added
stringlengths
32
32
created
int64
1,236B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.03
source
stringclasses
1 value
text
stringlengths
330
19.3k
num_lines
int64
16
648
avg_line_length
float64
15.5
59.3
max_line_length
int64
37
179
ast_depth
int64
8
38
length
int64
102
3.79k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.11k
276k
sast_codeql_findings_count
int64
1
33
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
33
rule_ids
listlengths
1
33
confidences
listlengths
1
33
severities
listlengths
1
33
messages
listlengths
1
33
line_starts
listlengths
1
33
line_ends
listlengths
1
33
column_starts
listlengths
1
33
column_ends
listlengths
1
33
2024-11-18T20:48:17.143832+00:00
1,468,854,561,000
b16bf39a7028484823b3f65f8acb3e1d57f8aeac
3
{ "blob_id": "b16bf39a7028484823b3f65f8acb3e1d57f8aeac", "branch_name": "refs/heads/master", "committer_date": 1468854561000, "content_id": "93a6661d1755cc8a481ec3d10f3e0b838c563ffb", "detected_licenses": [ "MIT" ], "directory_id": "ae0fd767a88e2a42a0166bdfac1a6d2142beb9a8", "extension": "py", "fi...
2.9375
stackv2
"""Extract translation tuples from Wiktionary pages.""" import json import logging import re from lxml import etree, html from ..html import classes, textify, heading_level, mw_headline from ..zim import ZimFile def parse_translation_table(table): """Extract translation tuples from *table*, which is an lxml ...
188
37.69
79
19
1,440
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9ff3afd231f3a345_819e50e0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 50, 54 ]
[ null, null ]
[ 25, 21 ]
[ 47, 43 ]
2024-11-18T20:48:18.247747+00:00
1,670,100,167,000
41a5b129f64962b853c5d9c66a7e42c58a2df487
4
{ "blob_id": "41a5b129f64962b853c5d9c66a7e42c58a2df487", "branch_name": "refs/heads/master", "committer_date": 1670100167000, "content_id": "0d20d3db4c13c5a3c76dfaf57d2193157b36318b", "detected_licenses": [ "MIT" ], "directory_id": "9ab07a79bb97e4f2c24b31b716d14acbfb3249e2", "extension": "py", "fi...
4.46875
stackv2
# Represents any school member. class SchoolMember: def __init__(self, name, age): self.name = name self.age = age print(f"Initialized SchoolMember for: {self.name}") # Tell my details. def tell(self): print(f"Name: {self.name} Age: {self.age}") # Represents a teacher. cla...
76
25.22
68
12
528
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bf3ded30f6de49b0_e0b8a05d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 22 ]
[ null ]
[ 15 ]
[ 39 ]
2024-11-18T21:11:30.010986+00:00
1,626,687,855,000
34a7d5b115e31b91c1a6ae0524b816957f5b74af
3
{ "blob_id": "34a7d5b115e31b91c1a6ae0524b816957f5b74af", "branch_name": "refs/heads/main", "committer_date": 1626687855000, "content_id": "f696e0c9b8c04296aaf1fd8cf225e4da3c7a86c8", "detected_licenses": [ "MIT" ], "directory_id": "b76bcbc6becc55cf2ccc8e09e1d9c126638f82a0", "extension": "py", "file...
2.609375
stackv2
from boruta import BorutaPy import matplotlib.pyplot as plt import matplotlib.patches as mpatches from sklearn.naive_bayes import BernoulliNB, MultinomialNB from sklearn.preprocessing import FunctionTransformer from sklearn.ensemble import RandomForestClassifier from sklearn.feature_extraction.text import CountVectoriz...
199
31.03
96
14
1,695
python
[{"finding_id": "codeql_py/overly-large-range_4506263c71c874ea_4d5a7761", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
2
true
[ "CWE-020", "CWE-918" ]
[ "py/overly-large-range", "py/full-ssrf" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "The full URL of this request depends on a [user-provided value](1)." ]
[ 64, 91 ]
[ null, null ]
[ 33, 16 ]
[ 36, 46 ]
2024-11-18T21:11:45.279599+00:00
1,625,481,376,000
717e6caf171338273f66e19521e52a961bbc7301
3
{ "blob_id": "717e6caf171338273f66e19521e52a961bbc7301", "branch_name": "refs/heads/main", "committer_date": 1625481376000, "content_id": "bbf9c7912da5fa5944854cd7b62e315e3bfeb3ad", "detected_licenses": [ "MIT" ], "directory_id": "1bd71f01234fdc91e95a9c07a02de6344ced9452", "extension": "py", "file...
2.578125
stackv2
# coding:utf-8 """ input file :host.txt output file :result.txt result is a list like : ["www.baidu.com","14.215.177.38","http://www.baidu.com","title_baidu","200","OK","Tengine"] run the main.py script then you can run result.deal.py to get clear reperot view or you can run reportGeneral.py to get a screen and html ...
143
26.31
140
17
1,014
python
[{"finding_id": "codeql_py/request-without-cert-validation_9129cfd1af719533_4ee3aea3", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 54 ]
[ null ]
[ 19 ]
[ 78 ]
2024-11-18T21:25:46.144715+00:00
1,519,756,064,000
91e3e8fe6f738b680e3dc44801b8417c25f59191
3
{ "blob_id": "91e3e8fe6f738b680e3dc44801b8417c25f59191", "branch_name": "refs/heads/master", "committer_date": 1519756065000, "content_id": "3d194aa06bcd0b5d1012e82017c3d1863b7335ff", "detected_licenses": [ "MIT" ], "directory_id": "8ca3c3aa8f63633d70d166ef2d08968f522d2f0e", "extension": "py", "fi...
2.921875
stackv2
""" This is the script that launches Flask app. @author: Nikolay Lysenko """ import os import sqlite3 from functools import reduce from typing import Tuple from flask import Flask, render_template, url_for from flask_misaka import Misaka, markdown from markupsafe import Markup from db_control import create_or_refr...
114
31.83
79
16
900
python
[{"finding_id": "codeql_py/flask-debug_926902a0e06df97a_91522e43", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
4
true
[ "CWE-215", "CWE-022", "CWE-022", "CWE-089" ]
[ "py/flask-debug", "py/path-injection", "py/path-injection", "py/sql-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This SQL query depends on a [user-provided value](1)." ]
[ 114, 59, 61, 92 ]
[ null, null, null, null ]
[ null, 27, 15, 21 ]
[ 20, 45, 33, 52 ]
2024-11-18T21:26:02.775939+00:00
1,505,238,361,000
54169eb05c51945a255db158ddaa50be09f0ac97
3
{ "blob_id": "54169eb05c51945a255db158ddaa50be09f0ac97", "branch_name": "refs/heads/master", "committer_date": 1505238361000, "content_id": "2ed60c5328321dfb731638ff44d57614244be553", "detected_licenses": [ "MIT" ], "directory_id": "b983b298fd8a1b5c283327b189493e7cadd4bf12", "extension": "py", "fi...
2.953125
stackv2
# Imports import requests from BeautifulSoup import BeautifulStoneSoup import config # Class: CUIC class CUIC: # Data def data(self): # Parse XML data as JSON data = { 'queue': [], 'success': False, 'message': '' } # Get data try: if not config.DEBUG: xml = requests.get(config.DATA_URL, ...
60
19.05
96
23
352
python
[{"finding_id": "codeql_py/request-without-cert-validation_daeff2bbe94ac234_d415f7ea", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 22 ]
[ null ]
[ 11 ]
[ 78 ]
2024-11-18T21:26:04.303043+00:00
1,594,146,242,000
23712c5a38196ca6ee74dfcd9090b4936483dfce
3
{ "blob_id": "23712c5a38196ca6ee74dfcd9090b4936483dfce", "branch_name": "refs/heads/master", "committer_date": 1594146242000, "content_id": "28dfac408644a7117601a11175d04bd5323a074b", "detected_licenses": [ "MIT" ], "directory_id": "8529dbab5cdee1d73fdea7dcaf44483410a81a9c", "extension": "py", "fi...
2.78125
stackv2
import sqlite3 import hashlib DB_NAME = 'database.sqlite3' conn = sqlite3.connect(DB_NAME) conn.cursor().execute(''' CREATE TABLE IF NOT EXISTS `users` ( `uid` INTEGER PRIMARY KEY AUTOINCREMENT, `email` TEXT NOT NULL UNIQUE, `username` TEXT NOT NULL UNIQUE, `password` TEXT NOT NULL )''') conn.cursor(...
85
28.41
78
12
586
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_717c7b9be0d40479_7b0932b1", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e...
[ 59 ]
[ null ]
[ 27 ]
[ 51 ]
2024-11-18T21:26:06.805557+00:00
1,543,539,335,000
b08242c8fecf29a91e66acf0b03200699f00ba37
2
{ "blob_id": "b08242c8fecf29a91e66acf0b03200699f00ba37", "branch_name": "refs/heads/master", "committer_date": 1543539335000, "content_id": "4218939fc5a5f1f6886081ba02f0da0f913d92cd", "detected_licenses": [ "MIT" ], "directory_id": "e417a5cf8974438f0e45d3abde5cffd49c70032e", "extension": "py", "fi...
2.5
stackv2
# coding: utf-8 import flask import hashlib import sqlite3 import Configure import Database def CheckLogin(): """ ログイン済みかを確認する """ if 'login' in flask.session and flask.session['login'] == True: return True return False def TryRegisterTeam(teamname, teamcode): """ チーム登録を試行する """ if not 4 ...
80
30.02
100
17
627
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_461ffdbe533f9470_523ff17b", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.", "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computational...
[ 32, 70 ]
[ null, null ]
[ 19, 19 ]
[ 27, 27 ]
2024-11-18T21:52:05.406446+00:00
1,568,583,233,000
866c81a1669d7a565fecc890261047960f0fcaf6
4
{ "blob_id": "866c81a1669d7a565fecc890261047960f0fcaf6", "branch_name": "refs/heads/master", "committer_date": 1568583233000, "content_id": "b062c311b604aca9df9a8b600548da6641beded6", "detected_licenses": [ "MIT" ], "directory_id": "7c4deebe6840df119a57973250267c30de90a0e6", "extension": "py", "fi...
3.578125
stackv2
import sqlite3 print('\n', 'Part 2 - The Northwind Database', '\n', '\n') db = 'northwind_small (1).sqlite3' try: print('PROCESSES:') # establish connection for northwind file print('attempting to connect to database...') nw_conn = sqlite3.connect(db) print('connection successful!', '\n', '\n') ...
133
32.77
123
13
1,097
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_19702165dbe35662_449ce67a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 66 ]
[ null ]
[ 19 ]
[ 27 ]
2024-11-18T21:52:22.820022+00:00
1,419,641,420,000
22ebc0e9863cf9ef0b3489749748ec36f3c307e3
2
{ "blob_id": "22ebc0e9863cf9ef0b3489749748ec36f3c307e3", "branch_name": "refs/heads/master", "committer_date": 1419641420000, "content_id": "0dfc00ff9ef5ae9b32ce20da050d4a9650604e7a", "detected_licenses": [ "MIT" ], "directory_id": "9e9d55c287fff511ffe26e0573213bff77a20943", "extension": "py", "fi...
2.4375
stackv2
from flask.ext import restful from . import database from flask import abort, request from datetime import datetime import pytz import requests def GeoIpLookup(ip): loc_resp = requests.get( 'https://freegeoip.net/json/{0}'.format(ip)) try: location = loc_resp.json() return {'latitude': ...
104
25.27
85
15
612
python
[{"finding_id": "codeql_py/partial-ssrf_8c5ca24d9e1d6a87_f426bb8e", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 9 ]
[ 10 ]
[ 16 ]
[ 53 ]
2024-11-18T20:31:29.468420+00:00
1,692,185,618,000
3a8fb910eb6b8c73b78de33994a42019edfa3e53
3
{ "blob_id": "3a8fb910eb6b8c73b78de33994a42019edfa3e53", "branch_name": "refs/heads/main", "committer_date": 1692185618000, "content_id": "36cd96e996285e0d95640ac193822f616423a98c", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "b7b409c839b4110e23219483f667f8d01989221f", "extension": "py"...
2.59375
stackv2
#!/usr/bin/env python3 """ Collect CIDR ip ranges from data centers Generates inputs for network policies to ban ingress `cidrs_:name()` returns a list of CIDRs for a datacenter owner Currently only collecting ipv4 addresses """ import ipaddress import os from html.parser import HTMLParser import requests import y...
149
29.58
130
20
1,114
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_4ab7b623a1d583cc_9bdb7ce4", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [https://download.microsoft.com](1) may be at an arbitr...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [https://download.microsoft.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 53 ]
[ 55 ]
[ 47 ]
[ 18 ]
2024-11-18T20:31:31.612526+00:00
1,631,561,556,000
59261238bcc32c813c3ff759797ba9a4088f99c8
2
{ "blob_id": "59261238bcc32c813c3ff759797ba9a4088f99c8", "branch_name": "refs/heads/main", "committer_date": 1631561556000, "content_id": "8be02358148bd80a4fe903a605b4d604fca0b09c", "detected_licenses": [ "Apache-2.0" ], "directory_id": "c1ef99c34aae524adfeb96f6f12bc623f9f543e5", "extension": "py", ...
2.359375
stackv2
from flask import Flask, request, render_template, jsonify, send_file import logging import os from tempfile import TemporaryDirectory from mergechance.db import autocomplete_list, get_from_cache, cache from mergechance.gh_gql import get_pr_fields, GQLError from mergechance.analysis import ANALYSIS_FIELDS, get_viable_...
