added
stringlengths
32
32
created
int64
1,236B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.03
source
stringclasses
1 value
text
stringlengths
330
19.3k
num_lines
int64
16
648
avg_line_length
float64
15.5
59.3
max_line_length
int64
37
179
ast_depth
int64
8
38
length
int64
102
3.79k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.11k
276k
sast_codeql_findings_count
int64
1
33
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
33
rule_ids
listlengths
1
33
confidences
listlengths
1
33
severities
listlengths
1
33
messages
listlengths
1
33
line_starts
listlengths
1
33
line_ends
listlengths
1
33
column_starts
listlengths
1
33
column_ends
listlengths
1
33
2024-11-18T21:55:42.429428+00:00
1,611,331,673,000
5f41e7b3b96cf22c3661ce7bde2a7e4adf156840
2
{ "blob_id": "5f41e7b3b96cf22c3661ce7bde2a7e4adf156840", "branch_name": "refs/heads/main", "committer_date": 1611331673000, "content_id": "a3bab084789dcb082b146dc5e1d1e0225f9593a6", "detected_licenses": [ "MIT" ], "directory_id": "c8724e3b8f6a2db2f5e44247a1b9ac494dad5a3e", "extension": "py", "file...
2.390625
stackv2
''' Copyright (c)2020, by Qogir, JMJ, MA71 All rights reserved. File Name: LocalProxy System Name: SwiftProxy Date: 2020-12-01 Version: 2.0 Description: 用户操作界面。此模块使用PyQt5库编写,并使用QProcess类启动外部程序localProxy,从而简化程序流程,提升程序健壮性与代码可读性。与用户在界面窗口中输入账户密码,并指定本地IP、端口及远程IP、端口,LocalGUI就会将数据呈递给LocalProxy。此界面中也会实时显示连接状态,每秒上传数据...
212
34.99
177
16
1,914
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3b7c80280a8a58b2_a3d7752c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 167 ]
[ null ]
[ 19 ]
[ 35 ]
2024-11-18T21:55:49.633847+00:00
1,439,206,106,000
9920d38ec62e8b053745fb7c49c490209080b94f
3
{ "blob_id": "9920d38ec62e8b053745fb7c49c490209080b94f", "branch_name": "refs/heads/master", "committer_date": 1439206106000, "content_id": "b41a8326a035d3fc07ebac09405bb46304b4a5ea", "detected_licenses": [ "Unlicense" ], "directory_id": "e6b4d8afa5515bbcc87d3b0661af0037e01d0243", "extension": "py",...
3
stackv2
#!/usr/bin/python3 # -*- coding: utf-8 -*- import os import json from datetime import datetime import yaml from yaml import SafeLoader, BaseLoader from jinja2 import Template, Environment, FileSystemLoader from tag_ontology import * from util import * import sys import logging class AbsolutePathException(Exception): ...
475
33.04
114
27
3,527
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_8ba1182e6e4f57ca_822b11c3", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 292, 389 ]
[ null, null ]
[ 15, 15 ]
[ 56, 56 ]
2024-11-18T21:55:51.686569+00:00
1,597,381,047,000
83dd486425782ef104794c2d1602d905ba885e95
4
{ "blob_id": "83dd486425782ef104794c2d1602d905ba885e95", "branch_name": "refs/heads/master", "committer_date": 1597381047000, "content_id": "ba67c09a82548d8d76e764b0660d4aad0621ba52", "detected_licenses": [ "MIT" ], "directory_id": "c9760ede3c4b9827ca37118f8df39cf44beb685e", "extension": "py", "fi...
3.625
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- """ Created on Thu Jun 18 07:24:23 2020 author: krishan """ class Employee: salary_raise = 1.04 def __init__(self, fname, lname, salary): self.fname = fname self.lname = lname self.salary = salary @property ...
41
21.41
56
12
266
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_72678cd1a6a01abd_0a1ed794", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 39 ]
[ null ]
[ 7 ]
[ 12 ]
2024-11-18T22:54:57.378567+00:00
1,549,515,900,000
f19eb01e955783ec31c935272cab2917830e9cd5
3
{ "blob_id": "f19eb01e955783ec31c935272cab2917830e9cd5", "branch_name": "refs/heads/master", "committer_date": 1549515900000, "content_id": "17445116cbb09357c82514bf4db1e8317ecd42d7", "detected_licenses": [ "MIT" ], "directory_id": "aa73446a508e64ed88e4f686edf6d5ef9977e032", "extension": "py", "fi...
2.859375
stackv2
from hashlib import sha256 from tkinter import * from tkinter.ttk import * known_sites = sorted([ "", "github.com", "bitbucket.org", "steam", "gmail.com", "google.com", "reddit.com", "linode.com", "discordapp.com", "rekt.live", "www.twitch.tv", "blockchain.com" ]) def ...
83
24.7
97
14
591
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_c79ca6d6cee01375_a88df471", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 22 ]
[ null ]
[ 19 ]
[ 65 ]
2024-11-18T22:54:57.439276+00:00
1,351,936,836,000
3634420c414ef9422a883db4ea06c97c4aac72f9
3
{ "blob_id": "3634420c414ef9422a883db4ea06c97c4aac72f9", "branch_name": "refs/heads/master", "committer_date": 1351936836000, "content_id": "4ccba8fdd01c0961bbe3c8fa98aec850fd14d27a", "detected_licenses": [ "MIT" ], "directory_id": "a5ae02b27c05b90d8b3c122611dc2c7163a5b1e4", "extension": "py", "fi...
2.6875
stackv2
#!/usr/bin/env python import cherrypy import os import requests from jinja2 import Environment, FileSystemLoader app_dir = os.path.abspath(os.path.dirname(__file__)) tmpl_dir = os.path.join(app_dir, 'templates') env = Environment(loader=FileSystemLoader(tmpl_dir)) twitter_url = 'http://search.twitter.com/search.json...
31
27.35
74
16
200
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_e92cb28a0c74d9b5_9a8c812b", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 11 ]
[ null ]
[ 7 ]
[ 53 ]
2024-11-18T22:54:59.530236+00:00
1,547,987,109,000
fbad12781c420212aabe1f2f5e15c5ab893ce412
2
{ "blob_id": "fbad12781c420212aabe1f2f5e15c5ab893ce412", "branch_name": "refs/heads/master", "committer_date": 1547987109000, "content_id": "ca3beb36fb124a5c0683c42ce78bef20de9bccaa", "detected_licenses": [ "MIT" ], "directory_id": "f52e6db78492a82f1e19a43ca6d179c95da0947e", "extension": "py", "fi...
2.359375
stackv2
"""Module provider for Open Domain Registry""" import hashlib import json import logging import time try: from urllib.parse import urlencode except ImportError: from urllib import urlencode import requests from lexicon.providers.base import Provider as BaseProvider LOGGER = logging.getLogger(__name__) NAME...
157
34.5
115
17
1,172
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_5c0dc571f09d52ed_a5a4bbf0", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecu...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecure.\n[Sensitive data (secret)](2) is used in a hashing algorithm (SHA1) that is insecure.\n[Sensitive data (password)](3) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally e...
[ 149 ]
[ null ]
[ 29 ]
[ 50 ]
2024-11-18T20:56:55.324730+00:00
1,647,833,979,000
f93d243e97a2185fb8ba74f7f9d2f1de60a4e1e1
3
{ "blob_id": "f93d243e97a2185fb8ba74f7f9d2f1de60a4e1e1", "branch_name": "refs/heads/master", "committer_date": 1647833979000, "content_id": "88e29d714e7c4d09ba1da741bd94d4255e62a421", "detected_licenses": [ "MIT" ], "directory_id": "47ef6997d03f4d5c921c83cc09aef1dfc6828e2c", "extension": "py", "fi...
2.90625
stackv2
# -*- coding:utf-8 -*- # Copyright (C) 2020. Huawei Technologies Co., Ltd. All rights reserved. # This program is free software; you can redistribute it and/or modify # it under the terms of the MIT License. # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the ...
239
33.49
101
27
1,777
python
[{"finding_id": "codeql_py/tarslip_2d430bd12bff5406_da05a815", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 228 ]
[ null ]
[ 13 ]
[ 16 ]
2024-11-18T20:56:55.587551+00:00
1,691,950,360,000
4434fa80d86397661a0b94ed2ae1a364e5747362
3
{ "blob_id": "4434fa80d86397661a0b94ed2ae1a364e5747362", "branch_name": "refs/heads/master", "committer_date": 1691950360000, "content_id": "fd4d14ecec210ec57dd7d04d8fc9ecf9283a7ad3", "detected_licenses": [ "Apache-2.0" ], "directory_id": "1088e51396f7d97addfccca1be97f9a5637ac461", "extension": "py"...
2.671875
stackv2
#!/usr/bin/env python """ Script to fetch DBpedia-Wikidata links """ import sys, time from wikidata.client import Client import json def main(): client = Client() coord_prop = client.get('P625') country_prop = client.get('P17') litate_prop = client.get('P131') # located in the administrative territori...
52
32.6
87
19
357
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_43e2a3a0a71b66c8_2e8454ec", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 39 ]
[ 46 ]
[ 19 ]
[ 45 ]
2024-11-18T23:10:51.683395+00:00
1,516,583,283,000
1afe2c5dc3591031210e8353cd153d1260815561
3
{ "blob_id": "1afe2c5dc3591031210e8353cd153d1260815561", "branch_name": "refs/heads/master", "committer_date": 1516583283000, "content_id": "e256f01e5526ef03a7630219966b7770566d1b8f", "detected_licenses": [ "MIT" ], "directory_id": "313285c4fa12ac5f8431c0202b952170bceb73c0", "extension": "py", "fi...
2.65625
stackv2
import random import json #import urllib2 import urllib3 import shelve import temp_humidity import led import time topics = None COMMAND1 = "who are you" COMMAND2 = "what can you do" COMMAND3 = "temp" COMMAND4 = "red led" COMMAND5 = "green led" COMMAND6 = "get-ip" headers = { 'x-api-key': 'rbfYSjUHLS58VdblPBdAZ6sU...
126
27.44
152
16
922
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_97d1d3a41c4ab118_a675137f", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [tccmd.wrayesian.com](1) may be at an arbitrary positio...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [tccmd.wrayesian.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 75 ]
[ null ]
[ 14 ]
[ 43 ]
2024-11-18T23:10:13.430659+00:00
1,541,573,902,000
21419245cefad7e05fdeb048dc204fcc07fbbeb5
3
{ "blob_id": "21419245cefad7e05fdeb048dc204fcc07fbbeb5", "branch_name": "refs/heads/master", "committer_date": 1541573902000, "content_id": "5e94e6967ed507aee93c3b3ca37d399fe25b7e6b", "detected_licenses": [ "MIT" ], "directory_id": "b3e8aa381da1271a4342896d6df3cc52a2ffc543", "extension": "py", "fi...
2.515625
stackv2
import requests import random import time from lxml import etree from settings import * from captcha import checkCaptcha def start_parse(): with open("companies.txt", 'r', encoding='utf-8') as f: while True: if not f.readline(): break company = f.readline().replace(...
50
40.84
99
30
539
python
[{"finding_id": "codeql_py/request-without-cert-validation_75e5ffad2a69b02c_0502151d", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 25 ]
[ null ]
[ 9 ]
[ 91 ]
2024-11-18T23:10:14.352020+00:00
1,612,794,512,000
b2e4fc7843852ef6c324978fb95a85445ae76370
2
{ "blob_id": "b2e4fc7843852ef6c324978fb95a85445ae76370", "branch_name": "refs/heads/master", "committer_date": 1612794512000, "content_id": "48006fab0f8fb39498b4a2254b60160d3b81fae4", "detected_licenses": [ "MIT" ], "directory_id": "39a8246286a023c70df91ecd594890043a13ed4f", "extension": "py", "fi...
2.453125
stackv2
import hashlib import json import re import time import urllib import warnings import webbrowser from datetime import date, datetime, timedelta import numpy as np import requests warnings.filterwarnings("ignore") class NuistDaily(object): def __init__(self): self.today = date.today() # 今日日期 sel...
209
34.24
143
27
1,979
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_f3c591e57090b5d1_ba4618d6", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi...
[ 31 ]
[ null ]
[ 20 ]
[ 49 ]
2024-11-18T23:10:20.055621+00:00
1,516,278,982,000
04cdf2b0512331ce2bf748a2f12efe4206a8d010
2
{ "blob_id": "04cdf2b0512331ce2bf748a2f12efe4206a8d010", "branch_name": "refs/heads/master", "committer_date": 1516278982000, "content_id": "f92491fd75a4ebeb84aee532eec6cf3a535c1fce", "detected_licenses": [ "MIT" ], "directory_id": "2a3f2594e8847ae9d58d5bbc5b06dd2042ce2070", "extension": "py", "fi...
2.4375
stackv2
import getpass import os import socket import subprocess import paramiko import asyncio from io import BytesIO from flowlight.core.setting import Setting from flowlight.core.command import Command from flowlight.core.response import Response class Connection: """A SSH Channel connection to remote machines. ...
185
33.94
111
24
1,263
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_a6077d109344ff34_91555503", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 51 ]
[ null ]
[ 13 ]
[ 78 ]
2024-11-18T23:10:20.782404+00:00
1,586,259,975,000
eb7050f4ce586b7b9908fb166e13a63412d85c04
3
{ "blob_id": "eb7050f4ce586b7b9908fb166e13a63412d85c04", "branch_name": "refs/heads/master", "committer_date": 1586259975000, "content_id": "a1fd9251a1ed7a770eada54401ee05990a41a893", "detected_licenses": [ "MIT" ], "directory_id": "a719328e3c3ea9fca0b1130c386b22580441e4fb", "extension": "py", "fi...
