added
stringlengths
32
32
created
int64
1,236B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.03
source
stringclasses
1 value
text
stringlengths
330
19.3k
num_lines
int64
16
648
avg_line_length
float64
15.5
59.3
max_line_length
int64
37
179
ast_depth
int64
8
38
length
int64
102
3.79k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.11k
276k
sast_codeql_findings_count
int64
1
33
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
33
rule_ids
listlengths
1
33
confidences
listlengths
1
33
severities
listlengths
1
33
messages
listlengths
1
33
line_starts
listlengths
1
33
line_ends
listlengths
1
33
column_starts
listlengths
1
33
column_ends
listlengths
1
33
2024-11-18T20:26:56.487450+00:00
1,537,993,079,000
89a2c6bdff2cb4449ecd22856bc931ca18f1e45c
2
{ "blob_id": "89a2c6bdff2cb4449ecd22856bc931ca18f1e45c", "branch_name": "refs/heads/master", "committer_date": 1537993079000, "content_id": "d7462003c8284b9d1051d798dacfd4229039b4b9", "detected_licenses": [ "MIT" ], "directory_id": "3abe956df2f838f1c1563059fdd2448ca4ee08d0", "extension": "py", "fi...
2.390625
stackv2
import flask, json, os import config, datetime from contexthandler import ContextHandler from cloudant_server import DatabaseAccess from utils import post_facebook_message, get_weather from flask import Blueprint, request, jsonify, make_response from flask_restful import Api, Resource from watson_developer_cloud import...
89
32.9
91
23
751
python
[{"finding_id": "codeql_py/reflective-xss_acee4217edf04c45_fea3c833", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 30 ]
[ null ]
[ 25 ]
[ 58 ]
2024-11-18T20:26:58.524773+00:00
1,397,436,144,000
00a93bd4ae66e32bbd2e9cd6787064fc9568facd
3
{ "blob_id": "00a93bd4ae66e32bbd2e9cd6787064fc9568facd", "branch_name": "refs/heads/master", "committer_date": 1397436144000, "content_id": "bacd7268923f7804da29c4c3dbd799600c706707", "detected_licenses": [ "MIT" ], "directory_id": "77abfc526949cf796c77a4290f5d3251cf9d1619", "extension": "py", "fi...
2.53125
stackv2
import socket import os import ssl import select import sys import commands import parsers import clients import string import protocols import logging class Server(object): """The chat server. It relays communication between client.""" _port = 0 _bind = "" _parser = None _server_client = None _clients = [] _e...
183
31.23
134
22
1,390
python
[{"finding_id": "codeql_py/insecure-default-protocol_564d603be0a6b93a_5419313a", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in...
1
true
[ "CWE-327" ]
[ "py/insecure-default-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used." ]
[ 125 ]
[ null ]
[ 20 ]
[ 99 ]
2024-11-18T20:52:15.192833+00:00
1,488,131,522,000
253e324f4b554a78a5dee72a7dac8b536c57c58a
3
{ "blob_id": "253e324f4b554a78a5dee72a7dac8b536c57c58a", "branch_name": "refs/heads/master", "committer_date": 1488131522000, "content_id": "7197ebcedf37279effaf48dbab6059c35a5d84a3", "detected_licenses": [ "MIT" ], "directory_id": "040b7db14e4ee2c0d6f30fed72777c2af575925b", "extension": "py", "fi...
2.890625
stackv2
#!/usr/bin/env python """ Copyright (c) 2015 World Wide Technology, Inc. All rights reserved. Revision history: 2 December 2015 | 1.0 - initial release 3 December 2015 | 1.1 - cosmetic and best practices updates. 14 December 2016 | 1.2 - address name conflict with 'items' """ ...
168
27.7
132
15
1,075
python
[{"finding_id": "codeql_py/request-without-cert-validation_5857cc753378ec88_af6fbfcd", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 111 ]
[ null ]
[ 17 ]
[ 106 ]
2024-11-18T19:02:59.157908+00:00
1,654,883,981,000
f0795d27ae4f3fb7ae56a11f847f17d56a57546d
2
{ "blob_id": "f0795d27ae4f3fb7ae56a11f847f17d56a57546d", "branch_name": "refs/heads/master", "committer_date": 1654883981000, "content_id": "abed7919b87386ab0a67c6a74a471a9883fe553e", "detected_licenses": [ "Apache-2.0" ], "directory_id": "731081ee61b207ba974f052b6b6bcb315bb2b508", "extension": "py"...
2.375
stackv2
import base64, json, requests # First example is with the new container registry tokens blade option in azure # Here you can skip many steps and get an acr access token easily # The user\pass of the token is the token_name\generated_password (1 of either passwords generated) # This is similar to using spervice princip...
78
38.14
158
10
779
python
[{"finding_id": "codeql_py/request-without-cert-validation_77e526c5f416d49e_42c8ecf6", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
5
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 25, 35, 52, 67, 76 ]
[ null, null, null, null, null ]
[ 12, 12, 12, 12, 12 ]
[ 85, 85, 86, 86, 85 ]
2024-11-18T19:14:28.292811+00:00
1,654,261,519,000
07dfb543e2aef159194ddebd74db39ccde942dae
2
{ "blob_id": "07dfb543e2aef159194ddebd74db39ccde942dae", "branch_name": "refs/heads/master", "committer_date": 1654261519000, "content_id": "e4aa2a8fd31bf85df5470367c7fee3f4300c9217", "detected_licenses": [ "MIT" ], "directory_id": "bee20f811ff64b58f6810bb100147bc4aea9b5a2", "extension": "py", "fi...
2.359375
stackv2
import logging from django.contrib.auth import authenticate from django.contrib.auth.password_validation import validate_password, \ get_password_validators from django.core.exceptions import ObjectDoesNotExist, ValidationError from rest_framework import status from rest_framework.response import Response from res...
149
39.89
99
17
1,085
python
[{"finding_id": "codeql_py/log-injection_1901de13a4bb6eb9_b69d983b", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
5
true
[ "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 48, 60, 63, 66, 69 ]
[ null, null, null, null, null ]
[ 37, 38, 35, 35, 35 ]
[ 75, 95, 69, 69, 69 ]
2024-11-18T20:06:14.958120+00:00
1,604,127,630,000
836c214202e7f47486e16df0b7fc461c83c1ab8c
3
{ "blob_id": "836c214202e7f47486e16df0b7fc461c83c1ab8c", "branch_name": "refs/heads/main", "committer_date": 1604127630000, "content_id": "c6eb62f065ff795649834dc62646278c5a226109", "detected_licenses": [ "Apache-2.0" ], "directory_id": "c2a8d4b65a44c39172321f7165e6acf9f9e17096", "extension": "py", ...
2.65625
stackv2
import requests, random, time, openpyxl, datetime, concurrent.futures, threading, bs4 requests.urllib3.disable_warnings() def getText(name): returnlist = [] with open(name, "r") as f: while True: a = f.readline() if len(a) == 0: break a = a.replac...
112
26.89
93
19
763
python
[{"finding_id": "codeql_py/request-without-cert-validation_c38aa87904730a97_c3f68959", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 54 ]
[ 60 ]
[ 20 ]
[ 14 ]
2024-11-18T20:18:11.854663+00:00
1,635,690,047,000
ec198ad7f6098c2705754d05b238181dc2439b54
2
{ "blob_id": "ec198ad7f6098c2705754d05b238181dc2439b54", "branch_name": "refs/heads/main", "committer_date": 1635690047000, "content_id": "e2d6321cad32c21ea38c8a8dd47c160ea2c94552", "detected_licenses": [ "MIT" ], "directory_id": "d5f9665d4dd4c995a77fd246772564cf761b4600", "extension": "py", "file...
2.390625
stackv2
import requests import json import os #在此处输入配置即可使用 url="192.168.1.1" #路由器网关url passwd="" #路由器管理密码 yidongusername="" #移动账号 yidongpassword="" #移动密码 yidongservice="" #移动服务名 dianxinusername="" #电信账号 dianxinservice="" #电信服务名,闪讯一般留空即可 #电信密码由于经常换,在程序内输入即可 #获取id内容 de...
156
18.74
87
15
890
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9908bffdc7de79ce_52a53afa", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 44 ]
[ null ]
[ 11 ]
[ 36 ]
2024-11-18T20:18:16.957994+00:00
1,568,095,888,000
5d14abe2f458d37b158e89c58b5413d7375af424
2
{ "blob_id": "5d14abe2f458d37b158e89c58b5413d7375af424", "branch_name": "refs/heads/master", "committer_date": 1568095888000, "content_id": "ed02fdebdd62875b802ebe7d17c6357e0f4d2727", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "8f863b79e68ff5ac679e7ea717f633629960c1e1", "extension": "p...
2.359375
stackv2
import datetime import json import logging import select import signal import socket import ssl import time from prometheus_client import start_http_server as prometheus_start_http_server from typing import Optional from .metrics import SERVER_LAST_CONTACT, SERVER_UP from .parser import Parser from .settings import S...
329
39.24
149
25
2,862
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0aafbe854124526c_da4b2efa", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 123 ]
[ null ]
[ 19 ]
[ 46 ]
2024-11-18T20:18:31.376772+00:00
1,604,151,386,000
eadcf588085ef472d0693c4573e401d572f51aa5
2
{ "blob_id": "eadcf588085ef472d0693c4573e401d572f51aa5", "branch_name": "refs/heads/master", "committer_date": 1604151386000, "content_id": "c8eb0e81de034281fa3f30972543585b8d5498e4", "detected_licenses": [ "MIT" ], "directory_id": "577fe8970d36b62c1ff98bb0b749aaed932453bd", "extension": "py", "fi...
2.328125
stackv2
# Copyright 2020 by Roman Khuramshin <mr.linqu@gmail.com>. # All rights reserved. # This file is part of the Intsa Term Client - X2Go terminal client for Windows, # and is released under the "MIT License Agreement". Please see the LICENSE # file that should have been included as part of this package. import os import...
273
37.03
131
21
2,138
python
[{"finding_id": "codeql_py/overly-permissive-file_74ee566fba9624ad_c2b42b82", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in open sets file to world writable.", "remediation": "", "location": {...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in open sets file to world writable." ]
[ 122 ]
[ null ]
[ 22 ]
[ 49 ]
2024-11-18T20:18:33.622950+00:00
1,591,441,439,000
d865bd5e90fd1409bf2d1f61a1d8d5a168b30ced
2
{ "blob_id": "d865bd5e90fd1409bf2d1f61a1d8d5a168b30ced", "branch_name": "refs/heads/master", "committer_date": 1591441439000, "content_id": "f0fe2391ec62bc9eda5d4c4a029b3db2ab487be7", "detected_licenses": [ "Apache-2.0" ], "directory_id": "1f09c0b7c9751bd8757ae97521650370e385968e", "extension": "py"...
2.4375
stackv2
# Create your views here. ## some utils import json import re import urllib3 from django.http import HttpResponse, HttpResponseRedirect, JsonResponse #templates stuff from django.template.loader import get_template from django.template import Context from tickplot.models import Scrips, Nsehistdata _email_restr = r"...
77
26.45
83
15
512
python
[{"finding_id": "codeql_py/overly-large-range_243a77644bdecc6e_578ae553", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with 0-9 in the same character class, and overlaps with A-Z in ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with 0-9 in the same character class, and overlaps with A-Z in the same character class, and is equivalent to \\[+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 15 ]
[ null ]
[ 41 ]
[ 44 ]
2024-11-18T20:43:35.639611+00:00
1,608,858,102,000
6c14f6a532fdee92e367d3ca627f1f1f71e9ae42
3
{ "blob_id": "6c14f6a532fdee92e367d3ca627f1f1f71e9ae42", "branch_name": "refs/heads/master", "committer_date": 1608858275000, "content_id": "1b7ed2e97f83b7b78a442451745b4f1f8bb3229a", "detected_licenses": [ "MIT" ], "directory_id": "5f5d4cd76d4ff69ed3b35eac162a9e2b760a4c55", "extension": "py", "fi...
2.6875
stackv2
from django.http import ( HttpRequest, HttpResponse, JsonResponse, HttpResponseBadRequest, HttpResponseNotAllowed, HttpResponseNotFound, ) from django.contrib.auth.decorators import login_required from django.db import transaction import json from ..api.arena import arena # POST @login_required def request_match(...
89
38.71
114
16
765
python
[{"finding_id": "codeql_py/stack-trace-exposure_fe37cb390bc1fc92_809306b3", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
2
true
[ "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 27, 89 ]
[ null, null ]
[ 39, 39 ]
[ 40, 40 ]
2024-11-18T20:44:15.462156+00:00
1,331,673,832,000
d3930ce4401a5331076b7f27626da907f45c5ab1
3
{ "blob_id": "d3930ce4401a5331076b7f27626da907f45c5ab1", "branch_name": "refs/heads/master", "committer_date": 1331673832000, "content_id": "81034131ce12b9d7eb179f44417f4008b0ee760d", "detected_licenses": [ "BSD-2-Clause", "BSD-2-Clause-Views" ], "directory_id": "d5973b68cabb0f6775cc6cbf257653ed9d...
2.65625
stackv2
"""The auth model Thanks to http://sarafsaurabh.wordpress.com/2010/08/10/pylons-authentication-and-authorization-using-repoze-what/ for repoze.what related authentication and code in this model """ import os from hashlib import sha1 from sqlalchemy import Column, ForeignKey from sqlalchemy.types import Unicode, Inte...
176
29
113
14
1,198
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_b226f4419c6ab575_d2b2de91", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-sensitive-data-hashing", "py/weak-sensitive-data-hashing" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expen...
[ 54, 82 ]
[ null, null ]
[ 21, 28 ]
[ 53, 57 ]
2024-11-18T20:57:31.091012+00:00
1,488,887,362,000
5a4fd77792f140594ae5db490b10bb8b367763cc
3
{ "blob_id": "5a4fd77792f140594ae5db490b10bb8b367763cc", "branch_name": "refs/heads/master", "committer_date": 1488887362000, "content_id": "fdc14409761e7b4ff107f987691ab77e3f910b82", "detected_licenses": [ "MIT" ], "directory_id": "674181cbe6d2e8a33bfaa6f1638ad5a5fb72d3de", "extension": "py", "fi...
