 ]
[ 40, 40 ]
2024-11-18T20:26:58.267035+00:00
1,593,318,221,000
ecdc7fa84f6325325c7096fdc7fc359155348964
3
{ "blob_id": "ecdc7fa84f6325325c7096fdc7fc359155348964", "branch_name": "refs/heads/master", "committer_date": 1593318221000, "content_id": "c53d7b8e3bda8e6131eb3bdecd9488a669e2638e", "detected_licenses": [ "MIT" ], "directory_id": "186e82b10f9218f8a48cd6ce8e197b29aa0e044d", "extension": "py", "fi...
2.890625
stackv2
# Flask-Login example inspired by https://github.com/shekhargulati/flask-login-example/blob/master/flask-login-example.py import os from flask import Flask, request, redirect from flask_login import LoginManager, UserMixin, login_user, logout_user import dash_core_components as dcc import dash_html_components as html ...
166
27.43
121
17
1,148
python
[{"finding_id": "codeql_py/flask-debug_8b76af4d62ccd89e_b5fc10ff", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-601" ]
[ "py/flask-debug", "py/url-redirection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 166, 158 ]
[ null, null ]
[ 5, 29 ]
[ 38, 53 ]
2024-11-18T20:52:05.792381+00:00
1,622,592,136,000
962eb29dfb5ea1f6d04aeaf1b28b6371031986af
2
{ "blob_id": "962eb29dfb5ea1f6d04aeaf1b28b6371031986af", "branch_name": "refs/heads/main", "committer_date": 1622592136000, "content_id": "a134ec56bc848f5853f2bac23227ac2e67080bfe", "detected_licenses": [ "Unlicense" ], "directory_id": "ab9711a882c72c2c948073a09729299d8590436a", "extension": "py", ...
2.40625
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- # DFIR Deaddrop - quick http client/server file transfer for IR evidence collection. # This is http only so password protect or encrypt the evidence prior to transfer # Author: Sean Frank import aiofiles import aiohttp import asyncio import base64 import ctypes import h...
192
38.27
160
19
2,414
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_3051b4408bd7c21a_c32a06cb", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 39, 47 ]
[ null, null ]
[ 47, 30 ]
[ 80, 76 ]
2024-11-18T20:52:06.613157+00:00
1,551,816,922,000
15dd8515ceb7387486bb94236afafb48954b642c
3
{ "blob_id": "15dd8515ceb7387486bb94236afafb48954b642c", "branch_name": "refs/heads/master", "committer_date": 1551816922000, "content_id": "647182087cfff771b8d0834508e79e22d5b59fb8", "detected_licenses": [ "Apache-2.0" ], "directory_id": "edf4cd6bfd9cc635cdf21f15f8a643fbc082a6fa", "extension": "py"...
2.6875
stackv2
# This is Retort, a thing to boil iKettles in Flask. # It is built on the shoulders of giants. # # This is the flask app. It's got no complicated bits # # things to do: # Move API bits to flask-restful # Add a pretty GUI # WebSockets for GUI updates? I heard you like sockets, so I put sockets in your sockets ...
155
22.78
91
16
927
python
[{"finding_id": "codeql_py/log-injection_bd4ed70acbd36de1_e9e02a26", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 73 ]
[ null ]
[ 15 ]
[ 67 ]
2024-11-18T20:52:25.388282+00:00
1,522,131,144,000
4b00cc3e3609c84565e492f6a9edb8a23693f67b
3
{ "blob_id": "4b00cc3e3609c84565e492f6a9edb8a23693f67b", "branch_name": "refs/heads/master", "committer_date": 1522131144000, "content_id": "a94a92f2a37965036b640a077fe5e81f56128977", "detected_licenses": [ "MIT" ], "directory_id": "601ee3605224c69c23f71e398c42280db0eb3f77", "extension": "py", "fi...
2.796875
stackv2
#!/usr/bin/env python3 import os, sys, requests from argparse import ArgumentParser, FileType from yaml import safe_load as load from jinja2 import Template, Environment def main(): parser = ArgumentParser() parser.add_argument('input', type=FileType('r')) parser.add_argument('output', nargs='?', type=FileType(...
41
23.85
82
12
235
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_ff226396267e504d_432b88ea", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 19 ]
[ null ]
[ 9 ]
[ 22 ]
2024-11-18T20:52:25.877261+00:00
1,469,531,285,000
e6100b08ef46742273ffda6789fc50cd3d4e3686
2
{ "blob_id": "e6100b08ef46742273ffda6789fc50cd3d4e3686", "branch_name": "refs/heads/master", "committer_date": 1469531285000, "content_id": "7f330078780c5c4195535379a8bf21da5cc1fea9", "detected_licenses": [ "Apache-2.0" ], "directory_id": "85550d94a02496dbe6720e53b2f40fb8cbc28a74", "extension": "py"...
2.34375
stackv2
# -*- coding: UTF-8 -*- import hashlib import base64 import datetime import urllib2 import json class TemplateSMS: account_sid = '' account_token = '' app_id = '' server_ip = '' server_port = '' soft_version = '' timestamp = '' def set_account(self, account_sid, token): self.a...
81
35.49
113
18
701
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_3a951a9db3a5e977_3340a33e", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (id)](2) is used in a hashing algorithm (MD5) that is insecure.", "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (id)](2) is used in a hashing algorithm (MD5) that i...
[ 35, 64 ]
[ null, null ]
[ 20, 20 ]
[ 29, 29 ]
2024-11-18T20:52:30.140740+00:00
1,608,452,525,000
a4bd2e7f15551215480f0450ff9e84f5772169c1
3
{ "blob_id": "a4bd2e7f15551215480f0450ff9e84f5772169c1", "branch_name": "refs/heads/main", "committer_date": 1608452525000, "content_id": "e998b4166f6fc250438f0aa73a65c93ff8173f26", "detected_licenses": [ "MIT" ], "directory_id": "af91ba1b8b808aeb72cbe80f0f225415679bf5ed", "extension": "py", "file...
3.4375
stackv2
import re DEBUG = False class filethingy: values = [] def __init__(self, filename): self.values = [] f = open(filename, 'r') for line in f: self.values.append(line) # print("input: ", self.values) class findvalid: """class to solve the problem at hand "...
59
26
85
16
413
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_19d7be59a0671a92_91280d9c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 36 ]
[ null ]
[ 15 ]
[ 59 ]
2024-11-18T20:52:33.641133+00:00
1,629,007,668,000
3c5db701516105a096a9d29ee2373daf00eb5f71
3
{ "blob_id": "3c5db701516105a096a9d29ee2373daf00eb5f71", "branch_name": "refs/heads/main", "committer_date": 1629007668000, "content_id": "22d68005d97f4f14a1e5f9d4c0e8734830656f2d", "detected_licenses": [ "MIT" ], "directory_id": "6f42bc8da6931b6577eb00ba851e97b2b8017332", "extension": "py", "file...
2.5625
stackv2
from flask import Flask, render_template, request import requests as r import pyqrcode from pyqrcode import QRCode import io app = Flask(__name__) @app.route('/') def home(): return render_template('home.html') @app.route('/scan',methods=['GET','POST']) def qrcode(): gambar=None gambar = io.BytesIO() ...
49
21.88
99
12
298
python
[{"finding_id": "codeql_py/flask-debug_8c3092ca83537b08_23420ab1", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 49, 46 ]
[ null, null ]
[ 5, 12 ]
[ 24, 16 ]
2024-11-18T20:52:38.477434+00:00
1,601,632,082,000
5e2def12bd2a2895e17b23bd73a51268e6ad3ac8
3
{ "blob_id": "5e2def12bd2a2895e17b23bd73a51268e6ad3ac8", "branch_name": "refs/heads/master", "committer_date": 1601632082000, "content_id": "410096acae1f8d57a6b2f0d5bb3fbc48ec6d0d88", "detected_licenses": [ "Apache-2.0" ], "directory_id": "aeb03567266b28846ea2b4e24a22a47510829cba", "extension": "py"...
2.671875
stackv2
""" Simple service to download files from URL's extracted from Sesam data entities and upload them to another URL """ import os import tempfile import logging import json import requests from flask import Flask, Response, request from sesamutils import VariablesConfig, sesam_logger from sesamutils.flask import serve ...
121
33.94
101
20
892
python
[{"finding_id": "codeql_py/full-ssrf_8245b051430e3792_349e70e2", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
2
true
[ "CWE-918", "CWE-918" ]
[ "py/full-ssrf", "py/full-ssrf" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1).", "The full URL of this request depends on a [user-provided value](1)." ]
[ 57, 70 ]
[ null, null ]
[ 19, 29 ]
[ 54, 67 ]
2024-11-18T20:52:50.572542+00:00
1,535,255,264,000
576f249c26c05ad30bb62ac82bcfc56fb3df959f
2
{ "blob_id": "576f249c26c05ad30bb62ac82bcfc56fb3df959f", "branch_name": "refs/heads/master", "committer_date": 1535255264000, "content_id": "8c1e2c347f55c65171bb3e8c9d95c780efdaa5c9", "detected_licenses": [ "MIT" ], "directory_id": "b61711f4b7b559517cdce14a4a79a67d58f93168", "extension": "py", "fi...
2.421875
stackv2
from collections import namedtuple from jinja2 import Environment, PackageLoader from . import filters Generator = namedtuple('Generator', ['generate_project']) def is_valid_language(language): return language.lower() in ['python'] def get_generator(language): if is_valid_language(language): ret...
54
26.26
67
12
317
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_b2ffaea365578ed2_e65963f4", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 37 ]
[ 39 ]
[ 11 ]
[ 6 ]
2024-11-18T20:52:56.432801+00:00
1,676,938,200,000
073aecb434e226ea04469b3ed18b0f023a1c81ad
3
{ "blob_id": "073aecb434e226ea04469b3ed18b0f023a1c81ad", "branch_name": "refs/heads/master", "committer_date": 1676938200000, "content_id": "56b32c6e8568069a6121a5ff75cc927cc9fb7313", "detected_licenses": [ "MIT" ], "directory_id": "6f9069ed4eacaf006eb25e21195d19581651ca55", "extension": "py", "fi...
2.796875
stackv2
import json import logging import shapely import time from shapely import speedups if speedups.available: speedups.enable() from shapely.geometry import shape, Point logger = logging.getLogger(__name__) # load GeoJSON file containing sectors with open('static/flightmap_europe_fir_uir.json') as f: firuirs = js...
55
34.58
78
15
446
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_898dbe33d58a3568_a9a3eaa9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.\nThis expression logs [sensitive data (private)](4) as clear text." ]
[ 44 ]
[ null ]
[ 19 ]
[ 74 ]
2024-11-18T19:02:29.882148+00:00
1,615,517,706,000
b319a08b06efe5d7a4d0d83eb41abc178e03e24e
3
{ "blob_id": "b319a08b06efe5d7a4d0d83eb41abc178e03e24e", "branch_name": "refs/heads/master", "committer_date": 1615517706000, "content_id": "d96d93dea7f56ee20adb6a8cd3d9626ad62e1b7a", "detected_licenses": [ "MIT" ], "directory_id": "f0a54fa8580357d129f6701a107fe02d063e0ea7", "extension": "py", "fi...
2.9375
stackv2
# -*- coding:utf-8 -*- import re import json import requests """ 目标APP:Before避风【快手旗下】 目标url:APP视频分享链接 爬取思路: 1. 通过APP里的分享获取视频url 2. 对 https://hlg.xiatou.com/h5/feed/detail 发送get请求,获取json数据 """ class Before(object): def __init__(self, url): self.url = url self.session = requests.Session() ...
62
35.34
115
21
612
python
[{"finding_id": "codeql_py/overly-large-range_bb056d29fb3d9bef_9c635530", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 23 ]
[ null ]
[ 66 ]
[ 69 ]
2024-11-18T19:02:57.955451+00:00
1,630,085,136,000
197f5b8a183ee3dc8ffc04949fa5d539bb1f6419
2
{ "blob_id": "197f5b8a183ee3dc8ffc04949fa5d539bb1f6419", "branch_name": "refs/heads/master", "committer_date": 1630085136000, "content_id": "1f9c16b21a1dd75f048b7a429a02a8bf121e5c0b", "detected_licenses": [ "MIT" ], "directory_id": "ce34c14dcf56bc042b1a49e87b7d7c5c70b6237d", "extension": "py", "fi...
2.484375
stackv2
from sendgrid import SendGridAPIClient from sendgrid.helpers.mail import Mail, From from jinja2 import Template, Environment, FileSystemLoader from config.config import Config # sending email def send_email(msg): # load config file configuration = Config() # set message to variable subject = msg['subj...