2.640625
stackv2
__author__ = 'tusharmakkar08' try: from urllib.parse import urlparse, urlencode from urllib.request import urlopen, Request, urlretrieve, build_opener from urllib.error import HTTPError except ImportError: from urlparse import urlparse from urllib import urlencode from urllib2 import urlopen, R...
41
41.51
120
15
424
python
[{"finding_id": "codeql_py/overly-large-range_2e9b4eee42af7abb_ce0d8fc3", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 17 ]
[ null ]
[ 43 ]
[ 46 ]
2024-11-18T21:33:28.991940+00:00
1,619,868,220,000
4990b25c3b27f92897c3e47df100f826b0c6a91d
3
{ "blob_id": "4990b25c3b27f92897c3e47df100f826b0c6a91d", "branch_name": "refs/heads/main", "committer_date": 1619868220000, "content_id": "687a54116dd8b1dd79592d51a40c4af71b8f1fd3", "detected_licenses": [ "MIT" ], "directory_id": "c508727941234926f4a602c012ab9019db4b1672", "extension": "py", "file...
2.796875
stackv2
''' @author: Antonio Fusco https://github.com/fuscoantonio ''' import sys sys.path.insert(1, './utilities') from requests import Session from requests.exceptions import HTTPError, ConnectionError from vvvvid import real_url from pathlib import Path from utils import ask_episodes_numbers, download, list_options USER_A...
226
32.09
134
15
1,814
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_7762b8235bbb9313_3a44ec05", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [youtube.com](1) may be at an arbitrary position in the...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [youtube.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 208 ]
[ null ]
[ 8 ]
[ 28 ]
2024-11-18T21:33:32.992349+00:00
1,436,680,227,000
c97d3cbc01841ef8f75d90a1c38910e3e1916175
2
{ "blob_id": "c97d3cbc01841ef8f75d90a1c38910e3e1916175", "branch_name": "refs/heads/master", "committer_date": 1436680227000, "content_id": "914a2ffac92fd2d4cc0d08bcb1e6783d0d04c68a", "detected_licenses": [ "Apache-2.0" ], "directory_id": "43d72df67de722d84b851b0dc57b34d91f103818", "extension": "py"...
2.3125
stackv2
#!/usr/bin/python # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # d...
79
29.48
74
16
543
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_4ce6f83c3449e2b9_e525a480", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 67 ]
[ 68 ]
[ 11 ]
[ 68 ]
2024-11-18T23:15:54.417631+00:00
1,620,460,144,000
71806d4468b0e82dd9830e2873ace6d7b7868b5b
3
{ "blob_id": "71806d4468b0e82dd9830e2873ace6d7b7868b5b", "branch_name": "refs/heads/master", "committer_date": 1620460144000, "content_id": "7b9124401badceb997160ef54c078efd79f17b1c", "detected_licenses": [ "Apache-2.0" ], "directory_id": "c6e3385a5389892683bb33da48f90f9daf503e39", "extension": "py"...
3.390625
stackv2
#!/usr/bin/env python3 #-*- coding: utf-8 -*- # Date: 2020-07-31 # Author: Shieber # 密码生成器 import sys import base64 from os.path import basename __version__ = 0.1 __all__ = ['HashMn', 'HashPassword'] """密码生成脚本 利用关键字符串(种子)和梅森哈希数去产生不同长度的密码。 种子:用户输入的某账户的关键字符串,比如对应腾讯的QQ,种子可以是[qq,qQ,Qq,QQ,txqq,..]中任何一个。 种子建...
104
28.29
113
16
1,320
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_aaae4203bcbdc7fe_f9ca6ef9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text.\nThis expression logs [sensitive data (passw...
[ 104 ]
[ null ]
[ 11 ]
[ 37 ]
2024-11-18T22:30:18.733796+00:00
1,647,289,717,000
36e053bb11a18eff3c067b73de9a0d300211d3b8
3
{ "blob_id": "36e053bb11a18eff3c067b73de9a0d300211d3b8", "branch_name": "refs/heads/master", "committer_date": 1647289717000, "content_id": "b63365bf7a6480022d34c905bc2d9368de8f91f3", "detected_licenses": [ "MIT" ], "directory_id": "1ae330d2405954ec535292742af619a3aefe1466", "extension": "py", "fi...
2.9375
stackv2
import re from datetime import date import uuid ''' Contains useful utility functions for our Flask app ''' def get_database_uri_from(env): ''' Use values from the environment to determine a Database URI per the SQLAlchemy schema. See https://docs.sqlalchemy.org/en/14/core/engines.html#database-urls for sp...
77
32.52
112
13
609
python
[{"finding_id": "codeql_py/redos_383dbe2478a94a46_af1cf256", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '0'.", "remediati...
1
true
[ "CWE-1333" ]
[ "py/redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '0'." ]
[ 25 ]
[ null ]
[ 27 ]
[ 36 ]
2024-11-18T22:30:26.249245+00:00
1,592,646,791,000
2cc8b54e12ab09b38a9eeb543da0359c89b7075f
3
{ "blob_id": "2cc8b54e12ab09b38a9eeb543da0359c89b7075f", "branch_name": "refs/heads/master", "committer_date": 1592646791000, "content_id": "f626badadc8413f49c18fee4860df85aa2945eaa", "detected_licenses": [ "BSD-3-Clause", "Apache-2.0", "MIT" ], "directory_id": "09e3ec542b850ee602414de3c532e06...
2.65625
stackv2
# -*- coding: utf-8 -*- from pathlib import Path from flask import Flask, render_template import io from flask_bootstrap import Bootstrap from flaskext.markdown import Markdown SONGS_PATH = Path('songs/') app = Flask(__name__) app.secret_key = 'dev' # set default button sytle and size, will be overwritten by macro ...
53
22.94
76
13
318
python
[{"finding_id": "codeql_py/flask-debug_53bef53690f5cab3_5523f518", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-022" ]
[ "py/flask-debug", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1)." ]
[ 53, 43 ]
[ null, null ]
[ 5, 18 ]
[ 24, 27 ]
2024-11-18T22:30:26.303499+00:00
1,235,962,524,000
0ced031e0f4c29bedad349e4c12202b1e22b52dd
2
{ "blob_id": "0ced031e0f4c29bedad349e4c12202b1e22b52dd", "branch_name": "refs/heads/master", "committer_date": 1235962524000, "content_id": "cea5549c60aa9337fab46db9abd7139f3f75a4d3", "detected_licenses": [ "Apache-2.0" ], "directory_id": "fb7ed0ddfe93f29a77902a94210a6f77f5bbe91e", "extension": "py"...
2.3125
stackv2
#!/usr/bin/python2.4 """MobWrite - Real-time Synchronization and Collaboration Service Copyright 2008 Neil Fraser http://code.google.com/p/google-mobwrite/ Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the Lic...
417
33.74
104
27
3,635
python
[{"finding_id": "codeql_py/log-injection_147d2f2b75ca383d_4b98485e", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
11
true
[ "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depen...
[ 107, 109, 143, 171, 173, 247, 255, 278, 285, 296, 323 ]
[ null, null, null, null, null, null, null, null, null, null, 324 ]
[ 19, 17, 19, 19, 21, 23, 23, 25, 22, 23, 22 ]
[ 74, 55, 66, 53, 61, 52, 50, 60, 62, 76, 65 ]
2024-11-18T22:30:29.932799+00:00
1,689,867,779,000
2596db0cc917bfb361e96ecc4193f5b883ee1d1e
3
{ "blob_id": "2596db0cc917bfb361e96ecc4193f5b883ee1d1e", "branch_name": "refs/heads/master", "committer_date": 1689895117000, "content_id": "2d699e7290e45899d9bc3c2ecb4e8412cdc311a3", "detected_licenses": [ "MIT" ], "directory_id": "a8cd314af4c1d5ec4f322a19275e3a706b6844ee", "extension": "py", "fi...
2.5625
stackv2
import argparse import logging import os.path import sys import tempfile import textwrap from .parsers import AppImageCraftYMLParser from . import _logging from .commands import * # noqa def parse_args(): parser = argparse.ArgumentParser( description="Shell script generator for building AppImages from s...
207
25.71
111
17
1,160
python
[{"finding_id": "codeql_py/overly-permissive-file_16f557625d55e704_639b5ca4", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable." ]
[ 185 ]
[ null ]
[ 5 ]
[ 31 ]
2024-11-18T22:44:33.393517+00:00
1,434,727,101,000
73827d8395ebc9608d8b8c4d1f9a12664c9d9728
3
{ "blob_id": "73827d8395ebc9608d8b8c4d1f9a12664c9d9728", "branch_name": "refs/heads/master", "committer_date": 1434727101000, "content_id": "efb467edd8084f2b42408e917a85599622c40f67", "detected_licenses": [ "MIT" ], "directory_id": "e91922a597af3657da76b248280f5f804c108e1f", "extension": "py", "fi...
3.1875
stackv2
# -*- coding: utf-8 -*- # Author Frank Hu , nicetag # iDoulist Function 0 - input import re import urllib2 import time # get url from UI module for test def main(): input_url = 'http://www.douban.com/doulist/36764655/' doulist_content = doulist_url_to_list(input_url) print doulist_content # the list doul...
82
29.68
151
17
744
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_20c1eaec63faf3e4_ffdbdad1", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'douban.com/subject/', so it might m...
5
true
[ "CWE-020", "CWE-020", "CWE-020", "CWE-020", "CWE-020" ]
[ "py/incomplete-hostname-regexp", "py/incomplete-hostname-regexp", "py/incomplete-hostname-regexp", "py/incomplete-hostname-regexp", "py/incomplete-hostname-regexp" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'douban.com/subject/', so it might match more hosts than expected.", "This regular expression has an unescaped '.' before 'douban.com/doulist/', so it might match more hosts than expected.", "This regular expression has an unescaped '.' before 'douban.com/peo...
[ 31, 54, 60, 60, 60 ]
[ null, null, null, null, null ]
[ 25, 20, 20, 57, 96 ]
[ 63, 57, 56, 95, 137 ]
2024-11-18T21:14:09.749677+00:00
1,565,978,452,000
357ee4299a5ff86594c920c03c7ec0811682649d
3
{ "blob_id": "357ee4299a5ff86594c920c03c7ec0811682649d", "branch_name": "refs/heads/master", "committer_date": 1565978452000, "content_id": "6f4464195d26cc8a07e3f62d79e75a5c5f9c2ceb", "detected_licenses": [ "MIT" ], "directory_id": "b86c9a0036f90517b541c1102ef4368ca0286c17", "extension": "py", "fi...
2.890625
stackv2
import sqlite3 conn = sqlite3.connect("northwind_small.sqlite3") curs = conn.cursor() query = """ SELECT ProductName FROM Product ORDER BY UnitPrice DESC LIMIT 10;""" ten_most_expensive_items = curs.execute(query).fetchall() query = """ SELECT AVG(HireDate - BirthDate) FROM Employee;""" aver...
102
32.95
77
15
903
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d8fa921fd8551709_1d3086d1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 64 ]
[ null ]
[ 44 ]
[ 69 ]
2024-11-18T21:14:12.433212+00:00
1,620,716,844,000
0ea67e593b1fa931a76e815d6baad417e225253d
3
{ "blob_id": "0ea67e593b1fa931a76e815d6baad417e225253d", "branch_name": "refs/heads/master", "committer_date": 1620716844000, "content_id": "0ef2df6f7797e1ce069bf9b3349e42b3d251c85d", "detected_licenses": [ "MIT" ], "directory_id": "67bab39254fc81f7e7edb6b8298c89f7a13f04e2", "extension": "py", "fi...
2.53125
stackv2
'''API to download dataset. ''' from __future__ import absolute_import from __future__ import division from __future__ import print_function import sys, os, six, time, collections from six.moves.urllib.error import HTTPError, URLError from six.moves.urllib.request import urlopen, urlretrieve import tarfile from pat...
145
33.46
124
16
1,269
python
[{"finding_id": "codeql_py/tarslip_3c65153ebe653ba0_c020f91a", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially untrusted source](1)." ]
[ 113 ]
[ null ]
[ 13 ]
[ 16 ]
2024-11-18T21:14:16.591954+00:00
1,629,082,979,000
c01272440b7a3a3f0c491daf58ebe3169fd36ed0
3
{ "blob_id": "c01272440b7a3a3f0c491daf58ebe3169fd36ed0", "branch_name": "refs/heads/main", "committer_date": 1629082979000, "content_id": "0795c775de3320fab0da8bd69648a046e0ae8d60", "detected_licenses": [ "MIT" ], "directory_id": "430587fb77de44922446cf7ef1e5b6449e369178", "extension": "py", "file...
2.578125
stackv2
from replit import db # importing the database from encoder import to_json from flask import Flask, render_template, redirect app = Flask('app', template_folder = "templates") def process(data): d = data.split("_") res = {} for i in d: res[i.split("=")[0]] = eval(i.split("=")[1]) return res @app.route('/g...
29
24
73
14
198
python
[{"finding_id": "codeql_py/code-injection_f19bd8db06e66012_2e2a3916", "tool_name": "codeql", "rule_id": "py/code-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This code execution depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "...
1
true
[ "CWE-094" ]
[ "py/code-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This code execution depends on a [user-provided value](1)." ]
[ 10 ]
[ null ]
[ 33 ]
[ 48 ]
2024-11-18T21:15:49.147236+00:00
1,632,238,557,000
8b246163222e9d741a4a53b59fc04a917fbdee57
4
{ "blob_id": "8b246163222e9d741a4a53b59fc04a917fbdee57", "branch_name": "refs/heads/main", "committer_date": 1632238557000, "content_id": "197b4566940fe3cf6d35d4ae6f33ac4ab07aaef5", "detected_licenses": [ "CC0-1.0" ], "directory_id": "55f0bfaa64e1621967afad3d142da70ae9aab0cf", "extension": "py", "...