2.984375
stackv2
''' downloader.py ''' import logging import os import requests logger = logging.getLogger('downloader.streambot') def _download(uri, local): ''' download from uri and save as local @param uri @param local @return True if download succeeds ''' try: resp = requests.get(uri, verify=F...
81
27.38
98
15
530
python
[{"finding_id": "codeql_py/request-without-cert-validation_856c1492a37c8e85_d18cdd7d", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 19 ]
[ null ]
[ 16 ]
[ 47 ]
2024-11-18T20:57:55.341154+00:00
1,572,373,639,000
26c0908f5151e985c89437ca18050b32a00027af
2
{ "blob_id": "26c0908f5151e985c89437ca18050b32a00027af", "branch_name": "refs/heads/master", "committer_date": 1572373639000, "content_id": "cee5c92b98b8ec9da93411557d9577425079c85f", "detected_licenses": [ "MIT" ], "directory_id": "339f5fe17f382f77db261758b1df9d942500cdf6", "extension": "py", "fi...
2.453125
stackv2
from django import forms from django.contrib.auth import authenticate import re from django.contrib.auth.models import User class LoginForm(forms.Form): username = forms.CharField(required=True, max_length=50, label='Username', widget=forms.TextInput(attrs={'class': 'form-control'}...
65
42.2
99
15
569
python
[{"finding_id": "codeql_py/polynomial-redos_72083f6131e0092e_c846fe85", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with ma...
1
true
[ "CWE-1333" ]
[ "py/polynomial-redos" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with many repetitions of '?'." ]
[ 23 ]
[ null ]
[ 44 ]
[ 52 ]
2024-11-18T21:10:18.604511+00:00
1,523,849,246,000
da764ba0a9aca8add6e8e4d833d233b6e64880fb
2
{ "blob_id": "da764ba0a9aca8add6e8e4d833d233b6e64880fb", "branch_name": "refs/heads/master", "committer_date": 1523849246000, "content_id": "4c6a19d8dd2b39b1b1a1403931a92217ac286acf", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "cec7b992e695de5c7be77c57ce6de191fc28d61f", "extension": "p...
2.5
stackv2
import os import sys import urllib import urllib.request import urllib.parse import ssl import requests import time import json from flask import request,Response,Flask,render_template from PIL import Image app = Flask(__name__) current_milli_time = lambda: int(round(time.time() * 1000)) @app.route('/') def index(): ...
55
29.16
73
15
407
python
[{"finding_id": "codeql_py/full-ssrf_2a6b8d92e1d87bf2_b385f445", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u...
3
true
[ "CWE-918", "CWE-022", "CWE-022" ]
[ "py/full-ssrf", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "The full URL of this request depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 46, 41, 49 ]
[ null, null, null ]
[ 9, 15, 15 ]
[ 38, 29, 35 ]
2024-11-18T21:10:58.681604+00:00
1,538,578,305,000
14df0da21ed02e3acb618441b8f12bcfb9ca1743
2
{ "blob_id": "14df0da21ed02e3acb618441b8f12bcfb9ca1743", "branch_name": "refs/heads/master", "committer_date": 1538578305000, "content_id": "5246817a82f1620bcf4b3a8646c16d57b250b0e4", "detected_licenses": [ "MIT" ], "directory_id": "5b3f33d6cf69192af4a82af44743ac4bc48769fb", "extension": "py", "fi...
2.34375
stackv2
#! /usr/bin/env python # -*- coding: utf-8 -*- """ Gitlab Webhook Receiver """ # Based on: https://github.com/schickling/docker-hook import json import yaml from subprocess import Popen, PIPE, STDOUT from argparse import ArgumentParser, ArgumentDefaultsHelpFormatter, FileType from importlib import import_module try: ...
152
35.59
95
17
1,146
python
[{"finding_id": "codeql_py/log-injection_7ad6c7af0f04615a_01d59f44", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
2
true
[ "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 38, 101 ]
[ null, null ]
[ 64, 63 ]
[ 71, 70 ]
2024-11-18T21:10:58.802057+00:00
1,581,902,357,000
46cdc4b15efdd3b6f8be6a630e1690734bde7330
3
{ "blob_id": "46cdc4b15efdd3b6f8be6a630e1690734bde7330", "branch_name": "refs/heads/master", "committer_date": 1581902357000, "content_id": "8dfa2336e081b8079b7023d2cfb976c594e08905", "detected_licenses": [ "MIT" ], "directory_id": "88ded6952eff03526e2c9083a9de090ca92c6dca", "extension": "py", "fi...
3.171875
stackv2
import json import requests import sys def main(): """Prompt the user, make the request and print results""" try: with open('key.json', 'r') as key_file: api_key = json.load(key_file).get('API_KEY') except IOError: print('Key file does not exist!') sys.exit(1) print...
74
33.3
103
15
629
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e69cc11186410512_e91fe904", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
24
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging...
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.", "This expression logs [sensitive dat...
[ 23, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70 ]
[ null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null, null ]
[ 19, 11, 11, 11, 11, 11, 11, 11, 11, 11, 11, 11, 11, 11, 15, 11, 11, 11, 11, 11, 11, 11, 11, 11 ]
[ 41, 43, 41, 43, 49, 47, 46, 49, 48, 47, 41, 52, 47, 50, 71, 51, 54, 52, 46, 41, 47, 52, 53, 47 ]
2024-11-18T21:11:08.739874+00:00
1,532,016,034,000
1a6ca69ec86a4dabcf615d060bd191e2edf85b6e
2
{ "blob_id": "1a6ca69ec86a4dabcf615d060bd191e2edf85b6e", "branch_name": "refs/heads/master", "committer_date": 1532016034000, "content_id": "a6e8c35f93248c1799b36730206c20c705decfe9", "detected_licenses": [ "MIT", "BSD-3-Clause" ], "directory_id": "b58792b4ddc68ffc99a203dd745bc848bd7410b6", "ext...
2.4375
stackv2
import json from baldrick.github.github_auth import repo_to_installationid_mapping from baldrick.github.github_api import RepoHandler from flask import Blueprint, request circleci = Blueprint('circleci', __name__) CIRCLECI_HANDLERS = [] def circleci_webhook_handler(func): """ Add a function that gets cal...
54
26.72
84
15
326
python
[{"finding_id": "codeql_py/reflective-xss_717241c9c93fbd85_dae91d4d", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 49 ]
[ null ]
[ 16 ]
[ 53 ]
2024-11-18T19:03:39.170949+00:00
1,551,748,729,000
eb37245636dcdfb9b7732dd7be5e38abdf74f0a5
2
{ "blob_id": "eb37245636dcdfb9b7732dd7be5e38abdf74f0a5", "branch_name": "refs/heads/master", "committer_date": 1551748816000, "content_id": "aa7f31e8e7003bb872b58e0d4903f60b8478a481", "detected_licenses": [ "ISC" ], "directory_id": "c62cae9ccf64857274639e3083ccf3631dde30af", "extension": "py", "fi...
2.3125
stackv2
#!/usr/bin/env python3 import re header = re.compile('(acro:|imitive:)') caps_only = re.compile('^[A-Z0-9_]+$') vhdl_param = re.compile('([A-Z0-9_]+)\s*=>\s*([XOB]?"[^"]*"|[0-9.]+|[A-Z0-9_]+)[^-]*(--.*)?') vhdl_template = re.compile('--.*Xilinx.*HDL.*Language.*Template') bit_extract = re.compile('\s*([0-9]*)\s*.bit[^...
135
31.28
96
22
1,054
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_06e9ed0b73d52a75_399a8113", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 133 ]
[ null ]
[ 12 ]
[ 56 ]
2024-11-18T19:28:42.047808+00:00
1,569,167,080,000
4aeb3891cbf8d416f45ce03da601b1279b7e2763
3
{ "blob_id": "4aeb3891cbf8d416f45ce03da601b1279b7e2763", "branch_name": "refs/heads/master", "committer_date": 1569167080000, "content_id": "2ef61a0f19f212009f8b3c9bc8322e4164e20bbe", "detected_licenses": [ "MIT" ], "directory_id": "01ec5e4372e5e4acfb6e8f6606aef5ab3dd34243", "extension": "py", "fi...
2.765625
stackv2
""" 短信发送工具类 @project: bright @file: .py @ide: PyCharm @auth: Eric Joe @email: whatisjava@hotmail.com @build: 2019-09-10 22:41 @info: """ import requests import json from bright.settings import SMS_CONFIG import random class SmsSender: def __init__(self, api_key=SMS_CONFIG['SMS_API_KEY']): self.api_key ...
55
21.29
119
14
339
python
[{"finding_id": "codeql_py/request-without-cert-validation_1da11e0a204ffd60_3c7c2c04", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 35 ]
[ null ]
[ 16 ]
[ 120 ]
2024-11-18T19:28:43.299230+00:00
1,648,134,677,000
cb492096d6ced0a771d915539c0a4fff4a6b0a63
2
{ "blob_id": "cb492096d6ced0a771d915539c0a4fff4a6b0a63", "branch_name": "refs/heads/master", "committer_date": 1648134677000, "content_id": "dc336358de507924a9108055d5ed52447f0b3b13", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "bc83db8996d870f37e8d9fa926e556f2fe25c2e2", "extension": "p...
2.484375
stackv2
"""Liveness/readiness checks for supervisor""" from django.core.cache import cache, InvalidCacheBackendError from django.db import DatabaseError from django.http import JsonResponse from django.views.decorators.cache import never_cache from .models import SoftwareCollection SUCCESS = "OK" # sentinel value indicatin...
68
24.85
74
11
371
python
[{"finding_id": "codeql_py/stack-trace-exposure_03ea9210d331941d_579ff204", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.\n[S...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.\n[Stack trace information](2) flows to this location and may be exposed to an external user." ]
[ 62 ]
[ null ]
[ 29 ]
[ 35 ]
2024-11-18T19:28:47.560364+00:00
1,568,217,803,000
251d81665cea60365ceb86ffa11d2d9a58a64971
3
{ "blob_id": "251d81665cea60365ceb86ffa11d2d9a58a64971", "branch_name": "refs/heads/master", "committer_date": 1568217803000, "content_id": "c8e8f0f1671bba59f29275908f045d6c78f56721", "detected_licenses": [ "MIT" ], "directory_id": "85a6bf1c2985b4e5ea2db798951ed71ffb7a00ba", "extension": "py", "fi...
3
stackv2
"""Templating related utilities """ # stdlib imports import json import os # third-party imports import jinja2 # local imports from shpkpr import exceptions from shpkpr import template_filters class InvalidJSONError(exceptions.ShpkprException): """Raised when a template can be rendered successfully but does not...
116
33.97
80
14
876
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_52fb9b87184092c6_c5fe00a6", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 102 ]
[ 108 ]
[ 20 ]
[ 6 ]
2024-11-18T19:28:49.484999+00:00
1,634,482,209,000
f4c2b2eb6a7704777070f733c259bd8535fbae01
3
{ "blob_id": "f4c2b2eb6a7704777070f733c259bd8535fbae01", "branch_name": "refs/heads/main", "committer_date": 1634482209000, "content_id": "cd98ec4bf1af81cc84bb3624fd864d83f1dcd6d8", "detected_licenses": [ "Apache-2.0" ], "directory_id": "d047690157fab54389641dfe91cec5c475a2b92d", "extension": "py", ...
2.796875
stackv2
#!python import requests import re import os import tarfile from distutils.version import StrictVersion class TorProject: """Class to perform operations on the TorProject site""" tor_project_root = "https://www.torproject.org" downloads_page = tor_project_root + "/download/" def __init__(self): ...
96
33.9
86
19
809
python
[{"finding_id": "codeql_py/tarslip_06c1da8d161c6201_d7ca53c1", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 62 ]
[ null ]
[ 9 ]
[ 10 ]
2024-11-18T19:29:02.524121+00:00
1,568,262,448,000
f388668bc89e50a3f18ac0170ca6c8a3dbefd9ae
2
{ "blob_id": "f388668bc89e50a3f18ac0170ca6c8a3dbefd9ae", "branch_name": "refs/heads/master", "committer_date": 1568270945000, "content_id": "5aba9baea7cfcbe65835d499963313e1283c7155", "detected_licenses": [ "Apache-2.0" ], "directory_id": "cf912394e9ce03e59a3f3819092fd05b4a1d01da", "extension": "py"...
2.390625
stackv2
# Copyright 2016 Scalyr Inc. # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, so...
361
43.71
126
18
3,380
python
[{"finding_id": "codeql_py/insecure-default-protocol_395e1f19fd3a445c_96e69b58", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/insecure-default-protocol", "py/insecure-default-protocol" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used.", "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used." ]
[ 323, 325 ]
[ null, null ]
[ 25, 25 ]
[ 105, 76 ]
2024-11-18T19:39:33.529144+00:00
1,592,383,792,000
dba187600a8397b0ff0aab19e0a09590cf3bb561
3
{ "blob_id": "dba187600a8397b0ff0aab19e0a09590cf3bb561", "branch_name": "refs/heads/master", "committer_date": 1592383792000, "content_id": "e17c282247ca38241f945d71c7eed19289906828", "detected_licenses": [ "MIT" ], "directory_id": "efdf173826b566e25923005cbf450378c38fdea4", "extension": "py", "fi...
2.640625
stackv2
#!/usr/bin/python # -*- coding: UTF-8 -*- import os import base64 import json import random from Crypto.Cipher import AES from configparser import ConfigParser def randomstr(): return ''.join(random.sample('123456890abcdefghijklmnopqrstuvwxyzABCDEDFGHIJKLMNOPQRSTUVWXYZ@#', 16)) def appconfigLoad(path): data = {} ...
77
30.62
102
14
729
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_cccf564ec22e2f8b_9578c9fa", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 64, 71 ]
[ null, null ]
[ 17, 24 ]
[ 54, 53 ]
2024-11-18T19:39:47.872138+00:00
1,684,067,671,000
7c64827f8241751d17e467fd7d93e4813106c6ef
3
{ "blob_id": "7c64827f8241751d17e467fd7d93e4813106c6ef", "branch_name": "refs/heads/master", "committer_date": 1684067671000, "content_id": "9d4e60ae62a197ae76711f4adc6f50ba50e17c70", "detected_licenses": [ "MIT" ], "directory_id": "358e29209787e370fe6c84f9fd3e1eabbc215414", "extension": "py", "fi...