141
33.06
116
16
1,127
python
[{"finding_id": "codeql_py/log-injection_7a467827976690b7_4cdcc8c6", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
2
true
[ "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 45, 47 ]
[ null, null ]
[ 18, 18 ]
[ 50, 52 ]
2024-11-18T21:10:34.527042+00:00
1,593,667,534,000
89bf4f6c4d9189d4da85a96508071fadac2cdbf1
3
{ "blob_id": "89bf4f6c4d9189d4da85a96508071fadac2cdbf1", "branch_name": "refs/heads/master", "committer_date": 1593667534000, "content_id": "5f3ea0b9a8e8e7c9ecdec4e1b0428c9fd51c6061", "detected_licenses": [ "MIT" ], "directory_id": "930bcc52e077614ab2343c1fdfb78d7e174ad0b2", "extension": "py", "fi...
2.734375
stackv2
from bs4 import BeautifulSoup import dateparser import datetime import requests import codecs from urllib.parse import unquote from langdetect import detect class Scraper: """Scraper class""" def __init__(self, html): self.html = html self.soup = BeautifulSoup(html, "lxml") print(f"[Scr...
109
34.95
97
19
893
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_584125d09a1f81ac_7bc417e8", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [https://bn.quora.com/](1) may be at an arbitrary posit...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [https://bn.quora.com/](1) may be at an arbitrary position in the sanitized URL." ]
[ 90 ]
[ null ]
[ 16 ]
[ 46 ]
2024-11-18T21:23:35.342754+00:00
1,477,411,531,000
adfac17ab55e94fef7ddc9f1ebd3db3bebd8710b
3
{ "blob_id": "adfac17ab55e94fef7ddc9f1ebd3db3bebd8710b", "branch_name": "refs/heads/master", "committer_date": 1477411531000, "content_id": "14611bb910fcdff9358e20b7e1d249780f00196e", "detected_licenses": [ "Apache-2.0" ], "directory_id": "2c5b7e184e1916687d1e1388495ef63088d93f86", "extension": "py"...
2.59375
stackv2
import cStringIO import os import socket import subprocess import sys import time import paramiko import logging logger = logging.getLogger(__name__) def check_port(host, port, timeout=2, attempts=100): logger.debug("Testing connection to - {0}:{1}".format(host, port)) for attempt in xrange(attempts): ...
136
32.16
79
15
1,057
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_6c790de6d0e9bb8e_839832e4", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 46 ]
[ null ]
[ 5 ]
[ 62 ]
2024-11-18T21:23:46.362822+00:00
1,692,887,878,000
fba22e5ff503a1d455a785ca4261ad0b55f70c0c
2
{ "blob_id": "fba22e5ff503a1d455a785ca4261ad0b55f70c0c", "branch_name": "refs/heads/master", "committer_date": 1692887878000, "content_id": "b7f10e0c0bb8cfb2906bf894d9e448b8e4e12d8d", "detected_licenses": [ "MIT" ], "directory_id": "149b53990682d1375b580b7a3e143facab6ac147", "extension": "py", "fi...
2.4375
stackv2
# # Copyright (C) 2010-2017 Samuel Abels # The MIT License (MIT) # # Permission is hereby granted, free of charge, to any person obtaining # a copy of this software and associated documentation files # (the "Software"), to deal in the Software without restriction, # including without limitation the rights to use, copy,...
298
32.28
81
16
2,256
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_8496518e85450038_09e5366d", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi...
[ 41 ]
[ null ]
[ 24 ]
[ 25 ]
2024-11-18T21:37:26.522072+00:00
1,368,307,381,000
7ecebc238150fba7b7cbc31f63416ba77e0692d0
3
{ "blob_id": "7ecebc238150fba7b7cbc31f63416ba77e0692d0", "branch_name": "refs/heads/master", "committer_date": 1368307381000, "content_id": "ca1418be1e6f683bd1d8e0be12806e07332b6e40", "detected_licenses": [ "Apache-2.0" ], "directory_id": "9250d3e6f570143fd361a8acca0a05d150f69a52", "extension": "py"...
2.96875
stackv2
""" Functions for loading configuration data. """ from itertools import chain from fabric.api import puts from jinja2 import Environment, FileSystemLoader, TemplateNotFound from confab.files import _import, _import_string from confab.merge import merge from confab.options import options from confab.output import debug...
116
31.16
91
17
704
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_fea32d6011732aec_4f4eb301", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 64 ]
[ null ]
[ 19 ]
[ 65 ]
2024-11-18T21:58:59.784033+00:00
1,581,616,191,000
6b9fa549a80011f96e824358cab5fbc5b8283017
2
{ "blob_id": "6b9fa549a80011f96e824358cab5fbc5b8283017", "branch_name": "refs/heads/master", "committer_date": 1581616191000, "content_id": "a2d71b0ea58c4ad78c3f0502092cdebd320031c6", "detected_licenses": [ "Apache-2.0" ], "directory_id": "804a1a6b44fe3a013352d04eaf47ea6ad89f9522", "extension": "py"...
2.421875
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- from __future__ import unicode_literals import os import markdown.inlinepatterns import markdown.extensions import markdown.util import slugify as slugify_impl class ClickHouseLinkMixin(object): def handleMatch(self, m): single_page = (os.environ.get('SINGL...
66
30.77
106
23
454
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_f0e5fa4dd659bc33_ff0412b5", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [https://clickhouse.yandex](1) may be at an arbitrary p...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [https://clickhouse.yandex](1) may be at an arbitrary position in the sanitized URL." ]
[ 26 ]
[ null ]
[ 24 ]
[ 68 ]
2024-11-18T21:59:00.525333+00:00
1,587,581,828,000
716225feed96f5f7a74c70d6b02981856fb09191
2
{ "blob_id": "716225feed96f5f7a74c70d6b02981856fb09191", "branch_name": "refs/heads/master", "committer_date": 1587581828000, "content_id": "52998185ba2c8d335907496a958a3ee5f75020bc", "detected_licenses": [ "Apache-2.0" ], "directory_id": "a378892cf54c0efcf8e8a5a6027f439614c2af89", "extension": "py"...
2.40625
stackv2
import os from flask import Flask, request, jsonify from flask_cors import CORS from firebase_admin import auth, credentials, firestore, initialize_app import functools import requests app = Flask(__name__) cors = CORS(app, resources={r"/api/*": {"origins": "*"}}) cred = credentials.Certificate("./serviceAccount.jso...
195
32.08
129
24
1,538
python
[{"finding_id": "codeql_py/stack-trace-exposure_602b0adf959de1e6_8be06736", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-215" ]
[ "py/stack-trace-exposure", "py/flask-debug" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger." ]
[ 178, 195 ]
[ null, null ]
[ 16, 5 ]
[ 40, 66 ]
2024-11-18T22:11:27.715004+00:00
1,534,698,087,000
2894ce0cc7f004389788f7ad672fb750811f842e
3
{ "blob_id": "2894ce0cc7f004389788f7ad672fb750811f842e", "branch_name": "refs/heads/master", "committer_date": 1534698087000, "content_id": "b9ab9ffa3d85fb2e4f8742969b2269da924974a9", "detected_licenses": [ "MIT" ], "directory_id": "d268c7de57913723ffd34129af77ffe5b2a9efda", "extension": "py", "fi...
2.984375
stackv2
"""routes.icons This module contains all of the routes for getting icons Attributes: icons_blueprint: The blueprint for these routes """ from flask import Blueprint, redirect icons_blueprint = Blueprint('icons', __name__, url_prefix='/icons') @icons_blueprint.route('<path:domain>/icon.png', methods=['GET']) de...
24
23
67
11
123
python
[{"finding_id": "codeql_py/url-redirection_a0a3464228bae7cf_e1d2e561", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 24 ]
[ null ]
[ 21 ]
[ 52 ]
2024-11-18T22:11:37.322411+00:00
1,615,899,993,000
cede7f41470139b4461c925b7ac924c8850b1e53
3
{ "blob_id": "cede7f41470139b4461c925b7ac924c8850b1e53", "branch_name": "refs/heads/master", "committer_date": 1615899993000, "content_id": "1269f0db4d22bdd7845b3f4390e872d4d19664a8", "detected_licenses": [ "MIT" ], "directory_id": "0abcde8a5c7ae429dbce93b0c93998edccd9df14", "extension": "py", "fi...
2.625
stackv2
import os import pandas as pd from transformers import RobertaTokenizer import torch import re from torch.nn.utils.rnn import pad_sequence def clean_data(df, tokenizer, fine_tune): df[0] = df[0].apply(lambda x: re.sub("\[ ?link ?\][a-z]?( \( [a-z] \))?", "<link>" if fine_tune else tokenizer.unk_token, x)) df...
102
38.76
148
23
1,255
python
[{"finding_id": "codeql_py/overly-large-range_8bb06f3a470b5083_05d7318b", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 12 ]
[ null ]
[ 105 ]
[ 108 ]
2024-11-18T22:11:37.494306+00:00
1,585,922,859,000
1d55ad36649e244a464f0ce161d1a091727ffaf7
2
{ "blob_id": "1d55ad36649e244a464f0ce161d1a091727ffaf7", "branch_name": "refs/heads/master", "committer_date": 1585922859000, "content_id": "638d64c512f6d8be02db58d60b039d62ceec50c3", "detected_licenses": [ "MIT" ], "directory_id": "85229d7b842e3ae6784673dd4d15c12f1eea6ab8", "extension": "py", "fi...
2.3125
stackv2
import requests from flask import Blueprint, render_template, url_for, current_app as app, request from werkzeug.utils import redirect from app.auth import auth blueprint = Blueprint('survey', __name__, template_folder='templates') @blueprint.route('/survey/<survey_id>', methods=["GET"]) @auth.login_required def ge...
48
37.12
120
13
402
python
[{"finding_id": "codeql_py/partial-ssrf_f51b26c753b26b70_88e2fe76", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depen...
2
true
[ "CWE-918", "CWE-918" ]
[ "py/partial-ssrf", "py/partial-ssrf" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depends on a [user-provided value](2).", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 36, 44 ]
[ 37, 45 ]
[ 16, 16 ]
[ 59, 59 ]
2024-11-18T22:11:37.745201+00:00
1,526,619,282,000
4ac09887a5100129f40851deb52f50a1b28ca6bc
3
{ "blob_id": "4ac09887a5100129f40851deb52f50a1b28ca6bc", "branch_name": "refs/heads/master", "committer_date": 1526619282000, "content_id": "7883476b1a666e7ceeae429ea05da91b0de9ef3c", "detected_licenses": [ "Apache-2.0" ], "directory_id": "36cf3cc6f2575cc2b8fc17ceb3a017c8b9efb598", "extension": "py"...
3.0625
stackv2
from math import radians, cos, sin, asin, sqrt import geocoder import json import requests """Driver details""" user_latitude = 22.5697 user_longitude = 88.3697 city = "Kolkata" print("\nUser/Driver details:") print ("latitude = " + str(user_latitude) + "\nlongitude = " + str(user_longitude) + "\ncity = " + city) """...
46
31.63
149
12
440
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d7935137bd2c24aa_f48a07c2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 11 ]
[ null ]
[ 8 ]
[ 104 ]
2024-11-18T22:11:50.291518+00:00
1,602,221,603,000
48d50b8823452f07a43e13d908f88091246915e1
2
{ "blob_id": "48d50b8823452f07a43e13d908f88091246915e1", "branch_name": "refs/heads/master", "committer_date": 1602221603000, "content_id": "295fb195706ab89c8b057610c5ba0f82350ed4ab", "detected_licenses": [ "MIT" ], "directory_id": "81407be1385564308db7193634a2bb050b4f822e", "extension": "py", "fi...
2.34375
stackv2
import os import re # import time import typing from selenium import webdriver from selenium.common.exceptions import TimeoutException from selenium.webdriver.support.wait import WebDriverWait import tomd # import execjs # pip install PyExecJS import requests from urllib.parse import urlparse from pyquery import PyQ...
165
36.07
144
23
1,582
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_4061e0919fa64dba_14f2f41b", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [www.cnblogs.com](1) may be at an arbitrary position in...
10
true
[ "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020" ]
[ "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitizatio...
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "The string [www.cnblogs.com](1) may be at an arbitrary position in the sanitized URL.", "The string [segmentfault.com](1) may be at an arbitrary position in the sanitized URL.", "The string [blog.csdn.net](1) may be at an arbitrary position in the sanitized URL.", "The string [www.jianshu.com](1) may be at a...
[ 104, 106, 108, 110, 112, 114, 116, 119, 121, 121 ]
[ null, null, null, null, null, null, null, null, null, null ]
[ 12, 12, 12, 12, 12, 12, 12, 12, 12, 40 ]
[ 36, 37, 34, 36, 37, 36, 38, 39, 36, 62 ]
2024-11-18T22:23:59.781978+00:00
1,601,638,680,000
b40b562054e73a4d637a887903b08f2166ab7cb5
3
{ "blob_id": "b40b562054e73a4d637a887903b08f2166ab7cb5", "branch_name": "refs/heads/master", "committer_date": 1601638680000, "content_id": "47b99a7e7e3ec3649a9e5628c245c5c535fd772e", "detected_licenses": [ "MIT" ], "directory_id": "e7722c60423d7f09a7f52fee049a1c6bf9acecf0", "extension": "py", "fi...
3
stackv2
#import required packages import pandas as pd import geopandas as gpd import requests import json import shapely import fiona from pyproj import Proj, transform, Transformer from sqlalchemy import create_engine import psycopg2 import geoalchemy2 def postgis_push(spatial_df): ''' A function to set the correct...
162
32.79
174
16
1,346
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7cf53a01b514b1ec_3f6bb8d0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (p...
[ 101, 132 ]
[ null, null ]
[ 15, 11 ]
[ 17, 22 ]
2024-11-18T22:24:12.721108+00:00
1,529,257,700,000
2763fef871a3595f0403ec21e3c4f12b8b28a949
2
{ "blob_id": "2763fef871a3595f0403ec21e3c4f12b8b28a949", "branch_name": "refs/heads/master", "committer_date": 1529257700000, "content_id": "43f5c9f6ed6da8d48dcaf513c32c9eeb91ef108f", "detected_licenses": [ "MIT" ], "directory_id": "fbabdde26aff4027b3835e972846f7de96127bd2", "extension": "py", "fi...