3.578125
stackv2
import random uppercase_letters = 'ABCDEFGHIJKLMNOPQRSTUVWXYZ' lowercase_letters = uppercase_letters.lower() digits = '1234567890' symbols = '@#$%=.,:;' upper,lower,nums,syms = True,True,True,True all = '' if upper: all += uppercase_letters if lower: all += lowercase_letters if nums: all += digits if sym...
30
24.03
54
10
177
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_80e40b60d09311db_3458f1fd", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 29 ]
[ null ]
[ 11 ]
[ 19 ]
2024-11-18T21:58:19.910588+00:00
1,693,354,396,000
a0a07eeafde253d08c0c43c59de9edd0ef487c4a
3
{ "blob_id": "a0a07eeafde253d08c0c43c59de9edd0ef487c4a", "branch_name": "refs/heads/main", "committer_date": 1693354396000, "content_id": "55b9282e81b8660f9448acaf8b51e7d220a98d1e", "detected_licenses": [ "MIT" ], "directory_id": "6b2c339ad1da97d3901e445a5ae13a56a86fda23", "extension": "py", "file...
2.890625
stackv2
import os import tarfile import requests REPO_BASE_URL = os.environ.get("PIEDOMAINS_MODEL_URL") or "https://dataverse.harvard.edu/api/access/datafile/7081895" def download_file(url: str, target: str, file_name: str) -> bool: """ Download file from the server Args: url (str): url of the resource...
51
31.29
117
14
393
python
[{"finding_id": "codeql_py/tarslip_84b6c185371590f1_c61550a6", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 50 ]
[ null ]
[ 9 ]
[ 12 ]
2024-11-18T21:58:20.156317+00:00
1,634,383,889,000
38714c8f13118303e7f7a107f0034685d0ec628e
3
{ "blob_id": "38714c8f13118303e7f7a107f0034685d0ec628e", "branch_name": "refs/heads/main", "committer_date": 1634383889000, "content_id": "64acdb4aae3e446048e7b2489472034e533113fa", "detected_licenses": [ "MIT" ], "directory_id": "90b1ad7d5155097ed363953cdb24b9093330bf5c", "extension": "py", "file...
3.1875
stackv2
"""Simple Server to receive files with a http PUT request.""" from flask import request, jsonify, Flask from shutil import copyfileobj # where to store the files UPLOAD_FOLDER = '/tmp/' app = Flask(__name__) @app.route('/upload/<filename>', methods=['PUT']) def upload(filename): """ Takes the filename from the ...
28
23.11
61
13
165
python
[{"finding_id": "codeql_py/path-injection_a5422eff177c3391_c7439355", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 19 ]
[ null ]
[ 13 ]
[ 42 ]
2024-11-18T21:58:30.801301+00:00
1,418,114,829,000
2ddbeb9e8eb021b1a8506da2bab5bf5ec146774e
4
{ "blob_id": "2ddbeb9e8eb021b1a8506da2bab5bf5ec146774e", "branch_name": "refs/heads/master", "committer_date": 1418114829000, "content_id": "7538a2525d714db82927693699de9d2465f21c7b", "detected_licenses": [ "MIT" ], "directory_id": "ec30d99bce9685721a3b4d322c2d060ef696a784", "extension": "py", "fi...
3.609375
stackv2
import os import bcrypt import getpass class UserOps: def __init__(self): ''' Prompts the user for a username and password. ''' self.salt = bcrypt.gensalt(log_rounds = 15) self.username = input("Please enter a username: ") self.password = bcrypt.hashpw(getpass.g...
77
31.53
146
16
526
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_ed81c1accbfc9949_4757dab4", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 57 ]
[ null ]
[ 26 ]
[ 70 ]
2024-11-18T23:10:51.853748+00:00
1,538,722,410,000
7641b1d76ebfd840011ca58edc2939881e40d462
3
{ "blob_id": "7641b1d76ebfd840011ca58edc2939881e40d462", "branch_name": "refs/heads/master", "committer_date": 1538722410000, "content_id": "0214abebfacb07764859b6c268f51500d8f53a5f", "detected_licenses": [ "Apache-2.0" ], "directory_id": "c845d719a804aea3477713cf8ae0dc5a104bb961", "extension": "py"...
2.578125
stackv2
from django.shortcuts import render, redirect import math import requests # additional functionality for requests package to disable warnings requests.packages.urllib3.disable_warnings() from bs4 import BeautifulSoup from datetime import timedelta, timezone, datetime import os import shutil from .models import Headl...
60
34.17
146
17
499
python
[{"finding_id": "codeql_py/request-without-cert-validation_754eb859aef506d4_bd092ef6", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 26, 44 ]
[ null, null ]
[ 15, 17 ]
[ 45, 69 ]
2024-11-18T23:10:59.000822+00:00
1,492,663,213,000
30c818723d64f3878e71e7a990af4316b1bb8b0e
3
{ "blob_id": "30c818723d64f3878e71e7a990af4316b1bb8b0e", "branch_name": "refs/heads/master", "committer_date": 1492663213000, "content_id": "b49aaf2054d99cd55fa5630ec284ba3ca89bc906", "detected_licenses": [ "MIT" ], "directory_id": "7cfad21bb8b9cfda28d2e6f05480807ee14aa30d", "extension": "py", "fi...
2.96875
stackv2
from flask import Flask, redirect, url_for, request app = Flask(__name__) @app.route('/') def hola_mundo(): return 'Hola UIP' @app.route('/relajo') def relajo(): return 'Relajo' @app.route('/hola/<nombre>') def hola_nombre(nombre): return 'Hola %s!' % nombre @app.route('/edad/<int:edad>') def validar_vo...
57
22.18
68
14
357
python
[{"finding_id": "codeql_py/reflective-xss_d0aaad816373dd67_652bdaf1", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
3
true
[ "CWE-079", "CWE-079", "CWE-079" ]
[ "py/reflective-xss", "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 14, 33, 44 ]
[ null, null, null ]
[ 12, 12, 12 ]
[ 31, 56, 36 ]
2024-11-18T22:49:05.584680+00:00
1,623,361,315,000
48e778fa3d47a5efaf6f68eba9e8a0d46e3f8218
2
{ "blob_id": "48e778fa3d47a5efaf6f68eba9e8a0d46e3f8218", "branch_name": "refs/heads/main", "committer_date": 1623361315000, "content_id": "91d45e228ebc15e8d33eac543fd079c4f9e9d044", "detected_licenses": [ "Apache-2.0" ], "directory_id": "b521e8390f0f3e3d3433dd2b08ec217d7c9ecf57", "extension": "py", ...
2.5
stackv2
from http import HTTPStatus from django.http import HttpResponse from django.views import View from morphodict.preference import Preference class ChangePreferenceView(View): """ A generic view (class-based view) that sets the cookie for a preference. Usage: # views.py class ChangeMyPre...
72
31.43
110
15
498
python
[{"finding_id": "codeql_py/cookie-injection_5498573793415bc9_6950303c", "tool_name": "codeql", "rule_id": "py/cookie-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cookie is constructed from a [user-supplied input](1).", "remediation": "", "location": {"file_path": "...
1
true
[ "CWE-020" ]
[ "py/cookie-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cookie is constructed from a [user-supplied input](1)." ]
[ 71 ]
[ null ]
[ 47 ]
[ 52 ]
2024-11-18T23:25:55.284200+00:00
1,562,663,022,000
8e462fc4ff8159b545c02cae67771b1664fb3f8c
2
{ "blob_id": "8e462fc4ff8159b545c02cae67771b1664fb3f8c", "branch_name": "refs/heads/master", "committer_date": 1562663022000, "content_id": "7d0869e6b72b0a685745f286e4855ac1f9d5ef7a", "detected_licenses": [ "Apache-2.0" ], "directory_id": "64367e9d39643c9d5f9b481e607cb2424c98685d", "extension": "py"...
2.421875
stackv2
# -*- coding: utf-8 -*- """ Created on Tue Jul 9 15:02:06 2019 @author: Administrator Spam Ham Email Classifier """ ########################### Downlaod data from internet ############################ import os import tarfile from six.moves import urllib import time DOWNLOAD_ROOT = "http://spamassassin.apache.org/o...
320
37.9
105
18
2,966
python
[{"finding_id": "codeql_py/tarslip_48998c2ac110f0fb_9254a989", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 29 ]
[ null ]
[ 9 ]
[ 21 ]
2024-11-18T23:25:59.822188+00:00
1,503,569,098,000
8f038e2cd12a8d5846f8847e97adfe45f2cf7a60
3
{ "blob_id": "8f038e2cd12a8d5846f8847e97adfe45f2cf7a60", "branch_name": "refs/heads/master", "committer_date": 1503569098000, "content_id": "20a6bf3e57703546da4b38040faa892b07474902", "detected_licenses": [ "MIT" ], "directory_id": "503cab299fe87264239bfce3a918ce8853a4afb9", "extension": "py", "fi...
2.640625
stackv2
import pjsua as pj import logging import time from soft_phone.callbacks import IncomingCallCallback, CallCallback from soft_phone.exceptions import PhoneCallNotInProgress from datetime import datetime logger = logging.getLogger(__name__) logging.addLevelName(5, "TRACE") class SoftPhone: """ 'Soft Phone' to a...
286
50.9
119
22
3,125
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3c100f4e16459048_8cf90eb8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 50 ]
[ 51 ]
[ 22 ]
[ 90 ]
2024-11-18T23:26:02.624887+00:00
1,631,348,338,000
fc28ded0ddc9441d0d5583381ab4e072f047fc4b
2
{ "blob_id": "fc28ded0ddc9441d0d5583381ab4e072f047fc4b", "branch_name": "refs/heads/master", "committer_date": 1631348338000, "content_id": "c0b5a78c423e520220524f43bfe5b42423b4d4bb", "detected_licenses": [ "ISC" ], "directory_id": "bdfff2c6f14c639508dae1ad1e0380cad7b7809c", "extension": "py", "fi...
2.46875
stackv2
#! /user/bin/python # division handles truncation 10/3. ==> 10/3, absolute_import changes where in path is checked for modules from __future__ import ( # this handles truncation 10/3. ==> 10/3 absolute_import, division, print_function) """ transfer.py Upload Tool using Paramiko """ __author__ = "Joseph Huehnerho...
62
25.02
106
14
422
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_787dc80fa045ec87_3a5a795c", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 33 ]
[ 34 ]
[ 9 ]
[ 38 ]
2024-11-18T23:26:04.851645+00:00
1,630,165,856,000
b98be6261de35fd1298c33119319095cd46c0cf1
4
{ "blob_id": "b98be6261de35fd1298c33119319095cd46c0cf1", "branch_name": "refs/heads/main", "committer_date": 1630165856000, "content_id": "89bf36c871b2fdf083cb813c41507ff4eaddeccf", "detected_licenses": [ "MIT" ], "directory_id": "13bf647f954f99929c0af5523b73775128848098", "extension": "py", "file...
3.546875
stackv2
from empstore import teams import employee as emp from empstore import employees def manage_all_team_menu(): print("\t1.Create team") print("\t2.Display team") print("\t3.Manage team(Particular)") print("\t4.Delete team") print("\t5.Exit") def manage_all_teams(): while True: manage_all_team_menu() ch = int(i...
93
22.67
86
14
602
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_08132d66b693e5b8_3870a363", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 49, 84 ]
[ null, null ]
[ 9, 8 ]
[ 34, 24 ]
2024-11-18T23:26:05.242030+00:00
1,559,610,430,000
e383f111ab19ff54e770c20766a59f050b43f78f
2
{ "blob_id": "e383f111ab19ff54e770c20766a59f050b43f78f", "branch_name": "refs/heads/master", "committer_date": 1559610430000, "content_id": "b3714968d0375e63e76607ea074a87ca6caacc04", "detected_licenses": [ "MIT" ], "directory_id": "b9f78e34fcdca97867aadfb2fa3b5d9504d5e9c2", "extension": "py", "fi...
2.453125
stackv2
from __future__ import print_function import os import subprocess from glob import glob import argparse import tarfile import h5py import numpy as np import scipy.io as sio parser = argparse.ArgumentParser(description='Download dataset for DCGAN.') parser.add_argument('--datasets', metavar='N', type=str, nargs='+',...
354
31.66
91
18
3,213
python
[{"finding_id": "codeql_py/tarslip_b9a91130a793cc71_c0666ffe", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 182 ]
[ null ]
[ 5 ]
[ 38 ]
2024-11-18T22:27:32.262449+00:00
1,538,147,953,000
50913cb35818109e1e7e0988eba95f26190fd8e9
3
{ "blob_id": "50913cb35818109e1e7e0988eba95f26190fd8e9", "branch_name": "refs/heads/master", "committer_date": 1538147953000, "content_id": "ae2795e6e9b7e847ab9149f5470ad8ca1769f385", "detected_licenses": [ "MIT" ], "directory_id": "191a31e33ef3dbe20600e26485c6f9b7f10c20b8", "extension": "py", "fi...
2.65625
stackv2
# -*- coding: utf-8 -*- import time import random import hmac import hashlib import binascii import base64 class Auth(object): def __init__(self, appid, sid, skey): self._appid, self._secretid, self._secretkey = str(appid), str(sid), str(skey) def setattr_appid(self, appid): self._appid = ap...
44
26.23
136
21
356
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_af7889445d6d6235_6364dfcf", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecu...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecure." ]
[ 40 ]
[ null ]
[ 63 ]
[ 83 ]
2024-11-18T22:27:43.581854+00:00
1,550,073,573,000
7307482cf47387b01db22ee6a33b906652648942
3
{ "blob_id": "7307482cf47387b01db22ee6a33b906652648942", "branch_name": "refs/heads/master", "committer_date": 1550073573000, "content_id": "93eabfb9381e1ccfcfce6d0e5d6174cae088219d", "detected_licenses": [ "MIT" ], "directory_id": "f6da76fa4aaceffc80517c41616a7e3427a60c6f", "extension": "py", "fi...