2.578125
stackv2
import os import tarfile import wget import tqdm import pandas def download_id(wnid, out): print(f"Downloading: {wnid}") download_url = f"https://image-net.org/data/winter21_whole/{wnid}.tar" filename = wget.download(download_url, out) folder_name = os.path.join(out, wnid) if not os.path.exis...
29
26.62
76
10
204
python
[{"finding_id": "codeql_py/tarslip_35c4a91d87d6039e_a4ce0236", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 18 ]
[ null ]
[ 5 ]
[ 13 ]
2024-11-18T19:40:00.820761+00:00
1,551,704,186,000
2a901c675acebdbf72ba7a317f6492a2e3d2dd7b
2
{ "blob_id": "2a901c675acebdbf72ba7a317f6492a2e3d2dd7b", "branch_name": "refs/heads/master", "committer_date": 1551704236000, "content_id": "40f8aa1660dbb122940c21691a909b35a30837c8", "detected_licenses": [ "Apache-2.0" ], "directory_id": "cb0c150336539ef36d9e7817b7d23bd37142ef40", "extension": "py"...
2.34375
stackv2
from flask import Blueprint,render_template,flash,redirect,url_for,request,current_app,jsonify from App.models import Posts,User from App.forms import SendPosts,Upload,UpdateInfo #导入发表博客表单类 from flask_login import current_user,login_required from datetime import datetime import os,string,random from PIL import Image fr...
122
31.05
94
15
1,024
python
[{"finding_id": "codeql_py/path-injection_5e78bcd6badd93b4_76574dc8", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
4
true
[ "CWE-022", "CWE-022", "CWE-022", "CWE-022" ]
[ "py/path-injection", "py/path-injection", "py/path-injection", "py/path-injection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1).", "This path depends on a [user-provided value](1)." ]
[ 98, 104, 105, 106 ]
[ null, null, null, null ]
[ 35, 23, 23, 23 ]
[ 39, 48, 53, 53 ]
2024-11-18T20:18:02.604697+00:00
1,538,641,853,000
5e4c5d6584604b096bff7ae84aabeb6117867262
2
{ "blob_id": "5e4c5d6584604b096bff7ae84aabeb6117867262", "branch_name": "refs/heads/master", "committer_date": 1538641853000, "content_id": "a3a77c3b24a3c4a229b57663bd0c7e7be6fb0cb0", "detected_licenses": [ "MIT" ], "directory_id": "540cb3f9543b3f68e6f834db96d6610146f39723", "extension": "py", "fi...
2.34375
stackv2
import asyncio import ssl from collections import deque from . import consts from ._json import json from .containers import NsqMessage from .exceptions import ProtocolError, ERROR_CODES from .log import logger from .protocol import DeflateReader, Reader, SnappyReader async def create_connection(host='localhost', p...
370
28.15
79
18
2,254
python
[{"finding_id": "codeql_py/insecure-protocol_5609222170e77c5e_d457c5c2", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 specified by [call to ssl.SSLContext](1).", "remediation": "", "lo...
1
true
[ "CWE-327" ]
[ "py/insecure-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Insecure SSL/TLS protocol version TLSv1 specified by [call to ssl.SSLContext](1)." ]
[ 87 ]
[ null ]
[ 24 ]
[ 58 ]
2024-11-18T20:18:31.584302+00:00
1,445,962,095,000
594ed8380d9023b1b2c7293201c36480a5337c14
3
{ "blob_id": "594ed8380d9023b1b2c7293201c36480a5337c14", "branch_name": "refs/heads/master", "committer_date": 1445962095000, "content_id": "09d1977d81b70265ff0b708c19ff7f00dfe09621", "detected_licenses": [ "MIT" ], "directory_id": "62072e56c550b0fbfb4cf90414e6a7f29b65dffb", "extension": "py", "fi...
2.640625
stackv2
import requests, json class Playbasis: """The Playbasis Object""" BASE_URL = 'https://api.pbapp.net/' BASE_ASYNC_URL = 'https://api.pbapp.net/async/'; def __init__(self): self.token = None self.apiKeyParam = None self.respChannel = None def auth(self, apiKey, apiSecre...
299
37.52
131
15
2,735
python
[{"finding_id": "codeql_py/request-without-cert-validation_483edc9f5f039a18_7a3b0a81", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
5
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 31, 285, 286, 298, 299 ]
[ null, null, null, null, null ]
[ 15, 31, 27, 31, 27 ]
[ 46, 69, 58, 69, 58 ]
2024-11-18T20:18:34.580586+00:00
1,616,217,753,000
4d106b5257f6648c0bbe7f2301fb3a7886b644e2
3
{ "blob_id": "4d106b5257f6648c0bbe7f2301fb3a7886b644e2", "branch_name": "refs/heads/master", "committer_date": 1616217753000, "content_id": "e30691dc50e33572fe437af890285c61b569e5ff", "detected_licenses": [ "Unlicense" ], "directory_id": "273836a20afe8e2c8a25fb7f4b4d8dabafb83ff2", "extension": "py",...
2.640625
stackv2
""" nginx secure streaming application written by Darren Popham, 2019 """ import os import time import datetime import json from requests_oauthlib import OAuth2Session from flask import Flask, request, redirect, session, url_for, abort from flask import render_template from flask.json import jsonify from functools im...
249
31.42
133
16
1,692
python
[{"finding_id": "codeql_py/log-injection_8437fb61f255ccb6_d84505ab", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
3
true
[ "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1)." ]
[ 206, 219, 232 ]
[ null, null, null ]
[ 22, 22, 22 ]
[ 72, 73, 73 ]
2024-11-18T20:18:34.991009+00:00
1,556,789,773,000
0af4676cb69887dc3f1bc9584f7efb0de93024d9
3
{ "blob_id": "0af4676cb69887dc3f1bc9584f7efb0de93024d9", "branch_name": "refs/heads/master", "committer_date": 1556789773000, "content_id": "81ee72bb78bf78aaef78798fb9f79c642ddfeafa", "detected_licenses": [ "MIT" ], "directory_id": "38d93fe13c30ae92061a5fcb25a7a1df93041775", "extension": "py", "fi...
2.671875
stackv2
from flask import Flask, render_template, request import os import sqlite3 import threading import time import uuid def worker(): while True: time.sleep(12) with sqlite3.connect('database.db') as conn: for row in conn.execute('SELECT * FROM tasks WHERE resource IS NULL'): ...
66
27.29
142
17
455
python
[{"finding_id": "codeql_py/reflective-xss_0a9a27241ae4de90_ad5684f1", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
2
true
[ "CWE-079", "CWE-089" ]
[ "py/reflective-xss", "py/sql-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1).", "This SQL query depends on a [user-provided value](1)." ]
[ 32, 42 ]
[ null, null ]
[ 16, 26 ]
[ 28, 36 ]
2024-11-18T20:18:47.803064+00:00
1,496,209,181,000
8b2d3089526dfdff0961055f4c5196226edbe4d5
3
{ "blob_id": "8b2d3089526dfdff0961055f4c5196226edbe4d5", "branch_name": "refs/heads/master", "committer_date": 1496209181000, "content_id": "6d12cba117da0a543bd682249a45e81fc3d7a630", "detected_licenses": [ "MIT" ], "directory_id": "14060038591587c62edcb365cfbc99fdf469363d", "extension": "py", "fi...
2.59375
stackv2
# Python Standard Library import re from shutil import rmtree, copyfile # 3rd Party Libraries from jinja2 import Environment, PackageLoader, FileSystemLoader, ChoiceLoader # Local from stablogen.config import * from stablogen.Post import * from stablogen.code import CodeExtension, output_code_style def setup_jinja(i...
153
29.82
83
17
1,094
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_a75b3747fb18deb1_f4101634", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 20 ]
[ 31 ]
[ 11 ]
[ 6 ]
2024-11-18T20:18:49.627593+00:00
1,468,063,930,000
4054ccfdff4a7d6471c22cd26442955c64d69937
3
{ "blob_id": "4054ccfdff4a7d6471c22cd26442955c64d69937", "branch_name": "refs/heads/master", "committer_date": 1468063930000, "content_id": "991d73c4c38312849d7e3e8621cd4125055602d3", "detected_licenses": [ "MIT" ], "directory_id": "1045807a8505435781af654627fc0cbc0c3140a1", "extension": "py", "fi...
2.640625
stackv2
import os import json import tornado.web import requests import server BING_KEY = 'd9c59f6186204b4b8c12d4c26e6e84e4' BING_URL = 'https://bingapis.azure-api.net/api/v5/images/search' TYPES = ['anger', 'contempt', 'disgust', 'fear', 'happiness', 'neutral', 'sadness', 'surprise'] NUM_FETCH = 20 class GuessHand...
50
26.56
75
14
382
python
[{"finding_id": "codeql_py/path-injection_4f05291772a27229_8913f217", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 23 ]
[ null ]
[ 25 ]
[ 29 ]
2024-11-18T20:18:50.340956+00:00
1,451,479,176,000
4f4e8bb935b077675859e35b532de1d869f0cf39
2
{ "blob_id": "4f4e8bb935b077675859e35b532de1d869f0cf39", "branch_name": "refs/heads/master", "committer_date": 1451479176000, "content_id": "5a0f3fbc120267185c37ff6ba6c7fab893bbcb2b", "detected_licenses": [ "Apache-2.0" ], "directory_id": "2e041584fa24ccbcbdf56c0cd00f44ec06ca7081", "extension": "py"...
2.34375
stackv2
import logging import tornado.escape import tornado.web import tornado.websocket import hashlib, random, datetime from tornado import gen from tornado_mysql import err class GeneralData: """""" # STT 保存着sessionId,toren和创建时间,每个 get() 方法开始都应该有一个检测个方法 # sessionId 一直存活到会话结束,而toren就在每次提交之后改变 STT = dict() ...
109
33.7
90
23
882
python
[{"finding_id": "codeql_py/code-injection_51424e95f42cb9bd_880706ce", "tool_name": "codeql", "rule_id": "py/code-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This code execution depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "...
1
true
[ "CWE-094" ]
[ "py/code-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This code execution depends on a [user-provided value](1)." ]
[ 81 ]
[ null ]
[ 24 ]
[ 31 ]
2024-11-18T20:29:38.600735+00:00
1,429,073,072,000
5d0def0497e73ae51ef7847209d717c92c3f1057
3
{ "blob_id": "5d0def0497e73ae51ef7847209d717c92c3f1057", "branch_name": "refs/heads/master", "committer_date": 1429073072000, "content_id": "c08d0ab04ce1c3eb9fea5cf7ace4c4729b72015a", "detected_licenses": [ "MIT" ], "directory_id": "9bb30ddd77eb8c145e1f00029894a390988292c0", "extension": "py", "fi...
2.515625
stackv2
#!/usr/bin/python # -*- coding: utf-8 -*- """ Created on Tue Jan 20 14:10:00 2015 @author: joschi """ from __future__ import print_function import time as time_lib from datetime import datetime, timedelta import collections import os import sys import csv #import simplejson as json import json import util input_form...
348
30.76
132
21
2,752
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_198139d3a1c9501b_e9d203d2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 54 ]
[ null ]
[ 23 ]
[ 88 ]
2024-11-18T20:29:42.992525+00:00
1,589,249,402,000
710c77c551a6fcabfe4e023f1f07155e489f241e
4
{ "blob_id": "710c77c551a6fcabfe4e023f1f07155e489f241e", "branch_name": "refs/heads/master", "committer_date": 1589249402000, "content_id": "537466df195a9b66170f48ed2937212e80d6eb85", "detected_licenses": [ "Apache-2.0" ], "directory_id": "643c9e81cd934d8eb65da0241f887c5b3fba704e", "extension": "py"...
4.21875
stackv2
# -*- coding:utf-8 -*- # __author__="X1gang" # Date:2018/12/8 ''' 非绑定方法 没有自动传值的功能 @staticmethod 绑定方法 绑定给谁就给谁调用,调用时会自动将调用者作为第一个参数传递给函数 1.绑定到对象的方法(不被任何装饰器装饰的函数) 2.绑定到类的方法 @classmethod 装饰的函数 class A: def __init__(self, name): self.name = name def call(self): # 绑定到对象的方法,对象调用时默认将调用者作为第一个参数自动传入,类也可调用,但只是...
143
19.46
93
10
1,150
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_591bfa78e8a57f7a_7e916c23", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.", "This expression logs [sensitive data (private)](1) as clear text." ]
[ 114, 116 ]
[ null, null ]
[ 7, 7 ]
[ 15, 15 ]
2024-11-18T20:29:48.529142+00:00
1,473,096,372,000
8bc553a1b4146255254777480a55dcc8a54f75fe
2
{ "blob_id": "8bc553a1b4146255254777480a55dcc8a54f75fe", "branch_name": "refs/heads/master", "committer_date": 1473096372000, "content_id": "6d86714abe5c068a5bde826f3ca82bffba6fef1d", "detected_licenses": [ "MIT" ], "directory_id": "64bc2ea92f33e1e7ec056b32c5d4db0bc7e13306", "extension": "py", "fi...
2.359375
stackv2
#!/usr/bin/env python # -*- coding: utf-8 -*- # file: pavement.py # authors: jonathan kelley 2016 from paver.easy import * import paver.doctools from paver.setuputils import setup import shutil import os import platform def value_from_specfile(getkey): """ loads the version and other keys from the .spec file ...
184
24.02
74
22
1,122
python
[{"finding_id": "codeql_py/overly-permissive-file_b1a6c3c063ec1ae2_d7594f71", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
2
true
[ "CWE-732", "CWE-732" ]
[ "py/overly-permissive-file", "py/overly-permissive-file" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable.", "Overly permissive mask in chmod sets file to world readable." ]
[ 82, 84 ]
[ null, null ]
[ 13, 9 ]
[ 32, 29 ]
2024-11-18T20:29:51.400147+00:00
1,514,504,467,000
b6a8848d3fb803545374b33c2f0298c68bc87429
2
{ "blob_id": "b6a8848d3fb803545374b33c2f0298c68bc87429", "branch_name": "refs/heads/master", "committer_date": 1514504467000, "content_id": "d24cd1707699375a66f5b6dc2a27c3ed9ffbb253", "detected_licenses": [ "MIT" ], "directory_id": "99b61eb75a0c4689ce934710ab40d0bb1cafa9f5", "extension": "py", "fi...