67
30.22
67
14
477
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_fc943d6a46707aeb_7b580a1f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 60 ]
[ null ]
[ 11 ]
[ 60 ]
2024-11-18T19:14:53.628278+00:00
1,588,070,539,000
620e642c6ac81f2e530b88232574f701ae0b5c73
3
{ "blob_id": "620e642c6ac81f2e530b88232574f701ae0b5c73", "branch_name": "refs/heads/master", "committer_date": 1588072610000, "content_id": "29436efaf8967f465b72e3b0ca73898bbfd823be", "detected_licenses": [ "Apache-2.0" ], "directory_id": "567909720b1d72923bdf3237b50f087923a32337", "extension": "py"...
2.59375
stackv2
# /* # * Copyright 2018 Nokia Solutions and Networks # * Licensed under the Apache License, Version 2.0, # * see license.txt file for details. # */ import argparse import os import paramiko import select import sys import zipfile def mkdir_p(sftp, remote_directory): """Change to this directory, recursively makin...
194
37.71
168
17
1,828
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_1696613c9a977a5f_c9de2797", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 178 ]
[ null ]
[ null ]
[ 58 ]
2024-11-18T19:27:39.511160+00:00
1,587,821,996,000
581c0077a05ed7d80eeecf2b6ad6fe6372b8dea5
3
{ "blob_id": "581c0077a05ed7d80eeecf2b6ad6fe6372b8dea5", "branch_name": "refs/heads/master", "committer_date": 1587821996000, "content_id": "2d2ec3379b50437ac31f2d036e970a35a374b1d7", "detected_licenses": [ "MIT" ], "directory_id": "5478a6265b2aace785b2eb805cbddcad4c07fb61", "extension": "py", "fi...
2.65625
stackv2
""" Creation of Flask object along with configuration based on environment name specified in the settings file""" import logging from datetime import datetime as dt from flask import Flask, Blueprint, request from flask_restful import Api from flask_sqlalchemy import SQLAlchemy from flask_bcrypt import Bcrypt from flas...
68
27.76
127
15
415
python
[{"finding_id": "codeql_py/log-injection_a475aec9007e8db4_44c761cf", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
5
true
[ "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 46, 48, 49, 53, 54 ]
[ null, null, null, null, null ]
[ 13, 13, 13, 13, 13 ]
[ 32, 27, 25, 29, 31 ]
2024-11-18T19:27:40.987997+00:00
1,691,673,242,000
b11ab73bb9b85a9e2c9fa6dafd3905aed124fd66
3
{ "blob_id": "b11ab73bb9b85a9e2c9fa6dafd3905aed124fd66", "branch_name": "refs/heads/master", "committer_date": 1691673242000, "content_id": "0a46bfddafdd007abcdc3a544316e9d23ce1c735", "detected_licenses": [ "Apache-2.0" ], "directory_id": "10b2b8d1d77c70c700885cd43ca8d341034ff734", "extension": "py"...
2.703125
stackv2
#!/usr/bin/env python3 # # generate_docker_compose.py # # Generate configuration from Jinja template. # # usage: python3 ./script/generate_docker_compose.py # (call only from root repository) # # Generate configuration with .env.values: # - from docker-compose.yml.template (Jinja template) to docker-compose.yml # - fro...
121
32.13
91
15
861
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_d16738b5592f575b_4bc5cdb0", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 74 ]
[ 76 ]
[ 15 ]
[ 6 ]
2024-11-18T19:27:46.442310+00:00
1,540,802,274,000
6a00e1fb1aa546037240908bc0f15488322e6311
3
{ "blob_id": "6a00e1fb1aa546037240908bc0f15488322e6311", "branch_name": "refs/heads/master", "committer_date": 1540802274000, "content_id": "1c52b5f83721a9c3a5b11ad81ce6d23fe17f7145", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "5ed2e645da9afbd2b9bbb83c492cad0f44530954", "extension": "p...
2.625
stackv2
# coding: utf-8 import requests from flask import request, Response class Proxy(object): def __init__(self, app=None): self.upstreams = [] self.init_app(app) def init_app(self, app): """Initialize this class with the given :class:`flask.Flask` application. :param app...
89
29.09
68
17
542
python
[{"finding_id": "codeql_py/reflective-xss_e52cac873e3df0c6_27250deb", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
2
true
[ "CWE-079", "CWE-918" ]
[ "py/reflective-xss", "py/partial-ssrf" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 86, 71 ]
[ null, 78 ]
[ 29, 20 ]
[ 44, 33 ]
2024-11-18T19:38:33.200618+00:00
1,588,336,244,000
cb02462a3dc8a79d6f445e1095b55f0eb017b2e3
3
{ "blob_id": "cb02462a3dc8a79d6f445e1095b55f0eb017b2e3", "branch_name": "refs/heads/master", "committer_date": 1588336244000, "content_id": "4b9801557e9bf9d9593308e7c8862b91c7833e71", "detected_licenses": [ "MIT" ], "directory_id": "e36d17f9af9429f0f00a8221abd24b311a2d2df9", "extension": "py", "fi...
2.625
stackv2
# -*- coding: utf-8 -*- import scrapy from scrapeNews.items import ScrapenewsItem from scrapeNews.settings import logger from dateutil import parser class NdtvSpider(scrapy.Spider): name = 'ndtv' custom_settings = { 'site_id': 104, 'site_name': 'NDTV', 'site_url': 'https://www.ndtv.com...
147
50.6
138
19
1,698
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_9ee5b5731c44f9f8_8d8f21b7", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [gadgets.ndtv.com](1) may be at an arbitrary position i...
28
true
[ "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE...
[ "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitizatio...
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MED...
[ "The string [gadgets.ndtv.com](1) may be at an arbitrary position in the sanitized URL.", "The string [www.ndtv.com](1) may be at an arbitrary position in the sanitized URL.", "The string [auto.ndtv.com](1) may be at an arbitrary position in the sanitized URL.", "The string [food.ndtv.com](1) may be at an arb...
[ 53, 55, 57, 59, 61, 63, 65, 76, 78, 78, 80, 80, 82, 84, 96, 100, 104, 104, 108, 108, 112, 127, 129, 129, 131, 133, 135, 135 ]
[ null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null ]
[ 16, 18, 18, 18, 18, 18, 18, 16, 18, 52, 18, 55, 18, 18, 16, 18, 18, 53, 18, 53, 18, 16, 18, 55, 18, 18, 18, 56 ]
[ 50, 48, 49, 49, 51, 51, 51, 50, 48, 83, 51, 88, 49, 51, 50, 48, 49, 86, 49, 86, 51, 46, 51, 88, 49, 49, 52, 89 ]
2024-11-18T19:38:44.138531+00:00
1,639,897,812,000
4eb0623e0b9f2038c678cd8e732d18fcdf6cb8fa
3
{ "blob_id": "4eb0623e0b9f2038c678cd8e732d18fcdf6cb8fa", "branch_name": "refs/heads/master", "committer_date": 1639897812000, "content_id": "277a2a8fe4d547e3965745c47616675723dc220a", "detected_licenses": [ "MIT" ], "directory_id": "74be39a2172a1c9afcd4f44df9f6f9fb8fb8f804", "extension": "py", "fi...
2.765625
stackv2
# -*- coding: utf-8 -*- """ Marker Cluster plugin --------------------- Creates a MarkerCluster plugin to add on a folium map. """ from jinja2 import Template from branca.element import JavascriptLink, CssLink, MacroElement, Figure from folium.map import Popup, Icon, Marker class MarkerCluster(MacroElement): ...
75
32.8
130
15
545
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_96b3134337f4175b_dceaf2d5", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 51 ]
[ 56 ]
[ 26 ]
[ 17 ]
2024-11-18T19:38:44.568215+00:00
1,593,109,769,000
fd6389db5e29b0d0a78bfd4b03df5dd0e509ecf2
2
{ "blob_id": "fd6389db5e29b0d0a78bfd4b03df5dd0e509ecf2", "branch_name": "refs/heads/master", "committer_date": 1593109769000, "content_id": "2ccbfa42d85e402ced7382607844a30877d117bd", "detected_licenses": [ "Apache-2.0" ], "directory_id": "7604095b8355f1221123ae9dbab2ad294756ca4c", "extension": "py"...
2.40625
stackv2
#!/usr/bin/env python3 # # fritzswitch - Switch your Fritz!DECT200 via command line # # Copyright (C) 2014 Richard "Shred" Körber # # This program is free software: you can redistribute it and/or modify # it under the terms of the GNU General Public License as # published by the Free Software Foundation, either version...
76
37.25
93
15
747
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_093c8416893e66a6_b85d1b65", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi...
[ 46 ]
[ null ]
[ 24 ]
[ 51 ]
2024-11-18T19:38:56.421460+00:00
1,523,301,144,000
6e68f0528e08d5aae215b538ff7b26db57602277
3
{ "blob_id": "6e68f0528e08d5aae215b538ff7b26db57602277", "branch_name": "refs/heads/master", "committer_date": 1523301144000, "content_id": "46193f81dd83934e181a015c006faae50b22a099", "detected_licenses": [ "Apache-2.0" ], "directory_id": "24a5f9fcb96369add6af2690d340e9a9ecc00d3e", "extension": "py"...
2.640625
stackv2
import datetime import json from flask import Flask from flask import request from flask_restful import reqparse app = Flask(__name__) parser = reqparse.RequestParser() parser.add_argument('pos') parser.add_argument('neg') def filter_blanks(dataset): return [val for val in dataset if val is not None and val != '...
139
32.24
139
27
1,122
python
[{"finding_id": "codeql_py/flask-debug_19fcc756727060ad_2dc315be", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
4
true
[ "CWE-215", "CWE-079", "CWE-022", "CWE-022" ]
[ "py/flask-debug", "py/reflective-xss", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 137, 134, 84, 126 ]
[ null, null, null, null ]
[ 5, 12, 19, 19 ]
[ 24, 49, 31, 31 ]
2024-11-18T20:18:34.478791+00:00
1,673,701,306,000
bc533470d1432ca0afc274ad704e688d641a28c4
3
{ "blob_id": "bc533470d1432ca0afc274ad704e688d641a28c4", "branch_name": "refs/heads/master", "committer_date": 1673701306000, "content_id": "2a3db9c0df6cac72387033db470e37705e843465", "detected_licenses": [ "Apache-2.0" ], "directory_id": "7869c15427c2cb5d825b961b5a36e084d25f1fdd", "extension": "py"...
3.046875
stackv2
""" This module uses endesive to sign PDF files and provides some classes to manage this and to help render the signature into the body of the PDF file (similar for portable signer) """ import logging import datetime import OpenSSL.crypto import endesive.pdf import pytz __author__ = 'Stephen Brown (Little Fish Solut...
134
37.12
124
17
1,101
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2b31a0ba5faa9710_dea72229", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 98 ]
[ null ]
[ 26 ]
[ 34 ]
2024-11-18T20:18:37.136703+00:00
1,508,770,036,000
7bff82662bcd3e928ed013c94a492e7d30610f6b
2
{ "blob_id": "7bff82662bcd3e928ed013c94a492e7d30610f6b", "branch_name": "refs/heads/master", "committer_date": 1508770036000, "content_id": "00abc4d30aa793f29e5706cd1f9ef9125dd7de26", "detected_licenses": [ "MIT" ], "directory_id": "a29d45978e121847aa36fd36dac515f073652273", "extension": "py", "fi...
2.390625
stackv2
"""Blueprint for user interface (the single page app) entry points""" from flask import Blueprint, Response, g, redirect, render_template, request, send_file from flask_security import current_user, login_required from common.config import get_config from ...flask_modules.jwt import create_jwt_for_user _CONFIG = get_...
55
37.13
90
14
450
python
[{"finding_id": "codeql_py/url-redirection_401bccec153e7f0c_56484d5e", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 47 ]
[ null ]
[ 21 ]
[ 73 ]
2024-11-18T20:31:36.198078+00:00
1,514,449,518,000
e67d4b9eef47c1f6411298b43acf7720d890b151
3
{ "blob_id": "e67d4b9eef47c1f6411298b43acf7720d890b151", "branch_name": "refs/heads/master", "committer_date": 1514449518000, "content_id": "189c5815467bb3ecd92ece1c0bc331c61db8a5b6", "detected_licenses": [ "Apache-2.0" ], "directory_id": "588fd74997a933d3dae48fee21780b441a84902d", "extension": "py"...
2.671875
stackv2
import uuid import time from hashlib import sha1, sha256 from chaintoken.wallet.token import Token from chaintoken.database.client import Mongo from chaintoken.settings import SECRET_KEY, ADDRESS_STARTSWITH, TRANSACTION_FEE, TRANSACTION_FEE_PERCENTS class Wallet(object): """ Token wallet object """ cl...
217
26.05
123
21
1,177
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_1c3525416b26d1cd_342b3f2f", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
3
true
[ "CWE-327", "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.", "[Sensitive data (id)](1) is used in a hashing algorithm (SHA1) that is insecure.\n[Sensitive data (id)](2) is used in a hashing algorithm (SH...