2.4375
stackv2
from django.contrib import messages from django.contrib.auth import login as django_login, authenticate from django.shortcuts import render, redirect # @login_required from django.views import View from django.views.generic import ListView from core.forms import SignUpForm, LoginForm from core.models import Profile ...
114
26.61
85
16
606
python
[{"finding_id": "codeql_py/url-redirection_b892d1702e13b542_e6e0e7ed", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 86 ]
[ null ]
[ 33 ]
[ 36 ]
2024-11-18T22:24:12.888813+00:00
1,399,038,768,000
8cc581ce72bb1930fa4013904f9b5bf4a8e1e1d7
3
{ "blob_id": "8cc581ce72bb1930fa4013904f9b5bf4a8e1e1d7", "branch_name": "refs/heads/master", "committer_date": 1399038772000, "content_id": "7614c9812a9f33e3547f6bbc45d31d48cca2c203", "detected_licenses": [ "MIT" ], "directory_id": "e1f300bf751ccc9186451c555303b90f6115cd17", "extension": "py", "fi...
3.25
stackv2
""" Copyright 2014 Nauman Ahmad This file is part of the Rocket library. """ from flask import Flask,render_template import markdown,os,yaml from werkzeug.utils import cached_property #Constants Defined FILE_EXTENSION = '.md' app = Flask(__name__) app.secret_key = 'f8ssdf00sas#$2233500966*@!' class Post(object): ...
66
28.79
114
18
449
python
[{"finding_id": "codeql_py/flask-debug_50961c598283a57d_585a0cdf", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-022" ]
[ "py/flask-debug", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1)." ]
[ 66, 41 ]
[ null, null ]
[ 5, 19 ]
[ 24, 28 ]
2024-11-18T22:24:13.012329+00:00
1,599,053,689,000
d25e744420955db6e8a7df80cb1c10e0192299f9
2
{ "blob_id": "d25e744420955db6e8a7df80cb1c10e0192299f9", "branch_name": "refs/heads/master", "committer_date": 1599053689000, "content_id": "a06a1cda8323c8ca54352d62a6c43a982ba8dc02", "detected_licenses": [ "Apache-2.0" ], "directory_id": "5fe72bb13baf3649058ebe11aa86ad4fc56c69ed", "extension": "py"...
2.3125
stackv2
#!/usr/bin/python #Install SleekXMPP & xmpppy Modules #This program is not for children -(18) #This program is only for educational purposes only. #Don't Attack people facebook account's it's illegal ! #If you want to HaCk into someone's account, you must have the permission of the user. #usage:Facebook-brute-force...
89
27.38
87
16
705
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_96bfcfec0be6fa7f_532da801", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 81 ]
[ null ]
[ 15 ]
[ 39 ]
2024-11-18T22:24:23.756561+00:00
1,636,445,367,000
bf8792e6c251d88419b2917ea801e13adaf31543
3
{ "blob_id": "bf8792e6c251d88419b2917ea801e13adaf31543", "branch_name": "refs/heads/master", "committer_date": 1636445367000, "content_id": "ed565dd83b990024d4d7c80922f74c69842a436a", "detected_licenses": [ "MIT" ], "directory_id": "0f04c3f5e35c0a3f96fbbb3b90d79a2d389f24a4", "extension": "py", "fi...
2.515625
stackv2
from __future__ import annotations import os from io import BytesIO from typing import List, Optional import flask from flask import Flask, redirect, render_template, request from itsdangerous import URLSafeSerializer from PIL import Image, ImageDraw, ImageFont app = Flask(__name__, static_url_path="/media") SECRET...
101
24.99
111
13
685
python
[{"finding_id": "codeql_py/flask-debug_ab8b2ca36f921dd1_b2d03a33", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-022" ]
[ "py/flask-debug", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1)." ]
[ 101, 20 ]
[ null, null ]
[ 5, 27 ]
[ 24, 31 ]
2024-11-18T22:24:24.820516+00:00
1,617,579,095,000
4044d6123a3d2dbc07ed76aaa66f29d8efb48b11
2
{ "blob_id": "4044d6123a3d2dbc07ed76aaa66f29d8efb48b11", "branch_name": "refs/heads/main", "committer_date": 1617579095000, "content_id": "f3d4284a6109157714a3d00e2647d5f5a2ee8643", "detected_licenses": [ "MIT" ], "directory_id": "db06b71f5ad71d864fa6b3dacbd10989c4c22ad5", "extension": "py", "file...
2.46875
stackv2
import os import re import sys import socket import asyncio from typing import Any from typing import Union from colorama import Fore from typing import Callable from asyncio import AbstractEventLoop from .utils import log from .utils import http_status_codes def write_response(code: int, body: bytes, headers: Union[...
251
31.57
99
22
1,774
python
[{"finding_id": "codeql_py/overly-permissive-file_351597d8544a21fa_fd762daf", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world writable." ]
[ 225 ]
[ null ]
[ 21 ]
[ 42 ]
2024-11-18T22:36:06.757564+00:00
1,628,749,665,000
d450023e5eefa6f6c6de00277556f5f20c644783
3
{ "blob_id": "d450023e5eefa6f6c6de00277556f5f20c644783", "branch_name": "refs/heads/main", "committer_date": 1628749665000, "content_id": "26d1a4bf4b90df81f7d20602cbf564e380743182", "detected_licenses": [ "MIT" ], "directory_id": "35f421ecf39c988b0fb16163334de460492755ae", "extension": "py", "file...
3.109375
stackv2
from flask import Flask from flask import request app= Flask(__name__) @app.route('/') def index(): return '<h1>HOLA MUNDO FLASK</h1>' @app.route('/suma') def suma(): n1 = request.args.get('n1','ingrese un valor de n1') n2 = request.args.get('n2','ingrese un valor de n2') r = int(n1) + int(n2) re...
40
25.73
56
12
313
python
[{"finding_id": "codeql_py/flask-debug_1077e55b46a6431f_7fdc4b0e", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-079", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 40, 15, 20 ]
[ null, null, null ]
[ 5, 12, 12 ]
[ 36, 54, 46 ]
2024-11-18T22:36:07.387744+00:00
1,406,377,558,000
ae2eac34ebb456397edebc42c0200d6054deb5d7
2
{ "blob_id": "ae2eac34ebb456397edebc42c0200d6054deb5d7", "branch_name": "refs/heads/master", "committer_date": 1406377558000, "content_id": "e0e9731aeacebc145be934d06e4b11a1ca7055ec", "detected_licenses": [ "MIT" ], "directory_id": "44969101dbc9e5056b9e45b18edd8b5003e5e736", "extension": "py", "fi...
2.4375
stackv2
#!/usr/bin/python import cgi import json form = cgi.FieldStorage() prob_name = form['problem_name'].value assert type(prob_name) is str # prevent subclassing shenanigans print("Content-type: text/plain; charset=iso-8859-1\n") try: for line in open('coding-the-matrix/python_lab.problem2name'): p, desc = line.s...
35
23.66
64
14
239
python
[{"finding_id": "codeql_py/path-injection_70157988a8a60d06_8fd0fcde", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 19 ]
[ null ]
[ 14 ]
[ 16 ]
2024-11-18T22:36:23.470606+00:00
1,688,954,286,000
488d57c48b4ec3a3440a523ebe5276b944460f3a
3
{ "blob_id": "488d57c48b4ec3a3440a523ebe5276b944460f3a", "branch_name": "refs/heads/master", "committer_date": 1688954286000, "content_id": "b40d388f9b1dc9cdb2f8749c7bb583be0d8d6a67", "detected_licenses": [ "MIT" ], "directory_id": "b779e7f6e017b4bbde5fe0ecf057a122f3a1e41f", "extension": "py", "fi...
2.625
stackv2
""" Download notMNIST and generate a pickle file Author: Rowel Atienza Project: https://github.com/roatienza/Deep-Learning-Experiments """ # On command line: python3 mnist_a2j_2pickle.py # Prerequisite: tensorflow (see tensorflow.org) from __future__ import print_function import numpy as np import pickle import os im...
113
32.33
96
18
898
python
[{"finding_id": "codeql_py/tarslip_837590715a40d71c_7e2acaa7", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 52 ]
[ null ]
[ 5 ]
[ 8 ]
2024-11-18T22:36:27.344105+00:00
1,518,937,878,000
305c472f818c15eec08af58987e3ee73c23715d4
3
{ "blob_id": "305c472f818c15eec08af58987e3ee73c23715d4", "branch_name": "refs/heads/master", "committer_date": 1518937878000, "content_id": "435830cab7492fb427281d0d98892eedcc080b2a", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "a8ec168566b61f3bab1a19b621c30c3a43dfffe4", "extension": "p...
3.25
stackv2
# Impler necessary modules from flask import Flask, jsonify, abort, render_template from geocoder import Geocoder # Define the app app = Flask(__name__) # Define what happens when '/' is called @app.route('/', methods=['GET']) def default(): # Render the webpage return render_template('layout.html') # Define what...
82
28.72
101
20
621
python
[{"finding_id": "codeql_py/flask-debug_4426e23b3dcf4f20_8050fe04", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 82, 75 ]
[ null, null ]
[ 2, 11 ]
[ 21, 70 ]
2024-11-18T22:36:35.727284+00:00
1,519,246,117,000
d2fd10bb9da36f124f2baca7ffe9f555fa3e3d51
3
{ "blob_id": "d2fd10bb9da36f124f2baca7ffe9f555fa3e3d51", "branch_name": "refs/heads/master", "committer_date": 1519246117000, "content_id": "e7791367f05b20bd0a797ae906e1e1b4e7b963a7", "detected_licenses": [ "MIT" ], "directory_id": "721a902265455ea095cbf6db1ad77b0859fd5838", "extension": "py", "fi...
2.703125
stackv2
#TWIL IG from flask import Flask, request, redirect from twilio.twiml.messaging_response import Message, MessagingResponse from InstagramAPI import InstagramAPI from PIL import Image from resizeimage import resizeimage import requests import urllib3 urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning) ...
105
31.09
145
18
815
python
[{"finding_id": "codeql_py/flask-debug_974ae1aeb26d2ab6_f3b0d7aa", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-295", "CWE-918" ]
[ "py/flask-debug", "py/request-without-cert-validation", "py/partial-ssrf" ]
[ "HIGH", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This request may run without certificate validation because [it is disabled](1).", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 105, 40, 40 ]
[ null, null, null ]
[ 5, 13, 13 ]
[ 24, 69, 69 ]
2024-11-18T22:36:39.308778+00:00
1,628,951,004,000
81ae6d1e404cde8f09986acd46496fcbc4730b35
3
{ "blob_id": "81ae6d1e404cde8f09986acd46496fcbc4730b35", "branch_name": "refs/heads/master", "committer_date": 1628951004000, "content_id": "4d0955c7abea2b8a533e322af9844f90e8e742ee", "detected_licenses": [ "MIT" ], "directory_id": "a1428ffd82f375081b620a9547f5860a97dec460", "extension": "py", "fi...
2.65625
stackv2
"""VSCode version manager.""" import os import os.path import re import shutil import subprocess import urllib.request from typing import Any, List, NamedTuple import bs4 import click VSCVM_PATH = os.path.expanduser("~/.vscvm") VSCODE_BASE_URL = "https://code.visualstudio.com" VSCODE_RELEASES_URL = VSCODE_BASE_URL +...
242
27.31
86
14
1,589
python
[{"finding_id": "codeql_py/overly-permissive-file_bfb3eda3da6f2dc9_e2eec7c0", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable." ]
[ 176 ]
[ null ]
[ 5 ]
[ 38 ]
2024-11-18T21:22:14.996381+00:00
1,556,590,754,000
8ce5ad1c8c2c5503dfec8184e63a625054aa641c
2
{ "blob_id": "8ce5ad1c8c2c5503dfec8184e63a625054aa641c", "branch_name": "refs/heads/master", "committer_date": 1556590754000, "content_id": "046d228e38aa469bc53a644653f4fee272a94b4e", "detected_licenses": [ "MIT" ], "directory_id": "418c3d40b71e81f9ec954cc40e98ef2b4c9ff0c8", "extension": "py", "fi...
2.359375
stackv2
import sys import os import time import logging import tempfile import subprocess import _thread import traceback import tornado.web import tornado.ioloop import tornado.gen import requests import psutil from .ssh import SSHRemoteForward log = logging.getLogger('curlbomb.server') class CurlbombBaseRequestHandler(to...
249
38.78
128
20
2,136
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_53fb4532a02172c8_51945558", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-117" ]
[ "py/clear-text-logging-sensitive-data", "py/log-injection" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This log entry depends on a [user-provided value](1)." ]
[ 226, 123 ]
[ null, 124 ]
[ 34, 22 ]
[ 92, 40 ]
2024-11-18T21:51:25.662919+00:00
1,418,821,946,000
ef20a64abbef822152fed26935162b23dcd5ae8f
2
{ "blob_id": "ef20a64abbef822152fed26935162b23dcd5ae8f", "branch_name": "refs/heads/master", "committer_date": 1418821946000, "content_id": "c3aafcc20e1f9835f50a9c2329bb123d428f1396", "detected_licenses": [ "MIT" ], "directory_id": "0f04bd2aa3768a09a00237be4c1ae3cd152fac9d", "extension": "py", "fi...
2.484375
stackv2
import binascii import types from lxml import etree from jinja2 import Template class XmlToPy(): def __init__(self): self.py_string = Template(""" class {{pck_name}}(): @classmethod def dtype(cls, data):{% if complexity == "complex" %} pos = GetPosition(data){% endif %} {% if com...