2.34375
stackv2
#!/usr/bin/env python # * coding: utf8 * ''' LocatorPallet.py A module that contains a pallet definition for data to support the web api locator services and methods to keep them current. Pre-requisites - The `secrets.py` file has been populated from the template file - The locators in `self.services` have bee...
309
48.83
165
16
3,535
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9220c7579c50f74a_4a74807e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
3
true
[ "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secre...
[ 118, 125, 125 ]
[ null, null, null ]
[ 41, 44, 54 ]
[ 48, 52, 63 ]
2024-11-18T20:51:20.305906+00:00
1,654,106,220,000
93b4bbea310e5a89445d9478504bdc126120c5c9
3
{ "blob_id": "93b4bbea310e5a89445d9478504bdc126120c5c9", "branch_name": "refs/heads/main", "committer_date": 1654106220000, "content_id": "4595f69513400f369f90ba6879b13f4aefba4e55", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "dec8352f5210a6d53c1f40d90f58674de39c72af", "extension": "py"...
2.609375
stackv2
# Licensed under a 3-clause BSD style license - see LICENSE.rst # -*- coding: utf-8 -*- """ =============== TracRemote.main =============== Contains entry point for command-line scripts. """ import os import sys from .connection import Connection def main_args(args=None): """Parse the command-line arguments pass...
212
35.57
79
20
1,578
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e6175869a5477475_6c177d5d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 207 ]
[ null ]
[ 19 ]
[ 75 ]
2024-11-18T20:51:20.602385+00:00
1,530,708,597,000
89288ef6c765461c49e45b7b1e577daef201107f
2
{ "blob_id": "89288ef6c765461c49e45b7b1e577daef201107f", "branch_name": "refs/heads/master", "committer_date": 1530708597000, "content_id": "764d6427cfd28f9e078772d936de434b9926c465", "detected_licenses": [ "Apache-2.0" ], "directory_id": "f5f926f90709354f68694bfe863c445f71a48265", "extension": "py"...
2.3125
stackv2
import datetime import sqlalchemy from flask import request, redirect, url_for, jsonify, flash from flask_login import logout_user, login_user, login_required, current_user from beedare import db from beedare.models import User from beedare import login_manager from . import * @auth_blueprint.route('/login', metho...
139
34.99
111
17
1,110
python
[{"finding_id": "codeql_py/stack-trace-exposure_a7feca2cda11058b_5811d8c5", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
4
true
[ "CWE-209", "CWE-209", "CWE-209", "CWE-209" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure", "py/stack-trace-exposure" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information...
[ 22, 40, 127, 134 ]
[ null, null, null, null ]
[ 24, 24, 24, 24 ]
[ 67, 67, 67, 67 ]
2024-11-18T20:51:29.849472+00:00
1,431,502,497,000
9eb62406260816131801eb722f853cc70bbf6e24
3
{ "blob_id": "9eb62406260816131801eb722f853cc70bbf6e24", "branch_name": "refs/heads/master", "committer_date": 1431502497000, "content_id": "1cbb53b4e8a409a64365d41831ccbb0aad892b21", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "0342e3f81113003db8cbbc1ae6bb713f8d98f280", "extension": "p...
2.671875
stackv2
""" This is the main python tool (the "backend") for uploading, processing, and ingesting data files. It will call the plotter to make plots too. You can start up the web server with: python upload_form.py Please try to keep lines to 80 characters where possible Print statements will show up in the terminal. ...
318
37.37
132
18
2,711
python
[{"finding_id": "codeql_py/flask-debug_3358f108df17551f_36271322", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
3
true
[ "CWE-215", "CWE-117", "CWE-079" ]
[ "py/flask-debug", "py/log-injection", "py/jinja2/autoescape-false" ]
[ "HIGH", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This log entry depends on a [user-provided value](1).", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 318, 161, 52 ]
[ null, null, null ]
[ 5, 22, 7 ]
[ 24, 28, 27 ]
2024-11-18T20:51:46.075888+00:00
1,644,750,479,000
f3e32db73943ef0a75f035705831141df8bdec34
3
{ "blob_id": "f3e32db73943ef0a75f035705831141df8bdec34", "branch_name": "refs/heads/master", "committer_date": 1644750479000, "content_id": "bb46220ce6a70f495fa3b7a80c0855ba391aee5b", "detected_licenses": [ "MIT" ], "directory_id": "e04d60b5c673b5c9eb4d0a4aa5993de73d707f10", "extension": "py", "fi...
3.3125
stackv2
# MAIN APP THAT USES FLASK FOR BACKEND # CLEAN, SIMPLE FRAMEWORK TO DO ALL THAT IS REQUIRED. # NOTHING MORE, NOTHING LESS. from flask import Flask, render_template, request # FLASK FILES import requests # FOR API CALLS # APP NAME = app app = Flask(__name__) # ROOT URL THAT RETURNS INDEX HTML @app.route('/') def ind...
130
30.11
96
14
1,146
python
[{"finding_id": "codeql_py/flask-debug_ab8203f9c818ec61_f24d1779", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-918" ]
[ "py/flask-debug", "py/partial-ssrf" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Part of the URL of this request depends on a [user-provided value](1)." ]
[ 130, 59 ]
[ null, null ]
[ 2, 13 ]
[ 21, 95 ]
2024-11-18T19:07:18.366515+00:00
1,680,803,901,000
72ae112721d3365ffdffe5e83da34c992f528a58
2
{ "blob_id": "72ae112721d3365ffdffe5e83da34c992f528a58", "branch_name": "refs/heads/main", "committer_date": 1680803901000, "content_id": "96c5c157945e0272e1a86e24752f8b1389dc2726", "detected_licenses": [ "MIT" ], "directory_id": "4056c19b4603e135e2162b77848c419a189e0c6c", "extension": "py", "file...
2.421875
stackv2
#! /usr/bin/env python3.6 """ server.py Stripe Sample. Python 3.6 or newer required. """ import stripe import json import os from flask import Flask, render_template, jsonify, request, send_from_directory from dotenv import load_dotenv, find_dotenv # Setup Stripe python client library load_dotenv(find_dotenv()) str...
135
37.74
119
19
1,087
python
[{"finding_id": "codeql_py/stack-trace-exposure_d128b8c1aed2fa75_28247119", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 115 ]
[ null ]
[ 20 ]
[ 21 ]
2024-11-18T19:07:25.297424+00:00
1,614,967,259,000
1e1b2f7aaa036826c2cd8e4482d698e1aaa60470
3
{ "blob_id": "1e1b2f7aaa036826c2cd8e4482d698e1aaa60470", "branch_name": "refs/heads/main", "committer_date": 1614967259000, "content_id": "e480076ebc43c6266cf7e4e67c127d1545869bc5", "detected_licenses": [ "MIT" ], "directory_id": "1caec96f60692080f1a1e3fd52353b3c2982f3de", "extension": "py", "file...
2.703125
stackv2
# Distributed under MIT license (see license.txt), Copyright Tarah Z. Tamayo # import leoverb import boto3 import json import requests import jinja2 import sys import re import unicodedata def sanitize_text(txt) -> str: # Some web data contains zero width strings and possibly other control characters. This strips...
111
28.68
107
13
899
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_c8304b12f83cad9b_0c8a7da8", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 70 ]
[ null ]
[ 12 ]
[ 56 ]
2024-11-18T19:07:56.849414+00:00
1,562,476,510,000
6c629b51035926aee2d56ff8dd894824646a18d3
3
{ "blob_id": "6c629b51035926aee2d56ff8dd894824646a18d3", "branch_name": "refs/heads/master", "committer_date": 1562481207000, "content_id": "39f2ccc08f6904e4e502b16d3aee4bb230227e09", "detected_licenses": [ "MIT" ], "directory_id": "c0991bf5a08fe4f1628382f8bdef9702e7fad99d", "extension": "py", "fi...
2.5625
stackv2
import argparse from .client import GoodreadsClient def main(args): gc = GoodreadsClient(args.key, args.secret) gc.authenticate(None, None) summary = [ "", "OAuth token: %s" % gc.session.access_token, "OAuth token secret: %s" % gc.session.access_token_secret, "", "Co...
29
33.69
96
11
230
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ee735a627c962920_1429c439", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (secret)](1) as clear text.", "This expression logs [sensitive data (secret)](1) as clear text." ]
[ 14, 22 ]
[ null, null ]
[ 11, 11 ]
[ 29, 27 ]
2024-11-18T19:08:01.933425+00:00
1,619,723,542,000
eb8886548283453bc9bf8cbd592c62726e17b952
3
{ "blob_id": "eb8886548283453bc9bf8cbd592c62726e17b952", "branch_name": "refs/heads/main", "committer_date": 1619723542000, "content_id": "809ab4f29b7cdf6ead5dc666f28cbd4c9d0cefd3", "detected_licenses": [ "MIT" ], "directory_id": "59dc58c93a08a2cb64a326a4f4d3bd4eaf3d134f", "extension": "py", "file...
2.84375
stackv2
from playwright.sync_api import sync_playwright import socket #Stage 2 from ipwhois.net import Net from ipwhois.asn import IPASN from pprint import pprint import ssl, socket class Solution: def __init__(self, url): #1.a self.user_given_url = url self.is_https = None self.domain_name...
128
29.09
130
19
856
python
[{"finding_id": "codeql_py/insecure-protocol_4e4847a54da431d4_2f908b44", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/...
1
true
[ "CWE-327" ]
[ "py/insecure-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.create_default_context](1)." ]
[ 86 ]
[ null ]
[ 18 ]
[ 21 ]
2024-11-18T19:18:18.170520+00:00
1,637,477,487,000
0ac2d30d883d2bdb482960a7fc8d3230148b5f38
3
{ "blob_id": "0ac2d30d883d2bdb482960a7fc8d3230148b5f38", "branch_name": "refs/heads/main", "committer_date": 1637477487000, "content_id": "6d21a7913e6544d7616ee5fb3914025fd87a879d", "detected_licenses": [ "MIT" ], "directory_id": "5292b03998384c0d2bb5858058892d7e45c5365b", "extension": "py", "file...
2.734375
stackv2
from hashlib import sha1 from random import * from sys import exit from os import urandom from Crypto.PublicKey import DSA from Crypto.Util.number import * rot = randint(2, 2**160 - 1) chop = getPrime(159) def message_hash(x): return bytes_to_long(sha1(x).digest()) def nonce(s, padding, i, q): return (pow(messag...
95
20.76
68
15
729
python
[{"finding_id": "codeql_py/weak-crypto-key_8bae33104970e539_9346266b", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an DSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",...
1
true
[ "CWE-326" ]
[ "py/weak-crypto-key" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Creation of an DSA key uses [1024](1) bits, which is below 2048 and considered breakable." ]
[ 44 ]
[ null ]
[ 11 ]
[ 29 ]
2024-11-18T19:18:32.717488+00:00
1,693,151,150,000
dc3a4bbd4df2b9bdec069b193ec1b7494c309989
3
{ "blob_id": "dc3a4bbd4df2b9bdec069b193ec1b7494c309989", "branch_name": "refs/heads/main", "committer_date": 1693151150000, "content_id": "ff8618dbc9b7924cea8efb2bb055e2d3ec76164e", "detected_licenses": [ "MIT" ], "directory_id": "a8ca3225e24c8b093056ce6baa1db6ba3aea8f97", "extension": "py", "file...
2.796875
stackv2
# -*- coding: utf-8 -*- """ Parametric 1D Inversion of Sounding Data ======================================== Here we use the module *SimPEG.electromangetics.static.resistivity* to invert DC resistivity sounding data and recover the resistivities and layer thicknesses for a 1D layered Earth. In this tutorial, we focus...
328
31.96
91
13
2,673
python
[{"finding_id": "codeql_py/tarslip_45f674d6210429f8_c4a1d27f", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 71 ]
[ null ]
[ null ]
[ 4 ]
2024-11-18T19:18:50.640254+00:00
1,669,125,703,000
65690bf8d82bdad2fe4d5d7edc47a0da4b747062
3
{ "blob_id": "65690bf8d82bdad2fe4d5d7edc47a0da4b747062", "branch_name": "refs/heads/master", "committer_date": 1669125703000, "content_id": "0c033419d9f66afb413699b92699c4ace318b6cc", "detected_licenses": [ "MIT" ], "directory_id": "b22716b295e19855fe450d7d115fff7bca12880a", "extension": "py", "fi...
2.609375
stackv2
#compare branch lengths on species tree to inferred events (per gene copy) --- read a species tree with branch lengths and a set of uml_rec files import os, re, sys, glob from collections import defaultdict import numpy as np import scipy import matplotlib matplotlib.use('Agg') import seaborn as sns import pandas as ...
109
35.39
145
17
1,060
python
[{"finding_id": "codeql_py/overly-large-range_48681e0ac35c0719_4bd10d5f", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\w in the same character class.", "remediation": "", "loc...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that overlaps with \\w in the same character class." ]
[ 23 ]
[ null ]
[ 26 ]
[ 29 ]
2024-11-18T19:18:55.329597+00:00
1,587,221,676,000
13205f89540ff378a8d3537ccd6a2375970eaf0f
3
{ "blob_id": "13205f89540ff378a8d3537ccd6a2375970eaf0f", "branch_name": "refs/heads/master", "committer_date": 1587221676000, "content_id": "040e575131be6ec75afafa09ff6113f48f71c6fa", "detected_licenses": [ "Apache-2.0", "MIT" ], "directory_id": "82daf96b3169d4927888a95e9c1e45ead616dba0", "exten...
2.5625
stackv2
# -*- coding: utf-8 -*- from __future__ import unicode_literals """ Views used to process the contact form. """ import logging from django.http import HttpResponseBadRequest from django.shortcuts import redirect from django.views.generic import FormView from envelope import signals from envelope.forms import Conta...
130
31.94
80
16
844
python
[{"finding_id": "codeql_py/url-redirection_51ec0af8ec9f280e_e4e316d8", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 105 ]
[ null ]
[ 25 ]
[ 47 ]
2024-11-18T19:19:00.480595+00:00
1,532,025,431,000
2dc371ce72a3aca6b2c4f2a9289b25629f31bd1f
3
{ "blob_id": "2dc371ce72a3aca6b2c4f2a9289b25629f31bd1f", "branch_name": "refs/heads/master", "committer_date": 1532025431000, "content_id": "76774a40df26ac5fc5178966dee0308a18c1b193", "detected_licenses": [ "MIT" ], "directory_id": "610e2032a5f813f66e3c9e4a3308e0137a486512", "extension": "py", "fi...