[ 47, 193, 194 ]
[ null, null, null ]
[ 25, 29, 29 ]
[ 47, 32, 48 ]
2024-11-18T20:43:18.822774+00:00
1,469,309,231,000
318aff9778b54e938286c2231cf9bdcf984dad2c
3
{ "blob_id": "318aff9778b54e938286c2231cf9bdcf984dad2c", "branch_name": "refs/heads/master", "committer_date": 1469309231000, "content_id": "0f8523d14c9b11a884059bde9d616deceded55b7", "detected_licenses": [ "MIT" ], "directory_id": "97039b47204ceccfc11f572f4b5715111d6db4ff", "extension": "py", "fi...
2.59375
stackv2
from flask import Flask, render_template, request, json, Response, redirect from flask_sqlalchemy import SQLAlchemy from werkzeug.utils import secure_filename from errors import * import os app = Flask(__name__) app.config.from_object(os.environ['APP_SETTINGS']) app.config['SQLALCHEMY_TRACK_MODIFICATIONS'] = False db...
302
31.9
79
19
2,312
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_b656cc2155ead220_3662ef00", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",...
3
true
[ "CWE-312", "CWE-312", "CWE-022" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.", "This expression stores [sensitive data (private)](1) as clear text.", "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2)." ]
[ 164, 165, 118 ]
[ null, null, null ]
[ 28, 28, 23 ]
[ 47, 54, 31 ]
2024-11-18T20:43:22.031856+00:00
1,693,778,182,000
56a46711306b00246c040c5a34ea0b615fb31dc7
3
{ "blob_id": "56a46711306b00246c040c5a34ea0b615fb31dc7", "branch_name": "refs/heads/master", "committer_date": 1693778182000, "content_id": "60e0a22a0b84354e8daf308d5ddf7f1280c6c604", "detected_licenses": [ "MIT" ], "directory_id": "2a1b8a671aceda6bc446f8ce26400aa84fa444a6", "extension": "py", "fi...
2.578125
stackv2
import demistomock as demisto # noqa: F401 from CommonServerPython import * # noqa: F401 from pathlib import Path from multiprocessing import Process import resource import re import time import subprocess import requests import urllib3 urllib3.disable_warnings() CLOUD_METADATA_URL = 'http://169.254.169.254/' #...
260
37.1
165
19
2,426
python
[{"finding_id": "codeql_py/request-without-cert-validation_0437501a5c553b72_a2bd4673", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 190 ]
[ null ]
[ 19 ]
[ 82 ]
2024-11-18T20:43:49.238234+00:00
1,610,081,685,000
fcbed948be207540a102de8e395c4c6d64d9ae9e
3
{ "blob_id": "fcbed948be207540a102de8e395c4c6d64d9ae9e", "branch_name": "refs/heads/master", "committer_date": 1610081685000, "content_id": "eabd0fe41f96f98f77a73c6fc79e538721385b9e", "detected_licenses": [ "MIT" ], "directory_id": "e5e9032965f2593fc2e022604887aee582c9c198", "extension": "py", "fi...
2.53125
stackv2
import argparse from collections import defaultdict, Counter import json import re from tqdm import tqdm RE_TAGGING = re.compile(r'^(O|B(o|b(i[_~])+|I[_~])*(I[_~])+)+$') # don't support plain I and i STRENGTH = {'I_': '_', 'I~': '~', 'i_': '_', 'i~': '~', 'B': None, 'b': None, 'O': None, 'o': None} # don't support p...
196
43.69
108
17
2,296
python
[{"finding_id": "codeql_py/redos_2e1d68b4b2f38947_36be4942", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'B' and containing many repetition...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with 'B' and containing many repetitions of 'I_I_B'." ]
[ 9 ]
[ null ]
[ 32 ]
[ 52 ]
2024-11-18T20:44:05.514253+00:00
1,693,532,147,000
2f1bf62d594c15f3ca8e94effdd037e050c52417
2
{ "blob_id": "2f1bf62d594c15f3ca8e94effdd037e050c52417", "branch_name": "refs/heads/master", "committer_date": 1693532147000, "content_id": "5309153425c59e89cbb61e9db48aee8a06900bcd", "detected_licenses": [ "Apache-2.0" ], "directory_id": "a64358585c6833b254abc909e41f91126ce156b5", "extension": "py"...
2.359375
stackv2
# # Pyserini: Reproducible IR research with sparse and dense representations # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required...
283
40.36
137
15
2,714
python
[{"finding_id": "codeql_py/tarslip_ac2d4b716fd753e9_7769c856", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially untrusted source](2).\nThis file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially untrusted source](2)." ]
[ 160 ]
[ null ]
[ 5 ]
[ 12 ]
2024-11-18T20:57:29.259520+00:00
1,447,286,394,000
f7b656b58b9feac759f9da0def9e7e2481603f65
2
{ "blob_id": "f7b656b58b9feac759f9da0def9e7e2481603f65", "branch_name": "refs/heads/master", "committer_date": 1447286423000, "content_id": "c8819c4f305d65c30fac9dad20767fe84c45c636", "detected_licenses": [ "MIT" ], "directory_id": "7d17b1ab5dd70f0f38d42bcea484e4a52a1570f3", "extension": "py", "fi...
2.484375
stackv2
# Quickie D3JS-NX interface for Jupyter Notebooks # Copyright (c) Nick Timkovich 2015 # MIT Licensed from __future__ import absolute_import, division, print_function import random import json from IPython.display import HTML import jinja2 __all__ = ['nx_force'] _LETTERS = 'bcdghjklmnpqrtvwyz' _CHARS = _LETTERS + '34...
164
24.88
76
14
1,097
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_e3773ba9ef35745a_330674aa", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 16 ]
[ null ]
[ 8 ]
[ 28 ]
2024-11-18T20:57:35.217825+00:00
1,634,590,691,000
74ba589797c234e760100460b71558803e09b631
3
{ "blob_id": "74ba589797c234e760100460b71558803e09b631", "branch_name": "refs/heads/main", "committer_date": 1634590691000, "content_id": "286bf1ec8f6135bb71bd878b329b3d96a7147135", "detected_licenses": [ "Apache-2.0" ], "directory_id": "50ae0be5b4946a6980ea109828508981879ec4a7", "extension": "py", ...
2.53125
stackv2
from pprint import pprint import requests from flask import Flask from flask import request app = Flask(__name__) @app.route("/") def whatsapp_echo(): return "WhatsApp HTTP API Echo server is ready!" @app.route("/message", methods=["GET", "POST"]) def whatsapp_webhook(): data = request.get_json() if n...
40
25.3
82
13
261
python
[{"finding_id": "codeql_py/full-ssrf_392bc904a9ccf5a1_a68e5a83", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
2
true
[ "CWE-918", "CWE-022" ]
[ "py/full-ssrf", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 31, 32 ]
[ null, null ]
[ 13, 14 ]
[ 37, 18 ]
2024-11-18T20:57:40.593626+00:00
1,590,211,141,000
a70a14dfa4559d1d5b4db50a75aed532d261e5cd
3
{ "blob_id": "a70a14dfa4559d1d5b4db50a75aed532d261e5cd", "branch_name": "refs/heads/master", "committer_date": 1590211141000, "content_id": "de5d16a8ad38334e53e362c22434b1dd67c10396", "detected_licenses": [ "MIT" ], "directory_id": "4b53c8242822e801a02309c541349d1fcc792358", "extension": "py", "fi...
3.3125
stackv2
""" c13.py Cryptopals Set 2, Challenge 13 """ from Crypto.Cipher import AES from Crypto.Random import get_random_bytes from cryptopals import padding secret_key = get_random_bytes(16) def main(): # email=aaaaaaaaaa # aaaaaaaaa@gmail. # com&uid=10&role= # user------------ email = 'a'*19 + '@gmai...
72
22.54
72
12
447
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_fe805033c32edd39_adab6f66", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 60, 67 ]
[ null, null ]
[ 12, 15 ]
[ 62, 65 ]
2024-11-18T20:57:56.966156+00:00
1,516,180,614,000
f0516cc25c055d05d50d3b6787416ddbca46c665
4
{ "blob_id": "f0516cc25c055d05d50d3b6787416ddbca46c665", "branch_name": "refs/heads/master", "committer_date": 1516180614000, "content_id": "d280f3519174143a0f8be70e551c3d075e33ebb4", "detected_licenses": [ "MIT" ], "directory_id": "e0cbd2a8868cb26d60e637763c3a37e3acb57c2f", "extension": "py", "fi...
3.515625
stackv2
#!/usr/bin/env python #_*_coding:utf-8_*_ #创建商品列表 product_list = [ ('Robot',200000), ('MacPro',12000), ('Iphone8',8888), ('Hello World',1200), ] #创建购物车列表 shopping_list = [] user_salary=input("请输入你的工资:") if user_salary.isdigit(): user_salary = int(user_salary) while True:...
43
28.4
68
17
303
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b7cd0e92539ef613_4cd03827", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 31, 33 ]
[ null, null ]
[ 51, 35 ]
[ 62, 46 ]
2024-11-18T20:58:17.981696+00:00
1,622,659,659,000
0cc1a7f480de7a03bb5b7025a3e50974e8171fdc
3
{ "blob_id": "0cc1a7f480de7a03bb5b7025a3e50974e8171fdc", "branch_name": "refs/heads/master", "committer_date": 1622659659000, "content_id": "2082dd70ac1691b665cd5f747fcbc4b55c9daa9e", "detected_licenses": [ "MIT" ], "directory_id": "2c76a7de56619d90e404f0bcde784596010bb4a9", "extension": "py", "fi...
3.125
stackv2
""" Board handling. """ import csv import logging as log from random import shuffle _CAT_FIELD = {'go','jail','parking','gojail','tax','chance','community'} _CAT_BUYABLE = {'utility','station'} FIELD_POSITION = { 'Go' : 0, 'Pall Mall' : 11, 'Marylebone Station' : 15, 'Trafalgar Square'...
354
34.12
89
23
2,828
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_783316df6e7076b6_88566b0e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 242 ]
[ null ]
[ 66 ]
[ 74 ]
2024-11-18T20:58:34.764005+00:00
1,545,380,620,000
31536f9f9ee7a0ac514ab3e00479b68752da7047
2
{ "blob_id": "31536f9f9ee7a0ac514ab3e00479b68752da7047", "branch_name": "refs/heads/master", "committer_date": 1545380620000, "content_id": "38d04452f252ef634672390b1b9ba5e61e665a20", "detected_licenses": [ "MIT" ], "directory_id": "961d9e652a536a554f32257709685041279260dd", "extension": "py", "fi...
2.484375
stackv2
# -*- coding: utf-8 -*- import json import os import re import urllib.request import time # 쓰레드, 큐를 위한 라이브러리 추가 import multiprocessing as mp from threading import Thread from bs4 import BeautifulSoup from slackclient import SlackClient from flask import Flask, request, make_response, render_template app = Flask(__na...
227
26.75
119
17
1,835
python
[{"finding_id": "codeql_py/reflective-xss_339d8c6f1495ea30_1d96153e", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 196, 202 ]
[ null, null ]
[ 30, 23 ]
[ 54, 30 ]
2024-11-18T20:58:40.078292+00:00
1,552,215,142,000
00170913f86657a265f46ae2d26b6e2e64fc8d6f
2
{ "blob_id": "00170913f86657a265f46ae2d26b6e2e64fc8d6f", "branch_name": "refs/heads/master", "committer_date": 1552215142000, "content_id": "2c6f6e39e4f927230aa2cf1752211bb3e8d3f57d", "detected_licenses": [ "MIT" ], "directory_id": "09df178ff30004f5c220ef651ab663203f7ba672", "extension": "py", "fi...
2.359375
stackv2
from __future__ import print_function from flask import Blueprint, request, render_template, jsonify, current_app, redirect, url_for import social.db.user as db_user import social.db.follow as db_follow import social.db.post as db_post import json from social.webserver.login import User from flask_login import login_re...
133
29.05
94
15
895
python
[{"finding_id": "codeql_py/full-ssrf_686bfe3b4e74e322_d7d534fd", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
2
true
[ "CWE-918", "CWE-918" ]
[ "py/full-ssrf", "py/full-ssrf" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1).", "The full URL of this request depends on a [user-provided value](1)." ]
[ 104, 110 ]
[ null, null ]
[ 9, 9 ]
[ 89, 91 ]
2024-11-18T21:10:20.829430+00:00
1,634,319,148,000
0bdf9b5046b077bb4dc0c7e2707118f1bf578125
3
{ "blob_id": "0bdf9b5046b077bb4dc0c7e2707118f1bf578125", "branch_name": "refs/heads/master", "committer_date": 1634319148000, "content_id": "9a4497a0210755a2969baccfd8dd6c06a3979838", "detected_licenses": [ "MIT" ], "directory_id": "95506c7665f2b5cc75c42f893720f3f559b44a70", "extension": "py", "fi...