3.171875
stackv2
''' This script is what parses the environmental variables It then outputs the nagios config file ''' import os import re from jinja2 import Template with open('./objects.cfg.j2') as f: template = Template(f.read()) def parse_envs(): ''' Goes through all the environmental variables Any matching a n...
55
21.89
58
12
305
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_9205cf84a49da32a_c8bf7ef9", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 11 ]
[ null ]
[ 16 ]
[ 34 ]
2024-11-18T22:39:27.927201+00:00
1,595,412,989,000
2780a16272ac3bf077754ebfa64b882a23eafa57
3
{ "blob_id": "2780a16272ac3bf077754ebfa64b882a23eafa57", "branch_name": "refs/heads/master", "committer_date": 1683050932000, "content_id": "600284d525f8f350ae4efa8aeb4e198da499bdf3", "detected_licenses": [ "Apache-2.0" ], "directory_id": "88fe39a8bf06298dca399faa6f9cd8be30ef24d6", "extension": "py"...
2.609375
stackv2
#!/bin/python import numpy as np import ear.core.direct_speakers.panner from jinja2 import Template def rule_to_row(rule): possible_gains = [ (1.0, "1.0"), (0.0, "0.0"), (np.sqrt(1 / 2), "std::sqrt(1.0 / 2.0)"), (np.sqrt(1 / 3), "std::sqrt(1.0 / 3.0)"), (np.sqrt(2 / 3), "st...
72
26
97
14
582
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_8aae03a9f80b2955_27fed066", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 42 ]
[ 64 ]
[ 12 ]
[ 2 ]
2024-11-18T22:14:52.249378+00:00
1,630,397,386,000
da5fa6d7fd8fb760613dafac2378249d30402df5
3
{ "blob_id": "da5fa6d7fd8fb760613dafac2378249d30402df5", "branch_name": "refs/heads/main", "committer_date": 1630397386000, "content_id": "78959593421e3aa68d62e2fe14a6e2d6d327dbe8", "detected_licenses": [ "MIT" ], "directory_id": "73fb81433dc64440c00b4e98972b2166f289eff1", "extension": "py", "file...
2.546875
stackv2
import os, subprocess, re from termcolor import colored # Emitter object keeps track of the generated code and outputs it. class Emitter: def __init__(self, tempfile, verbose, keep_c_file, generate_header): self.tempfile = tempfile self.verbose = verbose self.keep_c_file = keep_c_file self.generate_header = g...
179
31.25
121
26
1,621
python
[{"finding_id": "codeql_py/overly-large-range_29b3789f74ab82d0_52ed89bc", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/overly-large-range", "py/overly-large-range" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]." ]
[ 148, 154 ]
[ null, null ]
[ 23, 28 ]
[ 26, 31 ]
2024-11-18T22:54:58.637957+00:00
1,577,686,043,000
98cc8a5c8e2a176554d134013968a5100f605696
2
{ "blob_id": "98cc8a5c8e2a176554d134013968a5100f605696", "branch_name": "refs/heads/master", "committer_date": 1577703854000, "content_id": "92d27005f3b835f610cddb6d3d0a4726e9595d0b", "detected_licenses": [ "Apache-2.0" ], "directory_id": "966be21ecb8a959455b2eec58e0e93e04e7adcba", "extension": "py"...
2.484375
stackv2
#!/usr/bin/python3 import hashlib import logging _LOGGER = logging.getLogger(__name__) from .wyzeapi_exceptions import * from .wyzeapi_bulb import WyzeBulb from .wyzeapi_switch import WyzeSwitch from .wyzeapi_request_manager import RequestManager class WyzeApi(): def __init__(self, user_name, password): self._us...
137
24.82
86
21
1,117
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_5bb124078652cee3_781710e3", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi...
[ 30 ]
[ null ]
[ 25 ]
[ 49 ]
2024-11-18T22:55:30.018752+00:00
1,605,320,340,000
4aeec8f62aebff076c3d497edd238aa2abe5696c
3
{ "blob_id": "4aeec8f62aebff076c3d497edd238aa2abe5696c", "branch_name": "refs/heads/master", "committer_date": 1605320340000, "content_id": "251cf13bd9ade1660c16b598a28eb98a741bc604", "detected_licenses": [ "MIT" ], "directory_id": "f77e5e938c418c3c796a2c41fbfe55488252d581", "extension": "py", "fi...
2.9375
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- import json from hashlib import md5 try: from urllib import quote # Python 2.X except ImportError: from urllib.parse import quote # Python 3+ import sys try: import httplib import sys reload(sys) sys.setdefaultencoding('utf8') except ImportErr...
114
27.62
105
25
889
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_367596467e73d1cc_4b370f9d", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 52 ]
[ null ]
[ 23 ]
[ 43 ]
2024-11-18T23:18:23.346669+00:00
1,677,059,212,000
40727a8f2ad69cefd76e5c59786ebef13f96ca3e
3
{ "blob_id": "40727a8f2ad69cefd76e5c59786ebef13f96ca3e", "branch_name": "refs/heads/master", "committer_date": 1677059212000, "content_id": "79cb38867f615e9677dc28ed9f3a983120d05604", "detected_licenses": [ "MIT" ], "directory_id": "a779689a0ed2c94aea4881168f5db4d933466a3f", "extension": "py", "fi...
2.796875
stackv2
from subprocess import call from tempfile import NamedTemporaryFile from jinja2 import Environment, BaseLoader, PackageLoader from axju.generic.execution import ExecutionWorker class TemplateWorker(ExecutionWorker): """This worker can work with steps like: { 'info': '....', 'template': 'templa...
82
31.5
79
20
539
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_c94c3ecf936c5886_b66839e9", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 26 ]
[ null ]
[ 28 ]
[ 62 ]
2024-11-19T00:07:13.886987+00:00
1,604,961,936,000
278aeb91c86b466fe30fd18b4bbfa15dd8dceafb
2
{ "blob_id": "278aeb91c86b466fe30fd18b4bbfa15dd8dceafb", "branch_name": "refs/heads/master", "committer_date": 1604961936000, "content_id": "d118c2ad00682ea81e7c3e2302306cf134450685", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "43c51921ea558c8bf3416cf53f208e6219788515", "extension": "p...
2.359375
stackv2
from flask import Flask, Blueprint, jsonify, request, abort, current_app, \ make_response import random import requests from sqlalchemy.sql import func from slackclient import SlackClient from friendbot.models import Friend import re friendbot = Blueprint('fb', __name__) def get_phrase(text, event): if...
263
24.03
121
19
1,965
python
[{"finding_id": "codeql_py/polynomial-redos_0184480b92709066_61a6546a", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings startin...
2
true
[ "CWE-1333", "CWE-918" ]
[ "py/polynomial-redos", "py/full-ssrf" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings starting with '>' and with many repetitions of '>'.", "The full URL of this request depends on a [user-provided value](1)." ]
[ 30, 69 ]
[ null, null ]
[ 35, 13 ]
[ 39, 43 ]
2024-11-19T00:07:26.624216+00:00
1,550,043,752,000
ea34707ad8de45f3d82a0c25cdfcc97e3f609d25
3
{ "blob_id": "ea34707ad8de45f3d82a0c25cdfcc97e3f609d25", "branch_name": "refs/heads/master", "committer_date": 1550043752000, "content_id": "969143e5e86e1cec44a3186991fea900be2b7806", "detected_licenses": [ "MIT" ], "directory_id": "032a03ee5d9bac309299b4648c2d38224ae0e628", "extension": "py", "fi...
3.265625
stackv2
#!/usr/bin/env python3.6 from password import User import pyperclip def create_account(user_name,email,password): ''' Function to create a new account ''' new_account = User(user_name,email,password) return new_account def save_accounts(account): ''' Function to save accountt ''' acc...
132
33.52
162
19
781
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_dfaff09cbd5538fc_fd95284f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 87, 107 ]
[ null, null ]
[ 45, 39 ]
[ 107, 82 ]
2024-11-19T00:45:03.878169+00:00
1,566,245,682,000
cc6b53303999f2c841423dcb3db04556e7574012
2
{ "blob_id": "cc6b53303999f2c841423dcb3db04556e7574012", "branch_name": "refs/heads/master", "committer_date": 1566245682000, "content_id": "2b3d4daef486e50f58f654afd76c9b2c1371b1cd", "detected_licenses": [ "MIT" ], "directory_id": "64f873c381ca29ddec4ff84f103928c6ecddd079", "extension": "py", "fi...
2.453125
stackv2
# coding: utf-8 """ POSTMAN TO ROBOTFRAMEWORK Usage: postman2robot [--ifile <inputfile>] [--ofile <outputfile>] [options] postman2robot -h Options: -i <inputfile>, --ifile <inputfile> Path to the postman collection. [default: collection.json] -o <outputfile>, --ofile <outputfile> Path to the output ...
84
31.62
115
15
644
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_964274e02d7545df_41d5ea12", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 74 ]
[ 76 ]
[ 11 ]
[ 6 ]
2024-11-18T23:28:36.991266+00:00
1,596,999,869,000
d12640bed9c2df6012e760a5bce3a8f3094aaa70
3
{ "blob_id": "d12640bed9c2df6012e760a5bce3a8f3094aaa70", "branch_name": "refs/heads/master", "committer_date": 1596999869000, "content_id": "47f601d2ab716a22c143500c5f0ea8338b550553", "detected_licenses": [ "MIT" ], "directory_id": "43a443e0cfb4bafff51a3932cbcf5f3cb31f7a7e", "extension": "py", "fi...
2.984375
stackv2
#!/usr/bin/env python """ This Python script leverages RESTCONF to: - retrieve a list of interfaces on a device - ask the user for the interface to configure - displays the interface IP information - asks user for new IP information - updates the IP address on the interface - dis...
186
32.18
90
25
1,252
python
[{"finding_id": "codeql_py/request-without-cert-validation_13059c453968ff32_6667cdcc", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
3
true
[ "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 58, 92, 106 ]
[ 62, 97, 110 ]
[ 16, 16, 16 ]
[ 30, 30, 30 ]
2024-11-18T23:40:02.218045+00:00
1,500,481,802,000
0a63d90423227ec84559f1f985a00cb6536a8f0b
2
{ "blob_id": "0a63d90423227ec84559f1f985a00cb6536a8f0b", "branch_name": "refs/heads/master", "committer_date": 1500481802000, "content_id": "b94f91256b0cb3e798c4dd67035d244c5e882946", "detected_licenses": [ "Apache-2.0" ], "directory_id": "57a2c45466fa73d0a0c2cedb76c92f2d72984c14", "extension": "py"...
2.328125
stackv2
import json import os from actions import allergy from actions import forecast from actions import openfood from actions import place from flask import Flask from flask import make_response from flask import request # Flask app should start in global layout app = Flask(__name__) @app.route('/', methods=['GET']) d...
88
27.72
63
12
606
python
[{"finding_id": "codeql_py/flask-debug_2cd3602c3b5238ec_ac9c9844", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 88, 56 ]
[ null, null ]
[ 5, 16 ]
[ 51, 25 ]
2024-11-19T00:18:41.025889+00:00
1,625,515,385,000
ca9520d85f54abb8f16787fe9968b06b5e50a8f5
3
{ "blob_id": "ca9520d85f54abb8f16787fe9968b06b5e50a8f5", "branch_name": "refs/heads/main", "committer_date": 1625515385000, "content_id": "c128ec7bca269e7d50bf8c9b3d9c3a04cdc83a59", "detected_licenses": [ "Apache-2.0" ], "directory_id": "243f90e0889dab12777572834bafa1eee6c6d453", "extension": "py", ...
2.84375
stackv2
#!/usr/bin/env python3 import sys try: from http.server import HTTPServer, BaseHTTPRequestHandler from urllib.parse import urlparse, parse_qs except ImportError: sys.exit('ERROR: It seems like you are not running Python 3. ' 'This script only works with Python 3!') import sqlite3 from html imp...
79
26.47
144
16
530
python
[{"finding_id": "codeql_py/sql-injection_1278ce15ae68a0d0_e90bee60", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown...
1
true
[ "CWE-089" ]
[ "py/sql-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This SQL query depends on a [user-provided value](1)." ]
[ 65 ]
[ null ]
[ 38 ]
[ 41 ]
2024-11-19T00:18:41.140364+00:00
1,504,125,395,000
2669b40a8ae619b3d5a34e63ee2ba39d41cab170
2
{ "blob_id": "2669b40a8ae619b3d5a34e63ee2ba39d41cab170", "branch_name": "refs/heads/master", "committer_date": 1504125395000, "content_id": "c4ff4aaecf36b8e99165e146994e086264595e0f", "detected_licenses": [ "MIT" ], "directory_id": "03008e7193dc44f53bf23efc3c833d20b13c9516", "extension": "py", "fi...
2.453125
stackv2
# encoding: utf-8 from __future__ import unicode_literals from urlparse import urlparse from workflow import Workflow, MATCH_ALL, MATCH_ALLCHARS import argparse import subprocess import sys #################################################################### # Alfred Applescript Commands ##########################...
291
26.55
73
16
1,677
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_66bda1971c6c3167_52885100", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 190, 238 ]
[ null, null ]
[ 11, 15 ]
[ 38, 23 ]
2024-11-19T01:11:13.065397+00:00
1,631,352,688,000
0d25e5b5d734fca21c3d06ef34677924a78dc1ed
3
{ "blob_id": "0d25e5b5d734fca21c3d06ef34677924a78dc1ed", "branch_name": "refs/heads/master", "committer_date": 1631352688000, "content_id": "7015afc38d200c7f9511ccf94cf7b76b0dfcf9df", "detected_licenses": [ "MIT" ], "directory_id": "e25720a94f131a2bd7622b5abe325d68ba724af6", "extension": "py", "fi...