3.375
stackv2
# solution to http://cryptopals.com/sets/2/challenges/13 # injection into ciphered bytes, encrypted in AES ECB mode import Challenge09 from Crypto.Cipher import AES from random import randint # generates a random sequence of bytes. length is determined by length argument (int). # returns randomBytes (bytearray) def ...
126
44.87
116
14
1,407
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_005bdfc278673244_40e75b4b", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 25, 31 ]
[ null, null ]
[ 9, 9 ]
[ 36, 35 ]
2024-11-18T19:44:34.597109+00:00
1,623,602,862,000
db276708b53dbcb74e5abdaa742429feefcc7148
3
{ "blob_id": "db276708b53dbcb74e5abdaa742429feefcc7148", "branch_name": "refs/heads/main", "committer_date": 1623602862000, "content_id": "2f2f7cb0a3c392945773da0383c95a636615aac0", "detected_licenses": [ "MIT" ], "directory_id": "2fb060c6516bccc4302cfc6aeb3e99ab05671d80", "extension": "py", "file...
2.609375
stackv2
from flask import Flask, request import os import cv2 import dlib import numpy as np from keras.models import load_model import os # --------------------------------- # LOADING MODEL loadedModal = load_model('main.model') # --------------------------------- # CROPPING IMAGE FUNCTIONS detector = dlib.get_frontal_f...
104
28.62
84
15
934
python
[{"finding_id": "codeql_py/path-injection_479c034586b50605_a8df95e0", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
1
true
[ "CWE-022" ]
[ "py/path-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This path depends on a [user-provided value](1)." ]
[ 79 ]
[ null ]
[ 20 ]
[ 59 ]
2024-11-18T19:58:02.419483+00:00
1,526,034,747,000
7b0fbe29ab00f2c7c983fd948018a5336d8f1c6c
2
{ "blob_id": "7b0fbe29ab00f2c7c983fd948018a5336d8f1c6c", "branch_name": "refs/heads/master", "committer_date": 1526034747000, "content_id": "4dc83d9aca4993ed7ae11203f0a536362dde1cbe", "detected_licenses": [ "MIT" ], "directory_id": "8e84b64de2af016c5809772c52e4f8dd8e3381ad", "extension": "py", "fi...
2.328125
stackv2
#!/user/bin python #coding:utf-8 import commands import os import time import csv import sys import string import getpass import logging from itertools import islice import xlrd import json # ***************** authproxy **************************** """ Copyright 2011 Jeff Garzik AuthServiceProxy has the...
372
32.66
141
19
2,992
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1277ea60d5725ab7_2ddd6baf", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 293 ]
[ null ]
[ 30 ]
[ 87 ]
2024-11-18T20:10:19.325556+00:00
1,683,645,053,000
bd027f664ae689f38a9535e77e05391e04defe11
3
{ "blob_id": "bd027f664ae689f38a9535e77e05391e04defe11", "branch_name": "refs/heads/main", "committer_date": 1683645053000, "content_id": "67b46df5aae3d0e610835af53d6c11e43a0459ee", "detected_licenses": [ "MIT" ], "directory_id": "74ea34646f2d4116dff04d5ff3eaec07c75fa068", "extension": "py", "file...
3.25
stackv2
#Steady Scanner TickerConv v1.0.0 #9/11/2020 import pandas as pd import numpy as np import re import os all_trade_details = [] sum_list = [] filepath = "trade_history_test.txt" percent_change_search = r"([,-9]+)\w+" sell_type_search = r"([0-9]+)" file = open(filepath,"r+") #gets filepath for i, line in enum...
61
24.21
119
13
395
python
[{"finding_id": "codeql_py/overly-large-range_d7ad5cdd792ba2f1_4e2cf812", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[,\\-.\\/0-9\\].", "remediation": "", "location": {"f...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[,\\-.\\/0-9\\]." ]
[ 13 ]
[ null ]
[ 29 ]
[ 32 ]
2024-11-18T20:10:21.316757+00:00
1,626,038,619,000
2286e1056fadce16b5b9a61fb7825ee2ff05a9be
2
{ "blob_id": "2286e1056fadce16b5b9a61fb7825ee2ff05a9be", "branch_name": "refs/heads/master", "committer_date": 1626038619000, "content_id": "fab40beefe00a7c681808600f30e481b69c315ab", "detected_licenses": [ "MIT" ], "directory_id": "b8a7843d35364be3a68ff9771c65354291410e8a", "extension": "py", "fi...
2.484375
stackv2
import json from flask_swagger import swagger from flask import Flask, request, jsonify from flask_swagger_ui import get_swaggerui_blueprint from db import initialize_db from models import Notification, User, NotificationLog app = Flask(__name__) app.config['MONGODB_SETTINGS'] ={'host': 'mongo', 'port':27017} initia...
177
24.92
67
16
930
python
[{"finding_id": "codeql_py/stack-trace-exposure_e89570617da5e21d_a4cd7ea3", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 84 ]
[ null ]
[ 16 ]
[ 22 ]
2024-11-18T20:23:21.890658+00:00
1,445,873,227,000
7f9841a2ae85a745183966152f2ec36db9498f83
3
{ "blob_id": "7f9841a2ae85a745183966152f2ec36db9498f83", "branch_name": "refs/heads/master", "committer_date": 1445873227000, "content_id": "dd8cc529ad7c7b7b348a720bd0f0a4fd99505f1c", "detected_licenses": [ "MIT" ], "directory_id": "061f669b0125acd994857904dd0bd722bff5f4e6", "extension": "py", "fi...
3.078125
stackv2
__author__ = 'wfg2af' from Crypto.PublicKey import RSA from Crypto.Hash import SHA256 from Crypto import Random class userMessages: #Each user will have the public key of any other user. UserMap = {} UserName = "" def __init__(self, UserName = "", UserMap = {}, key = None): self.UserMap = UserM...
66
41.62
111
17
683
python
[{"finding_id": "codeql_py/weak-crypto-key_575bdd24036194ce_007b1f55", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",...
3
true
[ "CWE-326", "CWE-326", "CWE-326" ]
[ "py/weak-crypto-key", "py/weak-crypto-key", "py/weak-crypto-key" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable." ]
[ 37, 39, 61 ]
[ null, null, null ]
[ 10, 10, 18 ]
[ 46, 46, 55 ]
2024-11-18T20:23:23.170378+00:00
1,634,092,553,000
50a0ae9265067706ee6af9d8462889f4d02b2a2f
3
{ "blob_id": "50a0ae9265067706ee6af9d8462889f4d02b2a2f", "branch_name": "refs/heads/main", "committer_date": 1634092553000, "content_id": "afbef788f2fcf8ce4d5557289e08439a9cac23d9", "detected_licenses": [ "MIT" ], "directory_id": "c8a89a2b7e15c387de396837af288b357b4e9901", "extension": "py", "file...
3.25
stackv2
import requests import json # input city and get weather information city = input("Enter City: ") api_key ="c6da798dc76b00c38a31c1d4bad1daf5" url = f"http://api.openweathermap.org/data/2.5/weather?q={city}&appid={api_key}" res = requests.get(url) json_data = json.loads(res.text) weather = json_data["weather"][0][...
22
25.5
80
8
163
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9ed7fde7da52c028_30efa861", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
4
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text." ]
[ 19, 20, 21, 22 ]
[ null, null, null, null ]
[ 19, 24, 20, 23 ]
[ 26, 35, 28, 33 ]
2024-11-18T20:23:29.656334+00:00
1,525,106,057,000
52669c0b15a1d1d0596cae0090872015e71f9ffc
2
{ "blob_id": "52669c0b15a1d1d0596cae0090872015e71f9ffc", "branch_name": "refs/heads/master", "committer_date": 1525106057000, "content_id": "ec1c695b822c2d2e91cb7956c5105959a1e08082", "detected_licenses": [ "Apache-2.0" ], "directory_id": "d101c891deb3e07a8c83d83b5973631a1b633ce4", "extension": "py"...
2.484375
stackv2
# Script to finish deployment of new SPP server # Sets admin password based on argument and initializes onboard vSnap # Use sppdeploy.py -h for help # example: # python sppdeploy.py --host="https://172.20.58.59" --pass="newpass123" import json import logging from optparse import OptionParser import copy import sys imp...
80
32.3
109
12
631
python
[{"finding_id": "codeql_py/request-without-cert-validation_f1d21934764c45c3_552c2aad", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 48, 59 ]
[ null, 61 ]
[ 9, 9 ]
[ 94, 66 ]
2024-11-18T20:23:32.323663+00:00
1,576,166,000,000
95425a7fa8e735d0e78c6a3d3256db9bc6e7583c
3
{ "blob_id": "95425a7fa8e735d0e78c6a3d3256db9bc6e7583c", "branch_name": "refs/heads/master", "committer_date": 1576166000000, "content_id": "ad370cd7f9891103cffbaf6a6759f86ad678ff4b", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e04521686d16d66ab41ff62ccfde0e30cb677af3", "extension": "py"...
3.0625
stackv2
import hashlib def hexa_hash(packet): encoded = hashlib.md5(packet.encode()) return encoded.hexdigest() def solve(secret_key): i = 0 while True: if hexa_hash(secret_key + str(i))[:5] == "00000": return i i += 1 def parse(file_name): with open(file_name, "r") as f: ...
23
16.91
57
14
110
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_c8c31cf36567b3e8_155d8034", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure." ]
[ 5 ]
[ null ]
[ 27 ]
[ 42 ]
2024-11-18T20:49:31.442301+00:00
1,584,091,088,000
86d0b0838b5b6e14fcb5224a28009bfe52484e6c
3
{ "blob_id": "86d0b0838b5b6e14fcb5224a28009bfe52484e6c", "branch_name": "refs/heads/master", "committer_date": 1584091088000, "content_id": "a11a34c9f5a9b9752c5b0d29436889612b84299c", "detected_licenses": [ "MIT" ], "directory_id": "f10c1f31fe1492e214a1ba16d162a2c5bacee9f1", "extension": "py", "fi...
2.546875
stackv2
""" buildthedocs.utils Some random utilities Copyright (c) 2015 Pietro Albini Licensed under MIT license """ import pkg_resources import jinja2 def get_resource(path, jinja_context=None): """ Get a resource from the package, eventually building it with jinja """ path = "resources/"+path ...
23
24.48
78
11
140
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_e398fce5cfdf7210_fe93c479", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 20 ]
[ null ]
[ 20 ]
[ 40 ]
2024-11-18T20:49:34.852987+00:00
1,583,720,128,000
cc3a4562366329b89c28fc337e176aa6ef845558
2
{ "blob_id": "cc3a4562366329b89c28fc337e176aa6ef845558", "branch_name": "refs/heads/master", "committer_date": 1583720128000, "content_id": "8d4a49565b30a8d5c68c86e60ba2796eb53b98bd", "detected_licenses": [ "MIT" ], "directory_id": "d4c5046d1ae8052370123a2aa4a1f7d30a5d3388", "extension": "py", "fi...
2.390625
stackv2
# -*- coding: utf-8 -*- from flask import Flask from flask import request from flask import render_template from flask_cors import CORS import threading import logging import logging.config import os import sys import traceback import toml log_config_file = "./fdsns_log.conf" if os.path.exists(log_config_file): l...
103
24.77
87
15
650
python
[{"finding_id": "codeql_py/reflective-xss_023e0fc986aabd8c_bf762bd6", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 81 ]
[ null ]
[ 12 ]
[ 47 ]
2024-11-18T20:49:37.234455+00:00
1,629,560,716,000
fbb6b1ed5b4434a971386f1b66a3d31592984112
4
{ "blob_id": "fbb6b1ed5b4434a971386f1b66a3d31592984112", "branch_name": "refs/heads/main", "committer_date": 1629560716000, "content_id": "a705ea0b8cd8ff548a4740bd4d525c647b72db10", "detected_licenses": [ "MIT" ], "directory_id": "878ef1f97362353823a579ccfbe45686a8d81855", "extension": "py", "file...
4.0625
stackv2
#!/usr/bin/env python3 ''' Python Password Generator Ask for the number of characters wanted in a Password, take that number, generate a password randomizing letters, numbers and special characters. ''' import string import random import sys def main(): print('Python Password Generator\n') # Prompt for leng...
44
21.02
77
11
220
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_eb7b9d309f1e93db_dbee23ed", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 34 ]
[ null ]
[ 11 ]
[ 19 ]
2024-11-18T20:50:38.697748+00:00
1,692,812,852,000
99c80f74813d51fa7ee824582d276caf61418128
3
{ "blob_id": "99c80f74813d51fa7ee824582d276caf61418128", "branch_name": "refs/heads/main", "committer_date": 1692812852000, "content_id": "c9da1a4cd82dc4aa18bd860ef50ebc9d02bab82e", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "635c344550534c100e0a86ab318905734c95390d", "extension": "py"...
2.515625
stackv2
# Copyright (c) FIRST and other WPILib contributors. # Open Source Software; you can modify and/or share it under the terms of # the WPILib BSD license file in the root directory of this project. import os import sys from jinja2 import Environment, FileSystemLoader def output(outPath, outfn, contents): if not os...
52
27.6
83
13
366
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_d4ad28320450bf22_bba36a81", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 32 ]
[ 36 ]
[ 11 ]
[ 6 ]
2024-11-18T20:51:13.857390+00:00
1,693,477,536,000
74c318f3569159de25da8d1708f7389ce8e5c78b
2
{ "blob_id": "74c318f3569159de25da8d1708f7389ce8e5c78b", "branch_name": "refs/heads/master", "committer_date": 1693477536000, "content_id": "40f921fa12caa8cb18711438b434b38d43a3f230", "detected_licenses": [ "MIT" ], "directory_id": "c9500ad778b8521aaa85cb7fe3239989efaa4799", "extension": "py", "fi...
2.3125
stackv2
import komand import time from .schema import IssueInput, IssueOutput # Custom imports below import json import requests import queue import datetime import dateutil.tz requests.packages.urllib3.disable_warnings(requests.packages.urllib3.exceptions.InsecureRequestWarning) class Issue(komand.Trigger): def __ini...