89
31.6
133
19
628
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_02333440dbde2d65_ea8de240", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 11 ]
[ 19 ]
[ 26 ]
[ 44 ]
2024-11-18T21:51:27.383778+00:00
1,570,556,890,000
3676111ab33582d230ddc906ab4f2a537fcc8c6a
2
{ "blob_id": "3676111ab33582d230ddc906ab4f2a537fcc8c6a", "branch_name": "refs/heads/master", "committer_date": 1570556890000, "content_id": "a89ed998db8e38975c68517309dc054b4d0e51ee", "detected_licenses": [ "MIT" ], "directory_id": "16a984aa77f7af07129d846713c633a94a64e7a0", "extension": "py", "fi...
2.390625
stackv2
from django.shortcuts import render, redirect from django.http import HttpResponse from django.contrib.auth.models import auth, User from django.contrib import messages # Create your views here. # register def register(request): if request.method == 'POST': if User.objects.filter(username=request.POST['na...
49
29.57
110
16
276
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_26758a6db8da09c4_504ef1ba", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 31 ]
[ null ]
[ 24 ]
[ 32 ]
2024-11-18T21:51:30.034309+00:00
1,650,918,693,000
f45e33c711fb231405c65cce6ea5f42bf7d81950
3
{ "blob_id": "f45e33c711fb231405c65cce6ea5f42bf7d81950", "branch_name": "refs/heads/main", "committer_date": 1650918693000, "content_id": "23a80dd6c0b2815f610e182fad5bc9fe31473693", "detected_licenses": [ "MIT" ], "directory_id": "5f65e12a62b59aea9263f35240c960b7e6009aa5", "extension": "py", "file...
3.34375
stackv2
#!/usr/bin/env python3 """YouTube utilities. Using the YouTube URL: * Get the YouTube Title * Get the YouTube Shortened URL """ import sys import re import requests from bs4 import BeautifulSoup def video_id(url: str) -> str: """Return the YouTube Video Id from URL.""" REGEX = '(?:https:\/\/www.youtube.co...
70
22.63
86
14
422
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_6b5f690cc8d861f4_5e2acd14", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This string, which is used as a regular expression [here](1), has an unescaped '.' befor...
1
true
[ "CWE-020" ]
[ "py/incomplete-hostname-regexp" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This string, which is used as a regular expression [here](1), has an unescaped '.' before 'youtube.com', so it might match more hosts than expected." ]
[ 19 ]
[ null ]
[ 17 ]
[ 53 ]
2024-11-18T21:51:43.468973+00:00
1,484,192,270,000
b3c8ae4383a29dce15b445c8933233c41a94b8a2
3
{ "blob_id": "b3c8ae4383a29dce15b445c8933233c41a94b8a2", "branch_name": "refs/heads/master", "committer_date": 1484192270000, "content_id": "49616e5abfb1e1265d3b309f6c4ef526ab5ca8d1", "detected_licenses": [ "MIT" ], "directory_id": "7afe7bf5658edcb915b8a0045f6a684f14cc9825", "extension": "py", "fi...
2.546875
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- import os import BaseHTTPServer import SimpleHTTPServer import socket import ssl def main(): ssl_file = '/tmp/simple-https-ssl.pem' os.system('openssl req -new -x509 -keyout {F} -out {F} -days 365 -nodes -subj "/C=CN/ST=Hangzhou/L=China/CN=www.huijieapp.com"'.for...
33
20.33
151
10
221
python
[{"finding_id": "codeql_py/insecure-default-protocol_1ad1f75f1a04081a_b6fb119d", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in...
1
true
[ "CWE-327" ]
[ "py/insecure-default-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used." ]
[ 21 ]
[ 25 ]
[ 20 ]
[ 6 ]
2024-11-18T21:51:49.083883+00:00
1,683,150,422,000
39893f07fc4924627664d9addb570093ca9cedb4
3
{ "blob_id": "39893f07fc4924627664d9addb570093ca9cedb4", "branch_name": "refs/heads/master", "committer_date": 1683150422000, "content_id": "c1c276536e49a429ef59f0662d074aec8c8d8031", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "9fa737de79d98c09192bedb76021716d9ab44284", "extension": "p...
2.5625
stackv2
#!/usr/local/bin/python # Copyright Jon Berg, turtlemeat.com import string,cgi,time from os import curdir, sep from BaseHTTPServer import BaseHTTPRequestHandler, HTTPServer class MyHandler(BaseHTTPRequestHandler): def do_GET(self): print("doGet: path==" + self.path) try: if self.path == "/": sel...
68
31.28
86
19
470
python
[{"finding_id": "codeql_py/path-injection_bf1c3d6111afccd7_8ebea76f", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 17 ]
[ null ]
[ 26 ]
[ 50 ]
2024-11-18T21:51:54.360690+00:00
1,589,560,143,000
9e96a6581c520e06f11db8f3ce4d18af4a180bd2
3
{ "blob_id": "9e96a6581c520e06f11db8f3ce4d18af4a180bd2", "branch_name": "refs/heads/master", "committer_date": 1589560143000, "content_id": "edbdf3029d8307c1b3a289dc2fa32769ce0c8536", "detected_licenses": [ "MIT" ], "directory_id": "365410cfdc35c6188b5fbe1bfc90615022dcf0ce", "extension": "py", "fi...
2.59375
stackv2
import sys import os import configparser import asyncio import urllib.parse import aiohttp from lxml import html, etree CONFIG_PATH = f"{os.environ['HOME']}/.config/seqartfetch.ini" VERSION = "0.3.4" USAGE = f"""SeqArtFetch {VERSION} About A semi-universal webcomic/sequential art downloader, licensed under MIT. ...
231
32.31
112
26
1,715
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_5334c694654884c2_12b0738e", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [https://m.tapas.io](1) may be at an arbitrary position...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [https://m.tapas.io](1) may be at an arbitrary position in the sanitized URL." ]
[ 159 ]
[ null ]
[ 24 ]
[ 63 ]
2024-11-18T22:02:46.376538+00:00
1,691,154,790,000
d6b73793ba888941e7d79ae7e8457e772b6b102c
3
{ "blob_id": "d6b73793ba888941e7d79ae7e8457e772b6b102c", "branch_name": "refs/heads/master", "committer_date": 1691154790000, "content_id": "c5126bd5cfcc43701d703049e3c32a6a67426288", "detected_licenses": [ "Apache-2.0" ], "directory_id": "4491549f0b1bbf5397ae0b56192605a7abcb61b0", "extension": "py"...
2.828125
stackv2
from urllib.request import urlopen from requests import post import re url = "http://localhost:5000/login/" def get_content_from_class(html, class_name): pattern = f'<div class="{class_name}">.*?</div>' match_results = re.search(pattern, html, re.IGNORECASE) content = match_results.group() content = ...
62
23.19
62
14
365
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_cec94707a96f53e0_e709f0ff", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text." ]
[ 58 ]
[ null ]
[ 39 ]
[ 47 ]
2024-11-18T22:16:39.989356+00:00
1,549,041,939,000
29bcadbb24dd36423c674924eda59205bd0d6f49
3
{ "blob_id": "29bcadbb24dd36423c674924eda59205bd0d6f49", "branch_name": "refs/heads/master", "committer_date": 1549041939000, "content_id": "91ba98801c30e8e516d777b40f658b0c1b84d50e", "detected_licenses": [ "MIT" ], "directory_id": "e0a607c46c5947f3e2055a91fb2907a705a23111", "extension": "py", "fi...
3.3125
stackv2
#! /usr/bin/env python # -- coding: utf-8 -- # ULL - Sistemas Inteligentes 2018/2019 # # User class and functions to create, write and read users USERS_DATA = "../Data/users.txt" LAST_USER_ID = "../Data/last_user_id.txt" class User: def __init__(self, uid, age = 30, height = 170, weight = 70, sex = "M", exerci...
91
26.31
117
23
743
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_8e6146fee82d81fd_ac59b1ee", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text." ]
[ 83 ]
[ 84 ]
[ 13 ]
[ 70 ]
2024-11-18T22:27:55.607188+00:00
1,591,279,780,000
fd0b431b5e4ee2f9cb7ef9224da3ee2714d0f7c6
3
{ "blob_id": "fd0b431b5e4ee2f9cb7ef9224da3ee2714d0f7c6", "branch_name": "refs/heads/master", "committer_date": 1591279780000, "content_id": "c601556efe80f9b5ce021f7258a9d7c10a66993f", "detected_licenses": [ "Unlicense" ], "directory_id": "01eb2a217968b5a5045277c1736bed6ab3bc2996", "extension": "py",...
2.796875
stackv2
import streamlit as st #EDA Pkgs import pandas as pd import matplotlib.pyplot as plt import matplotlib matplotlib.use('Agg') from wordcloud import WordCloud, STOPWORDS, ImageColorGenerator #DB import sqlite3 conn = sqlite3.connect('blog.db') c = conn.cursor() #Functions def create_table(): c.execute('CREATE TA...
198
33.96
159
18
1,722
python
[{"finding_id": "codeql_py/sql-injection_9018e0e144333f42_28348b9b", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown...
2
true
[ "CWE-089", "CWE-089" ]
[ "py/sql-injection", "py/sql-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This SQL query depends on a [user-provided value](1).", "This SQL query depends on a [user-provided value](1)." ]
[ 37, 42 ]
[ null, null ]
[ 15, 15 ]
[ 71, 73 ]
2024-11-18T22:44:04.936048+00:00
1,630,626,361,000
688b01fd27cce4a2a8b15d90067eec319944971a
3
{ "blob_id": "688b01fd27cce4a2a8b15d90067eec319944971a", "branch_name": "refs/heads/main", "committer_date": 1630626361000, "content_id": "e57b3d333a23a5b4513684df59106d970fa4766c", "detected_licenses": [ "Apache-2.0" ], "directory_id": "749cc75e5bb13d4ecd4b8999414e015e64c3464d", "extension": "py", ...
2.84375
stackv2
import base64 import hmac import time class Sign(): def getSign(self,secret_key:str,msg:str) -> str: """ 生成鉴权签名串 """ msg_encoded = msg.encode() secret = str.encode(secret_key) sign = hmac.new(secret,msg_encoded,digestmod="sha256") sign = sign.hexdigest() sign...
28
31.29
90
16
234
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_b0114977d96be65c_29ab64ab", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 12 ]
[ null ]
[ 31 ]
[ 42 ]
2024-11-18T22:44:30.083390+00:00
1,489,592,039,000
ce22961c8488e15640ad6827e9e3a01d324ef0fb
2
{ "blob_id": "ce22961c8488e15640ad6827e9e3a01d324ef0fb", "branch_name": "refs/heads/master", "committer_date": 1489592039000, "content_id": "484a0b6960d71f42d9aa2415623146c327926934", "detected_licenses": [ "MIT" ], "directory_id": "543765bcdd02d1a1634faa434e6e41a62349301a", "extension": "py", "fi...
2.34375
stackv2
from flask import Flask, render_template, redirect, url_for, request, session, flash, jsonify, g import sqlite3 as sql import os import random import json from flask_sqlalchemy import SQLAlchemy import ast #To change string list to a python list import collections #To conte duplicate in iventory list using Counter() ...
383
24.18
109
19
2,725
python
[{"finding_id": "codeql_py/flask-debug_82ca425bbc640965_8e5eebad", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
6
true
[ "CWE-215", "CWE-079", "CWE-089", "CWE-089", "CWE-089", "CWE-089" ]
[ "py/flask-debug", "py/reflective-xss", "py/sql-injection", "py/sql-injection", "py/sql-injection", "py/sql-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1).", "This SQL query depends on a [user-provided value](1).", "This SQL query depends on a [user-provided value](1).", "T...
[ 383, 339, 287, 289, 293, 295 ]
[ null, null, null, null, null, null ]
[ 5, 9, 20, 20, 20, 20 ]
[ 39, 90, 71, 75, 71, 75 ]
2024-11-18T22:44:30.329289+00:00
1,413,972,615,000
3f733a267bef50992b04e1e09f2f193ddaaf97d5
3
{ "blob_id": "3f733a267bef50992b04e1e09f2f193ddaaf97d5", "branch_name": "refs/heads/master", "committer_date": 1413972615000, "content_id": "5b8053c9c76db20068767955003174f4824be431", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "368c1256a004cd6f0e17ce596cfe3310b473eabc", "extension": "p...
2.765625
stackv2
import os from flask import (Flask, request, send_from_directory, abort, jsonify, render_template) from werkzeug import secure_filename VERBOSE = True UPLOAD_FOLDER = 'static/uploads' # Folder where resources that are shared between all games are stored COMMONS_FOLDER = 'static/commons' JAVASCRIPT_F...
220
41
79
20
2,062
python
[{"finding_id": "codeql_py/path-injection_0d2e9dc457e24127_b63d5a46", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
7
true
[ "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2).\...
[ 92, 95, 98, 140, 175, 174, 195 ]
[ null, null, null, null, null, null, null ]
[ 43, 37, 31, 15, 40, 27, 32 ]
[ 56, 50, 41, 32, 43, 53, 35 ]
2024-11-18T22:44:41.844960+00:00
1,534,138,332,000
1cffffe1907d8808505d1b69195dee6f65a17110
3
{ "blob_id": "1cffffe1907d8808505d1b69195dee6f65a17110", "branch_name": "refs/heads/master", "committer_date": 1534138332000, "content_id": "1097a11c1dd27beda424e7d2ca22cf29d855e01f", "detected_licenses": [ "MIT" ], "directory_id": "c382b70131d13dd91b8c41a378f98ef4a1b8cdcb", "extension": "py", "fi...
2.984375
stackv2
import requests from bs4 import BeautifulSoup import json import pandas as pd term = "vr" # initialize list of links links = [] # get a list of links for channels while searching for a given term for i in range(0,200,10): r = requests.get("https://www.bing.com/search?q="+term+"%20site%3A%20https%3A%2F%2Fwww.yout...