2.703125
stackv2
from flask import Flask, request, render_template, redirect import app_functions as func from flask_mysqldb import MySQL import yaml app = Flask(__name__) mdb = yaml.load(open('db.yaml')) app.config['MYSQL_HOST'] = mdb['mysql_host'] app.config['MYSQL_USER'] = mdb['mysql_user'] app.config['MYSQL_PASSWORD'] = mdb['mysq...
36
28.78
92
12
251
python
[{"finding_id": "codeql_py/flask-debug_0bbe63b6b8ec673f_93606585", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-601" ]
[ "py/flask-debug", "py/url-redirection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 35, 22 ]
[ null, null ]
[ 5, 25 ]
[ 24, 57 ]
2024-11-18T23:46:49.376265+00:00
1,691,570,507,000
a34e1b453749d0f6b8cab15ca07f2da23e019d48
3
{ "blob_id": "a34e1b453749d0f6b8cab15ca07f2da23e019d48", "branch_name": "refs/heads/master", "committer_date": 1691570507000, "content_id": "fc8e53a8f822df5fa6fe6d657198208df36e26dd", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "69fda23fe612add785ed3b0ec2b116e995b6f5e6", "extension": "p...
3.140625
stackv2
""" Functions facilitating file operations """ import os import sys import errno import time from warnings import warn from tarfile import open as topen from hashlib import md5 __all__ = [ "checksum", "size", "filesize_to_str", "untar", "create_lock", "remove_lock", "wait_for_lock", "...
260
29.26
88
19
1,864
python
[{"finding_id": "codeql_py/tarslip_941e1ef1a3135ef2_482e7733", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 110 ]
[ null ]
[ 9 ]
[ 11 ]
2024-11-18T23:46:51.468886+00:00
1,602,101,863,000
6d42753233a83e9b7aa447b22e8e0e844b7b7b11
3
{ "blob_id": "6d42753233a83e9b7aa447b22e8e0e844b7b7b11", "branch_name": "refs/heads/master", "committer_date": 1602101863000, "content_id": "f2c3cae1bc75292918181e1efa4f12aece23f70f", "detected_licenses": [ "MIT" ], "directory_id": "104a9ff80f9c83855624e43061365e37da07b3c3", "extension": "py", "fi...
2.53125
stackv2
from datetime import datetime import os import pytz import requests import math import base64 API_TOKEN = os.getenv("API_KEY") API_URL = ('http://api.openweathermap.org/data/2.5/weather?q={}&country()&mode=json&units={}&av_temp{}&av_wind{}&appid={}') temp_threshold = "" wind_threshold = "" def query_api(city, countr...
21
29.67
123
14
160
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_916fb4f0c120ff69_d19a9cea", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 16 ]
[ null ]
[ 15 ]
[ 94 ]
2024-11-18T23:48:06.860900+00:00
1,619,870,888,000
6eae9d08818f5a449cb7e36c879d780d4b8a8ad2
3
{ "blob_id": "6eae9d08818f5a449cb7e36c879d780d4b8a8ad2", "branch_name": "refs/heads/main", "committer_date": 1619870888000, "content_id": "3083d60b5c2add62348fae41de58fba515e7d198", "detected_licenses": [ "MIT" ], "directory_id": "379407662d25f5cd8b59c9ea97a2c16b2ada0c22", "extension": "py", "file...
2.515625
stackv2
import os from flask import Flask, flash, g, request, redirect, url_for, send_from_directory, Blueprint, render_template, current_app from werkzeug.utils import secure_filename from flask import current_app from flaskr.db import get_db import cv2 import numpy as np from PIL import Image, ImageFilter, ImageOps from ...
123
34.02
153
18
923
python
[{"finding_id": "codeql_py/url-redirection_4a70c680ad1f5227_d24c1632", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
3
true
[ "CWE-601", "CWE-601", "CWE-022" ]
[ "py/url-redirection", "py/url-redirection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 37, 44, 93 ]
[ null, null, null ]
[ 29, 29, 19 ]
[ 40, 40, 32 ]
2024-11-18T23:48:18.096261+00:00
1,619,812,219,000
29468ece6b684f314ff63d4696aa021f68ddd3ea
3
{ "blob_id": "29468ece6b684f314ff63d4696aa021f68ddd3ea", "branch_name": "refs/heads/main", "committer_date": 1619812219000, "content_id": "00e6bde5cb88c79b69c86dad8a641039611c8a7c", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "e26682c2ce378a724a0dc133d695c51f4beea2b4", "extension": "py"...
2.53125
stackv2
#!/usr/bin/env python3 # data.py - script used to produce database results over HTTP for simple sqlite3 database import cgi import sqlite3 conn = sqlite3.connect('/etc/httpd/db/clients.db') curs = conn.cursor() print("Content-type:text/plain\n\n") form = cgi.FieldStorage() querystring = form.getvalue("querystring"...
27
22.78
89
12
157
python
[{"finding_id": "codeql_py/sql-injection_1c1f9b57c969c2b1_c625f887", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown...
1
true
[ "CWE-089" ]
[ "py/sql-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This SQL query depends on a [user-provided value](1)." ]
[ 21 ]
[ null ]
[ 25 ]
[ 31 ]
2024-11-19T00:29:34.209575+00:00
1,665,502,661,000
8b7f67195a1db50326e670dcd2bdb1f978a9ad01
3
{ "blob_id": "8b7f67195a1db50326e670dcd2bdb1f978a9ad01", "branch_name": "refs/heads/master", "committer_date": 1665502661000, "content_id": "dbfe2f4eabed3bf1bf535b0c01bc9aed41a220f3", "detected_licenses": [ "Apache-2.0" ], "directory_id": "2457d44a9c817a125c89c60f1d25546a02b1376d", "extension": "py"...
2.671875
stackv2
"""Auth StarLine API.""" import hashlib import logging from .base_api import BaseApi _LOGGER = logging.getLogger(__name__) class StarlineAuth(BaseApi): """Auth StarLine API class.""" def get_app_code(self, app_id: str, app_secret: str) -> str: """Get application code for getting application token.""...
72
38.64
176
18
639
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_925e0bb00258c866_264adcbe", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
3
true
[ "CWE-327", "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure.", "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure.", "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computation...
[ 18, 37, 57 ]
[ null, null, null ]
[ 35, 35, 34 ]
[ 68, 81, 70 ]
2024-11-19T00:44:15.154673+00:00
1,355,814,666,000
fd52b10bdbb7c8bec6f023b8feb88ee67d067a6b
3
{ "blob_id": "fd52b10bdbb7c8bec6f023b8feb88ee67d067a6b", "branch_name": "refs/heads/master", "committer_date": 1355814666000, "content_id": "70b3b62e2da7c8d577e224332ce870f744f49e82", "detected_licenses": [ "MIT" ], "directory_id": "a6db679289430b7f5b6e38015746dd7286757f77", "extension": "py", "fi...
2.6875
stackv2
#!/usr/bin/python2 # coding: utf8 import codecs import collections import os import os.path import sys import shutil import markdown import jinja2 import pygments try: progname, src, dst = sys.argv[:3] except: print u"USAGE: python dirtgen.py <source_dir> <destination_dir>" sys.exit(1) resource_dir = os...
150
27.3
87
15
1,014
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_fda23db4b01621d5_229910ee", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 25 ]
[ null ]
[ 14 ]
[ 78 ]
2024-11-18T23:05:41.179871+00:00
1,625,873,740,000
5d3f94434ea5c9b5baba4bd15484ca1e58bcd506
2
{ "blob_id": "5d3f94434ea5c9b5baba4bd15484ca1e58bcd506", "branch_name": "refs/heads/main", "committer_date": 1625873740000, "content_id": "1c2face545dd062fe54a536105bb96199cb04a25", "detected_licenses": [ "MIT" ], "directory_id": "c60fb303c609e62d20683d6192df92cc1dd3ab26", "extension": "py", "file...
2.453125
stackv2
import os from os.path import dirname, join, exists, abspath import pandas as pd from jinja2 import Environment, FileSystemLoader __all__ = ['template_loader'] class TemplateLoader: def __init__(self): template_dirs = { join(dirname(__file__), 'templates'), join(dirname(pd.__file...
28
28.25
69
14
167
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_6c46fb1b8a198200_a71585df", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 17 ]
[ null ]
[ 20 ]
[ 64 ]
2024-11-18T23:05:48.246313+00:00
1,612,472,128,000
2a6d33ae53bcd8dde441bd7e516e287f44dba6ab
3
{ "blob_id": "2a6d33ae53bcd8dde441bd7e516e287f44dba6ab", "branch_name": "refs/heads/master", "committer_date": 1612472128000, "content_id": "ededa081d5c17d3fd8c4c4620b6b93cecfcd2f35", "detected_licenses": [], "directory_id": "e827c22a34c76a39d461f42f10495cf6edc0f1cc", "extension": "py", "filename": "pub...
3.1875
stackv2
# CS 171 Final Project, Web Scraping # The hope of this file is to get an adjacency matrix of Harvard faculty co-authors # perhaps keep track of count of times that two authors are on same paper # feel free to ask Tyler Piazza about this file import numpy as np import pandas as pd import re import requests from time i...
176
36.99
147
21
1,638
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9bd298c3a7824ded_c276f54b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text." ]
[ 74, 147 ]
[ null, null ]
[ 21, 15 ]
[ 67, 61 ]
2024-11-18T23:11:13.869840+00:00
1,487,094,642,000
5191387d5cced93c19a8c8df394ea7377cf28020
3
{ "blob_id": "5191387d5cced93c19a8c8df394ea7377cf28020", "branch_name": "refs/heads/master", "committer_date": 1487094642000, "content_id": "a353e28f1334a9ca44438ff206acdfb5c63d6d21", "detected_licenses": [ "Apache-2.0" ], "directory_id": "616060f562bc07b246718dcf95c9b418bc79201b", "extension": "py"...
2.703125
stackv2
""" Gather relevance scores for given """ import json baseQuery = { "query": { "bool": { "filter": { "ids": { "values": [ # list of ids goes here ] } }, "should": { # query goes here } } ...
92
30.72
104
17
676
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_a2a4bbdbcdc8642c_9a23c658", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 51 ]
[ null ]
[ 16 ]
[ 62 ]
2024-11-18T23:11:14.951116+00:00
1,533,267,105,000
247c92ab12ac0e4fd230038b2a202e922069121d
3
{ "blob_id": "247c92ab12ac0e4fd230038b2a202e922069121d", "branch_name": "refs/heads/master", "committer_date": 1533267105000, "content_id": "dce23c15acb3df5446b32abb074a2230c4f3dcd7", "detected_licenses": [ "MIT" ], "directory_id": "5564d74bf4849269864e7aeca7d5e49606c28164", "extension": "py", "fi...
2.65625
stackv2
# coding:utf-8 import datetime from flask import render_template, redirect, url_for, request,flash from config.manager import app # from models.models import db from models.category import Category,db from route.func import user_login_required from route.forms import CatEditForm,CatForm # 发布文章 @app.route('/cat/add/'...
76
27.38
95
17
583
python
[{"finding_id": "codeql_py/url-redirection_06ea75cd4e72cb01_a96b4b22", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
2
true
[ "CWE-601", "CWE-601" ]
[ "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 47, 61 ]
[ null, null ]
[ 25, 21 ]
[ 80, 76 ]
2024-11-19T01:21:44.494720+00:00
1,441,518,143,000
dffefe691f9d073be6846e57bc76697274a8dc82
2
{ "blob_id": "dffefe691f9d073be6846e57bc76697274a8dc82", "branch_name": "refs/heads/master", "committer_date": 1441518143000, "content_id": "77a5e28748dc9c8f885480944e8e61ecb41b8b8d", "detected_licenses": [ "Apache-2.0" ], "directory_id": "3a21faa925e8a21ad5e0d6dedf3037cc52750cbd", "extension": "py"...
2.34375
stackv2
import os import socket import warnings import paramiko from paramiko.ssh_exception import BadHostKeyException, AuthenticationException, SSHException from libcloud.compute.base import NodeImage from datasciencebox.core.logger import getLogger logger = getLogger() from datasciencebox.core.exceptions import DSBExceptio...
267
31.43
93
16
1,769
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_c44f1de6010442ec_ef01c827", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 143 ]
[ null ]
[ 9 ]
[ 66 ]
2024-11-19T00:36:51.266045+00:00
1,493,785,596,000
bd6e82a9ee0019e51bad419729840b4ac3d2c9e0
2
{ "blob_id": "bd6e82a9ee0019e51bad419729840b4ac3d2c9e0", "branch_name": "refs/heads/master", "committer_date": 1493785596000, "content_id": "f247e182c6182e23e98ba5f3c971ccecb45895e0", "detected_licenses": [ "Apache-2.0" ], "directory_id": "6a6b81f740463782529cd8b46792132f02967016", "extension": "py"...
2.359375
stackv2
import tornado.web import tornado.gen import tornado.httpclient import requests from config import config class InfoController(tornado.web.RequestHandler): def set_default_headers(self): self.set_header("Access-Control-Allow-Origin", "*") self.set_header("Access-Control-Allow-Headers", "x-requeste...
26
30.69
86
14
179
python
[{"finding_id": "codeql_py/reflective-xss_d4709e9d933b54e9_5c092870", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
2
true
[ "CWE-079", "CWE-918" ]
[ "py/reflective-xss", "py/partial-ssrf" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 26, 25 ]
[ null, null ]
[ 20, 20 ]
[ 36, 53 ]
2024-11-19T00:36:52.821447+00:00
1,612,798,688,000
b3ddf3408eab25ef966c862975f62298c3bc5529
3
{ "blob_id": "b3ddf3408eab25ef966c862975f62298c3bc5529", "branch_name": "refs/heads/main", "committer_date": 1612798688000, "content_id": "334da747430fa12c5bacee9dd8b298ba16a6ee7f", "detected_licenses": [ "MIT" ], "directory_id": "a7aac07691604d252cd0b1bf5dbe218f9a9d1317", "extension": "py", "file...