117
39.09
113
22
995
python
[{"finding_id": "codeql_py/request-without-cert-validation_5b9b4b32362679fa_6a67b9bc", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 86, 111 ]
[ 92, 113 ]
[ 28, 24 ]
[ 18, 14 ]
2024-11-18T20:51:16.916891+00:00
1,611,239,329,000
9b88543830b922f90f1d81e675f0014aa8407686
2
{ "blob_id": "9b88543830b922f90f1d81e675f0014aa8407686", "branch_name": "refs/heads/master", "committer_date": 1611239329000, "content_id": "799940af594bf9972c7faedc6abc2d7ba4fa9aff", "detected_licenses": [ "MIT" ], "directory_id": "bf67b73039635a1b49e6e941df351653a3c527f0", "extension": "py", "fi...
2.453125
stackv2
from selenium import webdriver from selenium.webdriver.common.action_chains import ActionChains from selenium.webdriver.common.by import By from selenium.webdriver.support.wait import WebDriverWait from selenium.webdriver.support import expected_conditions as EC from selenium.common.exceptions import TimeoutException f...
135
32.28
172
18
1,022
python
[{"finding_id": "codeql_py/overly-large-range_350f17d34504e34c_d6ce42f7", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ...
1
true
[ "CWE-020" ]
[ "py/overly-large-range" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]." ]
[ 87 ]
[ null ]
[ 57 ]
[ 60 ]
2024-11-18T20:51:26.608025+00:00
1,668,872,863,000
39a7a0a2a216790a7bdefa3d614a70c9b1b28640
2
{ "blob_id": "39a7a0a2a216790a7bdefa3d614a70c9b1b28640", "branch_name": "refs/heads/main", "committer_date": 1668872863000, "content_id": "a56ef06da8bf8000cbe864251fcdd04d9fed18c6", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "d0eb51dfd302a40eef2d53f0759d3adeafd7c6fd", "extension": "py"...
2.453125
stackv2
#!/usr/bin/env python3 # app # A quick Flask app to demonstrate Machine Learning decision space. # # Author: Benjamin Bengfort <benjamin@bengfort.com> # Created: Sun Jul 21 06:22:47 2019 -0400 # # Copyright (C) 2019 Georgetown Data Analytics (CCPE) # For license information, see LICENSE.txt # # ID: app.py [] benjami...
174
30.6
127
16
1,269
python
[{"finding_id": "codeql_py/stack-trace-exposure_15589fe8611cc590_f9118f4a", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
1
true
[ "CWE-209" ]
[ "py/stack-trace-exposure" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user." ]
[ 127 ]
[ null ]
[ 16 ]
[ 27 ]
2024-11-18T21:13:47.057691+00:00
1,590,418,845,000
c3ed218aff1c3cf0a30bd7bf6063f29287209c9c
2
{ "blob_id": "c3ed218aff1c3cf0a30bd7bf6063f29287209c9c", "branch_name": "refs/heads/master", "committer_date": 1590418845000, "content_id": "17bb796162ec57e31725058781c0b35ae4e9309d", "detected_licenses": [ "MIT" ], "directory_id": "cd53da3d868129780dd03c4125753b509b2c6b53", "extension": "py", "fi...
2.453125
stackv2
import logging from flask import Blueprint, request, jsonify from flask.views import MethodView from flask_login import current_user, login_required from todos.schemas.tasks import TaskPost, TaskGet, TaskPatch, TaskOK, TaskError # noqa from todos.models.api.tasks_api import TaskApi # logger logger = logging.getLogger(...
417
35.29
113
19
3,494
python
[{"finding_id": "codeql_py/log-injection_d75176a840cddc9b_c67d2ec0", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno...
21
true
[ "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117", "CWE-117" ]
[ "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-injection", "py/log-...
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2).", "This log entry depends on a [user-provided value](1).", "This log entry depends on a [user-provided value](1).", "This log entry depends o...
[ 63, 114, 119, 125, 132, 135, 190, 195, 224, 227, 230, 287, 292, 300, 313, 306, 372, 377, 381, 391, 394 ]
[ null, 115, 120, null, null, null, 191, 196, null, null, 231, 288, 293, null, null, 307, 373, 378, null, null, 395 ]
[ 21, 26, 26, 26, 26, 26, 26, 26, 25, 30, 30, 26, 26, 21, 26, 30, 26, 26, 21, 26, 26 ]
[ 68, 69, 62, 91, 88, 88, 69, 62, 93, 92, 95, 69, 62, 68, 88, 76, 69, 62, 68, 88, 64 ]
2024-11-18T21:13:53.295403+00:00
1,571,052,081,000
6b669cb8857f02d6b721bf00b43fff44f64fb469
2
{ "blob_id": "6b669cb8857f02d6b721bf00b43fff44f64fb469", "branch_name": "refs/heads/master", "committer_date": 1571052081000, "content_id": "4b86df127e5305d1ca0a2ae7490317dd8e8ccadd", "detected_licenses": [ "Apache-2.0" ], "directory_id": "12c428f34ed3a1ff195b4012de8c84e603974a37", "extension": "py"...
2.328125
stackv2
""" Copyright (C) 2017 Extreme Networks. All rights reserved. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE L...
221
41.39
169
18
2,076
python
[{"finding_id": "codeql_py/request-without-cert-validation_9119aff8ec77c203_d93b3cf7", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
4
true
[ "CWE-295", "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation becau...
[ 43, 64, 87, 144 ]
[ 44, 65, null, null ]
[ 27, 27, 31, 31 ]
[ 119, 118, 96, 96 ]
2024-11-18T21:13:56.070800+00:00
1,443,562,075,000
a3068ac7ec0582930df53c028181273cbd7175e8
2
{ "blob_id": "a3068ac7ec0582930df53c028181273cbd7175e8", "branch_name": "refs/heads/master", "committer_date": 1443562075000, "content_id": "cdf55c5e91f1966aa0ac4129e9b06df8e061e159", "detected_licenses": [ "Apache-2.0" ], "directory_id": "5553b79f835fcb180185777f5d0f921e1431a386", "extension": "py"...
2.5
stackv2
# Standard lib imports #import logging from requests.auth import HTTPBasicAuth from requests_toolbelt import SSLAdapter from requests.adapters import HTTPAdapter from requests.packages.urllib3.poolmanager import PoolManager import requests import ssl import logging # Third party imports # None # Project level imports...
156
42.26
141
20
1,418
python
[{"finding_id": "codeql_py/request-without-cert-validation_08c5668f7bad5147_55de958e", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
2
true
[ "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1) by [this value](2).", "This request may run without certificate validation because [it is disabled](1) by [this value](2)." ]
[ 62, 79 ]
[ 66, 83 ]
[ 26, 50 ]
[ 10, 18 ]
2024-11-18T21:14:01.405197+00:00
1,684,934,513,000
15c0cdd85f8156cc47809e0e9a06ba73ff8ea65b
2
{ "blob_id": "15c0cdd85f8156cc47809e0e9a06ba73ff8ea65b", "branch_name": "refs/heads/master", "committer_date": 1684934513000, "content_id": "3fa51d50a5d92126a889ebdfa1245f03c32dbf8f", "detected_licenses": [ "MIT" ], "directory_id": "84889ddf879df0eff30f4f8a38855957c55939c0", "extension": "py", "fi...
2.46875
stackv2
import logging import subprocess import re import os from typing import Optional, Tuple from paramiko import SSHClient, AutoAddPolicy from backee.model.servers import SshBackupServer from backee.model.items import FilesBackupItem from backee.backup import constants log = logging.getLogger(__name__) class Transmi...
383
33.49
111
22
2,916
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_46fa704faafb4c9a_4ef69f7b", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 38 ]
[ null ]
[ 13 ]
[ 66 ]
2024-11-18T21:14:06.126544+00:00
1,496,699,916,000
029e990883360c5c56f70e953252d9f0b48223aa
2
{ "blob_id": "029e990883360c5c56f70e953252d9f0b48223aa", "branch_name": "refs/heads/master", "committer_date": 1496699916000, "content_id": "57f5f2365ef676a8dbed6ec8b1d123de38426ef6", "detected_licenses": [ "MIT" ], "directory_id": "49fcdf7a72e423f97cd747be8553054061d22ebf", "extension": "py", "fi...
2.46875
stackv2
"""Set up the default views.""" from pyramid.view import view_config from pyramid.httpexceptions import HTTPNotFound, HTTPFound from learning_journal.models import JournalEntries import datetime @view_config(route_name='list', renderer='../templates/list.jinja2') def list_view(request): """Return the list view.""...
79
30.43
82
17
542
python
[{"finding_id": "codeql_py/reflective-xss_562407eb6c979f38_0eb75416", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi...
1
true
[ "CWE-079" ]
[ "py/reflective-xss" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 42 ]
[ 46 ]
[ 20 ]
[ 14 ]
2024-11-18T21:14:08.681050+00:00
1,411,571,533,000
6887b73c1dc3f5aea0e041e5fad6aacba750979e
3
{ "blob_id": "6887b73c1dc3f5aea0e041e5fad6aacba750979e", "branch_name": "refs/heads/master", "committer_date": 1411571533000, "content_id": "aabfbf4d762daa4103007ccf4faf06ee4ae89201", "detected_licenses": [ "MIT" ], "directory_id": "8f815461e74d6a241a1eb67dd57dc1fea4a9d541", "extension": "py", "fi...
2.625
stackv2
from flask import Flask, render_template, request, redirect, url_for import corpus import markov from author_mapping import mapping app = Flask(__name__) @app.route('/') def hello_world(): return render_template('index.html', congresspeople=sorted(mapping.keys())) @app.route('/genera...
41
29.98
112
13
278
python
[{"finding_id": "codeql_py/flask-debug_c58b4fa79db6a003_9968f9bb", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-079" ]
[ "py/flask-debug", "py/reflective-xss" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 41, 29 ]
[ null, null ]
[ 5, 12 ]
[ 24, 26 ]
2024-11-18T21:14:10.890900+00:00
1,540,924,611,000
db30afa810792e79e932f494bc148da8aed73f75
2
{ "blob_id": "db30afa810792e79e932f494bc148da8aed73f75", "branch_name": "refs/heads/master", "committer_date": 1540924611000, "content_id": "2522a77e64e22393611bd49f5760213790a2f314", "detected_licenses": [ "MIT" ], "directory_id": "c8cb5e27ae3a81c3976d535ceb1c7db0dfe16a5a", "extension": "py", "fi...
2.328125
stackv2
#!/usr/bin/env python3 import urllib3 import requests import json import logging import urllib.response import urllib.request from datetime import datetime, timedelta # ctx = ssl.create_default_context() # ctx.check_hostname = False # ctx.verify_mode = ssl.CERT_NONE # ServiceNow - Post - # Vars Used to Post Data ...
133
30.47
148
18
1,001
python
[{"finding_id": "codeql_py/request-without-cert-validation_79d1e5fad629a3e5_f910c7b1", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 78 ]
[ null ]
[ 12 ]
[ 71 ]
2024-11-18T21:14:12.412430+00:00
1,612,433,033,000
eaef67f17ba7b248d3b384f21a0140936b1a03e1
2
{ "blob_id": "eaef67f17ba7b248d3b384f21a0140936b1a03e1", "branch_name": "refs/heads/master", "committer_date": 1612433033000, "content_id": "e89df15085aa5d14cea2a2023767f526baffe306", "detected_licenses": [ "MIT" ], "directory_id": "55e24c49e31bfb876106c2327e04a0364a622161", "extension": "py", "fi...
2.375
stackv2
# -*- coding: utf-8 -*- import socket, requests, validators, certifi from smart import checkURL from modules.json import creatJSON from modules.sort import sortData from modules.search import search from termcolor import colored from bs4 import BeautifulSoup from tqdm import tqdm #some init requests socket.setdefau...
134
27.1
121
31
891
python
[{"finding_id": "codeql_py/request-without-cert-validation_f45b5289affe9adf_fa79f932", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 79 ]
[ null ]
[ 16 ]
[ 69 ]
2024-11-18T21:14:35.318443+00:00
1,625,494,043,000
463e2ac234ad21b679aaf5149aa6381f99dc63e8
2
{ "blob_id": "463e2ac234ad21b679aaf5149aa6381f99dc63e8", "branch_name": "refs/heads/main", "committer_date": 1625494043000, "content_id": "2e30637b256419a13194e3149c9444e4a66c82c1", "detected_licenses": [ "MIT" ], "directory_id": "02695a155c9d1dced970b1c14e095d1a1dcbb2f2", "extension": "py", "file...
2.484375
stackv2
#!/bin/python import streamlit as st import pandas as pd import numpy as np import time, os import matplotlib.pyplot as plt import speech_recognition as sr import sys import os import nltk nltk.download('punkt') nltk.download('averaged_perceptron_tagger') from nltk.stem import PorterStemmer from nltk.tokenize import w...
61
32.13
118
20
513
python
[{"finding_id": "codeql_py/command-line-injection_4c905084b5b39eb7_61843482", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {...
1
true
[ "CWE-078" ]
[ "py/command-line-injection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This command line depends on a [user-provided value](1)." ]
[ 27 ]
[ null ]
[ 15 ]
[ 97 ]
2024-11-18T20:10:33.863460+00:00
1,576,122,263,000
dd0eb0c9546de89d1b6e2c6523954aa895f3fe35
2
{ "blob_id": "dd0eb0c9546de89d1b6e2c6523954aa895f3fe35", "branch_name": "refs/heads/master", "committer_date": 1576122263000, "content_id": "51abfedb1469044161d2f7430d7e29adb6d90b96", "detected_licenses": [ "Apache-2.0" ], "directory_id": "f404bf899e31638c3876d31a3521557c5e15f65b", "extension": "py"...
2.484375
stackv2
# -*- coding:utf-8 -*- ''' @project: '__dbreport__.py' @modules: report.host @description: @author: abelit @email: ychenid@live.com @created:Feb 28, 2018 @licence: GPL ''' import paramiko import re import time class HostMetric: def __init__(self, hostname, username, password, port, logpath=None): ...
132
26.1
146
16
894
python
[{"finding_id": "codeql_py/paramiko-missing-host-key-validation_d6f54b57754ac700_c32c79a4", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r...