69
34.12
135
15
652
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_901c8c4b79cd02cf_9ac04a85", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 43 ]
[ null ]
[ 11 ]
[ 20 ]
2024-11-18T20:59:37.880005+00:00
1,615,740,347,000
e6af3c560fa50d8755f92e5cef94786f01574207
2
{ "blob_id": "e6af3c560fa50d8755f92e5cef94786f01574207", "branch_name": "refs/heads/main", "committer_date": 1615740347000, "content_id": "5c80eb4f672aed147c590e053c624cb216381840", "detected_licenses": [ "MIT" ], "directory_id": "02fb46fbf913335673bd9100bf5e7b3de737cff6", "extension": "py", "file...
2.3125
stackv2
from flask import Flask, redirect, url_for, request, render_template, Response, stream_with_context import ancv_html_scraper as ancv import logging from logging.handlers import RotatingFileHandler from database.db import initialize_db, drop_db from database.models import Restaurants import json from pymongo import Mong...
102
31.97
102
16
798
python
[{"finding_id": "codeql_py/flask-debug_a04d6629c113f3be_8b03b777", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-117" ]
[ "py/flask-debug", "py/log-injection" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This log entry depends on a [user-provided value](1)." ]
[ 102, 20 ]
[ null, null ]
[ 5, 21 ]
[ 41, 62 ]
2024-11-18T20:59:42.932277+00:00
1,685,473,511,000
060fdf8bacb080b1c72d2d8d0599c5061f3f3a05
3
{ "blob_id": "060fdf8bacb080b1c72d2d8d0599c5061f3f3a05", "branch_name": "refs/heads/master", "committer_date": 1685473511000, "content_id": "2169cb247b10e6004ab10b2f34a35541c786b747", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "c650da6c4144f5090425f3bf87dcf6adf7fe53a2", "extension": "p...
3.140625
stackv2
import jinja2 def load_template(in_template): """ Returns a jinja2 template from file. Parameters --------- in_template: str path and name of jinja2 template Returns ------- output_template: jinja template object """ with open(in_template, 'r') as default: output_...
43
23.07
61
12
225
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_d8e70d1f87b999ac_c0ce6822", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 17 ]
[ null ]
[ 27 ]
[ 58 ]
2024-11-18T21:00:27.964575+00:00
1,644,515,547,000
453ac0531aa29da25d756840fbf8cce192f52a7b
2
{ "blob_id": "453ac0531aa29da25d756840fbf8cce192f52a7b", "branch_name": "refs/heads/master", "committer_date": 1644515547000, "content_id": "9dee8755eaeaeecd0f03a146c24137166b34e9bc", "detected_licenses": [ "MIT" ], "directory_id": "4f735598ec73cc2961c4a14bc2ed9dbda9d96b66", "extension": "py", "fi...
2.453125
stackv2
#! /usr/env/python # A wrapper class to run psrcat and generate the JSON dictionary with pulsar parameters import numpy as np import logging import json from jinja2 import Template import psrcatpy.params as params log = logging.getLogger('json_parser') class JSONParser: def __init__(self, params): ...
54
31.02
102
14
361
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_00768a706b3613a5_c8809c4d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 17 ]
[ 31 ]
[ 30 ]
[ 28 ]
2024-11-18T21:01:19.789321+00:00
1,577,998,348,000
f1173f86e7f5793ab752dc5a3f898d21dc02966a
3
{ "blob_id": "f1173f86e7f5793ab752dc5a3f898d21dc02966a", "branch_name": "refs/heads/master", "committer_date": 1577998348000, "content_id": "d740b143c670d2bc38d12bf1edfebb6bc12ba4ec", "detected_licenses": [ "MIT" ], "directory_id": "e880c6cef9d64071d73be8bd38c1daee71c4c62a", "extension": "py", "fi...
2.609375
stackv2
# _*_ coding: utf-8 _*_ from flask import Flask, request app = Flask(__name__) @app.route('/') def root(): parameter_dict = request.args.to_dict() if len(parameter_dict) == 0: return 'No parameter' parameters = '' for key in parameter_dict.keys(): parameters += 'key: {}, value: {}<br...
21
19.95
77
13
109
python
[{"finding_id": "codeql_py/reflective-xss_ac83484b5a5d0fb3_9c2cc1f1", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 16 ]
[ null ]
[ 12 ]
[ 22 ]
2024-11-18T21:01:24.381835+00:00
1,569,338,543,000
915a550f867940a3e42b23d73df947a1b970d86a
3
{ "blob_id": "915a550f867940a3e42b23d73df947a1b970d86a", "branch_name": "refs/heads/master", "committer_date": 1569338543000, "content_id": "e9f2ee02a763eb8dd9adba500b37d11a41d47ab4", "detected_licenses": [ "MIT" ], "directory_id": "9c6f1d756fc25972f2377636088833863f868895", "extension": "py", "fi...
2.515625
stackv2
#!/usr/bin/env python """\ Transform a DAWNet file into a Coala planner problem """ from __future__ import print_function import os import sys import logging import shutil from jinja2 import Environment, FileSystemLoader, TemplateNotFound from dawnet.parser import dawnet from dawnet import utils def get_configurati...
189
30.06
123
17
1,391
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_8ae2ecd1c057248c_d9bac574", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 100 ]
[ 104 ]
[ 7 ]
[ 24 ]
2024-11-18T21:01:34.125049+00:00
1,690,806,069,000
d2303ea261b67b9dd8ce574a643557cdabeab348
2
{ "blob_id": "d2303ea261b67b9dd8ce574a643557cdabeab348", "branch_name": "refs/heads/master", "committer_date": 1690806069000, "content_id": "1adb6783c07f107c786ea150e63ea24573951933", "detected_licenses": [ "MIT" ], "directory_id": "07e2f133cba3bdb91d03a1e84d080fc1bf0597c8", "extension": "py", "fi...
2.46875
stackv2
#!/usr/bin/env python3 from argparse import ArgumentParser from boto3 import client from jinja2 import Template parser = ArgumentParser(description='Hosts file generator') parser.add_argument('ec2_instance_name', metavar='NAME', type=str, help='EC2 instance name for filtering') args = parser.pars...
49
21.43
66
11
254
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_db6a5fb0ca8a7c5e_d9d30a3a", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 44 ]
[ null ]
[ 16 ]
[ 38 ]
2024-11-18T21:51:20.928578+00:00
1,609,169,007,000
6d48d7d4fd87c37a88b49ce637e83fde41b6fed7
3
{ "blob_id": "6d48d7d4fd87c37a88b49ce637e83fde41b6fed7", "branch_name": "refs/heads/master", "committer_date": 1609169007000, "content_id": "0a1b414f28c91066f8b523b72074d0cfe6b48f2a", "detected_licenses": [ "MIT" ], "directory_id": "b8aba2bb539c731591f86e17f1517861b2ccf218", "extension": "py", "fi...
2.5625
stackv2
# -*- coding: utf-8 -*- """Provider for SemanticScholar Author: G.J.J. van den Burg License: See LICENSE file Copyright: 2020, G.J.J. van den Burg """ import re import bs4 from ._base import Provider from ._info import Informer from ..exceptions import URLResolutionError from ..utils import get_page_with_retry c...
65
29.11
79
17
508
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_69e462516da05841_8eec91f1", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This string, which is used as a regular expression [here](1), has an unescaped '.' befor...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/incomplete-hostname-regexp", "py/incomplete-hostname-regexp" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This string, which is used as a regular expression [here](1), has an unescaped '.' before 'semanticscholar.org/paper/', so it might match more hosts than expected.", "This string, which is used as a regular expression [here](1), has an unescaped '.' before 'semanticscholar.org/', so it might match more hosts tha...
[ 31, 33 ]
[ null, null ]
[ 10, 15 ]
[ 79, 62 ]
2024-11-18T21:51:25.023190+00:00
1,544,683,938,000
7549bde66f6e80b0254417a00671dabdaffdc71d
2
{ "blob_id": "7549bde66f6e80b0254417a00671dabdaffdc71d", "branch_name": "refs/heads/master", "committer_date": 1544683938000, "content_id": "a7636307117f18d95268c11d9f0097700fee6b31", "detected_licenses": [ "MIT" ], "directory_id": "d881bff8fe2a0bccd2f7bfad8435d87c526f8deb", "extension": "py", "fi...
2.3125
stackv2
import logging import os import uuid import requests from bs4 import BeautifulSoup from flask import request, url_for, send_from_directory from werkzeug.utils import secure_filename from chatbrick_admin import app from chatbrick_admin.util.trans import allowed_file, as_json logger = logging.getLogger(__name__) @ap...
108
28.87
120
21
690
python
[{"finding_id": "codeql_py/full-ssrf_6a2ac3a8a52eee95_b1659e82", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
1
true
[ "CWE-918" ]
[ "py/full-ssrf" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1)." ]
[ 76 ]
[ 80 ]
[ 19 ]
[ 34 ]
2024-11-18T21:51:34.104685+00:00
1,358,431,115,000
58e61be6918ed23fdb67a4e54e9db65cde85bccd
3
{ "blob_id": "58e61be6918ed23fdb67a4e54e9db65cde85bccd", "branch_name": "refs/heads/master", "committer_date": 1358431115000, "content_id": "4b4b2f2a5cc5a21e823ed6ddc192cc2b1fb5bf1c", "detected_licenses": [ "BSD-2-Clause", "BSD-3-Clause" ], "directory_id": "e59fb40dac04bf19bf80d56dbe4c668b26b6a45c...
2.609375
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- """ ================= Threading Classes ================= :Author: Moritz Emanuel Beber :Date: 2011-02-26 :Copyright: Copyright(c) 2011 Jacobs University of Bremen. All rights reserved. :File: threaded.py Notes ----- Most classes (unless they inherit fro...
382
30.54
82
22
2,504
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_1383c19546b1ba96_14e03375", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/paramiko-missing-host-key-validation", "py/paramiko-missing-host-key-validation" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe.", "Setting missing host key policy to WarningPolicy may be unsafe." ]
[ 139, 141 ]
[ null, null ]
[ 13, 13 ]
[ 79, 79 ]
2024-11-18T21:51:34.753828+00:00
1,533,612,652,000
a5030706d96ef6c4cad114c6c833e376d2dff591
3
{ "blob_id": "a5030706d96ef6c4cad114c6c833e376d2dff591", "branch_name": "refs/heads/master", "committer_date": 1533612652000, "content_id": "7adbeae6006f612e50286297bdd4565d3cde2caf", "detected_licenses": [ "MIT" ], "directory_id": "48b749c0ddd1d212d99cca760d806f46e7ac4dfa", "extension": "py", "fi...
2.515625
stackv2
# 作者:Charles # 公众号:Charles的皮卡丘 # B站视频下载: # -https://www.bilibili.com/ import os import re import json import click import urllib import requests from contextlib import closing ''' Input: -url: 视频地址 -savepath: 视频下载后保存的路径 -app: 在cmd窗口运行还是在Demo中调用该类 Output: -返回下载响应码 ''' class bilibili(): def __init__(self): self...
104
31.73
137
24
1,125
python
[{"finding_id": "codeql_py/request-without-cert-validation_747568c0b91ec422_88390163", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 57, 70 ]
[ null, null ]
[ 17, 16 ]
[ 96, 95 ]
2024-11-18T22:00:18.914923+00:00
1,589,786,841,000
6172e5e6a0128e71aedd48b94586addaf39aed8c
3
{ "blob_id": "6172e5e6a0128e71aedd48b94586addaf39aed8c", "branch_name": "refs/heads/master", "committer_date": 1589786841000, "content_id": "47927970297f9b2f31788490b0369cdb8f418d1a", "detected_licenses": [ "MIT" ], "directory_id": "1ccfbd45ca8c8bd92f86d034c2f5bcf47ca42446", "extension": "py", "fi...
2.625
stackv2
import logging import requests logging.getLogger(__name__) def LogValue(sensorname, value, api_key, port, prtg_host, ssl): if ssl: url_scheme = 'https' else: url_scheme = 'http' json_response = { "prtg": { "result": [ { "channel": se...
29
29.28
109
15
206
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_cd6b4542004580da_ac463f73", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 27, 29 ]
[ null, null ]
[ 84, 43 ]
[ 96, 50 ]
2024-11-18T22:00:24.828523+00:00
1,628,346,675,000
5c2027356f4d1454eeca0b0531d5eb305a66452a
3
{ "blob_id": "5c2027356f4d1454eeca0b0531d5eb305a66452a", "branch_name": "refs/heads/main", "committer_date": 1628346675000, "content_id": "9197c16164aa6e3edfd594353c5d098f0b84e3d7", "detected_licenses": [ "MIT" ], "directory_id": "5c52e64424a57b1ddf8b3d09dc98ada658739e58", "extension": "py", "file...
3.25
stackv2
#!/usr/bin/env python """ 3a. Retrieve a list of all the devices in NetBox. This will require authentication. As in the previous task, create your headers manually and pass them into your request. In order to perform the NetBox authentication, you should do the following: import os # Set the token based on the NETB...
54
28.85
87
11
368
python
[{"finding_id": "codeql_py/request-without-cert-validation_c69605a47e55f0d5_d770f449", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 43 ]
[ null ]
[ 16 ]
[ 69 ]
2024-11-18T22:00:42.964713+00:00
1,600,543,945,000
b64b992a46060008393b5f4899eb3ebced0c5181
3
{ "blob_id": "b64b992a46060008393b5f4899eb3ebced0c5181", "branch_name": "refs/heads/master", "committer_date": 1600543945000, "content_id": "1ef5845783e4de7b5bc93c1c3b4293fe75272ee0", "detected_licenses": [ "CC0-1.0" ], "directory_id": "3eef24ef66cb09a06ef970973ee2071e3d4e97a6", "extension": "py", ...