2.6875
stackv2
from Crypto.PublicKey import RSA from Crypto.Cipher import PKCS1_v1_5 from models.key_pair import KeyPair from tp_link_cipher import TpLinkCipher import base64, hashlib, helpers, logging logger = logging.getLogger('root') class Encryption: def generate_key_pair(self) -> KeyPair: logger.debug(f"Generating ...
66
33.14
88
16
567
python
[{"finding_id": "codeql_py/weak-crypto-key_84ffe15f35c0ab7b_ab4ff197", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",...
1
true
[ "CWE-326" ]
[ "py/weak-crypto-key" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable." ]
[ 12 ]
[ null ]
[ 15 ]
[ 33 ]
2024-11-19T00:36:58.966359+00:00
1,564,266,138,000
ee71c933e01d01f71f9761d382bb878f544f0a20
2
{ "blob_id": "ee71c933e01d01f71f9761d382bb878f544f0a20", "branch_name": "refs/heads/master", "committer_date": 1564266138000, "content_id": "66f477b74dd28f42db15a2b87b51dd77d842b3b3", "detected_licenses": [ "MIT" ], "directory_id": "30b91b07a7f22dda9659cef865dc87ef312b6b78", "extension": "py", "fi...
2.328125
stackv2
from datetime import datetime from urllib.parse import unquote import traceback import sys # Django from django.db.models import Q from django.contrib.gis.geos import GEOSGeometry from django.contrib.gis.db.models.functions import Distance # REST Framework from rest_framework.response import Response from rest_framewor...
67
34.51
112
22
509
python
[{"finding_id": "codeql_py/stack-trace-exposure_80d6876bdcfb9f43_66e7f2a6", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 30, 67 ]
[ null, null ]
[ 29, 29 ]
[ 66, 66 ]
2024-11-19T01:02:11.677015+00:00
1,611,080,235,000
137208aa5468b70b0b3a398db097facb8432b8ea
4
{ "blob_id": "137208aa5468b70b0b3a398db097facb8432b8ea", "branch_name": "refs/heads/main", "committer_date": 1611080235000, "content_id": "6e2bcc88ad0a6f29762ee6e25b0ed1856f3b39a0", "detected_licenses": [ "MIT" ], "directory_id": "8e79c3ea650743890bb68c07b38d7bc58fb8e757", "extension": "py", "file...
3.71875
stackv2
# Author: Joseph Finley # Open Weather Map API # # Purpose: Take user supplied zip code and make # an API call for a 5 day forcast. # # import requests, calendar from collections import Counter # Forecast Object to organize data from request class Forecast(): def __init__(self,date): self.da...
176
26.53
115
14
1,238
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3d534547f8254cc5_e9520af4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 120 ]
[ null ]
[ 7 ]
[ 58 ]
2024-11-19T01:02:21.164408+00:00
1,485,985,932,000
733b644aeb817e8a23b3d368d258809382f74d9d
3
{ "blob_id": "733b644aeb817e8a23b3d368d258809382f74d9d", "branch_name": "refs/heads/master", "committer_date": 1485985932000, "content_id": "621c6f7e88b42ed640a39994a94f3ea45ab85297", "detected_licenses": [ "MIT" ], "directory_id": "59d48ed667d1994068b60212939a2ef86dc1056e", "extension": "py", "fi...
2.984375
stackv2
import configparser import getopt import logging.config import sys from wordscounterbot.twitch_words_counter_bot import TwitchWordsCounterBot default_server = "irc.chat.twitch.tv" default_port = 6667 def main(argv): server, port, channel, nickname, password = read_command_line_args(argv) logging.info("serve...
103
28.4
119
13
683
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_120a3a990039df21_3273385e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text." ]
[ 14 ]
[ null ]
[ 18 ]
[ 103 ]
2024-11-19T00:13:41.618412+00:00
1,546,604,557,000
c382f77cf455d426bb6011a25e73fa5f7fd0b1fd
3
{ "blob_id": "c382f77cf455d426bb6011a25e73fa5f7fd0b1fd", "branch_name": "refs/heads/master", "committer_date": 1546604557000, "content_id": "cca16b4b0fac117b68767ca924db201430387bcd", "detected_licenses": [ "MIT" ], "directory_id": "acfcf0c6a4e5ee27581b21dfc9f8715d5fb5bb72", "extension": "py", "fi...
2.734375
stackv2
import os import pathlib import glob import shutil from jinja2 import Environment, FileSystemLoader, meta, Template def get_variables(filename): env = Environment(loader=FileSystemLoader('.')) template_source = env.loader.get_source(env, filename)[0] parsed_content = env.parse(template_source) return meta.find_u...
67
24.39
77
21
427
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_67080e4992bd1526_7e1f98a3", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 10, 59 ]
[ null, null ]
[ 8, 8 ]
[ 49, 25 ]
2024-11-19T00:13:42.542975+00:00
1,559,339,510,000
ba08c2a37a633321213729f8d9818fa64c6784fe
3
{ "blob_id": "ba08c2a37a633321213729f8d9818fa64c6784fe", "branch_name": "refs/heads/master", "committer_date": 1559339510000, "content_id": "ab9c1e9b730f0c015bc5690f30421534cc38daa7", "detected_licenses": [ "MIT" ], "directory_id": "98211715774fa38226c6e98594bd09c91ed439b2", "extension": "py", "fi...
3.046875
stackv2
from cryptography.fernet import Fernet import rsa import hashlib import binascii import base64 import os def newSalt(size=16): '''Generate a new salt.''' salt = os.urandom(size) return salt def hashText(text, algorithm="sha512", salt=b""): '''Hash some text. It is highly recommended that a salt be use...
60
28.5
71
10
427
python
[{"finding_id": "codeql_py/weak-crypto-key_7de26998a3100156_327eb1b4", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [512](1) bits, which is below 2048 and considered breakable.", "remediation": "", ...
2
true
[ "CWE-326", "CWE-327" ]
[ "py/weak-crypto-key", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Creation of an RSA key uses [512](1) bits, which is below 2048 and considered breakable.", "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 49, 26 ]
[ null, null ]
[ 17, 26 ]
[ 37, 34 ]
2024-11-19T00:13:42.726866+00:00
1,627,740,937,000
5c9297e67b37f8b3d2d5f8aa66e54752b13623ed
2
{ "blob_id": "5c9297e67b37f8b3d2d5f8aa66e54752b13623ed", "branch_name": "refs/heads/main", "committer_date": 1627740937000, "content_id": "69e536ed52286ce704223b9d383f24a82c330d4f", "detected_licenses": [ "Apache-2.0" ], "directory_id": "a970da89b5d3185197d33b45ebed94df104c8d49", "extension": "py", ...
2.328125
stackv2
from tornado.web import RequestHandler # 登录逻辑判断 async def check_user(name, passwd): result = { "is_success": False, "token": "" } if name == "1" and passwd == "1": result = { "is_success": True, "token": "good" } return result # 登录,返回json class...
51
26.69
77
15
330
python
[{"finding_id": "codeql_py/reflective-xss_801b5eb3478a41d2_0b2f683b", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/reflective-xss", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 36, 42 ]
[ 40, 46 ]
[ 24, 24 ]
[ 14, 14 ]
2024-11-19T01:26:12.900650+00:00
1,633,986,868,000
c21dd5f4781bf0fda006dc147df791fc3028f58b
2
{ "blob_id": "c21dd5f4781bf0fda006dc147df791fc3028f58b", "branch_name": "refs/heads/main", "committer_date": 1633986868000, "content_id": "d44c13ed63da5a4d3265108368d3bd664e43a616", "detected_licenses": [ "Apache-2.0" ], "directory_id": "572ef64ef925f049cd821be90e1558250adf5e3a", "extension": "py", ...
2.421875
stackv2
import errno import re import socket import traceback from typing import List, Dict import numpy as np from flask import jsonify from lexsubgen.metrics.candidate_ranking_metrics import compute_gap, WORD_PAT_RE from lexsubgen.utils.wordnet_relation import get_wordnet_relation def get_free_port(): with socket.soc...
231
32.92
88
17
1,726
python
[{"finding_id": "codeql_py/stack-trace-exposure_205eef079ad9c8c6_877276ec", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
4
true
[ "CWE-209", "CWE-209", "CWE-200", "CWE-200" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure", "py/bind-socket-all-network-interfaces", "py/bind-socket-all-network-interfaces" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "'' binds a socket to all interfaces.", "'' binds a socket to all interfaces." ]
[ 54, 55, 16, 30 ]
[ null, null, null, null ]
[ 25, 27, 9, 9 ]
[ 31, 41, 27, 30 ]
2024-11-19T01:39:56.013696+00:00
1,627,323,707,000
c4dcc5383c9b8d2ec846d924e4f40c78477a958a
2
{ "blob_id": "c4dcc5383c9b8d2ec846d924e4f40c78477a958a", "branch_name": "refs/heads/master", "committer_date": 1629392778000, "content_id": "ab59e62b646064734410e26fcc3da7b97e04895f", "detected_licenses": [ "Apache-2.0" ], "directory_id": "1dbb6f31d36e25fae0a8df9005186e8dcc8db178", "extension": "py"...
2.5
stackv2
import http.client import http.server assert __name__ == '__main__', 'this module should only be executed, not imported' REAL_HOST = 'snapshot.debian.org' REAL_PATH = '/archive/debian-ports/20190706T203242Z' URL_LIST = open('debian-urls.txt', 'w') class Handler(http.server.BaseHTTPRequestHandler): def do_GET(se...
36
30.44
82
13
288
python
[{"finding_id": "codeql_py/partial-ssrf_1cf4dd6c82480897_e23dddf0", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil...
1
true
[ "CWE-918" ]
[ "py/partial-ssrf" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 17 ]
[ null ]
[ 9 ]
[ 51 ]
2024-11-18T23:43:34.231077+00:00
1,493,232,202,000
dc26a5757dc0b6fde4997dec5a24738257e4825b
3
{ "blob_id": "dc26a5757dc0b6fde4997dec5a24738257e4825b", "branch_name": "refs/heads/master", "committer_date": 1493232202000, "content_id": "79c085982550e86b34ec09ec5fd25e52ca346e10", "detected_licenses": [ "MIT" ], "directory_id": "d5e12d59e5e701bc18de5a182e07ceacc8112e71", "extension": "py", "fi...
2.5625
stackv2
from flask import * from functools import wraps import os import sqlite3 app = Flask(__name__) app.config.from_object(__name__) # load config from this file # Load default config and override config from an environment variable app.config.update(dict( DATABASE=os.path.join(app.root_path, 'sims.db'), SECRET...
162
29.86
161
18
1,090
python
[{"finding_id": "codeql_py/flask-debug_d00b40880ce46914_043d892c", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-601", "CWE-089" ]
[ "py/flask-debug", "py/url-redirection", "py/sql-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Untrusted URL redirection depends on a [user-provided value](1).\nUntrusted URL redirection depends on a [user-provided value](2).\nUntrusted URL redirection depends on a [user-provided value](3...
[ 162, 146, 51 ]
[ null, null, null ]
[ 5, 33, 28 ]
[ 24, 57, 33 ]
2024-11-19T01:18:09.678531+00:00
1,531,485,092,000
d932693153e83b3d99fc532391eb1230235b7491
2
{ "blob_id": "d932693153e83b3d99fc532391eb1230235b7491", "branch_name": "refs/heads/master", "committer_date": 1531485092000, "content_id": "87b44bd9c334442abfa40d2e2a81082cac496b5e", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "8a4d981a17a8a4b00f6ab7f4bebf9fbb7b7bad5d", "extension": "p...
2.3125
stackv2
# -*- coding: utf-8 -*- ######################################################################### # # Copyright 2018, GeoSolutions Sas. # All rights reserved. # # This source code is licensed under the BSD-style license found in the # LICENSE file in the root directory of this source tree. # ###########################...
313
33.01
122
19
2,313
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_2997ca484ff4b328_7dd02a0f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 197 ]
[ 198 ]
[ 14 ]
[ 43 ]
2024-11-19T01:54:17.903274+00:00
1,585,149,541,000
40e0dd6167356642598242982a2bf785cb699e45
3
{ "blob_id": "40e0dd6167356642598242982a2bf785cb699e45", "branch_name": "refs/heads/master", "committer_date": 1585149541000, "content_id": "f5a0d29a39b49c70a745632402f535d37db8d189", "detected_licenses": [ "MIT" ], "directory_id": "a074ef7c0a936946f56c8f5f8947b00365c4b8fd", "extension": "py", "fi...
3.171875
stackv2
""" The Stand News client to extract news from the Stand News. It can get the news index and the news content """ import requests import lxml from datetime import datetime, date import json from dateutil import parser import re from bs4 import BeautifulSoup from .News import News class theStandNewsClient: m...
190
30.35
86
22
1,146
python
[{"finding_id": "codeql_py/bad-tag-filter_576649cf7122e0e6_0016c751", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression does not match upper case <SCRIPT> tags.", "remediation": "", "location": {"file_path": ...
1
true
[ "CWE-116" ]
[ "py/bad-tag-filter" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression does not match upper case <SCRIPT> tags." ]
[ 172 ]
[ null ]
[ 25 ]
[ 52 ]
2024-11-19T00:02:47.014610+00:00
1,657,908,305,000
f99e674edd62e9e55c01c7543e08d9ba6ae7f407
3
{ "blob_id": "f99e674edd62e9e55c01c7543e08d9ba6ae7f407", "branch_name": "refs/heads/master", "committer_date": 1657908305000, "content_id": "467dfa98c88c15ffc388095a4a8339b13755b9a4", "detected_licenses": [ "MIT" ], "directory_id": "ed81f401dcd2ce0399cec3a99b6e5851e62e74ca", "extension": "py", "fi...