1
true
[ "CWE-295" ]
[ "py/paramiko-missing-host-key-validation" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Setting missing host key policy to AutoAddPolicy may be unsafe." ]
[ 31 ]
[ null ]
[ 9 ]
[ 66 ]
2024-11-18T20:10:55.790346+00:00
1,691,842,282,000
ebd265a9af7d5e56e69c0490b0ad8a4042da3de7
2
{ "blob_id": "ebd265a9af7d5e56e69c0490b0ad8a4042da3de7", "branch_name": "refs/heads/master", "committer_date": 1691842401000, "content_id": "9f01b59da7d615b5889e195700b2c2a7ccb82863", "detected_licenses": [ "Apache-2.0" ], "directory_id": "530b180c3aade8e67cc61ad2baddff018f7d59a8", "extension": "py"...
2.359375
stackv2
# Copyright (C) 2012 Anaconda, Inc # SPDX-License-Identifier: BSD-3-Clause from __future__ import annotations import os import re import subprocess import sys from distutils.spawn import find_executable from functools import lru_cache from logging import getLogger from os.path import ( abspath, basename, e...
352
29.57
118
20
2,790
python
[{"finding_id": "codeql_py/redos_bfdb726edeb3bb04_73a26b50", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'A:/' and containing many repetiti...
2
true
[ "CWE-1333", "CWE-1333" ]
[ "py/redos", "py/redos" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This part of the regular expression may cause exponential backtracking on strings starting with 'A:/' and containing many repetitions of '!/'.", "This part of the regular expression may cause exponential backtracking on strings starting with 'A:/!' and containing many repetitions of '//'." ]
[ 313, 313 ]
[ null, null ]
[ 55, 66 ]
[ 66, 72 ]
2024-11-18T20:48:26.662870+00:00
1,608,607,275,000
24d5e601c89ce1d4ee2634979948942b14be2306
2
{ "blob_id": "24d5e601c89ce1d4ee2634979948942b14be2306", "branch_name": "refs/heads/master", "committer_date": 1608607275000, "content_id": "4a3e242c3cf3d7e2a0b9c89e4414c8c30c86ac76", "detected_licenses": [ "Apache-2.0" ], "directory_id": "e46d86df334c09d05567b7a90765f2b015dbacc7", "extension": "py"...
2.40625
stackv2
#!/usr/bin/python3 import requests import sys import datetime import logging import socket import ssl operation = sys.argv[1] web_service_url = sys.argv[2] web_service_need_check = sys.argv[3] ssl_date_fmt = r'%b %d %H:%M:%S %Y %Z' def ssl_expires_in(hostname): context = ssl.create_default_context() conn = co...
44
25.75
76
17
288
python
[{"finding_id": "codeql_py/insecure-protocol_910a53e0f26d0b2e_fa9fc7f9", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/...
1
true
[ "CWE-327" ]
[ "py/insecure-protocol" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.create_default_context](1)." ]
[ 16 ]
[ null ]
[ 12 ]
[ 19 ]
2024-11-18T21:11:35.455037+00:00
1,607,753,950,000
49f0fc80e2e1154d4445132158f94a9c15f3b8f8
2
{ "blob_id": "49f0fc80e2e1154d4445132158f94a9c15f3b8f8", "branch_name": "refs/heads/main", "committer_date": 1607753950000, "content_id": "4e88c77c93dac3cfa9f570743d2e5cc534ac8339", "detected_licenses": [ "MIT" ], "directory_id": "0f8bc35d50768f135c86310a991e66db48a4f53f", "extension": "py", "file...
2.3125
stackv2
import os, shutil, jinja2 from typing import Union from .introspect import logger, analyze_package, Documenter # unfortunately sphinx barfs when trying to pickle when we include package_template for some reason #from .def_render import package_template # sphinx imports from docutils import nodes from docutils.statemac...
235
49.39
132
17
2,578
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_d6201ce948dae3dd_466d7e26", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 133 ]
[ null ]
[ 42 ]
[ 103 ]
2024-11-18T21:25:48.494236+00:00
1,688,601,008,000
e9d33c244e0d09aed9113d82cfbdee7611726bad
2
{ "blob_id": "e9d33c244e0d09aed9113d82cfbdee7611726bad", "branch_name": "refs/heads/master", "committer_date": 1688601120000, "content_id": "6bd71ce2275860483cd753864b20c6621536b07b", "detected_licenses": [ "MIT" ], "directory_id": "f3669b4f8bea59e5e9f2a9f86588dba5ae7c675b", "extension": "py", "fi...
2.46875
stackv2
from __future__ import absolute_import from __future__ import print_function import json import sys import csv import math from six.moves import range from six.moves import zip def read_csv(csv_path): """ Read flat csv file, first row are headers Return file contents as json {1:{header1:value1,...},2:} ...
149
35.58
106
23
1,447
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_ab86eec17ae87508_01a777b3", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n...
5
true
[ "CWE-312", "CWE-312", "CWE-312", "CWE-312", "CWE-312" ]
[ "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/clear-text-storage-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.\nThis expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.", "This expression stores [sensitive d...
[ 84, 122, 123, 124, 81 ]
[ 91, null, null, null, null ]
[ 27, 27, 27, 27, 23 ]
[ 45, 80, 80, 80, 97 ]
2024-11-18T21:25:49.468090+00:00
1,629,202,358,000
ced28f903add2c6de98865818783f23a62720786
2
{ "blob_id": "ced28f903add2c6de98865818783f23a62720786", "branch_name": "refs/heads/master", "committer_date": 1629202358000, "content_id": "751e0d6cce055670e69fa389ac802d8e95ba2c08", "detected_licenses": [ "MIT" ], "directory_id": "407b920e862c31c20530c17ad833f5a8be0aa24b", "extension": "py", "fi...
2.375
stackv2
import os import logging from jinja2 import FileSystemLoader, Environment from dop import definitions def log(msg, info=False): if info: logging.info(msg) else: logging.debug(msg) return "" def raise_error(error): raise RuntimeError(error) class RunnerEnvironment: def __init__...
68
24.99
86
13
349
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_213bbc25c5f90fd4_158bcbf4", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 59 ]
[ null ]
[ 22 ]
[ 87 ]
2024-11-18T21:25:57.068908+00:00
1,684,764,777,000
4e272f60a2665228d4d169aaeeb643980c2e6372
2
{ "blob_id": "4e272f60a2665228d4d169aaeeb643980c2e6372", "branch_name": "refs/heads/master", "committer_date": 1684764777000, "content_id": "781f575c85036be824005b66a80987bbc12bf89d", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "8b5d61f17ab2e4c158270cf6dda79f9a47870df1", "extension": "p...
2.5
stackv2
#!/usr/bin/env python3 # -*- coding: utf-8 -*- """ Created in November 2019 @author: Quentin Lutz <qlutz@enst.fr> """ import pickle import shutil import tarfile from os import environ, makedirs, remove, listdir from os.path import abspath, commonprefix, exists, expanduser, isfile, join from pathlib import Path from ty...
411
34.33
120
21
3,391
python
[{"finding_id": "codeql_py/tarslip_f4ca1aef9609c423_5572224b", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially untrusted source](2)." ]
[ 46 ]
[ null ]
[ 5 ]
[ 8 ]
2024-11-18T21:26:14.164272+00:00
1,477,975,850,000
108e941d3ff2388d6e5b08e533b27d01788f2330
2
{ "blob_id": "108e941d3ff2388d6e5b08e533b27d01788f2330", "branch_name": "refs/heads/master", "committer_date": 1477975850000, "content_id": "9ff2c7e15da87f95c8bf916395a0a148489bc818", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "a74ff326d4bb000ba72f1035ff8050854cb04589", "extension": "p...
2.484375
stackv2
import os import jinja2 import glob from collections import namedtuple, defaultdict env = jinja2.Environment() fsl = jinja2.DictLoader({"customsidebar.html": """ {# need this comment line to be sure versionsselector is on its own line #} <!--versionselector--> {% if versions|length > 1 %} ...
127
28.39
123
17
888
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_e87f9efc531d1f7d_73d2ef82", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 8 ]
[ null ]
[ 7 ]
[ 27 ]
2024-11-18T21:51:47.688728+00:00
1,626,187,342,000
f4ed1ca6bb3dd4c51f5d05484e31e3518d821c8a
3
{ "blob_id": "f4ed1ca6bb3dd4c51f5d05484e31e3518d821c8a", "branch_name": "refs/heads/main", "committer_date": 1626187342000, "content_id": "b0df0b9221ed64f440ac9db946d61584f3b704bc", "detected_licenses": [ "Apache-2.0" ], "directory_id": "3234fcd1a07bce1233222aa3b5642bea8f69ba88", "extension": "py", ...
3.015625
stackv2
import pandas as pd from Crypto.Cipher import AES from Crypto.Hash import MD5 from Crypto.Random import random import numpy as np import time def build_trapdoor(MK, keyword): keyword_index = MD5.new() keyword_index.update(str(keyword)) ECB_cipher = AES.new(MK, AES.MODE_ECB) return ECB_cipher.encrypt(k...
72
33.11
98
13
588
python
[{"finding_id": "codeql_py/weak-cryptographic-algorithm_65640b078623c7a4_8d164ea2", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ...
2
true
[ "CWE-327", "CWE-327" ]
[ "py/weak-cryptographic-algorithm", "py/weak-cryptographic-algorithm" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "[The block mode ECB](1) is broken or weak, and should not be used.", "[The block mode ECB](1) is broken or weak, and should not be used." ]
[ 13, 20 ]
[ null, null ]
[ 12, 12 ]
[ 54, 49 ]
2024-11-18T21:52:08.000761+00:00
1,589,969,241,000
c9e643791cbdbaa9549634771f66450b3e2146b5
4
{ "blob_id": "c9e643791cbdbaa9549634771f66450b3e2146b5", "branch_name": "refs/heads/master", "committer_date": 1589969241000, "content_id": "42219fb395d97cb3ea472055288aab3f5532b412", "detected_licenses": [ "MIT" ], "directory_id": "8dac8ec2051f4df851f389b1b50dd2f210be8f29", "extension": "py", "fi...
3.75
stackv2
class User: def __init__(self,name,mobile_no,address=""): self.name = name self.mobile_no = mobile_no self.address = address class BankAccount: def __init__(self,name,mobile_no): self.name = name self.mobile_no =mobile_no #self.acc_no = acc_no self.generate_account_no() self.balance = 0 def genera...
95
21.26
79
12
766
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d06cc33daf378327_f37f3051", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 26 ]
[ null ]
[ 14 ]
[ 25 ]
2024-11-18T21:52:27.744057+00:00
1,533,607,280,000
b939e4c46724c69e49a67bceea1c9a6586f2f26f
3
{ "blob_id": "b939e4c46724c69e49a67bceea1c9a6586f2f26f", "branch_name": "refs/heads/master", "committer_date": 1533607280000, "content_id": "2db3bf88760c7162aff7ab66441bc7802baf2c04", "detected_licenses": [ "MIT" ], "directory_id": "3420294bac0d69c350326a1168d9a43bb17c7d36", "extension": "py", "fi...
2.515625
stackv2
import datetime from admin_app_config import db from flask import (request, url_for, redirect, flash, current_app) from flask_admin import (BaseView, expose) from flask_login import (current_user, login_user) from models import User from wtforms import Form from wtforms.fields import (DateField, HiddenField, PasswordFi...
115
39.19
79
22
907
python
[{"finding_id": "codeql_py/url-redirection_759abf0e90f19aa8_e7b148f1", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
1
true
[ "CWE-601" ]
[ "py/url-redirection" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 74 ]
[ null ]
[ 37 ]
[ 68 ]
2024-11-18T20:31:30.229218+00:00
1,676,139,610,000
718f3f15b8c98e35d02ec4151ce5c6bb1465dfcc
3
{ "blob_id": "718f3f15b8c98e35d02ec4151ce5c6bb1465dfcc", "branch_name": "refs/heads/master", "committer_date": 1676139610000, "content_id": "967e041a2ec380fc96d698865bffd6acc00f390b", "detected_licenses": [ "MIT" ], "directory_id": "255e19ddc1bcde0d3d4fe70e01cec9bb724979c9", "extension": "py", "fi...
2.5625
stackv2
''' If server admin stream is experiencing buffering and there are concurrent transcode streams from another user, kill concurrent transcode stream that has the lowest percent complete. Message in kill stream will list why it was killed ('Server Admin's stream take priority and this user has X concurrent streams'). Mes...
113
36.1
114
23
982
python
[{"finding_id": "codeql_py/request-without-cert-validation_e1948f191a2b6b87_1275979b", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
3
true
[ "CWE-295", "CWE-295", "CWE-295" ]
[ "py/request-without-cert-validation", "py/request-without-cert-validation", "py/request-without-cert-validation" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1).", "This request may run without certificate validation because [it is disabled](1)." ]
[ 50, 52, 54 ]
[ null, null, null ]
[ 17, 17, 17 ]
[ 72, 73, 75 ]
2024-11-18T20:59:40.730110+00:00
1,497,374,525,000
f0e1cd808519c1c8782534b3a7594db414358fd8
5
{ "blob_id": "f0e1cd808519c1c8782534b3a7594db414358fd8", "branch_name": "refs/heads/master", "committer_date": 1497374525000, "content_id": "3d25ab2de7f8037ecd0eb1e2e344bdd3982d441f", "detected_licenses": [ "MIT" ], "directory_id": "ee53fb7e53d3b1f6334361e2ed6dfa31a3abe970", "extension": "py", "fi...
4.6875
stackv2
# ------------------------------------------------------------------------------------------------- # FUNCTIONS # ------------------------------------------------------------------------------------------------- print('\n\t\tFUNCTIONS\n') def test_one(): # define a 'normal' fun...
112
48.79
129
10
873
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_94434b33b4fcc78b_abd32a25", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.\nThis expression logs [sensitive data (private)](4) as clear text." ]
[ 53 ]
[ null ]
[ 11 ]
[ 14 ]
2024-11-18T20:59:41.133284+00:00
1,547,282,580,000
d81fd51a95246342457f7531bc340a5c93e69431
3
{ "blob_id": "d81fd51a95246342457f7531bc340a5c93e69431", "branch_name": "refs/heads/master", "committer_date": 1547413387000, "content_id": "c4dcb8fd22968d3bf2fcc6d2800cb26591602437", "detected_licenses": [ "MIT" ], "directory_id": "e36970deb4e7f6025ec1e14ffed313f39e531326", "extension": "py", "fi...