2.796875
stackv2
import socket import select import pickle from datetime import datetime from bidict import bidict import os HOST = '127.0.0.1' #localhost PORT = 5001 # Arbitrary non-privileged port #Function which calls the appropariate helper functions to complete tasks def executeTask(conn, data, activeUsers): ...
166
34.96
88
21
1,588
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_db280c2ed2d7b179_6bb366b4", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 86 ]
[ null ]
[ 11 ]
[ 42 ]
2024-11-18T21:10:47.567510+00:00
1,591,885,249,000
9400ed5e87aab3b26ffe0f96dcb4acd4fd6f8a5c
3
{ "blob_id": "9400ed5e87aab3b26ffe0f96dcb4acd4fd6f8a5c", "branch_name": "refs/heads/master", "committer_date": 1591885249000, "content_id": "5b22540e51f594dffce14b2dfcb296952fcbba3f", "detected_licenses": [ "MIT" ], "directory_id": "4826128b95d63a9ac691ae80cc14829ec1db1fa6", "extension": "py", "fi...
3.15625
stackv2
#!/usr/bin/env python3 """Utility functions, includes: `hash_id` and `Validate` class.""" import re def hash_id(*args: str or int) -> str: """A simple hashing function to generate `id`s given any number of string or number inputs.""" return ":".join([str(val) for val in args]) class Validate: @staticme...
47
33.3
98
17
477
python
[{"finding_id": "codeql_py/overly-large-range_1ae21f277a5e4253_ba66d3a2", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
2
true
[ "CWE-020", "CWE-1333" ]
[ "py/overly-large-range", "py/redos" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", "This part of the regular expression may cause exponential backtracking on strings starting with 'http://' and containing many repetitions of '*'." ]
[ 43, 43 ]
[ null, null ]
[ 51, 32 ]
[ 54, 95 ]
2024-11-18T21:11:01.699528+00:00
1,525,255,165,000
e9e4eae552d12d5e279a88de292ed16f2e37bbb8
2
{ "blob_id": "e9e4eae552d12d5e279a88de292ed16f2e37bbb8", "branch_name": "refs/heads/master", "committer_date": 1525255165000, "content_id": "0083aeb9a142af84c20462c82e0e422dbb0d40f9", "detected_licenses": [ "MIT" ], "directory_id": "c8390a8b0057482d89e766c88e7e9286c79606be", "extension": "py", "fi...
2.46875
stackv2
#!/anaconda3/envs/py3.6/bin/python from PyPDF2 import PdfFileReader import os allpdfs = [] for filename in os.listdir('./'): tmp = filename.split('.') if filename.split('.')[-1] == 'pdf': allpdfs.append(filename) def pageCount(pdffile): fp = open(pdffile, "rb") pdf = PdfFileReader(fp, strict ...
36
22.39
74
12
240
python
[{"finding_id": "codeql_py/overly-permissive-file_580bfe308d035c58_2c3cf7c5", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable." ]
[ 34 ]
[ null ]
[ 5 ]
[ 29 ]
2024-11-18T19:03:23.557061+00:00
1,685,409,529,000
32e89016da6f0d4f87da3047f4a772b929faceae
3
{ "blob_id": "32e89016da6f0d4f87da3047f4a772b929faceae", "branch_name": "refs/heads/master", "committer_date": 1685409529000, "content_id": "b8223ea935965719e9658b43d6328d9873195326", "detected_licenses": [ "MIT" ], "directory_id": "d456afaf2d77d3d4ae618d0180a47cb18a915cb5", "extension": "py", "fi...
2.734375
stackv2
# Example code to download all diary data for patients with N_EVENTS or more events recorded import seerpy N_EVENTS = 10 seer_client = seerpy.SeerConnect() # party_id can be blank to return all results patients = seer_client.get_patients_dataframe() patient_ids = patients['id'] for patient_id in patient_ids: ...
30
35.77
97
15
263
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4b5b4b6d1ec7ad69_db897119", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 29 ]
[ null ]
[ 19 ]
[ 47 ]
2024-11-18T19:03:40.715942+00:00
1,527,328,254,000
c1629c9436fa390e6e819b704140a6e057d9eba6
3
{ "blob_id": "c1629c9436fa390e6e819b704140a6e057d9eba6", "branch_name": "refs/heads/master", "committer_date": 1527328254000, "content_id": "cf3abf8af55acd1e086c7d5315dd0a2f9a0d5187", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "0d3962551f0cf285b662b6e688afb1bc9734872d", "extension": "p...
2.59375
stackv2
import json import pymongo from flask import Flask, request from bson import ObjectId replica1 = 'mongod-0.mongodb-service.default.svc.cluster.local:27017' replica2 = 'mongod-1.mongodb-service.default.svc.cluster.local:27017' replica3 = 'mongod-2.mongodb-service.default.svc.cluster.local:27017' uri = 'mongodb://main_...
85
28.72
131
19
571
python
[{"finding_id": "codeql_py/reflective-xss_3f7c8dd9cdbd73e9_1a3eba7d", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 63, 78 ]
[ 66, 81 ]
[ 20, 20 ]
[ 15, 15 ]
2024-11-18T19:28:39.197999+00:00
1,591,119,470,000
9e786b9f68e9796ef9571bb5cc4e456b2e673686
3
{ "blob_id": "9e786b9f68e9796ef9571bb5cc4e456b2e673686", "branch_name": "refs/heads/master", "committer_date": 1591119470000, "content_id": "7543fdd0d34c30f300b67659f232dc633572562d", "detected_licenses": [ "Apache-2.0" ], "directory_id": "b4f58b98cdccdfa29dcfab191952eea7db179eeb", "extension": "py"...
2.546875
stackv2
import os, base64 from flask import jsonify from ccai.config import CONFIG from ccai.image_processing.streetview import fetch_street_view_image from ccai.image_processing.watermark import apply_watermark def create_temp_dir(images, temp_dir): images.download_links(temp_dir) files = [f for f in os.listdir(tem...
58
35.84
92
15
508
python
[{"finding_id": "codeql_py/stack-trace-exposure_66cdffe2a4c0f497_6c55cda5", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 27 ]
[ 30 ]
[ 13 ]
[ 14 ]
2024-11-18T19:28:58.315166+00:00
1,364,164,971,000
5593cc9e88df102de437519668a91a6b833e846b
3
{ "blob_id": "5593cc9e88df102de437519668a91a6b833e846b", "branch_name": "refs/heads/master", "committer_date": 1364164971000, "content_id": "0c41b674a9b4eacd180ea0e04576d641ed652317", "detected_licenses": [ "Apache-2.0" ], "directory_id": "0199ffc1e40738601f68cd437d7ad106ad62cc0c", "extension": "py"...
2.59375
stackv2
#!/usr/bin/env python # Copyright 2013 Brett Slatkin # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law o...
398
35.72
79
17
3,279
python
[{"finding_id": "codeql_py/log-injection_119d71a3ee625fb1_4204707e", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
27
true
[ "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE...
[ "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-...
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MED...
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MED...
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depen...
[ 104, 136, 136, 217, 217, 217, 228, 228, 228, 263, 263, 263, 263, 301, 301, 301, 301, 302, 302, 302, 327, 327, 327, 352, 352, 352, 352 ]
[ null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null ]
[ 67, 39, 49, 23, 33, 47, 27, 37, 51, 18, 28, 42, 58, 18, 28, 42, 58, 18, 27, 43, 39, 49, 63, 31, 39, 49, 63 ]
[ 71, 47, 61, 31, 45, 61, 35, 49, 65, 26, 40, 56, 66, 26, 40, 56, 66, 25, 41, 55, 47, 61, 77, 37, 47, 61, 77 ]
2024-11-18T19:39:54.559626+00:00
1,577,014,193,000
dfc61eb0125fbd37254c36f047f5d67344127dd5
2
{ "blob_id": "dfc61eb0125fbd37254c36f047f5d67344127dd5", "branch_name": "refs/heads/master", "committer_date": 1577014193000, "content_id": "f3b284b54204ec082ff4e09a5fba993aab9d1251", "detected_licenses": [ "MIT" ], "directory_id": "a5ca689c9926261d790db2864a4fcbc76647bf62", "extension": "py", "fi...
2.40625
stackv2
import requests import sys, os,platform ''' 记得判断是否处于联网状态 ''' import re,random import time from datetime import datetime import urllib3 urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning) from user_agents import user_agents headers={ "Content-Type":"application/x-www-form-urlencoded", ...
138
20.35
99
16
734
python
[{"finding_id": "codeql_py/request-without-cert-validation_b4a281af10fa5b01_979ea2e1", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 53, 77 ]
[ null, null ]
[ 23, 16 ]
[ 100, 78 ]
2024-11-18T20:18:23.139271+00:00
1,621,400,818,000
9fd305773cb248f3b59473a45dac772e14760f98
3
{ "blob_id": "9fd305773cb248f3b59473a45dac772e14760f98", "branch_name": "refs/heads/master", "committer_date": 1621400818000, "content_id": "0c91676c0e5430c9a5a9d5c6f1b50c1c7895fc52", "detected_licenses": [ "Apache-2.0" ], "directory_id": "40f464e64333a63e833c246d39e1598e38592e99", "extension": "py"...
2.578125
stackv2
""" Validates generated prescriptions. Valiation errors are written to stdout. This duplicates functionality in the prescriptor validation script in the covid-xprize repo. It is copy-pasted here to avoid tangling dependencies, but this could be cleaned up in future. """ # Copyright 2021 (c) Cognizant Digital Busines...
233
37.46
123
20
2,030
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b3fd69c2291d09d0_422f1466", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 227 ]
[ null ]
[ 24 ]
[ 41 ]
2024-11-18T20:29:43.511741+00:00
1,619,014,410,000
6e09a2e6a8f150cf32097d170ff2713d76b4ccc8
3
{ "blob_id": "6e09a2e6a8f150cf32097d170ff2713d76b4ccc8", "branch_name": "refs/heads/master", "committer_date": 1619014410000, "content_id": "738393e69d35202f55c7d35c45c65dd2c1e64538", "detected_licenses": [ "MIT" ], "directory_id": "e808f9dc447114dc811b0ab6e7e5799715681a37", "extension": "py", "fi...
2.703125
stackv2
"""Server app execution.""" import os import random import requests from flask import Flask, render_template, abort, request from QuoteEngine import Ingestor from MemeEngine import MemeEngine app = Flask(__name__) meme = MemeEngine('./static') def setup(): """Load all resources.""" quote_files = ['./_data/...
72
24.46
61
13
446
python
[{"finding_id": "codeql_py/full-ssrf_41282a051a4339fc_b9a1c67a", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
1
true
[ "CWE-918" ]
[ "py/full-ssrf" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1)." ]
[ 61 ]
[ null ]
[ 20 ]
[ 62 ]
2024-11-18T20:51:45.062112+00:00
1,634,138,655,000
a4d7cfb9e2fc9629b1d4b8a3a484c6cf1542c8b9
3
{ "blob_id": "a4d7cfb9e2fc9629b1d4b8a3a484c6cf1542c8b9", "branch_name": "refs/heads/master", "committer_date": 1634138655000, "content_id": "a3d00182faa8099ee4029c9655646c128d16959a", "detected_licenses": [ "MIT" ], "directory_id": "e0ca2dcd3ab771c61ec2511d14a7f7e11af4f8b3", "extension": "py", "fi...
2.578125
stackv2
#!/usr/bin/python import glob import json import os from pathlib import Path from jinja2 import Environment, FileSystemLoader CWD = Path(os.path.dirname(__file__)) env = Environment(loader=FileSystemLoader(CWD / "files/templates")) tmp = env.get_template("README.jinja.md") langs = dict() for filename in glob.glob(...
24
25.25
67
15
160
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_c94766982ecfe0b1_f20ea0e1", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 12 ]
[ null ]
[ 7 ]
[ 68 ]
2024-11-18T19:07:10.504307+00:00
1,498,259,412,000
1a049e9696d0cbb5bf15165860ae62cfc7af7523
2
{ "blob_id": "1a049e9696d0cbb5bf15165860ae62cfc7af7523", "branch_name": "refs/heads/master", "committer_date": 1498259412000, "content_id": "adf860145e2c6d3b15a74410d1a585f129140f82", "detected_licenses": [ "Apache-2.0" ], "directory_id": "55060af49549a8f916d198437ff9bf44559c2e77", "extension": "py"...