2.859375
stackv2
#!/usr/bin/env python3 import httplib2 import re import socket import sys def parse_links(filename): """Returns a list of URLs from text file""" with open(filename) as fp: data = fp.read() raw_links = re.findall( 'http[s]?://(?:[a-zA-Z]|[0-9]|[$-_@.&+]|[!*\(\),]|(?:%[0-9a-fA-F][0-9a-fA-F]...
48
28.4
89
16
363
python
[{"finding_id": "codeql_py/overly-large-range_b21159ed1a28d2ed_5d714f69", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 14 ]
[ null ]
[ 40 ]
[ 43 ]
2024-11-19T00:15:32.464200+00:00
1,635,181,558,000
62dd7983299b9ebac47ea4ceddb98e49757098fd
2
{ "blob_id": "62dd7983299b9ebac47ea4ceddb98e49757098fd", "branch_name": "refs/heads/main", "committer_date": 1635181558000, "content_id": "58666e1226fd2d317f1fa8ea12567e95a02cb5ea", "detected_licenses": [ "MIT" ], "directory_id": "90d28e4d3aafc94277b60c4c970a3623969e271e", "extension": "py", "file...
2.421875
stackv2
""" File: lambda_function.py Project: ccda_step4_converter File Created: Friday, 17th July 2020 7:04:34 pm Author: Canivel, Danilo (dccanive@amazon.com) Description: Execute the conversion to generate a FHIR Bundle typer Batch ----- Last Modified: Tuesday, 12th January 2021 8:48:48 am Modified By: Canivel, Danilo (dcca...
195
34.84
134
16
1,651
python
[{"finding_id": "codeql_py/request-without-cert-validation_04eae619a835f52a_3b9cbb99", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 112, 117 ]
[ null, null ]
[ 19, 28 ]
[ 79, 95 ]
2024-11-19T01:02:51.609159+00:00
1,605,610,337,000
ae1120743f8620e6fdbf4fdd1b6d150173659caf
3
{ "blob_id": "ae1120743f8620e6fdbf4fdd1b6d150173659caf", "branch_name": "refs/heads/master", "committer_date": 1605610337000, "content_id": "8aefaac44a682d7636a00544760054c8de431dd4", "detected_licenses": [ "MIT" ], "directory_id": "26bb974dc94e44e3b8b9cf4d4fcd56b3244a71c4", "extension": "py", "fi...
2.984375
stackv2
#!/usr/bin/env python3 import sys,re regex = re.compile('[^a-zA-Z]') TownName = "Paris" # input comes from STDIN (standard input) for line in sys.stdin: UserName = None UserPhoneNumber = 0 CallFrom = 0 CallDuration = 0 # remove leading and trailing whitespace line = line.strip() # split the line into word...
26
25.73
79
11
203
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_542c65357d1a66f0_653239fd", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 25 ]
[ null ]
[ 9 ]
[ 79 ]
2024-11-19T02:00:39.851478+00:00
1,608,027,130,000
dcdc719a4f187d550b516b2b4b653f35e1c43935
3
{ "blob_id": "dcdc719a4f187d550b516b2b4b653f35e1c43935", "branch_name": "refs/heads/main", "committer_date": 1608027130000, "content_id": "081bf5ba982650fd3101d8ad21a780106b1940e9", "detected_licenses": [ "MIT" ], "directory_id": "a251391add0a459eeded2e7084d7e3a2c40ab9f8", "extension": "py", "file...
2.609375
stackv2
import logging from datetime import datetime, date, timedelta from pathlib import Path import requests import os from io import BytesIO import zipfile import csv from pathlib import Path requests.packages.urllib3.disable_warnings() requests.packages.urllib3.util.ssl_.DEFAULT_CIPHERS += ':HIGH:!DH:!aNULL' class Gesu...
97
35.24
136
19
704
python
[{"finding_id": "codeql_py/request-without-cert-validation_1bb756ed10820574_1fa331b5", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 27 ]
[ null ]
[ 13 ]
[ 62 ]
2024-11-19T00:16:10.470736+00:00
1,633,821,470,000
2721deb46b13b5d304dc2bfae7c4672060931850
3
{ "blob_id": "2721deb46b13b5d304dc2bfae7c4672060931850", "branch_name": "refs/heads/master", "committer_date": 1633821470000, "content_id": "8ee1ec4f22b9acf56aa4944cb66f323c04d4f769", "detected_licenses": [ "MIT" ], "directory_id": "6a349e04a3ae9f21417437b7b96aea72c6055f5c", "extension": "py", "fi...
2.625
stackv2
import itertools import struct from cryptography.hazmat.backends import default_backend from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes GET_ITEM = "a" EVAL = "b" ADD = "c" TO_CHAR = "d" ZERO = "e" ONE = "f" USER_PASSWORD = "g" HASH_COMPARISON = "h" PASSWORD = "Passw0rd!" PASSWORD_HASH = ...
271
27.77
85
15
2,215
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_1d849344b1785cda_bf3095ea", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
7
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sen...
[ 258, 60, 60, 60, 60, 252, 21 ]
[ null, null, null, null, null, null, null ]
[ 17, 32, 37, 41, 47, 11, 7 ]
[ 30, 35, 39, 45, 51, 15, 20 ]
2024-11-19T00:28:32.210478+00:00
1,637,152,819,000
d6e5bc7fba2aeb92ade22e2ad67595e5d3a04af4
2
{ "blob_id": "d6e5bc7fba2aeb92ade22e2ad67595e5d3a04af4", "branch_name": "refs/heads/main", "committer_date": 1637152819000, "content_id": "63aa8945b71fb14215a4d1fee81660def59da29c", "detected_licenses": [ "Apache-2.0" ], "directory_id": "fe8f5bc9681b8808fc7504975597a45d575f5e66", "extension": "py", ...
2.453125
stackv2
import os from flask import Flask, flash, request, redirect, url_for, render_template, make_response from app.identify import identify_animal_kind, identify_animal_kinds from werkzeug.utils import secure_filename from flask import send_from_directory UPLOAD_FOLDER = './uploads' ALLOWED_EXTENSIONS = {'png', 'jpg', 'jpe...
63
42.68
117
18
573
python
[{"finding_id": "codeql_py/url-redirection_537e3d750531683f_e8e1d894", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
2
true
[ "CWE-601", "CWE-601" ]
[ "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 26, 32 ]
[ null, null ]
[ 33, 33 ]
[ 44, 44 ]
2024-11-19T00:28:36.766198+00:00
1,534,262,888,000
58cc4e3cf30ffa7d52c8bef2e7e5b93ab6e331bb
2
{ "blob_id": "58cc4e3cf30ffa7d52c8bef2e7e5b93ab6e331bb", "branch_name": "refs/heads/master", "committer_date": 1534262888000, "content_id": "17582a01e591bbc551ccc8771c63d416f429e85a", "detected_licenses": [ "MIT" ], "directory_id": "d333d5f11f51611df682ad2983d42b0d22e8b757", "extension": "py", "fi...
2.5
stackv2
from flask import redirect, url_for, request, render_template, Blueprint, flash from flask_login import login_user, logout_user from sqlalchemy import or_ from OrderSystem import forms, db, sentry from OrderSystem.sql.ORM import User from OrderSystem.utilities.Helpers import verify_password, flash_errors from OrderSys...
58
31.88
103
17
388
python
[{"finding_id": "codeql_py/url-redirection_b29a9eb185e0556f_7538634d", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 41 ]
[ null ]
[ 29 ]
[ 88 ]
2024-11-19T00:51:29.118228+00:00
1,374,517,442,000
cd3ecca0eeb72da63366e82cabd89e841c35e95b
3
{ "blob_id": "cd3ecca0eeb72da63366e82cabd89e841c35e95b", "branch_name": "refs/heads/master", "committer_date": 1374517572000, "content_id": "0ced44fcc98cf9e0eac6eee23bde8ebded47dbc4", "detected_licenses": [ "Apache-2.0" ], "directory_id": "15dd9731ded2c410f0251ee9dc6f5b0d04fe7401", "extension": "py"...
2.703125
stackv2
import logging from google.appengine.ext import db class Configuration(db.Model): arduino_phone_number = db.StringProperty() appengine_phone_number = db.StringProperty() twilio_sid = db.StringProperty() twilio_token = db.StringProperty() def get_configuration(): existing = Configuration.all().fet...
72
28.89
92
11
448
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c68526b93bafa349_4a20d794", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 25, 34 ]
[ null, null ]
[ 18, 18 ]
[ 88, 92 ]
2024-11-19T02:01:08.125313+00:00
1,543,863,394,000
dd30249f9f1cace07f32709c372e0addcde03433
2
{ "blob_id": "dd30249f9f1cace07f32709c372e0addcde03433", "branch_name": "refs/heads/master", "committer_date": 1543863394000, "content_id": "5e397122e6ce320a7a2b04bae26c516881f7c305", "detected_licenses": [ "MIT" ], "directory_id": "d9ccd511ee732ab2d5c52c725f74d702b6e38237", "extension": "py", "fi...
2.359375
stackv2
"""App""" import platform import os from flask import Flask, render_template, request, send_file from pmix.borrow import borrow # noinspection PyProtectedMember from static_methods import upload_file app = Flask(__name__) basedir = os.path.abspath(os.path.dirname(__file__)) path_char = '\\' if platform.system() == '...
79
33.85
79
16
529
python
[{"finding_id": "codeql_py/flask-debug_aa535b10343c7f51_b9c2063b", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-022" ]
[ "py/flask-debug", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1)." ]
[ 79, 75 ]
[ null, null ]
[ 5, 22 ]
[ 24, 38 ]
2024-11-19T02:01:11.022418+00:00
1,456,801,634,000
637bdd73527de01eee68afdc523d77e602bedb05
2
{ "blob_id": "637bdd73527de01eee68afdc523d77e602bedb05", "branch_name": "refs/heads/master", "committer_date": 1456801634000, "content_id": "ccd67ff8242a974362200d309a4d416e8699f3ce", "detected_licenses": [ "MIT" ], "directory_id": "31008db6fd6b7f16ba31fe0105ed32c4a104e076", "extension": "py", "fi...
2.375
stackv2
from flask import Flask from flask import current_app, request, abort import hashlib import json class ApiSequrity(object): def __init__(self, secret): super(ApiSequrity, self).__init__() self.secret = secret def gen_key(self, uid: str): combined = self.secret + uid[:8] hash_s...
37
33.95
97
23
300
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_939ee7652df5e636_d2b158ff", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (secret)](2) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (id)](3) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (id)](4) is used in a hashing algorithm (MD5) that i...
[ 14 ]
[ null ]
[ 32 ]
[ 56 ]
2024-11-19T00:04:16.550685+00:00
1,414,691,766,000
c25cb90a031a117457dce6108a3a6e9002457502
3
{ "blob_id": "c25cb90a031a117457dce6108a3a6e9002457502", "branch_name": "refs/heads/master", "committer_date": 1414691766000, "content_id": "2b38dd4dc584b645a6c5f812ba22ef5958f30672", "detected_licenses": [ "MIT" ], "directory_id": "652333f188be79da54cd64c8ca7c8b068d53d065", "extension": "py", "fi...
2.9375
stackv2
from flask import Flask from flask import request import os, sys app = Flask(__name__) @app.route("/") def hello(): return "Hello World!" @app.route('/upload', methods=['GET', 'POST']) def upload_file(): if request.method == 'POST': f = request.files['file'] f.save('./uploads/'+f.filename) ...
50
18.8
46
13
319
python
[{"finding_id": "codeql_py/flask-debug_4f8c13cf349508ea_522e8099", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-022" ]
[ "py/flask-debug", "py/path-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This path depends on a [user-provided value](1)." ]
[ 17, 14 ]
[ null, null ]
[ 5, 16 ]
[ 40, 39 ]
2024-11-19T00:04:43.034480+00:00
1,566,087,099,000
45b498f8c7b2e3206d5f7ba551571703f2a77f77
3
{ "blob_id": "45b498f8c7b2e3206d5f7ba551571703f2a77f77", "branch_name": "refs/heads/master", "committer_date": 1566087099000, "content_id": "7854376b282ed9fa58b06f531825211872418eda", "detected_licenses": [ "MIT" ], "directory_id": "06b33c8d3d252d0d34ad6242d8fc682f2f961384", "extension": "py", "fi...
3.234375
stackv2
#!/bin/env python import argparse def convert(MACaddress): if MACaddress.rfind(':') > 0: lconvert = lambda mac: '.'.join(MACaddress.replace(':', '')[i:i+4] for i in range(0, 12, 4)) return lconvert(MACaddress) elif MACaddress.rfind('-') > 0: lconvert = lambda mac: '.'.join(MACaddress.re...
28
32.79
100
16
261
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_43e8e1c7f6ed2c07_fb12d45a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 23 ]
[ null ]
[ 15 ]
[ 36 ]
2024-11-19T00:40:24.134043+00:00
1,676,139,610,000
74b4331aeb30a02a7f4027549b91112a79360ce8
2
{ "blob_id": "74b4331aeb30a02a7f4027549b91112a79360ce8", "branch_name": "refs/heads/master", "committer_date": 1676139610000, "content_id": "4f7ad847b7db83204441f83b4c01bc19dae85fcd", "detected_licenses": [ "MIT" ], "directory_id": "255e19ddc1bcde0d3d4fe70e01cec9bb724979c9", "extension": "py", "fi...
2.359375
stackv2
#!/usr/bin/python import sys, time, datetime, os, pwd # Get Arguments numArgs = len(sys.argv) # First argument Number to Call try: sys.argv[1] asteriskParams = {'numbertocall':sys.argv[1], 'context': 'itp-redial', 'extension':'s', 'variables':'', 'touchtime':''} except: print 'USAGE: gencallfile.rb [phone-nu...