3.25
stackv2
#PASSWORD GENRATER import os import random import time # PLAY WITH COLOURS #red='\033[1;91m' #green='\033[1;92m' yellow='\033[1;93m' #blue='\033[1;94m' #purple='\033[1;95m' #cyan='\033[1;96m' #white='\033[1;97m os.system('clear') os.system("echo") print("\...
43
36.4
83
12
707
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_797652f84048ed80_a1ffabcc", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 40 ]
[ null ]
[ 15 ]
[ 61 ]
2024-11-18T22:01:02.898272+00:00
1,491,788,169,000
0602343b1b2a330b62f089716fb57484f96cf12e
3
{ "blob_id": "0602343b1b2a330b62f089716fb57484f96cf12e", "branch_name": "refs/heads/master", "committer_date": 1491788169000, "content_id": "fecf40ffb7162321db2f663b189a644d5faf027e", "detected_licenses": [ "MIT" ], "directory_id": "4311879e41437fe0d296816029ce41bf4e993344", "extension": "py", "fi...
2.75
stackv2
import re import sys import argparse import PIL import jieba import requests import numpy as np from lxml import html from wordcloud import WordCloud def read_stopwords(file_path): stopwords = set() with open(file_path, 'rb') as fp: for line in fp.readlines(): if not line.strip(): ...
99
34.83
127
15
879
python
[{"finding_id": "codeql_py/bad-tag-filter_d14f37465356fcb9_79926de7", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression does not match script end tags like </script >.", "remediation": "", "location": {"file_...
1
true
[ "CWE-116" ]
[ "py/bad-tag-filter" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression does not match script end tags like </script >." ]
[ 26 ]
[ null ]
[ 28 ]
[ 51 ]
2024-11-18T22:15:09.643567+00:00
1,570,306,531,000
936a7da85e40a6a0e3430d8d61e39e6f17150800
2
{ "blob_id": "936a7da85e40a6a0e3430d8d61e39e6f17150800", "branch_name": "refs/heads/master", "committer_date": 1570306531000, "content_id": "cee62df09a2b6787bc06e3e1adb4e55fafdcb9c5", "detected_licenses": [ "MIT" ], "directory_id": "e08479988afde2def82290b85d7ef3dfb4a1f3cc", "extension": "py", "fi...
2.328125
stackv2
from docx import Document from wordweaver.data import affix_data, pronoun_data, verb_data from wordweaver import buildtools import os from time import time import jinja2 import re from pylatexenc.latexencode import utf8tolatex from wordweaver.config import BUILD_CONFIG, LANG_CONFIG class FileMaker: '''Takes conju...
194
39.58
111
24
1,690
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_1eada1151bd81406_5efa15a7", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 147 ]
[ 160 ]
[ 30 ]
[ 10 ]
2024-11-18T22:25:57.408634+00:00
1,505,130,121,000
3e79dd5368d962e1e004fc9ec3b698a04dbb9eb8
3
{ "blob_id": "3e79dd5368d962e1e004fc9ec3b698a04dbb9eb8", "branch_name": "refs/heads/master", "committer_date": 1505130121000, "content_id": "55957b9aedab2c2b555afc1ee001d9e45a9a8489", "detected_licenses": [ "Apache-2.0" ], "directory_id": "173b6327e1be549caf257812775176e9f5e2d198", "extension": "py"...
2.984375
stackv2
#!/usr/bin/env python import logging.handlers import os import json API_KEY = '' LONG_LAT = '26.2172,50.1971' PATH = "temp.log" handler = logging.handlers.WatchedFileHandler( os.environ.get("LOGFILE", PATH)) formatter = logging.Formatter(logging.BASIC_FORMAT) handler.setFormatter(formatter) root = logging.getLogg...
77
22.34
101
13
513
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ad61d20dc14cc5e6_61d858ff", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 40 ]
[ null ]
[ 14 ]
[ 50 ]
2024-11-18T22:26:00.574453+00:00
1,588,596,782,000
51098889a8dfc5a2ebf7e87ff8175e4fba0e94fd
3
{ "blob_id": "51098889a8dfc5a2ebf7e87ff8175e4fba0e94fd", "branch_name": "refs/heads/master", "committer_date": 1588596782000, "content_id": "11246593f2bcb14e31b4d1f560f29f3487e8b934", "detected_licenses": [ "MIT" ], "directory_id": "28598b1a77a0886d17a2a278af4214da06cb1ce2", "extension": "py", "fi...
2.78125
stackv2
from flask import Flask from datetime import datetime import requests import time import redis app = Flask(__name__) @app.route('/collect') def collect(): try: start = datetime.utcnow() redis_host = "redis-service" redis_port = 6379 channel_a = 'app-a' channel_b = ...
73
25.1
89
16
458
python
[{"finding_id": "codeql_py/stack-trace-exposure_03939e6cf1f1c2cd_e5814db5", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-215" ]
[ "py/stack-trace-exposure", "py/flask-debug" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger." ]
[ 59, 73 ]
[ null, null ]
[ 16, 5 ]
[ 71, 51 ]
2024-11-18T22:26:18.113327+00:00
1,592,993,122,000
3e1352fd7f25294345a2794c8da32d13ccd18bbb
2
{ "blob_id": "3e1352fd7f25294345a2794c8da32d13ccd18bbb", "branch_name": "refs/heads/master", "committer_date": 1592993122000, "content_id": "151b7290fb91d7e9eff86c8c525627697198269d", "detected_licenses": [ "MIT" ], "directory_id": "c657052e2dab3385d5aba26cf9f0ed1f32882aa8", "extension": "py", "fi...
2.421875
stackv2
#!/usr/bin/python -u # $Id$ # based on: # http://googleonlinesecurity.blogspot.com/2011/04/improving-ssl-certificate-security.html from OpenSSL.SSL import WantReadError as SSL_WantReadError,SysCallError as SSL_SysCallError,Context as SSL_Context,SSLv23_METHOD,Connection as SSL_Connection from sys import stdin, stdou...
69
24.71
157
17
503
python
[{"finding_id": "codeql_py/insecure-protocol_0adf4c27bd55977c_5c700313", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version SSLv2 allowed by [call to SSL_Context](1).\nInsecure SSL/TLS protocol ve...
1
true
[ "CWE-327" ]
[ "py/insecure-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Insecure SSL/TLS protocol version SSLv2 allowed by [call to SSL_Context](1).\nInsecure SSL/TLS protocol version SSLv3 allowed by [call to SSL_Context](1).\nInsecure SSL/TLS protocol version TLSv1 allowed by [call to SSL_Context](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to SSL_Context](1)." ]
[ 39 ]
[ null ]
[ 26 ]
[ 29 ]
2024-11-18T22:26:24.846737+00:00
1,572,049,430,000
a15b9a7ada71ce532b3eceb9d7ca8bab8268e455
3
{ "blob_id": "a15b9a7ada71ce532b3eceb9d7ca8bab8268e455", "branch_name": "refs/heads/master", "committer_date": 1572049430000, "content_id": "e7d852e55f91ea54eb7afe5568b388e71d4184d9", "detected_licenses": [ "Unlicense" ], "directory_id": "05e8491dd76c0c2df09beb0bc83feb9eead37bad", "extension": "py",...
2.75
stackv2
from http.server import BaseHTTPRequestHandler import urllib.request import urllib.parse from typing import Any, List class MutatorHandler(BaseHTTPRequestHandler): def __init__( self, target_url: str, mutators: List[Any], *args: Any, **kwargs: Any ) -> None: self.target...
44
29.14
63
15
289
python
[{"finding_id": "codeql_py/full-ssrf_d99cc8b1b1a50642_4d227297", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
1
true
[ "CWE-918" ]
[ "py/full-ssrf" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1)." ]
[ 25 ]
[ null ]
[ 20 ]
[ 47 ]
2024-11-18T20:39:41.003484+00:00
1,634,301,668,000
69d90ca011f029b09b56d01de45d8a028ba849d8
2
{ "blob_id": "69d90ca011f029b09b56d01de45d8a028ba849d8", "branch_name": "refs/heads/master", "committer_date": 1634301668000, "content_id": "2ed6dce8c4bb2681005cc34685fb619b9018922d", "detected_licenses": [ "MIT" ], "directory_id": "94a1a22916e43b0a6dcbff8e113a8633de3e4b8c", "extension": "py", "fi...
2.453125
stackv2
''' May 2020 by Sebastiano Barbieri s.barbieri@unsw.edu.au https://www.github.com/sebbarb/ ''' import sys sys.path.append('../lib/') import feather import pandas as pd import numpy as np import pickle as pkl from hyperparameters import Hyperparameters from sklearn.model_selection import train_test_split from deep_sur...
116
41.64
146
15
1,265
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e1a21f101ca6013d_83bcc4a2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 29 ]
[ null ]
[ 15 ]
[ 45 ]
2024-11-18T21:08:16.374502+00:00
1,508,157,103,000
997b65fee0d31b171bedebac07af6227493823a5
3
{ "blob_id": "997b65fee0d31b171bedebac07af6227493823a5", "branch_name": "refs/heads/master", "committer_date": 1508157103000, "content_id": "c210d8384b8f20ac8b37598c282f8988b1aa108a", "detected_licenses": [ "MIT" ], "directory_id": "3edef1c14c878e927a2c82af9e2e346a6c8d0b6b", "extension": "py", "fi...
3.015625
stackv2
"""module for a emoji based tokenizer""" import re from typing import Iterable, Optional, Any, Dict import numpy as np from sklearn.base import TransformerMixin from . import output, TOutputType, TOutput class EmojiTransformer(TransformerMixin): # match signatures, pylint: disable=unused-argument """extrac...
52
36.17
120
12
485
python
[{"finding_id": "codeql_py/overly-large-range_4b5bffdd6bf2f4c7_e58b776a", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "remediatio...
3
true
[ "CWE-020", "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class." ]
[ 16, 16, 16 ]
[ null, null, null ]
[ 34, 37, 40 ]
[ 38, 41, 44 ]
2024-11-18T21:32:10.493269+00:00
1,603,463,951,000
6ff4aff5811d2bd7ad150d7e8f925308d120ef74
2
{ "blob_id": "6ff4aff5811d2bd7ad150d7e8f925308d120ef74", "branch_name": "refs/heads/main", "committer_date": 1603463951000, "content_id": "d23c2f3ae66ba2377788338e9eb511b691edbcc9", "detected_licenses": [ "MIT" ], "directory_id": "5b6a70756f15b11cf7b5a2180e63fe15f3cad54d", "extension": "py", "file...
2.359375
stackv2
# Imports import os from flask import Flask, redirect, render_template, url_for, request, flash from flask_login import LoginManager, login_user, logout_user, login_required, current_user # Import - Database from flask_sqlalchemy import SQLAlchemy # Import - Models from werkzeug.security import generate_password_hash...
279
30.01
141
18
1,905
python
[{"finding_id": "codeql_py/url-redirection_d1584ff13a24b27d_66b9ee3d", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 264 ]
[ null ]
[ 29 ]
[ 33 ]
2024-11-18T21:32:20.207546+00:00
1,609,431,810,000
850d895b67b9a3db91537499250633593512e2a5
3
{ "blob_id": "850d895b67b9a3db91537499250633593512e2a5", "branch_name": "refs/heads/main", "committer_date": 1609431810000, "content_id": "368118c5eae8c7fa75d1339b7ad1f4760eb25f19", "detected_licenses": [ "MIT" ], "directory_id": "e25866922e6d6b417b6d919aa23e1b817dc22bb9", "extension": "py", "file...
2.765625
stackv2
#!/usr/bin/env python import socket,sys,re if len(sys.argv) != 3: print("How to Use: python bruteftp.py 127.0.0.1 username") sys.exit(1) target = sys.argv[1] username = str(sys.argv[2]).strip() f = open('wordlists.txt') for password in f.readlines(): print("Starting the Brute Force Attack: {}|{}".format(usern...
32
23.62
75
11
241
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3ecce75dab6a5f9c_9dbec234", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 14, 29 ]
[ null, null ]
[ 9, 11 ]
[ 75, 44 ]
2024-11-18T21:32:24.564986+00:00
1,545,029,980,000
f234766ad54ca093239563d8406c4878c67eeb6d
3
{ "blob_id": "f234766ad54ca093239563d8406c4878c67eeb6d", "branch_name": "refs/heads/master", "committer_date": 1545031146000, "content_id": "cef1c4fc5bc196c081ef903d52312b01fffab4ac", "detected_licenses": [ "MIT" ], "directory_id": "7a26bc073d2eacd158f97e7cb6d804d35346f805", "extension": "py", "fi...
2.671875
stackv2
#!/usr/bin/env python3 import requests import urllib3 from requests.exceptions import ConnectionError, ConnectTimeout, ReadTimeout from gevent.pool import Pool from gevent import monkey from jackal import Credential, Logger, ServiceSearch from jackal.utils import print_error, print_notification, print_success from Open...
70
32.34
140
15
501
python
[{"finding_id": "codeql_py/request-without-cert-validation_0c8b7f180fd6c320_7252ac9e", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 35 ]
[ null ]
[ 22 ]
[ 115 ]
2024-11-18T21:32:44.291472+00:00
1,469,741,298,000
901d5fb4032d407c73bc313367376de52d946438
3
{ "blob_id": "901d5fb4032d407c73bc313367376de52d946438", "branch_name": "refs/heads/master", "committer_date": 1469741298000, "content_id": "b508326154cc64d34c6e62deab79839bbfe775cb", "detected_licenses": [ "MIT" ], "directory_id": "d30df79b21ad1897f2da7af997897733110bafb0", "extension": "py", "fi...
3.171875
stackv2
import smtplib # as you can see -_- declaring the SMTP Library smtpserver = smtplib.SMTP("smtp.gmail.com", 587) #SMTP Server Configs Just Follow the instructions of README.md for more informations smtpserver.ehlo() smtpserver.starttls() user = input("Enter the target's email address: ") passwfile = input("Enter the ...