2.375
stackv2
import os import nltk import csv import pickle import urllib2 import numpy as np import ka from multiprocessing import Process, Lock dirs = ["data/aclImdb/test/pos", "data/aclImdb/test/neg", "data/aclImdb/train/pos", "data/aclImdb/train/neg"] url = "http://ai.stanford.edu/~amaas/data/sentiment/aclImdb_v1.tar.gz" def...
174
31.54
115
20
1,418
python
[{"finding_id": "codeql_py/tarslip_2ba5f4af4fc3b714_28d86e9f", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 25 ]
[ null ]
[ 9 ]
[ 14 ]
2024-11-18T19:07:34.173537+00:00
1,595,929,662,000
99699fc360dc0f64b7e44e64d8b6104cc9ce98f7
2
{ "blob_id": "99699fc360dc0f64b7e44e64d8b6104cc9ce98f7", "branch_name": "refs/heads/master", "committer_date": 1595929662000, "content_id": "747bc83590562ef164052b7cc6487f39610a743b", "detected_licenses": [ "MIT" ], "directory_id": "6a36dbfce4e411261eb92efb70f29829e4562227", "extension": "py", "fi...
2.453125
stackv2
from grafana_backup.create_folder import main as create_folder from grafana_backup.create_datasource import main as create_datasource from grafana_backup.create_dashboard import main as create_dashboard from grafana_backup.create_alert_channel import main as create_alert_channel from glob import glob import tarfile, te...
43
41.81
95
19
370
python
[{"finding_id": "codeql_py/tarslip_0e303dbbc3354d70_d174b6eb", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 21 ]
[ null ]
[ 9 ]
[ 12 ]
2024-11-18T19:07:43.574119+00:00
1,573,968,116,000
a2e0047f31485b12a46032e71574dfb037ce207e
3
{ "blob_id": "a2e0047f31485b12a46032e71574dfb037ce207e", "branch_name": "refs/heads/master", "committer_date": 1573968116000, "content_id": "9cda63fa270006dbbba905a9e7ce592bce42de2c", "detected_licenses": [ "MIT" ], "directory_id": "0c7df95fcab916d93f5fb5d0b1bd13acb547963d", "extension": "py", "fi...
2.625
stackv2
#!/usr/bin/env python3 import requests import base64 import re from levels_credentials import credentials, folder level_url = credentials[9]["url"] level_username = credentials[9]["level"] level_password = credentials[9]["password"] next_level_url = credentials[10]["url"] next_level_username = credentials[10]["level...
34
30.47
93
11
266
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e6c7e5793c33d67c_af9c856c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 33 ]
[ null ]
[ 15 ]
[ 28 ]
2024-11-18T19:07:51.116152+00:00
1,676,981,946,000
9f56d7826dee98d3d447d130ea557a02ebcb49ca
3
{ "blob_id": "9f56d7826dee98d3d447d130ea557a02ebcb49ca", "branch_name": "refs/heads/master", "committer_date": 1676981946000, "content_id": "20b8b641b7223492f0fe66f4830f92380c29a11d", "detected_licenses": [ "MIT" ], "directory_id": "2b4741f8d0985d9cb6aa9110ad501879a9de0128", "extension": "py", "fi...
3.234375
stackv2
class ExtratorArgumentosUrl: def __init__(self, url): if self.url_eh_valida(url): self.url = url else: raise LookupError('Url inválida') @staticmethod def url_eh_valida(url): if url and url.startswith("https://bytebank.com"): return True e...
48
35.08
91
13
454
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_3b5cb62061e44b58_65595f55", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [https://bytebank.com](1) may be at an arbitrary positi...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [https://bytebank.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 10 ]
[ null ]
[ 20 ]
[ 58 ]
2024-11-18T19:07:57.841642+00:00
1,582,785,043,000
3efd99d1f25fa54015b16971c95cd6d910d9360c
2
{ "blob_id": "3efd99d1f25fa54015b16971c95cd6d910d9360c", "branch_name": "refs/heads/master", "committer_date": 1582785043000, "content_id": "9d3d8eeddf97fcdf1dcdd4dded61ae05f6160ce3", "detected_licenses": [ "Apache-2.0" ], "directory_id": "28a519d3ca21b91184e97d06a4a736d0079bb74f", "extension": "py"...
2.328125
stackv2
#!/usr/bin/env python from __future__ import print_function from future.standard_library import install_aliases install_aliases() import urllib3 from urllib.parse import urlparse, urlencode from urllib.request import urlopen, Request from urllib.error import HTTPError import base64 import json import os from textblob...
117
23.53
119
13
689
python
[{"finding_id": "codeql_py/reflective-xss_ecfd23c1a77eb8cb_72442e81", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 34 ]
[ null ]
[ 23 ]
[ 26 ]
2024-11-18T19:08:00.236584+00:00
1,393,340,126,000
ab07ae62ffddc1b029bb9d8dc00908892452f79a
3
{ "blob_id": "ab07ae62ffddc1b029bb9d8dc00908892452f79a", "branch_name": "refs/heads/master", "committer_date": 1393340126000, "content_id": "9dbad579268a6219da224b0af749c5180f6d8053", "detected_licenses": [ "MIT" ], "directory_id": "729958b2af793bffaec179cd40598990be491fea", "extension": "py", "fi...
2.59375
stackv2
import sys, os, tarfile from ftplib import FTP from src.utils import select_files, get_local_timestamp, get_remote_timestamp, \ update_progress, create_folder, is_compressed, is_tgz, is_gz, \ extract_gz, extract_tar from src.exceptions import ConnectionException, FtpPathExcep...
242
40.52
102
20
2,127
python
[{"finding_id": "codeql_py/tarslip_ce351e06bdfbd8c9_b358d99c", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
2
true
[ "CWE-022", "CWE-022" ]
[ "py/tarslip", "py/tarslip" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1).", "This file extraction depends on a [potentially untrusted source](1)." ]
[ 211, 213 ]
[ null, null ]
[ 41, 41 ]
[ 48, 48 ]
2024-11-18T19:18:30.279099+00:00
1,633,295,933,000
39cd6ed045da3dd968f736612f4e363b65f5a724
3
{ "blob_id": "39cd6ed045da3dd968f736612f4e363b65f5a724", "branch_name": "refs/heads/master", "committer_date": 1633295933000, "content_id": "e64ed1a624f104201aba3dc8c52002e9e518f2c1", "detected_licenses": [ "MIT" ], "directory_id": "0051a8ec096dc0eb7a1dbdea5583f3aec5d8c4b1", "extension": "py", "fi...
2.578125
stackv2
import os import threading import json import re from datetime import date from flask import Flask, request from itsdangerous import URLSafeSerializer, BadSignature from src import parsing from src.log import logging from src.persistence import Database from src.persistence import documents from src.mail import Recei...
422
38.41
120
24
3,614
python
[{"finding_id": "codeql_py/polynomial-redos_9338d1c93f115a54_b8fe8494", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with ma...
3
true
[ "CWE-1333", "CWE-079", "CWE-079" ]
[ "py/polynomial-redos", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with many repetitions of 'a'.\nThis [regular expression](3) that depends on a [user-provided value](2) may run slow on strings starting with 'a+caf_=' and with many repetitions of 'a+caf_='.", "Cross-site scripting vu...
[ 285, 152, 234 ]
[ null, null, null ]
[ 50, 16, 16 ]
[ 57, 36, 25 ]
2024-11-18T19:18:51.370450+00:00
1,513,635,274,000
48808bd0e5d5a5a7c9678571e79942eef53e6506
2
{ "blob_id": "48808bd0e5d5a5a7c9678571e79942eef53e6506", "branch_name": "refs/heads/master", "committer_date": 1513635274000, "content_id": "5c022ac871a8b9f8c9f966f7fa063fa918bff64e", "detected_licenses": [ "MIT" ], "directory_id": "6807c9041abff6f7f6f00b86db414b01290a24ed", "extension": "py", "fi...
2.40625
stackv2
from django.core.exceptions import ValidationError from django.core.validators import URLValidator from rest_framework import status from rest_framework.mixins import CreateModelMixin, RetrieveModelMixin, ListModelMixin, DestroyModelMixin from rest_framework.response import Response from rest_framework.viewsets import ...
72
32.26
110
16
469
python
[{"finding_id": "codeql_py/stack-trace-exposure_4bb2b41c3c1b21a4_808e3bd0", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 45 ]
[ null ]
[ 29 ]
[ 42 ]
2024-11-18T19:18:52.408421+00:00
1,299,808,539,000
b9d272797fab8e837cc3a247c7e87cbfc2b99c1e
3
{ "blob_id": "b9d272797fab8e837cc3a247c7e87cbfc2b99c1e", "branch_name": "refs/heads/master", "committer_date": 1299808539000, "content_id": "feab7128cc399f7d130037d192490dbb2c0afdbb", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "9b657cc5c3fcba61f8d58678e354484810571460", "extension": "p...
2.671875
stackv2
## \defgroup configyml # \ingroup madpack # routines to pull information out of the Config.yml, Version.yml, and # Install.yml files. import yaml import re import subprocess from itertools import chain ## # A Python exception class for our use class MadPackConfigError(Exception): def __init__(self, value): ...
189
30.55
119
17
1,486
python
[{"finding_id": "codeql_py/overly-large-range_dd2df2df4166738e_70943a0c", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\w in the same character class.", "remediation": "", "loc...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with \\w in the same character class." ]
[ 89 ]
[ null ]
[ 26 ]
[ 29 ]
2024-11-18T19:19:01.071256+00:00
1,548,784,812,000
75e225ecb064a28bf8fbd70efc28cfe0445585e6
2
{ "blob_id": "75e225ecb064a28bf8fbd70efc28cfe0445585e6", "branch_name": "refs/heads/master", "committer_date": 1548784812000, "content_id": "432b815fb08ae522597446bff78879070b265e8f", "detected_licenses": [ "MIT" ], "directory_id": "05846cd9dedf6f148a3b045e91f76cf9b1b9279c", "extension": "py", "fi...
2.453125
stackv2
# -*- coding: utf-8 -*- from __future__ import absolute_import, print_function import logging import threading import requests from . import wake_on_lan from .utils import LogIt, LogItWithReturn logger = logging.getLogger('samsungctl') class WebSocketBase(object): """Base class for TV's with websocket connectio...
91
24.68
72
18
499
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4de38c66bf18e1a2_612686b4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 26 ]
[ null ]
[ 19 ]
[ 31 ]
2024-11-18T19:29:43.237206+00:00
1,436,606,293,000
e1361c168709a01e72185ecfafb4338e86b551d0
3
{ "blob_id": "e1361c168709a01e72185ecfafb4338e86b551d0", "branch_name": "refs/heads/master", "committer_date": 1436606293000, "content_id": "5823725c1428f0b7da736fe533deb633ceb92ce0", "detected_licenses": [ "MIT" ], "directory_id": "c938df69057707856d5d50c992c7d93105398b45", "extension": "py", "fi...
2.5625
stackv2
"""A Team Cowboy API client.""" import hashlib import httplib import json import random import sys import time import urllib class TeamCowboyException(Exception): """A Team Cowboy error.""" pass class TeamCowboy(object): """A Team Cowboy API client.""" def __init__(self, public_key, private_key): """C...
193
26.33
79
17
1,271
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_7100df3c61c498b4_97e12676", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (SHA1) that is insecure.\...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (id)](1) is used in a hashing algorithm (SHA1) that is insecure.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 193 ]
[ null ]
[ 25 ]
[ 26 ]
2024-11-18T19:44:15.904974+00:00
1,614,594,387,000
84cc6dda26d5504fa79273828060ccbf624da16e
4
{ "blob_id": "84cc6dda26d5504fa79273828060ccbf624da16e", "branch_name": "refs/heads/main", "committer_date": 1614594387000, "content_id": "ea1d2086d4bd3ae505593962edbfcd807e0e798e", "detected_licenses": [ "MIT" ], "directory_id": "85e100c24a867cc29d30936bfa9bbc093c1d6def", "extension": "py", "file...
3.890625
stackv2
# -*- coding: utf-8 -*- ######################################################################## # # # # # # # MI...
49
32.57
114
14
348
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7689eb1262d61d75_2ed60ae3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 47 ]
[ null ]
[ 11 ]
[ 15 ]
2024-11-18T19:44:17.141515+00:00
1,692,475,624,000
e83d7523055bedae6db51e97c24bb42d20795d67
3
{ "blob_id": "e83d7523055bedae6db51e97c24bb42d20795d67", "branch_name": "refs/heads/master", "committer_date": 1692475624000, "content_id": "2d5b6fd706db65c96878727d4e33baa3702dafcf", "detected_licenses": [ "Apache-2.0" ], "directory_id": "baeebadd5786ee0e96626741da650d5c2e277b52", "extension": "py"...