59
30.64
117
14
595
python
[{"finding_id": "codeql_py/overly-permissive-file_699fc7041a7a2728_0a1191fb", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world writable." ]
[ 48 ]
[ null ]
[ null ]
[ 29 ]
2024-11-19T01:06:07.567771+00:00
1,693,585,381,000
b4116bb2ab07cd68bdf3402f1311bdfcade70f2e
2
{ "blob_id": "b4116bb2ab07cd68bdf3402f1311bdfcade70f2e", "branch_name": "refs/heads/main", "committer_date": 1693585381000, "content_id": "03fc7c198bbf141b52c9211b723667d15f70bf88", "detected_licenses": [ "Apache-2.0", "MIT" ], "directory_id": "d51f530078404a24f1844b53b037bbfed238a784", "extensi...
2.359375
stackv2
import jinja2 import yaml import os env = jinja2.Environment( loader=jinja2.FileSystemLoader(os.path.dirname(__file__)) ) with open('../metadata/sdks.yaml', 'r') as file: metadata = yaml.safe_load(file) for language in metadata.keys(): metadata[language] shortname = metadata[language]['pro...
18
24.22
70
12
102
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_4e56bc695513d68c_c78f22ef", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 5 ]
[ 7 ]
[ 7 ]
[ 2 ]
2024-11-19T01:06:11.790979+00:00
1,538,398,537,000
502d9cc607e6a7cfbce3906d8b73d5d66c41ead7
2
{ "blob_id": "502d9cc607e6a7cfbce3906d8b73d5d66c41ead7", "branch_name": "refs/heads/master", "committer_date": 1538398537000, "content_id": "ca31669ac61750e9af9ca673e8f48c0aa59774c7", "detected_licenses": [ "MIT" ], "directory_id": "6680fe21b9e9534fa1df9d9651af7075fcb817e0", "extension": "py", "fi...
2.4375
stackv2
from flask import Flask, request, jsonify from wtforms import Form, StringField, PasswordField, validators import requests import json app = Flask(__name__) @app.route("/auth", methods=['POST']) def auth_server(): form = ServerForm(request.form) address = form.address.data password = form.password.data ...
34
32.88
114
16
257
python
[{"finding_id": "codeql_py/full-ssrf_06146a12aee99bb2_2fa7af43", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
2
true
[ "CWE-918", "CWE-918" ]
[ "py/full-ssrf", "py/full-ssrf" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1).", "The full URL of this request depends on a [user-provided value](1)." ]
[ 26, 33 ]
[ null, null ]
[ 11, 11 ]
[ 110, 115 ]
2024-11-19T01:17:29.934350+00:00
1,460,304,720,000
c6eec8c5c793f89f6caeb741e9627b4dbc04a8e4
2
{ "blob_id": "c6eec8c5c793f89f6caeb741e9627b4dbc04a8e4", "branch_name": "refs/heads/master", "committer_date": 1460406878000, "content_id": "602529458b8434c1279fe217ab7cf8c14c67facd", "detected_licenses": [ "MIT", "BSD-2-Clause" ], "directory_id": "05db5efb0d3d83cde6ce0c93622a78ffc4796ae1", "ext...
2.34375
stackv2
import time from hashlib import md5 import requests from django.conf import settings from rest_framework.permissions import IsAuthenticated from rest_framework.response import Response from rest_framework.status import HTTP_400_BAD_REQUEST from rest_framework.views import APIView from rest_framework_extensions.cache.d...
279
35.23
104
20
2,068
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_d1149a56d0354410_c7e9b503", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
2
true
[ "CWE-327", "CWE-918" ]
[ "py/weak-sensitive-data-hashing", "py/partial-ssrf" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure.", "Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depends on a [user-provided value](2)." ]
[ 30, 36 ]
[ null, null ]
[ 25, 16 ]
[ 85, 83 ]
2024-11-19T01:17:34.665405+00:00
1,568,673,687,000
89b50a04643113350e1cb40dee354d4effb6f179
4
{ "blob_id": "89b50a04643113350e1cb40dee354d4effb6f179", "branch_name": "refs/heads/master", "committer_date": 1568673687000, "content_id": "8a09d26bdbed53294a73720ac870eb626f057a14", "detected_licenses": [ "MIT" ], "directory_id": "3188184f4ef36a28003b104f7a15246e06501c69", "extension": "py", "fi...
3.75
stackv2
if __name__ == '__main__': birthdays = { 'Courtney Young': 'June 26', 'Sarah Lamb': 'November 23', 'Ilsa Shaikh': 'March 18', 'Kevin Morton': 'June 17' } print('This is my tiny library of my friends\' birthdays! The birthdays we have on record are:') for name in birthdays: print (name) print('Who\'...
19
27.21
97
13
158
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b93065326c341b22_be4c8e4f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 12, 17 ]
[ null, null ]
[ 10, 9 ]
[ 14, 63 ]
2024-11-19T01:18:10.897251+00:00
1,613,078,874,000
0ddbe3b5163a43217b0ac798a23385031ae136a2
2
{ "blob_id": "0ddbe3b5163a43217b0ac798a23385031ae136a2", "branch_name": "refs/heads/main", "committer_date": 1613078874000, "content_id": "d1e96d1876bfd98eb33fde1f66fff1168d27d744", "detected_licenses": [ "Apache-2.0" ], "directory_id": "745e0199f4b22e20dd45cc0de08d356baf00ea4c", "extension": "py", ...
2.359375
stackv2
import requests import sys import json import urllib3 urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning) fhir_server_uri = sys.argv[1] token = sys.argv[2] json_file_path = sys.argv[3] headers = {'Authorization' : "Bearer " + token, 'Accept' : 'application/json', 'Content-Type' : 'application/jso...
19
26.05
115
9
127
python
[{"finding_id": "codeql_py/request-without-cert-validation_1732ca3ae668e397_9f823440", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 18 ]
[ null ]
[ 5 ]
[ 94 ]
2024-11-19T01:14:58.738380+00:00
1,542,686,116,000
05569d5e1d9775d86d6e8d2aba9e84b1b1a64691
3
{ "blob_id": "05569d5e1d9775d86d6e8d2aba9e84b1b1a64691", "branch_name": "refs/heads/master", "committer_date": 1542686116000, "content_id": "2c870a074be594d96e2e0e7c53960b0160bcd371", "detected_licenses": [ "Apache-2.0" ], "directory_id": "87a8de6f43fa9a8f7cab5e25f4d24f08c6112c56", "extension": "py"...
2.59375
stackv2
from flask import Blueprint, session, render_template from jinja2 import Template from myapp.models import db, Person blue = Blueprint("day02",__name__) @blue.route('/set') def set_session(): session['name'] = 'tom' return "OK" @blue.route('/get') def get_session(): res = session.get('name','游客') ret...
85
20.59
95
15
525
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_e5471ed54ee215f4_355234bb", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 25 ]
[ null ]
[ 16 ]
[ 34 ]
2024-11-19T01:15:11.368981+00:00
1,601,287,586,000
1a2ab956160ee4a035647807070090568fc93e16
2
{ "blob_id": "1a2ab956160ee4a035647807070090568fc93e16", "branch_name": "refs/heads/master", "committer_date": 1601287586000, "content_id": "1f4cbc1f56a02b76bd2d83fafb0bb9bbce71683f", "detected_licenses": [ "Apache-2.0" ], "directory_id": "b1dc778b8d764b80ebcfdd1c3ce4d4143bd75933", "extension": "py"...
2.4375
stackv2
""" Script for serving. """ import json import pickle import numpy as np import pandas as pd from bedrock_client.bedrock.metrics.service import ModelMonitoringService from flask import Flask, Response, current_app, request model = pickle.load(open("/artefact/model.pkl", "rb")) feature_cols = pickle.load(open("/artefa...
84
23
85
13
448
python
[{"finding_id": "codeql_py/code-injection_c1d0923b9dfbfb9e_1cf0f094", "tool_name": "codeql", "rule_id": "py/code-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This code execution depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "...
1
true
[ "CWE-094" ]
[ "py/code-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This code execution depends on a [user-provided value](1)." ]
[ 22 ]
[ null ]
[ 23 ]
[ 49 ]
2024-11-19T00:43:48.828501+00:00
1,512,156,771,000
438d108ca11b48ab7f1de3e6c151093945027d26
2
{ "blob_id": "438d108ca11b48ab7f1de3e6c151093945027d26", "branch_name": "refs/heads/master", "committer_date": 1512156771000, "content_id": "03086ce7946f9281ea8bd006d96bd74907ec5fab", "detected_licenses": [ "MIT" ], "directory_id": "08f3010b8300559771494d367f008233ca6ccaa8", "extension": "py", "fi...
2.328125
stackv2
#!/usr/local/bin/python3 # Written By Peter Yang # Copyright 2017 import subprocess import os import sys import time import requests import base64 import xml.dom.minidom from subprocess import Popen #below define the global variables for the program total_software_count=100#total number of software base_directory=...
178
36.54
140
18
1,516
python
[{"finding_id": "codeql_py/request-without-cert-validation_d24e5174670a8e04_1f186148", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 160 ]
[ null ]
[ 7 ]
[ 97 ]
2024-11-19T00:43:51.386168+00:00
1,452,121,831,000
1c9c120d78ed487a24e982239653320150720ac5
3
{ "blob_id": "1c9c120d78ed487a24e982239653320150720ac5", "branch_name": "refs/heads/master", "committer_date": 1452121831000, "content_id": "a031c4d3a55d1ce5e32c6fbf15d5ecf5524f1519", "detected_licenses": [ "Apache-2.0" ], "directory_id": "cc9ac37edbfc2651c3f1bd04a95845ced98abeec", "extension": "py"...
2.71875
stackv2
#!/usr/bin/env python """ Prune the crosswikis dictionary file to only include those above a certain probability. """ import re import sys import os import datetime import codecs import argparse import requests import urllib2 import pymongo import BeautifulSoup sys.path.insert(1, os.path.join(sys.path[0], '..')) fr...
146
31.84
103
22
920
python
[{"finding_id": "codeql_py/incomplete-hostname-regexp_741851fbfe467426_19dbb5e6", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'wikipedia.org', so it might match m...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/incomplete-hostname-regexp", "py/incomplete-hostname-regexp" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This regular expression has an unescaped '.' before 'wikipedia.org', so it might match more hosts than expected.", "This regular expression has an unescaped '.' before 'wikipedia.org', so it might match more hosts than expected." ]
[ 29, 30 ]
[ null, null ]
[ 35, 34 ]
[ 53, 52 ]
2024-11-19T00:43:53.055093+00:00
1,411,330,956,000
2b3321551db10d730b12db74564e130215d4467d
3
{ "blob_id": "2b3321551db10d730b12db74564e130215d4467d", "branch_name": "refs/heads/master", "committer_date": 1411330956000, "content_id": "abb068c4c6b44753c75ff8416bb51721a6d3ccfd", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "3bca0d7aa49bfddba274c85ad2b12245196a0a8d", "extension": "p...
2.890625
stackv2
import random from datetime import datetime from flask import Flask, jsonify from flask.ext.cache import Cache app = Flask(__name__) app.config.from_pyfile('hello.cfg') cache = Cache(app) #: This is an example of a cached view @app.route('/api/now') @cache.cached(50) def current_time(): return str(datetime.now...
50
20.98
55
12
311
python
[{"finding_id": "codeql_py/reflective-xss_7677d0d7a9fbc584_ab7d5441", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability d...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability due to a [user-provided value](2)." ]
[ 38 ]
[ null ]
[ 12 ]
[ 27 ]
2024-11-19T01:43:40.876276+00:00
1,632,408,872,000
059f1742396ef35f71756fc368ae36d1dcfe90b5
3
{ "blob_id": "059f1742396ef35f71756fc368ae36d1dcfe90b5", "branch_name": "refs/heads/main", "committer_date": 1632408872000, "content_id": "e25d0a1bad0a48fbe76cf4863a9d92c590ba14d7", "detected_licenses": [ "MIT" ], "directory_id": "5d4806038cc7d4704a8fc384fd2b0987ef36559a", "extension": "py", "file...
2.84375
stackv2
""" This is a Python example on how to create a custom data enrichment component using Python and Flask. For more information, see the Metamaze documentation or contact us at support@metamaze.eu. """ import logging import os import pickle from functools import wraps from typing import Any, Callable, Dict, List impor...
133
29.37
115
16
980
python
[{"finding_id": "codeql_py/flask-debug_53b417117a8c17bb_c8727b96", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
4
true
[ "CWE-215", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/flask-debug", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "HIGH", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 133, 77, 104, 115 ]
[ null, null, null, null ]
[ 5, 27, 19, 19 ]
[ 49, 54, 90, 62 ]
2024-11-19T01:43:45.526731+00:00
1,679,517,508,000
5c7013251ec265555d827fafe56e6992c10d177c
2
{ "blob_id": "5c7013251ec265555d827fafe56e6992c10d177c", "branch_name": "refs/heads/main", "committer_date": 1679517508000, "content_id": "e15b414ada40a1b0856c8b2efde694e9891730cc", "detected_licenses": [ "Apache-2.0" ], "directory_id": "43a1b3afeef61509488915328eb9aceea098c039", "extension": "py", ...
2.390625
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- # Copyright(c) 2021 The MITRE Corporation. All rights reserved. # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # # You may obtain a copy of the License at: # http://www.apache.org/lice...
164
30.7
78
14
1,135
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_551f017ef521caf4_812c98a4", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (certificate)](1) is used in a hashing algorithm (MD5) that is in...
3
true
[ "CWE-327", "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing", "py/insecure-default-protocol" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (certificate)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (certificate)](2) is used in a hashing algorithm (MD5) that is insecure.", "[Sensitive data (certificate)](1) is used in a hashing algorithm (SHA1) that is insecure.\n[Sensitive data (certificate)](2) is use...
[ 55, 56, 46 ]
[ null, null, null ]
[ 33, 35, 21 ]
[ 45, 47, 42 ]