19
45.05
170
12
212
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e18f9dae780b9024_6153c6c1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 15, 19 ]
[ null, null ]
[ 15, 15 ]
[ 50, 54 ]
2024-11-18T21:33:08.539804+00:00
1,604,775,741,000
22a6650483bb1f37e6cc5f7d67128f7a2560a74f
2
{ "blob_id": "22a6650483bb1f37e6cc5f7d67128f7a2560a74f", "branch_name": "refs/heads/main", "committer_date": 1604775741000, "content_id": "a79cdc0e1ee70959d5f3ba8a2a6d692525110064", "detected_licenses": [ "MIT" ], "directory_id": "04ed7a81c0188e1f4a6de34003a4cc7583edf9b4", "extension": "py", "file...
2.328125
stackv2
import urllib3 import logging import json from decouple import config import decouple import sys import time # TODO: SSDP instead of polling outside for the hue bridge ip logging.captureWarnings(True) http = urllib3.PoolManager(cert_reqs='CERT_NONE', assert_hostname=False) def hue_request_username(bridge_ip, ident...
226
30.11
123
17
1,827
python
[{"finding_id": "codeql_py/request-without-cert-validation_04f0965e784c3368_2a08ef42", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
10
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation"...
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).\nThis request may run without certificate validation because [it is disabled](2).", "This request may run without certificate validation because [it is disabled](1).\nThis request may run without certificate validation because [it i...
[ 21, 42, 51, 79, 88, 96, 101, 110, 118, 142 ]
[ 25, null, 53, 80, 91, 97, 104, 111, 121, 145 ]
[ 9, 9, 9, 9, 13, 9, 9, 9, 17, 17 ]
[ 54, 47, 28, 20, 58, 20, 54, 20, 62, 62 ]
2024-11-18T21:49:22.970082+00:00
1,624,018,682,000
505b99c711e0f8f0c3a884c7e92226ae4c297f95
3
{ "blob_id": "505b99c711e0f8f0c3a884c7e92226ae4c297f95", "branch_name": "refs/heads/main", "committer_date": 1624018682000, "content_id": "36ed16d78599d587a90a37b61237c0e9160bd183", "detected_licenses": [ "MIT" ], "directory_id": "315d2088fb2e1540cc14d749ba633f4b7fe82e9e", "extension": "py", "file...
3.078125
stackv2
import utils from site_parser import Parser from utils_objects import Thread, Site import requests from bs4 import BeautifulSoup from question import * from answer import * class SOFParser(Parser): site = Site.SOF site_url = site.value.url def parse_links(self, links) -> Thread: """ A gen...
94
35.12
100
17
699
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_fdb4a141b41dc47b_4f4d3fe0", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [stackoverflow.com](1) may be at an arbitrary position ...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [stackoverflow.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 47 ]
[ null ]
[ 16 ]
[ 43 ]
2024-11-18T20:31:24.536253+00:00
1,693,816,756,000
d27dd578c6dece9f1b68a5f5b7503670d743e2a0
3
{ "blob_id": "d27dd578c6dece9f1b68a5f5b7503670d743e2a0", "branch_name": "refs/heads/master", "committer_date": 1693816756000, "content_id": "2e99c46eaed5dec7d4f737bb4e1bb9a5578dd856", "detected_licenses": [ "MIT" ], "directory_id": "a9f63a0746de04b87979107995c94ef46d054f5b", "extension": "py", "fi...
2.578125
stackv2
"""Family members' roles with respect to the proband.""" import logging from collections import defaultdict from dae.variants.attributes import Role, Status, Sex from dae.pedigrees.family import Person logger = logging.getLogger(__name__) class Mating: """Class to represent a mating unit.""" def __init_...
262
38.47
78
17
2,257
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_414e0289d36e694e_23760e98", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 73 ]
[ null ]
[ 42 ]
[ 46 ]
2024-11-18T20:31:24.865768+00:00
1,572,507,736,000
691f40daabf882e48912580e50812b1c1ef21990
3
{ "blob_id": "691f40daabf882e48912580e50812b1c1ef21990", "branch_name": "refs/heads/master", "committer_date": 1572507736000, "content_id": "2905eda31be8d4bef0bc4173698c7529666d0938", "detected_licenses": [ "MIT" ], "directory_id": "d62a8e38a5208ccfc7c902766c7c5f3637f153d7", "extension": "py", "fi...
2.640625
stackv2
from flask import Blueprint, request, jsonify, render_template from file_processing import read_file lesson_6 = Blueprint('lesson_6', __name__) @lesson_6.route('/get_file_content_based_on_request') def get_file_content_based_on_request(): request_type = request.content_type f = read_file() if (request_type == ...
21
27.9
62
12
146
python
[{"finding_id": "codeql_py/reflective-xss_a00f5760ee3c3ad6_46c53f20", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 21 ]
[ null ]
[ 12 ]
[ 61 ]
2024-11-18T20:31:25.934295+00:00
1,488,282,147,000
4c0a2d7edbbbcf6501403487cd09d39b3906f25d
2
{ "blob_id": "4c0a2d7edbbbcf6501403487cd09d39b3906f25d", "branch_name": "refs/heads/master", "committer_date": 1488282147000, "content_id": "4e6a626e9fd8b011dccccd24eb937a6aaea5b80d", "detected_licenses": [ "Apache-2.0" ], "directory_id": "a7fda7aabaf63cbfb766b05716970cf8bcdc0163", "extension": "py"...
2.40625
stackv2
# -*- coding: utf-8 -*- """Devoted to services which use web hooks. Plugins are identified via the path being hit, which then delegates to the plugin to process. """ from flask import Flask from flask import request import threading import logging as log app = Flask("NebHookServer") class NebHookServer(threading.Th...
58
29.45
80
14
394
python
[{"finding_id": "codeql_py/log-injection_2fd2f72f4363276a_e8d2e450", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
1
true
[ "CWE-117" ]
[ "py/log-injection" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1)." ]
[ 32 ]
[ null ]
[ 28 ]
[ 47 ]
2024-11-18T20:53:29.745668+00:00
1,576,828,376,000
737b292f45388e1b276f861d13d8a40b5a3cd01b
2
{ "blob_id": "737b292f45388e1b276f861d13d8a40b5a3cd01b", "branch_name": "refs/heads/master", "committer_date": 1576828376000, "content_id": "665a137e4857d3cdedd3ef756b216e621c9439e8", "detected_licenses": [ "MIT" ], "directory_id": "cf7a1a32ed20d6877317fb39d8b2590a7788cff2", "extension": "py", "fi...
2.46875
stackv2
# Copyright 2015, Gil Levi and Tal Hassner # # The SOFTWARE provided in this page is provided "as is", without any guarantee made as to its suitability or fitness for any particular use. # It may contain bugs, so use of this tool is at your own risk. We take no responsibility for any damage of any sort that may uninte...
188
39.03
141
19
1,892
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_57e7da83303eb9e2_697fc09f", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.", "This expression stores [sensitive data (private)](1) as clear text." ]
[ 108, 170 ]
[ null, null ]
[ 35, 31 ]
[ 36, 32 ]
2024-11-18T21:10:00.411236+00:00
1,534,921,701,000
f28f0993d7b84fec80b05c82a2b184a95bb82164
2
{ "blob_id": "f28f0993d7b84fec80b05c82a2b184a95bb82164", "branch_name": "refs/heads/master", "committer_date": 1534921701000, "content_id": "3aeed79e426398526b697915e1abb8c812d8d3ee", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e042cdc2b30b3539a66aecede8ead2e63539ad2d", "extension": "py"...
2.34375
stackv2
import argparse import socket import time import re from . import utils PORT = 27431 s = socket.socket(socket.AF_INET, socket.SOCK_DGRAM) s.setsockopt(socket.SOL_SOCKET, socket.SO_BROADCAST, 1) s.settimeout(3) device_list = {} class KonekeDevice(object): def __init__(self, ip, mac, password, device): ...
220
25.79
95
17
1,463
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4cdc56534f668700_6404053e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 173 ]
[ null ]
[ 11 ]
[ 68 ]
2024-11-18T21:46:34.479879+00:00
1,630,511,447,000
73f59d5d63bd715b35961d107dd413631fe28f8b
2
{ "blob_id": "73f59d5d63bd715b35961d107dd413631fe28f8b", "branch_name": "refs/heads/main", "committer_date": 1630511447000, "content_id": "dd371f68923bd9ecf8477970d190625f0225b0cd", "detected_licenses": [ "MIT" ], "directory_id": "a55d3e20f3f0b28a77b8dd7fa3d239ec211dbc76", "extension": "py", "file...
2.34375
stackv2
# /usr/bin/python3 from selenium.webdriver.support import expected_conditions as EC from selenium.webdriver.common.by import By from selenium.webdriver.support.wait import WebDriverWait from selenium.common.exceptions import NoSuchElementException from selenium import webdriver import time import random import string f...
164
49.98
178
17
1,948
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_6a073a5cd58fb438_1dc6c4d7", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 150, 67 ]
[ null, null ]
[ 30, 24 ]
[ 64, 67 ]
2024-11-18T22:28:47.682387+00:00
1,610,384,751,000
35124d0a6cfc847fe9b8c0790f9c67a66626df1a
3
{ "blob_id": "35124d0a6cfc847fe9b8c0790f9c67a66626df1a", "branch_name": "refs/heads/main", "committer_date": 1610384751000, "content_id": "98a5fdff6acd9abf9ef1a0074d9c786c8d73a136", "detected_licenses": [ "MIT" ], "directory_id": "abdcbfb69594c40e5e5c5ccb8667f2a49125ee53", "extension": "py", "file...
2.875
stackv2
import smtplib, ssl import json import pandas as pd def sendEmail(receiver_email): sender_email = "socialeyalerts@gmail.com" message = """\ Subject: Hi there This message is sent from Python.""" from email.mime.text import MIMEText from email.mime.multipart import MIMEMultipart message ...
93
25.14
74
12
597
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_534d7cb1e3ec3ff5_99e0959d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 81 ]
[ null ]
[ 19 ]
[ 60 ]
2024-11-18T22:29:19.207485+00:00
1,445,880,322,000
fc2e46a0105c062f077c85653c9273bba1bf3d52
2
{ "blob_id": "fc2e46a0105c062f077c85653c9273bba1bf3d52", "branch_name": "refs/heads/master", "committer_date": 1445880365000, "content_id": "a6abc720b41b29e53599d91260b0e4a468d2d2fb", "detected_licenses": [ "MIT" ], "directory_id": "c43f202dcbf35e37177916bfcc82ab047078be9c", "extension": "py", "fi...
2.390625
stackv2
import jinja2 from .config import blog_config as config from .constants import * # noqa template_loader = jinja2.PackageLoader( APPLICATION_NAME, TEMPLATE_DIR) if config.TEMPLATE_DIR is not None: template_loader = jinja2.ChoiceLoader([ jinja2.FileSystemLoader(config.TEMPLATE_DIR), templ...
25
24.76
54
12
141
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_a8ae86c32b79e7b8_3fac145c", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 15 ]
[ null ]
[ 7 ]
[ 49 ]
2024-11-18T22:29:32.071366+00:00
1,406,178,961,000
04991b1513710fa3a610d7b70f1f5f866536519b
3
{ "blob_id": "04991b1513710fa3a610d7b70f1f5f866536519b", "branch_name": "refs/heads/master", "committer_date": 1406178961000, "content_id": "2979bc7b09d5d9be7863bc04be3ad78927865a15", "detected_licenses": [ "Apache-2.0" ], "directory_id": "7b3c3e42617cb7458f37d31684abb1e924b84430", "extension": "py"...
2.546875
stackv2
#!/usr/bin/env python # # Generate method and test skeletons from Redis command documentation. from __future__ import print_function import argparse import json import sys import jinja2 GROUPS = [ 'connection', 'generic', 'hash', 'hyperloglog', 'list', 'pubsub', 'scripting', 'server'...
85
24.61
138
14
525
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_4c9b051023a07ead_f3d48a7b", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 73 ]
[ null ]
[ 16 ]
[ 53 ]
2024-11-18T22:29:37.542884+00:00
1,577,998,348,000
5bd0cbaa936dfa42ed60adf98ca09a0f16021563
3
{ "blob_id": "5bd0cbaa936dfa42ed60adf98ca09a0f16021563", "branch_name": "refs/heads/master", "committer_date": 1577998348000, "content_id": "ec3dc28530fe4924d20c0daed2348023f8fb6f20", "detected_licenses": [ "MIT" ], "directory_id": "e880c6cef9d64071d73be8bd38c1daee71c4c62a", "extension": "py", "fi...
2.734375
stackv2
# _*_ coding: utf-8 _*_ from flask import Flask, request import json import requests app = Flask(__name__) @app.route('/') def root(): return 'welcome to flask' @app.route('/handle_post', methods=['POST']) def handle_post(): params = json.loads(request.get_data(), encoding='utf-8') if len(params) == 0:...
39
20.05
85
12
226
python
[{"finding_id": "codeql_py/reflective-xss_57e2e15abb413433_b3283804", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 23 ]
[ null ]
[ 12 ]
[ 22 ]
2024-11-18T22:29:40.646441+00:00
1,650,667,996,000
25d3dee84d679005e3064c3b21deeb67d60d3c76
3
{ "blob_id": "25d3dee84d679005e3064c3b21deeb67d60d3c76", "branch_name": "refs/heads/master", "committer_date": 1650667996000, "content_id": "aa8efcf0f3bfbdb891c71b7806a0093d556659a6", "detected_licenses": [ "MIT" ], "directory_id": "442fd46c2647d4988d409563d50a841fc1cdf259", "extension": "py", "fi...
2.75
stackv2
#!/usr/bin/env python import csv import json import logging import os from collections import defaultdict from html.parser import HTMLParser from pathlib import Path from typing import DefaultDict, Dict, List, Optional, Sequence, Tuple import click from jinja2 import Template class HTMLCounter(HTMLParser): def _...