2.53125
stackv2
#-*- coding:utf-8; mode:python; indent-tabs-mode: nil; c-basic-offset: 2; tab-width: 2 -*- import os, os.path as path, pkgutil, sys from bes.fs.file_path import file_path from bes.fs.file_util import file_util from bes.fs.temp_file import temp_file class package(object): 'Class to deal with python packages.' @cl...
59
37.88
112
18
573
python
[{"finding_id": "codeql_py/overly-permissive-file_05f45983edcea775_32e04e62", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable." ]
[ 20 ]
[ null ]
[ 7 ]
[ 31 ]
2024-11-18T19:44:27.489900+00:00
1,469,889,830,000
9747a2bd65c7e7baf0b6e92d84f4050711ec7938
3
{ "blob_id": "9747a2bd65c7e7baf0b6e92d84f4050711ec7938", "branch_name": "refs/heads/master", "committer_date": 1469889830000, "content_id": "dd47a3951a4e8c57921e15f1e7332f1f5be6b57a", "detected_licenses": [ "CC0-1.0" ], "directory_id": "596ad20cba78221817dbb29aecb88abf15145f54", "extension": "py", ...
2.953125
stackv2
#!/usr/bin/python from Crypto.Cipher import ARC4 from ctypes import * # shellcode to give /bin/sh using execve sys call shell_code = ("\x31\xc0\x50\x68\x2f\x2f\x73\x68\x68\x2f\x62\x69\x6e\x89\xe3\x50\x89\xe2\x53\x89\xe1\xb0\x0b\xcd\x80") #i want to display the encrypted and decrypted shellcode in hex format so crea...
41
26.54
117
10
348
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_c38f4a769a4d892b_05761db4", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The cryptographic algorithm ARC4](1) is broken or weak, and should not be used.", "...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[The cryptographic algorithm ARC4](1) is broken or weak, and should not be used.", "[The cryptographic algorithm ARC4](1) is broken or weak, and should not be used." ]
[ 25, 29 ]
[ null, null ]
[ 12, 18 ]
[ 33, 37 ]
2024-11-18T19:44:30.841358+00:00
1,693,345,400,000
3ed684a3ee0b400eea87f40a0062a160e4919380
3
{ "blob_id": "3ed684a3ee0b400eea87f40a0062a160e4919380", "branch_name": "refs/heads/master", "committer_date": 1693345400000, "content_id": "c60ecdc0079a53b1ffa27731b2600c1e14318fcb", "detected_licenses": [ "MIT" ], "directory_id": "8018cbc929b44be4a203dafa661a566151bb801d", "extension": "py", "fi...
2.625
stackv2
from flask import jsonify, session, request, make_response from flask_restful import Resource from api.db import db from api.models.post_tag import PostTag from api.resources.authentication import requires_auth class PostTagResource(Resource): def get(self, id): """ Returns a post tag by id. ...
116
24.34
79
18
614
python
[{"finding_id": "codeql_py/stack-trace-exposure_2f370d4ee45f0aa1_debee559", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 61, 96 ]
[ null, null ]
[ 63, 63 ]
[ 73, 73 ]
2024-11-18T19:44:34.012081+00:00
1,693,494,236,000
b58f9aa0c73b5b2e4fd3ab8549f2eb28ae7f34ae
2
{ "blob_id": "b58f9aa0c73b5b2e4fd3ab8549f2eb28ae7f34ae", "branch_name": "refs/heads/master", "committer_date": 1693494236000, "content_id": "f953f66b1095e2580db3b8971c0d872176608df5", "detected_licenses": [ "MIT" ], "directory_id": "96a34a048c783a75736bf0ec775df22142f9ee53", "extension": "py", "fi...
2.40625
stackv2
""" CRUD operations on a computation's tasks sub-resource A task is computation sub-resource that respresents a running computational service in the pipeline described above Therefore, - the task ID is the same as the associated node uuid """ import logging from typing import NamedTuple import networkx as nx from ...
181
32.73
115
14
1,370
python
[{"finding_id": "codeql_py/log-injection_d12ed8452714211e_4ea4ec54", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2)...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2).\nThis log entry depends on a [user-provided value](3).\nThis log entry depends on a [user-provided value](4).\nThis log entry depends on a [user-provided value](5)." ]
[ 95 ]
[ null ]
[ 13 ]
[ 51 ]
2024-11-18T19:44:43.131263+00:00
1,632,062,403,000
c7dc2a3d56bdb517df29d6d703a2d8437c80342a
2
{ "blob_id": "c7dc2a3d56bdb517df29d6d703a2d8437c80342a", "branch_name": "refs/heads/main", "committer_date": 1632062403000, "content_id": "9e27114d4f8f541ab26843d6bd1ba125bd6146c6", "detected_licenses": [ "Apache-2.0" ], "directory_id": "171ba57ceedafa08b83ffca1da0604ed7de64c95", "extension": "py", ...
2.375
stackv2
import logging from requests_oauthlib import OAuth1Session from secrets import key, secret _ACCESS_TOKEN_URL = "https://api.twitter.com/oauth/access_token" _BASE_AUTHORIZATION_URL = "https://api.twitter.com/oauth/authorize" _REQUEST_TOKEN_URL = "https://api.twitter.com/oauth/request_token" # TODO: caching # uses p...
88
32.42
97
11
613
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_22293e1543783566_a08d4b08", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 26, 57 ]
[ null, null ]
[ 41, 41 ]
[ 59, 59 ]
2024-11-18T19:57:59.691699+00:00
1,614,633,966,000
4a3184e6adec19a278a68b955bb91e8126abc8ad
2
{ "blob_id": "4a3184e6adec19a278a68b955bb91e8126abc8ad", "branch_name": "refs/heads/master", "committer_date": 1614634065000, "content_id": "844cbc22315c8a254c9b2890887933ed0d89dcb1", "detected_licenses": [ "MIT" ], "directory_id": "030c47770dfb0347e056084abae83a7b2ab3027a", "extension": "py", "fi...
2.484375
stackv2
#!/usr/bin/env python # pylint: disable=W0107 from __future__ import print_function import argparse import os import sys from .config import DEFAULT_PUBLIC_KEY, DEFAULT_PRIVATE_KEY, DEFAULT_VAULT_FILE from .identity import Identity from .vault import Vault try: import colorama colorama.init() OUTPUT_COL...
320
31.48
119
15
2,460
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_622a6d781d5f79ad_75721c26", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (secret)](...
[ 45, 50 ]
[ null, null ]
[ 11, 15 ]
[ 53, 66 ]
2024-11-18T20:10:08.913166+00:00
1,568,117,472,000
3541d61857a0613357ff3284d4fe5050b5ce3dcb
2
{ "blob_id": "3541d61857a0613357ff3284d4fe5050b5ce3dcb", "branch_name": "refs/heads/master", "committer_date": 1568117472000, "content_id": "55b53c44c3783e70390195fb3af8f6b461c7da93", "detected_licenses": [ "Apache-2.0" ], "directory_id": "823a1ed867a16056c7d2abb9abfb97082872d2af", "extension": "py"...
2.34375
stackv2
import yaml import os, sys, stat from flask import Flask, request, abort, jsonify import logging as log import requests import uuid DEF_HOST = '0.0.0.0' DEF_PORT = 6000 DEF_RESDIR = '/tmp/ga_results' DEF_ROUTEPATH = "/flowbster" DEF_LOGLEVEL = log.DEBUG DEF_LOGFORMAT = '%(asctime)s\t%(name)s\t%(levelname)s\t%(message)...
109
31.65
94
16
905
python
[{"finding_id": "codeql_py/unsafe-deserialization_9d94393464c0a563_1e5988c8", "tool_name": "codeql", "rule_id": "py/unsafe-deserialization", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Unsafe deserialization depends on a [user-provided value](1).", "remediation": "", "locatio...
16
true
[ "CWE-502", "CWE-918", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/unsafe-deserialization", "py/full-ssrf", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection...
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Unsafe deserialization depends on a [user-provided value](1).", "The full URL of this request depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path dep...
[ 88, 37, 18, 33, 40, 40, 54, 57, 62, 71, 50, 53, 55, 64, 68, 100 ]
[ null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null ]
[ 25, 13, 15, 44, 27, 46, 27, 34, 16, 23, 19, 19, 25, 19, 15, 18 ]
[ 30, 95, 16, 45, 31, 50, 59, 79, 49, 30, 87, 53, 78, 53, 33, 69 ]
2024-11-18T20:10:22.574494+00:00
1,499,847,736,000
e7906d22f8f17539afa55e27cffdb2a7cdb44a3a
3
{ "blob_id": "e7906d22f8f17539afa55e27cffdb2a7cdb44a3a", "branch_name": "refs/heads/master", "committer_date": 1499847736000, "content_id": "b9cfd7ea705a869e49c06c865543538e6abc5f91", "detected_licenses": [ "MIT" ], "directory_id": "e8ffe556e3d4115efce3bdeca8824865e278a0cb", "extension": "py", "fi...
3.390625
stackv2
# -*- coding: utf-8 -*- # Copyright (C) 2013-2016 Xue Can <xuecan@gmail.com> and contributors. # Licensed under the MIT license: http://opensource.org/licenses/mit-license """ 常用的加密和签名机制 ==================== 这个模块提供了一些函数,用于快速的实现 AES 和 Triple DES 加密解密的工作。 本模块依赖如下第三方库: * `pycrypto <https://pypi.python.org/pypi/pycrypt...
148
20.52
77
11
1,037
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_fca605a5e269097c_80eb4452", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The cryptographic algorithm DES3](1) is broken or weak, and should not be used.", "...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[The cryptographic algorithm DES3](1) is broken or weak, and should not be used.", "[The cryptographic algorithm DES3](1) is broken or weak, and should not be used." ]
[ 128, 146 ]
[ null, null ]
[ 12, 12 ]
[ 35, 35 ]
2024-11-18T20:10:27.026836+00:00
1,586,507,830,000
99aa06218f9ef6a7cf7bfdfe9bc0a006f1b452e0
4
{ "blob_id": "99aa06218f9ef6a7cf7bfdfe9bc0a006f1b452e0", "branch_name": "refs/heads/master", "committer_date": 1586507830000, "content_id": "c3149521e87cbc51165d5eb939b7e157c4126784", "detected_licenses": [ "MIT" ], "directory_id": "486fdef9a93782bf716e774181cc4a3b5289ef0f", "extension": "py", "fi...
3.890625
stackv2
# wczytanie napisow with open('../dane/slowa.txt') as f: data = [] for word in f.readlines(): data.append(word[:-1]) # jezeli odwrotnosc jest taka sama co slowo to jest to palindrom def ispali(word): return word[::-1] == word # zbior odwroconych slow passwords = [] # przejscie po slowach for wor...
53
27.87
85
16
495
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_83fb9d5cb961254a_38264a71", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text." ]
[ 53 ]
[ null ]
[ 7 ]
[ 13 ]
2024-11-18T20:10:33.095563+00:00
1,532,380,624,000
bc652a62005d2274ce58063d84b6e05859d26ff7
3
{ "blob_id": "bc652a62005d2274ce58063d84b6e05859d26ff7", "branch_name": "refs/heads/master", "committer_date": 1532380624000, "content_id": "9be6a4c17f22e0ff9499ebaa3f07c7b60a719804", "detected_licenses": [ "MIT" ], "directory_id": "662f90d9677d047039e856e99fffb58ebc7c22bf", "extension": "py", "fi...
3.421875
stackv2
import pandas as pd data = pd.read_csv('Salaries.csv') #average print(data['BasePay'].sum() / data['BasePay'].count()) #max print(data['OvertimePay'].max()) # What is the job title of JOSEPH DRISCOLL print(data[data['EmployeeName'] == 'JOSEPH DRISCOLL']['JobTitle']) #How much does JOSEPH DRISCOLL make (including b...
28
31.61
78
10
251
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_52e479db126209e4_7c349523", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 20, 24 ]
[ null, null ]
[ 7, 7 ]
[ 58, 58 ]
2024-11-18T20:23:20.086483+00:00
1,635,465,923,000
1f7016b8cb33babfc7499e70fbf09da6b7c84df4
2
{ "blob_id": "1f7016b8cb33babfc7499e70fbf09da6b7c84df4", "branch_name": "refs/heads/master", "committer_date": 1635465923000, "content_id": "5ca371356fc401c3cb406f824cdc5136c78574ba", "detected_licenses": [ "MIT" ], "directory_id": "e9ac16ebb3066366f530f384020398d648d7944e", "extension": "py", "fi...
2.421875
stackv2
import requests import json import pprint import csv cppm_base = "https://clearpasspm.jsd.ad:443/api" def gen_cp_token(): # GENERATE TOKEN authURL = cppm_base + "/oauth" clientID = "cppmAPI" clientSecret = "SECRET" user = "test" pwd = "test123" authBody = {"grant_type": "client_credentia...