2.625
stackv2
from flask import Flask from flask import abort, redirect, url_for, render_template, request from flask_less import lessc as flask_less from flask_sqlalchemy import SQLAlchemy from uuid import uuid4 as uuid from os import getcwd # RSS Schema must be initialized after db creation # 'db' variable must be bound to SQLA...
160
28.68
97
18
1,041
python
[{"finding_id": "codeql_py/url-redirection_0ddffb5c560bf1c6_8d81cc17", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
2
true
[ "CWE-601", "CWE-601" ]
[ "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 110, 153 ]
[ null, null ]
[ 25, 25 ]
[ 49, 54 ]
2024-11-18T21:10:30.242581+00:00
1,539,016,080,000
dd19e066bdb9404d5d6c4acde519b592283cd9e9
3
{ "blob_id": "dd19e066bdb9404d5d6c4acde519b592283cd9e9", "branch_name": "refs/heads/master", "committer_date": 1539016080000, "content_id": "0db765ddf823a591bf379eddd239e985438ec4b9", "detected_licenses": [ "MIT" ], "directory_id": "db67ad192564640cb266079c8f7c19568c260fe4", "extension": "py", "fi...
2.515625
stackv2
from flask import Flask, request, render_template, redirect, session, flash, url_for, jsonify from flask_pymongo import PyMongo from pymongo import MongoClient import datetime import re app = Flask(__name__) app.config['SECRET_KEY'] = 'HelloWorld' client = MongoClient('mongodb://abcd:abcd123@ds125263.mlab.com:25263/bl...
124
26.25
110
17
922
python
[{"finding_id": "codeql_py/flask-debug_23d44eeb88f715ab_0b9a08a9", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ...
2
true
[ "CWE-215", "CWE-730" ]
[ "py/flask-debug", "py/regex-injection" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", "This regular expression depends on a [user-provided value](1) and is executed by [re.findall](2)." ]
[ 124, 111 ]
[ null, null ]
[ 2, 18 ]
[ 21, 45 ]
2024-11-18T21:10:37.879437+00:00
1,631,083,680,000
cfa24cdb4d4ffa260114404394234fd51f087664
4
{ "blob_id": "cfa24cdb4d4ffa260114404394234fd51f087664", "branch_name": "refs/heads/main", "committer_date": 1631083680000, "content_id": "af6513d053c1576f53e8da0c1119a4521485cb6c", "detected_licenses": [ "Apache-2.0" ], "directory_id": "9dc16419cc28d7f83495cf26bdd0c1c81e6802b2", "extension": "py", ...
3.84375
stackv2
import csv contact_fields = ['phone', 'label_phone', 'first_name', 'surname', 'company', 'email', 'label_email'] contact_database = 'address_book.csv' def menu(): print("Welcome to Address Book\n") print("1. Add Contact\n") print("2. View Contacts\n") print("3. Delete Contact\n") print("4. Exit\n...
99
24.22
101
16
567
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c493e8dce1092d1b_36c7091e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 78 ]
[ null ]
[ 15 ]
[ 71 ]
2024-11-18T21:23:31.097805+00:00
1,607,450,743,000
ad010392ba2f3b948cb3d7abcd69466177ff338d
3
{ "blob_id": "ad010392ba2f3b948cb3d7abcd69466177ff338d", "branch_name": "refs/heads/master", "committer_date": 1607450743000, "content_id": "1b9fbf7cf0f6c4d974a521afc766b73d88b02b10", "detected_licenses": [ "Unlicense" ], "directory_id": "f2c4c5c21cb83bbe00e8d5f8d44eeca452c1e01e", "extension": "py",...
2.890625
stackv2
from colorama import Fore, Style UP_ONE_LINE = "\033[F\033[K" to_solve = '' with open('input.txt') as f: to_solve = f.read() to_solve = list(filter(None, to_solve.split('\n'))) to_solve = list(map(lambda x: x.split(': '), to_solve)) temp = [] for i in to_solve: ttemp = i[0].split(' ') tttemp = ttemp[0].split('-...
38
22.76
91
13
304
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_16c872e3c1403916_4f8f257e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 33 ]
[ null ]
[ 9 ]
[ 32 ]
2024-11-18T21:23:46.423684+00:00
1,395,325,288,000
a6ded67cf04d54e6eafabc534171f5e3334f11b4
2
{ "blob_id": "a6ded67cf04d54e6eafabc534171f5e3334f11b4", "branch_name": "refs/heads/master", "committer_date": 1395325288000, "content_id": "b2e5347279180478b7eff7b9a7d2576b2072ae5b", "detected_licenses": [ "MIT" ], "directory_id": "9ba9624474024d7497a4f81a2af839966d2ec152", "extension": "py", "fi...
2.328125
stackv2
import json import logging from flask import Blueprint, request import chronicler process = Blueprint('process', __name__) @process.route('', methods=['POST']) def processes(): try: details = request.get_json() if not details: raise Exception("No data") process = chronicler.add_process(details) ...
34
26.65
80
18
234
python
[{"finding_id": "codeql_py/stack-trace-exposure_8a87e39122dafc6a_46632677", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "...
3
true
[ "CWE-209", "CWE-209", "CWE-079" ]
[ "py/stack-trace-exposure", "py/stack-trace-exposure", "py/reflective-xss" ]
[ "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "[Stack trace information](1) flows to this location and may be exposed to an external user.", "[Stack trace information](1) flows to this location and may be exposed to an external user.", "Cross-site scripting vulnerability due to a [user-provided value](1)." ]
[ 20, 34, 31 ]
[ null, null, null ]
[ 12, 12, 13 ]
[ 46, 46, 80 ]
2024-11-18T21:23:57.726082+00:00
1,565,259,453,000
6c52d77817c944c00edf0bd545eb98db5c9d4d56
3
{ "blob_id": "6c52d77817c944c00edf0bd545eb98db5c9d4d56", "branch_name": "refs/heads/master", "committer_date": 1565259453000, "content_id": "abf402c33b07493937480e77d75787b5242b06dd", "detected_licenses": [ "MIT" ], "directory_id": "efa7b5676c6d0a66823ad377b40f0514e453ca69", "extension": "py", "fi...
2.953125
stackv2
from configparser import ConfigParser import json import logging import os import socket import time import requests HTTP_200_OK = 200 HTTP_400_BAD_REQUEST = 400 HTTP_500_INTERNAL_ERROR = 500 """Response codes""" CONFIG_PATH = '/usr/local/etc/ip2w.ini' """Configuration file path""" IP_URL = 'https://ipinfo.io/{}' ""...
201
24.63
97
15
1,223
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b36b688cbb678941_1bce3715", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
2
true
[ "CWE-312", "CWE-312" ]
[ "py/clear-text-logging-sensitive-data", "py/clear-text-logging-sensitive-data" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.", "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 191, 194 ]
[ null, null ]
[ 18, 18 ]
[ 59, 59 ]
2024-11-18T21:24:03.370150+00:00
1,610,418,027,000
3e36603f10915bf5d54a54907fa10cb80e25c5d0
3
{ "blob_id": "3e36603f10915bf5d54a54907fa10cb80e25c5d0", "branch_name": "refs/heads/master", "committer_date": 1610418027000, "content_id": "faab0dd0e2f25dcd44886f5d8936720159b3a152", "detected_licenses": [ "MIT" ], "directory_id": "9c20da18dc0c29ef2a8500417fd570698aef048e", "extension": "py", "fi...
2.796875
stackv2
from xml.dom import minidom import utils import os import urllib.request import zipfile import tarfile from collections import defaultdict import shutil import glob from bs4 import BeautifulSoup import csv __author__ = "Gwena Cunha" """ - Downloads dataset - Extracts information from XML (original and corrected essa...
296
39.46
148
21
2,554
python
[{"finding_id": "codeql_py/tarslip_1ec458b1109850b4_8f8a37d6", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 56 ]
[ null ]
[ 13 ]
[ 16 ]
2024-11-18T21:37:18.739814+00:00
1,547,185,016,000
b63dacc81c43b60210411c0941a64f2243bd7113
2
{ "blob_id": "b63dacc81c43b60210411c0941a64f2243bd7113", "branch_name": "refs/heads/master", "committer_date": 1547185016000, "content_id": "14b8ae17fd70b3e1e070beec547f899b180d491e", "detected_licenses": [ "BSD-3-Clause" ], "directory_id": "9e626463b41ea0deab0317cc41623d7829d3997e", "extension": "p...
2.40625
stackv2
#!/usr/bin/env python from setuptools import setup from setuptools.command.develop import develop from setuptools.command.install import install from setuptools import Command import glob import argparse import json import os import sys import shutil kernel_json = { 'argv': [sys.executable, '-m', 'reactivepy', '-...
178
26.38
76
18
1,080
python
[{"finding_id": "codeql_py/overly-permissive-file_4681e06d7bd68217_668ded80", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ...
1
true
[ "CWE-732" ]
[ "py/overly-permissive-file" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Overly permissive mask in chmod sets file to world readable." ]
[ 34 ]
[ null ]
[ 9 ]
[ 28 ]
2024-11-18T21:37:51.334266+00:00
1,478,259,015,000
eaef548b8a6d07b4d905dd1ae20be377e7d38253
2
{ "blob_id": "eaef548b8a6d07b4d905dd1ae20be377e7d38253", "branch_name": "refs/heads/master", "committer_date": 1478259015000, "content_id": "856d275d55d7c04713314e4ffc2d4451cd434422", "detected_licenses": [ "Apache-2.0" ], "directory_id": "2318dbbced3f068234185a03ec7110a251e85a04", "extension": "py"...
2.328125
stackv2
#!/bin/env python # -*- coding: utf-8 -*- # Created by Conan on 2016/10/31 import requests import string import logging import datetime import traceback from os import path as os_path from tornado.web import RequestHandler from tornado.web import HTTPError from tornado.options import options from kazoo.exceptions impor...
213
41.42
120
20
1,955
python
[{"finding_id": "codeql_py/partial-ssrf_011c0aeab4baf110_d8ff6a13", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depen...
4
true
[ "CWE-918", "CWE-918", "CWE-918", "CWE-117" ]
[ "py/partial-ssrf", "py/partial-ssrf", "py/partial-ssrf", "py/log-injection" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depends on a [user-provided value](2).\nPart of the URL of this request depends on a [user-provided value](3).\nPart of the URL of this request depends on a [user-provided value](4).", "Part of the URL of this...
[ 28, 37, 147, 72 ]
[ null, null, 153, null ]
[ 16, 16, 13, 33 ]
[ 65, 81, 11, 114 ]
2024-11-18T21:59:22.690879+00:00
1,670,328,408,000
cfc4cb684af38a2586b403e6325c5867a0ad4ad4
3
{ "blob_id": "cfc4cb684af38a2586b403e6325c5867a0ad4ad4", "branch_name": "refs/heads/master", "committer_date": 1670328408000, "content_id": "870bc86a27a146c819ff6e61cdbebfb150a40cb1", "detected_licenses": [ "MIT" ], "directory_id": "5f28febcb14385f79f2b41263753232bb44d23dc", "extension": "py", "fi...
3.078125
stackv2
""" I/O module. Adapted from keras: https://github.com/tensorflow/tensorflow/blob/r2.0/tensorflow/python/keras/utils/data_utils.py#L150-L270 """ import os import shutil import tarfile import zipfile from urllib.error import HTTPError, URLError from urllib.request import urlretrieve import six def _extract_archive(f...
130
34.79
124
20
1,022
python
[{"finding_id": "codeql_py/tarslip_d2154e5fae65da8a_7128aaa1", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially untrusted source](1)." ]
[ 49 ]
[ null ]
[ 21 ]
[ 28 ]
2024-11-18T21:59:23.385978+00:00
1,543,067,286,000
7dc56a1cccd0a7a4384a2a9101c4fcc5c164dff2
3
{ "blob_id": "7dc56a1cccd0a7a4384a2a9101c4fcc5c164dff2", "branch_name": "refs/heads/master", "committer_date": 1543067286000, "content_id": "6d91797a323e2ea8420825df8336dc701dfc1fa4", "detected_licenses": [ "MIT" ], "directory_id": "50bf58e6e47ca6d4d9b1199eba3dccd687a5d39b", "extension": "py", "fi...
2.546875
stackv2
#!/usr/bin/env python """ BibTeX fixer ------------ Fix your .bib BibTex files automatically This script will connect to Crossref's API and retrieve missing details in your bib files. Set CROSSREF_MAILTO env var to your mail address to gain access to a priority queue. It requires `pybtex`, `habanero`, and `tqdm`: ...
264
31.66
124
23
2,395
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_559313aba9e292ef_a55dfb9f", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [rxiv.org](1) may be at an arbitrary position in the sa...
1
true
[ "CWE-020" ]
[ "py/incomplete-url-substring-sanitization" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "The string [rxiv.org](1) may be at an arbitrary position in the sanitized URL." ]
[ 111 ]
[ null ]
[ 43 ]
[ 84 ]
2024-11-18T22:11:36.898520+00:00
1,551,121,833,000
207d9ec5c7c76b264f3c2f16f745daa49c7e8b0e
2
{ "blob_id": "207d9ec5c7c76b264f3c2f16f745daa49c7e8b0e", "branch_name": "refs/heads/master", "committer_date": 1551121833000, "content_id": "34fe51129c96a1eba61d350d524859ab46678df8", "detected_licenses": [ "MIT" ], "directory_id": "f2e2011f4b674c70038e3d2c72b7ea558bc9e925", "extension": "py", "fi...
2.390625
stackv2
import os import os.path import sys import shutil from distutils.dir_util import copy_tree import glob import time import threading import http.server import socketserver import webbrowser import json import markdown import argparse import signal from jinja2 import Template SCRIPT_DIR = os.path.dirname(os.path.realp...
400
33.52
154
22
2,869
python
[{"finding_id": "codeql_py/path-injection_75191ac1c13248fb_b0454edf", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ...
2
true
[ "CWE-022", "CWE-079" ]
[ "py/path-injection", "py/jinja2/autoescape-false" ]
[ "HIGH", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "This path depends on a [user-provided value](1).", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 117, 313 ]
[ null, null ]
[ 22, 24 ]
[ 26, 42 ]