125
29.46
91
20
884
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_e48620240569283c_936ac9be", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 27 ]
[ null ]
[ 16 ]
[ 43 ]
2024-11-18T22:40:27.380598+00:00
1,519,319,016,000
63e58c77c9dad71118a1adc208d0040def8c04c8
3
{ "blob_id": "63e58c77c9dad71118a1adc208d0040def8c04c8", "branch_name": "refs/heads/master", "committer_date": 1519319016000, "content_id": "9d05cd21aacc7f8bda1b4d56e68ecc8ffb049394", "detected_licenses": [ "MIT" ], "directory_id": "d73b114c49d8b6d1e5044d5643cc0ef9777638a7", "extension": "py", "fi...
3.453125
stackv2
"""Generate a weather-report based on the user's location. The script uses GeoIP to determine the user's location based on the IP and retrieves the weather, which is then returned it in a english sentence. """ # Native libraries/modules import json import sys import requests # External libraries/modules from user_lo...
162
33.59
94
16
1,341
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ff89e62b56f65618_2109d96b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 162 ]
[ null ]
[ 15 ]
[ 43 ]
2024-11-18T22:40:34.132025+00:00
1,482,084,640,000
4400e8edc5c4829b186f58e40542a4165d9caff5
3
{ "blob_id": "4400e8edc5c4829b186f58e40542a4165d9caff5", "branch_name": "refs/heads/master", "committer_date": 1482084640000, "content_id": "c91124d39f62aff2ae7a5cadf45a7129db657d16", "detected_licenses": [ "MIT" ], "directory_id": "57008b78058872d56cf9a984c36fdf7b4ed81646", "extension": "py", "fi...
3.15625
stackv2
class UserAccount: def __init__(self , user_name , user_password , user_secret): self.name=user_name self.password=user_password self.secret=user_secret def print_my_name(self): print(self.name) def forgot_password(self, secret_try): if self.secret == secret_try: ...
24
25.75
74
13
156
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f40d851400ac2927_d2f97311", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 21 ]
[ null ]
[ 7 ]
[ 53 ]
2024-11-18T22:40:36.599652+00:00
1,493,218,609,000
117398653012ff42a799209d25197120f9ca8e0c
2
{ "blob_id": "117398653012ff42a799209d25197120f9ca8e0c", "branch_name": "refs/heads/master", "committer_date": 1493218609000, "content_id": "105ebca2124b4d8e25d720328aa2a0e9be7b3d5f", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "7e53b38e8f969c9f7898feb59088665f9dfa6b76", "extension": "p...
2.421875
stackv2
import jinja2 import os import imp import requests import time from .logger import Logger from .config import Config from .discovery import Discovery from .store import Store __all__ = ['Apps'] class Apps: """ Public Apps object ================================================== format app config: ...
191
35.04
108
26
1,457
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_28057e7ffd624ddf_4f23beb0", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 88 ]
[ null ]
[ 28 ]
[ 49 ]
2024-11-18T22:41:23.125569+00:00
1,597,007,165,000
91838efaac0c230a9c9c3bdab97875f7d3368b9e
2
{ "blob_id": "91838efaac0c230a9c9c3bdab97875f7d3368b9e", "branch_name": "refs/heads/master", "committer_date": 1597007165000, "content_id": "4abf3e5b4afdc74c55ba2a6c8e67e68850f1bc96", "detected_licenses": [ "MIT" ], "directory_id": "f097648f708e8d37580120fcfbf53fc37c7dd89e", "extension": "py", "fi...
2.375
stackv2
import requests import requests_cache from flask import Flask from flask import request from flask import Response from flask import abort import dateparser from urllib.parse import urlparse from urllib.parse import quote_plus import re from feedgen.feed import FeedGenerator from lxml.html import fromstring import jso...
142
27.95
105
19
1,010
python
[{"finding_id": "codeql_py/flask-debug_21537606d5d2dca7_499f6534", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-918" ]
[ "py/flask-debug", "py/full-ssrf" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "The full URL of this request depends on a [user-provided value](1).\nThe full URL of this request depends on a [user-provided value](1)." ]
[ 142, 56 ]
[ null, 58 ]
[ 5, 12 ]
[ 51, 7 ]
2024-11-18T22:54:14.621782+00:00
1,500,297,463,000
ae7883e946cdaf251a4f72e3001ca3d9f5973b2d
2
{ "blob_id": "ae7883e946cdaf251a4f72e3001ca3d9f5973b2d", "branch_name": "refs/heads/master", "committer_date": 1500297463000, "content_id": "9d50055b7a73579e5cfca3c4dbf5fb9319d327b8", "detected_licenses": [ "MIT" ], "directory_id": "739d589e7de18f10b688592ac5edb30ac5f30d13", "extension": "py", "fi...
2.40625
stackv2
"""UserResourceCleanupFunction Clears out user-specific resources on stack deletion. """ from __future__ import print_function import json import boto3 import botocore import cfnresponse cognito_identity_client = boto3.client("cognito-identity") cognito_sync_client = boto3.client("cognito-sync") apig_client = boto...
95
33.31
87
20
592
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bba06ec3959f4a31_614106f7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 50 ]
[ 53 ]
[ 27 ]
[ 22 ]
2024-11-18T22:54:21.891179+00:00
1,559,133,183,000
96c950aaba515e1126e6d7ddebf202a82b8e3f2e
3
{ "blob_id": "96c950aaba515e1126e6d7ddebf202a82b8e3f2e", "branch_name": "refs/heads/master", "committer_date": 1559133183000, "content_id": "aa1dc22b9e53e7acabb59fe0f6be71824ddbde94", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "fc2045fe1946af373b2ca8ae9d4fd6528a49e2c1", "extension": "p...
2.828125
stackv2
# -*- coding: utf-8 -*- import rsa import logging logger = logging.getLogger(__file__) class RSAKey: def __init__(self, key = None, size = 1024, tuple = None): if key: self.key = key elif tuple: e, n = tuple self.key = rsa.PublicKey(n, e) else: ...
43
27.88
68
14
333
python
[{"finding_id": "codeql_py/weak-crypto-key_880d83371ab41a18_6b7e509b", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",...
1
true
[ "CWE-326" ]
[ "py/weak-crypto-key" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable." ]
[ 15 ]
[ null ]
[ 27 ]
[ 44 ]
2024-11-18T22:54:29.389940+00:00
1,604,871,632,000
2e681f9ed6fc9c05206f5143500b3ecb609918dc
3
{ "blob_id": "2e681f9ed6fc9c05206f5143500b3ecb609918dc", "branch_name": "refs/heads/master", "committer_date": 1604871712000, "content_id": "924fcea4028560b2cf0cfc02268c365b2d365b62", "detected_licenses": [ "MIT" ], "directory_id": "79034d579810e658feab753517cd28d948257f01", "extension": "py", "fi...
2.734375
stackv2
from app import app from data.names import names from flask import json, jsonify, redirect, render_template, request from scripts.levenshtein import levenshtein3 import urllib2 @app.route('/<myname>') @app.route('/<myname>/') def myname(myname): for rd in names: rd['l2'] = levenshtein3(myname.lower(),rd...
35
21.94
70
15
204
python
[{"finding_id": "codeql_py/url-redirection_b29d638f9e46cd40_6c5e1071", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 30 ]
[ null ]
[ 21 ]
[ 34 ]
2024-11-18T20:54:59.737908+00:00
1,604,282,519,000
4fa80cc32e6120ae49806d3eb0c7bfca2d3f09c2
3
{ "blob_id": "4fa80cc32e6120ae49806d3eb0c7bfca2d3f09c2", "branch_name": "refs/heads/master", "committer_date": 1604282519000, "content_id": "c5f338f5e193e2fc955d0613202f27b5f0de8ff3", "detected_licenses": [ "MIT" ], "directory_id": "55f2a837a7a75d25d6af14106616e6107d67703b", "extension": "py", "fi...
3.375
stackv2
import datetime current_date = datetime.date.today().strftime('%Y-%m-%d') current_date_lst = current_date.split('-') bday_log = [ ('Ayushi', ('1999', '10', '19')), ('Yash', ('1999', '04', '21')), ] add = input('To add birthday type y:').strip().lower() if add[:1] == 'y': new = input('Add birthday in format yy...
28
34.57
137
13
334
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_23b4a6a324404214_edc883d0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 27 ]
[ null ]
[ 14 ]
[ 69 ]
2024-11-18T20:55:12.179142+00:00
1,592,342,133,000
1b9ad962ca4e038c22a2952780cb74c69076c9e7
3
{ "blob_id": "1b9ad962ca4e038c22a2952780cb74c69076c9e7", "branch_name": "refs/heads/master", "committer_date": 1592342133000, "content_id": "4b4a0f44dade64264db1285832c977ebce222120", "detected_licenses": [ "MIT" ], "directory_id": "72741d1098f77932e4988328cb27969cae1e0e54", "extension": "py", "fi...
2.671875
stackv2
import re import logging from bs4 import BeautifulSoup jednostka_re = re.compile( "^https://www.szukajwarchiwach.gov.pl/jednostka/-/jednostka/\d+" ) site_re = re.compile("^https://www.szukajwarchiwach.gov.pl/") class Depaginator: def __init__(self, session): self.s = session def _next_page_url(se...
93
31.23
87
15
741
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_0a7cc9199195a8b3_85690946", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'szukajwarchiwach.gov', so it might ...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/incomplete-hostname-regexp", "py/incomplete-hostname-regexp" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'szukajwarchiwach.gov', so it might match more hosts than expected.", "This regular expression has an unescaped '.' before 'szukajwarchiwach.gov', so it might match more hosts than expected." ]
[ 6, 8 ]
[ null, null ]
[ 6, 23 ]
[ 68, 60 ]
2024-11-18T21:07:43.428784+00:00
1,681,205,860,000
bd6c0a6425bde14aca77182bc506f7c42c289075
3
{ "blob_id": "bd6c0a6425bde14aca77182bc506f7c42c289075", "branch_name": "refs/heads/master", "committer_date": 1681205860000, "content_id": "98844becc3c677e3ceb8274702667f395be71a95", "detected_licenses": [ "MIT" ], "directory_id": "674caa0d07acfa73a49a8762ca48eccef22e68d8", "extension": "py", "fi...
2.75
stackv2
#!/usr/bin/env python3 """ Take a polyglot from mitra, generate a OFB ciphertext which decrypts correctly under two different algorithms with the same key. iv = dec(c0 ^ p0) """ import binascii import os import argparse import re from Crypto.Cipher import AES from Crypto.Cipher import Blowfish as OtherAlgo from Cryp...
139
23.1
112
16
1,132
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_720c77a5e9945db0_bfd273fe", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 54, 64 ]
[ null, null ]
[ 14, 14 ]
[ 38, 40 ]
2024-11-18T21:33:18.727628+00:00
1,627,296,235,000
5796d7e4bc203b6eac55b8907ad2be94ed9025b4
2
{ "blob_id": "5796d7e4bc203b6eac55b8907ad2be94ed9025b4", "branch_name": "refs/heads/master", "committer_date": 1627296235000, "content_id": "e54610595bdba4e3575e915650f22a2adfbc1c18", "detected_licenses": [ "MIT" ], "directory_id": "1be296a1aebdd38434157296510827a31643ae3f", "extension": "py", "fi...
2.34375
stackv2
# %% import torch import flask from flask import Flask, request, render_template import json from rank_models import tfidf, bm25_model import util import numpy as np import Electra.electra_base as electra from flask_ngrok import run_with_ngrok app = Flask(__name__) run_with_ngrok(app) @app.route('/') def index(): ...
52
34.13
173
18
432
python
[{"finding_id": "codeql_py/stack-trace-exposure_a1cfbac916afcdc2_2ce5e443", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 48 ]
[ null ]
[ 44 ]
[ 59 ]
2024-11-18T21:33:24.870614+00:00
1,568,279,093,000
05944a6bce05ef93b25744f4c84cf7b1a2bd61f6
3
{ "blob_id": "05944a6bce05ef93b25744f4c84cf7b1a2bd61f6", "branch_name": "refs/heads/master", "committer_date": 1568279093000, "content_id": "7bbed77dce7673b1773b71ebde509934ff8ecd40", "detected_licenses": [ "MIT" ], "directory_id": "8c684fa3053829baa9c8520e4342c0eddd27551d", "extension": "py", "fi...
3.015625
stackv2
import enum import logging import re import random import time import requests from datetime import date, datetime, timedelta from pathlib import Path logging.basicConfig(level=logging.INFO) class Station(enum.Enum): LONDON = 7015400 PARIS = 8727100 BRUXELLES = 8814001 AMSTERDAM = 8400058 def find_a...
86
34.01
107
13
810
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_79a126e8147c37cb_6910fd0a", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 78, 33 ]
[ null, null ]
[ 28, 18 ]
[ 40, 59 ]
2024-11-18T21:55:39.494506+00:00
1,462,425,195,000
75bedc7997708a36c70e84e5bf88e1fa878e4a3d
2
{ "blob_id": "75bedc7997708a36c70e84e5bf88e1fa878e4a3d", "branch_name": "refs/heads/master", "committer_date": 1462425195000, "content_id": "5b1e0acf9f311a920c1afbe939d7a83e1038905d", "detected_licenses": [ "MIT" ], "directory_id": "91495be7c53be1bccb7e25d13425c345316583b6", "extension": "py", "fi...
2.390625
stackv2
from __future__ import absolute_import # encoding: UTF-8 import os import time from .api.client import Client from .cache import CachedClient from .config import CONFIG from .utils import pj, rel, rm_symlink, untar, chdir, ts from .logger import get_logger from .application import Application from .language import Lang...
82
39.51
118
16
788
python
[{"finding_id": "codeql_py/overly-permissive-file_2045c43355470a29_07694b91", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world writable." ]
[ 30 ]
[ null ]
[ 5 ]
[ 30 ]