58
28.64
83
10
436
python
[{"finding_id": "codeql_py/request-without-cert-validation_cc0f6b20ef48a798_fa7b12ac", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 22, 46 ]
[ null, null ]
[ 13, 18 ]
[ 64, 84 ]
2024-11-18T20:23:34.650231+00:00
1,476,290,575,000
467a5963daceda9a9c2af20df9d50ef3c4ecd2c2
3
{ "blob_id": "467a5963daceda9a9c2af20df9d50ef3c4ecd2c2", "branch_name": "refs/heads/master", "committer_date": 1476290575000, "content_id": "8d33e25d6ddcdf5a2c6167da771c3fdb14d5b6e7", "detected_licenses": [ "Apache-2.0" ], "directory_id": "c3003ae379df5313db699ec8fabf4ed80e9b1b53", "extension": "py"...
2.875
stackv2
# These are all the modules we'll be using later. Make sure you can import them # before proceeding further. from __future__ import print_function from __future__ import division import matplotlib.pyplot as plt import numpy as np import os import sys import tarfile from IPython.display import display, Image from scipy ...
324
35.85
113
18
2,875
python
[{"finding_id": "codeql_py/tarslip_f9cd128d78858362_ce976160", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 49 ]
[ null ]
[ 9 ]
[ 12 ]
2024-11-18T20:49:25.028525+00:00
1,664,667,919,000
c11a4bd9d7c5065c0aeff3fbe025581b49e21bed
3
{ "blob_id": "c11a4bd9d7c5065c0aeff3fbe025581b49e21bed", "branch_name": "refs/heads/master", "committer_date": 1664667919000, "content_id": "5a26cbdef16f716f0c34e939543e94923aea3600", "detected_licenses": [ "MIT" ], "directory_id": "da75565668cc3cc510651efe81545a89bee8ef6d", "extension": "py", "fi...
2.609375
stackv2
#!/usr/bin/env python3 import threading import pickle import copy import mpv import time from lxml.html import parse as parse_html from socket import gethostbyaddr from collections import namedtuple from urllib.request import urlopen from queue import Queue from flask import Flask from flask import request app = Flas...
295
24.81
162
17
1,767
python
[{"finding_id": "codeql_py/reflective-xss_ab190cf992e3297d_c6893032", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
6
true
[ "CWE-079", "CWE-079", "CWE-079", "CWE-079", "CWE-079", "CWE-918" ]
[ "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/reflective-xss", "py/partial-ssrf" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scri...
[ 145, 155, 229, 245, 275, 270 ]
[ null, null, null, null, null, null ]
[ 12, 12, 20, 20, 16, 28 ]
[ 32, 40, 60, 60, 52, 44 ]
2024-11-18T20:49:25.712859+00:00
1,612,287,479,000
6771cc5c8d7e2aae9f05470e84cf4f8fcaccecdc
3
{ "blob_id": "6771cc5c8d7e2aae9f05470e84cf4f8fcaccecdc", "branch_name": "refs/heads/main", "committer_date": 1612287479000, "content_id": "d53cfe68fca2ac8d2ef2f824c4170f7a44b1e5d9", "detected_licenses": [ "Unlicense" ], "directory_id": "50cd3cb3d3c2e52906e4b7f241f28befbcc7e8fa", "extension": "py", ...
2.5625
stackv2
import http.client import logging import os import queue as Queue import ssl import threading from http.server import BaseHTTPRequestHandler, HTTPServer from urllib.parse import parse_qs, urlparse def enable_requests_logging(): http.client.HTTPConnection.debuglevel = 4 logging.basicConfig() logging.getLo...
63
27.27
74
17
391
python
[{"finding_id": "codeql_py/insecure-default-protocol_59b7a0ea89edc0f9_ec3784f2", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in...
1
true
[ "CWE-327" ]
[ "py/insecure-default-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used." ]
[ 46 ]
[ 48 ]
[ 27 ]
[ 14 ]
2024-11-18T20:49:26.338186+00:00
1,401,118,997,000
44a05f7de36d07aaee72646beea678a44e6031d8
3
{ "blob_id": "44a05f7de36d07aaee72646beea678a44e6031d8", "branch_name": "refs/heads/master", "committer_date": 1401118997000, "content_id": "011df79536239701bff67fa6fcc5e1d5906f2d8c", "detected_licenses": [ "MIT" ], "directory_id": "7280ffcb9d50c81fd5001821eb16d59116107260", "extension": "py", "fi...
3.078125
stackv2
#!/usr/bin/env python # PassPack "export to CSV" default format: # Name,User ID,Password,Link,Tags,Notes,Email import sys import csv from datetime import datetime as dt _VERSION = 1.0 _BANNER = "KeePassPack %s" % _VERSION _USAGE = """Converts PassPack CSV output to KeePassX XML. Usage: ./keepasspack.py <csv input ...
185
24.05
81
13
1,182
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_62e0913ddb2b2685_c316b9a4", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 178 ]
[ null ]
[ 23 ]
[ 33 ]
2024-11-18T20:49:27.254598+00:00
1,574,864,655,000
8806863e695e46884c22415ca30c5241eb1cb576
2
{ "blob_id": "8806863e695e46884c22415ca30c5241eb1cb576", "branch_name": "refs/heads/master", "committer_date": 1574864655000, "content_id": "755c17022cae2644db80651ee44ca6da2433aee6", "detected_licenses": [ "MIT" ], "directory_id": "becc8deb99231e3296235a2c9366513ec3985cda", "extension": "py", "fi...
2.46875
stackv2
from flask import Flask, request, send_file, Response, render_template from pathlib import Path from scripts.detect_encoding import detect_encoding from scripts.converter import convert_encoding, get_available_formats import subprocess root_path = Path.cwd() # cwd is for current working directory # All paths in this p...
35
33.83
92
16
264
python
[{"finding_id": "codeql_py/path-injection_22fc56f31dde0f39_eaea4171", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 32 ]
[ null ]
[ 22 ]
[ 38 ]
2024-11-18T20:49:33.903105+00:00
1,602,916,951,000
ed92d8851ccca7fc7f8d8bdc0d58ddb992ffda9b
2
{ "blob_id": "ed92d8851ccca7fc7f8d8bdc0d58ddb992ffda9b", "branch_name": "refs/heads/master", "committer_date": 1602916951000, "content_id": "568e1d1033f48b6fffaa5a952aed6dfc878fdb41", "detected_licenses": [ "Apache-2.0" ], "directory_id": "61a174d1461ecd630747fc9e8af4ce0056199448", "extension": "py"...
2.4375
stackv2
from pathlib import Path from os import path import jinja2, tempfile, subprocess, shutil from lect.util import get_node_info latex_env = jinja2.Environment( loader = jinja2.PackageLoader(__name__, 'templates-latex'), autoescape = False, trim_blocks = True, lstrip_blocks = True, variable_start_strin...
59
29.49
142
15
425
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_761de625629bd46b_5db35b8a", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 6 ]
[ 15 ]
[ 13 ]
[ 28 ]
2024-11-18T20:49:57.324433+00:00
1,579,429,376,000
fa6418d61872c15d8a9a4c12b14a235d16cf81a2
2
{ "blob_id": "fa6418d61872c15d8a9a4c12b14a235d16cf81a2", "branch_name": "refs/heads/master", "committer_date": 1579429376000, "content_id": "b9e2d62b1917ced5048f47d1c6de0ed05d41629d", "detected_licenses": [ "Apache-2.0" ], "directory_id": "d59e763a8f916f8d3f7830aea0659940b9d6b210", "extension": "py"...
2.421875
stackv2
#!/usr/bin/python import sys import multiprocessing import BaseHTTPServer import logging import sqlite3 import os import codecs from message import HttpMsg from config import WS_SERVER, PATHS logger = logging.getLogger(__name__) class HttpHandler(BaseHTTPServer.BaseHTTPRequestHandler): configRoot = '../http' ...
110
33.23
117
19
855
python
[{"finding_id": "codeql_py/path-injection_5e5a160fdb72ea1e_262c9692", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
2
true
[ "CWE-022", "CWE-117" ]
[ "py/path-injection", "py/log-injection" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 35, 27 ]
[ null, null ]
[ 18, 22 ]
[ 52, 51 ]
2024-11-18T20:50:46.153573+00:00
1,588,583,919,000
fde02d3b0d81acc040993a2c0be3e0ae21270264
3
{ "blob_id": "fde02d3b0d81acc040993a2c0be3e0ae21270264", "branch_name": "refs/heads/master", "committer_date": 1588583919000, "content_id": "b1cd6668ea61d487138b7da793821df1e3374264", "detected_licenses": [ "MIT" ], "directory_id": "ea8c8ec8cc61d88870331a8a8f28d7953b1e759b", "extension": "py", "fi...
2.921875
stackv2
#!/usr/bin/env python3 """ Module Docstring """ __author__ = "John Porter" __version__ = "0.1.3" __license__ = "MIT License" # MIT License # # Copyright (c) 2019 John Porter # # Permission is hereby granted, free of charge, to any person obtaining a copy # of this software and associated documentation files (the "Softw...
199
43.2
118
19
1,800
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_c07f2274e9562e47_753213f7", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 131, 194 ]
[ null, null ]
[ 23, 23 ]
[ 36, 24 ]
2024-11-18T20:51:05.728785+00:00
1,607,225,310,000
4cede43340df41493491f0fd4654b71f199fc66f
3
{ "blob_id": "4cede43340df41493491f0fd4654b71f199fc66f", "branch_name": "refs/heads/main", "committer_date": 1607225310000, "content_id": "2876f7f84128f96ae8e3c3f309097719663e4852", "detected_licenses": [ "Apache-2.0", "Python-2.0" ], "directory_id": "ac576e82308a4bdad3138cbea3d5713a7a6f9b55", "...
2.859375
stackv2
""" The vra.py module contains properly-formatted API calls for VRA related tasks. The tasks can include installing a vra, uninstalling a vra, editing a VRA, or upgrading a vra """ import json import requests #from zerto_auth import testUrl, testHeaders class vra(): """ The VRA class houses VRA specific metho...
194
29.38
127
14
1,199
python
[{"finding_id": "codeql_py/request-without-cert-validation_00361294da3830fe_2274d582", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
6
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 76, 100, 115, 147, 176, 191 ]
[ null, null, null, null, null, null ]
[ 16, 16, 16, 16, 16, 16 ]
[ 99, 126, 127, 115, 128, 116 ]
2024-11-18T20:51:09.099659+00:00
1,534,572,393,000
e88f8371c878e2f47393044044be7b9f417c0b2d
3
{ "blob_id": "e88f8371c878e2f47393044044be7b9f417c0b2d", "branch_name": "refs/heads/master", "committer_date": 1534572393000, "content_id": "94e30441f9c00fcc6c84ccb6ec1814ce65745564", "detected_licenses": [ "MIT" ], "directory_id": "270262c3bae7a1c2ec4b5f36eb79e7b7d0a9e06a", "extension": "py", "fi...
2.578125
stackv2
from jinja2 import Environment, FileSystemLoader, TemplateNotFound import traceback, os class ErrorRenderer(): def __init__(self): self.template_path = os.path.join(os.path.dirname(os.path.realpath(__file__)), 'html') template_loader = FileSystemLoader(searchpath=self.template_path) self.j...
33
34.85
94
16
249
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_66dc8b5b81db337c_4749118e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 9 ]
[ 11 ]
[ 34 ]
[ 10 ]
2024-11-18T20:51:13.848966+00:00
1,599,654,230,000
d7d342af16fb4edb2231880f21a0e010129e5e54
3
{ "blob_id": "d7d342af16fb4edb2231880f21a0e010129e5e54", "branch_name": "refs/heads/master", "committer_date": 1599654230000, "content_id": "1c40a23989ae80e4473f4505e19980540d22119f", "detected_licenses": [ "Apache-2.0" ], "directory_id": "fffc68d1118ae290556b9d52a3fc6bf74c1e1cfd", "extension": "py"...
2.53125
stackv2
import os.path import logging from flask import request def root_dir(): # pragma: no cover return os.path.abspath(os.path.dirname(__file__)) def get_file(filename): # pragma: no cover try: src = os.path.join(root_dir(), filename) # Figure out how flask returns static files # Tried: ...
23
26
61
12
145
python
[{"finding_id": "codeql_py/path-injection_4011c6490a4c30d6_f0af5856", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 16 ]
[ null ]
[ 21 ]
[ 24 ]
2024-11-18T20:51:17.543530+00:00
1,387,969,418,000
6b7ea47bf06016e29ac695130fda81daf5e42aa2
2
{ "blob_id": "6b7ea47bf06016e29ac695130fda81daf5e42aa2", "branch_name": "refs/heads/master", "committer_date": 1387969418000, "content_id": "35f14c90f2a8600a0fca69d07701f3ee421e9654", "detected_licenses": [ "MIT" ], "directory_id": "aed5f7a8a7e8e368b9a4c78c95b742e96cf19d92", "extension": "py", "fi...
2.5
stackv2
#!/usr/bin/env python #coding: utf-8 """ python webim client Overview ======== See U{the WebIM homepage<http://www.github.com/webim>} for more about webim. Usage summary ============= This should give you a feel for how this module operates:: import webim c = webim.Client('domain', 'apikey', host='127.0....
285
28.08
110
19
1,912
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_19c87363087837d0_16cf288a", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (SHA1) that is insecure."...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (id)](1) is used in a hashing algorithm (SHA1) that is insecure." ]
[ 60 ]
[ null ]
[ 48 ]
[ 56 ]
2024-11-18T21:13:46.537300+00:00
1,591,104,418,000
08d922ad31007dc39c67c710a425627fb153110a
3
{ "blob_id": "08d922ad31007dc39c67c710a425627fb153110a", "branch_name": "refs/heads/master", "committer_date": 1591104418000, "content_id": "0a15447021f94725d9af068ce6651449a8ee8d4d", "detected_licenses": [ "MIT" ], "directory_id": "ebdc78ad69511f9c5eeb34334b0de012e5aebfdb", "extension": "py", "fi...
2.78125
stackv2
import re import string import numpy as np import pandas as pd from nltk.tokenize import word_tokenize from sklearn.model_selection import train_test_split from tensorflow.keras.initializers import Constant from tensorflow.keras.layers import Embedding, LSTM, Dense, SpatialDropout1D from tensorflow.keras.models import...
167
32.18
121
15
1,480
python
[{"finding_id": "codeql_py/overly-large-range_f6664b58f4a6ead0_853081f0", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "remediatio...
4
true
[ "CWE-020", "CWE-020", "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range", "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range ...
[ 40, 40, 40, 40 ]
[ null, null, null, null ]
[ 34, 37, 40, 49 ]
[ 38, 41, 44, 53 ]
2024-11-18T21:14:06.280187+00:00
1,692,107,468,000
10aedad6f0a7132750b44a1295de477b83fc732c
2
{ "blob_id": "10aedad6f0a7132750b44a1295de477b83fc732c", "branch_name": "refs/heads/master", "committer_date": 1692107468000, "content_id": "6c2aec8567ebb11a32a6a7332517ac6d29bccc00", "detected_licenses": [ "MIT" ], "directory_id": "8454441f899c3beb9fcea26cffc2f4c3cf75ff6a", "extension": "py", "fi...
2.4375
stackv2
#!/usr/bin/env python3 from flask import Flask, jsonify, send_from_directory try: from flask.ext.cors import CORS except: from flask_cors import CORS import json import sys application = Flask(__name__) # Utilize CORS to allow cross-origin API requests cors = CORS(application) @application.route("/<path:f...
42
23.52
79
13
228
python
[{"finding_id": "codeql_py/flask-debug_9c31753f30b918fc_b0557d39", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-022" ]
[ "py/flask-debug", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1)." ]
[ 42, 31 ]
[ null, null ]
[ 5, 15 ]
[ 32, 32 ]
2024-11-18T21:14:23.481711+00:00
1,569,266,462,000
814fa469f522edf86614f961392377004601cc64
4
{ "blob_id": "814fa469f522edf86614f961392377004601cc64", "branch_name": "refs/heads/master", "committer_date": 1569266462000, "content_id": "7b0fa2ec42ac67f503fa908317850fc43e148638", "detected_licenses": [ "MIT" ], "directory_id": "cf1ed3fe46a3418cc7f88ad5ccdbfc3475108a1a", "extension": "py", "fi...
3.5
stackv2
import random import sys #Password set options p_Upper = 'ABCDEFGHIJKLMNOPQRSTUVWXYZ' p_Lower = 'abcdefghijklmnopqrstuvwxyz' p_Digit = '0123456789' p_Sysbol = "!\"#$%&'()*+,-./:;<=>?@[]^_{|}~" p_set = '' x = 0 #Check argv count if len(sys.argv) < 3: print("Error in command line") exit(0) #Get password leng...
55
18.56
44
10
331
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_941146bb931638f7_e7a8cc3d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 55 ]
[ null ]
[ 11 ]
[ 24 ]
2024-11-18T21:14:24.351652+00:00
1,594,279,223,000
907f1ec4059bce54f0e2a7dc8229f1f7fc7eca90
3
{ "blob_id": "907f1ec4059bce54f0e2a7dc8229f1f7fc7eca90", "branch_name": "refs/heads/master", "committer_date": 1594279223000, "content_id": "a0dacf57b1295eb445b264d11829a17dd788d35b", "detected_licenses": [ "Apache-2.0" ], "directory_id": "ce005d2e7c72cf74491e099c047873bf56c2f0cd", "extension": "py"...
2.53125
stackv2
# Copyright (C) 2018 Cancer Care Associates # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to ...
185
28.68
88
16
1,189
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0df80cd1e1e20e33_effc57a0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 108, 116 ]
[ 110, 118 ]
[ 17, 13 ]
[ 18, 14 ]
2024-11-18T21:14:43.157234+00:00
1,551,958,787,000
5a43f2f5c41e0ad83ef3b04719ca0ee3c5b00d6a
2
{ "blob_id": "5a43f2f5c41e0ad83ef3b04719ca0ee3c5b00d6a", "branch_name": "refs/heads/master", "committer_date": 1551958787000, "content_id": "28e6a2f635226320303edd9287b2263622263aae", "detected_licenses": [ "Apache-2.0" ], "directory_id": "de2c992d8bf28c01ae151c8ed38a14c8b62b68c0", "extension": "py"...
2.4375
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- # import Flask ''' Created on Nov 15, 2016 @author: jmartan ''' from flask import Flask, request import uni_func import fill_set_widget from lxml import etree # Create an instance of Flask app = Flask(__name__, static_url_path='/static') app.config['DEBUG'] = True # c...
156
31.35
152
18
1,318
python
[{"finding_id": "codeql_py/xxe_72d0fd558c712fea_9c65dcd1", "tool_name": "codeql", "rule_id": "py/xxe", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "XML parsing depends on a [user-provided value](1) without guarding against external entity expansion.", "remediation": "", "locat...
3
true
[ "CWE-611", "CWE-117", "CWE-117" ]
[ "py/xxe", "py/log-injection", "py/log-injection" ]
[ "HIGH", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "XML parsing depends on a [user-provided value](1) without guarding against external entity expansion.", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 44, 41, 42 ]
[ null, null, null ]
[ 33, 21, 21 ]
[ 41, 58, 50 ]
2024-11-18T20:10:31.433297+00:00
1,583,978,741,000
7373ff5a3016cba6e91df11b339439ae50d5bb93
3
{ "blob_id": "7373ff5a3016cba6e91df11b339439ae50d5bb93", "branch_name": "refs/heads/master", "committer_date": 1583978741000, "content_id": "5343c10e4b9cc36d91875685ff3b9fc5f8f88d63", "detected_licenses": [ "MIT" ], "directory_id": "750065657aeb6d4d1f6a2445a5fe460e1769edcb", "extension": "py", "fi...
2.65625
stackv2
import select import paramiko class Ssh: def __init__(self, host): self.client = paramiko.SSHClient() self.client.set_missing_host_key_policy(paramiko.AutoAddPolicy()) self.hostname = host.get_real_hostname() self.username = host.username self.password = host.password ...
40
32.58
120
17
314
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_ee29d2cd8e4a75a6_86953168", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 8 ]
[ null ]
[ 9 ]
[ 74 ]
2024-11-18T20:10:32.714454+00:00
1,608,119,540,000
79c2100325ef5029bd74325f15ce12cc718e2957
4
{ "blob_id": "79c2100325ef5029bd74325f15ce12cc718e2957", "branch_name": "refs/heads/main", "committer_date": 1608119540000, "content_id": "a16f53d694948a9d7c01fd202156d8f2c110869c", "detected_licenses": [ "MIT" ], "directory_id": "e004ff5468a8dc1239f4b6d7067f97d07b4cf51a", "extension": "py", "file...
4
stackv2
# dictionnary, store info customers = { "name": "John Smith", "age": 30, "is_verified": True } # {} c an define dictionary, each key should be unique print(customers["name"]) print(customers.get("birthday")) # for info that is not in the dictionary # we can supple the value for "birthday" too print(custom...
29
29.21
178
10
255
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2495e51001148ae0_12af1874", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 8, 10, 15 ]
[ null, null, null ]
[ 7, 7, 7 ]
[ 32, 46, 28 ]
2024-11-18T20:10:34.365081+00:00
1,483,106,754,000
e2b15f03c7e2d0af73c15532fe416397357eadbe
3
{ "blob_id": "e2b15f03c7e2d0af73c15532fe416397357eadbe", "branch_name": "refs/heads/master", "committer_date": 1483106754000, "content_id": "e6b5cca840d75bd158f893596a1bc67f2b243187", "detected_licenses": [ "MIT" ], "directory_id": "6f5d6b02b0bfc1f8252f59ba1f91ed2954cd5142", "extension": "py", "fi...
2.609375
stackv2
# -*- coding: utf-8 -*- """ flask.ext.riaksessions ---------------------- This module provides a Riak-backed session store for Flask sessions. :copyright: (c) 2013 Tim Gross :license: MIT """ __version_info__ = ('0', '1', '0') __version__ = '.'.join(__version_info__) __author__ = 'Tim Gross' __l...
245
31.48
85
20
1,648
python
[{"finding_id": "codeql_py/log-injection_61386927c3cfc18e_26ecdd49", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 180 ]
[ null ]
[ 27 ]
[ 79 ]
2024-11-18T20:10:48.383400+00:00
1,632,970,061,000
cf67ac4e99979c7d8366f6fd13501d7ae9aaac57
2
{ "blob_id": "cf67ac4e99979c7d8366f6fd13501d7ae9aaac57", "branch_name": "refs/heads/main", "committer_date": 1632970061000, "content_id": "4ac53420d3873056c31a206d1118c93c1a3b93a0", "detected_licenses": [ "MIT" ], "directory_id": "4a7f30b815c36618640e3f4c225cff0b9db1c37d", "extension": "py", "file...
2.328125
stackv2
# -*- coding: utf-8 -*- # @Time : 2021/6/27 21:54 # @Author : zp # @Python3.7 import shutil import requests import time import re import os import urllib3 from urllib.parse import urljoin from loguru import logger from Crypto.Cipher import AES urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning) clas...
198
35.45
135
18
2,042
python
[{"finding_id": "codeql_py/request-without-cert-validation_33cf742dad97eb2f_6cb60cfd", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 58 ]
[ null ]
[ 24 ]
[ 89 ]
2024-11-18T20:10:51.665053+00:00
1,563,836,719,000
302312bec2ba65f4611f4e85d7eb2af4afde234c
4
{ "blob_id": "302312bec2ba65f4611f4e85d7eb2af4afde234c", "branch_name": "refs/heads/master", "committer_date": 1563836719000, "content_id": "23f231de8ec26f71a7d392e2da0bdafcd39479e1", "detected_licenses": [ "MIT" ], "directory_id": "2f74c4d2e5c6dd51eb3eaf0ee4b97122b26e7066", "extension": "py", "fi...
4.15625
stackv2
# # Functional Python: Map & Filter # Python Techdegree # # Created by Dulio Denis on 3/21/19. # Copyright (c) 2019 ddApps. All rights reserved. # ------------------------------------------------ # Map & Filter Challenge # ------------------------------------------------ # Challenge Task 1 of 3 # Create a functi...
59
34.22
83
11
554
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8950c9011baa8711_8af0a706", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 50 ]
[ null ]
[ 7 ]
[ 18 ]
2024-11-18T20:48:06.495961+00:00
1,518,147,594,000
aa7accfb6f41fd98e78cdf7b983e234bccf9aee3
2
{ "blob_id": "aa7accfb6f41fd98e78cdf7b983e234bccf9aee3", "branch_name": "refs/heads/master", "committer_date": 1518147594000, "content_id": "2fc211091bda9bcde9cfe445ff6c159579672737", "detected_licenses": [ "MIT" ], "directory_id": "11df3ea05fcae0ec53dc398f56d3f27532f48b71", "extension": "py", "fi...
2.421875
stackv2
import tornado.ioloop import tornado.web import tornado.websocket import tornado.httpserver import tornado.process import tornado.template import video import gen import os import sys cam = None html_page_path = dir_path = os.path.dirname(os.path.realpath(__file__)) + '/www/' class HtmlPageHandler(tornado.web.Reque...
117
30.82
101
16
867
python
[{"finding_id": "codeql_py/path-injection_c7b2a589175496cf_96916ca1", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 22 ]
[ null ]
[ 27 ]
[ 37 ]